CERIAS Tech Report 2004-32 TOWARDS IMPROVED FEDERATED IDENTITY AND PRIVILEGE MANAGEMENT IN OPEN SYSTEMS
نویسندگان
چکیده
Federated identity and privilege management are the cornerstones of access management on the Web. The increasing trend of business integration across enterprises and Web-based collaboration has led to tremendous growth of the identity and privilege management research and products in the recent past. However, despite the existence of available mechanisms, there are drawbacks in almost all well-known schemes that make them inadequate for use in large scale open system. Additionally, the migration of these mechanisms to the Web environment is happening at dissimilar pace, resulting in a wide gap in integrating privilege management with existing federated identity mechanisms to provide a comprehensive access management solution. In this paper, we discuss these issues in detail, namely the shortcomings of federated identity mechanisms, and their integration with privilege management mechanisms. In response, we provide an integrated approach to Web-based access management that combines a decentralized federated identity mechanism with a privilege management framework. Our solution allows name-binding to be avoided; doing so is essential to scalability and privacy in open systems. The solution has been prototyped and preliminarily tested to determine its feasibility. 1. Introduction The highly-networked enterprise environment is characterized by strategic partnerships to seize better business opportunities on the Internet. The desire to capitalize on such opportunities has driven the demand for mechanisms that allow web-based collaboration between enterprises. The access management to enterprise resources in such collaborative environments is absolutely critical for their security. The major industrial players in security also opine that " today's collaborative and interconnected e-business landscape requires a secure and effective way for enterprises to share trusted user identities " 1 and entitlements. However, if not done properly, imprecise access management could adversely affect the level of uninterrupted interoperability needed to seamlessly integrate enterprise units and business processes. The ability to federate identity across organizations while maintaining access rights and privileges is thus a major challenge [1]. The solution is federated identity and privilege management, which now stands as the key to seamless and secure enterprise integration and collaboration on the Web. The federated identity and privilege management mechanisms of today are, however, not without their shortcomings which need to be overcome in order to ensure that these mechanisms scale well. Among them is the use of (i) a centralized approach to providing federated identity, and (ii) identity or capability-based credentials. The centralized approach to federated identity has been subject to much scrutiny in recent …
منابع مشابه
Towards Improved Federated Identity and Privilege Management in Open Systems
1. Motivation The ability to federate identity across organizations while maintaining access rights and privileges poses a major challenge [5]. The solution is federated identity and privilege management. However, almost all well-known such schemes have their drawbacks. Additionally, the development of Web-based federated identity solutions has advanced more rapidly as compared to the Web-based...
متن کاملEnabling the Autonomic Management of Federated Identity Providers
The autonomic management of federated authorization infrastructures (federations) is seen as a means for improving the monitoring and use of a service provider’s resources. However, federations are comprised of independent management domains with varying scopes of control and data ownership. The focus of this paper is on the autonomic management of federated identity providers by service provid...
متن کاملFederated trouble ticket system for service management support in loosely coupled multi-domain environments
Operating services in multi-domain environments is inherently more complex than in a single domain because of the existence of multiple managed domains with various operating procedures, devices and systems in use. This increased complexity on one side and the demand to provide efficient and reliable services in such environment on the other impose the need to automate service operations proces...
متن کاملUnified Authentication Scheme Based on IBE in Trusted Network
The existing unified authentication schemes are based on Public Key Infrastructure (PKI)/Privilege Management Infrastructure (PMI), WS-Security, Kerberos etc. But they can't support the developing Trusted Network Connect (TNC) environment. To solve the problem, a unified authentication scheme supporting multi-authentication modes based on Identity-Based Encryption (IBE) in trusted network named...
متن کاملSemantic Interoperability of Authorizations
The shift from paper documents to their respective electronic formats is producing important advantages in the functioning of businesses and Public Administrations. However, this shift is often limited to the internal operation of each entity because of the lack of security in the electronic communication mechanisms. Traditionally, these entities have managed their Local Area Networks (LANs) or...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004