Case Study of the Usage of an Authentication and Authorization Infrastructure (AAI) in an E-Learning Project
نویسندگان
چکیده
Authentication and Authorization Infrastructures (AAIs) are single sign-on systems. Their purpose is authenticating a user once, i.e. locally at the user’s so-called home organization, and then checking authorization of requested resource accesses based on user attributes the user’s home organization delivers. AAIs are just about being widely employed, and Switzerland is playing a pioneering role in AAI deployment as the national research and education network provider SWITCH has managed to get all Swiss universities involved in setting up an AAI. In that context, the SWITCH AAI is used, for instance, to control access to e-learning resources. We will report in this paper on SWITCH AAI and its use in the VITELS (Virtual Internet and Telecommunications Laboratory for Switzerland). By doing so, we will discuss how the AAI middleware Shibboleth is used to implement a concrete AAI. After explaining how Shibboleth is used to implement SWITCH AAI, we will discuss how VITELS integrates into SWITCH AAI, including server (or better: service) integration of VITELS into SWITCH AAI as well as discussing which attributes are delivered cross organizations.
منابع مشابه
A Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملAuthentication and authorization infrastructures (AAIs): a comparative survey
In this article, we argue that traditional approaches for authorization and access control in computer systems (i.e., discretionary, mandatory, and role-based access controls) are not appropriate to address the requirements of networked or distributed systems, and that proper authorization and access control requires infrastructural support in one way or another. This support can be provided, f...
متن کاملUser and Machine Authentication and Authorization Infrastructure for Distributed Wireless Sensor Network Testbeds
The intention of an authentication and authorization infrastructure (AAI) is to simplify and unify access to different web resources. With a single login, a user can access web applications at multiple organizations. The Shibboleth authentication and authorization infrastructure is a standards-based, open source software package for web single sign-on (SSO) across or within organizational bound...
متن کاملOn the Effects of Authentication and Authorisation Infrastructures on E-Commerce Environments
Authentication and Authorisation Infrastructures (AAIs) support service providers on the Internet in outsourcing security services. AAIs influence and change the process of e-commerce transactions on multiple points. Changes influence users, service providers, and provider federations likewise. This work analyses the alterations implied by an AAI, comparing various AAI paradigms and traditional...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006