CORBA Security
Contents
-
CORBA Security Features
-
Identification & Authentication
-
Establishing Credentials
-
Authorisation and Access Control
-
Privilege Delegation
-
Security Auditing
-
Communication Security
-
Non-repudiation
-
Security Administration
-
CORBA Security feature packages
-
Goal of CORBA Security
-
Security Requirements
-
Can CORBA Security meet the requirements?
CORBA Security Features
Identification
& Authentication
-
User Log onto the system
-
Principal accountability for its actions
-
Obtaining access to protected objects
-
Identifying message originator
-
Use of credentials
Establishing Credentials
-
User sponsor
-
Principal Authenticator
-
Credentials
-
Current
-
Multiple Credentials
-
Selecting security attributes
Authorisation &
Access Control
-
Object invocation access policy
-
Application access policy
-
Access decision functions
-
Privilege attributes of initiator
-
Target control attributes
-
Rights
Privilege Delegation
schemes
-
No Delegation
-
Simple delegation
-
Composite delegation
-
Combined privileges delegation
-
Traced delegation
Security Auditing
-
System audit policy
-
Object/object type
-
Operation
-
Time
-
Principal attributes
-
Success/failure of operation
-
Application audit policy
Communication Security
-
Security of Communication
-
Encryption and cryptographic checksum
-
Security technology independence
-
Public/private keys
Non-repudiation
-
Non-repudiation
-
Evidence of message creation
-
Evidence of message receipt
-
Action timestamp
-
Evidence long-term storage facility
-
Adjudicator
-
NR Credentials
Security Administration
-
Security policies
-
Under what conditions active entities may access objects
-
Authentication: required to prove identity, rights, and delegation policy
-
Security of communication between objects: Quality of Protection and trust
requirements
-
Accountability: security relevant activities that is needed
-
Security domains
-
Federations
-
Trusted domain
-
Security policies and domain objects
-
Security policy domain: the set of objects to which common security policies
apply.
-
Domain manager is used to find policy objects
-
There may be more than one policy object in each domain.
CORBA Security Feature Packages
-
Kerberos
-
SSL
-
DCE
-
SPKM
-
ECMA-SESAME
Goal of CORBA Security
-
Usability for end users
-
Flexibility of security policy
-
Security technology neutral
-
Application portability
-
Key security functionality in a trusted core
-
Levels of trust between Different domains
Security Requirements
-
Identification & Authentication
-
Authorisation & Access Control
-
Communications security
-
Data integrity
-
Confidentiality
-
Audit trails
-
Non-repudiation
-
Availability
Can CORBA Security meet these requirements?
-
CORBA Security Service provides B2 security
-
Authentication and credentials
-
Security associations
-
Encryption/hash codes
-
Defined audit Policies
-
Non-repudiation framework
-
Sets of proven feature packages
-
Flexible security architecture