Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers

Amir Herzberg,

Yosi Mass,

Joris Mihaeli,

Dalit Naor

and Yiftach Ravid

 

Summary:

 

The authors seek to build a web of trust system (Trust Establishment) that allows parties to establish trust relationships based on certificates of reference.  In this system, trust is established in a “grass roots” manner meaning that there is not central root to the system.  Presenting certificates that satisfy the rules specified in the trust establishment policy can verify an entity.  The certificates themselves do not have any kind of access decisions; they merely present attributes of the entity requesting a resource.  (Principal of Separation of Users from Authorization)

 

Within the TE system, there are 3 types of entities: owners – define the access policies for a resource; subject- an entity requesting access to a resource and issuers- issuers certificates to either subjects or other issuers.

 

The TE system has two mechanisms for handling missing certificates.  The certificate presented by an entity can have a special attribute that is a pointer to additional certificates.  This will work well when the entity wants these certificates to be found.  In the case of negative certificates, the owner of the resource can supply a list of places to look for additional certificates. The certificate collector is responsible for locating the missing certificates either by looking in the database, or crawling the web to the repositories.

 

Trust Policy Language (TPL) – used to map entities to roles

Role:

·        Group of entities that can represent specific organizational units,

·        Has one or more rules defining how a certificate holder can become a member.

·        Requesting entity only needs to satisfy one of the rules in order to join

Special features of TPL:

 

 

Issues/Questions:

 

Pros:

 <contributed by Greg Koenig>

o       The design is based on industry standards such as XML.  I view this as positive for two reasons.  First, it allows an existing, proven technology to be used rather than reinventing technology. Second, it allows existing tools to be leveraged against creating an implementation of the design.

o       The system described in the paper "extends" existing security infrastructure but does not "depend" on it.  This would enable the system described in the paper to be used much more readily than if it required organizations to completely discard existing solutions.

o       The paper describes a nice orthogonal design in which the data in a certificate is separated from the security policy.  As the authors of the paper explain, a certificate authority cannot always know in advance what authorizations a certificate will be used to grant or deny, so they propose a system that separates the authentication problem from the authorization problem.  In my opinion, this is an important characteristic.

 

<contributed by Prasad Naldurg>

 

Cons:

<contributed by Amir Behgooy>