asap://xacml. jury-rigged

15
asap://www.XACML. jury-rigged

Upload: galya

Post on 07-Jan-2016

15 views

Category:

Documents


0 download

DESCRIPTION

asap://www.XACML. jury-rigged. Client. PEP. PDP. Rule 1 Rule 2 etc. Policy 1. PolicySet. Rule 1 Rule 2 etc. Policy 2. Rule 1 Rule 2 etc. Policy 3. Target Condition. Rule. Subject Resource Action. Target.

TRANSCRIPT

Page 1: asap://XACML. jury-rigged

asap://www.XACML.jury-rigged

Page 2: asap://XACML. jury-rigged

Client PEP

PDP

Page 3: asap://XACML. jury-rigged

PolicySet

Rule 1Rule 2 etc

Rule 1Rule 2 etc

Rule 1Rule 2 etc

Policy 1

Policy 2

Policy 3

Page 4: asap://XACML. jury-rigged

TargetCondition

Rule

Page 5: asap://XACML. jury-rigged

SubjectResource

Action

Target

Page 6: asap://XACML. jury-rigged

<Subject> <Attribute AttributeId=“” DataType =“” <AttributeValue> … </AttributeValue> </Attribute> + </Subject>

+ Subject can have one or more ‘Attribute’

Page 7: asap://XACML. jury-rigged

<Resource> <Attribute AttributeId=“” DataType =“” <AttributeValue> … </AttributeValue> </Attribute> 1 </Resource>

1 Resource can have only 1 ‘Attribute’

Page 8: asap://XACML. jury-rigged

<Action> <Attribute AttributeId=“” DataType =“” <AttributeValue> … </AttributeValue> </Attribute> + </Action>

+ Action can have one or more ‘Attributes’

Page 9: asap://XACML. jury-rigged

Confused about Target?

• Either inside Policy/PolicySet

or Rule

• When inside Policy/PolicySet, Target provides more of meta-data.

• When inside a Rule, Target provides info required to process the rule.

Page 10: asap://XACML. jury-rigged

There are 3 or more XML files in the works each time a request goes to PEP

Client(Requestor) PEP PDP

Policy DB

1. Authorization Request in day to day format

2. Authorization Request translated into XML format (1st XML file)

4. Permit/Deny XML file

(2nd XML file)

3. Compare policy from step 2 with the ones in DB. (the third or more xml files)

Page 11: asap://XACML. jury-rigged

An example of these 3 XML filesRequest XML File

Taken from http://sunxacml.sourceforge.net/guide.html#xacml-target

Request

XML

File

Page 12: asap://XACML. jury-rigged

An example of these 3 XML filesPolicy XML File

This Target provides meta-data

Page 13: asap://XACML. jury-rigged

An example of these 3 XML filesPolicy XML File

This Target provides rule processing info

Page 14: asap://XACML. jury-rigged

An example of these 3 XML filesResponse/Decision XML File

Page 15: asap://XACML. jury-rigged

Resources and References

• Sun’s XACML Implementation

http://sunxacml.sourceforge.net/