Presentation is loading. Please wait.

Presentation is loading. Please wait.

Role Based Access Control Venkata Marella. Access Control System Access control is the ability to permit or deny the use of a particular resource by a.

Similar presentations


Presentation on theme: "Role Based Access Control Venkata Marella. Access Control System Access control is the ability to permit or deny the use of a particular resource by a."— Presentation transcript:

1 Role Based Access Control Venkata Marella

2 Access Control System Access control is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources, logical resources, or digital resources.

3 Different Access Control Systems Discretionary Access Control: Restricts access to objects based solely on the identity of users who are trying to access them. Mandatory Access Control: Assign a security clearance to each user, and ensure that all users only have access to that data for which they have a clearance. Role-Based Access Control

4 What is RBAC? Role-Based Access Control Model is a nondiscretionary access control mechanism which allows & prompts the central administration of an organization specific security policy Permission to perform an operation on an object is assigned to roles, not to users Users are assigned to roles Users acquire their permissions based on the roles they are assigned

5 The process of defining roles should be based on a thorough analysis of how an organization operates and should include input from a wide spectrum of users in an organization. Permissions are defined based on job authority and responsibilities within a job function. Operations on an object are invocated based on the permissions. The object is concerned with the user’s role and not the user.

6 RBAC USERS ROLES OPERA TIONS OBJECTS privileges (UA) User Assignment Sess- ions user_sessionssession_roles

7 Core Components Defines: – USERS – ROLES – OPERATIONS (ops) – OBJECTS (obs) – User Assignments (ua) – Permissions (prms) – Sessions

8 RBAC supports three well-known security principles: Least Privilege Separation of duties Data Abstraction Least Privilege says that only minimum necessary rights should be assigned to a subject that requests access to a resource. Separation of duties is achieved by ensuring that mutually exclusive roles must be invoked to complete a sensitive task. Data abstraction is supported by means of abstract permissions such as credit and debit for an account. The degree to which data abstraction is supported will be determined by the implementation details Role-Based Access Control

9 Challenges in RBAC Policy must be clearly defined or RBAC breaks down completely Roles must be created that reflect business needs Permissions for roles to access objects must be determined Membership is each role must be determined

10 Advantage of RBAC Once implemented RBAC simplifies system administration Strong support for separation of duties Good auditing support Considered best practice by many

11 RBAC Simplifies System Administration When a user changes positions – Her roles are changed to reflect her new position – Her replacement is assigned her old roles – No need to remove user’s old access on each object If roles are well defined, the system administrator only needs to add a user to their assigned roles and the user has access to all the resources they require to complete their job

12 Separation of Duties Manages conflict of interest policy Reduces chances of fraud Spreads critical duties across roles and in turn users RBAC has built-in support for: – Static Separation of duties (SSD) – Dynamic Separation of duties (DSD)

13 RBAC Improves Auditing User, role, and permission reviews are built into RBAC Much easier to determine if an object should be accessed from a role instead of a person – Should Jane access the payroll object? ???

14 Disadvantages This is good model for a static, closed, centralized organization where you can form a Role Hierarchy. But, this model is not efficient for distributed or dynamic system.

15 References Ravi S. Sandhu “ Role-Based Access Control “ Gail - Joon Ahn and Ravi Sandhu “Role-Based Authorization Constraints Specification” Sandhu R. et. al. “Role-based Access Control Models”. IEEE Computer, 29(2):38-47 February 1996


Download ppt "Role Based Access Control Venkata Marella. Access Control System Access control is the ability to permit or deny the use of a particular resource by a."

Similar presentations


Ads by Google