Report on Attribute Certificates By Ganesh Godavari.

Slides:



Advertisements
Similar presentations
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Advertisements

Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Deploying and Managing Active Directory Certificate Services
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Public Key Management and X.509 Certificates
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Wednesday, June 03, 2015 © 2001 TrueTrust Ltd1 PERMIS PMI David Chadwick.
Use of AIA for Attribute Certificates
The EC PERMIS Project David Chadwick
CS526 – Advanced Internet And Web Systems Semester Project Public Key Infrastructure (PKI) By Samatha Sudarshanam.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
21 June 2006Copyright 2006 University of Kent1 Delegation of Authority (DyVOSE project) David Chadwick University of Kent.
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
11 CERTIFICATE SERVICES AND SECURE AUTHENTICATION Chapter 10.
Configuring Active Directory Certificate Services Lesson 13.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Lecture 5.3: Key Distribution: Public Key Setting CS 436/636/736 Spring 2012 Nitesh Saxena.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
National Institute of Advanced Industrial Science and Technology Brief status report of AIST GRID CA APGridPMA Singapore September 16 Yoshio.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 5 – Configure Site-to-Site VPNs Using Digital Certificates.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
15.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Key Management.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Windows 2000 Certificate Authority By Saunders Roesser.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
JISC Middleware Security Workshop 20/10/05© 2005 University of Kent.1 The PERMIS Authorisation Infrastructure David Chadwick
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Delegation of Authority David Chadwick
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Pkiuniversity.com. Alice Bob Honest Abe’s CA Simple PKI hierarchy.
Creating and Managing Digital Certificates Chapter Eleven.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
1 Certification Issue : how do we confidently know the public key of a given user? Authentication : a process for confirming or refuting a claim of identity.
Adding Distributed Trust Management to Shibboleth Srinivasan Iyer Sai Chaitanya.
1 Public Key Infrastructure Dr. Rocky K. C. Chang 25 February, 2002.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Public Key Infrastructure. A PKI: 1. binds public keys to entities 2. enables other entities to verify public key bindings 3. provides services for management.
CSE 4905 Public-key Infrastructure
Cryptography and Network Security
Chapter 15 Key Management
Authentication Applications
Adding Distributed Trust Management to Shibboleth
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Security in ebXML Messaging
زير ساخت كليد عمومي و گواهي هويت
جايگاه گواهی ديجيتالی در ايران
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
PKI (Public Key Infrastructure)
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Chapter 15 Key Management
National Trust Platform
Presentation transcript:

Report on Attribute Certificates By Ganesh Godavari

Dept CDept A Issuance of Attribute Certificates Central Applications Central Applications Central Applications Central Applications Department Applications Central Applications Department Applications Dept B External Company ACA Central ACA Local ACA Local ACA Local ACA Devolved User Central Applications

Issuance Central issuance - advantages –Suitable for small organizations Local issuance - advantages –Simplified user authentication –Simplified issuance procedures –Reduced administration overhead –Greater control –Simpler distribution

Distributing Attribute Certificates Pull Mirrors X.509 identity cert model -- certificates are written to directory (e.g. X.500) Applications requiring attribute certificates may “pull” them as required Push Users supply attribute certificate directly to application (similar to password model) No directory Attribute Certificate Server Attribute Certificate enabled Application Directory Publish Look up Given to user Submitted by user

Using Attribute Certificates CA RA CA Operator RA Operator Web Server Attribute Certificate Server User Manager Web Server Proxy Verifies AC Grants access Application Config Manager 1. Get X.509v3 Identity Certificate 2. Get Attribute Certificate 3. Use Identity cert for Authentication 4. Use Attribute Cert for access control Registration Authority (RA) is a person to whom the CA delegates the responsibility for the verification of identity of a person requesting a certificate.

Using Attribute Certificates Certificate (PKI) based authentication of user –SSL with client authentication –S/MIME with signature –Challenge response –Signed objects Check attribute certificate is linked to identity Check ACA is allowed Check ACA signature Extract attributes and use

Verifying Claimed Privilege Privilege Verifier Bill Alice Bob SOA AA Holder Root CA Signs Alice’s Public Key Bill’s Public Key Bob’s Public Key Issues AC to Issues AC to Issues Command to Checks delegation of privileges Checks all signatures Checks privilege is sufficient

Privilege Management Infrastructure The resource must have available to PMI –the root of trust of the PKI (public key of root CA) –the root of trust of the PMI (public key of Source of Authority or a valid PK certificate) –privilege policy (rules specifying privileges) –local variables e.g. time of day –access to revocation information and certificate chains

Certificate Management Authority Components of Certificate Management Authority System –Enrollment. You can apply for and obtain a certificate for yourself or for a server that you administer. –Renewal. You can renew a certificate that is about to expire or has already expired. –Revocation. If you are a system administrator, you can revoke a certificate so that it is no longer valid. –Retrieval. You can list all certificates that are available to you or to your server. Cert Requests Request CertificatesExpired certificates Revocation Information Issue Expire Revoke Publish CRL Audit Log

Conclusion on certificate management Cumbersome Tedious Who is root CA? What level of certificate chain validation must I go through?

Research areas How to define AC for a group? Certificate Management System simplification?

Questions ?

References Privilege Management in X.509(2000) presentation by David W Chadwick BSc PhD Attribute Certificates presentation by Spiro Alifrangis, Baltimore Technologies