04 - Access Control
04 - Access Control
Computer Science
Faculty
Network department
Advanced Computer Network -
CS740
Lecture 4
Access Control
TA. Shams Rashidy
[email protected]
Shams Rashidy
Conttents
1 Learning Objectives
2 Introduction
3 Access Control Principles
4 Subjects, Objects, and Access Rights
5 Discretionary Access
Control An Access Control
Model
6 Example: UNIX File Access
Control Access Control Lists in
UNIX
7 Role-Based Access
Control RBAC Reference
Models
Attribute-Based Access
Control ABAC Logical
NetSec Shams Rashidy
Learning Objectives
• explain how access control fits into the broader context that includes authentication,
authorization, and audit.
• define the three major categories of access control policies.
• distinguish among subjects, objects, and access rights.
• Describe the UNIX le access control model.
• Discuss the principal concepts of role-based access control.
• Summarize the RBAC model.
• Discuss the principal concepts of attribute-based access control.
• Explain the identity, credential, and access management model.
• Understand the concept of identity federation and its relationship to a trust framework.
Shams Rashidy
Access Control Principles
Access Control
Access control implements a security policy that specifies who or
what (ex in the case of a process) may have access to each
specific system resource and the type of access that is permitted
in each instance.
Shams Rashidy
Access Control Requirements
• Reliable input
• Support for fine and coarse specifications
• Least privilege
• Separation of duty
• Open and closed policies
• Policy combinations and conflict resolution
• Administrative Policies
• Dual control
Shams Rashidy
Subjects, Objects, and Access
Rights
access right:
the way in
which a subject • e.g. read, write, execute, delete, create, search
may access an
object
Shams Rashidy
Subject
Definition
As was previously stated, a discretionary access control scheme
is one in which an entity may be granted access rights that
permit the entity, by its own volition, to enable another entity
to access some resource.
access reference
subject object
request monitor
Shams Rashidy
RBAC Reference Models