Information and Cyber Security by Hein Venter & Marianne Loock & Marijke Coetzee & Mariki Eloff & Jan Eloff
Author:Hein Venter & Marianne Loock & Marijke Coetzee & Mariki Eloff & Jan Eloff
Language: eng
Format: epub
ISBN: 9783030432768
Publisher: Springer International Publishing
Now, the services of domains accessible in the federation are seen as federated services.
3.1 Access to Federated Services
We now present how to access the federated services.
Authentication and Trust Brokering. The access control of services relies on the authorization attributes of users asserted by a trusted third party. Each domain has its own authentication mechanism called local token service (LTS). The LTS authenticates users and issues a security token signed by the domain security certificate. The services of a domain are accessible only with a security token issued by the domain’s LTS.
In order to establish trust between domains, we introduce in the GACM a specialized authentication mechanism called federated token service (FTS) for domain authentication. We identify the domains and the GACM with the public-key certificates. The security certificates of domains are forwarded to the GACM which in turn transmits its certificate to the domains. The domains authenticate to the GACM with the security tokens signed with their security certificates. In response, the FTS delivers the security tokens signed by the GACM’s security certificate. Consequently, the domains of the federation trust each other through the federated security tokens.
As shown in Fig. 3, to access to a service () of domain B () from a domain A (), the authentication of the user () is performed with the following steps : 1.the LTS of authenticates and delivers an security token () signed with the security certificate ((1.a ) dashed arrow in Fig. 3);
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8316)
Test-Driven Development with Java by Alan Mellor(6876)
Data Augmentation with Python by Duc Haba(6801)
Principles of Data Fabric by Sonia Mezzetta(6536)
Learn Blender Simulations the Right Way by Stephen Pearson(6442)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6300)
Hadoop in Practice by Alex Holmes(5969)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5818)
RPA Solution Architect's Handbook by Sachin Sahgal(5701)
Big Data Analysis with Python by Ivan Marin(5437)
The Infinite Retina by Robert Scoble Irena Cronin(5400)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5164)
Pretrain Vision and Large Language Models in Python by Emily Webber(4400)
Infrastructure as Code for Beginners by Russ McKendrick(4172)
Functional Programming in JavaScript by Mantyla Dan(4050)
The Age of Surveillance Capitalism by Shoshana Zuboff(3967)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3884)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3684)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3661)
