Information and Cyber Security by Hein Venter & Marianne Loock & Marijke Coetzee & Mariki Eloff & Jan Eloff

Information and Cyber Security by Hein Venter & Marianne Loock & Marijke Coetzee & Mariki Eloff & Jan Eloff

Author:Hein Venter & Marianne Loock & Marijke Coetzee & Mariki Eloff & Jan Eloff
Language: eng
Format: epub
ISBN: 9783030432768
Publisher: Springer International Publishing


Now, the services of domains accessible in the federation are seen as federated services.

3.1 Access to Federated Services

We now present how to access the federated services.

Authentication and Trust Brokering. The access control of services relies on the authorization attributes of users asserted by a trusted third party. Each domain has its own authentication mechanism called local token service (LTS). The LTS authenticates users and issues a security token signed by the domain security certificate. The services of a domain are accessible only with a security token issued by the domain’s LTS.

In order to establish trust between domains, we introduce in the GACM a specialized authentication mechanism called federated token service (FTS) for domain authentication. We identify the domains and the GACM with the public-key certificates. The security certificates of domains are forwarded to the GACM which in turn transmits its certificate to the domains. The domains authenticate to the GACM with the security tokens signed with their security certificates. In response, the FTS delivers the security tokens signed by the GACM’s security certificate. Consequently, the domains of the federation trust each other through the federated security tokens.

As shown in Fig. 3, to access to a service () of domain B () from a domain A (), the authentication of the user () is performed with the following steps : 1.the LTS of authenticates and delivers an security token () signed with the security certificate ((1.a ) dashed arrow in Fig. 3);



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.