80 likes | 188 Views
SEVA: Securing Extranets. Yves ROUDIER, Refik MOLVA Institut Eurécom. http://www.eurecom.fr/~nsteam/SEVA/. Extranets: Deployment Issues. "client" intranet. "server" intranet. ?. User. User Management. User. User. Network Access Control. Application Access Control. HTTP request.
E N D
SEVA: Securing Extranets Yves ROUDIER, Refik MOLVA Institut Eurécom http://www.eurecom.fr/~nsteam/SEVA/
Extranets: Deployment Issues "client" intranet "server" intranet ? User UserManagement User User NetworkAccess Control ApplicationAccess Control HTTP request client(browser) server(web) firewall ? ?
SEVA: Overview • Automated management of access control • configuration and collaboration of security devices • delegation + role based access control • Transparent mechanism • retrofitting clients / servers without modification • using a remote network like a local one • Strong security • cryptographic mechanisms • fine grained authorizations and resource scoping
SEVA: Overall Architecture "client" intranet "server" intranet Initial Agreement(Role-Based Delegation) groups of resources Roles Defines Access Control rules - fine grained - application-level client(browser) server(web) Transparent and automatedenforcement
User Interface "client" intranet "server" intranet • Transparent protection • unmodified client / server software • operation similar to local server • yet strong security • materialized by smartcard • enforced through traffic tagging Smartcard KS Updateaccess rights firewall client(browser) server(web) Traffic tagginglayer
HTTP request HTTP request Traffic Tagging "client" intranet "server" intranet • Network-Level Access Control • stream authentication • Application-Level Access Control: • fine granularity (resource + operation) • application level • Lightweight Tagging • one-way function Traffic tagging Tag verification (access control) client(browser) server(web) firewall
SEVA: Current Status • Working Prototype • Traffic tagging • Application-level verification mechanism • Role management and delegation • Resource management and scoping • Embedded technologies • SPKI • Handle System • Java Card • cryptography: Cryptix (Java), Cryptlib (C), GemXpresso
Summary: Classical vs. SEVA Extranets • Access Control Management • identity / delegation+role • coarse / fine-grained • Access Control Location • definition: network+application / application only • enforcement: network+application / network only • Access Control Enforcement • configuration: manual / automated • user authentication: explicit / transparent