60 likes | 170 Views
AAA-Arch Authentication Schemes. Stephen Farrell stephen.farrell@baltimore.ie John Vollbrecht jrv@interlinknetworks.com Joe Salowey joes@wrq.com Standish Stewart sstewart@interlinknetworks.com. What we’re doing. Starting work... Similar to what we did with authorization
E N D
AAA-ArchAuthentication Schemes Stephen Farrell stephen.farrell@baltimore.ie John Vollbrecht jrv@interlinknetworks.com Joe Salowey joes@wrq.com Standish Stewart sstewart@interlinknetworks.com
What we’re doing • Starting work... • Similar to what we did with authorization • Analyse authentication schemes • no invention though! • Figure out some models • Match those with the authorization models
Factors • Communications paths (topology) • Establishes shared secrets or not • Requires time synchronisation or not • Mutual authentication or not • Type of pre-established data (root info, biometrics, shared-secrets) • Allows impersonation or not
User -> Auth. Server AS User Application
App. -> Auth. Server AS User Application
Triangle? AS User Application