120 likes | 375 Views
IISIS Redesign. Architecture Java Re-implementation Security Framework 911 Bridge. Architecture. Web server cluster Use of HA Linux for load balancing and failover monitoring. Architecture. Low cost proof-of-concept environment Can be built for under $2000
E N D
IISIS Redesign Architecture Java Re-implementation Security Framework 911 Bridge
Architecture • Web server cluster • Use of HA Linux for load balancing and failover monitoring
Architecture • Low cost proof-of-concept environment • Can be built for under $2000 • Targeted for municipalities on a budget • Fault tolerant and scalable
Java Re-implementation • Current code base is in Perl, leveraging the Catalyst Framework (i.e., Ruby on Rails or Struts for Perl). • A light weight Java container such as Spring allows for a fully transparent design and better separation of concerns. • Full transparency to data layer through Hibernate. A small municipality on MySQL will have the same data services as a regional center utilizing Oracle. • Java design makes use of Dependency Injection to enable true encapsulation of modules as services. • Java is more secure for packaging and deploying commercially.
Security Framework • Problems with traditional Role Based Authentication Control (RBAC) • User must be assigned roles that contain their permissions. • In practice, roles rarely encompass all of users required permissions.
Security Framework • The solution – a robust provisioning model • Break the paradigm by allowing the permissions to be assigned directly to user • Allow roles to be assigned to other roles to better describe subsets of permissions
Security Framework • Additional features • Domain based provisioning and trusts Internal to Domain External to Domain
Security Framework • Arbitrary attributes tied to a user-permission combination, regardless if permission is assigned directly or via a role
Security Framework • Default attributes are stored independent of user-permission. Only utilize additional storage when attribute value differs from default. • Can restrict attributes to a pre-defined list of values. • Permissions are self administering via a shadow permission. • Shadow permission attributes determine what a give administrator is able to do with a permission (assign, delegate admin, edit and/or view attributes) • Attributes enable other features such as time based permission assignment.
IISIS Redesign • Questions?