1 / 8

Group Authorization Challenges & Solutions: Computing Requirements, Privacy, and Authentication Methods

This discussion explores group authorization problems, complexity of access management, authentication, issues of privacy, and the strengths and weaknesses of various authentication methods like proxies and credential-based authentication. Understanding the computing requirements of a good system, the importance of authentication strength, and the interplay between privacy and accountability provides insights into establishing effective authorization mechanisms. Realms-based Kerberos shortcomings and the concept of IP source address filtering are also discussed.

wcotton
Download Presentation

Group Authorization Challenges & Solutions: Computing Requirements, Privacy, and Authentication Methods

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Discussion Class 11 Group authorization

  2. Question 1: (a) What is the group authorization problem? (b) What makes this hard?

  3. Question 2: Terminology (a) What is "access management"? (b) What is "authorization"? (c) What is "authentication"? (d) Lynch does not use the word "role". What term does he use for this concept?

  4. Question 3: (a)What are the computing requirements of a good system for group authorization? (b) In what ways is realm-based Kerberos unsuitable? (c) How important is authentication strength?

  5. Question 4: (a) What are the issues of privacy in authorization? (b) How does privacy compete with accountability?

  6. Question 5: Define IP source address filtering. What are the strengths and weaknesses of this approach?

  7. Question 6: How are proxies used for authentication? What are the strengths and weaknesses of this approach?

  8. Question 7: How does credential based authentication work? What are the strengths and weaknesses of this approach?

More Related