80 likes | 99 Views
This discussion explores group authorization problems, complexity of access management, authentication, issues of privacy, and the strengths and weaknesses of various authentication methods like proxies and credential-based authentication. Understanding the computing requirements of a good system, the importance of authentication strength, and the interplay between privacy and accountability provides insights into establishing effective authorization mechanisms. Realms-based Kerberos shortcomings and the concept of IP source address filtering are also discussed.
E N D
Discussion Class 11 Group authorization
Question 1: (a) What is the group authorization problem? (b) What makes this hard?
Question 2: Terminology (a) What is "access management"? (b) What is "authorization"? (c) What is "authentication"? (d) Lynch does not use the word "role". What term does he use for this concept?
Question 3: (a)What are the computing requirements of a good system for group authorization? (b) In what ways is realm-based Kerberos unsuitable? (c) How important is authentication strength?
Question 4: (a) What are the issues of privacy in authorization? (b) How does privacy compete with accountability?
Question 5: Define IP source address filtering. What are the strengths and weaknesses of this approach?
Question 6: How are proxies used for authentication? What are the strengths and weaknesses of this approach?
Question 7: How does credential based authentication work? What are the strengths and weaknesses of this approach?