6

I have been looking into various research on identity, PKI and access control trying to boil it down to a simplified methodology for IAM (Identity & Access Management).

One thing which pops up in lots of places is capability-based access control, as in: your current permissions are encoded in a ticket or certificate following the request. Lots of contemporary research is pointing to this as something to look in to, as it means giving temporary authorization to perform a certain transaction. Authorizing the transaction is often more important than establishing identity.

It seems to me that SAML is flexible enough to be handle such use-cases, encoding capabilities as SAML-attributes. I also believe capabilities is a better match in a federated scenario than roles, as trying to synchronize role-definitions (or even identity) across organizations seems futile.

However, I have found very little research, products or even prototypes on combining SAML and capabilities.

I have started looking at XPOLA, but I am wondering:

  • is there any other research, papers, products or projects I should take a look at?
  • does any of the off-the-shelf IAM or federation-products provide any capability-based functionality?
David Brossard
  • 1,360
  • 7
  • 16
Rolf Rander
  • 288
  • 1
  • 8
  • Hi Rolf, welcome to [security.se] - and thanks for this question! I look forward to seeing answers to this. – AviD Mar 13 '12 at 11:04
  • 2
    Btw (and this is not really an answer), I have seen capabilities called by several different terms, so you might have better luck searching with one of the other terms. I would suggest including also entitlements, ABAC (attribute based AC), PBAC (policy based AC), and fine-grained authorization. No, these are not exactly the same thing, but often vendors (even of these products) and researchers are confused by these terms, and tend to blur the lines, especially in marketing materials. – AviD Mar 13 '12 at 11:05

2 Answers2

2

I'm not familiar with XPOLA, but here are some resources on using capability-based authorization on the web that you should read:

D.W.
  • 98,420
  • 30
  • 267
  • 572
  • Any comments regarding the relation to "Trust Management" systems? They appear to be capability-systems where the granted permission is expressed in a generic grammar, making the system a bit more flexible/interoperable. – pepe Mar 13 '12 at 23:42
  • As far as I am aware, trust management does not use capabilities. (See Wikipedia for some defining attributes of a capability-based system.) However, as trust management schemes is intended to support expressing authorization policies, they seem to be in roughly the same space. – D.W. Mar 14 '12 at 00:58
0

There is one standard in this space that implements attribute-based access control (ABAC). That standard is XACML (eXtensible Access Control Markup Language). It's also part of OASIS exactly like SAML and has been designed in part to work with SAML in many IAM scenarios.

It's definitely not research anymore. There are lots of companies using XACML such as Boeing, Documentum, governments, Bank of America... There are several vendors in this space such as the one I work for - Axiomatics - or IBM, Oracle... Lastly, there is a pretty lively open source community (SunXACML in the old days - ForgeRock and OpenAM, and WSO2 today...)

Lastly, NIST have been working on attribute-based access control. Their work can be found here. It's a great place to start looking around.

David Brossard
  • 1,360
  • 7
  • 16