1

While reading a number of definitions of attribute-based access control (ABAC), I found that there are two different definitions:

  1. Access control decisions are made using the attributes of users, objects and the environment.

  2. Access control decisions are made using the attributes of users and objects (although environment attributes are not mentioned in this definition, they form part of the user's attribute e.g. user's location).

So I wanted to know, in information security, which definition is recognised as the standard definition of ABAC?

David Brossard
  • 1,360
  • 7
  • 16
synthesis
  • 155
  • 1
  • 1
  • 15

1 Answers1

0

There are several places where you could find a "formal" definition of . One such place is NIST, the National Institute of Standards and Technology. They have a dedicated site on ABAC.

Their definition is as follows:

ABAC is a logical access control model that is distinguishable because it controls access to objects by evaluating rules against the attributes of the entities (subject and object) actions and the environment relevant to a request. Attributes may be considered characteristics of anything that may be defined and to which a value may be assigned. In its most basic form, ABAC relies upon the evaluation of attributes of the subject, attributes of the object, environment conditions, and a formal relationship or access control rule defining the allowable operations for subject-object attribute and environment condition combinations.

In fact, ABAC uses two fundamental building blocks:

  • attributes (key-value pairs)
  • policies (or rules)

Like the definition says, attributes can be about anything (users, objects, environment, context, and more). Generally attributes relate to the grammatical function they play in a sentence e.g.

Managers can view documents they own

Translated, it becomes

A user with role == "manager" can do action == "view" on object of type == "document" if user.name == document.owner

The standard implementation for ABAC is & ALFA. There are several open-source implementations (AuthZForce) as well as commercial (Axiomatics - which is where I work)

Attributes can be typed (string, integer...) and multi-valued (e.g. you can have multiple roles). XACML / ALFA define the policy language to express ABAC. XACML also defines a REST/JSON profile to POST authorization requests and receive responses back.

David

David Brossard
  • 1,360
  • 7
  • 16