[security-dev] Entitlement versus Enforcement Model

Anil Saldhana Anil.Saldhana at redhat.com
Wed Nov 7 15:47:04 EST 2012


On 11/07/2012 10:28 AM, Jason Porter wrote:
> This is something I've been thinking about actually. A small side 
> project I'm working on during the late hours of the evening is going 
> to be doing something like this. My current line of thinking is to 
> authenticate once and pass back a token then double check the token 
> and IP address with each request and have a server side timeout for 
> their authorized session. I know it's not the same as what you're 
> talking about, but I couldn't come up with anything good to stop 
> spoofing a valid token and also enforcing a time limit to a secure 
> session.
Jason - good thinking.  What you are trying to do maps perfectly into a 
SAML rich structure but exceeds the JSON Web Token work (JWT 
http://tools.ietf.org/html/draft-ietf-oauth-json-web-token-05) that is 
going on in IETF.  Toward this, I have been thinking that we definitely 
need a JSON Token representation of the SAML XML structure (that can 
capture identity, authentication, attribute, authorization decisions 
etc). Basically a literal translation of the SAML XML structures into JSON.

>
>
> On Wed, Nov 7, 2012 at 8:53 AM, Anil Saldhana 
> <Anil.Saldhana at redhat.com <mailto:Anil.Saldhana at redhat.com>> wrote:
>
>     Hi All,
>        this is an issue I see more at a client (in the classic
>     client/server
>     paradigm) that the computing industry is moving toward.
>
>     With the increasing push towards mobility, cloud and REST
>     architectures,  I think access control decisions may have to be made
>     where a decision is needed.  So instead of making 100 authorization
>     calls to the server, we need a model where one call is made to the
>     server (given user, context etc) and we get back a set of entitlements
>     (or permissions) that need to be applied at the client side.
>
>     Examples include a mobile client (such as banking) that needs to
>     figure
>     out what aspects of the mobile screen the user is entitled to see and
>     what operations he is capable of performing.
>
>     The industry has put too much emphasis on the enforcement model
>     (meaning, make 100 authorization calls to the glorified server). There
>     has been almost no models for the entitlement approach.
>
>     I have prototyped something here:
>     https://docs.jboss.org/author/display/SECURITY/EntitlementsManager
>
>     The entitlements should be sent in a JSON response.
>
>     Also, trying to get this standardized in the industry via the OASIS
>     Cloud Authorization TC.
>     https://lists.oasis-open.org/archives/oasis-charter-discuss/201210/msg00003.html
>
>     I have a hunch that projects such as Aerogear, Drools, Errai and
>     Infinispan may need this model.
>
>     Thoughts?
>
>     Regards,
>     Anil
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.jboss.org/pipermail/security-dev/attachments/20121107/12064a19/attachment.html 


More information about the security-dev mailing list