[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: authentication levels in the ACM



Doh!  Lets try a mailing list response (sigh)

Given the current state of #3, I'd prefer either 1 or 2.

Ryan

On Fri, Jul 13, 2001 at 04:50:48PM +0200, robert byrne wrote:
| 
| Folks,
| 
| The issue of authentication levels versus mechanisms has come up again.
| 
| The history on this is that the model started with levels, went to
| mechanisms and now has moved back to levels.
| 
| To help us try to reach concensus on this, here are three options and I
| try to list some pros and cos of each of the options.
| 
| 1. Remove reference to authentication levels and mechanisms.
| 
| This way, the model would not be capable of exressing anything
| concerning the authentication method or strength of a user.  The policy
| of authentication requirements on users would be external to the model.
| 
| Pro: 
|   1. simplifies the ACM
|   
| Con:
|   1. authentication is a basic notion for authorization and so it's
| natural to want to express it in the ACM.
| 
| --
| 
| 2. Go back to a list of mechanisms with no "strength ordering" among
|      the mechanisms.
| 
| This way an aci subject would have to specify a list authentication
| mechanisms.  There would be special keywords "none" and "authenticated"
| to mean "no authentication" and "some kind of authentication".
| 
| Pro:
|  1. can force a given authzID to use a given mechanism.
| 
| Con: 
|  1. As no ordering is defined on mechanisms, the model cannot
| automatically give you behaviour you might expect: eg. if an aci
| authorizes me when I bind with DIGEST-MD5, I might be surprised to find
| that when I bound using SSL that it did not grant me that right.  The
| implication is that at grant aci create time the admin needs to list
| _all_ the mecahanisms he wishes to grant rights.  For deny, he needs to
| consider the possibility of the subject of his deny coming in using a
| different, "less strong", authentication mechanism with a potentially
| different authorizationId.
| 
| --
| 
| 3. Stick with authentication levels and a "strength hierarchy"
| 
| Pro:
|   1. The model can make use of the "strength hierarchy" in defining
|       ACI semantics (e.g. a deny applies to ALL subjects at lower
|       authnLevel).
|  2. Once the mechanisms are put in the buckets, the admin of acis is
| easier--just choose beteen the four levels rather than lots of
| mechanisms.
| 
| Con:
|   1. Assignment of mechanisms to levels is on a per-server basis, but
|       we could define a way for servers to advertise their assignments
|       (for example to help with replication).
|  2. No way to associate a particular user with a particular mechanism.
| 
| Cast your vote now!  Otherwise we will default to 3, which is the
| current flavour.
| 
| Rob.
|