14 Protection
14 Protection
UNIX
Domain = user-id
Domain switch accomplished via file system.
Each file has associated with it a domain bit (setuid bit).
When file is executed and setuid = on, then user-id is set to
owner of the file being executed. When execution
completes user-id is reset.
Domain Implementation (MULTICS)
Each Row = Capability List (like a key)
Fore each domain, what operations allowed on what
objects.
Object 1 – Read
Object 4 – Read, Write, Execute
Object 5 – Read, Write, Delete, Copy
Access Matrix of Figure A With Domains as Objects
Figure B
Access Matrix with Copy Rights
Access Matrix With Owner Rights
Modified Access Matrix of Figure B
Access Control
Protection can be applied to non-file resources
Solaris 10 provides role-based access control to implement least
privilege
Privilege is right to execute system call or use an option within
a system call
Can be assigned to processes
Users assigned roles granting access to privileges and
programs
Role-based Access Control in Solaris 10
Revocation of Access Rights
Access List – Delete access rights from access list.
Simple
Immediate
The protection domain indicates what operations the class can (and
cannot) perform.