Unit 4 - CS
Unit 4 - CS
Access Control
A B C D
alice 0 0 1 0
bob 1 1 0 1
subjects
charlie 0 0 1 0
dave 1 1 0 1
Adding Access Rights
• Access Rights
– e.g. Simple: Read, Write
– e.g. Complex: execute, change ownership
Objects
A B C D
alice r r/w r -
bob r r - r/w
subjects
charlie - - w -
dave r/w - w
Grouping
• Subjects
– Groups e.g. staff = {alice,dave}, students = {bob, charlie}
• Objects
– Types e.g. system_file = {A,B}, user_file = {C,D}
• Can have compound names
– e.g. in AFS talg:friends, system:backup
ACL’s
• What if I break my matrix down by columns?
– Each object has a set of <user, right> tuples
– A {<bob, r/w>, <alice,w>}
• Properties
– Good for many applications (file systems)
– Can grow quite large
Capabilities
• What if I break my matrix down by rows
– Alice {<A,r/w>, <B,w>, <C,r>}
• Properties
– Natural model for delegation (rights coupled to object)
• Each tuple can be viewed as a handle to an object
Access Control Matrix ( Example)
Access Control Matrix( Example)
Variations of DAC
• Strict DAC requires that the owner is the only one who has discretionary
authority to grant access to an object and that ownership cannot be transferred.
• Liberal DAC allows the owner to delegate discretionary authority for granting
access to an object to other users. Variations of liberal DAC
• One Level Grant: The owner can delegate grant authority to other users but they cannot
further delegate this power.
• Two Level Grant: In addition to a one-level grant the owner can allow some users to further
delegate grant authority to other users.
• Multilevel Grant:
• DAC with Change of Ownership: This variation allows a user to transfer
ownership of an object to another user.
Mandatory Access Control
25
KERBEROS
A backbone
Kerberos is annetwork allows protocol,
authentication several and
LANs to same
at the be
connected.
time a KDC, In a that
backbone
has network, no station
become very is directly
popular. Several
connected
systems, to the backbone;
including the stations
Windows 2000, are part
use Kerberos. of a
Originally
LAN, andatthe
designed backbone
MIT, connects
it has gone the several
through LANs. versions.
15.26
Kerberos servers
15.27
15.2.1 Continued
Real Server
The real server (Bob) provides services for the user (Alice).
15.28
Kerberos Operation
15.29
Using Different Servers
15.30
Kerberos Version 5
15.31
Realms
15.32