ECMA 219-1996 Authentication and Privilege Attribute Security Application with related key distribution functions - Part 1 Overview and Functional Model - Part 2 Security Informati.pdf
《ECMA 219-1996 Authentication and Privilege Attribute Security Application with related key distribution functions - Part 1 Overview and Functional Model - Part 2 Security Informati.pdf》由会员分享,可在线阅读,更多相关《ECMA 219-1996 Authentication and Privilege Attribute Security Application with related key distribution functions - Part 1 Overview and Functional Model - Part 2 Security Informati.pdf(176页珍藏版)》请在麦多课文档分享上搜索。
1、Standard ECMA-2192nd edition - March 1996Standardizing Information and Communication SystemsPhone: +41 22 849.60.00 - Fax: +41 22 849.60.01 - URL: http:/www.ecma.ch - Internet: helpdeskecma.chAuthentication and PrivilegeAttribute Security Applicationwith related key distributionfunctionsStandard ECM
2、A-2192nd edition - March 1996Standardizing Information and Communication SystemsPhone: +41 22 849.60.00 - Fax: +41 22 849.60.01 - URL: http:/www.ecma.ch - Internet: helpdeskecma.chGino Lauri - ECMA-219.DOC - 20/03/96 15:14Authentication and PrivilegeAttribute Security Applicationwith related key dis
3、tributionfunctionsPart 1: Overview and Functional ModelPart 2: Security Information ObjectsPart 3: Service DefinitionsBrief HistoryECMA, ISO and ITU-T are working on standards for distributed applications in an open system environment. Security ingeneral and authentication and distributed access con
4、trol in particular are major concerns in information processing.In July 1988, ECMA TR/46, “Security in Open Systems - A Security Framework“, was published. In December 1989, based onthe concepts of this framework, Standard ECMA-138, “Security in Open Systems - Data Elements and Service Definitions“,
5、was produced. It defines a set of Security Services for use in the Application Layer of the ISO OSI Reference Model. Some ofthese services have been expanded and are incorporated in the present work, though the definitions of the data elements inECMA-138 have been superseded by this document, and wi
6、th its publication, ECMA-138 is now withdrawn.This Standard ECMA-219 describes a model for distributed authentication and access control in which a trusted third party (the“Authentication and Privilege Attribute Application with Related Key Distribution Functions“ of this Standard) is used toauthent
7、icate human and software entities, provide them with the privileges they need for access control purposes and providethe means of protection of these privileges in interchange. The Standard covers bilateral peer-to-peer authentication, but only inconjunction with key distribution functions.It define
8、s the security information objects and services that allow Open Systems to interchange authentication information andaccess control information. The services defined in this document are independent of any particular security policy.This ECMA Standard is divided in three parts Part 1 provides an ove
9、rview of the Standard, its purpose and content, the functional model that underlies the Standard andits relationships to other standards. In addition, it provides all references for all parts of the Standard. Part 2 defines the major Security Information Objects used in the APA-Application. Part 3 p
10、rovides the Service Definitions of the APA-Application. It contains the abstract model, common arguments,common operations and definitions of the Authentication Port and the Privilege Attribute Port.This ECMA Standard is based on the practical experience of ECMA member Companies. It is oriented towa
11、rds urgent and wellunderstood needs.This ECMA Standard has been adopted by the ECMA General Assembly in March 1995.- i -Table of contentsPart 1 - Overview and functional model 11 Introduction 11.1 Scope 11.2 Field of application 11.3 Requirements to be satisfied 21.3.1 Background 21.3.2 Specific Req
12、uirements 21.4 Conformance 31.5 Overview and document structure 31.5.1 Overview of approach taken 31.5.2 Document Structure 52 References 52.1 Normative references 52.2 Informative references 63 Definitions and conventions 63.1 Imported definitions 63.2 New definitions 73.2.1 Access Identity 73.2.2
13、Attribute Set Reference 73.2.3 Attribute Authority 73.2.4 Audit Identity 73.2.5 Authenticated Identity 73.2.6 Authentication Level 73.2.7 Authentication Method Identifier 73.2.8 Basic key 73.2.9 Certificate 73.2.10 Charging Identifier 73.2.11 Client Key Block 73.2.12 Delegate Qualifier Attribute 83.
14、2.13 Delegate/Target Qualifier Attribute 83.2.14 Dialogue key 83.2.15 Initiator Qualifier Attribute 83.2.16 Logon Name 83.2.17 Non-repudiation Identity 83.2.18 Primary Principal 83.2.19 Primary Principal Qualifier Attribute 83.2.20 Principal Privileges 83.2.21 Privileges Attribute Certificate (PAC)
15、83.2.22 Security Authority 83.2.23 Secondary Principal 8- ii -3.2.24 Stateful Server 83.2.25 Stateless Server 83.2.26 Target AEF 93.2.27 Target Key Block 93.2.28 Target Qualifier Attribute 93.3 Conventions 93.4 Acronyms 94 Functional model 94.1 Environment 94.1.1 Proxy 104.2 Role of the APA-Applicat
16、ion 114.3 Functional model of the APA-Application 114.3.1 The APA-Application and APA-Clients 114.3.2 APA Abstract Model 144.3.3 Relationship between the APA-Application and other Applications. 144.4 Services provided by the APA-Application 164.4.1 Summary of Services 164.4.2 Configuration options 1
17、74.4.3 Distributed working 194.4.4 Modes of operation 204.4.5 Use of cryptographic features in clients 224.4.6 Certificate Controls 234.4.7 Certificate revocation 234.4.8 Walk-throughs 234.5 Data elements 294.5.1 Authentication Certificate (AUC) 304.5.2 Privilege Attribute Certificate (PAC) 304.5.3
18、Certificate Control Value 314.5.4 Keying Information 314.6 Authentication methods 324.7 Management and recovery of the APA-Application 335. Relationship to other Standards and Technical Report 335.1 Relationship to ECMA TR/46, “Security in Open Systems: A Security Framework“ 335.2 Relationship to St
19、andard ISO 7498-2, “Security Architecture“ 335.3 Relationship to Standard ISO/IEC 10181-2, “Authentication Framework“ 335.4 Relationship to Standard ISO/IEC 9594: 1990 Part 8, “Directory AuthenticationFramework“ 335.5 Relationship to Standard ISO/IEC 10181-3, “Access Control Framework“ 335.6 Relatio
20、nship to ISO/IEC 10164, “Standards for Systems Management“ 345.6.1 Managed Objects 345.6.2 Management operations on Managed Objects 345.6.3 Security management functions 35Annex A (Informative) Changes from the first edition (December 1994) 37- iii -Part 2 - Security information objects 391 Introduc
21、tion 392 Overview 393 GeneralisedCertificate 403.1 Common Contents fields 403.2 Specific Certificate Contents 423.3 Check value 423.4 Certificate Identity 444 Security attributes 445 Authentication Certificate (AUC) 456 Privilege Attribute Certificate (PAC) 467 Protection methods 487.1 “Control/Prot
22、ection Values“ protection method 497.2 “Primary Principal Qualification“ protection method 507.3 “Target Qualification“ protection method 507.4 “Delegate/Target Qualification“ protection method 517.5 “Delegate Qualification“ protection method 517.6 “Trace Pointer“ protection method 517.7 “Initiator
23、Qualification“ protection method 527.8 “Count“ protection method 527.9 “Check Back“ protection method 527.10 “Nested Chain“ protection method 537.11 Combining the methods 548 Generalised User Certificate (GUC) 549 External control values construct 5510 Specification of Keying Information 5510.1 Conf
24、igurations Supported 5610.2 General Description 5710.2.1 Keying Information Syntax 5810.3 Example walkthroughs of key exchanges 6010.3.1 Notation 6010.3.2 Example 1 6010.3.3 Example 2 6111 DialogueKeyBlock 62Annex A (Normative) Use of identities in the APA-Application 65- iv -Annex B (Normative) Sum
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ECMA2191996AUTHENTICATIONANDPRIVILEGEATTRIBUTESECURITYAPPLICATIONWITHRELATEDKEYDISTRIBUTIONFUNCTIONSPART1OVERVIEWANDFUNCTIONALMODELPART2SECURITYINFORMATIPDF

链接地址:http://www.mydoc123.com/p-704684.html