ECMA 235-1996 The ECMA GSS-API Mechanism《ECMA GSS-API机制》.pdf
《ECMA 235-1996 The ECMA GSS-API Mechanism《ECMA GSS-API机制》.pdf》由会员分享,可在线阅读,更多相关《ECMA 235-1996 The ECMA GSS-API Mechanism《ECMA GSS-API机制》.pdf(84页珍藏版)》请在麦多课文档分享上搜索。
1、Standard ECMA-235March 1996Standardizing Information and Communication SystemsPhone: +41 22 849.60.00 - Fax: +41 22 849.60.01 - URL: http:/www.ecma.ch - Internet: helpdeskecma.chThe ECMA GSS-APIMechanismStandard ECMA-235March 1996Standardizing Information and Communication SystemsPhone: +41 22 849.6
2、0.00 - Fax: +41 22 849.60.01 - URL: http:/www.ecma.ch - Internet: helpdeskecma.chGino Lauri - ECMA-235.DOC - 20/03/96 11:50The ECMA GSS-APIMechanismBrief HistoryECMA, ISO and ITU-T are working on standards for distributed applications in an open system environment. Security ingeneral and authenticat
3、ion and distributed access control in particular are major concerns in information processing.In July 1988, ECMA TR/46, “Security in Open Systems - A Security Framework“, was published. In December 1989, based onthe concepts of this framework, ECMA-138, “Security in Open Systems - Data Elements and
4、Service Definitions“, wasproduced. It defines a set of Security Services for use in the Application Layer of the ISO OSI Reference Model.In December 1994, the first edition of Standard ECMA-219 was published. Based on this earlier work, it describes a model fordistributed authentication and access c
5、ontrol in which a trusted third party, the Authentication and Privilege AttributeApplication (APA-Application) and related key distribution functions are used to authenticate human and software entities,provide them with the privileges they need for access control purposes and provide the means of p
6、rotection of these privilegesin interchange.Over this period also, the Internet Engineering Task Force (IETF) and other de facto and de jure standards organisations havebeen developing a standard general interface through which a security infrastructure such as that described in ECMA-219 canbe exerc
7、ised by application clients and servers. It has been designed so that callers do not need to know the details of theunderlying infrastructure, or even whether it is provided by ECMA-219 services or other infrastructure designs. This interfaceis the Generic Security Services Application Programming I
8、nterface, or GSS-API (GSS-API).This ECMA standard follows on from ECMA-219, showing how the security services described there can be used underneaththe GSS-API by application clients and servers. It describes the interface calls supported, the success and error responses thatcan be returned, and the
9、 format and content of the data tokens exchanged between the client and the server.In order to implement Privilege Attribute based access control features for distributed open applications using the GSS-API,this Standard also defines support functions that have to be used in addition to the standard
10、 GSS-API function set.KRB5GSS and SPKM also define ways of supporting the GSS-API, and some of the data constructs defined there are alsoused here.The Standard is based on the practical experience of ECMA member Companies. It is oriented towards urgent and wellunderstood needs.This ECMA Standard has
11、 been adopted by the ECMA General Assembly in March 1996.- i -Table of contents1 Introduction 11.1 Scope 11.2 Field of application 11.3 Requirements to be satisfied 11.4 Conformance 11.5 Overview and document structure 22 References 22.1 Normative references 22.2 Informative references 33 Definition
12、s 33.1 Imported definitions 33.2 New Definitions 33.2.1 Security Context 33.2.2 Generic Security Mechanism 33.2.3 Security Mechanism Options 43.2.4 Primary Principal Identifier (PPID) 43.3 Acronyms 44 Token formats 44.1 Token framings 44.2 InitialContextToken format 54.3 TargetResultToken 84.4 Error
13、Token 84.5 Per Message Tokens 94.5.1 MICToken 104.5.2 WrapToken 114.6 ContextDeleteToken 115 Key distribution and PAC protection options 125.1 PAC protection options 125.2 Key Distribution schemes 125.2.1 Basic symmetric key distribution scheme 125.2.2 Symmetric key distribution scheme with symmetri
14、c KD-Servers 125.2.3 Symmetric key distribution scheme with asymmetric KD-Servers 125.2.4 Asymmetric initiator / symmetric target key distribution scheme 135.2.5 Symmetric initiator / asymmetric target key distribution scheme 135.2.6 Full public key distribution scheme 135.3 Key distribution data el
15、ements 135.3.1 KD-Scheme independent data elements 135.3.2 Key distribution scheme OBJECT IDENTIFIERs 145.3.3 Hybrid inter-domain key distribution scheme data elements 15- ii -5.3.4 Key establishment data elements 165.3.5 Kerberos Data elements 175.3.6 Profiling of KD-schemes 175.3.6.1 Profile of Ti
16、cket (symmIntradomain and symmInterdomain) 185.3.6.2 Profile of PublicTicket (hybridInterdomain) 195.3.6.3 Profile of SPKM_REQ (asymmInitToSymmTarget, symmInitToAsymmTarget, asymmetric) 205.4 Returned Key Scheme Information 206 Algorithm use within ECMA mechanism 217 Identifiers for ECMA mechanism c
17、hoices 237.1 Architectural mechanism identifiers 238 Errors 248.1 Minor Status Codes 248.1.1 Non ECMA-specific codes 248.1.2 ECMA-specific codes 258.2 Quality of protection 279 Support functions 279.1 Attribute handling support functions 279.1.1 GSS_Set_cred_attributes 289.1.2 GSS_Get_sec_attributes
18、 299.1.3 GSS_Get_received_creds 309.2 Control and support functions for context acceptors 309.2.1 GSS_Set_cred_controls call 329.2.2 GSS_Get_sec_controls 329.2.3 GSS_Compound_creds call 339.3 Attribute specifications 349.3.1 Privilege attributes 349.3.1.1 Access Identity 349.3.1.2 Group 349.3.1.3 Pr
19、imary group 349.3.1.4 Role attribute 349.3.2 Attribute set reference 359.3.2.1 Role name 359.3.3 Miscellaneous attributes 359.3.3.1 Audit Identity 359.3.3.2 Issuer domain name 359.3.3.3 Validity periods 359.3.3.4 Optional restrictions 359.3.3.5 Mandatory restrictions 359.3.4 Qualifier attributes 369
20、.3.4.1 Acceptor name 369.3.4.2 Application trust group 36- iii -9.4 C Bindings 369.4.1 Data types and calling conventions 369.4.1.1 Identifier 369.4.1.2 Identifier set 379.4.1.3 Time periods 379.4.1.4 time period list 379.4.1.5 Security attributes 389.4.1.6 Security Attribute Sets 389.4.1.7 Credenti
21、als List 389.4.1.8 Acceptor Control 389.4.1.9 Acceptor Control Set 399.4.2 gss_set_cred_attributes 399.4.3 gss_get_sec_attributes 399.4.4 gss_get_received_creds 399.4.5 gss_set_cred_controls 399.4.6 gss_get_sec_controls 409.4.7 gss_compound_cred 4010 Relationship to other standards 40Annex A - Forma
22、l ASN.1 definitions of data types defined in this standard 43Annex B - Definitions of Kerberos data types 51Annex C - Definitions of SPKM data types 55Annex D - Mappings of Minor Status Returns onto ECMA-219 error values 61Annex E - Imported Types 631 Introduction1.1 ScopeStandard ECMA-219 defines s
23、ervices, data elements and operations for authentication, Privilege Attribute and keydistribution applications (the APA-Application).Following on from ECMA-219, this Standard ECMA-235defines the syntax of the tokens that enable distributedapplications implementing the APA-Application and related dat
24、a elements specified in Standard ECMA-219 tointerwork. The tokens defined in this Standard are : Tokens for Security Association establishment An error token for communicating a failure to establish a Security Association Tokens for message protection A token for Security Association deletionIn orde
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ECMA2351996THEECMAGSSAPIMECHANISMECMAGSSAPI 机制 PDF

链接地址:http://www.mydoc123.com/p-704698.html