翻訳と辞書
Words near each other
・ Privilege (film)
・ Privilege (insurance company)
・ Privilege (Ivor Cutler album)
・ Privilege (legal ethics)
・ Privilege (Set Me Free)
・ Privilege (social inequality)
・ Privilege (Television Personalities album)
・ Privilege bracketing
・ Privilege Creek
・ Privilege day
・ Privilege escalation
・ Privilege Ibiza
・ Privilege level
・ Privilege log
・ Privilege Magazine
Privilege Management Infrastructure
・ Privilege of Buda
・ Privilege of competency
・ Privilege of Evil
・ Privilege of Koszyce
・ Privilege of Mielnik
・ Privilege of Parliament Act 1512
・ Privilege of Parliament Act 1603
・ Privilege of peerage
・ Privilege of St Romain
・ Privilege revocation
・ Privilege revocation (computing)
・ Privilege revocation (law)
・ Privilege separation
・ Privilege sign


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Privilege Management Infrastructure : ウィキペディア英語版
Privilege Management Infrastructure
Privilege Management is the process of managing user authorisations based on the ITU-T Recommendation X.509. The 2001 edition of X.509 〔ISO 9594-8/ITU-T Rec. X.509 (2001) The Directory: Public-key and attribute certificate frameworks〕 specifies most (but not all) of the components of a ''Privilege Management Infrastructure'' (PMI), based on X.509 attribute certificates (ACs). Later editions of X.509 (2005 and 2009) have added further components to the PMI, including a delegation service (in 2005 〔ISO 9594-8/ITU-T Rec. X.509 (2005) The Directory: Public-key and attribute certificate frameworks〕) and interdomain authorisation (in the 2009 edition 〔ISO 9594-8/ITU-T Rec. X.509 (2009)〕).
Privilege Management Infrastructures (PMIs) are to authorisation what Public Key Infrastructures (PKIs) are to authentication. PMIs use attribute certificates (ACs) to hold user privileges, in the form of attributes, instead of public key certificates (PKCs) to hold public keys. PMIs have Sources of Authority (SoAs) and Attribute Authorities (AAs) that issue ACs to users, instead of Certification Authorities (CAs) that issue PKCs to users. Usually PMIs rely on an underlying PKI, since ACs have to be digitally signed by the issuing AA, and the PKI is used to validate the AA's signature.
An X.509 AC is a generalisation of the well known X.509 public key certificate (PKC), in which the public key of the PKC has been replaced by any set of attributes of the certificate holder (or subject). Therefore, one could in theory use X.509 ACs to hold a user's public key as well as any other attribute of the user. (In a similar vein, X.509 PKCs can also be used to hold privilege attributes of the subject, by adding them to the subject directory attributes extension of an X.509 PKC). However, the life cycle of public keys and user privileges are usually very different, and therefore it isn't usually a good idea to combine both of them in the same certificate. Similarly, the authority that assigns a privilege to someone is usually different from the authority that certifies someone's public key. Therefore, it isn't usually a good idea to combine the functions of the SoA/AA and the CA in the same trusted authority. PMIs allow privileges and authorisations to be managed separately from keys and authentication.
The first open source implementation of an X.509 was built with funding under the EC PERMIS PERMIS project, and the software is available from (here ). A description of the implementation can be found in.〔D.W.Chadwick, A. Otenko “The PERMIS X.509 Role Based Privilege Management Infrastructure”. Future Generation Computer Systems, 936 (2002) 1–13, December 2002. Elsevier Science BV.〕〔David W. Chadwick, GansenZhao, Sassa Otenko, Romain Laborde, Linying Su and Tuan Anh Nguyen. “PERMIS: a modular authorization infrastructure”. Concurrency And Computation: Practice And Experience. Volume 20, Issue 11, Pages 1341-1357, 10〕
X.509 ACs and PMIs are used today in Grids (see Grid computing), to assign privileges to users, and to carry the privileges around the Grid. In the most popular Grid privilege management system today, called VOMS,〔Alfieri, R., Cecchini, R., Ciaschini, V., Dell'Agnello, L., Frohner, A., Lorentey, K., Spataro, F., “From gridmap-file to VOMS: managing authorization in a Grid environment”. Future Generation Computer Systems. Vol. 21, no. 4, pp. 549-558. Apr. 2005〕 user privileges, in the shape of VO memberships and roles, are placed inside an X.509 AC by the VOMS server, signed by the VOMS server, and then embedded in the user's X.509 proxy certificate for carrying around the Grid.
Because of the rise in popularity of XML SOAP based services, SAML attribute assertions are now more popular than X.509 ACs for transporting user attributes. However, they both have similar functionality, which is to strongly bind a set of privilege attributes to a user.
== References ==


抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Privilege Management Infrastructure」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.