15
ACCESS CONTROL MANAGEMENT By: Poonam Gupta Sowmya Sugumaran

ACCESS CONTROL MANAGEMENT By: Poonam Gupta Sowmya Sugumaran

Embed Size (px)

Citation preview

Page 1: ACCESS CONTROL MANAGEMENT By: Poonam Gupta Sowmya Sugumaran

ACCESS CONTROL MANAGEMENT

By:

Poonam GuptaSowmya Sugumaran

Page 2: ACCESS CONTROL MANAGEMENT By: Poonam Gupta Sowmya Sugumaran

Project Goal

• The primary goal of access control management is to preserve and protect the confidentiality, integrity, and availability of information, systems, and resources.

Page 3: ACCESS CONTROL MANAGEMENT By: Poonam Gupta Sowmya Sugumaran

What is Access Control

• process by which users are identified and granted certain privileges to resources

• limits the use of a resource

Page 4: ACCESS CONTROL MANAGEMENT By: Poonam Gupta Sowmya Sugumaran

Types of Access Control

1. Discretionary-owner 2. Mandatory-authorities3. Role-based-according to role4. Rule-based-pre determined rules

Page 5: ACCESS CONTROL MANAGEMENT By: Poonam Gupta Sowmya Sugumaran

Access Control Technologies

• Tokens• Smart cards• Encrypted keys• Passwords

Popular Technologies

Page 6: ACCESS CONTROL MANAGEMENT By: Poonam Gupta Sowmya Sugumaran

Kerberos

• Authentication Protocol• For Client/Server Application• Using Secret Key Cryptography

Page 7: ACCESS CONTROL MANAGEMENT By: Poonam Gupta Sowmya Sugumaran

VPN

ACP(Kerberos)

Gateway

Internet

Page 8: ACCESS CONTROL MANAGEMENT By: Poonam Gupta Sowmya Sugumaran

Kerberos

Three things happen between client and server when client

Initiate to allocate resources

• AS Exchange• TGS Exchange• Client/Server (CS) Exchange

Page 9: ACCESS CONTROL MANAGEMENT By: Poonam Gupta Sowmya Sugumaran

http://technet.microsoft.com/en-us/library/bb742516.aspx

Page 10: ACCESS CONTROL MANAGEMENT By: Poonam Gupta Sowmya Sugumaran

Technical Details

User namePasswordPolicies

AS ServerKGS Sever

Resource 1

Resource 2

1 3

2

4

4

Page 11: ACCESS CONTROL MANAGEMENT By: Poonam Gupta Sowmya Sugumaran

Technical Details

Step 1: User-Client Logon(i)User-username & pswrd-client(ii)client-H(pswrd)-secret key of user

Step 2: Client Authentication(Client-AS)(i)Client sends user ID AS generates secret key from database(ii)AS sends 2 messages to client: Msg A- Client/TGS session key encrypted by user’s secret key Msg B- TGT encrypted with TGS’s secret key

Page 12: ACCESS CONTROL MANAGEMENT By: Poonam Gupta Sowmya Sugumaran

Contd..

Step 3: Client Service Authorization(Client-TGS)(i)Client-2 messages to TGS: Msg C- TGT & service ID Msg D- Authenticator(user ID, timestamp) encrypted using client/TGS session key(ii)TGS decrypts TGT & authenticator and sends 2 msgs to client: Msg E-Client-to-Server ticket Msg F-Client/Server session key encrypted with Client/TGS session key.

Page 13: ACCESS CONTROL MANAGEMENT By: Poonam Gupta Sowmya Sugumaran

Step 4: Client Service Request(Client- Service Server)(i)Client sends 2 msgs to SS: Msg E(Client/SS ticket) Msg G-Authenticator (user ID, timestamp, C/S session key)(ii)SS decrypts to get C/S session key SS decrypts authenticator and sends msg to client Msg H-Timestamp in client’s authenticator+1 encrypted using C/S key

Page 14: ACCESS CONTROL MANAGEMENT By: Poonam Gupta Sowmya Sugumaran

Roadmap of the Project

TASK MONTH WEEK

Understanding the project

January 3 – 4

Installing Kerberos & Proposal preparation

February 1

Proposal Presentation

February 2

Coding, Testing & Debugging

February-March

3-4

Implementation March-April

4-2

Final Presentation Preparation

April 3-4

Final Presentation May 1

Page 15: ACCESS CONTROL MANAGEMENT By: Poonam Gupta Sowmya Sugumaran

Thank You…!!!