You are on page 1of 20

INFS 767 Fall 2003

The RBAC96 Model

Prof. Ravi Sandhu George Mason University

AUTHORIZATION, TRUST AND RISK


v Information

security is fundamentally about managing


authorization trust

and

so as to manage risk

Ravi Sandhu

SOLUTIONS
v OM-AM v RBAC v PKI v and

others

Ravi Sandhu

THE OM-AM WAY


What? Objectives Model Architecture Mechanism How?
Ravi Sandhu

A s s u r a n c e
4

LAYERS AND LAYERS


v Multics

rings v Layered abstractions v Waterfall model v Network protocol stacks v OM-AM

Ravi Sandhu

OM-AM AND MANDATORY ACCESS CONTROL (MAC)


What? No information leakage Lattices (Bell-LaPadula) Security kernel Security labels How?
Ravi Sandhu

A s s u r a n c e
6

OM-AM AND DISCRETIONARY ACCESS CONTROL (DAC)


What? Owner-based discretion numerous numerous ACLs, Capabilities, etc How?
Ravi Sandhu

A s s u r a n c e
7

OM-AM AND ROLE-BASED ACCESS CONTROL (RBAC)


What? Policy neutral RBAC96 user-pull, server-pull, etc. certificates, tickets, PACs, etc. How?
Ravi Sandhu

A s s u r a n c e
8

ROLE-BASED ACCESS CONTROL (RBAC)


vA

users permissions are determined by the users roles


rather

than identity or clearance roles can encode arbitrary attributes


v multi-faceted v ranges

from very simple to very sophisticated


9

Ravi Sandhu

WHAT IS THE POLICY IN RBAC?


v RBAC

is a framework to help in articulating policy v The main point of RBAC is to facilitate security management

Ravi Sandhu

10

RBAC SECURITY PRINCIPLES


v least

privilege v separation of duties v separation of administration and access v abstract operations

Ravi Sandhu

11

RBAC96 IEEE Computer Feb. 1996


v Policy

neutral v can be configured to do MAC


roles

simulate clearances (ESORICS 96) simulate identity (RBAC98)

v can

be configured to do DAC

roles

Ravi Sandhu

12

WHAT IS RBAC?
v multidimensional v open

ended v ranges from simple to sophisticated

Ravi Sandhu

13

RBAC CONUNDRUM
v turn

on all roles all the time v turn on one role only at a time v turn on a user-specified subset of roles

Ravi Sandhu

14

RBAC96 FAMILY OF MODELS


RBAC3 ROLE HIERARCHIES + CONSTRAINTS

RBAC1 ROLE HIERARCHIES

RBAC2 CONSTRAINTS

RBAC0 BASIC RBAC


Ravi Sandhu

15

RBAC0
USER-ROLE ASSIGNMENT USERS PERMISSION-ROLE ASSIGNMENT ROLES PERMISSIONS

...
Ravi Sandhu

SESSIONS

16

PERMISSIONS
v Primitive
read,

permissions permissions

write, append, execute debit, inquiry

v Abstract
credit,

Ravi Sandhu

17

PERMISSIONS
v System v Object
read,

permissions

Auditor

permissions

write, append, execute, credit, debit, inquiry

Ravi Sandhu

18

PERMISSIONS
v Permissions

are positive v No negative permissions or denials


negative

permissions and denials can be handled by constraints

v No

duties or obligations
outside scope of access control

Ravi Sandhu

19

ROLES AS POLICY
vA

role brings together

collection of users and a collection of permissions


v These
A

collections will vary over time

role has significance and meaning beyond the particular users and permissions brought together at any moment
20

Ravi Sandhu

ROLES VERSUS GROUPS


v Groups
a

are often defined as

collection of users

vA

role is

collection of users and a collection of permissions


v Some
a

authors define role as

collection of permissions
21

Ravi Sandhu

USERS
v Users

are

human

beings or other active agents


v Each

individual should be known as exactly one user

Ravi Sandhu

22

USER-ROLE ASSIGNMENT
vA

user can be a member of many roles v Each role can have many users as members

Ravi Sandhu

23

SESSIONS
vA

user can invoke multiple sessions v In each session a user can invoke any subset of roles that the user is a member of

Ravi Sandhu

24

PERMISSION-ROLE ASSIGNMENT
vA

permission can be assigned to many roles v Each role can have many permissions

Ravi Sandhu

25

MANAGEMENT OF RBAC
v Option

1: USER-ROLE-ASSIGNMENT and PERMISSION-ROLE ASSIGNMENT can be changed only by the chief security officer v Option 2: Use RBAC to manage RBAC
Ravi Sandhu

26

RBAC1
ROLE HIERARCHIES USER-ROLE ASSIGNMENT USERS ROLES PERMISSION-ROLE ASSIGNMENT PERMISSIONS

...
Ravi Sandhu

SESSIONS 27

HIERARCHICAL ROLES
Primary-Care Physician Specialist Physician

Physician

Health-Care Provider
Ravi Sandhu

28

HIERARCHICAL ROLES
Supervising Engineer

Hardware Engineer

Software Engineer

Engineer
Ravi Sandhu

29

PRIVATE ROLES
Hardware Engineer Supervising Engineer Software Engineer

Hardware Engineer

Software Engineer

Engineer
Ravi Sandhu

30

EXAMPLE ROLE HIERARCHY


Director (DIR) Project Lead 1 (PL1) Production 1 (P1) Quality 1 (Q1) Project Lead 2 (PL2) Production 2 (P2) Quality 2 (Q2)

Engineer 1 (E1)

Engineer 2 (E2) Engineering Department (ED)

PROJECT 1

PROJECT 2

Ravi Sandhu

Employee (E)

31

EXAMPLE ROLE HIERARCHY


Project Lead 1 (PL1) Production 1 (P1) Quality 1 (Q1) Project Lead 2 (PL2) Production 2 (P2) Quality 2 (Q2)

Engineer 1 (E1)

Engineer 2 (E2) Engineering Department (ED)

PROJECT 1

PROJECT 2

Ravi Sandhu

Employee (E)

32

EXAMPLE ROLE HIERARCHY


Director (DIR) Project Lead 1 (PL1) Production 1 (P1) Quality 1 (Q1) Project Lead 2 (PL2) Production 2 (P2) Quality 2 (Q2)

Engineer 1 (E1)

Engineer 2 (E2)

PROJECT 1

PROJECT 2

Ravi Sandhu

33

EXAMPLE ROLE HIERARCHY


Project Lead 1 (PL1) Production 1 (P1) Quality 1 (Q1) Project Lead 2 (PL2) Production 2 (P2) Quality 2 (Q2)

Engineer 1 (E1)

Engineer 2 (E2)

PROJECT 1

PROJECT 2

Ravi Sandhu

34

RBAC3
ROLE HIERARCHIES USER-ROLE ASSIGNMENT USERS ROLES PERMISSIONS-ROLE ASSIGNMENT PERMISSIONS

...
Ravi Sandhu

SESSIONS CONSTRAINTS 35

CONSTRAINTS
v Mutually
Static

Exclusive Roles

Exclusion: The same individual can never hold both roles Dynamic Exclusion: The same individual can never hold both roles in the same context

Ravi Sandhu

36

CONSTRAINTS
v Mutually
Static

Exclusive Permissions

Exclusion: The same role should never be assigned both permissions Dynamic Exclusion: The same role can never hold both permissions in the same context

Ravi Sandhu

37

CONSTRAINTS
v Cardinality
At

Constraints on User-Role Assignment


most k users can belong to the role At least k users must belong to the role Exactly k users must belong to the role

Ravi Sandhu

38

CONSTRAINTS
v Cardinality
At

Constraints on Permissions-Role Assignment


most k roles can get the permission At least k roles must get the permission Exactly k roles must get the permission

Ravi Sandhu

39

You might also like