[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
HRAC submeeting team meeting July 30, 1998: minutes
Attached are the minutes of the meeting in Helsinki.
Konstantin
-----------------------------------
Distributed Computing Architect
Baptist Health Systems of South Florida
voice: 305.596.1960 x6469
Minutes of the HRAC RFP response submitters and supporters team meeting
Location: Radisson Hotel, Helsinki, Finland
Date: Thursday, July 30, 1998
Time: 9 AM -- 12 PM
Compiled by Konstantin Beznosov
Participants:
Bob Burt -- 2AB,
Carol Burt -- 2AB, (partly)
David Chizmadia -- NSA,
Bret Hartman -- Concept 5, (partly)
Charles Carman -- Philips,
Konstantin Beznosov -- BHSSF,
Angelique Krieger -- Boeing,
Jeff Mischkinsky -- Inprise, (partly)
David Curtis -- OMG (soon in Inprise)
The following items were in the meeting agenda
A. DESIGN GOALS
Participants converged on the following design goals (proposed by
Carol Burt in one of the earlier messages on the mail list):
1. There should be nothing in the interfaces that restricts the
scope of access control managed by an HRAC facility. That is, it
should be possible to have a single HRAC which controls access
rules and decisions for all targets in an enterprise or an HRACs
for each target in an enterprise.
[This does not imply that there would not be multiple instances of
ADO's accessing an enterprise rules repository... it does imply
that there must be a way to uniquely identify secured resources,
however]
2. It should be possible for targets to be developed without
concern for the vendor of the HRAC. That is, the rules for defining
"secured resource identifiers" are precise and there are no
hidden interfaces between the target and the HRAC.
3. Definition of access rules should be as simple as possible [and
still meet the requirements of the RFP] but not simpler. The
definition of access rules should be generic enough to allow a
variety of implementation approaches to storage and retrieval of
rules and simple enough that users and target developers will take
the time to define and use them.
4. Interfaces should exist such that Secured Resources and
associated Access control rules might be defined and administered
by a security administrator using a tool or by the target.
5. Interfaces and/or types that are specific to healthcare (the
required set of secured resources for healthcare) should be
provided in a separate module so that the specification can be
easily extended/adopted for other domains with similar
requirements.
ROUGH MODEL AND TERMINOLOGY IN IT
The following terminology was adopted for further use:
- Access Decision Object (ADO)
An object that provides an interface to obtain authorization decisions
about operations on resources by a particular principal.
- ADO Client
An application that acts as a client of ADO.
- Secured Resource
"a 'secured resource' can be any valuable asset of an application
owner, which is accessed by an application on behalf of a principal
using it, and access to which is to be controlled according to the
owner's interests."
"Resource Identifier" was NOT defined yet.
RESOURCE SPACE STRUCTURE AND ORGANIZATION
Bob described 2 alternative models of resource space that they used in
their implementations crying similar functionalities:
1. Flat space: each resource is uniquely identified by an identifier
which does not have any internal structure, i.e. just a unique
number that can be used for indexing resources and other
manipulation operations. In this case, each authorization rule
allows to make decision on one and only resource.
2. Tree-like hierarchy (acyclic directed graph [ADG]): each
resource is uniquely identified by an identifier which has internal
structure. The identifier structure represents the path to the
resource. This resource space is similar to Unix directory tree
organization, where a name of any file is a global path to that
file beginning from root. An authorization rule allows to make
decision on any node or leaf. Access to the resource is granted if
access is granted to every node in the path to the resource. For
example, in order to have access to resource identified by
/BHSSF/SMH/patients/JohnSmith/bloodtests/August-02/test-3 access
should be given to /BHSSF, to /BHSSF/SMH, to /BHSSF/SMH/patients,
..., to /BHSSF/SMH/patients/JohnSmith/bloodtests/August-02/test-3.
The described logic is the same as in access control model of Unix
file system.
Bob proposed to use these two structures of the resource space. I.e.
each resource identifier would be either from the flat (#1) space of
from the hierarchical (#2) space.
Participants tried to come up with scenarios where these two types of
resource space would not suffice. Nobody could come up with such a
scenario. It was decided that we all will test the proposed
organization of resource space and see if there is any reasonable
scenario of authorization rules that would require more sophisticated
or just different resource space organization.
It was suggested to have another meeting in Seattle during the OMG
meeting.