Top Banner
Self-Adaptive Federated Authorisation Infrastructures Lionel Montrieux
62

Self-Adaptive Federated Authorisation Infrastructures

Feb 21, 2017

Download

Software

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Self-Adaptive Federated Authorisation Infrastructures

Self-Adaptive Federated Authorisation

InfrastructuresLionel Montrieux

Page 2: Self-Adaptive Federated Authorisation Infrastructures

C. Bailey, D. Chadwick, R. de Lemos, Self-adaptive federated authorization

infrastructures. JCSS, 2014

Page 3: Self-Adaptive Federated Authorisation Infrastructures

C. Bailey, L. Montrieux, R. de Lemos, Y. Yu, M. Wermelinger, Run-time generation, transformation, and

verification of access control models for self-protection.

SEAMS’14

Page 4: Self-Adaptive Federated Authorisation Infrastructures

L. Montrieux, C. Bailey, R. de Lemos, A. Bandara,

Engineering self-adaptive authorisation

infrastructures. Draft.

Page 5: Self-Adaptive Federated Authorisation Infrastructures

Part 1

Page 6: Self-Adaptive Federated Authorisation Infrastructures

I am Arthur, king of the Britons

Page 7: Self-Adaptive Federated Authorisation Infrastructures

None shall pass.

Page 8: Self-Adaptive Federated Authorisation Infrastructures
Page 9: Self-Adaptive Federated Authorisation Infrastructures

It’s just a scratch.

Page 10: Self-Adaptive Federated Authorisation Infrastructures

Just a flesh wound.

Page 11: Self-Adaptive Federated Authorisation Infrastructures

I’m invincible!!!

Page 12: Self-Adaptive Federated Authorisation Infrastructures

Let’s just call it a draw then.

Page 13: Self-Adaptive Federated Authorisation Infrastructures

Come on, Patsy.

Page 14: Self-Adaptive Federated Authorisation Infrastructures

–Sinclair et al, 2007

“We have been cited examples in which 50-90% of the

individuals with access to particular data store also

have legacy access to information that they no

longer need.”

Page 15: Self-Adaptive Federated Authorisation Infrastructures

Self-Adaptive Authorisation

Page 16: Self-Adaptive Federated Authorisation Infrastructures

–Cheng et al., 2009

“Self-adaptive systems are systems that are able to

modify their behaviour and/or structure in response changes that occur to the

system itself, its environment, or even its

goals.”

Page 17: Self-Adaptive Federated Authorisation Infrastructures

–Montrieux et al, draft

“Self-adaptive authorisation infrastructures refer to the run-time adaptation of the collection of authorisation

policies and their enforcement.”

Page 18: Self-Adaptive Federated Authorisation Infrastructures

–Bailey et al, 2014

“Federated authorisation infrastructures […] build

upon existing authorisation models […]. [They] provide the method through which large scale distributed access can be granted.”

Page 19: Self-Adaptive Federated Authorisation Infrastructures

Part 2

Page 20: Self-Adaptive Federated Authorisation Infrastructures

Overview

Page 21: Self-Adaptive Federated Authorisation Infrastructures

Target System

Page 22: Self-Adaptive Federated Authorisation Infrastructures

Target System

Identity Provider

Credential Issuing Policy

User Attribute Repository

Attributes

Identity Provider

Credential Validation Service

Credential Validation

Policy

Credentials

Service Provider

Policy Decision Point

Access Control Policy

ValidAttributes

Page 23: Self-Adaptive Federated Authorisation Infrastructures

Adaptive Layer

Page 24: Self-Adaptive Federated Authorisation Infrastructures

Adaptive Layer

Target System

ProbesEffectors

Monitor Triggers

SAAF Controller

Analyser SolutionsPlanner

Executor

Authorisation Infrastructure

ModelBehaviour Model

Page 25: Self-Adaptive Federated Authorisation Infrastructures

Architecture

Page 26: Self-Adaptive Federated Authorisation Infrastructures

Component

Page 27: Self-Adaptive Federated Authorisation Infrastructures

Component

Sub-component

Page 28: Self-Adaptive Federated Authorisation Infrastructures
Page 29: Self-Adaptive Federated Authorisation Infrastructures
Page 30: Self-Adaptive Federated Authorisation Infrastructures

Identity Provider Server

Identity Provider Server

Authorisation Server

Identity Provider Server

Service Provider Server

Roles/Attributes

Role/AttributeAdaptations

SAMLAssertion

SubjectAuthentication

Access Decision

AccessRequest

Subject AccessRequest

Page 31: Self-Adaptive Federated Authorisation Infrastructures

LDAP (Attribute Repository)

SimpleSAMLPHP: Identity ProviderAttributes

Identity Provider Server

Page 32: Self-Adaptive Federated Authorisation Infrastructures

Authorisation Server

CVS PDP

PERMIS Standalone

SAAF Controller

AccessEvents

PolicyAdaptations

Page 33: Self-Adaptive Federated Authorisation Infrastructures

ResourcesResources

Policy EnforcementPoint

SimpleSAMLPHP:Service Provider

Resources

Service Provider Server

Page 34: Self-Adaptive Federated Authorisation Infrastructures

Planner Analyser

Behaviour Model

Authorisation Infrastructure

Model

Executor Asset MonitorBehaviour Gauges

Identity Provider

Authorisation Service

Rules &Attributes

Tailored Solutions

Plan

GetBehaviour

SetBehaviourRBAC/ABAC

Constructs

GetAttributes

ActivePolicies

AccessRequests/Decisions

AttributeAssignment

New Policies

Page 35: Self-Adaptive Federated Authorisation Infrastructures

Authorisation Model?

Page 36: Self-Adaptive Federated Authorisation Infrastructures

Attr3

Attr2

Attr1

Sub1

Sub2

Sub3

Sub4

IdP1

IdP2

Tgt1

Tgt2

Tgt3

Tgt4

Tgt5

Tgt6

Act1

Act2

Act3

Act4

Act5

CredentialValidationConstraints

Access ControlConstraints

Subject AttributeAssignments

Page 37: Self-Adaptive Federated Authorisation Infrastructures

Part 3

Page 38: Self-Adaptive Federated Authorisation Infrastructures

Initial Configuration

Page 39: Self-Adaptive Federated Authorisation Infrastructures

PERMIS AZ Policy<RoleAssignment ID="ContractorIdPAssignment"> <SubjectDomain ID="Contractor"/> <RoleList> <Role Type="permisRole" Value="Contractor"/> </RoleList> <Delegate Depth="0"/> <SOA ID="ContractIdP"/> <Validity/> </RoleAssignment> <TargetAccess ID="ContractPayroll"> <RoleList> <Role type="permisRole" Value="Contractor"/> </RoleList> <TargetList> <TargetDomain ID="PayrollSystem"/> <AllowedAction ID="getEmpPayslip"/> <AllowedAction ID="runPayroll"/> </TargetList> </TargetAccess>

Page 40: Self-Adaptive Federated Authorisation Infrastructures

SAAF Behaviour<BehaviourPolicy> <BaseTrigger ID="bt1"> <Subject/> <Provider/> <Attribute type="permisRole">Contractor</Attribute> <Target>PayrollSystem</Target> <Action>getEmpPayslip</Action> <Rate> <Threshold>5</Threshold> <Interval>1</Interval> <TimeScale>min</TimeScale> </Rate> </BaseTrigger> <CompositeTrigger ID="ct1"> <BasedTriggerID>bt1</BasedTriggerID> <Rate> <Threshold>4</Threshold> <Interval>1</Interval> <TimeScale>day</TimeScale> </Rate> </CompositeTrigger> </BehaviourPolicy>

Page 41: Self-Adaptive Federated Authorisation Infrastructures

SAAF Solutions (1)<SolutionPolicy> <Solution> <Action> <Operation>removeSubjectAttribute</Operation> </Action> <TriggerID>bt1</TriggerID> <TriggerID>ct1</TriggerID> </Solution> <Solution> <Action> <Operation>removeAttributePermission</Operation> </Action> <Action> <Operation>buildPolicy</Operation> </Action> <Action> <Operation>activatePolicy</Operation> </Action> <TriggerID>ct1</TriggerID> </Solution>

Page 42: Self-Adaptive Federated Authorisation Infrastructures

SAAF Solutions (2) <Solution> <Action> <Operation>removeAttributeAssignment</Operation> </Action> <Action> <Operation>buildPolicyFile</Operation> </Action> <Action> <Operation>activatePolicy</Operation> </Action> <TriggerID>ct1</TriggerID> </Solution> <Solution> <Action> <Operation>deactivatePolicy</Operation> </Action> <TriggerID>ct1</TriggerID> </Solution> </SolutionPolicy>

Page 43: Self-Adaptive Federated Authorisation Infrastructures

Runtime Adaptation

Page 44: Self-Adaptive Federated Authorisation Infrastructures

bt1 ct1

AnalyserPlanner

Executor Monitor

Target System

bt1

S1

S1

S1

ct1

S1,S2,S3,S4

S2

S2

Page 45: Self-Adaptive Federated Authorisation Infrastructures

LDAP directory

Page 46: Self-Adaptive Federated Authorisation Infrastructures

PERMIS AZ Policy

<RoleAssignment ID="ContractorIdPAssignment"> <SubjectDomain ID="Contractor"/> <RoleList> <Role Type="permisRole" Value="Contractor"/> </RoleList> <Delegate Depth="0"/> <SOA ID="ContractIdP"/> <Validity/> </RoleAssignment>

Before adaptation (excerpt)

Page 47: Self-Adaptive Federated Authorisation Infrastructures

PERMIS AZ Policy

<RoleAssignment ID="ContractorIdPAssignment"> <SubjectDomain ID="Contractor"/> <RoleList/> <Delegate Depth="0"/> <SOA ID="ContractIdP"/> <Validity/> </RoleAssignment>

After adaptation (excerpt)

Page 48: Self-Adaptive Federated Authorisation Infrastructures

Part 4

Page 49: Self-Adaptive Federated Authorisation Infrastructures

Validating Solutions

Verification

Analysis Planning

SAAF ControllerRBAC1RBAC2RBAC3

RBAC1RBAC2

RBAC

S1, S2, S3

RBAC1

isVerified

Page 50: Self-Adaptive Federated Authorisation Infrastructures

Model Validation

LDAP

PERMIS

RBAC

CONSTRAINTS

RBACDSML

Page 51: Self-Adaptive Federated Authorisation Infrastructures

rbacDSML MM

Page 52: Self-Adaptive Federated Authorisation Infrastructures

Constraint Verification (OCL)

constraint rbacDSML::Granted inv:self.rbacRole−>closure(parent).permission−>union (self.rbacRole.permission)−> includesAll(self.resource.permission)

Page 53: Self-Adaptive Federated Authorisation Infrastructures

Part 5

Page 54: Self-Adaptive Federated Authorisation Infrastructures

Planner Analyser

Behaviour Model

Authorisation Infrastructure

Model

Executor Asset MonitorBehaviour Gauges

Identity Provider

Authorisation Service

Rules &Attributes

Tailored Solutions

Plan

GetBehaviour

SetBehaviourRBAC/ABAC

Constructs

GetAttributes

ActivePolicies

AccessRequests/Decisions

AttributeAssignment

New Policies

Page 55: Self-Adaptive Federated Authorisation Infrastructures

Model RepairVerificationand repair

Analysis Planning

SAAF ControllerRBAC1RBAC2RBAC3

RBAC1_rRBAC2

RBAC

S1, S2, S3

RBAC1_r

RBAC1_rRBAC2

Page 56: Self-Adaptive Federated Authorisation Infrastructures

Model Repair

LDAP

PERMIS

RBAC

CONSTRAINTS

RBACDSML

Page 57: Self-Adaptive Federated Authorisation Infrastructures

Just One More Thing…

Page 58: Self-Adaptive Federated Authorisation Infrastructures
Page 59: Self-Adaptive Federated Authorisation Infrastructures

https://saaf-resource.kent.ac.uk/

game/index.php

Page 60: Self-Adaptive Federated Authorisation Infrastructures

Thank You

Page 61: Self-Adaptive Federated Authorisation Infrastructures

References• C. Bailey, D. W. Chadwick, and R. de Lemos, “Self-adaptive federated authorization infrastructures,” Journal of Computer and System Sciences, vol. 80, no. 5, pp. 935–952, Aug. 2014.

• C. Bailey, L. Montrieux, R. de Lemos, Y. Yu, and M. Wermelinger, “Run-time generation, transformation, and verification of access control models for self-protection,” in SEAMS’14: 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Hyderabad, India, 2014.

• B. H. C. Cheng, R. de Lemos, H. Giese, P. Inverardi, J. Magee, J. Andersson, B. Becker, N. Bencomo, Y. Brun, B. Cukic, G. D. M. Serugendo, S. Dustdar, A. Finkelstein, C. Gacek, K. Geihs, V. Grassi, G. Karsai, H. M. Kienle, J. Kramer, M. Litoiu, S. Malek, R. Mirandola, H. A. Müller, S. Park, M. Shaw, M. Tichy, M. Tivoli, D. Weyns, and J. Whittle, “Software Engineering for Self-Adaptive Systems: A Research Roadmap,” in Software Engineering for Self-Adaptive Systems, B. H. C. Cheng, R. de Lemos, H. Giese, P. Inverardi, and J. Magee, Eds. Springer Berlin Heidelberg, 2009, pp. 1–26

• S. Sinclair, S. W. Smith, S. Trudeau, M. E. Johnson, and A. Portera, “Information Risk in Financial Institutions: Field Study and Research Roadmap,” in Enterprise Applications and Services in the Finance Industry, D. J. Veit, D. Kundisch, T. Weitzel, C. Weinhardt, F. A. Rabhi, and F. Rajola, Eds. Springer Berlin Heidelberg, 2007, pp. 165–180.

Page 62: Self-Adaptive Federated Authorisation Infrastructures

Image Credits• All screen captures are from the film “Monthy Python and the Holy Grail” (1975)

• Snakes and Ladders, Len Matthews, CC by-nd 2.0 https://goo.gl/3j3KF4