Digital Library Authentication and Authorization
Architecture
What it is
A secure, precise, standards-based, scalable mechanism,
enabling information service providers both to guarantee the
identity of institutional consumers (authentication) and to
provide services based on the characteristics of individual
consumers (authorization) while offering increased access,
privacy, flexibility and richer management information to
consumer institutions.
Information service providers may be traditional commercial
vendors. They may also be our own institutions, enabling
increased flexibility in inter-institutional transactions, e.g.,
federated collections.
Participants in the current DLF-sponsored pilot are the
University of California (Office of the President), Columbia
University, JSTOR and OCLC.
Motivation
a) Increasing problems associated with network topological
(IP-address) methods
- no ISP (third-party dial-in) access to remote services
- security enforced only by physical location
- difficult/impossible to manage access for remote campuses
using commercial Internet providers
- difficult for providers to implement services customized per
individual
- poor management information for both providers and consumer
institutions
- poor scaling properties, increasing labor to manage
b) Increasing problems with "proxy" methods
- impossible to implement newer services, e.g., those which
build web addresses dynamically in the browser
- potential bandwidth bottleneck
- no management information for providers
- cache-based security violations possible for providers
c) Problems with remote user registration methods
- in opposition to strategies for single sign-on
- duplicate development work
- poor authentication
- poor management information for consumer institutions
d) Standards-based, trends promising
- certificate technology already standard in browsers
- e-commerce community positioning for certificate
technology
- directory service standards increasingly part of other
products (email, calendaring, enterprise-wide applications)
e) Feedback encouraging-increasing interest from higher-ed IT
decision-makers
Architecture
1. Individual within consumer institution community, providing
an individual digital certificate, requests service from remote
provider;
2. Service provider validates authenticity of individual's
issuing certificate authority, retrieves location of consumer
institution's directory/attribute service from within
individual's certificate, contacts that directory
service-providing its own certificate as well-requesting
authorization information for the individual;
3. Directory service validates authenticity of service
provider's issuing authority, and responds to provider with
appropriate classes of service permissible for the
individual;
4. Service provider delivers appropriate service to the
individual.
Design Principles
- privacy; user-specific information is kept entirely within
the consumer institution
- localization of information; minimal information exchange,
only what's precisely necessary for the transaction, no
redundancy
- better management information on all sides
- better services possible; providers can create extensive
user-profiled services with appropriate privacy
- separation between authentication and authorization systems;
much more flexible classes of service are possible
Investments, per architectural component
a) for customer institutions
- certificate identity for servers
- directory service
- certificate infrastructure for individuals
b) for service providers
- certificate identity for servers
- web server extension module
History/Status
- 97-98; UCOP, UC System-wide security architecture; Columbia
access management broker service
- Apr 98; Clifford Lynch white paper, issues in
inter-institutional authentication and authorization; CNI
discussion
- Oct 98; DLF Architecture Committee, identification of common
practices
- Dec 98; CNI, UCOP/Columbia comparison presentation
- Jan 99; UCOP/Columbia/JSTOR/OCLC Pilot Launched
- Apr 99; Pilot operational
- Apr 99; CNI presentation
- May 99; CSG presentation
- Jun 99; CIC presentation
- Jun 99; Internet-2 presentation
- Oct 99; Educause presentation
- Publication with the Corporation for Research and
Educational Networking (CREN)
of FAQ
return to top >> |