Title :
Policy-based authentication and authorization: secure access to the network infrastructure
Author_Institution :
Alcatel IND, USA
Abstract :
A gaping hole in many of today´s networks is the weak security surrounding the network devices themselves-the routers, the switches and the access servers. In all public networks and in some private networks, the network devices are shared virtually among different user communities. Access to the configuration schemes and command lines is most often an “all or nothing” proposition-the network administrator gets either read-only privileges or read/write privileges. In this case, authentication equals authorization. Herein lies the problem. Security policies may mandate that certain administrators have read-only capabilities for all device parameters and read/write capabilities for a certain subset of commands. Each administrator may have a unique access profile. Authentication verifies identity; authorization verifies privileges. This paper addresses the value of using a centralized, provisioned management structure that disseminates network policies and administration privileges to all the devices that make up the network infrastructure
Keywords :
authorisation; computer network management; message authentication; telecommunication security; access profile; access servers; administration privilege dissemination; centralized provisioned management structure; command lines; configuration schemes; device parameters; identity verification; network administration; network device security; network infrastructure; network policy dissemination; policy-based authentication; policy-based authorization; private networks; privilege verification; public networks; read-only privileges; read/write privileges; routers; secure access; security policies; switches; user communities; virtually shared network devices; Access control; Authentication; Authorization; Data security; File servers; IP networks; Mission critical systems; Network operating systems; Network servers; Switches;
Conference_Titel :
Computer Security Applications, 2000. ACSAC '00. 16th Annual Conference
Conference_Location :
New Orleans, LA
Print_ISBN :
0-7695-0859-6
DOI :
10.1109/ACSAC.2000.898887