[ Pobierz całość w formacie PDF ]
.This tradi­tional model violates the important security principle ofÏ% Allows scripts and applications to access authoriza­least privilege, which says that entities (users, applica­tion information easilytions, or devices) should be assigned only the minimumÏ% Provides a mechanism for applying runtime busi­privileges (rights or permissions) they need to fulfillness logic when checking access permissionstheir purposes and nothing more.See Also: permissions, rightsSolaris s role-based access control (RBAC) modelenables administrators to separate the rights and privi­leges of the Superuser account and assign them to dif­role-based securityferent roles such as primary administrator, juniorAny general mechanism that controls access toadministrator, system administrator, or operator.Theseresources using roles instead of user credentials.roles can then be assigned to individual users andOverviewgroups to grant them rights for performing specific sys­Role-based security is at the heart of many platformstem tasks such as backing up servers, while at the sameand products including Microsoft Windows operatingtime preventing them from being able to perform thesystems.The architecture of Microsoft Windows NTfull range of tasks that root can.uses role-based security based on privileges assigned toOn Solaris using RBAC, roles can be added, removed,local groups such as Administrators, Users, and Guests.and modified using the Roleadd, Roledel, and RolemodBy simply making a user a member of one of thesecommands, respectively, while the Role command cangroups, the user assumes the role of the generic groupbe used to display the roles that have been assigned tomember and has all the rights to perform system tasksspecific users or groups.and permissions to access resources that belong to thegroup.Microsoft Transaction Server (MTS), and laterSee Also: rootCOM+, enhanced this role-based security approach byRproviding developers with ways of defining their ownrole-based authorizationabstract roles for use with custom-developed applica­Authorization that uses roles to determine access rightstions.Administrators could then assign users to specificand privileges.roles to define levels of access to distributed applica­tions and resources on a network.The Microsoft.NETOverviewFramework extends this model further by includingA role is a symbolic category that collects togethersupport for role-based authorization within the commonusers who share the same levels of security privileges.language runtime based on Windows accounts or cus­Role-based authorization is a mechanism that uses rolestom identities.to assign users suitable rights for performing systemtasks and permissions for accessing resources.Role-See Also: access control, permissions, rights,based authorization is commonly used in business androle-based authorizationfinancial applications to simplify the application of pol-281 rollup root certificaterollup root CAA cumulative set of hotfixes that can be applied in a sin­ The certificate authority (CA) at the top of a hierarchi­gle step.cal Public Key Infrastructure (PKI).Overview OverviewRollups (or security rollups) are packages of hotfixes A CA is a trusted entity (organization, company, orprovided by Microsoft Corporation that can patch a agency) that issues digital certificates for e-commerce,number of vulnerabilities in a single operation.Rollups secure e-mail, and code-signing purposes.CAs are thesimplify the deployment of security hotfixes and help foundation of PKI systems, both public and private, andadministrators keep their systems up to date and secure most large PKI systems consist of multiple CAsfrom attack.Rollups generally target specific compo­ arranged in a hierarchy of trust.At the top of the CAnents or areas of a product s operation and are released hierarchy is the root CA, which is the ultimate authorityfrom time to time by the Microsoft Security Response for the system.The root CA issues digital certificates toCenter (MSRC), a team of security professionals at CAs under it to verify their identity, but no one can ver­Microsoft responsible for responding to security threats ify the identity of the root CA except itself, as the chaininvolving Microsoft products.of trust must stop somewhere.The root CA, therefore,issues and signs its own certificate, called a root certifi­See Also: hotfix, Microsoft Security Response Centercate.By deciding whether to trust this root certificate, a(MSRC), patchuser decides whether to trust the entire PKI system.See Also: CA certificate, CA hierarchy, certificaterootauthority (CA), digital certificate, Public Key Infra­The superuser on UNIX/Linux platforms.structure (PKI), root certificateOverviewThe root user (or simply root) in UNIX corresponds toroot certificatethe Administrator account on Microsoft Windows plat-A digital certificate identifying a root certificate author­forms and is the all-powerful account with virtuallyity (CA).complete control over the system.Because of itsextraordinary rights and privileges, root should always Overviewbe protected with strong passwords, and only trusted In a Public Key Infrastructure (PKI), each CA mustindividuals should be granted access to this account [ Pobierz caÅ‚ość w formacie PDF ]
  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • agnieszka90.opx.pl