ImageVerifierCode 换一换
格式:PDF , 页数:159 ,大小:1.09MB ,
资源ID:435841      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-435841.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ANSI INCITS 539-2016 Information Technology C Management of Security Credentials.pdf)为本站会员(boatfragile160)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ANSI INCITS 539-2016 Information Technology C Management of Security Credentials.pdf

1、American National StandardDeveloped byfor Information Technology Management of Security CredentialsINCITS 539-2016INCITS 539-2016INCITS 539-2016American National Standardfor Information Technology Management of Security CredentialsSecretariatInformation Technology Industry CouncilApproved July 1, 20

2、16American National Standards Institute, Inc.Approval of an American National Standard requires review by ANSI that therequirements for due process, consensus, and other criteria for approval havebeen met by the standards developer.Consensus is established when, in the judgement of the ANSI Board of

3、Standards Review, substantial agreement has been reached by directly andmaterially affected interests. Substantial agreement means much more thana simple majority, but not necessarily unanimity. Consensus requires that allviews and objections be considered, and that a concerted effort be madetowards

4、 their resolution.The use of American National Standards is completely voluntary; theirexistence does not in any respect preclude anyone, whether he has approvedthe standards or not, from manufacturing, marketing, purchasing, or usingproducts, processes, or procedures not conforming to the standards

5、.The American National Standards Institute does not develop standards andwill in no circumstances give an interpretation of any American NationalStandard. Moreover, no person shall have the right or authority to issue aninterpretation of an American National Standard in the name of the AmericanNatio

6、nal Standards Institute. Requests for interpretations should beaddressed to the secretariat or sponsor whose name appears on the titlepage of this standard.CAUTION NOTICE: This American National Standard may be revised orwithdrawn at any time. The procedures of the American National StandardsInstitu

7、te require that action be taken periodically to reaffirm, revise, orwithdraw this standard. Purchasers of American National Standards mayreceive current information on all standards by calling or writing the AmericanNational Standards Institute.American National StandardPublished byAmerican National

8、 Standards Institute, Inc.25 West 43rd Street, New York, NY 10036Copyright 2016 by Information Technology Industry Council (ITI)All rights reserved.No part of this publication may be reproduced in anyform, in an electronic retrieval system or otherwise,without prior written permission of ITI, 1101 K

9、 Street NW, Suite 610, Washington, DC 20005. Printed in the United States of AmericaCAUTION: The developers of this standard have requested that holders of patents that may berequired for the implementation of the standard disclose such patents to the publisher. However,neither the developers nor th

10、e publisher have undertaken a patent search in order to identifywhich, if any, patents may apply to this standard. As of the date of publication of this standardand following calls for the identification of patents that may be required for the implementation ofthe standard, no such claims have been

11、made. No further patent search is conducted by the de-veloper or publisher in respect to any standard it processes. No representation is made or impliedthat licenses are not required to avoid infringement in the use of this standard.i CONTENTS Forewordxi Introductionxii 1 Scope 1 1.1 Simple Identity

12、 Management Profile . 1 1.2 Role Based Authorization Profile 1 1.3 Credential Management Profile 1 1.4 Certificate Management Profile 1 2 Normative references 1 DMTF component documents . 2 3 Terms and definitions 3 4 Symbols and abbreviated terms 5 5 Simple Identity Management . 6 5.1 Synopsis . 6

13、5.2 Description 6 5.2.1 Authenticated entities 7 5.2.2 Account 8 5.2.3 Account states . 8 5.2.4 Local account security policies 8 5.2.5 Access ingress point 9 5.2.6 Identity context . 9 5.3 Implementation . 9 5.3.1 Base requirements . 9 5.3.2 Account creation 11 5.3.3 Account management 12 5.3.4 Rep

14、resenting a third-party authenticated principal 16 5.3.5 Managing account identity groups . 17 5.3.6 Representing access ingress point 17 5.3.7 Identity context . 18 5.4 Methods 18 5.4.1 CIM_AccountManagementService.CreateAccount( ) 18 5.4.2 CIM_Account.RequestStateChange( ) 20 5.4.3 Profile convent

15、ions for operations . 21 5.4.4 CIM_Account . 22 5.4.5 CIM_EnabledLogicalElementCapabilities 23 5.4.6 CIM_AccountOnSystem 23 5.4.7 CIM_AccountManagementCapabilities . 23 5.4.8 CIM_AccountManagementService 23 5.4.9 CIM_AccountSettingData 24 5.4.10 CIM_AssignedIdentity 24 5.4.11 CIM_Dependency 25 5.4.1

16、2 CIM_ElementCapabilities 25 5.4.13 CIM_ElementSettingData 25 5.4.14 CIM_Group 26 5.4.15 CIM_HostedService . 26 5.4.16 CIM_Identity . 27 5.4.17 CIM_IdentityContext 27 5.4.18 CIM_MemberOfCollection . 27 5.4.19 CIM_OwningCollectionElement . 28 5.4.20 CIM_ServiceAffectsElement 28 5.4.21 CIM_SettingsDef

17、ineCapabilities 28 5.4.22 CIM_UserContact 29 5.5 Use cases . 29 Error! Unknown document property name. ii 5.5.1 Profile registration 29 5.5.2 Determine whether CIM_Account.ElementName can be modified . 38 5.5.3 Determine whether account state management is supported . 38 5.5.4 Determine whether acco

18、unt management is supported 38 5.5.5 Create an account 38 5.5.6 Determine account defaults . 39 5.5.7 Delete an account 39 5.5.8 Modify the password for an account 39 5.5.9 Clear an account 40 5.5.10 Change state to enabled offline . 40 5.5.11 Add an account identity to a group 40 5.5.12 Remove an a

19、ccount identity from a group . 40 5.5.13 Determine the context of a security principal . 40 5.6 CIM elements 41 5.6.1 CIM_Account . 42 5.6.2 CIM_AccountManagementCapabilities . 42 5.6.3 CIM_AccountManagementService 43 5.6.4 CIM_AccountOnSystem 43 5.6.5 CIM_AccountSettingData 43 5.6.6 CIM_AssignedIde

20、ntity (CIM_Account) . 44 5.6.7 CIM_AssignedIdentity (Group) 44 5.6.8 CIM_AssignedIdentity (UserContact) 44 5.6.9 CIM_Dependency (access ingress) . 44 5.6.10 CIM_ElementCapabilities (CIM_AccountManagementService) 45 5.6.11 CIM_ElementCapabilities (CIM_Account) . 45 5.6.12 CIM_ElementSettingData 45 5.

21、6.13 CIM_EnabledLogicalElementCapabilities 46 5.6.14 CIM_Group 46 5.6.15 CIM_HostedService . 46 5.6.16 CIM_Identity . 46 5.6.17 CIM_IdentityContext 47 5.6.18 CIM_MemberOfCollection (group membership) 47 5.6.19 CIM_OwningCollectionElement . 47 5.6.20 CIM_ServiceAffectsElement 48 5.6.21 CIM_SettingsDe

22、fineCapabilities (CIM_AccountManagementCapabilities) . 48 5.6.22 CIM_SettingsDefineCapabilities (CIM_EnabledLogicalElementCapabilities) . 48 5.6.23 CIM_UserContact 49 5.6.24 CIM_RegisteredProfile . 49 6 Role Based Authorization 50 6.1 Synopsis . 50 6.2 Description 50 6.2.1 Role authorization service

23、: CIM_RoleBasedAuthorizationService 51 6.2.2 Authorized roles and privileges: CIM_Role and CIM_Privilege . 51 6.2.3 Security principal: CIM_Identity . 52 6.2.4 Privilege management . 52 6.3 Implementation . 53 6.3.1 Modeling the authorized role . 53 6.3.2 Authorized role management . 56 6.3.3 Author

24、ized role membership of security principal 56 6.3.4 Privilege management capability . 57 6.4 Methods 58 6.4.1 CIM_RoleBasedAuthorizationService.ModifyRole( ) . 58 6.4.2 CIM_RoleBasedAuthorizationService.AssignRoles( ) . 59 6.4.3 CIM_RoleBasedAuthorizationService.ShowAccess( ) 60 6.4.4 CIM_RoleBasedA

25、uthorizationService.ShowRoles( ) . 61 6.4.5 Profile conventions for operations . 63 iii 6.4.6 CIM_ConcreteDependency . 63 6.4.7 CIM_ElementCapabilities 65 6.4.8 CIM_HostedService . 65 6.4.9 CIM_MemberOfCollection . 65 6.4.10 CIM_OwningCollectionElement . 66 6.4.11 CIM_Privilege . 66 6.4.12 CIM_RoleB

26、asedManagementCapabilities . 66 6.4.13 CIM_Role . 66 6.4.14 CIM_RoleBasedAuthorizationService . 66 6.4.15 CIM_RoleLimitedToTarget . 67 6.4.16 CIM_ServiceAffectsElement 67 6.4.17 CIM_ServiceServiceDependency 67 6.5 Use cases . 67 6.5.1 Profile registration 68 6.5.2 Minimal instantiation of the profil

27、e . 68 6.5.3 Evaluating scope and privileges 69 6.5.4 Scope of the role and privileges for a managed element 72 6.5.5 Service processor roles use cases 74 6.5.6 Determine the roles managed by a service . 75 6.5.7 Determine candidate roles for a security principal . 76 6.5.8 Determine the roles to wh

28、ich a security principal is currently assigned 76 6.5.9 Determine the roles that scope a managed element . 77 6.5.10 Determine the current privileges of a security principal for a managed element 77 6.5.11 Modify a single privilege of an existing role . 77 6.5.12 Determine whether privilege manageme

29、nt is supported for a principal 78 6.5.13 Determine whether one-to-one privilege management is supported for an account 78 6.5.14 Assign custom privileges to an identity 78 6.6 CIM elements 79 6.6.1 CIM_ConcreteDependency (privilege). 79 6.6.2 CIM_ConcreteDependency (role) 80 6.6.3 CIM_ElementCapabi

30、lities 80 6.6.4 CIM_HostedService . 80 6.6.5 CIM_MemberOfCollection (privilege). 81 6.6.6 CIM_MemberOfCollection (identity). 81 6.6.7 CIM_OwningCollectionElement . 81 6.6.8 CIM_Privilege . 82 6.6.9 CIM_RoleBasedManagementCapabilities . 82 6.6.10 CIM_RegisteredProfile . 82 6.6.11 CIM_Role . 83 6.6.12

31、 CIM_RoleBasedAuthorizationService . 83 6.6.13 CIM_RoleLimitedToTarget . 83 6.6.14 CIM_ServiceAffectsElement CIM_Role 84 6.6.15 CIM_ServiceAffectsElement CIM_Privilege . 84 6.6.16 CIM_ServiceServiceDependency 85 7 Credential Management 86 7.1 Synopsis . 86 7.2 Description 86 7.2.1 Credential store 8

32、7 7.2.2 Credentials . 88 7.2.3 Authorization 88 7.3 Implementation . 88 7.3.1 Credentials . 88 7.3.2 Credential store 89 7.3.3 Utilizing credentials 89 7.3.4 Credential access authorization . 89 Error! Unknown document property name. iv 7.4 Methods 90 7.4.1 Profile conventions for operations . 91 7.

33、4.2 CIM_CredentialManagementService . 91 7.4.3 CIM_CredentialContext . 91 7.4.4 CIM_ConcreteDependency (CIM_CredentialStore) 91 7.4.5 CIM_HostedService . 92 7.4.6 CIM_CredentialStore . 92 7.4.7 CIM_MemberOfCollection (CIM_Credential) . 92 7.4.8 CIM_MemberOfCollection (CIM_CredentialStore) 93 7.4.9 C

34、IM_OwningCollectionElement . 93 7.4.10 CIM_ServiceAffectsElement (CIM_CredentialStore) . 93 7.4.11 CIM_ServiceAffectsElement (CIM_Credential) . 94 7.4.12 CIM_Credential 94 7.4.13 CIM_Identity . 94 7.4.14 CIM_AssociatedPrivilege . 94 7.5 Use cases . 94 7.5.1 Profile registration 95 7.5.2 Determining

35、the credential management service for a credential . 95 7.6 CIM elements 96 7.6.1 CIM_Credential 96 7.6.2 CIM_CredentialManagementService . 97 7.6.3 CIM_CredentialContext . 97 7.6.4 CIM_ConcreteDependency . 97 7.6.5 CIM_HostedService . 98 7.6.6 CIM_CredentialStore . 98 7.6.7 CIM_MemberOfCollection (

36、CIM_Credential) . 98 7.6.8 CIM_MemberOfCollection (CIM_CredentialStore) 99 7.6.9 CIM_OwningCollectionElement . 99 7.6.10 CIM_ServiceAffectsElement (CIM_CredentialStore) . 99 7.6.11 CIM_ServiceAffectsElement (CIM_Credential) . 100 7.6.12 CIM_CredentialManagementCapabilities 100 7.6.13 CIM_Identity .

37、100 7.6.14 CIM_AssociatedPrivilege . 101 8 Certificate Management 102 8.1 Synopsis . 102 8.2 Description 102 8.2.1 Key store 103 8.2.2 Public key infrastructure 104 8.2.3 Authorization 104 8.3 Implementation . 105 8.3.1 Key store 105 8.3.2 Certificate management service 105 8.3.3 Certificate chain .

38、 106 8.3.4 Authorization 106 8.4 Methods 107 8.4.1 CIM_CertificateManagementService.ImportPublicPrivateKeyPair( ) 107 8.4.2 CIM_CertificateManagementService.CreateKeystore( ) . 108 8.4.3 CIM_CertificateManagementService.CreateCertificateSigningRequest( ) 109 8.4.4 CIM_CertificateManagementService.Cr

39、eateSelfSignedCertificate( ) 112 8.4.5 CIM_CertificateManagementService.ImportEncodedCertificates( ) 114 8.4.6 CIM_CertificateManagementService.ImportCertificates( ) 115 8.4.7 CIM_CertificateManagementService.ExportEncodedCertificates( ) 116 8.4.8 CIM_CertificateManagementService.ApplyCRL( ) 118 8.4

40、.9 CIM_CertificateManagementService.ApplyDecodedCRL( ) 119 8.4.10 Profile conventions for operations . 120 8.4.11 CIM_CertificateManagementCapabilities 120 v 8.4.12 CIM_CertificateManagementService . 120 8.4.13 CIM_CredentialContext . 121 8.4.14 CIM_ConcreteDependency (CIM_Keystore) . 121 8.4.15 CIM

41、_ConcreteDependency (CIM_X509Certificate) . 121 8.4.16 CIM_ElementCapabilities 122 8.4.17 CIM_HostedService . 122 8.4.18 CIM_Keystore 122 8.4.19 CIM_MemberOfCollection . 122 8.4.20 CIM_OwningCollectionElement . 123 8.4.21 CIM_RegisteredProfile . 123 8.4.22 CIM_ServiceAffectsElement 123 8.4.23 CIM_Un

42、signedCredential . 124 8.4.24 CIM_X509Certificate 124 8.4.25 CIM_X509CRL . 124 8.4.26 CIM_Identity . 124 8.4.27 CIM_AssociatedPrivilege . 125 8.4.28 CIM_ConcreteDependency . 125 8.5 Use cases . 125 8.5.1 Profile registration 125 8.5.2 Simple certificate management . 126 8.5.3 Keystore . 127 8.5.4 Im

43、port asymmetric key . 128 8.5.5 CSR and self-signed certificate . 129 8.5.6 Import and export of certificates 130 8.5.7 CRL 131 8.6 CIM elements 134 8.6.1 CIM_CertificateManagementCapabilities 135 8.6.2 CIM_CertificateManagementService . 135 8.6.3 CIM_CredentialContext . 136 8.6.4 CIM_ConcreteDepend

44、ency (CIM_Keystore) . 136 8.6.5 CIM_ConcreteDependency (CIM_X509Certificate) . 136 8.6.6 CIM_ConcreteDependency . 137 8.6.7 CIM_ElementCapabilities 137 8.6.8 CIM_HostedService . 137 8.6.9 CIM_Keystore 138 8.6.10 CIM_ServiceAffectsElement (CIM_Credential) . 138 8.6.11 CIM_MemberOfCollection . 138 8.6

45、.12 CIM_OwningCollectionElement . 139 8.6.13 CIM_RegisteredProfile . 139 8.6.14 CIM_ServiceAffectsElement (CIM_Keystore) 139 8.6.15 CIM_UnsignedCredential . 140 8.6.16 CIM_X509Certificate 140 8.6.17 CIM_X509CRL . 141 8.6.18 CIM_AssociatedPrivilege . 141 Error! Unknown document property name. vi Figu

46、res Figure 1 Simple Identity Management profile: Class diagram . 7 Figure 2 Profile registration (Simple Identity Management implementation) . 29 Figure 3 Basic system accounts 30 Figure 4 Full account capabilities . 31 Figure 5 Account capabilities with ranges 32 Figure 6 Third-party authenticated

47、user . 33 Figure 7 Accounts with group membership 34 Figure 8 Role-oriented groups . 36 Figure 9 Access ingress point and identity context 37 Figure 10 Role Based Authorization Profile: Class diagram 51 Figure 11 Profile registration (Role Based Authorization implementation) 68 Figure 12 Minimal ins

48、tantiation 68 Figure 13 Cumulative Role Privilege example . 69 Figure 14 Scope of the roles 72 Figure 15 Fixed accounts with role membership privilege management . 73 Figure 16 Fixed accounts with individual account privilege management . 74 Figure 17 IPMI service processor with role management 75 F

49、igure 18 Credential Management Profile: Class diagram 87 Figure 19 Profile registration (Specialized profile for Certificate Management profile) Figure 20 Certificate Management profile: Class diagram . 103 Figure 21 Profile registration (Certificate Management profile implementation) 126 Figure 22 Simple certificate management . 127 Figure 23 Key store 128 Figure 24 Importing public/private key pair 129 Figure 25 Creating CSR and self-signed certificate . 130 Figure 26

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1