ANSI INCITS359-2012 Information Technology - Role Based Access Control《信息技术.角色访问控制》.pdf

上传人:confusegate185 文档编号:436727 上传时间:2018-11-14 格式:PDF 页数:61 大小:593.73KB
下载 相关 举报
ANSI INCITS359-2012 Information Technology - Role Based Access Control《信息技术.角色访问控制》.pdf_第1页
第1页 / 共61页
ANSI INCITS359-2012 Information Technology - Role Based Access Control《信息技术.角色访问控制》.pdf_第2页
第2页 / 共61页
ANSI INCITS359-2012 Information Technology - Role Based Access Control《信息技术.角色访问控制》.pdf_第3页
第3页 / 共61页
ANSI INCITS359-2012 Information Technology - Role Based Access Control《信息技术.角色访问控制》.pdf_第4页
第4页 / 共61页
ANSI INCITS359-2012 Information Technology - Role Based Access Control《信息技术.角色访问控制》.pdf_第5页
第5页 / 共61页
亲,该文档总共61页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、American National StandardDeveloped byfor Information Technology Role Based Access ControlINCITS 359-2012INCITS 359-2012Copyright American National Standards Institute Provided by IHS under license with ANSI Not for ResaleNo reproduction or networking permitted without license from IHS-,-,-Copyright

2、 American National Standards Institute Provided by IHS under license with ANSI Not for ResaleNo reproduction or networking permitted without license from IHS-,-,-INCITS 359-2012Revision ofINCITS 359-2004(R2009)American National Standardfor Information Technology Role Based Access ControlSecretariatI

3、nformation Technology Industry CouncilApproved May 29, 2012 American National Standards Institute, Inc.Copyright American National Standards Institute Provided by IHS under license with ANSI Not for ResaleNo reproduction or networking permitted without license from IHS-,-,-Approval of an American Na

4、tional Standard requires review by ANSI that therequirements for due process, consensus, and other criteria for approval havebeen met by the standards developer.Consensus is established when, in the judgement of the ANSI Board ofStandards Review, substantial agreement has been reached by directly an

5、dmaterially affected interests. Substantial agreement means much more thana simple majority, but not necessarily unanimity. Consensus requires that allviews and objections be considered, and that a concerted effort be madetowards their resolution.The use of American National Standards is completely

6、voluntary; theirexistence does not in any respect preclude anyone, whether he has approvedthe standards or not, from manufacturing, marketing, purchasing, or usingproducts, processes, or procedures not conforming to the standards.The American National Standards Institute does not develop standards a

7、ndwill in no circumstances give an interpretation of any American NationalStandard. Moreover, no person shall have the right or authority to issue aninterpretation of an American National Standard in the name of the AmericanNational Standards Institute. Requests for interpretations should beaddresse

8、d to the secretariat or sponsor whose name appears on the titlepage of this standard.CAUTION NOTICE: This American National Standard may be revised orwithdrawn at any time. The procedures of the American National StandardsInstitute require that action be taken periodically to reaffirm, revise, orwit

9、hdraw this standard. Purchasers of American National Standards mayreceive current information on all standards by calling or writing the AmericanNational Standards Institute.American National StandardPublished byAmerican National Standards Institute, Inc.25 West 43rd Street, New York, NY 10036Copyri

10、ght 2012 by Information Technology Industry Council (ITI)All rights reserved.No part of this publication may be reproduced in anyform, in an electronic retrieval system or otherwise,without prior written permission of ITI, 1101 K Street NW, Suite 610, Washington, DC 20005. Printed in the United Stat

11、es of AmericaCAUTION: The developers of this standard have requested that holders of patents that may berequired for the implementation of the standard disclose such patents to the publisher. However,neither the developers nor the publisher have undertaken a patent search in order to identifywhich,

12、if any, patents may apply to this standard. As of the date of publication of this standardand following calls for the identification of patents that may be required for the implementation ofthe standard, no such claims have been made. No further patent search is conducted by the de-veloper or publis

13、her in respect to any standard it processes. No representation is made or impliedthat licenses are not required to avoid infringement in the use of this standard.Copyright American National Standards Institute Provided by IHS under license with ANSI Not for ResaleNo reproduction or networking permit

14、ted without license from IHS-,-,-i CONTENTS PAGE FOREWORD . II 1 SCOPE . 1 2 CONFORMANCE 2 3 NORMATIVE REFERENCES. 2 4 TERMS AND DEFINITIONS 2 5 RBAC REFERENCE MODEL 3 5.1 CORE RBAC . 4 5.1.1 Core RBAC specification: . 5 5.2 HIERARCHAL RBAC . 6 5.2.1 General Role Hierarchies: . 7 5.2.2 Limited Role

15、Hierarchies: 8 5.3 CONSTRAINED RBAC . 8 5.4 STATIC SEPARATION OF DUTY RELATIONS . 9 5.4.1 Static Separation of Duty: 10 5.4.2 Static Separation of Duty in the Presence of a Hierarchy: . 10 5.5 DYNAMIC SEPARATION OF DUTY RELATIONS . 10 5.5.1 Dynamic Separation of Duty: . 11 6 POLICY ENHANCEMENTS . 12

16、 7 RBAC SYSTEM AND ADMINISTRATIVE FUNCTIONAL SPECIFICATION 12 7.1 CORE RBAC . 13 7.1.1 Administrative Commands for Core RBAC 13 7.1.2 Supporting System Functions for Core RBAC 16 7.1.3 Review Functions for Core RBAC 17 7.1.4 Advanced Review Functions for Core RBAC 18 7.2 HIERARCHICAL RBAC 19 7.2.1 G

17、eneral Role Hierarchies . 19 7.2.1.1 Administrative Commands for General Role Hierarchies 19 7.2.1.2 Supporting System Functions for General Role Hierarchies 21 7.2.1.3 Review Functions for General Role Hierarchies 22 7.2.1.4 Advanced Review Functions for General Role Hierarchies . 22 7.2.2 Limited

18、Role Hierarchies 23 7.2.2.1 Administrative Commands for Limited Role Hierarchies 23 7.2.2.2 Supporting System Functions for Limited Role Hierarchies 24 7.2.2.3 Review Functions for Limited Role Hierarchies 24 7.2.2.4 Advanced Review Functions for Limited Role Hierarchies . 24 7.3 STATIC SEPARATION O

19、F DUTY (SSD) RELATIONS . 24 7.3.1 Core RBAC . 24 7.3.1.1 Administrative commands for SSD Relations 24 7.3.1.2 Supporting System Functions for SSD . 26 7.3.1.3 Review Functions for SSD . 26 7.3.1.4 Advanced Review Functions for SSD 27 7.3.2 SSD with General Role Hierarchies . 27 7.3.2.1 Administrativ

20、e Commands for SSD with General Role Hierarchies 27 7.3.2.2 Supporting System Functions for SSD with General Role Hierarchies 29 7.3.2.3 Review Functions for SSD with General Role Hierarchies 30 7.3.2.4 Advanced Review Functions for SSD with General Role Hierarchies . 30 Copyright American National

21、Standards Institute Provided by IHS under license with ANSI Not for ResaleNo reproduction or networking permitted without license from IHS-,-,-ii 7.3.3 SSD Relations with Limited Role Hierarchies 30 7.3.3.1 Administrative Commands for SSD with Limited Role Hierarchies 30 7.3.3.2 Supporting System Fu

22、nctions for SSD with Limited Role Hierarchies 30 7.3.3.3 Review Functions for SSD with Limited Role Hierarchies 30 7.3.3.4 Advanced Review Functions for SSD with Limited Role Hierarchies . 30 7.4 DYNAMIC SEPARATION OF DUTIES (DSD) RELATIONS . 31 7.4.1 Core RBAC . 31 7.4.1.1 Administrative Commands f

23、or DSD Relations . 31 7.4.1.2 Supporting System Functions for DSD Relations. 33 7.4.1.3 Review Functions for DSD Relations . 33 7.4.1.4 Advanced Review Functions for DSD Relations 34 7.4.2 DSD Relations with General Role Hierarchies 34 7.4.2.1 Administrative commands for DSD Relations with General R

24、ole Hierarchies 34 7.4.2.2 Supporting System Functions for DSD Relations with General Role Hierarchies . 34 7.4.2.3 Review Functions for DSD Relations with General Role Hierarchies . 35 7.4.2.4 Advanced Review Functions for DSD Relations with General Role Hierarchies 35 7.4.3 DSD Relations with Limi

25、ted Role Hierarchies . 35 7.4.3.1 Administrative Commands for DSD Relations with Limited Role Hierarchies . 35 7.4.3.2 Supporting System Functions for DSD Relations with Limited Role Hierarchies . 36 7.4.3.3 Review Functions for DSD Relations with Limited Role Hierarchies . 36 7.4.3.4 Advanced Revie

26、w Functions for DSD Relations with Limited Role Hierarchies 36 A FUNCTIONAL SPECIFICATION OVERVIEW 37 A.1 FUNCTIONAL SPECIFICATION FOR CORE RBAC . 37 A.1.1 Administrative Functions 37 A.1.2 Supporting System Functions . 38 A.1.3 Review Functions 38 A.2 FUNCTIONAL SPECIFICATION FOR HIERARCHICAL RBAC

27、. 39 A.2.1 Hierarchical Administrative Functions 39 A.2.2 Supporting System Functions . 40 A.2.3 Review Functions 40 A.3 FUNCTIONAL SPECIFICATION FOR SSD RELATION 41 A.3.1 Administrative Functions 41 A.3.2 Supporting System Functions . 41 A.3.3 Review Functions 41 A.4 FUNCTIONAL SPECIFICATION FOR DS

28、D RELATION 42 A.4.1 Administrative Functions 42 A.4.2 Supporting System Functions . 42 A.4.3 Review Functions 43 A.5 FUNCTIONAL SPECIFICATION PACKAGES . 43 B RATIONALE INFORMATIVE ANNEX 45 B.1 CORE RBAC . 45 B.2 HIERARCHICAL RBAC 45 B.3 STATIC SEPARATION OF DUTY RELATIONS . 46 B.4 DYNAMIC SEPARATION

29、 OF DUTY RELATIONS . 47 C COMMAND LIST . 49 Copyright American National Standards Institute Provided by IHS under license with ANSI Not for ResaleNo reproduction or networking permitted without license from IHS-,-,-iiForeword (This foreword is not part of American National Standard INCITS 359-2012.)

30、Development this standard was initiated by the National Institute of Standards andTechnology (NIST) in recognition of a need among government and industry pur-chasers of information technology products for a consistent and uniform definition ofrole based access control (RBAC) features. Vendors were

31、implementing role basedaccess control features in their database management systems, security manage-ment, and network operating system products, without general agreement on the def-inition of RBAC features. This lack of a widely accepted model resulted in uncertaintyand confusion about RBACs utili

32、ty and meaning. This standard seeks to resolve thissituation by using a reference model to define RBAC features and then describingthe functional specifications for those features.This standard contains three annexes. Annexes A and B are informative and are notconsidered part of the standard. Annex

33、C is normative and is considered part of thestandard.Requests for interpretation, suggestions for improvement or addenda, or defect re-ports are welcome. They should be sent to InterNational Committee for InformationTechnology Standards (INCITS), ITI, 1101 K Street, NW, Suite 610, Washington, DC2000

34、5.This standard was processed and approved for submittal to ANSI by INCITS. Com-mittee approval of this standard does not necessarily imply that all committee mem-bers voted for its approval. At the time it approved this standard, INCITS had thefollowing members:Don Wright, ChairJennifer Garner, Sec

35、retaryOrganization Represented Name of RepresentativeAdobe Systems Inc. . Scott Foshee Steve Zilles (Alt.)AIM Global, Inc. Steve HallidayApple Helene WorkmanDavid Singer (Alt.)Distributed Management Task Force John Crandall Jeff Hilland (Alt.)EMC Corporation . Gary Robinson Stephen Diamond (Alt.)Far

36、ance, Inc. Frank Farance Timothy Schoechle (Alt.)GS1 US . Frank SharkeyCharles Biss (Alt.)Hewlett-Packard Company Karen Higginbottom Paul Jeran (Alt.)IBM Corporation Alexander TarpinianRobert Weir (Alt.)Arnaud Le Hors (Alt.)Debra Boland (Alt.)Steve Holbrook (Alt.)Gerald Lane (Alt.)IEEE . Jodie Haasz

37、Terry deCourcelle (Alt.)Bob Labelle (Alt.)Intel Philip Wennblom Grace Wei (Alt.)Stephen Balogh (Alt.)Lexmark International. Don Wright Dwight Lewis (Alt.)Paul Menard (Alt.)Jerry Thrasher (Alt.)Copyright American National Standards Institute Provided by IHS under license with ANSI Not for ResaleNo re

38、production or networking permitted without license from IHS-,-,-iiiOrganization Represented Name of RepresentativeMicrosoft CorporationJim Hughes Dick Brackney (Alt.)John Calhoon (Alt.)National Institute of Standards and (2) manag-ers and procurement officials who seek to acquire computer security p

39、roducts withfeatures that provide access control capabilities according to commonly known andunderstood terminology and functional specifications.Copyright American National Standards Institute Provided by IHS under license with ANSI Not for ResaleNo reproduction or networking permitted without lice

40、nse from IHS-,-,-AMERICAN NATIONAL STANDARD INCITS 359-2012American National Standard for Information Technology Role Based Access Control 1 1 SCOPE This standard consists of two main parts the RBAC Reference Model and the RBAC System and Administrative Functional Specification. The RBAC Reference M

41、odel defines sets of basic RBAC elements (i.e., users, roles, permissions, operations and objects) and relations as types and functions that are included in this standard. The RBAC reference model serves two purposes. First, the reference model defines the scope of RBAC features that are included in

42、 the standard. This identifies the minimum set of features included in all RBAC systems, aspects of role hierarchies, aspects of static constraint relations, and aspects of dynamic constraint relations. Second, the reference model provides a precise and consistent language, in terms of element sets

43、and functions for use in defining the functional specification. The RBAC System and Administrative Functional Specification specifies the features that are required of an RBAC system. These features fall into three categories, administrative operations, administrative reviews, and system level funct

44、ionality. The administrative operations define functions in terms of an administrative interface and an associated set of semantics that provide the capability to create, delete and maintain RBAC elements and relations (e.g., to create and delete user role assignments). The administrative review fea

45、tures define functions in terms of an administrative interface and an associated set of semantics that provide the capability to perform query operations on RBAC elements and relations. System level functionality defines features for the creation of user sessions to include role activation/deactivat

46、ion, the enforcement of constraints on role activation, and for calculation of an access decision. Annex A provides a functional specification overview. Informative Annex B provides a rationale for the major RBAC components defined in this document. A companion to this standard describes the enhance

47、ment of RBAC constraints. The present standard recognizes only constraints that are local to an RBAC environment. These constraints deal only with separation of duty and cardinality. These constraints are evaluated within the local RBAC environment, as opposed to being provided from outside the loca

48、l RBAC environment. The RBAC Policy-Enhanced (RPE) standard RPE also specifies constraints evaluated within the local environment. In addition, external constraints or the results of evaluating external constraints are imported into the environment. These constraints may change in real-time. This st

49、andard and the RPE standard have the evaluation of constraints as part of the access control decision in common. Thus, they are compatible, with the base standard Copyright American National Standards Institute Provided by IHS under license with ANSI Not for ResaleNo reproduction or networking permitted without license from IHS-

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > ANSI

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1