summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc2820.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc2820.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc2820.txt')
-rw-r--r--doc/rfc/rfc2820.txt507
1 files changed, 507 insertions, 0 deletions
diff --git a/doc/rfc/rfc2820.txt b/doc/rfc/rfc2820.txt
new file mode 100644
index 0000000..0a519f7
--- /dev/null
+++ b/doc/rfc/rfc2820.txt
@@ -0,0 +1,507 @@
+
+
+
+
+
+
+Network Working Group E. Stokes
+Request for Comments: 2820 D. Byrne
+Category: Informational IBM
+ B. Blakley
+ Dascom
+ P. Behera
+ Netscape
+ May 2000
+
+
+ Access Control Requirements for LDAP
+
+Status of this Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (2000). All Rights Reserved.
+
+Abstract
+
+ This document describes the fundamental requirements of an access
+ control list (ACL) model for the Lightweight Directory Application
+ Protocol (LDAP) directory service. It is intended to be a gathering
+ place for access control requirements needed to provide authorized
+ access to and interoperability between directories.
+
+ The keywords "MUST", "SHOULD", and "MAY" used in this document are to
+ be interpreted as described in [bradner97].
+
+1. Introduction
+
+ The ability to securely access (replicate and distribute) directory
+ information throughout the network is necessary for successful
+ deployment. LDAP's acceptance as an access protocol for directory
+ information is driving the need to provide an access control model
+ definition for LDAP directory content among servers within an
+ enterprise and the Internet. Currently LDAP does not define an
+ access control model, but is needed to ensure consistent secure
+ access across heterogeneous LDAP implementations. The requirements
+ for access control are critical to the successful deployment and
+ acceptance of LDAP in the market place.
+
+ The RFC 2119 terminology is used in this document.
+
+
+
+
+Stokes, et al. Informational [Page 1]
+
+RFC 2820 Access Control Requirements for LDAP May 2000
+
+
+2. Objectives
+
+ The major objective is to provide a simple, but secure, highly
+ efficient access control model for LDAP while also providing the
+ appropriate flexibility to meet the needs of both the Internet and
+ enterprise environments and policies.
+
+ This generally leads to several general requirements that are
+ discussed below.
+
+3. Requirements
+
+ This section is divided into several areas of requirements: general,
+ semantics/policy, usability, and nested groups (an unresolved issue).
+ The requirements are not in any priority order. Examples and
+ explanatory text is provided where deemed necessary. Usability is
+ perhaps the one set of requirements that is generally overlooked, but
+ must be addressed to provide a secure system. Usability is a security
+ issue, not just a nice design goal and requirement. If it is
+ impossible to set and manage a policy for a secure situation that a
+ human can understand, then what was set up will probably be non-
+ secure. We all need to think of usability as a functional security
+ requirement.
+
+3.1 General
+
+ G1. Model SHOULD be general enough to support extensibility to add
+ desirable features in the future.
+
+ G2. When in doubt, safer is better, especially when establishing
+ defaults.
+
+ G3. ACL administration SHOULD be part of the LDAP protocol. Access
+ control information MUST be an LDAP attribute.
+
+ G4. Object reuse protection SHOULD be provided and MUST NOT inhibit
+ implementation of object reuse. The directory SHOULD support policy
+ controlling the re-creation of deleted DNs, particularly in cases
+ where they are re-created for the purpose of assigning them to a
+ subject other than the owner of the deleted DN.
+
+3.2 Semantics / Policy
+
+ S1. Omitted as redundant; see U8.
+
+ S2. More specific policies must override less specific ones (e.g.
+ individual user entry in ACL SHOULD take precedence over group entry)
+ for the evaluation of an ACL.
+
+
+
+Stokes, et al. Informational [Page 2]
+
+RFC 2820 Access Control Requirements for LDAP May 2000
+
+
+ S3. Multiple policies of equal specificity SHOULD be combined in
+ some easily-understood way (e.g. union or intersection). This is
+ best understood by example. Suppose user A belongs to 3 groups and
+ those 3 groups are listed on the ACL. Also suppose that the
+ permissions for each of those groups are not identical. Each group is
+ of equal specificity (e.g. each group is listed on the ACL) and the
+ policy for granting user A access (given the example) SHOULD be
+ combined in some easily understood way, such as by intersection or
+ union. For example, an intersection policy here may yield a more
+ limited access for user A than a union policy.
+
+ S4. Newly created directory entries SHOULD be subject to a secure
+ default policy.
+
+ S5. Access policy SHOULD NOT be expressed in terms of attributes
+ which the directory administrator or his organization cannot
+ administer (e.g. groups whose membership is administered by another
+ organization).
+
+ S6. Access policy SHOULD NOT be expressed in terms of attributes
+ which are easily forged (e.g. IP addresses). There may be valid
+ reasons for enabling access based on attributes that are easily
+ forged and the behavior/implications of doing that should be
+ documented.
+
+ S7. Humans (including administrators) SHOULD NOT be required to
+ manage access policy on the basis of attributes which are not
+ "human-readable" (e.g. IP addresses).
+
+ S8. It MUST be possible to deny a subject the right to invoke a
+ directory operation. The system SHOULD NOT require a specific
+ implementation of denial (e.g. explicit denial, implicit denial).
+
+ S9. The system MUST be able (semantically) to support either
+ default-grant or default-deny semantics (not simultaneously).
+
+ S10. The system MUST be able to support either union semantics or
+ intersection semantics for aggregate subjects (not simultaneously).
+
+ S11. Absence of policy SHOULD be interpretable as grant or deny.
+ Deny takes precedence over grant among entries of equal specificity.
+
+ S12. ACL policy resolution MUST NOT depend on the order of entries
+ in the ACL.
+
+ S13. Rights management MUST have no side effects. Granting a
+ subject one right to an object MUST NOT implicitly grant the same or
+ any other subject a different right to the same object. Granting a
+
+
+
+Stokes, et al. Informational [Page 3]
+
+RFC 2820 Access Control Requirements for LDAP May 2000
+
+
+ privilege attribute to one subject MUST NOT implicitly grant the same
+ privilege attribute to any other subject. Granting a privilege
+ attribute to one subject MUST NOT implicitly grant a different
+ privilege attribute to the same or any other subject. Definition: An
+ ACL's "scope" is defined as the set of directory objects governed by
+ the policy it defines; this set of objects is a sub-tree of the
+ directory. Changing the policy asserted by an ACL (by changing one
+ or more of its entries) MUST NOT implicitly change the policy
+ governed by an ACL in a different scope.
+
+ S14. It SHOULD be possible to apply a single policy to multiple
+ directory entries, even if those entries are in different subtrees.
+ Applying a single policy to multiple directory entries SHOULD NOT
+ require creation and storage of multiple copies of the policy data.
+ The system SHOULD NOT require a specific implementation (e.g. nested
+ groups, named ACLs) of support for policy sharing.
+
+3.3 Usability (Manageability)
+
+ U1. When in doubt, simpler is better, both at the interface and in
+ the implementation.
+
+ U2. Subjects MUST be drawn from the "natural" LDAP namespace; they
+ should be DNs.
+
+ U3. It SHOULD NOT be possible via ACL administration to lock all
+ users, including all administrators, out of the directory.
+
+ U4. Administrators SHOULD NOT be required to evaluate arbitrary
+ Boolean predicates in order to create or understand policy.
+
+ U5. Administrators SHOULD be able to administer access to
+ directories and their attributes based on their sensitivity, without
+ having to understand the semantics of individual schema elements and
+ their attributes (see U9).
+
+ U6. Management of access to resources in an entire subtree SHOULD
+ require only one ACL (at the subtree root). Note that this makes
+ access control based explicitly on attribute types very hard, unless
+ you constrain the types of entries in subtrees. For example, another
+ attribute is added to an entry. That attribute may fall outside the
+ grouping covered by the ACL and hence require additional
+ administration where the desired affect is indeed a different ACL.
+ Access control information specified in one administrative area MUST
+ NOT have jurisdiction in another area. You SHOULD NOT be able to
+ control access to the aliased entry in the alias. You SHOULD be able
+ to control access to the alias name.
+
+
+
+
+Stokes, et al. Informational [Page 4]
+
+RFC 2820 Access Control Requirements for LDAP May 2000
+
+
+ U7. Override of subtree policy MUST be supported on a per-
+ directory-entry basis.
+
+ U8. Control of access to individual directory entry attributes (not
+ just the whole directory entry) MUST be supported.
+
+ U9. Administrator MUST be able to coarsen access policy granularity
+ by grouping attributes with similar access sensitivities.
+
+ U10. Control of access on a per-user granularity MUST be supported.
+
+ U11. Administrator MUST be able to aggregate users (for example, by
+ assigning them to groups or roles) to simplify administration.
+
+ U12. It MUST be possible to review "effective access" of any user,
+ group, or role to any entry's attributes. This aids the administrator
+ in setting the correct policy.
+
+ U13. A single administrator SHOULD be able to define policy for the
+ entire directory tree. An administrator MUST be able to delegate
+ policy administration for specific subtrees to other users. This
+ allows for the partitioning of the entire directory tree for policy
+ administration, but still allows a single policy to be defined for
+ the entire tree independent of partitioning. (Partition in this
+ context means scope of administration). An administrator MUST be able
+ to create new partitions at any point in the directory tree, and MUST
+ be able to merge a superior and subordinate partition. An
+ administrator MUST be able to configure whether delegated access
+ control information from superior partitions is to be accepted or
+ not.
+
+ U14. It MUST be possible to authorize users to traverse directory
+ structure even if they are not authorized to examine or modify some
+ traversed entries; it MUST also be possible to prohibit this. The
+ tree structure MUST be able to be protected from view if so desired
+ by the administrator.
+
+ U15. It MUST be possible to create publicly readable entries, which
+ may be read even by unauthenticated clients.
+
+ U16. The model for combining multiple access control list entries
+ referring to a single individual MUST be easy to understand.
+
+ U17. Administrator MUST be able to determine where inherited policy
+ information comes from, that is, where ACLs are located and which
+ ACLs were applied. Where inheritance of ACLs is applied, it must be
+ able to be shown how/where that new ACL is derived from.
+
+
+
+
+Stokes, et al. Informational [Page 5]
+
+RFC 2820 Access Control Requirements for LDAP May 2000
+
+
+ U18. It SHOULD be possible for the administrator to configure the
+ access control system to permit users to grant additional access
+ control rights for entries which they create.
+
+4. Security Considerations
+
+ Access control is a security consideration. This documents addresses
+ the requirements.
+
+5. Glossary
+
+ This glossary is intended to aid the novice not versed in depth about
+ access control. It contains a list of terms and their definitions
+ that are commonly used in discussing access control [emca].
+
+ Access control - The prevention of use of a resource by unidentified
+ and/or unauthorized entities in any other that an authorized manner.
+
+ Access control list - A set of control attributes. It is a list,
+ associated with a security object or a group of security objects.
+ The list contains the names of security subjects and the type of
+ access that may be granted.
+
+ Access control policy - A set of rules, part of a security policy, by
+ which human users, or their representatives, are authenticated and by
+ which access by these users to applications and other services and
+ security objects is granted or denied.
+
+ Access context - The context, in terms of such variables as location,
+ time of day, level of security of the underlying associations, etc.,
+ in which an access to a security object is made.
+
+ Authorization - The granting of access to a security object.
+
+ Authorization policy - A set of rules, part of an access control
+ policy, by which access by security subjects to security objects is
+ granted or denied. An authorization policy may be defined in terms
+ of access control lists, capabilities, or attributes assigned to
+ security subjects, security objects, or both.
+
+ Control attributes - Attributes, associated with a security object
+ that, when matched against the privilege attributes of a security
+ subject, are used to grant or deny access to the security object. An
+ access control list or list of rights or time of day range are
+ examples of control attributes.
+
+ Credentials - Data that serve to establish the claimed identity of a
+ security subject relative to a given security domain.
+
+
+
+Stokes, et al. Informational [Page 6]
+
+RFC 2820 Access Control Requirements for LDAP May 2000
+
+
+ Privilege attributes - Attributes, associated with a security subject
+ that, when matched against control attributes of a security object,
+ are used to grant or deny access to that subject. Group and role
+ memberships are examples of privilege attributes.
+
+ Security attributes - A general term covering both privilege
+ attributes and control attributes. The use of security attributes is
+ defined by a security policy.
+
+ Security object - An entity in a passive role to which a security
+ policy applies.
+
+ Security policy - A general term covering both access control
+ policies and authorization policies.
+
+ Security subject - An entity in an active role to which a security
+ policy applies.
+
+6. References
+
+ [ldap] Kille, S., Howes, T. and M. Wahl, "Lightweight Directory
+ Access Protocol (v3)", RFC 2251, August 1997.
+
+ [ecma] ECMA, "Security in Open Systems: A Security Framework"
+ ECMA TR/46, July 1988.
+
+ [bradner97] Bradner, S., "Key Words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Stokes, et al. Informational [Page 7]
+
+RFC 2820 Access Control Requirements for LDAP May 2000
+
+
+7. Authors' Addresses
+
+ Bob Blakley
+ Dascom
+ 5515 Balcones Drive
+ Austin, TX 78731
+ USA
+
+ Phone: +1 512 458 4037 ext 5012
+ Fax: +1 512 458 2377
+ EMail: blakley@dascom.com
+
+
+ Ellen Stokes
+ IBM
+ 11400 Burnet Rd
+ Austin, TX 78758
+ USA
+
+ Phone: +1 512 838 3725
+ Fax: +1 512 838 0156
+ EMail: stokes@austin.ibm.com
+
+
+ Debbie Byrne
+ IBM
+ 11400 Burnet Rd
+ Austin, TX 78758
+ USA
+
+ Phone: +1 512 838 1930
+ Fax: +1 512 838 8597
+ EMail: djbyrne@us.ibm.com
+
+
+ Prasanta Behera
+ Netscape
+ 501 Ellis Street
+ Mountain View, CA 94043
+ USA
+
+ Phone: +1 650 937 4948
+ Fax: +1 650 528-4164
+ EMail: prasanta@netscape.com
+
+
+
+
+
+
+
+Stokes, et al. Informational [Page 8]
+
+RFC 2820 Access Control Requirements for LDAP May 2000
+
+
+8. Full Copyright Statement
+
+ Copyright (C) The Internet Society (2000). All Rights Reserved.
+
+ This document and translations of it may be copied and furnished to
+ others, and derivative works that comment on or otherwise explain it
+ or assist in its implementation may be prepared, copied, published
+ and distributed, in whole or in part, without restriction of any
+ kind, provided that the above copyright notice and this paragraph are
+ included on all such copies and derivative works. However, this
+ document itself may not be modified in any way, such as by removing
+ the copyright notice or references to the Internet Society or other
+ Internet organizations, except as needed for the purpose of
+ developing Internet standards in which case the procedures for
+ copyrights defined in the Internet Standards process must be
+ followed, or as required to translate it into languages other than
+ English.
+
+ The limited permissions granted above are perpetual and will not be
+ revoked by the Internet Society or its successors or assigns.
+
+ This document and the information contained herein is provided on an
+ "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
+ TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
+ BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
+ HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
+ MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is currently provided by the
+ Internet Society.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Stokes, et al. Informational [Page 9]
+