理解Subjects, Principals and Credentials

2024-04-13 14:18

本文主要是介绍理解Subjects, Principals and Credentials,希望对大家解决编程问题提供一定的参考价值,需要的开发者们随着小编来一起学习吧!

摘自:Inside Java 2 Platform Security - 2nd Ed,published by Addison Wesley,2003

8.4.1 Subjects and Principals
Users often depend on computing services to assist them in performing work. Furthermore, services themselves might subsequently interact with other services.

JAAS uses the term subject to refer to a system entity, such as a user or a computing service.
JAAS用术语subject来表示系统实体,比如一个用户或者一个计算服务。

To identify the subjects with which it interacts, a computing service typically relies on names. However, a subject might not have the same name for each service and, in fact, may even have a different name for each individual service.
服务通常以来名字来标识那些和它交互的subject.然而一个subject一般不会用同一个名字面向每个服务,实际上,甚至subject会用各不相同的名字面向每个服务。

The term principal represents a name associated with a subject [71]. Because a subject may have multiple names, potentially one for each service with which it interacts, a subject in JAAS comprises a set of principals.
术语principal表示和一个subject关联的名字。因为一个subject可以有多个名字,以便和不同的服务交互时采用不同的名字,一个subject由一组principal组成。

Once a subject is authenticated, an instance of javax.security.auth.Subject is created to represent that subject and is populated with objects that implement the java.security.Principal interface.
一旦subject通过了认证,系统就会生成一个javax.security.auth.Subject的实例来表示该subject,并且加入一些实现java.security.Principal接口的对象到Subject实例中。

Authentication represents the process by which one system entity verifies the identity of another and must be performed in a secure fashion; otherwise, an intruder may impersonate others to gain access to a system.
认证就是一个系统实体验证另一个实体的身份的过程,并且必须在安全的方式下进行;否则入侵者就会伪装成别的实体进入系统。

Authentication typically involves the subject demonstrating possession of some form of evidence to prove its identity. Such evidence may be information only the subject would be likely to know or have, such as a password or smart card, or that only the subject could produce, such as signed data using a private key.
认证时,通常是一个subject出示其某种证据来证明它的身份。这些证据可以是这个subject知道或者拥有的信息,比如密码或者智能卡。。。

When it attempts to authenticate to a service, a subject typically provides the proof of its identity along with its name. If the authentication attempt succeeds, the service associates a service-specific Principal, using the given name, with the Subject. Applications and services can determine the identity of the Subject simply by referencing the relevant Principal associated with that Subject.
当它试图通过某个服务的认证时,subject通常随它的名字一起提供它身份的证明。如果认证通过了,服务会将一个特属于该服务的Principal和Subject关联,名字和subject请求认证时的名字相同。应用程序和服务可以通过参考Subject关联的Principal来识别Subject的身份。

Reliance on named principals usually derives from the fact that a service implements a conventional access control model of security [69]. This model allows a service to define a set of protected resources and the conditions under which named principals may access those resources.
命名的principals之所以值得信赖,源自服务一般都按惯例实现同一种访问控制安全模型。这个模型允许服务定义一个受保护的资源的集合,以及命名的principal可以访问这些资源的条件。

Both KeyNote [14] and SPKI [34] have focused on the limitations of using conventional names in large distributed systems for access control and note that public keys, instead, provide a more practical and scalable name representation.
JAAS and SPKI do not impose any restrictions on principal names. Localized environments that have limited namespaces or that do not rely on public-key cryptography may define principals that have conventional names.
Large-scale distributed systems may use principals that allow the principal name to be a public key.

8.4.2 Credentials
In addition to Principal information, some services may want to associate other security-related attributes and data with a Subject.
JAAS calls such generic security-related attributes credentials.
除了Principal的信息,有些服务还需要Subjec的其它一些安全相关的属性和数据。JAAS用术语credential表示这些平常的安全有关的属性。

A credential may contain information that could be used to authenticate the subject to additional services.
Some common types of credentials are passwords, Kerberos tickets [87] and public-key certificates.
一个credential可能包含该subject到其它的服务认证的信息。credentail通常是密码,Kerberos tickets以及公钥证书。

Many of these credential forms are used in environments that support single sign-on.

Credentials may also contain data that simply enables the subject to perform certain activities. Cryptographic keys,
for example, represent credentials that enable the subject to sign or encrypt data. In JAAS, credentials may be any type
 of object. Therefore, existing credential implementations, such as java.security.cert.Certificate, can be easily
 incorporated into JAAS. Third-party credential implementations may also be plugged in to the JAAS framework.
credentials也可以包含一些数据,以便subject可以执行一些特定点活动。比如包含Cryptographic keys, subject就可以签名或者加密数据。
在JAAS框架中,credential可以使任何类型的对象。

Although Kerberos tickets and cryptographic keys exemplify common types of credentials,
credentials can represent a wider range of security-related data.

Applications running on behalf of subjects must coordinate with the services on which they depend so as to
agree on the kinds of credentials that are needed and recognized during their interactions.
Thus, some credentials might be standard or well recognized, whereas others might be application and service specific.

In addition, credential implementations do not necessarily have to contain the security-related data;
they might simply reference that data. This occurs when the data must physically reside on a separate server or hardware device,
such as private keys on a smart card.

A subject must successfully authenticate to a service to obtain credentials. On successful authentication,
the service creates the appropriate credential object and associates it with the Subject.
Once a Subject has been populated with credentials, applications considered to be running on behalf of the subject may,
with the proper permissions, then access and use those credentials.
一个subject必须成功通过服务的认证,才能拿到credentials.

JAAS does not impose any restrictions about credential delegation to third parties.
Rather, JAAS either allows each credential implementation to specify its own delegation protocol, as Kerberos does,
or leaves delegation decisions up to the applications.

JAAS divides each Subject's credentials into two sets. One set contains the subject's public credentials,
such as public-key certificates. The other set stores the subject's private credentials, such as private keys,
Kerberos tickets, encryption keys, passwords, and so on.

To access a Subject's public credentials, no permissions are required. However,
access to a Subject's private credential set requires the caller to have been granted a PrivateCredentialPermission for the corresponding credential class.

这篇关于理解Subjects, Principals and Credentials的文章就介绍到这儿,希望我们推荐的文章对编程师们有所帮助!



http://www.chinasem.cn/article/900369

相关文章

深入理解Apache Kafka(分布式流处理平台)

《深入理解ApacheKafka(分布式流处理平台)》ApacheKafka作为现代分布式系统中的核心中间件,为构建高吞吐量、低延迟的数据管道提供了强大支持,本文将深入探讨Kafka的核心概念、架构... 目录引言一、Apache Kafka概述1.1 什么是Kafka?1.2 Kafka的核心概念二、Ka

深入理解Apache Airflow 调度器(最新推荐)

《深入理解ApacheAirflow调度器(最新推荐)》ApacheAirflow调度器是数据管道管理系统的关键组件,负责编排dag中任务的执行,通过理解调度器的角色和工作方式,正确配置调度器,并... 目录什么是Airflow 调度器?Airflow 调度器工作机制配置Airflow调度器调优及优化建议最

一文带你理解Python中import机制与importlib的妙用

《一文带你理解Python中import机制与importlib的妙用》在Python编程的世界里,import语句是开发者最常用的工具之一,它就像一把钥匙,打开了通往各种功能和库的大门,下面就跟随小... 目录一、python import机制概述1.1 import语句的基本用法1.2 模块缓存机制1.

深入理解C语言的void*

《深入理解C语言的void*》本文主要介绍了C语言的void*,包括它的任意性、编译器对void*的类型检查以及需要显式类型转换的规则,具有一定的参考价值,感兴趣的可以了解一下... 目录一、void* 的类型任意性二、编译器对 void* 的类型检查三、需要显式类型转换占用的字节四、总结一、void* 的

深入理解Redis大key的危害及解决方案

《深入理解Redis大key的危害及解决方案》本文主要介绍了深入理解Redis大key的危害及解决方案,文中通过示例代码介绍的非常详细,对大家的学习或者工作具有一定的参考学习价值,需要的朋友们下面随着... 目录一、背景二、什么是大key三、大key评价标准四、大key 产生的原因与场景五、大key影响与危

深入理解C++ 空类大小

《深入理解C++空类大小》本文主要介绍了C++空类大小,规定空类大小为1字节,主要是为了保证对象的唯一性和可区分性,满足数组元素地址连续的要求,下面就来了解一下... 目录1. 保证对象的唯一性和可区分性2. 满足数组元素地址连续的要求3. 与C++的对象模型和内存管理机制相适配查看类对象内存在C++中,规

认识、理解、分类——acm之搜索

普通搜索方法有两种:1、广度优先搜索;2、深度优先搜索; 更多搜索方法: 3、双向广度优先搜索; 4、启发式搜索(包括A*算法等); 搜索通常会用到的知识点:状态压缩(位压缩,利用hash思想压缩)。

【生成模型系列(初级)】嵌入(Embedding)方程——自然语言处理的数学灵魂【通俗理解】

【通俗理解】嵌入(Embedding)方程——自然语言处理的数学灵魂 关键词提炼 #嵌入方程 #自然语言处理 #词向量 #机器学习 #神经网络 #向量空间模型 #Siri #Google翻译 #AlexNet 第一节:嵌入方程的类比与核心概念【尽可能通俗】 嵌入方程可以被看作是自然语言处理中的“翻译机”,它将文本中的单词或短语转换成计算机能够理解的数学形式,即向量。 正如翻译机将一种语言

【C++高阶】C++类型转换全攻略:深入理解并高效应用

📝个人主页🌹:Eternity._ ⏩收录专栏⏪:C++ “ 登神长阶 ” 🤡往期回顾🤡:C++ 智能指针 🌹🌹期待您的关注 🌹🌹 ❀C++的类型转换 📒1. C语言中的类型转换📚2. C++强制类型转换⛰️static_cast🌞reinterpret_cast⭐const_cast🍁dynamic_cast 📜3. C++强制类型转换的原因📝

深入理解RxJava:响应式编程的现代方式

在当今的软件开发世界中,异步编程和事件驱动的架构变得越来越重要。RxJava,作为响应式编程(Reactive Programming)的一个流行库,为Java和Android开发者提供了一种强大的方式来处理异步任务和事件流。本文将深入探讨RxJava的核心概念、优势以及如何在实际项目中应用它。 文章目录 💯 什么是RxJava?💯 响应式编程的优势💯 RxJava的核心概念