Abstract
In some trusted environments, such as an organization’s intranet, local web services may be assumed to be trustworthy. This property can be exploited to simplify authentication and authorization protocols between resource providers and consumers, lowering the threshold for developing services and clients. Existing security solutions for RESTful services, in contrast, support untrusted services, a complexity-increasing capability that is not needed on an intranet with only trusted services.
We propose a central security service with a lean API that handles both authentication and authorization for trusted RESTful services. A user trades credentials for a token that facilitates access to services. The services may query the security service for token authenticity and roles granted to a user. The system provides fine-grained access control at the level of resources, following the role-based access control (RBAC) model. Resources are identified by their URLs, making the authorization system generic. The mapping of roles to users resides with the central security service and depends on the resource to be accessed. The mapping of permissions to roles is implemented individually by the services. We rely on secure channels and the trusted intermediaries characteristic for intranets to simplify the protocols involved and to make the security features easy to use, cutting the number of required API calls in half.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
MIT: Kerberos: The network authentication protocol, http://web.mit.edu/kerberos/
Schemers, R., Allbery, R.: WebAuth technical specification, http://webauth.stanford.edu/protocol.html
Mazurek, D.: CAS protocol (May 2005), http://www.jasig.org/cas/protocol
Samar, V.: Single sign-on using cookies for web applications. In: Proceedings of the 8th Intl. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 1999), Stanford, CA, USA, pp. 158–163. IEEE (1999)
OASIS: SAML specifications, http://saml.xml.org/saml-specifications
OASIS: OASIS eXtensible Access Control Markup Language (XACML) TC, http://www.oasis-open.org/committees/xacml/
Mirza, Q.K.A.: Restful implementation of authorization mechanisms. In: Proceedings of the International Conference on Technology and Business Management (ICTBM 2011), Dubai, UAE, pp. 1001–1010. INFOMS (March 2011)
Gutzmann, K.: Access control and session management in the HTTP environment. IEEE Internet Computing 5, 26–35 (2001)
Graf, S., Zholudev, V., Lewandowski, L., Waldvogel, M.: Hecate, managing authorization with RESTful XML. In: Proceedings of the 2nd International Workshop on RESTful Design (WS-REST 2011), Hyderabad, India, pp. 51–58. ACM (March 2011)
Recordon, D., Reed, D.: OpenID 2.0: A platform for user-centric identity management. In: Proceedings of the 2nd Workshop on Digital Identity Management (DIM 2006), Fairfax, Virginia, USA, pp. 11–16. ACM (November 2006)
Hammer-Lahav, E.: The OAuth 1.0 protocol. RFC 5849, IETF (April 2010)
Jazz Community: Jazz, https://jazz.net/
ANSI: American national standard for information technology – Role based access control. ANSI INCITS 359-2004, ANSI (February 2004)
Zukowski, M.: RubyCAS-Server, http://code.google.com/p/rubycas-server/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Brachmann, E., Dittmann, G., Schubert, KD. (2012). Simplified Authentication and Authorization for RESTful Services in Trusted Environments. In: De Paoli, F., Pimentel, E., Zavattaro, G. (eds) Service-Oriented and Cloud Computing. ESOCC 2012. Lecture Notes in Computer Science, vol 7592. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33427-6_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-33427-6_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33426-9
Online ISBN: 978-3-642-33427-6
eBook Packages: Computer ScienceComputer Science (R0)