22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Identity <strong>and</strong> Access Services in NATO<br />

Federation Scenarios<br />

Robert Malewicz, Rui Fiske, Graeme Lunt<br />

Core Enterprise Services, NATO C3 Agency, The Hague, The Netherl<strong>and</strong>s,<br />

robert.malewicz@ncia.nato.int<br />

Abstract: This paper describes an approach for the effective implementation of a st<strong>and</strong>ards-based<br />

solution for authentication <strong>and</strong> authorization services across user realms in NATO.<br />

Keywords: component: identity <strong>and</strong> access management, federation, SAML, XACML<br />

I. Introduction<br />

A. Background<br />

Identity <strong>and</strong> Access Management (I&AM) has gained a significant attention<br />

in NATO recently. NATO engages in missions that involve different types of partners<br />

ranging from NATO <strong>and</strong> Non-NATO nations through to international organizations<br />

<strong>and</strong> industry.<br />

The diversity of data sharing scenarios makes the boundaries of user <strong>and</strong> asset<br />

governance realms less obvious. Therefore, much more stress is put nowadays on<br />

trusted mechanisms to control access authorization, going beyond “local” domains,<br />

<strong>and</strong> even beyond the enterprise. The simultaneous application, in a balanced way,<br />

of two contradictory (by nature) concepts is required on a large scale in a multisecurity<br />

classification information processing environment, i.e. the Need-to-Share<br />

operational requirement <strong>and</strong> the Need-to-Know security principle.<br />

The problem itself is not new in classified computing environments. The Biba<br />

Model (from 70s), the Bell-LaPadula Model (from 90s) are just two examples of existing<br />

access control enforcement mechanisms. However, the scale of the required<br />

integration in the NATO scenario is what poses a new challenge for communities<br />

of <strong>Information</strong> Assurance (IA), <strong>Information</strong> Services (IS) <strong>and</strong> <strong>Information</strong> <strong>and</strong><br />

Knowledge Management (IKM).<br />

In this context, a NATO-wide I&AM framework, coherent across both network<br />

<strong>and</strong> organizational boundaries, becomes a key enabler for extensive information<br />

sharing in different NATO federation scenarios.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!