Home · About · A-Z Index · Search · Contacts · Press · Register · Login
    


Objective of Meeting
Summary
Outputs
Next Steps
Links

Sponsoring Forum(s):

Directory Interoperability

Messaging

Mobile Management

Security


Meeting Report

Joint Meeting
Access Control Business Scenario

Cannes, France - Tuesday, October 15 2002

Objective of Meeting

This joint meeting with members of the Security Forum, Directory Interoperability Forum, Messaging Forum, and Mobile Management Forum, was held to review and develop a draft Access Control business scenario, based on inputs gathered at the previous meeting (Boston, July 2002).

Summary

Attendees

The meeting was attended by 24 members of the Security Forum, DIF, Messaging Forum and MMF.

Discussion

The discussion time for this meeting was reduced because the preceeding Identity Management meeting involved the same members and represented much high-value presentations and discussion, and Ian Dobson advised hris Harding that this Access Control meeting would require significantly kless time than had originally been allocated.

Ian explained that despite good intentions, he had been unable to generate an initial draft of the proposed Access Control business scenario. There were two main reasons for this.

One is that several important questions in the requirements-gathering workshop in Boston were not answered, and we need those answers in order to construct a representative view, particularly of the technical environment and the business and technical processes involved. The key original questions awaiting answers are:

  • How would you enhance the high level model?
  • What relationships do you see between elements in the model?
  • What are the technology actors and their roles?
    Web servers, directories, databases, …
  • What key processes are relevant:
    • To mission/business?
    • To consumer?
    • To provider

The other main reason is that in creating this Access Control business scenario, it became evident that there are major similarities to the business environment and apparent technical environment of the Identity Management business scenario. So much seemed to be in common that we need to ask:

  • How should we relate our Access Control business scenario to the Identity Management business scenario?
  • What dependencies on identity management (authentication, authorization, etc.) should we declare?

Feedback from the members present was that this degree of commonality between Identity Management and Access Control should not be the case. Skip Slone drew a diagram showing how he would expect the business environment to have Identity Management on one side, with authentication providing credentials to an authorization mechanism that provided access control for a Permissions Management function on the other side. Eliot suggested an enhanced view that involves a Privilege Service in each domain where you wish to access Protected Resources, access control to the Protected Resource being decided by the applicable Policy defined for that Resource.

In further discussion, it was agreed that we should revisit the business requirements in the Identity Management business scenario, to validate them as real business requirements and not technical ones, and to compare them with those for the Access Control business scenario. Also, members confirmed that would expect both to relate at the business requirements level such that Identity Management passes authorizations to a Permissions Management function, a part of which is Access Control.

It was also suggested that the Executive on the Move business scenario has some contribution to make here, so we should include that in our review.

Outputs

Agreement that we want to continue with development of an Access Control business scenario, and that we should expect the real business requirements that emerge to be concerned with Permissions Management, this being complementary to those brought out by the Identity Management business scenario, and linked by authentication and authorization mechanisms. Two non-contradictory business environment models were suggested.

Next Steps

Ian will issue a call to all attendees to the Access Control joint meeting in Cannes to provide their answers to the unanswered questions posed in the requirements-gathering workshop at the Boston (July 2002) meeting, and in addition to list their top business requirements for an Access Control system.

Ian will review the Identity Management business scenario and Access Control business scenario material and enlist the help of Chris Harding and others to draw out the real business requirements for the user in generating the draft Access Control business scenario.

Links

The interactive Web page at www.opengroup.org/projects/idm/ includes access to the Identity Management business scenario

The interactive Web page at www.opengroup.org/projects/access/ includes access to the work on Access Control 

The interactive Web page at www.opengroup.org/mobile/ includes access to the Executive on the Move business scenario, to members only (Log in required, then look in the Documents section).


Home · Contacts · Legal · Copyright · Members · News
© The Open Group 1995-2012  Updated on Wednesday, 23 October 2002