25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The DCE security service ensures secure communications <strong>and</strong> controlled<br />

access to resources in this distributed environment. It is based on the<br />

Massachusetts Institute of Technology's Project Athena, which produced<br />

Kerberos. Kerberos is an authentication service that validates a user or service.<br />

The current DCE security service (DCE 1.2.2) is based on Kerberos Version 5.<br />

Because the DCE security service must be able to validate users <strong>and</strong> services, it<br />

must also have a database to hold this information. This is indeed the case. The<br />

DCE security service maintains a database of principals, accounts, groups,<br />

organizations, policies, properties, <strong>and</strong> attributes. This database is called the<br />

registry. Figure 13-9 shows a pictorial representation of the registry tree. The<br />

registry is actually part of the cell directory namespace, although it is stored on a<br />

separate server.<br />

Figure 13-9 DCE: Registry directory structure<br />

The DCE security service consists of several components:<br />

...<br />

sec<br />

organization groups policy replist xattrschema accounts<br />

MYGROUP1 MYGROUPn<br />

USER1<br />

Authentication service H<strong>and</strong>les the process of verifying that principals are<br />

correctly identified. This also contains a ticket<br />

granting service, which allows the engagement of<br />

secure communications.<br />

Privilege service Supplies a user's privilege attributes to enable<br />

them to be forwarded to DCE servers.<br />

Registry service Maintains the registry database, which contains<br />

accounts, groups, principals, organizations, <strong>and</strong><br />

policies.<br />

USERn<br />

Access control list facility Provides a mechanism to match a principal's<br />

access request against the access controls for the<br />

resource.<br />

Chapter 13. Remote execution <strong>and</strong> distributed computing 501<br />

...

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!