Security Concepts: Difference between revisions

From NovaOrdis Knowledge Base
Jump to navigation Jump to search
Line 37: Line 37:
=Security Protocols=
=Security Protocols=


* [[WS-*]]
==Authentication Protocols==
 
* [[SAML]]
* [[SAML]]
* [[OpenID Connect]]
* [[Kerberos]]
==Authorization Delegation Protocols==
* [[OAuth 2.0]]
* [[OAuth 2.0]]
* [[Kerberos]]
 
==Others==
 
* [[WS-*]]

Revision as of 19:28, 12 November 2017

Public Key Cryptography

Public Key Cryptography, also known as asymmetrical cryptography

Authentication

Authentication is the process of identifying a subject and verifying the authenticity of the identification information.

The most common authentication mechanism is username/password. Other mechanisms are available: public key, shared key, smart cards, etc.

In the context of JEE declarative security, the result of a successful authentication is called a principal.

Related subjects: Basic and Digest HTTP Authentication.

Authorization

Authorization is the mechanism for granting or denying access to a resource based on identity.

In JEE, this is usually implemented by matching a principal with a set of actions they are or are not allowed to perform. This mapping is referred as a role.

Encryption

TODO https://home.feodorov.com:9443/wiki/Wiki.jsp?page=CryptographicAlgorithms#EncryptionAndDecryption

SSL/TLS

TLS

SSO

TODO https://home.feodorov.com:9443/wiki/Wiki.jsp?page=SingleSign-On

LDAP

TODO https://home.feodorov.com:9443/wiki/Wiki.jsp?page=LDAP

Security Protocols

Authentication Protocols

Authorization Delegation Protocols

Others