What Is the DCE Security Service?
The DCE Security Service comprises several parts, including the authentication service, the privilege service, the registry service, the ACL facility, the login facility, and the audit
service.
· Authentication service
The authentication service enables two processes on different machines to be certain of one another's identity, or authenticated. On a timesharing system, this functionality is provided
in part by the operating system kernel. However, since a local host's operating system cannot necessarily be trusted in a distributed system, an authentication service is necessary in a distributed
computing environment.
· Privilege service
Once a server has verified the identity of the user who is making a request, it still needs to determine whether the user should be authorized, or granted the requested access to a
resource that the server controls. This functionality is provided by the DCE authorization service, called the privilege service. It forwards in a secure way the information that a server needs to
know in order to determine what permissions it should grant to the user.
Both the authentication service and the privilege service are used in conjunction with DCE RPC and the login facility, so the typical application programmer does not interact with them directly,
but instead uses authenticated RPC.
· Registry service
The registry service is a replicated service that manages the cell's security database. The security database contains entries for security entities, which are called principals. A
principal can be a user or a server, for example. The database also contains information associated with each principal; for example, encryption keys, which are used in authentication,
authorization, and encryption of messages. The registry service enables administrators to access and modify the database of DCE users.
The extended registry attribute (ERA) interface allows the registry schema to be modified so that user-defined attributes can be associated with registry objects.
· Access control list facility
DCE access control lists (ACLs) are lists of users who are authorized to access a given resource. For example, a user can put a colleague on an ACL for a certain file, thereby granting the
colleague permission to read and write the file. DCE ACLs are associated with many DCE resources: files, entries in the Directory Service, and entries in the security service. DCE ACLs are based on
the POSIX 1003.6/Draft 3 specification. An ACL API allows programmers to manipulate ACLs, and the dcecp command allows users to modify ACLs associated with resources they own.
· Login facility
The DCE login facility initializes a user's DCE security environment. It authenticates the user to the security service by means of the user's password. The security service returns security
credentials, which are then used to authenticate the user to distributed services that are accessed during the user's session, such as DFS or other applications. The login facility permits log in
using the following authentication protocols:
- The public key protocol, which provides the highest level security
- The third-party protocol, which is less secure than public key protocol
- The timestamps protocol, which is less secure than the third-party protocol
- The DCE Version 1.0 protocol, which is the least secure protocol. This is provided solely for compatibility with DCE Version 1.0 clients.
· Audit service
The audit service detects and records the execution of DCE server operations that are relevant to the maintenance of a secure distributed computing environment. The audit service records the
event in a log file called an audit trail file. DCE application programmers build auditing into their DCE servers by designating security-relevant operations as code
points for which auditing is required, and using an audit API to establish auditing of those operations. The DCE Security Service and the DCE Distributed Time Service also use the audit service to
track and record the use of their security-critical operations. Administrators can use the audit service event class and filter mechanisms to organize and tailor the recording of
events into audit trail files.
|