The present invention relates broadly to access control lists in computer operating systems. Specifically, the present invention relates to caching membership information and retrieving the membership information to avoid maintaining a database of backpointers.
Controlling user access is a fundamental aspect of network operating system functionality. With the proliferation of computer networks serving large numbers of users, access control lists are a fundamental part of managing network traffic as well as security. Users and other entities can be members of a group. Members and groups are represented in computer systems as objects. Members are organized into groups, with each group having certain privileges and access capabilities. Groups can contain subgroups, which introduces increased complexity to the network operating system's access control list implementation.
In current systems where group membership is determined at login time, the system suffers from the serious defect of only finding a limited number of groups to which the member belongs. Simply enumerating all the groups to see which ones the user is a member of is a concept that clearly doesn't scale well, and if nested groups are allowed, enumerating all groups to which a member belongs becomes impossible. Some directory services provide group membership determination at login, but only through database maintenance of back pointers. Such a database must be constantly updated as groups are created, and members join or are removed from groups. This is computationally expensive and requires significant bandwidth across large systems. Lightweight directory access protocol (LDAP) servers are becoming more and more popular among system administrators, but are overwhelmed by the demands and costs of maintaining such a database. Thus, there is a heartfelt need for a mechanism that meets the requirement of computational economy while still managing large and complex access control lists.
The present invention solves the problems described above by determining group membership in a computer system through obtaining an identifier that describes a member of a group. The member of a group has a member hash table that contains group membership information describing to what groups a member belongs. A primary search is performed on a plurality of groups to determine if each group contains the member's identifier. Each group in the plurality has a group hash table that describes to what other groups the group belongs. The results of the primary search are cached in the member hash table. For each group to which the member belongs, a secondary search is performed on a plurality of groups to determine what groups contain the group to which the member belongs. These results of the secondary search are cached into the group hash table and merging into the member hash table. In an embodiment, the secondary search is performed on all subgroups, with each match being cached into the group hash table and merged into the member hash table. By reading the member hash table, group membership is then determined.
In another aspect, a membership updater daemon is provided that keeps the member's indirect membership information current. The membership updater contains a local cache on a node, as well as membership objects for all members or groups referenced directly or indirectly by groups on the node. Each member or group object in the cache maintains only immediate back pointers in the form of lists of groups that contain this member or group.
The present invention introduces the concept of access control lists (ACLs) in both the file system and directory. These ACLs are used on the filesystem, for directory access and for service access. In each case, an ACL consists of a number of access control entries, each of which identify a set of rights and to whom that set of rights is granted or possibly denied.
The present invention utilizes a “who” function that determines if the asking entity somehow matches an entry on an ACL. The “who” function can identify users and groups of users, as well as computers. In an embodiment, each of these entities (user, group or computer) is identified by a 128-bit number. However, previously-implemented UNIX groups are not sufficient to specify whether a given user is a member of a group. The most significant problem is that the UNIX group mechanism only identifies users by name, and there is a need for a more exact way of specifying users.
The present invention provides a daemon referred to herein as the resolver. If the client is unable to get a complete list of groups out of the user records, the resolver can employ the “who” function is to answer the question, “is user x a member of group y” and cache the result. This requires resources that run in the kernel (such as file systems) to make a call to a user-level process. The resolver can make system calls to inspect the group and see if the user is a member. For nested groups, the resolver may need to make repeated calls to fetch subgroups. The resolver caches group results as well as user membership data.
Thus, the resolver is used to construct an inverse mapping of directory services group membership information, and convert information relating to membership from the form Y contains X, Z contains Y, etc. to the form X is a member of Y, Y is a member of Z, etc. This is done on an as-needed basis, and avoids the computational complexity of maintaining a centralized database of backpointers. In an embodiment, rather than expanding groups, an indexed search of the server can be performed to find groups that contain the user directly. A recursive search is performed for groups containing those groups to build up a membership list for the specific user.
Directing attention to
The sequence of acts performed in accordance with the present invention is illustrated in
To preserve computational economy on the server, a membership updater daemon can be employed by the server to keep the user's indirect membership information current. The membership updater contains a local cache of all groups on a node, as well as membership objects for all users or groups referenced directly or indirectly by groups on the node. Each member or group object in the hash tables 108, 110 maintain only immediate back pointers in the form of lists of groups which contain this user or group.
When group information changes, the membership updater only needs to update the immediate back pointers. However, when subgroups are added or removed, it needs to expand those groups so it can build a complete list of users whose membership attributes need to be updated. In an embodiment, if a search returns a group multiple times during an expansion, the group can be skipped since all its members are already on the list. Then the membership updater processes all the users that need to be updated, and expands their immediate memberships in the reverse direction to contain all the groups they're indirectly a member of.
In embodiments where changes in groups on a remote server can change membership in a local group that contains that remote group, the membership updater runs periodically even if it's also triggered by local change notifications.
While techniques for caching permissions information has been described and illustrated in detail, it is to be understood that many changes and modifications can be made to embodiments of the present invention without departing from the spirit thereof.
Number | Name | Date | Kind |
---|---|---|---|
5173939 | Abadi et al. | Dec 1992 | A |
5220604 | Gasser et al. | Jun 1993 | A |
5283830 | Hinsley et al. | Feb 1994 | A |
5315657 | Abadi et al. | May 1994 | A |
5748896 | Daly et al. | May 1998 | A |
5752196 | Ahvenainen et al. | May 1998 | A |
5852822 | Srinivasan et al. | Dec 1998 | A |
5897637 | Guha | Apr 1999 | A |
6047228 | Stone et al. | Apr 2000 | A |
6212525 | Guha | Apr 2001 | B1 |
6263434 | Hanna et al. | Jul 2001 | B1 |
6366913 | Fitler, Jr. et al. | Apr 2002 | B1 |
6529882 | Park et al. | Mar 2003 | B1 |
6671695 | McFadden | Dec 2003 | B2 |
6697835 | Hanson et al. | Feb 2004 | B1 |
6862602 | Guha | Mar 2005 | B2 |
6883100 | Elley et al. | Apr 2005 | B1 |
6947924 | Bates et al. | Sep 2005 | B2 |
6965767 | Maggenti et al. | Nov 2005 | B2 |
6975873 | Banks et al. | Dec 2005 | B1 |
7024515 | Ruan et al. | Apr 2006 | B1 |
7032243 | Leerssen et al. | Apr 2006 | B2 |
7072958 | Parmar et al. | Jul 2006 | B2 |
7080195 | Ngai et al. | Jul 2006 | B2 |
7085365 | Kauppinen | Aug 2006 | B2 |
7130839 | Bireham et al. | Oct 2006 | B2 |
7177978 | KanKar et al. | Feb 2007 | B2 |
7213262 | Elley et al. | May 2007 | B1 |
7233974 | Kawahara et al. | Jun 2007 | B2 |
7240149 | Nagarej et al. | Jul 2007 | B1 |
7240171 | Barton et al. | Jul 2007 | B2 |
7249374 | Lear et al. | Jul 2007 | B1 |
7260720 | Yamamoto et al. | Aug 2007 | B2 |
20020059191 | Tamura | May 2002 | A1 |
20020144149 | Hanna et al. | Oct 2002 | A1 |
20030041141 | Abdelaziz et al. | Feb 2003 | A1 |
20030196094 | Hillis et al. | Oct 2003 | A1 |
20040054899 | Balfanz et al. | Mar 2004 | A1 |
20050097166 | Patrick et al. | May 2005 | A1 |
20050220129 | Boyd | Oct 2005 | A1 |