The present invention relates to a method for performing delegation of resources, in particular services, wherein a user—resource owner—has access to a resource offered by a service provider and wherein the resource is delegated to at least one other user—delegate—by using delegation credentials.
Furthermore, the present invention relates to a system for performing delegation of resources, in particular services, the system comprising a service provider for offering a resource, wherein a user—resource owner—has access to the resource, and wherein the resource is delegated to at least one other user—delegate—by using delegation credentials.
The preferences and data related to each person or individual makes it somehow difficult to distinguish between an account at an ISP (Internet Service Provider) and a subscription related to a service offered by that ISP. It is more common that the transport subscription (network access) is shared and separate service provider subscriptions are held since a person's profile is linked to the subscription. In a federated identity environment the user's profile is linked to different subscriptions. Although that is a well known problem which already has solutions, like those proposed in Liberty Alliance (see for reference http://www.projectliberty.org) and OpenID (http://www.openid.net), the problem of sharing a subscription by means of delegation is still an open field.
It is therefore an object of the present invention to improve and further develop a method and a system of the initially described type for performing delegation of resources in such a way that users are allowed to share their access to resources with others in a way which preserves the users' privacy and allows a tight control on the delegation process and circumstances.
In accordance with the invention the aforementioned object is accomplished by a method comprising the features of claim 1. According to this claim, such a method is characterized in that the method comprises the steps of performing an authentication of the delegate at the service provider, and performing an authorization of the delegate at an identity provider based on authorization rules.
Furthermore, the aforementioned object is accomplished by a system comprising the features of independent claim 18. According to this claim, such a system is characterised in that said service provider is configured to perform an authentication of the delegate, and that an identity provider is provided, which is configured to perform an authorization of the delegate based on authorization rules.
According to the invention it has first been recognized that existing mechanisms do not provide for a sufficiently flexible and secure possibility of sharing resources by means of delegation. The present invention deals with how to combine identity management functions, service provider subscription management and cryptographic primitives to produce a method and a system which allow users to delegate subscriptions or payment to other users. While the power to authenticate the user and confirm the delegation remains with the service provider, the identity provider is still capable of granting or denying access based on access control rules, i.e. authorization rules. This process separates authentication from authorization which adds flexibility to the system. The service provider does not necessarily need to know the rules of authorization and the identity provider might not be part of the authentication of the user for service access.
Furthermore, the partition of authentication and authorization for service consumption also permits the added privacy benefit that the service provider does not need to know the delegate user, simply his relation to the subscriber. The usual way of supporting multiple users under the same subscription according to prior art either involves the knowledge on the server provider side of this linking or the sharing of credentials (and therefore non-distinction) of the different users. By employing delegation credentials in form of cryptographic primitives, such as signing and verifying messages and certificates, the sanity and security of the method and the system according to the invention is ensured.
It is provided a flexible delegation method and system which allow for multiple configurations and the control of the account user on the different delegations. This would mean that the resource or subscription holder does not simply provide the credentials or identity of the user but may rather ask the service to issue new credentials which he links to his subscription. These credentials can then be used by the delegated entity to access the service. Since this new user is not directly involved in the transaction, the service provider knows he is allowed by the resource holder or subscriber to use that account but not necessarily who he is (responsibility falls upon the subscriber).
The method and the system according to the invention constitute a centralized delegation management and result in the advantages of easier subscription management, which is simple to handle from the user's perspective, enhancement of the privacy of its users (protecting the delegates' identity, while maintaining strong security parameters, in terms of the identity of the delegates) and the provision of identity providers with new business models.
According to a preferred embodiment the authorization rules defined for a delegate may be registered at the identity provider, thereby employing said delegation credentials. The authorization rules may grant a delegate full access to a resource with no constraints. On the other hand, it is possible that the authorization rules defined for a delegate include resource access restrictions.
According to a further preferred embodiment the access to a resource may be established by the resource owner holding a subscription to a service. The resource owner may e.g. directly subscribe to a service offered by the service provider.
Preferably, the delegation credentials are issued and verified (in the authentication process) by the service provider. In case of a delegation, it may be provided that the delegation credentials are handed over from the resource owner, e.g. the subscription holder, to the delegate. In other words, the service provider holds the power of authentication. It holds, generates and checks the credentials used by the delegate to access the service. However, the access control policies which provide authorization (in which cases access can be granted) are separate and may be stored at the identity provider. The benefit is that the service provider does not need to handle the authorization rules (usually based on groups, context, etc which are outside the realm of the service provider), and simply deals with the authentication and binding of the user to the subscription.
With respect to high security, it may be provided that the authentication of the delegate at the service provider is performed on the basis of the delegation credentials. Alternatively or additionally, upon the delegate requesting the service at the service provider, an authentication of the delegate may be performed at the identity provider on the basis of the delegation credentials. Moreover, an authorization may be performed at the service provider, resulting in a liability benefit, as the identity provider can claim, since part of the authorization is done at the service provider, it cannot be liable for any user misconduct.
According to a preferred embodiment, user accounts may be provided at the identity provider, wherein each account is linked to another digital identity of the user. In such case, authorization rules defined for a delegate may be defined in a digital identity specific manner. In particular, it may be provided that the authentication of a delegate at the service provider is based upon the digital identity of the delegate. Specifically, it may be provided that one digital identity is allowed to access or to use a resource/service, wherein such access/usage is denied for another digital identity. In this context, it is important to note a clear separation between the user's digital identity and the physical one. Since one physical person may have multiple digital identities, it might be that, in some cases, it cannot access a service with one digital identity but can with another.
It is to be noted that the identity provider can also be used to handle access control for multiple services at the same time. So the same authorization rules can be used under different credentials to access different services by the same user under the same delegation. On the other hand, general authorization rules may be specified which can apply to more than one delegation. In any case, the resource holder can change delegation authorization without contacting the service provider.
Different instantiations are possible where the access control property changes. For example, the resource holder may base his authorization rules on several aspects. In particular, they may be based on the type of service that is to be delegated. Furthermore, a time may be specified during which a delegate is allowed to access the resource to be delegated. Further, the user may be specified, wherein the digital identities of the user may be taken into consideration. Moreover, the costs of accessing or using a resource/service may be specified within the authorization rules, e.g. in terms of specifying a cost limit. The listed criteria are to be understood as examples only, i.e. further criteria that might be considered for defining the authorization rules may be envisioned and may be specified according to specific needs and requirements.
According to a preferred embodiment, which provides high security and which is readily to implement, the delegation credentials may include a certificate and a secret key. Each entity, to which the key is handed over in the context of a delegation, will then be able to use the delegated resource.
As regards a readily handling of the authorization, it may be provided that the authorization information is centralized at the identity provider, wherein the information is aggregated per each delegate. Alternatively or additionally, the authorization information may be centralized at the identity provider aggregated per each service. However, distributed management of the authorization rules is also possible.
There are several ways how to design and further develop the teaching of the present invention in an advantageous way. To this end, it is to be referred to the patent claim subordinate to patent claims 1 and 18 on the one hand, and to the following explanation of a preferred example of an embodiment of the invention illustrated by the drawing on the other hand. In connection with the explanation of the preferred example of an embodiment of the invention by the aid of the drawing, generally preferred embodiments and further developments of the teaching will be explained. In the drawings
In the following a specific use case scenario for delegation within the IPTV area is specified. The delegation in mind deals with the special case of sharing of subscriptions to services. The use case introduces an Identity Management platform as an overseeing entity which deals with the access control in delegation scenarios.
In today's typical IPTV scenarios, user subscriptions to base services are usually shared since there is no particular authentication per-user to the service. It is to be expected that with the proliferation of Identity Management and personalized services, this will change. The user subscription, which was so far the identifier of the users' access to services, will no longer suffice.
IPTV supports services far beyond those currently offered by digital television. These services include, on top of those already offered by today's systems, IP telephony, gaming services and even access to 3rd party services. The interaction of the IPTV provider with external services is an important aspect dealt with in the use-case detailed in the following.
Users must manage all the different subscriptions to IPTV providers and service providers, whether they are offered by the same operator or by 3rd party providers, independently. Identity Management can offer a common platform to ease the users' account management. In particular, since services which interact with identity management platforms are usually also dependent in the concept of identity, the management of user subscriptions bound to different digital identities is another axis to the problem.
In the described scenario it is assumed that a user and its digital representation, or virtual identity (VID), are distinct entities. A user holds the subscription, which is the contractual bound between it and its service provider, but can then associate it, as needed, to its VIDs. In
In
Below the services, the holder of the account and main digital identity responsible for the subscription is shown. In some cases more than one digital identity may be directly linked to the subscription. The subscriber delegates the use of the subscription to other digital identities; some which belong to themselves and others to other trusted entities. In the use case illustrated in
In the example shown in the left of
One extension to the delegation problem is the fact of adding more complex access control rules per-delegation. Taking the example above, the subscriber to the telephony service, ‘father’, delegates usage of the phone service to the ‘son’ but restricts the amount of money the user ‘son’ can spend on the service. Another restricted delegation is shown with respect to the father authenticated as “employee”, who is only allowed to call the son. With respect to the Internet service, the son is underlying two different restrictions: in his identity as son, the restriction is based on the specific type of service (e.g. in that access to certain gaming services is denied), in his identity as student on the other hand, the restriction is based on time (e.g. access is granted during certain hours of daytime only).
It is to be noted that according to the specific embodiment of
In
A.1) In this step the owner of the subscription creates a link at the IPTV provider, which allows another user to use the owner's account, provided the IPTV provider abides to access control rules at the Identity Provider.
A.2) A similar operation is performed with the 3rd party Service Provider.
A.3) The owner of the subscription sets up access control rules at the Identity Provider. This operation can be seen as adding “authenticated” information to the profile of the delegates or giving the delegates the credentials for them to add to their own profiles. It is to be noted that in this step the user can setup generic access control policies which affect both services, which is one of the advantages of using an Identity Management system to perform the access control.
B.1) The delegate accesses an IPTV service.
B.2) The IPTV service provider contacts the Identity Provider (which can be also in the IPTV operator's domain) to authenticate the user. It is to be assumed, in this case, that the user is already authenticated with its Identity Provider; otherwise the authentication could occur at this time.
B.3) Once the Identity Provider can verify that the user is authenticated, it will verify the access control restrictions on access to that service using that delegation. Based on this, it will allow or deny access to the service.
The IPTV provider might, additionally, check for other access control credentials related to the service delegation before providing access to the user.
Steps B.4), B.5) and B.6) portrait a similar scenario which involves a 3rd party service provider. It is to be noted that the authorization control is mainly performed by the Identity Management system and policies can be shared amongst delegations (reducing the effort in user-subscription management).
In step 3, either the delegate or the owner of the subscription setup their identity management system to account for the delegation. This means the Identity Management system is made aware that this delegation belongs to the son (in our scenario). Also in step 3, the owner might decide to setup extra access control rules, which are the separated authorization for the delegation. In step 4 the owner provides the delegate with the secret key with which the delegate can access the service using that subscription. Step 5 demonstrates how the service can be accessed and is further detailed below. Finally, the subscriber receives the bill for the joint usage of his subscription by every delegation and himself.
The Service Provider SP holds information about the subscription of the father including delegation credentials, which have been issued by the Service Provider SP, e.g. after subscription. By employing the credentials the father configures the Identity Provider IdP. In the specific case shown in
Once the Service Provider SP and the Identity Provider IdP are configured as described above, the father can give the secret key of the delegation credentials to the son since the delegation is now active. When the son contacts the Service Provider SP and asks for the service (indicated by the upper arrow directed from the son to the SP), the SP will contact the IdP to authenticate the son. This step is described in some more detail with respect to
Once the owner has these keys in his possession he configures the Identity Management system of the delegate by sending the certificate and configuring a set of rules on that certificate. In this step he can also present more than one certificate and set joint delegation rules for all those delegations. For instance, to this end SAML (Security Assertion Markup Language) or a web-based protocol may be employed.
It is to be noted that this does not present a security risk since: the attack would be to offer delegation to subscriptions which the delegate does not want (this does not offer a privacy or any other danger to the delegate) and that since the certificate is issued by the service provider and contains the identity of the owner, the Identity Provider can authenticate the owner either locally or at the owner's identity provider before he allows him to set delegation rules. This mechanism is also outside the scope of this invention. Once the Service and Identity Providers are configured, the owner can now give the secret key to the delegate (e.g. by means of a physical transfer), since the delegation is now active.
The SP will then contact the delegate and request that he authenticates (a second time) based on the certificate of the delegation. This step ensures that the delegate did not copy the delegation but is the true delegate. The delegate can then use the secret key to answer the challenge from the SP and service consumption can start. Since the SP can associate the delegation with the owner's account, the owner will be also billed for the services accessed by the delegate.
Many modifications and other embodiments of the invention set forth herein will come to mind the one skilled in the art to which the invention pertains having the benefit of the teachings presented in the foregoing description and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
Number | Date | Country | Kind |
---|---|---|---|
07016737.4 | Aug 2007 | EP | regional |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP2008/007029 | 8/27/2008 | WO | 00 | 4/22/2010 |