The invention relates to access control.
A server is often connected to two or more networks with each network connecting devices of a particular type to the server.
As shown in
Thus it should be appreciated that firewalls that police the traffic to and from a machine are known. Firewalls can be of numerous types. For example, a network layer firewall can be configured to filter traffic on the basis of source or destination IP address and source or destination port, and protocol type. Application layer firewalls are also known and these can be used to filter the traffic to and from particular applications. They may be used, for example, to prevent inappropriate content from being displayed in a web page.
A firewall is however just one part of a complete security solution. Other access control mechanisms are also well known in the art. For example, Virtual Private Networks (VPNs) provide trusted users with access to resources not available to general users. In the pub/sub arena Access Control Lists (ACLs) may be used to determine which users are allowed to publish on particular topics and which may subscribe to particular topics. Equally, access to a particular machine or application may only be allowed through a specific access port.
Security is also an issue when a server is accessed via only one network.
There is a need in the industry for an improved security mechanism addressing the situation where one server is being accessed by different devices. The server may be attached to one network only or may be connected to a plurality of networks, with devices on each network attempting to access the server.
According to a first aspect, there is provided a method for controlling access to a publish/subscribe message broker, the method comprising:
In one embodiment, it is determined which port is used to access the message broker and it is then determined whether the identified function set is associated with the port used to access the broker.
In one embodiment, it is determined which communication network the request originates from and it is then determined whether the identified function set is associated with the communication network from which the request originates.
In one embodiment, the communication network from which the request originates is identifiable by an address comprising a network part and a host part. In this embodiment, the communication network with which the identified function set is associated is also identifiable by at least a network part. In order to determine whether the identified function set is associated with the communication network from which the request originates comprises, the network part of the communication network from which the request originates is compared with the network part of the communication network with which the identified function set is associated.
In one embodiment a subnet mask is used to determine whether the network part of both communication networks are the same.
In one embodiment, a request to connect to the broker is received. This results in a connection object being created for the connect request. Information contained within the connection object is then used to determine the communication network via which any future requests from the same requester arrive.
In one embodiment, if it is determined that the identified function set is not associated with the communication path used, then the request is discarded. The requester may be informed that the request has been disallowed.
In one embodiment access is provided to database functions on the basis of the communication path via which a request for a database function arrives.
According to another aspect, there is provided an apparatus for controlling access to a publish/subscribe message broker, the apparatus comprising:
The invention may be implemented in computer software.
A preferred embodiment of the present invention will now be described, by way of example only, and with reference to the following drawings:
a depicts, in accordance with a preferred embodiment of the present invention, the format of a message received at the server of
b illustrates, in accordance with a preferred embodiment of the present invention, the format of a connection object created when a device connects to the server of
a and 5b depict tabular information mapping server application functionality to user profiles in accordance with a preferred embodiment of the present invention;
c illustrates a Venn diagram of the function sets provided in an exemplary embodiment; and
a & 6b illustrate the processing of the present invention in accordance with a preferred embodiment.
Disclosed is a mechanism for controlling device access to functionality provided by a server, based on the network location of the device.
The invention will be described, in accordance with a preferred embodiment, with reference to FIGS. 3 to 6. The figures should be read in conjunction with one another.
A request to perform some function provided by message broker 70 is received at step 400 (
These elements are part of the protocol header. Note that the requesting device is not necessarily on the same network as that to which the broker is attached and thus the IP source address may be completely different.
If it is determined at step 410 that the newly received request is a connection request, it is the network information, along with the userid) that is used to create (at step 420) a connection object 320 (essentially state information) as shown in
Either way, processing reaches step 430 where the connection port sends the request on its way to broker interface 220. The broker interface is used to make calls to the functions 230 provided by the broker 70. At step 440, the request is intercepted, on its way to the broker interface, by interceptor 200, specifically intercepting component 270. Connection Information Component 240 determines at step 450 whether connection information for the intercepted request is available locally. If this is the first request seen from this particular client for the current connection session, then there will be no connection information available locally. In which case, the connection object associated with the request is requested from the connection port from which the request originated (step 460). The received connection object is then stored locally to the interceptor component for use with future requests (not shown). In another embodiment, connection information may simply be requested from the connection port for each request.
At step 470, user profile and function table information 330, 340 (as shown in
Function table 330 lists the broker functions provided by component 230 (
Request message function codes are each mapped by the table to one of the above operations.
While a device may request any of the functions, the network location of the device has, according to the preferred embodiment, an impact on whether the broker actually fulfils the requested operation. The third column in the function table 330 indicates the user profiles of permitted users for each operation. Thus, only a user of type 2 may publish a message, whereas only a user of type 1 may request the subscribe operation. Thus in effect, the application functionality of the message broker is divided into function sets with only certain types of user having access to each function set. This is illustrated by the Venn diagram in
Despite the fact that only two function sets are shown and that there are a plurality of functions in each set, this does not have to be the case, There may be more than two function sets. Also, a function set may only have one function.
The user profile table 340 defines what is meant by a user of type 1 when compared with a user of type 2. The table in the figure defines that the relevant information, when determining whether a requesting device is permitted to access a function provided by the broker, is the specified Net ID (network ID)/subnet mask pair, the destination port via which the broker is accessed and the name of the requesting user. It can be seen from the figure that some the entries in a user profile may be wildcarded. In other words, it does not matter who the user is in profile 1.
Referring back to the processing of
Note that the user profile table columns are exemplary only. The key point is that a user's access is to application functionality is being controlled based on one or more characteristics relevant to the network location of the user.
It will be appreciated from
Information obtained from consultation step 470 is passed on to Gate Keeper 260; in other words, whether or not the request fulfils the required criteria. Gate Keeper 260 then uses such information to determine whether the request is allowable (step 480). If the request did not fulfil the required criteria (for example, it originated from a different subnet to that specified in relevant profile information), the request is discarded at step 490. This may mean that the request is simply not carried out, but more generally may also involve informing the requesting device that the request is not being allowed.
If on the other hand, the request is deemed to be allowable at step 480, then Gate Keeper 260 passes the request onto broker interface 220 through which the appropriate operation (publish in this example) may be requested. Hence forth the functionality of the message broker operates in a manner that is well known in the art.
To summarise, the application level protocol of the server is segmented by function into sets. Each of these sets is then associated with a profile that describes the requirements for accessing this set of functions. Referring back to the example of
As indicated above, the use of source IP address, subnet, destination port and userid information in performing the access control is exemplary only. For example, destination port may be used on its own. In which case the functionality of the present invention may be built into firewall technology (e.g. the packet filters 110, 120 of
Finally while the embodiment described makes reference to a server connected to two or more networks, the invention is not limited to such. For example, devices may access the server via a single network. The server may be listening on multiple ports on a single network. A firewall can be used to control which source IP address ranges are allowed to access which port on the server, in which case the consultation component only needs to consider the port number in its decision making. Alternatively the source IP address range and port can be specified in the profile and the consultation component can do the validation.
Number | Date | Country | Kind |
---|---|---|---|
0542111.2 | Nov 2005 | GB | national |