This disclosure relates to security authentication in computer systems, and more specifically to an authentication system that provides unified user identification across multiple namespaces.
In networked computer systems, and in particular, in heterogeneous networking environments across multiple operating systems, entity authentication presents a management challenge. Entities, or in the present context, security principals, may be individual users, groups, particular machines, and the like. Entities are typically externally identified by a user ID or name that provides a symbolic tag, but internally, a numeric tag is typically associated with the entity as a practical measure. The numeric tag then provides a uniform identifier in the particular environment, such as security identifier objects (SIDs) used in Microsoft WINDOWS, or group and user identifiers as used in UNIX-type operating systems. (UNIX is a trademark of The Open Group.) Application programming interfaces (APIs) that access secured objects generally require such a numeric tag as an input, either directly or implicitly, as do gateways such as network portals.
Typically, an external database is used to map an entity identifier from one namespace to all of the various namespaces that the entity might encounter. An entity should be able to access the same set of objects irrespective of the operating system, network, machine, etc. from which an access occurs. Therefore, a large number of mappings may be required to and from various namespaces associated with various operating systems, machines and in some instances particular sub-systems or applications. Such identifier mappings have several drawbacks. First, the database must typically be fully populated before use, which is a labor-intensive process and has a high barrier to entry. Second, the reliance on an external database is a security vulnerability that is continuously exposed. Finally, it is frequently impractical to query a platform-specific database from a different platform, making the interface to the external database awkward for at least some of the access paths.
Therefore, it would be desirable to provide an identification method and system that provides uniform identification, can provide automatic population of identifiers and that adapts easily to access paths from different platforms.
The invention is embodied in a computer-performed method, computer program product and computer system that authenticates entities generating accesses in a computer system.
Accesses to objects or gateways in the computer system, which may be a network of computers executing different operating systems, is made using canonical identifiers from a single namespace. Accesses directly specifying an identifier from the canonical namespace are made directly, while accesses made with identifiers from other namespaces are looked up in an external mapping database to obtain corresponding identifiers in the canonical namespace. If the external mapping database is not available or the identifier is not already present, a new identifier is automatically generated and used for the present access, and generally an entire session. The automatically-generated identifier is stored in an internal database and used for subsequent accesses by the same entity, making it possible to automatically populate the canonical namespace. The external database, if available, can be periodically polled to determine if the entity obtains an identifier in the same namespace mapped to by an automatically generated mapping, indicating a conflict. The external database lookup results are used to resolve the conflict.
Accesses to objects or gateways requiring an identifier from another particular namespace may be handled by a database lookup that obtains an identifier in the particular namespace that corresponds to the identifier from the canonical namespace. Alternatively, a generic identifier from the particular namespace may be assigned to all accesses from the canonical namespace.
These and other aspects of the present disclosure are disclosed in the following detailed description of the embodiments, the appended claims and the accompanying figures.
The invention is best understood from the following detailed description when read in conjunction with the accompanying drawings. It is emphasized that, according to common practice, the various features of the drawings are not to-scale. On the contrary, the dimensions of the various features are arbitrarily expanded or reduced for clarity.
The present invention relates to computer security systems, and specifically identification of entities, including users, groups, and the like between systems and software requiring identifiers from differing namespaces. A canonical namespace is managed such that a fail-free path is provided for accesses made via identifiers from other namespaces. When an identifier from another namespace is used for the access, an external mapping database is consulted to determine if a corresponding identifier from the canonical namespace is present in the external database. If the external database is not available, or the corresponding identifier is not present in the external database, an identifier in the canonical namespace is automatically generated. The generated identifiers are stored in an internal database, making it possible to populate the internal database automatically. Accesses requiring identifiers from another namespace can be made using a canonical identifier to look up corresponding identifiers in the other namespace, or by assigning a generic identifier in the another namespaces to identifiers in the canonical namespace. The external database can be periodically polled to discover any new or changed mappings for identifiers of interest. If a new or changed external mapping is discovered that conflicts with an existing automatically generated mapping stored in the internal database, the external mapping is used.
Referring now to
Workstation computer system also includes a hard disc controller HDC 14 that interfaces processor CPU to local storage device 17A and a network interface that couples workstation computer system 10A to network 15, which may be fully wireless, fully wired or any type of hybrid network. VFS interface 11A provides a uniform set of application programming interfaces (APIs) that provide access to resources, such as local storage device 17A or remote storage such as storage devices 17B and 17C, which are coupled to network 15 by network disc controller (NWDC) 18. An external mapping database DB, external to the VFS, provides storage for traditional administrative mapping information as will be described in further detail below, and which may be a single database, or comprise multiple databases. An internal mapping database IDB provides for storage of automatically-generated identifier mappings and is internal to the VFS, which means that internal database IDB is owned by the VFS and is not generally accessible to other sub-systems. Another workstation computer system 10B, having an internal organization similar to that depicted in workstation computer system 10A, is coupled to network 15 and executes a different operating system, e.g., UNIX. A different VFS client 11B is provided and executed within workstation computer system 10B to provide suitable native APIs for accessing storage within workstation computer system 10B, networked storage devices 17B and 17C, as well as local storage device 17A within workstation computer system 10A, if local storage device 17A is shared.
Network 15 may include wireless local area networks (WLANs), wired local-area networks (LANs), wide-area networks (WANs) or any other suitable interconnection that provides communication between workstation computer systems 10A and 10B, local storage devices 17A-17C, external database DB and any other systems and devices coupled to network 15. Internal database DB is generally a file stored within a storage device, such as one of local storage devices 17A-17C, and is thereby accessible by file system interface objects 11A and 11B over network 15. Further, the present invention concerns identification functionality that is not limited to a specific computer system or network configuration. Finally, the specification workstation computer systems 10A and 10B and the location of their specific memory MEM and file system interface objects 11A and 11B does not imply a specific client-server relationship or hierarchical organization, as the techniques of the present invention may be employed in distributed systems in which no particular machine is identified as a server, but at least one of the machines provides an instance and functionality of an object or interface that performs identification in accordance with an embodiment of the present invention. The objects or interfaces process accesses according to methods and structures of the present invention, as described in further detail below.
Referring now to
In the depicted example, for generality, the file system driver managing local storage device 17 is depicted as requiring identifiers from canonical namespace 22. However, under certain circumstances, an identifier from canonical namespace 22 or another namespace may be needed as a return value to the originating platform. For example, when a query from a WINDOWS operating system is made to obtain the owner of a file which in WINDOWS is a security identifier sd.SID. In order to provide a security identifier for a file having an owner identified only in canonical namespace 22, a conversion algorithm 26 may be used to generate an artificial, but compatible, security identifier sd.SID from canonical ID C′(ID1). Alternatively, a dummy or generic identifier compatible with namespace 21A may be provided from VFS interface 11A in response to a request for an owner identifier of a file whose owner is not identified in namespace 21A.
It is understood that the techniques illustrated above apply to object accesses in general, and storage devices/files are only an illustrative example of an object type for which access may be mapped according to embodiments of the present invention. Further, it is understood that the mapping provided by the above-described technique is not a 1:1 security mapping, but for automatically-generated identifiers, can provide some level of access, e.g., that level of access available to non-owner non-group members in UNIX. However, once the identifiers are populated in database DB in traditional administrative fashion, or automatically generated and stored in internal database IDB, permissions can be subsequently tailored to the entity's needs. For example, a user may access a UNIX storage device from a WINDOWS operating system temporarily, receiving access to directories such as /tmp via identifier ID1 mapped to automatically-generated canonical namespace identifier C′(ID1). Subsequently the entity can arrange for an administrator to set permissions for accessing /usr/entity1, providing the same permissions as entity1 has under their normal UNIX account, for example.
Referring now to
While the invention has been described in connection with certain embodiments, it is to be understood that the invention is not to be limited to the disclosed embodiments but, on the contrary, is intended to cover various modifications and equivalent arrangements included within the scope of the appended claims, which scope is to be accorded the broadest interpretation so as to encompass all such modifications and equivalent structures as is permitted under the law.
The present application is a continuation of U.S. patent application Ser. No. 14/147,675, filed on Jan. 6, 2014; which is a continuation of U.S. Pat. No. 8,700,664, issued on Apr. 15, 2014; which is a continuation of U.S. Pat. No. 8,447,780, issued on May 21, 2013; which is a continuation of U.S. Pat. No. 8,180,794, issued on May 15, 2012; and which is a continuation of U.S. Pat. No. 8,086,633 on Dec. 27, 2011, which are incorporated herein in their entirety by reference.
Number | Name | Date | Kind |
---|---|---|---|
6389427 | Faulkner | May 2002 | B1 |
6446253 | Mellmer | Sep 2002 | B1 |
6732172 | House et al. | May 2004 | B1 |
7017183 | Frey et al. | Mar 2006 | B1 |
7340723 | Antonov et al. | Mar 2008 | B2 |
7512608 | Loeser et al. | Mar 2009 | B2 |
7584219 | Zybura et al. | Sep 2009 | B2 |
7672945 | Chatterjee et al. | Mar 2010 | B1 |
7730089 | Campbell et al. | Jun 2010 | B2 |
8086633 | Plantenberg et al. | Dec 2011 | B2 |
8180794 | Plantenberg et al. | May 2012 | B2 |
8230050 | Brandwine et al. | Jul 2012 | B1 |
8272039 | Bennett et al. | Sep 2012 | B2 |
8275826 | Kakivaya et al. | Sep 2012 | B2 |
8312046 | Eisler et al. | Nov 2012 | B1 |
8335921 | von Behren et al. | Dec 2012 | B2 |
8364711 | Wilkins et al. | Jan 2013 | B2 |
8447780 | Plantenberg et al. | May 2013 | B1 |
8700664 | Plantenberg et al. | Apr 2014 | B2 |
9325712 | Plantenberg et al. | Apr 2016 | B2 |
9524167 | Cohn | Dec 2016 | B1 |
20020112045 | Nirkhe et al. | Aug 2002 | A1 |
20030028808 | Kameda | Feb 2003 | A1 |
20030237002 | Oishi et al. | Dec 2003 | A1 |
20040181696 | Walker | Sep 2004 | A1 |
20050005260 | Antonov et al. | Jan 2005 | A1 |
20050097073 | Mair | May 2005 | A1 |
20060287767 | Kraft | Dec 2006 | A1 |
20070005620 | Loeser et al. | Jan 2007 | A1 |
20070050395 | Hunter et al. | Mar 2007 | A1 |
20080126369 | Ellard | May 2008 | A1 |
20080205655 | Wilkins et al. | Aug 2008 | A1 |
20080263640 | Brown | Oct 2008 | A1 |
20080281967 | Muhlestein et al. | Nov 2008 | A1 |
20090030957 | Manjunath | Jan 2009 | A1 |
20090171926 | Loeser et al. | Jul 2009 | A1 |
20090177756 | Gunda et al. | Jul 2009 | A1 |
Entry |
---|
Ryutov, Tatyana; “Representation and Evaluation of Security Policies for Distributed System Services”, Proceedings of DARPA Information Survivability Conference, Jan. 2000, pp. 172-183, Hilton Head, SC. |
Notice of Allowance in U.S. Appl. No. 12/549,205 dated Aug. 19, 2011, 24 pp (pp. 1-24 in pdf). |
Notice of Allowance in U.S. Appl. No. 13/287,189 dated Jan. 10, 2012, 32 pp (pp. 1-32 in pdf). |
Notice of Allowance in U.S. Appl. No. 13/425,019 dated Jan. 17, 2013, 20 pp (pp. 1-20 in pdf). |
Notice of Allowance in U.S. Appl. No. 13/768,127 dated Dec. 2, 2013, 21 pp (pp. 1-21 in pdf). |
Number | Date | Country | |
---|---|---|---|
20160239679 A1 | Aug 2016 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14147675 | Jan 2014 | US |
Child | 15134972 | US | |
Parent | 13768127 | Feb 2013 | US |
Child | 14147675 | US | |
Parent | 13425019 | Mar 2012 | US |
Child | 13768127 | US | |
Parent | 13287189 | Nov 2011 | US |
Child | 13425019 | US | |
Parent | 12549205 | Aug 2009 | US |
Child | 13287189 | US |