CAN/CSA-ISO/IEC 9594-8-98
This National Standard of Canada is equivalent to International Standard
ISO/IEC 9594-8:1995.
1 Scope
This Recommendation | International Standard:
- specifies the form of authentication information held by the
Directory;
- describes how authentication information may be obtained from the
Directory;
- states the assumptions made about how authentication information is
formed and placed in the Directory;
- defines three ways in which applications may use this authentication
information to perform authentication and describes how other
security services may be supported by authentication.
This Recommendation | International Standard describes two levels of
authentication: simple authentication, using a password as a verification of
claimed identity; and strong authentication, involving credentials formed using
cryptographic techniques. While simple authentication offers some limited
protection against unauthorized access, only strong authentication should be
used as the basis for providing secure services. It is not intended to
establish this as a general framework for authentication, but it can be of
general use for applications which consider these techniques adequate.
Authentication (and other security services) can only be provided within the
context of a defined security policy. It is a matter for users of an
application to define their own security policy which may be constrained by the
services provided by a standard.
It is a matter for standards defining applications which use the authentication
framework to specify the protocol exchanges which need to be performed in order
to achieve authentication based upon the authentication information obtained
from the Directory. The protocol used by applications to obtain credentials
from the Directory is the Directory Access Protocol (DAP), specified in ITU-t
Recommendation X.519 | ISO/IEC 9594-5.
The strong authentication method specified in this Recommendation |
International Standard is based upon public-key cryptosystems. It is a major
advantage of such systems that user certificates may be held within the
Directory as attributes, and may be freely communicated within the Directory
System and obtained by users of the Directory in the same manner as other
Directory information. The user certificates are assumed to be formed by
"off-line" means, and placed in the Directory by their creator. The generation
of user certificates is performed by some off-line Certification Authority
which is completely separate from the DSAs in the Directory. In particular, no
special requirements are placed upon Directory providers to store or
communicate user certificates in a secure manner.
A brief introduction to public-key cryptography can be found in Annex C.
In general, the authentication framework is not dependent on the use of a
particular cryptographic algorithm, provided it has the properties described in
7.1. Potentially a number of different algorithms may be used. However, two
users wishing to authenticate shall support the same cryptographic algorithm
for authentication to be performed correctly. Thus, within the context of a
set of related applications, the choice of a single algorithm will serve to
maximize the community of users able to authenticate and communicate securely.
One example of a public key cryptographic algorithm can be found in Annex D.
Similarly, two users wishing to authenticate shall support the same hash
function [see 3.3f)] (used in forming credentials and authentication tokens).
Again, in principle, a number of alternative hash functions could be used, at
the cost of narrowing the communities of users able to authenticate. A brief
introduction to hash functions can be found in Annex E.
SDO:
CSA
Language:
English
ICS Codes:
35.100.70
Status:
Withdrawn
Publish date:
1998-02-27
Standard Number:
CAN/CSA-ISO/IEC 9594-8-98