Skip to content

Attribute Authority Framework: A framework for attribute certificate life cycle management

Notifications You must be signed in to change notification settings

giovani-milanez/aafw

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Attribute Authority Framework

This project is the result of my final paper and its aimed to be used by attribute authorities that needs to manage the life cycle of their attribute certificates.

[Final Paper (Portuguese)] (https://projetos.inf.ufsc.br/arquivos_projetos/projeto_1540/TCC_Framework_Certificado_Atributo_Giovani_Milanez_v2.pdf)

Abstract: The X.509 attribute certificate is a digitally signed document that establish assignments to a entity. In July 2012, the technology was standardized for use in Brazil by ICP-Brasil. Because it is a relatively new technology in that country, the development support for systems that uses attribute certificate still lack of studies and references. The author proposes a request-response protocol for attribute certificate issuance, search and revocation. Such protocol was implemented in a object oriented framework that allows the construction of applications that need to manage the life cycle of that certificates. The framework was used to build a prototype application for cinema ticket management.

Use Case Diagram

The frameworks goal is to respond to attribute certificate issuance, search and revocation requests, as shown in the use case diagram.

Use Case

The life cycle of a attribute certificate starts with a issuance request from a thirty party. The request is processed and the holder's situation will be verified in order to approve the issuance. After that the AC will be issued. The publication using either a push or pull method is needed so that it can be consumed. Once publish the holder can benefit from it until it expires. While the AC is in its validity it can be revoked, causing the holder's privilege to be cancelled. Also, the AC verifier may query the Attribute Authority to check if the entity trying to access the protected resource has the rights to do so (has an AC expliciting it). The life cycle ends when the AC validity expires.

Class Diagram

The simplified diagram class show a scenario where the framework user create a subclass of AttributeAuthority called MinhaEEA (MyAA in english), the green rectangle. The framework interfaces are represented by the blue rectangles. The orange rectangles represent some of the interfaces implementation provided by the framework. Implementing the framework interfaces is the way to change its behavior.

Classes

The behaviors that can be changed are:

  • How to load the digital certificate, private key and algorithm to perform the AC signature (KeyLoader interface)
  • How to store and search in a repository the issued attribute certificates (ACStore interface)
  • How to obtain the next serial number of the AC to be issued (ACSerialLoader interface)
  • How to receive and send AttributeCertificateReq and AttributeCertificateResp messages (TransportServer interface)
  • How and where to publish revoked AC (CRLPublisher interface)
  • How to validate if the attributes present in a issuance request are acceptable for the requested holder (AttributeValidator interface)
  • How to handle the templateId field present in a request (ACTemplate interface)

Examples

The most basic AA application uses the already provided framework interfaces implementation. In order to use the framework one must inherit AttributeAuthority class and implement its abstracts methods.

The following application will respond through RPC or TCP protocol, as defined in the paper, to attribute certificate requests, for the attribute of OID 2.30.50.1.1.1.

The AllowValidadtor is linked to the attribute, so whenever a request for that attribute is received the validator will trigger. The validator must tell if the holder present in the request has the privileges to obtain such attribute. The AllowValidator is implemented so that no validation is done, always granting the holder the attribute requested.

#include "aafw/AttributeAuthority.hpp"
#include "aafw/DefaultFactory.hpp"
#include "aafw/AllowValidator.hpp"
#include "aafw/FileSystemCRLPublisher.hpp"

#include <iostream>

using namespace aafw;
using namespace cryptobase;

class MyAA : public AttributeAuthority
{
public:
	std::unique_ptr<SystemFactory> getSystemFactory()
	{
		return std::unique_ptr<SystemFactory>(new DefaultFactory);
	}
	void setup()
	{
		registerValidator("2.30.50.1.1.1", new AllowValidator);
		registerCRLPublisher("2.30.50.1.1.1", new FileSystemCRLPublisher(60, "http://myaa.com/aa.crl", "C:\\aa.crl"));
		denyUnknownAttributes();
	}
};

int main(int argc, char ** argv)
{
	try
	{
		MyAA aa;
		return aa.run(argc, argv);
	}
	catch(...)
	{
		std::cerr << "something bad happened" << std::endl;
	}
}

Dependencies

[POCO C++ Libraries] (http://pocoproject.org/)

[Apache Thrift] (http://thrift.apache.org/)

[cryptobase] (https://github.com/giovani-milanez/cryptobase)

About

Attribute Authority Framework: A framework for attribute certificate life cycle management

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages