Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What are the protocols used by CSI?

Answer Posted / rithi

Linda Gricius (March, 1998):

CSI Common Security Protocols define the details of the
tokens in the SECIOP messages. Three protocols are defined:

SPKM Protocol
- this protocol supports identity based policies without
delegation (CSI level 0) using public key technology for
keys assigned to both principals and trusted authorities.
The SPKM protocol is based on the definition in The Simple
Public-Key GSS-API Mechanism, Internet Draft
draft-ietf-cat-spkmgss-06.txt January 1996.
GSS Kerberos Protocol
- this protocol supports identity based policies with
unrestricted delegation (CSI level 1) using secret key
technology for keys assigned to both principals and trusted
authorities. It is possible to use it without delegation (so
providing CSI level 0).

The GSS protocol is based on the IETF GSS Kerberos V5
definition, which specifies details of the use of Kerberos
V5 with GSS-API. It includes updates to RFC 1510; e.g., how
to carry delegation information. It is specified in RFC
1964. This itself is a profile of the Kerberos V5 mechanism
as defined in IETF RFC 1510, September 1993.

CSI-ECMA Protocol
- this protocol supports identify and privilege based
policies with controlled delegation (CSI level 2). It can be
used with identity, but no other privileges, and without
delegation restrictions if the administrator permits this
(CSI level 1), and can be used without delegation (CSI level
0).

Is This Answer Correct ?    0 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explain can corba application be tuned for better performance?

897


Does corba define high level application architectures?

862


Compare CORBA security with security of other distributed object computing frameworks such as Java RMI or DCOM?

1858


What would be the most suitable ORB products when buliding a small lab for evaluating, testing and implementing security functions in a CORBA system?

2625


What is corba? What does it do?

881


What about CSI with SSL?

2389


Explain the reason to implement a corba application with multi-threading?

809


Does the existing Authorization Service of CORBASec scale in a "well" distributed-object environment?

2515


Are CORBAsec implementations from the US generally subjected to export control?

2560


Explain are there different threading models that can be used within corba servers?

778


Explain do different corba implementations perform at significantly different levels?

785


What is corba good for?

864


How does corba support interoperability?

796


Explain does corba supports asynchronous communication?

795


Can corba application have call back?

970