Common access control model

Access control that is controlling user access to resources or services, popular access control model are the following.

MAC(Mandatory Access Control)

Initially designed and used by the government and the military, it has a very strict access control model.
In the MAC, all privileges predefined by an administrator, and is controlled by the operating system.
MAC achieve a privilege classification of data (such as the important level or security level) and permissions classification of users (departments, projects, etc.), so that when verification can compare authorization level correspondence between the user and the data to know if there access permission.
Only rarely use the MAC, will generally be mixed with other methods, such as UNIX file systems using DAC, but the root account can bypass the access control model is not limited.

DAC(Discretionary Access Control)

And all data and control authority is not the same as the operating system, this allows the user to control access to their own data.
According to the user's identity and group they belong to limit access to the object.
Who or what level the user can define an ACL can access what resources each ACL contains a list of users and groups, and their access rights.
Typically, the system administrator to set a series of common access control permissions.
The key here is that the user can define access to their own resources.

RBAC(Role-Based Access Control)

RBAC company normally used to give access based on the user's position. Here permissions are assigned to roles defined in the above company.
RBAC user is assigned a role, but it contains only have permission roles, methods can not be bypassed.
RBAC separation of duties through the role.

RBAC(Rule-Based Access Control)

Administrators assign permissions based on predefined rules. Each object has its own ACL (access control list), the operating system checks whether the user has that permission.

ABAC(Attribute-Based Access Control)

This model to assign permissions based on specific rules, which combines the user (users), resources (resource) and objects (objects) of properties.
Logic processing is based on the properties of this action, and to determine the role of different properties should meet different requirements.


Refer:
https://www.utilizewindows.com/overview-of-four-main-access-control-models/
https://resources.infosecinstitute.com/access-control-models-and-methods/#gref
https://medium.com/yellow-universe/access-control-models-review-of-types-and-use-cases-1f4c427b0cc2

Guess you like

Origin www.cnblogs.com/helloz/p/11234101.html