AS/NZS 4019.8:1996
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
Information technology - Open Systems Interconnection - The Directory Authentication framework
Hardcopy , PDF 1 User , PDF 3 Users , PDF 5 Users , PDF 9 Users
30-06-2017
English
05-05-1996
Specifies a framework for the provision of authentication services by the Directory to its users. These users include the Directory itself as well as other applications and services. This Standard is identical with and has been reproduced from ISO/IEC 9594-8:1995.
Committee |
IT-001
|
DocumentType |
Standard
|
ISBN |
0 7337 0426 3
|
Pages |
35
|
ProductNote |
To run concurrently with AS 4019.8-1992
|
PublisherName |
Standards Australia
|
Status |
Withdrawn
|
Supersedes |
This Recommendation International Standard:- specifies the form of authentication information held by the Directory;- describes how authentication information may be obtained from the Directory;- states the assumptions made about how authentication information is formed and placed in the Directory;- defines three ways in which applications may use this authentication information to perform authentication and describes how other security services may be supported by authentication.This Recommendation International Standard describes two levels of authentication: simple authentication, using a password as a verification of claimed identity; and strong authentication, involving credentials formed using cryptographic techniques. While simple authentication offers some limited protection against unauthorized access, only strong authentication should be used as the basis for providing secure services. It is not intended to establish this as a general framework for authentication, but it can be of general use for applications which consider these techniques adequate.Authentication (and other security services) can only be provided within the context of a defined security policy. It is a matter for users of an application to define their own security policy which may be constrained by the services provided by a standard.It is a matter for standards defining applications which use the authentication framework to specify the protocol exchanges which need to be performed in order to achieve authentication based upon the authentication information obtained from the Directory. The protocol used by applications to obtain credentials from the Directory is the Directory Access Protocol (DAP), specified in ITU-T Recommendation X.519 ISO/IEC 9594-5.The strong authentication method specified in this Recommendation International Standard is based upon public-key cryptosystems. It is a major advantage of such systems that user certificates may be held within the Directory as attributes, and may be freely communicated within the Directory System and obtained by users of the Directory in the same manner as other Directory information. The user certificates are assumed to be formed by "off-line" means, and placed in the Directory by their creator. The generation of user certificates is performed by some off-line Certification Authority which is completely separate from the DSAs in the Directory. In particular, no special requirements are placed upon Directory providers to store or communicate user certificates in a secure manner.A brief introduction to public-key cryptography can be found in Annex C.In general, the authentication framework is not dependent on the use of a particular cryptographic algorithm, provided it has the properties described in 7.1. Potentially a number of different algorithms may be used. However, two users wishing to authenticate shall support the same cryptographic algorithm for authentication to be performed correctly. Thus, within the context of a set of related applications, the choice of a single algorithm will serve to maximize the community of users able to authenticate and communicate securely. One example of a public key cryptographic algorithm can be found in Annex D.Similarly, two users wishing to authenticate shall support the same hash function [see 3.3 f)] (used in forming credentials and authentication tokens). Again, in principle, a number of alternative hash functions could be used, at the cost of narrowing the communities of users able to authenticate. A brief introduction to hash functions can be found in Annex E.
Standards | Relationship |
ISO/IEC 9594-8:1995 | Identical |
First published in Australia as AS 4019.8-1992.
Jointly revised and designated AS/NZS 4019.8:1996.
AS/NZS 4019.7:1996 | Information technology - Open Systems Interconnection - The Directory Selected object classes |
AS 2777.2-1990 | Information processing systems - Open systems interconnection - Basic reference model Security architecture |
AS/NZS 4019.1:1996 | Information technology - Open Systems Interconnection - The Directory Overview of concepts, models and services |
AS/NZS 4019.2:1996 | Information technology - Open Systems Interconnection - The Directory Models |
AS/NZS 4019.4:1996 | Information technology - Open Systems Interconnection - The Directory Procedures for distributed operation |
AS/NZS 4019.6:1996 | Information technology - Open Systems Interconnection - The Directory Selected attribute types |
AS/NZS 4019.3:1996 | Information technology - Open Systems Interconnection - The Directory Abstract service definition |
AS/NZS 4019.5:1996 | Information technology - Open Systems Interconnection - The Directory Protocol specifications |
AS/NZS 4019.9:1996 | Information technology - Open Systems Interconnection - The Directory Replication |
AS/NZS 4019.9:1996 | Information technology - Open Systems Interconnection - The Directory Replication |
AS/NZS 4019.1:1996 | Information technology - Open Systems Interconnection - The Directory Overview of concepts, models and services |
AS/NZS 4019.7:1996 | Information technology - Open Systems Interconnection - The Directory Selected object classes |
AS 4033.8-1998 | Information technology - Text communication - Message-oriented text interchange systems Electronic data interchange messaging service |
MP 75-1996 | Strategies for the implementation of a Public Key Authentication Framework (PKAF) in Australia |
AS 4033.1-1992 | Information technology - Text communication - Message-oriented text interchange systems System and service overview |
AS 4588-1999 | Automatic fee collection - Interface specification for clearing between operators |
AS/NZS 4019.5:1996 | Information technology - Open Systems Interconnection - The Directory Protocol specifications |
AS/NZS 4019.4:1996 | Information technology - Open Systems Interconnection - The Directory Procedures for distributed operation |
AS 4033.5-1998 | Information technology - Text communication - Message-oriented text interchange systems Message store - Abstract service definition |
AS 4033.9-1998 | Information technology - Text communication - Message-oriented text interchange systems Electronic data interchange messaging system |
AS/NZS 4019.6:1996 | Information technology - Open Systems Interconnection - The Directory Selected attribute types |
AS/NZS 4019.2:1996 | Information technology - Open Systems Interconnection - The Directory Models |
AS/NZS 4019.3:1996 | Information technology - Open Systems Interconnection - The Directory Abstract service definition |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.