Extensible Access Control Markup Language (XACML) Version 1.0
Total Page:16
File Type:pdf, Size:1020Kb
1 2 eXtensible Access Control Markup Language 3 (XACML) Version 2.0 4 OASIS Standard, 1 Feb 2005 5 Document Identifier: oasis-access_control-xacml-2.0-core-spec-os 6 Location: http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf 7 Editor: 8 Tim Moses, Entrust Inc. ([email protected]) 9 Abstract: 10 This specification defines version 2.0 of the extensible access-control markup language. 11 Status: 12 This version of the specification is an approved OASIS Standard within the OASIS Access 13 Control TC. 14 Access Control TC members should send comments on this specification to the 15 [email protected] list. Others may use the following link and complete the 16 comment form: http://oasis-open.org/committees/comments/form.php?wg_abbrev=xacml. 17 For information on whether any patents have been disclosed that may be essential to 18 implementing this specification, and any offers of patent licensing terms, please refer to the 19 Intellectual Property Rights section of the Access Control TC web page (http://www.oasis- 20 open.org/committees/tc_home.php?wg_abbrev=xacml). 21 For any errata page for this specification, please refer to the Access Control TC web page 22 (http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml). 23 The non-normative errata page for this specification is located at 24 www.oasis-open.org/committees/access-control. 25 Copyright © OASIS Open 2004-2005 All Rights Reserved. access_control-xacml-2.0-core-spec-os 1 February 2005 Copyright © OASIS Open 2004. All Rights Reserved. Page 1 of 141 26 Table of contents 27 1. Introduction (non-normative).......................................................................................................8 28 1.1. Glossary ............................................................................................................................8 29 1.1.1 Preferred terms..........................................................................................................8 30 1.1.2 Related terms ..........................................................................................................10 31 1.2. Notation ...........................................................................................................................10 32 1.3. Schema organization and namespaces ..........................................................................10 33 2. Background (non-normative) ....................................................................................................11 34 2.1. Requirements ..................................................................................................................11 35 2.2. Rule and policy combining ..............................................................................................12 36 2.3. Combining algorithms......................................................................................................12 37 2.4. Multiple subjects ..............................................................................................................13 38 2.5. Policies based on subject and resource attributes..........................................................13 39 2.6. Multi-valued attributes .....................................................................................................14 40 2.7. Policies based on resource contents...............................................................................14 41 2.8. Operators.........................................................................................................................14 42 2.9. Policy distribution.............................................................................................................15 43 2.10. Policy indexing.................................................................................................................15 44 2.11. Abstraction layer..............................................................................................................16 45 2.12. Actions performed in conjunction with enforcement........................................................16 46 3. Models (non-normative)............................................................................................................16 47 3.1. Data-flow model...............................................................................................................16 48 3.2. XACML context................................................................................................................16 49 3.3. Policy language model ....................................................................................................16 50 3.3.1 Rule .........................................................................................................................16 51 3.3.2 Policy .......................................................................................................................16 52 3.3.3 Policy set .................................................................................................................16 53 4. Examples (non-normative)........................................................................................................16 54 4.1. Example one....................................................................................................................16 55 4.1.1 Example policy ........................................................................................................16 56 4.1.2 Example request context.........................................................................................16 57 4.1.3 Example response context ......................................................................................16 58 4.2. Example two ....................................................................................................................16 59 4.2.1 Example medical record instance ...........................................................................16 60 4.2.2 Example request context.........................................................................................16 61 4.2.3 Example plain-language rules .................................................................................16 access_control-xacml-2.0-core-spec-os 1 February 2005 Copyright © OASIS Open 2004. All Rights Reserved. Page 2 of 141 62 4.2.4 Example XACML rule instances..............................................................................16 63 5. Policy syntax (normative, with the exception of the schema fragments)..................................16 64 5.1. Element <PolicySet> .......................................................................................................16 65 5.2. Element <Description> ....................................................................................................16 66 5.3. Element <PolicySetDefaults>..........................................................................................16 67 5.4. Element <XPathVersion> ................................................................................................16 68 5.5. Element <Target>............................................................................................................16 69 5.6. Element <Subjects> ........................................................................................................16 70 5.7. Element <Subject> ..........................................................................................................16 71 5.8. Element <SubjectMatch> ................................................................................................16 72 5.9. Element <Resources>.....................................................................................................16 73 5.10. Element <Resource>.......................................................................................................16 74 5.11. Element <ResourceMatch>.............................................................................................16 75 5.12. Element <Actions> ..........................................................................................................16 76 5.13. Element <Action> ............................................................................................................16 77 5.14. Element <ActionMatch> ..................................................................................................16 78 5.15. Element <Environments> ................................................................................................16 79 5.16. Element <Environment>..................................................................................................16 80 5.17. Element <EnvironmentMatch> ........................................................................................16 81 5.18. Element <PolicySetIdReference> ...................................................................................16 82 5.19. Element <PolicyIdReference>.........................................................................................16 83 5.20. Simple type VersionType.................................................................................................16 84 5.21. Simple type VersionMatchType.......................................................................................16 85 5.22. Element <Policy>.............................................................................................................16 86 5.23. Element <PolicyDefaults> ...............................................................................................16