Secure Download Service Imprint

Secure Download Service Imprint

DISCUSSION PAPER Secure Download Service Imprint Publisher Federal Ministry for Economic Affairs and Energy (BMWi) Public Relations 11019 Berlin www.bmwi.de Text and editing Plattform Industrie 4.0 Bülowstraße 78 10783 Berlin Design PRpetuum GmbH, 80801 Munich Status October 2020 This publication is available for download only. Picture credits Plattform Industrie 4.0; spainter_vfx – iStockphoto (Title) This publication is issued by the Federal Ministry of Economic Affairs and Energy as part of its public relations work. The pub- lication is distributed free of charge and is not intended for sale. It may not be used by political parties or by election campaign- Central ordering service for publications ers or election assistants during an election campaign for the of the Federal Government: purpose of election advertising. This applies to elections to the Email: [email protected] Bundestag, the Landtag and local elections as well as to elec- Tel.: +49 30 182722721 tions to European Parliament. Fax: +49 30 18102722721 2 Content 1. Introduction..............................................................................................................................................................................................................................................4 1.1 Content and aim of this discussion paper ............................................................................................................................................................ 5 2. Application scenario ..........................................................................................................................................................................................................................6 2.1 Overview ........................................................................................................................................................................................................................................ 7 2.2 Transfer of engineering data........................................................................................................................................................................................... 7 3. Assumptions and requirements...............................................................................................................................................................................................9 3.1 Requirements............................................................................................................................................................................................................................11 3.1.1 Provisioning of the requested data ...........................................................................................................................................................11 3.1.2 Authorisation.............................................................................................................................................................................................................11 3.1.3 Authentication..........................................................................................................................................................................................................11 3.1.4 Scalability......................................................................................................................................................................................................................11 4. Outline solution/discussion.....................................................................................................................................................................................................12 4.1 HTTPS/REST communication protocols ............................................................................................................................................................13 4.1.1 Handshake between the parties ..................................................................................................................................................................13 4.2 Identity management using OpenID Connect ...............................................................................................................................................13 4.2.1 Authorisation using ABAC...............................................................................................................................................................................16 4.2.2 Authentication using secure, cryptographic methods...............................................................................................................16 4.2.3 Mutual agreement on trust anchors ........................................................................................................................................................16 5. Token-based authentication ....................................................................................................................................................................................................18 5.1 Use of certificates for mutual authentication in TLS .................................................................................................................................19 5.2 Use of tokens for authentication using cryptographic keys .................................................................................................................20 5.2.1 Cryptographically secure authentication using the private_key_jwt method.........................................................20 5.2.2 Proposed private_key_certchain_jwt method...................................................................................................................................21 CONTENT 3 6. Example of the structure of a download session....................................................................................................................................................23 6.1 Handshake for automatic access................................................................................................................................................................................24 6.1.1 Reference to the authentication server .................................................................................................................................................25 6.1.2 Client response .........................................................................................................................................................................................................25 6.1.3 Authentication server response...................................................................................................................................................................26 6.1.4 Resource server response..................................................................................................................................................................................26 6.1.5 Demonstrator ............................................................................................................................................................................................................26 7. Summary and outlook ..................................................................................................................................................................................................................27 8. Glossary ......................................................................................................................................................................................................................................................29 9. List of figures . .30 10. References ................................................................................................................................................................................................................................................31 11. Technical details of the proposed solution concept ............................................................................................................................................32 11.1 Example of a process of authentication and authorisation ..................................................................................................................32 11.2 Format of a “private_key_certchain_jwt” token .............................................................................................................................................33 11.2.1 Sample tokens ...........................................................................................................................................................................................................35 1. Introduction 1. INTRODUCTION 5 The interoperable retrieval of engineering data is crucial (HTTPS/ REST), identity management and authentication to the implementation of Industrie 4.0. To this end, it is in particular are discussed, taking OpenID Connect as an imperative that the requirements for interoperability are example. The formats and content of the data are discussed specified for both the contents and the data that are trans- elsewhere in other documents, primarily in the series entitled ferred and for the formats and protocols. Interoperability “Details of the Asset Administration Shell” (2). In this dis- also includes the security

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    40 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us