Policy management of multiple security domains
First Claim
1. A method, in a data processing system, for centralized policy management of multiple security domains in accordance with an illustrative embodiment, the method comprising:
- receiving an access request at a microprocessor executing a policy enforcement point component in the data processing system, wherein the policy enforcement point component runs in the data processing system and controls access to a sensitive resource on the data processing system, wherein the policy enforcement point component is managed by a plurality of security domains, and wherein the access request requests access to the sensitive resource;
sending an access control query from the policy enforcement point component to a policy broker component running in the data processing system;
responsive to the policy broker component determining no policy decision point component is co-located on the data processing system, sending the access control query to a plurality of policy decision point components associated with the plurality of security domains, receiving independent access decisions from the plurality of policy decision point components, and determining, by the policy broker components, a reconciled access decision that complies with policies of the plurality of security domains based on the independent access decisions received from the plurality of policy decision point components;
returning, by the policy broker component, the reconciled access decision to the policy enforcement point component; and
allowing or rejecting, by the microprocessor executing the policy enforcement point component, the access request on the sensitive resource based on the reconciled access decision.
1 Assignment
0 Petitions
Accused Products
Abstract
A mechanism is provided in a data processing system for centralized policy management of multiple security domains in accordance with an illustrative embodiment. A policy enforcement point component in the data processing system receives an access request. The policy enforcement point component is managed by a plurality of security domains. The policy enforcement point component queries a policy broker component in the data processing system. The policy broker component determines an access decision that complies with policies of the plurality of security domains. It does so by orchestrating a workflow that involves the policy decision, administration, and information components of those domains. The policy broker component returns the access decision to the policy enforcement point component.
13 Citations
20 Claims
-
1. A method, in a data processing system, for centralized policy management of multiple security domains in accordance with an illustrative embodiment, the method comprising:
-
receiving an access request at a microprocessor executing a policy enforcement point component in the data processing system, wherein the policy enforcement point component runs in the data processing system and controls access to a sensitive resource on the data processing system, wherein the policy enforcement point component is managed by a plurality of security domains, and wherein the access request requests access to the sensitive resource; sending an access control query from the policy enforcement point component to a policy broker component running in the data processing system; responsive to the policy broker component determining no policy decision point component is co-located on the data processing system, sending the access control query to a plurality of policy decision point components associated with the plurality of security domains, receiving independent access decisions from the plurality of policy decision point components, and determining, by the policy broker components, a reconciled access decision that complies with policies of the plurality of security domains based on the independent access decisions received from the plurality of policy decision point components; returning, by the policy broker component, the reconciled access decision to the policy enforcement point component; and allowing or rejecting, by the microprocessor executing the policy enforcement point component, the access request on the sensitive resource based on the reconciled access decision. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product comprising a non-transitory computer readable medium having a computer readable program stored therein, wherein the computer readable program, when executed on a computing device, causes the computing device to:
-
receive an access request at a policy enforcement point component in the computing device, wherein the policy enforcement point component runs in the computing device and controls access to a sensitive resource on the computing system, wherein the policy enforcement point component is managed by a plurality of security domains, and wherein the access request requests access to the sensitive resource; send an access control query from the policy enforcement point component to a policy broker component running in the computing device; responsive to the policy broker component determining no policy decision point component is co-located on the computing device, send the access control query to a plurality of policy decision point component associated with the plurality of security domains, receive independent access decision from the plurality of policy decision point components, and determine, by the policy broker component, a reconciled access decision that complies with policies of the plurality of security domains based on the independent access decisions received from the plurality of policy decision point components; return, by the policy broker component, the reconciled access decision to the policy enforcement point component; and allow or reject, by the policy enforcement point component, the access request on the sensitive resource based on the reconciled access decision. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A data processing system, comprising:
-
a processor; and a memory coupled to the processor, wherein the memory comprises instructions which, when executed by the processor, cause the processor to; receive an access request at a policy enforcement point component in the data processing system, wherein the policy enforcement point component runs in the data processing system and controls access to a sensitive resource on the data processing system, wherein the policy enforcement point component is managed by a plurality of security domains, and wherein the access request requests access to the sensitive resource; send an access control query from the policy enforcement point component to a policy broker component running in the data processing system; responsive to the policy broker determining no policy decision point component is co-located on the data processing system, send the access control query to a plurality of policy decision point components associated with the plurality of security domains, receive independent access decisions from the plurality of policy decision point components, and determine, by the policy broker component, a reconciled access decision that complies with policies of the plurality of security domains based on the independent access decisions received from the plurality of policy decision point components; return, by the policy broker component, the reconciled access decision to the policy enforcement point component; and allow or reject, by the policy enforcement point component, the access request on the sensitive resource based on the reconciled access decision. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification