>     My question is, how's a typical authentication delegation implemented
> using SSL? I can visualize a point-to-point authetication happening between
> the client and ServiceA. But, how can I control access to ServiceB's
> resources by ServiceA unless ServiceA is acting on behalf of a authorised
> user? Surely, I dont want ServiceA to know the clients Private key....

Assuming
        Client <--> Service A <--> Service B
I don't believe you can do this with straight SSL.  You will have to
build some extra security protocol on top of, underneath, or "next to"
it.  Simplest is to define a protocol where A can say "treat me like you
would the Client" and B is configured to allow A to do arbitrary
impersonation. You might be able, with participation of the Client, have
A play a man-in-the-middle game.

This is really one of those places where it is important to understand
the subtlies of *transport* level security as opposed to end-to-end. :)
 
>     Wonder how those CORBA ORB-s use SSL for security when delegation is
> involved.

Those who do it right add their own I&A (identification and authorization)
on top of SSL.  There's a reason why (last time I looked) IIOP had its
own security payload.
        /r$

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to