Instrumental | bbe7154 | 2018-05-25 12:29:38 -0500 | [diff] [blame] | 1 | .. This work is licensed under a Creative Commons Attribution 4.0 International License. |
| 2 | .. http://creativecommons.org/licenses/by/4.0 |
| 3 | .. Copyright © 2017 AT&T Intellectual Property. All rights reserved. |
| 4 | |
| 5 | Security Architecture |
| 6 | ===================== |
| 7 | Communicating |
| 8 | ------------- |
| 9 | When one compute process needs to communicate to another, it does so with networking. |
| 10 | |
| 11 | The service side is always compute process, but the client can be of two types: |
| 12 | - People (via browser, or perhaps command line tool) |
| 13 | - Compute process talking to another computer process. |
| 14 | |
| 15 | Thus, the essential building blocks of any networked system is made up of |
| 16 | |
| 17 | |
| 18 | In larger systems, it is atypical |
| 19 | |
| 20 | Communicating *Securely* |
| 21 | ------------------------ |
| 22 | Whenever two processing entities exist that need to communicate securely, it is *essential* that |
| 23 | - The communications between the two are encrypted |
| 24 | - The identities of the caller and callee are established (authentication) |
| 25 | - The caller must be allowed to do what it is asking to do (authorization) |
| 26 | |
| 27 | |
| 28 | |
| 29 | |