blob: fd10dc9804d951944833e6fea5fa936dfdfdc025 [file] [log] [blame]
Instrumentalbbe71542018-05-25 12:29:38 -05001.. This work is licensed under a Creative Commons Attribution 4.0 International License.
2.. http://creativecommons.org/licenses/by/4.0
3.. Copyright © 2017 AT&T Intellectual Property. All rights reserved.
4
5Security Architecture
6=====================
7Communicating
8-------------
9When one compute process needs to communicate to another, it does so with networking.
10
11The service side is always compute process, but the client can be of two types:
12 - People (via browser, or perhaps command line tool)
13 - Compute process talking to another computer process.
14
15Thus, the essential building blocks of any networked system is made up of
16
17
18In larger systems, it is atypical
19
20Communicating *Securely*
21------------------------
22Whenever two processing entities exist that need to communicate securely, it is *essential* that
23 - The communications between the two are encrypted
24 - The identities of the caller and callee are established (authentication)
25 - The caller must be allowed to do what it is asking to do (authorization)
26
27
28
29