For a large configuration with several hundred users it is undesirable to have to maintain separate keys for each user. In many cases most of the requests will in any case be for data objects stored on the machine cluster itself.
In such a situation it is useful to assign and register a single authentication key for the entire cluster and for messages to specify the roles a user is authorised to perform within the context of the master authentication key.
It is of course essential to ensure that access to the public key is restricted such that it may only be read by client executables trusted not to divulge it to the user. Such an event would be equivalent to the disclosure of the root password.
In the standard configuration a user would be provided with their username as an authorised role plus any roles granted by the operating system (i.e .UNIX groups or VMS rights Identifiers).
For true distributed authorisation a user might be granted additional network roles.
The standard htadm program is used to generate and maintain keys. Use of the new Digest scheme requires passwords to be stored in a different, incompatible format to the UNIX based format used previously. Older password entries may be read and used for the Basic scheme and old and new format passwords may be stored in the same file however.
The standard client rules file is used to specify sets of URLs for which security enhancements are to be made.
In addition to these site specific configuration options HTML texts may incorporate security directives. The configuration rules file is of principal benefit when securing communication between close parties such as those cooperating on the same project.
The current versions of Mosaic use a divergent and largely superceeded variant of CERN libwww. This variant does not incorporate client side rules files and consequently configuration options are more limited than those possible with libwww browsers.
Server installation is similar to that for previous releases of the CERN httpd. The main difference being that the schemes Digest and PubKey may also be specified in a protection file. Encryption of a returned object is enforced by specifying the dummy method ENCRYPT in the .www_acl file.
Phillip M. Hallam-Baker, CERN ECP PTG hallam@alws.cern.ch Henrik Frystyk Nielsen, CERN CN, frystryk@ptsun00.cern.ch Ari Luotonen, CERN ECP (Now at Mosaic Communications Corp)