Authentication and Authorization Infrastructure

Authentication and Authorization Infrastructure (AAI) bezeichnet einen Service und ein Verfahren, Angehörigen unterschiedlicher Institutionen Zugriff auf geschützte Informationsangebote zu ermöglichen, die verteilt auf unterschiedlichen Webservern liegen. Mittels Authentication-and-Authorization-Infrastructure wird geprüft, ob eine Person berechtigt ist, auf eine Ressource zuzugreifen, wobei die Prüfung nicht aufgrund eines zentralen Registers erfolgt, sondern bei der jeweiligen Heimatorganisation der Person, die den Zugriff auf die Ressource wünscht.

In der Schweiz entwickelt die Stiftung SWITCH ein Shibboleth-basiertes AAI-System, das insbesondere den Schweizer Hochschulen hilft, ihre E-Learning-Angebote über die eigenen Institutionengrenzen hinaus den Studierenden zugänglich zu machen. Ausgehend vom Erfolg der SWITCHaai folgen andere Länder mit eigenen AAI-Projekten.


Wikimedia Foundation.

Schlagen Sie auch in anderen Wörterbüchern nach:

  • Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… …   Wikipedia

  • Internet Authentication Service — (IAS) is a component of Windows Server operating systems that provides centralized user authentication and authorization, auditing and accounting. Overview While Routing and Remote Access (RRAS) security is sufficient for small networks, larger… …   Wikipedia

  • Pluggable Authentication Modules — or PAM are a mechanism to integrate multiple low level authentication schemes into a high level application programming interface (API), which allows programs that rely on authentication to be written independently of the underlying… …   Wikipedia

  • Critical Internet infrastructure — is a collective term for all hardware and software systems that constitute essential components in the operation of the Internet. Physical transmission lines of all types, such as wired, fiber optic and microwave links, along with routing… …   Wikipedia

  • Critical internet infrastructure — Physical transmission lines of all types such as wired, fiber optic and microwave links along with routing equipment and the accompanying critical soft services like DNS, email, website hosting, authentication and authorization, storage systems… …   Wikipedia

  • Public key infrastructure — In cryptography, a public key infrastructure (PKI) is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique for each CA. The binding is established through …   Wikipedia

  • Extensible Authentication Protocol — Pour les articles homonymes, voir EAP. Extensible Authentication Protocol (EAP) est un mécanisme d identification universel, fréquemment utilisé dans les réseaux sans fil (ex : de type Wi Fi) et les liaisons point à point. Sommaire 1… …   Wikipédia en Français

  • List of computing and IT abbreviations — This is a list of computing and IT acronyms and abbreviations. Contents: 0–9 A B C D E F G H I J K L M N O P Q R S T U V W X Y …   Wikipedia

  • Identity and Access Management — (IAM) is a concept that combines business processes, policies and technologies that enable companies to: * provide secure access to any resource. * efficiently control this access. * respond faster to changing relationships. * protect… …   Wikipedia

  • Privilege Management Infrastructure — Privilege Management is the process of managing user authorisations based on the ITU T Recommendation X.509. The 2001 edition of X.509 [1] specifies most (but not all) of the components of a Privilege Management Infrastructure (PMI), based on… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”