throbber
4/23/2019
`
`Access Management of Web-based Services: An Incremental Approach to Cross-organizational Authentication and Authorization
`
`D-Lib Magazine
`September 1998
`
`ISSN 1082-9873
`
`Access Management of Web-based Services
`
`An Incremental Approach to Cross-organizational Authentication and Authorization
`
`Ariel Glenn and David Millman
`Columbia University
`
`New York, New York
`ariel@columbia.edu
`
`dsm@columbia.edu
`
`
`
`Abstract
`
`We describe the construction of access management "broker" software for web-based services in a university setting. The
`broker works with an existing institutional ID and directory infrastructure, permits delivery of complex remote services from
`providers outside of the home organization, and provides user attributes to remote service providers. We discuss ways in
`which the broker might be used to develop a cross-organizational access management system.
`
`1.0 Introduction
`
`Cross-organizational access management for web-based resources has emerged as a topic of great interest among many information
`consuming institutions and information resource providers. These organizations wish, as precisely and as (cid:193)exibly as possible, to enable
`access to particular networked resources to particular members of institutional consumer communities. Access should be simple for the
`user, should guarantee a large measure of privacy to the user, should not depend entirely on the user's location or network address but
`rather on the user's membership in appropriate communities, and should provide necessary management and demographic information to
`institutional consumer administrators and to resource providers. Here, we will describe several architectural models for such cross-
`organizational access management services now under development at Columbia University.
`
`A (cid:193)exible and robust access management service is more than a technical architecture; it must also address a number of other dif(cid:192)cult
`issues, including policy and infrastructure considerations, deployment of technology in an uncertain market and broad consensus and
`development of standards among key players. Clifford Lynch [Lynch98] has recently provided an excellent summary and discussion of
`the issues and the state of the art in cross-organizational authentication and access management. While we will touch on many of these
`issues as they pertain to our motivation and our work, we refer the interested reader to Lynch's comprehensive and thoughtful document
`for additional context.
`
`Below, we will discuss the history of our institutional access management systems and our motivation for our current work; we will
`describe our proposed architecture models; we will discuss some outstanding issues out of the scope of our proposal; and we will indicate
`the directions we feel are appropriate next steps or areas requiring new research.
`
`2.0 History and Motivation
`
`Two technical infrastructure components are minimally required for an institutional access management system: the ability of a user to
`obtain an identity on the network, known as authentication; and the ability to correlate a user's identity with rights and permissions to use
`various services, called authorization.
`
`Often these two services are combined in simple ways which blur their distinction, such as the UNIX implementation of (cid:192)le permission
`policy through group membership, "uids" and "gids." More robust and scalable authentication and authorization services may instead
`arise independently and be supported by special purpose systems rather than as side-effects of particular operating systems or other
`technologies.
`
`Management systems for computer identities at Columbia University began in 1983, by deploying a simple database to consolidate and
`manage e-mail accounts for a quickly growing population. Over the next several years, the process became increasingly automated and
`complex, with data feeds of potential e-mail users arriving from the personnel and student administrative systems, from af(cid:192)liate
`institutions, and from the libraries. By 1990, we found our database to be the most authoritative directory of individuals on campus, so we
`initiated an on-line "phone book" lookup service. Soon after, we participated in the NYSERnet X.500 directory pilot. We also began an
`experiment with the Kerberos authentication software [Col92]. Kerberos does not require a directory entry, only a unique identi(cid:192)er for an
`individual and the person's password. In "pure" Kerberos environments, a "Kerberos login" enables secure network communication
`within a local jurisdiction, and can be logically decoupled from e-mail accounts or particular timesharing systems. But we did not have
`such an environment and had no immediate practical use for our Kerberos service.
`
`Meanwhile, Columbia had developed a terminal-based "Campus-Wide Information System," called ColumbiaNet, in 1988. At the time, it
`was one of a number of such systems underway at several universities, offering anonymous online public access to such things as class,
`shuttle bus and gym schedules, campus events, and, of course for us, the phone book directory. When the "Gopher" protocol emerged as a
`
`https://web.archive.org/web/19981202112253/http:/dlib.org/dlib/september98/millman/09millman.html
`
`1/7
`
`Dropbox 1117
`
`

`

`4/23/2019
`
`Access Management of Web-based Services: An Incremental Approach to Cross-organizational Authentication and Authorization
`standard for exchange of public information over the Internet, ColumbiaNet embraced it and extended it. ColumbiaNet became our
`transition software to offer multiple library catalogs in a single interface; and we began plans to develop it into a gateway to remote
`licensed online resources, such as the RLG and OCLC catalogs (RLIN, FirstSearch) and full-text reference books from our university
`press.
`
`For licensed services, totally anonymous access was no longer possible. We had the Kerberos infrastructure available to identify, with id
`and password, any of the now 60,000 individuals known to us from our many directory feeds -- our extended community in some sense.
`But only a subset, the students and employees of Columbia, were covered by our licenses. We began to employ our directory service in
`order to screen individuals for access. In 1992, the ColumbiaNet application became the (cid:192)rst "customer" of combined authentication and
`authorization services. Kerberos authenticates individuals, but for services only as deemed appropriate through the screening process.
`And ColumbiaNet, a terminal-based gateway, was able to invisibly "script" the login negotiation with remote service providers, thus
`acting as both an institutional (cid:192)lter for incoming users and as a trusted institutional "representative" to remote services.
`
`Lately, our nearly total migration to the web incorporated most of these same mechanisms, with end-to-end encryption on the network
`(SSL), updated to the current directory standards (LDAP) and with our institutional Kerberos identity infrastructure intact by local
`modi(cid:192)cation to our web server (Figure 1). But the web architecture, while providing tremendous new capabilities for so many -- and so
`many new users -- has largely disabled our institutional ability to act as a trusted mediator, to offer-up our pre-screened population to
`remote service providers.
`
`The prevalent web architecture today relies on a more fundamental, and for us an older, method of access policy: by Internet address ("IP
`source address"). This method identi(cid:192)es the topological location of a user on the network. Many institutions have also deployed web
`proxy servers, which alleviate some of the access management dif(cid:192)culties of the basic IP source address method. The drawbacks and
`trade-offs of these methods have been discussed at length elsewhere, and most recently in the Lynch paper. But neither of these methods
`enable access management based on the characteristics of the user. They provide authentication and authorization in a single, imprecise
`step, based primarily on network location.
`
`As remote service providers create increasingly sophisticated services which are customized to individual users, they (cid:192)nd they must
`implement independent user "registration" infrastructures: essentially building duplicate id, password, and user-pro(cid:192)le systems for
`populations that are already part of well established and carefully maintained institutional id systems and directories at their "home"
`institutions. This is an unfortunate duplication of effort for the provider and annoyance to the user (who must login to each such service
`independently). Its problems are compounded by its underlying security model: still largely by IP source address or proxy web server.
`
`3.0 Architecture
`
`Given these limitations in the existing approaches and the redundant efforts required, we have been investigating alternative architectures
`which can leverage the existing authentication and authorization databases at the local organization based on the following guidelines:
`
`It must be a real-world solution; that is, it must take into account the browsers and web servers currently in use, existing ID and
`directory systems and an average level of user expertise. Web server modi(cid:192)cations must be as modular and as simple to maintain as
`possible.
`
`It should allow the retrieval of user information (user "attributes") when speci(cid:192)cally needed for the business of a service (for
`example, a user's fax number for a document delivery service), while otherwise protecting user information from illegal or
`inappropriate use. For example, student information is strongly protected in the U.S. by the "FERPA" legislation [Col97]. The
`American Library Association has adopted a set of privacy guidelines as well, re(cid:193)ecting the public's heightened concerns that
`personal information will be collected and used without the individual's consent [ALA94].
`
`It should protect any user "secrets." In particular, a user's password may never travel across the network in the clear.
`
`It should restrict access to services with the desired granularity. For example, some services may be provided to the entire
`Columbia University student and alumni population; others might be provided to all registered students in a particular set of
`departments; still others might be restricted to department heads and department administrators.
`
`It should be reasonably ef(cid:192)cient, both in terms of Web server processing and in terms of network traf(cid:192)c.
`
`It should be as painless to manage and to scale as current technology permits.
`
`In the descriptions of architecture models below, we use a few terms in specialized ways:
`
`credentials,
`refer to information needed to authenticate a user, most commonly a user id and a password; but other methods, such as a digital
`certi(cid:192)cate or "smartcard" are possible.
`third-party,
`is a service provider outside of the local organization.
`attribute,
`is typically found in an institutional directory service. It is a characteristic of an individual user, which can be more precise (e.g., a
`name) or less precise (membership in an arbitrary group).
`
`3.1 Initial Model
`
`As described above, our web service includes a locally customized server module. In this model, both the user and the service provider
`are members of the same institution.
`
`(cid:172)
`
`https://web.archive.org/web/19981202112253/http:/dlib.org/dlib/september98/millman/09millman.html
`
`2/7
`
`

`

`4/23/2019
`
`Access Management of Web-based Services: An Incremental Approach to Cross-organizational Authentication and Authorization
`
`Figure 1. Simple Web Access Management and Messaging Flow
`
`(cid:172) A
`
` single transaction in this scenario would proceed as follows:
`
`1. User requests a restricted service.
`
`2. Web server asks browser for user credentials.
`
`3. Browser prompts user for name and password, and resubmits the request with these user credentials.
`
`4. Web server's access management module passes user's credentials to institutional validation system to check if the credentials are
`valid (Kerberos in this example).
`
`5. Web server's access management module collects user attributes from institutional directory system (LDAP in this example). Based
`on the user's attributes it determines whether the user is permitted to access the requested service. For example, the user must be a
`member of a particular class.
`
`6. Web server delivers the service.
`
`This is an improvement over the plain vanilla web authentication provided by a typical web server; it allows the server to leverage the
`existing infrastructure of the institutional ID system and directory. It assumes that there is a secure communication channel (SSL)
`between the browser and the web server.
`
`The access management module maintains a cache of user credentials and attributes so that it need not contact the authentication and
`directory systems for every user request. A user might request a document containing 20 restricted images; the institutional validation and
`directory systems will be contacted only once.
`
`Public facilities pose their traditional problems in this model. User credentials are kept in the browser until the browser is closed or until
`the user logs out (typically by requesting a URL which asks the user to explicitly erase the stored password). In this model, user
`credentials do not expire, and there is no provision in the web protocol for the server to demand fresh credentials. Therefore, if the user
`does not remember to log out or exit the browser, the next user who sits down at the same workstation will inherit their credentials and
`capabilities.
`
`This model does not scale well. If more than one such web server exists at the institution, each must be modi(cid:192)ed to communicate with the
`institutional authentication and directory systems. Any change to institutional authentication or directory systems requires a change to all
`modi(cid:192)ed servers. If there is more than one institutional authentication or directory system in use, the server has no means of choosing
`which one to use. And this method cannot be scaled to access management between an institution and a remote service provider. Each
`web server providing restricted services would need to support the authentication and directory systems of all subscribers to its services;
`this would rapidly become unmanageable.
`
`3.2 Broker Model
`
`Almost immediately, we required more than a single directory system: the alumni of(cid:192)ces and certain (cid:192)nancial centers at our institution
`already maintained independent directory systems, wished to continue using them, but also wished to incorporate these existing systems
`into our access management process. Therefore, we attempted a more scalable architecture by introducing a "broker" service to
`consolidate and generalize access management. This service includes a new Access Management Broker server and a new plug-in
`module for web servers.
`
`(cid:172)
`
`https://web.archive.org/web/19981202112253/http:/dlib.org/dlib/september98/millman/09millman.html
`
`3/7
`
`

`

`4/23/2019
`
`Access Management of Web-based Services: An Incremental Approach to Cross-organizational Authentication and Authorization
`
`Figure 2. Access Management via a Broker
`
`(cid:172) I
`
`n this model, requirements for granting service are encoded, in advance, in sets of "rules." The new Access Management Broker server
`uses a particular rule to decide which authentication and authorization components to use (perhaps several) and how to combine and
`interpret the information retrieved from them. The protocol between web server and broker server permits the web server to suggest a
`preferred rule.
`
`A single transaction would thus be:
`
`1. User requests a restricted service.
`
`2. Web server asks browser for user credentials.
`
`3. Browser prompts user for name and password, and resubmits the request with user credentials.
`
`4. Web server's access management module sends to the broker: the user's credentials, the service desired by the user, and any user
`attributes it wishes sent back.
`
`5. Broker determines which authentication and authorization rule to use based on the requesting host and the requested service.
`Broker passes user's credentials to the appropriate authentication system to check the credentials.
`
`6. Broker uses the same rule to collect user attributes from the appropriate institutional directory system(s). It then determines, based
`on the user's attributes, whether the user is permitted to access the requested service.
`
`7. Broker noti(cid:192)es the web server whether user is permitted to access to the service and also returns any permissible user attributes
`which may have been requested by the web server.
`
`8. Web server provides access to the service.
`
`This model has some nice properties. Maintenance is much easier: web servers need only to talk to the broker through a single protocol;
`changes made to institutional ID or directory systems are re(cid:193)ected by changes in the broker software and nowhere else. The broker
`maintains a cache of credentials and attributes, preserving the performance of the previous model. A web server may request that a cache
`entry be considered stale beyond some interval, or it might request live veri(cid:192)cation every time for increased security at the expense of
`performance.
`
`User privacy is also better protected in this model. The entire directory (names, demographics, all user attributes) is no longer known to
`the web server by default. A web server must explicitly request any user attributes it requires for business (e.g., a fax number if the
`service to be performed requires fax to the user, or a cost center identi(cid:192)cation). Broker server rules can therefore implement useful access
`management policies in a manner similar to that suggested by Arms [Arms98]. (It is conceivable that a rogue web server could make
`multiple broker requests and derive considerable user demographics by statistical methods, but this is detectable by auditing broker
`transactions and is, in any case, unlikely within an institution.)
`
`3.3 Cross-Organizational Access Management by Proxy -- an Interim Approach?
`
`The above methods cannot be extended out of an institution because the user name and password still move through the web server
`unencrypted. In a cross-organizational setting, that web server would be operated by a remote, or "third-party" service provider, i.e., a
`provider at another institution, commercial or otherwise. It was not acceptable to permit our user names and passwords to travel either
`across the Internet unencrypted or through a remote server managed by an outside organization. As a (cid:192)rst attempt to solve this, we
`proposed to channel all requests for such third-party services through a proxy.
`
`(cid:172)
`
`https://web.archive.org/web/19981202112253/http:/dlib.org/dlib/september98/millman/09millman.html
`
`4/7
`
`

`

`4/23/2019
`
`Access Management of Web-based Services: An Incremental Approach to Cross-organizational Authentication and Authorization
`
`
`Figure 3. Cross-Organizational Access Management through Institutional Proxy
`
`his interaction might work like this:
`
`(cid:172) T
`
`(Note step 0: the user must have previously authenticated with the proxy in order to use it. These credentials are present in every request
`the user sends to the proxy and are kept in the proxy's cache.)
`
`1. User requests a restricted service through proxy.
`
`2. Proxy forwards request for restricted service to third-party server.
`
`3. Third-party server asks proxy for user credentials.
`
`4. Proxy checks user credentials from cache with broker, including an identi(cid:192)er for the third-party and the name of the restricted
`service as additional parameters.
`
`5. Broker validates user credentials as before.
`
`6. Broker does authorization check as before.
`
`7. Broker sends result back to proxy.
`
`8. Proxy sends an institutional credential previously agreed upon with the service provider back to the third-party server along with
`the user's request for service.
`
`9. Third-party server checks the institutional credential against a local table, veri(cid:192)es it, and allows proxy access to the service.
`
`10. Proxy forwards service to user.
`
`Future requests from the user for the same service must be intercepted by the proxy so that the institutional credential can be passed along
`to the third-party service provider with the request.
`
`This setup is relatively easy to roll out quickly, as it requires modi(cid:192)cations only to the institutional proxy server. But it has the usual
`drawbacks associated with proxies: if the proxy does not handle all requests, the user is initially directed to the proxy through another
`resource at the user's institution. In this case, absolute URLs in documents returned from the third-party through the proxy must be
`rewritten to point back to the proxy; and relative URLs must be rewritten so that the proxy recognizes them as requests to forward. If the
`proxy handles all traf(cid:192)c, it may become a bottleneck.
`
`There is no mechanism in this method for the third-party service provider to retrieve user attributes when required. We considered this a
`big disadvantage. And this method encourages service providers to allow access based on a (cid:192)xed password, the institutional credential.
`While that seems to be the state of the art today, we prefer not to encourage its continued use. Fixed institutional passwords should be
`carefully guarded because they enable transactions to be performed on behalf of an entire institution; but the prevalent procedures for
`establishing and maintaining them with service providers is subject to many kinds of compromise.
`
`Since many institutions are moving towards the use of proxies as gateways to third-party services, this model may be a natural (cid:192)rst step
`for them. However, we continued our investigation in search of a model better suited to our needs.
`
`3.4 Cross-Organizational Access Management via Cryptographic Module
`
`This model is still in development but appears to have the best long-term promise. As of the Spring of 1998, both the Netscape and the
`Microsoft Explorer browsers are able to incorporate cryptographic plug-in modules.
`
`We are now developing a PKCS#11 module [RSA1] for the Netscape browser in Unix. Once this has been tested, we will look into
`moving it to other platforms and browsers.
`
`(cid:172)
`
`https://web.archive.org/web/19981202112253/http:/dlib.org/dlib/september98/millman/09millman.html
`
`5/7
`
`

`

`4/23/2019
`
`Access Management of Web-based Services: An Incremental Approach to Cross-organizational Authentication and Authorization
`
`Figure 4. Access Management with Certi(cid:192)cate
`
`Before any services are requested, the user must activate the browser module. This is currently done in Netscape by choosing the module
`and selecting "login." The user will be prompted for a "PIN" and responds with an id, password and an identi(cid:192)cation of the local
`institutional access management broker.
`
`1. The browser module, acting over a secure channel, contacts the broker and presents the user's credentials (id and password) and the
`preferred processing rule for the broker.
`
`2. The broker validates the user, as described above, and then obtains or generates a temporary private key and a temporary digital
`certi(cid:192)cate, which are returned back to the module. The certi(cid:192)cate contains the address of the broker and an opaque identi(cid:192)er of the
`user, again temporary, and known only to the broker. This new certi(cid:192)cate is then available within the browser for subsequent use
`with third-party services. In current browsers, the user must then explicitly select it, indicating a desire to be "known" by this
`identity.
`
`3. Again, we have provided a server plug-in which handles the broker communication at remote, third-party providers. Third-party
`service providers use this server plug-in and use SSL (secure channel). The user's new certi(cid:192)cate is sent to the third-party server
`during initialization of the SSL channel. The plug-in will use the certi(cid:192)cate as the user's credentials rather than id and password.
`
`4. Because the certi(cid:192)cate contains the address of the broker, the third-party server can establish contact with that broker, send it the
`user's certi(cid:192)cate, the class of service it plans to provide, and any further user attributes to be retrieved back for business purposes.
`
`5. The broker can perform authentications as above and return authentication and any requested (and permitted) attributes back to the
`third-party.
`
`6. The service is delivered to the user.
`
`This model appears the most secure and most (cid:193)exible of any. Because the certi(cid:192)cates are temporary, we avoid several administrative
`problems usually associated with certi(cid:192)cates: we do not need to establish a complex distribution system or invent special methods to
`accommodate people using more than one workstation; we do not need long-term revocation lists; and we do not need escrow and key
`recovery infrastructures. Because a single certi(cid:192)cate is installed by the browser module for all transactions, users do not require extensive
`training in certi(cid:192)cate handling (installation, update, etc.) although they do need to be educated about the use of the browser module itself.
`
`We continue to re(cid:192)ne the protocol and the requirements for third-parties.
`
`We also need to further re(cid:192)ne our de(cid:192)nition of "temporary". When a certi(cid:192)cate expires, the user must explicitly obtain a new one. If
`certi(cid:192)cates expire very quickly, it can be inconvenient for users and may also create a signi(cid:192)cant computational strain for the system
`which is generating them. If they expire too slowly, they are no longer useful on public or shared workstations and, ultimately, lose the
`bene(cid:192)ts described above.
`
`4. Related Issues and Future Work
`
`Much work is being done in this area as other large research institutions face similar problems. Several web access management systems
`leverage pre-existing Kerberos ID infrastructures, either by using a callback to the user's workstation, invoked by the web server, as
`Stanford's WebAuth does [STANFORD1] or by using a browser plug-in, invoked by a document with a special MIME type, as in CMU's
`Minotaur [CMU1]. Others, such as North Carolina State's Web Realm Authentication Protocol ("WRAP") [NC1], use HTTP's basic
`authentication to retrieve a user id and password and then, by a combination of setting "cookies" and redirecting from one server to
`another, enable the user to authenticate with the user's institutional "Web Authorization Server" and then return to the original resource.
`
`None of these approaches quite met our needs; they were designed to solve somewhat different problems. None was explicitly designed
`for general inter-organizational access management. WRAP permits a limited form of inter-organizational management, but without the
`ability to use arbitrary user attributes (it employs only the user's name and institutional af(cid:192)liation). We wanted to enable any subset of a
`user community to access a service. Additionally, we were reluctant to rely on cookies as part of our access management mechanism:
`cookies were designed explicitly for user tracking and so may not be shared across Internet DNS domains, which limits their utility for
`our purposes, and their use in user tracking has raised legitimate privacy concerns [EPIC1].
`
`Several areas remain to be explored as we continue work on this project.
`
`While our use of digital certi(cid:192)cates is temporary for end users, the broker and the web servers do require a public key infrastructure to
`manage their own certi(cid:192)cates and their associated keys. A (cid:192)rst step might be the establishment of a trusted directory from which broker
`certi(cid:192)cates could be retrieved and where revocation lists might be posted. Real-time modi(cid:192)cations of entries in this directory must be
`supported while maintaining data integrity.
`
`https://web.archive.org/web/19981202112253/http:/dlib.org/dlib/september98/millman/09millman.html
`
`6/7
`
`

`

`4/23/2019
`
`Access Management of Web-based Services: An Incremental Approach to Cross-organizational Authentication and Authorization
`We need to think about ways to link disjoint ID and directory systems that operate within the same institution, for purposes of attribute
`retrieval. Attributes must be associated with the same user entity no matter which of several different disjoint ID systems may have been
`used to validate the user's credentials. Attributes must be marked by their source directory.
`
`While attribute names and values may differ from one institution to another (and even within institutions), we should standardize the
`names of user attributes that might be requested from a broker. X.500 may be a useful starting point for this [X.500]. Translating standard
`attribute names into the varying names used within an institution is yet another task. We might also consider standardizing the format of
`service names that are reported to brokers, depending on the type of service provided.
`
`A user's attributes may be distributed across more than one institution, i.e., the user is a member of more than one community. In this
`case, one organization's broker may need to consult another broker, at another organization, to retrieve certain user attributes.
`
`Generally, we see a need for a better understanding of user identity and communities in the networked environment. Membership in
`networked communities is increasingly important, and many areas of research, including legal and public policy, play as critical a role as
`the technology work we have described here.
`
`References
`
`[ALA94] OITP, American Library Association. Principles for the Development of the National Information Infrastructure. June 29, 1994.
`http://www.ala.org/oitp/principles.html
`
`[Arms98] W. Arms. Implementing Policies for Access Management. D-Lib Magazine. February 1998.
`http://www.dlib.org/dlib/february98/arms/02arms.html
`
`[CMU1] Computing Services, Carnegie Mellon University. Project Minotaur. http://andrew2.andrew.cmu.edu/minotaur/
`
`[Col92] Columbia University - Presbyterian Hospital Committee on Data Security. Network User Authorization and Authorization
`Architecture. June 16, 1992. ftp://ftp.columbia.edu/cpsec/nua.ps
`
`[Col97] Student Services Of(cid:192)ce, Columbia University. "Appendix A: Policy on Access to Student Records under the Federal Family
`Educational Rights and Privacy Act (FERPA) of 1974." Facets -- Facts About Columbia Essential to Students. 1997.
`http://www.columbia.edu/cu/facets/50.html
`
`[EPIC1] Electronic Privacy Information Center. The Cookies Page. http://www.epic.org/privacy/internet/cookies/
`
`[Lynch98] C. Lynch, ed. A White Paper on Authentication and Access Management Issues in Cross-organizational Use of Networked
`Information Resources. Coalition for Networked Information. Revised Discussion Draft of April 14, 1998.
`http://www.cni.org/projects/authentication/authentication-wp.html
`
`[NC1] Web Services, NC State University. Welcome 2 WRAP. http://www.ncsu.edu/wrap/
`
`[RSA1] RSA Laboratories. PKCS-11: Cryptographic Token Interface Standard. April 15, 1997.
`http://www.rsa.com/rsalabs/pubs/PKCS/html/pkcs-11.html
`
`[STANFORD1] Stanford University Web Authentication. http://www.stanford.edu/group/dcg/webauth
`
`[X.500] ISO/IEC 9594-1/ITU-T Recommendation X.500. "Information Techonology - Open Systems Interconnection -- The Directory:
`Overview of Concepts, Models and Services". 1997 edition.
`
`Copyright © 1998 Ariel Glenn and David Millman
`
`Top | Magazine
`
`Search | Author Index | Title Index | Monthly Issues
`Previous Story | Next Story
`
`Comments | E-mail the Editor
`
`hdl:cnri.dlib/september98-millman
`
`https://web.archive.org/web/19981202112253/http:/dlib.org/dlib/september98/millman/09millman.html
`
`7/7
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket