Table of Contents
1Scope
2References
3Definitions
3.1Importeddefinitions
3.2Additionaldefinitions
4Abbreviations
5Conventions
6Overview
7XACMLcore
7.1Background
7.2XACMLmodels
7.3XACMLcontext
7.4Policysyntax
7.5Contextsyntax
7.6XACMLfunctionalrequirements
7.7XACMLextensibilitypoints
7.8Conformance
8Coreandhierarchicalrolebasedaccesscontrol(RBAC)
profile
8.1RBACbackground
8.2RBACexample
8.3Assigningandenablingroleattributes
8.4ImplementingtheRBACmodel
8.5Profile
8.6Identifiers
9MultipleresourceprofileofXACML
9.1Requestsformultipleresources
9.2Requestsforanentirehierarchy
9.3Newattributeidentifiers
9.4Newprofileidentifiers
10SAML2.0profileofXACML
10.1MappingSAMLandXACMLattributes
10.2Authorizationdecisions
10.3Policies
10.4Element
10.5Element
10.6Element
11XMLdigitalsignatureprofile
11.1UseofSAML
11.2Canonicalization
11.3Signingschemas
12HierarchicalresourceprofileofXACML
12.1Representingtheidentityofanode
12.2Requestingaccesstoanode
12.3Statingpoliciesthatapplytonodes
12.4NewDataType:xpath-expression
12.5Newattributeidentifiers
12.6Newprofileidentifiers
13Privacypolicyprofile
13.1Standardattributes
13.2Standardrules:Matchingpurpose
AnnexA-Data-typesandfunctions
A.1Introduction
A.2Data-types
A.3Functions
AnnexB-XACMLidentifiers
B.1XACMLnamespaces
B.2Accesssubjectcategories
B.3Data-types
B.4Subjectattributes
B.5Resourceattributes
B.6Actionattributes
B.7Environmentattributes
B.8Statuscodes
B.9Combiningalgorithms
AnnexC-Combiningalgorithms
C.1Deny-overrides
C.2Ordered-deny-overrides
C.3Permit-overrides
C.4Ordered-permit-overrides
C.5First-applicable
C.6Only-one-applicable
AnnexD-XACMLschema
D.1XACMLcontextschema
D.2Policyschema
D.3XACMLSAMLprotocolschema
D.4XACMLSAMLassertionschema
AppendixI-Securityconsiderations
I.1Threatmodel
I.2Safeguards
AppendixII-XACMLexamples
II.1Exampleone
II.2Exampletwo
AppendixIII-Exampledescriptionofhigherorderbagfunctions
III.1Exampleofhigher-orderbagfunctions
BIBLIOGRAPHY Abstract
Describes core XACML including syntax of the language, models, context with policy language model, syntax and processing rules.