Departments within a company are often assigned security classifications that are based on the department's function and the kind of information that it handles. For example:
Depending upon the sensitivity of the information, it might be secured in locked filing cabinets that serve as access control mechanisms. Access control to this information is with a separate key for each filing cabinet issued to a person authorized to access the information.
Graded authentication replaces the physical key given to users with a clearance. Also, NMAS replaces the filing cabinet with NetWare file system volumes that are also assigned security labels. These security labels replace the filing cabinet lock type.
As the network administrator, you assign users authorization levels for login. When a user logs in, the user is assigned a clearance for that login session. The clearance becomes the key that is necessary for access. Access is granted to the user based on the clearance (key) that the user is authorized to hold and the security label (lock) that is being accessed.
Although a user can be authorized to have more than one clearance, only one clearance is assigned at login, and it is this clearance that determines what information can be unlocked. For example, the following would apply (as illustrated in Single-Factor Authentication ) to a user logging in with an authentication grade of Password:
Figure 2
Single-Factor Authentication
The following would apply (as illustrated in Multiple-Factor Authentication ) to a user logging in with a password and token:
Figure 3
Multiple-Factor Authentication
A user working in Human Resources with information classified as sensitive logs in with a password and token clearance. The information that the user needs is on a network volume that is also labeled Password and Token. Because the user's clearance and the volume security label match (Read label dominates the volume label and the volume label dominates the Write label), the user is able to read from and write to the NetWare volume.
However, suppose the same user attempts to copy the sensitive information to a network area that requires only a password for access. Graded authentication prevents this action because copying or moving information from a higher label to a lower label is not allowed. This prevents the user from compromising the sensitive information.
The following table shows how several departments within a company might classify their information. Security labels and clearances are assigned based on the information classification and not on a user.
In this example, because Sales has been assigned a Public clearance and Sales information is freely accessible, a user only needs to be logged in to access Sales information.
However, users who work in Engineering must use a password to access the confidential information needed for their job function. Engineering's data volumes would also be labeled Password for read/write access.
Human Resources often deals with sensitive information related to personnel records. A password and token are required to access this information.
Finance also has sensitive classified information and considers financial information critical to the company's operation and survival. A biometric and token are required to access this information.