summaryrefslogtreecommitdiffstats
path: root/docs/sections/architecture/security.rst
blob: fd10dc9804d951944833e6fea5fa936dfdfdc025 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
.. This work is licensed under a Creative Commons Attribution 4.0 International License.
.. http://creativecommons.org/licenses/by/4.0
.. Copyright © 2017 AT&T Intellectual Property. All rights reserved.

Security Architecture
=====================
Communicating
-------------
When one compute process needs to communicate to another, it does so with networking.

The service side is always compute process, but the client can be of two types:
 - People (via browser, or perhaps command line tool)
 - Compute process talking to another computer process.

Thus, the essential building blocks of any networked system is made up of 


In larger systems, it is atypical 

Communicating *Securely*
------------------------
Whenever two processing entities exist that need to communicate securely, it is *essential* that 
 - The communications between the two are encrypted
 - The identities of the caller and callee are established (authentication)
 - The caller must be allowed to do what it is asking to do (authorization)