Authorisation is the process of allowing an entity (humans, systems or devices) to access information systems or facilities where information and processing capabilities are being stored. More practical in an industrial setting for Digital Manufacturing Platforms, an authorized person can get access to an operational machine in order to update it, or investigate its contents. Unauthorized access could be someone who has been able to access the network from the outside, performing actions that have not been authorized and cannot be justified.

Authentication is a means to assess the authorization rules of an entity by means of a set of instruments. In the case of Digital Manufacturing Platforms it would be the instruments like user name and password, and in addition a second factor such as a physical token or a mobile phone that can authenticate the person accessing the platform. The physical token connects the person to something he has, the password to something he knows. 

A third A in the AAA-architecture is related to Access. Once authorized, and authenticated, access can be granted to the location, system, application, and / or information. Access control levels can thus be set up on different layers. These can be physical (access to the country, to the plant, to the building, the room and the environment where the system is located), and logical (using authentication technologies). In Digital Manufacturing Platforms this means the systems could be accessible only on premise, in the factory or for instance in the (private or public) cloud. As a result different access mechanisms needs to be considered, depending on the risk and intended security levels and controls. 

https://en.wikipedia.org/wiki/AAA_(computer_security) ; https://en.wikipedia.org/wiki/Authorization

 


Associated projects

Show all
Showing 10 out of 13
Show more information
  Design of the Security Framework II Result description , access control and transport security.
  Connectors for Inter-factory Interoperability and Logistics II Result comments tenders and bidding Cybersecurity The Security Framework together with the Blockchain layer is strongly interlaced with the COMPOSITION ecosystem, providing all the necessary security features as authentication
  AAA - Access, Authorisation and Authentication Taxon title AAA - Access, Authorisation and Authentication Taxon description   A third A in the AAA-architecture is related to Access. Once authorized, and authenticated, access can be granted to the location, system, application, and / or information. Search keywords AAA Access Authorisation Authentication
  Supply chain and value network efficiency Comments Buyers and sellers will have close to perfect knowledge of offers, with searchable, low latency access to information.
Show more information
  Periodic Reporting for period 1 - SAFIRE (Cloud-based Situational Analysis for Factories providing Real-time Reconfiguration Services) Result description Complementing the technology development work in the project have been tasks to establish the initial dissemination and exploitation strategy where the project partners have made important decisions regarding access
  AAA - Access, Authorisation and Authentication Taxon title AAA - Access, Authorisation and Authentication Taxon description   A third A in the AAA-architecture is related to Access. Once authorized, and authenticated, access can be granted to the location, system, application, and / or information. Search keywords AAA Access Authorisation Authentication
Show more information
  Periodic Reporting for period 1 - NIMBLE (Collaboration Network for Industry, Manufacturing, Business and Logistics in Europe) Result description We propose an integrated model of trust to be used on the NIMBLE platform. (6) Life-Cycle Data Management: As the world moves towards ubiquitous network access enabling the IoT, we need to view life cycle
  AAA - Access, Authorisation and Authentication Taxon title AAA - Access, Authorisation and Authentication Taxon description   A third A in the AAA-architecture is related to Access. Once authorized, and authenticated, access can be granted to the location, system, application, and / or information. Search keywords AAA Access Authorisation Authentication
  Cybersecurity Comments , fine-grained authorization and access control.
Show more information
  AAA - Access, Authorisation and Authentication Taxon title AAA - Access, Authorisation and Authentication Taxon description   A third A in the AAA-architecture is related to Access. Once authorized, and authenticated, access can be granted to the location, system, application, and / or information. Search keywords AAA Access Authorisation Authentication
  Business model aspects of digital platform deployment Comments Automation players interested in using the technology will have access to the showcase to understand its potentialities and learn the methodologies.
  Business ecosystem Comments Automation players interested in using the technology will have access to the showcase to understand its potentialities and learn the methodologies.
Show more information
  D5.8: Data access API & Reference data store (Final Release) Result title D5.8: Data access API & Reference data store (Final Release) Result description This deliverable describes aims to support the final implementation outcome of the unified access to data in the manufacturing facility, regardless their source and format and provide transparent access
  AAA - Access, Authorisation and Authentication Taxon title AAA - Access, Authorisation and Authentication Taxon description   A third A in the AAA-architecture is related to Access. Once authorized, and authenticated, access can be granted to the location, system, application, and / or information. Search keywords AAA Access Authorisation Authentication
Show more information
  vfOS - ID4.4a - Security & Data Access(M18) Result title vfOS - ID4.4a - Security & Data Access(M18)
  vfOS - ID10.1 - Impact Strategy and Plan(M3) Result description s results and the widest dissemination of knowledge from the project in an open access manner
  AAA - Access, Authorisation and Authentication Taxon title AAA - Access, Authorisation and Authentication Taxon description   A third A in the AAA-architecture is related to Access. Once authorized, and authenticated, access can be granted to the location, system, application, and / or information. Search keywords AAA Access Authorisation Authentication
Show more information
  AAA - Access, Authorisation and Authentication Taxon title AAA - Access, Authorisation and Authentication Taxon description   A third A in the AAA-architecture is related to Access. Once authorized, and authenticated, access can be granted to the location, system, application, and / or information. Search keywords AAA Access Authorisation Authentication
Show more information
  AAA - Access, Authorisation and Authentication Taxon title AAA - Access, Authorisation and Authentication Taxon description   A third A in the AAA-architecture is related to Access. Once authorized, and authenticated, access can be granted to the location, system, application, and / or information. Search keywords AAA Access Authorisation Authentication
Show more information
  AAA - Access, Authorisation and Authentication Taxon title AAA - Access, Authorisation and Authentication Taxon description   A third A in the AAA-architecture is related to Access. Once authorized, and authenticated, access can be granted to the location, system, application, and / or information. Search keywords AAA Access Authorisation Authentication
Show more information
  AAA - Access, Authorisation and Authentication Taxon title AAA - Access, Authorisation and Authentication Taxon description   A third A in the AAA-architecture is related to Access. Once authorized, and authenticated, access can be granted to the location, system, application, and / or information. Search keywords AAA Access Authorisation Authentication