W3C home > Mailing lists > Public > public-credentials@w3.org > November 2021

Re: Any Good use case of PAM (Privileged account Management) using Vcs

From: Drummond Reed <drummond.reed@evernym.com>
Date: Sun, 7 Nov 2021 16:40:37 -0800
Message-ID: <CAAjunnaJgSCYAPW0dg8yLXc3frHhLHVbfQ9PPGZth3o4r2ei9g@mail.gmail.com>
To: Bob Wyman <bob@wyman.us>
Cc: sethi shivam <sethishivam27@gmail.com>, "W3C Credentials CG (Public List)" <public-credentials@w3.org>
"One should delegate rights, not credentials." Perfectly put, Bob.

BTW, one *can* use a special class of VCs to delegate rights. There are
several efforts to define such delegation models—see this discussion of
Zcaps <https://kyledenhartog.com/comparing-VCs-with-zcaps/> from Kyle Den
Hartog and the ToIP Authentic Chained Data Container
(ACDC) Task Force.



On Sun, Nov 7, 2021 at 11:17 AM Bob Wyman <bob@wyman.us> wrote:

> Sethi,
> You asked: "I want to give Access of a machine to my Colleague by sharing
> VC of (Privileged account) ."
> Delegating the rights associated with a VC is sometimes quite reasonable
> and may be supported, however, delegating the right to use an existing VC
> should not be supported. In commonly understood terms, it might sometimes
> be reasonable for me to delegate to you the right to act on my behalf, but
> it is never reasonable to delegate to you the right to "be" me. If you take
> an action, based on rights which were originally delegated to me, the fact
> that it was you, not me, who acted, should be discoverable, even if I
> approve of your actions. A common example of this is when someone uses a
> "Power of Attorney," to sign a contract. When they do, they typically sign
> documents with their own names and an annotation "on behalf of," "for," or
> "by power of attorney," they don't forge the signature of the one who
> granted the power of attorney.
> One should delegate rights, not credentials.
> bob wyman
> On Sat, Nov 6, 2021 at 7:48 PM sethi shivam <sethishivam27@gmail.com>
> wrote:
>> Hi Team ,
>> Is it possible that we can give our Vcs to someone for a particular
>> period of time .
>> Like I am on vacation and I want to give Access of a machine to my
>> Colleague by sharing VC of (Privileged account) .
>> and my second question is :
>> Is there any good enterprise level use-case of managing Privileged
>> accounts using Vcs .
>> I am just trying to explore PIM-PAM use cases with Vcs
>> PIM = Privileged Identity management
>> Today we have many tools like Cyberark , beyondTrust
>> Best Regards
>> Sethi Shivam
Received on Monday, 8 November 2021 00:41:02 UTC

This archive was generated by hypermail 2.4.0 : Thursday, 24 March 2022 20:25:24 UTC