We Have Developed a System for Configuring Firewalls Based on Identities

14 Oct 2021

No description

In cooperation with the CESNET Development Fund, we implemented the Firewall Rules Management project using user identities. As the name suggests, its main goal was to demonstrate and prototype the ability to manage firewall rules using user identities in the CESNET e-infrastructure environment managed in the Perun system, with the main focus on heterogeneous infrastructures of larger organizations.

With the achieved results, we were able to successfully demonstrate in the project that the use of the proposed and prototype-implemented solution can lead to a significant reduction in the number of requests delegated to the central network administrator or network firewall. And this also speeds up the implementation of the changes required of them.

"The developed system, professionally called FIST (Firewall rules from Identities - Simple Translator), manages the configuration of firewalls based on input data containing information about current rules of access to network resources. The system thus works with the identity management system, which defines user groups with delegated member management to the group administrator, and the network resources to which members of these groups should have access,” explains Tom Rebok, one of the project managers.

You can find more about the achieved results and the final report of the project on this website.


More articles

All articles

You are running an old browser version. We recommend updating your browser to its latest version.

More info