EASI solutions integrate security technologies across the perimeter, middle, and legacy security tiers. An EASI solution first and foremost consists of a security framework, which describes a collection of security service interfaces that may be implemented by an evolving set of security products.
An EASI solution also includes integration techniques, such as bridges, wrappers, and interceptors that developers can use to plug security technologies into a middleware environment. To hook together different security technologies, EASI must solve a key problem: defining a secure association between clients and targets that establishes a common security context. The security context consists of a user’s privileges that must be transferred across the system to a target application. A user’s privileges, which form the basis for authorization decisions and audit events, must be protected as they are transmitted between perimeter, middle, and legacy tiers. Because each technology in these tiers represents and protects a user’s privileges differently, integration of security context can be a rather difficult problem.