Identity provider or IdP based on a request of some sort from a relying party A.K.A. Service provider or SP, and they contain statements that service providers use to make accesscontrol decisions.
Network security is an important research area in the application of information system now, How to implement effective accesscontrolbased on user's identity is very important.
An identity-based authorization model is presented in this paper. It combined the identity authentication technique of PKI and the accesscontrol technique of RBAC.