No edit summary |
|||
(7 intermediate revisions by the same user not shown) | |||
Line 11: | Line 11: | ||
=== Combadge === | === Combadge === | ||
A [[combadge]] provides multiple functions for the authentication process. For one, it can generate two forms of authentication. The device is equipped with a DNA scanner which, when attached close to the body (such as on clothes), is able to scan the wearers DNA and transmit verification data to the main computer. Secondly the device generates a 4096 bit authentication key every 20 seconds, this key is generated by the main computer as well. If the computers key and the combadge key both match, then this provides the same kind of authentication as key-fob. | A [[combadge]] provides multiple functions for the authentication process. For one, it can generate two forms of authentication. The device is equipped with a DNA scanner which, when attached close to the body (such as on clothes), is able to scan the wearers DNA and transmit verification data to the main computer. Secondly the device generates a 4096 bit authentication key every 20 seconds, this key is generated by the main computer as well. If the computers key and the [[combadge]] key both match, then this provides the same kind of authentication as key-fob. | ||
=== Fourth Factor Authentication === | === Fourth Factor Authentication === | ||
Line 37: | Line 37: | ||
|- | |- | ||
|style="white-space: nowrap;"|Level 1 | |style="white-space: nowrap;"|Level 1 | ||
|style="white-space: nowrap;"|Enlisted | |style="white-space: nowrap;"|Enlisted or NCO | ||
|8 Token Code | |8 Token Code | ||
|Single Factor | |Single Factor | ||
Line 44: | Line 44: | ||
* Secure access to all communications | * Secure access to all communications | ||
* Access to secure areas | * Access to secure areas | ||
* Basic diagnostics control | |||
* Manual override access to tertiary systems | * Manual override access to tertiary systems | ||
* Place Level 1 access lockouts. | * Place Level 1 access lockouts. | ||
Line 52: | Line 53: | ||
|Two Factor | |Two Factor | ||
| | | | ||
* Advanced | * Advanced diagnostics control | ||
* Manual override of secondary systems | * Manual override of secondary systems | ||
* Override Level 1 access lockouts | * Override Level 1 access lockouts | ||
Line 66: | Line 67: | ||
* Provide Secondary Authorization for Self Destruct | * Provide Secondary Authorization for Self Destruct | ||
* Override of Level 2 access lockouts | * Override of Level 2 access lockouts | ||
* Place | * Place Level 3 access lockouts | ||
|- | |- | ||
|style="white-space: nowrap;"|Level 4 | |style="white-space: nowrap;"|Level 4 | ||
Line 77: | Line 78: | ||
* Access secure mission data | * Access secure mission data | ||
* Override of Level 3 access lockouts | * Override of Level 3 access lockouts | ||
* Place | * Place Level 4 access lockouts | ||
|- | |- | ||
|style="white-space: nowrap;"|Level 5 | |style="white-space: nowrap;"|Level 5 | ||
Line 89: | Line 90: | ||
* View ''eyes-only'' data pertaining to vessel operations | * View ''eyes-only'' data pertaining to vessel operations | ||
* Override of Level 4 access lockouts | * Override of Level 4 access lockouts | ||
* Place | * Place Level 5 access lockouts | ||
|- | |- | ||
|style="white-space: nowrap;"|Level 6 | |style="white-space: nowrap;"|Level 6 | ||
|style="white-space: nowrap;"|Temporal Operatives<br> | |style="white-space: nowrap;"|[[Temporal Operatives]]<br>[[Obscura]] Agents | ||
|10 Token Code | |10 Token Code | ||
|Three Factor | |Three Factor | ||
Line 100: | Line 101: | ||
* Override operation of time travel related systems | * Override operation of time travel related systems | ||
* Override of Level 5 access lockouts | * Override of Level 5 access lockouts | ||
* Place | * Place Level 6 access lockouts | ||
|- | |- | ||
|style="white-space: nowrap;"|Level 7 | |style="white-space: nowrap;"|Level 7 | ||
Line 114: | Line 115: | ||
* Recall temporal assets during field operations | * Recall temporal assets during field operations | ||
* Override of Level 6 access lockouts | * Override of Level 6 access lockouts | ||
* Place | * Place Level 7 access lockouts | ||
|- | |- | ||
|style="white-space: nowrap;"|Level 8 | |style="white-space: nowrap;"|Level 8 | ||
Line 127: | Line 128: | ||
* Override all command protocols | * Override all command protocols | ||
* Override of Level 7 access lockouts | * Override of Level 7 access lockouts | ||
* Place | * Place Level 8 access lockouts | ||
|- | |||
|style="white-space: nowrap;"|Level 9 | |||
|style="white-space: nowrap;"|Head of [[Solas Tempus]] | |||
|10 Token Code | |||
|Four Factor | |||
| | |||
* Override any previous command | |||
* Override of Level 8 access lockouts | |||
* Place Level 9 access lockouts | |||
|} | |} | ||
In this case, a ''token'' is defined as a word from the [[Phonetic Alphabet]] table or a number. | In this case, a ''token'' is defined as a word from the [[Phonetic Alphabet]] table, any letter from the greek alphabet, or a number. | ||
=== Manual Override === | |||
A commanding officer has one unique ability that others do not have, that of ''manual override''. Any manual override code must be entered manually on the vessel in question to be completely effective. While such codes can be entered remotely, someone with sufficient access at the actual terminal will ''always'' take precedence over someone sending the command remotely. This is why a [[Temporal Operative]], Animas Agent, or a Commanding Officer are the most trusted and powerful positions in the field. While a flag officer or higher can override commands of these people, these people are also the most likely to be ''in the field'' where an override is needed. | |||
Manual override codes must be entered manually into a console, when on board a ship override codes entered directly into the affected ship system have precedence over code entered at any other location on the ship except for those of the ''commanding officer''. | |||
=== Privilege of Command === | |||
A commanding officer has additional privileges beyond their access level on board their own vessel. A commanding officer, once properly authenticated, has the ability to override commands given by a ''Temporal Operative'' or a ''Flag Officer'' should their Executive Officer also concur. | |||
=== Self Destruct === | |||
Invoking the self destruct command requires access by two different officers, only a ''Primary Authorization'' can request the self destruct be enabled while either a ''Secondary Authorization'' or ''Primary Authorization'' can provide the second command to enabled the self destruct. If no personnel with ''Primary Authorization'' is available the computer will accept three officers with the ''Secondary Authorization'' privilege to enable self destruct. This also goes for disabling the self destruct. | |||
=== Theta Protocol === | |||
Only ''Blue Leader'' and the head of Solas Tempus can activate [[Theta Protocol]]. | |||
[[Category:Solas Tempus]] | [[Category:Solas Tempus]] |
Latest revision as of 00:04, 27 October 2023
Command codes are specialized access codes used to access key command level functions. Such functions include most starship operations but more specifically allow personnel to access critical diagnostic, operational, and override functions of the main computer. All key functions are operated by command code.
Multifactor Authentication
Access to command functions is obtained through multifactor authentication schemes, these schemes utilize one or more of the following authentication parameters:
- Something You Know (i.e. access codes or username / password)
- Something You Have (i.e. physical access card or physical access key-fob)
- Something You Are (i.e. DNA, voice print, finger print, retinal scan, or other personally unique biometric data)
Access Cards / Fobs
In the case of a physical access card to key-fob, these require to be scanned by the computer or the short-lived alpha-numeric code for the device provided be input before access can be granted. When a key-fob produced a unique code, it lasts for 20 seconds, then it changed to a random or otherwise unpredictable code. Even if the proper access code or biometric data is given, if such a code or access is not available.
Combadge
A combadge provides multiple functions for the authentication process. For one, it can generate two forms of authentication. The device is equipped with a DNA scanner which, when attached close to the body (such as on clothes), is able to scan the wearers DNA and transmit verification data to the main computer. Secondly the device generates a 4096 bit authentication key every 20 seconds, this key is generated by the main computer as well. If the computers key and the combadge key both match, then this provides the same kind of authentication as key-fob.
Fourth Factor Authentication
Commands which require four factors of authentication require all three factors above and an additional biometric verification, usually voice print and DNA / retinal scan match before access is granted.
Command Levels
Command codes are given most often by rank, but specialized access may be given by someone of a given level, or above, overriding default access. Such instances are most often used with Non-Commissioned Officers who require specialized access but do not have specific rank. Usage of such access overrides is required to be audited but security personnel and reported on to the commanding officer or flag officer who originally granted the access. The table below indicates default access levels determined by rank.
Level | Granted To | Code Complexity | Authentication | Functions |
---|---|---|---|---|
Level 0 | Civilian | 6 Token Code | Single Factor |
|
Level 1 | Enlisted or NCO | 8 Token Code | Single Factor |
|
Level 2 | Commissioned Officers | 8 Token Code | Two Factor |
|
Level 3 | Department Heads | 8 Token Code | Two Factor |
|
Level 4 | Executive Officer | 8 Token Code | Three Factor |
|
Level 5 | Commanding Officer | 8 Token Code | Three Factor |
|
Level 6 | Temporal Operatives Obscura Agents |
10 Token Code | Three Factor |
|
Level 7 | Flag Officers | 10 Token Code | Four Factor |
|
Level 8 | Blue Leader Green Leader Gold Leader |
10 Token Code | Four Factor |
|
Level 9 | Head of Solas Tempus | 10 Token Code | Four Factor |
|
In this case, a token is defined as a word from the Phonetic Alphabet table, any letter from the greek alphabet, or a number.
Manual Override
A commanding officer has one unique ability that others do not have, that of manual override. Any manual override code must be entered manually on the vessel in question to be completely effective. While such codes can be entered remotely, someone with sufficient access at the actual terminal will always take precedence over someone sending the command remotely. This is why a Temporal Operative, Animas Agent, or a Commanding Officer are the most trusted and powerful positions in the field. While a flag officer or higher can override commands of these people, these people are also the most likely to be in the field where an override is needed.
Manual override codes must be entered manually into a console, when on board a ship override codes entered directly into the affected ship system have precedence over code entered at any other location on the ship except for those of the commanding officer.
Privilege of Command
A commanding officer has additional privileges beyond their access level on board their own vessel. A commanding officer, once properly authenticated, has the ability to override commands given by a Temporal Operative or a Flag Officer should their Executive Officer also concur.
Self Destruct
Invoking the self destruct command requires access by two different officers, only a Primary Authorization can request the self destruct be enabled while either a Secondary Authorization or Primary Authorization can provide the second command to enabled the self destruct. If no personnel with Primary Authorization is available the computer will accept three officers with the Secondary Authorization privilege to enable self destruct. This also goes for disabling the self destruct.
Theta Protocol
Only Blue Leader and the head of Solas Tempus can activate Theta Protocol.