Directory based Middleware Services Keith Hazelton, Senior IT Architect, Univ. of Wisconsin-Madison Middleware Architecture Committee for Education, Internet2.

Slides:



Advertisements
Similar presentations
04 June 2002, TERENA, Limerick MACE: Directories at Work Keith Hazelton, Senior IT Architect, Univ. of Wisconsin-Madison Chair, MACE-Dir Working Group.
Advertisements

EduPerson and Federated K-12 Activities InCommon/Quilts Pilot Group February 27, 2014 Keith Hazelton UW-Madison, InCommon/I2.
Internet2 Middleware BASE CAMP slides Michael R. Gettes Principal Technologist Georgetown University
NSF Middleware Initiative: Managing Identity on Campus Michael R Gettes, Duke University Tom Barton, University of Chicago.
Access management for repositories: challenges and approaches for MAMS James Dalziel Professor of Learning Technology and Director, Macquarie E-Learning.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Welcome to CAMP! Ken Klingenstein, Director, Internet2 Middleware Initiative.
TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
Recent Developments in Directories Tom Barton, University of Chicago Keith Hazelton, University of Wisconsin.
2006 © SWITCH Authentication and Authorization Infrastructures in e-Science (and the role of NRENs) Christoph Witzig SWITCH e-IRG, Helsinki, Oct 4, 2006.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
1 11 th Fed/Ed PKI Meeting Some quick updates from recent HEPKI-TAG and SURA work Jim Jokl
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Inside the PKI Framework: * Activating the Puzzle Pieces PKI Summit Snowmass August
Welcome to CAMP Identity Management Integration Workshop Ann West NMI-EDIT EDUCAUSE/Internet2.
Software Architecture in Practice (3rd Ed) Introduction
Directories and PKI Keith Hazelton Senior IT Architect, UW-Madison PKI Summit, Snowmass, 9-Aug-01.
EDUCAUSE PKI Working Group Where Are We and Where are We Going.
07 May 2002, I2 Member Meeting MACE: Directories at Work Keith Hazelton, Senior IT Architect, Univ. of Wisconsin-Madison Chair, MACE-Dir Working Group.
F. Guilleux, O. Salaün - CRU Middleware activities in French Higher Education.
Directory Services at UMass  Directory Services Overview  Some common definitions  What can a directory do or not do?  User Needs Assessment  What.
TNC2004 Rhodes 1 Authentication and access control in Sympa mailing list manager Serge Aumont & Olivier Salaün May 2004.
Australian Access Federation and other Middleware Initiatives Presented at TF-EMC2, Prague 4 Sep 2007 Patty McMillan, The University of Queensland.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
In Chicago we met near the Loop, To share the security scoop … Techies search for the clues, While the rest of us schmooze And that’s why they call it.
Shibboleth Update Michael Gettes Principal Technologist Georgetown University Ken Klingenstein Director Interne2 Middleware Initiative.
USERS Implementers Target Communities NMI Integration Testbed The NMI Integration Testbed NMI Participation Developed and managed by SURA Evaluate NMI.
David L. Wasley Office of the President University of California Shibboleth Safe delivery of reliable authorization data David L. Wasley University of.
Directories Keith Hazelton, University of Wisconsin Brendan Bellina, University of Notre Dame Tom Barton, University of Chicago.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Shibboleth A word which was made the criterion by which to distinguish the Ephraimites from the Gileadites. The Ephraimites, not being able to pronounce.
Directory Workshop Parallel Sessions Rob Banz, Univ. of Maryland, Baltimore County Tom Barton, University of Memphis Keith Hazelton, University of Wisconsin,
JISC Middleware Security Workshop 20/10/05© 2005 University of Kent.1 The PERMIS Authorisation Infrastructure David Chadwick
Internet2 Middleware Initiative Shibboleth Ren é e Shuey Systems Engineer I Academic Services & Emerging Technologies The Pennsylvania State University.
Internet2 Middleware PKI: Oy-vey! Michael R. Gettes Principal Technologist Georgetown University
19 May 2003, TERENA, Zagreb Civilizing eduPerson Keith Hazelton, Senior IT Architect, Univ. of Wisconsin-Madison Chair, MACE-Dir Working Group Keith Hazelton,
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 NMI R3 Enterprise Directory Components.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
Going Forward: Year 2 NMI and Higher Ed Middleware.
Shibboleth A word which was made the criterion by which to distinguish the Ephraimites from the Gileadites. The Ephraimites, not being able to pronounce.
Middleware CAMP Day 2. Current Research Research that develops th e…
Computing Fundamentals Module Lesson 6 — Using Technology to Solve Problems Computer Literacy BASICS.
Advanced CAMP: BoF Summaries. 2 Role-based Access Control (RBAC)
Shibboleth at USMAI David Kennedy Spring 2006 Internet2 Member Meeting, April 24-26, 2006 – Arlington, VA.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
Higher Ed Certificate Authority by CREN: Update CSG February 2, 2000.
Shibboleth Trust Model Shibboleth/SAML Communities (aka Federated Administrations) Club Shib Club Shib Application process Policy decision points at the.
05 October 2001 Directories: The Next Stage Keith Hazelton, Senior IT Architect University of Wisconsin-Madison Keith Hazelton, Senior IT Architect University.
Welcome to Base CAMP: Enterprise Directory Deployment Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein This.
Current Middleware Picture Tom Barton University of Chicago Tom Barton University of Chicago.
Shibboleth Update January, 2001 Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder.
Authorization: Just when you thought middleware was no fun anymore Keith Hazelton, Senior IT Architect, Univ. of Wisconsin-Madison Member, Internet2 Middleware.
Adding Distributed Trust Management to Shibboleth Srinivasan Iyer Sai Chaitanya.
2-Oct-0101 October 2001 Directories as Middleware Keith Hazelton, Senior IT Architect University of Wisconsin-Madison Keith Hazelton, Senior IT Architect.
MGRID Architecture Andy Adamson Center for Information Technology Integration University of Michigan, USA.
Shibboleth at USMAI David Kennedy Spring 2006 Internet2 Member Meeting, April 24-26, 2006 – Arlington, VA.
May I introduce you to eduPerson? Keith Hazelton Sr. IT Architect, UW-Madison TNC 2001, Antalya, Turkey, 15-May-2001.
Internet2 Spring Meeting, Washington DC April NMI R2 Directory Services Components Overview Art Vandenberg Director, Advanced Campus Services Information.
Authority Management Systems Keith Hazelton, Senior IT Architect, Univ. of Wisconsin-Madison Middleware Architecture Committee for Education, Internet2.
Middleware: Directories LDAP-Recipe Michael R Gettes Georgetown University.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
LIGO Identity and Access Management
Vidmid Session Overview
Current Activities in Middleware
Adding Distributed Trust Management to Shibboleth
ESA Single Sign On (SSO) and Federated Identity Management
The DAMe’s First Steps: eduroam and NAS-SAML
Shibboleth Deployment Overview
The JISC Core Middleware Call
Presentation transcript:

Directory based Middleware Services Keith Hazelton, Senior IT Architect, Univ. of Wisconsin-Madison Middleware Architecture Committee for Education, Internet2 Advanced CAMP, Boulder Colorado, 31-Jul-02 Keith Hazelton, Senior IT Architect, Univ. of Wisconsin-Madison Middleware Architecture Committee for Education, Internet2 Advanced CAMP, Boulder Colorado, 31-Jul-02

31-Jul-02 2 The directory architect’s new jobs “Groups in LDAP” becomes support for Role- Based Access Control (RBAC) The role of directories in authorization and policy tasks Warm-up for this evening’s RBAC BoF The repository of institutional information supports event-driven institutional processes A class of metadirectory functions A theme in yesterday’s Metamerge tutorial

31-Jul-02 3 The directory architect’s new jobs Institutional boundaries become porous to directory-based information and process flows Inter-directory flows Warm-up for tonight’s “Affiliated Directory” BoF Adds up to some mental calisthenics for the first morning of Advanced CAMP

31-Jul-02 4 Cascading phrases defining controlled access to resources Systems of record Identify Persons Affiliations / Attributes Entitlements Services Service Providers Who have That are mapped to That determine eligibility for That are offered by

31-Jul-02 5 Separation of policy from technical architecture and implementation Ask the technologists To build a system that can easily accommodate new sources, people, services, etc. Ask the stakeholders To agree on policies & procedures in terms of this cascading diagram Yields a cleaner separation of the two activities The two groups share a layer of language

31-Jul-02 6 Technology needs to support any & all mappings Services can come & go New populations can get added New entitlements can be defined Access policies can change All without having to call the technologists back to reprogram Systems can change without changing “contracts”

31-Jul-02 7 What is LDAP Server’s proper role in RBAC? To provide an LDAP protocol gateway to this information for systems that need it May involve moving & transforming data from one repository to another within the enterprise directory Makes use of groups to represent affiliations & entitlements Relational database as a more natural basis for group management, RBAC management tools

31-Jul-02 8 Tools for RBAC The tools we need to manage RBAC have been identified by Tom Barton & MACE-Dir: Grouper (group math service) SAGE Service for Authorized Group Editing (with RIBot)

31-Jul-02 9 RBAC tools research GROUPER (original incarnation at Brown) A special LDAP server (OpenLDAP) engineered to handle group math operations against the enterprise directory for applications that are not group savvy. Application -> get group BLAH -> GROUPER -> combine 15 groups and remove those in the exclusion group -> give back combined static object as group BLAH

31-Jul A quick look at one SAGE-like tool UW-Msn system for managing roles, objects and access rights, Steve Fosdal, Health Alert Network project We will need to add terms to the policy expression as scenarios get more complicated Drive the group representations into the LDAP Server via automated processes Put the information where apps will expect it

31-Jul Escaping meta- and affiliated-: Inter-directory issues in general “Metadirectory,” “Affiliated directory:” Terms that are more trouble than they’re worth Focus on the set of issues that come up when directories (and other info stores) need to interact Sharing info across realms or domains is one class of scenarios Information transformation on the way in & out of different repositories and stores is another

31-Jul The primary clusters of Inter-directory issues Shared language syntax (SAML + schema) semantics (of attributes, values, policy assertions) Identity management Access control questions Who can do what to which information where Registration & discovery Summary: We need RBAC-enabled repositories

31-Jul Medical Middleware scenario and Inter-directory requirements Provider at site away from “staff home” accessing medical records We can’t make real progress here until we solve RBAC issue Identity management issue Shared language (or mapping) issue

31-Jul Inter-directory issues Shibboleth issue of who can see what personal information (policy) Usability worries Ken Klingenstein: It’s all in picking intelligent defaults

31-Jul The triumph of Security Assertions Markup Language (SAML) Will this be seen as on a par with the triumph of LDAP in the later 90’s? Everyone in the vendor space agrees to support this RBAC information carried in SAML assertions The Shibboleth Attribute Authority points the way…

31-Jul Inter-directory issues SAML win is that it is now a standard tool Attribute integrity solution in the form of signed SAML attribute assertions with accompanying data Including effective dating info Who sez? How do I correct a value I know is wrong? – A separate SAML based conversation? What’s the update action in this case? …and XACML (eXtensible Access Control Markup Language) for policy assertions?

31-Jul A new kind of schema work Express attribute values as URNs URN:MACE:foo.edu:service_x_entitlement Then inter-realm schema equivalence mappings can be formalized Like the OID-based policy mapping in X.509 certs, but friendlier

31-Jul A new kind of schema work Define some shared principles to make the mappings & discussions easier Top-down vs grass-roots: When to hammer it out on conference calls, when to go it alone (or with your close friends & associates)

31-Jul An enlightening extreme case Imagine a set of information in the wilderness. What would make it self-contained? If we can answer that, we should be able to share data safely Does this make policy granularity too fine?

31-Jul Proposal to start the conversation Mandate SAML flows for inter-realm and inter- directory exchanges Transform back to LDAP at destination if desired (connectors and scripts a la Metamerge) BoFs can hammer on these & other issues about the future of Directory based middleware services

31-Jul BASE CAMP Voting for “What to do next?” eduOrg, eduPerson, edu(other …) Shibboleth Roles (RBAC) GIG (Group Implementer’s Guide) GROUPER, RI-Bot, SAGE Blue Pages LDAP-Recipe (next?) Affiliated Directories HEBCA, Bridge PKI, etc… Video Middleware (commObject) GRID AuthN campus integration GRID AuthZ campus integration Medical Middleware (MedMid) Operational Issues (perf/mon) Directory Policy PKI Policy Identity Mgmt Practices Metadirectories Dir of Dirs Higher Ed (DoDHE) LDAP Analyzer The Art of Directories/Databases PKI-Lite and S/MIME Early Harvest for App Developers Digital Rights Management (DRM) Outreach and Dissemination N-Tier Systems (portals) Filesystems Selling it Project Mgmt

31-Jul What is in the directory space? eduOrg, eduPerson, edu(other …) Shibboleth Roles (RBAC) GROUP THERAPY GIG (Group Implementer’s Guide) GROUPER, RI-Bot, SAGE Blue Pages LDAP-Recipe (next?) Affiliated Directories HEBCA, Bridge PKI, etc… Video Middleware (commObject) GRID AuthN campus integration GRID AuthZ campus integration Directory Policy Dir of Dirs Higher Ed (DoDHE) LDAP Analyzer Operational Issues (perf/mon) The Art of Directories/Databases Identity Mgmt Practices Metadirectories..

31-Jul Certificate Parsing Server Peter Gietz - a draft to describe X.509 certificates as plain old directory objects. Finding certificates becomes easy for directory aware applications. Use PKI operations on the cert you select to verify it. David Chadwick - a Certificate Parsing Server (CPS). Like GROUPER but only works on add/delete/modify operations and stores cert objects as child objects as well as userCertificate attributes where they are now. This should have a dramatic impact on Bridge CA model operations.

31-Jul Q & A and discussion