GIRAF Grid Integrated Radius Authentication Fabric A Whole Bunch of People GGF-11 June 9, 2004.

Slides:



Advertisements
Similar presentations
GridWorld 2006 Use of MyProxy for the FusionGrid Mary Thompson Monte Goode GridWorld 2006.
Advertisements

MyProxy Jim Basney Senior Research Scientist NCSA
Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
DOE’s PKI service for Grids Tony J. Genovese Malaga, Spain November 2003.
MyProxy: A Multi-Purpose Grid Authentication Service
Authenticated QoS Signaling William A. (Andy) Adamson Olga Kornievskaia CITI, University of Michigan.
Deploying and Managing Active Directory Certificate Services
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Lecture 23 Internet Authentication Applications
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
National Center for Supercomputing Applications Integrating MyProxy with Site Authentication Jim Basney Senior Research Scientist National Center for Supercomputing.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Kerberos and PKI Cooperation Daniel Kouřil, Luděk Matyska, Michal Procházka Masaryk University AFS & Kerberos Best Practices Workshop 2006.
DGC Paris Community Authorization Service (CAS) and EDG Presentation by the Globus CAS team & Peter Kunszt, WP2.
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
Open Science Grid Use of PKI: Wishing it was easy A brief and incomplete introduction. Doug Olson, LBNL PKI Workshop, NIST 5 April 2006.
Use of Kerberos-Issued Certificates at Fermilab Kerberos  PKI Translation Matt Crawford & Dane Skow Fermilab.
Remote User Authentication. Module Objectives By the end of this module participants will be able to: Describe the methods available for authenticating.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Windows 2003 and 802.1x Secure Wireless Deployments.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Digital Object Architecture
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Configuring Directory Certificate Services Lesson 13.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
Module 9: Fundamentals of Securing Network Communication.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Neil Witheridge APAN29 Sydney February 2010 ARCS Authorisation Services Neil Witheridge Manager, ARCS Authorisation Services APAN29, Sydney, February 2010.
Grid and NREN operational support Tony Genovese ATF team ESnet Lawrence Berkeley National Laboratory.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Harshavardhan Achrekar - Grad Student Umass Lowell presents 1 Scenarios Authentication Patterns Direct Authentication v/s Brokered Authentication Kerberos.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Integrating and Troubleshooting Citrix Access Gateway.
ESnet RAF and eduroam ™ Tony J. Genovese ATF Team ESnet/Lawrence Berkeley National Laboratory.
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Fermilab CA Infrastructure EDG CA Managers Mtg June 13, 2003.
Module 13: Enterprise PKI Active Directory Certificate Services (AD CS)
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Office of Science U.S. Department of Energy Grid Security at NERSC/LBL Presented by Steve Chan Network, Security and Servers
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
VOMS Attribute Authorities Michael Helm ESnet/LBNL 23 Feb 2007.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
The GRIDS Center, part of the NSF Middleware Initiative Grid Security Overview presented by Von Welch National Center for Supercomputing.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Configuring and Troubleshooting Routing and Remote Access
Public Key Infrastructure from the Most Trusted Name in e-Security
Presentation transcript:

GIRAF Grid Integrated Radius Authentication Fabric A Whole Bunch of People GGF-11 June 9, 2004

ESnet PKI One Time Password Support Grid response to One Time Password Initiative What can ESnet do to help? We have capabilities / resources that can help We have specific expertise to address critical technical, policy, and “social” issues

ESnet PKI team DOEGrids CA –Built –Deployed –Operate 3 FTE + support PKI for Office of Science projects –Primarily Grid ID’s –Other uses Federation – community

Offline Vaulted Root CA HSM Secure Data Center Building Security LBNL Site security Hardware Security Modules Access controlled racks PKI Systems Internet Fire Wall Intrusion Detection DOEGrids Security Grid User

Features In Depth LDAP –Directory of accounts (certificates) Hardware Security Module –Move private key to “hardware” domain –Unique expertise Support Multiple CA Profiles –DOEGrids: conventional PKI –NERSC: Long Term Credential Store CA –ESnet SSL: Classic SSL server certificates Statistics

Federation and Community Leadership Manage & host DOEGrids Policy Management Authority –Sets policies for certification in DOEGrids –Manages membership and domain of services –Office of Science participating programs have “stake” in CA! International Grid Federation (see supporting slides) –Work to establish Asian Pacific Policy Management Authority –Member of European Data Grid and joined new EGEE Federation –Joined TERENA Top level CA registry Experimental OCSP service –Demonstrate improved certificate validation techniques –Demonstrate improved delivery of certificate services Provide NERSC PKI with a secure CA (see supporting slides) Global Grid Forum – Grid Standards organization

NERSC PKI (2) To get NERSC PKI accepted Internationally, ESnet established a new process for evaluating CAs –Draft GGF document on CA profiles First submission scheduled for next Global Grid Forum –Identifies 3 known CA profiles Classic PKI (i.e. DOEGrids) Large site integrated proxy services (SIPS) Credential stores (i.e. NERSC) –EU Grid Policy Management Authority will contribute to Document. Service Level Agreement –Establishes clear operational requirements Certificate Policy/Certification Practices Statement –Helping NERSC to produce an internationally approved set of policies and procedures for their CA Peer with international community –Establishing NERSC as a full member of the International trust community.

The Grid vs One – Time Password Why is this an issue for Grids? What needs to be done? Some assumptions –PKI is essential for Grids –Grids are/will provide value to DOE science Let’s look at Grid authentication today:

DOEGrids cert workflow

Subscriber RA DOEGrids CA Key Generator 1. Generate 2 Key pair Local Storage 3. Signing Request 4. Notify Approver 5. Process CA 6. Certificate / Rejection 7. Export / store / use Note: This process occurs exactly ONCE Certification Process

Certificate Request Workflow Subscriber 1 2 Registration Manager PKI1.DOEGrids.Org RM Agent Certificate Manager 7 1. Subscriber request Certificate 2. A notice request has been queued 3. The RA for the Subscriber reviews request – approves or rejects request 4. The Signed Certificate Request is sent to CA CM issues certificate 6. RM sends notice to Subscriber 7. Subscriber picks up new certificate

Grid Authentication Workflow

Key Generator Grid Proxy Init Grid Service Key Store Generate new key pair Return Grid Proxy Init and Grid Job Execution 1 Authenticate 2 Ptr to proxy cert Enable private key Sign Proxy pub key 3 Execute 4 Receive Job Results

Gridlogon Response

Authentication Services Auth DB Grid LOGON CA MyProxy Credentials PAM Manage Long term Creds 1 Log in 2 Ask AuthN 3 Look up 5 Receive Proxy Cert 1A Get Long Term Cred 4a Signing Request Long Term Cred 5a Store Long Term Cred Manage myProxy 6 (Opt) Store Proxy 7 Execute 4 AuthN ok PDP and PRP PEP (PDP and PRP)

OTP – Token Authentication Workflow

Radius Authentication Server Auth DB Auth DB OTP Auth Server Application (or NAS) Radius Client OTP Gizmo 1 Password dialog 2 Pass to radius 3 Look up 4 Ask OTP server 5 Ret user auth info 6 check 7 Return Auth info to Radius 8 Return AuthN/Z 9 Customer OTP – Token Authentication Workflow

Evolution OTP initiative accelerates evolution that was happening anyway: “OUTSOURCING” PKI services –In Grid Logon, see outsourced Authentication –ESnet proposals MULTIPLE CA profiles –On-demand proxy certs (SIPS) KCA Generalizing CA interfaces RADIUS –For backend AAA –Obvious issue for Grid firewall traversal Other

ESnet Proposal Also a use case….

ESnet Radius Auth DB ESnet Proposal ESnet Root CA MyProxy Credentials PAM 1 Log in 2 Ask AuthN; hint OTP 5 Receive Proxy Cert Manage myProxy 6 (Opt) Store Proxy 7 Execute OTP Services OCSP HSM Subordinate CA Engine 4. Auth OK; Namestring 3 OTP verification 4 Sign Proxy Sign Subordinate CA SIPS

OCSP MyProxy Grid Application 1 Execute 2 Cert valid? 3 Yes/No4: Processes 0 Fetch Proxy (OTP Login) 5a Refresh [How TBD] 7 Receive Results Grid Job Workflow

ESnet Proposal Components ESnet Radius service SIPS – Site Integrated Proxy CA –Variant (subset) of “Grid logon” Distributed HSM management –Extension of current system OCSP – Real time Certificate Validation –Already in development OTP services – federated management –Optional

Project Outline Feasibility study – Focus on RADIUS component –Simple: One OTP product RADIUS service One simple Application: login, sshd, ? –Complex: Multiple OTP products -or- Multiple servers of one OTP product HA configurations Geographical dispersion Firewall component (see end) ESnet proposal – pilot project

Project Development Collaboration –“Globus” PAM interface & specification –CA development Credential store integration; from Globus? SIPS Vendor –Front line site Deployment and DBMS requirements –ESnet RADIUS integration –Vendors

ESnet Radius

Auth DB Radius Proxy Ace Slave Radius Client Site (legacy) Radius Ace/Server OTP Radius Server ESnet Radius Multi-vendor Support ok? Use OTP Yes; cn=Mike Helm 12345, … Implied Radius Server authentication

ESnet Radius (2) Appliance Dedicated Hardware Minimal ports open High Availability Geographical dispersion

ESnet Radius (3) Data Model Sites manage data ESnet manages infrastructure & “transport” Partition RADIUS server –Sites manage/federate populating user db –Only Grid data (name) provided to grid app For now?

ESnet Radius (4) Authorization / Custom Info Namespace support is critical in Grids RADIUS must return subject name for SIPS CA Options for subject name CN=name, basename= site related Example: CN=mike, ou=people, dc=es, dc=net * CN=name, basename= DOEGrids similar to existing model Example: ou=people, dc=doegrids,

ESnet Radius (5) What does login look like to customers? Because we are forwarding (proxying for) multiple authentication domains, login users will need to specify their realms, eg Login may look much like Windows domain login Local name + realm (domain) == unique account name

ESnet Radius (6) Why provide an ESnet radius “layer”? Consistent interface to SIPS CA’s Separate CA’s from interoperability issues Manage mutual authentication between Radius Client (PAM) and Server Support related infrastructure

ESnet RADIUS (Summary) ESnet RADIUS – Authentication Router Deploy as many units as needed –One or more per site ESnet provides a “transport layer” but sites manage most of the data content directly Routers should present identical data everywhere (federation), but could proxy for other RADIUS servers, proxy between RADIUS servers could be used to support other site infrastructure

SIPS

ESnet Root CA MyProxy Credentials PAM 1 Log in 2 Ask AuthN 5 Receive Proxy Cert Manage myProxy 6 (Opt) Store Proxy 7 Execute OCSP HSM Subordinate CA Engine 4. Auth OK; Namestring 4 Sign Proxy Sign Subordinate CA SIPS

SIPS (2) Site Integrate Proxy Services Storing long term credentials is unattractive –Security headache –Little utility; can factor out –More appropriate in non-Authentication context “MyProxy” may be useful – short term cache –NB: “MyProxy” means “storage for short term credentials”

SIPS (3) SIPS mini-CA –Issues proxy or proxy like short term certs –Cert signed by ESnet root CA Hardware Security Module –See below OCSP –Real time & local certificate validation

Hardware Security Module HSM Grid Logon, or SIPS: –Online, 24x7, unattended CA! Good relationship with vendor Network based HSM management: –Network sharable device – –Network based management: – htmlhttp:// html –Remote Operator provides the ability for security personnel to present a smart card to their local HSM and have it recognized at a remote unattended HSM.

OCSP Online Certificate Status Protocol OCSP: A simple certificate validation service –RFC 2560: Valid/invalid/unknown responses –Alternative/synergize with lists of revoked certificates –Soliciting requirements for upcoming GGF draft document –Support physics grids –Pilot effort includes all European and US revocation lists –Pioneer the concept of “outsourcing” CA services

Federated OTP Implicit Assumption: Sites will “trust” other sites’ OTP authentication –Federation issue –Cross acceptance of proxy certs If a federated acquisition makes sense If a common solution makes sense ESnet can support certain backend, acquisition, and management functions; this makes some of our job easier Front line “fulfillment” functions should not be managed by ESnet: token support, deployment, configuration, help desk, &c

Put It Altogether! SIPS CA ESnet Radius SIPS CA ESnet Radius SIPS CA ESnet Radius SIPS CA ESnet Radius SIPS CA ESnet Radius ESnet AOA DOE Site1 DOE Site2 Collab Site1

Put It Altogether The ESnet RADIUS servers replicate their data amongst each other –Master-slave configuration developed from pilot SIPS or GRIDLOGON –Instances of a single, distributed CA? –Locally managed CA infrastructure? –(This is another part of the project!)

ESnet RADIUS & SIPS One RADIUS service – or MANY? Is this many SIPS CA’s – –Or just ONE CA with multiple instances? –Cloned CA feature available from vendor about 01 Jan 2005

Federation Work Needed Cross site OTP / token acceptance CA profiles –A profile of the DOE type CA is needed –Process –Certificate Policy changes Additional certificate extensions Site issues –Integration / Exposure of site authentication information –Classic federation problem

Standards Bodies (GGF and others) Gridlogon OTP requirements CA profiles –Addition of this CA type Federated Identity Proxy certificate requirements

Fusiongrid workflow

Fusiongrid workflow (2) Firewalls Delegation Isn’t somebody working on this? –EAP + X.509 -> RADIUS AuthN? Proxy certs? –MPLS VPN or? Grid networking Need help understanding issues Explore some basic issues/operations

IP Disclosure

Other Options This is a new initiative; requirements may shift, adding new complexity or removing unnecessary components Many other configurations are possible We will respond appropriately to these changing needs

One Time Password Infrastructure Call Center

The Reality Slide Much new work needs to be done We are ready willing & able to help ESnet needs additional support to meet these needs Additional middleware needs to be developed (“Globus” support) Sites need support to manage this process 24 x 7 infrastructure!

On going research: OTP & Secure Password Protocol Integration (Frank Siebenlist, Globus) On going research: OTP & Secure Password Protocol Integration Secure Password Protocol: –Shared secret (OTP) not revealed in protocol –Mutual authentication –Includes key-exchange Advantages: –“Provable” secure –No need for server key/cert –Resistant against MITM attacks –Possible SSH-forwarding schemes Ongoing work: –LBL’s security&crypto group with Globus –Implementation of protocol for SSL/SSH/OGSA-GT