Implementing Community Security Policies for Trustworthy e/cyberinfrastructure Jens Jensen, STFC (UK) Paolo Mori, CNR (IT) Stephan Kindermann, DKRZ (DE)

Slides:



Advertisements
Similar presentations
Access control for geospatial information objects using/extending the eXtensible Access Control Markup Language Andreas Matheus, Technische Universität.
Advertisements

EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
(Re)using existing AAI experiences and future --- AAI Soapbox --- Jens Jensen, STFC-RAL Terena VAMP, 0-1 Oct 2013.
Implementing Federated Security with ConSec Jens Jensen, STFC OGF40, Oxford, 16 Jan 2014.
Contrail and Federated Identity Management
1 Authorization XACML – a language for expressing policies and rules.
EUDAT FIM4R at TNC 2014 Jens Jensen, STFC, on behalf of EUDAT AAI task force.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI - Identity Management Steven Newhouse Director, EGI.eu Federated Identity.
Access Control Patterns & Practices with WSO2 Middleware Prabath Siriwardena.
Federated Identity Management for Research Communities (FIM4R) David Kelsey (STFC-RAL) EGI TF, AAI workshop 19 Sep 2012.
Authz work in GGF David Chadwick
XACML 2.0 and Earlier Hal Lockhart, Oracle. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
Towards Cloud Federations: what we have; what we want OGF 31, Taipei Cloud security session Jens Jensen Science and Technology Facilities Council Rutherford.
1 July 2005© 2005 University of Kent1 Seamless Integration of PERMIS and Shibboleth – Development of a Flexible PERMIS Authorisation Module for Shibboleth.
Audumbar. Access control and privacy Who can access what, under what conditions, and for what purpose.
Combining KMIP and XACML. What is XACML? XML language for access control Coarse or fine-grained Extremely powerful evaluation logic Ability to use any.
XACML Gyanasekaran Radhakrishnan. Raviteja Kadiyam.
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
XACML Briefing for PMRM TC Hal Lockhart July 8, 2014.
Federated A(A(A))I Jens Jensen hepsysman, RAL,
Here Come the Feds Federated identity management: the consumer’s perspective Jens Jensen, STFC On behalf of EUDAT AAI TF EGI CF Manchester April 2013.
Authorization Infrastructure, a Standards View Hal Lockhart OASIS.
Climate Sciences: Use Case and Vision Summary Philip Kershaw CEDA, RAL Space, STFC.
Federated Identity Management for HEP David Kelsey WLCG GDB 9 May 2012.
XACML – The Standard Hal Lockhart, BEA Systems. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
Elisa Bertino Purdue University Pag. 1 Security of Distributed Systems Part II Elisa Bertino CERIAS and CS &ECE Departments Purdue University.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
ShibGrid: Shibboleth access to the UK National Grid Service University of Oxford and STFC.
ASPiS Security Jens Jensen Science and Technology Facilities Council AHM, 8-11 Sep 2008 Edinburgh.
EMI is partially funded by the European Commission under Grant Agreement RI Argus Policies Tutorial Valery Tschopp - SWITCH EGI TF Prague.
Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
WebFTS File Transfer Web Interface for FTS3 Andrea Manzi On behalf of the FTS team Workshop on Cloud Services for File Synchronisation and Sharing.
EUDAT receives funding from the European Union's Horizon 2020 programme - DG CONNECT e-Infrastructures. Contract No The pan-European.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Report and plans Attribute.
11 Restricting key use with XACML* for access control * Zack’-a-mul.
EMI INFSO-RI Argus Policies in Action Valery Tschopp (SWITCH) on behalf of the Argus PT.
Federated Identity Management for HEP David Kelsey HEPiX, IHEP Beijing 18 Oct 2012.
Example Use Case for Attribute Authorities and Token Translation Services Jens Jensen, EUDAT/AARC/STFC.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
EUDAT receives funding from the European Union's Horizon 2020 programme - DG CONNECT e-Infrastructures. Contract No B2ACCESS LSDMA.
Ákos FROHNER – DataGrid Security n° 1 Security Group TODO
Federated Identity Management for Scientific Collaborations The Common Vision David Kelsey (STFC) 3 Nov 2011.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
OASIS e Xtensible Access Control Markup Language (XACML) Hal Lockhart
Access Control Policy Languages in XML Lê Anh Vũ Võ Thành Vinh
Authorization PDP GE Course (R4) FIWARE Chapter: Security FIWARE GE: Authorization PDP FIWARE GEri: AuthZForce Authorization PDP Owner: Cyril Dangerville,
AAI needs of the Distributed Computing Infrastructures - CLARIN Dieter Van Uytvanck Max Planck Institute for Psycholinguistics
EMI is partially funded by the European Commission under Grant Agreement RI Argus Policies Tutorial Valery Tschopp (SWITCH) – Argus Product Team.
Security and Delegation The Certificate Perspective Jens Jensen Rutherford Appleton Laboratory Workshop at NIKHEF, 27 April 2010.
Store and exchange data with colleagues and team Synchronize multiple versions of data Ensure automatic desktop synchronization of large files B2DROP is.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Services for Distributed e-Infrastructure Access Tiziana Ferrari on behalf.
Authentication and Authorisation for Research and Collaboration Peter Solagna, Nicolas EGI AAI integration experiences AARC Project.
WSO2 Identity Server. Small company (called company A) had few services deployed on one app server.
PIDs in EUDAT Webinar, 15 Februari 2013
Security of Distributed Systems Part II Elisa Bertino CERIAS and CS &ECE Departments Purdue University Purdue University.
OGF PGI – EDGI Security Use Case and Requirements
EGI Updates Check-in Matthew Viljoen – EGI Foundation
AAI for a Collaborative Data Infrastructure
Identity Management and Authorization
XACML and the Cloud.
CLARIN Federated Identity Vision
Federated Identity Management for Scientific Collaborations
Identity Management and Authorization
Community AAI with Check-In
EUDAT Site and Service Registry
Groups and Permissions
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
Presentation transcript:

Implementing Community Security Policies for Trustworthy e/cyberinfrastructure Jens Jensen, STFC (UK) Paolo Mori, CNR (IT) Stephan Kindermann, DKRZ (DE) Mark van de Sanden, SurfSARA (NL) International Symposium on Grids and Clouds (ISGC) 2014, Academia Sinica, Taipei, March 2014

Contents Background – the problem, the projects What are policies? AAI deployment Requirements Implementation

BACKGROUND The problem, the projects

Background – The Problem e/cyber infrastructures are providing services Mostly federation rules are quite simple –D Kelsey et al – WLCG federation rules –WLCG has a simple VO structure (see later) However, user communities will diversify –And complexificate –And future developments may also have an effect

Background – The Relevance e-/cyber-infrastructures support diverse communities Scale – more users, more data, complexity Make use of standards – tools, implementations, protocols Stds 1+1i Users

Background – the Projects Federated access to clouds: ConSec: framework for AAI Data e-Infrastructure

7 Data StagingSafe ReplicationSimple Store AAIMetadata Catalogue Dynamic replication to HPC workspace for processing Data curation and access optimization Various flavors Researcher data store (simple upload, share and access) Aggregated EUDAT metadata domain. Data inventory Network of trust among authentication and authorization actors PID Identity Integrity Authenticity Locations EUDAT Box dropbox -like service easy sharing local synching Semantic Anno checking & referencing services to come Dynamic Data immediate handling Workflow Engine executing WFs EUDAT Services

Simple but works – WLCG WLCGVOSiteSecurity

WLCG WLCG is (kind of) a federation of T0, T1, T2, T3 –1 T0, ~11 T1, ~100 T2s, Four original WLCG VOs (ATLAS, CMS, LHCb, ALICE) Additional VOs: global, international, national, site VOs provide scalability: –Accepting WLCG AUP –Defining scope of VO’s work –Managing membership and user authorisation –Authorisation is pretty coarse grained: user, production –Using VOMS (RFC3281 AC)

More complex: Dramatis Personae FederationCommunity Sub- community MemberSiteSite adminSite opsec“Fed stuff”

Next steps in federated authorisation? How can we express policy in practice, and which policy requirements can we identify – and satisfy with the technology available to us today? Case studies: ENES (climate), CLARIN (linguistics) in EUDAT

POLICIES

Policies (in general) –Identity attributes –Authorisation attributes doing to –identifier, class-of-object in –Time, location, status

We divide policies into two main classes: * Authorisations: express the actions that a subject is allowed to perform on an object within an environment. * Prohibitions: express actions that a subject is not allowed to perform on an object within an environment. (use with caution...)

Usage Control Normal access control: “pre” (before action) Ongoing control: “on” (after successful initial decision)

DEPLOYMENT

Technology Review Protocols and Standards X.509 – federation-internal credentials (SSL/TLS) XACML SAML OAuth (RFC6749) – delegation of credentials

From xacml-3.0-core-spec-os-en: Copyright © OASIS Open All Rights Reserved. The XACML model

Important: separation of duties in ConSec

REQUIREMENTS Community policies

ENES Data centres: local data ingest Actions: –Access, Ingest, Publish, Modification/Version User and API access (OGC WPS?)

CLARIN – The Language Archive (TLA) Trusted repository Users can upload and share language data NREN (Shib) feds for identity and attributes Authorisation is local (currently.htaccess), generally individually {user}x{file}  {true, false} Virtualises the logical name space and physical name, identifies objects via Persistent Identifiers

EUDAT itself Different authentication methods (e.g. OpenID, OAuth, X.509, Shib, …) Support fine grained access control – VO and Role approach does not (always) work A minimum set of semantically standardised attributes for user identification and access control (future: CoC) Communities retain control on authorisation decisions Attributes provided by IdP, ConSec, or (todo) AtP Support different Access Methods (e.g. HTTP, GridFTP, Web Portals, Workflows) Bridge to other infrastructures – PRACE, EGI, …

EUDAT itself Authorisation policies Language sufficiently expressive Tools to make it possible to express Sufficient performance in evaluations Resilience possible (against SPoF, attacks) Need much of XACML3.0 supported Also certain optional, er, options (note also support for UCON as extension)

IMPLEMENTATION Community policies

Very simple policies …? (Communities) Objects = Files (or datasets) Subjects = User (DN/principal) –With X.509. Possibly delegated (w. OAuth) Actions = read (mostly) Environment = (don’t care) …

Very simple policies? (Sites’ view) Site policies: –Define communities to support –Define min-req-LoA, policy-attrs., AUP accepted –Traceable identities –Agents are user-delegated (OAuth)

Very simple policies? (Fed’n view) Which LoAs are supported –Policy for assignment of LoAs to IdPs –Cross federation AUPs accepted Supporting volatile attributes? Community data must go only to community-supporting sites

Combining Algorithms Select on membership: –User is member of –PolicySet Kind of like boolean (except 3-state) (or (and (member-x) (cond-x)) (and (member-y) (cond-y))) Membership can be multi-valued (future?)

Combining Algorithms PolicySet: Policies from Com., Site, Fed’n Failsafe: deny overrides Consider ordering: in general, Com. is more specific (do last) Check communities orthogonal: (NotApplicable) if processed

Matching Community Resources (fed policy) Resource publishes (bag of) community Use of AttributeSelector

E.g. AUP and IdP-LoA Fed: IdP is covered by suitable policy –Or, user has accepted additional AUP Comm.: Must have Comm.-AUP Site: must have Comm. member and AUP

Problems – Translations Translating existing ACLs into the fed. infra “New” names: users, files –must be mapped, consistent, persistent –Particularly ePTID where no algo exists (use ?) How to address files –Replicas, PID, –Protect every replica; single ACL Datasets (PID/handle), granularity

Problems – more names urn names of attributes (AttributeDesignator) Harmonised credentials made it possible (problem is pushed to multi server and/or fed’n db) Consistency across PEPs - context

Access Control Decisions (community integration) Callout to existing PDP (e.g. REMS) –REMS: {user} x {file}  {true, false} Run a new REMS instance with e-I names Translate to fed-provided policy (language) –Maintain consistency With XACML it’d be Policy (with first-applicable ) … where Target matches file “name”, subject “name”, and action (Access)

CONCLUSION

What we can do XACML (prototype!) Data ACL (read only) Data ACL (read only) Fed level PAP

Future work PEP integration with EUDAT services Understanding of the naming problems Support more actions Link to external AA/AtP (eg VOMS) Community PAPs More testing…!

Conclusions Basics (like read-only) common to communities –Somewhat coarse grained, except objects –Expressing ~90% is relatively easy, translations harder –Still a bit experimental – getting a feel for what’s feasible –Semi-hand-knitted – works, but no direct community PAP Yes, probably XACML is overkill atm –But it makes sense to use standards –Maintain extensibility for future Move to federated authorisation not trivial –Mostly the (re)naming problems –Still need to integrate non-IdP AtP (AA) Federation must provide (consistent) authorisation –Enforced at lowest level (storage) – ConSec provides portal and API

Thanks… S Memon, FZJ (DE) I Matteucci, A Yautsiukhin, M Petrocchi, L Krautsevich, A Lazouski, CNR (IT) W Elbers, MPI (NL)

EXTRA SLIDES

POLICIES

Contradictions * Contradictory policies allow and deny the same action by the same subject on the same object within the same environment * Alice can write clinical data during office hours * Alice cannot write clinical data during office hours

Exceptions * Exceptions: different effects on the same action, and one policy is a subset of the other one. * Subjects with role General Practitioner can print documents of category medical of their patients * Subjects with ID dr12345 cannot print the document with ID xyz * dr12345 has role General Practitioner * xyz is a medical document

Correlations * Correlations: different effects and the attributes set of a policy intersects the attributes set of the other * Subjects with role Administrative Personnel can print administrative documents * Subjects with role Administrative Personnel cannot print administrative documents until 31/12/2020

Analytic Hierarchy Process 1)you have a goal in mind 2)you have different alternatives to reach the goal 3) AHP helps you in choose the most relevant alternative based on a set of criteria.

Sub-criteria Each criterion can be refined by considering sub-criteria

AHP for policy conflict resolution The goal is ranking two conflicting policies and prioritize the application of the winning policy The alternatives are the two conflicting policies The criteria are –Specificity of the subject –Specificity of the object –Specificity of the environment –The subcriteria for each criterion are for subject: ID, role, and organization for object: ID, category, and issuer for environment: status, time, and location

DEPLOYMENT

Fed stuff? Governance –Rules of membership –Policies Operations –Adding/removing sites, communities, –Security incidents (coordinate response) –Dealing with (high level) policy violations Legal –Data protection –Compliance with national legislation

Federated Id Resource PEP PDP DB Policies PAP PIP Subscr. OK X reject + suspend Federation core =attributes (SAML) Authorisation and Access Control