OGF 43, Washington 26 March 2015. FELIX background information Authorization NSI Proposed solution Summary.

Slides:



Advertisements
Similar presentations
Using PHINMS and Web-Services for Interoperability The findings and conclusions in this presentation are those of the author and do not necessarily represent.
Advertisements

Introduction of Grid Security
© 2006 Open Grid Forum Network Services Interface Introduction to NSI Guy Roberts.
OFELIA – Japan interconnection Hagen Woesner, Coordinator of OFELIA project.
17 March 2010 Workshop on Efficient and Effective eGovernment FASTeTEN : a Flexible Technology in Different European Administrative Contexts
Enabling Secure Internet Access with ISA Server
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
The European Activities of BR Communication e-CODEX e-Justice Communication via Online Data Exchange Bucharest, June 14 th 2013.
Contrail and Federated Identity Management
Inter-Institutional Registration UNC Cause December 4, 2007.
Lecture 23 Internet Authentication Applications
Authentication & Kerberos
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
FEDERATED TEST-BEDS FOR LARGE SCALE INFRASTRUCTURE EXPERIMENTS.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Generic AAA model in Grids IRTF - AAAARCH meeting IETF 52 – Dec 14 th Salt Lake City Leon Gommans Advanced Internet Research Group.
8.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Design Extensions to Google+ CS6204 Privacy and Security.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Survey of Identity Repository Security Models JSR 351, Sep 2012.
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
EC (EU), MIC & NICT (JP) collaborative project Project running from April 2013 till March PMs of effort PL BE NL DE IT ES JP EU coordinator JP.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
EMI AAI Strategy & Plans John White / Helsinki Institute of Physics Federated Identity Systems for Scientific Collaborations Workshop , CERN,
Sponsored by the National Science Foundation GEC16 Plenary Session: GENI Solicitation 4 Tool Context Marshall Brinn, GPO March 20, 2013.
Sponsored by the National Science Foundation Enabling Trusted Federation Marshall Brinn, GENI Program Office October 1, 2014.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
Insert Your Name Insert Your Title Insert Date Client Registration Open Issues Update 5/27/2011 Denis Pochuev (original proposal by Alan Frindell)
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Connect. Communicate. Collaborate The authN and authR infrastructure of perfSONAR MDM Ann Arbor, MI, September 2008.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
CaGrid 2.0 Security Prototype 1. Goals Prototype some proposed security solutions – Ensure interoperability across programming models – Ensure interoperability.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
Authorisation Jens Jensen, Phil Kershaw (STFC) et al. contrail is co-funded by the EC 7th Framework Programme under Grant Agreement nr contrail-project.eu.
D u k e S y s t e m s GENI Federation Basics Jeff Chase Duke University.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Overview –Monitoring the slice(s) dynamically provisioned over the FELIX testbed Cooperates with the Resource Orchestrator (RO) for overall view – Hierarchical.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Federation and Software Defined Exchanges (SDXs): Applications, Services, Architecture, Technologies, and Implementations Joe Mambretti, Director,
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Insert Your Name Insert Your Title Insert Date Client Registration Examples Alan Frindell 2/18/2011.
Insert Your Name Insert Your Title Insert Date Client Registration Examples Alan Frindell Denis Pochuev 4/26/2011.
D u k e S y s t e m s Some Issues for Control Framework Security GEC7 Jeff Chase Duke University.
A Study of Certification Authority Integration Model in a PKI Trust Federation on Distributed Infrastructures for Academic Research Eisaku SAKANE, Takeshi.
Survey of Identity Repository Security Models JSR 351, Sep 2012.
Identity Federations - Overview
HellasGrid CA & euGridPMA
Public Key Infrastructure (PKI)
Network Services Interface
The New Virtual Organization Membership Service (VOMS)
NAAS 2.0 Features and Enhancements
Public Key Infrastructure from the Most Trusted Name in e-Security
Mix & Match: Resource Federation
X-Road as a Platform to Exchange MyData
Community AAI with Check-In
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
Presentation transcript:

OGF 43, Washington 26 March 2015

FELIX background information Authorization NSI Proposed solution Summary

FELIX Background Information

EC (EU), MIC & NICT (JP) collaborative project -Collaboration between European and Japanese partners Started in April To run till March 2016 PL BE NL DE IT ES JP EU coordinator JP coordinator To createa large-scale testbed (experimental infrastructure), federated across two continents To define a common software architecture for testbeds FactsObjectives

OFELIA (OpenFlow in Europe: Linking Infrastructure and Applications) RISE (Research Infrastructure for large-Scale network Experiments) Existing testbeds To increase mutual benefits of European and Japanese researchers by creating more complex environments for specialized research and experiments Why to federate?

RO: Resource Orchestrator, MRO: Master RO, VM: Virtual Machine, AM: Aggregate Manager, RM: Resource Manager, SE-RM: Stitching Entity-RM, TN-RM: Transit Network-RM

A trust anchor and responsible for authentication and authorization of all actors in a FELIX deployment Supports extended Common Federation Service API version 2 Authentication using digital certificate Certificate –Asserts: public key ↔ subject –Issued & digitally signed by clearinghouse CA –Defined validity period –X.509 version 3 Authorization using digital credentials Credentials –Provide the owner with permissions on a target object –Issued & digitally signed by clearinghouse CA –Defined validity period –Can be delegated –SFA and ABAC formats are supported

Authorization in NSI

NSI is agnostic to authentication and authorization methods used by any network deployment NSI introduces a flexible header element for transporting security related information between NSAs within the trusted control plane The format of the any security related parameters inside the is left up to solution implementation must be supplied by user/application to uRA for insertion in NSI request header Security attributes are securely transported to all uPA involved in the reservation and consumed by their Authorization Server(s) SURFnet deployment has employed OAuth token based authorization

* Copied from John MacAuley’s presentation on NSI: Security Omnibus, Dec. 2014

Application (client) User (Resource owner) Authorization Server Resource Server 1. Authorization Request 2. Authorization Grant 3. Authorization Grant 4. Access Token 5. Access Token 6. Requested resources Authorization Server User (Resource owner) 0. User Registration *Figure redrawn from RFC 6749

Secure Transport uRA AG uPA NRM Authorization Server 1. Auth Grant 2. Access token 3. Access token + NSI reservation request 4a. Access token placed in NSI header 5. Extract access token 7. Confirm reservation 6. Validate access token 4b. Access token placed in NSI header

OAuth-based Solution for FELIX

Assumption: A central NSI Authorization Server exists per NSI deployment Establish trust relationship between FELIX clearinghouse and NSI Authorization Server (analogous to user registration) NSI Authorization Server adds FELIX clearinghouse’s root certificate in its Trusted Root Certificates This way, NSI Authorization Server recognizes all certificates and credentials signed by FELIX clearinghouse TN-RM obtains GENI styled digitally signed credentials by FELIX clearinghouse TN-RM employs its credentials as ‘Authorization Grant’ to authenticate and authorize with NSI Authorization Server and obtain access token

FELIX TN-RM FELIX Clearinghouse NSI Authorization Server NSI AG/uPA Digital credential Access Token Requested resources Trust

Secure Transport AG uPA NRM NSI Authorization Server 1. Credential 2. Access token 3. Access token placed in NSI request header 5. Extract access token 7. Confirm reservation 6. Validate access token TN-RM FELIX Clearinghouse Credential RO MRO 4. Access token placed in NSI request header RO: Resource Orchestrator MRO: Master RO RM: Resource Manager TN-RM: Transit Network-RM

Use of FELIX credential as ‘Authorization Grant’ complies with RFC 6749 NSI Authorization Server must NOT issue access token with validity period greater than that of TN-RM’s FELIX credential In authorization process, NSI Authorization Server must validate presented credential and check whether privileges are sufficient to demand an access token TN-RM’s FELIX credentials are issued and renewed by FELIX clearinghouse TN-RM may use same access token for multiple resource requests TN-RM may request access token more than once using the same credentials The proposed approach could also be employed by other GENI/FIRE SDN testbeds

FELIX project is about federation of SDN testbeds in EU and Japan FELIX relies on NSI for multi-domain on-demand network connection services through transit network OAuth can be used for NSI control-plane authentication and authorization NSI Authorization Server establishes trust relationship with FELIX clearinghouse TN-RM entity of FELIX acts as uRA when interfacing NSI world FELIX clearinghouse issues GENI styled credential to its TN-RM entity TN-RM exchanges its FELIX credentials to obtain access token In future other methods for AuthN/AuthZ may also be supported

Poznan Supercomputing and Networking Center Poland Nextworks Italy European Center for Information and Communication Technologies Gmbh Germany Fundacio Privada i2CAT, Internet I Innovacio Digital A Catalunya Spain SURFnet bv Netherlands KDDI Japan National Institute of Advanced Industrial Science and Technology Japan iMinds VZW Belgium Thanks for your attention Acknowledgement: Some figures and text are based on John MacAuley’s presentation on NSI: Security Omnibus, Dec. 2014