Https://aarc-project.eu Status and plans of AARC SA1 Libraries pilots Pete Birkinshaw, Martin Haase, Peter Gietz / DAASI Lalla Mantovani, Barbara Monticini,

Slides:



Advertisements
Similar presentations
Lousy Introduction into SWITCHaai
Advertisements

Federated Identity for Grid Architects Tom Scavo NCSA
Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
Secure Lync mobile Authentication
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
Active Directory Integration with Microsoft Office 365 Ross Adams & Jono Luk Program Managers Microsoft Corporation OSP321.
SWITCHaai Team Federated Identity Management.
Identity Management in Education. Welcome Scott Johnson, NetProf, Inc. Creator of OmnID Identity Management for Education
Global Customer Partnership Council Forum | 2008 | November 18 1IBM - GCPC MeetingIBM - GCPC Meeting IBM Lotus® Sametime® Meeting Server Deployment and.
Single Sign-On Multiple Benefits via Alaska K20 Identity Federation 20 May 2011 BTOP Partner Meeting Anchorage, Alaska 20 May 2011 BTOP Partner Meeting.
AARC Overview Licia Florio, David Groep 21 Jan 2015 presented by David Groep, Nikhef.
I2Q & WMnet Pilot Presented by Jason Rousell – i2Q Jay Neale - i2Q.
AAI-enabled VO Platform “VO without Tears” Christoph Witzig EGI TF, Amsterdam, Sept 15, 2010.
Belnet Federation Belnet – Loriau Nicolas Brussels – 12 th of June 2014.
Helsinki Institute of Physics (HIP) Liberty Alliance Overview of the Liberty Alliance Architecture Helsinki Institute of Physics (HIP), May 9 th.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
The I-Trust Federation: Federating the University of Illinois Keith Wessel Identity Management Service Manager University of Illinois at Urbana-Champaign.
authenticated networked guided environment for learning - secure integration of learning environments with digital libraries - Current.
Real Life Solution, Real Life Problems: A-Select, An Open Source Federated Identity Management Solution An Identity 1.0 story Maarten Koopmans SURFnet,
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
Holly Eggleston, UCSD Shibboleth and Library Resources InCommon Library/Shibboleth Project.
Authentication and Authorisation for Research and Collaboration Pilots on the Integrated R&E AAI Paul van Dijk, Activity Lead Pilots.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Connect. Communicate. Collaborate AAI scenario: How AutoBAHN system will use the eduGAIN federation for Authentication and Authorization Simon Muyal,
Authentication and Authorisation for Research and Collaboration David Kelsey AARC AHM Milan And mechanisms NA3 Task 4 – Scalable.
Authentication and Authorisation for Research and Collaboration SA1 - Pilots on the Integrated R&E AAI TSA1.1 - Pilots on Guest.
Authentication and Authorisation for Research and Collaboration Niels van Dijk AARC General Meeting Authentication and Authorisation.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Report and plans Attribute.
Authentication and Authorisation for Research and Collaboration Michał Jankowski, Maciej Brzeźniak AARC General Meeting, Milan.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Current status and plans.
Authentication and Authorisation for Research and Collaboration Christos Kanellopoulos GRNET Proposed Pilots for Libraries and eGov.
CARSI: Federated Identity and Resource Sharing over CERNET Dr. PING CHEN Peking University( 北京大学 ) Jan, 24 th, 2008.
Authentication and Authorisation for Research and Collaboration Milan, Italy Training and Outreach Authentication and Authorisation.
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
June 9, 2009 SURFfederatie: implementing a multi- protocol federation Hans Zandbelt & Joost van Dijk, SURFnet.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
A uthentication & A uthorization for R esearch & C ollaboration Pilots in SA1 Paul van Dijk, SURFnet AARC.
Shibboleth at USMAI David Kennedy Spring 2006 Internet2 Member Meeting, April 24-26, 2006 – Arlington, VA.
European Grid Initiative AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
Authentication and Authorisation for Research and Collaboration Bari, Italy Training and Outreach Authentication and Authorisation.
David Groep Nikhef Amsterdam PDP & Grid AARC Authentication and Authorisation for Research and Collaboration an impression of the road ahead.
B2access.eudat.eu B2ACCESS User Training How to register with B2ACCESS Version 1 February 2016 This work is licensed under the Creative Commons.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Enabling SSO capabilities in the EGI Cloud services Peter Solagna – EGI.eu.
Networks ∙ Services ∙ People Licia Florio TNC, Lisbon Consuming identities across e- Infrastructures 16 June 2015 PDO GÈANT.
Authentication and Authorisation for Research and Collaboration Peter Solagna, Davide Vaghetti, et al. Topics for PY2 activities.
Authentication and Authorisation for Research and Collaboration Peter Solagna, Nicolas EGI AAI integration experiences AARC Project.
Authentication and Authorisation for Research and Collaboration AARC/CORBEL Workshop for Life Sciences AAI AARC Draft Blueprint.
Authentication and Authorisation for Research and Collaboration Lalla Mantovani AARC General Meeting, Utrecht What do we want to.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
Using Your Own Authentication System with ArcGIS Online
WLCG Update Hannah Short, CERN Computer Security.
Mechanisms of Interfederation
Federation made simple
eduTEAMS platform for collaboration Niels Van Dijk
eduTEAMS – Current status & Future Plans
Identity Federations - Overview
Géant-TrustBroker Dynamic inter-federation identity management
An AAI solution for collaborations at scale
AARC2 JRA1 Nicolas Liampotis
Shibboleth Implementation in EZproxy
GALILEO Approach and implementation
Pilots in AARC Arnout Terpstra (AARC2) / Paul van Dijk (AARC1)
AARC Blueprint Architecture and Pilots
Community AAI with Check-In
Shibboleth 2.0 IdP Training: Introduction
eIDAS-enabled Student Mobility
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
Presentation transcript:

Status and plans of AARC SA1 Libraries pilots Pete Birkinshaw, Martin Haase, Peter Gietz / DAASI Lalla Mantovani, Barbara Monticini, Mario Reale / GARR Niels van Dijk / SURFnet Jens Jenses / STFC Nicolas Liampotis, Christos Kanellopoulos, Zenon Mousmulas / GRNET Jiri Pavlik, Petr Zabicka / MZK SA1 TSA1.1 Pilots on Guest Identities Subtask TSA1.1.3 Libraries 1

Content Goals for subtask TSA1.1.3 (Libraries) Key aspects for defining solutions and planning pilots Requirements and Pilots Pilot #1 : Libraries Extended Multi-Scenario pilot Pilot #2: Proxy Model for Library Consortia Pilot #1: Libraries Extended Pilot on Hybrid Access: Scenario 1 - EZ proxy access mode switch Scenario 2 - Walk in user portal including IP based AuthN Scenario 3 - Super Walk In portal dealing with multiple libraries Pilot #2: Showcasing benefits for Library Consortia to join a federation as an IDP/SP proxy Next Steps 2

Pilot solutions (from JRA1) for supporting Libraries in adopting Federated AAI taking into account the requirements from users’ communities Library pilots have to take into account: Solutions allowing Hybrid Authentication IP-based AuthN and Identity Federations Walk-In Users: Library Users might not be registered in any IDP Library Consortia / Branding: In many cases one or few organizations manage contracts with publishers at the national level 3 Goals for subtask TSA1.1.3 (Libraries)

National bodies dealing with purchasing electronic resources are the Identity Federations only in few cases in Europe We Need a link between Nat Id Federations and National Bodies for the Negotiation of electronic resources Examples: UK(JISC), NL, contract signer = National Identity Federation FR, SP, IT: IT,FR,SP: Nat Id Fed does not manage contracts + National Body to issue contracts ( not managing any Federation) GR : 2 Federations : HEAL-Link and GRnet 4 Identity Federation vs Libraries Consortia

Scenario 1: Demonstrate usage of EZproxy as Access Mode Switch (AMS) Gain hands-on experience on the tool Write a comprehensive guide supporting libraries in the configuration of EZ proxy as AMS enabling SAML IDP based AuthN wherever possible Scenario 2 Extend Authentication mechanisms for one library to set Attributes in assertions based on IP information providing a portal dealing with walk-in users as bulk users Scenario 3 Extend Scenario 2 to the case of multiple libraries 5 Goals for pilot #1

Showcase benefit for a Library Consortium to join a federation as and IDP/SP proxy [ see later slides from Nicolas here ] 6 Goals for pilot #2

OCLC EZproxy acting as access mode switch + IP based IDP ext for Walk-ins 7 Scenario 1: Hybrid access (EZproxy as access mode switch)

1.Installed EZpx working as a standard IP GARR Firenze a.working with actual publishers b.local DB to store credentials (username and password of users) 2.Shibboleth: Made EZproxy become an SP in the test federation a.required wildcard * certificates - used TCS digicert - easy to obtain - wild card for port 443 b. self-signed certificate for metadata 3.Configured a trusted connection to a single IDP 4.Release of attributes to EZproxy: a.entitlement of the user ( not only affiliation, but if a user belongs to a specific department...and so on) - Shibboleth set up, you can specify specific roles - I followed the suggestion on the guide b.Many options are available 5. Configured federated login on EZproxy a.Users logged in on EZproxy using their HO credentials 8 Wrap up of Work Done on OCLC EZproxy (Scenario 1) 1/4

6.After login, the PX mechanism would be in place also publishers support federated ID 7.Configured the Access Mode Switch: a.Each resource/publisher has been configured in EZproxy standard way (database stanzas) b.For those publisher who provides “Institutional Login” a special directive (SPUEdit) has been configured c.Any user request is served redirecting the user session to the SP login initiator if available or simply proxying contents otherwise 8.Advantages: in case of IP proxing, the network traffic mostly depends on the proxy activity - in the other case the user is redirected to the publisher reducing the network connections 9 Wrap up of Work Done on OCLC EZproxy (Scenario 1) 2/4

Compared to the standard proxy mechanism (based on IP) the advantage of SSO is to maintain user profiling feature (if available by the provider) EZpx acts like a service provider accepting federated login and thus avoiding the need of having a local user DB EZpx is already in place in many location of our community and is known to work well with many discovery service tools and library delivery systems So: if resources are not federated → Simple IP Px If resources are federated, use the redirect SSO, BYPASSING the IP proxying mechanisms A guide has been written based on the experience of this pilot 10 Wrap up of Work Done on OCLC EZproxy (Scenario 1) 3/4

Implemented mechanisms for Guest Users a smart way to manage users not yet in IDP Libraries accepting walk in users - not registered in the IDP - on a public terminal Shibboleth in the IDP instance can support not only username and password but also IP IP-based access from the IDP side ( >>>> only towards IP endpoints) [ few IP address to be Auth ] >> Not prompted for username and password 11 IP based authn and walk ins in Scenario 1

Full validation of EZ proxy as Access Mode Switch Produced Install and Config guide to support Librarians in configuriong EZ-proxy: th-en-2.pdf?version=1&modificationDate= &api=v2 th-en-2.pdf?version=1&modificationDate= &api=v2 Guide will be initial input for a dedicated training program for Librarians ( ---> NA2 ) 12 Outcome Pilot Scenario 1: full exploitment of EZproxy

Portal allowing both IP and federated AuthN Dealing with 1 Library ( 1 IDP) Setting attributes based on IP info 13 Scenario 2 Walk-In user portal including IP-based AuthN

Currently being implemented by Pete - Martin on OKEANOS resources Based on IP-based Authentication extension for Shibboleth IDP version 3 DAASI has gained experience on IP based Shib IDP extension from past projects 14 Scenario 2

Portal dealing with many Libraries Acting as User Interface Publishers see IDPs selected by user Portal is a Federation SP Manages IP based info 15 Scenario 3: “Super Walk-in” portal dealing with multiple libraries

Users- Portal 16 Simplified Trust Model Publishers SPs Portal SP Portal IDP Users IDPs Portal- Publishers eduGAIN

Additional features w.r.t. Scenario 1 and 2: Deals with multiple libraries Manages contracts centrally → Sets IP ranges for Libraries Enables both Authentication methods: IP-based Federated IDP Sets appropriate SAML Attribute based on IP-based info ePSA = ePE = staff, student, …. 17 Scenario 3 : Super Walk-In portal for many libraries

Users can own Federated IDs in a Library IDP or be walk-ins: Portal UI has a Federation SP component: if in IDP, they log in on the portal selecting their IDP if not, they are identified as Walk-in library Once logged in, the portal act as a multiple connector: a SSO proxy redirecting to publisher SP if users are federated towards federated SP presenting IDP released attributes an IDP to SP releasing (ePSA) to federated SPs for walk-in users (IP-based AuthN) an IP proxy for all AuthN’ed users towards non-federated SPs 18 Scenario 3: User Workflow

Libraries managers: log in to the portal set IP ranges (net/subnets) for IP based AuthN select which attributes they want the portal to release matching IP based information Eg. ePSA ePE Attribute release can be SP-specific 19 Scenario 3: Management Workflow

AARC SA1 Pilots Subtask SA1.1.3 Pilot #2 - Proxy Model for Library Consortia 3rd AARC General Meeting 24 May 2016, Utrecht Nicolas Liampotis GRNET

Pilot goals (I) The main goal of this pilot is to showcase the benefits for a library consortium, namely HEAL-Link, joining a federation as an IdP/SP proxy. These benefits include: allowing publisher contracts to be managed centrally by the consortium easier to implement and manage than establishing trust relationships among IdPs and SPs (either bilateral or through a federation) the consortium will retain control on the branding and policies disconnecting the establishment of technical trust between the IdP and SP entities from the application of policies relating to contracts (publisher subscriptions etc.) more precise and easier to produce statistics 21

Pilot goals (II) Integrate with the other library pilot activities in order to investigate the possibilities in the proxy model to address library requirements relating to the use of: guest identities mixed federated and IP-based access 22

Pilot milestones Deploy IdP/SP proxy and publish metadata to REEP ✔ Test login workflow using AARC DIY IdP and pilot SP entities ✔ The IdP/SP proxy has joined GRNET federation ✔ Test login workflow using production IdPs in Greece [WIP] Federate IdP/SP proxy with at least one SP of a publisher (even demo/testing), who partners with HEAL-Link [WIP] Test login workflow and access to content has been tested successfully. 23

24

Pilot extension: Mixed federated and IP-based access Adding support for Library (Walk-In) users based on IP address would require: Interconnecting proxy to Shibv3IdP with IP-based AuthN plugin Allowing admin staff of consortium and member libraries to manage IP address ranges / eduPersonEntitlements via: Web portal REST API 25

Proceed with implementation of Scenario 2- 3 for Pilot#1 Finalize/Test scenario 2 Enlarge discussion to Libraries and publishers about Scenario 3 Expand carefully the design into further detail for Scenario 3 Splitting admin and user profiles/roles requires assessment of possible options/solutions Test in multiple federation scenarios Proceed with workplan for Pilot#2 test in production add support for walk-in users 26 Next Steps