1 Grid security Services and Support Vincenzo Ciaschini, INFN CNAF V INFN-GRID workshop 18-20/12/2006.

Slides:



Advertisements
Similar presentations
29 June 2006 GridSite Andrew McNabwww.gridsite.org VOMS and VOs Andrew McNab University of Manchester.
Advertisements

Data Management Expert Panel - WP2. WP2 Overview.
EGEE-II INFSO-RI Enabling Grids for E-sciencE The gLite middleware distribution OSG Consortium Meeting Seattle,
FP7-INFRA Enabling Grids for E-sciencE EGEE Induction Grid training for users, Institute of Physics Belgrade, Serbia Sep. 19, 2008.
Role Based VO Authorization Services Ian Fisk Gabriele Carcassi July 20, 2005.
The VOMS Attribute Authority and its relation with Shibboleth Presenter: Vincenzo Ciaschini 8 th TF-EMC2 Meeting Firenze, March 2007.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Services Abderrahman El Kharrim
Copyright B. Wilkinson, This material is the property of Professor Barry Wilkinson (UNC-Charlotte) and is for the sole and exclusive use of the students.
Makrand Siddhabhatti Tata Institute of Fundamental Research Mumbai 17 Aug
INFSO-RI Enabling Grids for E-sciencE XACML and G-PBox update MWSG 14-15/09/2005 Presenter: Vincenzo Ciaschini.
CERN, 29 August 2006 Status Report Riccardo Zappi INFN-CNAF, Bologna.
OSG Middleware Roadmap Rob Gardner University of Chicago OSG / EGEE Operations Workshop CERN June 19-20, 2006.
May 8, 20071/15 VO Services Project – Status Report Gabriele Garzoglio VO Services Project – Status Report Overview and Plans May 8, 2007 Computing Division,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
Apr 30, 20081/11 VO Services Project – Stakeholders’ Meeting Gabriele Garzoglio VO Services Project Stakeholders’ Meeting Apr 30, 2008 Gabriele Garzoglio.
GILDA testbed GILDA Certification Authority GILDA Certification Authority User Support and Training Services in IGI IGI Site Administrators IGI Users IGI.
Mine Altunay OSG Security Officer Open Science Grid: Security Gateway Security Summit January 28-30, 2008 San Diego Supercomputer Center.
LCG Middleware Testing in 2005 and Future Plans E.Slabospitskaya, IHEP, Russia CERN-Russia Joint Working Group on LHC Computing March, 6, 2006.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security and Job Management.
Mar 28, 20071/9 VO Services Project Gabriele Garzoglio The VO Services Project Don Petravick for Gabriele Garzoglio Computing Division, Fermilab ISGC 2007.
Maarten Litmaath (CERN), GDB meeting, CERN, 2006/02/08 VOMS deployment Extent of VOMS usage in LCG-2 –Node types gLite 3.0 Issues Conclusions.
EDG Security European DataGrid Project Security Coordination Group
AN INTEGRATED FRAMEWORK FOR VO-ORIENTED AUTHORIZATION, POLICY-BASED MANAGEMENT AND ACCOUNTING Andrea Caltroni 3, Vincenzo Ciaschini 1, Andrea Ferraro 1,
June 24-25, 2008 Regional Grid Training, University of Belgrade, Serbia Introduction to gLite gLite Basic Services Antun Balaž SCL, Institute of Physics.
Mine Altunay July 30, 2007 Security and Privacy in OSG.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks VOMS Vincenzo Ciaschini EGEE/OSG Workshop.
Overview of Privilege Project at Fermilab (compilation of multiple talks and documents written by various authors) Tanya Levshina.
Role Based VO Authorization Services Ian Fisk Gabriele Carcassi July 20, 2005.
US LHC OSG Technology Roadmap May 4-5th, 2005 Welcome. Thank you to Deirdre for the arrangements.
WebFTS File Transfer Web Interface for FTS3 Andrea Manzi On behalf of the FTS team Workshop on Cloud Services for File Synchronisation and Sharing.
1 Andrea Sciabà CERN Critical Services and Monitoring - CMS Andrea Sciabà WLCG Service Reliability Workshop 26 – 30 November, 2007.
VO management: Progress since Chicago Workshop Vincenzo Ciaschini 23/5/2002 CNAF – Bologna.
INFSO-RI Enabling Grids for E-sciencE G-PBox Auth meeting 13/9/2005 Presenter: Vincenzo Ciaschini.
OSG AuthZ components Dane Skow Gabriele Carcassi.
INFSO-RI Enabling Grids for E-sciencE Installing a gLite VOMS server Joachim Flammer Integration Team, CERN EMBRACE Tutorial, Clermont-Ferrand.
Glite. Architecture Applications have access both to Higher-level Grid Services and to Foundation Grid Middleware Higher-Level Grid Services are supposed.
VOMS: Status & Plans Vincenzo Ciaschini, Valerio Venturi MWSG Meeting, CERN, Feb
FP6−2004−Infrastructures−6-SSA E-infrastructure shared between Europe and Latin America Alexandre Duarte CERN IT-GD-OPS UFCG LSD 1st EELA Grid School.
INFSO-RI Enabling Grids for E-sciencE ARDA Experiment Dashboard Ricardo Rocha (ARDA – CERN) on behalf of the Dashboard Team.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Grid2Win : gLite for Microsoft Windows Roberto.
Testing and integrating the WLCG/EGEE middleware in the LHC computing Simone Campana, Alessandro Di Girolamo, Elisa Lanciotti, Nicolò Magini, Patricia.
INFSO-RI Enabling Grids for E-sciencE /10/20054th EGEE Conference - Pisa1 gLite Configuration and Deployment Models JRA1 Integration.
DIRAC Pilot Jobs A. Casajus, R. Graciani, A. Tsaregorodtsev for the LHCb DIRAC team Pilot Framework and the DIRAC WMS DIRAC Workload Management System.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
INFSO-RI Enabling Grids for E-sciencE Policy management and fair share in gLite Andrea Guarise HPDC 2006 Paris June 19th, 2006.
INFSO-RI Enabling Grids for E-sciencE VOMS & MyProxy interaction Emidio Giorgio INFN NA4 Generic Applications Meeting 10 January.
Ákos FROHNER – DataGrid Security n° 1 Security Group TODO
SESEC Storage Element (In)Security hepsysman, RAL 0-1 July 2009 Jens Jensen.
Site Authorization Service Local Resource Authorization Service (VOX Project) Vijay Sekhri Tanya Levshina Fermilab.
INFSO-RI Enabling Grids for E-sciencE DGAS, current status & plans Andrea Guarise EGEE JRA1 All Hands Meeting Plzen July 11th, 2006.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks OpenSAML extension library and API to support.
Placeholder ES 1 CERN IT EGI Technical Forum, Experiment Support group AAI usage, issues and wishes for WLCG Maarten Litmaath CERN.
Status of gLite-3.0 deployment and uptake Ian Bird CERN IT LCG-LHCC Referees Meeting 29 th January 2007.
EGEE-III INFSO-RI Enabling Grids for E-sciencE VO Authorization in EGEE Erwin Laure EGEE Technical Director Joint EGEE and OSG Workshop.
Consorzio COMETA - Progetto PI2S2 UNIONE EUROPEA Grid2Win : gLite for Microsoft Windows Elisa Ingrà - INFN.
OSG Status and Rob Gardner University of Chicago US ATLAS Tier2 Meeting Harvard University, August 17-18, 2006.
SAM architecture EGEE 07 Service Availability Monitor for the LHC experiments Simone Campana, Alessandro Di Girolamo, Nicolò Magini, Patricia Mendez Lorenzo,
DGAS Distributed Grid Accounting System INFN Workshop /05/1009, Palau Giuseppe Patania Andrea Guarise 6/18/20161.
Bologna, March 30, 2006 Riccardo Zappi / Luca Magnoni INFN-CNAF, Bologna.
Overview of the New Security Model Akos Frohner (CERN) WP8 Meeting VI DataGRID Conference Barcelone, May 2003.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Introduction Salma Saber Electronic.
EGEE Data Management Services
Argus EMI Authorization Integration
Jean-Philippe Baud, IT-GD, CERN November 2007
AuthN and AuthZ in StoRM A short guide
StoRM: a SRM solution for disk based storage systems
Short update on the latest gLite status
The INFN Tier-1 Storage Implementation
Update on EDG Security (VOMS)
INFNGRID Workshop – Bari, Italy, October 2004
Presentation transcript:

1 Grid security Services and Support Vincenzo Ciaschini, INFN CNAF V INFN-GRID workshop 18-20/12/2006

2 Index Basic services  VOMS Security in grid services  WMS, DM, IS, etc… Forthcoming services  G-PBox, StoRM, glExec

3 VOMS

4 What is VOMS VOMS is an X.509 Attribute Authority with special support for grids.  Adds groups and roles.  Adds Attribute Certificates (ACs) directly in the user proxy.  Used via voms-proxy-init command.  Compatible with grid-proxy-init

5 Current status (voms) Server version is the latest version in production.  It can generate proxy certificates for globus 2 and 3.  Does not support globus 4. LDAP server have been turned off.

6 Current status (voms) Many VOs only hosted at CERN.  cms, atlas, alice, lhcb, etc…  No replication -- CERN team not interested in doing it. Other VOs at CNAF  Infngrid, etc..  Available for replication

7 Current status (voms) Stability  VOMS at CERN highly unstable CERN Oracle sometimes goes into ‘kernel panic’. CERN Oracle also gets in other non-working states. No replication means no one can create a proxy.

8 Current status (voms) Old (Non INFN-developed) voms-admin may leaks memory.  Only happens at the CERN installation.  Not reproducible anywhere else.  Not interesting: voms-admin 2.0 will be out in january and is a rewrite of voms-admin 1.x Status  Tested by EGEE testing team.  Core considered stable by gLite.

9 In Certification (voms) Voms version is in certification.  New features breakout: Generic attributes Host certificates in AC GT4 support Correct Java APIs Several bug fixes

10 In Certification (voms) Additional features:  Support for generic attributes Couples (name, value) Requested by: LHCb, Atlas (user afs identity) Support for shibboleth integration Other middleware: DGAS (user LHR) Examples:  (parentOrganization, INFN CNAF)  (guarantor, Andrea Sciaba)  (user, vciaschi) Deprecates capabilities.

11 In Certification (voms) Additional features  VOMS certificate included in the voms proxy instead than distributed in vomsdir. Requested by SA1 to ease management.  VOMS certificates are needed for proxy verification, but change rapidly (once a year)  Current update procedures are not up to this for several VOs. Transparent to the user.

12 In Certification (voms) Additional features  Support for GT4 Needed for interoperability and usage with many non-gLite grids. Native globus version of gLite 3.1 INCOMPATIBLE proxy format with GT3  Last verified with GT and GT  However, you may still generate GT2 proxies. They are compatible with pretty much anything.

13 In Certification (voms) Additional features  Corrected AC verification in Java APIs. Previous versions would consider invalid ACs as valid.  Several bug fixes See bDevelopment for details. bDevelopment

14 Forthcoming (voms) Voms-admin version 2.0  Easier, more stable and more maintainable administration interface.  Would include conformance to JSPG requirements.  Would allow user to request inclusion in specific groups/ownership of specific roles.  Developed by INFN

15 Voms-admin screenshot

16 Forthcoming (voms) Java voms-proxy-init.  Create proxies from java applications. Requested by several applications. Logging to syslog  Requested by operational security. Multiple certificates for each user  Solves problems with CA rollovers.

17 Forthcoming (voms) SAML support  VOMS will generate standard SAML AttributeAssertions  Useful to make VOMS contactable by Web Services  AttributeAssertions will be usable independently from the user’s credentials.  Development under the OMII-EU project

18 Forthcoming VOMS VOMS voms-proxy-init –voms vo Proxy +AC SAML Attribute Assertion GSI Auth. Web Service WSDL SSL Auth AC SAML Attribute Assertion

19 Forthcoming (voms) Shibboleth interoperability.  Attributes coming from a Shibboleth IdP can be inserted directly into a VOMS proxy.  Allows users having a Shibboleth account to use that information also in their grid account.  In conjunction with SLCS, or with an already existing certificate, allows direct usage of the grid from a successful Shibboleth authentication. SLCS is not in IGTF, but will be submitted for evaluation there. Note:  Shibboleth is the state of the art for web authorization.  Very good support for federations.  Can be used to access non grid-resources E.g: medical databases  But a component like SLCS or another certificate is necessary for job submission on the grid.

20 gLite Middleware (in production)

21 Workload Management System DGAS Data Management RGMA Computing Element

22 Workload Management System (current) User Interface:  The user interface extracts just the VO name and the first FQAN and puts them in the JDL. Multiple VOs are ignored. Multiple groups/roles are ignored. Matchmaking:  Ignores the extension in the proxy.  Only uses the information in the JDL. Implies the use of only the first FQAN from the first VO.

23 Workload Management System (future) No changes

24 DGAS DGAS:  VOMS groups and roles are used for access authorization. Multiple VOs are ignored. Multiple groups/roles are considered.  Production in INFNGrid, not in gLite!  No changes envisioned in the future

25 Data Management (current) VO and group/role information from VOMS certificates are used to decide which ACL and which channels to use.  True for: Fireman, LFC, Hydra, FTS. glite-transfer-* commands, lfc-* commands, dpm-* commands, etc…

26 Data Management (current) Within FTS, VOMS groups and roles are used to authorize job start and cancellation and channel manipulation.  Jobs for FTS are file transfers. DPM  Uses SRMv2.2, but depends on LFC for ACLs.  Is capable of managing only one FQAN.

27 Data Management (future) Probably most complete support up-to- date, but…  Default gLite configuration is not using it. Still using gridmap files!  Dedicated effort to change the default gLite configuration

28 Data Management (future) Support for VOMS credentials also in Castor and dCache  For dCache, support is already present in its gPlazma cell in the newest releases.  For Castor: “VOMS is supported – whatever that means.”

29 RGMA (current) “Currently, we have no authorization”!

30 RGMA (future) RGMA plans to support group/roles for authorization “early next year.”

31 Computing Element (current) LCG CE and gLite CE are based on LCAS/LCMAPS for authorization.  LCAS/LCMAPS respectively authorize and map users depending on local policies. They have full support of VOMS groups/roles, and even of multiple ACs (multiple VOs) in the user credentials.

32 Computer Element (forthcoming) CREAM CE  Uses the grid Java Authorization Framework (gJAF) Full support of groups/roles

33 gLite Middleware (forthcoming)

34 Forthcoming middleware G-PBox StoRM glexec

35 What is G-PBox It is an highly distributed policy management and evaluation framework  Policies are necessary in any grid environment. It is the natural complement of VOMS  VOMS issues attributes  G-PBox uses them for policy evaluation VOMS (Attribute Authority) VOMS (Attribute Authority) G-PBox (Policy System) G-PBox (Policy System) VO Admin.

36 One G-PBox (at least) for each VOOne G-PBox (at least) for each VO One G-PBox for a Site or a brunch of SitesOne G-PBox for a Site or a brunch of Sites PBox PBoxPBox G-PBoxes are the basic elements of G-PBox They originate and distribute policies created by VO and Site admin They originate and distribute policies created by VO and Site admin They evaluate requests from Resources/Services contacted by User They evaluate requests from Resources/Services contacted by User What is G-PBox

37 Site Site SiteSite GRID(NorduGrid) GRID(INFNGrid) VO PBox PBox PBox PBoxPBoxPBoxPBox PBox PBoxPBox SubFARM SubFARM SubFARM

38 Credentials usage G-PBox fully supports policies which include references to VOMS groups/roles.  This implies that all services using it would automagically fully support VOMS. Fully tested by developers and (rudimentally) by several VOs.  G-PBox compliant WMS and CE.

39 StoRM introduction StoRM is a storage resource manager for disk based storage systems.  It implements the SRM interface version 2.2.  StoRM is designed to support guaranteed space reservation and direct access (native POSIX I/O call), as well as other standard libraries (like RFIO).  StoRM take advantage from high performance parallel file systems. Also standard POSIX file systems are supported (XFS, ext3, …).  A modular architecture decouples StoRM logic from the supported file system.  Strong security framework with VOMS support.

40 StoRM Security Aspects 1.User perform srmPrepareToGet 2.StoRM verifies if the principal holds a valid proxy certificate and delegates the external policy decision point to validate the request. 3.StoRM then queries the Authorization Sources to verify if the user can perform the specified operation on the SURL 4.StoRM queries LCMAPS to obtain local user account corresponding to the grid identity of the requestor 1.Using LCAS/LCMAPS for authorization implies the same capabilities of LCAS/LCMAPS in voms credential management. 5.Physical file name derives by SURL and user attributes (Virtual organization name space) 6.The file system wrapper enforces permissions by setting a new ACL on the physical file. 7.The user job can be executed into the worker node 8.The application can perform a standard POSIX call to access the file into/from the storage system.

41 glexec glexec changes the credentials and user mapping of a job  Changes the credentials and than does exec() The calling process does not exist anymore.  I.e: user ‘/C=IT/O=my/CN=some user’ mapped to myvo001 can become: /C=IT/O=my/CN=other user’ mapped to myvo002  Uses LCAS/LCMAPS.

42 Thanks to A.Frohner, S.Fisher, A.Ferraro, Y.Demchenko, O.Koeroo, M.Sgaravatto, L.Magnoni for the info and some slides. All errors are only mine 