Https://aarc-project.eu Authentication and Authorisation for Research and Collaboration Michał Jankowski, Maciej Brzeźniak AARC General Meeting, Utrecht.

Slides:



Advertisements
Similar presentations
Lousy Introduction into SWITCHaai
Advertisements

Scaling TeraGrid Access A Testbed for Attribute-based Authorization and Leveraging Campus Identity Management
MyProxy Jim Basney Senior Research Scientist NCSA
Contrail and Federated Identity Management
MyProxy: A Multi-Purpose Grid Authentication Service
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
National Center for Supercomputing Applications University of Illinois at Urbana-Champaign This material is based upon work supported by the National Science.
The Design and Implementation of an OpenID-Enabled PKI Kevin Bauer University of Colorado Supervisor: Dhiva Muruganantham.
WebFTS as a first WLCG/HEP FIM pilot
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Security in Virtual Laboratory System Jan Meizner Supervisor: dr inż. Marian Bubak Consultancy: dr inż. Maciej Malawski Master of Science Thesis.
ArcGIS Server and Portal for ArcGIS An Introduction to Security
Authentication and Authorisation for Research and Collaboration Licia Florio (GÉANT) Christos Kanellopoulos (GRNET) Service orientation.
Introduction Moonshot workshop
Project Moonshot update ABFAB, IETF 80. About Moonshot Moonshot is implementing ABFAB Developer meeting, 24 March 2011 Testing event, 25 March 2011 A.
ShibGrid: Shibboleth access to the UK National Grid Service University of Oxford and STFC.
Federated Access to US CyberInfrastructure Jim Basney CILogon This material is based upon work supported by the National Science.
Tutorial: Building Science Gateways TeraGrid 08 Tom Scavo, Jim Basney, Terry Fleury, Von Welch National Center for Supercomputing.
Kerberos and Identity Federations Daniel Kouřil, Luděk Matyska, Michal Procházka, Tomáš Kubina AFS & Kerberos Best Practices Worshop 2008.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
Connect. Communicate. Collaborate The authN and authR infrastructure of perfSONAR MDM Ann Arbor, MI, September 2008.
WebFTS File Transfer Web Interface for FTS3 Andrea Manzi On behalf of the FTS team Workshop on Cloud Services for File Synchronisation and Sharing.
Authentication and Authorisation for Research and Collaboration Licia Florio REFEDS Meeting The AARC Project I2 Technology Exchange.
Authentication and Authorisation for Research and Collaboration Licia Florio AARC Workshop The AARC Project Brussels, 26 October.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Current status and plans.
Authentication and Authorisation for Research and Collaboration Niels van Dijk AARC General Meeting Authentication and Authorisation.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Report and plans Attribute.
Authentication and Authorisation for Research and Collaboration Michał Jankowski, Maciej Brzeźniak AARC General Meeting, Milan.
SAML to LDAP bridging developments Marcus Hardt Marcus kit.eduSteinbuch Centre for Computing (SCC) Motivation Allow linux logins,
Federating non-web services with LDAP-Façade
Authentication and Authorisation for Research and Collaboration Michał Jankowski, Maciej Brzeźniak AARC General Meeting, Milan.
Shibboleth & Grid Integration STFC and University of Oxford (and University of Manchester)
Identity Management in DEISA/PRACE Vincent RIBAILLIER, Federated Identity Workshop, CERN, June 9 th, 2011.
1 Earth System Grid Center for Enabling Technologies ESG-CET Security January 7, 2016 Frank Siebenlist Rachana Ananthakrishnan Neill Miller ESG-CET All-Hands.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
EUDAT receives funding from the European Union's Horizon 2020 programme - DG CONNECT e-Infrastructures. Contract No B2ACCESS LSDMA.
EMI is partially funded by the European Commission under Grant Agreement RI Federated Grid Access Using EMI STS Henri Mikkonen Helsinki Institute.
A uthentication & A uthorization for R esearch & C ollaboration Pilots in SA1 Paul van Dijk, SURFnet AARC.
Networks ∙ Services ∙ People Thomas Bärecke Journée Fédération, Paris Collaboration européenne GÉANT SA5 03/07/2015 SA5 T5 team
EMI is partially funded by the European Commission under Grant Agreement RI Security Token Service (STS) Transforming the Existing User Credentials.
Connect communicate collaborate Trust & Identity EC meets GÉANT 19 June 2014 Brussels Valter Nordh, NORDUnet Federation as a Service Task Leader Trust.
b2access.eudat.eu B2ACCESS The simple and secure authorisation and authentication platform of EUDAT This work is licensed under the Creative.
EMI is partially funded by the European Commission under Grant Agreement RI Security Token Service (STS) Simplified Credential Management Henri.
Networks ∙ Services ∙ People Mandeep Saini TNC15, Porto, Portugal Virtual organisation Authorisation Management Practices in Research and.
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
Workshop on Security for Web Services. Amsterdam, April 2010 Applying SAML to Identity Data Exchange.
B2access.eudat.eu B2ACCESS User Training How to register with B2ACCESS Version 1 February 2016 This work is licensed under the Creative Commons.
Authentication and Authorisation for Research and Collaboration Peter Solagna, Davide Vaghetti, et al. Topics for PY2 activities.
Non Web-based Identity Federations - Moonshot Daniel Kouril, Michal Prochazka, Marcel Poul ISGC 2015.
Authentication and Authorisation for Research and Collaboration Peter Solagna, Nicolas EGI AAI integration experiences AARC Project.
Authentication and Authorisation for Research and Collaboration AARC/CORBEL Workshop for Life Sciences AAI AARC Draft Blueprint.
Authentication and Authorisation for Research and Collaboration Marcus Hardt AARC AHM, Milan Current Status of Non Web (via LDAP.
CLASSe PROJECT: IMPROVING SSO IN THE CLOUD Alejandro Pérez Rafael Marín Gabriel López
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
WLCG Update Hannah Short, CERN Computer Security.
EGI Updates Check-in Matthew Viljoen – EGI Foundation
Federation made simple
User Community Driven Development in Trust and Identity
Jean-François Perrin (ILL) - Umbrella Annual Meeting 2015
Christos Kanellopoulos
CheckIn: the AAI platform for EGI
ESA Single Sign On (SSO) and Federated Identity Management
Community AAI with Check-In
TeraGrid Identity Federation Testbed Update I2MM April 25, 2007
Computer Network Information Center, Chinese Academy of Sciences
Authentication and Authorisation for Research and Collaboration
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
Presentation transcript:

Authentication and Authorisation for Research and Collaboration Michał Jankowski, Maciej Brzeźniak AARC General Meeting, Utrecht Non web access May 2016 AARC SA1.3 Poznan Supercomputing and Networking Center

Local resource provisioning Setup local account To be done once, using web is possible Token translation Map „federated” attributes or group/roles to the local ones Verify the „federated” credentials while accessing the resource (e.g. to forbid users that left their home institution) Local resource deprovisioning When the local account and connected data may be deleted? Problem statement 2

The account is being created while registration step (LDAP Facade). Pools of accounts are created locally, the user is mapped to the account on the first sign on (LCMAPS). Approaches Provisioning 3

Enhanced proxy Enhanced client Local authentication PKI based authentication (GSI). Accounts with limited activity time Approaches Token Translation 4

Fact: the user’s attributes/rights are changing rarely and usually there is no need to verify all the time The assertion obtained at the login is not "continuously" verifying, but assumed as true for some (session) time Assertions signed included in X509 (proxy) certificates are valid for some time The workflow: 1.The user access the web portal, web SSO profile is used for authentication and obtaining some attributes from IdP 2.The attributes are mapped to local username, group membership, etc. 3.On the first login the user must setup local access (public key, password…) 4.The provisioned account is valid for some limited time (e.g. 12h) 5.The user must login to the non-web resource within this limited time 6.After that time the local account is locked, the user may unlock it by logging again to the web portal Issue LDAP doesn’t support locking/unlocking an account out of the box Accounts with limited activity time 5

SSH/SFTP LDAP Facade Moonshot Unity + LDAP plugin GSI OpenSSH GSI (Grid Security Infrastructure) –gridFTP VOMS + LCMAPS CILogon Unity + online CA (EUDAT B2ACCESS) iRODS Unity + iCAT provisioning script (EUDAT B2ACCESS) Kerberos Application specific LibreOffice / ownCloud integration OpenStack …. Access Protocols Pilots coverage 6

Production Designed to work with Federation of non Web-based Services in the State of Baden-Württemberg (bwIDM) Uses bwIDM specific attributes for mapping the user to account and groups The pilot required modification of the code (the mapping cannot be defined via the portal) PSNC development: key based authentication Development „Zero attributes” policy implemented (well, Uid or ePPN are used to produce username) Some issues not present in the production version (e.g. the user cannot deregister) Other features on the roadmap: OIDC for authentication LDAP Facade Piloted versions 7

Translation Services -comparison Requirements R4 Community-based authorisation R7 Federation solutions based on open and standards-based technologies R8 Persistent user identifiers R9 Unique user identities R11 Up-to-date identity information R12 User groups and roles groups based on attributes, currently support for inter-IdP groups R14 Browser & non-browser based federated access

Moonshot pilot Status and experience Moonshot installation Closed environment - all components on local VMs No federated access tested So far conclusions Installing a complete OS with server from DVD is pretty easy Comprehensive documentation But still the installed environment had an issue, solved by direct intervention of the support No security issues „by design” But intrudes „badly designed” standard ssh authentication (requires both dedicated client and server) Was it the cause of my issue? The federation must be „trust infrastructure” eduGAIN is currently not, but some work is in progress „Proxy IdP” is not a solution (TI contains also SPs) TI would solve some issues present in eduGAIN

Translation Services -comparison Protocols ServiceTranslate fromTranslate to LDAP FacadeSAML 2LDAP MoonshotSAML/RADIUSGSS-EAP Unity(one time) passwords challenge-response X509 LDAP/AD SAML OpenId OAuth Web UI SAML 2 Web SAML 2 WS OpenId OAuth1 (LDAP) CILogonSAML OpenId OAuth X509

Translation Services -comparison Typical use cases ServiceUse caseExample LDAP Facade Access to resource via ssh/sftp, gridFTP in plans bwIDM (Federation of non Web-based Services in the State of Baden- Württemberg) MoonshotAccess to web and non-web resources, e.g. GSS enabled SSH server, Apache, MS Exchange EUPanData (access to data using Shibboleth authentication) UnityTranslation between different SSO protocols, (inter-) federation, IdMaaS EUDAT B2ACCESS CILogonProvide certificates for accessing grid resources (gridFTP, WS, Globus Gatekeeper) CILogon Service (provide certificates for InCommon federation)

Translation Services -comparison Requirements Requirement LDAP Facade MoonshotUnityCILogon R4 Community-based authorisation VVVV R7 Federation solutions based on open and standards-based technologies VVVV R8 Persistent user identifiers VVVV R9 Unique user identities VVVV R11 Up-to-date identity information ?VVV R12 User groups and roles ?VVV R14 Browser & non-browser based federated access VVVV Cer t dat e

Translation Services -comparison R1 User and Service Provider friendliness 13 ServiceUserAdministrator LDAP FacadeRequires registration step Standard client software No documentation (in English) Software is not packaged, must be compiled and deployed some config might be done automatically Good installation documentation Lack of portal documentation Issues with underlying software Admin ifc not completelly translated to English MoonshotClient software must be modified Documentation in place Installing a complete OS with server from DVD is pretty easy Comprehensive documentation But still the installed environment had an issue, solved by direct intervention of the support

© GÉANT on behalf of the AARC project. The work leading to these results has received funding from the European Union’s Horizon 2020 research and innovation programme under Grant Agreement No (AARC). Thank you Any Questions?

LDAP Facade Architecture source: S.Labitzke Now SAML takes it all: Federation of non Web-based Services in the State of Baden-Württemberg, European Identity & Cloud Conference 2013

LDAP Facade Workflow Prior resource provisioning/registration via web portal and SAML WebSSO profile Access to the resource is possible in two models: Full trust the user passess his IdP password to ssh server the server verifies the password using LDAP Facade LDAP Facade authenticates the user against IdP (enhanced proxy SAML profile) Limited trust after registration the user sets up pair of keys to access ssh server the user is authenticated using the keys the server verifies the user using LDAP Façade LDAP Facade checks the user against his IdP (assertion query SAML profile)

Moonshot Architecture source:

Moonshot Workflow Prerequisites credential from Moonshot IdP trust relationship with a Moonshot Relying Party Proxy installed/configured client software server software modified/configured to talk with local RP Proxy Authentication/Authorisation the client contacts the server, usage of GSS-API is negotiated the user selects identity to be used for the particular service TLS tunnel is set from the client to the IdP thru the Service the tunnel is used to authenticate the user and to verify RP (RP name sent by the client and name of „tunnel proxy” are compared) IdP sends RADIUS Access-Accept and optionally SAML assertion to RP RP Proxy and then the service authorize the user depending on the above and on local policies

Unity Architecture source: Access via different endpoints. Each endpoint has low level binding (web, SOAP, etc.) Each endpoint is associated with authenticator(s) that collect and check credentials. Each user must be registered in a local database.