Dynamic Accounts: Identity Management for Site Operations Kate Keahey R. Ananthakrishnan, T. Freeman, R. Madduri, F. Siebenlist.

Slides:



Advertisements
Similar presentations
From Sandbox to Playground: Dynamic Virtual Environments in the Grid Kate Keahey Argonne National Laboratory Karl Doering University.
Advertisements

Virtual Workspaces in the Grid Kate Keahey Argonne National Laboratory Ian Foster, Tim Freeman, Xuehai Zhang, Daniel Galron.
Scaling TeraGrid Access A Testbed for Attribute-based Authorization and Leveraging Campus Identity Management
TeraGrid Deployment Test of Grid Software JP Navarro TeraGrid Software Integration University of Chicago OGF 21 October 19, 2007.
VO Support and directions in OMII-UK Steven Newhouse, Director.
Site Authorization Service (SAZ) at Fermilab Vijay Sekhri and Igor Mandrichenko Fermilab CHEP03, March 25, 2003.
GUMS status Gabriele Carcassi PPDG Common Project 12/9/2004.
Implementing Finer Grained Authorization in the Open Science Grid Gabriele Carcassi, Ian Fisk, Gabriele, Garzoglio, Markus Lorch, Timur Perelmutov, Abhishek.
New Challenges for Access Control April 27, Improving Usability and Expressiveness with Dynamic Policies and Obligations Dennis Kafura Markus Lorch.
Andrew McNab - EDG Access Control - 14 Jan 2003 EU DataGrid security with GSI and Globus Andrew McNab University of Manchester
The Community Authorisation Service – CAS Dr Steven Newhouse Technical Director London e-Science Centre Department of Computing, Imperial College London.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Open Science Grid Use of PKI: Wishing it was easy A brief and incomplete introduction. Doug Olson, LBNL PKI Workshop, NIST 5 April 2006.
Understanding Active Directory
Kate Keahey Argonne National Laboratory University of Chicago Globus Toolkit® 4: from common Grid protocols to virtualization.
Manage & Configure SQL Database on the Cloud Haishi Bai Technical Evangelist Microsoft.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Virtual Infrastructure in the Grid Kate Keahey Argonne National Laboratory.
VO Management in D-Grid, 2. WS, H. Enke (AstroGrid-D) AGD Grid Account Management.
TeraGrid Science Gateways: Scaling TeraGrid Access Aaron Shelmire¹, Jim Basney², Jim Marsteller¹, Von Welch²,
INFSO-RI Enabling Grids for E-sciencE The US Federation Miron Livny Computer Sciences Department University of Wisconsin – Madison.
The EDGI project receives Community research funding 1 EDGI Brings Desktop Grids To Distributed Computing Interoperability Etienne URBAH
Apr 30, 20081/11 VO Services Project – Stakeholders’ Meeting Gabriele Garzoglio VO Services Project Stakeholders’ Meeting Apr 30, 2008 Gabriele Garzoglio.
GridShib: Grid/Shibboleth Interoperability September 14, 2006 Washington, DC Tom Barton, Tim Freeman, Kate Keahey, Raj Kettimuthu, Tom Scavo, Frank Siebenlist,
Mar 28, 20071/9 VO Services Project Gabriele Garzoglio The VO Services Project Don Petravick for Gabriele Garzoglio Computing Division, Fermilab ISGC 2007.
VOMRS/VOMS-Admin Convergence and VO Services Project Status Tanya Levshina Computing Division, Fermilab.
Grid User Management System Gabriele Carcassi HEPIX October 2004.
GUMS Gabriele Carcassi PPDG Collaboration meeting June 27, 2004.
Global Grid Forum GridWorld GGF15 Boston USA October Abhishek Singh Rana and Frank Wuerthwein UC San Diegowww.opensciencegrid.org The Open Science.
1 Globus Toolkit Security Rachana Ananthakrishnan Frank Siebenlist Argonne National Laboratory.
Communicating Security Assertions over the GridFTP Control Channel Rajkumar Kettimuthu 1,2, Liu Wantao 3,4, Frank Siebenlist 1,2 and Ian Foster 1,2,3 1.
Tutorial: Building Science Gateways TeraGrid 08 Tom Scavo, Jim Basney, Terry Fleury, Von Welch National Center for Supercomputing.
CHEP03 Mar 25Mary Thompson Fine-grained Authorization for Job and Resource Management using Akenti and Globus Mary Thompson LBL,Kate Keahey ANL, Sam Lang.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Grid Security: Authentication Most Grids rely on a Public Key Infrastructure system for issuing credentials. Users are issued long term public and private.
Windows Role-Based Access Control Longhorn Update
INFSO-RI Enabling Grids for E-sciencE LCAS/LCMAPS and WSS Site Access Control boundary conditions David Groep NIKHEF.
Legion - A Grid OS. Object Model Everything is object Core objects - processing resource– host object - stable storage - vault object - definition of.
Overview of Privilege Project at Fermilab (compilation of multiple talks and documents written by various authors) Tanya Levshina.
US LHC OSG Technology Roadmap May 4-5th, 2005 Welcome. Thank you to Deirdre for the arrangements.
INFSO-RI Enabling Grids for E-sciencE LCAS/LCMAPS and WSS Site Access Control boundary conditions David Groep et al. NIKHEF.
VO Privilege Activity. The VO Privilege Project develops and implements fine-grained authorization to grid- enabled resources and services Started Spring.
OSG AuthZ components Dane Skow Gabriele Carcassi.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
CoreGRID Workpackage 5 Virtual Institute on Grid Information and Monitoring Services Michał Jankowski, Paweł Wolniewicz, Jiří Denemark, Norbert Meyer,
Standards driven AAA for Job Management within the OMII-UK distribution Steven Newhouse Director, OMII-UK
OSG Site Admin Workshop - Mar 2008Using gLExec to improve security1 OSG Site Administrators Workshop Using gLExec to improve security of Grid jobs by Alain.
Dynamic Creation and Management of Runtime Environments in the Grid Kate Keahey Matei Ripeanu Karl Doering.
VOX Project Tanya Levshina. 05/17/2004 VOX Project2 Presentation overview Introduction VOX Project VOMRS Concepts Roles Registration flow EDG VOMS Open.
The GRIDS Center, part of the NSF Middleware Initiative Grid Security Overview presented by Von Welch National Center for Supercomputing.
Site Authorization Service Local Resource Authorization Service (VOX Project) Vijay Sekhri Tanya Levshina Fermilab.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Overview of the New Security Model Akos Frohner (CERN) WP8 Meeting VI DataGRID Conference Barcelone, May 2003.
Workspace Management Services Kate Keahey Argonne National Laboratory.
UNICORE and Argus integration Krzysztof Benedyczak ICM / UNICORE Security PT.
OGF PGI – EDGI Security Use Case and Requirements
Security for Open Science
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Update on EDG Security (VOMS)
GGF15 – Grids and Network Virtualization
OGSA-WG Security Use Cases Jan 29, 2004
Gridification Gatekeeper LCAS: Local Centre AuthZ Service LCAS
What’s changed in the Shibboleth 1.2 Origin
Liang Fang, Dennis Gannon Indiana University Frank Siebenlist
TeraGrid 08 Tom Scavo, Jim Basney , Terry Fleury, Von Welch
Resource and Service Management on the Grid
A Grid Authorization Model for Science Gateways
Condor-G Making Condor Grid Enabled
NSF Middleware Initiative: GridShib
Presentation transcript:

Dynamic Accounts: Identity Management for Site Operations Kate Keahey R. Ananthakrishnan, T. Freeman, R. Madduri, F. Siebenlist

06/19/06EGEE Execution Rights Management Workshop 2006 Requirements l Mapping PKI credentials to local accounts u Mapping attributes into account attributes l Creating a mapping creates an implied policy u The PKI credential mapped to an account can access and manage this account l Resource allocation aspect u Account is a resource u Allocate accounts from a pool, manage those pools u Pools may be allocated on a per-attribute basis l Policy management aspect u Account access policies: mapping multiple identities to a local account u Account management policies: who can manage this mapping

06/19/06EGEE Execution Rights Management Workshop 2006 DMSDMS Dynamic Account Services Dynamic Account Factory Service useradd (dynamic) Database/Derby (pool) LCMAPS (pool) request an account WSRF-based, secure GT4 management interfaces Back-end implementation Dynamic Account Management Service Account Resource: -Termination time -Account policies manage an account query account mapping DMSDMS PEP Dynamic Accounts Backend Back-end adapters Account creation within a Trusted Computing Base (TCB)

06/19/06EGEE Execution Rights Management Workshop 2006 Authorizing Workspace Use l Authorization based on VOMS proxy attributes l Creation (Factory) u Authorization via a DN ACL u Authorization via an attribute ACL l Management and Inspection (Service) u Management functions accessible based on management policies l Authorization callouts are customizable u LCAS /DC=org/DC=doegrids/OU=People/CN=Timothy Freeman /O=Grid/OU=GlobusTest/OU=simpleCA-prnb3/CN=TimF /EGEE/egee/manager /egtest/mytemp/Role=NULL/Capability=NULL

06/19/06EGEE Execution Rights Management Workshop 2006 Using Dynamic Accounts Service: GRAM Example Dynamic Account Factory and Management Services (1) request an account and set policies DMSDMS PEP (4) renegotiate lifetime and policies as needed GRAM PEP (3) check for DN mapping to a specific account (specified by RSL localUserId) l A service needs to be configured to work with the DA Service (configurable in GT4 GRAM) l Prototype extended SAML interface to enable GUMS substitution u Paper: Authorization Attributes, Obligations and Flexible Account Management in the OpenScienceGrid, GRID 2005 (2) request job execution

06/19/06EGEE Execution Rights Management Workshop 2006 Managing Accounts: Resource Aspect l Pool Accounts u A site admin creates a finite pool of accounts u Accounts are assigned from a pool and potentially restored to the pool after they have been used l The same account may get assigned to multiple users -- audit issue l The number of available accounts is limited l How do we “clean” accounts? l How and when can accounts be quarantined? l Truly dynamic accounts u Created by UNIX useradd call u Flexibilty: accounts created based on need u No need to recycle, simplifies audit u Could potentially interfere with local account management systems

06/19/06EGEE Execution Rights Management Workshop 2006 Dynamic Accounts Backend l Creation: poolindex function u DN+attributes -> pool lease + groups l Termination u Via explicit destroy call or TTL termination u Expires the lease u Callout to clean: kill processes, delete files, revert groups back to default u Default script, configurable by site administrator l Quarantine u Puts the account in a “quarantine pool” u Mandatory quarantine: if the termination script exits with errors or checks fail u Optional quarantine: configurable by site administrator u Quarantine removal can be manual or automatic

06/19/06EGEE Execution Rights Management Workshop 2006 Backend Adapters l LCMAPS u Developed at NIKHEF u Based on a gridmapdir patch u Maps credentials to pool accounts based on policy/algorithm by creating a hardlink u Allows for multiple pool leases l Database (Derby) u A site administrator creates account pools and describes them in files (one file per pool), the database is populated from these files u The policies are managed in the database, uses db methods for persistence, transactions, etc. l Truly dynamic accounts in prototype stage

06/19/06EGEE Execution Rights Management Workshop 2006 Managing Accounts: Policy Aspect l Account Access Policy: what DNs can map to this account? u “owner” access is implied u Optional: specify a list of DNs at creation u Enforcement depends on infrastructure l Plugins configure gridmapfile, lcmaps structures l Account management policy u “owner” management is implied u Can I determine management policies for this account? u Management policies imply adding or limiting access to the account

06/19/06EGEE Execution Rights Management Workshop 2006 Managing Accounts: Identity Mapping l Account creation u Credential attributes are used for authorization u Credential attributes are mapped into attributes associated with the new credential, e.g.: l VOMS attributes -> UNIX groups, l An attribute -> account pool u Implied semantics attached to attributes within a system (TCB-specific policies) PIPPDPapplication VOMS Shib? message context

06/19/06EGEE Execution Rights Management Workshop 2006 Future Directions: CAS Interface l CAS overview u WS Policy Management Interface u SAML-based OGSA-Authz authorization query u CAS is enhanced to accommodate dynamic, real- time policy management and enforcement l CAS policy management as an alternative interface to the dynamic accounts service u Leverage CAS’ full featured policy lifecycle management interface u Potentially also leverage CAS’ more expressive policy language to write more sophisticated policies about accounts

06/19/06EGEE Execution Rights Management Workshop 2006 Status l Available as part of GT distribution u Contribution, an incubator project l Leverages GT4 features u GT4 logging for audit, persistence, security, etc. l Integration with Globus services u GT4 GRAM patch available u Can be used with GT2 GRAM via a C client callout l Documentation and download at

06/19/06EGEE Execution Rights Management Workshop 2006 Workspaces and Dynamic Accounts l Workspaces u Dynamically created and managed environment based on an authorized request u Associated with a resource allocation u Associated with an environment and its deployment capability u Associated with access and management policies l Examples: u A physical machine configured to meet TeraGrid requirements u A cluster of virtual machines configured to meet OSG requirements l Dynamic Accounts Service is part of the Workspace suite of tools u Also used to go by the name of WorkSpace Service (WSS)

06/19/06EGEE Execution Rights Management Workshop 2006 Workspaces (cntd) l Workspace creation: u Provision resources, provide/complete configuration, provide access u Dynamic accounts provide access l Workspace Implementations: u Physical machines u Virtual Machines l Virtual Workspace Service u Allows you to create an independently configured, isolated environment, manage its resource allocation on a fine-grained level u Used in OSG Edge Services u

06/19/06EGEE Execution Rights Management Workshop 2006 Summary l Some current issues u Mapping into UNIX accounts: separating policy management and querying from resource management concerns u Agreement on interfaces for identity mapping and policy management l E.g., GUMS/Dynamic Accounts effort u Formalizing of attribute mapping between different domains l Right now typically defined by the implementation -- essentially requiring everybody to use the same implementation l More information at