The IGTF to eduGAIN Bridge

Slides:



Advertisements
Similar presentations
Federated Identity for Grid Architects Tom Scavo NCSA
Advertisements

EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
Authentication solutions for Outlook and Office 365 Multi-factor authentication for Office 365 Outlook client futures.
Case Studies in Identity Management for Scientific Collaboration 2014 Technology Exchange Jim Basney CILogon This material is.
2006 © SWITCH Authentication and Authorization Infrastructures in e-Science (and the role of NRENs) Christoph Witzig SWITCH e-IRG, Helsinki, Oct 4, 2006.
1 Issues in federated identity management Sandy Shaw EDINA IASSIST May 2005, Edinburgh.
WebFTS as a first WLCG/HEP FIM pilot
AARC Overview Licia Florio, David Groep 21 Jan 2015 presented by David Groep, Nikhef.
Federated Identity Management for HEP David Kelsey WLCG GDB 9 May 2012.
PAPI Points of Access to Providers of Information.
AAI-enabled VO Platform “VO without Tears” Christoph Witzig EGI TF, Amsterdam, Sept 15, 2010.
Belnet Federation Belnet – Loriau Nicolas Brussels – 12 th of June 2014.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
Connect. Communicate. Collaborate Federation Interoperability Made Possible By Design: eduGAIN Diego R. Lopez (RedIRIS)
Kerberos and Identity Federations Daniel Kouřil, Luděk Matyska, Michal Procházka, Tomáš Kubina AFS & Kerberos Best Practices Worshop 2008.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
Internet2 Middleware Initiative Shibboleth Ren é e Shuey Systems Engineer I Academic Services & Emerging Technologies The Pennsylvania State University.
EResearchers Requirements the IGTF model of interoperable global trust and with a view towards FIM4R AAI Workshop Presenter: David Groep, Nikhef.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Report and plans Attribute.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Current status and plans.
Authentication and Authorisation for Research and Collaboration Christos Kanellopoulos GRNET Proposed Pilots for Libraries and eGov.
Connect. Communicate. Collaborate Universität Stuttgart A Client Middleware for Token- Based Unified Single Sign On to eduGAIN Sascha Neinert, University.
SAML to LDAP bridging developments Marcus Hardt Marcus kit.eduSteinbuch Centre for Computing (SCC) Motivation Allow linux logins,
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
EUDAT receives funding from the European Union's Horizon 2020 programme - DG CONNECT e-Infrastructures. Contract No B2ACCESS LSDMA.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
European Grid Initiative AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
Kipper – a Grid bridge to Identity Federation Andrey Kiryanov.
David Groep Nikhef Amsterdam PDP & Grid AARC Authentication and Authorisation for Research and Collaboration an impression of the road ahead.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Enabling SSO capabilities in the EGI Cloud services Peter Solagna – EGI.eu.
Networks ∙ Services ∙ People Licia Florio TNC, Lisbon Consuming identities across e- Infrastructures 16 June 2015 PDO GÈANT.
Authentication and Authorisation for Research and Collaboration Peter Solagna, Davide Vaghetti, et al. Topics for PY2 activities.
CERN IT Department CH-1211 Geneva 23 Switzerland t OIS Operating Systems & Information Services CERN IT Department CH-1211 Geneva 23 Switzerland.
Authentication and Authorisation for Research and Collaboration Peter Solagna, Nicolas EGI AAI integration experiences AARC Project.
Authentication and Authorisation for Research and Collaboration AARC/CORBEL Workshop for Life Sciences AAI AARC Draft Blueprint.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
Building Trust for Research and Collaboration
Introduction to AAI Services
The EGI AAI “CheckIn” Service
WLCG Update Hannah Short, CERN Computer Security.
RCauth.eu CILogon-like service in EGI and the EOSC
The Policy Puzzle Many groups and (proposed) policies, but leaving many open issues AARC “NA3” is tackling a sub-set of these “Levels of Assurance” –
EGI Updates Check-in Matthew Viljoen – EGI Foundation
AAI for a Collaborative Data Infrastructure
AARC Update What’s been happening in AARC which matters for GÉANT
User Community Driven Development in Trust and Identity
eduTEAMS platform for collaboration Niels Van Dijk
Identity Federations - Overview
Christos Kanellopoulos
CheckIn: the AAI platform for EGI
AAI Alignment Nicolas Liampotis (based on the work of Mikael Linden)
Check-in Nicolas Liampotis
Identity Federations - Installation and operation
AARC2 JRA1 Nicolas Liampotis
Minimal Level of Assurance (LoA)
Identity Management and Authorization
Leveraging the IGTF authentication fabric for research
Leveraging the IGTF authentication fabric for research
Pilots in AARC Arnout Terpstra (AARC2) / Paul van Dijk (AARC1)
AARC Blueprint Architecture and Pilots
AARC2 JRA1 Update Nicolas Liampotis
AAI Architectures – current and future
RCauth.eu CILogon-like service in EGI and the EOSC
Community AAI with Check-In
Example Use Case for Attribute Authorities and Token Translation Services - the case for eduGAIN Andrea Biancini.
AAI in EGI Status and Evolution
Authentication and Authorisation for Research and Collaboration
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
Presentation transcript:

The IGTF to eduGAIN Bridge Bringing X.509 and SAML together Ioannis Kakavas Nicolas Liampotis AARC SA1 - Pilots AARC SA1 - Pilots Identity & Security Engineer, GRNET S.A. AAI Research Engineer, GRNET S.A. 39th EUGridPMA meeting, Firenze 2017-01-30

AARC support the collaboration model across institutional and sector borders advance mechanisms that will improve the experience for users guarantee their privacy and security build on the very many existing and evolving components ESFRI clusters, eduGAIN, national AAI federations, NGIs, IGTF, SCI, SirTFi design, test and pilot any missing components integrate them with existing working flows

AARC support the collaboration model across institutional and sector borders advance mechanisms that will improve the experience for users guarantee their privacy and security build on the very many existing and evolving components ESFRI clusters, eduGAIN, national AAI federations, NGIs, IGTF, SCI, SirTFi design, test and pilot any missing components integrate them with existing working flows

Bridging IGTF to eduGAIN The facts eScience Services Traditionally support X.509 authentication Paradigm shift towards federated SSO Support for authentication at Home Organizations eScience Services Users Large number of them already have X.509 certificates Some of them might not have an account at the Identity Provider of their Home Organization Some of them might not have a Home Organization Some of them might not want to / cannot use their Home Organization account eScience Services Authentication X.509 certificates from IGTF Accredited CAs provide higher assurance than Home Organization IdP credentials

Bridging IGTF to eduGAIN The problem statement How can we allow eScience Services Users to access the Services Using the X.509 certificates that they already have Not forcing them to register/use Home Organization accounts Carrying a high LoA (Level of Assurance) And at the same time How can we allow eScience Services To follow the paradigm shift to federated SSO To not lose/alienate their user base To maintain LoA requirements

Bridging IGTF to eduGAIN The solution authX509toSAML https://github.com/jkakavas/authX509toSAML

Bridging IGTF to eduGAIN authX509toSAML Functionality Authenticates users based on their X.509 certifcates Translates X.509 certificates to SAML assertions Stateless by design -> Distributed nature *https://www.cs.virginia.edu/~evans/cs551/saltzer/

Bridging IGTF to eduGAIN authX509toSAML Design Principles* Principle of Economy of Mechanism Minimal implementation ( minimal bugs ) Each component should do what it is designed to do Principle of Fail-safe Defaults Provide sane defaults where applicable Principle of Open Design Use / extend well known software components Principle of Psychological Acceptability Easy to use workflow / UX that users are familiar with *https://www.cs.virginia.edu/~evans/cs551/saltzer/

Bridging IGTF to eduGAIN authX509toSAML Components Apache2 httpd server Handles X509 client authentication Accepts only certificates signed by IGTF accredited Cas SimpleSAMLphp module ( authX509toSAML) Performs token translation Authenticated certificate  SAML Assertion

Bridging IGTF to eduGAIN authX509toSAML

Bridging IGTF to eduGAIN authX509toSAML Apache2 httpd Configuration SSLVerifyClient require SSLVerifyDepth 1 SSLCACertificatePath "/usr/share/igtf-policy/classic_mics“ Debian packages: igtf-policy-{classic,mics}

Bridging IGTF to eduGAIN authX509toSAML SimpleSAMLphp module (authX509toSAML) 'x509' => array( 'authX509toSAML:X509userCert', 'authX509toSAML:cert_name_attribute': 'CN', 'authX509toSAML:assertion_name_attribute': 'displayName', 'authX509toSAML:assertion_dn_attribute': 'distinguishedName', 'authX509toSAML:assetion_assurance_attribute': 'eduPersonAssurance', 'authX509toSAML:parse_san_emails': TRUE 'authX509toSAML:parse_policy': TRUE, 'authX509toSAML:export_eppn': FALSE, ),

Bridging IGTF to eduGAIN authX509toSAML SimpleSAMLphp module (authX509toSAML) 'cert_name_attribute': The attribute in the certificate carrying the name of the subject 'assertion_name_attribute':The attribute in the SAML Assertion to map the above 'assertion_dn_attribute': The attribute in the SAML Assertion to map the DN 'assetion_assurance_attribute': The attribute ubin the SAML Assertion to use for certificate policy attributes ‘parse_san_emails': Attempt to parse SANs with type emailAddress 'parse_policy': Attempt to parse Certificate Policy extention, 'export_eppn': Attempt to parse eduPersonPrincipalName from the CN ( i.e. Grid Robot certificates

Bridging IGTF to eduGAIN Demo “Researcher needs to have access to SAML Service Provider published in eduGAIN, but they do not have an account at the IdP of their Home Organization. They do, however, have a certificate issued to them by the IGTF accredited HellasGrid Certification Authority.” https://snf-666522.vm.okeanos.grnet.gr/ssp/module.php/core/frontpage_auth.php

ikakavas@noc.grnet.gr