The EGI AAI “CheckIn” Service

Slides:



Advertisements
Similar presentations
Shibboleth 2.0 and Beyond Chad La Joie Georgetown University Internet2.
Advertisements

EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
Shibboleth-intro-dec051 Shibboleth A Technical Overview Tom Scavo NCSA.
Survey of Identity Repository Security Models JSR 351, Sep 2012.
TNC2004 Rhodes 1 Authentication and access control in Sympa mailing list manager Serge Aumont & Olivier Salaün May 2004.
Shib-Grid Integrated Authorization (Shintau) George Inman (University of Kent) TF-EMC2 Meeting Prague, 5 th September 2007.
AAI-enabled VO Platform “VO without Tears” Christoph Witzig EGI TF, Amsterdam, Sept 15, 2010.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Report and plans Attribute.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Current status and plans.
Authentication and Authorisation for Research and Collaboration Christos Kanellopoulos GRNET Proposed Pilots for Libraries and eGov.
SAML to LDAP bridging developments Marcus Hardt Marcus kit.eduSteinbuch Centre for Computing (SCC) Motivation Allow linux logins,
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
Authentication and Authorisation for Research and Collaboration Christos Kanellopoulos Open Day Event: Towards the European Open.
June 9, 2009 SURFfederatie: implementing a multi- protocol federation Hans Zandbelt & Joost van Dijk, SURFnet.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
Networks ∙ Services ∙ People Marina Adomeit FIM4R meeting Virtual Organisation Platform as a Service VOPaaS Nov 30, 2015, Austria Task Leader,
European Grid Initiative AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
Networks ∙ Services ∙ People Mandeep Saini TNC15, Porto, Portugal Virtual organisation Authorisation Management Practices in Research and.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI-InSPIRE PY5 new activities Peter Solagna – EGI.eu.
Authentication and Authorisation for Research and Collaboration Peter Solagna, Davide Vaghetti, et al. Topics for PY2 activities.
Authentication and Authorisation for Research and Collaboration Peter Solagna, Nicolas EGI AAI integration experiences AARC Project.
Authentication and Authorisation for Research and Collaboration AARC/CORBEL Workshop for Life Sciences AAI AARC Draft Blueprint.
ELIXIR AAI Michal Procházka, Mikael Linden, EGI VC 15 March 2016.
Security in the wider world David Kelsey (STFC-RAL) GridPP37 – Ambleside 2 Sep 2016.
The IGTF to eduGAIN Bridge
Building Trust for Research and Collaboration
Guidelines for attribute translation to X.509
WLCG Update Hannah Short, CERN Computer Security.
RCauth.eu CILogon-like service in EGI and the EOSC
Azure Active Directory - Business 2 Consumer
EGI Updates Check-in Matthew Viljoen – EGI Foundation
AAI for a Collaborative Data Infrastructure
AARC Update What’s been happening in AARC which matters for GÉANT
Federation made simple
User Community Driven Development in Trust and Identity
eduTEAMS platform for collaboration Niels Van Dijk
eduTEAMS – Current status & Future Plans
Identity Federations - Overview
Identity Management and Authorization
Christos Kanellopoulos
CheckIn: the AAI platform for EGI
AAI Alignment Nicolas Liampotis (based on the work of Mikael Linden)
Check-in Nicolas Liampotis
An AAI solution for collaborations at scale
Identity Management and Authorization
Identity Management and Authorization
GÉANT project update eduTEAMS - AAI as a Service for Collaborative organisations Introduction Status Pilots New Features – input requested InAcademia –
GÉANT 4-2 JRA3 T1 and T2 Federations and Campus (CaFe) e-Infrastructures and Service Providers (RASP) Daniela Pöhn JRA3 T1 LRZ/DFN-AAI Technology Exchange.
Policy in harmony: our best practice
ESA Single Sign On (SSO) and Federated Identity Management
Leveraging the IGTF authentication fabric for research
Thursday pilot session: 7-minutes
Pilots in AARC Arnout Terpstra (AARC2) / Paul van Dijk (AARC1)
AAI For Researchers Licia Florio AARC Project Coordinator GÉANT DI4R
AARC Blueprint Architecture and Pilots
OIDC Federation for Infrastructures
AAI Architectures – current and future
Matthew Levy Azure AD B2B vs B2C Matthew Levy
RCauth.eu CILogon-like service in EGI and the EOSC
Community AAI with Check-In
AAI in EGI Status and Evolution
The Attribute and the ecosystem
JRA1: Integrated AAI Developments
REFEDS Assurance WG REFEDS meeting 16 June 2019
Security for Science Gateways Initial Design Discussions
Authentication and Authorisation for Research and Collaboration
eIDAS-enabled Student Mobility
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
REFEDS Assurance Suite
Presentation transcript:

The EGI AAI “CheckIn” Service Peter Solagna - EGI.eu Christos Kanellopoulos - GRNET

EGI CheckIn Goals Attribute Authority EGI Services EGI CheckIn IdP Mandatory Attributes EGI UID First name, last name email affiliation

EGI AAI CheckIn Service May 2015: Introduction of the EGI AAI Roadmap and Architecture

AARC Blueprint Architecture

Why Proxy? All EGI SPs can have one statically configured IdP No need to run an IdP Discovery Service on each EGI SP Connected SPs get consistent/harmonised user identifiers and accompanying attribute sets from one or more AAs that can be interpreted in a uniform way for authZ purposes External IdPs only deal with a single EGI SP proxy In a nutshell: EGI services will not have to deal with the complexity of multiple IdPs/Federations/Attribute Authorities/technologies. This complexity will be handled centrally by the proxy.

EGI CheckIn Service Today Available via eduGAIN IdP Discovery User Enrolment User Consent Support for LoA Attribute Aggregation SAML2.0 Attribute Query, REST, LDAP Support for OIDC/OAuth2 Providers Google, Facebook, LinkedIn, ORCID Support for OIDC/OAuth2 services Experimental support for eIDAS Production Ready for production Alpha

Levels of Assurance Levels of Assurance EGI AAI proposal for 3 levels of assurance. Each level is represented by a URI: Low: Authentication through a social identity provider → https://aai.egi.eu/LoA#Low Substantial: Password authentication at the user's home IdP → https://aai.egi.eu/LoA#Substantial High: Substantial + multi-factor authn (not yet supported, TBD) → https://aai.egi.eu/LoA#High TODO: Create an appropriate document for each LoA (this may be, but does not have to be, referenced by the URI above).

Use cases for the LoA in EGI allow an IdP to advertise those LoAs for which it is able to meet the associated requirements allow an IdP to indicate the actual LoA in its responses allow a SP to express its expectations for the LoA at which a user should be authenticated

EGI Unique Identifier requirements EGI User Identifier The EGI User ID should be: personal - used by a single person persistent - used for an extended period of time across multiple sessions non-reassignable - assigned exclusively to a specific person, and never reassigned to another individual non-targeted - not intended for a specific relying party (or parties), i.e. should be shared globally unique - unique beyond the namespace of the IdP and the namespace of the SP(s) with which the ID is shared opaque - should (by itself) provide no information about the user, i.e. should be privacy- preserving

EGI User Identifier implementation EGI Unique User Id Generation EGI User ID is created by the CheckIn service at the moment of the first user connection The IdP/SP Proxy adds (or replaces) the eduPersonUniqueId (urn:oid:1.3.6.1.4.1.5923.1.1.1.13) attribute, based on the first non-empty value from this attribute list: ePUID, ePPN, ePTID The selected attribute value is hashed and the “egi.eu” scope portion is added to the generated ePUID, e.g.: ef72285491ffe53c39b75bdcef46689f5d26ddfa00312365cc4fb5ce97e9ca87@egi.eu

IdP/SP Proxy technical architecture High Availability & Load Balancing SimpleSAMLphp caches user sessions in Memcached, an in-memory key-value store for small chunks of arbitrary data COmanage maintains EGI user profile information in PostgreSQL DB cluster; Data are synced between master (read/write) and hot standby slave (read-only queries) Sessions are distributed and replicated among different Memcached servers, enabling load- balancing and fail-over User requests are load balanced among multiple SimpleSAMLphp web front-ends that use the back-end matrix of Memcached servers

Integration with attribute authorities Connection with Perun - DONE Connection with GOCDB - DONE Connection with COmanage - DONE Connection with the new OpenConnext Attribute Aggregator – Pilot in collaboration with AARC project

Attribute aggregation The EGI CheckIn supports attribute aggregation through: SAML 2.0 AttributeQuery Attribute Aggregator SimpleSAMLphp module Enables SSP to issue SAML 2.0 attribute queries to Attribute Authorities that support SAML 2.0 SOAP binding LDAP Attribute Aggregator Allows SSP to issue LDAP queries for retrieving attributes REST Attribute Aggregator Allows SSP to retrieve attributes from a RESTful web service OpenConext attribute aggregation Java application Handles attribute aggregation and provides REST API for accessing attribute information

CoCo & R&S compliance <md:EntityDescriptor entityID="https://aai.egi.eu/proxy/module.php/saml/sp/metadata.php/sso"> <md:Extensions> <mdattr:EntityAttributes xmlns:mdattr="urn:oasis:names:tc:SAML:metadata:attribute"> <saml:Attribute xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" Name="http://macedir.org/entity-category" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"> <saml:AttributeValue xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xs="http://www.w3.org/2001/XMLSchema" xsi:type="xs:string">http://www.geant.net/uri/dataprotection-code-of-conduct/v1</saml:AttributeValue> <saml:AttributeValue xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xs="http://www.w3.org/2001/XMLSchema" xsi:type="xs:string">http://refeds.org/category/research-and-scholarship</saml:AttributeValue> </saml:Attribute> </mdattr:EntityAttributes> </md:Extensions> CheckIn compliances Compliant with R&S Not compliant with CoCo but this will happen soon as the needed policies are put in place Identifiers eduPersonUniqueId eduPersonPrincipalName eduPersonTargetedID Mail attribute mail Name attributes displayName givenName sn (surname) Authorization attribute eduPersonScopedAffiliation

Token Translation: CILogon + RC Auth

User Enrollment EGI CheckIn supports different user enrollment flows depending on the attributes released by the user’s Home Identity Provider: Self-service Sign Up: Allows joining the EGI User Community without approval by an administrator if all the information below is asserted by the Home Organisation: at least one of the following unique user identifiers: pseudonymous, non-reassignable identifier (eduPersonUniqueId attribute); name-based identifier (eduPersonPrincipalName attribute); pseudonymous identifier (eduPersonTargetedID attribute or SAML persistent identifier) first name (givenName attribute) and surname (sn attribute) email address (mail attribute) role (affiliation) at Home Organisation (eduPersonScopedAffiliation attribute)

User Enrollment Sign Up: If any of the required information cannot be released by the Home Organisation: user needs to self-assert the values of the missing attributes request must then be approved by an EGI User Sponsor Identity linking: Allows access to EGI resources with a single personal EGI ID, using any of the linked login credentials → organisational or social

OpenID Connect Support Service Providers can connect to the EGI AAI using OpenID Connect (OIDC) as an alternative to SAML2 EGI AAI OIDC Provider allows users to sign in using any of the supported backend authentication mechanisms, i.e institutional IdPs (eduGAIN) or Social Providers Easy OIDC client registration through Client Management UI: Obtain OAuth 2.0 credentials Register one or more redirect URIs Register required scopes (e.g. openid, profile, email)