AuthN and AuthZ in StoRM A short guide

Slides:



Advertisements
Similar presentations
Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
Advertisements

Site Authorization Service (SAZ) at Fermilab Vijay Sekhri and Igor Mandrichenko Fermilab CHEP03, March 25, 2003.
ASGC Site Update Yi-Ping Wu Jeng-Hsueh Wu. Two Significant Researches 1.Oracle Security issues and Studies for 3D 2.Streams Replications Study Report.
Andrew McNab - EDG Access Control - 14 Jan 2003 EU DataGrid security with GSI and Globus Andrew McNab University of Manchester
E-science grid facility for Europe and Latin America A Data Access Policy based on VOMS attributes in the Secure Storage Service Diego Scardaci.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Services Abderrahman El Kharrim
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
EDINA 20 th March 2008 EDINA Geo/Grid - Security Prof. Richard O. Sinnott Technical Director, National e-Science Centre University of Glasgow, Scotland.
Open Science Grid Use of PKI: Wishing it was easy A brief and incomplete introduction. Doug Olson, LBNL PKI Workshop, NIST 5 April 2006.
Summer School Certificates Diego Romano & Gilda Team.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
National Computational Science National Center for Supercomputing Applications National Computational Science Alliance Setup Package Requirements Jim Basney.
Makrand Siddhabhatti Tata Institute of Fundamental Research Mumbai 17 Aug
OSG End User Tools Overview OSG Grid school – March 19, 2009 Marco Mambelli - University of Chicago A brief summary about the system.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) VOMS Installation and configuration Bouchra
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
GILDA testbed GILDA Certification Authority GILDA Certification Authority User Support and Training Services in IGI IGI Site Administrators IGI Users IGI.
E-science grid facility for Europe and Latin America E2GRIS1 Raúl Priego Martínez – CETA-CIEMAT (Spain)‏ Itacuruça (Brazil), 2-15 November.
Evolution of the Open Science Grid Authentication Model Kevin Hill Fermilab OSG Security Team.
EU DataGrid (EDG) & GridPP Authorization and Access Control User VOMS C CA 2. certificate dn, ca, key 1. request 3. certificate 4. VOMS cred: VO, groups,
EMI is partially funded by the European Commission under Grant Agreement RI Argus Policies Tutorial Valery Tschopp - SWITCH EGI TF Prague.
EPIKH School for Grid Site Administrators, Amman, /32 Introductions BDII Installation and Configuration Miguel Angel Díaz Corchero
Maarten Litmaath (CERN), GDB meeting, CERN, 2006/02/08 VOMS deployment Extent of VOMS usage in LCG-2 –Node types gLite 3.0 Issues Conclusions.
Ákos FROHNER – DataGrid Security n° 1 Security Group D7.6 Design Ideas
June 24-25, 2008 Regional Grid Training, University of Belgrade, Serbia Introduction to gLite gLite Basic Services Antun Balaž SCL, Institute of Physics.
OGF22 25 th February 2008 OGF22 Demo Slides Prof. Richard O. Sinnott Technical Director, National e-Science Centre University of Glasgow, Scotland
US LHC OSG Technology Roadmap May 4-5th, 2005 Welcome. Thank you to Deirdre for the arrangements.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Glite. Architecture Applications have access both to Higher-level Grid Services and to Foundation Grid Middleware Higher-Level Grid Services are supposed.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
HLRmon accounting portal DGAS (Distributed Grid Accounting System) sensors collect accounting information at site level. Site data are sent to site or.
EMI INFSO-RI Argus Policies in Action Valery Tschopp (SWITCH) on behalf of the Argus PT.
Recent improvements in HLRmon, an accounting portal suitable for national Grids Enrico Fattibene (speaker), Andrea Cristofori, Luciano Gaido, Paolo Veronesi.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
VO Box Issues Summary of concerns expressed following publication of Jeff’s slides Ian Bird GDB, Bologna, 12 Oct 2005 (not necessarily the opinion of)
Last update 21/01/ :05 LCG 1Maria Dimou- cern-it-gd Current LCG User Registration, VO management and Authorisation Procedures VOMS workshop
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Data management in LCG and EGEE David Smith.
GRID Security & DIRAC A. Casajus R. Graciani A. Tsaregorodtsev.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
INFSO-RI Enabling Grids for E-sciencE Policy management and fair share in gLite Andrea Guarise HPDC 2006 Paris June 19th, 2006.
Ákos FROHNER – DataGrid Security n° 1 Security Group TODO
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks gLite configuration (plans) Robert Harakaly.
HLRmon accounting portal The accounting layout A. Cristofori 1, E. Fattibene 1, L. Gaido 2, P. Veronesi 1 INFN-CNAF Bologna (Italy) 1, INFN-Torino Torino.
Placeholder ES 1 CERN IT EGI Technical Forum, Experiment Support group AAI usage, issues and wishes for WLCG Maarten Litmaath CERN.
The VOMS and the SE in Tier2 Presenter: Sergey Dolgobrodov HEP Meeting Manchester, January 2009.
EGI-InSPIRE RI Grid Training for Power Users EGI-InSPIRE N G I A E G I S Grid Training for Power Users Institute of Physics Belgrade.
EMI is partially funded by the European Commission under Grant Agreement RI Argus Policies Tutorial Valery Tschopp (SWITCH) – Argus Product Team.
Storage Element Security Jens G Jensen, WP5 Barcelona, May 2003.
StoRM + Lustre Proposal YAN Tian On behalf of Distributed Computing Group
HLRmon Enrico Fattibene INFN-CNAF 1EGI-TF Lyon, France19-23 September 2011.
OSG PKI Transition Mine Altunay OSG Security Officer
Bologna, March 30, 2006 Riccardo Zappi / Luca Magnoni INFN-CNAF, Bologna.
Security recommendations DPM Jean-Philippe Baud CERN/IT.
INFSO-RI Enabling Grids for E-sciencE GUMS vs. LCMAPS Oscar Koeroo.
Jean-Philippe Baud, IT-GD, CERN November 2007
Classic Storage Element
StoRM: a SRM solution for disk based storage systems
StoRM Troubleshooting session
Authorization and Authentication in gLite
WMS Installation and Configuration
A gLite Authorization Framework
StoRM Architecture and Daemons
UI Installation and Configuration
WLCG security landscape in EGI and beyond Maarten Litmaath CERN v1
Update on EDG Security (VOMS)
Gridification Gatekeeper LCAS: Local Centre AuthZ Service LCAS
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
Grid Security Infrastructure
Presentation transcript:

AuthN and AuthZ in StoRM A short guide

A simple access scenario 1 A Grid User with a valid proxy certificates wants to read a file pointed by SURL. So she performs a srmPrepareToGet (srmPtG) call. StoRM-Tutorial for supporter, IGI, Bologna, Italy

A simple access scenario 2 StoRM verifies if the identified User with the FQANs is authorized to perform srmPtG (read operation) on that SURL. StoRM-Tutorial for supporter, IGI, Bologna, Italy

A simple access scenario 3 StoRM retrieves the local mapping for the grid user. The Mapping configuration is the same used by the Computing Element. StoRM-Tutorial for supporter, IGI, Bologna, Italy

A simple access scenario 4 StoRM set up an ACL entry to the physical file corresponding to the required SURL. This entry could be removed when the pin expires or when the file will be released by the user. StoRM-Tutorial for supporter, IGI, Bologna, Italy

A simple access scenario 5 The Grid User submits a job to the Computing Element close to the SE holding the wished SURL. StoRM-Tutorial for supporter, IGI, Bologna, Italy

A simple access scenario 6 The user job can access to the file directly (file://), because the job is running with the same local credential previously added by StoRM in the ACL. StoRM-Tutorial for supporter, IGI, Bologna, Italy

Security layers A stop can occurs at every level! StoRM-Tutorial for supporter, IGI, Bologna, Italy

Authentication of requestors 1 Authentication of requestors The requestor MUST have a valid proxy certificate It is not expired The proxy certificate MUST to be issued by a trusted CA The CA public certificate must be installed on StoRM FrontEnd hosts The user holds a certificate that hasn’t been revoked The user is not banned! Check the Certificate Revocation Lists (CRLs) Stored in the directory: /etc/grid-security/certificates CRL is a file {CA_hash}.r0  StoRM-Tutorial for supporter, IGI, Bologna, Italy

Trusted Grid CAs for EGI and LCG sites 1 Trusted Grid CAs for EGI and LCG sites The trusted CAs are distributed via RPM available in the YUM repo “EGI-trustanchors.repo”: The meta-package lcg-CA should be installed and updated: # yum clean cache metadata # yum update lcg-CA StoRM-Tutorial for supporter, IGI, Bologna, Italy

Trusted Grid CA installed 1 Trusted Grid CA installed Information about the trusted Certification Authorities are stored in: /etc/grid-security/certificates/ StoRM-Tutorial for supporter, IGI, Bologna, Italy

VOMS awareness: LSC files 1 VOMS awareness: LSC files StoRM is a VOMS-aware service It verifies the trusting VOMS server by checking the correspondence in the certificate subject and what is stored in the LSC (“LiSt of Certificates”) files For each supported VO, for each of its VOMS servers there needs to be an LSC file in the directory: $X509_VOMS_DIR/${VO} by default: /etc/grid-security/vomsdir/${VO} StoRM-Tutorial for supporter, IGI, Bologna, Italy

2 Approachable rules Approachable rules define which users (or which class of users) can approach a certain Storare Area identified by the Virtual FS name in namespace.xml StoRM-Tutorial for supporter, IGI, Bologna, Italy

Approachable rules: Grammar 2 Approachable rules: Grammar StoRM-Tutorial for supporter, IGI, Bologna, Italy

Approachable rules: Grammar 2 Approachable rules: Grammar <dn>*</dn> means that everybody can access the storage Area. It is possible use regular expression on DN fields to define more complex approachable rules. <vo-name>*</vo-name> means that everybody belonging to a VO access the storage Area. users without VOMS extension aren’t recognized as belonging to VOs then they will not be allowed to approach the SA. removing this line imply that the Storage Area is approachable to users without VOMS extensions. StoRM-Tutorial for supporter, IGI, Bologna, Italy

Approachable rules: Examples 2 Approachable rules: Examples <dn>C=IT<dn> means that only Italian users can approach the Storage Area. <vo-name>dteam</vo-name> means that only users belonging to the VO dteam will be allowed to access the Storage Area. This entry can be a list of comma separeted VO-name. StoRM-Tutorial for supporter, IGI, Bologna, Italy

Approachable rules: QUIZ !! 2 Approachable rules: QUIZ !! StoRM-Tutorial for supporter, IGI, Bologna, Italy

Storage Area protection: path-authz.db 2 Storage Area protection: path-authz.db ‘path-authz.db’ is a file containing authorization policies. The policies are defined via ACL (Access Control List), that is an ordered list of ACE (Access Control Entry) Every ACE is expressed as: <user-class, path,permission,ace-type> The evaluation algorithm is the same of NFSv4.1 # cat /etc/storm/backend-server/path-authz.db StoRM-Tutorial for supporter, IGI, Bologna, Italy

3 Grid User mapping The grid user mapping occurs at BE side using the LCMAPS library /etc/storm/backend-server/lcmaps.db The mapping policy is: Map the primary group, based on VOMS credentials, if this is successful, continue trying to allocate a pool account based on VOMS credentials. If any of the steps fails, it tries to map a poolaccount following the normal /etc/grid-security/grid- mapfile. If even that fails tries to map a local account (necessary for *sgm users) StoRM-Tutorial for supporter, IGI, Bologna, Italy

3 Grid User mapping Primary Group: vomslocalgroup The mapping is based on file: /etc/grid-security/groupmapfile StoRM-Tutorial for supporter, IGI, Bologna, Italy