Applying eduGAIN to network operations The perfSONAR case

Slides:



Advertisements
Similar presentations
Donkey Project Introduction and ideas around February 21, 2003 Yuri Demchenko.
Advertisements

Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
2006 © SWITCH Authentication and Authorization Infrastructures in e-Science (and the role of NRENs) Christoph Witzig SWITCH e-IRG, Helsinki, Oct 4, 2006.
1 ARPA A regional infrastructure for secure role-based access to RTRT services Ing. Laura Castellani Tuscany Region.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
TF-EMC2 February 2006, Zagreb Deploying Authorization Mechanisms for Federated Services in the EDUROAM Architecture (DAME) -Technical Project Proposal-
Connect. Communicate. Collaborate The eduGAIN Way Diego R. Lopez - RedIRIS.
Connect. Communicate. Collaborate Federation peering à la European The eduGAIN way Diego R. Lopez - RedIRIS.
Shibboleth-intro-dec051 Shibboleth A Technical Overview Tom Scavo NCSA.
EuroPKI 2008 Manuel Sánchez Óscar Cánovas Gabriel López Antonio F. Gómez Skarmeta University of Murcia Levels of Assurance and Reauthentication in Federated.
Connect. Communicate. Collaborate First steps in federation peering: eduGAIN and eduroam Diego R. Lopez - RedIRIS.
TNC2004 Rhodes 1 Authentication and access control in Sympa mailing list manager Serge Aumont & Olivier Salaün May 2004.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
High-quality Internet for higher education and research AAI from the NREN perspective Schiphol, October 17, 2005
Connect. Communicate. Collaborate eduGAIN in Real Life! Ajay Daryanani, RedIRIS TERENA Networking Conference Brugge, 20th May 2008.
Connect. Communicate. Collaborate Place organisation and project logos in this area Usage of SAML in eduGAIN Stefan Winter, RESTENA Foundation TERENA Networking.
1 CS 502: Computing Methods for Digital Libraries Lecture 19 Interoperability Z39.50.
Connect. Communicate. Collaborate Federation Interoperability Made Possible By Design: eduGAIN Diego R. Lopez (RedIRIS)
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
Connect. Communicate. Collaborate The authN and authR infrastructure of perfSONAR MDM Ann Arbor, MI, September 2008.
Connect. Communicate. Collaborate The MetaData Service Distributing trust in AAI confederations Manuela Stanica, DFN.
Connect. Communicate. Collaborate AAI scenario: How AutoBAHN system will use the eduGAIN federation for Authentication and Authorization Simon Muyal,
PAPI: Simple and Ubiquitous Access to Internet Information Services JISC/CNI Conference - Edinburgh, 27 June 2002.
Connect. Communicate. Collaborate Federated peering the NREN way: eduGAIN and eduroam Diego R. Lopez (RedIRIS) Klaas Wierenga (SURFnet)
Authentication and Authorisation for Research and Collaboration Christos Kanellopoulos GRNET Proposed Pilots for Libraries and eGov.
Connect. Communicate. Collaborate Universität Stuttgart A Client Middleware for Token- Based Unified Single Sign On to eduGAIN Sascha Neinert, University.
Diego R. Lopez, RedIRIS JRES2005, Marseille On eduGAIN and the Coming GÉANT Middleware Infrastructure.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Authentication and Authorisation in eduroam Klaas Wierenga, AA Workshop TNC Lyngby, 20th May 2007.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Deploying Authorization Mechanisms for Federated Services in eduroam Klaas Wierenga, EuroCAMP Helsinki, 17&18th April 2007.
Task Force CoRD Meeting / XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA.
PerfSONAR WG 2006 Spring Member Meeting Jeff W. Boote 24 April 2006.
Adding Distributed Trust Management to Shibboleth Srinivasan Iyer Sai Chaitanya.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
University of Murcia Gabriel López.  Network authentication in eduroam and SSO token distribution ◦ RADIUS hierarchy ◦ Token based on SAML  Network.
Workshop on Security for Web Services. Amsterdam, April 2010 Applying SAML to Identity Data Exchange.
AAI Interconnection with an European style Diego R. Lopez RedIRIS.
Connect. Communicate. Collaborate Applying eduGAIN to network operations The perfSONAR case Diego R. Lopez (RedIRIS) Maurizio Molina (DANTE)
Project Moonshot Daniel Kouřil EGI Technical Forum
THE CAMPUS IDENTITY SYSTEM Lucy Lynch, NSRC. Learning Objectives Discovering the key role campus networks play in trusted identities for R&E Authoritative.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
Copyright © 2009 Trusted Computing Group An Introduction to Federated TNC Josh Howlett, JANET(UK) 11 June, 2009.
Access Policy - Federation March 23, 2016
IT Infrastructure Plans
Cross-sector and user-centric AAI
University of Stuttgart University of Murcia
First steps in federation peering: eduGAIN and eduroam
HMA Identity Management Status
Identity Federations - Overview
Géant-TrustBroker Dynamic inter-federation identity management
The GEMBus Architecture and Core Components
Federation peering à la European The eduGAIN way
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Adding Distributed Trust Management to Shibboleth
AARC2 JRA1 Nicolas Liampotis
Federation peering à la European The eduGAIN way
ESA Single Sign On (SSO) and Federated Identity Management
The DAMe’s First Steps: eduroam and NAS-SAML
Multi-Domain User Applications Research (JRA3)
AARC Blueprint Architecture and Pilots
UK Access Management Federation
A(nother) view on federation issues
Community AAI with Check-In
GN2 JRA5 Roaming and Authorisation Jürgen Rauschenbach, DFN-Verein
敦群數位科技有限公司(vanGene Digital Inc.) 游家德(Jade Yu.)
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
Update on a few activities And many things to do
Presentation transcript:

Applying eduGAIN to network operations The perfSONAR case Diego R. Lopez (RedIRIS) Maurizio Molina (DANTE)

perfSONAR perfSONAR is a highly distributed and dynamic network measurement infrastructure User Interface Layer User interface 1 User interface 2 Service Layer Domain A - services Domain B - services Domain C - services Measurement Point Layer Domain A Domain B Domain C Metric type 1 Measurement Point Metric type 2 Measurement Point Metric type 3 Measurement Point

perfSONAR and AAI perfSONAR is built upon many interdependent components Independently deployed Subject to local rules for access and usage Federating solutions for AuthN/AuthZ seem the only acceptable ones Already existing federations in many domains It is necessary to federate federations eduGAIN is the GÉANT2 solution for this

eduGAIN: AAI for GÉANT2 Started from Scattered AAI implementations in the EU and abroad The basic idea of federating them, preserving hard-won achievements Based on the idea of confederation A loosely-coupled set of cooperating identity federations Identity management and AuthN/AuthZ must be properly handled by the participating federations Dynamically established trust links

The perfSONAR Model for AuthN/AuthZ At each perfSONAR participating domain there exists an instance of the Authentication Service (AS) Acting as a proxy between the AuthN/AuthZ and the perfSONAR infrastructures There is a direct trust relationship between resources and the AS in their domain AS relieves resources from deployment and administrative overhead related to AuthN/AuthZ operations AS takes resource access (AuthZ) decisions on the basis of common domain policies Though resources or resource protectors can ultimately deny access because of resource availability

The eduGAIN Model Use a set of interconnection points (Bridging Element, BE) at each federation Announce BE metadata through the FPP (Federation Peering Point) Distribute these metadata through the Metadata Service (MDS) Metadata is used by the requesting BE to establish the trust links BEs exchange data using the eduGAIN SAML-based profiles

The eduGAIN Model MDS R-FPP H-FPP R-BE H-BE Resource(s) Connect. Communicate. Collaborate The eduGAIN Model Metadata Query MDS Metadata Publish Metadata Publish R-FPP H-FPP R-BE H-BE AA Interaction AA Interaction AA Interaction Resource(s) Id Repository(ies)

Putting It All Together Connect. Communicate. Collaborate Putting It All Together

eduGAIN Operations Defined in abstract terms, following the SOA paradigm Metadata Service (MDS) Authentication Service (AuthN) Attribute Exchange Service (Attr) Authorisation Service (AuthZ) Formally defined parameters for each operation Bindings defined for SAML 1.1 and part of SAML 2.0 Plans for evolving these bindings as required

eduGAIN Operation Binding Current version is based on SAML 1.1 Profiling the standard to fit abstract parameters Component identifiers play their role again A SAML 2.0 implementation will be available along the lifetime of the project The abstract service specification protects components and applications from these changes Authentication assertions and attribute exchange mechanisms are designed to be Shibboleth 1.x compatible And Shibboleth 2.0 in the future

eduGAIN Trust Fabric Based on a PKI Validation procedures include Normal certificate validation Trust path evaluation, signatures, revocation,… Peer identification Certificates hold the component identifier It must match the appropriate metadata Applicable to TLS connections between components Two-way validation is mandatory Verification of signed XML assertions

Component Identifiers eduGAIN operations strongly depend on having unique, structured and well-defined component identifiers Based on URNs delegated by the eduGAIN registry to the participating federation Identifiers establish the kind of component they apply to by means of normalized prefixes Identifiers follow the hierarchy of the trust establishing process Including the identifiers of the federation (and BE) the component is using to connect to eduGAIN

The eduGAIN API Common libraries for all eduGAIN components Implementation of the eduGAIN service definition, metadata access and validation procedures The interface is based on specific classes modeling the abstract definition: AuthNReq, AuthNResp,… Is a general abstraction layer for AuthN/AuthZ operations Applicable to perfSONAR clients and AS for interactions in the eduGAIN trust zone And to resources and other components for interactions in the internal trust zone

Profiles Define the precise exchange of messages and the processing rules for these messages in particular use cases Defined in a joint perfSONAR-eduGAIN specification document Two profiles defined so far Automated client (no human interaction) Client on behalf of a user (derived from Web SSO) The eduGAIN API provides specific access to elements implementing the profile logic Simpler usage Easier interoperability

A Layered Model eduGAIN API Profile logic Connect. Communicate. Collaborate A Layered Model eduGAIN API Profile logic Basic eduGAIN services: validation, metadata, service adaptation,… SAML library  OpenSAML SOAP/TLS/XMLSig libraries  Shibboleth components whenever possible

Profiles: Automated Client Connect. Communicate. Collaborate Profiles: Automated Client Certificate installed in the client SH: Client identifier plus (optional) attributes Optional steps to verify properties of SH and/or retrieve additional attributes

Profiles: Client on Behalf of a User Connect. Communicate. Collaborate Profiles: Client on Behalf of a User The identity of the user must be established by the client through direct interaction with the user’s IdP. Work is in progress to provide a simpler Alternative sequence

The GÉANT2 IdP (GIdP) eduGAIN assumes that “NREN level” AAIs are in place and register the identity and attributes of users at their “Homes” This may not be always the case In the short term For all early adopters of GÉANT2 services (including perfSONAR) GIdP fills a temporal gap For those potential users of GÉANT2 services that are within NRENs / end institutions without an AAI in place, or not yet connected to eduGAIN GIdP allows defining an initial trust and resource access model for GÉANT2 services that can be refined/adjusted in the future.

GIdP: The “Home of Last Resort” for eduGAIN Users Connect. Communicate. Collaborate GIdP: The “Home of Last Resort” for eduGAIN Users GIdP User accesses authenticates GIdP IdP Attributes AuthN pSR R-AS R-BE H-BE eduGAIN Resource’s Domain (Remote) GIdP Domain (Home)

Where We Are Implementing the eduGAIN APIs Defining the GIdP service Polishing profiles First pilot to be run around 4th quarter of this year Establishing links with other potential user communities Inside GÉANT2: JRA3 (bandwidth-on-demand) and JRA2 (security) And beyond: the LOBSTER project Starting an initiative to connect network access (eduroam) and AAI (eduGAIN): DAMe

Time for Your Questions (and Your Applause) Connect. Communicate. Collaborate Time for Your Questions (and Your Applause)