Investigation authentication using AAF for the CVL on NeCTAR

Slides:



Advertisements
Similar presentations
Cloud PIV Authentication and Authorization Demo PIV Card User Workstation Central Security Server In order to use Cloud Authentication and Authorization.
Advertisements

FI-WARE Testbed Access Control temporary solution.
An Authorization Service using.NET Passport ™ as underlying Authentication Scheme Bar-Hen Ron Hochberger Daniel Winter 2002 Technion – Israel Institute.
IT:Network:Applications VIRTUAL DESKTOP INFRASTRUCTURE.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Catania Science Gateway Framework Motivations, architecture, features Catania, 09/06/2014Riccardo Rotondo
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
Additional SugarCRM details for complete, functional, and portable deployment.
CONFIGURING WINDOWS SERVER MIS 424 Professor Sandvig.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Eucalyptus Virtual Machines Running Maven, Tomcat, and Mysql.
Customized cloud platform for computing on your terms !
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
Presented by: Sanketh Beerabbi University of Central Florida COP Cloud Computing.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Customized cloud platform for computing on your terms ! Nirav Merchant
| nectar.org.au NECTAR TRAINING Module 10 Beyond the Dashboard.
Enjoy Remote Support WinVNC Introduction A&SIT Ben Wu 11/04/08.
608D CloudStack 3.0 Omer Palo Readiness Specialist, WW Tech Support Readiness May 8, 2012.
User Access to Router Securing Access.
Securing Sensitive Information Data Security Dashboards often contain the most important data in the company Securing that information makes business.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
How to Deploy and Configure the Smart Net Total Care CSPC Collector
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
| nectar.org.au NECTAR TRAINING Module 10 Beyond the Dashboard.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Configuring and Deploying Web Applications Lesson 7.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
IPlant Collaborative Tools and Services Workshop iPlant Collaborative Tools and Services Workshop Overview of Atmosphere.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
1 Dr. Tom Hicks Computer Science Department Trinity University 1.
Academic Technology Services The UC Grid Project OSG Consortium All-Hands Meeting Bill Labate & Joan Slottow Research Computing Technologies UCLA Academic.
The Characterisation Virtual Laboratory James Wettenhall Clayton Campus 20 th June 2012.
Holland Computing Center STAT802 Create and access Anvil Windows 10 SAS instance 01/23/2017.
ICE Integrated Cloud Environment Cloud Scanning and Mobile Printing
IT06 – HAVE YOUR OWN DYNAMICS NAV TEST ENVIRONMENT IN 90 MINUTES
Contents Software components All users in one location:
THE BATTLE OF CLOUDS Openstack vs. Amazon
Lab 05 Firewalls.
Single Sign-On Led by Terrice McClain, Jen Paulin, & Leighton Wingerd
Customized cloud platform for computing on your terms !
Enterprise Hybrid Cloud
Tools and Services Workshop Overview of Atmosphere
Power BI Security Best Practices
THE STEPS TO MANAGE THE GRID
Creating a Windows 10 Virtual machine
OpenStack Ani Bicaku 18/04/ © (SG)² Konsortium.
Chapter 3: Windows7 Part 4.
File Transfer Olivia Irving and Cameron Foss
Network Services.
Diego Scardaci (EGI.eu)
Multifactor Authentication & First Time Login
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Multi-Factor Authentication
OpenStack-alapú privát felhő üzemeltetés
Getting Started: Amazon AWS Account Creation
An Introduction to Cloud Computing
* Introduction to Cloud computing * Introduction to OpenStack * OpenStack Design & Architecture * Demonstration of OpenStack Cloud.
Lecture 16B: Instructions on how to use Hadoop on Amazon Web Services
Access eJournals Form Your Home
Welcome to Office 365!.
Jerald Overstreet, GISP Server Portal SQL Manager Admin
FCL – Administration Tool
How do I complete an application form?
Module 1.3 Introduction to the HFR Administration Module
Presentation transcript:

Investigation authentication using AAF for the CVL on NeCTAR Version 0.1

Review of current CVL creation and connection on NeCTAR (2) (3) NeCTAR cloud AAF Login through home institution Failed Users interface (1) HTTP OK (4) (5) NeCTAR dashboard User NeCTAR project (create instances, manage resources ...) (6) (7) SSH VNC Launcher CVL Instances

Where we are going to use AAF in NeCTAR CVL Question: which authentication we are talking about? - Authentication to create nectar instance? . Login to NeCTAR dashboard (AAF has already been used). . Login to CVL (NeCTAR) dashboard? Create and manager CVL only instances and resources. Who is going to create the CVL dashboard? - Authentication to access CVL nectar instance either from launcher, or vncviewer, or command ssh? . Using password authentication. . Using key authentication.

Options to use AAF authentication for CVL on NeCTAR Option 1: Login to NeCTAR dashboard to create CVL instance (AAF has already been used, mission is accomplished :-)). Option 2: Create a new CVL NeCTAR dashboard to manage and create CVL only images and to use AAF (possible, but is it feasible?) Option 3: Create a secure HTTP CVL portal to use AAF then to redirect to CharacterisationVM project in NeCTAR dashboard. Option 4: Change the current CVL instance mode, to allocate a pool of CVL NeCTAR instances to form a virtual cluster. CVL manages user credential, security, resources and backup facilities. User accounts need be approved and created by an authorized person or CVL administration. Users can came and go to use CVL facilities but users don't own the CVL instances, which is similar to the MASSIVE mode, a centralized authoritative mode. Option 5: AAF is irrelevant once an instance has been created from Option 1, handing over an instance to a CVL user or a team. Option 6: ...........

Proposal 1: Authentication without AAF using VNC launcher (2) Create user account (user identity, user group, ssh key, etc.) CVL project Images Pre-installed CVL drivers for (Neuroimaging, structural biology, energy materials) Resources Database CVL Administrator NeCTAR API for Computer Storage Image (4) Check user credential CVL login servers (1) Register CVL VNC Launcher (5) VM IP address, loging name and password Normal users (6) VM login (3) Start launcher and user login (7) VM desktop

Proposal 2: Authentication without AAF using web portal (2) Create user account (user identity, user group, ssh key, etc.) CVL Administrator NeCTAR API for Computer Storage Image CVL WEB login portal CVL project CVL Images Resources Database (1) Register (3) User login Normal users (4) VM IP address, loging name and password from encypted login code (5) Start VNC Launcher, manually copy IP, name password to launcher (6) VM Login CVL VNC Launcher (7) VM desktop