Jens Jensen, STFC Sep EUGridPMA Manchester

Slides:



Advertisements
Similar presentations
Combining the strengths of UMIST and The Victoria University of Manchester Adapting to Federated Identity SHEBANGS Shibboleth Enabled Bridge to Access.
Advertisements

Jens G Jensen CCLRC e-Science Single Sign-on to the Grid Federated Access and Integrated Identity Management.
Federated Access to Grids Daniel Kouřil, Sam Hartman, Josh Hewlet, Jens Jensen, Michal Procházka EGI User Forum 2011.
Implementing Federated Security with ConSec Jens Jensen, STFC OGF40, Oxford, 16 Jan 2014.
Contrail and Federated Identity Management
EUDAT FIM4R at TNC 2014 Jens Jensen, STFC, on behalf of EUDAT AAI task force.
David Groep Nikhef Amsterdam PDP & Grid Evolving Assurance – IGTF LoA generalisation David Groep Interoperable Global Trust Federation IGTF Documents at.
Copyright JNT Association 20051OptionalCopyright JNT Association 2007 Overview of the UK Access Management Federation Josh Howlett.
Federated A(A(A))I Jens Jensen hepsysman, RAL,
CA Stuff Jens Jensen Dave Meredith John Kewley GridPP31, Imperial, London Sept
Here Come the Feds Federated identity management: the consumer’s perspective Jens Jensen, STFC On behalf of EUDAT AAI TF EGI CF Manchester April 2013.
Tweaking the Certificate Lifecycle for the UK eScience CA John Kewley NGS Support Centre Manager & Service Manager for the UK e-Science CA
Usable Security for Science Challenges and Next Steps Jens Jensen Science and Technology Facilities Council Trust and Security 2 nd Workshop Oxford 8-9.
ShibGrid: Shibboleth access to the UK National Grid Service University of Oxford and STFC.
Jens G Jensen CCLRC e-Science Single Sign-on at RAL (and DLS too) Authentication and Integrated Identity Management hepsysman Cambridge, 23 Oct 2006.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
CertWizard: a New Certificate Tool for the UK NGI User Community John Kewley ( ), Jens Jensen, David Meredith and Akay Okcun 16/11/20151EGI.
Jens G Jensen UK e-Science Alternative CA software Jens G Jensen UK e-Science CA Rutherford Appleton Laboratory.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
WebFTS File Transfer Web Interface for FTS3 Andrea Manzi On behalf of the FTS team Workshop on Cloud Services for File Synchronisation and Sharing.
Shibboleth & Grid Integration STFC and University of Oxford (and University of Manchester)
AAI Developments AAI for e-infrastructures UK T0 workshop, Milton Hill Park October 2015
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
Grid Security and Identity Management Mine Altunay Security Officer, Open Science Grid, Fermilab.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
EUDAT receives funding from the European Union's Horizon 2020 programme - DG CONNECT e-Infrastructures. Contract No B2ACCESS LSDMA.
A New UK CA Portal David Meredith Jens Jensen John Kewley.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI VOMS Proxy Lifetime UCB 21 Aug 2012 David Kelsey STFC.
European Grid Initiative AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
EMI is partially funded by the European Commission under Grant Agreement RI Security Token Service (STS) Simplified Credential Management Henri.
Gilda certificates. Certification Authority
OSG Security: Updates on OSG CA & Federated Identities Mine Altunay, PhD OSG Security Team OSG AHM March 24, 2015.
UK e-Science Certification Authority Self Audit Jens Jensen EUGridPMA meeting, Berlin.
News from EUGridPMA EGI OMB, 22 Jan 2013 David Kelsey (STFC) Using notes from David Groep 22/01/20131EUGridPMA News.
Soapbox (S-Series) Certificate Validation Jens Jensen, STFC.
PRACE user authentication and vetting Vincent RIBAILLIER, 29 th EUGridPMA meeting, Bucharest, September 9 th, 2013.
ELIXIR AAI Michal Procházka, Mikael Linden, EGI VC 15 March 2016.
WLCG Update Hannah Short, CERN Computer Security.
Jens Jensen EU Grid PMA, Berlin Jan 2015
RCauth.eu CILogon-like service in EGI and the EOSC
Soapbox of Random Stuff
EGI Updates Check-in Matthew Viljoen – EGI Foundation
P-p-pick up a Pathfinder
J Jensen, STFC hepsysman, June 2017
UK e-Science CA Update J Jensen, STFC 31 Jan 2017.
AAAI Pathfinder J Jensen, STFC 031 Oct,
Identity Management and Authorization
Christos Kanellopoulos
Grid accounting system
CheckIn: the AAI platform for EGI
Check-in Nicolas Liampotis
Tweaking the Certificate Lifecycle for the UK eScience CA
Jens Jensen, STFC 15 Sep GridPP39, Lancaster
Identity Management and Authorization
ESA Single Sign On (SSO) and Federated Identity Management
Leveraging the IGTF authentication fabric for research
Leveraging the IGTF authentication fabric for research
Thursday pilot session: 7-minutes
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
Pilots in AARC Arnout Terpstra (AARC2) / Paul van Dijk (AARC1)
AARC Blueprint Architecture and Pilots
UK e-Science CA and JCS Migration Status
Guest Identities – Milan workshop goals
David Kelsey (STFC-RAL)
Community AAI with Check-In
AAI in EGI Status and Evolution
Authentication and Authorisation for Research and Collaboration
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
Presentation transcript:

Jens Jensen, STFC Sep. 2017 EUGridPMA Manchester Pathfinder Stuff Jens Jensen, STFC Sep. 2017 EUGridPMA Manchester

Contents AAAI Pathfinder Er, that’s it.

AAAI Pathfinder GridPP VOMS DiRAC, ARCHER X.509 SAFE ssh IdP

AAAI Pathfinder GridPP PRACE EGI, EUDAT, Indigo DC X.509 IdP

GridPP, EGI, PRACE, EUDAT, GlobusConnect(?) DB Pathfinder T3.2 STFC/Facilities Portal sshd User Reg’n portal SCARF Public Authn MyProxy Online CA HSM GridPP, EGI, PRACE, EUDAT, GlobusConnect(?)  VOMS

(links to) JISC and service AUP CRL (links to) CP and CPS Moonshot (user) authenticated Account management Public Portal/server (no authentication required) Information Links to helpdesk (links to) JISC and service AUP CRL (links to) CP and CPS AUP Acceptance Name filter IdP check Attribute check Data Processing Acceptance Certificate Interface Acct DB Status (Re)new Revoke Management Interface (X.509 authenticated) Service API Forget

GridPP’s participation Work with Suleman Tariq CA portal (user interface) If you have an IdP in Assent, you can authenticate to https://pathfinder.stfc.ac.uk/moonshot/userreq.pl Not finished yet You can’t get a certificate (yet) Evaluated, but chose not to use MP client Chose not to use the CTS code No VOMS in interface; expecting attrs from Moonshot

Visiony Stuff Single identity provided by home org. Or a “homeless” org. Access to both web and non-web resources Chicken and egg takeup: More resources make having an IdP more attractive Use Pathfinder to provide resources

Technical Points Moonshot requires client side libs (mech_eap.so) X.509 certificates require higher LoA Aiming for BIRCH Need for IdP to communicate “loss of traceability” Infrastructure managed private keys Should improve usability

(Main) Risks (There is a proper risk register…) Not enough IdPs… Of a sufficient LoA (IGTF BIRCH) Need to sign a contract! (little assurance in Assent itself) IdP cannot notify on loss of traceability IGTF accreditation delayed Users still manage certs through browser!

Database

Current Status Trusted IdPs: managed manually (whitelist) in service No assurance in Assent Needs agreement (lawyers, legal) Compare UK eSc: HoD signed Option for individual user step up auc. Guidance from AARC? Needs to not just be a one off (traceability) Registration practices statement? Option for notification “step up” as well Complicated status: need UF indicator

Current Status – Person Unauthenticated person Authenticated person Authenticated from good org Or has step-up (see prev.) Authenticated from good org with good attrs Authenticated from good org with good attrs and notify on loss of traceability Authenticated from good org with good attrs and notify on loss of traceability and AUP/dataprot.-accept

Final steps Need approval from reviewers! MyProxy ∫ (à la CTS) No VOMS extensions though Not prod’n ready Temporary CA, database in cloud Writeup to be finished Still some funnies in the system 10-14 unauthorised requests are made before one is authorised(!) Still need the *!@^!^%& attributes! (see RFC 7056) Doesn’t pick up local biscuit even with IE Ensure logging is correct

Future directions ∫ with RCauth? Could support IOTA branch for < MICS Lots of Globus dependencies for MyProxy Will need to approve each IdP (Need to define process for doing so) And debug its attributes… Like, what is the User-Name (RFC 7056)