f f FermiGrid – Site AuthoriZation (SAZ) Service

Slides:



Advertisements
Similar presentations
PRAGMA Application (GridFMO) on OSG/FermiGrid Neha Sharma (on behalf of FermiGrid group) Fermilab Work supported by the U.S. Department of Energy under.
Advertisements

Dec 14, 20061/10 VO Services Project – Status Report Gabriele Garzoglio VO Services Project WBS Dec 14, 2006 OSG Executive Board Meeting Gabriele Garzoglio.
Role Based VO Authorization Services Ian Fisk Gabriele Carcassi July 20, 2005.
GUMS status Gabriele Carcassi PPDG Common Project 12/9/2004.
OSG AuthZ Architecture AuthZ Components Legend VO Management Services Grid Site GUMS Site Services SAZ CE Gatekeeper Prima Is Auth? Yes / No SE SRM gPlazma.
Implementing Finer Grained Authorization in the Open Science Grid Gabriele Carcassi, Ian Fisk, Gabriele, Garzoglio, Markus Lorch, Timur Perelmutov, Abhishek.
A Model for Grid User Management Rich Baker Dantong Yu Tomasz Wlodek Brookhaven National Lab.
Open Science Grid Software Stack, Virtual Data Toolkit and Interoperability Activities D. Olson, LBNL for the OSG International.
The Fermilab Campus Grid (FermiGrid) Keith Chadwick Fermilab Work supported by the U.S. Department of Energy under contract No. DE-AC02-07CH11359.
OSG Middleware Roadmap Rob Gardner University of Chicago OSG / EGEE Operations Workshop CERN June 19-20, 2006.
VOX Project Status T. Levshina. Talk Overview VOX Status –Registration –Globus callouts/Plug-ins –LRAS –SAZ Collaboration with VOMS EDG team Preparation.
May 8, 20071/15 VO Services Project – Status Report Gabriele Garzoglio VO Services Project – Status Report Overview and Plans May 8, 2007 Computing Division,
G RID M IDDLEWARE AND S ECURITY Suchandra Thapa Computation Institute University of Chicago.
Apr 30, 20081/11 VO Services Project – Stakeholders’ Meeting Gabriele Garzoglio VO Services Project Stakeholders’ Meeting Apr 30, 2008 Gabriele Garzoglio.
Virtualization within FermiGrid Keith Chadwick Work supported by the U.S. Department of Energy under contract No. DE-AC02-07CH11359.
Mine Altunay OSG Security Officer Open Science Grid: Security Gateway Security Summit January 28-30, 2008 San Diego Supercomputer Center.
SAMGrid as a Stakeholder of FermiGrid Valeria Bartsch Computing Division Fermilab.
Metrics and Monitoring on FermiGrid Keith Chadwick Fermilab
Mar 28, 20071/9 VO Services Project Gabriele Garzoglio The VO Services Project Don Petravick for Gabriele Garzoglio Computing Division, Fermilab ISGC 2007.
VOMRS/VOMS-Admin Convergence and VO Services Project Status Tanya Levshina Computing Division, Fermilab.
May 11, 20091/17 VO Services Project – Stakeholders’ Meeting Gabriele Garzoglio VO Services Project Stakeholders’ Meeting May 11, 2009 Gabriele Garzoglio.
Jan 10, 20091/16 VO Services Project – Stakeholders’ Meeting Gabriele Garzoglio VO Services Project Stakeholders’ Meeting Jan 10, 2009 Gabriele Garzoglio.
Mine Altunay July 30, 2007 Security and Privacy in OSG.
Overview of Privilege Project at Fermilab (compilation of multiple talks and documents written by various authors) Tanya Levshina.
4/25/2006Condor Week 1 FermiGrid Steven Timm Fermilab Computing Division Fermilab Grid Support Center.
Metrics and Monitoring on FermiGrid Keith Chadwick Fermilab
6/23/2005 R. GARDNER OSG Baseline Services 1 OSG Baseline Services In my talk I’d like to discuss two questions:  What capabilities are we aiming for.
VO Privilege Activity. The VO Privilege Project develops and implements fine-grained authorization to grid- enabled resources and services Started Spring.
OSG AuthZ components Dane Skow Gabriele Carcassi.
EMI INFSO-RI Argus Policies in Action Valery Tschopp (SWITCH) on behalf of the Argus PT.
Jun 12, 20071/17 AuthZ Interoperability – Status and Plan Gabriele Garzoglio AuthZ Interoperability Status and Plans June 12, 2007 Middleware Security.
AstroGrid-D Meeting MPE Garching, M. Braun VO Management.
Auditing Project Architecture VERY HIGH LEVEL Tanya Levshina.
OSG Site Admin Workshop - Mar 2008Using gLExec to improve security1 OSG Site Administrators Workshop Using gLExec to improve security of Grid jobs by Alain.
Eileen Berman. Condor in the Fermilab Grid FacilitiesApril 30, 2008  Fermi National Accelerator Laboratory is a high energy physics laboratory outside.
Sep 25, 20071/5 Grid Services Activities on Security Gabriele Garzoglio Grid Services Activities on Security Gabriele Garzoglio Computing Division, Fermilab.
An Introduction to Campus Grids 19-Apr-2010 Keith Chadwick & Steve Timm.
INFSO-RI Enabling Grids for E-sciencE SAML-XACML interoperability Oscar Koeroo.
April 25, 2006Parag Mhashilkar, Fermilab1 Resource Selection in OSG & SAM-On-The-Fly Parag Mhashilkar Fermi National Accelerator Laboratory Condor Week.
VOX Project Tanya Levshina. 05/17/2004 VOX Project2 Presentation overview Introduction VOX Project VOMRS Concepts Roles Registration flow EDG VOMS Open.
FermiGrid Keith Chadwick. Overall Deployment Summary 5 Racks in FCC:  3 Dell Racks on FCC1 –Can be relocated to FCC2 in FY2009. –Would prefer a location.
Sep 17, 20081/16 VO Services Project – Stakeholders’ Meeting Gabriele Garzoglio VO Services Project Stakeholders’ Meeting Sep 17, 2008 Gabriele Garzoglio.
VOX Project Status T. Levshina. 5/7/2003LCG SEC meetings2 Goals, team and collaborators Purpose: To facilitate the remote participation of US based physicists.
Site Authorization Service Local Resource Authorization Service (VOX Project) Vijay Sekhri Tanya Levshina Fermilab.
Fermilab / FermiGrid / FermiCloud Security Update Work supported by the U.S. Department of Energy under contract No. DE-AC02-07CH11359 Keith Chadwick Grid.
FermiGrid Keith Chadwick Fermilab Computing Division Communications and Computing Fabric Department Fabric Technology Projects Group.
OSG Status and Rob Gardner University of Chicago US ATLAS Tier2 Meeting Harvard University, August 17-18, 2006.
VO Management Tanya Levshina Computing Division, Fermilab.
Development of the Fermilab Open Science Enclave Policy and Baseline Keith Chadwick Fermilab Work supported by the U.S. Department of.
April 18, 2006FermiGrid Project1 FermiGrid Project Status April 18, 2006 Keith Chadwick.
Abhishek Singh Rana and Frank Wuerthwein UC San Diegowww.opensciencegrid.org The Open Science Grid ConsortiumCHEP 2006 Mumbai INDIA February gPLAZMA:
Why you should care about glexec OSG Site Administrator’s Meeting Written by Igor Sfiligoi Presented by Alain Roy Hint: It’s about security.
FermiGrid The Fermilab Campus Grid 28-Oct-2010 Keith Chadwick Work supported by the U.S. Department of Energy under contract No. DE-AC02-07CH11359.
Virtual Organization Management Registration Service (VOMRS) T. Levshina J. Weigand S. White Co-Authors: L. Bauerdick, G. Carcassi, I. Fisk, A. Heavey,
Virtualization within FermiGrid Keith Chadwick Work supported by the U.S. Department of Energy under contract No. DE-AC02-07CH11359.
FermiGrid Highly Available Grid Services Eileen Berman, Keith Chadwick Fermilab Work supported by the U.S. Department of Energy under contract No. DE-AC02-07CH11359.
SAZ Server/Service Update 17-May-2010 Keith Chadwick, Neha Sharma, Steve Timm.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI solution for high throughput data analysis Peter Solagna EGI.eu Operations.
FermiGrid - PRIMA, VOMS, GUMS & SAZ Keith Chadwick Fermilab
Argus EMI Authorization Integration
StoRM: a SRM solution for disk based storage systems
FermiGrid - PRIMA, VOMS, GUMS & SAZ
Open Source distributed document DB for an enterprise
AuthZ Interop report out
Global Banning List and Authorization Service
Security for Open Science
CRC exercises Not happy with the way the document for testbed architecture is progressing More a collection of contributions from the mware groups rather.
Short update on the latest gLite status
Viet Tran Institute of Informatics Slovakia
Interoperability & Standards
Presentation transcript:

f f FermiGrid – Site AuthoriZation (SAZ) Service Keith Chadwick, Neha Sharma, Steven C. Timm, D. R. Yocum The Grid Resource Authorization Problem: Grid resource administrators need the ability to control access to the resources by internal and external users: Black-list (or ban) during the investigation of a potential compromise, or in the actual compromise of credentials, virtual organizations or certificate authorities. White-list to assure that certain users are guaranteed access to the resource. The above access decisions need to be based on: Distinguished Name (DN), Virtual Organization (VO), Fully Qualified Attribute Name (FQAN = VO + Group and/or Role), Certificate Authority (CA). Additional Requirements: Implement via standard Globus interfaces. Support fast response in the event of an incident. Ability to respond high number of authorization queries. Easy administration of the blacklist and easily restore access. Support the propagation of banning information. Verification/auditing of desired authorization policy. Staged deployment of banning tools and services. FermiGrid – Current Architecture: Fermilab supports a scientific program that includes experiments and scientists located across the globe. To better serve this community, Fermilab has placed its production computer resources in a Campus Grid infrastructure called 'FermiGrid'. The architecture of FermiGrid facilitates seamless interoperation of the multiple heterogeneous Fermilab resources with the resources of the other regional, national and international Grids. Description of the Site AuthoriZation Service: The Site AuthoriZation Service consists of the following components: The SAZ server with backend MySQL database. The SAZ client for Globus Gatekeepers. The interactive sazclient (used by gLExec within pilot jobs). The SAZ gPlazma plugin. The SAZ command line administration script. The SAZ web administration interface (under development) The SAZ client for Globus Gatekeepers is configured through the globus_authorization entry in the configuration file /etc/grid-security/gsi-authz.conf globus_authorization /usr/local/vdt-1.8.1/sazclient-1.2/lib/libSAZ-gt3.2_gcc32dbg globus_saz_access_control_callout globus_mapping /usr/local/vdt-1.8.1/prima/lib/libprima_authz_module_gcc32dbg globus_gridmap_callout The host name, port number and DN of the SAZ server that the SAZ client contacts are configured in: /etc/grid-security/sazc.conf The typical contents of /etc/grid-security/sazc.conf are: SAZ_SERVER_HOST saz.fnal.gov SAZ_SERVER_PORT 8888 SAZ_SERVER_DN /DC=org/DC=doegrids/OU=Services/CN=saz.fnal.gov Multiple SAZ servers may be configured in sazc.conf. If more than one SAZ server is configured in sazc.conf, the SAZ servers are contacted in series for each and every authorization request. The SAZ server interfaces to the backend MySQL database via the Java hibernate method. SAZ Diagram: OSG VO Services Architecture: Current Status: SAZ V1.0 was deployed within FermiGrid in October 2006. The current version of SAZ is V2.0.1b (released in November 2008). All code paths in the SAZ service are regression tested prior to the release and production deployment of the new version. The current SAZ deployment has been stress tested to 1,000,000+ authorization decisions/day, routinely handles 18,000 authorization decisions/hour and has handled peaks of > 27,000/hour. SAZ & FermiGrid-HA: SAZ is one of the services in the FermiGrid service catalog that is deployed in high availability (HA) configuration that is collectively known as “FermiGrid-HA”. The goal for FermiGrid-HA is > 99.999% service availability. For the period of 01-Dec-2007 through 30-Jun-2008, we achieved a service availability of 99.9969%. for the period from 01-Jul-2008 through 20-Feb-2009, we have currently achieved a service availability of 99.9810%. FermiGrid-HA utilizes three key technologies: Linux Virtual Server (LVS). Xen Hypervisor. MySQL Circular Replication. Optional SAZ Configurations: As indicated in the SAZ service description above, the SAZ client can be configured to query multiple SAZ servers. A site can deploy multiple SAZ servers. Possibilities include: One to control access to Globus gatekeepers, A second to control access by Grid pilot jobs (gLExec), A third to control access to Grid storage via GridFTP or SRM/dCache. These SAZ servers can be configured with: Individual backend MySQL databases, Shared access to a common backend MySQL database, A combination of individual and common backend MySQL databases. A Grid may deploy a central SAZ server. The contents of the central SAZ server backend MySQL database can be replicated to individual Grid sites to reduce the WAN latency and potential timeouts. Individual Grid resources may: Query the local Grid site SAZ server, Query the central Grid SAZ server, Replicate the contents of the central Grid SAZ server MySQL database to a local SAZ server MySQL database, Use a combination of a local and an (optionally replicated) Grid wide SAZ service. Future Work: The SAZ service is under active development. The current SAZ administrative interface is via a command line tool, a web interface will shortly be deployed. A security review of the SAZ code was recently undertaken, and the results of the security review will be incorporated in the near term work. The SAZ client-server interface will be extended to support the Globus XACML interface. As a consequence of the XACML extensions, the majority of the Grid proxy information parsing will move into the client (currently this in the server), and this is expected to significantly improve the performance of the SAZ server. Conclusions: The SAZ service is working well in FermiGrid. There are some known limitations that will be addressed shortly. We are open to offers of collaboration in the future development and deployment of SAZ. VOMS Server SAZ GUMS FERMIGRID SE (dcache SRM) Gratia BlueArc CMS WC2 CDF OSG1 OSG2 D0 CAB1 GP Farm Step 2 - user issues voms-proxy-init user receives voms signed credentials Step 3 – user submits their grid job via globus-job-run, globus-job-submit, or condor-g Step 5 – Gateway requests GUMS Mapping based on VO & Role Step 4 – Gateway checks against Site Authorization Service clusters send ClassAds via CEMon to the site wide gateway Step 6 - Grid job is forwarded to target cluster Periodic Synchronization CAB2 Site Wide Gateway Exterior Interior WC1 WC3 VOMRS Step 1 - user registers with VO OSG3/4 Gatekeeper or gLExec DN VO Role CA SAZ A D M I N Job Replication LVS Standby VOMS Active GUMS SAZ MySQL Heartbeat Client Work supported by the U.S. Department of Energy under contract No. DE-AC02-07CH11359