AARC2 JRA1 Nicolas Liampotis

Slides:



Advertisements
Similar presentations
Options for integrating the JANET Roaming Service (JRS) and Shibboleth Tim Chown University of Southampton (UK) JISC Access Management.
Advertisements

Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
Shibboleth 2.0 IdP Training: Basics and Installation January, 2009.
AARC Overview Licia Florio, David Groep 21 Jan 2015 presented by David Groep, Nikhef.
Belnet Federation Belnet – Loriau Nicolas Brussels – 12 th of June 2014.
The UK Access Management Federation for education and research John Chapman, Project Adviser, Technical Policy & Standards.
Towards Interconnecting the Nordic Identity Federations TNC2007 Walter M Tveter, UiO Mikael Linden, CSC/HAKA Ingrid Melve, Uninett/Feide.
Connect. Communicate. Collaborate Place organisation and project logos in this area Usage of SAML in eduGAIN Stefan Winter, RESTENA Foundation TERENA Networking.
Technical Break-out group What are the biggest issues form past projects – need for education about standards and technologies to get everyone on the same.
GridShib and PERMIS Integration: Adding Policy driven Role-Based Access Control to Attribute-Based Authorisation in Grids Globus Toolkit is an open source.
Authentication and Authorisation for Research and Collaboration David Kelsey AARC AHM Milan And mechanisms NA3 Task 4 – Scalable.
Authentication and Authorisation for Research and Collaboration Michał Jankowski, Maciej Brzeźniak AARC General Meeting, Milan.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Current status and plans.
Authentication and Authorisation for Research and Collaboration Christos Kanellopoulos GRNET Proposed Pilots for Libraries and eGov.
Shibboleth Trust Model Shibboleth/SAML Communities (aka Federated Administrations) Club Shib Club Shib Application process Policy decision points at the.
Interfederation RL “Bob” Morgan University of Washington and Internet2 Internet2 Member Meeting Chicago, Illinois December 2006.
June 9, 2009 SURFfederatie: implementing a multi- protocol federation Hans Zandbelt & Joost van Dijk, SURFnet.
DANTE AAI Training: Part 2: Under the Hood Nicole Harris, TERENA.
REFEDs Wiki A test-bed for cross-federation practices ? Firstname Lastname Job title
Introduction to Shibboleth Attribute Delivery for Campuses New to Shibboleth Paul Caskey The University of Texas System.
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
David Groep Nikhef Amsterdam PDP & Grid AARC Authentication and Authorisation for Research and Collaboration an impression of the road ahead.
Workshop on Security for Web Services. Amsterdam, April 2010 Applying SAML to Identity Data Exchange.
Connect. Communicate. Collaborate Applying eduGAIN to network operations The perfSONAR case Diego R. Lopez (RedIRIS) Maurizio Molina (DANTE)
Authentication and Authorisation for Research and Collaboration Peter Solagna, Davide Vaghetti, et al. Topics for PY2 activities.
Authentication and Authorisation for Research and Collaboration Peter Solagna, Nicolas EGI AAI integration experiences AARC Project.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
Security in the wider world David Kelsey (STFC-RAL) GridPP37 – Ambleside 2 Sep 2016.
The IGTF to eduGAIN Bridge
Access Policy - Federation March 23, 2016
David Millman—Columbia January 2005
The EGI AAI “CheckIn” Service
Applying eduGAIN to network operations The perfSONAR case
Cross-sector and user-centric AAI
Chief Regulatory Adviser, JANET(UK)
Mechanisms of Interfederation
EGI Updates Check-in Matthew Viljoen – EGI Foundation
Federation made simple
OMG, Another Simple, Lightweight Authentication Service???
eduTEAMS – Current status & Future Plans
Extending Authentication to Members of Social Networks
Identity Federations - Overview
Géant-TrustBroker Dynamic inter-federation identity management
CheckIn: the AAI platform for EGI
AAI Alignment Nicolas Liampotis (based on the work of Mikael Linden)
e-Infrastructure Workshop 28th March 2006, University of Leeds
Updates on Training Andrea Biancini (AARC2.AHM)2 NA2 WP leader
Identity Federations - Installation and operation
Shibboleth Implementation in EZproxy
GÉANT 4-2 JRA3 T1 and T2 Federations and Campus (CaFe) e-Infrastructures and Service Providers (RASP) Daniela Pöhn JRA3 T1 LRZ/DFN-AAI Technology Exchange.
Auditing in SQL Server 2008 DBA-364-M
Policy in harmony: our best practice
Leveraging the IGTF authentication fabric for research
Thursday pilot session: 7-minutes
What’s changed in the Shibboleth 1.2 Origin
OIDC Federation for Infrastructures
AARC Overview Licia Florio
AARC Blueprint Architecture and Pilots
OIDC Federation for Infrastructures
AARC2 JRA1 Update Nicolas Liampotis
eduPersonAffiliation semantics – a spin-off of eduGAIN policy
Community AAI with Check-In
Shibboleth 2.0 IdP Training: Introduction
JRA1: Integrated AAI Developments
Verifying student status with
Authentication and Authorisation for Research and Collaboration
eIDAS-enabled Student Mobility
What is InAcademia? An affiliation validation service
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
REFEDS Assurance Suite
Presentation transcript:

AARC2 JRA1 Nicolas Liampotis Exchange of scoped affiliation information across infrastructures Nicolas Liampotis JRA1, AARC2 GRNET AARC2 2nd meeting, Amsterdam 22 November 2017

Scoped affiliation information What is it “The person's affiliation within a particular security domain in broad categories such as student, faculty, staff, alum, etc.” The values consist of a left and right component separated by an "@" sign The left component is one of the values from the eduPersonAffiliation controlled vocabulary This right-hand side syntax of eduPersonScopedAffiliation intentionally matches that used for the right-hand side values for eduPersonPrincipalName The "scope" portion MUST be the administrative domain to which the affiliation applies

Scoped affiliation information Why we need it RPs typically use scoped affiliation information to make authorisation decisions based on the person’s affiliation within their: Home Organisation  HO affiliation, e.g. member@admin.grnet.gr Infrastructure  Infrastructure affiliation, e.g. member@elixir-europe.org

Scoped affiliation information The problem with X-infra exchange Scoped affiliation information can be communicated via the ePSA attribute which is an (optional) attribute of the REFEDS R&S bundle so.. problem solved! BUT ePSA attribute values will be typically filtered out by SPs due to scope checking

Scoped affiliation information What is scope checking After receiving a scoped attribute from the IdP, SP software can be configured to compare the asserted scope to the scope value(s) in metadata or to a locally defined list The scoped attribute is accepted by the SP if and only if the asserted scope matches a scope value in metadata or one that's manually configured The Shibboleth SP software is configured this way by default. SimpleSAMLphp doesn't perform scope checking by default but it may in the near future (at last!) Other SP software may require explicit configuration or in many cases may not support the <shibmd:Scope> element at all.

Scoped affiliation information The big question To check, or not to check the scope?

Scoped affiliation information Can SPs trust it? “Consumers of ePSA will have to decide whether or not they trust values of this attribute. In the general case, the directory carrying the ePSA is not the ultimate authoritative speaker for the truth of the assertion. Trust must be established out of band with respect to exchanges of this attribute value.” Q. Do the asserted ePSA value scopes need to match the scope value(s) in metadata? Well… You can't read an eduPerson definition and make any inference about scopes in metadata, since the definition is of an attribute that exists independently of SAML. If you want the asserted attribute values to be acceptable, you'll need to add them [their scopes] to metadata. Otherwise all bets are off. To be honest though, that text is just weird. I don't actually know what it was trying to say.

Scoped affiliation information Can SPs trust it in a proxy environment? Q. How can an IdP proxy of a research/e-Infra AAI pass the ePSA values received by upstream IdPs to the downstream SPs? The proxy is almighty and can assert whatever it wants, and the SPs relying on that one proxy have no* way to verify anything the proxy asserts (other than that it's actually the proxy they know that sent them data) BUT Can this work for SPs that are connected to a proxy and are exposed in eduGAIN at the same time?

Scoped affiliation information Different approaches to support X-infra exchange The IdP Proxy communicates scoped affiliation values via the ePSA attribute with all scope values in the IdP proxy metadata The IdP Proxy communicates scoped affiliation values via the ePSA attribute and downstream SPs are configured to disable scope checking for that attribute The IdP/SP proxy introduces an existing eduPerson attribute (e.g. eduPersonEntitlement) to communicate scoped affiliation values The IdP/SP proxy introduces a new ePSA-like attribute “XScopedAffiliation” to communicate scoped affiliation values

Scoped affiliation information Exchange via ePSA attribute with all scope values in the IdP Proxy metadata ePSA is a standard attribute ePSA is an optional attribute of the REFEDS R&S bundle No config required for downstream SPs Needs agreement with Federation operators who are in effect authoritative for the scope element in metadata

Scoped affiliation information Exchange via ePSA attribute without scope values in IdP Proxy metadata No need to add scopes in IdP proxy metadata ePSA is a standard attribute ePSA is an optional attribute of the REFEDS R&S bundle Requires SPs to be configured to disable scope checking for ePSA values from the proxy

Scoped affiliation information Exchange via ePEntitlement attribute without scope values in IdP Proxy metadata No need to add scopes in IdP Proxy metadata ePEntitlement is a standard attribute ePEntitlement is already used for access control by SPs ePEntitlement is not part of the REFEDS R&S attribute bundle Requires SPs to be configured to parse affiliation information from IdP Proxies in a special way

Scoped affiliation information Exchange via new xScopedAffiliationAttribute attribute without scope values in IdP Proxy metadata No need to add scopes in IdP proxy metadata xScopedAffiliation is not part of the REFEDS R&S attribute bundle Requires SPs to be configured to handle affiliation information from both ePSA and new attribute

nliam@grnet.gr