Federation peering à la European The eduGAIN way

Slides:



Advertisements
Similar presentations
Federated Identity for Grid Architects Tom Scavo NCSA
Advertisements

TAC - Poznan, 6 June 2005 Building trust with a European style Diego R. Lopez RedIRIS.
The ICAR Federated Identity Model Massimiliano Pianciamore, CEFRIEL Francesco Meschia, CSI-Piemonte
TF-EMC2 February 2006, Zagreb Deploying Authorization Mechanisms for Federated Services in the EDUROAM Architecture (DAME) -Technical Project Proposal-
Connect. Communicate. Collaborate The eduGAIN Way Diego R. Lopez - RedIRIS.
WebFTS as a first WLCG/HEP FIM pilot
Connect. Communicate. Collaborate Federation peering à la European The eduGAIN way Diego R. Lopez - RedIRIS.
CNRI Handle System and its Applications
SWITCHaai Team Federated Identity Management.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright 2006 Archistry Limited. All Rights Reserved. SOA Federated Identity Management How much do you really need? Andrew S. Townley Founder and Managing.
SWITCHaai Team Introduction to Shibboleth.
EuroPKI 2008 Manuel Sánchez Óscar Cánovas Gabriel López Antonio F. Gómez Skarmeta University of Murcia Levels of Assurance and Reauthentication in Federated.
Connect. Communicate. Collaborate First steps in federation peering: eduGAIN and eduroam Diego R. Lopez - RedIRIS.
Federated Identity Management for HEP David Kelsey WLCG GDB 9 May 2012.
Shib-Grid Integrated Authorization (Shintau) George Inman (University of Kent) TF-EMC2 Meeting Prague, 5 th September 2007.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
Connect. Communicate. Collaborate eduGAIN in Real Life! Ajay Daryanani, RedIRIS TERENA Networking Conference Brugge, 20th May 2008.
An XML based Security Assertion Markup Language
Connect. Communicate. Collaborate Place organisation and project logos in this area Usage of SAML in eduGAIN Stefan Winter, RESTENA Foundation TERENA Networking.
1 CS 502: Computing Methods for Digital Libraries Lecture 19 Interoperability Z39.50.
Connect. Communicate. Collaborate Federation Interoperability Made Possible By Design: eduGAIN Diego R. Lopez (RedIRIS)
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
EResearchers Requirements the IGTF model of interoperable global trust and with a view towards FIM4R AAI Workshop Presenter: David Groep, Nikhef.
Connect. Communicate. Collaborate The authN and authR infrastructure of perfSONAR MDM Ann Arbor, MI, September 2008.
Connect. Communicate. Collaborate The MetaData Service Distributing trust in AAI confederations Manuela Stanica, DFN.
Connect. Communicate. Collaborate AAI scenario: How AutoBAHN system will use the eduGAIN federation for Authentication and Authorization Simon Muyal,
PAPI: Simple and Ubiquitous Access to Internet Information Services JISC/CNI Conference - Edinburgh, 27 June 2002.
Connect. Communicate. Collaborate Federated peering the NREN way: eduGAIN and eduroam Diego R. Lopez (RedIRIS) Klaas Wierenga (SURFnet)
Connect. Communicate. Collaborate Universität Stuttgart A Client Middleware for Token- Based Unified Single Sign On to eduGAIN Sascha Neinert, University.
Diego R. Lopez, RedIRIS JRES2005, Marseille On eduGAIN and the Coming GÉANT Middleware Infrastructure.
Diego R. Lopez, RedIRIS TF-EMC2, Umea SIR, FedSSH and more to come…
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Authentication and Authorisation in eduroam Klaas Wierenga, AA Workshop TNC Lyngby, 20th May 2007.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Deploying Authorization Mechanisms for Federated Services in eduroam Klaas Wierenga, EuroCAMP Helsinki, 17&18th April 2007.
E-Authentication October Objectives Provide a flexible, easy to implement authentication system that meets the needs of AES and its clients. Ensure.
PAPI 2 Distributed trust model and AA interoperability.
Workshop on Security for Web Services. Amsterdam, April 2010 Applying SAML to Identity Data Exchange.
AAI Interconnection with an European style Diego R. Lopez RedIRIS.
Connect. Communicate. Collaborate Applying eduGAIN to network operations The perfSONAR case Diego R. Lopez (RedIRIS) Maurizio Molina (DANTE)
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Overview SPIRE project: Looking at the feasibility of P2P in UK higher education Focused on Penn States open source P2P system ‘LionShare’ which is a heavily.
Access Policy - Federation March 23, 2016
Applying eduGAIN to network operations The perfSONAR case
Cross-sector and user-centric AAI
Mechanisms of Interfederation
Federation Systems, ADFS, & Shibboleth 2.0
University of Stuttgart University of Murcia
First steps in federation peering: eduGAIN and eduroam
The GEMBus Architecture and Core Components
Federation peering à la European The eduGAIN way
Federated Identity Management for Researchers (FIM4R)
CLARIN Federated Identity Vision
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
SWIM Common PKI and policies & procedures for establishing a Trust Framework                           Kick-off meeting Patrick MANA Project lead 29 November.
ESA Single Sign On (SSO) and Federated Identity Management
The DAMe’s First Steps: eduroam and NAS-SAML
Multi-Domain User Applications Research (JRA3)
It Is All about Identity (Whatever the Sphere)
A(nother) view on federation issues
Community AAI with Check-In
GN2 JRA5 Roaming and Authorisation Jürgen Rauschenbach, DFN-Verein
Shibboleth 2.0 IdP Training: Introduction
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
Presentation transcript:

Federation peering à la European The eduGAIN way Diego R. Lopez - RedIRIS

As Federations Grow The risk of dying of success Do we really need to go on selling the federated idea? Different communities, different needs Not even talking about international collaboration Different (but mostly alike) solutions Grids and libraries as current examples And many to come: Governments, professional associations, commercial operators,… Don’t hold your breath waiting for the Real And Only Global Federation

Confederations Federate Federations Same federating principles applied to federations themselves Own policies and technologies are locally applied Independent management Identity and authentication-authorization must be properly handled by the participating federations Commonly agreed policy Linking individual federation policies Coarser than them Trust fabric entangling participants Whitout affecting each federation’s fabric E2E trust must be dynamically built

First Steps Simplifying user collaboration across whatever border is an excellent selling argument Making the whole promise of the VO idea eduroam fast worldwide success is a clear example Lingua franca Syntax: SAML profiles Converging to 2.0 Semantics: eduPerson, SCHAC Trust fabric Public key technologies (if not infrastructures) Component identifiers and registries Metadata repositories

Policy and Legal Matters The PMA model has proven extremely useful Consensual set of guidelines Peer-reviewed accreditation Legal matters: Hic sunt leones For techies like us Privacy Liability More or less manageable in the case of (national) federations

The AAI Goal in GÉANT2 To build an interoperable authentication and authorisation infrastructure that will be used all over Europe enabling seamless sharing of e-science resources We started from Scattered AAI implementations in the EU and abroad And growing The basic idea of federating them, preserving hard-won achievements

Applying Confederation Concepts An eduGAIN confederation is a loosely-coupled set of cooperating identity federations That handle identity management, authentication and authorization using their own policies Trust between any two participants in different federations is dynamically established Members of a participant federation do not know in advance about members in the other federations Syntax and semantics are adapted to a common language Through an abstract service definition

The eduGAIN Components Bridging Elements (BE) Interconnection points Federation-wide (LFA) or distributed (LA) Federation Peering Point (FPP) Able to announce BE metadata The Metadata Service (MDS) Publishing interface (to FPPs) Querying interface (to BEs)

The eduGAIN Model MDS   R-FPP H-FPP R-BE H-BE Resource(s) Connect. Communicate. Collaborate The eduGAIN Model Metadata Query MDS Metadata Publish Metadata Publish   R-FPP H-FPP R-BE H-BE AA Interaction AA Interaction AA Interaction Resource(s) Id Repository(ies)

An Adaptable Model From centralized structures... Connect. Communicate. Collaborate An Adaptable Model From centralized structures... MDS   FPP FPP BE BE IdP IdP SP SP IdP SP IdP IdP SP SP SP SP SP IdP SP IdP

An Adaptable Model ...to fully E2E ones... Connect. Communicate. Collaborate An Adaptable Model ...to fully E2E ones... MDS   SP BE SP BE IdP BE SP BE SP BE IdP BE SP BE IdP BE IdP BE SP BE SP BE IdP BE IdP BE SP BE SP BE IdP BE

An Adaptable Model ...including any mix of them Connect. Communicate. Collaborate An Adaptable Model ...including any mix of them MDS   FPP IdP BE FPP BE IdP BE IdP BE IdP BE SP SP BE SP SP BE IdP SP IdP SP SP BE SP BE SP IdP

The (X.509) Trust Fabric Validation procedures include Normal certificate validation Trust path evaluation, signatures, revocation,… Peer identification Certificates hold the component identifier It must match the appropriate metadata Applicable to TLS connections between components Two-way validation is mandatory Verification of signed XML assertions

Component Identifiers eduGAIN operations strongly depend on having unique, structured and well-defined component identifiers Based on URNs delegated by the eduGAIN registry to the participating federation Identifiers establish the kind of component they apply to by means of normalized prefixes Identifiers follow the hierarchy of the trust establishing process

A General Model for eduGAIN Interactions Connect. Communicate. Collaborate A General Model for eduGAIN Interactions https://mds.geant.net/ ?cid=someURN <samlp:Request . . . RequestID=”e70c3e9e6…” IssueInstant=“2006-06…”> . . . </samlp:Request> <samlp:Response . . . ResponseID=”092e50a08…” InResponseTo=“e70c3e9e…”> . . . </samlp:Response> MDS TLS Channel <EntityDescriptor . . . entityID= ”urn:geant2:..:responder"> . . . <SingleSignOnService . . . Location= “https://responder.dom/” /> TLS Channel(s) urn:geant2:...:responder urn:geant2:...:requester Requester Responder Resource Id Repository

Operation Mapping Maps the abstract service definition into actual protocols Current version is based on SAML 1.1 Profiling the standard to fit abstract parameters A SAML 2.0 implementation will be available along the lifetime of the project The abstract service specification protects components and applications from these changes Authentication assertions and attribute exchange mechanisms are designed to be Shibboleth 1.3 compatible And Shibboleth 2 in the future

Metadata Service Based on REST interfaces transporting SAML 2.0 metadata Usable by non-eduGAIN components Metadata are published through POST operations Metadata are retrieved through GET operations URLs are built as MDSBaseURL/FederationID/entityID?queryString Using component names The query string transports data intended to locate the appropriate home BE (Home Locators) Hints provided by the user Contents of certificate extensions (SubjectInformationAccess)

A Layered Model for Implementation Connect. Communicate. Collaborate A Layered Model for Implementation Component logic eduGAINBase Profile Access eduGAINBase + eduGAINVal + eduGAINMeta SAML toolkit (OpenSAML) SOAP/TLS/XMLSig libraries

eduGAIN Profiles Oriented to Enable direct federation interaction Enable services in a confederated environment Four profiles discussed so far WebSSO (Shibboleth browser/POST) AC (automated cilent: no human interaction) UbC (user behind non-Web client: use of SASL-CA) WE (WebSSO enhanced client: delegation) Others envisaged Extended Web SSO (allowing the send of POST data) eduGAIN usage from roaming clients (DAMe) Based on SAML 1.1 Mapping to SAML 2.0 profiles along the transition period

Connect. Communicate. Collaborate The AC Profile

Connect. Communicate. Collaborate The UbC Profile

Connect. Communicate. Collaborate The WE Profile

Connect. Communicate. Collaborate The WebSSO Profile

The European Way (Too) many governments, languages, national priorities/laws/prides/… A little of weakness, a little of strength The will for convergence Without imposing dramatic inner changes Adopt whatever is worth from overseas With a scent of style and history (Humble) model for the rest of the world We are a little world in itself