OGF 21 Seattle Washington

Slides:



Advertisements
Similar presentations
Security Design and Solution in ARC1 Weizhong Qiang University of Oslo April 9, 2008.
Advertisements

PASSPrivacy, Security and Access Services Don Jorgenson Introduction to Security and Privacy Educational Session HL7 WG Meeting- Sept
Federated Identity for Grid Architects Tom Scavo NCSA
Fujitsu Laboratories of Europe © 2004 What is a (Grid) Resource? Dr. David Snelling Fujitsu Laboratories of Europe W3C TAG - Edinburgh September 20, 2005.
GT 4 Security Goals & Plans Sam Meder
VOMS & SAML Valerio Venturi MWSG /6/07. EU project: RIO31844-OMII-EUROPE OMII-Europe OMII-Europe is an EU-funded project which has been established.
Authz work in GGF David Chadwick
TF-EMC2 February 2006, Zagreb Deploying Authorization Mechanisms for Federated Services in the EDUROAM Architecture (DAME) -Technical Project Proposal-
EDINA 20 th March 2008 EDINA Geo/Grid - Security Prof. Richard O. Sinnott Technical Director, National e-Science Centre University of Glasgow, Scotland.
Shibboleth-intro-dec051 Shibboleth A Technical Overview Tom Scavo NCSA.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
SWITCHaai Team Introduction to Shibboleth.
Shib-Grid Integrated Authorization (Shintau) George Inman (University of Kent) TF-EMC2 Meeting Prague, 5 th September 2007.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
Apr 30, 20081/11 VO Services Project – Stakeholders’ Meeting Gabriele Garzoglio VO Services Project Stakeholders’ Meeting Apr 30, 2008 Gabriele Garzoglio.
SAML support in VOMS Valerio Venturi EGEE JRA1 AH Meeting, Amsterdam 20/23 February 2008.
ShibGrid: Shibboleth access to the UK National Grid Service University of Oxford and STFC.
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
1 Globus Toolkit Security Rachana Ananthakrishnan Frank Siebenlist Argonne National Laboratory.
Interoperability in OMII – Europe (using the new standard compliant SAML-based VOMS to handle attribute-based authz.) Morris Riedel (FZJ), Valerio Venturi.
Tutorial: Building Science Gateways TeraGrid 08 Tom Scavo, Jim Basney, Terry Fleury, Von Welch National Center for Supercomputing.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
Shibboleth: An Introduction
JISC Middleware Security Workshop 20/10/05© 2005 University of Kent.1 The PERMIS Authorisation Infrastructure David Chadwick
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security Token Service Valéry Tschopp - SWITCH.
OGF22 25 th February 2008 OGF22 Demo Slides Prof. Richard O. Sinnott Technical Director, National e-Science Centre University of Glasgow, Scotland
Overview of Privilege Project at Fermilab (compilation of multiple talks and documents written by various authors) Tanya Levshina.
Connect. Communicate. Collaborate AAI scenario: How AutoBAHN system will use the eduGAIN federation for Authentication and Authorization Simon Muyal,
GridShib and PERMIS Integration: Adding Policy driven Role-Based Access Control to Attribute-Based Authorisation in Grids Globus Toolkit is an open source.
Grid Authorization Landscape and Futures Von Welch NCSA
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
Attribute Aggregation in Federated Identity Management David Chadwick, George Inman, Stijn Lievens University of Kent.
Shibboleth & Grid Integration STFC and University of Oxford (and University of Manchester)
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
Adding Distributed Trust Management to Shibboleth Srinivasan Iyer Sai Chaitanya.
Gridshib-intro-dec051 GridShib An Introduction Tom Scavo NCSA.
University of Murcia Gabriel López.  Network authentication in eduroam and SSO token distribution ◦ RADIUS hierarchy ◦ Token based on SAML  Network.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks OpenSAML extension library and API to support.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
Security Assertion Markup Language, v2.0 Chad La Joie Georgetown University / Internet2.
Trygve Aspelien and Yuri Demchenko
Access Policy - Federation March 23, 2016
Authentication, Authorisation and Security
Obligations in the OGSA SAML Authorization Service Interface
OGSA-WG Basic Profile Session #1 Security
Shibboleth Roadmap
SAML New Features and Standardization Status
HMA Identity Management Status
Géant-TrustBroker Dynamic inter-federation identity management
EMI Interoperability Activities
e-Infrastructure Workshop 28th March 2006, University of Leeds
Vincenzo Ciaschini JRA1 All-Hands Helsinki 18-20/06/07
Usecases and Requirements for OGSA-Security
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Grid Security Jinny Chien Academia Sinica Grid Computing.
Adding Distributed Trust Management to Shibboleth
University of Virginia, USA GGF9, Chicago, Illinois, US
Update on EDG Security (VOMS)
The New Virtual Organization Membership Service (VOMS)
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
Put SAML assertion in context
O. Otenko PERMIS Project Salford University © 2002
GridShib: Grid/Shibboleth Integration Update GGF 18 Shibboleth Developers BoF September 10-11, 2006 Washington, DC Tom Barton, Tim Freeman, Kate Keahey,
TeraGrid 08 The Third Annual TeraGrid Conference
Community AAI with Check-In
A Grid Authorization Model for Science Gateways
NSF Middleware Initiative: GridShib
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
Presentation transcript:

OGF 21 Seattle Washington OGSA-Authz WG OGF 21 Seattle Washington

Agenda Note Well Appoint note taker Agenda Bashing Progress of Existing Specs XACML Profile WS Trust Profile New Specifications SAML Attribute Retrieval Profile SAML VO Attribute Profile Project Progress Reports VOMS-PERMIS integration SAML Authz Service Grid-Shib Project Shintau Future of the WG

Progress of Existing Specs XACML profile Have added further text for obligations to the XACML profile to say how gridmap files can be replaced with obligations, and how coordination decision making can be enabled with obligations WS-Trust profile No changes to this Have updated the models and diagrams to make them more generic. Protocol flows are still the same, but more possibilities are allowed (see next 2 slides)

Authz request with Valid Access Requestor PEP User Authn Context Handler Push credentials Authentic Name/ID + Credentials [+meta info] Authz request with Valid Attributes STS-I Get credentials Valid Attributes Authz Decision CVS PDP Optional Pull more credentials or attribute assertions Fig 1 PEP Context Handler – Push Credentials AA Access Requestor Push credentials PEP User Authn Authentic Name/ID + Credentials [+meta info] Authz Decision Examples. Fig 1. PERMIS in Push Mode Fig 2.GGF OGSA Authz Protocol STS-I Get credentials PDP Context Handler CVS Valid Attributes Optional Pull more credentials or attribute assertions AA Fig 2 PDP Context Handler – Push Credentials

Authz request with Valid Access Requestor Unique Name/ID PEP User Authn Context Handler Authz request with Valid Attributes Valid Attributes Authz Decision Authentic name/ID [+meta info] CVS PDP Pull Credentials or attribute assertions Fig 3 PEP Context Handler – Pull Credentials AA Access Requestor Name PEP User Authn Authz Decision Examples. Fig 3. PERMIS in Pull Mode. GT4 Grid Shib Fig 4. GGF OGSA Authz Protocol Authentic Name/ ID [+meta info] Meta info may contain URL, VO name, context info etc. Authentic name/ID is the unique name of resource or subject or context PDP Context Handler CVS Pull Credentials or attribute assertions Valid Attributes AA Fig 4 PDP Context Handler – Pull Credentials

New Specifications Attribute profiles Attribute retrieval profile

VO SAML V2.0 Attribute Profile Aim at defining a SAML V2.0 Profile for Virtual Organization attributes Attributes Name Will be according to the XACML Attribute Profile Attributes Virtual Organization Group Role

VO SAML V2.0 Attribute Profile Involved so far VOMS Chemomentum project Someone else interested? May 2007 post from Takuya Mori on the WG list on the solution adopted in Naregi Timeframe to define

OGSA Attribute Retrieval Service OGSA Attribute Service SAML V2.0 Deployment Profile for X.509 Subject How the protocols and bindings work Format of SAML elements XACML Attribute Profile WDSL available SAML specification describe protocol and bindings without mandating a port type Also the SAML TC has provided a non-normative WSD WSDL has facilitated the adoption of other OGF developed specs like BES

Specification type Status type Adoption level Informational SAML V2.0 Deployment Profile for X.509 Subject is Draft Institutional standard Hopefully Institutional Standard soon XACML Attribute Profile is Institutional Standard Adoption level Implemented VOMS has a prototype Interoperable soon? UNICORE folks working on something similar Shibboleth 2 on its way out, following that others may follow Informational

Project Progress Reports VOMS-PERMIS integration. Using Valerio’s VOMS SAML Attribute server and a new PERMIS CVS module to pull the SAML assertions and validate them according to the PERMIS CVS policy Architecture in next slide

VOMS-PERMIS Architecture

XACML Authorization Service G-Pbox is an authorization service following the XACML specification Developed in gLite Inclusion in the future gLite releases will be discussed in the next months One of its component is an XACML compliant Policy Decision Point Process xacml-context:Request agains a repository of XACML policies and returns and xacml-context:Response Ongoing evolution towards SAML 2.0 profile of XACML

Authorization Service Part of a wider effort for having interoperable authorization services between EGEE, OSG and Globus interface of the PDP is going to be according to the SAML 2.0 Profile of XACML Agreeing on common id (actions, obligations) Some implementations ongoing GT providing a library G-Pbox gJAF

Grid-Shib Project Update The GridShib Project continues to implement attribute push in the GridShib SAML Tools and GridShib for GT. This work is focused on a hybrid security token that we call an X.509-bound SAML Token, that is, a SAML assertion bound to an X.509 certificate, either a short-lived end entity certificate or a proxy certificate. The resulting "X.509-bound SAML Token Profile" is a straightforward extension of the WS-Security X.509 Token Profile, and therefore an implementation of the latter (such as Globus GSI Secure Message) is automatically an implementation of the former. This approach is advantageous since it obviates the need to implement yet another GSI wire protocol (such as WS-Security SAML Token Profile). Moreover, the same token works equally well at the transport level (GSI Transport).

Shintau Project. Conceptual Model Introduce a Linking Service whose purpose is to hold uni-directional links between a user’s attributes from different IdPs User will register with a Linking Service and link his attributes together, optionally providing an Link Release Policy to say which links can go to which SPs. When user contacts an SP for a service, then Linking Service is used to directly or indirectly aggregate the attributes

Linking Service IdP 1 4 3 UserX, Attr1, PID J, LS 2 1 Linking Service User1, IdP1, PID J, IdP2, PID M 5 7 6 IdP 2 UserA, Attr2, PID M, LS

UserID PId IdP UserID SP IDP Fred A=123 Airmiles.com EduX=u23@kent.ac.uk Kent.ac.uk Mary ABC=456 XYX Co uid=123345 Cardbank.com Linking Table UserID SP IDP Fred Books.co.uk Kent.ac.uk Cardbank.com Mary XYX Co * Compstore.com Airmiles.com Link Release Policy Table If the user connects via the LS, and picks an IDP to authenticate to, the LS could then ask, which of the following IDPs do you want to use for this SP (and pick from the Linking Table the full set of linked IDPs). The user can select several of these, along with a tick box “remember”, and the LS will add this subset to the Link Release Policy Table for this SP.

Accessing a Service with LS Aggregation IdP 1 2. User redirected to chosen IdP 3 User Authn 4. IdP 1’s attributes +Authn token Referral to Linking Service 1. Service Request Service Provider 5. SP passes referral+Authn token Linking Service 6. Signed AAs from IdPs 2 and 3 7. IdP follows link, passes Authn token+ Referal 8. IDP2’s Signed AAs 10. IDP3’s Signed AAs Attribute Requests 5,7,9 contain: Authentication Assertion + Referral + Attribute Query Responses contain attributes of user using RID from authn assn 9. IdP follows link IdP 3 IdP 2

Contents of a Referral A user ID that is the PId of the user, originally generated by the recipient IdP, and encrypted to the public key of the recipient IdP. The name of the recipient IdP (or LS) that is the destination of the Referral. A link to the authentication assertion that was created for this user session. The name of the SP that requires the user’s attributes The name of the initiator of the Referral (i.e. the authenticating IdP or LS) The whole construct is digitally signed by the creator of the Referral (i.e. the authenticating IdP or LS)

Accessing a Service with SP Aggregation IdP 1 2. User redirected to chosen IdP 3 User Authn 4. IdP 1’s attributes + Referral to Linking Service 1. Service Request Service Provider 5. SP follows referral Linking Service 6. Referrals to linked IdPs 2 and 3 7. SP follows referral 8. IDP2’s attributes IdP 2 9. SP follows referral 10. IDP3’s attributes IdP 3

Accessing a Service by User choosing LS 3. User redirected to chosen IdP 4. IdP 1’s Authn Assern 5. Attribute request for PID and User attributes for SP 6. Attribute responses IdP 1 User Authn 3,5 4,6 1. Service Request Service Provider 2. User redirected to LS Linking Service 11. Signed AAs from IdPs 2 and 3 7. IdP follows link 8. IDP2’s Signed AAs 10. IDP3’s Signed AAs Attribute Requests 7,9 contain: Authentication Assertion + Referral + Attribute Query Responses contain attributes of user using RID from authn assn 9. IdP follows link IdP 3 IdP 2

Trust Model All IdPs trust the LS to hold their PIds securely LS trusts each linked IdP to authenticate the user correctly, and to return the correct PId that is unique to this user SP trusts LS to hold the established links securely All linked IdPs must trust the authenticating IdP to authenticate the user correctly. (Each Referral is accompanied by an authentication assertion signed by the authenticating IdP, so each linked IdP can check this dynamically) SP must trust the authenticating IdP to authenticate the user correctly SP must trust each IdP to correctly generate and process Referrals and to only send attributes that pertain to the authenticated user that they are authoritative for. (Note that each attribute assertion can be signed by the sending IdP, so that the SP can dynamically validate this on receipt).

Privacy Model User is in control of his/her privacy User is given a unique random number for each session so SP cannot link user sessions together (except via attributes released by user) User says which IdPs are linked together User says which SPs can receive which linked attributes Linking service does not know who the user is or what attributes the user holds. Attribute assertions are encrypted by sending IdP for receiving SP, so intermediaries cannot see these attributes

Protocol Specification (in progress) Linking Protocol is standard SAMLv2 authentication request protocol. IdP returns authentication assertion with PId as subject or random ID for subject plus attribute assertion containing the PId Referral is proposed to be based on Liberty Alliance ID-WSF Identity Mapping Service where each IdP acts as a Identity Mapping Service Each ID-WSF Identity Mapping Request comprises i) the Sec Token of the request contains the Authn token from the authenticating IDP ii) the Token Policy contains the ID of the user as known by the receiving IDP, along with the set of attributes that are being requested, and the name of the SP that needs them The Response contains a set of Mapping Outputs, each mapping output being an attribute for the user (identified by the Authn token), encrypted to the SP. Either the LS sends Identity Mapping Requests and collects all the Mapping Outputs from the Linked IDPs to return to the SP or SP can make the Identity Mapping Requests itself.

More information Full requirements questionnaire results, plus conceptual and protocol design documents are available at http://sec.cs.kent.ac.uk/shintau