Evolving the EGI trust fabric using distributed responsibility

Slides:



Advertisements
Similar presentations
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
Advertisements

EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI The IGTF IOTA Profile towards differentiated assurance levels.
David Groep Nikhef Amsterdam PDP & Grid Evolving Assurance – IGTF LoA generalisation David Groep Interoperable Global Trust Federation IGTF Documents at.
INFSO-RI Enabling Grids for E-sciencE JRA3 2 nd EU Review Input David Groep NIKHEF.
WebFTS as a first WLCG/HEP FIM pilot
David Groep Nikhef Amsterdam PDP & Grid Differentiated and Collaborative Assurance profiling the identity management landscape for diversifying e-Infrastructure.
Security Incident Response Trust Framework for Federated Identity (Sir-T-Fi) David Kelsey (STFC-RAL) REFEDS, Indianapolis 26 Oct 2014 and now abbreviated.
Trust and Security for FIM (Sirtfi/SCI) David Kelsey (STFC-RAL) FIM4R at CERN 4 Feb 2015.
IOTA Questions for RPs Sept 9, 2013 Bucharest, Romania.
LiveAP Towards Differentiated Identity Assurance David Groep, Nikhef supported by the Netherlands e-Infrastructure SURFsara, and EGI.eu O-E-15 and EGI-InSPIRE.
Federated Identity Management for HEP David Kelsey WLCG GDB 9 May 2012.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI Towards Differentiated Identity Assurance as a collaborative.
David Groep Nikhef Amsterdam PDP & Grid Evolving Assurance – going where? Collaborative, distributed, and generalized assurance beyond just identity authentication.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
EResearchers Requirements the IGTF model of interoperable global trust and with a view towards FIM4R AAI Workshop Presenter: David Groep, Nikhef.
IOTA Questions for RPs Sept 9, 2013 Bucharest, Romania.
Security Policy Update David Kelsey UK HEP Sysman, RAL 1 Jul 2011.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Current status and plans.
IOTA AP Towards Differentiated Identity Assurance David Groep, Nikhef supported by the Netherlands e-Infrastructure and SURFsara.
Federated Identity Management for HEP David Kelsey HEPiX, IHEP Beijing 18 Oct 2012.
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
EGI-InSPIRE RI EGI EGI-InSPIRE RI Establishing Identity in EGI the authentication trust fabric of the IGTF and EUGridPMA.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
David Groep Nikhef Amsterdam PDP & Grid Bring the WLCG federation Home Extending your trust options beyond bottom-up identity by collaborating with global.
CERN IT Department CH-1211 Geneva 23 Switzerland t OIS Operating Systems & Information Services CERN IT Department CH-1211 Geneva 23 Switzerland.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF & EUGridPMA status update SHA-2 – and more (David Groep,
News from EUGridPMA EGI OMB, 22 Jan 2013 David Kelsey (STFC) Using notes from David Groep 22/01/20131EUGridPMA News.
PRACE user authentication and vetting Vincent RIBAILLIER, 29 th EUGridPMA meeting, Bucharest, September 9 th, 2013.
Security Policy Update WLCG GDB CERN, 11 June 2008 David Kelsey STFC/RAL
IGTF in 10 years enabling the interoperable global trust federation Nikhef, Amsterdam supported the Dutch national e-Infrastructure funded and coordinated.
Security in the wider world David Kelsey (STFC-RAL) GridPP37 – Ambleside 2 Sep 2016.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI The IGTF IOTA Profile towards differentiated assurance levels.
Security Incident Response Trust Framework for Federated Identity (Sir-T-Fi) David Kelsey (STFC-RAL) REFEDS, Indianapolis 26 Oct 2014.
Building Trust for Research and Collaboration
Introduction to AAI Services
WLCG Update Hannah Short, CERN Computer Security.
Boosting AAI for research and collaboration
RCauth.eu CILogon-like service in EGI and the EOSC
The Policy Puzzle Many groups and (proposed) policies, but leaving many open issues AARC “NA3” is tackling a sub-set of these “Levels of Assurance” –
EGI Updates Check-in Matthew Viljoen – EGI Foundation
AARC Update What’s been happening in AARC which matters for GÉANT
Bring the WLCG federation Home
eduTEAMS platform for collaboration Niels Van Dijk
LCG Security Status and Issues
AAI Alignment Nicolas Liampotis (based on the work of Mikael Linden)
Boosting AAI for research and collaboration
Minimal Level of Assurance (LoA)
Policy in harmony: our best practice
Assessing Combined Assurance
Assessing Combined Assurance
Leveraging the IGTF authentication fabric for research
Leveraging the IGTF authentication fabric for research
OIDC Federation for Infrastructures
Pilots in AARC Arnout Terpstra (AARC2) / Paul van Dijk (AARC1)
AARC Blueprint Architecture and Pilots
Supporting communities with harmonized policy
EUGridPMA Status and Current Trends and some IGTF topics March 2018 APGridPMA ISGC Meeting David Groep, Nikhef & EUGridPMA.
OIDC Federation for Infrastructures
RCauth.eu CILogon-like service in EGI and the EOSC
David Kelsey (STFC-RAL)
Community AAI with Check-In
AAI in EGI Status and Evolution
Combined Assurance Model
Federated Incident Response
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
REFEDS Assurance Suite
Presentation transcript:

Evolving the EGI trust fabric using distributed responsibility David Groep EGI IGTF Liaison orcid.org/0000-0003-1026-6606

EGI Security Policy top-level framework EGI trust policy space EGI Security Policy top-level framework Accepted Certification Authorities policy IGTF Classic IGTF MICS IGTF SLCS Virtual Organisation Membership Policy Registration Practices EGI (based on earlier joint JSPG work) puts user traceability on the IGTF providers accepting a set of IGTF assurance profiles: MICS, SLCS, Classic with peer-reviewed self-audits and transparency VO registration process is fairly light-weight: no audits, no documented procedures but a few VOs are different and do have such processes (mainly wLCG) Evolving the EGI Trust Fabric - Bari 2015

Federated Authentication Performing reasonable identity vetting of users and providing traceability is non-trivial Authorities set of a distributed Registration Authority network Or leverage an existing one, based on ‘FedAuth’ with quality assurance e.g. through services like DFN-AAI and Trusted Certificate Service TCS Graphic: IGTF 2015 Graphic from: Jan Meijer, UNINETT Evolving the EGI Trust Fabric - Bari 2015

‘Federated Authentication’ for a myriad of services But SSO single password & federation also means: instant abuse in case it gets compromised (WebSSO, imap, smtp, ssh, eduroam, TCS, …) And unknown qualities of identity in each federation and each IdP  ‘free VMs 4 ALL’ wLCG FIM4R pilot background: eduGAIN connected federations as of November 2014 – Brooke Schofield, TERENA Evolving the EGI Trust Fabric - Bari 2015

Federated use of the eInfra WebFTS ‘FIM4R’ in wLCG Romain Wartel ELIXIR reference architecture Mikael Linden et al. Evolving the EGI Trust Fabric - Bari 2015

Evolving the EGI Trust Fabric - Bari 2015 Why the move to FedAuth Cross-national federated access progressed tremendously eduGAIN: more federations, with technical interop across countries Increased awareness of research & scholarship use cases ‘the will to make it happen’: demonstrated by SirTFi, AARC, VOPaaS, … A great promise for easier collaboration Move to authenticators ‘closer’ to the user understanding – mainly home organization credentials Ability to ‘hide’ end-user PKIX technology – and offer simpler authentication for web-based services through ‘OpenID Connect’ and ‘SAML’ And there are bridges – since for non-Web, command-line and brokerage ‘SAML2Int WebSSO’ does not work STS, CILogon, TCS, SSH-to-MyProxy tokens, Moonshot, … Evolving the EGI Trust Fabric - Bari 2015

Issues hindering the adoption of FedAuth Although many production federations are pretty good, and quite a few IdPs have good processes … public documentation, self-assessment and peer-review are missing it’s not consistent across IdPs and processes are not designed for collaboration use cases re-use of identifiers is common (also an issue for social IdPs) the identity providers provide no identity … or it’s non-consistent identifiers generated are specific to each SP and may not provide traceability needed for valuable resources some allow users to change their own data (including e.g. their email address and all contact data), or do not collaborate in case of issues Evolving the EGI Trust Fabric - Bari 2015

Assurance profiles as charted by the IGTF So many production federations and IdPs are pretty good, but … they are all different, and the lowest common denominator is quite low … so IGTF for ‘conventional’ assurances requires additional per-user controls … and the (‘uniqueified’) AP ‘DOGWOOD’ (IOTA) leaves an assurance gap …3,4 LoA 2: 1, 2-factor vetting, verified traceability, externally audited as matter of course 2 Assurance profiles BIRCH, CEDAR (MICS, Classic): identified naming, traceability, longer-term, limited auditing Kantara-like Assurance Scale ASPEN (SLCS): identified naming, point-in-time traceability, time-limited RP task DOGWOOD (IOTA): unique identification, no identity , limited traceability 1 LoA 1: verified email address with mail-back * somewhat my personal view … sorry for bias LoA 0: ‘like conventional unsigned email’ Evolving the EGI Trust Fabric - Bari 2015

Redistributing responsibilities with IOTA Who can absorb the responsibilities, if not the identity providers? Requirements: End-to-end traceability must remain the same Changing or documenting federation and IdP processes is a ‘lengthy’ process – but adding some requirements does work (e.g. SiRTFi on incident response) … so who can absorb the responsibility? The resource centres – and go back to 1995 with per-site vetting  The Infrastructure or funding agencies, through a rigorous registration process – PRACE ‘home sites’, or XSEDE registration + NSF granting EGI UMP – that’s what’s happening partially in the LToS service Or the communities? Evolving the EGI Trust Fabric - Bari 2015

Moving the bar towards differentiated assurance http://igtf.net/ap/iota (part of http://igtf.net/ap/loa) IOTA AP assurance level ‘DOGWOOD’ is different, and remainder of the elements must be taken up by somebody else – the VO or the sites Only thing you get is an opaque ID Consider questions about Real names and pseudonyms Enrolling users in a community Keeping audit records Auditability and tracing Incident response Identity elements identifier management re-binding and revocation binding to entities traceability of entities emergency communications regular communications ‘rich’ attribute assertions correlating identifiers access control Evolving the EGI Trust Fabric - Bari 2015

Specific Delegated Responsibilities Need for proper traceability does not go away, so … who holds that information need not only be a traditional CA but can be another entity with similarly rigorous processes Some communities have an existing registration system that is very robust PRACE – in-person links at the home sites XSEDE – NSF grant approval process wLCG –CERN Users Office and HR Database Evolving the EGI Trust Fabric - Bari 2015

Distributed Responsibilities I: Trusted Third Party Evolving the EGI Trust Fabric - Bari 2015

Evolving the EGI Trust Fabric - Bari 2015 Distributed Responsibilities II: Collaborative Assurance & Traceability Evolving the EGI Trust Fabric - Bari 2015

Evolving the EGI Trust Fabric - Bari 2015 IOTA in the EGI context EGI – by design - supports loose and flexible user collaboration 300+ communities Many established ‘bottom-up’ with fairly light-weight processes Membership management policy* is deliberately light-weight Most VO managers rely on naming in credentials to enroll colleagues Only a few VOs are ‘special’ LHC VOs: enrolment is based on the users’ entry in a special (CERN-managed) HR database, based on a separate face-to-face vetting process and eligibility checks, including government photo ID + institutional attestations Only properly registered and active people can be listed in VOMS *) https://documents.egi.eu/document/79 Evolving the EGI Trust Fabric - Bari 2015

Software support for DiffLoA What is needed it for the infrastructures (resource centres) to differentiate between ‘light-weight VOs’ and ‘heavily-managed VOs’ Preferably on a per-VO basis Allowing IdPs with a lower assurance profile to be used for heavily-managed VOs’ Whilst ensuring light-weight VOs can continue to enjoy airiness since they’re combined with higher-assurance IdPs (CAs) # Example VO-CA-AP-file, please adapt according to requirements # First the VOMS entries /pvier "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth",\ file:TERENAeSciencePersonalCA.info, file:TERENAeSciencePersonalCA-2.info, \ file:TERENAeSciencePersonalCA-3.info /dteam file:policy-igtf-mics.info,file:policy-igtf-classic.info Evolving the EGI Trust Fabric - Bari 2015

Software capabilities today ‘For site-controlled redistribution to work, all software in the infrastructure faces with redistributed responsibility must support it’ Key components Argus Authorization System Site access control suite for C ‘LCMAPS’ … embedded ACL systems in (storage) software For some it’s there (like LCMAPS on next slide), for others its ‘fairly trivial’ to implement (Argus), but all needs to be deployed and used as well way to feed CA policy information to Argus decision engine is needed i.e., a “PIP” in AUthZ lingo speak, or it will not scale, but this is planned For service-specific authorization systems an inventory is needed Evolving the EGI Trust Fabric - Bari 2015

LCMAPS example implementation # Example VO-CA-AP-file, please adapt according to requirements # First the VOMS entries /pvier "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth",\ file:TERENAeSciencePersonalCA.info, \ file:TERENAeSciencePersonalCA-3.info /dteam file:policy-igtf-mics.info,file:policy-igtf-classic.info For each VO (FQAN), list the set of acceptable CAs and (IGTF) Assurance Profiles Relying parties can easily add their own bundles (in info files) Under control of the resource centres – who have to take the risks For Argus Read “CA” and “Profile” information in a Policy Information Point The decision in the Argus policy is then a simple “AND” of VO+CA/AP Evolving the EGI Trust Fabric - Bari 2015

A Generic (CERN or EGI) IOTA CA But this software is not there quite yet Needs at least Argus (and a PIP) Deployment Ubiquitous adoption Meanwhile, we do want to experiment with FedAuth in production Solution: implement the VO requirements in the IOTA CA, making it a special IOTA CA scoped to VOs that do their own tracing Accept that special CA in the infra with specific policy controls Which wLCG in this case can safely do because it satisfies the requirements and the policy (also EGI’s) already allows for exceptions And it’s deployed only as needed – so now only for wLCG Evolving the EGI Trust Fabric - Bari 2015

‘Twee geloven op één kussen, daar slaapt de duivel tussen’* * old Dutch saying: two religions sleeping on one cushion? The Devil sleeps in between! Can you combine two policies within the same infrastructure? Can been done if new policy does not negatively affect the other one Which in this case is OK, since the specific new CERN IOTA CA In itself implements all the policy requirements of a traditional CA by insisting on LHC membership the same requirement that already governs the Classic CERN CA But note that is does not generally hold for arbitrary IOTA CAs Have to wait for “VO+CA-authZ” before adding e.g. InCommon Basic Technically it is a relatively easy change Evolving the EGI Trust Fabric - Bari 2015

Dependencies in policy installation For EGI-only sites: nothing changes! For EGI sites also under wLCG policy and installed post-EGEE: just install both policy packages “egi-core” and “lcg” lcg-CA ca-policy-egi-core IGTF Classic ca-AEGIS … IGTF MICS ca-TCS IGTF SLCS ca-DFN-AAI ca-policy-lcg IGTF Classic ca-AEGIS … IGTF MICS ca-TCS IGTF SLCS ca-DFN-AAI ca-CERN-LCG-IOTA Evolving the EGI Trust Fabric - Bari 2015

Changes to the trust fabric EGI sites continue installing the egi-core whilst preparing for a future of differentiated assurance wLCG sites (also the EGI ones) also install the wlcg policy Net result is that the EGI+wLCG sites add one CA: the special, circumscribed, CERN LHC IOTA CA This does not compromise the integrity of the trust fabric at any site, since the VO (actually CERN) takes care of traceability through additional policy constraints “WLCG-CERN-IOTA-statement-MB-20151028” http://www.nikhef.nl/grid/tmp/WLCG-CERN-IOTA-statement-MB-20151028.pdf Evolving the EGI Trust Fabric - Bari 2015

Document on the Agenda Page Read it: it contains specific safeguards that are essential This does not open a door to arbitrary IOTA CAs: this cannot be done since we want to support loose collaborations – until we get VO+CA decision support in all middleware foreseen in Argus&there in LCMAPS, needs bit more development should also be deployed and honoured at all EGI sites But does open the way to innovative use of FedAuth and many new use cases – including support for federated research and scholarship! For EGI-only sites: nothing changes … yet For EGI+wLCG sites: install the “ca-policy-lcg” package in addition to “ca-policy-egi-core” when so requested Both packages are contained in both yum/apt repositories - so it does not matter whether you use the EGI or LCG repository Evolving the EGI Trust Fabric - Bari 2015

… and join the AARC session on Thursday!