Materials Microcharacterization Collaboratory

Slides:



Advertisements
Similar presentations
Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
MMC Security Issues James A. Rome Oak Ridge National Laboratory
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Materials Microcharacterization Collaboratory Security and Instrument Safety James A. Rome ORNL.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Grid Security. Typical Grid Scenario Users Resources.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Kerberos and PKI Cooperation Daniel Kouřil, Luděk Matyska, Michal Procházka Masaryk University AFS & Kerberos Best Practices Workshop 2006.
Citrix ® Secure Gateway Phil Montgomery Senior Product Manager Citrix Products and Services October 2001.
Abdelilah Essiari Gary Hoo Keith Jackson William Johnston Srilekha Mudumbai Mary Thompson Akenti - Certificate-based Access Control for Widely Distributed.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Using Digital Credentials On The World-Wide Web M. Winslett.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Philadelphia Area SharePoint User Group Building Customer/Partner Extranets Designing a Secure Extranet with Sharepoint 2007 Russ Basiura RJB Technical.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Module 9: Fundamentals of Securing Network Communication.
Single Sign-On across Web Services Ernest Artiaga CERN - OpenLab Security Workshop – April 2004.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Adding Distributed Trust Management to Shibboleth Srinivasan Iyer Sai Chaitanya.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Key management issues in PGP
Secure Connected Infrastructure
Grid Computing Security Mechanisms: the state-of-the-art
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Apache web server Quick overview.
SSL Certificates for Secure Websites
Grid Security.
Cryptography and Network Security
Information Security message M one-way hash fingerprint f = H(M)
Modernizing your Remote Access
Authentication.
Radius, LDAP, Radius used in Authenticating Users
CSCE 715: Network Systems Security
Authentication Applications
Certificates An increasingly popular form of authentication
Module 8: Securing Network Traffic by Using IPSec and Certificates
Public Key Infrastructure (PKI)
Adding Distributed Trust Management to Shibboleth
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Message Digest Cryptographic checksum One-way function Relevance
NAAS 2.0 Features and Enhancements
Building Systems That Flexibly Control Downloaded Executable Content
Cyber Security Authentication Methods
Goals Introduce the Windows Server 2003 family of operating systems
PLUG-N-HARVEST ID: H2020-EU
Public Key Infrastructure from the Most Trusted Name in e-Security
Information Security message M one-way hash fingerprint f = H(M)
O. Otenko PERMIS Project Salford University © 2002
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Lecture 4 - Cryptography
Certificates An increasingly popular form of authentication
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
CLASP Project AAI Workshop, Nov 2000 Denise Heagerty, CERN
Module 8: Securing Network Traffic by Using IPSec and Certificates
AAA: A Survey and a Policy- Based Architecture and Framework
Kerberos and X.509 Fourth Edition by William Stallings
Certificates An increasingly popular form of authentication
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

Materials Microcharacterization Collaboratory Security and Instrument Safety James A. Rome ORNL

Aspects of security Site protection Strong user authentication Fine-grained authorization Data integrity Disclosure protection via encryption Instrumentation control protocols Inter-site communication

MMC security challenges Diversity of platforms at facilities and at users Broad, diverse user group Some proprietary information Inability to require users to install lots of security HW/SW, especially if it isn’t free Multiple security venues: Online instrument operation and control Data analysis and archiving Video conferencing

Basic site protection We think that most resources should be behind a firewall provided that it is Transparent enough to not “get in the way” Fast enough to handle the throughput Cheap enough to be affordable The Checkpoint Firewall-1 meets these requirements $2995 for 25 users (behind the firewall) 40 Mbps throughput

Harmonization Because of the diversity of our sites and users, we propose to use Web-based remote access and Web-based remote applications wherever possible. SSL provides encryption Small user learning curve Coming ability to use client public key as the basis for all user interactions Many of the MMC facilities are already online with a large base of users.

Quick and dirty solutions We need to get things up and running ASAP because the “nice” solutions will take some time to implement. Several sites use Timbuktu (encrypted tunnels) General control of the stage and focus of a microscope are straightforward and can be harmonized behind a Web interface Site-specific features may have to be “out of band” for a while

Scale of the collaboratory The scalability of security solutions is always an issue. The MMC will have no more than a few hundred users Can handle certificates and authorizations manually if necessary The researchers are generally “trustworthy” folks No need for big revocation lists

Authentication Many excellent authentication schemes exist, but most are not available on all platforms Smart cards and tokens Kerberos and ssh X.509 certificates Biometrics One-time passwords (S-key)

MMC authentication Our solution is to use SSL client certificates This public key is his identity for the MMC The MMC will issue and sign the certificates Entrust WebCA handles this for $1/certificate Downloaded to the user’s web browser online In Netscape 4.0 these certificates and the corresponding keys can be extracted and used for other purposes S/MIME for secure E-mail

Authentication conclusions The client certificate scheme has numerous advantages Platform independent Cheap User friendly — not even a uid/pwd to type Can be used as the basis for other authorization But, The user must protect his keys and Browser

Authorization Traditionally, enforced by file access restrictions. File access controls alone are not flexible enough for the MMC File access controls may be good enough for protecting data Fine-grained authorizations require authorization certificates

Authorization scenario To use an online facility, we need proof that The user has received (and passed) training A reservation has been made for a time slot A payment may be required Additional information is required about the user Is the work proprietary? Is the user a student, staff, or researcher? What site resources does the user need? These have nothing to do with file access controls

SPKI Certificates Rather than binding a public key to an identity, what is really wanted is to bind a public key to an action or authorization. This is the goal of SPKI (simple public key infrastructure). http://www.clark.net/pub/cme/spki-reqts.html http://www.clark.net/pub/cme/html/spki.txt http://theory.lcs.mit.edu/~rivest/publications.html

SPKI certificates have 5 parts ISSUER: The public key of the issuing party both as a name for the issuer and a means to verify the certificate SUBJECT: The public key receiving authority via this certificate AUTHORITY: The specific authorization(s) delegated by this certificate (may be delegated to another subject) VALIDITY: At least an expiration date, but perhaps also a means of online verification (such as a URL) SIGNATURE: Signature of the issuer (and optionally) the subject to accept the authority granted) “<issuer> says that <subject> has attribute <auth>”

SPKI trust model If a verifier is principal “Self”, then the only 5-tuple he or she can trust is of the form <Self, X, *, A, V> where X is the subject asking to be trusted A is the authority to be granted V includes the present time I.e., you are the only authority you can really trust to issue a certificate.

<Issuer, Subject, Delegation, Authority, Validity> 5-tuple reduction Ignoring the signature field, a SPKI certificate can be represented as a 5-tuple: <Issuer, Subject, Delegation, Authority, Validity> I can delegate the issuing authority to you: <me, you, D1, A1, V1> + <you, your_user, D2, A2, V2> = <me, your_user, 0, A, V> where D1 >D2 A = intersection (A1,A2) V = intersection (V1,V2)

PolicyMaker Sometimes, credentials don’t grant the exact <auth> needed, A. Instead, one has a policy which, in effect, accepts <auth>s A1,A2,A3 to be used instead of A. PolicyMaker (ftp://research.att.com/dist/mab/policymaker.ps) allows the formulation of these more complicated (non-intersection) policies. Example: you might need authorization from 3 out of 5 Vice Presidents to obtain authorization for a check of $300,000.

MMC authorization certificates We propose to use SPKI certificates to instantiate the bindings between a user’s public key (from his browser client certificate) and each authorization. LBNL (Larsen has agreed to provide a certificate engine for us to use by the end of this FY) We propose to store the certificates as Cookies on the user’s Web browser We will create policy engines to combine multiple input certificates into single device certificates

Implementation — Year One Put sites behind firewall to stop most Internet-based attacks Implement and issue the SSL2 Client certificates Survey the sites to determine their needs Implement secure Web servers to provide encrypted access to researcher’s E-notebooks Obtain authority certificates from LBNL

Implementation — Year Two Required SPKI certificates must be determined and created A certificate acquisition process must be created and implemented What certificates does a user need? Where are they obtained? PolicyMaker engines created, integrated, tested Pilot deployment at a few sites

Implementation — Year Three Deploy the infrastructure across the MMC Provide cross-realm delegation (if desired) Implement SPKI security for data analysis tools Fix problems as they arise