Mix & Match: Resource Federation

Slides:



Advertisements
Similar presentations
Secure Single Sign-On Across Security Domains
Advertisements

Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
© 2012 IBM Corporation Architecture of Quantum Folsom Release Yong Sheng Gong ( 龚永生 ) gongysh #openstack-dev Quantum Core developer.
1 Security on OpenStack 11/7/2013 Brian Chong – Global Technology Strategist.
Securing Insecure Prabath Siriwardena, WSO2 Twitter
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Catania Science Gateway Framework Motivations, architecture, features Catania, 09/06/2014Riccardo Rotondo
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
First Look Clinic: What’s New for IT Professionals in Microsoft® SharePoint® Server 2013 Sayed Ali (MCTS, MCITP, MCT, MCSA, MCSE )
Survey of Identity Repository Security Models JSR 351, Sep 2012.
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper
Kelly Boccia Abi Natarajan Konstantin Livitski Senthil Anand Subbanan Meyyappan 1.
1 Emergency Alerts as RSS Feeds with Interdomain Authorization Filippo Gioachin 1, Ravinder Shankesi 1, Michael J. May 1,2, Carl A. Gunter 1, Wook Shin.
Summit Held in Hong Kong, 1 st time in Asia –Beijing is the city with the most OpenStack developers Attendance 3,500 up from 3,000 in Portland –45% APAC,
10.1 Silberschatz, Galvin and Gagne ©2005 Operating System Principles 10.4 File System Mounting A file system must be mounted before it can be accessed.
ArcGIS Server for Administrators
2 OpenStack Design Summit Summary Swiss and Rhone Alpes - OpenStack User Group Meeting 6 th December, CERN Belmiro Moreira
Communicating Security Assertions over the GridFTP Control Channel Rajkumar Kettimuthu 1,2, Liu Wantao 3,4, Frank Siebenlist 1,2 and Ian Foster 1,2,3 1.
MAT U M A T U Middleware Assisted Take-Up Service For JISC Funded Early Adopters.
Visual Studio Windows Azure Portal Rest APIs / PS Cmdlets US-North Central Region FC TOR PDU Servers TOR PDU Servers TOR PDU Servers TOR PDU.
Cloud federation Are we there yet? Marek Denis CERN openlab Major Review Geneva, Switzerland › October
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Report and plans Attribute.
PAPI: Simple and Ubiquitous Access to Internet Information Services JISC/CNI Conference - Edinburgh, 27 June 2002.
Opening Up OpenStack’s Identity Service David W Chadwick, Ioram S Sette, Kristy W Siu.
CoprHD and OpenStack Ideas for future.
REST By: Vishwanath Vineet.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Ian Collier, STFC, Romain Wartel, CERN Maintaining Traceability in an Evolving Distributed Computing Environment Introduction Security.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
OGF 43, Washington 26 March FELIX background information Authorization NSI Proposed solution Summary.
Authentication and Authorisation for Research and Collaboration Peter Solagna, Nicolas EGI AAI integration experiences AARC Project.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Building Azure Mobile Apps
Course: Cluster, grid and cloud computing systems Course author: Prof
Secure Single Sign-On Across Security Domains
Security on OpenStack 11/7/2013
Stop Those Prying Eyes Getting to Your Data
Multi-VIM/Cloud High Level Architecture
Federation made simple
Section 6 Object Storage Gateway (RADOS-GW)
OPEN-O Multiple VIM Driver Project Use Cases
Using OpenStack to Measure OpenStack Cinder Performance
Principles of Computer Security
Identity Federations - Overview
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Ops Manager API, Puppet and OpenStack – Fully automated orchestration from scratch! MongoDB World 2016.
SCD Cloud at STFC By Alexander Dibbo.
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Windows Azure AppFabric
OpenStack Ani Bicaku 18/04/ © (SG)² Konsortium.
Multisite BP and OpenStack Kingbird Discussion
Multi-VIM/Cloud High Level Architecture
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
The pub-sub channels based push service…..
NAAS 2.0 Features and Enhancements
KMIP Entity Object and Client Registration
Searchlight Lei Zhang Search service for OpenStack
SAMANVITHA RAMAYANAM 18TH FEBRUARY 2010 CPE 691
Community AAI with Check-In
Building Serverless Enterprise Applications
Groups and Permissions
敦群數位科技有限公司(vanGene Digital Inc.) 游家德(Jade Yu.)
Western Mass Microsoft Technology Users Group
Harrison Howell CSCE 824 Dr. Farkas
eIDAS-enabled Student Mobility
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
Presentation transcript:

Mix & Match: Resource Federation Kristi Nikolla Massachusetts Open Cloud

The Massachusetts Open Cloud Multiple Landlords: BU, MIT, Northeastern, Harvard, UMass Universities want to administer their own hardware Each university has their own auth framework, and will not trust a centralized Keystone So they will want to set up OpenStack themselves Open Cloud eXchange Competing service providers standing up services in their own OpenStack deployments Users can combine resources from different service providers: “mix and match”

Resource Federation Allow OpenStack services to consume resources from services in other OpenStack deployments Resources are volumes, images, snapshots, etc. Resource Federation is the first step towards OCX

Challenges Preserving API and user experience Combine information from multiple providers Uniquely qualifying resources Authentication and authorization Security Scalability Performance And we had to solve some challenges, both on an architectural and implementation level. Preserving the API to preserve compatibility with Horizon and other clients, and still being able to combine information from multiple providers and allow users to perform targeted actions. An auth framework that crossed the OpenStack boundaries, without compromising security, but enhancing it. And do all of this in a scalable way without degrading performance. That’s a lot of challenges, so let’s go through them.

Combining information: Meta-Projects Every resource is owned by a project Projects are mapped with each other to form a meta-project User is presented with combined view of all resources in meta-project Project: BigDataResearchCollab project@ Boston University project@ Northeastern University project@ MIT volume1 volume2 volume1 img1

Uniquely Qualifying Resources Everything in OpenStack is identifying by a UUID UUIDs are unique, even across multiple service providers We didn’t need to change the API to uniquely qualify the target resource We can combine without naming conflicts

$ openstack volume list ID Volume Name Service Provider 3294C96D...831DBCCB1F73 volume1 Northeastern University AFB5236E...768B8BF5801C volume2 890DD196...C017D93E1AA3 MIT Project: BigDataResearchCollab Boston University project@ Boston University project@ Northeastern University project@ MIT vm1 volume1 volume2 volume1 img1

$ openstack server add volume vm1 3294C96D...831DBCCB1F73 Project: BigDataResearchCollab project@ Boston University project@ Northeastern University project@ MIT vm1 volume1 volume2 volume1 img1

Northeastern University Crossing boundaries Boston University Northeastern University Keystone Keystone Nova Cinder mixmatch (Proxy)

Authentication and Authorization Keystone-to-Keystone federation SAML2 assertion contains user attributes Keystone maps roles on projects based on those attributes We exploit this to implement the meta-project Northeastern University Boston University Keystone Keystone

Northeastern University Boston University Northeastern University Keystone Keystone Nova Cinder mixmatch (Proxy)

Northeastern University Keystone Boston University Cinder Keystone where? MIT Nova Keystone mixmatch (Proxy) Cinder

How It Works Every request in OpenStack is done through the REST API Resource UUID are a predictably located part of the URL Proxy analyzes URL for UUID Call Action GET w/o UUID Aggregate GET w UUID Find resource PUT/PATH w UUID DELETE w UUID POST Be more explicit? Header API to the proxy from the client

Finding Resources Search by broadcasting →GET volume1 ←404 Not Found Search by broadcasting Proxy will query service providers until it finds the resource with the requested ID. Does not scale to many SPs BU NU →GET volume1 ←200 OK MIT volume1

Performance Improvements Cache Tokens Local Token → Service Provider, Project ID, Remote Project Cache Resource Mappings in DB after finding resources Ideally, proxy should already know the location...

Finding Resources (part 2) MIT Listen to notifications, and store in DB More scalable, requires more trust volume1 created in project mixmatch Agent Boston University Cinder mixmatch (Proxy) AMQP DB volume1

Data plane No performance degradation in data plane iSCSI Ceph/RBD Just works™ Credentials for the volume are passed in API calls, so no more access is granted than needed. Ceph/RBD Works, however... All compute nodes must have all Ceph authentication keys This requires a high amount of trust between service providers We’re working with the Ceph developers to address these issues

Beyond Open Cloud eXchange Adding experimental services to a production cloud Partial upgrade of cloud services—standing up multiple versions at once Defense in depth—limiting scope of a security breach As a user of an open-cloud exchange… As a cloud administrator, even if you don’t use the OCX model, you might want to

Future Work Deploying in production Security More granular permission model for Ceph/RBD Limit information exposed from proxy agent Federation of networks across service providers Testing cross-attach with other Cinder backends Benchmarking the API overhead Becoming an official OpenStack project Check us out! http://info.massopencloud.org/blog/mixmatch-federation https://github.com/openstack/mixmatch