O. Otenko PERMIS Project Salford University © 2002

Slides:



Advertisements
Similar presentations
Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
Advertisements

Eduserv Athens Federations David Orrell Eduserv Athens Technical Architect.
FAME-PERMIS Project University of Manchester University of Kent London, July 2006.
ASPiS - Architecture for a Shibboleth-Protected iRODS System Mark Hedges, Tobias Blanke Centre for e-Research, Kings College London Adil Hasan, Jens Jensen.
Donkey Project Introduction and ideas around February 21, 2003 Yuri Demchenko.
Report on Attribute Certificates By Ganesh Godavari.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
TF-EMC2 February 2006, Zagreb Deploying Authorization Mechanisms for Federated Services in the EDUROAM Architecture (DAME) -Technical Project Proposal-
DGC Paris Community Authorization Service (CAS) and EDG Presentation by the Globus CAS team & Peter Kunszt, WP2.
EDINA 20 th March 2008 EDINA Geo/Grid - Security Prof. Richard O. Sinnott Technical Director, National e-Science Centre University of Glasgow, Scotland.
Wednesday, June 03, 2015 © 2001 TrueTrust Ltd1 PERMIS PMI David Chadwick.
The EC PERMIS Project David Chadwick
Using Digital Credentials On The World-Wide Web M. Winslett.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
1 July 2005© 2005 University of Kent1 Seamless Integration of PERMIS and Shibboleth – Development of a Flexible PERMIS Authorisation Module for Shibboleth.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Authorization Scenarios with Signet RL “Bob” Morgan University of Washington Internet2 Member Meeting, September 2004.
A PERMIS-based Authorization Solution between Portlets and Back-end Web Services Hao Yin 1, Sofia Brenes-Barahona 2, Donald F. McMullen * 2, Marlon Pierce.
Digital Object Architecture
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
1 Emergency Alerts as RSS Feeds with Interdomain Authorization Filippo Gioachin 1, Ravinder Shankesi 1, Michael J. May 1,2, Carl A. Gunter 1, Wook Shin.
Attribute Certificate By Ganesh Godavari. Talk About An Internet Attribute Certificate for Authorization -- RFC 3281.
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Supporting further and higher education The Akenti Authorisation System Alan Robiette, JISC Development Group.
Portal-based Access to Advanced Security Infrastructures John Watt UK e-Science All Hands Meeting September 11 th 2008.
JISC Middleware Security Workshop 20/10/05© 2005 University of Kent.1 The PERMIS Authorisation Infrastructure David Chadwick
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Oxford University e-Science Centre 1 Managing Access 4 Dec Managing Access to Resources on the Grid 4 December 2002.
OGF22 25 th February 2008 OGF22 Demo Slides Prof. Richard O. Sinnott Technical Director, National e-Science Centre University of Glasgow, Scotland
Delegation of Authority David Chadwick
CSIIR Workshop March 14-15, Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth.
Connect. Communicate. Collaborate AAI scenario: How AutoBAHN system will use the eduGAIN federation for Authentication and Authorization Simon Muyal,
GridShib and PERMIS Integration: Adding Policy driven Role-Based Access Control to Attribute-Based Authorisation in Grids Globus Toolkit is an open source.
SecPAL Presented by Daniel Pechulis CS5204 – Operating Systems1.
PAPI: Simple and Ubiquitous Access to Internet Information Services JISC/CNI Conference - Edinburgh, 27 June 2002.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
Dynamic Privilege Management Infrastructures Utilising Secure Attribute Exchange Dr John Watt Grid Developer, National e-Science Centre University of Glasgow.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
PAPI-PERMIS Integration Project Proposal David Chadwick
PAPI 2 Distributed trust model and AA interoperability.
Adding Distributed Trust Management to Shibboleth Srinivasan Iyer Sai Chaitanya.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
TAG Presentation 18th May 2004 Paul Butler
Presented By: Smriti Bhatt
Key management issues in PGP
ESign Aashutosh.
Chapter 14: System Protection
TAG Presentation 18th May 2004 Paul Butler
e-Infrastructure Workshop 28th March 2006, University of Leeds
Module 8: Securing Network Traffic by Using IPSec and Certificates
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Tweaking the Certificate Lifecycle for the UK eScience CA
Adding Distributed Trust Management to Shibboleth
Scott Cantor April 10, 2003 Shibboleth and PKI Scott Cantor April 10, 2003.
Update on EDG Security (VOMS)
Chapter 14: Protection.
Computer Science Department
NAAS 2.0 Features and Enhancements
Hao Yin1, Sofia Brenes-Barahona2, Donald F. McMullen
Materials Microcharacterization Collaboratory
Module 8: Securing Network Traffic by Using IPSec and Certificates
The JISC Core Middleware Call
National Trust Platform
Presentation transcript:

O. Otenko PERMIS Project Salford University © 2002 How-to: Authorise O. Otenko PERMIS Project Salford University © 2002 During the past two years I have been participating in the pan-European PERMIS project designing and developing authorisation modules. Now the project has finished. As the result the project under JISC to compare the Akenti and PERMIS authorisation systems has been started. It aims to evaluate the architectures of the two and do performance and manageability comparisons. As part of the research we have studied other systems to pin-point the most important design questions - the questions that have rigid solutions and affect the usability of the system. We will have a look at how existing systems are coping with them and how the solutions affect extensibility and flexibility. I am assuming the audience is familiar with the architectural concepts of the authorisation systems.

Key Issues Issuing Authorisation Tokens (who is the Issuer?) Extension and flexibility Distributing Authorisation Tokens (Push vs Pull) distribution = publicity - impersonation Looking at AuthZ from Server (who is protecting the Server?) Among the key design issues there are these three. It is important to decide who and how issues the authorisation tokens. The question is down to how the trust relationship is established between the verifier and the issuer of the privileges. Indeed, the question of establishing trust between all of the parts of the system is important, only that other parts of the system are bound in a pretty static way. Answering a chain of questions: “why do you trust the user? Because I trust the issuer.” “and why do you trust the issuer?..” It should always end with “because I trust me”. The chain in general can be quite long, but in fact there is hardly any delegation involved, so a lot more ways to do that are feasible. However, in long run not all of them are equally flexible and extensible. The tokens can be put in a publicly accessible places, which diminishes privacy. There are also questions of impersonation and what can be revealed to others. On the other hand the tokens can be given to the users directly, which causes its own set of problems. Finally, a very important point is what the decision mechanism is actually returning. This affects the complexity of the decision-enforcement modules.

Issuing AuthZ Tokens PAPI: authentication server (trusted) Client Name ? AuthZ Token PAPI: authentication server (trusted) Shibboleth: handle service (impersonation) CAS: server issues short-living PKCs IBM: CA issuing PKCs (can be configured) Akenti: CAs issuing proprietary ACs PERMIS: AAs issuing X.509 ACs In PAPI the tokens are issued by the authentication server. The server uploads the tokens to the user’s browser after successful authentication. Such approach works for impersonation of the holder and simplifies the decision-making module as we will see later. However, there are complications related to delegation and also there is a requirement for the Target to trust all the existing authentication servers to issue the authorisation tokens (which is a difficult case). In Shibboleth there is a simple PMI introduced with Attribute Authorities issuing the attributes to the users of the system. The Shibboleth developers applied main effort to ensure user privacy, so the certificates do not contain the holder name, only the digest of his PKC, nor does it contain the issuer name - so it should be cumbersome to extend the PMI without changing the policies of all the Targets that are intended to accept the attributes. The CAS server is acting like a CA to issue short-living PKCs with authorisation attributes as extensions. There is the same problem as in PAPI that the Targets should trust the policy of the CAS on issuing the certificates and requirement to update the rules on all the CAS servers when the policy changes. The IBM access control system can be configured to understand various infrastructures and certificate format, but by default it uses PKCs, like the CAS. It is questionable, if the PKCs should be used to contain the authorisation information. Akenti and PERMIS have infrastructures of authorities issuing ACs.

Token Distribution & Delegation Push revocation no software available delegator’s tokens Pull locating the tokens: naming privacy and impersonation (no delegation implemented anyway) controlling what is revealed The tokens can either be stored by the user and presented to the Target on request, or the Target would retrieve the user’s tokens on its own, knowing the user’s identity. The models are respectively called the Push and Pull models.

Token Acquisition Tokens acquired using PAPI Shibboleth CAS IBM Akenti PERMIS Push; tokens go as cookies Pull; WAYF service locates the server Push; token goes as the signing PKC Push; token goes as PKC in SSL (can pull) Pull; policy-specified servers Pull; configured servers (can be pushed)

Who is Protecting the Target? Client Name AuthZ engine ? PAPI: explicit ACL statement Shibboleth: attributes (Grant/Deny in DAC mode) CAS: attributes IBM: roles PERMIS: Grant/Deny Akenti: Grant/Deny This slide shows what is the output of the authorisation engines. The simpler the output, the more complicated the Target Access Control policy is. The more complicated the output is, the more work should be done on the part of the software integrating the engine into the Access Control system. The PAPI system sends just an ACL - very simple to implement, very difficult to control. The Shibboleth system does provide a policy to return simple answers Grant/Deny, but the policy is DAC, which implies difficulties in extension and managebility. It is possible to derive a more complicated decisions by intercepting the attributes the Shibboleth Handle Service returns, but this should be done by the integrating code. The CAS server just returns the attributes, so there is the same problem, as with Shibboleth. The IBM Access Control system returns the roles that are assigned correctly to the user, but the policy does not have the role specification, and it has to be implemented by the integrating code. The PERMIS and Akenti systems return a Grant/Deny reply, which is easy to enforce by the AEF. The policies are quite complicated and contain both role assignment rules and role specification.