Web Service Security support in the SSE Toolbox

Slides:



Advertisements
Similar presentations
Fujitsu Laboratories of Europe © 2004 What is a (Grid) Resource? Dr. David Snelling Fujitsu Laboratories of Europe W3C TAG - Edinburgh September 20, 2005.
Advertisements

Web Service Ahmed Gamal Ahmed Nile University Bioinformatics Group
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Web Services and the Semantic Web: Open Discussion Session Diana Geangalau Ryan Layfield.
Peoplesoft: Building and Consuming Web Services
GFIPM Web Services Concept and Normative Standards GFIPM Delivery Team Meeting November 2011.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
SAML Conformance Sub-Group Report Face-to-face meeting August 29, 2001 Bob Griffin.
1 © Talend 2014 Service Registry / WS-Policy Registry Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
SWITCHaai Team Introduction to Shibboleth.
THE GITB TESTING FRAMEWORK Jacques Durand, Fujitsu America | December 1, 2011 GITB |
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
SAML Right Here, Right Now Hal Lockhart September 25, 2012.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
SAML 2.0: Federation Models, Use-Cases and Standards Roadmap
Web Services Based on SOA: Concepts, Technology, Design by Thomas Erl MIS 181.9: Service Oriented Architecture 2 nd Semester,
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
17 March 2008 © 2008 The University of Edinburgh, European Microsoft Innovation Center and University of Southampton IT Innovation Centre 1 NextGRID Security.
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
Secure Systems Research Group - FAU Patterns for Web Services Security Standards Presented by Keiko Hashizume.
Shibboleth: An Introduction
Technical Break-out group What are the biggest issues form past projects – need for education about standards and technologies to get everyone on the same.
XML Meta Documents Security Based on Extended Provisional Authorization.
1 Registry Services Overview J. Steven Hughes (Deputy Chair) Principal Computer Scientist NASA/JPL 17 December 2015.
ΕΚΤ Access to Knowledge ΕΚΤ Access to Knowledge CERIF API: Access and reuse research information in CRIS Dimitris Karaiskos Vasilis Bonis, Nikos Pougounias.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
HMA Sep 2009 – Slide 1 Daniele Marchionni Elsag Datamat HMA Follow On – Task 4 - Workplan.
ESRIN, 15 December 2009 Slide 1 Web Service Security in HMA-T HMA-T Final Presentation 14 December 2009 S. Gianfranceschi, Intecs.
Teleconference, 22 October 2008 SPS Mandatory I/F Development Slide 1 HMA SPS Mandatory I/F Development HMA-T Phase 2 Progress Meeting 26 Nov 2008, by.
28 May 2010 HMA-FO Task 2: Feasibility Analysis Service HMA Follow On Activities Task 2: Feasibility Analysis Service (Sensor Planning Service) Monthly.
Slide’s title Subtitle (if there is one) Date and location Speakers:Name and Last Name.
ESRIN, 15 July 2009 Slide 1 Web Service Security support in the SSE Toolbox HMA-T Phase 2 AR Meeting 15 July 2009 S. Gianfranceschi, Intecs.
Hoeilaart, 19 February 2009 Slide 1 CITE tests for and HMA-T Phase 2 Progress Meeting 19 February 2009, Hoeilaart Nicolas Lesage, IGN.
HMA-T Progress Meeting 26 November 2008 Slide 1 IMAA-CNR activity report HMA-T Progress Meeting 26 November 2008 S. Nativi, E. Boldrini, F. Papeschi IMAA-CNR.
Presented by : Piero Milani ( InfoCamere - Italy)Piero Milani InfoCamere - Italy VCD Signature & VCD Verification strategy as seen by InfoCamere ( WP1.
Spacebel - Hoeilaart, February 2009 SPS Mandatory I/F Development Slide 1 HMA SPS Mandatory I/F Development HMA-T Phase 2 Acceptance Review 1 18.
ESRIN, 15 July 2009 Slide 1 Web Service Security support in the SSE Toolbox HMA-T Phase 2 FP 14 December 2009 S. Gianfranceschi, Intecs.
Security Chapter – Architecture & Focus on Authorization PDP Cyril Dangerville (TS), Chapter Architect, Authorization PDP GE owner 7 July 2016.
HMA-T User Management (07-118) Abstract Test Suite Dr Andrew Woolf STFC Rutherford Appleton Lab.
Frascati, 2-3 July 2008 Slide 1 User Management compliance testing for G-POD HMA-T Phase 2 KO Meeting 2-3 July 2008, Frascati Andrew Woolf, STFC Rutherford.
Frascati, 2-3 July 2008 SPS Mandatory I/F Development Slide 1 HMA SPS Mandatory I/F Development HMA-T Phase 2 KO Meeting 2-3 July 2008, Frascati Ricardo.
HMA-S Project User Management for EO Services OGC r9
Access Policy - Federation March 23, 2016
OASIS Digital Signature Services and ETSI standards Juan Carlos Cruellas – UPC Stefan Drees - DSS-X co-chair Nick Pope – Thales.
HMA Identity Management Status
CEN 202 “Space Standardisation”
HMA AWG Configuration Management Status 1 December 2008
OGSA-WG Basic Profile Session #1 Security
Sabri Kızanlık Ural Emekçi
HMA Identity Management Status
The GEMBus Architecture and Core Components
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
HMA SPS Mandatory I/F Development
Identity Management in ESA Grid on-Demand Infrastructure
Service-centric Software Engineering
HMA-Testbed Phase 2 AR-2 Meeting July 2009, Frascati
CSSSPEC6 SOFTWARE DEVELOPMENT WITH QUALITY ASSURANCE
Tim Bornholtz Director of Technology Services
HMA Follow On Task 4 - Order Final Presentation 21 June 2011
Ordering Services for EO Products Abstract Test Suite (ATS)
HMA Follow-on Kickoff Meeting
OGC and activities HMA-T Phase 2 KO Meeting
Data Transport Standard (DTS)
Web Service Security support in the SSE Toolbox
QoS Metadata Status 106th OGC Technical Committee Orléans, France
Presentation transcript:

Web Service Security support in the SSE Toolbox HMA-T Phase 2 CDR Meeting 18-19 February 2009 S. Gianfranceschi, Intecs Slide 1

Agenda Introduction Work performed Toolbox Security Architectural Overview ATS and ATP Overview Work planned Schedule Open discussion Slide 2

Agenda Introduction Work performed Toolbox Security Architectural Overview ATS and ATP Overview Work planned Schedule Open discussion Slide 3 3

Introduction The Toolbox is a framework which facilitate the integration of web services in the HMA infrastructure. The component that will be provided in this project is finalized of providing WS-Security at Ground Segment level, enabling existing GS to wrap and connect their own catalogues to the HMA infrastructure. Both internal (deployed on the Toolbox) and external (gateway) services can be secured with this extension. Slide 4

HMA Infrastructure high-level diagram Slide 5

Agenda Introduction Work performed Toolbox Security Architectural Overview ATS and ATP Overview Work planned Schedule Open discussion Slide 6 6

Work Performed Upgrade of the prototype for the security layer Integration of the prototype in the Toolbox (started) Architectural Design Document: first release Development of sample XACML policy files for EbRim EO profile interfaces. Requirement Document: new release ATS and ATP: first release Slide 7

Requirements RID Description Action Requirement document: new version available (HMAT-SRD-1200-INT_1.1) New/update requirements from RIDs: RID Description Action YC-59 “Would be highly desirable that also SOAP 1.1 is supported via a configuration parameter as SOAP 1.1 is the current EODAIL baseline.” Requirement HMAT-RB-INT- 010 updated accordingly (chapter 3.3, pag. 19) YC-61 Regarding SAML token attributes: “the Toolbox should support a configurable list instead of this Fixed list; as the list in 07-118 is only indicative…". Requirement HMAT-RB-INT- 120 modified accordingly (chapter 3.3, pag. 21)

Agenda Introduction Work performed Toolbox Security Architecture Overview ATS and ATP Overview Work planned Schedule Open discussion Slide 9 9

Application Security Layer Toolbox Architecture WS-Policy WS-Security Layer SOAP layer Application layer XACML Policy Application Security Layer Service Gateway Operation Operation Asynchronous Operation Synchronous Operation Asynchronous Operation Synchronous Operation

Toolbox Security Architecture Axis2 as basic SOAP engine Axis2 module Rampart (Apache Software Foundation) for WS-Security layer: its behaviour has been extended to cover the HMAT security requirements (HMAT- SRD-1200-INT_1.1) ToolboxSecurityWrapper: Axis2 service with link to the Policy Enforcement Point (PEP, Application Security Layer) and Toolbox Application Layer Axis2 ToolboxPEP ToolboxSecurityWrapper (Axis2 service) SOAP XACML Policies Service Description RAMPART 4HMAT Toolbox Application Layer WS-Policy

Toolbox Security Architecture: Main Activities Allocation Security Layer 1 2 Verify client signature, decryption of SAML token WS-Security signed-encrypted SOAP request 3 Enforce enterprise policies Toolbox Serve request (Application layer) 4 5 Fault Soap response verify SAML token SAML attributes 6 Get SAML assertion Identity Provider Client ToolboxPEP RAMPART 4HMAT WS-Policy XACML Policies Slide 12

Toolbox Security Architecture A more formal model:

Toolbox Security Wrapper: Service Description Axis2 Responsabilities: deploys ToolboxSecurityWrapper into Axis2, holds the list of the wrapped services to be secured, for each wrapped service, holds the WS-Security policy, Its artifact is the service.xml file of the Axis2 ToolboxSecurity deployment located at: ToolboxSecurityWrapper (Axis2 service) RAMPART 4HMAT Service Description Service Configuration WS-Policy <TOMCAT_ROOT>/webapps/Axis2/Web-INF/services/ToolboxSecurityWrapper/META-INF/services.xml

Service Description: an Example Wrapped Service Wrapper service SOAP action WS-Security policy

Toolbox Security Architecture: ToolboxPEP ToolboxPEP: invoked by the ToolboxSecurityWrapper when WS-Security check is successful; enforces XACML policies check XACML policies are stored in dedicated XML files Each policy owns information about the wrapped service and SOAP action for which the policy applies Owns a list of policy rules; each rule can refer SAML token and/or SOAP (body) attributes values. ToolboxPEP XACML Policies

XACML example for EO EbRim profile (1/3) The target wrapped service for which this policy applies: wrs (Web Registry Service)

XACML example for EOLI (2/3) If an owned condition evaluates to true than the effect of the rule is “deny” The target of this rule: commercial client SAML attribute reference Condition about the collection

XACML example for EO EbRim profile (3/3) SOAP action for registry update

Agenda Introduction Work performed Toolbox Security Architecture Overview ATS and ATP Overview Work planned Schedule Open discussion Slide 20 20

TEST PLAN Test Plan is made up of 2 main building block: Abstract Test Suite for OGC 07-118r1 (ATS in brief) Acceptance Test Plan for Toolbox Security Layer specific aspects ATS delivered as a separate document A unique ATS, merging multiple contributions, shall be defined The ATS format and structure harmonized at the OGC level The ATS has to be “instantiated” in an ETS (Executable Test Suite) ATP “complements” ATS E.g. non functional requirements, SW/HW specific aspects. Slide 21 21

ATS - 1 ATS addresses conformance tests The aim is to check that a service/product fulfills the clauses of an OGC Implementation Specification HMA-T services are tested against OGC 07-118r1 “clauses” covering authentication and authorization interfaces for EO products ATS is usually structured according to class levels Mandatory elements are at the bottom conformance class level Classes shall be defined at the specification level, otherwise a unique core conformance class with all clauses is assumed For OGC 07-118 a unique conformance core class is defined Slide 22 22

ATS - 2 ATS main aspects: ATS proposed structure: Authentication capabilities provided by Identity Providers Authorization aspects enforced by Service Providers ATS proposed structure: Module 1 for clauses addressing common protocols/specifications used Module 2 for authentication conformance tests Module 3 for authorization conformance tests Slide 23 23

ATS – Module 1 ATS Module 1 Tests for Module 1 encryption issues: Support for SOAP/HTTP or SOAP/HTTPS SOAP version 1.2 in OGC 0.0.2 -> 1.1 in new spec. Support for SAML token Embedded in WS-Security elements in SOAP header Covering GMES minimum profile Support for encryption/hashing AES-128 encryption algorithm and SHA-1 hash algorithm for signature Tests for Module 1 encryption issues: SAML Token encrypted with public key of the Federating Entity SAML Token contents cannot be accessed without private key Slide 24 24

ATS – Module 1 Suggestion 1: inspect the wsdl to check support of security features WSDL should be extended with WS-policy description (in line with OASIS policy) Not applicable for checking SAML support of minimum profile Suggestion 2: test session with the IdP Self-generate a couple of key for testing Invasive: both Identity Provider and Service Provider (sharing private key) are involved Slide 25 25

ATS – Module 2 ATS Module 2 Tests for ATS Module 2 issues Support for authentication requests Explicit designated IdP Federating entity External entity No IdP designated Federating entity plays as the IdP External entity plays as IdP Tests for ATS Module 2 issues As in Module 1 Being related to Identity Provider capabilities, the Toolbox Security Layer ETS will not address this Module Slide 26 26

ATS – Module 3 ATS Module 3 ATS Module 3 issues Support for authorization requests Synchronous mode Asynchronous mode ATS Module 3 issues Asynchronous behavior depends on the specific implementation service Authorization failures still need to be defined Slide 27 27

STS The ATP covers also the following scenarios Scenario TS_1 Configuration of WS-Security policy Configuration of XACML policy Scenario TS_2 Protocol bindings not covered in OGC 07-118r1 v0.0.2 Future issues of the document: ETS for data and definition of actual test cases covered by ATS Input data for remaining ATP test cases Slide 28 28

Agenda Introduction Work performed Toolbox Security Architectural Overview Work planned Schedule Open discussion Slide 29 29

Work planned Architectural Design Document: final version Toolbox integration finalization Manage asynchronous response: from OGC 07-118 “ the response has to be signed” ATS and ATP finalization ETS preparation Test Slide 30

Agenda Introduction Work performed Toolbox Security Architectural Overview Work planned Schedule Open discussion Slide 31 31

Schedule

Agenda Introduction Work performed Toolbox Security Architectural Overview Work planned Schedule Open discussion Slide 33 33

SOAP Support in the TEAM Engine HMA-T Phase 2 CDR Meeting 18-19 February 2009 S. Gianfranceschi, Intecs Slide 34

TEAM Engine story First version in July available on the ERGO WIKI pages Based on AXIS SOAP client No access to the SOAP and HTTP level Discussion with OGC in September A new structure of the tag has been agreed A prototype compliant with the new tag structure has been done No feedback from OGC New contacts with the OGC in February No work on SOAP support has been done by OGC Major changes have been done on the TEAM Engine by OGC to cope with performances. A synchronization is needed Slide 35

TEAM Engine A new prototype for the Team Engine has been developed New tag sysntax No specific SOAP client Allow access to the HTTP layer New SOAP parser The work done have to be aligned with the current version of the TEAM Engine (available only on SVN, Team2 branch). Slide 36

OLD structure <soap-request Required The SOAP request instruction returnType=”XML|SOAP”> Define the structure of the return XML message. If SOAP, the complete SOAP message is returned (including the SOAP tags). If XML, the content of the SOAP body is returned. <url>URL</url> Requested web resource <soapaction>soapaction </ soapaction > SOAP action for the request. It has to be compliant with the end point WSDL description. <body>XML </body> Body for the SOAP Request. It has to be compliant with the end point WSDL description. <parser/> Optional Parser instruction needed to validate the content of the SOAP message. If not provided the tag returns directly the content of the SOAP message without validation. </request> Slide 37

NEW Structure <soap-request Required The SOAP request instruction version="1.1|1.2"> Define SOAP version to be used. In the current implementation only 1.1 is supported. <url>URL</url> Requested web resource <soapaction>soapaction</ soapaction > Optional SOAP action for the request. It has to be compliant with the end point WSDL description. If not provided an empty Sopa Action will be used. <headers> Header for the SOAP request. <element/> Elements to be included in the SOAP Header < headers /> <body>XML </body> Body for the SOAP Request. It has to be compliant with the end point WSDL description. <parser/> Parser instruction needed to validate the content of the SOAP message. If not provided the tag returns directly the content of the SOAP message without validation. </request> Slide 38

OLD example <soap-request returnType="XML"> <url><xsl:value-of select="$GetRecordsURL"/></url> <soapaction>GetRecords</soapaction> <body> <csw:GetRecords> ... </csw:GetRecords> </body> <ctlp:SOAPXMLValidatingParser ignoreErrors="true" ignoreWarnings="true" xmlns:ctlp="http://www.occamlab.com/te/parsers"/> </soap-request> Slide 39

NEW Example <soap-request version="1.1"> <url><xsl:value-of select="$GetRecordsURL"/></url> <soapaction>GetRecords</soapaction> <body> <csw:GetRecords> ... </csw:GetRecords> </body> <parsers:SOAPParser return="body"> <parsers:XMLValidatingParser> <parsers:schemas> <parsers:schema type="url">http://www.oasis-open.org/committees/regrep/documents/3.0/schema/rim.xsd</parsers:schema> </parsers:schemas> </parsers:XMLValidatingParser> </parsers:SOAPParser> </soap-request> Slide 40