Combined Assurance Model

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MyProxy and EGEE Ludek Matyska and Daniel.
Advertisements

Appropriate Access InCommon Identity Assurance Profiles David L. Wasley Campus Architecture and Middleware Planning workshop February 2008.
Functional component terminology - thoughts C. Tilton.
David Groep Nikhef Amsterdam PDP & Grid Evolving Assurance – IGTF LoA generalisation David Groep Interoperable Global Trust Federation IGTF Documents at.
INFSO-RI Enabling Grids for E-sciencE Update on LCG/EGEE Security Policy and Procedures David Kelsey, CCLRC/RAL, UK
INFSO-RI Enabling Grids for E-sciencE JRA3 2 nd EU Review Input David Groep NIKHEF.
Instructions and forms
National Smartcard Project Work Package 8 – Security Issues Report.
Functional Model Workstream 1: Functional Element Development.
Trust and Security for FIM (Sirtfi/SCI) David Kelsey (STFC-RAL) FIM4R at CERN 4 Feb 2015.
IOTA Questions for RPs Sept 9, 2013 Bucharest, Romania.
LiveAP Towards Differentiated Identity Assurance David Groep, Nikhef supported by the Netherlands e-Infrastructure SURFsara, and EGI.eu O-E-15 and EGI-InSPIRE.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
+1 (801) Standards for Registration Practices Statements IGTF Considerations.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
ITU-T X.1254 | ISO/IEC An Overview of the Entity Authentication Assurance Framework.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Profile for Portal-based Credential Services (POCS) Yoshio Tanaka International Grid Trust Federation APGrid PMA AIST.
EResearchers Requirements the IGTF model of interoperable global trust and with a view towards FIM4R AAI Workshop Presenter: David Groep, Nikhef.
IOTA Questions for RPs Sept 9, 2013 Bucharest, Romania.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Security Policy Update David Kelsey UK HEP Sysman, RAL 1 Jul 2011.
IOTA AP Towards Differentiated Identity Assurance David Groep, Nikhef supported by the Netherlands e-Infrastructure and SURFsara.
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
EGI-InSPIRE RI EGI EGI-InSPIRE RI Establishing Identity in EGI the authentication trust fabric of the IGTF and EUGridPMA.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
Summary of Poznan EUGridPMA32 September EUGridPMA Poznan 2014 meeting – 2 David Groep – Welcome back at PSNC.
News from EUGridPMA EGI OMB, 22 Jan 2013 David Kelsey (STFC) Using notes from David Groep 22/01/20131EUGridPMA News.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Soapbox (S-Series) Certificate Validation Jens Jensen, STFC.
PRACE user authentication and vetting Vincent RIBAILLIER, 29 th EUGridPMA meeting, Bucharest, September 9 th, 2013.
Security Policy Update WLCG GDB CERN, 11 June 2008 David Kelsey STFC/RAL
IGTF Generalised Assurance comments by federation operators with a SAML background September 19-21, 2016 CERN, Geneva, CH.
Security Incident Response Trust Framework for Federated Identity (Sir-T-Fi) David Kelsey (STFC-RAL) REFEDS, Indianapolis 26 Oct 2014.
Building Trust for Research and Collaboration
Accountability & Structured Privacy Management
David Kelsey STFC-RAL 4th WISE workshop, Nikhef 27 March 2017
RCauth.eu CILogon-like service in EGI and the EOSC
Cross-sector and user-centric AAI
AARC Update What’s been happening in AARC which matters for GÉANT
David Kelsey STFC-RAL 2nd WISE workshop, XSEDE16, Miami 18 July 2016
AAI Alignment Nicolas Liampotis (based on the work of Mikael Linden)
Service Organization Control (SOC)
Tweaking the Certificate Lifecycle for the UK eScience CA
Frameworks for harmonized policies and practices
Policy in harmony: our best practice
Draft ETSI TS Annex C Presented by Michał Tabor for PSD2 Workshop
Assessing Combined Assurance
Assessing Combined Assurance
Leveraging the IGTF authentication fabric for research
Updated (VO) Community Security Policies
Update - Security Policies
AARC Blueprint Architecture and Pilots
Supporting communities with harmonized policy
EUGridPMA Status and Current Trends and some IGTF topics March 2018 APGridPMA ISGC Meeting David Groep, Nikhef & EUGridPMA.
OIDC Federation for Infrastructures
AARC2 JRA1 Update Nicolas Liampotis
RCauth.eu CILogon-like service in EGI and the EOSC
David Kelsey (STFC-RAL)
Operationalizing Export Certification and Regionalization Programmes
David Groep for the entire AARC Policy Team AARC2 AHM4 meeting
Appropriate Access InCommon Identity Assurance Profiles
WEQ-012 PKI Overview March 19, 2019
Neopay Practical Guides #2 PSD2 (Should I be worried?)
REFEDS Assurance WG REFEDS meeting 16 June 2019
Federated Incident Response
REFEDS Assurance Suite
Presentation transcript:

Combined Assurance Model David Kelsey AARC2 Community Engagement/Policy and Best Practice Harmonisation STFC – UK Research and Innovation IGTF All Hands Meeting, ISGC2019, Taipei 1 April 2019

Outline Quick reminder on Assurance in R&E Federated Identity Management IGTF Assurance - Relying Party - EGI policy Combined Assurance Assessment/accreditation A use case – LIGO Next steps

Reminder: Assurance in R&E Federated Identity

IGTF Assurance Profiles https://www.igtf.net/ap/authn-assurance/

End-entity, subscriber and user identity validation IOTA/DOGWOOD Profile End-entity, subscriber and user identity validation Credentials issued must be bound to an act of identity vetting. Authorities are only required to collect the data that are necessary for fulfilling the uniqueness requirements. Credentials issued by authorities under this LoA are not required to provide sufficient information to independently trace individual subscribers. Traceability of the credential is provided only in a cooperative way jointly with other parties that provide other elements of identity-related data. Credentials issued by authorities operating under this LoA should be used primarily in conjunction with vetting and authentication data collected by the relying parties or service providers. Validation of the credential application establishes the permanent binding between the end- entity, the owner, and the subject name. The authority must describe how it can reasonably verify identity information and trace this information back to a physical person (or for non- human credentials to a named group) at the time of credential issuance.

REFEDS Assurance Framework https://refeds.org/assurance To manage risks related to the access control of their services, the Relying Parties of the research and education federations need to make decisions on how much to trust the assertions made by the Identity Providers and their back-end Credential Service Providers (CSP) This framework splits assurance into the following orthogonal components: the identifier uniqueness; the identity assurance; the attribute assurance Assurance profile Cappuccino for low-risk research use cases ($PREFIX$/profile/cappuccino) Assurance profile Espresso for use cases requiring verified identity ($PREFIX$/profile/espresso) The assurance of authentication is not covered by this specification Single Factor Authentication https://refeds.org/profile/sfa requirements that an authentication event must meet in order to communicate the usage of SFA Multi Factor Authentication https://refeds.org/profile/mfa at least two of something you know, something you have, something you are, something you do  

REFEDS Identity proofing and credential issuance, renewal and replacement Value Description $PREFIX$/IAP/low Identity proofing and credential issuance, renewal, and replacement qualify to any of sections 5.1.2-5.1.2.9 and section 5.1.3 of Kantara assurance level 1 [Kantara SAC] IGTF level DOGWOOD [IGTF] IGTF level ASPEN [IGTF] Example: self-asserted identity together with verified e-mail address, following sections sections 5.1.2-5.1.2.9 and section 5.1.3 of [Kantara SAC]. $PREFIX$/IAP/medium sections 5.2.2-5.2.2.9, section 5.2.2.12 and section 5.2.3 of Kantara assurance level 2 [Kantara SAC] IGTF level BIRCH [IGTF] IGTF level CEDAR [IGTF] section 2.1.2, section 2.2.2 and section 2.2.4 of eIDAS assurance level low [eIDAS LoA] Example: the person has sent a copy of their government issued photo-ID to the CSP and the CSP has had a remote live video conversation with them, as defined by [IGTF].

Kantara & eIDAS Kantara Initiative https://kantarainitiative.org/confluence/display/LC/Identity+Assurance+Framework Four Assurance Levels 1- Little or no confidence in the asserted identity’s validity 2 - Some confidence in the asserted identity’s validity 3 - High confidence in the asserted identity’s validity 4 - Very high confidence in the asserted identity’s validity eIDAS http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ:JOL_2015_235_R_0002 Regulation (EU) 2015/1502 of 8 September 2015 on setting out minimum technical specifications and procedures for assurance levels for electronic identification means pursuant to Article 8(3) of Regulation (EU) No 910/2014 of the European Parliament and of the Council on electronic identification and trust services for electronic transactions in the internal market 

Mapping Assurance Frameworks to each other (Ian Neilson & D Groep) AARC-I050 Comparison Guide to Identity Assurance Mappings for Infrastructures Read this document carefully to fully understand all (“breadcrumbs” & “grains of rice” get lost along the way!) https://wiki.geant.org/download/attachments/114935014/AARC-I050- ComparisonGuidetoAssuranceMapping.pdf

IGTF Assurance Relying Party (EGI) policy

EGI Policy - Policy on Acceptable Authentication Assurance https://documents.egi.eu/document/2930 Authentication and identification is considered adequate if the combined assurance level provided by the Issuing Authority, the e-Infrastructure registration service, and the VO registration service, for each User authorised to access Services, meets or exceeds the requirements of the following approved IGTF authentication assurance profiles: a) IGTF Assurance Profile ASPEN (urn:oid:1.2.840.113612.5.2.5.1) b) IGTF Assurance Profile BIRCH (urn:oid:1.2.840.113612.5.2.5.2) c) IGTF Assurance Profile CEDAR (urn:oid:1.2.840.113612.5.2.5.3) Unless either the VO or e-infrastructure registration service can demonstrate that - for the Users it authorises to use Services - it meets one of the approved assurance profiles, the IGTF accredited issuing authority MUST provide this level of assurance.

Combined Assurance - assessment

Combined assurance – policy/procedure – Are we seeking IGTF approval? https://wiki.egi.eu/wiki/SPG:Drafts:Assessment_Community_IDvetting_adequacy Authentication and identification is considered adequate, for each User authorised to access Services, if the combined assurance level provided by the end-user credential issuing authority, and either the e-Infrastructure registration service and/or the Community registration service, meets or exceeds the requirements of the approved IGTF authentication assurance profiles [AAP]. This is conventionally assured through a vetting process during user credential issuance at their identity provider. The Community or e-Infrastructure wishing to prove the adequacy of its identity vetting, in order to use its members' credentials in conjunction with the IGTF Assurance Profile DOGWOOD, and substantiate their compliance with the Snctfi membership management requirements, must submit a request for assessment by the designated Security Policy Groups (SPG) by way of Infrastructure Operations.

Combined Assurance (2) The request shall include the following information: a statement of their compliance with the Community Membership Management Policy a statement of their compliance with the Community Operations Security Policy a documented description of the membership life cycle process and practices meeting the requirements of the IGTF BIRCH, CEDAR (or ASPEN) assurance level, in which the credential of the user is the membership registration data and community-issued assertions the Issuing Authority is the collection of membership management and assertion-issuing systems and services the credential life time corresponds to the renewal periods as defined in the Community Membership Management Policy a description of the method of binding between the membership information and the DOGWOOD user credential (identifier)

Combined Assurance (3) Based on this information, the SPG shall advise the Infrastructure Operations with respect to suitability of the Community or e-Infrastructure for such combined adequacy in accordance with the Policy on Acceptable Authentication Assurance. The SPG may make available an evaluation matrix. Applicant communities are welcome to use the assurance evaluation matrix to prepare the requisite documents, bearing in mind the evaluation Method and the Persistent registry (community membership) implementation and assessment hints. The most relevant community assurance profiles for the joint adequacy purpose are BIRCH and CEDAR. Registries and membership services at ASPEN level are strongly discouraged. The credential (registration) life time of 11 days necessitates re- registering members with this frequency, and re-validating their eligibility. This model is likely to both confuse and upset members. 

Evaluation/Assessment spreadsheet AssuranceAssessment-v04-20190124 Show spreadsheet and discuss?

A use case - LIGO

LIGO – request for assessment of combined assurance 19 March 2019 (email to David Groep) > When enabling the use of /cvmfs/ligo.osgstorage.org at NIKHEF we came across an issue, as you are aware, that many LIGO users get their user certificates from CILogon Basic CA, and at first cvmfs on the NIKHEF worker nodes rejected them.  The problem has been solved at NIKHEF, but I am still concerned about the bigger issue of access to this repository at more sites throughout Europe and I want to discuss with you about how to solve that problem. Response from DavidG included: Since LIGO as of yet had not requested assessment for the combined assurance model under EGI, they are not (at Nikhef, nor anywhere else AFAIK) in the set of whitelisted communities for the combined assurance model. The 'ca-policy-egi-cam' trust anchors add, on top of the core set: ca_RCauth-Pilot-ICA-G1 ca_cilogon-basic ca_CERN-LCG-IOTA-CA which are equivalent in terms of their assurance level

LIGO (2) Jim B: once LIGO has written down the membership vetting process - actually the LSC members in the LIGO VO all qualify already for a higher assurance level for their identity. All vetted members meet the REFEDS "Cappuccino" assurance level, which is equivalent in vetting to the IGTF BIRCH level. And - by going through the LIGO proxy on CILogon itself - they all qualify for CILogon Silver! In that way, all LSC users in LIGO immediately get back to the old trust level they had from the OSC CA, but now through the federated mechanism. Draft of membership vetting now been provided – EGI SPG analysis can soon start

Next steps Work with LIGO on assessment of their request to be trusted As a result of this work, may need to Modify assessment methods/spreadsheet Review policy/procedure for Assurance assessment Who owns the Combined Assurance Assessment Policy/procedure? Role of IGTF?

David.Kelsey@stfc.ac.uk