Authentication and Authorisation for Research and Collaboration

Slides:



Advertisements
Similar presentations
Lousy Introduction into SWITCHaai
Advertisements

EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
AARC Overview Licia Florio, David Groep 21 Jan 2015 presented by David Groep, Nikhef.
CTO My SelfStudy Application Overview Sep 25, 2005.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Openid Connect
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
Technical Break-out group What are the biggest issues form past projects – need for education about standards and technologies to get everyone on the same.
Test your IdP
Authentication and Authorisation for Research and Collaboration David Kelsey AARC AHM Milan And mechanisms NA3 Task 4 – Scalable.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Report and plans Attribute.
Authentication and Authorisation for Research and Collaboration Michał Jankowski, Maciej Brzeźniak AARC General Meeting, Milan.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Current status and plans.
Shibboleth & Grid Integration STFC and University of Oxford (and University of Manchester)
EUDAT receives funding from the European Union's Horizon 2020 programme - DG CONNECT e-Infrastructures. Contract No B2ACCESS LSDMA.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
Networks ∙ Services ∙ People Thomas Bärecke Journée Fédération, Paris Collaboration européenne GÉANT SA5 03/07/2015 SA5 T5 team
b2access.eudat.eu B2ACCESS The simple and secure authorisation and authentication platform of EUDAT This work is licensed under the Creative.
European Grid Initiative AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
B2access.eudat.eu B2ACCESS User Training How to register with B2ACCESS Version 1 February 2016 This work is licensed under the Creative Commons.
Networks ∙ Services ∙ People Licia Florio TNC, Lisbon Consuming identities across e- Infrastructures 16 June 2015 PDO GÈANT.
Authentication and Authorisation for Research and Collaboration Peter Solagna, Davide Vaghetti, et al. Topics for PY2 activities.
Authentication and Authorisation for Research and Collaboration Michał Jankowski, Maciej Brzeźniak AARC General Meeting, Utrecht.
International Planetary Data Alliance Registry Project Update September 16, 2011.
Authentication and Authorisation for Research and Collaboration Peter Solagna, Nicolas EGI AAI integration experiences AARC Project.
Authentication and Authorisation for Research and Collaboration AARC/CORBEL Workshop for Life Sciences AAI AARC Draft Blueprint.
Authentication and Authorisation for Research and Collaboration Marcus Hardt AARC AHM, Milan Current Status of Non Web (via LDAP.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
Security in the wider world David Kelsey (STFC-RAL) GridPP37 – Ambleside 2 Sep 2016.
Introduction to AAI Services
The EGI AAI “CheckIn” Service
WLCG Update Hannah Short, CERN Computer Security.
RCauth.eu CILogon-like service in EGI and the EOSC
EGI Updates Check-in Matthew Viljoen – EGI Foundation
Federation made simple
User Community Driven Development in Trust and Identity
Identity Federations - Overview
Data and Applications Security Developments and Directions
Cryptography and Network Security
SaaS Application Deep Dive
Christos Kanellopoulos
CheckIn: the AAI platform for EGI
AAI Alignment Nicolas Liampotis (based on the work of Mikael Linden)
Check-in Nicolas Liampotis
Updates on Training Andrea Biancini (AARC2.AHM)2 NA2 WP leader
CDISC SHARE API v1.0 CAC Update 22 February 2018
NAAS 2.0 Features and Enhancements
OIDC Federation for Infrastructures
Pilots in AARC Arnout Terpstra (AARC2) / Paul van Dijk (AARC1)
AARC Blueprint Architecture and Pilots
Common Authentication and Authorisation Service for Life Science Research Mikael Linden, ELIXIR Finland.
Office 365 Identity Management
OIDC Federation for Infrastructures
AARC2 JRA1 Update Nicolas Liampotis
AAI Architectures – current and future
RCauth.eu CILogon-like service in EGI and the EOSC
SharePoint Online Authentication Patterns
Single Sign-On (SSO) Authentication
Community AAI with Check-In
NHS Identity Authentication fit for modern health and social care
JRA1: Integrated AAI Developments
D Guidance 26-Jun: Would like to see a refresh of this title slide
eIDAS-enabled Student Mobility
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
LifeWatch AARC Pilot Fernando Aguilar 13th FIM4R Workshop
Presentation transcript:

OIDC Fed – Use cases from the relying parties: EGI Check-in & EUDAT B2ACCESS Authentication and Authorisation for Research and Collaboration Nicolas Liampotis JRA1 Integrated AAI Developments/EGI Check-in GRNET Shiraz Memon EUDAT B2ACCESS JSC 42nd EUGridPMA meeting/Prague, CZ 22 Jan 2018

EGI Check-in / EUDAT B2ACCESS Overview Check-in / B2ACCESS: Multi-protocol identity and access management solutions: Developed in close collaboration with the AARC project in order to implement the recommendations of the AARC Blueprint Architecture and Policy Framework Registered in eduGAIN in order to make connected services available to +2,000 universities and research institutes with little or no administrative overhead Allow the use of OIDC as alternative to SAML2 for integrating services: To support modern web standards (REST and JSON) To enable federated access for non- browser based resources, such as CLI tools and APIs

EGI Check-in / EUDAT B2ACCESS OIDC Client Registration and Management Three alternative means of OIDC client registration Approval-based client registration via email Approval-based client registration via registration Form Automatic client registration via registration form Only for testing/development environment!

EGI Check-in / EUDAT B2ACCESS Approval-based client registration via email OIDC Client Operators send an email containing a registration request to the OP Administrators The request contains redirect/return URI and purpose of the application OP Administrators review the client details and either register or reject the registration request The OP Administrators send encrypted email reply containing client credentials and OIDC metadata information

EGI Check-in / EUDAT B2ACCESS Approval-based client registration via registration form OIDC Client Operators fill in registration form accessible via the OP web site The form requires redirect/return URI, purpose of the application, username, password (client id/secret credentials), and other optional information OP Administrators approve/reject the registration request and Client Operators receive an email notification

Only for testing/devel environment! EGI Check-in / EUDAT B2ACCESS Automatic client registration via registration form OIDC client operators fill in registration form accessible via the OP web site The form requires redirect/return URI, purpose of the application, username, password (the client credentials), and other optional information The client is registered automatically and operators receive an email notification Only for testing/devel environment!

EGI Check-in / EUDAT B2ACCESS In a nutshell OP adopt different approaches depending on the deployment environment: Testing/Development: Automatic registration Production: Approval-based registration Problem: Automatic registration is not a trusted approach Approval-based approaches are trusted but cannot scale (administrators are contacted for every OIDC client registration request) Goal: “SCALABLE” and “TRUSTED” registration mechanism for OIDC clients Approach Trusted Scalable Approval-based ✔️ X Automatic OIDC Fed

nliam@grnet.gr