What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual.

Slides:



Advertisements
Similar presentations
1 Copyright © 2002 Pearson Education, Inc.. 2 Chapter 2 Getting Started.
Advertisements

Distributed Systems Architectures
Chapter 7 System Models.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Lousy Introduction into SWITCHaai
Authorisation Models for National Scale Services Alan Robiette Joint Information Systems Committee
The Basics of Federated Identity. Overview of Federated Identity and Grids Workshop Session 1 - for all Basics and GridShib Session 2 – more for developers.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination. Introduction to the Business.
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
PKI Solutions: Buy vs. Build David Wasley, U. California (ret.) Jim Jokl, U. Virginia Nick Davis, U. Wisconsin.
May 06, 2002 Getting Started with Digital Certificates: Is PKI-Lite Real PKI? Internet2 Spring Meeting 2002 Wash, DC.
Configuration management
25 July, 2014 Hailiang Mei, TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei Remote Terminal Management.
31242/32549 Advanced Internet Programming Advanced Java Programming
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 12 View Design and Integration.
PSSA Preparation.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
ICDL 2004, New Delhi1 Access Management for Digital Libraries in a well-connected World John Paschoud SECURe Project London School of Economics Library.
Welcome Acknowledgments and thanks Security Acronymny: then and now What’s working What’s proving hard.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Shibboleth Update a.k.a. “shibble-ware”
InCommon Policy Conference April Uses  In order to encourage and facilitate legal music programs, a number of universities have contracted with.
Welcome to CAMP Identity Management Integration Workshop Ann West NMI-EDIT EDUCAUSE/Internet2.
EDUCAUSE PKI Working Group Where Are We and Where are We Going.
Project Shibboleth Update, Demonstration and Discussion Michael R Gettes Duke University (on behalf of the entire shib team!!!) June.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 Shibboleth Pilot Local Authentication.
1 The Partnership Challenge Higher education’s missions are realized in increasingly global, collaborative, online relationships –Higher educations’ digital.
7 October 2015 Shibboleth. Agenda  Shibboleth Background and Status  Why is Shibboleth Important (to Higher Ed)?  Current Pilots Course Management.
R & Ethinking Trust Ken Klingenstein, custodian, InCommon and the CREN CAt.
Of Security, Privacy, and Trust. Security Personal security is largely distinct from network security (modulo VPN’s and authentication to the network)
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
David L. Wasley Office of the President University of California Shibboleth Safe delivery of reliable authorization data David L. Wasley University of.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Shibboleth A Federated Approach to Authentication and Authorization Fed/Ed PKI Meeting June 16, 2004.
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
Rethinking Privacy As Bob Blakley says, “It’s not about privacy, it’s about discretion.” Passive privacy - The current approach. A user passes identity.
Federations 101 John Krienke Internet2 Fall 2006 Internet2 Member Meeting.
Shibboleth Update Advanced CAMP 7/31/02 RL “Bob” Morgan, Washington Steven Carmody, Brown Scott Cantor, Ohio State Marlena Erdos, IBM/Tivoli Michael Gettes,
Shibboleth A word which was made the criterion by which to distinguish the Ephraimites from the Gileadites. The Ephraimites, not being able to pronounce.
Internet2 Middleware Initiative Shibboleth Ren é e Shuey Systems Engineer I Academic Services & Emerging Technologies The Pennsylvania State University.
US of A and A Activities Ken Klingenstein, Director Internet2 Middleware Initiative.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 NMI R3 Enterprise Directory Components.
Shibboleth: Status and Pilots. The Golden Age of Plywood.
Project Shibboleth Update, Demonstration and Discussion Michael Gettes May 20, 2003 TERENA Conference, Zagreb, Croatia Michael Gettes.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
Shibboleth A word which was made the criterion by which to distinguish the Ephraimites from the Gileadites. The Ephraimites, not being able to pronounce.
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
Fundamentals: Security, Privacy, Trust. Scenarios we’d like to see... Use of licensed library materials regardless of student’s location Signed .
Shibboleth Trust Model Shibboleth/SAML Communities (aka Federated Administrations) Club Shib Club Shib Application process Policy decision points at the.
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
Shibboleth: Overview and Status The Shibboleth Architecture Team.
Day 3 Roadmap and PKI Update. When do we get to go home? Report from the BoFs CAMP assessment, next steps PKI technical update Break Research Issues in.
Welcome to Base CAMP: Enterprise Directory Deployment Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein This.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
Shibboleth Update January, 2001 Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder.
InCommon® for Collaboration Institute for Computer Policy and Law May 2005 Renee Shuey Penn State Andrea Beesing Cornell David Wasley Internet 2.
Shibboleth for Middle Schools James Burger -
01 October 2001 “...By Any Other Name…”. Consequences and Truths (Ken) The Pieces and the Processes (Bob) Directories (Keith) Shibboleth and SAML (Scott)
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Mark Luker, EDUCAUSE Copyright Mark Luker, This work is the intellectual.
Federated Identity Management at Virginia Tech
John O’Keefe Director of Academic Technology & Network Services
Michael R Gettes, Duke University On behalf of the shib project team
Open Source Web Initial Sign-On Packages
Shibboleth Deployment Overview
Shibboleth: Status and Pilots
Shibboleth and Federations
Presentation transcript:

What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Base CAMP - February 5-7, Overview Grids – next generation distributed computing, data and instrumentation environments Shibboleth – inter-institutional web services and enriched middleware architecture PKI – encryption and authentication tools

Base CAMP - February 5-7, A Map of Middleware Land

Base CAMP - February 5-7, Grid Basics Complex software environments for the sharing of cycles, storage, remote instrumentation, etc. The more general the software, the more that is left to the reader…

Base CAMP - February 5-7, Facts about Grids There are many distributed computing and resources sharing environments besides Grids. Much big science and medicine will be based on Grids Grids come in many flavors Global Grid Forum attempts to coordinate flavors Among the flavors, there is a predominant strain –Developed out of ISI, Argone, etc by Kesselman, Foster, et al –Current instantiation is Globus Toolkit 2.0 (part of NMI) –Next generation is Open Grid Services Architecture (OGSA)

Base CAMP - February 5-7, More facts about Grids Grids are stand-alones, tending not to recognize firewalls, enterprise services, usability requirements, privacy, politics of resource sharing, etc. Two distinct types of Grids are emerging –Intragrids – users on the outside access an internal grid that supplies cycles, storage, etc transparently –Intergrids – a shared mesh of resources among autonomous enterprises

Base CAMP - February 5-7, Globus and OGSA John McGee – ISI

Base CAMP - February 5-7, Shibboleth A word which was made the criterion by which to distinguish the Ephraimites from the Gileadites. The Ephraimites, not being able to pronounce sh, called the word sibboleth. See --Judges xii. Hence, the criterion, test, or watchword of a party; a party cry or pet phrase. - Webster's Revised Unabridged Dictionary (1913):Webster's Revised Unabridged Dictionary (1913)

Base CAMP - February 5-7, Stage 1 - Addressing Three Scenario’s Member of campus community accessing licensed resource –Anonymity required Member of a course accessing remotely controlled resource –Anonymity required Member of a workgroup accessing controlled resources –Controlled by unique identifiers (e.g. name) Taken individually, each of these situations can be solved in a variety of straightforward ways. Taken together, they present the challenge of meeting the user's reasonable expectations for protection of their personal privacy.

Base CAMP - February 5-7, Attribute-based authorization There is a spectrum of approaches available for attribute-based management of access to controlled resources, At one end is the attribute-based approach, where attributes are exchanged about a prospective user until the controlled resource has sufficient information to make a decision. This approach does not degrade privacy. At the other end is the identity-based approach, where the identity of a prospective user is passed to the controlled resource and is used to determine (perhaps with requests for additional attributes about the user) whether to permit access. Since this leads with identity, this approach requires the user to trust the target to protect privacy.

Base CAMP - February 5-7, Rethinking Privacy Passive privacy - The current approach. A user passes identity to the target, and then worries about the target’s privacy policy. To comply with privacy, targets have significant regulatory requirements. The user has no control, and no responsibility. And no one is happy... Active privacy - A new approach. A user (through their security domain) can release the attributes to the target that are appropriate and necessary. If the attributes are personally identifiable. If the attributes are personally identifiable, the user decides whether to release them. The user has control, along with commensurate responsibility. All parties are happy, maybe…

Base CAMP - February 5-7, Establishing a User Context

Base CAMP - February 5-7, Getting Attributes and Determining Access

Base CAMP - February 5-7, Milestones Project formation - Feb 2000 Stone Soup Process - began late summer 2000 with bi-weekly calls to develop scenario, requirements and architecture. Linkages to SAML established Dec 2000 Architecture and protocol completion - Aug 2001 Design - Oct 2001 Coding began - Nov 2001 Alpha-1 release – April 24, 2002 OpenSAML release – July 15, 2002 v0.7 Shibboleth released Nov 25, 2002 v0.8 March 1, 2003 v1.0 April 2003 v1.1 conversations ruminating; v1.2 may be the plateau

Base CAMP - February 5-7, Shibboleth and SAML SAML is specifying a format and a means to exchange authentication and authorization assertions Shibboleth builds a general purpose public infrastructure around SAML by –developing user-navigation services, –standards to manage the exchange of attributes, –standard sets of attributes to be exchanged, and –infrastructure and user tools to preserve and manage privacy. –supporting groups using a common policy model; a scaleable solution to common needs SAML is creating a middleware equivalent of an IP address. Shibboleth adds services equivalent to DNS, routing, etc, to create a middleware equivalent of the Internet.

Base CAMP - February 5-7, Code status v0.7 released November 2002 (note switch to numbering) (coding teams – MIT, Columbia, Ohio State, CMU) v0.7 much easier to install than alpha’s. C/C++ only on origin. Java still on target. Relatively safe to deploy and experiment Release issues – platform dependencies, fragile Apache components, binaries vs source, etc… v0.7 to v0.8 new features – ARP’s redone, added robustness timeframes – march 1, 2003 general release V0.8 to 1.0 – bug fixes and re-packaging only; due out before spring I2 member meeting

Base CAMP - February 5-7, Early Adopters WebCT Webassign National Digital Science Library EBSCO The Library pilot

Base CAMP - February 5-7, What is the library pilot? A dozen+ campuses working with 6 information vendors Using Shibboleth to control access to electronic resources Good test case for privacy requirements, trust model needs

Base CAMP - February 5-7, Project Goals Explore and Evaluate the utility of the Shibboleth model (attributes) for controlling access to licensed resources Identify problems and issues with this approach –How well do existing licenses map to attributes? –Library “walk-in” customers Identify and address Shib deploy issues for campuses AND for vendors Explore new possibilities

Base CAMP - February 5-7, Campus Participants Carnegie Mellon Columbia Dartmouth Georgetown London School of Economics New York Unv. Ohio State Penn State U. Colorado U. Michigan U. Washington U. Wisconsin - Madison UCOP (U. California System) U.Texas Health Science Center at Houston

Base CAMP - February 5-7, Vendor Participants EBSCO ~ Elsevier OCLC Sfx (Ex libris) JSTOR McGraw Hill eBooks Proquest

Base CAMP - February 5-7, Shibboleth Deployment Issues Access Issues Kiosks and walk-ins logins for on-campus use Licensing issues reconciling license structures with directory structures system and consortial issues mitigating disintermediation Functional issues handling Shibbed and non-Shibbed resources roll-out strategies entitlements vs attributes what attributes to pass how to structure the attribute name space

Base CAMP - February 5-7, Next steps Convergence with other efforts Shibboleth the architecture vs Shibboleth the web service Shibboleth the technology vs Club Shib the trust model Federated Digital Rights Management Federated P2P Privacy Management Systems – see Personal Information Managers – see

Base CAMP - February 5-7, Personal Resource Manager

Base CAMP - February 5-7, Privacy Management Systems

Base CAMP - February 5-7, PMS-2

Base CAMP - February 5-7, Long-term implications of Shib Interrealm basic exchanges of information for access control –The web service: Digital rights management –The architecture: Desktop video-conferencing –The trust model: Accelerating related technologies –Privacy –PKI

Base CAMP - February 5-7, Trust models Authenticate locally, act globally raises the fundamental question “Why should a remote target trust your remote authentication and attributes?” “Solutions” are global trust, federated trust, virtual organization, no need for formal trust…

Base CAMP - February 5-7, Key Trust Structures Hierarchies –may assert stronger or more formal trust –requires bridges and policy mappings to connect hierarchies –appear larger scale Federated administration –basic bilateral (origins and targets in web services) –complex bilateral (videoconferencing with external MCU’s, digital rights management with external rights holders) –multilateral Virtual organizations –Shared resources among a sparse, distributed set of users –Grids, virtual communities, some P2P applications –Want to leverage other trust structures above

Base CAMP - February 5-7, Federations A group of organizations (universities, corporations, content providers, etc.) who agree to exchange attributes using the SAML/Shibboleth/Liberty protocols. In doing so they agree to abide by common sets of rules. The required rules and functions could include: –A registry to process applications and administer operations –A set of best practices on associated technical issues, typically involving security and attribute management –A set of agreements or best practices on policies and business rules governing the exchange and use of attributes. –The set of attributes that are regularly exchanged (syntax and semantics). –A mechanism (WAYF) to identify a user’s security domains –Ways to federate and unfederate identities

Base CAMP - February 5-7, Federations in the last year Communicator Hub ID is one of the pioneering Liberty Alliance-based services on the market, supporting vertical-industry B2B offerings such as SecuritiesHub. SecuritiesHub, which is sponsored by eight leading Wall Street investment firms, including Credit Suisse First Boston, Goldman Sachs, JPMorgan, Lehman Brothers, Merrill Lynch, Morgan Stanley, Salomon Smith Barney and UBS Warburg. Liberty Alliance ( Federal e-Authentication Initiative ( Not much use of federated.NET Shibboleth and InCommon (

Base CAMP - February 5-7, Federating organizations organization (FOO) To explore the issues in federations, and multiple federations, and subclubs, and… Includes GM, Johnson and Johnson, Bechtel, Liberty, Microsoft, Fed e-AuthN Discussions just started... Friends of foo as an list to stay informed of the discussions

Base CAMP - February 5-7, Authorization Expressions of authorization x.509 attribute certs, SAML expressions, rights languages, policy languages, meta… Linking expressions to infrastructure middleware groups in directories registries attribute authorities securing the feeds Making decisions on authorization entitlements vs attributes – who decides within the apps decision points versus enforcement points

Base CAMP - February 5-7, PKI Didn’t it die? There is no substitute for many services that PKI can provide It is not a universal panacea It will continue to evolve until we get it right

Base CAMP - February 5-7, Uses for PKI Server side SSL certificates End-entity identity certs VPN certs for channel encryption Signed Attribute certs Signing enterprise SAML assertions

Base CAMP - February 5-7, Types of PKI Intrarealm –Primarily stand-alone –Classic corporate VPN/web-authn/secure shell Interrealm –Hierarchical –Bridged –Federated enterprise

Base CAMP - February 5-7, PKI deployments Intra-realm –A moderate percentage of large corps –A few uses at a few institutions: Texas/Houston – web authn, secure shell, signed Virginia - VPN MIT – web authn Inter-realm –Only public-sector activity, primarily government and higher ed

Base CAMP - February 5-7, Shibboleth and PKI Complementary technologies Technically: –Shibboleth leverages existing campus authentication processes (and can use end-entity certificates for this process) –Shibboleth uses PKI to implement a multi-domain trust model –Shibboleth’s primary use is for authorization and privacy –PKI’s primary use is establishing identity across domains –PKI can use Shibboleth to achieve privacy and authorization. Policy: –Shibboleth establishes a collaborative trust model (flexible, quick, privacy-enabled, etc.) –PKI establishes a legal trust model (binding, hierarchical, formal, etc.).

Base CAMP - February 5-7, Deploying A Campus PKI Establishing CA services –Out-source –In-source Getting a profile and a policy/practice doc Solving the annoying problems –Mobility –Operating system gotchas PKI-enabling applications

Base CAMP - February 5-7, PKI in the last year FPKI efforts and the FBCA The HEBCA The demise of CREN Sean Smith and his interesting research… faking security…macros and screen manipulation faking privacy…unlocking the cert store and playing Go Fish

Base CAMP - February 5-7, Current Interrealm Activities Federal Bridge Certificate Authority Higher Ed Bridge Certificate Authority

Base CAMP - February 5-7, Relating PKI to the federated approach Well, at one level, PKI identities should anchor federated activities. At a more operational level, federated activities need to either –Peer with PKI activities (at a bridge?) –Interact with other federated activities