August 2013 Introduction to Moonshot. Why Moonshot? Within education, there are a number of specialised federations: – UK federation - Access to web-based.

Slides:



Advertisements
Similar presentations
Secure Single Sign-On Across Security Domains
Advertisements

eduroam Delegate Authentication System with Shibboleth SSO
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
ABFAB for Internet-of-Things Rhys Smith, Janet Sam Hartman & Margaret Wasserman, Painless Security.
Josh Howlett Head, International Collaboration 22 May 2013 CEENGINE, Kiev Connecting research & education in the UK.
Federated Access to Grids Daniel Kouřil, Sam Hartman, Josh Hewlet, Jens Jensen, Michal Procházka EGI User Forum 2011.
Project Moonshot February Background Project Moonshot 2.
John Chapman, Janet Fall 2012 Internet 2 Member Meeting 3 October 2012 Trust me, I’m an engineer: Engineering trust using a Trust Router infrastructure.
Andrew Cormack Chief Regulatory Adviser, Access Management and Security WG.
May 2013 Janet Cloud Services SWIT3E –update. UK wide Cloud Services Framework – cloud and hybrid cloud services Sector agreements Microsoft/Google/Dropbox/Amazon-
Trust Router Overview IETF 86, Orlando, FL Trust Router Bar BOF Margaret Wasserman
John Littledale Service Lead Network Services Group Janet(UK) East Scotland.
Federated Identity Management for Researchers – A quick overview from GÉANT BoF TNC May 2014 Dublin.
Licia Florio EUNIS05, Manchester 1 Eduroam EUNIS Conference, June Licia Florio.
BYOD Security Maintaining a Secure Infrastructure Friday 15 th March 2013.
Moonshot for Federated Identity Jens Jensen, STFC Daniel Kouřil, CESNET EGI CF, April 2013.
Project Moonshot update TF-EMC2 & TF-MNM 14 & 16 February 2011.
Moonshot Workshop 14 th October Introduction to the Day Moonshot Workshop.
© Janet 2012 Project Moonshot Technology, use cases & pilot 17 January, 2012 Haka conference, Helsinki 1.
Key Negotiation Protocol & Trust Router draft-howlett-radsec-knp ABFAB, IETF March, Prague.
Infocard and Eduroam Enrique de la Hoz, Diego R. L ó pez, Antonio Garc í a, Samuel Mu ñ oz.
2006 © SWITCH Authentication and Authorization Infrastructures in e-Science (and the role of NRENs) Christoph Witzig SWITCH e-IRG, Helsinki, Oct 4, 2006.
Multihop Federations draft-mrw-abfab-multihop-fed-01.txt Margaret Wasserman
Copyright JNT Association 20051OptionalCopyright JNT Association 2007 Overview of the UK Access Management Federation Josh Howlett.
ABFAB Multihop Federations draft-mrw-abfab-multihop-fed-01.txt Margaret Wasserman
Multihop Federations & Trust Router draft-mrw-abfab-multihop-fed-02.txt draft-mrw-abfab-trust-router-01.txt Margaret Wasserman
Project Moonshot TF-MNM. Use cases Project Moonshot 2.
FIM-ig Federated Identity Management Interest Group.
EduRoam Australia Project Experience in location independent wireless networking with international collaboration with TERENA EduRoam Project 19 th APAN.
To identity federation and beyond! Josh Howlett JANET(UK) HEAnet 2008.
(From Radius Hierarchy to AAI) Miroslav Milinović University Computing Centre - Srce EuroCAMP Ljubljana, March 2006.
Copyright JNT Association 2005Copyright JNT Association An Introduction to Access Management and the UK Federation Simon Cooper.
Michal Procházka, Jan Oppolzer CESNET.
Introduction Moonshot workshop
Project Moonshot update ABFAB, IETF 80. About Moonshot Moonshot is implementing ABFAB Developer meeting, 24 March 2011 Testing event, 25 March 2011 A.
Connect. Communicate. Collaborate Federation Interoperability Made Possible By Design: eduGAIN Diego R. Lopez (RedIRIS)
Connect. Communicate. Collaborate The authN and authR infrastructure of perfSONAR MDM Ann Arbor, MI, September 2008.
Shibboleth & Grid Integration STFC and University of Oxford (and University of Manchester)
Federated Identity Management for HEP David Kelsey HEPiX, IHEP Beijing 18 Oct 2012.
Image © Viatour Luc ( Project Moonshot TNC 2010 Vilnius, 1 June 2010 Josh Howlett, JANET(UK)
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Authentication and Authorisation in eduroam Klaas Wierenga, AA Workshop TNC Lyngby, 20th May 2007.
Introduction & use-cases FedAuth IETF78 Maastricht, July 27, 2010
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
IETF 78 Maastricht 27 July 2010 Josh Howlett, JANET(UK)
Connect communicate collaborate Trust & Identity EC meets GÉANT 19 June 2014 Brussels Valter Nordh, NORDUnet Federation as a Service Task Leader Trust.
b2access.eudat.eu B2ACCESS The simple and secure authorisation and authentication platform of EUDAT This work is licensed under the Creative.
Federated Wireless Network Authentication Kevin Miller Duke University Internet2 Joint Techs Salt Lake City February, 2005.
1 Identities and Federation: The Next IT Wave (The Canadian Access Federation) Rick Bunt President The Canadian University Council of CIOs (CUCCIO)
Facing the challenge of relevance Erwin Bleumink 4 June 2013 TNC13.
Trust Router Overview IETF 86, Orlando, FL Routing Area Meeting Margaret Wasserman
Moonshot-enabled Federated Access to Cloud Infrastructure Terena Networking Conference, Reykjavik. May 2012 David Orrell, Eduserv.
INTRODUCTION TO IDENTITY FEDERATIONS Heather Flanagan, NSRC.
Project Moonshot Daniel Kouřil EGI Technical Forum
Jisc/Janet AIM Update Dr Rhys Smith May Agenda Where we are And where we’re going.
Designing Identity Federation Policy, the right way Marina Vermezović, Academic Network of Serbia TNC2013 conference 4 May 2013.
Non Web-based Identity Federations - Moonshot Daniel Kouril, Michal Prochazka, Marcel Poul ISGC 2015.
The Umbrella Project Authentication The minimum user information possible is stored centrally to avoid Data Protection issues. The Authentication is done.
CLASSe PROJECT: IMPROVING SSO IN THE CLOUD Alejandro Pérez Rafael Marín Gabriel López
THE CAMPUS IDENTITY SYSTEM Lucy Lynch, NSRC. Learning Objectives Discovering the key role campus networks play in trusted identities for R&E Authoritative.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
Federated Access to Storage EGI CF 2012 Luke Howard, Daniel Kouril, Michal Prochazka.
Introduction to AAI Services
Secure Single Sign-On Across Security Domains
Data and Applications Security Developments and Directions
European AFS & Kerberos Conference 2010
Federated Identity Management for Researchers (FIM4R)
ESA Single Sign On (SSO) and Federated Identity Management
Multi-Domain User Applications Research (JRA3)
Presentation transcript:

August 2013 Introduction to Moonshot

Why Moonshot? Within education, there are a number of specialised federations: – UK federation - Access to web-based resources – eduroam - International wireless roaming – edugain - Access to resources worldwide To build a single unified federation, we need a common interface, to allow us to federate anything and everything.

Federations: Why Federate? Costs can be reduced and shared Users take better care of a single, reusable credential Adding services is simple Offers enhanced privacy to users Access decisions can be delegated to the identity provider

Federations: Why Federate? The ATM doesn ’ t decide whether you get your money or not - that ’ s decided by your own bank The ATM doesn ’ t validate your PIN and card either - again, that ’ s checked by your own bank

ABFAB Application Bridging for Federated Access Beyond web

Interface: GSS GSS-API is used by Moonshot to interface between applications and the relying party. – GSS is not the only API supported here - SASL and SSPI work too!

Transport Credentials are transmitted from the end user to the RP using GSS - but how do the credentials then move credentials from the RP to the IdP?

Transport: RadSec RadSec is a security focused evolution of RADIUS - a proven technology that you could be using right now. Moonshot uses RadSec to transport credentials between a Relying Party and the Identity Provider.

Transport: RadSec eduroam has been operating using RADIUS for 10 years In the UK alone, there are currently 229 members Last month, the UK saw 200,000 unique devices, and handled almost 10,000,000 successful authentications 54 countries worldwide

Confidentiality One weakness that may be apparent is that credentials are sent to the RP - they could potentially alter them or worse, steal them.

Confidentiality: EAP EAP provides a standard to encapsulate credentials, and protect them from being read by anything but the IdP - even the RP. EAP also provides “ Channel Bindings ” - allowing the IdP to verify the user is connecting to the RP they think they are.

Rich Identity: SAML SAML provides a language to describe the properties a user might have - their role, address, or name for example. Moonshot supports SAML, allowing the IdP to give this information to the RP.

Moonshot Architecture 13 SSH clientSSH serverRADIUS server (2) SSH negotiation (3) Authentication (4) RADIUS (1) Credentialing (5) Attributes (6) SSH session OpenSSH used as example of application; many others also apply

Scaling Moonshot brings together a number of technologies: – GSS - a common interface between applications and services – RadSec - Secure AAA Transport – EAP - Protection for credentials – SAML - Rich identity information How can these technologies be scaled for use beyond a single institution?

Scaling: The Trust Router The trust router uses the concept of a “ Web of Trust ” to find a trusted path to a resource. You don ’ t necessarily trust the person holding the resource - but you do trust the judgement of someone that can vouch for them.

Scaling: The Trust Router University of Camford Blue Book Publishing Inc. Internet2 Janet Oxfordshire NHS Trust Jisc Collections

Scaling: The Trust Router

RadSecRadSec Trust Router RadSecRadSec TPQTPQ Temporary Identity GSSGSSEAPEAPEAPEAP Relying Party Client Trust Router Trust Router RP Proxy IdP Proxy T.I.T.I. Access-AcceptAccess-Accept Access-AcceptAccess-Accept SessionSession Moonshot and Trust Router Architecture

Using Moonshot: UX [This slide intentionally left blank.]

Using Moonshot: UX

Using Moonshot: Why? Enhanced UX and privacy – Improved SSO: users can access more resources more easily No credential management – Home institution is responsible for provisioning credentials and support Fine-grained security policies with minimal effort Reduced management overhead

Using Moonshot: Use Cases Primarily Janet is supporting research users Strong demand from local and central government, health, education and research for a federated desktop experience – Many desktops in these institutions run Windows – Janet ’ s SSPI provides this functionality already, but UX could be improved even further by tighter integration

Using Moonshot: Use Cases “We aim to streamline access services using Moonshot technology, which will take the burden of authentication out of the hands of our users.” -- Dr Peter Oliver, Group Leader Science and Technology Facilities Council

Using Moonshot: Use Cases “Moonshot is a valuable enabler for Cancer Research across the UK. It will make collaboration systems easy to build internally so that we can quickly share large data sets,between institutes without complicating the management of that system.” -- Peter Maccallum, Head of IT & Scientific Computing CRUK Cambridge Research Institute

Using Moonshot: Use Cases “Moonshot technology will give our university a better means of cooperating for research purposes using High Performance Computing” -- Alex Brulo, Senior Server Engineer (HPC) Aston University

Using Moonshot: How Anything that understands GSS or Kerberos can already support Moonshot. Web based applications will be able to implement the Moonshot web plugin. Non web applications - integrate GSS, SASL or SSPI directly. – Doing this will mean that it will work with not just Moonshot, but Kerberos/Active Directory, and more

Janet’s Moonshot Pilot

Moonshot Pilot Service To assist pilot sites in implementing Moonshot to solve real use cases. To fully test Janet support and infrastructure operations. To develop, test & refine documentation, training and policies. To inform and shape the business case for a full production service.

Janet Pilot Sites London Research Institute Norfolk County Council Loughborough University Swansea University Newcastle University QCIF (also working with Monash Uni) Deutsches Elektronen- Synchrotron Universidade do Porto University of Leicester Georgia Tech University of Leeds University of Nottingham Universidade Lusofona University of Westminster CANARIE Inc.. London Metropolitan University Francis Crick Institute E2BN (East of England RBC) University of Edinburgh Research Data, ISD, UCL Queen Mary, University of London Wellcome Trust Sanger Institute GSI Darmstadt University of Liverpoo l University of Kent University of Glasgow University of Cambridge University for the Creative Arts Cardiff University and LIGO Scientific Collaboration University of Leicester STFC Brunel University Harper Adams University University of Huddersfield University of Southampton Brunel University Coleg Sir Gar University of Sussex University of Exeter University of South Australia Arkivum Microsoft

GÉANT GN3+ MOONSHOT PILOT

GN3+ Pilot 2 year project to implement an eduGAIN pilot service to: investigate the peering requirements between different NREN Trust Router infrastructures; promote uptake of a standard non-web SSO solution across eduGAIN members; implement non-web SSO for specific user-defined problems; establish a policy framework within eduGAIN for pilot Communities of Interest

GN3+ Janet RENATER NIIFI SWITCH CARNetCESNET NORDUnet (CSC) RedIRIS

Further Information Moonshot Community website: Software: moonshot-using-live-dvdhttps://community.ja.net/groups/moonshot/wiki/getting-started- moonshot-using-live-dvd Standards:

THANK YOU Janet, Lumen House Library Avenue, Harwell Oxford Didcot, Oxfordshire t: +44 (0) f: +44 (0) e: