Managing Roles & Privileges with Grouper and Signet Middleware Nate Klingenstein (some words stolen from Tom Barton & Lynn Mcrae) Helsinki EuroCAMP, April.

Slides:



Advertisements
Similar presentations
Centralized Application Permissions Privilege Management Nate Klingenstein 30 January 2007 OGF 19 Chapel Hill.
Advertisements

EduPerson and Federated K-12 Activities InCommon/Quilts Pilot Group February 27, 2014 Keith Hazelton UW-Madison, InCommon/I2.
Kantara: From IRM to Context. The World of Access Keeps Expanding App sourcing and hosting User populations App access channels SasS apps Apps in public.
Managing Authorization with Signet and Grouper Tom Barton, University of Chicago Lynn McRae, Stanford University Tom Barton, University of Chicago Lynn.
Integration Technologies for Grouper & Signet Tom Barton, U Chicago Joy Veronneau, Cornell Gary Brown, U Bristol Lynn McRae, Stanford.
A Middleware Unified Field Theory Identity Management / Directories Privileges / Groups Single Sign-On / Federation Enterprise Integration from network.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Handling Groups and Permissions: Grouper and Signet and uPortal Lynn McRae, Stanford University Keith Hazelton, University of Wisconsin With thanks to.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Copyright B. Wilkinson, This material is the property of Professor Barry Wilkinson (UNC-Charlotte) and is for the sole and exclusive use of the students.
Lecture 7 Access Control
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Chapter 7 WORKING WITH GROUPS.
A Use Case for SAML Extensibility Ashish Patel, France Telecom Paul Madsen, NTT.
Introduction to Group Management Tom Barton, Blair Christensen University of Chicago.
A Model for Enterprise Group and Affiliation Management RL “Bob” Morgan University of Washington CAMP, June 2005.
Combining KMIP and XACML. What is XACML? XML language for access control Coarse or fine-grained Extremely powerful evaluation logic Ability to use any.
Signet and Grouper for Distributed Attribute Administration
Managing Roles & Privileges with Grouper and Signet Middleware Tom Barton, University of Chicago Lynn McRae, Stanford University Tom Barton, University.
Authorization Scenarios with Signet RL “Bob” Morgan University of Washington Internet2 Member Meeting, September 2004.
Introduction to Grouper Part 1: Access Management & Grouper Tom Barton University of Chicago and Internet2 Manager – Grouper Project.
Attribute Resolution. 2 © 2010 SWITCH Terms: Attribute A piece of information about a user. Each attribute has a unique ID and has zero of more values.
I2/NMI Update: Signet, Grouper, & GridShib Tom Barton University of Chicago.
Maturation & Convergence in Authentication & Authorization Services in US Higher Education: Keith Hazelton, Sr. IT Architect, University.
External Identity and Authorization in GENI. Topics Federated identity and virtual organizations ABAC Creating and transporting attributes.
Cornell University Replacing a System that (sorta) Works Tom Parker Joy Veronneau Identity Management Team OIT/CIT Security Office Central Authorization.
Introduction to Databases A line manager asks, “If data unorganized is like matter unorganized and God created the heavens and earth in six days, how come.
I2Q & WMnet Pilot Presented by Jason Rousell – i2Q Jay Neale - i2Q.
SERVER I SLIDE: 6. SERVER I Topics: Objective 4.3: Deploy and configure the DNS service Objective 5.1: Install domain controllers.
San Diego Supercomputer Center National Partnership for Advanced Computational Infrastructure San Diego Supercomputer Center National Partnership for Advanced.
Signet and Grouper A Use Case Study for Central Authorization at Cornell University March 2006.
XML Registries Source: Java TM API for XML Registries Specification.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Directories Keith Hazelton, University of Wisconsin Brendan Bellina, University of Notre Dame Tom Barton, University of Chicago.
Using Grouper and Signet for Access Management Kathryn Huxtable GPN Annual Meeting 30 May 2008
Using Signet and Grouper for Access Management Using Signet and Grouper for Access Management Tom Barton, University of Chicago Lynn McRae, Stanford University.
The Glance Project ATLAS Management January 2012.
Access Control and Markup Languages Pages 183 – 187 in the CISSP 1.
Windows Role-Based Access Control Longhorn Update
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
© 2006 The University of Chicago Grouper Backgrounder for Authorization WG Tom Barton, U Chicago.
Grouper Tom Barton University of Chicago. I2MM Spring Outline  Grouper’s place in the world  Some Grouper guts  Deployment scenarios.
5 th Annual Conference on Technology & Standards April 28 – 30, 2008 Hyatt Regency Washington on Capitol Hill Considerations for Future XML.
Cloud federation Are we there yet? Marek Denis CERN openlab Major Review Geneva, Switzerland › October
Advanced CAMP: BoF Summaries. 2 Role-based Access Control (RBAC)
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
Current Middleware Picture Tom Barton University of Chicago Tom Barton University of Chicago.
Grouper: A Toolkit for Managing Groups Tom Barton blair christensen University of Chicago.
Grouper attributes and privileges FUTURE features in Internet2 MACE Grouper June 2009 Chris Hyzer University of Pennsylvania Internet2.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
LIGO Identity and Access Management
CollegeSource Security Application &
I2/NMI Update: Signet, Grouper, & GridShib
Géant-TrustBroker Dynamic inter-federation identity management
Moving Beyond Implementation: Authorization
What’s changed in the Shibboleth 1.2 Origin
Privilege Management: the Big Picture
Provisioning Groups, Memberships, and Permissions to LDAP
Overview and Development Plans
Signet Privilege Management
Grouper: A Toolkit for Managing Groups
PDI: Intro to Grouper Jeff Ruch Jeff Ruch ACNS Middleware
Signet & Privilege Management
The Attribute and the ecosystem
Signet Privilege Management
Ponder policy toolkit Jovana Balkoski, Rashid Mijumbi
Managing Roles & Privileges with Grouper and Signet Middleware
Presentation transcript:

Managing Roles & Privileges with Grouper and Signet Middleware Nate Klingenstein (some words stolen from Tom Barton & Lynn Mcrae) Helsinki EuroCAMP, April 18, 2007

Overview It’s all about data structures –Attributes –Groups –Privileges –And other more exotic forms It’s all about data management –Databases, directories, people systems, and more –Signet manages complex permissions –Grouper manages complex groups

What’s an Attribute? Intuitively easy to answer –At least one name Sometimes more… –At least one value Sometimes more… –May be more structured Practically anything can be stuffed into an attribute, whether string or structure –Is this the right expression? –All parties need to understand it The data surrounding an attribute are as important as the attribute itself

What’s a Group? Intuitively easy to answer –A set of people Usually with common characteristics Representing groups is also understood –“Static” groups A group object represents the group and contains membership and other information –“Dynamic” groups If you have the secret attribute, you’re part of the group –One group can be represented both ways

What’s a Permission? Intuitively easy to answer –The right to perform some action on some resource Usually within a context Representing permissions is somewhat less understood Attribute-based access control hasn’t really taken off

XACML A rule consists of a triplet: subject, resource, action A policy is a set of rules and combinatorics Can be crammed into a SAML attribute or requested through its own protocol Version 2.0 ratified in March 2005 No interoperability event has been attempted Hasn’t been extremely popular

The Scope Experience Member Oops –Made interoperability with other systems much harder –No applications wanted to deal with this much structure Much less XML In retrospect, preferable

Sometimes it’s simple If a group can be represented as an attribute carried by a set of users… If a privilege can be represented as an attribute carried by a set of users… Thus, eduPersonEntitlement was born

But, sometimes it’s complex Overloading a string with too much information is worse –Whether or not a string is opaque can be a religious battle Some systems make good use of complex data structures

The chaos inside Think LDAP or relational database vs. data delivered to applications –They don’t want the user object or a database dump –But the DIT and triggers are extremely useful Manage your complex groups with Grouper Manage your permissions with Signet –Export them to LDAP, a RDBMS, Shibboleth, or other systems in your format of choice

Grouper Defines a “Groups Registry” –Centralized management of groups –Group math, group nesting, exclusion criteria –Hierarchical name-space (name stems & substems) –When you’re done, export the group to the systems that use or store it Can feed from existing group information Supports the creation of new groups –By schools, departments, and individuals! –Distributed/delegated model of control

Signet Brings privilege information together in one place -- a “Privilege Registry” –Central granting, can apply across multiple systems –Central reporting, history, auditing, review –Accessible to managers and holders of privileges Independent of specific vendors, systems, releases or technologies Distributed/delegated model of control

Enough talk Example time -- and this time you can help Super-user: demo/signet Other users: username/signet –tbarton/signet –lmcrae/signet

Privilege Elements by Example By authority of the Dean grantor principal investigators grantee (group/role) who have completed training prerequisite can approve purchases function in the School of Medicine scope for research projects resource up to $100,000 limit until January 1, 2007 as long as a faculty member at… conditions PrivilegeLifecycle

Configuring Signet XML configuration files: –subsystem.xml Defines the set of permissions, limits, etc. that exist –tree.xml Defines the structure of trees and scopes –users.xml Creates user data if you don’t have it already Database of your choice provides the real backend –SQL scripts to create Signet tables are provided for most major databases

Configuring Grouper Mix of manual and automation processes manage a common Groups Registry –Stored in an RDBMS –Information provisioned from here to enterprise data stores Opt-in and opt-out supported –People can, subject to policy, change their own memberships

Composite Groups Composite group membership is computed dynamically –A = B U C union –A = B ∩ C intersection –A = B – C relative complement Common use – “tweak” existing groups –Whitelist or blacklist factored in to another group

Exporting from Grouper API XML Import/Export Tool –Snapshots Groups Registry, including naming stems and privileges A single group All subordinate to a specified naming stem All matching a search condition Entire Registry LDAP Provisioning Connector

Federating Permissions & Groups The really big question: how do you knit together groups and permissions across realms? –Is it sufficient to just assert common attribute values? –Use common privilege definition metadata? –Integrate systems at a deeper layer than just attribute & metadata exchange? Does the virtual organization (VO) / IdP proxy model address this problem?