USCGrid KX.509& Enterprise Security Shelley Henderson Project Manager, Grid Software USC Information Services Copyright Shelley Henderson This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.
November 2003NMI Integration Workshop - KX.5092 USCGrid: KX.509 & Enterprise Security KX.509 as an alternative Specific experience with KX.509 at USC KX.509 & Campus Certificate Policies
November 2003NMI Integration Workshop - KX.5093 USCGrid: KX.509 & Enterprise Security KX.509 as an alternative Specific experience with KX.509 at USC KX.509 & Campus Certificate Policies
November 2003NMI Integration Workshop - KX.5094 USCGrid: KX.509 & Enterprise Security KX.509 as an alternative What if your enterprise already has a non-PKI authentication mechanism in place? Q:
November 2003NMI Integration Workshop - KX.5095 USCGrid: KX.509 & Enterprise Security KX.509 as an alternative What if your enterprise already has a non-PKI authentication mechanism in place? Can an existing security mechanism be leveraged to get the user population on the grid? Q:
November 2003NMI Integration Workshop - KX.5096 USCGrid: KX.509 & Enterprise Security KX.509 as an alternative What if your enterprise already has a non-PKI authentication mechanism in place? Can an existing security mechanism be leveraged to get the user population on the grid? Or does an entire parallel PKI mechanism need to be created? Q:
November 2003NMI Integration Workshop - KX.5097 USCGrid: KX.509 & Enterprise Security KX.509 as an alternative If your existing enterprise authentication mechanism is kerberos, the answer is KX.509. A:
November 2003NMI Integration Workshop - KX.5098 USCGrid: KX.509 & Enterprise Security KX.509 as an alternative If your existing enterprise authentication mechanism is kerberos, the answer is KX.509. KX.509 allows you to authenticate to kerberos, then create a proxy certificate based on your kerberos credential. A:
November 2003NMI Integration Workshop - KX.5099 USCGrid: KX.509 & Enterprise Security KX.509 as an alternative If your existing enterprise authentication mechanism is kerberos, the answer is KX.509. Suddenly, everyone with a kerberos credential is grid-enabled. A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security KX.509 as an alternative If your existing enterprise authentication mechanism is not kerberos, the answer may be a proposed follow-up to KX.509, a general credential convertor. A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security KX.509 as an alternative What about server certificates? Q:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security KX.509 as an alternative What about server certificates? Can I use kerberos to create those? Q:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security KX.509 as an alternative Kerberos does not affect server certificates. A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security KX.509 as an alternative Kerberos does not affect server certificates. They must still be generated or acquired the ‘old-fashioned way’ A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security KX.509 as an alternative Kerberos does not affect server certificates. They must still be generated or acquired the ‘old-fashioned way’ – for instance, by purchasing one through Verisign. A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security KX.509 as an alternative Specific experience with KX.509 at USC KX.509 & Campus Certificate Policies
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC What does USC’s KX.509 setup look like? Q:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC USCGrid is comprised of a Beowulf cluster (more on that in a minute), A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC USCGrid is comprised of a Beowulf cluster, a Sunfire 15k called almaak.usc.edu, A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC USCGrid is comprised of the Beowulf cluster, a Sunfire 15k called almaak.usc.edu, and a recently- upgraded Condor pool made up 110 Unix workstations in a public userroom. A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC Kerberos and KX.509 are directly available through an NSF-mounted file system, /usr/usc, to anyone with a Solaris or Linux workstation. A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC Kerberos and KX.509 are directly available through an NSF-mounted file system, /usr/usc, to anyone with a Solaris or Linux workstation. Those with PCs or Macs must ssh to a Unix timesharing system, such as almaak. A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC The KCA runs on hpc-master.usc.edu, the head node for our gajillion-node Beowulf cluster. A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC To use locally-controlled grid resources, a user’s public certificate must be added to the grid mapfile. Q:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC To use locally-controlled grid resources, a user’s public certificate must be added to the grid mapfile. KX.509 users don’t have a public certificate. Q:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC To use locally-controlled grid resources, a user must be added to the grid mapfile. KX.509 users don’t have a public certificate. How can they be added to a grid mapfile? Q:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC We have a fairly simple-minded method currently for users to follow to request that they be added to the USCGrid mapfile. A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC We have a fairly simple-minded method currently for users to follow to request that they be added to the USCGrid mapfile. Each user must send an message containing a copy of his or her kx509 certificate to the USCGrid administrator. A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC Example: almaak.usc.edu(23): source /usr/usc/nmi/default/setup.csh almaak.usc.edu(24): kinit Password for almaak.usc.edu(25): kx509 A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC almaak.usc.edu(26): kxlist -p Service kx509/certificate issuer= /C=US/ST=California/L=Los Angeles /O=University of Southern California/CN=usc.edu subject= /C=US/ST=California/L=Los Angeles /O=University of Southern California serial=A8 hash=e A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC almaak.usc.edu(27): grid-proxy-info | \ mail -s "add me to grid mapfile" \ A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC The Unix sysadmin can then add an entry to the grid mapfile using the information from grid-proxy-info : "/C=US/ST=California/L=Los Angeles/O=University of Southern California/OU=usc.edu/CN=shelley shelley A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC How hard is it to install and maintain KX.509? Q:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC KX.509 is my favorite NMI component. A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC KX.509 is my favorite NMI component. You install it, A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC KX.509 is my favorite NMI component. You install it, no problem. A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC KX.509 is my favorite NMI component. You install it, no problem. Then it runs. A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security Specific experience with KX.509 at USCSpecific experience with KX.509 at USC KX.509 is my favorite NMI component. You install it, no problem. Then it runs. Really. A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security KX.509 as an alternative Specific experience with KX.509 at USC KX.509 & Campus Certificate Policies
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security KX.509 & Campus Certificate Policies What about certificate policies? Do I still have to implement certificate policies if we use KX.509? Q:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security KX.509 & Campus Certificate Policies KX.509 doesn’t buy you out of dealing with certificate policies. A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security KX.509 & Campus Certificate Policies KX.509 doesn’t buy you out of dealing with certificate policies. In a small way, it’s harder to cross-certify because you’re ‘different’. A:
November 2003NMI Integration Workshop - KX USCGrid: KX.509 & Enterprise Security KX.509 & Campus Certificate Policies KX.509 doesn’t buy you out of dealing with certificate policies. We’re working on this with ‘the security community’ – stay tuned. A:
November 2003NMI Integration Workshop - KX Disclaimer I would like to thank everyone involved in the USC NMI effort, and disclaim any credit for all the good stuff that’s been done. I’m just a project manager; I don’t do any useful work! I would like to thank everyone involved in the USC NMI effort, and disclaim any credit for all the good stuff that’s been done. I’m just a project manager; I don’t do any useful work!