Grid Security. Typical Grid Scenario Users Resources.

Slides:



Advertisements
Similar presentations
Introduction of Grid Security
Advertisements

Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
Security Protocols Sathish Vadhiyar Sources / Credits: Kerberos web pages and documents contained / pointed.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
MyProxy: A Multi-Purpose Grid Authentication Service
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
GRID Security Infrastructure: Overview and problems PKI-COORD Meeting, Amsterdam November 26, 2001 Yuri Demchenko.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Lecture 2: Security Rachana Ananthakrishnan Argonne National Lab.
Lecture 23 Internet Authentication Applications
Jim Basney GSI Credential Management with MyProxy GGF8 Production Grid Management RG Workshop June.
Military Technical Academy Bucharest, 2006 GRID SECURITY INFRASTRUCTURE (GSI) - Globus Toolkit - ADINA RIPOSAN Department of Applied Informatics.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
National Center for Supercomputing Applications Integrating MyProxy with Site Authentication Jim Basney Senior Research Scientist National Center for Supercomputing.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Kerberos and PKI Cooperation Daniel Kouřil, Luděk Matyska, Michal Procházka Masaryk University AFS & Kerberos Best Practices Workshop 2006.
DGC Paris Community Authorization Service (CAS) and EDG Presentation by the Globus CAS team & Peter Kunszt, WP2.
Security Issues in Grid Computing Reading: Grid Book, Chapter 16: “Security, Accounting and Assurance” By Clifford Neuman.
Security NeSC Training Team International Summer School for Grid Computing, Vico Equense,
Grid Security Overview The Globus Project™ Copyright (c) 2002 University of Chicago and The University of Southern California. All.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Slides for Grid Computing: Techniques and Applications by Barry Wilkinson, Chapman & Hall/CRC press, © Chapter 1, pp For educational use only.
1-2.1 Grid computing infrastructure software Brief introduction to Globus © 2010 B. Wilkinson/Clayton Ferner. Spring 2010 Grid computing course. Modification.
Use of Kerberos-Issued Certificates at Fermilab Kerberos  PKI Translation Matt Crawford & Dane Skow Fermilab.
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
National Computational Science National Center for Supercomputing Applications National Computational Science MyProxy: An Online Credential Repository.
INFSO-RI Enabling Grids for E-sciencE EGEE Security Basics for the User Guy Warner NeSC Training Team An Induction to EGEE for GOSC.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Kerberos: An Authentication Service for Open Network Systems Jennifer G. Steiner Clifford Neuman Jeffrey I. Schiller.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Unit 1: Protection and Security for Grid Computing Part 2
INFSO-RI Enabling Grids for E-sciencE Getting Started Guy Warner NeSC Training Team Induction to Grid Computing and the National.
Grid Security 1. Grid security is a crucial component Need for secure communication between grid elements  Authenticated ( verify entities are who they.
1 Grid Security. 2 Grid Security Concerns Control access to shared services –Address autonomous management, e.g., different policy in different work groups.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Chapter 21 Distributed System Security Copyright © 2008.
National Computational Science National Center for Supercomputing Applications National Computational Science NCSA-IPG Collaboration Projects Overview.
Module 9: Fundamentals of Securing Network Communication.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
E-science grid facility for Europe and Latin America E2GRIS1 Raúl Priego Martínez – CETA-CIEMAT (Spain)‏ Itacuruça (Brazil), 2-15 November.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Military Technical Academy Bucharest, 2004 GETTING ACCESS TO THE GRID Authentication, Authorization and Delegation ADINA RIPOSAN Applied Information Technology.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
National Computational Science National Center for Supercomputing Applications National Computational Science Credential Management in the Grid Security.
Security, Accounting, and Assurance Mahdi N. Bojnordi 2004
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
Grid, Web services and Taverna Machiel Jansen Richard Holland.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Authorisation, Authentication and Security Guy Warner NeSC Training Team Induction to Grid Computing and the EGEE Project, Vilnius,
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
1 Grid School Module 4: Grid Security. 2 Typical Grid Scenario Users Resources.
EGEE is a project funded by the European Union CA overview and requirements Ognjen Prnjat, Nikos Vogiatzis GRNET EGEE-SEE regional kick-off, April 7-8.
EGI-InSPIRE RI Grid Training for Power Users EGI-InSPIRE N G I A E G I S Grid Training for Power Users Institute of Physics Belgrade.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Key management issues in PGP
Secure Connected Infrastructure
Authentication, Authorisation and Security
Grid Security.
THE STEPS TO MANAGE THE GRID
Grid School Module 4: Grid Security
Grid Security Overview
Grid Security Infrastructure
Presentation transcript:

Grid Security

Typical Grid Scenario Users Resources

What do we want from security? Identity Authentication Privacy Integrity Authorization Single sign-on Delegation

Identity & Authentication Each entity should have an identity  Who are you?  Example: Unix login name Authentication:  Prove your identity  Stops masquerading imposters Examples:  Passport  Username and password

Privacy Medical Record Patient no: 3456

Integrity Run myHome/whoami Run myHome/rm –f *

Message Protection Sending message securely Integrity  Detect whether message has been tampered Privacy  No one other than sender and receiver should be able to read message

Authorization establishes rights to do actions What can a particular identity do? Examples:  Are you allowed to read this file?  Are you allowed to run a job on this machine?  Unix read/write/execute permissions Must authenticate first  Authentication != authorization

Single sign on Log on once  Type password once Use any grid resource without typing password again

Delegation

Resources on the grid can act as you Example: Execution jobs can transfer files Delegation can be restricted  For example: Delegation only valid for a short period of time

Solutions using cryptography

Cryptographic Keys, the building block of cryptography, are collections of bits The more bits that you have, the stronger is the key Public key cryptography has two keys:  Public key  Private key

Encryption takes data and a key, feeds it into a function and gets encrypted data out Encrypted data is, in principal, unreadable unless decrypted Encryption Function

Decryption feeds encrypted data & a key into a function and gets the original data Encryption and decryption functions are linked Decryption Function

Digital Signatures let you verify aspects of the data Who created the data That the data has not been tampered with Does not stop other people reading the data  Combine encryption+signature

Public Key Infrastructure (PKI) provides Identity X.509 certificate  Associates an identity with a public key  Signed by a Certificate Authority Owner

John Doe 755 E. Woodlawn Urbana IL BD Male 6’0” 200lbs GRN Eyes State of Illinois Seal Certificates are similar to passports or identity cards Name Issuer Public Key Validity Signature Valid Till:

Certification Authorities (CAs) sign certificates CAs are small set of trusted entities CA certificates must be distributed securely Issuer? Name Validity Public Key

Each CA has a Certificate Policy (CP) The Certificate Policy states:  To whom the CA will issue certificates  How the CA identifies people to whom it will issue certificates Lenient CAs don’t pose security threat because resources determine the CAs they trust.

Grid Security Infrastructure (GSI) allows users & apps to securely access resources Based on PKI A set of tools, libraries and protocols used in Globus Uses SSL for authentication and message protection Adds features needed for Single-Sign on  Proxy Credentials  Delegation

In GSI, each user has a set of credentials they use to prove their identity on the grid Consists of a X509 certificate and private key Long-term private key is kept encrypted with a pass phrase  Good for security, inconvenient for repeated usage

GSI Proxy credentials are short-lived credentials created by user Short term binding of user’s identity to alternate private key Same identity as certificate Stored unencrypted for easy repeated access Short lifetime in case of theft

GSI: Single Sign-on Single sign-on  Uses proxies  Type in password once, make a proxy with no password Features:  Allow easy repeated access to credentials  Limit risk of misuse on theft  Allow process to perform jobs for user

GSI delegation allows another entity to run using your credentials Other entity gets a proxy with your identity Other entity can run as you  only for limited time  for specific purpose For example, a compute job might want to transfer files on your behalf.

Authorization Types  Server side authorization  Client side authorization Examples  Self authorization  Identity authorization

Gridmap is a list of mappings from allowed DNs to user name "/C=US/O=Globus/O=ANL/OU=MCS/CN=Ben Clifford” benc "/C=US/O=Globus/O=ANL/OU=MCS/CN=MikeWilde” wilde Commonly used in Globus for server side ACL + some attribute Controlled by administrator Open read access

MyProxy Developed at NCSA Credential Repository with different access mechanism (e.g username/pass phrase) Can act as a credential translator from username/pass phrase to GSI Online CA Supports various authentication schemes  Passphrase, Certificate, Kerberos

MyProxy: Use Cases Credential need not be stored in every machine Used by services that can only handle username and pass phrases to authenticate to Grid. E.g. web portals Handles credential renewal for long-running tasks Can delegate to other services

Lab Session Focus on tools  Certificates  Proxies  Gridmap Authorization  Delegation  MyProxy

The presentation was based on: Grid Security Rachana Ananthakrishnan Argonne National Lab