INFSO-RI-508833 Enabling Grids for E-sciencE www.eu-egee.org Portals and Authentication Issues and Solution Directions from a CA and IGTF Perspective David.

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MyProxy and EGEE Ludek Matyska and Daniel.
Advertisements

Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
David Groep Nikhef Amsterdam PDP & Grid Evolving Assurance – IGTF LoA generalisation David Groep Interoperable Global Trust Federation IGTF Documents at.
Authorization WG Update David Kelsey EU Grid PMA, Copenhagen 27 May 2008.
Open Science Grid Use of PKI: Wishing it was easy A brief and incomplete introduction. Doug Olson, LBNL PKI Workshop, NIST 5 April
2006 © SWITCH Authentication and Authorization Infrastructures in e-Science (and the role of NRENs) Christoph Witzig SWITCH e-IRG, Helsinki, Oct 4, 2006.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
INFSO-RI Enabling Grids for E-sciencE JRA3 2 nd EU Review Input David Groep NIKHEF.
Open Science Grid Use of PKI: Wishing it was easy A brief and incomplete introduction. Doug Olson, LBNL PKI Workshop, NIST 5 April 2006.
NRENs supporting Grids using current Grid technology TERENA NREN-GRID Workshop Amsterdam Milan Sova CESNET.
\ Grid Security and Authentication1. David Groep Physics Data Processing group Nikhef.
David Groep Nikhef Amsterdam PDP & Grid Differentiated and Collaborative Assurance profiling the identity management landscape for diversifying e-Infrastructure.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
LiveAP Towards Differentiated Identity Assurance David Groep, Nikhef supported by the Netherlands e-Infrastructure SURFsara, and EGI.eu O-E-15 and EGI-InSPIRE.
Identity Management Levels of Assurance WLCG GDB CERN, 8 Apr 2009 David Kelsey STFC/RAL david.kelsey AT stfc.ac.uk.
Federated Identity Management for HEP David Kelsey WLCG GDB 9 May 2012.
Blueprint Meeting Notes Feb 20, Feb 17, 2009 Authentication Infrastrusture Federation = {Institutes} U {CA} where both entities can be empty TODO1:
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
NECTEC-GOC CA Self Audit 7 th APGrid PMA Face-to-Face meeting March 8 th, 2010 Large-Scale Simulation Research Laboratory Sornthep Vannarat Large-Scale.
TERENA TF-EMC2 Workshop David Groep,
Evolution of the Open Science Grid Authentication Model Kevin Hill Fermilab OSG Security Team.
Ning Zhang, the University of Manchester, UK David Groep, National Institute for Nuclear and High Energy Physics, NL Blair Dillaway, OGF Security Area.
Updates from the EUGridPMA David Groep, July 16 st, 2007.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Profile for Portal-based Credential Services (POCS) Yoshio Tanaka International Grid Trust Federation APGrid PMA AIST.
HEPSYSMAN UCL, 26 Nov 2002Jens G Jensen, CLRC/RAL UK e-Science Certification Authority Status and Deployment.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
EResearchers Requirements the IGTF model of interoperable global trust and with a view towards FIM4R AAI Workshop Presenter: David Groep, Nikhef.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
INFSO-RI Enabling Grids for E-sciencE EGEE SA1 in EGEE-II – Overview Ian Bird IT Department CERN, Switzerland EGEE.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
IOTA AP Towards Differentiated Identity Assurance David Groep, Nikhef supported by the Netherlands e-Infrastructure and SURFsara.
Updates from the EUGridPMA David Groep, May 9 st, 2007.
NRENs, Grids and Integrated AAI In Search For the Utopian Solution Christos Kanellopoulos AUTH/GRNET October 17 th, 2005 skanct at physics.auth.gr 2nd.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
EGI-InSPIRE RI EGI EGI-InSPIRE RI Establishing Identity in EGI the authentication trust fabric of the IGTF and EUGridPMA.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
VOMS Attribute Authorities Michael Helm ESnet/LBNL 23 Feb 2007.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
8-Mar-01D.P.Kelsey, Certificates, WP6, Amsterdam1 WP6: Certificates for DataGrid Testbeds David Kelsey CLRC/RAL, UK
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
12-Jun-03D.P.Kelsey, CA meeting1 CA meeting Minimum Requirements CERN, 12 June 2003 David Kelsey CCLRC/RAL, UK
Identity Management in Open Science Grid Identity Management in Open Science Grid Challenges, Needs, and Future Directions Mine Altunay, James Basney,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
7-May-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Issues and Planning or Report from the Security Group CERN, 8 May 2003 David Kelsey CCLRC/RAL, UK.
APGridPMA Update Eric Yen APGridPMA August, 2014.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security aspects (based on Romain Wartel’s.
Summary of Poznan EUGridPMA32 September EUGridPMA Poznan 2014 meeting – 2 David Groep – Welcome back at PSNC.
A Study of Certification Authority Integration Model in a PKI Trust Federation on Distributed Infrastructures for Academic Research Eisaku SAKANE, Takeshi.
Security and Delegation The Certificate Perspective Jens Jensen Rutherford Appleton Laboratory Workshop at NIKHEF, 27 April 2010.
A Survey of Certificate Management Processes and Procedures in OSG Gabriel Ghinita and Mine Altunay
Jens' obligatory soap box Can't be a PMA without a SoapBox A random collection of Soapy things Nicosia, Jan 2009.
INFSO-RI Enabling Grids for E-sciencE JRA3 Åke Edlund On behalf of JRA3 EGEE 8th All-activity meeting January 18-19,
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF & EUGridPMA status update SHA-2 – and more (David Groep,
UGRID CA Self-audit report Sergii Stirenko 21 st EUGRIDPMA Meeting Utrecht 24 January 2011.
News from EUGridPMA EGI OMB, 22 Jan 2013 David Kelsey (STFC) Using notes from David Groep 22/01/20131EUGridPMA News.
Soapbox (S-Series) Certificate Validation Jens Jensen, STFC.
Classic X.509 AP updates (v4.1)
LCG Security Status and Issues
HellasGrid CA & euGridPMA
Tweaking the Certificate Lifecycle for the UK eScience CA
Assessing Combined Assurance
Assessing Combined Assurance
Portals and Authentication Issues and Solution Directions from a CA and IGTF Perspective David Groep NIKHEF.
Presentation transcript:

INFSO-RI Enabling Grids for E-sciencE Portals and Authentication Issues and Solution Directions from a CA and IGTF Perspective David Groep NIKHEF

Enabling Grids for E-sciencE INFSO-RI TCG Portal WG: Issues in authentication 2 Issues Authentication –a federated CA structure –Identity vetting, policies, requirements, and relying parties –Certificate ‘classes’ and their assurance Authentication and Portals –automated clients –user credential caches –AAI-backed Short-Lived Credential Service CAs

Oct 3, 2007TCG Portal WG: Issues in authentication3 Federation Model for Grid Authentication A Federation of many independent CAs –common minimum requirements (in various flavours) –trust domain as required by users and relying parties where relying party is (an assembly of) resource providers –defined and peer-reviewed acceptance process No strict hierarchy with a single top –spread of reliability, and failure containment (resilience) –maximum leverage of national efforts and complementarities CA 1 CA 2 CA 3 CA n authentication profiles distribution acceptance process relying party 1 relying party n

Oct 3, 2007TCG Portal WG: Issues in authentication4 International Grid Trust Federation Federation of 3 Regional “PMAs”, that define common guidelines and accredit credential-issuing authorities TAGPMAEUGridPMAAPGridPMA

Oct 3, 2007TCG Portal WG: Issues in authentication5 Relying Party issues to be addressed Common Relying Party requests on the Authorities 1.standard accreditation profiles sufficient to assure approximate parity effectively, a single level of assurance sufficed then for relying parties – is changing today, as more diverse resources are being incorporated 2.monitor [] signing namespaces for name overlaps 3.a forum [to] participate and raise issues 4.[operation of] a secure collection point for information about CAs which you accredit 5.common practices where possible 6.reasonable likeness for a subject’s name* 7.a subject’s name should be forever persistent* list courtesy of the Open Science Grid (* and wLCG and EGEE draft policy)

Oct 3, 2007TCG Portal WG: Issues in authentication6 Grid Relying Parties & resource providers In Europe –Enabling Grid for E-sciencE (EGEE) (~ 200 sites) –Distr. Eur. Infrastructure for Supercomputer Apps (DEISA) (~15 sites) –South Eastern Europe: SEE-GRID (10 countries) –many national projects (NL BIG-GRID, VL-e, UK e-Science, Grid.IT, …) In the Americas –EELA: E-infrastructure Europe and Latin America (24 partners) –WestGrid (6 sites), GridCanada, … –Open Science Grid (OSG) (~ 60 sites) –TeraGrid (~ 10 sites + many users) In the Asia-Pacific –AP Grid (~10 countries and regions participating, and growing) –Pacific Rim Applications and Grid Middleware Assembly (~15 sites) data as per mid 2006

Oct 3, 2007TCG Portal WG: Issues in authentication7 Building the federation Trust providers (‘CAs’) and relying parties (‘sites’) together shape the common requirements –Several profiles for different identity management models –Authorities demonstrate compliance with profile guidelines –Peer-review process within the federation to (re-) evaluate members on entry & periodically –reduces effort on the relying parties single document to review and assess for all CAs under a profile –reduces cost for the authorities but participation does come at a cost of involved participation … Ultimate trust decision always remains with the RP An authority is not necessarily limited to just ‘grid’ use

Oct 3, 2007TCG Portal WG: Issues in authentication8 Evolution and revolution Each CA is independent –constraints of manpower, local funding, national legislation &c –compliance is to minimum requirements Introduction of new features –through demand from within the subscriber base (per CA) most effective, especially if you bring along effort –through cross-fertilisation by peer CAs also effective, but can take a lot of time if effort is lacking –by raising the minimum requirements does not work well for innovations …

Certificate Assurance and LoA

Oct 3, 2007TCG Portal WG: Issues in authentication10 Guidelines: secured X.509 CAs Aimed at long-lived identity assertions, the ‘traditional PKI’ world Identity vetting procedures –Based on (national) photo ID’s –Face-to-face verification of applicants via a network of distributed Registration Authorities –Periodic renewal (once every year) –revocation and CRL issuing required and we have all RPs actually downloading the CRLs several times a day –subject naming must be a reasonable representation of the entity name Secure operations –off-line signing key or HSM-backed on-line secured systems –data retention and audit trail requirements, traceability of certified entities Technical implementation –need to limit the number of issuing authorities for technical reasons (most software and browsers cannot support O (1000) issuers) –certificate profile and interoperability requirements

Oct 3, 2007TCG Portal WG: Issues in authentication11 Short-lived or member integrated services Aimed at short-lived ‘translations’, that are organisation/federation bound Identity vetting procedures –based on an existing ID Management system of sufficient quality** –Original identity vetting must be of sufficient quality to trace the individual for as long as name is in active use –If documented traceability is lost, the subject name can never be re-used –revocation and CRL issuing not required for assertion lifetimes << 1 Ms –subject naming must be a reasonable representation of the entity name Secure operations –HSM-backed on-line secured systems –data retention and audit trail requirements, traceability of certified entities Technical implementation –scaling of this model still needs to be demonstrated, and needs coordination –most software and browsers cannot support O (1000) issuers –and a peer-review based trust fabric cannot do that either …

Oct 3, 2007TCG Portal WG: Issues in authentication12 Target audience for current profiles For users (personal certificates) –directly authenticating to end-systems –granting unrestricted access to (high-end) resources For hosts and services (networked connections) –proving identity of a network end-point to a user ‘did I get to the right system?’ –‘abused’ for other services, such as VOMS Certificates today reflect these two audiences

Oct 3, 2007TCG Portal WG: Issues in authentication13 Users versus Hosts and Services Users –high-quality identity vetting, so that the same subject name is quite surely bound to the person –‘all’ CAs under the classic profile meet this bar Hosts (or ‘service’, e.g. ‘ CN=gatekeeper/ce.example.org ’) –the concept of ‘ownership’ of the (DNS) name is vague –can be a group of system admins, where the local RA will ensure (‘somehow’, ‘vaguely’) that the requestor is authorized –for some CAs, ‘service’ certificates can be requested by ‘service owners’, and no thorough checking is done with the system administrators –assurance level for host and service certs is really bound to the use of the DNS name only –when used outside securing TLS network-endpoint, the assurance level is ill-defined and varies widely across the IGTF

Oct 3, 2007TCG Portal WG: Issues in authentication14 Hosts versus Robots If hosts/service assurance level is so ill-defined, what then? Raise the assurance level –leads to intricate problems when used for the current purpose of securing network endpoints Introducing an ‘automated client’ class of certificates –identities for programs and services that act in an automated way towards the grid infrastructure –concept introduced by Mike Helm in 2002 –initial criteria developed by Jens Jensen –not yet supported by all CAs, but interest is growing (actually, today only UK and NL do, with CZ coming up)

Oct 3, 2007TCG Portal WG: Issues in authentication15 Profile matrix: towards multiple LoAs? Today, a one-size-fits-all model has helped enormously –prevent weird-interaction bugs in middleware –wide interoperability –based on common RP requirements Identity vetting requirements for Classic and MICS –only in-person allowed –VOs need to collect this information and more anyway for incident response Is a both stringent and looser LoA needed for other resource classes? –when risk profile changes, what about changing the RP requirements? –and if so, how do they change?

Enabling Grids for E-sciencE INFSO-RI TCG Portal WG: Issues in authentication 16 Current options in AuthN Current authentication profile options Service certs –the CA may allow its use as an automated client –but the infrastructures should be wary of accepting them! –check of the policy may be needed  i.e. in NL, the ‘hosts’ class identifies network endpoints, as the verification is limited to finding the appropriate system admin; in DoEGrids they are quite weakly linked User certs –generate a proxy from the personal proxy of the portal owner –needs the owner to regularly provide the passphrase –but works in virtually all scenarios Robots certs (see Jens’ talk) –where available (UK, NL, soon CZ) these are the preferred choice –protects private key from abuse outside the portal system and, of course, these options can be mixed downside: requires new Grid AUP/Policies (but no new CA requirements)

Enabling Grids for E-sciencE INFSO-RI TCG Portal WG: Issues in authentication 17 ‘Alternatives’ Do nothing: just use a MyProxy solution –all jobs are traceable to the requesting user –portal MyProxy server becomes a valuable target –traditional MyProxy is entirely within the current policy space –serious issue: ‘real’ users cannot handle any kind of credentials In a pervasive AAI federation environment Federation backed SLCS integrated with the portal –SWITCHaai-like solutions –excellent for those countries that have a working AAI that actually reaches all your researchers (i.e. CH) –Authorize to portal based on AAI account, then generate a cert on the fly form the SLCS service –also entirely within current policy space –not too many countries have something pervasive …