Generic AAA Architecture draft-delaat-aaa-generic-00 C. de Laat Utrecht University G. Gross Lucent Technologies L. Gommans Cabletron Systems EMEA J. Vollbrecht.

Slides:



Advertisements
Similar presentations
Authentication Authorization Accounting and Auditing
Advertisements

AAA Architecture Use of a AAA Server Application Specification to Support Generic AAA Applications Across a Mesh of Interconnected AAA Servers With Policy.
TF-NGN AAA research Cees de Laat 1 of 10 Utrecht University.
SOAP.
IRTF - AAAARCH - RG Authentication Authorisation Accounting ARCHitecture RG chairs: J. Vollbrecht and C. de Laat RFC 2903, 2904, 2905,
IRTF - AAAARCH - RG Authentication Authorisation Accounting ARCHitecture RG chairs: C. de Laat and J. Vollbrecht RFC 2903, 2904, 2905,
IRTF - AAAARCH - RG Authentication Authorisation Accounting ARCHitecture RG chairs: J. Vollbrecht and C. de Laat RFC 2903, 2904, 2905,
Authorization of a QoS path based on Generic AAA SC2002 Baltimore NOV Bas van Oudenaarde Advanced Internet Research Group University of Amsterdam.
SIP roaming solution amongst different WLAN-based service providers Julián F. Gutiérrez 1, Alessandro Ordine 1, Luca Veltri 2 1 DIE, University of Rome.
Generic AAA based provisioning Of Network Elements Status update EVL 9/10/03 Leon Gommans University of Amsterdam.
History Since created in 1995, RADIUS has been used to provide authentication, authorization and generate accounting information for dial-in users. However,
Policy-based Accounting Draft Sebastian Zander, Tanja Zseby GMD FOKUS - German National Research Institute for Information Technology Competence Center.
AAA-ARCH IRTF-RG Authentication Authorisation and Accounting ARCHitecture chairs: C. de Laat J. Vollbrecht 1 of 16.
AAA-ARCH IRTF-RG Authentication Authorisation and Accounting ARCHitecture Research Group chairs: C. de Laat J. Vollbrecht Content of this talk has contributions.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
IRTF - AAAARCH - RG Authentication Authorisation Accounting ARCHitecture RG chairs: C. de Laat and J. Vollbrecht RFC 2903, 2904, 2905,
IRTF - AAAARCH - RG Authentication Authorisation Accounting ARCHitecture RG chairs: J. Vollbrecht and C. de Laat RFC 2903, 2904, 2905,
The Architecture of Transaction Processing Systems
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Introduction CS-480b Dick Steflik. X.800 – OSI Security Services Security Service – a service provided by a protocol layer of communicating open systems,
IRTF - AAAARCH - RG Authentication Authorisation Accounting ARCHitecture RG chairs: C. de Laat and J. Vollbrecht RFC 2903,
Systems Architecture, Fourth Edition1 Internet and Distributed Application Services Chapter 13.
Course Instructor: Aisha Azeem
1 CHEETAH software OCS/AAA module Routing decision module Signaling module VLSR module Include TL1 proxy for Cisco MSPP Router disconnect module.
Understanding Active Directory
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
1 Review of Important Networking Concepts Introductory material. This slide uses the example from the previous module to review important networking concepts:
Implementing RADIUS AAA Phil & Rick. Content Terms and Concepts Access Control What is AAA? Benefits of AAA What is RADIUS? Microsoft IAS Overview Installation.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
IRTF - AAAARCH - RG Authentication Authorisation Accounting ARCHitecture RG chairs: C. de Laat and J. Vollbrecht RFC 2903, 2904, 2905,
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 10Slide 1 Architectural Design l Establishing the overall structure of a software system.
© Copyright 2007 Arbinet-thexchange, Inc. All Rights Reserved. Voice Peering Steve Heap Chief Technology Officer.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Architectural Design lecture 10. Topics covered Architectural design decisions System organisation Control styles Reference architectures.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
QUALCOMM Incorporated 1 Protocol Options for BSN- BSMCS Controller Interface Jun Wang, Kirti Gupta 05/16/2005 Notice: Contributors grant a free, irrevocable.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 10Slide 1 Architectural Design l Establishing the overall structure of a software system.
Architectural Design Yonsei University 2 nd Semester, 2014 Sanghyun Park.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
11 December, th IETF, AAA WG1 AAA Proxies draft-ietf-aaa-proxies-01.txt David Mitton.
Reconsidering Internet Mobility Alex C. Snoeren, Hari Balakrishnan, M. Frans Kaashoek MIT Laboratory for Computer Science.
AAA and Mobile IPv6 Franck Le AAA WG - IETF55. Why Diameter support for Mobile IPv6? Mobile IPv6 is a routing protocol and does not deal with issues related.
Data Objects and Message Types 49 th IETF AAAarch Research Group David Spence Interlink Networks.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
1 Chapters 2 & 3 Computer Networking Review – The TCP/IP Protocol Architecture.
The concepts of Generic AAA are described in RFC2903 [1] (Generice AAA Architecture) and RFC2904 [2] (Authorization Framework). Several.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Globus: A Report. Introduction What is Globus? Need for Globus. Goal of Globus Approach used by Globus: –Develop High level tools and basic technologies.
DSLF Subscriber Auth Requirements and IETF PANA Protocol PANA WG Chairs IETF 70 Dec 7, 2007 – Vancouver, Canada.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
Securing Access to Data Using IPsec Josh Jones Cosc352.
RADIUS By: Nicole Cappella. Overview  Central Authentication Services  Definition of RADIUS  “AAA Transaction”  Roaming  Security Issues and How.
Architecture Review 10/11/2004
Module 3: Enabling Access to Internet Resources
High Performance Computing Lab.
IEEE 802 OmniRAN Study Group: SDN Use Case
EA C451 Vishal Gupta.
Chapter 3: Windows7 Part 4.
draft-ipdvb-sec-01.txt ULE Security Requirements
Security & .NET 12/1/2018.
Chapter 6 – Architectural Design
AAA: A Survey and a Policy- Based Architecture and Framework
Developing for Windows Azure
Global Grid Forum (GGF) Orientation
Presentation transcript:

Generic AAA Architecture draft-delaat-aaa-generic-00 C. de Laat Utrecht University G. Gross Lucent Technologies L. Gommans Cabletron Systems EMEA J. Vollbrecht Merit Network, Inc. D. Spence Merit Network, Inc. 1 of 18

Starting point Applications –Network Access –Bandwidth Broker –Authorization of resources living in many administrative domains –Budget system –Library system –Computer based education system Requirements –Take high level requirements from the different applications as notified in the AAA drafts –Separate common from application specific functionality 2 of 18

Physics-UU to IPP-FZJ => 7 kingdoms –Physics dept –Campus network –SURFnet –TEN 155 –WINS/DFN –Juelich, Campus –Plasma Physics Multi Kingdom Problem 3 of 18 USA line 3 ms Jülich 17 ms 2.5 ms

The need for AAA End user RRRR Remote service management 4 of 18 Kingdom NKingdom N+1 BB AAA BB management ? ? AAA $$$

Generic AAA server Rule based engine Application Specific Module Auth rules Events API AAA Server building block Types of communication: 1: “The” AAA protocol 2: interface (API) to app specific module (addressing!) 3: interface (API or connection) to repositories (e.g. LDAP) 5 of 18 Rule example: Auth_A = (B>9).or. C.and. D

Generic AAA server Rule based engine Application Specific Module Policy Events Service 5 Types of communication: 5: Towards service (f.e. COPS, CLI, SNMPv3) Pushing the buttons 6 of 18

Generic AAA server Rule based engine Application specific Module Policy Events Types of communication: 4: Legacy protocols (Radius, Diameter, …) 7 of 18 Legacy protocols

Generic AAA server Rule based engine Application specific Module Policy Events GW 1 2 Gateway 8 of 18

AAA server Generic AAA Agent Model AAA server 9 of 18

MacsBug 6.5.4a6, Copyright Apple Computer, Inc NMI (user entered MacsBug on purpose) 17-Jun :51:26 PM (since boot = 28 minutes) Current application is “Microsoft PowerPoint” Machine = 312 (PowerBookG3Series), System $0860, sysu = $ ROM version $077D, $41F6, $0002 (ROMBase $FFC00000) VM is on; paging is currently safe NIL^ = $FFC10000 Stack space used = Address FFC0693A is in the ROM at _PutIcon+0378C Registers D0 = A0 = FEE00000 USP = 0B25F3D8 D1 = C A1 = 0028B9A4 MSP = D2 = 008D49B0 A2 = ISP = 0BA055E4 D3 = 0B25FAF0 A3 = VBR = 0016D494 D4 = 746FFF00 A4 = 0B25F754 CACR = SFC = 0 D5 = 0000FFFE A5 = 0B9F3790 CAAR = DFC = 0 D6 = 6C A6 = 0B25F42C PC = FFC0693A D7 = A7 = 0BA055E4 SR = SmxnzvC Int = 0 Calling chain using A6/R1 links Back chain ISA Caller 0B25F8FF PPC 002FD83C EmToNatEndMoveParams B25F880 PPC 1B5C67F8 0B25F848 PPC 1B5C68A8 0B25F7D8 PPC 1B249B30 0B25F780 PPC 1B2905DC 0B25F710 PPC 1B28F3FC 0B25F6A0 PPC 1AE7BE98 AfxWaitNextEvent Just kidding Next section We will now examine the generic AAA problem from the perspective of a layered protocol model George Gross 10 of 19

Basic Authorization Entities User User Home Organization AAA Server Service Provider AAA Server Service Equipment 11 of 20

User User Home Organization AAA Server Service Provider AAA Server Service Equipment Request 1 Approved 4 Commit Approval 2 Conditional Approval 3 5 use service 4 Example applications: Mobile IP, PPP dial-in to NAS 1 Roaming “Pull” Authorization Model 12 of 20

User User Home Organization AAA Server Service Provider AAA Server Service Equipment Request 1 Approved 4 5 use service 4 Conditional Approval with ticket 2 Request with ticket 3 Example application: Internet printing, where file and print servers are in different admin domains Roaming “Push” Authorization Model 13 of 20

User User Home Organization AAA Server Service Provider AAA Server Service Equipment Request 1 Approved 4 Commit Approval 3 Conditional Approval 2 5 use service 3 Example application: bandwidth brokerage at Enterprise/Service Provider boundary Roaming “Agent” Authorization Model 14 of 20

Complex Authorization Message Flows The authorization models just discussed dealt with a single type of application request that had only two stakeholders But an authorization request could contain multiple application requests of different types, and arbitrary chains of stakeholders. Example, grant the authorization request if the following logical expression evaluates to true: –User’s request for QoS bandwidth is available given network’s state – AND (User’s account “A” has credit to pay for it OR account “B” has credit to pay for it) –AND User Home Organization has less than its contracted bandwidth ceiling allocated by the Service Provider 15 of 20

An authorization request must be routed amongst one or more authorization stakeholders Each stakeholder executes an Authorization Decision Function (ADF) to approve, deny, or conditionally approve the request The authorization request accumulates approvals and other context state information as it passes through the stakeholder chain Final approval causes an authorization commit notification to be sent to all of the stakeholders Distributed Authorization Decision Making 16 of 20

Post approval: an Authorized Session Some authorization request types have no ongoing state after they have been granted, they are transactions But there are many authorization types that cause an allocation and ongoing service/resource consumption Implies requirements for: –monitor session’s service/resource use against limits –coordinate Authorized Session state across AAA servers –network operator interface to view, modify, or cancel session –an option for User to modify session’s current authorization These requirements are met by the AAA Server’s resource manager component 17 of 20

Reliable Secure Transport Service Layer AAA Transaction Session Management (AAA-TSM) Service Layer AAA-TSM service layer API Internet Protocol Service Layer Presentation Service Layer AAA Application Specific Service Layer AAA Server Protocol Stack 18 of 20

Service Layer Components Service layer [N] abstract program interface that offers a service to its adjacent service layer [N+1] A lexicon of Protocol Data Units (PDU) exchanged between the distributed service layer peers Service layer end point address space, by which PDUs are routed to their destination Trust relationships between the peer end points Service layer end point’s externally visible Finite State Machine (FSM) and events that cause transitions Mechanisms for end point registration, discovery, detect lost connectivity, service location by search attributes 19a of 20

Generic AAA Server Components Authorization Policy Rules Evaluation Engine Authorization history event log Attribute Authority AAA-TSM service API AAA-TSM Protocol Handler Authorized Session Resource Manager Authorization policy rules database Presentation Service Layer Reliable Secure Transport User Authorization Request Services 19b of 20

Generic AAA Server Components Generic authorization decision function driven by policy rule evaluation engine Program interface to one or more Application Specific Modules (ASM) Authorization history event log - can be consulted by ADF, or used for auditing Generic authorization policy rule repository Authorized Session resource manager - control point for querying, canceling, or modifying in progress authorized sessions 19c of 20

Completed Approval List Member AAA-TSM Request AAA-TSM Request Payload Authorizer’s approval digital signature Authorization Stakeholder Routing List User’s Authorization Request User’s credentials, e.g.attribute certificate User’s identity AAA-TSM Common Header Authorization Completed Approvals List Application-specific response data Authorizer’s decision serial number Generic decision status code Authorizer’s Session Layer Address Timestamp of decision Payload Modification Audit Trail Authorization formula partial results stack 19d of 20

AAA Protocol Stack - end to end view User Service Provider Administrative Domain User Home Organization Admin. Domain AAA Gateway This scenario shows the User requesting an authorization transaction that requires getting approval from both of two AAA applications, X and Y Internet Protocol Reliable/Secure Transport Reliable/Secure Transport AAA Transaction Session Management Presentation Service “X” Application “X” Authorization Manager AAA Transact Session Mgmnt. “X” Service Equipment Presentation Service Application Specific Authorization Requestor User Reliable/Secure Transport Internet Protocol Reliable/Secure Transport AAA Transaction Session Management Presentation Service”X” Application “X” Authorization Manager Policy Database AAA Server Presentation Service “Y” Application “Y” Authorization Manager Policy Database Presentation Service “Y” Application “Y” Authorization Manager “Y” Service Equipment AAA-TSM service layer API 19d’ of 20

Define exactly what goes in which component Determine what needs to be standardized –Type 1 protocol –Naming space (what needs to be globally addressable) –Policy and rule language(s) (Policy Framework WG) –Audit overview –Management Discrete event simulation –Try implementation of simple rules –Scalability –Looping rules (PF-WG) »A says yes if B says yes and B says yes if A says yes –Try simple naming schemes and (re)routing (URL-like???) Future work 19e of 20 Generic AAA server Rule based engine Application Specific Module Policy Events Service 5 4

Does this work create a base for completing a “generic architecture” for future A 3 (A) work? Should the results in this work be reflected in the new charter for this group? Questions to the WG Current charter wording --> Collecting and satisfying application- layer requirements is not in the current set of AAA WG milestones. However, if a set of agreed upon application-layer requirements can be delivered before the deadline of I-D submission for the next IETF, then such document(s) will/may be considered. We propose a revision! 20a of 20

Proposed New Charter Items Develop Generic AAA Model by explicitly including Authentication and Accounting Develop model for management of a WEB of AAA-Servers Develop auditability framework specification Align development for short term AAA protocol to be fitting in long term AAA model Tackle interdomain issues using the proposed generic model Proposal: Advance current generic authorization model draft to AAA-WG info RFC 21 of 21