TF-EMC2 February 2006, Zagreb Deploying Authorization Mechanisms for Federated Services in the EDUROAM Architecture (DAME) -Technical Project Proposal-

Slides:



Advertisements
Similar presentations
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
Advertisements

TNC 2008 / Short Lived Credential Service Implementation Based on National AAI Short Lived Credential Service Implementation Based on National AAI Emir.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
2006 © SWITCH Authentication and Authorization Infrastructures in e-Science (and the role of NRENs) Christoph Witzig SWITCH e-IRG, Helsinki, Oct 4, 2006.
Authz work in GGF David Chadwick
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Federated Identity Management for the context of storage Bart Kerver - TERENA Storage-meeting, Amsterdam,
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
Understanding Active Directory
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
1 July 2005© 2005 University of Kent1 Seamless Integration of PERMIS and Shibboleth – Development of a Flexible PERMIS Authorisation Module for Shibboleth.
Web services security I
A Use Case for SAML Extensibility Ashish Patel, France Telecom Paul Madsen, NTT.
Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Web:
Clinic Security and Policy Enforcement in Windows Server 2008.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
EuroPKI 2008 Manuel Sánchez Óscar Cánovas Gabriel López Antonio F. Gómez Skarmeta University of Murcia Levels of Assurance and Reauthentication in Federated.
Implementing Network Access Protection
Connect. Communicate. Collaborate First steps in federation peering: eduGAIN and eduroam Diego R. Lopez - RedIRIS.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
2005 © SWITCH Perspectives of Integrating AAI with Grid in EGEE-2 Christoph Witzig Amsterdam, October 17, 2005.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
High-quality Internet for higher education and research AAI from the NREN perspective Schiphol, October 17, 2005
1 Emergency Alerts as RSS Feeds with Interdomain Authorization Filippo Gioachin 1, Ravinder Shankesi 1, Michael J. May 1,2, Carl A. Gunter 1, Wook Shin.
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Connect. Communicate. Collaborate Federation Interoperability Made Possible By Design: eduGAIN Diego R. Lopez (RedIRIS)
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
Kerberos and Identity Federations Daniel Kouřil, Luděk Matyska, Michal Procházka, Tomáš Kubina AFS & Kerberos Best Practices Worshop 2008.
Shibboleth: An Introduction
JISC Middleware Security Workshop 20/10/05© 2005 University of Kent.1 The PERMIS Authorisation Infrastructure David Chadwick
Connect. Communicate. Collaborate The authN and authR infrastructure of perfSONAR MDM Ann Arbor, MI, September 2008.
Connect. Communicate. Collaborate AAI scenario: How AutoBAHN system will use the eduGAIN federation for Authentication and Authorization Simon Muyal,
Connect. Communicate. Collaborate Universität Stuttgart A Client Middleware for Token- Based Unified Single Sign On to eduGAIN Sascha Neinert, University.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
Identity Management in DEISA/PRACE Vincent RIBAILLIER, Federated Identity Workshop, CERN, June 9 th, 2011.
Diego R. Lopez, RedIRIS JRES2005, Marseille On eduGAIN and the Coming GÉANT Middleware Infrastructure.
NRENs, Grids and Integrated AAI In Search For the Utopian Solution Christos Kanellopoulos AUTH/GRNET October 17 th, 2005 skanct at physics.auth.gr 2nd.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Authentication and Authorisation in eduroam Klaas Wierenga, AA Workshop TNC Lyngby, 20th May 2007.
Deploying Authorization Mechanisms for Federated Services in eduroam Klaas Wierenga, EuroCAMP Helsinki, 17&18th April 2007.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
PAPI-PERMIS Integration Project Proposal David Chadwick
DICE: Authorizing Dynamic Networks for VOs Jeff W. Boote Senior Network Software Engineer, Internet2 Cándido Rodríguez Montes RedIRIS TNC2009 Malaga, Spain.
EMI is partially funded by the European Commission under Grant Agreement RI Federated Grid Access Using EMI STS Henri Mikkonen Helsinki Institute.
Adding Distributed Trust Management to Shibboleth Srinivasan Iyer Sai Chaitanya.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
Federated Wireless Network Authentication Kevin Miller Duke University Internet2 Joint Techs Salt Lake City February, 2005.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
University of Murcia Gabriel López.  Network authentication in eduroam and SSO token distribution ◦ RADIUS hierarchy ◦ Token based on SAML  Network.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks OpenSAML extension library and API to support.
Shibboleth Use at the National e-Science Centre Hub Glasgow at collaborating institutions in the Shibboleth federation depending.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Networks ∙ Services ∙ People Andrea Biancini #TNC15, Porto, Portugal Implementing Grouper to federate user authorization Federated Authorization.
AAI Interconnection with an European style Diego R. Lopez RedIRIS.
Connect. Communicate. Collaborate Applying eduGAIN to network operations The perfSONAR case Diego R. Lopez (RedIRIS) Maurizio Molina (DANTE)
Project Moonshot Daniel Kouřil EGI Technical Forum
Copyright © 2009 Trusted Computing Group An Introduction to Federated TNC Josh Howlett, JANET(UK) 11 June, 2009.
Applying eduGAIN to network operations The perfSONAR case
University of Stuttgart University of Murcia
First steps in federation peering: eduGAIN and eduroam
NAAS 2.0 Features and Enhancements
The DAMe’s First Steps: eduroam and NAS-SAML
Multi-Domain User Applications Research (JRA3)
AARC Blueprint Architecture and Pilots
Presentation transcript:

TF-EMC2 February 2006, Zagreb Deploying Authorization Mechanisms for Federated Services in the EDUROAM Architecture (DAME) -Technical Project Proposal- Óscar Cánovas (UM) Antonio G. Skármeta (UM) Diego R. Lopez (RedIRIS) Klaas Wierenga (SURFnet)

TF-EMC2 Overview Introduction Motivation of this project Background and previous work: NAS-SAML Main goals

TF-EMC2 Introduction DAME is a project that builds upon previous TERENA, GN2, Internet2, and University of Murcia work: EDUROAM, a result of TERENA Mobility Task Force, which defines an inter-NREN roaming architecture,  Reports available on the EDUROAM web site eduGAIN, the AAI interoperation infrastructure designed by GN2 JRA5  Documentation available at the GÉANT2 web site Shibboleth, a widely deployed federation mechanism developed by Internet2 and the NSF Middleware Initiative.  Documentation available on the Shibboleth web site. NAS-SAML, a network access control approach for AAA environments, developed by the University of Murcia (Spain), based on the SAML and the XACML standards,  Documentation available on the web sitehttp://pki.dif.um.es

TF-EMC2 Overview Introduction Motivation of this project Background and previous work: NAS-SAML Main goals

TF-EMC2 Motivation We have experienced the emergence of federated approaches to resource sharing. Access to shared resources with a single identity Examples of these approaches: the establishment of academic federations worldwide and the concepts around Grid Computing. Some aspects generally related with integral identity management are still open, especially those related to user authorization. Only allowed users are able to perform the set of allowed actions over each resource. One of the main resources to share is the network, for mobility purposes. The TERENA Mobility Task Force defined and tested an inter-NREN roaming architecture, called EDUROAM, proposed after identifying the most suitable techniques currently deployed in the NRENs.

TF-EMC2 Motivation EDUROAM allows users of participating institutions to access the Internet at other participants using their home institution's credentials. It would be desirable to extend the EDUROAM architecture with authentication and authorization mechanisms. NAS-SAML is an access control proposal for AAA environments which can be used to extend EDUROAM to exchange existing credentials. Credentials can be expressed in several forms, ranging from eduGAIN/Shibboleth statements to X.509 Attribute certificates Additionally, this authorization mechanism might be used at service- level, for example for Grid Computing purposes. EDUROAM constitutes an exceptional starting point to offer a full and integrated network access experience to the users.

TF-EMC2 Overview Introduction Motivation of this project Background and previous work: NAS-SAML Main goals

TF-EMC2 NAS-SAML Main objectives: To define a network access control approach based on:  X.509 PKC authentication  User attributes (roles)  Authorization policies. Rules stating the permissions give to each system role. Use of XML to express:  access control policies (XACML)  authorization statements (SAML)  authorization protocols (SAML) The scenario should be integrated in the AAA architecture.

TF-EMC2 NAS-SAML Architectural elements

TF-EMC2 NAS-SAML End User: Entity requesting access to the network Authentication based on (X.509 PKC or login/passwd pairs) AAA Server: Requires two ASM modules:  Source Authority (SA)  Policy Decision Point (PDP) Source Authority (SA): Manages the Role Assignment Policy (roles to users) Role Assignment Policy: “in the source domain Source, the set of roles R1, R2.. Rn can be assigned to the users contained in the o=org,c=ES X.500 sub-tree for the period V” Based on XACML

TF-EMC2 NAS-SAML Policy Decision Point (PDP): Generates the statements related to authorization decisions Manages the Resource Access Policy Policy Administration Point (PAP): Defines, signs and publishes the Resource Access Policy Resource Access Policy: “the users pertaining to the source domain Source, and playing the role R1, will get access to the network N1 with a QoS1” Based on XACML Network Access Point (NAP): forwards the client requests to the appropriate AAA server of the target domain obtains and enforces the properties of the network connection

TF-EMC2 NAS-SAML Example: Inter-domain pull model

TF-EMC2 NAS-SAML Current status: Architectural elements, protocols, integration with DIAMETER  G. López, O. Cánovas, A. F. Gómez-Skarmeta, R. Marín. “A Network Access Control Approach based on the AAA Architecture and Authorization Attributes”. Journal of Network and Computer Applications  Implemented and tested. Security policies (access control, role assignment, conversion):  G. López, O. Cánovas, A. F. Gómez-Skarmeta. “Use of XACML Policies for a Network Access Control Service”. 4th International Workshop of Applied PKI, IWAP’2005.  Implemented and tested. Integration with PERMIS (in collaboration with D. W. Chadwick):  G. López, O. Cánovas, A. F. Gómez-Skarmeta, O. Otenko, D.W. Chadwick. “A Heterogeneous Network Access Service based on PERMIS and SAML”. 2nd European PKI Workshop, EuroPKI’2005.  Implemented and tested.

TF-EMC2 Overview Introduction Motivation of this project Background and previous work: NAS-SAML Main goals and summary of activities

TF-EMC2 Main goals First Goal: Extension of EDUROAM using NAS-SAML User mobility controlled by assertions and policies expressed in SAML and XACML. Enhanced interoperability among organizations (common language)

TF-EMC2 Main goals First Goal: Extension of EDUROAM using NAS-SAML RELATED ACTIVITIES: Activity 1. Integration of the NAS-SAML architecture in the EDUROAM network.  Task 1. Analysis of the current status of the EDUROAM network.  Task 2. Analysis of the required user attributes and policies for roaming.  Task 3. Development of the Source Authority and Policy Decision Points.  Task 4. Development a custom SAML module for RADIUS and DIAMETER servers.  Task 5. Create a translator to convert RADIUS messages into DIAMETER and vice versa.  Task 6. Validate the resulting architecture for mobility purposes. Activity 2. Development of a user-friendly management interface for authorization policies.  Task 1. Analysis of the different existing proposals for privilege administration.  Task 2. Development of a high level interface able to be integrated with common office applications.  Task 3. Creation of interpreters and translators able to convert policies into XACML.  Task 4. Validate the resulting interface.

TF-EMC2 Main goals Second Goal: Use of eduGAIN/Shibboleth as AuthN and AuthZ backend NAS-SAML has been already integrated with other proposals (X.509 AC) Link between the AAA servers (now acting as Service Providers) and the Identity Providers of the federation.

TF-EMC2 Main goals Second Goal: Preliminary design.

TF-EMC2 Main goals Second Goal: Use of eduGAIN/Shibboleth as AuthN and AuthZ backend RELATED ACTIVITIES: Activity 3. Use of eduGAIN/Shibboleth as authentication back-end for NAS-SAML  Task 1. Analysis of the proposed profiles for SSO. Identification of the possible modifications that would require some of those profiles.  Task 2. Development of a Shibboleth Service Provider module responsible for the creation and exchange of Shibboleth data exchange  Task 3. Development of an eduGAIN BE to provide direct access to the con- federation infrastructure  Task 4. Definition of the authentication methods to be used by the end users in order to demonstrate their digital identity.  Task 5. Extension of the existing XACML context manager in order to interpret the eduGAIN/Shibboleth SAML credentials.  Task 6. Validate the resulting architecture.

TF-EMC2 Main goals Third Goal: Global Single Sign On (SSO) Users will be authenticated once, during the network access control phase The eduGAIN/Shibboleth authentication would be bootstrapped from the NAS-SAML New PEAP method for delivering authentication credentials and new security middleware

TF-EMC2 Main goals Third Goal: Global Single Sign On (SSO) RELATED ACTIVITIES: Activity 4. Development of a global SSO  Task 1. Analysis of the requirements of a new PEAP authentication method able to exchange the necessary eduGAIN/Shibboleth signed tokens.  Task 2. Development of the client and server software modules implementing the specified PEAP method..  Task 3. Design and develop the middleware able to manage the signed Shibboleth tokens that will be then provided to the resource providers  Task 4. Modify the existing service providers in order to include a custom SSO profile based on a push method, that is, a method where the end users are able to provide the required authentication credentials.  Task 5. Validate the resulting system.

TF-EMC2 Main goals Fourth Goal: Authorization mechanisms for application-level services Mainly focused on Grid Computing Grid Services have specific components for authorization purposes We plan to link that components with the existing authorization infrastructure, using standard extension points:  OGSA-Authz  MyProxy  GridShib RELATED ACTIVITIES: Activity 5. Deployment of an authorization mechanism for an application-level service: Grid Computing.  Task 1. Analysis of the different Grid platforms that are being currently used in the different European initiatives.  Task 2. Analysis of the GridShib tool as starting point to provide authorization services to Grids.  Task 3. Definition of the set of attributes used to describe grid-relevant properties.  Task 4. Modify the existing network of AAA servers in order to add the Grid-related policies and attributes.  Task 5. Validate the resulting authorization services.

TF-EMC2 Budget In order to accomplish this proposal, the time and cost estimation is as follow: Activity 1-3: Man Month (MM) Effort: 14 MM Activity 4-6: 18 MM Technical coordination 6 MM Total Effort: 40 MM Based on this schema, we estimate: A 16 month project for 2 persons full time A cost of euros