Security Issues in Physics Grid Computing Ian Stokes-Rees OeSC Security Working Group 14 June 2005.

Slides:



Advertisements
Similar presentations
Introduction of Grid Security
Advertisements

Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
GT 4 Security Goals & Plans Sam Meder
Role Based VO Authorization Services Ian Fisk Gabriele Carcassi July 20, 2005.
Middleware technology and software quality issues Andrew McNab Grid Security Research Fellow University of Manchester.
High Performance Computing Course Notes Grid Computing.
Lecture 23 Internet Authentication Applications
Andrew McNab - EDG Access Control - 14 Jan 2003 EU DataGrid security with GSI and Globus Andrew McNab University of Manchester
Grid Security. Typical Grid Scenario Users Resources.
The Community Authorisation Service – CAS Dr Steven Newhouse Technical Director London e-Science Centre Department of Computing, Imperial College London.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Services Abderrahman El Kharrim
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
DGC Paris Community Authorization Service (CAS) and EDG Presentation by the Globus CAS team & Peter Kunszt, WP2.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
CoreGRID Workpackage 5 Virtual Institute on Grid Information and Monitoring Services Authorizing Grid Resource Access and Consumption Erik Elmroth, Michał.
Military Technical Academy Bucharest, 2006 SECURITY FOR GRID INFRASTRUCTURES - Grid Trust Model - ADINA RIPOSAN Department of Applied Informatics.
Slides for Grid Computing: Techniques and Applications by Barry Wilkinson, Chapman & Hall/CRC press, © Chapter 1, pp For educational use only.
1-2.1 Grid computing infrastructure software Brief introduction to Globus © 2010 B. Wilkinson/Clayton Ferner. Spring 2010 Grid computing course. Modification.
Globus Computing Infrustructure Software Globus Toolkit 11-2.
GT Components. Globus Toolkit A “toolkit” of services and packages for creating the basic grid computing infrastructure Higher level tools added to this.
Ákos FROHNER – DataGrid Security Requirements n° 1 Security Group D7.5 Document and Open Issues
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
Grid Security 1. Grid security is a crucial component Need for secure communication between grid elements  Authenticated ( verify entities are who they.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Module 9: Fundamentals of Securing Network Communication.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Grid Middleware Tutorial / Grid Technologies IntroSlide 1 /14 Grid Technologies Intro Ivan Degtyarenko ivan.degtyarenko dog csc dot fi CSC – The Finnish.
June 24-25, 2008 Regional Grid Training, University of Belgrade, Serbia Introduction to gLite gLite Basic Services Antun Balaž SCL, Institute of Physics.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
User Management: Authentication & Authorization on the NorduGrid Balázs Kónya, AndersWäänänen 3 rd NorduGrid Workshop, 23 May, 2002 Helsinki.
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Role Based VO Authorization Services Ian Fisk Gabriele Carcassi July 20, 2005.
US LHC OSG Technology Roadmap May 4-5th, 2005 Welcome. Thank you to Deirdre for the arrangements.
Conference name Company name INFSOM-RI Speaker name The ETICS Job management architecture EGEE ‘08 Istanbul, September 25 th 2008 Valerio Venturi.
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Trusted Virtual Machine Images a step towards Cloud Computing for HEP? Tony Cass on behalf of the HEPiX Virtualisation Working Group October 19 th 2010.
Grid Authorization Landscape and Futures Von Welch NCSA
Glite. Architecture Applications have access both to Higher-level Grid Services and to Foundation Grid Middleware Higher-Level Grid Services are supposed.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Grid technology Security issues Andrey Nifatov A hacker.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
David Adams ATLAS ATLAS distributed data management David Adams BNL February 22, 2005 Database working group ATLAS software workshop.
Office of Science U.S. Department of Energy Grid Security at NERSC/LBL Presented by Steve Chan Network, Security and Servers
Securing the Grid & other Middleware Challenges Ian Foster Mathematics and Computer Science Division Argonne National Laboratory and Department of Computer.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
Ákos FROHNER – DataGrid Security n° 1 Security Group TODO
VOMS Attribute Authorities Michael Helm ESnet/LBNL 23 Feb 2007.
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
VOX Project Tanya Levshina. 05/17/2004 VOX Project2 Presentation overview Introduction VOX Project VOMRS Concepts Roles Registration flow EDG VOMS Open.
Placeholder ES 1 CERN IT EGI Technical Forum, Experiment Support group AAI usage, issues and wishes for WLCG Maarten Litmaath CERN.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
OSG Security: Updates on OSG CA & Federated Identities Mine Altunay, PhD OSG Security Team OSG AHM March 24, 2015.
Trusted Virtual Machine Images the HEPiX Point of View Tony Cass October 21 st 2011.
EGEE is a project funded by the European Union under contract INFSO-RI DGAS Grid accounting L.Gaido on behalf of A.Guarise LCG Workshop November.
OGF PGI – EDGI Security Use Case and Requirements
Grid Security.
LCG Security Status and Issues
Ian Bird GDB Meeting CERN 9 September 2003
THE STEPS TO MANAGE THE GRID
The New Virtual Organization Membership Service (VOMS)
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
The Globus Toolkit™: Information Services
The Anatomy and The Physiology of the Grid
The Anatomy and The Physiology of the Grid
Grid Computing Software Interface
Presentation transcript:

Security Issues in Physics Grid Computing Ian Stokes-Rees OeSC Security Working Group 14 June 2005

Outline Issues (20 mins) Ideas (10 mins) Discussion (15-20 mins) I am not a security person, but I recognize it is essential for large scale grid computing of which I have some experience trying to “do”. Please interject, disagree, question anything I say.

Pieces of the Puzzle People Physicists Sys Admins VO managers Software developers Hardware Individual computers Computing centres Networks Software Operating system/host specific Site specific VO specific Communal grid s/w Services service class service instance User software parallel/cooperating jobs

Authorization Domains 3 Authz domains: Site specific (which we know well) VO/grid (which we’re working on) User configurable All need to give the “thumbs up” for data access service access execution

Usage Control and Costing Utilisation/Usage tracking Charging Fair share/dynamic access control Paradigms Turn a tap Release funds to an account

Privacy Data access Information leakage through meta-data through “recipe” to create data Access to entity identity/authentication tokens “unavoidable” through delegation/service access? Not such a big issue for particle physicists

Correctness Who generated this file data result Is it correct? Do I trust the source? What version(s) of software was used? What was the workflow?

Virtual Organisations Entities need to exist in security domains which span physical domains Virtual Organisations VOs are dynamic constantly changing membership must be easy to setup/destroy/propagate VOs are themselves (internally) hierarchical VO managers, even “per-role” managers Need automation Issuing of “rights” and membership Policies Services Sites want to make “block” arrangements with VOs and not negotiate terms with every user

Roles Current “user security” infrastructure has one focus: “I am Ian Stokes-Rees” because I know a password because I have a certificate signed by a trusted CA which has been told by a trusted RA that they should sign that certificate and give it to me Sites say: Ian Stokes-Rees can access this system submit batch jobs read/write data VO says: Ian Stokes-Rees is part of our VO (But at the moment only one VO can say this...) This isn’t very exciting, or a very big step but a journey of a thousand miles starts with one step

Roles II Authorization by sites or services is then per- entity Or “We trust this VO and will import/mirror their entire user list” Need to be able to say: “I am a Physics Working Group Coordinator” “I am an LHCb Data Curation Manager” “I trust CERN software services” So we need roles And of course services and hosts have roles And each entity may have multiple roles

Tickets Tickets imply time limited/windowed specific rights may be entity-bound or may be transferable Need a “Ticket Server” Or more likely a network of ticket servers Need some way to manage a ticket collection and probably to decide which tickets to use I am still trying to decide if tickets and roles are different

Decoupled There needs to be points of commonality understood data formats But there needs to be freedom of implementation different protocols different usages Need to identify fundamental requirements and representation leave implementation and handling open to different approaches

Scenario Users Software Services Site Administrators Grid Computing

Users Construct an “identity” time based permissions specify a set of roles collect and bind together a set of tickets meta-permissions (identity-bound policy?) can the identity delegate who can communicate with the identity Specify which identity to use for which operations Bind identity to data implications of identity “expiring” Use sets of identities is this different to roles or credential wallet? yes, if they are mutually exclusive identities no, if they are complimentary

Software Services Software needs to have its own security profile: identity token credentials (roles, access tickets) But also needs to accept delegated responsibility from other users, to perform operations on their behalf from other services (or maybe not?) Operates in a larger security domain (site, host and VO) this will imply “inherited” policy

System Administrators Need (and in many ways have) ultimate control over who accesses their systems, executes programs, reads and writes data Will have dynamic policies based on night, day, weekend, load level, maintenance Need it to be simple

Grid Computing specific example of Users and Software Services coming together many different tokens may be required to access grid resources run on a specific site collect data from different sources write data to different sources access remote services (e.g. database) draw “funds” from different accounts

Ideas PKI based infrastructure Credential wallet Timed credentials Tickets and Roles are equivalent Roles are just “long lived” tickets Two classes: transferable credentials identity locked credentials Also “receiver locked” credentials/identity (PK encrypted) Tickets, Grid Bucks, Reservation, and Resource Management somehow related

Questions Are roles and tickets different? Is PKI the only obvious way to do this right now? How good is PKI support for roles and/or tickets? What standards exist to support this? What libraries exist to make it happen? Where are we with Grid Economies?