Abdelilah Essiari Gary Hoo Keith Jackson William Johnston Srilekha Mudumbai Mary Thompson Akenti - Certificate-based Access Control for Widely Distributed.

Slides:



Advertisements
Similar presentations
InterScan AppletTrap Zhang Hong Trend Micro, AppletTrap Team (Nanjing)
Advertisements

Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing Xinwen Zhang Francesco Parisi-Presicce Ravi Sandhu
GridWorld 2006 Use of MyProxy for the FusionGrid Mary Thompson Monte Goode GridWorld 2006.
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Data Management Expert Panel - WP2. WP2 Overview.
Authorization Policy in a PKI Environment
Chapter 17: WEB COMPONENTS
Authenticated QoS Signaling William A. (Andy) Adamson Olga Kornievskaia CITI, University of Michigan.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Chapter 9 Deploying IIS and Active Directory Certificate Services
Grid Security. Typical Grid Scenario Users Resources.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
DGC Paris Community Authorization Service (CAS) and EDG Presentation by the Globus CAS team & Peter Kunszt, WP2.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
SIS: Secure Information Sharing for Windows Systems Osama Khaleel CS526 Semester Project.
X.509 at the University of Michigan CIC-RPG Meeting June 7, 1999 Kevin Coffman Bill Doster
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Configuring Active Directory Certificate Services Lesson 13.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Masud Hasan Secue VS Hushmail Project 2.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
The Windows NT ® 5.0 Public Key Infrastructure Charlie Chase Program Manager Windows NT Security Microsoft Corporation.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Unit 1: Protection and Security for Grid Computing Part 2
Configuring Directory Certificate Services Lesson 13.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
Module 9: Fundamentals of Securing Network Communication.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Supporting further and higher education The Akenti Authorisation System Alan Robiette, JISC Development Group.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
CHEP03 Mar 25Mary Thompson Fine-grained Authorization for Job and Resource Management using Akenti and Globus Mary Thompson LBL,Kate Keahey ANL, Sam Lang.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Windows Role-Based Access Control Longhorn Update
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
Module 13: Enterprise PKI Active Directory Certificate Services (AD CS)
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Globus and PlanetLab Resource Management Solutions Compared M. Ripeanu, M. Bowman, J. Chase, I. Foster, M. Milenkovic Presented by Dionysis Logothetis.
WEB SERVER SOFTWARE FEATURE SETS
X.509 Proxy Certificates for Dynamic Delegation Ian Foster, Jarek Gawor, Carl Kesselman, Sam Meder, Olle Mulmo, Laura Perlman, Frank Siebenlist, Steven.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
The Hierarchical Trust Model. PGP Certificate Server details Fast, efficient key repository –LDAP, HTTP interfaces Secure remote administration –“Pending”
Adding Distributed Trust Management to Shibboleth Srinivasan Iyer Sai Chaitanya.
MGRID Architecture Andy Adamson Center for Information Technology Integration University of Michigan, USA.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
EMI is partially funded by the European Commission under Grant Agreement RI Common Authentication Library Daniel Kouril, for the CaNL PT EGI CF.
Grid Security.
Adding Distributed Trust Management to Shibboleth
Public Key Infrastructure from the Most Trusted Name in e-Security
O. Otenko PERMIS Project Salford University © 2002
Presentation transcript:

Abdelilah Essiari Gary Hoo Keith Jackson William Johnston Srilekha Mudumbai Mary Thompson Akenti - Certificate-based Access Control for Widely Distributed Resources

Motivation l Distributed computing environments, collaborative research environments l Resources, stakeholders and users are all distributed l Spanning organizational as well as geographical boundaries, e.g., DOE Collaboratories l Requires a flexible but secure way to identify users l Requires a flexible and secure way for stakeholders to remotely specify access control for their resources

Goals l Access based on policy statements made by stakeholders l Handle multiple independent stakeholders for a single resource l Use Public Key Infrastructure standards to identify users and create digitally signed certificates l Emphasize usability

Approach l Public Key Infrastructure (PKI) l Architecture l Usability features

Public Key Infrastructure l Provides a uniform way for organizations to identify people or other entities through X.509 identity certificates containing public keys. l These certificates and keys can be used though secured connections (SSL) and possession of a private key to establish the identity of the entities on the connection. l The keys can be used to provide digital signatures on documents. The authors and contents of signed documents can be verified at the time of use. l Public Key Infrastructure is beginning to be widely deployed in terms of organizations running Certificate Authorities.

Akenti Access Control l Minimal local Policy Files (authorization files). Who to trust, where to look for certificates. l Based on the following digitally signed certificates: n X.509 certificates for user authentication n UseCondition certificates containing stakeholder policy n Attribute certificates in which a trusted party attests that a user possesses some attribute, e.g. training, group membership l Can be called from any application that has an authenticated user’s identity certificate and a unique resource name, to return that users privileges with respect to the resource.

Required Infrastructure l Certificate Authority to issue identity certificates (required) n SSLeay provides simple CA for testing n Netscape CA - moderate cost and effort n Enterprise solutions - Entrust, Verisign, … l Method to check for revocation of identity certificates (required) n LDAP server - free from Univ. of Mich.. Or comes with Netscape CA n Certificate Revocation lists - supported by most CA’s l Network accessible ways for stakeholders to store their certificates (optional) n Web servers n MSQL web accessible data bases

Web Server Database Server LDAP Certificate Servers Akenti Identity (X509) certificate on behalf of the user. Internet File Servers Fetch Certificate Cache Manager Log Server Use condition or attribute certificates Identity certificates DN AKENTI ARCHITECTURE Client DN Resource Server

Stakeholders C1(S1) C4(S4) C2(S2)C3(S3) S1S2 S3S4 Certificate Servers AKENTI CERTIFICATE MANAGMENT Akenti Certificate Generator Hash Generator Search based on resource name, user DN, and attribute

Emphasis on usability l Akenti certificate generators provide a user friendly interface for stakeholders to specify the use constraints for their resources. l User or stakeholder can see a static view of the policy that controls the use of a resource. l Akenti Monitor applet provides a Web interface for a user to check his access to a resource to see why it succeeded or failed.

Vulnerabilities l Distributed certificates might not be available when needed. l Independent stakeholders may create a policy that is inconsistent with what they intend. Easy to deny all access.

Related Work l Ellison, et.al. SPKI - authorization certificates l Nekander & Partanen (HUT) SPKI style certificates for access permissions on Java code. To replace per/machine Java policy files. l Blaze,Feigenbaum Policy Maker and KeyNote based on authorization certificates written in a specified executable language. l Foster, Kesselman Globus Use of X.509 identity certificates to authenticate users. l Ryutov, Neuman Generic Authorization and Access- control API - and IETF draft standard t define an interface for authorization.

Status l Akenti enabled Apache Web servers deployed at LBNL and Sandia. n Controlling Akenti code distribution, secure data/image repository, ORNL electronic notebooks l We have given code to CONDOR, Univ. of Wisc., WebFlow at Syracuse Univ., NIST, and ISI/USC l Servers run on Solaris, but client code runs on Linux as well l Java interface to Akenti policy engine exists and is used by the Anchor agent code.

Future Directions l Implement Akenti as a standalone server l Expand Use Conditions to include dynamic variables such as time-of-day, originating IP address, state variables. l Change syntax of certificates, probably to XML. We already have a Matchmaker want-ad style in addition to our original key-word/value syntax. l Add delegation - probably in the form of authorization certificates l Integrate with additional applications n Network bandwidth Quality of service, n Secure Mobile agents, n Group key agreement protocol.

Conclusions l As enterprises deploy PKI, identifying users by their identity certificates will become natural and transparent. n Currently there are several competing standards m browsers, Netscape and Explorer m Entrust - own client interface l Akenti/SSL overhead acceptable for medium grained access checking. E.g, starting an operation, making a authenticated connection. l Ease of use for stakeholders must be emphasized.