To Authentication and Beyond An update on C&C’s authentication-related middleware services UW Computing Support Staff Meeting December 16, 2004

Slides:



Advertisements
Similar presentations
Open Grid Forum 19 January 31, 2007 Chapel Hill, NC Stephen Langella Ohio State University Grid Authentication and Authorization with.
Advertisements

EduPerson and Federated K-12 Activities InCommon/Quilts Pilot Group February 27, 2014 Keith Hazelton UW-Madison, InCommon/I2.
Copyright Tom Parker, Ron DiNapoli, Andrea Beesing, Joy Veronneau This work is the intellectual property of the authors. Permission is granted for.
Sponsored by the National Science Foundation Campus Policies for the GENI Clearinghouse and Portal Sarah Edwards, GPO March 20, 2013.
Technical Issues with Establishing Levels of Assurance Zephyr McLaughlin Lead, Security Middleware Computing & Communications University of Washington.
Intra-campus Web SSO Management Topics for Deployed Campuses Nathan Dors, Technology Manager University of Washington CAMP Shibboleth June 25-27, 2007.
2006 © SWITCH Authentication and Authorization Infrastructures in e-Science (and the role of NRENs) Christoph Witzig SWITCH e-IRG, Helsinki, Oct 4, 2006.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
Public Key Infrastructure at the University of Pittsburgh Robert F. Pack, Vice Provost Academic Planning and Resources Management March 27, 2000 CNI Spring.
Understanding Active Directory
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Introduction to Grouper. Open source, community-driven project of the Internet2 Middleware Initiative Initial release v0.5 in December 2004 Grouper originally.
Security Middleware Update IS Development Staff Forum December 8, 2004.
The Access Management Puzzle: Putting the Pieces Together Identity and Access Management at the UW Ian Taylor Manager of Security Middleware University.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Administrative Information Systems Shibboleth: The Next Generation ISIS Technical Information Session for Developers Datta Mahabalagiri March
Managing Information UT November 13-14, 2008 Campus Identity and Access Management Services.
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
Copyright Copyright Ian Taylor This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Shibboleth-intro-dec051 Shibboleth A Technical Overview Tom Scavo NCSA.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
Authorization Scenarios with Signet RL “Bob” Morgan University of Washington Internet2 Member Meeting, September 2004.
Introduction to Grouper Part 1: Access Management & Grouper Tom Barton University of Chicago and Internet2 Manager – Grouper Project.
Australian Access Federation Robert Hazeltine Identity and Access Management Enterprise Systems Office.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 Shibboleth Pilot Local Authentication.
I2/NMI Update: Signet, Grouper, & GridShib Tom Barton University of Chicago.
Maturation & Convergence in Authentication & Authorization Services in US Higher Education: Keith Hazelton, Sr. IT Architect, University.
TeraGrid Science Gateways: Scaling TeraGrid Access Aaron Shelmire¹, Jim Basney², Jim Marsteller¹, Von Welch²,
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
NMI-EDIT CAMP Synopsis, ISCSI Storage Solution, Linux Blade Cluster, And Current State Of NetID By Jonathan Higgins Presentation Template available from.
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
SUNY System Administration Federation Overview Gavin Hogan July 15th, 2009 A work in progress….
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
COMPDIRS NATHAN DORS APRIL 16, AGENDA  IAM – who we are, what we do  HRP Modernization & Workday  What’s new in IAM?  Identity.UW soft.
Helsinki Institute of Physics (HIP) Liberty Alliance Overview of the Liberty Alliance Architecture Helsinki Institute of Physics (HIP), May 9 th.
Shibboleth as Attribute Delivery for Authorization Renee Shuey Penn State University June 27, 2006.
Middleware Support for Virtual Organizations Internet 2 Fall 2006 Member Meeting Chicago, Illinois Stephen Langella Department of.
Module 9: Fundamentals of Securing Network Communication.
GridShib: Grid/Shibboleth Interoperability September 14, 2006 Washington, DC Tom Barton, Tim Freeman, Kate Keahey, Raj Kettimuthu, Tom Scavo, Frank Siebenlist,
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
Integrated Institutional Identity Infrastructure: Implications and Impacts RL “Bob” Morgan University of Washington Internet2 Member Meeting, May 2005.
Information Technology Current Work in System Architecture January 2004 Tom Board Director, NUIT Information Systems Architecture.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
University of Washington Identity and Access Management IEEAF – RENU Network Design Workshop Seattle - 29 Nov 2007 Lori Stevens, Director, Distributed.
E-Authentication & Authorization Presentation to the EA2 Task Force March 6, 2007.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Identity Management, Federating Identities, and Federations November 21, 2006 Kevin Morooney Jeff Kuhns Renee Shuey.
Authorization: Just when you thought middleware was no fun anymore Keith Hazelton, Senior IT Architect, Univ. of Wisconsin-Madison Member, Internet2 Middleware.
Shibboleth Use at the National e-Science Centre Hub Glasgow at collaborating institutions in the Shibboleth federation depending.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Fermilab supports several authentication mechanisms for user and computer authentication. This talk will cover our authentication systems, design considerations,
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
OpenRegistry MACE-Dir 5/18/09 1 OpenRegistry Initiative Revisiting the Management of Electronic Identity Benjamin Oshrin Rutgers University May 2009.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
OpenRegistry LSM 10/7/09 1 OpenRegistry Revisiting the Management of Electronic Identity Benjamin Oshrin Rutgers University July 2009.
Identity and Access Management
Federated Identity Management at Virginia Tech
I2/NMI Update: Signet, Grouper, & GridShib
John O’Keefe Director of Academic Technology & Network Services
e-Infrastructure Workshop 28th March 2006, University of Leeds
THE STEPS TO MANAGE THE GRID
PASSHE InCommon & Federated Identity Workshop
Copyright Copyright Ian Taylor This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Shibboleth as Attribute Delivery for Authorization
Open Source Web Initial Sign-On Packages
Identity Management at the University of Florida
Technical Issues with Establishing Levels of Assurance
Presentation transcript:

To Authentication and Beyond An update on C&C’s authentication-related middleware services UW Computing Support Staff Meeting December 16,

Topics Authentication in Context –within identity management –toward our communities of service Authentication Infrastructure Services –UW NetID, Kerberos, SecurID (for people) –UW Services CA (for servers and services) –Pubcookie –Shibboleth Authorization Infrastructure Services –UW Groups –ASTRA

Identity Management? “Identity management is the set of business processes, and a supporting infrastructure, for the creation, maintenance, and use of digital identities.” - The Burton Group (market research firm specializing in enterprise IT infrastructure) How does this compare with, and fit into, our conception of C&C’s (middleware) infrastructure services?

Basic functions of IdM ReflectData of interest from SoR JoinMatch identity across SoR CredentialNetID, password, SecurID Manage Affil/GroupsBasic/flat AuthZ info Manage PrivilegesStructured AuthZ info ProvisionFor apps w/ attitude DeliverGet AuthZ info to app AuthenticateCheck identity claims AuthorizeMake allow/deny decision LogTrack usage for audit Original source: Keith Hazelton, Univ of Wisconsin

IdM functions & big picture Reflect Join Credential Deliver (AuthN) Provision AuthZ Mng Grps Mng Priv Log Source: Keith Hazelton, Univ of Wisconsin; Tom Barton, Univ of Chicago

Many communities to serve Central Services –C&C maintained, administrative services Local Community, that’s you! –enabling departmental services Federated Communities –external partnerships, virtual organizations –some 3rd-party hosted applications –this is you too! C&C’s infrastructure services need to serve the unique requirements of each community.

Another view… Image source: Keith Hazelton, Univ of Wisconsin

Definitions Basic: –Authentication says who you are. –Authorization says what you can do. Something geekier: –Authentication is the establishment of a security context based on evaluation of evidence. –Authorization is configuration and operation of systems so actions in support of organizational goals are permitted and other actions are prohibited.

UW NetIDs Primary digital credential for online services at the UW About 225,000 active UW NetIDs 3-8 characters in length They’re a service to users –single id, single password, maybe even some single sign-on Get in the game! –namespace first, authentication if you can

UW NetID passwords Uniform policy for all passwords 8 characters or longer Must pass strength test Regular changing recommended Not externally provisioned

UW NetID types Personal –belongs to a single person for life Shared/supplemental –group id; actions not easily audited Reserved –system account Tremporary –use by one person, temporarily Other –kerberos host mailing list names

UW NetID populations All employees in UW payroll –including HMC, HHMI, affiliate faculty, UWRP retirees All UW students –including matriculated, non-matriculated, UW extension, UWT and UWB; and applicants too Some Clinicians –e.g., UW Medical Center, from Cancer Care Alliance, Children’s hospital, UW Physicians network

UW NetID populations… C&C Information additions –including sponsored and supplemental ids, temporary ids (guest wireless) UW Alumni ID holders –e.g., graduates in the alumni db, UW donors and others too, e.g. –some Digital Learning Commons users –Cascadia Community College students and employees (very soon)

Kerberos infrastructure UW’s Enterprise Authentication Service Fundamental credential store MIT Kerberos V (version 1.3.5) Do departments need service principals and host keys for departmental systems? –If so, we haven’t seen the demand –If so, we can create a storefront, similar to the UW CA and Weblogin registration services, based on UW DNS ownership info

SecurID infrastructure High-assurance authentication service based on SecurID technology Provides “two-factor” authentication –something you know + something you have Use is primarily administrative systems About 5,600 SecurIDs in use About $60 per device Use is not likely to expand much

UW Services CA Issues digital certificates for –Traditional web server uses –Systems and services using SSL/TLS 767 certificates in use What best practices are emerging in departments to trust the UW CA? Support calls? Very few (our perception, yours too?)

UW CA growth

Pubcookie/Weblogin Purpose –Normalize web-based user authentication –Deliver UW NetID authentication info to apps Participation –Registration based on UW DNS ownership –Requires trusted SSL server certificate –Over 790 participating servers

Pubcookie New functionality –POST-based cross-dns-domain messaging –Custom login messages –Keyserver supports wildcard certs –Keyserver supports Subject Alt Names Release info –Beta 1 release available now (Apache only) –Beta 2 release available tomorrow(ish) Will be the recommended version for UW!

Custom login messages Example: ESS login

Shibboleth Purpose –An architecture, project, and software components for standards-based federated authentication and attribute exchange. –Like Pubcookie on steroids (mostly SAML standard) User support profile –Should be similar to Pubcookie… –Except now there are Attribute Release Policies (ARPs) involved

Shibboleth… UW is a Shibboleth “Identity Provider” (IdP) –Running Shibboleth IdP 1.2 –Production service status with first real Service Provider (CreateHope.com, e-academy.com) –User authentication by Pubcookie/weblogin –User attributes from UW EDS Person directory –Participating in InCommon (R&E) federation; “authenticate locally, act federally” –UW NetID credential services undergoing USG E- Authentication Program credential assessment

What can our Shib IdP deliver? Answer: in general, user attributes of broad cross-community interest: –eduPersonPrincipalName (based on UW NetID) –eduPersonAffiliation (faculty, student, staff, alum, member, affiliate, employee) –eduPersonEntitlement –eduPersonTargetedID –uwPersonAffiliation –uwEmployeeID Qualifier: but only if an Attribute Release Policy allows release to a given service provider.

Authority management Why externalize authorization? –To save development time and cost ASTRA is built and ready for use UW Groups are coming –To distribute management of authorization If you want to hand it off to others, you can Put business people in charge of managing authority –To leverage well designed and maintained solutions –To use standard UIs for managing authorization data –To increase visibility of access control policy –To improve policy adherence and auditing

UW Groups UW EDS Groups directory under development –Institutional –Departmental –Adhoc Pairing with new UW Authorization module (for Apache, known as mod_uwa) Infrastructure alone, not enough… Need to study institutional triggers and indicators for departmental-level group creation

ASTRA Mission ASTRA provides Web-based management of authority for UW administrative applications. ASTRA removes systems administrators and operations teams from the business of implementing authorization requests. Instead, using ASTRA, the appropriate decision makers within the University community can easily distribute authority to the appropriate people.

ASTRA authority elements example By authority of Rupert B., authorizor Nathan Dors, user within Financial Desktop, application in the role of Designee, role may inquire about budget information level of access for budget access restriction from to condition

ASTRA authority elements example… ASTRA UI: initial Authorizor view

ASTRA authority elements example… ASTRA UI: defining new authorization

ASTRA authority elements example… ASTRA UI: adding new authorization

ASTRA authority elements example… ASTRA UI: new authorization added

ASTRA authority elements example… <authz xmlns:xsd=" xmlns:xsi=" ASTRA API: attributes received in XML view

ASTRA: Clients in Production SAGE Ariba System Administration E-Procurement Online Work Leave System Affirmative Action Department Tools for Time Schedule FS-Works Employee Self-Service

ASTRA: Clients in Development Financial Desktop Space Inventory Management System Online Accident Reporting System Year End Tax Form VEBA PUC Maintenance Application Vendor Payment System

ASTRA: Clients in Discussion MyGradProgram Online Payroll Update System UW Project Tracker Cognos Tools (Data Warehouse) Keynes Applications (PAS, FIN, etc.)

ASTRA: Usage Since Launch

To Authentication and Beyond… How far out do C&C’s various infrastructure services reach? Kerberos Pubcookie Shibboleth UW Groups ASTRA Answer: the necessary roadmaps are being defined now. Image source: Keith Hazelton, Univ of Wisconsin