1 The Cryptographic Token Key Initialization Protocol (CT-KIP) Web Service Description KEYPROV WG IETF-68 Prague March 2007 Andrea Doherty.

Slides:



Advertisements
Similar presentations
1 IETF KEYPROV WG Protocol Basis and Characteristics IEEE P April 11, 2007 Andrea Doherty.
Advertisements

Dynamic Symmetric Key Provisioning Protocol (DSKPP)
18 Copyright © 2005, Oracle. All rights reserved. Distributing Modular Applications: Introduction to Web Services.
The Cryptographic Token Key Initialization Protocol (CT-KIP) OTPS Workshop February 2006.
CT-KIP Magnus Nyström, RSA Security OTPS Workshop, October 2005.
Web Service Ahmed Gamal Ahmed Nile University Bioinformatics Group
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Scale Up Access to your 4GL Application using Web Services
Chapter 19: Network Management Business Data Communications, 4e.
1 Introduction to XML. XML eXtensible implies that users define tag content Markup implies it is a coded document Language implies it is a metalanguage.
G O B E Y O N D C O N V E N T I O N WORF: Developing DB2 UDB based Web Services on a Websphere Application Server Kris Van Thillo, ABIS Training & Consulting.
Latest techniques and Applications in Interprocess Communication and Coordination Xiaoou Zhang.
Technical Architectures
J2ME Web Services Specification.  With the promise to ease interoperability and allow for large scale software collaboration over the Internet by offering.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
FI-WARE – Future Internet Core Platform FI-WARE Cloud Hosting July 2011 High-level description.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
What is adaptive web technology?  There is an increasingly large demand for software systems which are able to operate effectively in dynamic environments.
The Dynamic Symmetric Key Provisioning Protocol (DSKPP)
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Sys Prog & Scripting - HW Univ1 Systems Programming & Scripting Lecture 15: PHP Introduction.
Architecture Of ASP.NET. What is ASP?  Server-side scripting technology.  Files containing HTML and scripting code.  Access via HTTP requests.  Scripting.
PPSP Tracker Protocol draft-gu-ppsp-tracker-protocol PPSP WG IETF 82 Taipei Rui Cruz (presenter) Mário Nunes, Yingjie Gu, Jinwei Xia, David Bryan, João.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
1 Web Services Distributed Systems. 2 Service Oriented Architecture Service-Oriented Architecture (SOA) expresses a software architectural concept that.
Jaeki Song ISQS6337 JAVA Lecture 16 Other Issues in Java.
Enabling Embedded Systems to access Internet Resources.
GT Components. Globus Toolkit A “toolkit” of services and packages for creating the basic grid computing infrastructure Higher level tools added to this.
Dynamic Symmetric Key Provisioning Protocol (DSKPP) Mingliang Pei Salah Machani IETF68 KeyProv WG Prague.
Grid Resource Allocation and Management (GRAM) Execution management Execution management –Deployment, scheduling and monitoring Community Scheduler Framework.
COMP3019 Coursework: Introduction to GridSAM Steve Crouch School of Electronics and Computer Science.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Livespace Architecture. Overview Livespace requirements Discussion of issues Livespace Architecture.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV BOF IETF-67 San Diego November 2006 Andrea Doherty.
DSKPP And PSKC: IETF Standard Protocol And Payload For Symmetric Key Provisioning Philip Hoyer Senior Architect – CTO Office.
DSKPP And PSKC: IETF Standard Protocol And Payload For Symmetric Key Provisioning Philip Hoyer Senior Architect – CTO Office.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
Web Services. Abstract  Web Services is a technology applicable for computationally distributed problems, including access to large databases What other.
1 82 nd IETF meeting NETCONF over WebSocket ( ) Tomoyuki Iijima, (Hitachi) Hiroyasu Kimura,
Web Services Presented By : Noam Ben Haim. Agenda Introduction What is a web service Basic Architecture Extended Architecture WS Stacks.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
INTRODUCTION TO WEB APPLICATION Chapter 1. In this chapter, you will learn about:  The evolution of the Internet  The beginning of the World Wide Web,
1 3GPP2 GBA Overview Adrian Escott Chair, TSG-S WG4 24 May 2006.
Saving State on the WWW. The Issue  Connections on the WWW are stateless  Every time a link is followed is like the first time to the server — it has.
March 2006IETF 65 - Dallas1 The Cryptographic Token Key Initialization Protocol (CT-KIP) Dave Mitton, RSA Security for Magnus Nyström IETF SAAG.
S imple O bject A ccess P rotocol Karthikeyan Chandrasekaran & Nandakumar Padmanabhan.
SOAP-based Web Services Telerik Software Academy Software Quality Assurance.
Module: Software Engineering of Web Applications Chapter 2: Technologies 1.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV WG IETF-68 Prague March 2007 Andrea Doherty.
SACRED REQUIREMENTS DOCUMENT Stephen Farrell, Baltimore Alfred Arsenault, Diversinet.
ASP-2-1 SERVER AND CLIENT SIDE SCRITPING Colorado Technical University IT420 Tim Peterson.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Introduction to Web Services Presented by Sarath Chandra Dorbala.
Lecture VI: SOAP-based Web Service CS 4593 Cloud-Oriented Big Data and Software Engineering.
Security API discussion Group Name: SEC Source: Shingo Fujimoto, FUJITSU Meeting Date: Agenda Item: Security API.
Diameter SIP Application
REST API to develop application for mobile devices Mario Torrisi Dipartimento di Fisica e Astronomia – Università degli Studi.
IETF Provisioning of Symmetric Keys (keyprov) WG Update WG Chairs: Phillip Hallam-Baker Hannes Tschofenig Presentation by Mingliang Pei 05/05/2008.
Chapter 19: Network Management
Web Development Web Servers.
Web Programming Developing Web Applications including Servlets, and Web Services using NetBeans 6.5 with GlassFish.V3.
WEB SERVICES.
Chapter 3: Windows7 Part 4.
Ashish Pandit IT Architect, Middleware & Integration Services
Introduction to Web Services and SOA
Saranya Sriram Developer Evangelist | Microsoft
Introduction to Web Services and SOA
Presentation transcript:

1 The Cryptographic Token Key Initialization Protocol (CT-KIP) Web Service Description KEYPROV WG IETF-68 Prague March 2007 Andrea Doherty

2 Goals Define a SOAP-based Web Service interface for use by implementor’s of CT-KIP Provide a generic means for CT-KIP clients and Provisioning services to interoperate Encapsulate CT-KIP protocol using a standard messaging system Extend utilization of CT-KIP within highly available and distributed SOA environments Set a common security assurance level for systems in operation. Provide a scalable solution that can be easily administered

3 Background Since submission of CT-KIP to IETF in 2005, implementations have emerged in the form of software toolkits that create and process protocol messages. These toolkits became core components in certain Web services offering inline token provisioning –“Inline token provisioning” refers to cryptographic token initialization and configuration using CT-KIP –“Initialization” refers to generating and storing a symmetric key –“Configuration” refers to metadata associated with the newly initialized key, which is required so that the relying authentication token can perform its activities As interest grows in CT-KIP, so does the need for a common interface for transporting protocol messages to Web services capable of dynamically provisioning tokens to many types of cryptographic tokens.

4 Usage Domain CT-KIP is only one step in the overall authN token provisioning process, which typically involves: 1.User enrolls for a cryptographic token via a provisioning application (CT-PA) 2.CT-PA fulfills a token (e.g., hardware device and/or software application that runs on a device) to the end-user 3.User triggers initialization and configuration of a key on the token using CT-KIP 4.Upon success, the CT-PA binds the key to the token and activates it for future authentications. CT-KIP-WS is a mechanism for performing Step 3.

5 CT-KIP-WS Deployment Options Although CT-KIP-WS is logically segregated from other CT-PA components, it may be deployed within the same environment, and share the same data storage as the CT-PA. A CT-KIP Web service resides on a Web application server that may run in a clustered or distributed multi- node environment –Although CT-KIP is stateful, the Web service that encapsulates will most likely be stateless. The CT-KIP Client API will typically be deployed on a desktop/laptop or a mobile device (e.g., phone or PDA) that can host the client application –Because some legacy or just technologically simple mobile phone devices do not have native HTTPS capability, it is assumed that messages will be transported over HTTP.

6 CT-KIP-WS Trigger CT-KIP allows for an optional trigger message from the server to get the protocol started –If this type of trigger is required by the application, then it should be handled by a POST from the Web server in accordance with the HTTP binding defined in CT-KIP –The browser resident on the device will receive the trigger and request the application to send the first CT-KIP-WS message –Rationale is that devices that host cryptographic tokens are usually ill-suited for hosting Web APIS capable of serving SOAP requests. In the absence of an explicit trigger message, the CT- KIP protocol is initiated by the CT-KIP-WS ClientHello message.

7 CT-KIP-WS Parameters A CT-PA will typically require a user to authenticate themselves before it will authorize key provisioning –To accommodate this, CT-KIP-WS includes AuthData as a parameter in each request CT-PA may also require token-specific provisioning data, e.g., Device ID/Type, to properly configure the key (i.e., in accordance with policy and applicable business rules) –To accommodate this, CT-KIP-WS includes ProvisioningData as a parameter in each request and response

8 CT-KIP-WS Operations (1) 1. initiates first call to CT- KIP-WS. This request includes: a)AuthData - contains activation code as required by CT-PA. b)ProvisioningData - contains token data, e.g., Device ID/Type. c)Request - contains PDU 2. responds to initial request by CT-KIP-WS. This response includes: a)ProvisioningData – should include ServerNonce as a way of running WS as a stateless service (i.e., ensures CT-KIP client will return it in the next request) b)Response - contains the CT-KIP PDU

9 CT-KIP-WS Operations (2) 1. sends the client nonce to the CT-KIP-WS. This request includes: a)AuthData - contains activation code as required by CT-PA b)ProvisioningData - contains token data, e.g., Device ID/Type. c)Request - contains the CT-KIP PDU 2. returns token configuration data to the CT-KIP client. This response includes: a)ProvisioningData – contains application-specific data required for the client application to configure the token credential b)Response - contains the CT-KIP PDU

10 Open Issues AuthData and ProvisioningData are opaque –Details are left to the application AuthData and ProvisioningData are Mandatory fields –If these parameters are added to the protocol, should they remain in the CT-KIP WS definition? Advantage is it allows authentication to be maintained within the Web session. –If so, then these parameters should be made Optional CT-KIP request and response PDUs are Base64 encoded blobs, which hide PDU details –Intent was for PDUs to be encapsulated by the SOAP messages –PDUs are sent as XML Strings –Design supports cryptographic tokens with small footprints and performance optimization Version information is missing

11 Next steps Broader review of IETF Internet Draft Revise and possibly re-submit draft