David Groep Nikhef Amsterdam PDP & Grid Differentiated and Collaborative Assurance profiling the identity management landscape for diversifying e-Infrastructure.

Slides:



Advertisements
Similar presentations
Appropriate Access InCommon Identity Assurance Profiles David L. Wasley Campus Architecture and Middleware Planning workshop February 2008.
Advertisements

EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI The IGTF IOTA Profile towards differentiated assurance levels.
David Groep Nikhef Amsterdam PDP & Grid Evolving Assurance – IGTF LoA generalisation David Groep Interoperable Global Trust Federation IGTF Documents at.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI - Identity Management Steven Newhouse Director, EGI.eu Federated Identity.
INFSO-RI Enabling Grids for E-sciencE Portals and Authentication Issues and Solution Directions from a CA and IGTF Perspective David.
Authorization WG Update David Kelsey EU Grid PMA, Copenhagen 27 May 2008.
Sponsored by the National Science Foundation GENI Clearinghouse Panel GEC 12 Nov. 2, 2011 INSERT PROJECT REVIEW DATE.
1 Issues in federated identity management Sandy Shaw EDINA IASSIST May 2005, Edinburgh.
INFSO-RI Enabling Grids for E-sciencE JRA3 2 nd EU Review Input David Groep NIKHEF.
NRENs supporting Grids using current Grid technology TERENA NREN-GRID Workshop Amsterdam Milan Sova CESNET.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
David Groep EUGridPMA The International Grid Trust Federation enabling an interoperable global trust fabric also supported by EGI.eu EGI-InSPIRE RI ,
\ Grid Security and Authentication1. David Groep Physics Data Processing group Nikhef.
Geneva, Switzerland, September 2014 Introduction of ISO/IEC Identity Proofing Patrick Curry Director, British Business Federation Authority.
IOTA Questions for RPs Sept 9, 2013 Bucharest, Romania.
LiveAP Towards Differentiated Identity Assurance David Groep, Nikhef supported by the Netherlands e-Infrastructure SURFsara, and EGI.eu O-E-15 and EGI-InSPIRE.
Identity Management Levels of Assurance WLCG GDB CERN, 8 Apr 2009 David Kelsey STFC/RAL david.kelsey AT stfc.ac.uk.
Federated Identity Management for HEP David Kelsey WLCG GDB 9 May 2012.
Shib-Grid Integrated Authorization (Shintau) George Inman (University of Kent) TF-EMC2 Meeting Prague, 5 th September 2007.
Security Update WLCG GDB CERN, 12 June 2013 David Kelsey STFC/RAL.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI Towards Differentiated Identity Assurance as a collaborative.
Ning Zhang, the University of Manchester, UK David Groep, National Institute for Nuclear and High Energy Physics, NL Blair Dillaway, OGF Security Area.
David Groep Nikhef Amsterdam PDP & Grid Evolving Assurance – going where? Collaborative, distributed, and generalized assurance beyond just identity authentication.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
EResearchers Requirements the IGTF model of interoperable global trust and with a view towards FIM4R AAI Workshop Presenter: David Groep, Nikhef.
IOTA Questions for RPs Sept 9, 2013 Bucharest, Romania.
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
Security Policy Update David Kelsey UK HEP Sysman, RAL 1 Jul 2011.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Current status and plans.
A Trust Framework for Security Collaboration among Infrastructures David Kelsey (STFC-RAL, UK) 1 st WISE, Barcelona 20 Oct 2015.
IOTA AP Towards Differentiated Identity Assurance David Groep, Nikhef supported by the Netherlands e-Infrastructure and SURFsara.
A Trust Framework for Security Collaboration among Infrastructures David Kelsey (STFC-RAL, UK) WLCG GDB, CERN 10 Jul 2013.
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
EGI-InSPIRE RI EGI EGI-InSPIRE RI Establishing Identity in EGI the authentication trust fabric of the IGTF and EUGridPMA.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF EUGridPMA status update SHA-2, OCSP, and more David.
David Groep Nikhef Amsterdam PDP & Grid Bring the WLCG federation Home Extending your trust options beyond bottom-up identity by collaborating with global.
European Grid Initiative AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
INTRODUCTION TO IDENTITY FEDERATIONS Heather Flanagan, NSRC.
David Groep Nikhef Amsterdam PDP & Grid AARC Authentication and Authorisation for Research and Collaboration an impression of the road ahead.
Summary of Poznan EUGridPMA32 September EUGridPMA Poznan 2014 meeting – 2 David Groep – Welcome back at PSNC.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF & EUGridPMA status update SHA-2 – and more (David Groep,
News from EUGridPMA EGI OMB, 22 Jan 2013 David Kelsey (STFC) Using notes from David Groep 22/01/20131EUGridPMA News.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
PRACE user authentication and vetting Vincent RIBAILLIER, 29 th EUGridPMA meeting, Bucharest, September 9 th, 2013.
IGTF in 10 years enabling the interoperable global trust federation Nikhef, Amsterdam supported the Dutch national e-Infrastructure funded and coordinated.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI The IGTF IOTA Profile towards differentiated assurance levels.
Building Trust for Research and Collaboration
WLCG Update Hannah Short, CERN Computer Security.
EGI Updates Check-in Matthew Viljoen – EGI Foundation
Bring the WLCG federation Home
Policy in harmony: our best practice
Assessing Combined Assurance
Assessing Combined Assurance
Update - Security Policies
AARC Blueprint Architecture and Pilots
Supporting communities with harmonized policy
OIDC Federation for Infrastructures
Introduction of ISO/IEC Identity Proofing
Appropriate Access InCommon Identity Assurance Profiles
Combined Assurance Model
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
Presentation transcript:

David Groep Nikhef Amsterdam PDP & Grid Differentiated and Collaborative Assurance profiling the identity management landscape for diversifying e-Infrastructure services ISGC2014 David Groep This work is supported by EGI-InSPIRE under NA2 for Global Task O-E-15 and by the Dutch National e-Infrastructure coordinated by SURFsara orcid.org/ http://dx.doi.org/ /m9.figshare.XXXXXX

David Groep Nikhef Amsterdam PDP & Grid Why Do We Trust? Goals single registration for access to many resources with multiple sources of ‘interesting’ trust assertions: user, institute, trusted third parties, communities to provide basis for access control by resources providers in a secure, operationally stable, and available way Reduce over-all burden by adhering to common policy criteria

David Groep Nikhef Amsterdam PDP & Grid Participants Many participants contribute to access control with trustworthy identity and attributes decision rests with the resource … service, site, &c …

Requirements to fulfil Incident Response long-term* traceable independent from short-lived community must be revocable correlate with other information sources banning and containment handle Privacy and data protection important ‘unalienable right’ for research correlation of PII among service providers could allow profiling exchange of PII often fraught with issues Measurement and Accounting publication metrics usage metering, billing auditing and compliance monitoring identity lives in a policy ecosystem to protect all participants commensurate to their risk level Access Control Attribute handle unique binding never re-assigned Regulatory compliance need to know who you let in beforehand

David Groep Nikhef Amsterdam PDP & Grid Whom do we ~ trust? community today often either uses identity from identity authorities (e.g. most EGI VOs) might also be a merger of local user knowledge (e.g. PRACE) resource owners grant access based on both ID authorities directly and community membership which is based on the ID TTPs are typically IGTF classic, MICS and SLCS local knowledge (usually) overrides anything else

David Groep Nikhef Amsterdam PDP & Grid As resource owners in what identity do we trust? It has a ‘name’ Some sort of integrity protection (crypto) An assurer, who says the above is correct but ‘correct’ can mean different things and also ‘integrity protection’ can be different Trusted Identity? Name ‘Crypto’ - a watermark Assurer name

David Groep Nikhef Amsterdam PDP & Grid Most common levels IGTF Classic, MICS, SLCS Name is ‘reasonable representation’ verified against an official document (via a federated ID, in-person meeting, local representative, or notary) Crypto is usually RSA digital signatures Signed by a limited set of authorities, peer-reviewed and namespace-coordinated IGTF’s Classic, MICS and SLCS give ‘roughly equivalent’ assurance level Identity authorities in current e-Infrastructure Interoperable Global Trust Federation –

Risk Action (app) based More constraint actions can lower need for identity LoA (J)SPG VO Portal policy did just that: 4 levels of actions Resource (value) based e.g. access to wireless network does not pose huge risks, so can live with a lower identity LoA (eduroam) Subject (ID/LoA) based Defined identity assurance level Includes Community-given LoA For given actions, resources, and acceptable residual risk, required ID assurance is a given ‘risk envelope’

David Groep Nikhef Amsterdam PDP & Grid Distributed IT infrastructures get more diverse Portals and SAAS Read-only data access, or transient data More (data) sharing between pre-trusted individuals or small groups Pre-vetted infrastructures (XSEDE, wLCG) Does a single level still suffice, or can we redistribute the responsibilities? Beyond a single level for Identity?

Example: user registration in PRACE site B site C site A LDAP user DB allowed User authz Review DB Project attributes user DB user DB Graphic: Vincent Rabbailler (IDRIS and PRACE) EUGridPMA Budapest 2013

IGTF Assurance Process Type and sensitivity of e-Infrastructure services drives the level of assurance required Security and assurance level set to be commensurate ◦ not overly high for ‘commodity’ resources ◦ not too low, as resource owners/providers otherwise start implementing additional controls on top of and over the common criteria ◦ defined in collaboration with resource providers ◦ using transparency and a peer review processes ◦ leveraging our own community organisation mechanisms

Trust Element Distribution Technical elements integrity of the roots of trust integrity of issuance process process incident response revocation capabilities key management credential management incident response Identity elements identifier management re-binding and revocation binding to entities traceability of entities emergency communications regular communications ‘rich’ attribute assertions correlating identifiers access control Verifiability & Response, mitigation, recovery IGTF Classic elements RP, Community elements

Until now, our e-Infrastructure used a single ‘level’ ◦ there are also well-known ‘government’ standards for LoA in the USA: OMB M & NIST SP800-63, generalised: Kantara ◦ there is rough but not 1:1 correspondence between balanced needs of the providers and users and the Kantara LoA levels For your interest: Kantara Assurance Levels Trust in the assertions by resource and service providers is key

David Groep Nikhef Amsterdam PDP & Grid Cater for those use cases where ◦ the relying parties (VOs) already collect identity data ◦ this relying party data is authoritative and provides traceability ◦ the ‘identity’ component of the credential is not used through an authentication service that provides only ◦ persistent, non-reused identifiers ◦ traceability only at time of issuance ◦ naming be real, pseudonymous, or set by-the-user-and-usually-OK ◦ retains good security for issuance processes and systems and where the RP will have to take care of ◦ all ‘named’ identity vetting, naming and contact details ◦ subscribers changing name (often) when traceability is lost Differentiated LoA - Collaborative identity vetting

A new Identity Assurance Level Identity elements identifier management re-binding and revocation binding to entities traceability of entities emergency communications regular communications ‘rich’ attribute assertions correlating identifiers access control

IGTF Trust Structure Common criteria and model ◦ globally unique and persistent identifier provisioning ◦ not fully normative, but based on minimum requirements Trust is technology agnostic ◦ technology and assurance ‘profiles’ in the same trust fabric ◦ ‘classic’traditional public key infrastructure with near-realtime identity betting ◦ ‘MICS’dynamic ID provisioning leveraging federations ◦ ‘SLCS’on-demand short-lived token generation a basis for ‘arbitrary token’ services ◦ and now a new profile … … IOTA – Identifier-Only Trust Assurance For your interest: IGTF Authentication Profiles

IGTF and other assurance levels my own personal classification of identity LoAs

David Groep Nikhef Amsterdam PDP & Grid Name is unique, but not ‘standard’ globally ◦ Some WebSSO federations on purpose don’t have one ◦ But you get a name, probably OK, maybe user-chosen Incident response participation by the CA ◦ a contact address for the home organisation ◦ and likely from the federation, maybe from the ‘UHO’ A up-to-13-months valid certificate ◦ Can keep same name later if there is an ID record ◦ But: name will change if the user moves institution A well-secured issuing process IOTA: what do you get? For now, you’ll get these mostly as certificates, but the level is technology agnostic and can be applied to X.509, OpenID Connect, WebSSO federations with SAML, &c

David Groep Nikhef Amsterdam PDP & Grid Prevent duplication of effort ◦ Should be easier for end-users to get ◦ They should feel ‘happier’ ◦ Less end-user support (for eligible users) More quick turn-around time registering ◦ Experience like TCS (MICS) or on-line Cas ◦ But for many more users (e.g. InCommon Basic) More flexibility assigning services to trust levels IOTA: what do you gain?

David Groep Nikhef Amsterdam PDP & Grid Identity assurance only as strong as back-end usually R&E federations (eduGAIN, InCommon) some are really weak on assurance, auditing and traceability, have user-editable content – or just decline incident response on purpose not many of these are setup to deal with OpSec! expect content of the IOTA credentials to be somewhat better than facebook, twitter or gmail But then they are much easier to get for users … Differentiated  Really Different!

David Groep Nikhef Amsterdam PDP & Grid … and since you know your users anyway Link IOTA credentials to pre-existing users you know yourself IOTA subject are persistent, unique and never re-issued to anyone else (so are good identifiers) … or it’s a ‘lower value resource’ to mitigate risk Know your own users

David Groep Nikhef Amsterdam PDP & Grid It remains critical that RPs acknowledge that the information contained in IOTA credentials in itself is insufficient to trace individuals, and that any traceability and contact requirements rest with the infrastructures (or collectives of users). Mixing IOTA-capable and more loosely managed assurance levels within the same service requires distinguishing capabilities and policy evaluation on the receiving end that can take combined decisions on authentication credential strength and community membership or attribute information, and it must be noted that most software in current production use is not capable of making this distinction. Assurance levels must not be mixed unless a risk assessment has been done. In Quasi-legalise …

David Groep Nikhef Amsterdam PDP & Grid Think before you Do ‘interesting’ interplay in mixed infrastructures It is not supported in software to distinguish users on resources that are part of two RP infrastructures with multiple VOs, i.e., one with and one without IOTA “For a Resource Provider participating in multiple infrastructures, the minimum acceptable LoA should be the lowest one that the resource provider is willing to accept for all its users and supported communities” So if you participate in a controlled infra with managed user database and one which has ‘loose’ registration procedures, you should stay at Classic, MICS & SLCS!

David Groep Nikhef Amsterdam PDP & Grid IOTA opens new possibilities for easier access Fits really well with current federations ◦ An InCommon Basic IOTA CA is coming ◦ Policy allows for a single service in e.g. eduGAIN a ‘WYSIWYG’ authority: the name is never re-used, but it may not be who you think it is! Prevents duplication of effort and encourages more users, if you use it with your own user registration system … but read the fine-print before first use: Summary

?