Middleware Activities Update Internet2 Membership, with coordination provided by Internet2 et al presentation by Renee Woodten Frost Internet2 and the.

Slides:



Advertisements
Similar presentations
EduPerson and Federated K-12 Activities InCommon/Quilts Pilot Group February 27, 2014 Keith Hazelton UW-Madison, InCommon/I2.
Advertisements

Inter-Institutional Registration UNC Cause December 4, 2007.
UDDI, Discovery and Web Services Registries. Introduction To facilitate e-commerce, companies needed a way to locate one another and exchange information.
ICDL 2004, New Delhi1 Access Management for Digital Libraries in a well-connected World John Paschoud SECURe Project London School of Economics Library.
Attributes, Anonymity, and Access: Shibboleth and Globus Integration to Facilitate Grid Collaboration 4th Annual PKI R&D Workshop Tom Barton, Kate Keahey,
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
Public Key Infrastructure at the University of Pittsburgh Robert F. Pack, Vice Provost Academic Planning and Resources Management March 27, 2000 CNI Spring.
Business Intelligence Dr. Mahdi Esmaeili 1. Technical Infrastructure Evaluation Hardware Network Middleware Database Management Systems Tools and Standards.
Shibboleth Update a.k.a. “shibble-ware”
InCommon Policy Conference April Uses  In order to encourage and facilitate legal music programs, a number of universities have contracted with.
Understanding Active Directory
Welcome to CAMP Identity Management Integration Workshop Ann West NMI-EDIT EDUCAUSE/Internet2.
Shibboleth-intro-dec051 Shibboleth A Technical Overview Tom Scavo NCSA.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
1998 Fall Internet2 Project Meeting San Francisco September.
Web Development Process Description
Directory Services at UMass  Directory Services Overview  Some common definitions  What can a directory do or not do?  User Needs Assessment  What.
New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Current Activities in Middleware Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder.
TNC2004 Rhodes 1 Authentication and access control in Sympa mailing list manager Serge Aumont & Olivier Salaün May 2004.
Australian Access Federation and other Middleware Initiatives Presented at TF-EMC2, Prague 4 Sep 2007 Patty McMillan, The University of Queensland.
What is Cyberinfrastructure? Russ Hobby, Internet2 Clemson University CI Days 20 May 2008.
Vidmid VC working group: Scenarios & workplan Egon Verharen, SURFnet.
USERS Implementers Target Communities NMI Integration Testbed The NMI Integration Testbed NMI Participation Developed and managed by SURA Evaluate NMI.
David L. Wasley Office of the President University of California Shibboleth Safe delivery of reliable authorization data David L. Wasley University of.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
authenticated networked guided environment for learning - secure integration of learning environments with digital libraries - Current.
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
Shibboleth Update Advanced CAMP 7/31/02 RL “Bob” Morgan, Washington Steven Carmody, Brown Scott Cantor, Ohio State Marlena Erdos, IBM/Tivoli Michael Gettes,
Shibboleth A word which was made the criterion by which to distinguish the Ephraimites from the Gileadites. The Ephraimites, not being able to pronounce.
Shibboleth: An Introduction
Internet2 Middleware Initiative Shibboleth Ren é e Shuey Systems Engineer I Academic Services & Emerging Technologies The Pennsylvania State University.
Shibboleth Access Management System Walter Hoehn & David Millman, Columbia University.
Sponsored Educational Group Participation in Abilene Laurie Burns Director, Member Activities, Internet2 EDUCAUSE Gathering of State Networks Denver, Colorado.
Shibboleth: Status and Pilots. The Golden Age of Plywood.
Project Shibboleth Update, Demonstration and Discussion Michael Gettes May 20, 2003 TERENA Conference, Zagreb, Croatia Michael Gettes.
Shibboleth: Installation and Deployment Scott Cantor July 29, 2002 Scott Cantor July 29, 2002.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
January 9, 2002 Internet2 WebISO Project RL "Bob" Morgan, University of Washington.
Shibboleth A word which was made the criterion by which to distinguish the Ephraimites from the Gileadites. The Ephraimites, not being able to pronounce.
Connect. Communicate. Collaborate The authN and authR infrastructure of perfSONAR MDM Ann Arbor, MI, September 2008.
University of Washington Identity and Access Management IEEAF – RENU Network Design Workshop Seattle - 29 Nov 2007 Lori Stevens, Director, Distributed.
New Developments in Access Management: Setting the Scene Alan Robiette JISC Development Group JISC-CNI Conference, June 2002.
PAPI: Simple and Ubiquitous Access to Internet Information Services JISC/CNI Conference - Edinburgh, 27 June 2002.
Internet2 End-to-End (e2e) Performance Initiative Laurie Burns Steve Corbató Internet2 Fall Member Meeting Atlanta, Georgia October 31, 2000.
Shibboleth Trust Model Shibboleth/SAML Communities (aka Federated Administrations) Club Shib Club Shib Application process Policy decision points at the.
05 October 2001 Directories: The Next Stage Keith Hazelton, Senior IT Architect University of Wisconsin-Madison Keith Hazelton, Senior IT Architect University.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Shibboleth: Overview and Status The Shibboleth Architecture Team.
Introduction to Active Directory
Welcome to Base CAMP: Enterprise Directory Deployment Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein This.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
NSF Middleware Initiative Purpose To design, develop, deploy and support a set of reusable, expandable set of middleware functions and services that benefit.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Shibboleth Update January, 2001 Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder.
InCommon® for Collaboration Institute for Computer Policy and Law May 2005 Renee Shuey Penn State Andrea Beesing Cornell David Wasley Internet 2.
October 2, 2001 Middleware: Pieces and Processes RL "Bob" Morgan, University of Washington.
2-Oct-0101 October 2001 Directories as Middleware Keith Hazelton, Senior IT Architect University of Wisconsin-Madison Keith Hazelton, Senior IT Architect.
May I introduce you to eduPerson? Keith Hazelton Sr. IT Architect, UW-Madison TNC 2001, Antalya, Turkey, 15-May-2001.
Welcome to CAMP Directory Workshop Ken Klingenstein, Internet2 and University of Colorado-Boulder.
01 October 2001 “...By Any Other Name…”. Consequences and Truths (Ken) The Pieces and the Processes (Bob) Directories (Keith) Shibboleth and SAML (Scott)
Current Activities in Middleware
Michael R Gettes, Duke University On behalf of the shib project team
Overview and Development Plans
Internet2 Middleware Activities Progress
Shibboleth: Status and Pilots
Presentation transcript:

Middleware Activities Update Internet2 Membership, with coordination provided by Internet2 et al presentation by Renee Woodten Frost Internet2 and the University of Michigan

CNI Fall Task Force Meeting December 2000 Internet2 New Initiatives A brief introduction to new initiatives launched at the Internet2 Fall Member Meeting: - End-to-End Performance - Expanded Access

CNI Fall Task Force Meeting December 2000 Goal: To create a ubiquitous, predictable, and well supported environment in which Internet2 campus network users have routinely successful experiences in their development and use of advanced Internet applications Components: - distributed, coordinated Performance Evaluation and Response Teams (PERTS), information resources, and mechanisms for access to experts - a persistent, proactive, and widely deployed performance measurement infrastructure, including tools and instruments for detection and resolution - ongoing outreach, tech transfer, and dissemination of best practices to the Internet2 membership and beyond End-to-End Performance Initiative

CNI Fall Task Force Meeting December 2000 End-to-End Performance Initiative Timeline: - planning cycle now through late January, RFP published late January to identify small set of partner campuses for second phase - second phase begins early April

CNI Fall Task Force Meeting December 2000 Expanded Access - Sponsored Education Group Participation Effective January 15, 2001, a networked aggregate of educational institutions may gain access to Abilene as a Sponsored Education Group Participant. designed primarily to accommodate existing and emerging state-based education networks (Regional GigaPoP proposal – June, 2000) reflects modified Abilene CoU (approved by UCAID Board – October, 2000) This new class of Abilene participation supplements the existing classes of Member Participant, Collaboration Site, and Sponsored Participant Sponsored Participation remains a viable option for individual colleges and school districts Applications will be accepted commencing December 1, 2000

CNI Fall Task Force Meeting December 2000 Expanded Access - Sponsorship One or more member universities may sponsor a networked aggregate of educational organizations (e.g., a state education network) in the same state. In states with multiple state education networks (e.g., distinct K-12, CC, and 4-year college networks), one or more sponsors can work with the same Abilene Connector to aggregate these networks’ traffic. Upon approval of the Participant, the Connector assumes fiscal and operational responsibility for the Sponsored Education Group Participant to both UCAID and the Abilene NOC

CNI Fall Task Force Meeting December 2000 Along a middleware path... Identifier mapping (prerequisite) EduPerson - an objectclass for higher education Directory of directories - large-scale directory interactions Shibboleth - inter-realm authentication and basic authorization Applications integration H.323 Jabber - an instant messenger ???

CNI Fall Task Force Meeting December 2000 Other Middleware Sessions Internet2 Fall Meeting Mware big picture, identifier basics, authn, directory concepts, PKI overview Mware identifiers+, directory deployments PKI apps, certs, profiles, policies, trust models HEPKI- PAG - current policy activities Middleware metadirectories, registries, authorization Early Adopters technology --- policy LDAP Recipe HEPKI- TAG - current technical activities Multicampus BoF Academic Medical Middleware International Issues in Middleware Labs: Eduperson Shibboleth DoD, apps Middleware and the Grid Metadirectories BoF

CNI Fall Task Force Meeting December 2000 Identifier Mapping Getting the house in order Establishing enterprise names spaces and ids Obtaining an institutional OID mappings/

CNI Fall Task Force Meeting December 2000 eduPerson A directory objectclass to support inter-institutional applications Contains suggested attributes for instructional, research and administrative inter-institutional use Fills gaps in traditional directory schema Intends to integrate with Grid, IMS, and other upper-middleware Has parent classes of iNetOrgPerson and Person; states good practices for those attributes Specifies several new attributes and controlled vocabulary to use as values. Provides suggestions on how to assign values, but it is up to the institution to choose. Version 1.0 almost done; one or two revisions anticipated

CNI Fall Task Force Meeting December 2000 Issues about Upper Class Attributes eduPerson inherits attributes from person, iNetOrgPerson Some of those attributes would benefit from syntactic conventions about controlled vocabulary (e.g. telephones) Some of those attributes need ambiguity resolved via a consistent interpretation (e.g. address) Some of the attributes need standards around indexing and search (e.g. compound surnames) Many of those attributes need access control and privacy decisions (e.g jpeg photo, address, etc.)

CNI Fall Task Force Meeting December 2000 New eduPerson Attributes v1.0 eduPersonAffiliation eduPersonPrimaryAffiliation eduPersonOrgDN eduPersonOrgUnitDN eduPersonPrincipalName eduPersonNickname

CNI Fall Task Force Meeting December 2000 Some Possible v1+ Attributes eduPersonSchoolCollegeName eduPersonPrimarySchool/CollegeName eduPersonJobClassification eduPersonFERPAflag eduPersonAthlete eduPersonResearchInterest eduPersonNotEnrolledMailAddress

CNI Fall Task Force Meeting December 2000 eduPersonAffiliation Multi-valued list of relationships an individual has with institution Controlled vocabulary includes:faculty, staff, student, alum, member, affiliate Applications that use: DoD, white pages

CNI Fall Task Force Meeting December 2000 eduPersonPrimaryAffiliation Single-valued attribute that would be the status put on a name badge at a conference Controlled vocabulary includes:faculty, staff, student, alum, member, affiliate Applications that use: DoD, white pages

CNI Fall Task Force Meeting December 2000 eduPersonPrincipalName EPPN may look like an address but it is used by different systems. One must be able to authenticate against the EPPN Intended for inter-realm authentication such as Shibboleth In some situations it can be used for access control lists; if used, a site should make sure that the identifier is unique

CNI Fall Task Force Meeting December 2000 eduPerson Next Steps Led by Keith Hazelton, Wisconsin version 1.0 by Dec 15. Check with web site for additional changes Participate:

CNI Fall Task Force Meeting December 2000 A Directory of Directories An experiment to build a combined directory search service for higher education To show the power of coordination To show the existing barriers to cooperation standard object classes standard display formats standard meta-data To investigate load and scaling issues - on the clients and the servers To suggest the service to follow

CNI Fall Task Force Meeting December 2000 D o’ D Next Steps Michael Gettes, Georgetown project manager SUN to provide equipment and directory software Two different experimental regimes to be tested centralized indexing and repository with referrals large-scale parallel searches with heuristics to Constrain search space Will interact with EU directory work Target is 5,000,000 entries among 100 institutions by March, for ongoing information

CNI Fall Task Force Meeting December 2000 Shibboleth A word which was made the criterion by which to distinguish the Ephraimites from the Gileadites. The Ephraimites, not being able to pronounce sh, called the word sibboleth. See --Judges xii. Hence, the criterion, test, or watchword of a party; a party cry or pet phrase. - Webster's Revised Unabridged Dictionary (1913):Webster's Revised Unabridged Dictionary (1913)

CNI Fall Task Force Meeting December 2000 Shibboleth A catchword or formula adopted by a party or sect, by which their adherents or followers may be discerned, or those not their followers may be excluded E. Norice, New Gospel 3: His followers sequestering themselves to such as were their own way,..gave themselves to mirth and jollity,..as if it were the only Shibboleth whereby to be discerned from the miserable Legalists that held mourning and sorrow for sinne. –OED

CNI Fall Task Force Meeting December 2000 Shibboleth An initiative to analyze and develop mechanisms (protocols and implementations) for inter-institutional authentication and authorization “authenticate locally, act globally” the Shibboleth shibboleth Facilitated by Mace (a committee of leading higher ed IT architects) and Internet2 Vendor participation - IBM et al

CNI Fall Task Force Meeting December 2000 Shibboleth Discussion Outline Model and Basic Approaches Assumptions Campus and Resource Requirements Deliverables Operation Design Issues Project Status/Next Steps

CNI Fall Task Force Meeting December 2000 Why Is Shibboleth Needed? There is a strong and growing demand for this functionality Vendors haven't (yet) addressed it, When there is a solution, campuses will need an "open" solution

CNI Fall Task Force Meeting December 2000 Isn’t This What PKI Does? End-to-end PKI fits the Shibboleth model, but other forms of authentication do as well Uses a lightweight certificate approach for inter-institutional communications - uses the parts of PKI that work today (server side certs) and avoids the parts of PKI that don’t work today (eg client certs). Allows campuses to use other forms of authentication locally May actually have benefits over the end-user to target-site direct interactions...

CNI Fall Task Force Meeting December 2000 Inter-institutional Model User Browser Alpha Authn/z EPPN Beta Authn/z Web Host Security Domain Authentication Service Alpha UniversityUniversity of Beta Authentication Domain Selection Service Web Page

CNI Fall Task Force Meeting December 2000 Database Model User Browser Alpha Authn/z EPPN Web Host Security Domain Authentication Service Alpha University Authentication Domain Selection Service Web Page

CNI Fall Task Force Meeting December 2000 Primordial Authentication and Transition to Shibboleth User Browser Alpha Authn/z EPPN Beta Authn/z Web Host Security Domain Authentication Service Alpha UniversityUniversity of Beta Where are you from service Web Page

CNI Fall Task Force Meeting December 2000 Identification and Authentication User Browser Alpha Authn/z EPPN Beta Authn/z Web Host Security Domain Authentication Service Alpha UniversityUniversity of Beta Authentication Domain Selection Service Web Page

CNI Fall Task Force Meeting December 2000 Authorization and Use User Browser Alpha Authn/z EPPN Beta Authn/z Web Host Security Domain Authentication Service Alpha UniversityUniversity of Beta Authentication Domain Selection Service Web Page 1 2 3

CNI Fall Task Force Meeting December 2000 Assumptions Disturb as little of the existing campus infrastructure as possible Encourage good campus behaviors Be deployable soon Engineer with PKI in mind Require no new client software Do not provide session management software for the target application Create a marketplace and reference implementations Accommodate push and pull authorizations

CNI Fall Task Force Meeting December 2000 Campus and Resource Requirements Campus-wide identifier space Campus-wide authentication service Campus-wide web single sign-on service DNS that supports SRV records LDAP-based web access controls Implementation of EduPerson objectclass

CNI Fall Task Force Meeting December 2000 Deliverables Architecture and open standards Apache module on the web server to redirect authentication requests and then accept authentication requests (that have passed the weblogin phase) and then process authorization steps Reference implementation of a weblogin server A “where from” service and a key exchange service (static at first, then perhaps dynamic)

CNI Fall Task Force Meeting December 2000 Operational Steps Many alternatives for implementation Off-the-shelf will use redirects, URLs to contain transaction certs “Where from” service Public key exchange service

CNI Fall Task Force Meeting December 2000 Design Issues Transport of requests and credentials Security of authentication requests and replies no security, PKI, DNS if PKI, distribution of public keys “Where from” service implementation - central service, distributed within security domains, distributed within web servers Securing personal identity Extensibility of credentials Push authorization - forwarded credentials contain rights of user Pull authorization - resource provider requests rights of user

CNI Fall Task Force Meeting December 2000 What Phase I Will Not Do Addressing the 3-tier problem Formal trust management between domains Authorization beyond htaccess Implementing pseudonymous identity

CNI Fall Task Force Meeting December 2000 What Phase I May Do Reference web single signon implementation Discovery process for important applications (eg classes, affiliations)

CNI Fall Task Force Meeting December 2000 Discussants Campuses Internet2 IBM Industrial cabal Terena The Athens replacement project (UK) Libraries (DLF, CNI, EBSSCO)

CNI Fall Task Force Meeting December 2000 Shibboleth Project Status/Next Steps Analysis largely complete; proposed architecture under discussion IBM and Mace-Shibboleth are refining architecture and evaluating issues IBM intends to develop an Apache web module (perhaps an extension of auth_ldap) Internet2 intends to develop supporting materials (documentation, installation, etc) and web tools (for htaccess construction, filter and access control, remote resource attribute discovery). Testbed target start-up - March 1, 2001 Release - Summer 2001 Deployment - Fall 2001

CNI Fall Task Force Meeting December 2000 Architectural Closure Are the basic boxes and flows right? Are there any boxes or flows that contain “show-stoppers”, or do we think we can work each out, perhaps with shims, scope limitations, static first steps, etc.? Do we know of at least one way today, however ugly, that establishes the viability of the architecture?

CNI Fall Task Force Meeting December 2000 Protocol Specifications Define the units of information for the flows Define the APIs that interface with the flows Define the alternatives for service locations

CNI Fall Task Force Meeting December 2000 Protocol Implementations Apache modules Proprietary implementations among web single signon vendors

CNI Fall Task Force Meeting December 2000 Interested? Concerned? Led by Steven Carmody (Brown) and RL “Bob” Morgan (Washington)

CNI Fall Task Force Meeting December 2000 Applications Integration Many “killer apps” are stalled in deployment by lack of identifiers and associated authentication Examples include H.323 (desktop video) (both direct client authentication and MCU-mediated) Instant messaging Distributed file systems Strategies may include working with open source versions to include EPPN-based authentication

CNI Fall Task Force Meeting December 2000 Opportunities for Volunteers Nature of work - participating in bi-weekly calls, reviewing documents and specifications, seeking campus counsel, speaking one’s clue Mace-dir - working on eduPerson refinements, the directory-of- directory, directory aspects of Shibboleth, etc. Mace-shibboleth - working on inter-realm authentication Mace-med- working on issues in the integration of enterprise and academic medical middleware HEPKI- TAG and HEPKI-PAG - PKI policy and technology issues, including mobility, profiles, etc.