PaN-data WP4 - Users Gordon Brown STFC-e-Science Alun Ashton DLS Bill Pulford DLS.

Slides:



Advertisements
Similar presentations
Lousy Introduction into SWITCHaai
Advertisements

EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MyProxy and EGEE Ludek Matyska and Daniel.
GT 4 Security Goals & Plans Sam Meder
VO Support and directions in OMII-UK Steven Newhouse, Director.
Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Andrew McNab - EDG Access Control - 14 Jan 2003 EU DataGrid security with GSI and Globus Andrew McNab University of Manchester
Data Catalogue Service Work Package 4. Main Objective: Deployment, Operation and Evaluation of a cataloguing service for scientific data. Why: Potential.
The Community Authorisation Service – CAS Dr Steven Newhouse Technical Director London e-Science Centre Department of Computing, Imperial College London.
1 Issues in federated identity management Sandy Shaw EDINA IASSIST May 2005, Edinburgh.
PDC Enabling Science Grid Security Research Olle Mulmo.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
DGC Paris Community Authorization Service (CAS) and EDG Presentation by the Globus CAS team & Peter Kunszt, WP2.
20 March 2007 VOMS etc Andrew McNabwww.gridsite.org VOMS etc Andrew McNab University of Manchester.
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
Slides for Grid Computing: Techniques and Applications by Barry Wilkinson, Chapman & Hall/CRC press, © Chapter 1, pp For educational use only.
1-2.1 Grid computing infrastructure software Brief introduction to Globus © 2010 B. Wilkinson/Clayton Ferner. Spring 2010 Grid computing course. Modification.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Copyright B. Wilkinson, This material is the property of Professor Barry Wilkinson (UNC-Charlotte) and is for the sole and exclusive use of the students.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Globus Computing Infrustructure Software Globus Toolkit 11-2.
15th January, NGS for e-Social Science Stephen Pickles Technical Director, NGS Workshop on Missing e-Infrastructure Manchester, 15 th January, 2007.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
26-28 th April 2004BioXHIT Kick-off Meeting: WP 5.2Slide 1 WorkPackage 5.2: Implementation of Data management and Project Tracking in Structure Solution.
WP6: Grid Authorization Service Review meeting in Berlin, March 8 th 2004 Marcin Adamski Michał Chmielewski Sergiusz Fonrobert Jarek Nabrzyski Tomasz Nowocień.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
PaNdata Europe Midpoint workshop 8-10 February 2011 Soleil, Paris PaN-data Europe – building a sustainable data infrastructure for Neutron and Photon laboratories.
Grid Security 1. Grid security is a crucial component Need for secure communication between grid elements  Authenticated ( verify entities are who they.
2005 © SWITCH Perspectives of Integrating AAI with Grid in EGEE-2 Christoph Witzig Amsterdam, October 17, 2005.
Neil Witheridge APAN29 Sydney February 2010 ARCS Authorisation Services Neil Witheridge Manager, ARCS Authorisation Services APAN29, Sydney, February 2010.
ShibGrid: Shibboleth access to the UK National Grid Service University of Oxford and STFC.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Oxford University e-Science Centre 1 Managing Access 4 Dec Managing Access to Resources on the Grid 4 December 2002.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Authorisation, Authentication and Security Guy Warner NeSC Training Team Induction to Grid Computing and the EGEE Project, Vilnius,
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Current status and plans.
Shibboleth & Grid Integration STFC and University of Oxford (and University of Manchester)
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
Simplified Experiment Submit Proposal Results Excited Users Do Expt Data Analysis Feedback.
Last update 21/01/ :05 LCG 1Maria Dimou- cern-it-gd Current LCG User Registration, VO management and Authorisation Procedures VOMS workshop
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
The GRIDS Center, part of the NSF Middleware Initiative Grid Security Overview presented by Von Welch National Center for Supercomputing.
Shibboleth Use at the National e-Science Centre Hub Glasgow at collaborating institutions in the Shibboleth federation depending.
Thomas Gutberlet HZB User Coordination NMI3-II Neutron scattering and Muon spectroscopy Integrated Initiative WP5 Integrated User Access.
Security Bob Cowles
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Introduction Salma Saber Electronic.
The Umbrella Project Authentication The minimum user information possible is stored centrally to avoid Data Protection issues. The Authentication is done.
ICAO Seminar on Aeronautical spectrum management (Cairo, 7 – 17 June 2006) SAFIRE Spectrum and Frequency Information Resource (presented by Eurocontrol)
Data and Applications Security Developments and Directions
Cryptography and Network Security
Tweaking the Certificate Lifecycle for the UK eScience CA
Gonçalo Borges, Mário David, Jorge Gomes
Update on EDG Security (VOMS)
ESA Single Sign On (SSO) and Federated Identity Management
ICAO Seminar on Aeronautical spectrum management (Cairo, 7 – 17 June 2006) SAFIRE Spectrum and Frequency Information Resource (presented by Eurocontrol)
The New Virtual Organization Membership Service (VOMS)
An Introduction to Computer Networking
CLASP Project AAI Workshop, Nov 2000 Denise Heagerty, CERN
The GENIUS Security Services
Community AAI with Check-In
Grid Computing Software Interface
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
Presentation transcript:

PaN-data WP4 - Users Gordon Brown STFC-e-Science Alun Ashton DLS Bill Pulford DLS

WP4 Development of standards for common user information exchange Objectives To foster interoperability of user information across the participating facilities and the wider research community. To develop standards enabling a shared Virtual Organisation Management and common processes across the participating facilities. Methodology The ultimate objective is the implementation of a system to allow scientific users to access data files across the physically distributed repositories. A typical use case would be a user having performed experiments at several facilities who needs to perform the same data analysis on all data sets. This process involves the use of remote computing resources and software packages, which implies a system whereby a logged user at a local site can be automatically authenticated and authorised (AAA) to use remote facilities. This additional level of AAA should be as transparent as possible to the user. Data protection laws in each country enormously complicate the sharing of user information between organisations. Consequently the AAA must function with the transfer of the very minimum of information, possibly only the user’s name and/or and the trust information. A corollary is that AAA is not involved in implementing user databases at each site but rather in providing a mechanism of interfacing with existing applications to make available the trust information in a consistent and coordinated manner across the facilities. Task 4.1: Review existing authentication solutions with special emphasis of the IRUVX / ESRFUP prototype solution. Propose prototype authentication system in view of the needs of the full neutron and photon community (M1-M8). Task 4.2: Workshop with facility authentication experts; plan the adoption strategy for the full- community authentication system (M9). Task 4.3: Revise the proposal in the light of the workshop findings, and determine the next steps (non web-based applications, GRID-related issues). (M8-M12). (Note: the final workshop to disseminate the results of the work package takes place in WP3) Deliverables D4.1 : Proposal for authentication system enabling shared Virtual Organisation Management (M8) D4.2 : User information workshop report (M10) D4.3 : Revised specification of common authentication system (M12)

Objectives How to share user information Centralisation v Federation Best way for user access/authentication DLS Objectives: – Remote access including role based access control – Seamless access to remote large computing resources

Overview of Current Access Internal central file system with remote log in. Web access for MX data in place. Internal central file system with remote log in. Also Internet Data Access via web service VMS login or PC browse of directory structure. Web access by known experiment number only Internal file system with remote log in. Internet Data Access via web service Internal central file system with remote log in + dcap and pnfs access on FLASH. Others?

Overlaps with Other Projects IRUVX-PP WP2 – User Needs and Policies ESRFUP WP7 – User Single Entry Point to ESRF and ILL

VOMS I Virtual Organisation Membership Service. Provides tools to help grids manage the authorization of their users. Helps Virtual Organisations (VOs) by delegating the approval of users to the VO itself, consequently removing the onus upon the end user to register with each resource s/he might use as part of the VO. VOMS is a project resulting from a collaborations between EDG and DataTAG. VOMS service allows VOs to be created and each VO membership is managed by a named VO manager.

VOMS II Simple account database with fixed formats for the information exchange and features – single login – expiration time – backward compatibility – multiple virtual organizations. Database is manipulated by authorization data that defines specific capabilities and roles for users. Administrative tools can be used by administrators to assign roles and capability information in the database. Command-line tool allows users to generate a local proxy credential based on the contents of the VOMS database. – This credential includes the basic authentication information that standard Grid proxy credentials contain, but it also includes role and capability information from the VOMS server. VOMS-aware applications can use the VOMS data to make authentication decisions regarding user requests.

Diamond Single Sign On The aim of this project was to provide a mechanism for uniquely identifying users of UK large scientific facilities irrespective of their method of access. All users of the major facilities will need only one username/password combination to access any of the facilities. These credentials or an automatically generated certificate or token will allow access to any computing technology given the correct authorization. The authorization will be performed locally by the facility involved based on the single unique identifier derived from 1-3. Normally we use either CAS (Originally Yale – now JASIG) or myProxy to perform user authenication - A Java Web service filter uses authenticated user name with Actve Directory and/or local ldap to determine the user's roles. Partners: STFC, e-Science, SRS, ISIS, Diamond Users can now reset their own passwords using a “Bank Type” web application.

OpenID User can adopt a digital identifier from one or more of authentication providers. Providers are numerous and are chosen by the users themselves. Identifiers in form of userid.openidprovider.net (i.e. a sort of URI) The authentication providers (AP) maintain the information such as name and necessary for the operation of the scheme. In the case where an OpenID user tries to login to a site other than their AP, the authentication is proxied automatically to their AP which replies either "yes" or "no" - his can be the only information transferred.

OpenID The site that the user is trying to access may require further authentication information but none of these needs to be transmitted between sites. This idea may be particularly relevant for the members of PaN-data since many of our users are already inscribed simultaneously in a number of the facilities. The OpenID is the single digital identifier relating these common records and would thus enable one of the fundamental requirements to authorize access to physically distributed files and resources. Acknowledged that this represented to 70% or more use cases for AAA in PaN-data. schemes - e.g user.openid.diamond.eu

OpenID - Advantages 1.Responsibility for the user's information is controlled by the user themselves 2.Very widely available and used in the world. 3.Very large selection of open source software in most technologies for both servers and clients 4.An OpenID server site can be set up quite quickly without the continuous support from specialized people. 5.X509 certificates can often be auto-generated to enable more advanced interactions such as setting up data processing pipelines. 6.Usefully for Diamond, our Central Authentication System (CAS) already has support for OpenID. 7.No immediate need for a central repository of user information. This may eventually be very useful but the political and practical difficulties could cause critical delays to other components. a.It should be possible to transfer a user's information between authenticating member sites using first their explicit authorization and by then using their OpenID as the mechanism controlling the actual transfer. b.Assuming that the user had authorized the maintenance of their basic name and address information across sites, the use of the single digital identity would enable an automatic process of transfer. c.It would be necessary to assume the the user may have more than one OpenID and it would be necessary on all sites to maintain a list belonging to each user.

OpenID: Disadvantages and Next Steps Disadvantages – Possible security problems due to spoofing and/or phishing of the OpenIDs. - This could be addressed by adding some additional checks at the authenticating sites. Possible next steps: 1.Set up OpenID APs at all or most EDNP members. 2.Standardize on naming schemes - e.g user.openid.diamond.eu

Next Steps Set up OpenID More detailed survey of user databases (looking at possible ways to join them)

Questions and (hopefully) Answers