Dr Ken Klingenstein Shibboleth and InCommon: An Update and Next Steps.

Slides:



Advertisements
Similar presentations
Dr Ken Klingenstein Director, Internet2 Middleware and Security Emerging Infrastructure for Collaboration: Next Generation Plumbing.
Advertisements

The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security.
The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
Dr Ken Klingenstein Shibboleth and InCommon: An Update and Next Steps.
Welcome to CAMP! Ken Klingenstein, Director, Internet2 Middleware Initiative.
Internet2 and other US WMD Update. Topics Update on non-merger, Newnet (and the control plane), InCommon and other feds “Product” update – Shib, Grouper,
Drive-By Dialogues. Presenter’s Name Topics The Long Strange Trip of I2 – NLR Merger A Brief Comment on Optical Networking Middleware Developments Security.
Presenter’s Name InCommon Approximately 80 members and growing steadily More than two million “users” Most of the major research institutions (MIT joining.
17 May 2004 Shibboleth: Federated Identity Management Renee Woodten Frost, Internet2 Middleware and Security.
InCommon Policy Conference April Uses  In order to encourage and facilitate legal music programs, a number of universities have contracted with.
Collaboration & InCommon EDUCAUSE Midwest Regional Conference March 21, 2005 Carrie E. Regenstein UW-Madison.
1 Update on the InCommon Federation, Higher Education’s Community of Trust EDUCAUSE 2005 October 19 10:30am-11:20am.
Welcome to CAMP Identity Management Integration Workshop Ann West NMI-EDIT EDUCAUSE/Internet2.
Federations and Security: A Multi-level Marketing Scheme Ken Klingenstein Director, Internet2 Middleware and Security.
Ken Klingenstein Director, Internet2 Middleware and Security Middleware and Security Update.
3 September 2015 Federated R US. Agenda  Background on Internet2 Middleware and NSF Middleware Initiative  The body of work  Directories  Shibboleth.
Authority, Virtual Organizations and Diagnostics: Building and Managing Complexity Ken Klingenstein Director, Internet2 Middleware and Security.
23 April 2004 Shibboleth: Federated Identity Management Renee Woodten Frost, Internet2 Middleware and Security.
Federated Administration: The Cutting Edge. Topics  Federations: The Basics Business drivers and the basic model Technical Considerations and the marketplace.
Shib in the present and the future Ken Klingenstein Director, Internet2 Middleware and Security.
1 The Partnership Challenge Higher education’s missions are realized in increasingly global, collaborative, online relationships –Higher educations’ digital.
1 The InCommon Federation John Krienke Internet2 Spring Member Meeting Tuesday, April 25, 2006.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
7 October 2015 Shibboleth. Agenda  Shibboleth Background and Status  Why is Shibboleth Important (to Higher Ed)?  Current Pilots Course Management.
Shibboleth & Federations Renee’ Shuey May 4, 2004 ITS – Emerging Technologies The Pennsylvania State Universtiy.
VO and Internet2 Middleware. Presenter’s Name Topics Motivations for Internet2 Middleware work Federated identity and InCommon Other IdM Groups, privileges,
InCommon Update Internet2 Meeting April 20, 2004 Ken Klingenstein and Carrie Regenstein.
The New Problem Space: Issues for the Future Ken Klingenstein Director, Internet2 Middleware and Security.
23 April 2004 Shibboleth: Federated Identity Management Renee Woodten Frost, Internet2 Middleware and Security.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Shibboleth A Federated Approach to Authentication and Authorization Fed/Ed PKI Meeting June 16, 2004.
Frontiers of Authentication and Authorization Copyright 2003 Kenneth J. Klingenstein Internet2 and UC-Boulder Camp Meeting, June 5 th, 2003.
Federations 101 John Krienke Internet2 Fall 2006 Internet2 Member Meeting.
Shibboleth Update Advanced CAMP 7/31/02 RL “Bob” Morgan, Washington Steven Carmody, Brown Scott Cantor, Ohio State Marlena Erdos, IBM/Tivoli Michael Gettes,
Shibboleth Authenticate Locally, Act Globally A Penn State Case Study Renee’ Shuey May 4, 2004 ITS – Emerging Technologies.
Federations: InQueue to InCommon Renee Woodten Frost 19 April 2004.
Shibboleth at Columbia Update David Millman R&D July ’05
US of A and A Activities Ken Klingenstein, Director Internet2 Middleware Initiative.
Scared Straight… if you want to go outside… Authenticate Locally, Act Globally.
Shibboleth: Status and Pilots. The Golden Age of Plywood.
Project Shibboleth Update, Demonstration and Discussion Michael Gettes May 20, 2003 TERENA Conference, Zagreb, Croatia Michael Gettes.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
National Authentication and Authorization Infrastructures and NRENs Ken Klingenstein Director, Internet2 Middleware and Security.
Shibboleth Trust Model Shibboleth/SAML Communities (aka Federated Administrations) Club Shib Club Shib Application process Policy decision points at the.
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
Internet2 and Cyberinfrastructure Russ Hobby Program Manager,
AAI in Europe ++ Ken Klingenstein Director, Internet2 Middleware and Security.
Middleware and Network Security Update: Progress, Problems, and Opportunities for Interaction.
Welcome to Base CAMP: Enterprise Directory Deployment Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein This.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Origins: The Requirements of Participating in Federations CAMP Shibboleth June 29, 2004 Barry Ribbeck & David Wasley.
InCommon® for Collaboration Institute for Computer Policy and Law May 2005 Renee Shuey Penn State Andrea Beesing Cornell David Wasley Internet 2.
Shibboleth Authenticate Locally, Act Globally A Penn State Case Study.
InCommon Update FedEd Meeting June 16, 2004 Carrie Regenstein.
Welcome to CAMP Directory Workshop Ken Klingenstein, Internet2 and University of Colorado-Boulder.
Federated Security Services Ken Klingenstein Day Job: Middleware Night Job: Network Security.
01 October 2001 “...By Any Other Name…”. Consequences and Truths (Ken) The Pieces and the Processes (Bob) Directories (Keith) Shibboleth and SAML (Scott)
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Mark Luker, EDUCAUSE Copyright Mark Luker, This work is the intellectual.
Current Activities in Middleware
Virtual organization support services:
Middleware: Plumbing at the Next Layer
Introduction to Federations
Context, Gaps and Challenges
Overview and Development Plans
Internet2 Middleware & Security/University of Michigan
A History of the Next Five Years: (the rise of indoor plumbing)
Shibboleth: Status and Pilots
Shibboleth and Federations
Introduction to Federations
Internet2 Middleware & Security/University of Michigan
Presentation transcript:

Dr Ken Klingenstein Shibboleth and InCommon: An Update and Next Steps

Topics  Developments and designs Shibboleth and InCommon Signet – an authority system Integrated diagnostics  Discussion International trust fabrics Virtual organization support Coordinated software development

Shibboleth Status  Open source, privacy preserving federating software  Being very widely deployed in US and international universities  Target - works with Apache(1.3 and 2.0) and IIS targets; Java origins for a variety of Unix platforms.  V2.0 likely to include portal support, identity linking, non web services (plumbing to GSSAPI,P2P, IM, video) etc.  Work underway on intuitive graphical interfaces for the powerful underlying Attribute Authority and resource protection  Likely to coexist well with Liberty Alliance and may work within the WS framework from Microsoft.  Growing development interest in several countries, providing resource manager tools, digital rights management, listprocs, etc. 

Adoption  Over 40 + universities using it for access to OCLC, JSTOR, Elsevier, WebAccess, Napster, etc.  Common status is “moving into production”  The hard part is not installing Shibboleth but running “plumbing” to it: directories, attributes, authentication  Deployments in Europe and the UK  Development efforts broadening to the UK and Australia  Likely to be the interrealm aspect to Sakai, Lionshare, video

Federated administration  Given the strong collaborations within the academic community, there is an urgent need to create inter-realm tools, so  Build consistent campus middleware infrastructure deployments, with outward facing objectclasses, service points, etc. and then  Federate (multilateral) those enterprise deployments with interrealm attribute transports, trust services, etc. and then  Leverage that federation to enable a variety of applications from network authentication to instant messaging, from video to web services, from p2p to virtual organizations, etc. while we  Be cautious about the limits of federations and look for alternative fabrics where appropriate.

Federated administration OTOT OTOT TT A CM CM A VO T Campus 1 Campus 2 Federation

InCommon federation  Federation operations – Internet2  Federating software – Shibboleth 1.1 and above  Federation data schema - eduPerson or later and eduOrg or later  Becomes operational April 5, with several early entrants to help shape the policy and membership issues.  Precursor federation, InQueue, has been in operation for about six months and will feed into InCommon 

InQueue Origins  Rutgers University  University of Wisconsin  New York University  Georgia State University  University of Washington  University of California Shibboleth Pilot  University at Buffalo  Dartmouth College  Michigan State University  Georgetown  Duke  The Ohio State University  UCLA  Internet2  Carnegie Mellon University  National Research Council of Canada  Columbia University  University of Virginia  University of California, San Diego  Brown University  University of Minnesota  Penn State University  Cal Poly Pomona  London School of Economics  University of North Carolina at Chapel Hill  University of Colorado at Boulder  UT Arlington  UTHSC-Houston  University of Michigan  University of Rochester  University of Southern California

InCommon Management  Operational services by I2 Member services Backroom (CA, WAYF service, etc.)  Governance Executive Committee - Carrie Regenstein - chair (Wisconsin), Jerry Campbell, (USC), Lev Gonick (CWRU), Clair Goldsmith (Texas System), Mark Luker (EDUCAUSE),Tracy Mitrano (Cornell), Susan Perry (Mellon), Mike Teetz, (OCLC), David Yakimischak (JSTOR). Project manager – Renee Frost (Internet2)  Membership open to.edu and affiliated business partners (Elsevier, OCLC, Napster, Diebold, etc…)  Contractual and policy issues being defined now…  Likely to take 501(c)3 status

Trust in InCommon - initial  Members trust the federated operations to perform its activities well The operator (Internet2) posts its procedures, attempts to execute them faithfully, and makes no warranties Enterprises read the procedures and decide if they want to become members  Origins and targets trust each other bilaterally in out-of- band or no-band arrangements Origins trust targets dispose of attributes properly Targets trust origins to provide attributes accurately Risks and liabilities managed by end enterprises, in separate ways

InCommon Trust - ongoing  Use trust  Build trust cycle  Clearly need consensus levels of I/A  Multiple levels of I/A for different needs Two factor for high-risk Distinctive requirements (campus in Bejing or France, distance ed, mobility)  Standardized data definitions unclear  Audits unclear  International issues

The Research and Education Federation Space REF Cluster InQueue (a starting point) InCommon SWITCH The Shib Research Club Other national nets Other clusters Other potential US R+E feds State of Penn Fin Aid Assoc NSDL Slippery slope - Med Centers, etc Indiana

The potential for InCommon  The federation as a networked trust facilitator  Needs to scale in two fundamental ways Policy underpinnings need to move to normative levels among the members; “post and read” is a starting place… Inter-federation issues need to be engineered; we are trying to align structurally with emerging federal recommendations  Needs to link with PKI and with federal and international activities  If it does scale and grow, it could become a most significant component of cyberinfrastructure…

Beyond web services…  Federated security services Collaborative incident correlation and analysis Trust-mediated transparency and other security-aware capabilities  Federated extensions to other architectures Lionshare project for P2P file sharing IM Federated Grids

Virtual Organizations  Geographically distributed, enterprise distributed community that shares real resources as an organization.  Examples include team science (NEESGrid, HEP, BIRN, NEON), digital content managers (library cataloguers, curators, etc), life-long learning consortia, etc.  On a continuum from interrealm groups (no real resource management, few defined roles) to real organizations (primary identity/authentication providers)  Want to leverage enterprise middleware and external trust fabrics

Virtual organizations  Need a model to support a wide variety of use cases Native v.o. infrastructure capabilities, differences in enterprise readiness, etc. Variations in collaboration modalities Requirements of v.o.’s for authz, range of disciplines, etc  JISC in the UK has lead; solicitation is on the streets (see ( builds on NSF NMIhttp://  Tool set likely to include seamless listproc, web sharing, shared calendaring, real-time video, privilege management system, etc.

Leveraging V.O.s Today VO Target Resource User Enterprise Federation

Leveraged V.O.s Tomorrow VO Target Resource User Enterprise Federation Collaborative Tools Authority System etc

Stanford Authz Model

Signet Deliverables The deliverables consist of  A recipe, with accompanying case studies, of how to take a role-based organization and develop apprpriate groups, policies, attributes etc to operate an authority service  Templates and tools for registries and group management  a Web interface and program APIs to provide distributed management (to the departments, to external programs) of access rights and privileges, and  delivery of authority information through the infrastructure as directory data and authority events.

Home

Grant Authority Wizard

Person

Steps to Enable Diagnostic Applications  Establish the common event record  Enable the collection of events from a wide array of event sources Network: NetFlow, SNMP, RMON, etc Security: IDS, Snort, firewalls, etc Applications: Shib, Dir, IM, P2P, smtpd, named, httpd, Kerberos, etc Hosts: /var/log/*, Syslog, etc

Steps to Enable Diagnostic Applications (2)  Build tools to create dissemination infrastructures that, Allows access to the diagnostic data Provides operators to filter, anonymize, aggregate, tag, store and archive the data Enables pipelining of data operators to organize and manipulate diagnostic data based on an organization or federations policies Provide a common API so applications can access the diagnostic data

Enabling Diagnostic Applications With a Common Event Descriptor Security Related Events Middleware Related Events Network Related Events Collection and Normalization of Events Dissemination Network Diagnostic applications (Middleware, Network, Security) can extract event data form multiple data sets

Discussion International trust fabrics – national federations – International peering Virtual organization support – the nature of our collaborations –Difficult issues of inconsistent level of campus and country middleware infrastructure Coordinated software development