Introduction of Grid Security

Slides:



Advertisements
Similar presentations
What is. Digital Certificate It is an identity.
Advertisements

April 19-22, 2005SecureIT-2005 How to Start a PKI A Practical Guide Dr. Javier Torner Information Security Officer Professor of Physics.
Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
GT 4 Security Goals & Plans Sam Meder
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E IEPG March 2000 APNIC Certificate Authority Status Report.
Liang ZHAO, PKU EUChinaGrid 3 rd Tutorial Nov.25, 2006 Authentication and Authorization in gLite Liang ZHAO Peking University.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Lecture 2: Security Rachana Ananthakrishnan Argonne National Lab.
Lecture 23 Internet Authentication Applications
Presentation Two: Grid Security Part Two: Grid Security A: Grid Security Infrastructure (GSI) B: PKI and X.509 certificates C: Proxy certificates D:
Military Technical Academy Bucharest, 2006 GRID SECURITY INFRASTRUCTURE (GSI) - Globus Toolkit - ADINA RIPOSAN Department of Applied Informatics.
Grid Security. Typical Grid Scenario Users Resources.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Generic AAA model in Grids IRTF - AAAARCH meeting IETF 52 – Dec 14 th Salt Lake City Leon Gommans Advanced Internet Research Group.
An Authorization System for Grid Applications Thesis Presentation 5 th Dec 2006 Author: Wang Xiao Supervisor: Professor Heikki Hämmäinen Instructor: MSc.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
DGC Paris Community Authorization Service (CAS) and EDG Presentation by the Globus CAS team & Peter Kunszt, WP2.
Security NeSC Training Team International Summer School for Grid Computing, Vico Equense,
INFSO-RI Enabling Grids for E-sciencE Security, Authorisation and Authentication Mike Mineter Training, Outreach and Education National.
Open Science Grid Use of PKI: Wishing it was easy A brief and incomplete introduction. Doug Olson, LBNL PKI Workshop, NIST 5 April 2006.
Grid Security Overview The Globus Project™ Copyright (c) 2002 University of Chicago and The University of Southern California. All.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key in the first place? Solutions: Deffie-Hellman trusted key distribution.
CS470, A.SelcukPKI1 Public Key Infrastructures CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
03 December 2003 Public Key Infrastructure and Authentication Mark Norman DCOCE Oxford University Computing Services.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Security Management.
Public Key Infrastructure Ammar Hasayen ….
Galileo - Knowledge Testing Service e-MSoft Artur Majuch.
INFSO-RI Enabling Grids for E-sciencE EGEE Security Basics for the User Guy Warner NeSC Training Team An Induction to EGEE for GOSC.
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Unit 1: Protection and Security for Grid Computing Part 2
INFSO-RI Enabling Grids for E-sciencE Getting Started Guy Warner NeSC Training Team Induction to Grid Computing and the National.
Grid Security 1. Grid security is a crucial component Need for secure communication between grid elements  Authenticated ( verify entities are who they.
1 Grid Security. 2 Grid Security Concerns Control access to shared services –Address autonomous management, e.g., different policy in different work groups.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
INFSO-RI Enabling Grids for E-sciencE Sofia, 22 March 2007 Security, Authentication and Authorisation Mike Mineter Training, Outreach.
Module 9: Fundamentals of Securing Network Communication.
E-science grid facility for Europe and Latin America E2GRIS1 Raúl Priego Martínez – CETA-CIEMAT (Spain)‏ Itacuruça (Brazil), 2-15 November.
Encryption / Security Victor Norman IS333 / CS332 Spring 2014.
Communicating Security Assertions over the GridFTP Control Channel Rajkumar Kettimuthu 1,2, Liu Wantao 3,4, Frank Siebenlist 1,2 and Ian Foster 1,2,3 1.
INFSO-RI Enabling Grids for E-sciencE Security in gLite Gergely Sipos MTA SZTAKI With thanks for some slides to.
Authorisation, Authentication and Security Guy Warner NeSC Training Team Induction to Grid Computing and the EGEE Project, Vilnius,
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Grid technology Security issues Andrey Nifatov A hacker.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
1 Grid School Module 4: Grid Security. 2 Typical Grid Scenario Users Resources.
1 Certification Issue : how do we confidently know the public key of a given user? Authentication : a process for confirming or refuting a claim of identity.
EGEE is a project funded by the European Union CA overview and requirements Ognjen Prnjat, Nikos Vogiatzis GRNET EGEE-SEE regional kick-off, April 7-8.
EGI-InSPIRE RI Grid Training for Power Users EGI-InSPIRE N G I A E G I S Grid Training for Power Users Institute of Physics Belgrade.
1 Grid Security Jinny Chien Academia Sinica Computing Centre Deployment team.
GRID-FR French CA Alice de Bignicourt.
EGEE-II INFSO-RI Enabling Grids for E-sciencE Authentication, Authorisation and Security Mike Mineter, National e-Science Centre.
EGEE-II INFSO-RI Enabling Grids for E-sciencE Authentication, Authorisation and Security Emidio Giorgio INFN Catania.
INFSO-RI Enabling Grids for E-sciencE Sofia, 17 March 2009 Security, Authentication and Authorisation Mike Mineter Training, Outreach.
1 Introduction of Grid Yoshio Tanaka, Naotaka Yamamoto AIST.
(Exchange Programme to advance e-Infrastructure Know-How) The EPIKH Project Hailong Yang
Authentication, Authorisation and Security
Grid Security.
Authorization and Authentication in gLite
Grid Security Jinny Chien Academia Sinica Grid Computing.
Organized by governmental sector (National Institute of information )
Public Key Infrastructure
Grid Security Overview
Install AD Certificate Services
Grid Security Infrastructure
Presentation transcript:

Introduction of Grid Security Yoshio Tanaka AIST, Japan

Again, what is Grid? Resource sharing & coordinated problem solving in dynamic, multi-institutional virtual organizations Communities committed to common goals Assemble team with heterogeneous members & capabilities Distribute across geography and organization This slide is by courtesy of Ian Foster @ ANL

Key Technologies: GSI and VOMS Grid Security Infrastructure (GSI) is standard security technology used in the current Grid communities. Based on Public Key Infrastructure (PKI) and X.509 Certificates. Virtual Organization Membership Services (VOMS) is a software for creating/managing VOs. Developed by European Communities Based on GSI

GSI: Grid Security Infrastructure Authentication and authorization using standard protocols and their extensions. Authentication: Identify the entity Authorization: Establishing rights Standards PKI, X.509, SSL,… Extensions: Single sign on and delegation Entering pass phrase is required only once Implemented by proxy certificates

PKI and X.509 certificate Public Key Infrastructure (a pair of asymmetric keys) Private key is used for data encryption Public key is used for data decryption Every entity (users, computers, etc.) is required to obtain his/its certificate issued by a trusted Certificate Authority (CA) X.509 certificates contain Name of Subject Public key of Subject Name of Certificate Authority (CA) which has signed it, to match key and identity Digital Signature of the signing CA Certificate Subject DN Public Key Issuer (CA) Digital Signature

How a user is authenticated by a server User Cert. Subject DN Public Key Issuer (CA) Digital Signature User Cert. Subject DN Public Key Issuer (CA) Digital Signature Public Key of the CA Send Cert. private key (encrypted) challenge string QAZWSXEDC… QAZWSXEDC… QAZWSXEDC… Public Key PL<OKNIJBN… encrypted challenge string

Requirements for Grid security Single Sign on Delegation user server A server B remote process creation requests* Communication* Remote file access requests* * with mutual authentication

PKI and X.509 certificate (cont’d) X.509 certificates Similar to a driving license. Photo on the license corresponds to a public key. issued by a CA Validity of the certificate depends on the opposite entity’s policy Valid until Dec. 31, 2003 NAME: Taro Sanso Address: 1-1-1, Umezono, Tsukuba User Certificate Subject DN Public Key Issuer (CA) Digital Signature Issued by a CA Issued by a state/prefecture private key (encrypted) Identify the entity

X.509 Proxy Certificate Defines how a short term, restricted credential can be created from a normal, long-term X.509 credential A “proxy certificate” is a special type of X.509 certificate that is signed by the normal end entity cert, or by another proxy Supports single sign-on & delegation through “impersonation”

User Proxies Minimize exposure of user’s private key A temporary, X.509 proxy credential for use by our computations We call this a user proxy certificate Allows process to act on behalf of user User-signed user proxy cert stored in local file Created via “grid-proxy-init” command Proxy’s private key is not encrypted Rely on file system security, proxy certificate file must be readable only by the owner

User Proxies (cont’d) Identity of the user Proxy Certificate Subject DN/Proxy (new) public key (new) private key (not encrypted) Issuer (user) Digital Signature (user) User Certificate Subject DN Public Key Issuer (CA) Digital Signature grid-proxy-init User Certificate Subject DN Public Key Issuer (CA) Digital Signature private key (encrypted) sign

Delegation Remote creation of a user proxy Results in a new private key and X.509 proxy certificate, signed by the original key Allows remote process to act on behalf of the user Avoids sending passwords or private keys across the network Proxy-1 Private key Public Key User Proxy-2 private public Proxy-2 public Proxy-1 Private grid-proxy-init Client Server Proxy-2 Public Proxy-1 private User Public Key User Private key CA Private

Traverse Certificate Chain to verify identity User Identity User Certificate CA User Identity Proxy Certificate User CA User Identity Proxy Certificate User CA

Requirements for users Obtain a certificate issued by a trusted CA You can launch your CA for tests The certificate and the signing policy file of the CA should be put on an appropriate directory (/etc/grid-security/certificates). International Grid Trust Federation (IGTF) is a community for building trust. Create a Proxy Certificate in advance Need to enter pass phrase for the decryption of a private key. Only once! A proxy certificate will be used for further authentication.

Summary of GSI Every entity has to obtain a certificate. Treat your private key carefully!! Private key is stored only in well-guarded places, and only in encrypted form Create a user proxy in advance Run grid-proxy-init command virtual login to Grid environment A proxy certificate will be generated on user’s machine. Single sign on and delegation enable easy and secure access to remote resources.

GSI provides basic technology for authentication (who is the user). What’s the role of VOMS? GSI provides basic technology for authentication (who is the user). The other framework is necessary for authorization (what the user can do). The most naive approach is to map each user to each local account on each server. What happens if there are thousands to millions of users? “/C=JP/O=AIST/O=GRID/CN=Yoshio Tanaka” yoshio “/C=JP/O=AIST/O=GRID/CN=Ryosuke Nakamura” ryosuke …..

What’s the role of VOMS? (cont’d) VOMS provides a mechanism for VO-based authorization. Users are registered to VO(s) Users can belong to Group(s) in the VO Users can be assigned role(s) Service providers can configure the system to control access based on VO-base All users in a VO can access to the service Group-base Users in a specific group can access to the services Group&Role-base Users in a specific group with specific role can access to the services It is implemented by embedding “VOMS attributes” in user’s proxy certificate.

Introduction of Grid and its technology Yoshio Tanaka National Institute of Advanced Industrial Science and Technology (AIST), Japan

What is the GEO Grid ? The GEO (Global Earth Observation) Grid is aiming at providing an E-Science Infrastructure for worldwide Earth Sciences communities to accelerate GEO sciences based on the concept that relevant data and computation are virtually integrated with a certain access control and ease-of-use interface those are enabled by a set of Grid and Web service technologies. AIST: OGF Gold sponsor (a founding member) AIST: OGC Associate member (since 2007) Satellite Data Grid Technologies Geology Map Geo* Contents Applications GIS data Resources Environment Field data Disaster mitigation

Overview and usage model of the GEO Grid system User-level Authentication and VO-level Authorization User’s right is managed (assigned) by an administrator of his belonging VO. Access control to a service is configured by the service provider according to the publication policy. There are some options of the access control VO-level, Group/Role-based, User-level, etc. Scalable architecture for the number of users.

L0 login Terra/ASTER user TDRS credential APAN/TransPAC GET exec query account (GAMA) server Account DB Terra/ASTER VO (VOMS) server VO DB TDRS credential APAN/TransPAC portal server GET exec query GSI + VOMS ERSDIS/NASA GSI + VOMS GSI + VOMS GEO Grid Cluster L0 OGSA DAI WFS WCS WMS CSW GRAM GridFTP GIS server map server catalogue/ metadata server gateway server Data Maps Meta data Storage (DEM)