IOTA Questions for RPs Sept 9, 2013 Bucharest, Romania.

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MyProxy and EGEE Ludek Matyska and Daniel.
Advertisements

Appropriate Access InCommon Identity Assurance Profiles David L. Wasley Campus Architecture and Middleware Planning workshop February 2008.
Sponsored by the National Science Foundation 1 Activities this trimester 0.5 revision of Operational Security Plan Independently (from GPO) developing.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI The IGTF IOTA Profile towards differentiated assurance levels.
David Groep Nikhef Amsterdam PDP & Grid Evolving Assurance – IGTF LoA generalisation David Groep Interoperable Global Trust Federation IGTF Documents at.
INFSO-RI Enabling Grids for E-sciencE JRA3 2 nd EU Review Input David Groep NIKHEF.
Federated Identity, Levels of Assurance, and the InCommon Silver Certification Jim Green Identity Management Academic Technology Services © Michigan State.
\ Grid Security and Authentication1. David Groep Physics Data Processing group Nikhef.
TeraGrid Science Gateway AAAA Model: Implementation and Lessons Learned Jim Basney NCSA University of Illinois Von Welch Independent.
David Groep Nikhef Amsterdam PDP & Grid Differentiated and Collaborative Assurance profiling the identity management landscape for diversifying e-Infrastructure.
Trust and Security for FIM (Sirtfi/SCI) David Kelsey (STFC-RAL) FIM4R at CERN 4 Feb 2015.
LiveAP Towards Differentiated Identity Assurance David Groep, Nikhef supported by the Netherlands e-Infrastructure SURFsara, and EGI.eu O-E-15 and EGI-InSPIRE.
Identity Management Levels of Assurance WLCG GDB CERN, 8 Apr 2009 David Kelsey STFC/RAL david.kelsey AT stfc.ac.uk.
Shib-Grid Integrated Authorization (Shintau) George Inman (University of Kent) TF-EMC2 Meeting Prague, 5 th September 2007.
+1 (801) Standards for Registration Practices Statements IGTF Considerations.
GGF12 – 20 Sept LCG Incident Response Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Security Update WLCG GDB CERN, 12 June 2013 David Kelsey STFC/RAL.
Classic X.509 secured profile version 4.2 Proposed Changes David Groep, Nov 7 nd, 2008.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
Revocation in MICS §4.4 May 11-13, 2009 Zürich, Switzerland.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI Towards Differentiated Identity Assurance as a collaborative.
Updates from the EUGridPMA David Groep, July 16 st, 2007.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Security, Accounting, and Assurance Mahdi N. Bojnordi 2004
IOTA Questions for RPs Sept 9, 2013 Bucharest, Romania.
SHA-2, current trends and some technical topics March 2013 Taipei, TW David Groep, Nikhef & EUGridPMA.
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
Security Policy Update David Kelsey UK HEP Sysman, RAL 1 Jul 2011.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Current status and plans.
IOTA AP Towards Differentiated Identity Assurance David Groep, Nikhef supported by the Netherlands e-Infrastructure and SURFsara.
A Trust Framework for Security Collaboration among Infrastructures David Kelsey (STFC-RAL, UK) WLCG GDB, CERN 10 Jul 2013.
Federated Identity Management for HEP David Kelsey HEPiX, Ann Arbor MI 30 Oct 2013.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
EGI-InSPIRE RI EGI EGI-InSPIRE RI Establishing Identity in EGI the authentication trust fabric of the IGTF and EUGridPMA.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
David Groep Nikhef Amsterdam PDP & Grid Bring the WLCG federation Home Extending your trust options beyond bottom-up identity by collaborating with global.
© 2007 Open Grid Forum CAOPS-WG RP Namespace Constraints Policy David Groep CAOPS-WG OGF20 May 8 th, 2007.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI CSIRT Procedure for Compromised Certificates and Central Security Emergency.
European Grid Initiative AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
Summary of Poznan EUGridPMA32 September EUGridPMA Poznan 2014 meeting – 2 David Groep – Welcome back at PSNC.
18 th EUGridPMA, Dublin / SRCE CA Self Audit SRCE CA Self Audit Emir Imamagić SRCE Croatia.
2007© SWITCH SWITCHslcs the new AAI-based short-lived credential service for Grid users C.Witzig Swiss Grid Day, Berne, May 7, 2007.
On live video supported F2F May 9-11, 2016 Abingdon, Oxfordshire, UK.
CERN IT Department CH-1211 Geneva 23 Switzerland t OIS Operating Systems & Information Services CERN IT Department CH-1211 Geneva 23 Switzerland.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF & EUGridPMA status update SHA-2 – and more (David Groep,
News from EUGridPMA EGI OMB, 22 Jan 2013 David Kelsey (STFC) Using notes from David Groep 22/01/20131EUGridPMA News.
© 2007 Open Grid Forum Authentication Service Profile Christos Kanellopoulos 14 th EUGridPMA, Lisbon, PT October 7 th, 2008.
PRACE user authentication and vetting Vincent RIBAILLIER, 29 th EUGridPMA meeting, Bucharest, September 9 th, 2013.
IGTF Generalised Assurance comments by federation operators with a SAML background September 19-21, 2016 CERN, Geneva, CH.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI The IGTF IOTA Profile towards differentiated assurance levels.
Building Trust for Research and Collaboration
WLCG Update Hannah Short, CERN Computer Security.
J Jensen, STFC Chief Soapbox Officer 23 May 2017
Soapbox of Random Stuff
EUGridPMA Status and Current Trends and some technical topics November 2013 La Plata, AR David Groep, Nikhef & EUGridPMA.
Assessing Combined Assurance
Assessing Combined Assurance
Evolving the EGI trust fabric using distributed responsibility
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
AARC Blueprint Architecture and Pilots
Supporting communities with harmonized policy
Appropriate Access InCommon Identity Assurance Profiles
AAI in EGI Status and Evolution
Doug Bellows – Inteliquent 3/18/2019
Dr Linda Cornwall STFC/RAL EGI OMB 27th September 2013
Presentation transcript:

IOTA Questions for RPs Sept 9, 2013 Bucharest, Romania

28 th EUGridPMA Kyiv – May David Groep – Basic Premises  Subject names must be globally unique  Subject names must be persistent (for the life time of the authority)  It’s about people and robots  Naming of IOTA subjects must be different from other profiles

28 th EUGridPMA Kyiv – May David Groep – IOTA Questions for RPs  Do the RPs/RCs need the ‘real name’ of the person the certificate subject?  Is it enough to be able to ask another entity to give you the name (e.g. the VO, community, other site or central LDAP)? What assurance level do you expect from this 3 rd party?  Do you need this information up-front (before or at use time)?  Do you need this information at end (e.g. for accounting)?  or It is sufficient to be able to ask an entity to contact the user on your behalf (like a privacy service)?  Should pseudonyms be clearly identifiable (e.g. if they look like a name they should be the real name)?  The use case will not work: since Address must be embedded in the SAN, but the mail will be pseudonymous as well

28 th EUGridPMA Kyiv – May David Groep – IOTA AP  Vetting assurance level and responsibility  Given that the name may be a pseudonym and is weakly verified, do you (RP, community) have the mechanisms in place to strongly identify the real user?  Should we enforce obfuscated naming for all subjects?  How will you (RP, VO) deal with ‘identity spoofing’?  How do you currently enrol users in the community? Do you use or rely on the commonName of the subject for adding people to your databases (or get a ‘warm fuzzy’ feeling in association with e.g. unsigned )?  Tracability by the VO  Are you set up to provide traceability for your users?  Do you have means and procedures for incident response and mitigation?

28 th EUGridPMA Kyiv – May David Groep – Auditability, traceability  Access to the user information by RPs  Do you insist that the collection of this data is verifiable?  Should the chain of processes be documented?  Should the chain of processes be audited periodically (expensive!)?  Should the chain be auditable? Or contract/sanction-based?  A user may and will have many credentials and changing names: does this pose issues?  Do you expect e.g. the community to provide a real name up-front with every access request (e.g. in a VOMS generic attribute)?  Do the RPs (RCs) need to be able to independently trace the user without involving the user community?  Can a registration mechanism, retrievable or callable by the RP, satisfy this requirement (e.g. like the EGEE CIC portal having an ability to send to the owner of a DN)  Do the RPs need to be able to trace without involving the CA?  Which are the ‘emergency cases’ where they expect CA involvement in tracing or contacting subscribers?

28 th EUGridPMA Kyiv – May David Groep – Incident response  Do RPs/RCs expect the CA to be involved in incident response?  What is an incident where you expect CA involvement?  What is the level of involvement?  Do you see a classification of incidents?  If there are up-stream IdPs, are you ‘happy’ with just the CA response even if upstream does not participate?  Do you expect more than pure credential revocation in case of demonstrable credential compromise?  Do you see the CA more than a fall back to point to in case LEA comes after you?  Do you expect/prefer suspension possibilities? Do you have this capability at the RP level (through authorization)?  Can you get by with just your own response capability?