Current Activities in Middleware Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder.

Slides:



Advertisements
Similar presentations
04 June 2002, TERENA, Limerick MACE: Directories at Work Keith Hazelton, Senior IT Architect, Univ. of Wisconsin-Madison Chair, MACE-Dir Working Group.
Advertisements

Digital Certificate Operation in a Complex Environment Matthew J. Dovey Oxford University Computing Services.
Internet2 Middleware BASE CAMP slides Michael R. Gettes Principal Technologist Georgetown University
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Technical Primer: Identifiers Internet2 Base CAMP Boulder, Colorado June, 2002.
Welcome to CAMP! Ken Klingenstein, Director, Internet2 Middleware Initiative.
Lecture 23 Internet Authentication Applications
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
PKI: News from the Front and views from the Back Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of.
CNI Fall 1998 Access Management Requirements and Approaches Joan Gargano California Digital Library
PKI Update. Topics Background: Why/Why Not, The Four Planes of PKI, Activities in Other Communities Technical activities update S/MIME Pilot prospects.
May 22, 2002 Joint Operations Group Discussion Overview Describe the UC Davis Security Architecture Describe Authentication Efforts at UC Davis Current.
June 1, 2001 Enterprise Directory Service at College Park David Henry Office of Information Technology University of Maryland College Park
Copyright JNT Association 20051OptionalCopyright JNT Association 2007 Overview of the UK Access Management Federation Josh Howlett.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
9/20/2000www.cren.net1 Root Key Cutting and Ceremony at MIT 11/17/99.
InCommon Policy Conference April Uses  In order to encourage and facilitate legal music programs, a number of universities have contracted with.
Welcome to CAMP Identity Management Integration Workshop Ann West NMI-EDIT EDUCAUSE/Internet2.
EDUCAUSE PKI Working Group Where Are We and Where are We Going.
1 PKI Update September 2002 CSG Meeting Jim Jokl
Middleware Tutorial and Use Renee Woodten Frost Project Manager, Internet2 Middleware Initiative Internet2 Middleware Liaison, University of Michigan ARKNet.
Directory Services at UMass  Directory Services Overview  Some common definitions  What can a directory do or not do?  User Needs Assessment  What.
New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
HEPKI-TAG UPDATE Jim Jokl University of Virginia
X.509/PKI There is progress.... Topics Why PKI? Why not PKI? The Four Stages of X.509/PKI Other sectors Federal Activities - fBCA, NIH Pilot, ACES, other.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Supporting further and higher education Middleware and AA within the JISC Environment Nicole Harris, JISC Development Group.
Shibboleth Update Michael Gettes Principal Technologist Georgetown University Ken Klingenstein Director Interne2 Middleware Initiative.
USERS Implementers Target Communities NMI Integration Testbed The NMI Integration Testbed NMI Participation Developed and managed by SURA Evaluate NMI.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
Internet2 Middleware Initiatives: Early Harvest to Early Adopters and Beyond Renee Woodten Frost Project Manager, Middleware Early Adopters, Internet2.
March 27, 2000GSU/IST/Advanced Campus Services 1 Enterprise Directory Strategy & Recommendations Georgia State University.
Shibboleth Update Advanced CAMP 7/31/02 RL “Bob” Morgan, Washington Steven Carmody, Brown Scott Cantor, Ohio State Marlena Erdos, IBM/Tivoli Michael Gettes,
Shibboleth A word which was made the criterion by which to distinguish the Ephraimites from the Gileadites. The Ephraimites, not being able to pronounce.
Internet2 Middleware Initiative Shibboleth Ren é e Shuey Systems Engineer I Academic Services & Emerging Technologies The Pennsylvania State University.
Middleware CAMP June Welcome Welcome to the Camp, I guess you all know why we're here. Tommy, by Pete Townsend, The Who We're not gonna take it.
State of e-Authentication in Higher Education August 20, 2004.
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
Mware 101 Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder.
February 1, 2002 Internet2 Middleware Initiative and MACE RL "Bob" Morgan, University of Washington.
PKI: News from the Front and views from the Back Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of.
PKI Session Overview 1:30 pm edt - Welcome, etiquette, session outline 1:40 pm edt - HEPKI-TAG Update (Jim Jokl, Virginia) 2:00 pm edt - HEPKI-PAG Update.
New Developments in Access Management: Setting the Scene Alan Robiette JISC Development Group JISC-CNI Conference, June 2002.
Higher Ed Certificate Authority by CREN: Update CSG February 2, 2000.
05 October 2001 Directories: The Next Stage Keith Hazelton, Senior IT Architect University of Wisconsin-Madison Keith Hazelton, Senior IT Architect University.
Day 3 Roadmap and PKI Update. When do we get to go home? Report from the BoFs CAMP assessment, next steps PKI technical update Break Research Issues in.
Welcome to Base CAMP: Enterprise Directory Deployment Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein This.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Current Middleware Picture Tom Barton University of Chicago Tom Barton University of Chicago.
Middleware and Muddleware: A Progress Report Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado.
Shibboleth Update January, 2001 Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder.
October 2, 2001 Middleware: Pieces and Processes RL "Bob" Morgan, University of Washington.
Authorization: Just when you thought middleware was no fun anymore Keith Hazelton, Senior IT Architect, Univ. of Wisconsin-Madison Member, Internet2 Middleware.
Internet2 Base CAMP Topics in Middleware: Authentication.
2-Oct-0101 October 2001 Directories as Middleware Keith Hazelton, Senior IT Architect University of Wisconsin-Madison Keith Hazelton, Senior IT Architect.
Welcome to CAMP Directory Workshop Ken Klingenstein, Internet2 and University of Colorado-Boulder.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Vidmid Session Overview
Current Activities in Middleware
Middleware CAMP June 2002 _______________________________________________________________.
Goals Introduce the Windows Server 2003 family of operating systems
September 2002 CSG Meeting Jim Jokl
Presentation transcript:

Current Activities in Middleware Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder

Topics Application requirements - Digital libraries, Grids, IMS, Portals, etc... Early Harvest best practices Early Adopters Mace (Middleware Architectural Committee for Education) Experiments: Shibboleth, the Directory of Directories, and Eduperson PKI Medical middleware International Efforts

Application Requirements Digital libraries need scalable, interoperable authentication and authorization. The Grid as the new paradigm for a computational resource, with Globus the middleware, including security, location and allocation of resources, scheduling, etc. built on top of campus infrastructures. Instructional Management Systems (IMS) need authentication and directories Next-generation portals want common authentication and storage

Partnerships EDUCAUSE CREN Globus, Legion, etc. Campuses Professional associations - AACRAO, NACUA, CUMREC

The Early Harvest experiences Identifiers for people, objects, groups Authentication for people, objects and groups Directories to store common information Authorization services Applications that use all of the above Complex design and implementation tradeoffs at technical and policy levels

Early Harvest Outputs Identifier mapping Good practice documents on middleware web site, to guide campus IT organizations Informational RFC in June May form part of the basis for an assurance model for higher ed PKI

Identifier Mapping Map campus identifiers against a canonical set of functional needs For each identifier, establish its key characteristics, including revocation, reassignment, privileges, and opacity Shine a light on some of the shadowy underpinnings of middleware

Major campus identifiers UUID Student and/or emplid Person registry id Account login id Enterprise-lan id Netid address Library/deptl id Publicly visible id (and pseudossn) Pseudonymous id

Identifier Characteristics Revocation - can the subject ever be given a different value for the identifier Reassignment - can the identifier ever be given to another subject Privileges - what accesses does the authenticated identifier have Opacity - is the real world subject easily deduced from the identifier - privacy and use issues

Identifier relationships Person registry ID address Library ID Acct login Pseudo ID Student ID PubVis ID Enterprise-LAN ID Departmental IDs UUID Empl ID ISO card ID

Authentication Options Password based Clear text LDAP Kerberos Certificate based Others - challenge-response, biometrics

Typical Good Practices Have a UUID that is non-revocable, non-reassignable, opaque No clear text passwords Precrack new passwords, using foreign dictionaries as well as US Confirm new passwords are different than old Require password change if possibly compromised Use shared secrets or positive photo-id to reset forgotten passwords Password strength depends on use...

Typical Interoperability Standards dc= instead of X.500 for naming of directory suffixes, certificate subjects, etc. use of certain object class future standardization of certificate profiles

Directories: Core of the Core Overall campus directory services model Enterprise directory design and implementation Departmental directories Security and directories

Enterprise directory issues Schema, referrals and redundancy Naming Attributes Replication and synchronization Groups

Early Adopters: The Campus Testbed Phase A variety of roles and missions Commitment to move implementation forward Provided some training and facilitated support Develop national models of deployment alternatives Address policy standards

Early Adopter Participants Dartmouth U Hawaii Johns Hopkins Univ of Maryland, BC Univ of Memphis Univ of Michigan Michigan Tech Univ Univ of Pittsburgh Univ of Southern Cal Tufts Univ Univ of Tennessee, Memphis

Primary Goals to facilitate the campus deployments of core middleware technologies to identify reasonable approaches - both technical and policy - and design issues and factors that influence institutional selection of a particular approach to enrich the technical contents of Early Harvest to inform larger community (NSF, Education, NIH, etc) of requirements for deployment and interoperability

Secondary Goals explore medical middleware issues Generic - how is this expressed in the core deployment Specific - what medical data structures need integration into campus environment outreach to encourage other institutions research into options for authorization services evaluate new tools and technologies

Basic Approaches technology sharing and workshops policy sharing champions data owners professional associations - EDUCAUSE, CNI, NACUA, NACUBO, AACRAO, ALA, external experts vendor interactions

MACE (Middleware Architecture Committee for Education) Purpose - to provide advice, create experiments, foster standards, etc. on key technical issues for core middleware within higher ed Membership - Bob Morgan (UW) Chair, Steven Carmody (Brown), Michael Gettes (Georgetown), Keith Hazelton (Wisconsin), Paul Hill (MIT), Mark Mara (Cornell), Mark Poepping (CMU) Current working Groups DIR - eduperson, the Uber-directory experiment PKI - campus operational issues, trust models, fPKI involvement Shibboleth - inter-institutional resource sharing

A Directory of Directories an experiment, now encompassing 8 schools, to build a combined directory search service to show the power of coordination to show the existing barriers to cooperation standard object classes standard display formats standard meta-data to investigate load and scaling issues - on the clients and the servers to suggest the service to follow

Edu-person An objectclass for higher education Contain suggested attributes for instructional, research and administrative inter-institutional use Presumes campuses to add local person objectclass. A joint effort of EDUCAUSE and I2

edu-person 0.9a parent objectclass=inetorgperson intends to integrate with Grid, IMS, and other upper-middleware includes: primary affiliation (fac/stu/staff) enrolledcurrentterm (binary true/false) withdrawnpreviousterm (binary) schoolcollegename, (multivalued case ignore strings)

Shibboleth interinstitutional web authentication and perhaps authorization use local credentials for remote services; enable logins; fosters best practices; encourage transition from simple ht controls to LDAP-based uses SRV records in DNS and several forms of authn; authz via directories IBM to analyze, several schools to participate in pilot

Medical middleware the intersection of higher ed and health care services worst case requirements in I/A HIPAA - new privacy and security requirements must integrate with higher level objects - CORBA Med work will consist of problem structuring, technologies, and policy/process issues

International Aspects identifier agreements international trust models shared expertise workshop this summer in Europe

Authorization how an individual’s attributes are carried from an individual or a central store to an application move from a per-application basis to an infrastructural service options include Kerberos tickets LDAP calls RPC’s long-term certificates attribute certificates

PKI Public Key Certificates are a remarkably simple and powerful tool for signing documents authentication encrypting building secure channels across the Internet non-repudiation conveying authorizations and more Infrastructure to support this little understood mobility user interface internal formats trust chains revocation policy expression See Current Issues in PKI on middleware.internet2.edu for details

Where to watch cren.org fPKI work Globus.org