LiveAP Towards Differentiated Identity Assurance David Groep, Nikhef supported by the Netherlands e-Infrastructure SURFsara, and EGI.eu O-E-15 and EGI-InSPIRE.

Slides:



Advertisements
Similar presentations
Appropriate Access InCommon Identity Assurance Profiles David L. Wasley Campus Architecture and Middleware Planning workshop February 2008.
Advertisements

Classic X.509 secured profile version 4.2 Proposed Changes David Groep, Apr 20 th, 2009.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI The IGTF IOTA Profile towards differentiated assurance levels.
David Groep Nikhef Amsterdam PDP & Grid Evolving Assurance – IGTF LoA generalisation David Groep Interoperable Global Trust Federation IGTF Documents at.
Grid Security. Typical Grid Scenario Users Resources.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI - Identity Management Steven Newhouse Director, EGI.eu Federated Identity.
INFSO-RI Enabling Grids for E-sciencE Portals and Authentication Issues and Solution Directions from a CA and IGTF Perspective David.
INFSO-RI Enabling Grids for E-sciencE JRA3 2 nd EU Review Input David Groep NIKHEF.
David Groep EUGridPMA The International Grid Trust Federation enabling an interoperable global trust fabric also supported by EGI.eu EGI-InSPIRE RI ,
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
David Groep Nikhef Amsterdam PDP & Grid Differentiated and Collaborative Assurance profiling the identity management landscape for diversifying e-Infrastructure.
IOTA Questions for RPs Sept 9, 2013 Bucharest, Romania.
David Groep Nikhef Amsterdam PDP & Grid Traceability in the face of Clouds EGI-GEANT Symposium – cloud security track With grateful thanks for the input.
Identity Management Levels of Assurance WLCG GDB CERN, 8 Apr 2009 David Kelsey STFC/RAL david.kelsey AT stfc.ac.uk.
Federated Identity Management for HEP David Kelsey WLCG GDB 9 May 2012.
+1 (801) Standards for Registration Practices Statements IGTF Considerations.
Security Update WLCG GDB CERN, 12 June 2013 David Kelsey STFC/RAL.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
Enforcement mechanisms for distributed authorization across domains in UMA – aka “UMA trust” Eve Maler | 22 Aug 2012 draft.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI Towards Differentiated Identity Assurance as a collaborative.
Updates from the EUGridPMA David Groep, July 16 st, 2007.
David Groep Nikhef Amsterdam PDP & Grid Evolving Assurance – going where? Collaborative, distributed, and generalized assurance beyond just identity authentication.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
EResearchers Requirements the IGTF model of interoperable global trust and with a view towards FIM4R AAI Workshop Presenter: David Groep, Nikhef.
IOTA Questions for RPs Sept 9, 2013 Bucharest, Romania.
SHA-2, current trends and some technical topics March 2013 Taipei, TW David Groep, Nikhef & EUGridPMA.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
EUGridPMA Status, current trends and some technical topics March 2013 Taipei, TW David Groep, Nikhef & EUGridPMA.
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
Authentication and Authorisation for Research and Collaboration Licia Florio AARC Workshop The AARC Project Brussels, 26 October.
Security Policy Update David Kelsey UK HEP Sysman, RAL 1 Jul 2011.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Current status and plans.
A Trust Framework for Security Collaboration among Infrastructures David Kelsey (STFC-RAL, UK) 1 st WISE, Barcelona 20 Oct 2015.
IOTA AP Towards Differentiated Identity Assurance David Groep, Nikhef supported by the Netherlands e-Infrastructure and SURFsara.
A Trust Framework for Security Collaboration among Infrastructures David Kelsey (STFC-RAL, UK) WLCG GDB, CERN 10 Jul 2013.
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Federated Identity Management for HEP David Kelsey HEPiX, Ann Arbor MI 30 Oct 2013.
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
EGI-InSPIRE RI EGI EGI-InSPIRE RI Service Operations Security Policy the new generalised site operations security policy.
EGI-InSPIRE RI EGI EGI-InSPIRE RI Establishing Identity in EGI the authentication trust fabric of the IGTF and EUGridPMA.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF EUGridPMA status update SHA-2, OCSP, and more David.
European Grid Initiative AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
APGridPMA Update Eric Yen APGridPMA August, 2014.
David Groep Nikhef Amsterdam PDP & Grid AARC Authentication and Authorisation for Research and Collaboration an impression of the road ahead.
Summary of Poznan EUGridPMA32 September EUGridPMA Poznan 2014 meeting – 2 David Groep – Welcome back at PSNC.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Services for Distributed e-Infrastructure Access Tiziana Ferrari on behalf.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF & EUGridPMA status update SHA-2 – and more (David Groep,
News from EUGridPMA EGI OMB, 22 Jan 2013 David Kelsey (STFC) Using notes from David Groep 22/01/20131EUGridPMA News.
Authentication and Authorisation for Research and Collaboration Peter Solagna, Nicolas EGI AAI integration experiences AARC Project.
PRACE user authentication and vetting Vincent RIBAILLIER, 29 th EUGridPMA meeting, Bucharest, September 9 th, 2013.
IGTF in 10 years enabling the interoperable global trust federation Nikhef, Amsterdam supported the Dutch national e-Infrastructure funded and coordinated.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI The IGTF IOTA Profile towards differentiated assurance levels.
Building Trust for Research and Collaboration
AAI Alignment Nicolas Liampotis (based on the work of Mikael Linden)
Solutions for federated services management EGI
Frameworks for harmonized policies and practices
Policy in harmony: our best practice
Assessing Combined Assurance
Assessing Combined Assurance
Evolving the EGI trust fabric using distributed responsibility
AARC Blueprint Architecture and Pilots
Supporting communities with harmonized policy
Appropriate Access InCommon Identity Assurance Profiles
Combined Assurance Model
Presentation transcript:

LiveAP Towards Differentiated Identity Assurance David Groep, Nikhef supported by the Netherlands e-Infrastructure SURFsara, and EGI.eu O-E-15 and EGI-InSPIRE NA2.3

APGridPMA Taipei 2013 meeting – 2 David Groep – Outline  Introduction and retro-active rationale  Assurance levels  IGTF ‘common criteria’  Current APs  Towards collaborative differentiated LoA  Distributing elements of trust decision  Use cases for the LiveAP  LiveAP  Light-weight Identity Vetting Environment: towards LoA 1+  Limitations of a ‘LIVE AP’ and new LoA levels Towards differentiated collaborative LoA

APGridPMA Taipei 2013 meeting – 3 David Groep – Requirements to fulfil – mainly for RPs! Towards differentiated collaborative LoA Incident Response long-term* traceable independent from short-lived community must be revocable correlate with other information sources banning and containment handle Privacy and data protection important ‘unalienable right’ for research correlation of PII among service providers could allow profiling exchange of PII often fraught with issues Measurement and Accounting publication metrics usage metering, billing auditing and compliance monitoring identity lives in a policy ecosystem to protect all participants commensurate to their risk level Access Control Attribute handle unique binding never re-assigned Regulatory compliance need to know who you let in beforehand

APGridPMA Taipei 2013 meeting – 4 David Groep – Redistributing responsibilities Towards differentiated collaborative LoA Subject (ID) based Effective LoA is retained For given actions, resources, and acceptable residual risk, required ID assurance is a given can shift ‘line’ in identity trust level Action (app) based More constraint actions can lower need for identity LoA (J)SPG VO Portal policy did just that: 4 levels of actions Resource (value) based e.g. access to wireless network does not pose huge risks, so can live with a lower identity LoA (eduroam)

APGridPMA Taipei 2013 meeting – 5 David Groep – Trust Element Distribution (Classic, MICS) Towards differentiated collaborative LoA Technical elements integrity of the roots of trust integrity of issuance process process incident response revocation capabilities key management credential management incident response Identity elements identifier management re-binding and revocation binding to entities traceability of entities emergency communications regular communications ‘rich’ attribute assertions correlating identifiers access control Verifiability & Response, mitigation, recovery IGTF Classic elements RP, Community elements

APGridPMA Taipei 2013 meeting – 6 David Groep – Collaborative assurance?  PRACE T1 (“DEISA”) centres  Users run applications across the infrastructure  All originate from a home site inside the infrastructure where they are fully known personally and have gone through a thorough vetting process  Home site distributes this knowledge actively towards the other centres (through a central LDAP) So some of the identity elements of trust already done  XSEDE might be similar?  even wLCG is somewhat similar … through CERN HR Towards differentiated collaborative LoA I’m hopefully not misrepresenting Jules Wolfrat for PRACE here … redistribution of responsibilities: a new profile?

APGridPMA Taipei 2013 meeting – 7 David Groep – Light-weight ID vetting environment AP  Cater for those use cases where  the RPs (VOs) already collect identity data  this RP (VO) data is authoritative and provides traceability  the ‘identity’ component of the credential is not used  through an AP where the authority provides only  persistent, non-reused identifiers  traceability only at time of issuance  naming be real or pseudonymous (discussion on going!)  good security for issuance processes and systems  and where the RP will have to take care of  subscribers changing name often (in case traceability at issuing authority is lost)  all ‘named’ identity vetting, naming and contact details

APGridPMA Taipei 2013 meeting – 8 David Groep – ‘Light-weight Identity Vetting Environment’  as seen from the IdP/authority side  Must be complemented by the RP to profile full vetting and integrity Vetting LoA scale LoA 0: ‘like conventional unsigned ’ * somewhat my personal view … sorry for bias 1 2 …3,4 RP task

APGridPMA Taipei 2013 meeting – 9 David Groep – From IGTF to RP  IGTF Distribution is not monolithic  Authorities comes in ‘bundles’ for each profile  RPs select one or more ‘profiles’ as sufficient and may add their own authorities as well  e.g: “EGI policy on trusted authorities” accepts Classic, MICS and SLCS And there is no ‘IGTF all’ distribution – on purpose!  With more diverse profiles (and LoAs) RPs will make more diverse choices For your interest: EGI SPG policy on Approval of Certification Authorities,

APGridPMA Taipei 2013 meeting – 10 David Groep – LiveAP and its Caveats  Live AP assurance level is different, and rest must be taken up by somebody else  But e.g. in EGI  many communities rely on names to enrol people  communities do not keep much of auditable records  users are a-priori unknown to the resource owners  RPs support loosely organised communities  RPs thus need independent authoritative real names Identity elements identifier management re-binding and revocation binding to entities traceability of entities emergency communications regular communications ‘rich’ attribute assertions correlating identifiers access control

APGridPMA Taipei 2013 meeting – 11 David Groep – Technical trust remains  loosing technical trust would make any authentication infrastructure useless  so integrity of the issuer has to be retained  just like for the AA Operations Guidelines  similar to the classic, mics and slcs profiles  both issuing system and ID management secure  retention of records for incident response When contracting back-end (university) IdPs the requirements must apply to them as well

APGridPMA Taipei 2013 meeting – 12 David Groep – LIGHT-WEIGHT IDENTITY VETTING ENVIRONMENT The Profile

APGridPMA Taipei 2013 meeting – 13 David Groep – DRAFT LIVE AP Identity  Persistency of name binding  any single subject name in a credential must be linked with one and only one entity for the whole lifetime of the service  Naming  name elements […] sufficient to uniquely identify individual  sourced from ‘reasonable’ systems  real name or pseudonym with compensatory controls:  only in conjunction w/verified name element allowing contact to subject -- and the pseudonymity should be ‘obvious’  Re-issuance, renewal and re-keying  authority should keep enough data to re-vet use of name  Tracability requirements  at issuance time the authority should identify user, and that relationship should be documented and verifiable

APGridPMA Taipei 2013 meeting – 14 David Groep – DRAFT LIVE AP Technical  We expect a secure, on-line CA system  Long-term commitment, security controls and trained personnel  With FIPS140-2 level 3 or equivalent HDM controlling key  2+ tier system on monitored controlled network  revocation capable  so at least better than ssh ;-)  Documented, transparent, policy and practices  Including provisions for auditing by peers  Some requirements propagate back to upstream IdPs!  Credentials in common recognisable formats  Initially X.509v3 certificates, but profile is mostly generic!

APGridPMA Taipei 2013 meeting – 15 David Groep – DRAFT will change

APGridPMA Taipei 2013 meeting – 16 David Groep – New Authentication Profile  The AP currently being drafted on   Satisfy RP requirements (PRACE, XSEDE) – and aim to get SARoNGS and CI Logon Basic included  Many things to be decided!  Need for HSM FIPS level 3 or 2?  What audit requirements needed?  Real or pseudonymous naming? Robots or not?  Distribution would be through separate ‘bundle’  Next to ‘classic’, ‘mics’, ‘slcs’, and ‘experimental’  Note there never was an ‘all’ bundle for this very reason  RPs will have to make an explicit choice to accept this