Mine Altunay OSG Security Officer Open Science Grid: Security Gateway Security Summit January 28-30, 2008 San Diego Supercomputer Center.

Slides:



Advertisements
Similar presentations
Global Grid Forum GridWorld GGF15 Boston USA October Abhishek Singh Rana and Frank Wuerthwein UC San Diegowww.opensciencegrid.org The Open Science.
Advertisements

Dec 14, 20061/10 VO Services Project – Status Report Gabriele Garzoglio VO Services Project WBS Dec 14, 2006 OSG Executive Board Meeting Gabriele Garzoglio.
Role Based VO Authorization Services Ian Fisk Gabriele Carcassi July 20, 2005.
OSG AuthZ Architecture AuthZ Components Legend VO Management Services Grid Site GUMS Site Services SAZ CE Gatekeeper Prima Is Auth? Yes / No SE SRM gPlazma.
Implementing Finer Grained Authorization in the Open Science Grid Gabriele Carcassi, Ian Fisk, Gabriele, Garzoglio, Markus Lorch, Timur Perelmutov, Abhishek.
Andrew McNab - EDG Access Control - 14 Jan 2003 EU DataGrid security with GSI and Globus Andrew McNab University of Manchester
Open Science Grid Use of PKI: Wishing it was easy A brief and incomplete introduction. Doug Olson, LBNL PKI Workshop, NIST 5 April
Open Science Grid Use of PKI: Wishing it was easy A brief and incomplete introduction. Doug Olson, LBNL PKI Workshop, NIST 5 April 2006.
OSG End User Tools Overview OSG Grid school – March 19, 2009 Marco Mambelli - University of Chicago A brief summary about the system.
VO Management in D-Grid, 2. WS, H. Enke (AstroGrid-D) AGD Grid Account Management.
Open Science Grid Software Stack, Virtual Data Toolkit and Interoperability Activities D. Olson, LBNL for the OSG International.
OSG Security Review Mine Altunay June 19, June 19, Security Overview Current Initiatives  Incident response procedure – top priority (WBS.
OSG Services at Tier2 Centers Rob Gardner University of Chicago WLCG Tier2 Workshop CERN June 12-14, 2006.
OSG Middleware Roadmap Rob Gardner University of Chicago OSG / EGEE Operations Workshop CERN June 19-20, 2006.
VOX Project Status T. Levshina. Talk Overview VOX Status –Registration –Globus callouts/Plug-ins –LRAS –SAZ Collaboration with VOMS EDG team Preparation.
May 8, 20071/15 VO Services Project – Status Report Gabriele Garzoglio VO Services Project – Status Report Overview and Plans May 8, 2007 Computing Division,
OSG Security Kevin Hill. Goals Operational Security – Identify software vulnerabilities – observing the practices of our VOs and sites, and sending alerts.
Grid Security 1. Grid security is a crucial component Need for secure communication between grid elements  Authenticated ( verify entities are who they.
G RID M IDDLEWARE AND S ECURITY Suchandra Thapa Computation Institute University of Chicago.
Apr 30, 20081/11 VO Services Project – Stakeholders’ Meeting Gabriele Garzoglio VO Services Project Stakeholders’ Meeting Apr 30, 2008 Gabriele Garzoglio.
National Computational Science National Center for Supercomputing Applications National Computational Science NCSA-IPG Collaboration Projects Overview.
Mar 28, 20071/9 VO Services Project Gabriele Garzoglio The VO Services Project Don Petravick for Gabriele Garzoglio Computing Division, Fermilab ISGC 2007.
Evolution of the Open Science Grid Authentication Model Kevin Hill Fermilab OSG Security Team.
OSG Security Review Mine Altunay December 4, 2008.
VOMRS/VOMS-Admin Convergence and VO Services Project Status Tanya Levshina Computing Division, Fermilab.
May 11, 20091/17 VO Services Project – Stakeholders’ Meeting Gabriele Garzoglio VO Services Project Stakeholders’ Meeting May 11, 2009 Gabriele Garzoglio.
Jan 10, 20091/16 VO Services Project – Stakeholders’ Meeting Gabriele Garzoglio VO Services Project Stakeholders’ Meeting Jan 10, 2009 Gabriele Garzoglio.
Global Grid Forum GridWorld GGF15 Boston USA October Abhishek Singh Rana and Frank Wuerthwein UC San Diegowww.opensciencegrid.org The Open Science.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
June 24-25, 2008 Regional Grid Training, University of Belgrade, Serbia Introduction to gLite gLite Basic Services Antun Balaž SCL, Institute of Physics.
Mine Altunay July 30, 2007 Security and Privacy in OSG.
Overview of Privilege Project at Fermilab (compilation of multiple talks and documents written by various authors) Tanya Levshina.
Role Based VO Authorization Services Ian Fisk Gabriele Carcassi July 20, 2005.
US LHC OSG Technology Roadmap May 4-5th, 2005 Welcome. Thank you to Deirdre for the arrangements.
Open Science Grid (OSG) Introduction for the Ohio Supercomputer Center Open Science Grid (OSG) Introduction for the Ohio Supercomputer Center February.
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
VO Privilege Activity. The VO Privilege Project develops and implements fine-grained authorization to grid- enabled resources and services Started Spring.
OSG AuthZ components Dane Skow Gabriele Carcassi.
Jun 12, 20071/17 AuthZ Interoperability – Status and Plan Gabriele Garzoglio AuthZ Interoperability Status and Plans June 12, 2007 Middleware Security.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
AstroGrid-D Meeting MPE Garching, M. Braun VO Management.
Auditing Project Architecture VERY HIGH LEVEL Tanya Levshina.
OSG Site Admin Workshop - Mar 2008Using gLExec to improve security1 OSG Site Administrators Workshop Using gLExec to improve security of Grid jobs by Alain.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
Eileen Berman. Condor in the Fermilab Grid FacilitiesApril 30, 2008  Fermi National Accelerator Laboratory is a high energy physics laboratory outside.
Sep 25, 20071/5 Grid Services Activities on Security Gabriele Garzoglio Grid Services Activities on Security Gabriele Garzoglio Computing Division, Fermilab.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
Jun 18, 20071/26 Security Policies and Middleware in OSG Gabriele Garzoglio Security Policies and Middleware in OSG June 18, 2007 JRA1 All Hands Meeting.
Ákos FROHNER – DataGrid Security n° 1 Security Group TODO
INFSO-RI Enabling Grids for E-sciencE SAML-XACML interoperability Oscar Koeroo.
Open Science Grid Build a Grid Session Siddhartha E.S University of Florida.
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
Sep 17, 20081/16 VO Services Project – Stakeholders’ Meeting Gabriele Garzoglio VO Services Project Stakeholders’ Meeting Sep 17, 2008 Gabriele Garzoglio.
VOX Project Status T. Levshina. 5/7/2003LCG SEC meetings2 Goals, team and collaborators Purpose: To facilitate the remote participation of US based physicists.
Feb 15, 20071/6 OSG EB Meeting – VO Services Status Gabriele Garzoglio VO Services Status OSG EB Meeting Feb 15, 2007 Gabriele Garzoglio, Fermilab.
Site Authorization Service Local Resource Authorization Service (VOX Project) Vijay Sekhri Tanya Levshina Fermilab.
Tier 3 Support and the OSG US ATLAS Tier2/Tier3 Workshop at UChicago August 20, 2009 Marco Mambelli –
Open Science Grid Security Activities D. Olson, LBNL OSG Deputy Security Officer For the OSG Security Team: M. Altunay, FNAL, OSG Security Officer, D.O.,
OSG Status and Rob Gardner University of Chicago US ATLAS Tier2 Meeting Harvard University, August 17-18, 2006.
Abhishek Singh Rana and Frank Wuerthwein UC San Diegowww.opensciencegrid.org The Open Science Grid ConsortiumCHEP 2006 Mumbai INDIA February gPLAZMA:
INFSO-RI Enabling Grids for E-sciencE GUMS vs. LCMAPS Oscar Koeroo.
Why you should care about glexec OSG Site Administrator’s Meeting Written by Igor Sfiligoi Presented by Alain Roy Hint: It’s about security.
New OSG Virtual Organization Security Training OSG Security Team.
OSG Security Review Mine Altunay March 12, Jan Security Overview Current Initiatives  OSG Security roadmap  Technical and operational.
FermiGrid - PRIMA, VOMS, GUMS & SAZ Keith Chadwick Fermilab
OSG Security Kevin Hill.
Open Science Grid Progress and Status
Open Science Grid Consortium Meeting
f f FermiGrid – Site AuthoriZation (SAZ) Service
AuthZ Interop report out
Presentation transcript:

Mine Altunay OSG Security Officer Open Science Grid: Security Gateway Security Summit January 28-30, 2008 San Diego Supercomputer Center

Gateway Security Summit : 01/30/ OSG Security Team Mine Altunay FNAL Doug Olson LBNL Bob Cowles SLAC Don Petravick FNAL

Gateway Security Summit : 01/30/ OSG Security The big picture: –What OSG security does ? Security Infrastructure –Authentication –VOMS –PRIMA/GUMS –gPlazma –gLexec How can someone become part of OSG

Gateway Security Summit : 01/30/ OSG Security A security framework that enables science and promotes autonomous and open science collaboration among VOs, sites, and software providers Operational –Vulnerability analysis, patches, –Incident response Interoperability –Joint policy work, JSPG, MWSG, IGTF –Why we are here – how to build interoperability with other Grids TeraGrid Education –Security tutorials, documents for naïve user

Gateway Security Summit : 01/30/ Globu s Condo r GLexe c RSV Gratia VDT Fermi grid BNL_ATLAS _1 UCSDT2 ATLAS CM S Software Check software vulnerabilities Develop and announce patches Interoperability JSPG, IGTF: Participate in EGEE’s response and operation teams: Security Education for Sites and VOs Raise security awareness Teach OSG policies and best practices workshops, tutorials, grid schools Open Science Grid Job Submissions Policies for Site-VO interoperability Develop policies : AUP, Service Agreements, pilot policies, MOU, membership Inter operability Incident Response and Monitoring Coordinating the response teams, communication with Sites and VOs Banning compromised machines or users, monitoring for suspicious job submissions Fire drills for practice

Gateway Security Summit : 01/30/ Security Infrastructure Authentication –Performed by GSI –OSG distributes IGTF approved root CAs (in VDT) –Sites fetches automatic CRL updates –Sites can update root CAs (optional tool in VDT)

Gateway Security Summit : 01/30/ Authorization VOMS+PRIMA+GUMS VOMS Server Attribute Repository GUMS Server DN/FQAN Mapping (MySQL) Synch periodically to get VO membership Validate Proxy (GSI) Gate keeper Gridmap callout PRIMA Module Batch system Job submission 3 4: request account 5: account mapping 6 1: voms-proxy-init 2: receive VO permissions

Gateway Security Summit : 01/30/ VOMS VO Membership service –VO manages access rights for its members –FQAN: Fully Qualified Attribute Name –Based on RFC 3281 –Example: /oscar.nikhef.nl/mcprod/Role=production/Capability=NULL –Different roles have different permissions Sites must honor VO permissions VOMS registration –via VOMS, or VOMRS or manually Use voms-proxy-init instead of grid-proxy-init – VO specific permissions FQAN inserted into X.509 noncritical extensions

Gateway Security Summit : 01/30/ GUMS: Grid User Management Service Maps user DNs/FQANs to accounts –Replaces grid-map files –Site-wide tool Sites recognize VO permissions Synch with VOMS periodically –Downloads the VO memberships, FQANs –Can work with LDAP instead of VOMS

Gateway Security Summit : 01/30/ GUMS Three types of mapping –personal accounts (manual or from LDAP) –group accounts (multiple DNs to a single UID, like VO -> UID) –pool accounts (dynamically generated) Guarantee that the same UID can be used by only one DN/FQAN at any given time Currently, the pool account is created when a DN/FQAN is first seen, and never released

Gateway Security Summit : 01/30/ GUMS Two kinds of grouping User groups –Map (DN,FQAN) to (uid,gid) Host groups –Connect host with user groups –A M x N configuration –A single host group can be used for Multiple hosts (like "*.usatlas.bnl.gov") Multiple user groups (like “usatlasGroup,atlas,dial")

Gateway Security Summit : 01/30/ gPlazma: Storage Authz SRM-dCache SRM Server voms-proxy-init Proxy with VO Membership | Role attributes gPLAZMA PRIMA SAML Client Storage Authorization Service Storage metadata GridFTP Server DATA https/SOAP SAML response SAML query Get storage authz for this username User Authorization Record If authorized, get username SRM Callout srmcp GridFTP Callout gPLAZMALite Authorization Service gPLAZMALite grid-mapfile dcache.kpwd GUMS Identity Mapping Service a 4b 4c 4d

Gateway Security Summit : 01/30/ CE and SE: Big Picture GUMS Local or Remote Client Proxy with VO Membership | Role Attributes Site-wide Assertion Service Site SAZ VOMS Site-wide Mapping Service Auxiliary Mapping Service CE SE gPLAZMA Storage metadata PRIMA C SAML libraries Globus Gatekeeper PRIMA callout Storage Authorization Service

Gateway Security Summit : 01/30/ Local or Remote Client Proxy with VO Membership | Role Attributes SAZ GUMS Site-wide Assertion Service Site VOMS Site-wide Mapping Service Auxiliary Mapping Service CE SE gPLAZMA Storage metadata PRIMA C SAML libraries Globus Gatekeeper PRIMA callout PEP Storage Authorization Service

Gateway Security Summit : 01/30/ Local or Remote Client Proxy with VO Membership | Role Attributes GUMS Site-wide Assertion Service Site SAZ VOMS Site-wide Mapping Service Auxiliary Mapping Service CE SE gPLAZMA Storage metadata PRIMA C SAML libraries Globus Gatekeeper PRIMA callout Storage Authorization Service

Gateway Security Summit : 01/30/ SAZ gPLAZMALite Authorization Services suite GUMS Site-wide Assertion Service Site VOMS Site-wide Mapping Service Auxiliary Mapping Service PRIMA C SAML libraries CE SE gPLAZMA Storage metadata PRIMA Java SAML gPLAZMA Globus Gatekeeper PRIMA callout SRM-GridFTP gPLAZMA callout Storage Authorization Service Local or Remote Client Proxy with VO Membership | Role Attributes

Gateway Security Summit : 01/30/ Local or Remote Client Proxy with VO Membership | Role Attributes gPLAZMALite Authorization Services suite GUMS Site-wide Assertion Service Site SAZ VOMS Site-wide Mapping Service Auxiliary Mapping Service PRIMA C SAML libraries CE SE gPLAZMA Storage metadata PRIMA Java SAML gPLAZMA Globus Gatekeeper PRIMA callout SRM-GridFTP gPLAZMA callout PEP Storage Authorization Service

Gateway Security Summit : 01/30/ gLExec Slide courtesy: Igor Sfiligoi, Gabriele Garzoglio, FNAL When a user submits a grid job to an OSG site, the job always carries the user's credentials. At the execution site, the job is assigned an appropriate userid under which to run. Another option for submitting grid jobs involves the concept of a pilot job. This type of job, once it's in a site's batch slot, coordinates and calls a series of user jobs according to VO priorities at launch time. If the pilot job and the user jobs all run under the same userid, however, the pilot job framework violates the security policies of any site that requires knowledge and control of its resource users. gLExec, a gLite product currently used on European Computing Elements, solves this problem. gLExec is a privileged executable that, given a user credential and an execution command, obtains the appropriate Unix ID from a site's GUMS server and executes the job under that Unix ID. In order to use gLExec within OSG, VOs must configure the pilot job such that it "calls home" to get the associated user credential. The pilot then forwards the credential to gLExec, which uses it to communicate with the site security service, thus returning control to the site.

Gateway Security Summit : 01/30/ gLExec Slide courtesy: Igor Sfiligoi, Gabriele Garzoglio, FNAL

Gateway Security Summit : 01/30/ How to become an OSG member? Join the OSGEDU VO: – Run small applications after learning how to use OSG from schools Be part of the Engagement program and Engage VO: –Support within the Facility to bring applications to production on the distributed infrastructure Be a standalone VO and a Member of the Consortium: –Ongoing use of OSG & participate in one or more activity groups. Open Science Grid

Gateway Security Summit : 01/30/ Documents OSG Security twiki – OSG Security Plan – bin/ShowDocument?docid=389http://osg-docdb.opensciencegrid.org/cgi- bin/ShowDocument?docid=389 Security Awareness for the OSG – bin/ShowDocument?docid=573http://osg-docdb.opensciencegrid.org/cgi- bin/ShowDocument?docid=573