Using NMI Components in MGRID: A Campus Grid Infrastructure Andy Adamson Center for Information Technology Integration University of Michigan, USA.

Slides:



Advertisements
Similar presentations
MyProxy Jim Basney Senior Research Scientist NCSA
Advertisements

Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
Welcome to Middleware Joseph Amrithraj
Data Management Expert Panel - WP2. WP2 Overview.
Security Protocols Sathish Vadhiyar Sources / Credits: Kerberos web pages and documents contained / pointed.
ICS 434 Advanced Database Systems
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
The Anatomy of the Grid: An Integrated View of Grid Architecture Carl Kesselman USC/Information Sciences Institute Ian Foster, Steve Tuecke Argonne National.
Using the Collaborative Tools in NEESgrid Charles Severance University of Michigan.
METALOGIC s o f t w a r e © Metalogic Software Corporation DACS Developer Overview DACS – the Distributed Access Control System.
Remote Name Mapping for Linux NFSv4 Andy Adamson Center For Information Technology Integration University of Michigan August 2005.
Secure Network Performance Testing using SeRIF Dr. Charles J. Antonelli Center for Information Technology Integration University of Michigan Winter 2006.
MyProxy: A Multi-Purpose Grid Authentication Service
Authenticated QoS Signaling William A. (Andy) Adamson Olga Kornievskaia CITI, University of Michigan.
Kerberized Credential Translation Olga Kornievskaia Peter Honeyman Bill Doster Kevin Coffman Center for Information Technology Integration University of.
Andrew McNab - EDG Access Control - 14 Jan 2003 EU DataGrid security with GSI and Globus Andrew McNab University of Manchester
National Center for Supercomputing Applications Integrating MyProxy with Site Authentication Jim Basney Senior Research Scientist National Center for Supercomputing.
Kerberos and PKI Cooperation Daniel Kouřil, Luděk Matyska, Michal Procházka Masaryk University AFS & Kerberos Best Practices Workshop 2006.
Authenticated QoS Project Overview Andy Adamson Research Investigator Center for Information Technology Integration University of Michigan Ann Arbor.
Open Science Grid Use of PKI: Wishing it was easy A brief and incomplete introduction. Doug Olson, LBNL PKI Workshop, NIST 5 April 2006.
Use of Kerberos-Issued Certificates at Fermilab Kerberos  PKI Translation Matt Crawford & Dane Skow Fermilab.
Milos Kobliha Alejandro Cimadevilla Luis de Alba Parallel Computing Seminar GROUP 12.
Copyright B. Wilkinson, This material is the property of Professor Barry Wilkinson (UNC-Charlotte) and is for the sole and exclusive use of the students.
Challenges Running an NFSv4- backed OSG Cluster Kevin Coffman Center for Information Technology Integration University of Michigan.
MGRID: Network Testing and Performance Charles J. Antonelli Center for Information Technology Integration University of Michigan.
1 July 2005© 2005 University of Kent1 Seamless Integration of PERMIS and Shibboleth – Development of a Flexible PERMIS Authorisation Module for Shibboleth.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
WP6: Grid Authorization Service Review meeting in Berlin, March 8 th 2004 Marcin Adamski Michał Chmielewski Sergiusz Fonrobert Jarek Nabrzyski Tomasz Nowocień.
Module 12: Designing an AD LDS Implementation. AD LDS Usage AD LDS is most commonly used as a solution to the following requirements: Providing an LDAP-based.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Michigan Grid Testbed Report Shawn McKee University of Michigan UTA US ATLAS Testbed Meeting April 4, 2002.
Network Testing and Performance Using SeRIF Charles J. Antonelli David Richter Olga Kornievskaia Nathan Gallaher Center for Information Technology Integration.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
KX509: Leveraging Kerberos to Obtain Digital Certificates for Web Client Authentication University of Michigan Kevin Coffman Bill Doster.
Slide 1 Experiences with NMI R2 Grids Software at Michigan Shawn McKee April 8, 2003 Internet2 Spring Meeting.
Lunch in (34-1) slides Experiences with NMI at Michigan Shawn McKee October 1, 2004 NMI/SURA Testbed Workshop.
1 School of Computer, National University of Defense Technology A Profile on the Grid Data Engine (GridDaEn) Xiao Nong
University of Michigan Enterprise Directory Services Appendix A Conceptual Architecture.
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
GridFE: Web-accessible Grid System Front End Jared Yanovich, PSC Robert Budden, PSC.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
National Computational Science National Center for Supercomputing Applications National Computational Science NCSA-IPG Collaboration Projects Overview.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Scaling NT To The Campus Integrating NT into the MIT Computing Environment Danilo Almeida, MIT.
Supporting further and higher education The Akenti Authorisation System Alan Robiette, JISC Development Group.
Communicating Security Assertions over the GridFTP Control Channel Rajkumar Kettimuthu 1,2, Liu Wantao 3,4, Frank Siebenlist 1,2 and Ian Foster 1,2,3 1.
Kerberos and Identity Federations Daniel Kouřil, Luděk Matyska, Michal Procházka, Tomáš Kubina AFS & Kerberos Best Practices Worshop 2008.
JISC Middleware Security Workshop 20/10/05© 2005 University of Kent.1 The PERMIS Authorisation Infrastructure David Chadwick
09/02 ID099-1 September 9, 2002Grid Technology Panel Patrick Dreher Technical Panel Discussion: Progress in Developing a Web Services Data Analysis Grid.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Single Sign-On across Web Services Ernest Artiaga CERN - OpenLab Security Workshop – April 2004.
Practical Distributed Authorization for GARA Andy Adamson and Olga Kornievskaia Center for Information Technology Integration University of Michigan, USA.
Overview of Privilege Project at Fermilab (compilation of multiple talks and documents written by various authors) Tanya Levshina.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
Fermilab CA Infrastructure EDG CA Managers Mtg June 13, 2003.
Office of Science U.S. Department of Energy Grid Security at NERSC/LBL Presented by Steve Chan Network, Security and Servers
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
MGRID Architecture Andy Adamson Center for Information Technology Integration University of Michigan, USA.
The GRIDS Center, part of the NSF Middleware Initiative Grid Security Overview presented by Von Welch National Center for Supercomputing.
Secure Network Performance Testing using SeRIF Charles J. Antonelli Center for Information Technology Integration University of Michigan Laurence Kirchmeier.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
A System for Monitoring and Management of Computational Grids Warren Smith Computer Sciences Corporation NASA Ames Research Center.
Virtual Organisations and the NGS Mike Jones Research Computing Services e-Science & “The Grid” for Bio/Health Informaticians, IT January 2008.
Secure Connected Infrastructure
Stop Those Prying Eyes Getting to Your Data
Patrick Dreher Research Scientist & Associate Director
A Network Operating System Edited By Maysoon AlDuwais
Presentation transcript:

Using NMI Components in MGRID: A Campus Grid Infrastructure Andy Adamson Center for Information Technology Integration University of Michigan, USA

Outline MGRID: Background and Motivation MGRID Architecture NTAP: A Grid Application Distributed Authorization Issues What's Next

MGRID Michigan Grid Research and Infrastructure Development is a collaborative effort of many parts of the University of Michigan focused on developing and deploying grid computing for the University of Michigan. –Characterize and optimize the UM network –Assist in the development of Grid security middleware –Determine the requirements for a production Grid site within the UM –Develop and test Grid Applications

Why MGRID Multiple Grid efforts at the U of M –Clusters –Automated network configuration and testing –Remote instrument operation Middleware issues are difficult –Single solution –Leverage existing security services Potentially large user base for Grid services

U of M Security Services Uniqname –Unique campus wide user name and UID Kerberos V5 (multiple cells) KX509 Group Services –AFS PTS –LDAP ( groups)

MGRID Architecture mod ssl mod kx509 mod kct CHEF Apache Tomcat KCT GateKeeper Service Grid Service KCA Browser kx509 libpkcs11 kinit User Workstation KDC Kerberos V5 SSL – Client Certificate required GSI Kerberos Grid-Mapfile LDAP SASL Web Server Group Services Resource Mng Authorization 8 mod jk mod php

MGRID Portal Proxy KX509 credentials, keep the Globus client off workstations Ease of use for U of M faculty, staff, and students –Kerberos + kx509 + browser = Grid access Single point for PKI management –CA self-signed keys –CA policy files Single entry point for MGRID services

MGRID Portal User workstation –KX509 to obtain user X509 credentials –KX509 Certificate available to browser Additions to OpenSSL, required on Web Server –SSL handshake recorded Web server SSL configured to require user X509 credentials

MGRID Portal SSL Handshake transcript –Contains all packets exchanged –Allows KCT to repeat user certificate verification –Handshake time stamp used Apache module, mod_kct –Sends ssl handshake transcript to KCT service –Requests KCA Kerberos service ticket

MGRID Portal Apache module, mod_kx509 –Uses the KCA TGS –Obtains user proxy KX509 credentials –Places them in a ticket file Apache module, mod_php –Creates RSL, uses KX509 credentials CHEF runs in Tomcat –Communicates with Apache through mod_jk –Creates RSL, uses KX509 or MyProxy credentials

MGRID Architecture mod ssl mod kx509 mod kct CHEF Apache Tomcat KCT GateKeeper Service Grid Service KCA Browser kx509 libpkcs11 kinit User Workstation KDC Kerberos V5 SSL – Client Certificate required GSI Kerberos Grid-Mapfile LDAP SASL Web Server Group Services Resource Mng Authorization 8 mod jk mod php

MGRID NTAP Project NTAP: Network Testing and Performance Globus Service to run network test and performance tools Purpose: Help build and maintain a secure and functional network at UMICH Runs on multi homed nodes placed in a VLANed network

MGRID NTAP Architecture Web Portal Router 1 Host A Router 2Router 3 Host B NTAP 1NTAP 2NTAP 3 GSI Group Services

MGRID NTAP Project Based on GARA: General-purpose Architecture for Reservation and Allocation GARA bandwidth reservation –Adds and removes configuration stanza's in network hardware –Includes scheduler for future reservations Security of communications and the ability to support roles is required

MGRID NTAP Project Added fine grained authorization Added signed group membership RSL payload Extended bandwidth reservation to be able to run arbitrary programs at a Grid service endpoint Designed to easily add functionality Network testing tools being run –Iperf, traceroute, ping, owamp, etc

MGRID NTAP Architecture Web Portal Router 1 Host A Router 2Router 3 Host B NTAP 1NTAP 2NTAP 3 GSI Group Services Local Domain

Cross-domain Authorization Implemented with Policy based software Policy engine makes authorization decision –Input are matched against resource specific policy rules –Input attribute names are matched to policy attribute names by a string compare Cross-domain attribute name space is therefore required

Cross-domain Authorization Attributes include –Group membership from group services –Resource request parameters: bandwidth, number of CPU's, etc from RSL –Environment parameters: time of day, CPU load, etc Use of existing local group services is required –U of M has 100,000+ active uniqnames to manage –Avoid replicating data and management tasks

Cross-domain Authorization Our first design in use today uses a modular group membership call-out and the KeyNote Policy Engine Group membership determined by –Secure RX call to AFS PTS Fine-grained authorization expressed in KeyNote policy rules Works across U of M campus

MGRID Architecture mod ssl mod kx509 mod kct CHEF Apache Tomcat KCT GateKeeper Service Grid Service KCA Browser kx509 libpkcs11 kinit User Workstation KDC Kerberos V5 SSL – Client Certificate required GSI Kerberos Grid-Mapfile LDAP SASL Web Server Group Services Resource Mng Authorization 8 mod jk mod php

Authorization: Where? Earlier is better At the portal –RSL, group membership, and some environment attributes available –Can remove load from Grid Service At the Grid Service –Needed when policy has components that can only be satisfied at end service Both (divided policy)

PERMIS Similar functionality to KeyNote –Attributes and policy rules Follows XACML standard Signed policy stored in LDAP Signed user attributes stored in LDAP –Current design requires new database of users

MGRID: Whats Next? Use XACML to exchange authorization data –XACML front end to existing UMICH group services Replace grid-mapfile with LDAP call out –Central administration –Dynamic local cluster accounts Investigate NFSv4 as a grid file system

Summary Kx509, CHEF, and PERMIS (XACML) NMI components are being integrated and tested by MGRID We would like mod_kct and mod_kca to be considered for NMI-5 Construction and management of a shared attribute name space is the largest problem facing cross-domain authorization

Any Questions?