Frontiers of Authentication and Authorization Copyright 2003 Kenneth J. Klingenstein Internet2 and UC-Boulder Camp Meeting, June 5 th, 2003.

Slides:



Advertisements
Similar presentations
The Basics of Federated Identity. Overview of Federated Identity and Grids Workshop Session 1 - for all Basics and GridShib Session 2 – more for developers.
Advertisements

© 2012 Open Grid Forum Simplifying Inter-Clouds October 10, 2012 Hyatt Regency Hotel Chicago, Illinois, USA.
Open Grid Forum 19 January 31, 2007 Chapel Hill, NC Stephen Langella Ohio State University Grid Authentication and Authorization with.
DIGIDOC A web based tool to Manage Documents. System Overview DigiDoc is a web-based customizable, integrated solution for Business Process Management.
Chapter 13 Review Questions
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Welcome to CAMP! Ken Klingenstein, Director, Internet2 Middleware Initiative.
Lynn McRae Stanford University Lynn McRae Stanford University Stanford Authority Manager Privilege management use.
Trust Fabrics: Old Whine in New Battles Ken Klingenstein Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado, Boulder.
Internet2 and other US WMD Update. Topics Update on non-merger, Newnet (and the control plane), InCommon and other feds “Product” update – Shib, Grouper,
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
XACML 2.0 and Earlier Hal Lockhart, Oracle. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Shibboleth Update a.k.a. “shibble-ware”
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Understanding Active Directory
Public Key Infrastructure from the Most Trusted Name in e-Security.
Combining KMIP and XACML. What is XACML? XML language for access control Coarse or fine-grained Extremely powerful evaluation logic Ability to use any.
SOA – Development Organization Yogish Pai. 2 IT organization are structured to meet the business needs LOB-IT Aligned to a particular business unit for.
Administering the Mesh/s of Trust: Old Whine in New Battles.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Authorization Scenarios with Signet RL “Bob” Morgan University of Washington Internet2 Member Meeting, September 2004.
Shib in the present and the future Ken Klingenstein Director, Internet2 Middleware and Security.
I2/NMI Update: Signet, Grouper, & GridShib Tom Barton University of Chicago.
Maturation & Convergence in Authentication & Authorization Services in US Higher Education: Keith Hazelton, Sr. IT Architect, University.
Designing Active Directory for Security
1 Identity and Transparency ( Bridging the GAPS of Governance Bridging the GAPS of Governance in eGov Initiatives in eGov Initiatives )‏ Badri Sriraman.
Federated Identity Management for HEP David Kelsey WLCG GDB 9 May 2012.
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
The New Problem Space: Issues for the Future Ken Klingenstein Director, Internet2 Middleware and Security.
Shibboleth Update Michael Gettes Principal Technologist Georgetown University Ken Klingenstein Director Interne2 Middleware Initiative.
December 2001 Internet2 Virtual Briefing - 1 -Stanford University Authority Registry December 12, 2001 Stanford University Lynn McRae.
Middleware Support for Virtual Organizations Internet 2 Fall 2006 Member Meeting Chicago, Illinois Stephen Langella Department of.
David L. Wasley Office of the President University of California Shibboleth Safe delivery of reliable authorization data David L. Wasley University of.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
95-843: Service Oriented Architecture 1 Master of Information System Management Service Oriented Architecture Lecture 3: SOA Reference Model OASIS 2006.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
17 March 2008 © 2008 The University of Edinburgh, European Microsoft Innovation Center and University of Southampton IT Innovation Centre 1 NextGRID Security.
Integrated Institutional Identity Infrastructure: Implications and Impacts RL “Bob” Morgan University of Washington Internet2 Member Meeting, May 2005.
Authority Process & Policy   Advanced CAMP July 9, 2003 Copyright Sandra Senti This work is the intellectual property of the author. Permission.
JISC Middleware Security Workshop 20/10/05© 2005 University of Kent.1 The PERMIS Authorisation Infrastructure David Chadwick
US of A and A Activities Ken Klingenstein, Director Internet2 Middleware Initiative.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Proposal for RBAC Features for SDD James Falkner Sun Microsystems October 11, 2006.
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
Identity Federations and the U.S. E-Authentication Architecture Peter Alterman, Ph.D. Assistant CIO, E-Authentication National Institutes of Health.
Advanced CAMP: BoF Summaries. 2 Role-based Access Control (RBAC)
11 Restricting key use with XACML* for access control * Zack’-a-mul.
Shibboleth Trust Model Shibboleth/SAML Communities (aka Federated Administrations) Club Shib Club Shib Application process Policy decision points at the.
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Day 3 Roadmap and PKI Update. When do we get to go home? Report from the BoFs CAMP assessment, next steps PKI technical update Break Research Issues in.
Welcome to Base CAMP: Enterprise Directory Deployment Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein This.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 SOA Seminar Seminar on Service Oriented Architecture SOA Reference Model OASIS 2006.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Identity and Access Management
I2/NMI Update: Signet, Grouper, & GridShib
ESA Single Sign On (SSO) and Federated Identity Management
Ebusiness Infrastructure Platform
Privilege Management: the Big Picture
Public Key Infrastructure from the Most Trusted Name in e-Security
O. Otenko PERMIS Project Salford University © 2002
SAMANVITHA RAMAYANAM 18TH FEBRUARY 2010 CPE 691
Collaborative Technologies and Enterprise Middleware:
Signet & Privilege Management
Shibboleth and Federations
Administering the Mesh/s of Trust: Old Whine in New Battles
Presentation transcript:

Frontiers of Authentication and Authorization Copyright 2003 Kenneth J. Klingenstein Internet2 and UC-Boulder Camp Meeting, June 5 th, 2003

Topics Authentication Local authn –Passfaces and other paradigm busters –Credential convertors Interrealm authn –Trust models –Federations Authorization A few basics Plumbing authz into legacy apps External authz services –Policy and rights languages –PDP –PEP –Fitting to apps

Origin Side Architecture

Local authentication Passfaces ( Smart cards and dumb people Local PKI – for internal use only

Credential Converters Build on work of KX.509 out of Michigan Service needs for short-term certs in Grids, H.323, web authn, etc. Several short term tasks add other acts of authentication as inputs easy to configure output cert profiles cope with cert placement issues Several long term tasks expose the CA function and generalize capabilities expose and automate the identifier mapping function add diagnostic capabilities

Interrealm Authentication PKI The problems without bridges, the problems with bridges CP Issues and the new Citizen and Commerce CP Federal e-authentication Initiative Federations Liberty Alliance – v1.1, v2.0, SecuritiesHub, PingID Federated Passport Shibboleth

Three Types of federation Internal federations are occurring among the many subsidiaries of large companies, especially for those companies with more dynamic aggregations. Private federations occur among enterprises, typically within a market sector, that want to facilitate a specific set of transactions and interactions. Public federations address more free-standing, long-term, general-purpose requirements, and need to be more open about rules of engagement. Public federations face significant scaling issues and may not be able to leverage contractual relationships that private federations can.

Federations and Classic PKI They are very similar Both imply trust models Federations are a enterprise-enterprise PKI Local authentication may well be end-entity certs Name-space control is a critical issue And they are very different End user authentication a local decision Flat set of relationships; little hierarchy Focus as much on privacy as security Web Services only right now: no other apps, no encryption We get to define…

The Research and Education Federation Space REF Cluster InQueue (includes existing base) Only metadata InCommon SWITCH The Shib Research Club Other national nets Other clusters Other potential US R+E feds State of Penn Fin Aid Assoc NSDL Slippery slope - Med Centers, etc

InCommon Activities Current Process applications for admission into origin list or for being a target Manage central WAYF and distribution of Club Shib feed (members and their keys) Member services – information, key revocation; no tech support Facilitate federated member trust understandings Longer term…

A possible path for InCommon In response to real business drivers and feasible technologies increase the strengths of (identification, authentication, directory integrity, auditing) In the fall… Class 1 trust – no prescriptions, self-audits Perhaps a year later Class 2 trust - in person or proxied id, encrypted authn, self-audit Sometime later Class 3 trust – very strong identification, token authn, secured dir, external audit Closely coupled to PKI but ultimately distinct

Process the last three months Breadth of interest in Shib leads to design team discussions Discussions in FOO Conversations in the halls of lots of meetings Most recently, discussions with European and Australian middleware folks Internal Internet2 planning of storefront, operations, naming

Overall Trust Fabric

Simpleton’s Authz Mt Authorization, from whose top one sees the unified field theory of authzanity

A Better View of Authzanity The Enterprise Attribute River, feeding the legacy apps that plumb to it, for their own internal authz processing The Oracle in the Mountains providing authz advice/decision (permit, deny, permit with constraints, etc.) to the simple masses The Swarms of Policy Decision Point The Policy Enforcement Points throughout the land, implementing decisions The Interrealm Attribute Requestor The Packaging Plants for digital rights execution, etc.

Caveats to travelers A land of policy, technology and human nature Static and run time controls Layers of abstraction and laws of complexity Issues of trust and privacy are closely entwined

Authz: a few basics Can user X perform operation Y on object Z? NIST Role-Based Access Controls Recent HIPAA interest William Winsborough work

A Tour of RBAC

The Enterprise Attribute River Stanford University Authority Project Key individuals: Lynn McRae, Sandy Senti, the lingering vapors of Bob Morgan and Jeff Hodges… Marshals resources from a broad set of registries (for people, groups, policies, roles, etc) and directories, with innovative use of groups, to produce atomic entitlements for entry into existing authorization systems Provides users with facile tools for viewing, managing and delegating authority Requires reasonable alignment of roles within institution.

Stanford Authz Model

Stanford Authz Goals Simplification of authority policy, management and interpretation. We should be able to summarize the full rights and privileges of an individual "at a glance" or let departmental administrators view and manage together all authority in their department or division. Consistent application of authority rules via infrastructure services and synchronization of administrative authority data across systems. Integration of authority data with enterprise reference data to provide extended services such as delegation and automatic revocation of authority based on status and affiliation changes. Role-based authority, that is, management of privileges based on job function and assignments rather than attached to individuals.

Deliverables The deliverables consist of a Web interface and program APIs to provide distributed management (to the departments, to external programs) of access rights and privileges, and delivery of authority information through the infrastructure as directory data and authority events.

Qualifiers Contexts Prerequisites Limits read-only no-self Context and prerequisites determine whether you have the authority at all. Limits are applied at the time authority is used in order to place boundaries on the scope of that authority

Layers of Aggregation Roles Functions Tasks Entitlements - These are the atomic units of authority control

Assignment of authority Authority can be managed by assigning Functions directly to individuals. As illustrated above, the system also supports role based authority -- the ability to describe a job role within your department then assign functions to that role in the Authority system. Any individual assigned to that role gets all the privileges of that role, and it privileges move automatically to any new person who is assigned the role. We anticipate role- based authority to be the most prevalent at the department level. The system should facilitate the management of such assignments by making it easy to identify individuals with roles and the privileges they have, easy to move people in and out of roles, easy to clone/duplicate/derive new roles, etc.

The 80/20 Rule of Functions A good set of basic functions should cover the majority of departmental requirements for managing authority. The system will allow some degree of direct control over enabling authority at the task level (either by direct assignment or by modifying tasks within a function). This is the way of addressing "the other 20%" of authority needs within an organization

External authorization service For what types of applications can the business logic be separated from the transaction processing? For what applications does this make sense? Videoconferencing Enterprise P2P DRM

Components of an external authz PDP Rights languages (on the users, relative to an operation) Policy languages (on objects, relative to an operation) Decision engine Type of value returned Tools to configure