WP3 Authorization and R-GMA Linda Cornwall WP3 workshop 2-4 April 2003.

Slides:



Advertisements
Similar presentations
21 Sep 2005LCG's R-GMA Applications R-GMA and LCG Steve Fisher & Antony Wilson.
Advertisements

29 June 2006 GridSite Andrew McNabwww.gridsite.org VOMS and VOs Andrew McNab University of Manchester.
FP7-INFRA Enabling Grids for E-sciencE EGEE Induction Grid training for users, Institute of Physics Belgrade, Serbia Sep. 19, 2008.
A responsibility based model EDG CA Managers Meeting June 13, 2003.
Andrew McNab - EDG Access Control - 14 Jan 2003 EU DataGrid security with GSI and Globus Andrew McNab University of Manchester
E-science grid facility for Europe and Latin America A Data Access Policy based on VOMS attributes in the Secure Storage Service Diego Scardaci.
Haga clic para cambiar el estilo de título Haga clic para modificar el estilo de subtítulo del patrón DIRAC Framework A.Casajus and R.Graciani (Universitat.
5-Sep-02D.P.Kelsey, Security Summary, Budapest1 WP6/7 Security Summary Budapest 5 Sep 2002 David Kelsey CLRC/RAL, UK
DGC Paris Community Authorization Service (CAS) and EDG Presentation by the Globus CAS team & Peter Kunszt, WP2.
20 March 2007 VOMS etc Andrew McNabwww.gridsite.org VOMS etc Andrew McNab University of Manchester.
30-Jan-03D.P.Kelsey, GridPP Security1 Security GridPP6 30 Jan 2003 Coseners House David Kelsey CLRC/RAL, UK
GGF Toronto Spitfire A Relational DB Service for the Grid Peter Z. Kunszt European DataGrid Data Management CERN Database Group.
Canonical Producer CP API User Code CP Servlet Files CreateTable, Port, Protocol, Security, SQL Support, Multiple Query Support Security Insert Query Port.
Lecture 7 Access Control
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
EGEE Security Area 13 May 2004 EGEE Security Area Stakeholders JRA3 middleware Architecture What we have for Unix and Java What.
1 TAPAS Workshop Nicola Mezzetti - TAPAS Workshop Bologna Achieving Security and Privacy on the Grid Nicola Mezzetti.
VOX Project Status T. Levshina. Talk Overview VOX Status –Registration –Globus callouts/Plug-ins –LRAS –SAZ Collaboration with VOMS EDG team Preparation.
Ákos FROHNER – DataGrid Security Requirements n° 1 Security Group D7.5 Document and Open Issues
JSPG: User-level Accounting Data Policy David Kelsey, CCLRC/RAL, UK LCG GDB Meeting, Rome, 5 April 2006.
Planning: Hardening the rabbit Steve Fisher / RAL 5/3/2004 WP3.
EU DataGrid (EDG) & GridPP Authorization and Access Control User VOMS C CA 2. certificate dn, ca, key 1. request 3. certificate 4. VOMS cred: VO, groups,
Author - Title- Date - n° 1 Partner Logo WP5 Summary Paris John Gordon WP5 6th March 2002.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks R-GMA Now With Added Authorization Steve.
Communicating Security Assertions over the GridFTP Control Channel Rajkumar Kettimuthu 1,2, Liu Wantao 3,4, Frank Siebenlist 1,2 and Ian Foster 1,2,3 1.
EDG Security European DataGrid Project Security Coordination Group
WP3 Information and Monitoring Steve Fisher / RAL 23/9/2003.
30-Sep-03D.P.Kelsey, SCG Summary1 Security Co-ordination Group (WP7 SCG) EDG Heidelberg 30 September 2003 David Kelsey CCLRC/RAL, UK
Edg-voms-admin European DataGrid Project Security Coordination Group
VO. VOMS 1. Authentication2. Credentials 3. Authentication Client Resource.
User VOMS Java C CA 2. certificate dn, ca, key 1. request 3. certificate 4. VOMS cred: VO, groups, roles, capabilities Authentication Certificate Authorities.
Overview of Privilege Project at Fermilab (compilation of multiple talks and documents written by various authors) Tanya Levshina.
EGEE User Forum Data Management session Development of gLite Web Service Based Security Components for the ATLAS Metadata Interface Thomas Doherty GridPP.
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
INFSO-RI Enabling Grids for E-sciencE
VO management: Progress since Chicago Workshop Vincenzo Ciaschini 23/5/2002 CNAF – Bologna.
Ad Hoc VO Akylbek Zhumabayev Images. Node Discovery vs. Registration VO Node Resource User discover register Resource.
Last update 21/01/ :05 LCG 1Maria Dimou- cern-it-gd Current LCG User Registration, VO management and Authorisation Procedures VOMS workshop
The impact of R-GMA (upon WP1 and WP4). EDG (Paris) 6 Mar James MagowanImpact of R-GMA Grid Monitoring Architecture (GMA) We use it not only for.
Author - Title- Date - n° 1 Partner Logo WP5 Status John Gordon Budapest September 2002.
INFSO-RI Enabling Grids for E-sciencE Information System Valeria Ardizzone INFN EGEE NA4 Generic Applications Meeting Catania,
WP3 Security and R-GMA Linda Cornwall. WP3 UserVOMS service authr map pre-proc authr LCAS LCMAPS pre-proc LCAS Coarse-grained e.g. Spitfire WP2 service.
Ákos FROHNER – DataGrid Security n° 1 Security Group TODO
EGEE is a project funded by the European Union under contract IST Information and Monitoring Services within a Grid R-GMA (Relational Grid.
INFSO-RI Enabling Grids for E-sciencE R-GMA Gergely Sipos and Péter Kacsuk MTA SZTAKI Credit to Valeria Ardizzone.
Securing Web Applications Lesson 4B / Slide 1 of 34 J2EE Web Components Pre-assessment Questions 1. Identify the correct return type returned by the doStartTag()
15-May-03D.P.Kelsey, SCG Summary1 Security Coord Group (SCG) EDG Barcelona, 12 May 2003 David Kelsey CCLRC/RAL, UK
Plans for D7.7 The Security Report on the Final Project Release Linda Cornwall, RAL.
INFSO-RI Enabling Grids for E-sciencE gLite Information System: R-GMA Tony Calanducci INFN Catania gLite tutorial at the EGEE User.
Site Authorization Service Local Resource Authorization Service (VOX Project) Vijay Sekhri Tanya Levshina Fermilab.
EGEE is a project funded by the European Union under contract IST R-GMA Security Stephen Hicks UK Cluster Security Middleware Security Group.
INFSO-RI Enabling Grids for E-sciencE NPM Security Alistair K Phipps (NeSC) JRA4 Face To Face, CERN, Geneva.
DataGrid Security Wrapup Linda Cornwall 4 th March 2004.
Storage Element Security Jens G Jensen, WP5 Barcelona, May 2003.
What to expect in TB 2.0 J. Templon, NIKHEF/WP8. Jeff Templon – AWG Meeting, NIKHEF, WP1 u New resource broker architecture Big potato.
Overview of the New Security Model Akos Frohner (CERN) WP8 Meeting VI DataGRID Conference Barcelone, May 2003.
WP3 Security and R-GMA Linda Cornwall, RAL. WP3 Linda Cornwall, RAL - 02/09/2002Security and R-GMA,DataGrid Workshop, Budapest 2 Current Status Currently,
Virtual Organisations and the NGS Mike Jones Research Computing Services e-Science & “The Grid” for Bio/Health Informaticians, IT January 2008.
Containers as a Service with Docker to Extend an Open Platform
Access Control Model SAM-5.
Third Party Transfers & Attribute URI ideas
Chapter 14: System Protection
CRIC ・ Authentication & Authorization
R-GMA Security Principles and Plans
CRC exercises Not happy with the way the document for testbed architecture is progressing More a collection of contributions from the mware groups rather.
Update on EDG Security (VOMS)
The New Virtual Organization Membership Service (VOMS)
CE Operating Systems Lecture 21
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
Canonical Producer CP API CP Servlet User Code Files
Presentation transcript:

WP3 Authorization and R-GMA Linda Cornwall WP3 workshop 2-4 April 2003

WP3 What is Authorization? Whereby a principal is allowed to or prevented from carrying out an action. In edg there are requirements to carry out an authorization decision based on –Specific DN –VO membership(s) –Role within VO –Group within VO –By allowing anyone with an acceptable certificate to carry out an action –Allowing anyone to carry out an action

WP3 Authorization – EDG Principle Principle within EDG is that Authorization information goes with the resource or data. The authorization decision is made close to the resource or data, based on a combination of local Authorization information and attributes from the user This enables e.g. resource owner or administrator, or a file owner or administrator to keep control over it’s access. Hence e.g. a producer of information must make the decision as to whether or not the requestor of that information can have that information. Hence the end producer of the information must have information on the DN, VO membership, role(s) and groups of the end client in order to make an authorization decision.

WP3 VOMS certificate Voms certificate contains proof that a user is a member of a VO, is a member of certain groups in a VO, and has certain roles within a VO. A delegated VOMS certificate means that any servlet that is connected onto has proof of an entity’s VO membership, groups and roles as well as DN. Then an authorization decision can be made. Without a delegated VOMS certificate – authorization is not really secure – any hacked consumer can do what they like.

WP3 Course grained vs fine grained authorization Course grained – authorization on front of service (I.e. y/n can the person connect). –“Is the user allowed to use this service – if so – what role” Fine grained – authorization takes place within a service. –E.g. can this user read this file? R-GMA could have services which decide whether or not a connection is allowed, as well as services which decide whether to satisfy the request within the service. I favour ALL authorization decisions being made within services for R-GMA – a combination will be rather cumbersome.

WP3 UserVOMS service authr map pre-proc authr LCAS LCMAPS pre-proc LCAS Coarse-grained e.g. Spitfire WP2 service dn dn + attrs Fine-grained e.g. RepMeC WP2/WP3 Coarse-grained e.g. CE, Gatekeeper WP4 Fine-grained e.g. SE, /grid WP5 Java C authenticate acl

WP3 User service authr map pre-proc authr Coarse-grained e.g. Spitfire WP2 dn dn + attrs Fine-grained e.g. RepMeC WP2/WP3 Java authenticate acl service pre-proc authr delegation

WP3 Sensor Code Producer API Application Code Consumer API Registry Consumer Instance Registry API Registry API Producer Instance Schema API Schema Delegation (from application’s cert) Delegation (from producer’s cert) Producer decides- sensor y/n? Registry decides producer to register y/n? Registry decides consumer y/n? Producer decides- application y/n? Consumer decides- application y/n? ?

WP3 Authenticated USER ACL (DN, Vo, Role) DN, Vo, Role(s) Fine grained R-GMA In fine grained Authorization a decision must be made within the producer. Each table, even each row of a table will have it’s own ACL ACL (DN, Vo, Role) ACL (DN, Vo, Role)

WP3 Confidentiality There are certain requirements on confidentiality. To satisfy these an authorization decision at the source of info AND a delegated VOMS proxy is needed. If a third party can say ‘tell me if Linda is banned’ without the use of a delegated certificate – then the fact Linda is banned can be found out without Linda’s permission. Similarly for any info – a hacked or rogue R- GMA can get any info they want. Can only make things difficult.

WP3 Rogue Consumer Rogue Consumer has acceptable Certificate. DN DN info matches Without Delegation it is possible to obtain info one is not authorized to see. But it requires a consumer to be hacked or written.

WP3 Some WP3 specific requirements It must be possible to restrict knowledge of the existence of producers of information to specific authorized users –Solution – authorization information goes into the registry – only those authorized are granted info on the producer A producer must be able to restrict the publishing of information to specific authorized users. –Solution – each time a user attempts to publish – check against a list of users.

WP3 Specific WP3 requirements - contd A user can only see information on their own job –Solution – when job control info is requested, the producer only passes the info back if dn matches dn. A producer must be able to restrict read access to information to specific authorized users. –Solution – add authorization info into the table. –This could be a generalization of above

WP3 Suggested implementation solution Each Servlet has associated with it a file which defines authorization for each type of operation. Each table has an indicator as to whether authorization is per table or per row. If per table – indicate the name of the authorization file for this table – possibly indicate DN must match. If per row, each row contains authorization info – possibly a pointer to a table

WP3 Authorization without delegation First just have user’s only seeing their own jobs. Only way to do this in the absence of delegation in the trustmanager is –extract the DN of the user when they connect to the consumer –Pass this onto the producer –Add to job info table that DN must match –Only allow the user to see the job if DN matches Not secure – anyone with an acceptable certificate could get the info – but they would have to write their own consumer code

WP3 Sensor Code Producer API Application Code Consumer API Registry “Event Dictionary” Consumer Instance Registry API Registry API Producer Instance Schema API Schema If job info –does DN match? Have to trust the consumer to pass on DN

WP3 Evolutionary approach 1 st carry out a very crude system for authorization without delegation – until delegation is available. This will allow to try out the DN extracting and matching, having a first stage of adding to table. Replace with delegation as soon as available Then start looking at how to formulate what are effectively the ACL’s. Possibly use GACL. Look at what to add to the schema tables – pointer such as no Authorization, DN match, pointer to table. Steve Fisher has ideas on details.

WP3 Mixing secure and non-secure access Allowing different access rules after authentication fits quite well into R-GMA. Allowing a mixture of secure and non secure access is more difficult. –Authentication happens before connection –Authorization happens within the servlet –So for non-secure access – would need a different copy of R-GMA on a different port. –Problem is for us – 1 R-gma does everything. –Ideally, would need different service for non- secure access, I.e. a cut down R-GMA which just allows certain things.

WP3 Sensor Code Producer API Application Code Consumer API Registry Consumer Instance Registry API Registry API Producer Instance Schema API Schema