INFSO-RI-508833 Enabling Grids for E-sciencE GGF16 workshop Authorization Interoperability (Here and Now) David Kelsey, CCLRC/RAL, UK

Slides:



Advertisements
Similar presentations
The LHC experiments AuthZ Interoperation requirements GGF16, Athens 16 February 2006 David Kelsey CCLRC/RAL, UK
Advertisements

GGF16, Athens AuthZ Interoperability Here and Now Workshop, 16 Feb 2006.
Authorization WG Update David Kelsey EU Grid PMA, Copenhagen 27 May 2008.
INFSO-RI Enabling Grids for E-sciencE Update on LCG/EGEE Security Policy and Procedures David Kelsey, CCLRC/RAL, UK
The Community Authorisation Service – CAS Dr Steven Newhouse Technical Director London e-Science Centre Department of Computing, Imperial College London.
INFSO-RI Enabling Grids for E-sciencE JRA3 2 nd EU Review Input David Groep NIKHEF.
30-Jan-03D.P.Kelsey, GridPP Security1 Security GridPP6 30 Jan 2003 Coseners House David Kelsey CLRC/RAL, UK
Trust and Security for FIM (Sirtfi/SCI) David Kelsey (STFC-RAL) FIM4R at CERN 4 Feb 2015.
Computer Security and the Grid … or how I learned to stop worrying and love The Grid. Dane Skow Fermilab Computer Security Awareness Day 8 March 2005.
INFSO-RI Enabling Grids for E-sciencE The US Federation Miron Livny Computer Sciences Department University of Wisconsin – Madison.
12-May-03D.P.Kelsey, SCG Online Authentication1 Online Authentication SCG Meeting EDG Barcelona, 12 May 2003 David Kelsey CCLRC/RAL, UK
Federated Identity Management for HEP David Kelsey WLCG GDB 9 May 2012.
Summary of Accounting Discussion at the GDB in Bologna Dave Kant CCLRC, e-Science Centre.
Deployment Issues David Kelsey GridPP13, Durham 5 Jul 2005
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
JSPG: User-level Accounting Data Policy David Kelsey, CCLRC/RAL, UK LCG GDB Meeting, Rome, 5 April 2006.
© 2006 Open Grid Forum Enabling Pervasive Grids The OGF GIN Effort Erwin Laure GIN-CG co-chair, EGEE Technical Director
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Ake Edlund EGEE Sec Head 9th MWSG meeting, SLAC,
Security Policy Update LCG GDB Prague, 4 Apr 2007 David Kelsey CCLRC/RAL
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
23-Oct-03D.P.Kelsey, LCG Security Update, HEPiX1 LCG Security Update HEPiX-HEPNT, TRIUMF, 23 October 2003 David Kelsey CCLRC/RAL, UK
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks EGEE and OSG: Common Security Policies? OSG.
3-Jul-02D.P.Kelsey, Security1 Security meetings Report to EDG PTB 3 Jul 2002 David Kelsey CLRC/RAL, UK
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks State of Interoperability Laurence Field.
30-Sep-03D.P.Kelsey, SCG Summary1 Security Co-ordination Group (WP7 SCG) EDG Heidelberg 30 September 2003 David Kelsey CCLRC/RAL, UK
INFSO-RI Enabling Grids for E-sciencE External Projects Integration Summary – Trigger for Open Discussion Fotis Karayannis, Joanne.
INFSO-RI Enabling Grids for E-sciencE LCAS/LCMAPS and WSS Site Access Control boundary conditions David Groep NIKHEF.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Linda Cornwall CCLRC (RAL) FP6 Security workshop.
15-Dec-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the Joint Security Policy Group) CERN 15 December 2004 David Kelsey CCLRC/RAL,
US LHC OSG Technology Roadmap May 4-5th, 2005 Welcome. Thank you to Deirdre for the arrangements.
Grid Security Vulnerability Group Linda Cornwall, GDB, CERN 7 th September 2005
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
INFSO-RI Enabling Grids for E-sciencE EGEE SA1 in EGEE-II – Overview Ian Bird IT Department CERN, Switzerland EGEE.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Dr Linda Cornwall CCLRC (RAL) FP6 Security workshop.
Andrew McNabSecurity Middleware, GridPP8, 23 Sept 2003Slide 1 Security Middleware Andrew McNab High Energy Physics University of Manchester.
Security Policy Update David Kelsey UK HEP Sysman, RAL 1 Jul 2011.
Grid Authorization Landscape and Futures Von Welch NCSA
Open Science Grid & its Security Technical Group ESCC22 Jul 2004 Bob Cowles
Distributed Accounting Working Group (DAWG) Distributed Accounting Models Research Group Monday, 22 July 2002 Tuesday, 23 July 2002 Edinburgh, Scotland.
Security Operations David Kelsey GridPP Deployment Board 3 Mar 2005
Federated Identity Management for HEP David Kelsey HEPiX, IHEP Beijing 18 Oct 2012.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks New Authorization Service Christoph Witzig,
INFSO-RI Enabling Grids for E-sciencE Policy and International cooperation Fotis Karayannis, NA5 activity leader All Activity Meeting.
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
INFSO-RI Enabling Grids for E-sciencE Policy management and fair share in gLite Andrea Guarise HPDC 2006 Paris June 19th, 2006.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks EGEE and JSPG activities David Kelsey CCLRC/RAL.
INFSO-RI Enabling Grids for E-sciencE SAML-XACML interoperability Oscar Koeroo.
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks OpenSAML extension library and API to support.
INFSO-RI Enabling Grids for E-sciencE Joint Security Policy Group David Kelsey, CCLRC/RAL, UK 3 rd EGEE Project.
7-May-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Issues and Planning or Report from the Security Group CERN, 8 May 2003 David Kelsey CCLRC/RAL, UK.
EGEE is a project funded by the European Union under contract IST EGEE Security Åke Edlund Security Head EU IST-FP6 Concertation, 17 th September.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Study on Authorization Christoph Witzig,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Study on Authorization Christoph Witzig,
DataGrid Security Wrapup Linda Cornwall 4 th March 2004.
EGEE-III INFSO-RI Enabling Grids for E-sciencE VO Authorization in EGEE Erwin Laure EGEE Technical Director Joint EGEE and OSG Workshop.
Security Bob Cowles
INFSO-RI Enabling Grids for E-sciencE EGEE general project update Fotis Karayannis EGEE South East Europe Project Management Board.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Ake Edlund for JRA3 EGEE EU Review (CERN) May 23-24, 2006.
INFSO-RI Enabling Grids for E-sciencE JRA3 Åke Edlund On behalf of JRA3 EGEE 8th All-activity meeting January 18-19,
15-Jun-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) CERN 15 June 2004 David Kelsey CCLRC/RAL, UK
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Argus: command line usage and banning Christoph.
Security Policy Update WLCG GDB CERN, 11 June 2008 David Kelsey STFC/RAL
May 4, 2006Dane Skow Managing (Dis)Honorable Guests -- A Role for Grid Security Dane Skow University of Chicago and Argonne National.
Bob Jones EGEE Technical Director
David Kelsey CCLRC/RAL, UK
Open Science Grid Consortium Meeting
LCG Security Status and Issues
David Kelsey CCLRC/RAL, UK
Presentation transcript:

INFSO-RI Enabling Grids for E-sciencE GGF16 workshop Authorization Interoperability (Here and Now) David Kelsey, CCLRC/RAL, UK EGEE MWSG Meeting CERN, 7 March 2006

Enabling Grids for E-sciencE INFSO-RI GGF16 AuthZ 2 GGF16 workshop Athens, 16 Feb 2006 Half-day workshop on Grid Authorization –Interoperability “Here and Now” Organised by… Christophe Blanchet(CNRS IBCP&EGEE biomed VO dep) Vincent Breton(CNRS & EGEE Dir of Applications) Bob Cowles(SLAC and OSG Security co-chair) Ake Edlund(KTH and EGEE Director of Security) David Groep(NIKHEF and IGTF chair) David Kelsey(CCLRC and LCG/EGEE JSPG chair) Olle Mulmo(KTH and GGF Security Area Director) Dane Skow(USA and GGF Security Area Director) Von Welch(NCSA and Globus Alliance)

Enabling Grids for E-sciencE INFSO-RI GGF16 AuthZ 3 Background Much work on Grid Authentication -> success –International GridTrust Federation (IGTF) –facilitates cross-Grid authentication Grid Authorization is less mature Many large-scale application communities (VOs) are global in nature –have the need to access multiple Grid infrastructures Authorization (AuthZ) assertions and policy needs to be controlled at the VO level Important requirement for interoperability in AuthZ between Grids –protocols and evaluation of the AuthZ/Policy assertions –different implementations interwork and make AuthZ decisions.

Enabling Grids for E-sciencE INFSO-RI GGF16 AuthZ 4 Aims This workshop will consider short-term (now and next two years) Grid Authorization and Policy implementations, requirements and issues Investigate what improvements can be made to encourage and facilitate interoperability between Grid operational infrastructures Lessons learned from today's implementations –For the Grid security standards activities in GGF for the longer-term future. Highlight the Life Science perspective with requirements from the biomed VO in EGEE and in the overall biomedical community

Enabling Grids for E-sciencE INFSO-RI GGF16 AuthZ 5 Agenda – Session # Welcome, introduction and aims The LHC experiments (particle physics) AuthZ requirements (David Kelsey) The Biomed/EGEE AuthZ requirements (Christophe Blanchet/Rémi Mollon) AuthZ in Open Science Grid (Bob Cowles) Discussion

Enabling Grids for E-sciencE INFSO-RI GGF16 AuthZ 6 Agenda – Session #2 Panel presentations & discussion - AuthZ interoperability issues and plans Von Welch TeraGrid/OSG interoperation issues David Groep EGEE framework and local PDP's Jens Jensen Data management AuthZ Yuri Demchenko GAAA/GT4 gap analysis Christos Kanellopoulos Ideas on interoperation/interoperability Olle MulmoFuture plans and directions (for GGF) leading into general discussion - recommendations for short-term and mid-term direction All slides are available. Should be on GGF16 web (not yet!). In the meantime…

Enabling Grids for E-sciencE INFSO-RI GGF16 AuthZ 7 Links to slides Session #1 Introhttp://hepwww.rl.ac.uk/kelsey/ggf16authzws/intro.ppthttp://hepwww.rl.ac.uk/kelsey/ggf16authzws/intro.ppt LCG Biomed OSG Notes - session #1 Session #2 Von David Jens Yuri Christos Olle Notes - session #2 - number 1 notes1.txthttp://hepwww.rl.ac.uk/kelsey/ggf16authzws/session2- notes1.txt Notes - session #2 - number 2 notes2.txthttp://hepwww.rl.ac.uk/kelsey/ggf16authzws/session2- notes2.txt

Enabling Grids for E-sciencE INFSO-RI GGF16 AuthZ 8 LHC AuthZ requirements Some general AuthZ requirements (not complete list!) A VO (experiment) wishes to centrally control –Fine-grained access control (data) –Fine-grained access control/priority (cpu)  Priority likely to be dynamic –By Group membership, by role, or individual Individuals may belong to more than one VO –User must be able to choose for each session User must be able to select a role(s) per session –Not always super-user! Sites need to apply local policy based on AuthZ attributes No need for data encryption – integrity more important Privacy (no read) between experiments (or groups) needed Accounting/Auditing required (at group/role/individual) AND MUST INTEROPERATE BETWEEN GRIDS

Enabling Grids for E-sciencE INFSO-RI GGF16 AuthZ 9 LHC Interoperation/Issues (1) All GRIDs must understand VOMS attributes All services/middleware must understand VOMS –Gridftp will be used for some years ahead  Not VOMS-aware so still need a grid mapfile  User therefore can only belong to one VO Local sites need to interpret the attributes sensibly –Not necessarily the same, but not contradictory Cannot today implement large numbers of groups and roles –batch systems/schedulers use UNIX group id –Need a separate gid for every combination of group/role –too many! LHC trying to limit the number for now –(Per VO) 2 to 4 groups and 2 to 4 roles (sum <= 6)

Enabling Grids for E-sciencE INFSO-RI GGF16 AuthZ 10 LHC Interoperation/Issues (2) Can we standardise the names of common roles? –No conclusion yet in LHC –Concerns about names becoming hard-wired into code –May be too hard or not worth it LHC Groups/Roles today –All experiments have one group = “lcg1”  For general users (old names stick!) –CMS has defined some physics groups (no need to standardise)  StandardModel, HeavyIons, Higgs, … –Role names  VO-Admin(the VO managers)  lcgadmin(software managers)  production(managers of data production)  But note… also cmsprod and usprod

Enabling Grids for E-sciencE INFSO-RI GGF16 AuthZ 11 LHC Interoperation/Issues (3) How do VO’s define a global/central policy? And will this be interpreted same by all Grids? –Each VO needs to be able to set processing priority  By group (to give a physics topic priority)  Dynamically and for short periods of time  Without having to get sites to reconfigure –Should they assign a role? –Or a VOMS “capability” (not used yet) –Or maybe nothing to do with VOMS  E.g. VO Global policy could be applied at the Resource Broker (new G-PBox)?

Enabling Grids for E-sciencE INFSO-RI GGF16 AuthZ 12 LHC Interoperation/Issues (4) A user can belong to multiple groups –How does the work performed run/accounted correctly (in correct group) –And will all Grids do this the same way? And linked to AuthZ… –Will Grids be able/willing to share accounting and/or auditing information?  This is required by the VO  But usually handled by the Grid Operations  Technical and/or legal problems

Enabling Grids for E-sciencE INFSO-RI GGF16 AuthZ 13 GGF16 Discussion Taken from notes Can we come up with a common format for FQN? –Basically, this is a problem in string standardization. Can we standardize resource description and job description, and does GLUE have anything to offer in this regard? We now have (almost) a standard syntactical representation of FQN. –Is it useful to address the semantics associated with roles at this time? We have a wide array of (possible) solutions to choose from, but we need to focus on one or two solutions so that we can move forward Two tracks: short-term "here and now" solutions and long-term vision GIN Goal: interop test at SC06 What agreements should we have in place a year from now? We need interoperable credentials, not common credentials. Determine issues here and now, prioritize them, and then invest development effort in the highest priority items. GGF OGSA-AuthZ WG looking for input Concrete interactions between GGFs are needed. (Too much intervening time between GGFs.) –How? When? Where?

Enabling Grids for E-sciencE INFSO-RI GGF16 AuthZ 14 MultiGrid Auth Group Input from Dane Skow MultiGrid = “Grid Interoperability Now” activity (GIN) –Aiming for SuperComputing 2006 –There is a GGF mail list for GIN AuthN/AuthZ They will discuss use of common role definitions A proposal: Group User: would be provisioned with the default permissions and capabilities for the standard usage of a resource by that group Role Admin: would be provisioned full permissions and capabilities allowed to the group managers (probably not equivalent to root access to a machine) Role Storage Admin: would be provisioned with the ability to read/ write/delete all files and directories owned by the group Role Priority Admin: would be provisioned with the ability to adjust priorities for queued requests by that group on a resource. (This probably implies the requirement for a common interface for manipulating priority of queued requests).

Enabling Grids for E-sciencE INFSO-RI GGF16 AuthZ 15 TONIC group This was shown, but no great enthusiasm! TONIC Taskforce Organizing Near-term Interoperation for Credentials Draft Charter: Community group formed to develop interoperation agreements to support various levels of interoperation between grids participating in the Grid Interoperation Now (GIN) activity. Create documents defining interoperation agreements for levels of interoperation. Act as an intermediate between the immediate needs of the production grid interoperation actions and the standards development process. Conclusion –GGF Security Area Directors to decide the way forward

Enabling Grids for E-sciencE INFSO-RI GGF16 AuthZ 16 MWSG discussion Scope? –EGEE and OSG only? Timeframe? –“Here and Now”?  2 years?  Timeframe of EGEE-II?  Developed, tested and deployed VOMS took 3 years What are the urgent topics? –Common role names?  “Without standardization of attributes, cross-domain authz is not possible” (Christos K) –Batch job priorities – how? –Data access? –More?