Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MyProxy and EGEE Ludek Matyska and Daniel.
Advertisements

Grid Security Policy GridPP18, Glasgow David Kelsey 21sr March 2007.
5-Dec-02D.P.Kelsey, GridPP Security1 GridPP Security UK Security Workshop 5-6 Dec 2002, NeSC David Kelsey CLRC/RAL, UK
Grid Security Policy David Kelsey (RAL) 1 July 2009 UK HEP SYSMAN Security workshop david.kelsey at stfc.ac.uk.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
Andrew McNab - EDG Access Control - 14 Jan 2003 EU DataGrid security with GSI and Globus Andrew McNab University of Manchester
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI - Identity Management Steven Newhouse Director, EGI.eu Federated Identity.
Authorization WG Update David Kelsey EU Grid PMA, Copenhagen 27 May 2008.
5-Sep-02D.P.Kelsey, Security Summary, Budapest1 WP6/7 Security Summary Budapest 5 Sep 2002 David Kelsey CLRC/RAL, UK
INFSO-RI Enabling Grids for E-sciencE JRA3 2 nd EU Review Input David Groep NIKHEF.
Open Science Grid Use of PKI: Wishing it was easy A brief and incomplete introduction. Doug Olson, LBNL PKI Workshop, NIST 5 April 2006.
30-Jan-03D.P.Kelsey, GridPP Security1 Security GridPP6 30 Jan 2003 Coseners House David Kelsey CLRC/RAL, UK
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Security Policy Group Summary EGI TF David Kelsey 6/28/
WLCG Security TEG, risks and Identity Management David Kelsey GridPP28, Manchester 18 Apr 2012.
Grid Trust Fabric TNC 2006, Catania 16 May 2006 David Kelsey CCLRC/RAL, UK
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Security Policy Group EGI Technical Forum Sep 2010 David Kelsey.
Federated Identity Management for HEP David Kelsey WLCG GDB 9 May 2012.
Security Update WLCG GDB CERN, 12 June 2013 David Kelsey STFC/RAL.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Mine Altunay OSG Security Officer Open Science Grid: Security Gateway Security Summit January 28-30, 2008 San Diego Supercomputer Center.
JSPG: User-level Accounting Data Policy David Kelsey, CCLRC/RAL, UK LCG GDB Meeting, Rome, 5 April 2006.
Evolution of the Open Science Grid Authentication Model Kevin Hill Fermilab OSG Security Team.
© 2006 Open Grid Forum Enabling Pervasive Grids The OGF GIN Effort Erwin Laure GIN-CG co-chair, EGEE Technical Director
Security Policy Update LCG GDB Prague, 4 Apr 2007 David Kelsey CCLRC/RAL
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
3-Jul-02D.P.Kelsey, Security1 Security meetings Report to EDG PTB 3 Jul 2002 David Kelsey CLRC/RAL, UK
Mine Altunay July 30, 2007 Security and Privacy in OSG.
LCG Pilot Jobs + glexec John Gordon, STFC-RAL GDB 7 November 2007.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Linda Cornwall CCLRC (RAL) FP6 Security workshop.
15-Dec-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the Joint Security Policy Group) CERN 15 December 2004 David Kelsey CCLRC/RAL,
9-Oct-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) FNAL 9 October 2003 David Kelsey CCLRC/RAL, UK
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Security Coordination Group Dr Linda Cornwall CCLRC (RAL) FP6 Security workshop.
Trusted Virtual Machine Images a step towards Cloud Computing for HEP? Tony Cass on behalf of the HEPiX Virtualisation Working Group October 19 th 2010.
Security Policy Update David Kelsey UK HEP Sysman, RAL 1 Jul 2011.
Glite. Architecture Applications have access both to Higher-level Grid Services and to Foundation Grid Middleware Higher-Level Grid Services are supposed.
A Trust Framework for Security Collaboration among Infrastructures David Kelsey (STFC-RAL, UK) 1 st WISE, Barcelona 20 Oct 2015.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
INFSO-RI Enabling Grids for E-sciencE An overview of EGEE operations & support procedures Jules Wolfrat SARA.
Security Policy: From EGEE to EGI David Kelsey (STFC-RAL) 21 Sep 2009 EGEE’09, Barcelona david.kelsey at stfc.ac.uk.
WLCG Laura Perini1 EGI Operation Scenarios Introduction to panel discussion.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI SPG future work EGI Technical Forum Lyon, 21 Sep 2011 David Kelsey, STFC/RAL.
EGI-InSPIRE RI EGI EGI-InSPIRE RI Establishing Identity in EGI the authentication trust fabric of the IGTF and EUGridPMA.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks EGEE and JSPG activities David Kelsey CCLRC/RAL.
VOMS Attribute Authorities Michael Helm ESnet/LBNL 23 Feb 2007.
8-Mar-01D.P.Kelsey, Certificates, WP6, Amsterdam1 WP6: Certificates for DataGrid Testbeds David Kelsey CLRC/RAL, UK
JSPG Update David Kelsey MWSG, Zurich 31 Mar 2009.
12-Jun-03D.P.Kelsey, CA meeting1 CA meeting Minimum Requirements CERN, 12 June 2003 David Kelsey CCLRC/RAL, UK
Security Policy Update WLCG GDB CERN, 8 Dec 2010 David Kelsey STFC/RAL david.kelsey AT stfc.ac.uk.
Why a Commercial Provider should Join the Academic Cloud Federation David Blundell Managing Director 100 Percent IT Ltd Simple, Flexible, Reliable.
Grid Security Update David Kelsey (RAL) HEPiX, LBNL 28 Oct 2009.
INFSO-RI Enabling Grids for E-sciencE Joint Security Policy Group David Kelsey, CCLRC/RAL, UK 3 rd EGEE Project.
LCG Pilot Jobs + glexec John Gordon, STFC-RAL GDB 7 December 2007.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI CSIRT Procedure for Compromised Certificates and Central Security Emergency.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI VOMS Proxy Lifetime UCB 21 Aug 2012 David Kelsey STFC.
European Grid Initiative AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
DataGrid Security Wrapup Linda Cornwall 4 th March 2004.
Open Science Grid Security Activities D. Olson, LBNL OSG Deputy Security Officer For the OSG Security Team: M. Altunay, FNAL, OSG Security Officer, D.O.,
Trusted Virtual Machine Images the HEPiX Point of View Tony Cass October 21 st 2011.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Services for Distributed e-Infrastructure Access Tiziana Ferrari on behalf.
OSG VO Security Policies and Requirements Mine Altunay OSG Security Team July 2007.
Grid Security Policy: EGEE to EGI David Kelsey (RAL) 16 Sep 2009 JSPG meeting, DFN Berlin david.kelsey at stfc.ac.uk.
News from EUGridPMA EGI OMB, 22 Jan 2013 David Kelsey (STFC) Using notes from David Groep 22/01/20131EUGridPMA News.
15-Jun-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) CERN 15 June 2004 David Kelsey CCLRC/RAL, UK
Security Policy Update WLCG GDB CERN, 11 June 2008 David Kelsey STFC/RAL
LCG Security Status and Issues
Update on EDG Security (VOMS)
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
AAI in EGI Status and Evolution
Presentation transcript:

Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008

15 Sep 08IPG AAAA summary, Kelsey2 AAAA Documents submitted DEISA: “DEISA AAA Policies” OSG: “OSG AAAA” and many linked policies TeraGrid: “TeraGrid Certificate Management and Authorization Policy” (TG5), “Policy Framework” (TG1) & “Core Services” (wiki) EGEE: “EGEE Security Policies” (summary document with all policies in appendix) NAREGI –Not yet in production –New task force to discuss technical/operational issues –No documents to share yet

15 Sep 08IPG AAAA summary, Kelsey3 Authentication In common –All use X.509 PKI –All except TeraGrid rely on IGTF to define trusted CAs Differences –TeraGrid defines its own list of CAs (some are IGTF accredited) –TeraGrid policy document states general responsibilities Similar to EGEE top-level security policy document User must accept TeraGrid User Responsibility form prior to certificate issue –TeraGrid PI requests host/service certs for external resources –DEISA has policies which partners have to obey (and also local policy) –OSG and EGEE (will) have different policies for CA removal –TeraGrid has many detailed requirements for CAs Important input for IGTF (not always compliant with IGTF profiles) E.g. CRL must be issued every 24 hours –OSG and EGEE have defined high-level requirements on IGTF

15 Sep 08IPG AAAA summary, Kelsey4 Authorisation In common –EGEE/OSG use VOMS and have similar approaches Also working on VO registration and VO membership management policies –DEISA/TeraGrid have similar approaches AuthZ relies on X.509 authentication and mapping into local databases DEISA have additional user attributes in their LDAP database Differences (particularly in the security model) –EGEE/OSG delegate User Registration to VO –DEISA/TeraGrid: User Registration at Sites (& “Home”) “Project PI” has similar role to “VO Manager” –Local (Site) versus Global (VO) Authorisation –EGEE/OSG have AuthZ policies related to operation of VOs

15 Sep 08IPG AAAA summary, Kelsey5 Accounting In common –No policy documents but accounting is used! –OSG and EGEE sharing accounting data for WLCG Vos –DEISA/TeraGrid have standards based accounting With access control Differences –OSG has a Data Privacy policy –JSPG working on Accounting Data policy Data privacy concerns relates to User-level accounting (required by VOs)

15 Sep 08IPG AAAA summary, Kelsey6 Auditing In common –No common auditing polices –But OSG/EGEE share a common Incident Response policy –TeraGrid has a well defined incident handling workflow (DEISA?) Differences –EGEE has policy on Traceability and Logging Requires middleware to produce appropriate logs Sites and Service providers must keep logs –In a site central server –For at least 90 days Details defined by Operational Security Coord Team –Including some core logs which must be kept for 180 days

AUP In common –Grid User AUP EGEE and OSG identical wording –Accepted by user during registration with VO DEISA uses slightly modified version OGF GIN also uses slightly modified –OSG/EGEE: VO AUP belongs to the VO Different –TeraGrid has an AUP per site (so does DEISA) Accepted by user during registration 15 Sep 08IPG AAAA summary, Kelsey7

Other Policies TeraGrid –Policy Framework (TG1) Process for agreeing policy JSPG has a top-level Security Policy JSPG, EGEE, OSG –Site Registration, Site Operation –VO Registration, VO Operation, VO Membership –Pilot Jobs 15 Sep 08IPG AAAA summary, Kelsey8

Policy precedence OSG defines an order of precedence –Site then VO then Workspace then OSG EGEE: –Each Site has its own local policies –EGEE policy augments local policies by setting out additional Grid-specific requirements –And has an exceptions handling process DEISA/TeraGrid? 15 Sep 08IPG AAAA summary, Kelsey9

IGTF – new work EUGridPMA Authorisation WG –Tackling scaling problem: Build trust between large number of both VOs and Grids –Working on document defining minimum requirements for running an Attribute Authority service (e.g. VOMS). Accreditation process TBD. VO responsibilities defined in JSPG document: VO Membership Management Policy 15 Sep 08IPG AAAA summary, Kelsey10

JSPG future work JSPG currently working on –VO registration, VO membership, Accounting Data, & Grid Portals Once that is all complete –Plan to revise and simplify all policies Working towards EGI and many NGIs –To produce simple and general policies To augment the NGI local policies Establish trust for international Grid interoperation 15 Sep 08IPG AAAA summary, Kelsey11

Issues for discussion Standardise the Grid AUP? Agree on IGTF for AuthN? –With possibility to add other CAs if needed Can we use common language for manager of the User Database? –“VO” versus “Resource Provider/Site”? JSPG revision of all policies –It would be highly desirable to get IPG input Input also welcome to IGTF AuthZ WG 15 Sep 08IPG AAAA summary, Kelsey12

Longer term issues Accounting –If we share VOs and/or users, accounting data exchange is very likely to be needed We do need policy here, particularly for Privacy concerns Auditing –If we share users, we are likely to share security incidents (e.g. recent ssh attacks) –Audit logs important – need for common policy here? Coordinated incident handling is highly desirable OSG has a “peer Grid” contact list OSG/TeraGrid/EGEE is discussing high-level communication –To avoid n*n communication paths 15 Sep 08IPG AAAA summary, Kelsey13