AA aspects in some GN2 activities Maurizio Molina DANTE (www.dante.net)www.dante.net TF-EMC2 Meeting - 17th Feb 2005, Amsterdam.

Slides:



Advertisements
Similar presentations
Nicolas Simar, Network Engineer 12/01/2005 Brussels DANTE GN2-JRA1 Performance Monitoring.
Advertisements

Internetworking II: MPLS, Security, and Traffic Engineering
Shibboleth: How It Relates to SAML Marlena Erdos Aug 27, 2001.
Connect. Communicate. Collaborate Towards Multi-domain Monitoring for the Research Networks Nicolas Simar, Dante TNC 2005, Poznan, June 2005.
TF-EMC2 February 2006, Zagreb Deploying Authorization Mechanisms for Federated Services in the EDUROAM Architecture (DAME) -Technical Project Proposal-
SOA Security Chapter 12 SOA for Dummies. Outline User Authentication/ authorization Authenticating Software and Data Auditing and the Enterprise Service.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
ABFAB Multihop Federations draft-mrw-abfab-multihop-fed-01.txt Margaret Wasserman
Multihop Federations & Trust Router draft-mrw-abfab-multihop-fed-02.txt draft-mrw-abfab-trust-router-01.txt Margaret Wasserman
TF-NGN TERENA General Assembly Roberto Sabatino Copenhagen, 23 October 2003.
Test Review. What is the main advantage to using shadow copies?
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
EuroPKI 2008 Manuel Sánchez Óscar Cánovas Gabriel López Antonio F. Gómez Skarmeta University of Murcia Levels of Assurance and Reauthentication in Federated.
GN2 Performance Monitoring & Management : AA Needs – Nicolas Simar - 2 nd AA Workshop Nov 2003 Malaga, Spain GN2 Performance Monitoring & Management.
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE II - Network Service Level Agreement (SLA) Establishment EGEE’07 Mary Grammatikou.
Performance Monitoring - Internet2 Member Meeting -- Nicolas Simar Performance Monitoring Internet2 Member Meeting, Indianapolis.
World Class Standards WG8 presentation of current Subscription Management Activities TISPAN WG8 – 3GPP SA#5 Joint meeting Sophia Antipolis, May14th - 15.
PerfSONAR Eric L. Boyd. 2 perfSONAR: Overview Joint effort of ESnet, GÉANT2 JRA1 and Internet2 Herding cats or babysitting rottweilers? Webservices network.
Identities and Network Access Identifier in M2M Page 1 © GPP2 3GPP2 and its Organizational Partners claim copyright in this document and individual.
Distributed Information Retrieval Using a Multi-Agent System and The Role of Logic Programming.
Connect. Communicate. Collaborate eduGAIN in Real Life! Ajay Daryanani, RedIRIS TERENA Networking Conference Brugge, 20th May 2008.
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
Connect. Communicate. Collaborate BANDWIDTH-ON-DEMAND SYSTEM CASE-STUDY BASED ON GN2 PROJECT EXPERIENCES Radosław Krzywania (speaker) PSNC Mauro Campanella.
Routing integrity in a world of Bandwidth on Demand Dave Wilson DW238-RIPE
IMS 架構與話務分析 網路管理維運資源中心 日期 : 2013/07/25 網路管理維運資源中心 日期 : 2013/07/25 限閱.
J. Access Control to Video Resources TF-VVC.
OGF22 25 th February 2008 OGF22 Demo Slides Prof. Richard O. Sinnott Technical Director, National e-Science Centre University of Glasgow, Scotland
Practical Distributed Authorization for GARA Andy Adamson and Olga Kornievskaia Center for Information Technology Integration University of Michigan, USA.
Connect. Communicate. Collaborate The authN and authR infrastructure of perfSONAR MDM Ann Arbor, MI, September 2008.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Connect. Communicate. Collaborate Stitching framework for AutoBAHN Victor Reijs, HEAnet TNC2007, May 23 rd, 2007
Connect. Communicate. Collaborate AAI scenario: How AutoBAHN system will use the eduGAIN federation for Authentication and Authorization Simon Muyal,
The Client-Server Model And the Socket API. Client-Server (1) The datagram service does not require cooperation between the peer applications but such.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
January 16 GGF14 NMWG Chicago (June 05) Jeff Boote – Internet2 Eric Boyd - Internet2.
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
EGEE-II INFSO-RI Enabling Grids for E-sciencE End-to-End Service Level Agreement Provisioning and Monitoring for End-to-End QoS.
INFSO-RI Enabling Grids for E-sciencE NRENs & Grids Workshop Relations between EGEE & NRENs Mathieu Goutelle (CNRS UREC) EGEE-SA2.
PerfSONAR WG 2006 Spring Member Meeting Jeff W. Boote 24 April 2006.
E2E piPEfitters Eric L. Boyd. 2 Agenda NLANR / DAST Advisor Jim Ferguson John Estabrook OWAMP Jeff Boote SONAR Prototype Deployment Eric Boyd.
Adding Distributed Trust Management to Shibboleth Srinivasan Iyer Sai Chaitanya.
Connect. Communicate. Collaborate GN2 Activities and the LOBSTER Project Nicolas Simar, DANTE TNC 2005, Poznan, June 2005.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
Javier Orellana JRA4 Coordinator Face to Face Partners Meeting University College London 11 December 2003 EGEE is proposed as a project funded by the European.
Federated Wireless Network Authentication Kevin Miller Duke University Internet2 Joint Techs Salt Lake City February, 2005.
22-Mar-2005 Internet2 Performance Architecture & Technologies Update Jeff W. Boote.
PiPEfitters Salt Lake City Jt Techs (Feb 05) Jeff Boote - Internet2.
EGEE is a project funded by the European Union under contract IST JRA4 Overview Javier Orellana JRA4 Coordinator EGEE Kick Off Meeting SA2.
INFSO-RI Enabling Grids for E-sciencE NPM Security Alistair K Phipps (NeSC) JRA4 Face To Face, CERN, Geneva.
Omniran IEEE 802 Scope of OmniRAN Date: Authors: NameAffiliationPhone Max RiegelNSN
EGEE is a project funded by the European Union under contract IST GN2 SA3 End to End Quality of Service Toby Rodwell DANTE First EGEE Conference,
AAI Interconnection with an European style Diego R. Lopez RedIRIS.
Connect. Communicate. Collaborate Applying eduGAIN to network operations The perfSONAR case Diego R. Lopez (RedIRIS) Maurizio Molina (DANTE)
Planning File and Print Services Lesson 5. File Services Role The File Services role and the other storage- related features included with Windows Server.
Dynamic/Deferred Document Sharing (D3S) Profile for 2010 presented to the IT Infrastructure Technical Committee Karen Witting February 1, 2010.
Javier Orellana EGEE-JRA4 Coordinator CERN March 2004 EGEE is proposed as a project funded by the European Union under contract IST Network.
Bob Jones EGEE Technical Director
Applying eduGAIN to network operations The perfSONAR case
eduTEAMS platform for collaboration Niels Van Dijk
GGF14 NMWG Chicago (June 05)
PerfSONAR: Development Status
Adding Distributed Trust Management to Shibboleth
O. Otenko PERMIS Project Salford University © 2002
IEEE 802 Scope of OmniRAN Abstract
TGu Requirements Check
Shared Infrastructure
Presentation transcript:

AA aspects in some GN2 activities Maurizio Molina DANTE ( TF-EMC2 Meeting - 17th Feb 2005, Amsterdam

DANTE and GN2 Dante operates Geant Network, interconnecting European NRENS Geant2 project (evolution of Geant NW) Started sep Year project (FP6): evolution of Geant Network –Partners: DANTE (main contractor), Terena, NRENs 3 Activity types: –Procurement –Service (SA) –Research (JRA) AA Needs…

SA3, JRA1, JRA3 needs for an AAI infrastructure SA3: End-to-End Quality of Service –Needs AA to allocate Network resources E.g. bandwidth allocated trough Premium IP Provisioning System (PIP PS); we’ll use this example throughout the following JRA1: Network Measurement Infrastructure –Architecture jointly developed with I2 (Eric Boyd, Jeff W. Boote) –Needs AA to protect Measurement Data, Measurement Tools, Network resources from excessive active measurement traffic JRA3: Bandwidth on Demand service –(problem space similar to SA3 - Not further covered in this presentation)

JRA1 – General (no AA) – Example of active Measurement Setup request

SA3 – general (no AA) PIP PS A F PIP A > F? B C D E PIP B > D? PIP D > F? Granted/Denied The user wants some guaranteed bandwidth spanning more than one domain (“Extended QoS Domain”). In the request, only the end points of the path are specified The request arrives at PIP PS of the domain where the starting point is This PIP PS must fulfil the request for its domain and forward the request to the next PIP PS –The process is repeated up to the destination The request succeeds if all PIP PSs can grant the request PIP PS PIP PS

JRA1 – AA needs Access to Measurement data (Meas Archive service) –AuthZ is access/deny based on local policies Access to measurement resources (Meas Point service) –AuthZ is access/deny based on local policies + check if measurements are feasible Enough resources within the MPs Not conflicting within the network

JRA1 – AA flow (Meas. Point access) – case1 Lookup Service is the entry point –It provides MP list, and AuthN Service(s) that can authenticate for them Client chooses one AuthN service where he has an identity, and authenticates Handle is returned, client goes to resource (MP) AuthZ can involve multiple entities (MP, RP level1, RP level 2…) –More attribute can be asked back (as in Shibboleth model)

JRA1 – AA flow (Meas. Point access) – case 2 More complicate flow in case a user hasn’t got an identity among the set of specified possible AuthN Service(s) where you can authenticate for the MP. Is it really different from the previous one?

JRA1: Discussion: (feedback please…) Lookup Service MUST accept unauthenticated queries (makes sense?) Support for clients with multiple identities (is it in AA scope?) Support for resources that have multiple owners (makes sense?) Hierarchical distributed authZ (MP, RPlev.1, RP lev. 2…) (feasible?) The AuthN Service for the realm manages the federation relationship on behalf of the other services in the realm (i.e. no SHIRE on MPs, Meas. Archives, etc.) (makes sense?) Is case 1 different from case 2 (or can 1 collapse in 2?) User making request may roam and already have network access in RI. Does this modify the AA model? (I guess NO…) Which interface can JRA5 provide for JRA1’s prototype? (Timeline, Sep. 2005)

SA3 – AA needs PIP PS PIP PS PIP PS A F PIP A > F? B C D E PIP B > D? PIP D > F? Granted/Denied In terms of AA, An authN process is triggered ONLY because of the request to the PIP PS of first domain Requests forwarded by the first PIP PS to other PIP PS will trigger only local AutZ Let’s detail more the AA aspects…

SA3 – AA Phase 1 Restrictions: –Starting point A MUST be in user’s home domain –Authentication MUST happen within AuthN server of user’s home domain Note: user may also be not “physically” attached to his home domain as shown in this picture PIP PS PIP PS PIP PS PIP A > F? + ID Credentials + Attributes PIP B > D? + ID Credentials + Attributes Granted/Denied AuthN server PIP D > F? + ID Credentials + Attributes Granted/Denied AuthN server AuthN server AutZ policies AutZ policies AutZ policies A F BC D E User’s Home Domain

SA3 – AA Phase 2 No more restrictions: –Starting PIP PS can be in whatever domain –User can start his authentication in remote domains PIP PS PIP PS PIP PS PIP C > F? + ID Credentials + Attributes AuthN server PIP D > F? + ID Credentials + Attributes Granted/Denied AuthN server AuthN server AuthN C F D E AutZ policies AutZ policies AutZ policies User’s Home Domain

SA3: AA Discussion (1/2) Phase 1 Only 1 AuthN server plays a role Full user identity and relevant attributes got from initial AuthN are simply passed along to AuthZ engines –Local policies need to be installed in ALL domains (same user may have different rights in different domains) –PIP servers need to trust each other for AuthN the user How? Is this part of what JRA5 will provide? How does the initial AuthN happen? i.e. SR3 expects JRA5 to provide a full set of interfaces for this case (e.g. not just refer to Shib, PAPI,..) Timeline for a working AA solution: 31th May 05 Phase 2 Two AuthN servers play a role (need of an Identity Federation) But from second domain on, no AA difference from Phase 1

SA3: AA Discussion (2/2) - Identity and attribute structure Identity: Hierarchical.. –Uk.kent.physics.prof_x Users have single identities but can access the PIP PS for more projects. Need of at least another attribute for that –If user is registered for multiple projects he can be prompted to choose one. PIP PSs will want to know the user’s identity and project anyway –No need of an identity hiding? However, can identities and attributes be plaintext, for the AA system?

Backup slides

JRA1 – Main open Points * support for clients with multiple identities * support for resources that have multiple owners (I can be convinced that this is overkill, but I am curious what you all think about this.) * hierarchical distributed authZ. For network measurements, you often need access to multiple resources, and you may need to contact different authZ servers for each of those different resources. We have discussed a hierarchical model for this so that control of a group of a resources can be collected and managed more easily. (This is the Resource Protector service described in the JRA1 docs.) * Federation trust relationships do not extend all the way to all of the independent services within the realm. The Authentication Service for the realm manages the federation relationship on behalf of the other services in the realm. - I'm not sure if the first one is in scope (i.e. it's a simple replication of authentication, each time with different identities) - The second one seems to add some complications (although Diego says it's feasible). How "strong" are you about it? - On the third one, you explained during the last phone conference I attended why you want the RP (potentially hierarchical RPs) into the loop. I think I have understood your point and will try to make it to them. - on the fourth one, I think you mean that we require authentication before accessing Service's resources (other than the LS). Or, putting it in "old" Shibboleth language, no resource has a SHIRE, but they only have a SHAR. Can you confirm it? Beyond that, I'll try to discuss the following: 1) what really differentiate the Single domain case from the multiple one? (Diego seems to suggest that in a federated environment there are in reality no differences) 2) Network access is different from Measurement resource access. So, even if we have accessed a remote network we still have to authenticate to use the Meas infrastructure 3) which type of interface is JRA5 providing us?

JRA1 – proposed AA flow (Meas. Point access) –Client queries Lookup service (LS) for MPs that match a given criteria. –LS returns a list of candidate MPs including an indication of the authentication realms that manage authentication for each one. (Each MP could actually be managed by more than one realm.) LS also returns the address of an AA service that can authenticate for each of the returned authentication realms. –Client contacts the AA service that manages authentication for the resource realm (R-AA-Service) and requests an authentication token blessed for use in the resource realm (R-AuthRealm). –R-AA-Service returns a list of known (federated) authentication realms and asks the client to choose one for authenticating. –Client –R-AA-Service manages identities for R-AuthRealm, so R-AA-Service asks client for identity credentials. –Client presents credentials. –If credentials are valid, R-AA-Service creates a handle that can be used to request additional attributes about the identity subject to attribute release policies in R-AuthRealm. This handle is returned to the client encoded as an AuthToken blessed by R-AuthRealm (R- AuthToken). –Client requests a measurement from MP. Request includes the R- AuthToken. –MP requests resources from the Resource Protector service (RP). The R-AuthToken is passed along in the request. –RP needs more information about the identity requesting the resources and makes an attribute query to R-AA-Service using the R- AuthToken handle. –R-AA-Service releases only as much information about the client identity as is allowed. –RP returns resource availability. (allowed/disallowed) This portion will include scheduling. –MP returns response to measurement request.

JRA1 – more in detail Client queries Lookup service (LS) for MPs that match a given criteria. LS returns a list of candidate MPs including an indication of the authentication realms that manage authentication for each one. LS also returns the address of an AA service that can authenticate for each of the returned authentication realms. Client contacts the AA service that manages authentication for the resource realm (R-AA-Service) and requests an authentication token blessed for use in the resource realm (R-AuthRealm). R-AA-Service returns a list of known (federated) authentication realms and asks the client to choose one for authenticating. Client specifies desire to authenticate at F-AuthRealm. (JRA5 Terminology: Client R-AA-Service does not manage F-AuthRealm so it redirects the client to F-AA- System. Client contacts the AA service that manages authentication for the client- selected realm (F-AA-Service) and requests an F-AuthToken authentication token for use in R-AuthRealm (as in step 3.) F-AA-Service returns a list of known (federated) authentication realms and asks the client to choose one for authenticating (as in step 4.) Client specifies desire to authenticate at F-AuthRealm (as in step 5.) F-AA-Service manages identities for F-AuthRealm, so F-AA-Service asks client for identity credentials (where credentials could be passwd, one-time token, finger print scan, etc.) (as in step 6, non-federated case.) Client presents credentials (as in step 7.) If credentials are valid, F-AA-Service creates a handle that can be used to request additional attributes about the identity subject to the attribute release policies in F-AuthRealm. This handle is returned to the client encoded as an AuthToken blessed by F-AuthRealm (F-AuthToken) (as in step 8.) Client presents credentials to R-AA-Service. In the federated case, the credentials can be the authentication token from a federated authentication realm, in this case F-AuthToken. R-AA-Service needs more information about the federated identity requesting access to R-AuthRealm protected resources and makes an attribute query to F-AA-Service using the F-AuthToken handle. F-AA-Service releases only as much information about the client identity as is allowed. If credentials are valid, R-AA-Service blesses the F-AuthToken for use with R- AuthRealm resources. This effectively creates an R-AuthToken but keeps the handle pointing back to the F-AA-Service for attribute queries. Client requests a measurement from MP. Request includes the R-AuthToken. MP requests resources from the Resource Protector service (RP). The R- AuthToken is passed along in the request. RP needs more information about the identity requesting the resources and makes an attribute query. The query goes to the F-AA-Service. F-AA-Service releases only as much information about the client identity as is allowed. RP returns resource availability (allowed/disallowed.) This portion includes scheduling. MP returns response to measurement request.