Authentication and Authorisation for Research and Collaboration Christos Kanellopoulos GRNET Proposed Pilots for Libraries and eGov.

Slides:



Advertisements
Similar presentations
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
Advertisements

Agenda Project beginnings and funding. Purpose of the federation. Federation members. Federation protocols. Special features in our federation. Pilot.
AARC Overview Licia Florio, David Groep 21 Jan 2015 presented by David Groep, Nikhef.
Belnet Federation Belnet – Loriau Nicolas Brussels – 12 th of June 2014.
Authentication and Authorisation for Research and Collaboration Licia Florio (GÉANT) Christos Kanellopoulos (GRNET) Service orientation.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
Authentication and Authorisation for Research and Collaboration Pilots on the Integrated R&E AAI Paul van Dijk, Activity Lead Pilots.
Authentication and Authorisation for Research and Collaboration Licia Florio REFEDS Meeting The AARC Project I2 Technology Exchange.
Authentication and Authorisation for Research and Collaboration Licia Florio AARC Workshop The AARC Project Brussels, 26 October.
Authentication and Authorisation for Research and Collaboration David Kelsey AARC AHM Milan And mechanisms NA3 Task 4 – Scalable.
Authentication and Authorisation for Research and Collaboration Niels van Dijk AARC General Meeting Authentication and Authorisation.
Authentication and Authorisation for Research and Collaboration Michał Jankowski, Maciej Brzeźniak AARC General Meeting, Milan.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Current status and plans.
Authentication and Authorisation for Research and Collaboration Mikael Linden AARC all hands Milan Authentication and Authorisation.
Authentication and Authorisation for Research and Collaboration Michał Jankowski, Maciej Brzeźniak AARC General Meeting, Milan.
Authentication and Authorisation for Research and Collaboration Milan, Italy Training and Outreach Authentication and Authorisation.
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
Authentication and Authorisation for Research and Collaboration Christos Kanellopoulos
Authentication and Authorisation for Research and Collaboration David Groep AARC All Hands meeting Milano Policy and Best Practice.
Authentication and Authorisation for Research and Collaboration Christos Kanellopoulos Open Day Event: Towards the European Open.
June 9, 2009 SURFfederatie: implementing a multi- protocol federation Hans Zandbelt & Joost van Dijk, SURFnet.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
Networks ∙ Services ∙ People Thomas Bärecke Journée Fédération, Paris Collaboration européenne GÉANT SA5 03/07/2015 SA5 T5 team
Networks ∙ Services ∙ People Nicole Harris UK federation meeting eduGAIN, REFEDS and the UK 23 June 2015 Project Development Officer GÉANT.
Networks ∙ Services ∙ People Marina Adomeit FIM4R meeting Virtual Organisation Platform as a Service VOPaaS Nov 30, 2015, Austria Task Leader,
Federated Identity Fundamentals Ann Harding, SWITCH Cambridge July 2014.
Networks ∙ Services ∙ People Ann Harding GÉANT Symposium, Vienna Users Session A3 Trust and Identity March GÉANT Activity Leader Trust.
European Grid Initiative AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
Authentication and Authorisation for Research and Collaboration Licia Florio REFEDS Meeting AARC and AARC2 Vienna, 1 st December.
Networks ∙ Services ∙ People Mandeep Saini TNC15, Porto, Portugal Virtual organisation Authorisation Management Practices in Research and.
INTRODUCTION TO IDENTITY FEDERATIONS Heather Flanagan, NSRC.
Authentication and Authorisation for Research and Collaboration Bari, Italy Training and Outreach Authentication and Authorisation.
David Groep Nikhef Amsterdam PDP & Grid AARC Authentication and Authorisation for Research and Collaboration an impression of the road ahead.
Networks ∙ Services ∙ People Licia Florio TNC, Lisbon Consuming identities across e- Infrastructures 16 June 2015 PDO GÈANT.
Authentication and Authorisation for Research and Collaboration Heiko Hütter, Martin Haase, Peter Gietz, David Groep AARC 3 rd.
Authentication and Authorisation for Research and Collaboration Peter Solagna, Davide Vaghetti, et al. Topics for PY2 activities.
Status and plans of AARC SA1 Libraries pilots Pete Birkinshaw, Martin Haase, Peter Gietz / DAASI Lalla Mantovani, Barbara Monticini,
Authentication and Authorisation for Research and Collaboration Licia Florio AARC CORBEL Workshop The AARC Project Paris, 31 May.
Networks ∙ Services ∙ People Marina Adomeit TNC16 Conference, Prague Towards a platform for supporting collaboration GÉANT VOPaaS
Authentication and Authorisation for Research and Collaboration Peter Solagna, Nicolas EGI AAI integration experiences AARC Project.
Authentication and Authorisation for Research and Collaboration David Kelsey AARC AHM Utrecht NA3 Task 4 – Scalable Policy Negotiation.
Authentication and Authorisation for Research and Collaboration AARC/CORBEL Workshop for Life Sciences AAI AARC Draft Blueprint.
Authentication and Authorisation for Research and Collaboration Lalla Mantovani AARC General Meeting, Utrecht What do we want to.
Networks ∙ Services ∙ People Ann Harding Networkshop 44, Manchester Thinking globally, acting locally Trust and Identity in the GÉANT project.
Authentication and Authorisation for Research and Collaboration Brussels Training and Outreach Authentication and Authorisation.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
Networks ∙ Services ∙ People Mandeep Saini AARC/CORBEL Workshop Collaborative Organisation Platform as a Service June 1, 2016, Paris Product.
Authentication and Authorisation for Research and Collaboration Licia Florio IGTF Meeting The AARC Project Amsterdam, 8 September.
Géant-TrustBroker Dynamic inter-federation identity management Daniela Pöhn TNC2014 Dublin, Ireland May 19 th, 2014.
Authentication and Authorisation for Research and Collaboration On behalf of the MJRA1.2 scribes J Jensen.
Networks ∙ Services ∙ People Di4R Network. Services. People. GÉANT 28 th September, Krakow.
Introduction to AAI Services
WLCG Update Hannah Short, CERN Computer Security.
Applying eduGAIN to network operations The perfSONAR case
Cross-sector and user-centric AAI
Mechanisms of Interfederation
EGI Updates Check-in Matthew Viljoen – EGI Foundation
User Community Driven Development in Trust and Identity
eduTEAMS platform for collaboration Niels Van Dijk
eduTEAMS – Current status & Future Plans
Extending Authentication to Members of Social Networks
Identity Federations - Overview
AAI Alignment Nicolas Liampotis (based on the work of Mikael Linden)
An AAI solution for collaborations at scale
GÉANT project update eduTEAMS - AAI as a Service for Collaborative organisations Introduction Status Pilots New Features – input requested InAcademia –
EduTEAMS at a Glance Mandeep Saini Linz, Austria 30 May 2017.
AARC Blueprint Architecture and Pilots
AAI Architectures – current and future
Community AAI with Check-In
eIDAS-enabled Student Mobility
Presentation transcript:

Authentication and Authorisation for Research and Collaboration Christos Kanellopoulos GRNET Proposed Pilots for Libraries and eGov IDs Milan, 04 November 2016 GRNET

Two proposed pilots: 1.Federated Access Mechanisms for Library Consortia 2.Integrating eGov IDs 2 Agenda

3 “Guest Identities” Proposed Pilot: e-Gov eduGAIN and STORK High Level Architectures

Interconnection use cases Use Case 1: eduGAIN SP makes use of the STORK infrastructure Use Case 2: STORK SP makes use of the eduGAIN infrastructure (Does it make sense for AARC??) 4 “Guest Identities” Proposed Pilot: e-Gov

5 Proposed Pilot 1: eduGAIN SP makes use of the STORK infrastructure eduPEPS C-PEPSIdP SP Discovery Service 7 6 STORK eduGAIN 5 Scenario: A user visits an “eduGAIN” enabled SP. Authentication and Attribute Retrieval on/from STORK 1.User visits an eduGAIN enabled SP in Greece 2.The Greek SP redirects the user to the Discovery Service at GRNET. The user selects that she wants to be authenticate via “STORK” 3.The DS redirects the user back to the Greek SP with the information about the eduPEPS 4.The SP redirects the user to the eduPEPS along with an attribute request. The user has to choose her country 5.The user is redirected to the C-PEPS proxy service of her country and there she authenticates using her eID 6.The C-PEPS redirects the user back to the eduPEPS along with a SAML response that include the SAML authentication assertion and the requested attributes 7.The eduPEPS validates the SAML response, translates it to SAML2Int and redirects the user to the SP along with the SAML assertion 2

STORK SPS-PEPS eduPEPS C-PEPSIdP Discovery Service STORK eduGAIN Scenario: A user visits a STORK enabled SP. Authentication using eID and Attribute Retrieval from an “eduGAIN” IdP 1.User visits a STORK enabled SP 2.The STORK SP redirects the user to the S-PEPS. The user selects that she wants to be authenticate via “eduGAIN” 3.The S-PEPS redirects the user to the C-PEPS, where the user authenticates 4.The C-PEPS redirects the user back to the S-PEPS with the authentication assertion and a basic set of attributes 5.The S-PEPS verifies the response from the C-PEPS and redirects the user to eduPEPS. The eduPEPS translates the STORK SAML Attribute Request into a SAML2Int SAML Attribute Request 6.The eduPEPS redirects the user to a Discovery Service in eduGAIN (The Discovery Service could be integrated in the eduPEPS and skip this extra step.) 7.In the Discovery Service the user selects her home institution and is redirected back to the eduPEPS 8.The eduPEPS redirects the user to the IdP of the home institution that the user selects along with the SAML2Int Attribute Request. 9.Upon successful authentication and the IdP redirects the user back to the eduPEPS along with a SAML assertion that includes the released attributes 10.The eduPEPS translates the SAML assertion(s) and the retrieved attributes and generates a STORK SAML assertion. The user is redirected back to the S- PEPS with the STORK SAML assertion generated by the eduPEPS 11.The S-PEPS verifies the response from the eduPEPS and redirects the user back to the STORK SP along with aggregated set of the requested attributes. C-PEPS STORK IdP Proposed Pilot 2: STORK SP makes use of the eduGAIN infrastructure

7

8

Have a model for the case in which publisher contracts are managed centrally by the a library consortium. Having the consortium join a federation as an SP using the SP/IdP proxy has many benefits, which we can show case in this pilot (branding, flexible handling of the contract implementation, statistics etc) Survey library/consortia that have contracts in place that enable the use of federated access for access to resources and produce guidelines for producing federated access-friendly contracts When talking with library consortia, branding is a very important aspect. In this pilot, we want so show, that it is possible to join a national federation and retain control on the branding and the policies. Pilot a solution about Guest identities in the library space. Guest identities have multiple aspects for example library walk-ins, people in small organizations with no local IdM etc. Possible synergy with the GARR Library pilot 9 Library Pilot

HEAL-Link Pilot HEAL-Link is the consortium of academic and research libraries in Greece. It has 54 libraries as members and manages access to more than titles in 19 major publishers Currently HEAL-Link operated it’s own SAML Federation outside of GRNET and eduGAIN (although the IdPs in the HEAL-Link federation are the same like those in the GRNET federation) In this pilot HEAL-Link will join the GRNET Federation using the IdP/SP proxy model 10 Library Pilot

Benefits for Libraries/Library Consortia: The consortium can provide services to its members/users, without loosing its branding as a Service Provider (please note that this is the Service Provider branding we are looking for) In some cases the contracts are centrally managed and they ensure that the users are not identified in individual basis or by the organisations they are coming from. In other cases, the contracts stipulate that the home organizations must be made known to the publishers etc. These different kind of contracts can be satisfied using the proposed model. The technical infrastructure is managed centrally by the consortium. The libraries, and specially the smaller ones, will not have the overhead of maintaining a technical infrastructure. The consortium can add even more services if required, e.g. an EZproxy could be such a service in case there is interest and this is why we find also the GARR pilot interesting. Potential benefits for AARC: Experience with variations of the SP proxy model for library consortia A potential model for library consortia to join their local federations with a turn key solution. Guidelines for establishing contracts that enable the use of federated access mechanism in order to access the publisher content 11 Library Pilot

12

13 Contract management Access Statistics Guest Access Branding

© GEANT on behalf of the AARC project. The research leading to these results has received funding from the European Union’s Horizon 2020 research and innovation programme under Grant Agreement No (AARC). Thank you Any Questions? Christos Kanellopoulos