JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.

Slides:



Advertisements
Similar presentations
Eduserv Athens Federations David Orrell Eduserv Athens Technical Architect.
Advertisements

EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
SWITCHaai Team Federated Identity Management.
Functional Model Workstream 1: Functional Element Development.
AARC Overview Licia Florio, David Groep 21 Jan 2015 presented by David Groep, Nikhef.
A DESCRIPTION OF CONCEPTS AND PLANS MAY 14, 2014 A. HUGHES FOR TFTM The Identity Ecosystem DISCUSSION DRAFT 1.
I2Q & WMnet Pilot Presented by Jason Rousell – i2Q Jay Neale - i2Q.
Shib-Grid Integrated Authorization (Shintau) George Inman (University of Kent) TF-EMC2 Meeting Prague, 5 th September 2007.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
AAI-enabled VO Platform “VO without Tears” Christoph Witzig EGI TF, Amsterdam, Sept 15, 2010.
Authentication and Authorisation for Research and Collaboration Licia Florio (GÉANT) Christos Kanellopoulos (GRNET) Service orientation.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
UNCLASSIFIED 1 Authorization and Attribute Service Tiger Team (AATT) Update & Status January 13, 2008
Transboundary Trust Space February 16, 2012 Ensuring trust in information exchange – proposal and approaches from Russia and CIS-states (RCC states) National.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Authentication and Authorisation for Research and Collaboration Pilots on the Integrated R&E AAI Paul van Dijk, Activity Lead Pilots.
Authentication and Authorisation for Research and Collaboration Licia Florio REFEDS Meeting The AARC Project I2 Technology Exchange.
Authentication and Authorisation for Research and Collaboration Licia Florio AARC Workshop The AARC Project Brussels, 26 October.
Authentication and Authorisation for Research and Collaboration David Kelsey AARC AHM Milan And mechanisms NA3 Task 4 – Scalable.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Current status and plans.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Report and plans Attribute.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Current status and plans.
The UK Access Management Federation John Chapman Project Adviser – Becta.
Federated Identity Management for HEP David Kelsey HEPiX, IHEP Beijing 18 Oct 2012.
Authentication and Authorisation for Research and Collaboration Christos Kanellopoulos
Authentication and Authorisation for Research and Collaboration David Groep AARC All Hands meeting Milano Policy and Best Practice.
Authentication and Authorisation for Research and Collaboration Christos Kanellopoulos Open Day Event: Towards the European Open.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
Networks ∙ Services ∙ People Marina Adomeit FIM4R meeting Virtual Organisation Platform as a Service VOPaaS Nov 30, 2015, Austria Task Leader,
Authentication and Authorisation for Research and Collaboration Taipei Taiwan Authentication and Authorisation for Research and.
European Grid Initiative AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
INTRODUCTION TO IDENTITY FEDERATIONS Heather Flanagan, NSRC.
Possibilities for Grouper in a cross/inter organizational use Andrea Biancini, Consortium GARR GN3+ F-2-F meeting Stockholm, April.
Networks ∙ Services ∙ People Andrea Biancini #TNC15, Porto, Portugal Implementing Grouper to federate user authorization Federated Authorization.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI-InSPIRE PY5 new activities Peter Solagna – EGI.eu.
Authentication and Authorisation for Research and Collaboration Peter Solagna, Davide Vaghetti, et al. Topics for PY2 activities.
Networks ∙ Services ∙ People Marina Adomeit TNC16 Conference, Prague Towards a platform for supporting collaboration GÉANT VOPaaS
Authentication and Authorisation for Research and Collaboration Peter Solagna, Nicolas EGI AAI integration experiences AARC Project.
Authentication and Authorisation for Research and Collaboration David Kelsey AARC AHM Utrecht NA3 Task 4 – Scalable Policy Negotiation.
Authentication and Authorisation for Research and Collaboration AARC/CORBEL Workshop for Life Sciences AAI AARC Draft Blueprint.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
Authentication and Authorisation for Research and Collaboration Licia Florio IGTF Meeting The AARC Project Amsterdam, 8 September.
ELIXIR AAI Michal Procházka, Mikael Linden, EGI VC 15 March 2016.
Access Policy - Federation March 23, 2016
Introduction to AAI Services
WLCG Update Hannah Short, CERN Computer Security.
Cross-sector and user-centric AAI
EGI Updates Check-in Matthew Viljoen – EGI Foundation
AARC Update What’s been happening in AARC which matters for GÉANT
User Community Driven Development in Trust and Identity
eduTEAMS platform for collaboration Niels Van Dijk
eduTEAMS – Current status & Future Plans
Identity Federations - Overview
Check-in Nicolas Liampotis
EGI-Engage Engaging the EGI Community towards an Open Science Commons
The AARC Project Licia Florio (GÉANT) Christos Kanellopoulos (GRNET)
The AARC Project Licia Florio AARC Coordinator GÉANT
Minimal Level of Assurance (LoA)
GÉANT project update eduTEAMS - AAI as a Service for Collaborative organisations Introduction Status Pilots New Features – input requested InAcademia –
The New Virtual Organization Membership Service (VOMS)
Policy and Best Practice … in practice
Updated (VO) Community Security Policies
Update - Security Policies
AARC Blueprint Architecture and Pilots
AARC2 JRA1 Update Nicolas Liampotis
AAI Architectures – current and future
Community AAI with Check-In
Example Use Case for Attribute Authorities and Token Translation Services - the case for eduGAIN Andrea Biancini.
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
Presentation transcript:

JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini

JRA1.4 Main activities - 1/2 1.AAs for authorisation: ○Compare different existing technologies to implement AAs, for instance: Grouper/COmanage, Perun, Hexxa, VOMS-SAML ○Assess the existing AA in federated environments and identify the missing features in respect with the guidelines for AAs developed within EGI ○Model and identify possible solutions to overtake existing technical limitations 2.Token Translation Services: ○Investigate different existing solutions for TTS, for instance: TCS (to release user certificates after a federated login) and the use of Science Gateways (to broker the access to different services), OpenID-SAML gateway. ○Open the investigation to new schemas used in different contexts (like OAuth2 used in the social world).

JRA1.4 Main activities - 2/2 3.Provide a blueprint architecture document, including: ○Comparison of different technical solutions (with strengths and weaknesses) to integrate different communities in existing federations ○Guidelines about how to manage authorisation leveraging AAs ○Opportunities and critical aspects in using TTS 4.Follow-up and support the PoC and piloting activities to prove designed architectures.

Advancement ●To facilitate the creation of a shared vision we concentrate on creating a common understanding of the architectural elements. ●For this reason two documents has collaboratively been created: o “Information flows for AAs” with the intent to describe the possible flows and high level use cases of user interactions involving Attribute Authorities. o “Terms and definitions” with the intent to describe the main terms and concepts regarding AAI to be shared among all participants.

Next Steps ●Define a TOC for the blueprint document. This document is intended to suppot the goals and objectives of the AARC projects in different ways: o Call objective 3: Overcome technical, organisational and legal obstacles for the implementation of an integrated and interoperable authentication and authorisation infrastructure. o Call objective 4: Enable the interoperability of different AAIs by researching the use of security token translation services and accounting services. ●KPI defined for the activity: Number of models for implementing attribute providers and token translation services. (Target: 3)

Blueprint TOC - Sections 1.Introduction and existing work. This section will define the context of current AAI and will give some general information about the current AAI systems supporting different communities and projects. 2.Proposed concept and architecture. This section will describe the main concept about the attribute management tool subject of this deliverable. 3.Adaptation to existing use-cases. This section will test the solution described in the document and describe how it will simplify existing user interactions. Starting from real use cases, this section will prove the efficacy of the architecture described in regards to user experience. 4.Benefits, problems and conclusions. This section will offer a conclusion showing benefits and problems of the solution proposed. It will also draw some conclusion and eventually identify possible directions for future works.

How to move forward ●Common revision of this TOC ( Comments, suggestions, corrections are REALLY WELCOME! ●Definition of participants and people engaged with the task. ●Parallel work on the different sections of this document.

Major terms agreed – 1/3 ●Identity Federation: A collection of organisations that agree to interoperate under a certain rule, a federation policy, set to authenticate and authorize users. Federations are usually circles of trust in which the different organisations agree to trust the Identity Management of the others belonging to the same federation. ●Virtual Organisation (VO): A Virtual Organisation (VO) describes an organisational entity. This entity represents a group of users that want to collaboratively use resources for a common purpose. Before entering a VO a user may be requested users to sign its “Acceptable use Policy” (AUP). Acceptance of a user to enter the VO, or membership, may be subject to approval based on various criteria.

Major terms agreed – 2/3 ●Identity Provider: An Identity Provider (IdP), also known as Identity Assertion Provider, is responsible for (a) providing identifiers for subjects looking to interact with a system, and (b) asserting to such a system that the identifier presented by a user is known to the provider. ●Attribute Authority: An Attribute Authority (AA) is the party responsible for managing the binding between subjects and attributes. As we have seen before, many IdPs operate as AA after authentication to release information about the logged in user. There are also generic AAs that usually are not operating any authentication but are only providing attributes of the user’s digital identity obtained from a different authenticating IdP.

Major terms agreed – 3/3 ●Attribute Aggregation: Attribute Aggregation is the process that permits a Service Provider to retrieve different attributes from different IdPs or AAs and aggregate them in a consistent way to build a coherent digital identity for the user. In general we can have different models to aggregate the attributes: ○Mesh: in which each service itself contacts relevant IdPs and AAs and collects attributes for the user. ○Proxy: in which a single entity, a proxy, collects attributes at relevant sources on behalf of the services, and then passes the combined set towards the actual service. ○Mesh with proxies: in this case the aggregation happens in a meshed way but some of the entities (either IdPs or SPs) operates as proxies.