Image © Viatour Luc (http://www.lucnix.be) Project Moonshot TNC 2010 Vilnius, 1 June 2010 Josh Howlett, JANET(UK)

Slides:



Advertisements
Similar presentations
ABFAB for Internet-of-Things Rhys Smith, Janet Sam Hartman & Margaret Wasserman, Painless Security.
Advertisements

Federated Access to Grids Daniel Kouřil, Sam Hartman, Josh Hewlet, Jens Jensen, Michal Procházka EGI User Forum 2011.
Project Moonshot February Background Project Moonshot 2.
Trust Router. Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any.
Moonshot for Federated Identity Jens Jensen, STFC Daniel Kouřil, CESNET EGI CF, April 2013.
Project Moonshot update TF-EMC2 & TF-MNM 14 & 16 February 2011.
Hannes Tschofenig, Blaine Cook (IETF#79, Beijing).
© Janet 2012 Project Moonshot Technology, use cases & pilot 17 January, 2012 Haka conference, Helsinki 1.
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
TF-EMC2 February 2006, Zagreb Deploying Authorization Mechanisms for Federated Services in the EDUROAM Architecture (DAME) -Technical Project Proposal-
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
Project Moonshot TF-MNM. Use cases Project Moonshot 2.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
To identity federation and beyond! Josh Howlett JANET(UK) HEAnet 2008.
(From Radius Hierarchy to AAI) Miroslav Milinović University Computing Centre - Srce EuroCAMP Ljubljana, March 2006.
SAML Right Here, Right Now Hal Lockhart September 25, 2012.
Michal Procházka, Jan Oppolzer CESNET.
Federated Identity Management for HEP David Kelsey WLCG GDB 9 May 2012.
Introduction Moonshot workshop
Project Moonshot update ABFAB, IETF 80. About Moonshot Moonshot is implementing ABFAB Developer meeting, 24 March 2011 Testing event, 25 March 2011 A.
Connect. Communicate. Collaborate Place organisation and project logos in this area Usage of SAML in eduGAIN Stefan Winter, RESTENA Foundation TERENA Networking.
Connect. Communicate. Collaborate Federation Interoperability Made Possible By Design: eduGAIN Diego R. Lopez (RedIRIS)
Shibboleth Update Fall Ch-ch-changes Chad moving on to new job opportunity, requires realigning product responsibilities and reviewing roadmap Tom.
Technical Break-out group What are the biggest issues form past projects – need for education about standards and technologies to get everyone on the same.
Draft-ietf-abfab-aaa-saml Josh Howlett IETF 90. Remaining issues (recap from IETF 89) SAML naming of AAA entities The focus of this presentation Alejandro.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Test your IdP
Authentication and Authorisation for Research and Collaboration Licia Florio AARC Workshop The AARC Project Brussels, 26 October.
Innovation through participation eduGAIN policy: A worm report TF-EMC2 Vienna Mikael Linden, CSC The worm farmer.
Authentication and Authorisation for Research and Collaboration Michał Jankowski, Maciej Brzeźniak AARC General Meeting, Milan.
Connect. Communicate. Collaborate Universität Stuttgart A Client Middleware for Token- Based Unified Single Sign On to eduGAIN Sascha Neinert, University.
Identity Management in DEISA/PRACE Vincent RIBAILLIER, Federated Identity Workshop, CERN, June 9 th, 2011.
Federated Identity Management for HEP David Kelsey HEPiX, IHEP Beijing 18 Oct 2012.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Authentication and Authorisation in eduroam Klaas Wierenga, AA Workshop TNC Lyngby, 20th May 2007.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Requirements and Selection Process for RADIUS Crypto-Agility December 5, 2007 David B. Nelson IETF 70 Vancouver, BC.
Introduction & use-cases FedAuth IETF78 Maastricht, July 27, 2010
Networks ∙ Services ∙ People Thomas Bärecke Journée Fédération, Paris Collaboration européenne GÉANT SA5 03/07/2015 SA5 T5 team
IETF 78 Maastricht 27 July 2010 Josh Howlett, JANET(UK)
Connect communicate collaborate Trust & Identity EC meets GÉANT 19 June 2014 Brussels Valter Nordh, NORDUnet Federation as a Service Task Leader Trust.
Federated Wireless Network Authentication Kevin Miller Duke University Internet2 Joint Techs Salt Lake City February, 2005.
1 SAIC XMSF Update XMSF Workshop & MOVES Open House 4-5 August 2003 Katherine L. Morse, Ph.D., David L. Drake, Ryan.
Trust Router Overview IETF 86, Orlando, FL Routing Area Meeting Margaret Wasserman
Authentication and Authorisation for Research and Collaboration Licia Florio REFEDS Meeting AARC and AARC2 Vienna, 1 st December.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
INDIGO – DataCloud WP5 introduction INFN-Bari CYFRONET RIA
Networks ∙ Services ∙ People Andrea Biancini #TNC15, Porto, Portugal Implementing Grouper to federate user authorization Federated Authorization.
Project Moonshot Daniel Kouřil EGI Technical Forum
Networks ∙ Services ∙ People Licia Florio TNC, Lisbon Consuming identities across e- Infrastructures 16 June 2015 PDO GÈANT.
Jisc/Janet AIM Update Dr Rhys Smith May Agenda Where we are And where we’re going.
Non Web-based Identity Federations - Moonshot Daniel Kouril, Michal Prochazka, Marcel Poul ISGC 2015.
The Umbrella Project Authentication The minimum user information possible is stored centrally to avoid Data Protection issues. The Authentication is done.
CLASSe PROJECT: IMPROVING SSO IN THE CLOUD Alejandro Pérez Rafael Marín Gabriel López
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
Copyright © 2009 Trusted Computing Group An Introduction to Federated TNC Josh Howlett, JANET(UK) 11 June, 2009.
Federated Access to Storage EGI CF 2012 Luke Howard, Daniel Kouril, Michal Prochazka.
Géant-TrustBroker Dynamic inter-federation identity management Daniela Pöhn TNC2014 Dublin, Ireland May 19 th, 2014.
Federation made simple
SAML New Features and Standardization Status
HMA Identity Management Status
European AFS & Kerberos Conference 2010
Multi-Domain User Applications Research (JRA3)
The Anatomy and The Physiology of the Grid
The Anatomy and The Physiology of the Grid
eIDAS-enabled Student Mobility
Presentation transcript:

Image © Viatour Luc ( Project Moonshot TNC 2010 Vilnius, 1 June 2010 Josh Howlett, JANET(UK)

Contents Why Project Moonshot? Technical Architecture & Specifications Deliverables and plans Partners & Contributors Get involved!

Background “The Identity Messy-system" (TNC 2008) TERENA TF-EMC2 Beyond Web SSO work item JANET(UK) use-case categories 1.Beyond Web SSO - to extend the scope of federated identity to many more services. 2.Scalable Trust - to manage trust for “many more services”.

Goals To deliver – a standardised technical architecture. – production-quality open-source implementation. – packaged and shipped with Debian Linux. – a test-bed for interoperability testing. – high quality documentation. – an active community of users and developers. Enabling – implementation on all commonly used computing platforms. – and use by deployers and users. Highly ambitious but achievable.

Non-Web SSO Use-Cases 1)Support federated authentication to out- sourcing providers. 2) High Performance Computing Address HPC community requirements (Business Continuity & HPC-as-a-service) Federated SSH, NFS, CIFS

Learning from Web SSO In creating federated authentication for new applications, avoid problems discovered with web SSO today - and fix it for web SSO. Identity Provider discovery User presented with hundreds of possible identity providers; inter-federation (e.g. eduGAIN) will likely increase this to thousands quite soon. Multiple affiliations Sometimes difficult to choose the correct identity for a given service.

Proposed benefits Users – Sign-on using one or more identities to desktop applications that support the technology. – Ability to easily select an identity, addressing the "discovery" and "multiple affiliation“ problems.

Proposed benefits Institutions – Increases the ROI made in federated identity services, by expanding its use to a greater range of applications. – Mitigates the effort required to support different authentication technologies and credentials for different services.

Proposed benefits Service Providers – Introduces the benefits of SAML-based federated identity to new types of services. – Addresses some of the issues associated with the conventional Web SSO profiles, including the "discovery" problem. – The technology, when used with a web browser, could co-exist with conventional Web SSO profiles, enabling a smooth transition.

Proposed benefits Federation operators – Permits the use of role descriptors in SAML metadata that do not include keys or credentials of any kind, or references to these. – Permits the use of unsigned SAML metadata while providing a means to demonstrate trustworthiness, including real-time revocation. – Permits the use of any kind of metadata distribution mechanism; this does not need to be trusted.

Proposed benefits SAML implementations – A single SAML-based SSO profile for any application supporting GSS or SASL. – SAML entities can use almost any type of credential to authenticate itself; communicating SAML implementations do not need to understand each others credential types. – Credential and key management can be delegated entirely outside of the SAML implementation.

Vision Users have a single interface to manage the use of their credentials and identities for both networks and applications. Developers have access to a standard API for consuming federated identity. Standards developers can more easily design protocols that use federated identity, without becoming experts on federated identity.

EAP lower layer (e.g ) EAP peer (Supplicant) EAP authen ticator EAP lower layer (e.g ) AAA client AAA server EAP server ClientService ProviderIdentity Provider Moonshot architecture GSS-API Application (e.g. SFTP) GSS-API Application (e.g. SFTP) SAML IdP OpenSEA supplicant GSS library Applications GSS library FreeRADIUS Shibboleth IdP By analogy with eduroam

Specifications IETF – “A RADIUS attribute for SAML constructs” – “A GSS-API Mechanism for the Extensible Authentication Protocol” – “Key Negotiation Protocol” Work in progress

Specifications OASIS – “SAML V2.0 AAA Binding” saml-binding-aaa-draft-00.pdf – “SAML V2.0 EAP GSS SSO Profile” saml-eapgss-sso-draft-00.pdf – “Metadata Trust Management Profile” Work in progress

“This looks complex” It’s equivalent to eduroam or any Enterprise WiFi implementation. The new SAML binding and SSO profile are at least as simple as the conventional SAML V2.0 bindings and SSO profiles. It looks complex because it’s an unusual composition of technologies.

“It requires too many changes” Most of the changes are small. Most of the changes are desirable independent of Moonshot. Most applications that support GSS-API or SASL today can be modified to support Moonshot at little effort.

What have we achieved so far? Phases 1-3 (January 2010  April 2010) – Feasibility Analysis – Draft specifications for all core technologies – Bar IETF 77 Phase 4 (April  June) – Draft project plan See – IETF Working Group charter

What’s next? Phase 5 (June 2010  August 2010) – IETF 78 BoF preparation – Updates to draft specifications. – Complete project plan. Phase 6 (August 2010  July 2011) – Advance specifications through IETF and OASIS. – Perform implementation work. – Implement test-bed demonstrating use-cases.

Final deliverables Advanced set of draft specifications documenting the complete architecture. Production quality code. Packaged and shipping in Debian Linux. Test-bed for interoperability testing. High quality documentation.

Who’s participating? JANET(UK) (~1.5 FTE) – Project management: Josh Howlett and Henry Hughes – Technical architecture: Josh Howlett and Sam Hartman – Software architecture: Sam Hartman – FreeRADIUS & Shibboleth modifications, and GSS library implementation: Consultants – Testing and documentation: Rhys Smith (Cardiff)

Who’s participating? GÉANT (2-3 FTE) – Apache GSS implementation: Daniel Kouril and Michal Prochazka (CESNET/Masaryk University) – Firefox GSS implementation: Daniel Kouril and Michal Prochazka (CESNET/Masaryk University) – GSS consultancy: Simon Wilkinson (JANET/Edinburgh) – RadSec library implementation: Linus Nordberg (NORDUNET) – Test-bed implementation: Miroslav Milinovic (CARNET/SRCE) – Specification review: Stefan Winter (RESTENA)

Other important relevant work GSS Naming Extensions: Leif Johannson (NORDUNET) “RadSec”: Stefan Winter (RESTENA)

How to participate Before December 2010 – Use-cases, use-cases, use-cases. – Specification review. – Join the mailing list. – Get involved in the proposed IETF Working Group (intended IETF 78 in Maastricht, July) After December 2011 – Moonshoot commonly used applications. – Packaging for other distributions. – Implement local test-beds.

Thank you for your attention! Any questions?