Overview of the security capabilities of ARC Aleksandr Konstantinov, Weizhong Qiang (presented by Balázs Kónya) NorduGrid collaboration EGEE'09 Conference.

Slides:



Advertisements
Similar presentations
Lousy Introduction into SWITCHaai
Advertisements

Security Design and Solution in ARC1 Weizhong Qiang University of Oslo April 9, 2008.
Shibboleth 2.0 and Beyond Chad La Joie Georgetown University Internet2.
GT 4 Security Goals & Plans Sam Meder
Data Management Expert Panel - WP2. WP2 Overview.
Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
The Anatomy of the Grid: An Integrated View of Grid Architecture Carl Kesselman USC/Information Sciences Institute Ian Foster, Steve Tuecke Argonne National.
EGEE-II INFSO-RI Enabling Grids for E-sciencE The gLite middleware distribution OSG Consortium Meeting Seattle,
MyProxy: A Multi-Purpose Grid Authentication Service
Haga clic para cambiar el estilo de título Haga clic para modificar el estilo de subtítulo del patrón DIRAC Framework A.Casajus and R.Graciani (Universitat.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
11 DICOM Image Communication in Globus-Based Medical Grids Michal Vossberg, Thomas Tolxdorff, Associate Member, IEEE, and Dagmar Krefting Ting-Wei, Chen.
4b.1 Grid Computing Software Components of Globus 4.0 ITCS 4010 Grid Computing, 2005, UNC-Charlotte, B. Wilkinson, slides 4b.
WebFTS as a first WLCG/HEP FIM pilot
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Globus 4 Guy Warner NeSC Training.
Kate Keahey Argonne National Laboratory University of Chicago Globus Toolkit® 4: from common Grid protocols to virtualization.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
Security in Virtual Laboratory System Jan Meizner Supervisor: dr inż. Marian Bubak Consultancy: dr inż. Maciej Malawski Master of Science Thesis.
GT Components. Globus Toolkit A “toolkit” of services and packages for creating the basic grid computing infrastructure Higher level tools added to this.
1 School of Computer, National University of Defense Technology A Profile on the Grid Data Engine (GridDaEn) Xiao Nong
Standards landscape and ARC development plans Péter Stefán KnowARC WP3 + NIIF.
HPDC 2007 / Grid Infrastructure Monitoring System Based on Nagios Grid Infrastructure Monitoring System Based on Nagios E. Imamagic, D. Dobrenic SRCE HPDC.
2005 © SWITCH Perspectives of Integrating AAI with Grid in EGEE-2 Christoph Witzig Amsterdam, October 17, 2005.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
SAML support in VOMS Valerio Venturi EGEE JRA1 AH Meeting, Amsterdam 20/23 February 2008.
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
1 Globus Toolkit Security Rachana Ananthakrishnan Frank Siebenlist Argonne National Laboratory.
Communicating Security Assertions over the GridFTP Control Channel Rajkumar Kettimuthu 1,2, Liu Wantao 3,4, Frank Siebenlist 1,2 and Ian Foster 1,2,3 1.
© 2006 Open Grid Forum Why do we need PGI? The NorduGrid/ARC perspective Aleksandr Konstantinov, Balazs Konya, Weizhong Qiang, on behalf of the NorduGrid.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
Shibboleth: An Introduction
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security Token Service Valéry Tschopp - SWITCH.
June 24-25, 2008 Regional Grid Training, University of Belgrade, Serbia Introduction to gLite gLite Basic Services Antun Balaž SCL, Institute of Physics.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Grid Security: Authentication Most Grids rely on a Public Key Infrastructure system for issuing credentials. Users are issued long term public and private.
Connect. Communicate. Collaborate The authN and authR infrastructure of perfSONAR MDM Ann Arbor, MI, September 2008.
Overview of Privilege Project at Fermilab (compilation of multiple talks and documents written by various authors) Tanya Levshina.
EGEE User Forum Data Management session Development of gLite Web Service Based Security Components for the ATLAS Metadata Interface Thomas Doherty GridPP.
WebFTS File Transfer Web Interface for FTS3 Andrea Manzi On behalf of the FTS team Workshop on Cloud Services for File Synchronisation and Sharing.
PAPI: Simple and Ubiquitous Access to Internet Information Services JISC/CNI Conference - Edinburgh, 27 June 2002.
Glite. Architecture Applications have access both to Higher-level Grid Services and to Foundation Grid Middleware Higher-Level Grid Services are supposed.
Shibboleth & Grid Integration STFC and University of Oxford (and University of Manchester)
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
NG07 summary: Grid state of art, solution, infrastructure, and KnowARC topics Weizhong Qiang November 2, 2007.
EMI is partially funded by the European Commission under Grant Agreement RI Federated Grid Access Using EMI STS Henri Mikkonen Helsinki Institute.
EGI Technical Forum Amsterdam, 16 September 2010 Sylvain Reynaud.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
University of Murcia Gabriel López.  Network authentication in eduroam and SSO token distribution ◦ RADIUS hierarchy ◦ Token based on SAML  Network.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks OpenSAML extension library and API to support.
WSO2 Identity Server 4.0 Fall WSO2 Carbon Enterprise Middleware Platform 2.
Tutorial on Science Gateways, Roma, Catania Science Gateway Framework Motivations, architecture, features Riccardo Rotondo.
EMI is partially funded by the European Commission under Grant Agreement RI Common Authentication Library Daniel Kouril, for the CaNL PT EGI CF.
Kipper – a Grid bridge to Identity Federation Andrey Kiryanov.
ARC’s view on the European (Grid) Middleware Initiative: role, objectives and migration plans Balázs Kónya, Lund University, NorduGrid Collaboration EGEE.
Overview of the New Security Model Akos Frohner (CERN) WP8 Meeting VI DataGRID Conference Barcelone, May 2003.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Introduction Salma Saber Electronic.
Security Area Christoph Witzig (SWITCH) on behalf of John White (HIP)
Argus EMI Authorization Integration
Aleksandr Konstantinov, Weizhong Qiang NorduGrid collaboration
StoRM: a SRM solution for disk based storage systems
Use of Nagios in Central European ROC
HMA Identity Management Status
EMI Interoperability Activities
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
ARC6 retreat, Umeå, 7-9 November 2018
Presentation transcript:

Overview of the security capabilities of ARC Aleksandr Konstantinov, Weizhong Qiang (presented by Balázs Kónya) NorduGrid collaboration EGEE'09 Conference Barcelona, Spain, 22 September 2009

2/24/2016www.nordugrid.org2 Outline The Advanced Resource Connector Security within pre-WS services The new security framework (HED) New security services Separate talk: arcproxy client thanks to Oxana Smirnova for the numerous nice slides

2/24/2016www.nordugrid.org3 ARC Today  Reliable, efficient and easy-to handle open source middleware, in production since 2002  Best suits high-throughput distributed computing  Totally independent, very portable code base  GSI-based  Clear separation of cluster and grid layer –No grid layer on the nodes (unless required by users) –Powerful input/output grid data handling by the front-end Dramatically increases CPU utilization Automatically allows for data caching –ARC frontend: all grid related operations –ARC infosys: efficient, reliable, distributed, dynamic  Resource discovery and brokering encapsulated in the client –No single point of failure, ARC clients act as “agents” –Redundancy, mobility, scalability –Based on a powerful client API, ARCLIB  Clear separation of cluster and grid layer –No grid layer on the nodes (unless required by users) –Powerful input/output grid data handling by the front-end Dramatically increases CPU utilization Automatically allows for data caching –ARC frontend: all grid related operations –ARC infosys: efficient, reliable, distributed, dynamic  Resource discovery and brokering encapsulated in the client –No single point of failure, ARC clients act as “agents” –Redundancy, mobility, scalability –Based on a powerful client API, ARCLIB

2/24/2016www.nordugrid.org4 ARC enabled Applications  Biophysics  Biochemistry  Computational chemistry  Quantum chemistry GAMESS  Molecular dynamics GAUSSIAN, DALTON, MOLDEN  Bioinformatics Taverna BLAST, HMMER eQTL  Language studies  Solid state physics  Computational physics  Mathematical crystallography  Informatics, mathematical logic clause solving  Automatic malware comparison  Medical imaging  Simulation of avalanche dynamics  HEP ATLAS, IceCube, CMS, ALICE, LHCb tested  CO2 sequestration  Other materials sciences Disclaimer: information shown here is incomplete and was collected by Oxana Smirnova in half an hour by asking people around and googling

24/02/2016www.nordugrid.org5 Security within production ARC –Protocols –Authorization –Delegation

24/02/2016www.nordugrid.org6  Uses X.509 for authentication of users  Uses communication protocols which provide data integrity and protection –GridFTP Used for most communications Including communication with Computing Element (job submission!) –HTTPS –Third-party proprietary protocols Data management – RLS, LFC  Unprotected communication –LDAP Used by Information System production ARC - protocols

24/02/2016www.nordugrid.org7  Relatively thin layer integrated into communication stack  Strongly coupled with delegation  Based on information stored in X.509 certificate  Simple hard-coded and configurable authorization rules –DN of X.509 –VOMS attributes –External plugin/executable –LCAS framework  Some services implement own authorization based on internal information –Hard-coded rules –GACL polices production ARC - authorization

24/02/2016www.nordugrid.org8  Full identity delegation - X.509 Proxy Certificates –Used by Computing Element to retrieve and store data on behalf of original user –No additional restrictions put into Proxy Certificates –Delegation performed as part of GSI handshake Embedded into GridFTP protocol –Support for renewal of delegated credentials –Support for MyProxy service (for renewal)‏ production ARC - delegation

2/24/2016www.nordugrid.org9 HED ing towards a better ARC WS interfaces Standard-based interop. Better modularity Extensibility Self-sufficient core components Portability Re-designed security User-friendly Developer-friendly

24/02/2016www.nordugrid.org10  New ARC services and clients are based on modular approach –Message Chain Component (MCC)‏ Protocol layer module –Data Management Component (DMC)‏ Full data protocol(s)‏ –ARC Client Component (ACC)‏ Job submission and control modules –Security Handler Component (SHC)‏ Security related attributes collection and handling Policies and Attributes evaluation WS-Security support Modular approach TCP MCC HTTP MCC TLS MCC X.509DN SAML2 SAML1 Proxy Cert Policy VOMS

24/02/2016www.nordugrid.org11  Every service developed in HED gets generic security infrastructure –Information collected and processed at protocol levels –Authorization decisions based on protocol specific information –Authorization configuration fully depends on deployment  Every service can implement own authorization –Through pluggable modules –Using direct support to ARC policy evaluation library –ARC policy language –Partial XACML Unified security offered by HED

24/02/2016www.nordugrid.org12  Services which implement own authorization –A-REX – BES compliant Grid Computing Element per Grid Job authorization policies –Storage system (multiple services)‏ per stored entity authorization policies Inter-service trust relationship Information filtering (GLUE2 documents over WSRF)‏ Each node in XML document may have policy attached Document is pre-filtered by matching policies to authentication tokens provided by client Unified security offered by HED

2/24/2016www.nordugrid.org13 Fruits of the non-intrusive development A-REX The flagship HED service implementing a Computing Element (CE) JSDL/BES/GLUE2 with ARC extensions Available as part of the 0.8 production ARC release Based on the good- old Grid-Manager Comes with all the production-triggered improvements

2/24/2016www.nordugrid.org14 Fruits of the non-intrusive development Libarcclient (including libarcdata2) and arc* utils Implemented in C++ but comes with Python and JAVA wrappers Modular, plugin-based with powerful existing plugins for pre-WS ARC, gLite, Unicore services, variety of brokering algorithms Backward compatible with previous ARC servers Available on Windows, MAC- OSXGrid

2/24/2016www.nordugrid.org15 Fruits of the non-intrusive development Chelonia distributed storage solution implemented within HED Global namespace Supports collections and sub-collection to any depth Automaatic replication A-Hash: a replicated database to store metadata; Librarian: handles metadata and hierarchy of collections and files the location of replicas health data of the Shepherd services Bartender: high-level interface for the users and for other services Shepherd: manages storage services, and provides a simple interface for storing files on storage nodes Watch online or see the demo live at EGEE09 in Barcelona

2/24/2016www.nordugrid.org16 Fruits of the non-intrusive development ISIS P2P information system backbone stores service registrations WS interface to insert/query registration info a new generation ARC service implemented within HED

24/02/2016www.nordugrid.org17  Security Handler components –Security handlers are modules that are supposed to be embedded/configured into generic services in order to provider different security functionalities. –Available SCHs: –X.509 generic information extraction –VOMS information extraction –WS-Security extraction and insertion X.509 Token Profile Username Token Profile SAML Token Profile (co-operate with an Attribute Authority service, such as VOMS SAML Service)‏ HED security modules

24/02/2016www.nordugrid.org18 HED security modules –Available SCHs (continued) –Local policy evaluation –Remote policy evaluation (call to remote policy decision service)‏ –CHARON (ARC service) –ARGUS to be supported –X.509 proxy certificate policy evaluation –Consumption of SAML assertions (from SAML token, and SAML 2.0 SSO profile)‏

24/02/2016www.nordugrid.org19  Supported policy expressions/languages –Lists of X.509 DNs – gridmap-like –Grid Access Control List (GACL)‏ –Proprietary ARC policy language XML based Similar to XACML with simplification for (relative) user-friendliness –XACML policy language –Obligation is not supported HED security: policies

24/02/2016www.nordugrid.org20 HED: new approach for delegation  Still full identity delegation - X.509 Proxy Certificates –WS Port type for delegating credentials to service Implemented by services which accept delegation –Support for proxy policies According to RFC 3820 policyLanguage = id-ppl-anyLanguage policy = ARC Policy XML document

24/02/2016www.nordugrid.org21  CHARON, ARC authorization service (policy evaluation service) –Accepts policy evaluation request XACML request (XACML context schema)‏ Proprietary ARC request –Interoperation profile SAML 2.0 profile of XACML for XACML policy and request Proprietary ARC profile --- for ARC policy and request –Returns evaluation result –Security handler (embedded in generic services) is supposed to contact Policy decision service New security services: Charon

24/02/2016www.nordugrid.org22 New security services: Fruitfly  FruitFly short-lived credential service (SLCS service)‏ –Accepts Shibboleth tokens –Generates short-lived X.509 credentials –SAML attribute assertion returned from Shibboleth IdP is embedded as certificate extension –The credential then can be used to access services which require X.509 credentials –Related client “arcslcs” that can be used to contact IdP (Shibboleth) and short-lived credential service to acquire X.509 credential The client can/will also be capable to contact other SLCS service (like the gLite SLCS implementation) and the Confusa SLCS service (

24/02/2016www.nordugrid.org23  Delegation service (DS)‏ –Web Service for X.509 credential delegation –Standalone service –Functionality similar to Myproxy – but uses standard communication channel (SOAP)‏ –Acts as intermediate for passing delegated credentials from client to sevice –Corresponding Security Handler Component to (almost) seamlessly Delegate credentials to DS on client side Fetch credentials from DS on service side New security services: DS

24/02/2016www.nordugrid.org24 New security services: ARC-VOMS  ARC-VOMS, an Attribute Authority (AA) service –Act as Attribute Authority to issue SAML attribute assertion –With the same interface as VOMS AA service –Reuse voms database as back-end database –Reuse voms admin service for managing the voms attributes –Configurable to adapt other database schema

24/02/2016www.nordugrid.org25 New security services: ARC-VOMS –Two ways of using AA service SAML token security handler (embedded in generic services) is supposed to contact AA service to acquire SAML Token (assertion); and then SAML Token profile (WS-Security) can be supported. Specific client is supposed to contact AA service to acquire SAML assertion; The assertion can be embedded into proxy certificate.

24/02/2016www.nordugrid.org26 New security services: Shibbridge  Service Provider service (Shibboleth-bridge)‏ –Http layer service –In charge of Service Provider (SP) functionality of SAML 2.0 SSO profile –Act together with client interface (in charge of the functionality of user agent of SAML 2.0 SSO), and Shibboleth IdP (2.0)‏ –SP service shares the same session with other services (one SP service per container)‏ –SSL Client certificate authentication should be switched off –SAML attribute assertion can be used for access control –Benefit: Use community credential (Username/Passwd) as a replacement of X.509 cred.

Read more The new security framework svn.nordugrid.org/trac/nordugrid/browser/arc1/trunk/doc/tech_doc/sec/arc-security- documentation.pdf Soon available at