Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.

Slides:



Advertisements
Similar presentations
Step Up Authentication in SAML (and XACML) Hal Lockhart February 6, 2014.
Advertisements

Donkey Project Introduction and ideas around February 21, 2003 Yuri Demchenko.
XML Security Standards — Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Lecture 23 Internet Authentication Applications
Access Control Patterns & Practices with WSO2 Middleware Prabath Siriwardena.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Web Services and the Semantic Web: Open Discussion Session Diana Geangalau Ryan Layfield.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
XACML 2.0 and Earlier Hal Lockhart, Oracle. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
Web Services Security Multimedia Information Engineering Lab. Yoon-Sik Yoo.
Applied Cryptography Week 13 SAML Applied Cryptography SAML and XACML Mike McCarthy Week 13.
CS 522 WebServices -Sujeeth Narayan -Ankur Patwa.
Web services security I
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
Prabath Siriwardena Senior Software Architect. An open source Identity & Entitlement management server.
Combining KMIP and XACML. What is XACML? XML language for access control Coarse or fine-grained Extremely powerful evaluation logic Ability to use any.
XACML Gyanasekaran Radhakrishnan. Raviteja Kadiyam.
XACML 2.0 in the Enterprise: Use- Cases and Deployment Challenges Prateek Mishra, Frank Villavicencio, Rich Levinson Oracle Identity Management Group 02/07/2006.
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
XACML Briefing for PMRM TC Hal Lockhart July 8, 2014.
Global Federated Identity & Privilege Management GFIPM John Ruegg, Director LA County ISAB United States Department of Justice.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Service Standards, Security & Management Chris Peiris
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
EuroPKI 2008 Manuel Sánchez Óscar Cánovas Gabriel López Antonio F. Gómez Skarmeta University of Murcia Levels of Assurance and Reauthentication in Federated.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Saml-intro-dec051 Security Assertion Markup Language A Brief Introduction to SAML Tom Scavo NCSA.
Authorization Infrastructure, a Standards View Hal Lockhart OASIS.
SAML, XACML & the Terrorism Information Sharing Environment “Interoperable Trust Networks” XML Community of Practice February 16, 2005 Martin Smith Program.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
SAML Right Here, Right Now Hal Lockhart September 25, 2012.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
SAML CCOW Work Item HL7 Working Group Meeting San Antonio - January 2008 Presented by: David Staggs, JD CISSP VHA Office of Information Standards.
SharePoint Security Fundamentals Introduction to Claims-based Security Configuring Claims-based Security Development Opportunities.
XACML – The Standard Hal Lockhart, BEA Systems. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
Elisa Bertino Purdue University Pag. 1 Security of Distributed Systems Part II Elisa Bertino CERIAS and CS &ECE Departments Purdue University.
SAML 2.1 Building on Success. Outline n Summary of SAML 2.0 n Work done since 2.0 n Objectives of SAML 2.1 n Proposed Task List n Undecided Issues n Invitation.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
SAML 2.0: Federation Models, Use-Cases and Standards Roadmap
Web Services Standards. Introduction A web service is a type of component that is available on the web and can be incorporated in applications or used.
17 March 2008 © 2008 The University of Edinburgh, European Microsoft Innovation Center and University of Southampton IT Innovation Centre 1 NextGRID Security.
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
SAML: An XML Framework for Exchanging Authentication and Authorization Information + SPML, XCBF Prateek Mishra August 2002.
Secure Systems Research Group - FAU Patterns for Web Services Security Standards Presented by Keiko Hashizume.
W3C Web Services Architecture Security Discussion Kick-Off Abbie Barbir, Ph.D. Nortel Networks.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security Token Service Valéry Tschopp - SWITCH.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
OASIS XACML Update Hal Lockhart Office of the CTO BEA Systems
11 Restricting key use with XACML* for access control * Zack’-a-mul.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
Web Services Security Standards Dr. Phillip M. Hallam-Baker C.Eng. FBCS VeriSign Inc.
XACML Contributions Hal Lockhart, Oracle Corp. 2 Topics Authorization API Finding Input Attributes.
OGSA Attributes: Requirements, Definitions, and SAML Profile Abstract This document specifies elements and vocabulary for expressing attribute assertions.
SAML 2.0 and Related Work in XACML and WS-Security Hal Lockhart BEA Systems.
Workshop on Security for Web Services. Amsterdam, April 2010 Applying SAML to Identity Data Exchange.
Security Assertion Markup Language, v2.0 Chad La Joie Georgetown University / Internet2.
Eclipse Foundation, Inc. Eclipse Open Healthcare Framework v1.0 Interoperability Terminology HL7 v2 / v3 DICOM Archetypes Health Records Capture Storage.
Access Policy - Federation March 23, 2016
SAML New Features and Standardization Status
XACML and the Cloud.
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Presentation transcript:

Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle

Agenda Security and privacy for the Smart Grid Key management standards for the Smart Grid Authentication and authorization standards for the Smart Grid

OASIS Standards to be Described SAML: Security Assertion Markup Language – A framework for the exchange of security-related information between trusting parties – The key standard for federated identity systems – Widely used today for cross-domain single sign-on XACML: eXtensible Access Control Markup Language – Language for expressing Access Control Policies – Also defines Network Req/Resp Protocol for Access decisions – Technology and domain-specific profiles SAML 2.0 & XACML 2.0 are also ITU-T Recommendations

SAML assertions Assertions are declarations of fact, according to a trusted party XML Format SAML defines assertions about: – Authentication – Attribute – Authorization decision SAML can be extended to express other types of facts Assertions can be digitally signed and/or encrypted All SAML assertions have the same header info

SAML Architectural Entities Identity- relying entities Identity- wielding entities Identity- attesting entities Identity data Identity Provider (IdP) User Service Provider (SP)

SAML components and how they relate to each other Profiles Combinations of assertions, protocols, and bindings to support a defined use case (also attribute profiles) Bindings Mappings of SAML protocols onto standard messaging and communication protocols Protocols Requests and responses for obtaining assertions and doing identity management Assertions Authentication, attribute, and entitlement information Metadata Configuration data for identity and service providers Authentication Context Detailed data on types and strengths of authentication

SAML protocol for getting assertions

SAML Features Multiple Web SSO Profiles Robust identity federation and management Identity provider discovery Basic session management and global logout Fine-grained description of authentication mechanisms Standard Attribute Profiles Metadata for simplified configuration Federation with Privacy protections Name Identifier Update Protocol

SAML in Web Services Security (WSS) Provides protection of SOAP messages SOAP header element Digital signatures and encryption Greater flexibility than SSL/TLS Supports multiple Security Token types – Username/password – Binary: X.509 and Kerberos – XML: SAML with or without keys

Additional SAML Profiles - 1 Metadata Profiles Third-Party Requests Protocol Requesting Authentication Context Shared Credentials Challenge/Response Authentication X.500/LDAP/X.509 Profiles Simplified Digital SIgnatures

Additional SAML Profiles - 2 Identity Provider Discovery Service Protocol Kerberos Profiles XSPA (Healthcare) Profile Delegation Restriction SSL/TLS Profiles Identity Assurance

What is XACML? XML language for access control Coarse or fine-grained Extremely powerful evaluation logic Superset of Permissions, ACLs, RBAC, etc Ability to use any available information Scales from PDA to Internet Federated policy administration

Powerful Policy Expression “Anyone can use web servers with the ‘spare’ property between 12:00 AM and 4:00 AM” “Salespeople can create orders, but if the total cost is greater that $1M, a supervisor must approve” “Anyone view their own 401K information, but nobody else’s” “The print formatting service can access printers and temporary storage on behalf of any user with the print attribute” “The primary physician can have any of her patients’ medical records sent to a specialist in the same practice.”

XACML Benefits Standard Policy Language – Investment protection – Skills reuse Leverage XML tools Policy not in application code – Reduce cost of changes – Consistent application – Enable audit

XACML Architecture PDP Decision Application Administration Policy Repository PEP Enforcement Client Authorities Attribute Repositories PDP

XACML Current Status XACML 2.0 OASIS Standard – Feb 2005 XACML 3.0 In progress – Core & base profiles currently in 2nd Public Review Administration/delegation {New} Hierarchical resource {Enhanced} Multiple resource {Enhanced} SAML {Enhanced} Digital Signature Privacy RBAC – Additional profiles under development XSPA, Obligation families, Export Compliance, Policy Distribution, Metadata, WS-XACML OGC GeoXACML Standard Profiles and Extends XACML

OpenAZ Open Source Project AzAPI – API for requesting access decisions – Not specified by XACML Standard – Multiple languages (Java & C++ so far) – Enable full power of XACML Attribute Manifest Format (AMF) – Specifies attributes needed for access decision – Additional attribute type information for tools Goal is to provide ready to use code examples

Authorization API Benefits Needed for call to local PDP – Local PDP required for low latency calls – Inefficient to serialize data to and from XML – XML form not required by the standard Also useful to have standard API for remote requests – Common code to build message API can be used over legacy authorization schemes – JAAC, proprietary, etc. – Facilitates deployment: Application 1 st or Infrastructure 1st

The Input Attributes Problem XACML Policies operate on data provided Only PDP sees/evaluates policies What attributes should be provided? Where can attributes be obtained from? How can the proper instance value be obtained?

Attribute Manifest File File in XML format identifies attributes to be added to Request Context Name of Attribute, Issuer, datatype, location, access method, other attribute to use as key Not all fields may be present Three usecases: – PDP advertizes required attributes – PIPs are configured to add attributes to Request Context – Policy authoring tools use attribute name & format

For More Information OASIS Security Services Technical Committee – OASIS XACML Technical Committee – OpenAZ Open Source Project – age#OpenAz

Questions? Hal