Download presentation
Presentation is loading. Please wait.
Published byMeghan York Modified over 9 years ago
1
Hao Wang Computer Sciences Department University of Wisconsin-Madison hbwang@cs.wisc.edu http://www.cs.wisc.edu/condor Authentication and Authorization in Condor
2
www.cs.wisc.edu/condor Outline › General Requirements › Issues › Our Design › Current Status › Plans and Issues
3
www.cs.wisc.edu/condor General Requirements › Why do we need security? A question of trust › We need security in a distributed environment Control resources usage Privacy reason And much more
4
www.cs.wisc.edu/condor General Requirements › Secure channel We want to have a secure way to communicate Send commands, messages or data securely Secure channel should provide Privacy – no one can eavesdrop on the channel Integrity – no one can tamper with the communication Authenticity – who am I talking to and how can I make sure it’s true
5
www.cs.wisc.edu/condor General Requirements › Authentication – who are you? Provide a positive identification Mutual authentication is often required › Credentials Forms of identification Normally a product of a successful authentication
6
www.cs.wisc.edu/condor General Requirements › Authorization I know who you are, but what can you do? Map a user to a set of rights Many different ways to setup the mapping e.g. Host based, role based › Data Integrity Make sure that the data is not tampered › Data Security
7
www.cs.wisc.edu/condor Issues › Different authentication protocols Normally incompatible with each other Different strength › Non-interactive authentication User may not be present when authentication is required › How to deal with credentials Credentials can expire How to store them
8
www.cs.wisc.edu/condor Our Design › Authentication Support multiple protocols Independent of actual protocol used Use API to provide consistency and hide complexity of the protocols › Authorization User based access control policy Separation of policy from mechanism
9
www.cs.wisc.edu/condor Our Design KerberosNTSSPIX.509..... Condor Daemons Authentication API (partial) authenticate forward_credential receive_credential is_valid remove_credential update_credential.....
10
www.cs.wisc.edu/condor Authentication in Action A Condor User Condor Scheduling Agent Connect User initiate the action
11
www.cs.wisc.edu/condor Authentication in Action A Condor User Condor Scheduling Agent Connect Authenticate yourself Server requires authentication
12
www.cs.wisc.edu/condor Authentication in Action A Condor User Condor Scheduling Agent Connect Authenticate yourself Handshake User provides a list of supported protocols Server decides which ones to use and in what order
13
www.cs.wisc.edu/condor Authentication in Action A Condor User Condor Scheduling Agent Connect Authenticate yourself Handshake Authentication(s) One or more authentication might be required
14
www.cs.wisc.edu/condor Current Status › Authentication API is already in place One API for authentication –Mechanism independent One API for credential management –Mechanism independent –Dealing with issues such as expiration, forwarding, proxies
15
www.cs.wisc.edu/condor Current Status › Authentication (cont.) Protocols already supported: NTSSPI, Claimtobe, Filesystem X.509 and Kerberos support is coming soon Supports mutual authentication Supports encryption Supports proxy/delegation Use GSS-API for X.509
16
www.cs.wisc.edu/condor Current Status › Authorization Defining access control policy Defined in Condor’s configuration file Currently host based HOSTALLOW_ADMIN = beak.cs.wisc.edu HOSTDENY_READ = *.wisc.edu HOSTALLOW_WRITE = *.cs.wisc.edu Will be user based soon ALLOW_ADMIN = alice@cs.wisc.edu DENY_READ = charlie@somewhere.net
17
www.cs.wisc.edu/condor Current Status › Data Encryption Using X.509 and Kerberos’ built-in support for now › Data Integrity Still an open issue
18
www.cs.wisc.edu/condor Plans and Issues › Authorization Look at software and tools for enforcing security policies Keynote, SPKI › Role Based Access Control Dealing with Access Control based on Roles, not users More structural
19
www.cs.wisc.edu/condor Plans and Issues › Data Security Would like it to be independent of authentication method Deal with large amount of data (> GB) Use private key based encryption? › Data Integrity Deal with large amount of data (> GB)
20
www.cs.wisc.edu/condor Conclusion › Our goal is: Make Condor a secure environment to work with › Where are we? Worked primarily in authentication and authorization Still much to be done
21
www.cs.wisc.edu/condor That’s it for now! › Questions? › Comments? › Ideas?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.