Presentation is loading. Please wait.

Presentation is loading. Please wait.

GSI: Security On Teragrid A Introduction To Security In Cyberinfrastructure By Dru Sepulveda.

Similar presentations


Presentation on theme: "GSI: Security On Teragrid A Introduction To Security In Cyberinfrastructure By Dru Sepulveda."— Presentation transcript:

1 GSI: Security On Teragrid A Introduction To Security In Cyberinfrastructure By Dru Sepulveda

2 Overview What is Cyberinfrastructure and Grid Computing? What is Cyberinfrastructure and Grid Computing? What is Teragrid? What is Teragrid? Authenticating users and securing credentials Authenticating users and securing credentials GSI-SSH GSI-SSH Grid Proxies Grid Proxies Shibboleth Shibboleth Clemson’s Use of Grid Security Clemson’s Use of Grid Security

3 What is Cyberinfrastructure and Grid Computing? Cyberinfrastructure is a buzz word for grid computing. Cyberinfrastructure is a buzz word for grid computing. Cyberinfrastructure is the coordinated aggregate of software, hardware and other technologies, as well as human expertise, required to support current and future discoveries in science and engineering.Cyberinfrastructure is the coordinated aggregate of software, hardware and other technologies, as well as human expertise, required to support current and future discoveries in science and engineering.

4 The Structure of Cyberinfrastructure

5 What is Teragrid? TeraGrid is an open scientific discovery infrastructure combining leadership class resources at nine partner sites to create an integrated, persistent computational resource. TeraGrid is an open scientific discovery infrastructure combining leadership class resources at nine partner sites to create an integrated, persistent computational resource.

6 What is Teragrid… Really? Services High Performance Computing Visualization Data Storage Accessibility

7 Why Do We Use Security On Teragrid? While Teragrid was designed to be openly used by the scientific community to share information and solve computationally intensive problems using distrubuted resources it must be protected from ignorant or malicious users who might accidentally or intentionally damage or misuse those resources. While Teragrid was designed to be openly used by the scientific community to share information and solve computationally intensive problems using distrubuted resources it must be protected from ignorant or malicious users who might accidentally or intentionally damage or misuse those resources.

8 Authenticating Users and Securing Credentials Users must submit their personal information by US Mail. Users must submit their personal information by US Mail. To speed up the process it helps to have someone on the inside vouch for you. To speed up the process it helps to have someone on the inside vouch for you. All returned credentials are sent via US Mail after they call you to confirm your identity. All returned credentials are sent via US Mail after they call you to confirm your identity.

9 Grid Proxies A short term grid proxy is a certificate made in the X.509 standard from a long term client certificate that was stored on a remote machine called MyProxy when a user account is added to Teragrid. A short term grid proxy is a certificate made in the X.509 standard from a long term client certificate that was stored on a remote machine called MyProxy when a user account is added to Teragrid. This short term credential is stored on the local machine and can been used to access remote machines without a login name and password via GSI-SSH. This short term credential is stored on the local machine and can been used to access remote machines without a login name and password via GSI-SSH.

10 GSI-SSH GSI-SSH is a modded version of OpenSSH that uses a grid credential to authenticate users instead of a user name and password. GSI-SSH stands for Grid Security - Secure Shell and was developed by Globus.

11

12 Shibboleth Shibboleth allows users to make grid credentials from existing credentials such as a user name and password. Shibboleth allows users to make grid credentials from existing credentials such as a user name and password. This credential is a EEC or End Entity Certificate which is the certificate at the end of the authentication chain. This credential is a EEC or End Entity Certificate which is the certificate at the end of the authentication chain.

13 How Clemson is Using Grid Security CPSC881 has set up a small cluster that is running ROCKS a prepackaged Cyberinfrastructure set up on the CentOS platform. CPSC881 has set up a small cluster that is running ROCKS a prepackaged Cyberinfrastructure set up on the CentOS platform. Tomcat with Globus has been set up so that users with a valid credential can use web services over https as long as the name in their grid credential is the same as the one in their.gridmap file that is mapped to a local account. Tomcat with Globus has been set up so that users with a valid credential can use web services over https as long as the name in their grid credential is the same as the one in their.gridmap file that is mapped to a local account.

14 Clemons’s Future With Grid Security Clemson’s future with grid computing is to get a campus wide allocation on Teragrid so that all users can simply use their student login in Grid Shib to get a grid credential for use on the Grid.

15 References http://www.teragrid.org/ http://www.teragrid.org/ http://www.teragrid.org/ http://grid.ncsa.uiuc.edu/myproxy/t gsso.html http://grid.ncsa.uiuc.edu/myproxy/t gsso.html http://grid.ncsa.uiuc.edu/myproxy/t gsso.html http://grid.ncsa.uiuc.edu/myproxy/t gsso.html http://grid.ncsa.uiuc.edu/myproxy/t gsso.html http://grid.ncsa.uiuc.edu/myproxy/t gsso.html http://grid.ncsa.uiuc.edu/myproxy/t gsso.html http://grid.ncsa.uiuc.edu/myproxy/t gsso.html http://en.wikipedia.org/wiki/Cyberinf rastructure http://en.wikipedia.org/wiki/Cyberinf rastructure


Download ppt "GSI: Security On Teragrid A Introduction To Security In Cyberinfrastructure By Dru Sepulveda."

Similar presentations


Ads by Google