Presentation is loading. Please wait.

Presentation is loading. Please wait.

15 May 2015 JA-SIG Winter Conference 2002 Orlando, Florida Michael R Gettes Principal Technologist Georgetown University Michael.

Similar presentations


Presentation on theme: "15 May 2015 JA-SIG Winter Conference 2002 Orlando, Florida Michael R Gettes Principal Technologist Georgetown University Michael."— Presentation transcript:

1 15 May 2015 JA-SIG Winter Conference 2002 Orlando, Florida Michael R Gettes Principal Technologist Georgetown University gettes@georgetown.edu Michael R Gettes Principal Technologist Georgetown University gettes@georgetown.edu National Science Foundation Middleware Initiative (NMI)

2 2 NSF Middleware Initiative Purpose To design, develop, deploy and support a set of reusable, expandable set of middleware functions and services that benefit applications in a networked environment

3 3 NMI Organization GRIDS Center – ISI, NCSA, U Chicago, UCSD & U Wisconsin EDIT Team (Enterprise and Desktop Integration Technologies) –EDUCAUSE, Internet2 & SURA Core NMI Team Grants for R & D Year 1 -- 9 grants Year 2 -- 9 grants

4 4 Experimental Software & research applications Middleware deployment Consensus - disciplines - communities - industries Early Implementations - GRID services, directories, authentication, etc MiddlewareTestbeds - experimental, Beta, scaling & “hardening” Early Adopters Dissemination & Support Research & Education NMI Process

5 5 First Deliverables: NMI Release 1 Software (Globus, Condor, Network Weather Service, KX.509, CPM, Pubcookie) Object Classes (eduPerson, eduOrg, commObject) White Papers (Shibboleth, video directories, etc) Best Practices (Directories, LDAP) Policies (campus certificates, account management) Services (certificate profile registry) www.nsf-middleware.org

6 6 GRIDS Center, Part of the NSF Middleware Initiative One of two NMI teams, the GRIDS Center (Grid Research, Integration, Development & Support) In late 2001, GRIDS created to: Define, develop, deploy, and support an integrated national middleware infrastructure for 21 st Century S&E Create robust, tested, packaged, & documented middleware for S&E, including large NSF projects (e.g., NEES, GriPhyN, TeraGrid) Work with middleware research community to evolve architecture & integrate other components Provide dedicated operations capability for 24x7 support and monitoring of Grid infrastructure

7 7 Elements of Grid Computing Resource sharing as a fundamental pursuit Computers, storage, sensors, networks Sharing is always conditional, based on issues of security, trust, policy, negotiation, payment, etc. Coordinated problem solving Beyond client-server: distributed data analysis, computation, collaboration, etc. Dynamic, multi-institutional “virtual organizations” Community overlays on classic org structures Large or small, static or dynamic

8 8 Grid-Oriented Projects in eScience

9 9 Grid Applications Science portals Help scientists overcome steep learning curves of installing and using new software Distributed computing High-speed workstations and networks as aggregated computational resources Large-scale data analysis Computer-in-the-loop instrumentation Grids permit quasi-real-time analysis of data from telescopes, synchrotrons, and electron microscopes Collaborative work Grids enable collaborative problem formulation, data analysis, and discussion

10 10 The 13.6 TF TeraGrid: Computing at 40 Gb/s 26 24 8 4 HPSS 5 UniTree External Networks Site Resources NCSA/PACI 8 TF 240 TB SDSC 4.1 TF 225 TB CaltechArgonne TeraGrid: NCSA, SDSC, Caltech, Argonne www.teragrid.org

11 11 Size distribution of galaxy clusters? Sloan Digital Sky Survey Analysis Galaxy cluster size distribution Chimera Virtual Data System + iVDGL Data Grid (many CPUs)

12 12 Grids and Industry Grid computing has much in common with major industrial thrusts to decentralize (e.g., B2B, P2P, ASP, etc.) Sharing issues are not adequately addressed by existing technologies Companies like IBM, Platform Computing and Microsoft are now substantively involved with the open-source Grid community (e.g., OGSA, which combines Web services and Grid services)

13 13 NMI-EDIT: Goals Much as at the network layer, create a ubiquitous common, persistent and robust core middleware infrastructure for the R&E community In support of inter-institutional and inter-realm collaborations, provide tools and services (e.g. registries, bridge PKI components, root directories) as required

14 14 A Map of Middleware Land

15 15 NMI-EDIT: Core Middleware Scope Identity and Identifiers – namespaces, identifier crosswalks, real world levels of assurance Authentication – campus technologies and policies, inter-realm interoperability via PKI, Kerberos Directories – enterprise directory services architectures and tools, standard object classes, inter- realm and registry services Authorization – permissions and access controls, delegation, privacy management Integration Activities – common management tools, use of virtual, federated and hierarchical organizations

16 16 NMI-EDIT: Organization Overall technical direction set by MACE Middleware Architecture Committee for Education (MACE) Campus IT architects and representatives from Grids and International Communities Directions set via NSF and NMI management team Internet2 Network Planning and Policy Advisory Council PKI and Directory Technical Advisory Boards Internet2 members

17 17 Sample NMI-EDIT Process (Directories ) MACE-DIR Working Group prioritizes needed materials Subgroups established: revision of basic documents (LDAP Recipe) new best practices in groups and metadirectories standards development for eduPerson 1.5 and eduOrg 1.0 Subgroups work in enhanced IETF approach: scenarios, requirements, architectures, recommended standards stages Working group deliverables announced; input and conference call review/feedback processes start; work groups reconvene as needed Process takes around 4-6 months, depending on product 6-8 people drive the process with 15-50 schools participating

18 18 A Few Year-One NMI-EDIT Milestones Sept 1, 2001 – Grant awarded Oct 2001– eduPerson 1.0 finalized; outreach begins with multiple workshops Jan 2002 – HEBCA tested; first CAMP workshop held Feb 2002 – PKI Lite CP/CPS; e-Gov and Management and Leadership Best Practice Awards April 2002 – Shibboleth alpha ships; NMI testbed selected; NIST/NIH PKI workshop May 2002 – NMI release, with eduPerson 1.5, pubcookie, KX.509, groups and metadirectories, video white papers June 2002 – affiliated directories begins; Base CAMP; testbed kickoff July 2002 – Shibboleth alpha v 2 ships; Advanced CAMP August 2002 – LDAP Analyzer testing begins; Shibboleth pilot-sites selected; Work with content providers begins September 2002 – Grant renewed; supplemental grant awarded for outreach; Shibboleth beta ships October 2002 -- NMI Release 2 (see itemized list; www.nsf-middleware.org)

19 19 NMI-EDIT: Release 1 Deliverables Software KX.509 and KCA, Certificate Profile Maker, Pubcookie Object Classes eduPerson 1.0, eduPerson 1.5, eduOrg 1.0, commObject 1.0 Service Certificate Profile Registry

20 20 NMI-EDIT: Release 1 Deliverables Conventions and Practices Practices in Directory Groups 1.0, LDAP Recipe 2.0 Metadirectory Practices for the Enterprise Directory in Higher Education 1.0 White Papers Shibboleth Architecture v5 Policies Campus Certificate Policy for use at the Higher Education Bridge Certificate Authority (HEBCA) Lightweight Campus Certificate Policy and Practice Statement (PKI-Lite) Sample Campus Account Management Policy

21 21 NMI-EDIT: Release 1 Deliverables Works in Progress Role of Directories in Video-on-Demand Resource Discovery for Videoconferencing Directory Services Architecture for Video and Voice Conferencing over IP (commObject)

22 22 NMI-EDIT: Release 2 New/Revised Deliverables Software Programs and Libraries –OpenSAML 1.0 –Shibboleth 1.0 –Pubcookie 3.0 Directory Schemas –eduPerson –eduOrg

23 23 NMI-EDIT: Release 2 New/Revised Deliverables Conventions and Practices LDAP Recipe Metadirectory Practices for Enterprise Directories Practices in Directory Groups Architectures Inter-domain Data Exchange (Draft) Services LDAP Analyzer

24 24 The pieces fit together… Campus infrastructure Name space, identifiers, directories Enterprise authentication and authorization Inter-realm infrastructure edu object classes Exchange of attributes Inter-realm Upperware Grids Digital libraries Video

25 25 A Campus Directory Architecture metadirectory enterprise directory database departmental directories OS directories (MS, Novell, etc) border directory registries source systems Enterprise applications dir

26 Shibboleth Update middleware.internet2.edu/shibboleth Steven Carmbody, Brown University Project Leader, Shibboleth Michael R. Gettes, Georgetown University

27 27 Target Web Server Origin Site Target Site Browser Authentication Phase First Access - Unauthenticated Authorization Phase Pass content if user is allowed Shibboleth Architecture Concepts - High Level

28 28 Second Access - Authenticated Target Web Server Origin Site Target Site Browser First Access - Unauthenticated Web Login Server Redirect User to Local Web Login Ask to Obtain Entitlements Pass entitlements for authz decision Pass content if user is allowed Authentication Attribute Server Entitlements Auth OK Req Ent Ent Prompt Authentication Phase Authorization Phase Success! Shibboleth Architecture Concepts (detail)

29 29 Shibboleth Architecture

30 30 Shibboleth Components

31 31 Descriptions of services 1.local authn server - assumed part of the campus environment 2.web sso server - typically works with local authn service to provide web single sign-on 3.resource manager proxy, resource manager - may serve as control points for actual web page access 4.attribute authority - assembles/disassembles/validates signed XML objects using attribute repository and policy tables 5.attribute repository - an LDAP directory, or roles database or…. 6.Where are you from service - one possible way to direct external users to their own local authn service 7.attribute mapper - converts user entitlements into local authorization values 8.PDP - policy decision points - decide if user attributes meet authorization requirements 9.SHAR - Shibboleth Attribute Requestor - used by target to request user attributes

32 32 Shibboleth Flows Draft

33 33 Target Web Server Origin Site Target Site Browser Shibboleth Architecture -- Managing Trust TRUST Attribute Server Shib engine

34 34 Personal Privacy Web Login Server provides a pseudononymous identity An Attribute Authority releases Personal Information associated with that pseudnonymous identity to site X based on: Site Defaults –Business Rules User control –myAA Filtered by –Contract provisions My AA Site Defaults Contact Provisions Browser User

35 35 Managing ARPs

36 36 The Liberty Alliance www.project-liberty.org Sun Microsystems, American Express, United Airlines, Nokia, MasterCard, AOL Time Warner, American Airlines, Bank of America, Cisco, France Telecom, Intuit, NTT DoCoMo, Verisign, Schlumberger, Sony … Initiated in September 2001. Protect Privacy, Federated Administration, Interoperability, Standards based but requires new technology, hard problems to solve, a Network Identity Service Funny, doesn’t this stuff sound familiar?

37 Middleware Marketing

38 38 Drivers of Vapor Convergence JA-SIG uPortal Authen OKI/Web Authentication Local Web SSO Pressures We all get Web SSO for Local Authentication and an Enterprise Authorization Framework with an Integrated Portal that will all work inter- institutionally! Shibboleth Inter-Realm AuthZ

39 39 Middleware Inputs & Outputs Grids JA-SIG & uPortalOKIInter-realmcalendaring Shibboleth, eduPerson, Affiliated Dirs, etc. EnterpriseDirectoryEnterpriseAuthenticationLegacySystemsCampus Web SSO futures EnterpriseauthZ LicensedResourcesEmbedded App Security

40 40 www.internet2.edu


Download ppt "15 May 2015 JA-SIG Winter Conference 2002 Orlando, Florida Michael R Gettes Principal Technologist Georgetown University Michael."

Similar presentations


Ads by Google