INFSO-RI-508833 Enabling Grids for E-sciencE www.eu-egee.org Authorisation and Authentication Dr. Mike Mineter National e-Science Centre, Edinburgh / UK.

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE Practical using EGEE middleware: AA and simple job submission.
Advertisements

The National Grid Service and OGSA-DAI Mike Mineter
Liang ZHAO, PKU EUChinaGrid 3 rd Tutorial Nov.25, 2006 Authentication and Authorization in gLite Liang ZHAO Peking University.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Tutorial Getting started with GILDA.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE Tutorial How to get started.
Grid Security. Typical Grid Scenario Users Resources.
The Community Authorisation Service – CAS Dr Steven Newhouse Technical Director London e-Science Centre Department of Computing, Imperial College London.
INFSO-RI Enabling Grids for E-sciencE Security, Authorisation and Authentication Mike Mineter Training, Outreach and Education National.
Summer School Certificates Diego Romano & Gilda Team.
GLite authentication and authorization Discipline: Grid Computing, 07/08-2 Practical classes Inês Dutra, DCC/FCUP.
\ Grid Security and Authentication1. David Groep Physics Data Processing group Nikhef.
GRID workshop Enabling Grids for E-sciencE iag.iucc.ac.il PKI, Certificates and CAs – Oh My! Hank Nussbacher Israel InterUniversity Computation.
Enabling Grids for E-sciencE Security on gLite middleware Matthieu Reichstadt CNRS/IN2P3 ACGRID School, Hanoi (Vietnam) November 5th, 2007.
INFSO-RI Enabling Grids for E-sciencE Practicals on VOMS and MyProxy Emidio Giorgio INFN Retreat between GILDA and ESR VO, Bratislava,
FP6−2004−Infrastructures−6-SSA E-infrastructure shared between Europe and Latin America Luciano Díaz ICN-UNAM Based on Domenico.
INFSO-RI Enabling Grids for E-sciencE Getting Started Guy Warner NeSC Training Team Induction to Grid Computing and the National.
National Computational Science National Center for Supercomputing Applications National Computational Science NCSA-IPG Collaboration Projects Overview.
INFSO-RI Enabling Grids for E-sciencE Sofia, 22 March 2007 Security, Authentication and Authorisation Mike Mineter Training, Outreach.
E-science grid facility for Europe and Latin America E2GRIS1 Raúl Priego Martínez – CETA-CIEMAT (Spain)‏ Itacuruça (Brazil), 2-15 November.
Security, Authorisation and Authentication.
E-infrastructure shared between Europe and Latin America Security Hands-on Christian Grunfeld, UNLP 8th EELA Tutorial, La Plata, 11/12-12/12,2006.
INFSO-RI Enabling Grids for E-sciencE VOMS architecture Valerio Venturi, Vincenzo Ciaschini INFN First gLite tutorial on GILDA,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Introduction to GILDA and gaining access.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Next steps with EGEE EGEE training community.
June 24-25, 2008 Regional Grid Training, University of Belgrade, Serbia Introduction to gLite gLite Basic Services Antun Balaž SCL, Institute of Physics.
INFSO-RI Enabling Grids for E-sciencE GILDA Practicals : Security systems GILDA Tutors Singapore, 1st South East Asia Forum -- EGEE.
E-infrastructure shared between Europe and Latin America FP6−2004−Infrastructures−6-SSA Hands-on on security Pedro Rausch IF - UFRJ.
INFSO-RI Enabling Grids for E-sciencE Security in gLite Gergely Sipos MTA SZTAKI With thanks for some slides to.
EGEE-II INFSO-RI Enabling Grids for E-sciencE The GILDA training infrastructure.
INFSO-RI Enabling Grids for E-sciencE Installing a gLite VOMS server Joachim Flammer Integration Team, CERN EMBRACE Tutorial, Clermont-Ferrand.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Authorisation, Authentication and Security Guy Warner NeSC Training Team Induction to Grid Computing and the EGEE Project, Vilnius,
EGEE is a project funded by the European Union under contract IST Grid computing Assaf Gottlieb Tel-Aviv University assafgot tau.ac.il
Hands-on security Angelines Alberto Morillas Ciemat.
4th EELA TUTORIAL - USERS AND SYSTEM ADMINISTRATORS E-infrastructure shared between Europe and Latin America Security Hands-on Vanessa.
INFSO-RI Enabling Grids for E-sciencE GILDA and GENIUS Guy Warner NeSC Training Team An induction to EGEE for GOSC and the NGS NeSC,
FP6−2004−Infrastructures−6-SSA E-infrastructure shared between Europe and Latin America Practicals on Security Miguel Cárdenas Montes.
E-infrastructure shared between Europe and Latin America Security Hands-on Alexandre Duarte CERN Fifth EELA Tutorial Santiago, 06/09-07/09,2006.
EGEE-II INFSO-RI Enabling Grids for E-sciencE MyProxy - a brief introduction.
FP6−2004−Infrastructures−6-SSA E-infrastructure shared between Europe and Latin America Moisés Hernández Duarte UNAM FES Cuautitlán.
Security, Authorisation and Authentication Mike Mineter, Guy Warner Training, Outreach and Education National e-Science Centre
INFSO-RI Enabling Grids for E-sciencE Authorisation and Authentication in gLite Mike Mineter National e-Science Centre, Edinburgh.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
INFSO-RI Enabling Grids for E-sciencE Authorisation and Authentication in gLite Mike Mineter National e-Science Centre, Edinburgh.
INFSO-RI Enabling Grids for E-sciencE VOMS & MyProxy interaction Emidio Giorgio INFN NA4 Generic Applications Meeting 10 January.
Enabling Grids for E-sciencE Sofia, 17 March 2009 INFSO-RI Introduction to Grid Computing, EGEE and Bulgarian Grid Initiatives –
EGEE-II INFSO-RI Enabling Grids for E-sciencE Using Certificate & Simple Job Submission Jinny Chien ASGC.
Security in WLCG/EGEE. Security – January Requirements Providers of resources (computers, storages, databases, services..) need risks to.
Hands-on security Carlos Fuentes RedIRIS Madrid,26 – 30 de Octubre de 2008.
Hands on Security, Authentication and Authorization Virginia Martín-Rubio Pascual RedIRIS/Red.es Curso Grid y e-Ciencia.
EGI-InSPIRE RI Grid Training for Power Users EGI-InSPIRE N G I A E G I S Grid Training for Power Users Institute of Physics Belgrade.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) 马兰馨 IHEP, CAS Hands on gLite Security.
1 Grid Security Jinny Chien Academia Sinica Computing Centre Deployment team.
Enabling Grids for E-sciencE gLite security pratical tutorial Dario Russo INFN Catania Catania,
EGEE-II INFSO-RI Enabling Grids for E-sciencE Overview of gLite, the EGEE middleware Mike Mineter Training Outreach Education National.
INFSO-RI Enabling Grids for E-sciencE GILDA t-Infrastructure Antonio Fuentes Bermejo
EGEE-II INFSO-RI Enabling Grids for E-sciencE Authentication, Authorisation and Security Mike Mineter, National e-Science Centre.
EGEE-II INFSO-RI Enabling Grids for E-sciencE Authentication, Authorisation and Security Emidio Giorgio INFN Catania.
INFSO-RI Enabling Grids for E-sciencE Sofia, 17 March 2009 Security, Authentication and Authorisation Mike Mineter Training, Outreach.
EGEE is a project funded by the European Union under contract IST Job Submission Giuseppe La Rocca EGEE NA4 Generic Applications INFN Catania.
Security, Authorisation and Authentication Mike Mineter,
Security in gLite Gergely Sipos MTA SZTAKI
Authentication, Authorisation and Security
Grid Security.
Practicals on VOMS and MyProxy
Security and getting access to the training infrastructure
Security, Authorisation and Authentication
Grid Security Jinny Chien Academia Sinica Grid Computing.
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
Presentation transcript:

INFSO-RI Enabling Grids for E-sciencE Authorisation and Authentication Dr. Mike Mineter National e-Science Centre, Edinburgh / UK Dr. Rüdiger Berlich, Forschungszentrum Karlsruhe / Germany Brisbane, 2 February 2006 Slides contributed by EGEE Team

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Acknowledgements This presentation includes slides taken from the following talks: –Roberto Barbera at ISSGC05, Vico Equense, July –Richard Sinnott at ISSGC05, Vico Equense, July 2005 –Carl Kesselman, at ISSGC04, Vico Equense, July –David Fergusson at EMBRACE/EGEE Tutorial, Clermont Ferrand, July –Joachim Flammer at EMBRACE Tutorial, Clermont-Ferrand, July 2005 Also information from: –Globus Alliance: GT4 Security: Key concepts –

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Please download this file from the agendamaker page: Go to Follow link to technical site, NA3 (training activity) Choose “events and registration” from menu Select “jump to now” for latest events Select Brisbane event Select transparencies associated with this talk Download talk And return to explore these sites in future! ALL EGEE training talks are (or at least should be!) found here. Material can be re-used – please tell us. There is a searchable archive – from NA3 page ( go to “training material”.

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Outline Delegation: building distributed systems dynamically Why Authorisation and Authentication (AA) are the basis of grids Authentication: “AuthN” –“Who are you? Are you who you claim to be?” Authorisation: “AuthZ” –“What are you allowed to do?” MyProxy: management of certificates

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Requirements for AuthN and AuthZ Support multiple VOs across –Administrative domains –National borders –Via Internet Single sign-on –Multiple services –Delegation Scalability: –N,000 users –M,000 CPUs –Without M*N million usernames / passwords… Security INTERNET

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Use Delegation to Establish Dynamic Distributed System Compute Center VO Service slide based on presentation given by Carl Kesselman at GGF Summer School 2004

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Trust Grids by definition have no central control, and connect users to resources where neither has prior knowledge of the other Need to establish trust, so  Resource can trust user  User can trust the resource The basis: –CAs sign user and resource (site) certificates –Both users and sites trust Certificate Authorities –So users and providers trust each other …and for international collaboration: –CAs trust each other

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Authentication and X.509 certificates

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January AA and Certificates X 509 Digital certificate is the basis of AA in EGEE Certification Authorities (CAs) –~one per country; each builds network of “Registration Authorities” who issue certificates CAs are mutually recognized – to enable international collaboration – International Grid Trust Federation For Asia-Pacific region CAs: CA issues certificates to –Users: you get a Certificate and use it to access a grid –Sites providing resources Uses Public Key Infrastructure (PKI) –Private key – known only to you –Public key included in your certificate

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Use of PKI - overview Basis for authentication, integrity, confidentiality, non-repudiation Certificate: held in two parts –Public key + principal information + CA signature –Private key: only the owner (should) use this Asymmetric encryption Digital signatures –A hash derived from the message and encrypted with the signer’s private key –Signature is checked by decrypting with the signer’s public key –Public key is trusted only because it is signed by a trusted third party (Certification Authority)  A CA certifies that a key belongs to a given principal Encrypted text Private Key Public Key Clear text message

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January X.509 Certificates An X.509 Certificate contains: –owner’s public key; –identity of the owner; –info on the CA; –time of validity; –Serial number; –digital signature of the CA Public key Subject:C=CH, O=CERN, OU=GRID, CN=Andrea Sciaba 8968 Issuer: C=CH, O=CERN, OU=GRID, CN=CERN CA Expiration date: Aug 26 08:08: GMT Serial number: 625 (0x271) CA Digital signature Structure of a X.509 certificate

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Certificate Validity The public key from the CA certificate can then be used to verify the certificate. Name Issuer: CA Public Key Signature =? Name: CA Issuer: CA CA’s Public Key CA’s Signature slide based on presentation given by Carl Kesselman at GGF Summer School 2004 Decrypt CA

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January The Grid Security Infrastructure (GSI) every user/host/service has an X.509 certificate; certificates are signed by trusted (by the local sites) CA’s; every Grid transaction is mutually authenticated: 1. A sends his certificate; 2. B verifies signature in A’s certificate; 3. B sends to A a challenge string; 4. A encrypts the challenge string with his private key; 5. A sends encrypted challenge to B 6. B uses A’s public key to decrypt the challenge. 7. B compares the decrypted string with the original challenge 8. If they match, B verified A’s identity and A can not repudiate it. A B A’s certificate Verify CA signature Random phrase Encrypt with A’ s private key Encrypted phrase Decrypt with A’ s public key Compare with original phrase Based on X.509 PKI: VERY IMPORTANT Private keys Private keys must be stored only: protected in protected placesAND encrypted in encrypted form

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January The Grid Security Infrastructure (GSI) - continued Default: message integrity checking –Not private – a test for tampering. For private communication: –Encrypt all the message (not just hash) - Slower After A and B authenticated each other, for A to send a message to B: A B Generate hash from message Message + Encrypted hash Decrypt with A’ s public key Compare with decrypted hash Encrypt hash with A’ s private key Further encrypt hash with B’ s public key Decrypt with B’ s private key Generate hash from message

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January To use the EGEE grid Get an internationally recognised certificate –From a local RA – you will need to see them personally, bringing passport or other identification Contact the VO manager Accept the VO and the EGEE conditions of use to register with both EGEE and the VO Upload your certificate to a “User Interface” machine We are continuing the practical from this stage We have training certificates on the GILDA testbed

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Using GILDA If you are new to Linux – or if you prefer – work in pairs Logon to glite-tutor.ct.infn.it –Username brisbaneXX where XX is –Password GridBRIXX If you don’t yet have access work with someone who does until lunchtime.

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January The GILDA project (

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January The GILDA Test-bed ( 15 sites in 3 continents ! GILDA is coordinated by Roberto Barbera and colleagues at the University of Catania and INFN.

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Preliminary :.globus directory.globus directory contains your personal public / private keys Pay attention to permissions ! [ glite-tutor ] /home/giorgio > ls -l.globus total 8 -rw-r giorgio users 1613 Oct 4 19:30 usercert.pem -r giorgio users 1914 Oct 4 19:30 userkey.pem

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Verify your certificate openssl x509 -in.globus/usercert.pem –noout -text Certificate: Issuer: C=IT, O=GILDA, CN=GILDA Certification Authority Validity Not Before: Oct 11 14:54: GMT Not After : Oct 31 14:54: GMT Subject: C=IT, O=GILDA, OU=Personal Certificate, L=TENERIFFE, Subject Public Key Info:…. To get information on your certificate, run NOTICE THE ISSUER AND THE SUBJECT

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Grid Security Infrastructure - proxies de facto standard for Grid middleware Based on PKI To support…. –Single sign-on: to a machine on which your certificate is held –Delegation: a service can act on behalf of a person –Mutual authentication: both sides must authenticate to the other ….GSI introduces proxy certificates –Short-lived certificates signed with the user’s certificate or a proxy –Reduces security risk, enables delegation

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Authentication, Authorisation: pre- VOMS Authentication –User certificate signed by CA –Connects to UI by ssh –Downloads certificate –Invokes Proxy server –Single logon – to UI - then Grid Security Infrastructure identifies user to other machines Authorisation –User joins Virtual Organisation –VO negotiates access to Grid nodes and resources –Authorisation tested by CE –gridmapfile maps user to local account UI CA VO mgr Personal/ once VO database Gridmapfiles on CE GSI VO service Daily update LCG

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January “Compute element” “Worker nodes” Local resource management system: Condor / PBS / LSF master Globus gatekeeper Job request Info system Logging gridmapfile I.S. Logging

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Building on AuthN Authorisation… What are you allowed to do? … and how is this controlled?? In EGEE the answer is VOMS Virtual Organisation Management System –“second generation” of VO management

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Evolution of VO management Before VOMS User is authorised as a member of a single VO All VO members have same rights Gridmapfiles are updated by VO management software: map the user’s DN to a local account grid-proxy-init VOMS User can be in multiple VOs –Aggregate rights VO can have groups –Different rights for each  Different groups of experimentalists  … –Nested groups VO has roles –Assigned to specific purposes  E,g. system admin  When assume this role Proxy certificate carries the additional attributes voms-proxy-init VOMS – now in both the production (LCG) and pre-production (gLite) middleware

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Introduction to VOMS VOMS Features –Single login using (proxy-init) only at the beginning of a session  Attaches VOMS attributes to user proxy –Expiration time  The authorization information is only valid for a limited period of the time as the proxy certificate itself –Multiple VO  User may log-in into multiple VOs and create an aggregate proxy certificate, which enables him/her to access resources in any one of them –Backward compatibility  The extra VO related information is in the user’s proxy certificate  User’s proxy certificate can be still used with non VOMS-aware service –Security  All client-server communications are secured and authenticated

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Groups The number of users of a VO can be very high: –E.g. the experiment ATLAS has 2000 members Make VO manageable by organizing users in groups: –VO BIOMED-FRANCE  Group Paris Sorbonne University oGroup Prof. de Gaulle Central University  Group Lyon  Group Marseille Groups can have a hierarchical structure Group membership is added automatically to your proxy when doing a voms-proxy-init

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Groups rights Assign rights to certain members of the groups –using Access Control Lists (ACL) like in a file system  Allow / Deny Create user Delete user Get ACL Set ACL List user Remove ACL –Specifying unit for entry:  The local database administrator  A specific user (not necessarily a member of this VO)  Anyone who has a specific VOMS attribute FQAN  Anyone who presents a certificate issued by a known CA (Including host and service certificates)  Absolutely anyone, even unauthenticated clients

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Roles Roles are specific roles a user has and that distinguishes him from others in his group: –Software manager –Administrator –Manager Difference between roles and groups: –Roles have no hierarchical structure – there is no sub-role –Roles are not used in ‘normal operation’  They are not added to the proxy by default when running voms-proxy-init  But they can be added to the proxy for special purposes when running voms-proxy-init Example: –User Yannick has the following membership  VO=BIOMED-FRANCE, Group=Paris, Role=SoftwareManager –During normal operation the role is not taken into account, e.g. Yannick can work as a normal user –For special things he can obtain the role “Software Manager”

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January gLite VOMS Authz DB is a RDBMS (both MySQL and Oracle are currently supported).

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Try to use the grid without a proxy! hostname.jdl is a simple job description file. –It will be explained this afternoon To see which CEs can run this job we would use the command: glite-job-list-match hostname.jdl Please try this command!!

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January VOMS proxy creation voms-proxy-init --voms gilda Your identity: /C=IT/O=GILDA/OU=Personal Certificate/L=INFN/CN=Emidio Enter GRID pass phrase for this identity: [insert your certificate passphrase] Creating temporary proxy..... PEM PASSPHRASE : BRISBANE Ignore “directory/file missing..vomses” message You could set this up to simplify aggregation of VO rights, for example.

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Try to use the grid with a proxy Retry: glite-job-list-match hostname.jdl The result is a list of the CEs (batch queues) where this job can be run… more later! Creating a proxy certificate is your logon to the grid

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Whats in your proxy?? voms-proxy-info Principal options : --all prints all proxy options --file specifies a different location of proxy file voms-proxy-info --all Compare the proxy’s issuer to that which you saw in your certificate. What’s different?? (The first issuer is that of the proxy. Subsequent issuers are associated with VOMS attributes)

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Verify obtained credentials voms-proxy-info --all subject : /C=IT/O=GILDA/OU=Personal Certificate/L=INFN/CN=Emidio issuer : /C=IT/O=GILDA/OU=Personal Certificate/L=INFN/CN=Emidio identity : /C=IT/O=GILDA/OU=Personal Certificate/L=INFN/CN=Emidio type : proxy strength : 512 bits path : /tmp/x509up_u513 timeleft : 20:59:53 VO : gildav subject : /C=IT/O=GILDA/OU=Personal Certificate/L=INFN/CN=Emidio issuer : /C=IT/O=INFN/OU=Host/L=CNAF/CN=cert-voms- 01.cnaf.infn.it attribute : /gildav/Role=NULL/Capability=NULL timeleft : 20:58:28

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January voms-proxy-init : options Main options -voms  command syntax is :/ /group for group specify (default none)  command syntax is :/ /Role= for Role choice (default none)  Multiple –voms can be set to aggregate rights -valid x:y, create a proxy valid for x hours and y minutes -vomslife x, create a proxy with AC valid for x hours (max 24 h) voms-proxy-init –-voms gildav:/gildav/Role=VO-Admin voms-proxy-init --voms gildav:/gildav/tutors

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January The main commands Create a VOMS proxy: voms-proxy-init Display information: voms-proxy-info Destroy the proxy: voms-proxy-destroy And note: voms-proxy-… -help

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January “MyProxy” You may need: –To interact with a grid from many machines  And you realise that you must NOT, EVER leave your certificate where anyone can find and use it…. Its on a USB drive only. –To use a portal, and delegate to the portal the right to act on your behalf (by logging in to an account that can make a proxy certificate for you) –To run jobs that might last longer than the lifetime of a short-lived proxy Solution: you can store a long-lived proxy in a “MyProxy repository” and derive a proxy certificate when needed.

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Grid authentication with MyProxy UI Local WS MyProxy Server GENIUS Server (UI) voms-proxy-init myproxy-init any grid service myproxy-get-delegation output the Grid execution WEB Browser

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Upload a proxy to MyProxy Server myproxy-init -s grid001.ct.infn.it -s specifies the MyProxy server Use “BRISBANE” as your myproxy pass phrase… Usually it should be different from your passphrase but we’ve already got a lot to remember today!

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January GENIUS portal – a quick practical In a browser go to (When asked: Accept for this session only) Enter your brisbaneXX username and the MyProxy pass phrase (BRISBANE) Select “Set VO/VOMS” and confirm you are acting in the GILDA VO by “set” Choose job service- job submission –single job Enter /home/brisbane01/hostname.jdl Allow the resource broker to choose Submit the job

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January GENIUS Can be tailored to suit a particular VO and its applications Allows Grid jobs to be run from any browser MyProxy enables this by issuing the portal server with a proxy on your behalf Many VOs are not physicists who like to code! –Need to be provided with an easy interface Provided by the University of Catania and NICE

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Has your job run? Choose “single job” then “job queue” If it has completed, retrieve the output file. You can return to this later. After the tutorial you have access to “grid-demo”:

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January MyProxy Consists of a server and a set of client tools that can be used to delegate and retrieve credentials to and from a server. MyProxy Client commands: myproxy-init myproxy-info // myproxy-info -s -d myproxy-destroy myproxy-get-delegation // myproxy-get-delegation -s -d –t -o -a myproxy-change-pass-phrase The myproxy-init command allows you to create and send a delegated proxy to a MyProxy server for later retrieval; in order to launch it you have to assure you’re able to execute the voms-proxy-init command. myproxy-init -s -t -d –n The myproxy-init command stores a user proxy in the repository specified by (the –s option). Default lifetime of proxies retrieved from the repository will be set to (see -t) and no password authorization is permitted when fetching the proxy from the repository (the -n option). The proxy is stored under the same user-name as is your subject in your certificate (-d).

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January Summary The EGEE multi-VO grid is built on –Authentication based on X.509 digital certificates  Issued by CAs that are internationally recognised (enabling international collaboration)  With proxies –Authorisation provided by VOMS  VOMS supports multiple groups, roles within a VO Aggregation of rights by a user who is a member of several VOs MyProxy –Secure storage of long-lived proxy certificates –Delegation so services can create and use a proxy on your behalf

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January User Responsibilities Keep your private key secure. Do not loan your certificate to anyone. Report to your local/regional contact if your certificate has been compromised. Do not launch a proxy for longer than your current task needs. If your certificate or proxy is used by someone other than you, it cannot be proven that it was not you.

Enabling Grids for E-sciencE INFSO-RI Authorisation and Authentication, Brisbane, January References VOMS on EGEE: User Guide available at VOMS Available at Alfieri, Cecchini, Ciaschini, Spataro, dell'Agnello, Fronher, Lorentey, From gridmap-file to VOMS: managing Authorization in a Grid environment Vincenzo Ciaschini, A VOMS Attribute Certificate Profile for Authorization GSI Available at A Security Architecture for Computational Grids. I. Foster, C. Kesselman, G. Tsudik, S. Tuecke. Proc. 5th ACM Conference on Computer and Communications Security Conference, pp , A National-Scale Authentication Infrastructure. R. Butler, D. Engert, I. Foster, C. Kesselman, S. Tuecke, J. Volmer, V. Welch. IEEE Computer, 33(12):60-66, RFC S.Farrell, R.Housley, An internet Attribute Certificate Profile for Authorization, RFC 3281