DataGrid Security Wrapup Linda Cornwall 4 th March 2004.

Slides:



Advertisements
Similar presentations
24-May-01D.P.Kelsey, GridPP WG E: Security1 GridPP Work Group E Security Development David Kelsey CLRC/RAL, UK
Advertisements

DataGrid is a project funded by the European Union CHEP 2003 – March 2003 – Grid-based access control – n° 1 Grid-based access control for Unix environments,
5-Dec-02D.P.Kelsey, GridPP Security1 GridPP Security UK Security Workshop 5-6 Dec 2002, NeSC David Kelsey CLRC/RAL, UK
29 June 2006 GridSite Andrew McNabwww.gridsite.org VOMS and VOs Andrew McNab University of Manchester.
Data Management Expert Panel - WP2. WP2 Overview.
Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
Andrew McNab - Manchester HEP - 2 May 2002 Testbed and Authorisation EU DataGrid Testbed 1 Job Lifecycle Software releases Authorisation at your site Grid/Web.
Middleware technology and software quality issues Andrew McNab Grid Security Research Fellow University of Manchester.
Andrew McNab - EDG Access Control - 14 Jan 2003 EU DataGrid security with GSI and Globus Andrew McNab University of Manchester
The Community Authorisation Service – CAS Dr Steven Newhouse Technical Director London e-Science Centre Department of Computing, Imperial College London.
5-Sep-02D.P.Kelsey, Security Summary, Budapest1 WP6/7 Security Summary Budapest 5 Sep 2002 David Kelsey CLRC/RAL, UK
INFSO-RI Enabling Grids for E-sciencE JRA3 2 nd EU Review Input David Groep NIKHEF.
DGC Paris Community Authorization Service (CAS) and EDG Presentation by the Globus CAS team & Peter Kunszt, WP2.
20 March 2007 VOMS etc Andrew McNabwww.gridsite.org VOMS etc Andrew McNab University of Manchester.
Grid Security in EGEE/LCG ISGC 2005, Taipei, Taiwan 29 April 2005 David Kelsey CCLRC/RAL, UK
30-Jan-03D.P.Kelsey, GridPP Security1 Security GridPP6 30 Jan 2003 Coseners House David Kelsey CLRC/RAL, UK
Authentication Policy David Kelsey CCLRC/RAL 15 April 2004, Dublin
Security Mechanisms The European DataGrid Project Team
EGEE Security Area 13 May 2004 EGEE Security Area Stakeholders JRA3 middleware Architecture What we have for Unix and Java What.
Andrew McNab - GACL - 16 Dec 2003 Grid Access Control Language Andrew McNab, University of Manchester
RomeWorkshop on eInfrastructures 9 December LCG Progress on Policies & Coming Challenges Ian Bird IT Division, CERN LCG and EGEE Rome 9 December.
Andrew McNab - GridPP Security - 24 Feb 2003 GridPP Security Middleware Andrew McNab, University of Manchester
Grid Security work in 2006 Andrew McNab Grid Security Research Fellow University of Manchester.
12-May-03D.P.Kelsey, SCG Online Authentication1 Online Authentication SCG Meeting EDG Barcelona, 12 May 2003 David Kelsey CCLRC/RAL, UK
Ákos FROHNER – DataGrid Security Requirements n° 1 Security Group D7.5 Document and Open Issues
INFSO-RI Enabling Grids for E-sciencE SA1: Cookbook (DSA1.7) Ian Bird CERN 18 January 2006.
9-May-02D.P.Kelsey, Security Plans, GridPP41 Security: Plans 9 May 2002 GridPP4 meeting, Manchester David Kelsey CLRC/RAL, UK
Security Area in GridPP2 4 Mar 2004 Security Area in GridPP2 “Proforma-2 posts” overview Deliverables – Local Access – Local Usage.
EU DataGrid (EDG) & GridPP Authorization and Access Control User VOMS C CA 2. certificate dn, ca, key 1. request 3. certificate 4. VOMS cred: VO, groups,
Security Middleware in GridPP2 5 Feb 2004 Security Middleware in GridPP2 Current Status – GridSite GridPP2 Themes – libgridsite.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
23-Oct-03D.P.Kelsey, LCG Security Update, HEPiX1 LCG Security Update HEPiX-HEPNT, TRIUMF, 23 October 2003 David Kelsey CCLRC/RAL, UK
EDG Security European DataGrid Project Security Coordination Group
Grid Security in a production environment: 4 years of running Andrew McNab University of Manchester.
10-May-01D.P.Kelsey, Security Workshop Summary1 DataGrid Security Workshop 29/30 March 2001 SUMMARY David Kelsey CLRC/RAL, UK
Andrew McNab - Security - 1 July 2003 Security: Authorization, Access Control and Usage Control Andrew McNab, University of Manchester
3-Jul-02D.P.Kelsey, Security1 Security meetings Report to EDG PTB 3 Jul 2002 David Kelsey CLRC/RAL, UK
WP3 Authorization and R-GMA Linda Cornwall WP3 workshop 2-4 April 2003.
30-Sep-03D.P.Kelsey, SCG Summary1 Security Co-ordination Group (WP7 SCG) EDG Heidelberg 30 September 2003 David Kelsey CCLRC/RAL, UK
Oxford University e-Science Centre 1 Managing Access 4 Dec Managing Access to Resources on the Grid 4 December 2002.
User VOMS Java C CA 2. certificate dn, ca, key 1. request 3. certificate 4. VOMS cred: VO, groups, roles, capabilities Authentication Certificate Authorities.
Overview of Privilege Project at Fermilab (compilation of multiple talks and documents written by various authors) Tanya Levshina.
23-Oct-02D.P.Kelsey, Grid Security, HEPiX, FNAL1 LCG/EDG Security - update and plans HEPiX/HEPNT - FNAL 23 Oct 2002 David Kelsey CLRC/RAL, UK
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
Andrew McNabSecurity Middleware, GridPP8, 23 Sept 2003Slide 1 Security Middleware Andrew McNab High Energy Physics University of Manchester.
Glite. Architecture Applications have access both to Higher-level Grid Services and to Foundation Grid Middleware Higher-Level Grid Services are supposed.
Andrew McNab - EDG Access Control - 17 Jun 2003 EU DataGrid and GridPP Authorization and Access Control Andrew McNab, University of Manchester
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Grid Security work in 2004 Andrew McNab Grid Security Research Fellow University of Manchester.
Security Middleware 3 June 2004 Security Middleware Current Status – GridSite deployments – Architecture GridPP2 – Web services.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
Security Middleware Andrew McNab University of Manchester.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
WP3 Security and R-GMA Linda Cornwall. WP3 UserVOMS service authr map pre-proc authr LCAS LCMAPS pre-proc LCAS Coarse-grained e.g. Spitfire WP2 service.
Ákos FROHNER – DataGrid Security n° 1 Security Group TODO
8-Mar-01D.P.Kelsey, Certificates, WP6, Amsterdam1 WP6: Certificates for DataGrid Testbeds David Kelsey CLRC/RAL, UK
12-Jun-03D.P.Kelsey, CA meeting1 CA meeting Minimum Requirements CERN, 12 June 2003 David Kelsey CCLRC/RAL, UK
18-May-04D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Update (Report from the LCG Security Group) Barcelona 18 May 2004 David Kelsey CCLRC/RAL, UK
The GRIDS Center, part of the NSF Middleware Initiative Grid Security Overview presented by Von Welch National Center for Supercomputing.
15-May-03D.P.Kelsey, SCG Summary1 Security Coord Group (SCG) EDG Barcelona, 12 May 2003 David Kelsey CCLRC/RAL, UK
Plans for D7.7 The Security Report on the Final Project Release Linda Cornwall, RAL.
7-May-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security Issues and Planning or Report from the Security Group CERN, 8 May 2003 David Kelsey CCLRC/RAL, UK.
Gridification progress report David Groep, Oscar Koeroo Wim Som de Cerff, Gerben Venekamp Martijn Steenbakkers.
Overview of the New Security Model Akos Frohner (CERN) WP8 Meeting VI DataGRID Conference Barcelone, May 2003.
WP7: Security Coordination Group (SCG)
R-GMA Security Principles and Plans
Update on EDG Security (VOMS)
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
Presentation transcript:

DataGrid Security Wrapup Linda Cornwall 4 th March 2004

DataGrid Security Co-ordination Group No single work-package to tackle Grid security –But WP2 has a security task and team Security Coordination Group (SCG) was formed in late 2001 –Lead by David Kelsey Mandate of SCG (sub-group of WP7) –To produce the Deliverables of WP7 on Security –To help coordinate security activities in WPs 1 to 7 –To liaise with WP6 CA & Authorization groups (and others) –To contribute to the architecture of the EU DataGrid (ATF) SCG has larger scope than originally foreseen –At least one representative per middleware WP –Collaboration with DataTAG and national Grid projects

SCG Achievements - overview Authentication: Certification Authorities (CAs) for EDG and others –WP6 Certificate Authorities Coordination Group DataGrid Security Requirements (D7.5, May 2002) –112 requirements in many areas… –Authentication, Authorization, Auditing, Non-repudiation, Delegation, Confidentiality, Integrity, Network, Manageability, Usability, Interoperability, Scalability, Performance, Robustness –Priority attached – DataGrid Requirements, Aims within EDG, Long Term aims Several joint meetings with WP8, 9 and 10 for VO use cases Security Design (D7.6, March 2003) (Large UK contribution) Final Security Report (D7.7, January 2004) –includes comparison with initial requirements

Summary of the EDG Security design Users are issued with a PKI certificate from their local (country) Certification Authority. Users become a member of one or more `Virtual Organisation’ (VO) Users are issued with authorization credentials by the VOs to which they belong Authorization rules are enforced by the local sites or resources –Various Language dependent tools have been developed

Overview of the EDG Security Components (D7.6) MyProxy user CA certificate: dn, ca, Pkey proxy cert: dn, cert, Pkey, VOMS cred. (short lifetime) TrustManager doit pre-process: parameters-> obj.id + req. op. obj.id -> acl dn,attrs,acl, req.op ->yes/no authz auth WebServices Authz dn,attrs,acl, req.op ->yes/no doit auth authz map dn -> DB role TrustManager LCMAPS dn -> userid, krb ticket GSI LCAS dn,attrs,acl, req.op ->yes/no doit auth authz map GSI doit pre-process: parameters-> obj.id + req. op. GACL: obj.id -> acl dn,attrs,acl, req.op ->yes/no authz auth coarse grained (e.g. Spitfire) coarse grained (e.g. gatekeeper) fine grained (e.g. RMC) fine grained (e.g. SE, /grid) Java proxy cert mod_ssl doit pre-process: parameters-> obj.id + req. op. GACL: obj.id -> acl dn,attrs,acl, req.op ->yes/no authz auth C web fine grained (e.g. GridSite) proxy cert VOMS VOMS cred: VO, group(s), role(s) certificate proxy cert delegation: cert+key (long lifetime) delegation: cert+key (short lifetime) re-newal request

Achievements - Authentication PKI based Certification Authorities (CAs) for EDG and other Grid Projects –DataTAG, CrossGrid, LCG – including a global service for particle physics –Same CAs used by many national projects Tools to carry out Authentication in languages other than `C’ (GSI) –java (edg-java-security trustmanger) –Apache web services (mod_ssl)

Authorization – Early on VO LDAP server was developed to manage VO membership –This produced a grid-mapfile Tool for leasing Pool Accounts to users defined in the grid-mapfile obtained from the VO LDAP server Combination of these allowed users access to resources without a specific account on that particular host. This provides very course grain authorization according to a VO based identity

Authorization VOMS Virtual Organisation Membership Service (VOMS) developed jointly between EDG and DataTAG projects. Allows for the managements of VO membership for both Users and Services and the issuing of Credentials proving –VO membership, Groups, Roles and Capabilities VOMS credentials are in the form of a extension to the GSI proxy –VOMS proxy

`Local’ Authorization Various tools have been developed within EDG to allow access in the local environment. LCAS and LCMAPS for authorization in C/C++ services Java authorization Manager –Coarse grained authorization mapping –Credential extraction and checking to allow fined grained authorization by the service GridSite – Authorization in Web services environment GACL `Grid Access Control Language’ for defining access control based on Grid Credentials

Requirements analysis (EDG 2.1) DataGrid Requirements Success  Mostly satisfied  Not satisfied  FS= fully, PS=partially, NS=not… satisfied “Partially” means not all WPs and/or not all languages No.FSPSNS Authentication Authorization23896 Confidentiality Non-Repudiation33 Usability33 Interoperability321 Other areas15384 Total

Summary of progress Authentication – lots of success! Large amount of progress in Authorization mechanisms –Need to be fully integrated with other middleware Confidentiality – area where we largely failed. –Depended on Authorization integration being complete, and data being stored in encrypted form –More of a problem for e.g. Bio Medical applications than particle physics Interoperability – also largely successful. –Based on GSI –Worked closely with the international community, GGF Some other areas need much more work – security largely turned off in EDG testbed 2.1 –Liable to denial of service attacks Areas like non-repudiation need more attention.

Lessons learned Be careful collecting requirements –In hindsight, the D7.5 requirements were rather ambitious –The expectations of the applications were documented but there was not sufficient analysis of the difficulty of integration Security must be an integral part of all development –from the start Building and maintaining “trust” between projects and continents takes time –Not just about middleware Integration of security into existing systems is complex –When designing middleware `think security’ –Don’t rely on adding it later There must be a dedicated activity dealing with security EGEE planning has already benefited from our experience

Exploitation Authentication –The CA infrastructure will continue –EGEE will manage the EDG PKI in a new EU PMA –LCG driving the requirements for global physics authentication –Grid CAs to be registered in new TERENA CA repository (TACAR) –eInfrastructure and eIRG meetings (Ireland) to consider this topic A general EU Grid PKI infrastructure? –DataGrid people will continue in EGEE and GGF Security Policy issues –DataGrid people already active in defining LCG policy and procedures –Important input to EGEE and eIRG

Exploitation (2) Authorization –EDG components and people will continue in EGEE, LCG and other projects –VOMS is part of LCG-2 The HEP applications need roles and groups –Integration with SlashGrid, ACLs (GACL) and GridSite Joint work with UK GridPP, using VOMS and working with PERMIS team Greater exploitation of the various Authorization tools will possible when they are fully integrated with other middleware –Work in GGF security area groups will continue EDG providing reference implementations in OGSA-AuthZ WS-security, VOMS, LCAS, GridSite, SlashGrid etc XML policy, XACML, VOMS Attribute Certificates, SAML Will continue to drive and track standards Publication of the work is ongoing