A Study of Certification Authority Integration Model in a PKI Trust Federation on Distributed Infrastructures for Academic Research Eisaku SAKANE, Takeshi.

Slides:



Advertisements
Similar presentations
Lousy Introduction into SWITCHaai
Advertisements

Introduction of Grid Security
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MyProxy and EGEE Ludek Matyska and Daniel.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
TNC 2008 / Short Lived Credential Service Implementation Based on National AAI Short Lived Credential Service Implementation Based on National AAI Emir.
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
1 WebTrust for Certification Authorities (CAs) Overview October 2011 WebTrust for Certification Authorities (CAs) Overview October 2011 Presentation based.
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
PKI Implementation in the Real World
August 2004 Providing Industry-wide Security and Identity Management Solutions.
Lecture 23 Internet Authentication Applications
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Public Key Infrastructure Ben Sangster February 23, 2006.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
PKI in US Higher Education TAGPMA Meeting, March 2006 Rio De Janeiro, Brazil.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Federation of Campus PKI and Grid PKI for Academic GOC Management Conformable to APGrid PMA National Institute of Informatics, JAPAN Toshiyuki Kataoka,
EuroCAMP Ljubljana, 3-5 March 2006 TERENA Server Certificate Service Towards the large-scale use of affordable popup-free server certificates for the European.
INFSO-RI Enabling Grids for E-sciencE JRA3 2 nd EU Review Input David Groep NIKHEF.
8.
National Institute of Advanced Industrial Science and Technology Auditing, auditing template and experiences on being audited Yoshio Tanaka
NRENs supporting Grids using current Grid technology TERENA NREN-GRID Workshop Amsterdam Milan Sova CESNET.
03 December 2003 Digital Certificate Operation in a Complex Environment Consultation/Stakeholders Meeting 3 December 2003.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
1 USHER Update Fed/ED December 2007 Jim Jokl University of Virginia.
NASA PKI for PKI FORUM Presenters: Paul Ma, NASA-Ames Research Center
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Chapter 3 : Distributed Data Processing Business Data Communications, 4e.
CILogon OSG CA Mine Altunay Jim Basney TAGPMA Meeting Pittsburgh May 27, 2015.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Computing on the Cloud Jason Detchevery March 4 th 2009.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
Configuring Directory Certificate Services Lesson 13.
Proposal for device identification PAR. Scope Unique per-device identifiers (DevID) Method or methods for authenticating that device is bound to that.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Introduction of NAREGI-CA National Institute of Informatics JAPAN Toshiyuki Kataoka, July 19, 2006 APAN Grid-Middleware Workshop, Singapore.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Transboundary Trust Space February 16, 2012 Ensuring trust in information exchange – proposal and approaches from Russia and CIS-states (RCC states) National.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Profile for Portal-based Credential Services (POCS) Yoshio Tanaka International Grid Trust Federation APGrid PMA AIST.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Academia Sinica Grid Computing Certification Authority (ASGCCA)
By Umair Ali. Dec 2004Version 1 -PKI - a security architecture – over the internet. -Provides an increased level of confidence for exchanging information.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Leveraging the InCommon Federation to access the NSF TeraGrid Jim Basney Senior Research Scientist National Center for Supercomputing Applications University.
Creating and Managing Digital Certificates Chapter Eleven.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
The Trusted Network · · · LEFIS PKI · · · 2 nd June, 2006 · Sofia by Leonardo Catalinas · May 2006
APGridPMA Update Eric Yen APGridPMA August, 2014.
Summary of Poznan EUGridPMA32 September EUGridPMA Poznan 2014 meeting – 2 David Groep – Welcome back at PSNC.
18 th EUGridPMA, Dublin / SRCE CA Self Audit SRCE CA Self Audit Emir Imamagić SRCE Croatia.
CAISO Public Key Infrastructure: Supporting Secure ICCP Leslie DeAnda Senior Information Security Analyst, Information Security, CAISO EMS Users Group.
Draft-howlett-abfab-trust-router-ps ABFAB, IETF83 Josh Howlett & Margaret Wasserman.
VPN What, where, who, why when?.
جايگاه گواهی ديجيتالی در ايران
Presentation transcript:

A Study of Certification Authority Integration Model in a PKI Trust Federation on Distributed Infrastructures for Academic Research Eisaku SAKANE, Takeshi NISHIMURA, Kento AIDA National Institute of Informatics, Japan 1 International Symposium on Grids & Clouds March 2016 Academia Sinica, Taipei, Taiwan

Outline Introduction Objects and Issues – Typical CA Architecture Proposals Discussions Related Works Summary 2

Introduction Background – Among certification authorities (CAs) in an academic PKI trust federation, most of academic organizations that operate CA install by themselves the CA equipment in their building. – It is necessary to maintain such CA equipment and to obtain the special operators. – Consequently, the high cost of CA operation weighs heavily on the CA organization. – For research institutes whose essential duties are not the CA operation, the burden on the high cost of CA operation is an earnest problem, and cost reduction with increasing the efficiency of the operation is an important issue. 3

Introduction (cont’d) Guiding question – How about trying for more than one operating organization to reduce cost operations? Importance of the research – We propose a method of increasing the efficiency of CA operations in cooperation between more than one CA operating organization. 4

Premise of the Argument We do not discuss how to build from scratch a CA that covers each research community. – Keep the independence of CA operating organization. We do not discuss the following: – Two CA operating organizations outsource CA to a commercial CA vendor and share the expenses. We discuss how to integrate existing CAs without being forced to a drastic change in order to reduce the cost of the CA operations. – From user’s point of view, CA service procedures for users should be unchanged as possible. – From operator’s point of view, the changes of CA operation procedures should be small if possible. 5

Typical CA Architecture CA architecture in question – Composed of IA and RA servers – IA located in a private network connects only the RA and is a dedicate machine for only signing operations. – RA connected to the public network receives the request from end-entities and conveys it to the IA. 6 Certificate Policy A IA RA End entities, Relying parties HSM

Certificate Policy B IA RA End entities, Relying parties Certificate Policy A IA RA End entities, Relying parties HSM Typical CA Architecture (cont’d)

Basic Idea Interference in certificate policies would be kept down to a minimum if each RA is independently operated as before. – The research community should have the responsibility to vet user identities. – It is difficult for one RA to vet user identities in the other community because RA operations are heavy duties. Issuing operations are the following: – Strictly management of the CA private key – Response to the requests from the RA It would be unnecessary to operate the IA at one’s own expense as long as the IA communicates reliable RAs. The integration of IAs is more better. 8

Certificate Policy B RA(β) End entities, Relying parties Certificate Policy A IA RA End entities, Relying parties HSM How to connect RA with outside IA How connect?

Proposed IA-RA Connections Direct connection – A virtual private network (VPN) connecting between RA(β) and IA. Relaying RA – Secure connection IA-RA-RA(β) on the public network. 10

Certificate Policy A Certificate Policy B Internet IA RA End entities RA(β) End Entities VPN Direct Connecting: VPN 11 HSM

Certificate Policy A Certificate Policy B Internet IA RA End entities RA(β) End Entities 12 Relaying RA HSM

Certificate Policy A IAd RAd Clients Certificate Policy B RAd(β) Clients Relaying RA (cont’d) 13 RAd- compat. Secure connection Sending a request to “IA” as before Receiving the request like “IA” HSM

Discussion on IA-RA connection Direct connecting – Advantages Unchanged I/F to users. Basically no software development. – Disadvantages Some trouble to establish a VPN. Further difficulty in connecting CA components across countries via VPN Relaying RA – Advantages Unchanged I/F to users. No difficulty with network infrastructure. – Disadvantages Software development is needed. Connection depends on the software package. 14

Discussion on AP There are two CA authentication profiles that enable CA to issue long-lived certificates, provided by IGTF: – Classic – MICS (Member Integrated Credential Service) An example of 4 combinations – IA and RA: MICS, RA(β): Classic – RA(β) should change from Classic RA to MICS IdM. – This basically ensure each independence of organization and does not interfere in the policy. – IA needs to go through the formalities for permit it to issue certificates to the RA(β). 15

Related Works RPS (Registration Practice Statement) – Discussed in IGTF – Can be considered as a subordinate document to the CPS – It is suggested that separating RAs from the CA function has benefits that are useful for more efficient trust processing of the overall system. – RPS framework would help the proposed integration model in policy arrangement. ASGC CA as real integrated CA – ASGC CA has foreign RAs such as AU, NZ, VN, PH. 16

Summary We considered an integration model of certificate authorities in a PKI trust federation such IGTF. We proposed two connection types between IA and RA: – Direct connecting using VPN – Relaying RA We would like to implement the proposed relaying RA model to NAREGI-CA software and perform demonstrative evaluation. We would like to consider integration procedures with RPS framework. 17