Authentication and Authorisation for Research and Collaboration Christos Kanellopoulos David Groep 9 th FIM4R Meeting The AARC Project.

Slides:



Advertisements
Similar presentations
Federated Identity Management for Researchers – A quick overview from GÉANT BoF TNC May 2014 Dublin.
Advertisements

Federated Identity Management for Research Communities (FIM4R) David Kelsey (STFC-RAL) EGI TF, AAI workshop 19 Sep 2012.
BoF: Federated Identity Management for Researchers David Kelsey (STFC-RAL) TNC2014, Dublin 20 May 2014.
AARC Overview Licia Florio, David Groep 21 Jan 2015 presented by David Groep, Nikhef.
Federated Identity Management for HEP David Kelsey WLCG GDB 9 May 2012.
Updates Licia Florio, TERENA REFEDS Meeting 5 Sept 2012.
Authentication and Authorisation for Research and Collaboration Licia Florio (GÉANT) Christos Kanellopoulos (GRNET) Service orientation.
Authentication and Authorisation for Research and Collaboration Pilots on the Integrated R&E AAI Paul van Dijk, Activity Lead Pilots.
EResearchers Requirements the IGTF model of interoperable global trust and with a view towards FIM4R AAI Workshop Presenter: David Groep, Nikhef.
Authentication and Authorisation for Research and Collaboration Licia Florio REFEDS Meeting The AARC Project I2 Technology Exchange.
Authentication and Authorisation for Research and Collaboration Licia Florio AARC Workshop The AARC Project Brussels, 26 October.
Authentication and Authorisation for Research and Collaboration David Kelsey AARC AHM Milan And mechanisms NA3 Task 4 – Scalable.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Current status and plans.
Authentication and Authorisation for Research and Collaboration Christos Kanellopoulos GRNET Proposed Pilots for Libraries and eGov.
Authentication and Authorisation for Research and Collaboration Mikael Linden AARC all hands Milan Authentication and Authorisation.
Authentication and Authorisation for Research and Collaboration Milan, Italy Training and Outreach Authentication and Authorisation.
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
Federated Identity Management for HEP David Kelsey HEPiX, IHEP Beijing 18 Oct 2012.
Authentication and Authorisation for Research and Collaboration Christos Kanellopoulos
Authentication and Authorisation for Research and Collaboration David Groep AARC All Hands meeting Milano Policy and Best Practice.
Authentication and Authorisation for Research and Collaboration Christos Kanellopoulos Open Day Event: Towards the European Open.
Networks ∙ Services ∙ People Daniela Pöhn REFEDS EWTI, Vienna IdPs and Federations Service Aspects of Assurance SA5T1.
Federated Identity Management for Scientific Collaborations The Common Vision David Kelsey (STFC) 3 Nov 2011.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
Networks ∙ Services ∙ People Thomas Bärecke Journée Fédération, Paris Collaboration européenne GÉANT SA5 03/07/2015 SA5 T5 team
Connect communicate collaborate Trust & Identity EC meets GÉANT 19 June 2014 Brussels Valter Nordh, NORDUnet Federation as a Service Task Leader Trust.
Networks ∙ Services ∙ People Nicole Harris UK federation meeting eduGAIN, REFEDS and the UK 23 June 2015 Project Development Officer GÉANT.
Research Community Requirements Ann Harding, SWITCH Cambridge July 2014.
Networks ∙ Services ∙ People Marina Adomeit FIM4R meeting Virtual Organisation Platform as a Service VOPaaS Nov 30, 2015, Austria Task Leader,
Networks ∙ Services ∙ People Ann Harding GÉANT Symposium, Vienna Users Session A3 Trust and Identity March GÉANT Activity Leader Trust.
Authentication and Authorisation for Research and Collaboration Taipei Taiwan Authentication and Authorisation for Research and.
Authentication and Authorisation for Research and Collaboration Licia Florio REFEDS Meeting AARC and AARC2 Vienna, 1 st December.
David Groep Nikhef Amsterdam PDP programme Authentication and Authorization for Research and Collaboration David Groep, Nikhef with materials gratefully.
Authentication and Authorisation for Research and Collaboration Bari, Italy Training and Outreach Authentication and Authorisation.
David Groep Nikhef Amsterdam PDP & Grid AARC Authentication and Authorisation for Research and Collaboration an impression of the road ahead.
Networks ∙ Services ∙ People Licia Florio TNC, Lisbon Consuming identities across e- Infrastructures 16 June 2015 PDO GÈANT.
Authentication and Authorisation for Research and Collaboration Heiko Hütter, Martin Haase, Peter Gietz, David Groep AARC 3 rd.
Authentication and Authorisation for Research and Collaboration Licia Florio AARC CORBEL Workshop The AARC Project Paris, 31 May.
Authentication and Authorisation for Research and Collaboration Licia Florio AARC f-2-f Meeting One Year of AARC Utrecht, 24 May.
Authentication and Authorisation for Research and Collaboration Peter Solagna, Nicolas EGI AAI integration experiences AARC Project.
Authentication and Authorisation for Research and Collaboration David Kelsey AARC AHM Utrecht NA3 Task 4 – Scalable Policy Negotiation.
Authentication and Authorisation for Research and Collaboration AARC/CORBEL Workshop for Life Sciences AAI AARC Draft Blueprint.
Authentication and Authorisation for Research and Collaboration Brussels Training and Outreach Authentication and Authorisation.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
Authentication and Authorisation for Research and Collaboration Licia Florio IGTF Meeting The AARC Project Amsterdam, 8 September.
Introduction to AAI Services
Boosting AAI for research and collaboration
RCauth.eu CILogon-like service in EGI and the EOSC
Authentication and Authorisation for Research and Collaboration
The Policy Puzzle Many groups and (proposed) policies, but leaving many open issues AARC “NA3” is tackling a sub-set of these “Levels of Assurance” –
LoA Policy Harmonisation and Best Practices
AARC Update What’s been happening in AARC which matters for GÉANT
User Community Driven Development in Trust and Identity
LoA Policy Harmonisation and Best Practices
AAI Alignment Nicolas Liampotis (based on the work of Mikael Linden)
Boosting AAI for research and collaboration
Federated Identity Management for Scientific Collaborations
The AARC Project Licia Florio (GÉANT) Christos Kanellopoulos (GRNET)
The AARC Project Licia Florio AARC Coordinator GÉANT
LoA Policy Harmonisation and Best Practices
Minimal Level of Assurance (LoA)
Policy in harmony: our best practice
Leveraging the IGTF authentication fabric for research
Leveraging the IGTF authentication fabric for research
Policy and Best Practice … in practice
AAI For Researchers Licia Florio AARC Project Coordinator GÉANT DI4R
AARC Blueprint Architecture and Pilots
Supporting communities with harmonized policy
AAI Architectures – current and future
RCauth.eu CILogon-like service in EGI and the EOSC
Presentation transcript:

Authentication and Authorisation for Research and Collaboration Christos Kanellopoulos David Groep 9 th FIM4R Meeting The AARC Project – First 7 months Vienna, 30 November 2015 JRA1 – Architecture WP Leader NA3 – Policy WP Leader GRNET NIKHEF

2 AARC Facts Two-year EC-funded project 20 partners NRENs, e-Infrastructure providers and Libraries as equal partners About 3M euro budget Starting date 1st May, Authentication and Authorisation for Research and Collaboration

AARC Vision and Objectives 3 Impacts Create a cross-e-infrastructure ‘network’ for identities Reduce duplication of efforts in the service delivery Improve the penetration of federated access Outputs Design of integrated AAI built on federated access Harmonised policies to easy cross-discipline collaboration Pilot selected use-cases Offer a diversified training package Avoid a future in which new research collaborations develop independent AAIs

Integration, policy harmonisation, piloting and training 4 Approach Use existing e- infrastructures in the delivery chain Work with e-infras and user communities to solve existing challenges, pilot use-cases and get feedback on the results Design an integrated AAI built on production infrastructures

5 AARC Work areas

6 First Results

First document describing the approach to the training: Report on the identified target groups for training and their requirements End of the month the first online module on federated access 7 Training and Outreach Repackage and add what is missing

Security Incident on FIM To agree on a generic security incident response procedure for federations Sirtfi Trust Framework was finalised at the next I2 Tech Exc Sirtfi WG: SIRTFI 8 Policy and Best Practices Harmonisation LoA work To agree on a sustainable LoA framework AARC (through surveys and FIM4R) looking at immediate and longer-term need by SPs and RPs: vey+for+SP+communities Key challenge is cost of operation, and who bears this costs R&E federations and their IdPs looking at the ‘service aspect’ of providing assurance MNA3.1 Recommendations on minimal assurance level relevant for low-risk use cases MNA3.2 Community requirements on Accounting data

Many groups and many (proposed) policies, but they leave also many open issues via AARC Policy and Best Practice Harmonisation we try tackling a sub-set of these “Levels of Assurance” – a minimally-useful profile and a differentiated set, for ID and attributes “Sustainability models and Guest IdPs”– how can assurance be offered in the long run? “Scalable policy negotiation” – beyond bilateral discussion “Protection of (accounting) data privacy” – aggregation of PI-like data in collaborative infrastructures “Incident Response”– encouraging ‘expression’ of engagement by (federation) partners and a common understanding AARC supports the SirTFi activity – of which Hannah will tell you a lot later! 9 The Policy Puzzle IGTF SCI REFEDS FIM4R GN4 AARC SIRTFI...

What do relying parties need, and what can IdPs provide? Recommendations on Minimal Assurance Level Relevant for Low-risk Research Use Cases 1.The accounts in the Home Organisations must each belong to a known individual person 2.Persistent user identifiers (i.e., no re-assignment of user identifiers) 3.Documented identity vetting procedures (not necessarily face-to-face) 4.Password authentication (with some good practices) 5.Departing user’s eduPersonAffiliation must change promptly 6.Self-assessment (supported with specific guidelines) See Mikael presentation hereafter – community consultation open LoA capabilities are closely linked to a sustainability model … 10 ILoA requirements and ‘achievability’

Sustainable operating models Who supports such a service? Central national funding, the RPs using it, subscribers/user paying a subscription fee, community-centric funding, … Does it need specific promotion, and by whom? (to get subscriber/user buy-in for sustainable funding) Over time, no generic - non-community-based - identity provider seems to survive… ProtectNetwork: now pay-per-use (SPs need to pay $ now), Feide OpenIdP: phase out by Jan 1 st, 2016 Other open identity providers are sustained because they serve a dedicated community – e.g. IGTF Identity Providers are (co)supported by national funding and by community groups But homeless users exist (and need IdPs of Last Resort or “Guest IdPs”) with a defined assurnance Policies for ‘homeless user’ accounts lifecycles Traceability and assignment of persistent non-reassigned identifiers Policies for translating social network identities into SAML federation users – effect on LoA? 11 IISustainable models

Some existing ‘scalable’ policy mechanisms around now Coordinated ‘policy bridge’ trust anchor/meta-data distributions (e.g. IGTF trust fabric*) eduGAIN is policy-free, but there are Entity Categories (‘ECs’) Geant CoCo, iCoco, REFEDS R&S, and some evaluation of extent to which currently used Gaps or problems to be addressed Federations not exposing IdPs to eduGAIN, or lack of EC support (or willing IdPs with metadata got it re-written by their federation operator …) What about expressing SIRTFI trust compliance, should that be an EC? Should policies and ECs be single global definitions (like CoCo, R&S), or should we prepare for many ‘community trust marks’ - already some countries have scoped entity categories Remember TACAR* – where the registry is neutral but anchors can be ‘qualified’ Do service providers/RPs ‘on the ground’ actually understand LoA? 12 IIIScaling Policies and Assurance * *

infrastructures need to be able to process data and meta-data about the users and their interaction with the systems accounting and for assigning use data to allocations, and to be able to follow up on incidents in the infrastructure Now: classification and inventory of data types and roles MNA3.2 available on Developing recommendations for data protection template policy as next step in AARC 13 IVAccounting and infrastructure data protection

14 Architecture Design Analysis of requirements Analysis of AA technologies Guest Identities Attribute Authorities – Token Translation Blueprint Architecture Sep15Dec15Apr15Apr17Jul16

15 Architecture Design – Analysis of requirements AARC Surveys BioVel, CLARIN, D4Science, DARIAH, EISCAT, EUDAT, FMI, PSNC, UMBRELLA, … AARC Interviews EGI, ELIXIR, EUDAT, GN4, LIBRARIES (UKB), … Past Activities FIM4R & TERENA AAA Study AARC Requirement Analysis (available end of Sept.)

1.User Friendliness 2.Homeless Users 3.Different Levels of Assurance 4.Community based authorization 5.Flexible and scalable attribute release policies 6.Attribute Aggregation & Account Linking 7.Federation solutions based on open and standards based technologies 8.Persistent & Unique User Identifiers 9.User managed Identity Information 10.Up to date identity information 11.User groups and roles 12.Step up authentication 16 Architecture Design – Analysis of requirements 13.Browser and non-browser based federated access 14.Delegation 15.Social media identities 16.Integration with e-Government infrastructures 17.Service Provider Friendliness 18.Effective Accounting 19.Policy Harmonization 20.Federated Incident report Handling 21.Sufficient Attribute release 22.Awareness about R&E Federations 23.Semantically harmonized identity attributes 24.Simplified process for joining identity federation 25.Best practices for terms and conditions

1.User Friendliness 2.Homeless Users 3.Different Levels of Assurance 4.Community based authorization 5.Flexible and scalable attribute release policies 6.Attribute Aggregation & Account Linking 7.Federation solutions based on open and standards based technologies 8.Persistent & Unique User Identifiers 9.User managed Identity Information 10.Up to date identity information 11.User groups and roles 12.Step up authentication 17 Architecture Design – Analysis of requirements 13.Browser and non-browser based federated access 14.Delegation 15.Social media identities 16.Integration with e-Government infrastructures 17.Effective Accounting 18.Policy Harmonization 19.Federated Incident report Handling 20.Sufficient Attribute release 21.Awareness about R&E Federations 22.Semantically harmonized identity attributes 23.Simplified process for joining identity federation 24.Service Provider Friendliness 25.Best practices for terms and conditions

Continue the interviews with the AARC stakeholders and the parallel work on Guest Identities and Attribute Authorities (AA) & Token Translation Services (TTS) End of October first internal draft release of AARC High Level Architecture End of December: Analysis of available AA technologies January – February: Consultation with stakeholders around the AARC High Level Architecture Arpil: Release work on Guest Identities, AAs and TTS July: 1 st version of the AARC AAI Architecture Framework 18 Architecture Design – Next steps

Although the AARC project has only started for a few months, we have started the preparation for AARC2 focus on user-driven innovation and pilots on existing e-Infrastructures to respond to user-community challenges Help us identifying use-cases: 1O9z81NAyBsmxtJNSNGXSICU/viewform 19 Preparation for AARC 2

© GEANT on behalf of the AARC project. The research leading to these results has received funding from the European Union’s Horizon 2020 research and innovation programme under Grant Agreement No (AARC). Thank you Any Questions?