1 Name of Meeting Location Date - Change in Slide Master Authentication & Authorization Technologies for LSST Data Access Jim Basney

Slides:



Advertisements
Similar presentations
Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
Advertisements

An Open Source Google Apps Integration (Bboogle) Patricia Goldweic, Sr. Software Engineer, Northwestern University.
Case Studies in Identity Management for Scientific Collaboration 2014 Technology Exchange Jim Basney CILogon This material is.
1 Collaborators at the Gates of Troy: Extending eServices at USC.
WSO2 Identity Server Road Map
Emory University Case Study I2 Day Camp November 5, 2010 John Ellis & Elliot Kendall.
Will Darby April  What is Federated Security  Security Assertion Markup Language (SAML) Overview  Example Implementations  Alternative.
National Center for Supercomputing Applications University of Illinois at Urbana-Champaign This material is based upon work supported by the National Science.
Federated Identity for Scientific Collaborations: Policy Issues Jim Basney 2 nd Workshop on Federated Identity Systems for Scientific.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Federated Access to US CyberInfrastructure Jim Basney CILogon This material is based upon work supported by the National Science Foundation.
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
Campus Management Portal and Online Higher Education Cardean Learning Group.
Turkey IDA Info-Day PM Session, September 25, 2003 CIRCA 1 CIRCA : The IDA Collaborative Software Tool Grzegorz Ambroziewicz European Commission - DG Enterprise.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Distributed Web Security for Science Gateways Jim Basney In collaboration with: Rion Dooley Jeff Gaynor
The InCommon Federation The U.S. Access and Identity Management Federation
Distributed Web Security for Science Gateways Jim Basney In collaboration with: Rion Dooley Jeff Gaynor
Office of Information Technology Balancing Technology and Privacy – the Directory Conundrum January 2007 Copyright Barbara Hope and Lori Kasamatsu 2007.
Exploring InCommon Getting Started with InCommon: Creating Your Roadmap.
Federated Identity and the International Research Community Dr Ken Klingenstein Director, Internet2 Middleware and Security.
Belnet Federation Belnet – Loriau Nicolas Brussels – 12 th of June 2014.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
Researcher ID September Presented by Terry Smith - AAF Technical Manager.
PS Security By Deviprasad. Agenda Components of PS Security Security Model User Profiles Roles Permission List. Dynamic Roles Static Roles Building Roles/Rules.
Collaborative Platforms. Collaborations and Virtual Organizations IdM is a critical dimension of collaboration, crossing many applications.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs This would be presented.
Access Management 2.0: UMA for the #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 1.
Leveraging the InCommon Federation to access the NSF TeraGrid Jim Basney Senior Research Scientist National Center for Supercomputing Applications University.
University of Washington Identity and Access Management IEEAF – RENU Network Design Workshop Seattle - 29 Nov 2007 Lori Stevens, Director, Distributed.
Federating non-web services with LDAP-Façade
Access resources in a federation partner organization.
February, TRANSCEND SHIRO-CAS INTEGRATION ANALYSIS.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Stanford University & National Student Clearinghouse Shibboleth Pilot CAMP Phoenix, AZ February 5, 2009.
Identity Management, Federating Identities, and Federations November 21, 2006 Kevin Morooney Jeff Kuhns Renee Shuey.
WSO2 Identity Server 4.0 Fall WSO2 Carbon Enterprise Middleware Platform 2.
CERN IT Department CH-1211 Genève 23 Switzerland t Single Sign On, Identity and Access management at CERN Alex Lossent Emmanuel Ormancey,
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Introduction to Terra Dotta Applications Integration with Campus Data Systems for institutions beginning their software implementation.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Azure Active Directory Uday Hegde 2016 Redmond Summit | Identity Without Boundaries May 26, 2016 Group Program Manager, Azure AD
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
National Center for Supercomputing Applications University of Illinois at Urbana-Champaign This material is based upon work supported by the National Science.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
University of Southern California Identity and Access Management (IAM)
Ask the Experts – Building Login-Based Sites in AEM
Sakai ID & Access Management
Azure Active Directory - Business 2 Consumer
Federated Identity Management at Virginia Tech
LIGO Identity and Access Management
Identity Management (IdM)
ESA Single Sign On (SSO) and Federated Identity Management
Identity and Access Management
Management of users at UNIL
University of Southern California Identity and Access Management (IAM)
Implementing Database Roles in the Enterprise Geodatababse
Matthew Levy Azure AD B2B vs B2C Matthew Levy
SharePoint Online Authentication Patterns
Community AAI with Check-In
07 | Introduction to Authentication
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
Presentation transcript:

1 Name of Meeting Location Date - Change in Slide Master Authentication & Authorization Technologies for LSST Data Access Jim Basney February 23, 2016

2 LSST IAM Group − − − Bi-weekly meeting using ls.st/sup Google hangout Thursdays 10am Pacific / noon Central

3 Goals of Session − What is feasible technically − Policy implications − State of current prototype − IAM system goals include: – Identify members of US/Chilean astronomy community – Identify named individuals and delegates with data rights – Manage collaborative L3 data sharing

4 Standard Authentication Mechanisms − Federated user identities – SAML, OpenID, OAuth – Web single sign-on from universities, labs, GitHub, Google − Kerberos – password-based single sign-on – Self-service registration, password change/reset – Web, API, and command-line SSO − OAuth – token delegation – Web and API access − 2nd authentication factor – FIDO U2F – browser-based – OATH – smartphone, hard token − X.509 certificates for authenticating services

5 Federated Identity – Academic Providers − SAML identity providers operated by universities and labs in US, Chile, France, and other countries − National SAML federations connected via eduGAIN.org interfederation service – US: InCommon.org – Chile: COFRe.REUNA.cl – France: services.RENATER.fr/federation

6

10

11

12 Federated Identity - eduPersonAffiliation − Definition: Specifies the person's relationship(s) to the institution in broad categories such as student, faculty, staff, alum, etc. − Permissible values: faculty, student, staff, alum, member, affiliate, employee, library-walk-in − no "astronomer" attribute − departmental affiliation not well supported

13 Federated Identity - eduPersonAffiliation − Proposed: gets L2 data rights – "Member" is intended to include faculty, staff, student, and other persons with a full set of basic privileges that go with membership in the university community (e.g., they are given institutional calendar privileges, library privileges and/or vpn accounts). It could be glossed as "member in good standing of the university community."

14 Technical Prototype - Authentication − InCommon authentication with eduPersonAffiliation – – Using Shibboleth, CILogon and Globus middleware − Kerberos authentication for SSH single sign-on – Kerberos ticket in user’s SSH session – Ticket-based authentication to Web APIs − MariaDB – Kerberos authentication – Kerberos password authentication via PAM – Kerberos ticket-based authentication new in MariaDB authentication-plugin/

15

16

17 Authorization − L2 data rights − L3 collaboration groups − Access to applications/services − Admin/staff roles

18 Access Control Components − User/Group Manager – Implements the logic and workflows to determine who has L2 Data Access Rights and who is involved in L3 collaborations. These workflows set/unset User Attributes (i.e., group memberships). − User Attribute Store – Receives information from User/Group Manager and publishes the resulting User Attributes via a standard LDAP interface. − Service Level Authorization – Services implement authorization (access control) based on access control lists (ACLs) or database GRANT statements or other service-specific methods, based on the User Attributes.

19

20 L2 Data Rights − National professional astronomical community – Use eduPersonAffiliation when available – Otherwise will require manual review/approval − Named individuals from international partners – Lookup existing LSST accounts – -based invitations − A limited number of designated additional individuals (post- docs, grad students) per named individual – Named individuals can invite/grant others (from same institution)

21 Managing an L3 Group (Proposed) − Via ORACLE – ORACLE (Observatory Resource Allocation Committee for Level Elevation) process defines a group indicating the users (group members) who can use the resource allocation. Also create an associated L3 data workspace private to that group. − Via User/Group Manager – […]

22 Managing an L3 Group (Proposed) − Via ORACLE − Via User/Group Manager – Any user with Data Access Rights can click "Create L3 Data Product Group" in the User/Group Manager web interface to create an L3 group and define its initial members. That user will be the initial owner of the group. – Users who own L3 groups will also see a "Manage My L3 Data Product Group(s)" button/link that allows them to add/remove members and add owners / transfer ownership. – Users with Data Access Rights will see a "Manage My L3 Data Product Group Memberships" button/link that allows them to request to join L3 groups or leave L3 groups they are currently a member of.

23 Technical Prototype - Authorization − pam_sss and sssd – set Unix groups from LDAP − mod_authnz_ldap – set WebDAV permissions using LDAP groups − LDAP to SQL Provisioner – set SQL roles from LDAP

24 Leveraging NCSA IAM Improvements − Self-service user registration, profile management, password reset − Delegated group administration – Group invitation process – Custom group registration questions, membership policies − Kerberos and LDAP replication

25 User/Group Manager Options − New NCSA IAM web interfaces − Internet2 COmanage/Grouper – Very flexible workflows, group logic, and provisioners − Globus Groups – Cloud service under development

26 Identity Linking − External identities (University, GitHub, etc.) linked to individual’s LSST identity – Established during initial enrollment and managed by user − Group memberships based on LSST identity – LDAP queries using LSST IDs and external IDs

27 IAM Next Steps − Technical prototyping continued – MariaDB Kerberos tickets – DAX integration – Delegation (OAuth, X.509) − Admin/Staff roles − COFRe/eduGAIN exploration − NCSA IAM deployment

28 Thanks! − Contacts: – – –