PRACE user authentication and vetting Vincent RIBAILLIER, 29 th EUGridPMA meeting, Bucharest, September 9 th, 2013.

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MyProxy and EGEE Ludek Matyska and Daniel.
Advertisements

Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Ensuring Effective Monitoring, Certification and Verification of Emissions by Jed Jones Lloyd’s Register.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Campus Based Authentication & The Project Presented By: Tim Cameron National Council of Higher Education Loan Programs.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI The IGTF IOTA Profile towards differentiated assurance levels.
INFSO-RI Enabling Grids for E-sciencE JRA3 2 nd EU Review Input David Groep NIKHEF.
National Institute of Advanced Industrial Science and Technology Auditing, auditing template and experiences on being audited Yoshio Tanaka
National Smartcard Project Work Package 8 – Security Issues Report.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
CILogon OSG CA Mine Altunay Jim Basney TAGPMA Meeting Pittsburgh May 27, 2015.
IOTA Questions for RPs Sept 9, 2013 Bucharest, Romania.
LiveAP Towards Differentiated Identity Assurance David Groep, Nikhef supported by the Netherlands e-Infrastructure SURFsara, and EGI.eu O-E-15 and EGI-InSPIRE.
Identity Management Levels of Assurance WLCG GDB CERN, 8 Apr 2009 David Kelsey STFC/RAL david.kelsey AT stfc.ac.uk.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
National Institute of Advanced Industrial Science and Technology Brief status report of AIST GRID CA APGridPMA Singapore September 16 Yoshio.
Updates from the EUGridPMA David Groep, July 16 st, 2007.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Profile for Portal-based Credential Services (POCS) Yoshio Tanaka International Grid Trust Federation APGrid PMA AIST.
8-Jul-03D.P.Kelsey, LCG-GDB-Security1 LCG/GDB Security (Report from the LCG Security Group) RAL, 8 July 2003 David Kelsey CCLRC/RAL, UK
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
IOTA Questions for RPs Sept 9, 2013 Bucharest, Romania.
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
Leveraging the InCommon Federation to access the NSF TeraGrid Jim Basney Senior Research Scientist National Center for Supercomputing Applications University.
Security Policy Update David Kelsey UK HEP Sysman, RAL 1 Jul 2011.
Identity Management in DEISA/PRACE Vincent RIBAILLIER, Federated Identity Workshop, CERN, June 9 th, 2011.
IOTA AP Towards Differentiated Identity Assurance David Groep, Nikhef supported by the Netherlands e-Infrastructure and SURFsara.
February, TRANSCEND SHIRO-CAS INTEGRATION ANALYSIS.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Security Solutions Rachana Ananthakrishnan University of Chicago.
Security Policy Update WLCG GDB CERN, 14 May 2008 David Kelsey STFC/RAL
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
EUDAT receives funding from the European Union's Horizon 2020 programme - DG CONNECT e-Infrastructures. Contract No B2ACCESS LSDMA.
0 NAREGI CA Status Report APGrid F2F meeting in Singapore June 4, 2007 Rumiko Masuko.
VOMS Attribute Authorities Michael Helm ESnet/LBNL 23 Feb 2007.
CERN IT Department CH-1211 Genève 23 Switzerland t Single Sign On, Identity and Access management at CERN Alex Lossent Emmanuel Ormancey,
18 th EUGridPMA, Dublin / SRCE CA Self Audit SRCE CA Self Audit Emir Imamagić SRCE Croatia.
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI IGTF & EUGridPMA status update SHA-2 – and more (David Groep,
UGRID CA Self-audit report Sergii Stirenko 21 st EUGRIDPMA Meeting Utrecht 24 January 2011.
HellasGrid CA self Audit. In general We do operations well Our policy documents need work (mostly to make the text clearer in a few sections) 2.
News from EUGridPMA EGI OMB, 22 Jan 2013 David Kelsey (STFC) Using notes from David Groep 22/01/20131EUGridPMA News.
CAISO Public Key Infrastructure: Supporting Secure ICCP Leslie DeAnda Senior Information Security Analyst, Information Security, CAISO EMS Users Group.
29 th EUGridPMA meeting, September 2013, Bucharest AEGIS Certification Authority Dušan Radovanović University of Belgrade Computer Centre.
ISO Certification For Laboratory Accreditation ISO Certification For Laboratory Accreditation.
© 2007 Open Grid Forum Authentication Service Profile Christos Kanellopoulos 14 th EUGridPMA, Lisbon, PT October 7 th, 2008.
Security Policy Update WLCG GDB CERN, 11 June 2008 David Kelsey STFC/RAL
EGI-InSPIRE RI EGI (IGTF Liaison Function) EGI-InSPIRE RI The IGTF IOTA Profile towards differentiated assurance levels.
WLCG Update Hannah Short, CERN Computer Security.
OGF PGI – EDGI Security Use Case and Requirements
Bring the WLCG federation Home
AEGIS Certification Authority
LCG Security Status and Issues
Cryptography and Network Security
HellasGrid CA & euGridPMA
CRC exercises Not happy with the way the document for testbed architecture is progressing More a collection of contributions from the mware groups rather.
THE STEPS TO MANAGE THE GRID
KMIP Client Registration Ideas for Discussion
Update on EDG Security (VOMS)
Draft ETSI TS Annex C Presented by Michał Tabor for PSD2 Workshop
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
Supporting communities with harmonized policy
Appropriate Access InCommon Identity Assurance Profiles
Combined Assurance Model
Dr Linda Cornwall STFC/RAL EGI OMB 27th September 2013
Protecting Privacy with Federated AA
Presentation transcript:

PRACE user authentication and vetting Vincent RIBAILLIER, 29 th EUGridPMA meeting, Bucharest, September 9 th, 2013

PRACE user authentication and vetting I.Overview of the current PRACE user registration process II.Use case for the IOTA profile in PRACE III.PRACE review of the IOTA profile

The PRACE security model Authentication X.509 certificates (EUGridPMA, IGTF) Services using X.509 authentication : GSI-SSH, UNICORE, GridFTP, GRAM, web services SSO (MyProxy server) Authorization LDAP used as an authorization database Fine grained management Attributes associated to projects (groups of persons) Attributes associated to accounts Accounting Distributed database (DART for access) Accounting records compliant to OGF Usage Record format

b) Federated User Administration c) Authorized Access to Resources a) PRACE Project Administration site B site C site A LDAP user DB allowed User authz Review DB Project attributes user DB user DB User registration in PRACE (1/2)

User registration is done by each partner for users from their country or by assignment. User is only registered once for all sites. Rules are not very explicit for Tier-1 sites. It is assumed that sites have a contract with the user that they register and that they have a clear evidence on how to trace the user. User registration in PRACE (2/2)

Information collected by sites and published in LDAP -First name, last name - -Telephone number -Certificate subject DN -Nationality -Login details, group memberships, organization (« Home site ») …

Why do we need this information ? -Site local policies require a clear traceability (no anonymous access on the execution sites). -Some sites need this information to initiate a local authorization procedure which can lead in the worse cases to access refusal.

PRACE user authentication and vetting I.Overview of the current PRACE user registration process II.Use case for the IOTA profile in PRACE III.PRACE review of the IOTA profile

What could be the use case for the IOTA profile ? A CA compliant to the IOTA profile could be used by : -An organization which would like to collaborate with PRACE. -More generally, any new partner that would wish to join PRACE.

So, is the IOTA profile acceptable for PRACE ? Yes, as long as PRACE and the joining organization can organize themselves to meet the traceability requirement : User should never access the PRACE environment anonymously. An execution site (site providing computing resources to PRACE users) should have an immediate access to the user details. This can be achieved with a distributed database like the PRACE LDAP. A prerequisite would be that all partners have solid procedures to register users. An internal meeting will be organized to define more clearly the criteria of these procedures.

This profile may be accepted by PRACE if we are convinced that for every internal registered user we have enough information to trace that user. (the next two slides quote parts form the profile which make clear why we need the above requirement) Users from other infrastructures can only be accepted if that infrastructure has the same requirement for traceability of the user and can provide us with this information if asked for (in agreed situations).

General architecture Authorities are not required to collect more data than are necessary for fulfilling the uniqueness requirements. Credentials issued by authorities under this profile may not provide sufficient information to independently trace individual subscribers, and should be used in conjunction with complementary identification and vetting processes. Traceability of the credential is provided only in a cooperative way jointly with other parties that provide other elements of identity-related data. Credentials issued by authorities operating under this Authentication Profile should be used primarily in conjunction with vetting and authentication data collected by the relying parties, such that there is less need for collecting data that would otherwise duplicate efforts already performed by such relying parties. 12

Traceability Requirements At credential issuing time, the authority must reasonably demonstrate how it can verify identity information and trace this information back to a physical person (or for non-human credentials to a named group). At the time of issuance, the authority may rely in good faith on any identity management system by a third party with which it has entered into an agreement and that meets the requirements on third parties set forth in the General Architecture. 13

PRACE user authentication and vetting I.Overview of the current PRACE user registration process II.Use case for the IOTA profile in PRACE III.PRACE review of the IOTA profile

PRACE review of the IOTA profile Reference Only a few comments 15

Naming No anonymous credentials may be issued under this profile. what is an anonymous credential? Renewal and re-keying that the entity requesting this renewal or re-keying is the same entity as the one to whom the original credential was issued Under persistency: In case the subject name is assigned to a non- human entity, the owner, being a human person or organisational group, should initiate the identification process. So if the owner left or group doesn’t exist anymore, no renewal is possible? 16 PRACE review of the IOTA profile

Certificate profile Reference to GFD.125 (OGF document) should be provided Security requirements “current IT industry best practices for security sensitive systems.” is vague. Audits The auditing does not necessarily extend to identity vetting systems operated by third parties and used for credential issuance. Why not? 17 PRACE review of the IOTA profile

Privacy and confidentiality “ The authority is not required to release such information. “ Propose to replace “such” by “private information” 18 PRACE review of the IOTA profile

Conclusion IOTA profile is in principle acceptable for PRACE as long as organizations using this profile can satisfy the PRACE registration and traceability requirements. Traceability is already well managed in PRACE. Registration requirements will have to be more formally defined.