David Groep Nikhef Amsterdam PDP & Grid Getting Real about Virtual Collaboration on the Grid Technologies for AAI in non-web distributed e-Infrastructures.

Slides:



Advertisements
Similar presentations
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks MyProxy and EGEE Ludek Matyska and Daniel.
Advertisements

GT 4 Security Goals & Plans Sam Meder
VO Support and directions in OMII-UK Steven Newhouse, Director.
Role Based VO Authorization Services Ian Fisk Gabriele Carcassi July 20, 2005.
OSG AuthZ Architecture AuthZ Components Legend VO Management Services Grid Site GUMS Site Services SAZ CE Gatekeeper Prima Is Auth? Yes / No SE SRM gPlazma.
Implementing Finer Grained Authorization in the Open Science Grid Gabriele Carcassi, Ian Fisk, Gabriele, Garzoglio, Markus Lorch, Timur Perelmutov, Abhishek.
David Groep Nikhef Amsterdam PDP & Grid Evolving Assurance – IGTF LoA generalisation David Groep Interoperable Global Trust Federation IGTF Documents at.
The Community Authorisation Service – CAS Dr Steven Newhouse Technical Director London e-Science Centre Department of Computing, Imperial College London.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Services Abderrahman El Kharrim
INFSO-RI Enabling Grids for E-sciencE JRA3 2 nd EU Review Input David Groep NIKHEF.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
David Groep Nikhef Amsterdam PDP & Grid Getting Real about Virtual Collaboration on the Grid Technologies for AAI in non-web e-Infrastructures TNC 2011.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
What is EGI? The European Grid Infrastructure enables access to computing resources for European scientists from all fields of science, from Physics to.
TeraGrid Science Gateways: Scaling TeraGrid Access Aaron Shelmire¹, Jim Basney², Jim Marsteller¹, Von Welch²,
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
Mine Altunay OSG Security Officer Open Science Grid: Security Gateway Security Summit January 28-30, 2008 San Diego Supercomputer Center.
VOMRS/VOMS-Admin Convergence and VO Services Project Status Tanya Levshina Computing Division, Fermilab.
Global Grid Forum GridWorld GGF15 Boston USA October Abhishek Singh Rana and Frank Wuerthwein UC San Diegowww.opensciencegrid.org The Open Science.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
JISC Middleware Security Workshop 20/10/05© 2005 University of Kent.1 The PERMIS Authorisation Infrastructure David Chadwick
EMI is partially funded by the European Commission under Grant Agreement RI Argus Policies Tutorial Valery Tschopp - SWITCH EGI TF Prague.
June 24-25, 2008 Regional Grid Training, University of Belgrade, Serbia Introduction to gLite gLite Basic Services Antun Balaž SCL, Institute of Physics.
Mine Altunay July 30, 2007 Security and Privacy in OSG.
EResearchers Requirements the IGTF model of interoperable global trust and with a view towards FIM4R AAI Workshop Presenter: David Groep, Nikhef.
INFSO-RI Enabling Grids for E-sciencE LCAS/LCMAPS and WSS Site Access Control boundary conditions David Groep NIKHEF.
Overview of Privilege Project at Fermilab (compilation of multiple talks and documents written by various authors) Tanya Levshina.
Role Based VO Authorization Services Ian Fisk Gabriele Carcassi July 20, 2005.
US LHC OSG Technology Roadmap May 4-5th, 2005 Welcome. Thank you to Deirdre for the arrangements.
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
INFSO-RI Enabling Grids for E-sciencE LCAS/LCMAPS and WSS Site Access Control boundary conditions David Groep et al. NIKHEF.
OSG AuthZ components Dane Skow Gabriele Carcassi.
Glite. Architecture Applications have access both to Higher-level Grid Services and to Foundation Grid Middleware Higher-Level Grid Services are supposed.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Current status and plans.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
EMI INFSO-RI Argus Policies in Action Valery Tschopp (SWITCH) on behalf of the Argus PT.
Jun 12, 20071/17 AuthZ Interoperability – Status and Plan Gabriele Garzoglio AuthZ Interoperability Status and Plans June 12, 2007 Middleware Security.
Standards driven AAA for Job Management within the OMII-UK distribution Steven Newhouse Director, OMII-UK
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
EGI-InSPIRE RI EGI EGI-InSPIRE RI Establishing Identity in EGI the authentication trust fabric of the IGTF and EUGridPMA.
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
INFSO-RI Enabling Grids for E-sciencE Policy management and fair share in gLite Andrea Guarise HPDC 2006 Paris June 19th, 2006.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
European Grid Initiative AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
EMI is partially funded by the European Commission under Grant Agreement RI Argus Policies Tutorial Valery Tschopp (SWITCH) – Argus Product Team.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Services for Distributed e-Infrastructure Access Tiziana Ferrari on behalf.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Introduction Salma Saber Electronic.
PRACE user authentication and vetting Vincent RIBAILLIER, 29 th EUGridPMA meeting, Bucharest, September 9 th, 2013.
Dynamic Accounts: Identity Management for Site Operations Kate Keahey R. Ananthakrishnan, T. Freeman, R. Madduri, F. Siebenlist.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI solution for high throughput data analysis Peter Solagna EGI.eu Operations.
Virtual Organisations and the NGS Mike Jones Research Computing Services e-Science & “The Grid” for Bio/Health Informaticians, IT January 2008.
Accessing the VI-SEEM infrastructure
OGF PGI – EDGI Security Use Case and Requirements
AAI for a Collaborative Data Infrastructure
AuthZ Interop report out
EMI Interoperability Activities
Getting Real about Virtual Collaboration on the Grid
THE STEPS TO MANAGE THE GRID
WLCG security landscape in EGI and beyond Maarten Litmaath CERN v1
Interoperability & Standards
Update on EDG Security (VOMS)
EGI – Organisation overview and outreach
Assessing Combined Assurance
Assessing Combined Assurance
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
AARC Blueprint Architecture and Pilots
AAI in EGI Status and Evolution
Ponder policy toolkit Jovana Balkoski, Rashid Mijumbi
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
The LHCb Computing Data Challenge DC06
Presentation transcript:

David Groep Nikhef Amsterdam PDP & Grid Getting Real about Virtual Collaboration on the Grid Technologies for AAI in non-web distributed e-Infrastructures TNC 2011 David Groep

David Groep Nikhef Amsterdam PDP & Grid >our e-Infrastructure is global >based around (dynamic) user communities not around their home organisations >that may live long or be over quickly >deal with compute, data, visualisation, services, and more >and users consist of research staff, students, technicians, …

David Groep Nikhef Amsterdam PDP & Grid 186 Communities (VOs) 320 Sites 58 Countries Logical CPUs (cores) ◦ 207,200 EGI, ◦ 308,500 All 101 PB disk 80 PB tape 25.7 million jobs/month ◦ 933,000 jobs/day Archeology Astronomy Astrophysics Civil Protection Comp. Chemistry Earth Sciences Finance Fusion Geophysics High Energy Physics Life Sciences Multimedia Material Sciences … A typical infrastructure in Europe

David Groep Nikhef Amsterdam PDP & Grid Grid scenario: bulk processing

David Groep Nikhef Amsterdam PDP & Grid ‘Private Cluster’ via overlay scheduling

David Groep Nikhef Amsterdam PDP & Grid Or via portals Portals acting on behalf of the user, work-flow portals with canned applications turn-around: min~hours Graphic: Christophe Blanchet, CNRS/IBCP

David Groep Nikhef Amsterdam PDP & Grid Graphic: Steven Newhouse, EGI.eu Or in a cloud …

David Groep Nikhef Amsterdam PDP & Grid more than one... More than one administrative domain More than one service provider participates in a single transaction More than one user in a single transaction More than one authority influences effective policy Single interoperating instance across the entire world

David Groep Nikhef Amsterdam PDP & Grid What drove the Grid AAI model Accommodate multiple sources for assertions ◦ collective policies linked by a common trusted identity (AuthN) ◦ one or more sources of VO centric ‘AuthZ’ attributes Accommodate delegation (disconnected work) ◦ Many entities (services & systems) act on behalf of a user ◦ Service providers do not know, and cannot fully trust, each other ◦ conversely: ensure commensurate impact of resource compromise Accommodate individual, independent researchers ◦ collaborate without necessity to involve home org. bureaucracy Sufficient LoA & Trust as needed by resource providers ◦ allow ‘auto-provisioning’ access to systems ◦ without pre-registration of individual users

David Groep Nikhef Amsterdam PDP & Grid The Canonical Grid Scenario

David Groep Nikhef Amsterdam PDP & Grid Authorization: VO representations VO * : directory of members, groups, roles, attributes Membership information conveyed to services ◦ configured statically, out of band usually with pre-provisioning of local user accounts ◦ in advance, by periodically pulling lists VO (LDAP) directories VO Membership Service (VOMS) ◦ signed assertions pushed with the request in proxies ◦ push or pull assertions via SAML * this is the ‘EGI’ or e-Infrastructure sense of VO, representing users. Other definitions may include resources providers in a more vertically oriented ‘silo’ model

David Groep Nikhef Amsterdam PDP & Grid Coordinated Identity

David Groep Nikhef Amsterdam PDP & Grid ‘policy bridge’ infrastructure for authentication: 86 accredited authorities, 54 countries & economic regions direct relying party (customer) representation (LoA!) from countries and major cross-national organisations ◦ EGI, DEISA/PRACE-RI, wLCG, TERENA, PRAGMA (APGridPMA), Teragrid (TAGPMA), Open Science Grid (TAGPMA) persistent unique ID for use by production infrastructures coordinated identity - IGTF

David Groep Nikhef Amsterdam PDP & Grid Attributes from many sources grid structure was not too much different! In ‘conventional’ grids, all attributes assigned by VO but there are many more attributes, and some of these may be very useful for grid

David Groep Nikhef Amsterdam PDP & Grid Towards a multi-authority world Interlinking of technologies can be done at various points 1. Authentication: linking (federations of) identity providers to the existing grid AuthN systems ◦ (Short-Lived) Credential Services translation: e.g. TCS eSc Personal 2. Populate VO databases with UHO Attributes (‘VASH’) 3. Equip resource providers to also inspect UHO attributes 4. Expressing VO attributes in function of UHO attributes and many other options as well … Leads to assertions with multiple LoAs in the same token ◦ thus all assertions ought carry to their LoA and Source of Authority ◦ expressed in a way that’s recognisable ◦ and the LoA attested to by a trusted (third?) party (e.g. a federation) e.g. in ‘meta-data distribution’ and bound by a chain signatures

David Groep Nikhef Amsterdam PDP & Grid A Bunch Of Assertions is Not Enough SRM-Client SRM cache SRM dCache 6.GridFTP ERET (pull mode) Enstore CASTOR Replica Catalog Network transfer of DATA 1.DATA Creation 2. SRM- PUT Network transfer 3. Register (via RRS) CERN Tier 0 Replica Manager FNAL Tier 1 archive files stage files 4.SRM- COPY Tier0 to Tier1 5.SRM-GET archive files SRM Tier2 Storage Tier 2 Center Network transfer 9.GridFTP ESTO (push mode) 8.SRM-PUT 7.SRM- COPY Tier1 to Tier2 SRM-Client Retrieve data for analysis 10.SRM-GET Users SRM-Client Network transfer of DATA Example file transfer services using managed third- party copy via the SRM protocol Example automatic workload distribution across many sites in a Grid SRM graphic: Timur Perelmutov and Don Petravick, Fermilab, US

David Groep Nikhef Amsterdam PDP & Grid Delegation – propagating your attributes Mechanism to have someone, or some-thing – a program – act on your behalf ◦ with a (sub)set of your rights ◦ allowing resource providers to apply policies based on your own Fundamental to the grid model ◦ since the grid is highly dynamic and resources do not necessarily know about each other only the user (and VO) can ‘grasp’ the current view of their grid ◦ resource owners need long-lasting assertions and traceability (independent of the community or its short life time) ◦ higher LoA and declaration of ID requires for high value resources!

David Groep Nikhef Amsterdam PDP & Grid Delegating rights and privileges GSI (PKI)... and now also some recent SAML specs ◦ GSI using proxy certificates (see RFC3820) pioneered by Globus ◦ SAML: Subject Confirmation, linking to at least one key or name RFC3820 supported in OpenSSL and as add-in to many suites

David Groep Nikhef Amsterdam PDP & Grid VOMS: the ‘proxy’ as a container Virtual Organisation Management System (VOMS) push-model signed VO membership tokens ◦ using the traditional X.509 ‘proxy’ certificate for trans-shipment, backward-compatible with only-identity-based mechanisms ◦ supplying SAML tokens (typically in a push scenario as well) Similar concept as use of embedded SAML as SubjectConfirmation in the GEMBus token format... GEMBus graphic from: Diego R. Lopez, RedIRIS and GEANT3

David Groep Nikhef Amsterdam PDP & Grid

David Groep Nikhef Amsterdam PDP & Grid What to Do with a Bunch of Attributes...

David Groep Nikhef Amsterdam PDP & Grid Make a Decision... Permit Atlas users (FQAN) to execute job on worker node (WN) resource " { action " { rule permit { fqan="/atlas" } } Ban a particular user by DN resource ".*" { action ".*" { rule deny { subject="/C=CH/O=SWITCH/CN=Valery Tschopp" } } Example: Argus Authorization Service. Argus translates this to XACML2. Source: Valery Tschopp, SWITCH and EMI

David Groep Nikhef Amsterdam PDP & Grid A basic yes-no doesn’t get you far If yes, what are you allowed to do? ◦ Credential mapping via obligations, e.g. unix user accounts, to limit what a user can do or disambiguate users ◦ ‘Intended’ side effects allocating or creating accounts... or virtual machines, or limit access to specific (batch) queues, or specific systems, or... Additional software needed ◦ Interpreting policy and constraints ◦ Handling ‘obligations’ conveyed with a decision ◦ e.g. LCMAPS : account mappings, AFS tokens, Argus call-out Argus: pluggable obligation handlers per application  and interpret (pre-provisioned) policies applicable to a transaction/credential

David Groep Nikhef Amsterdam PDP & Grid Job Submission Today User submits the jobs to a resource through a ‘cloud’ of intermediaries Direct binding of payload and submitted grid job job contains all the user’s business access control is done at the site’s edge inside the site, the user job should get a specific, site-local, system identity

David Groep Nikhef Amsterdam PDP & Grid Auto-provisioning as a core feature – e.g. to the Unix world Unix does not talk Grid, so translation is needed between grid and local identity no prior knowledge of potential users 1. local environment procurement 2. obligation to use the environment 3. separation of distinct users and VOs ‘heavy-weight policy enforcement point’ C=IT/O=INFN /L=CNAF /CN=Pinco Palla /CN=proxy VOMS pseudo-cert VOMS + other attributes pvier001:x:43401:2029:PoolAccount VL-e P4 no.1:/home/pvier001:/bin/sh Identity Proxy run as root credential: …/CN=Pietje Puk run as target user uid: ppuk001 uidNumber:

David Groep Nikhef Amsterdam PDP & Grid Many access control points … *of course, central policy and distributed per-WN mapping also possible! site-central service off-site policy

David Groep Nikhef Amsterdam PDP & Grid Argus – consistent authorization graphic: Valery Tschopp, SWITCH and EMI

David Groep Nikhef Amsterdam PDP & Grid Protocol Elements for interop Common communications profile ◦ Agreed on use of SAML2-XACML2 ◦ Common attributes and obligations profile ◦ List and semantics of attributes sent and obligations received between a ‘PEP’ and ‘PDP’ ◦ ◦ PDP Site Services CE / SE / WN Gateway PEP XACML Request XACML Response Grid Site Subject S requests to perform Action A on Resource R within Environment E Decision Permit, but must fulfill Obligation O Sept EGI-TF10 NREN-Grids workshop Graphic: Gabriele Garzoglio, FNAL

David Groep Nikhef Amsterdam PDP & Grid Capabilities (Argus as an example) Enable various common authorization tasks ◦ Banning of users (VO, WMS, site, or grid wide) Composition of policies ◦ e.g. Site Owner policy + experiment policy + CE policy + EGI CSIRT policy + NGI policy=> Effective policy ◦ Argus uses composeability of XACML policies and policy sets Support authorization based on information about the job, action, and execution environment ◦ Support for authorization based on attributes other than FQAN ◦ Support for multiple credential formats (not just X.509) ◦ ‘Procurement’ of multiple types of execution environments ◦ Virtual machines, workspaces, …

David Groep Nikhef Amsterdam PDP & Grid Beyond a single policy Attribute interpretation is more than mere mapping ◦ what do the attributes mean, and do all VOs mean similar things with the same kinds of attributes? ◦ Is the order in which the attributes are presented important? ◦ Can the same bag of attributes (or same priority) be used for both compute and data access? ◦ How do changing attributes reflect access rights on persistent storage, if the VO evolves its attribute set? needs interaction between attribute source and RPs/SPs, that goes beyond just policy languages, SAML or XACML harmonization makes most sense when driven by relying parties & users explicitly include RPs in setting standards for LoA and semantics

David Groep Nikhef Amsterdam PDP & Grid What Grid-AA Does for you Today Grid is built around multiple sources of authority ◦ ID vetting, persistent identification, attribute sourcing and policy come under distinct domains, but leveraging a common authentication ID ◦ With the ‘PKI bits’ being ever more cleverly hidden from the user Accommodate delegation of rights bound to an ID ◦ allows software and other users to act on your behalf ◦ with transparency via MyProxy and on-line service like TCS and SLCS-es Accommodate also individual, independent researchers ◦ even though federations will aid 95+% percent, full coverage will not be … EGI demonstrates that grid mechanisms and associated policies and standards convinced 300+ resource providers grid is trustworthy enough Users actually see a single interface (VO), and no longer need to register at 100s of different sites and fill in 100+ AUP statements … since 2002!

Questions?