3 September 2015 Federated R US. Agenda  Background on Internet2 Middleware and NSF Middleware Initiative  The body of work  Directories  Shibboleth.

Slides:



Advertisements
Similar presentations
Dr Ken Klingenstein Director, Internet2 Middleware and Security Emerging Infrastructure for Collaboration: Next Generation Plumbing.
Advertisements

PKI Solutions: Buy vs. Build David Wasley, U. California (ret.) Jim Jokl, U. Virginia Nick Davis, U. Wisconsin.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
1 HEPKI-TAG Update EDUCAUSE/Dartmouth PKI Summit July 26, 2005 Jim Jokl University of Virginia.
Welcome to CAMP Shibboleth Ken Klingenstein, Director, Internet2 Middleware Initiative.
Welcome to CAMP! Ken Klingenstein, Director, Internet2 Middleware Initiative.
PKI in US Higher Education TAGPMA Meeting, March 2006 Rio De Janeiro, Brazil.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
ICDL 2004, New Delhi1 Access Management for Digital Libraries in a well-connected World John Paschoud SECURe Project London School of Economics Library.
Shibboleth Update a.k.a. “shibble-ware”
InCommon Policy Conference April Uses  In order to encourage and facilitate legal music programs, a number of universities have contracted with.
The Rise of Collaborative Tools Ken Klingenstein Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder.
Welcome to CAMP Identity Management Integration Workshop Ann West NMI-EDIT EDUCAUSE/Internet2.
EDUCAUSE PKI Working Group Where Are We and Where are We Going.
Project Shibboleth Update, Demonstration and Discussion Michael R Gettes Duke University (on behalf of the entire shib team!!!) June.
Administering the Mesh/s of Trust: Old Whine in New Battles.
Authority, Virtual Organizations and Diagnostics: Building and Managing Complexity Ken Klingenstein Director, Internet2 Middleware and Security.
Dr Ken Klingenstein Shibboleth and InCommon: An Update and Next Steps.
Maturation & Convergence in Authentication & Authorization Services in US Higher Education: Keith Hazelton, Sr. IT Architect, University.
EDUCAUSE Midwest Regional March 24, 2003 Copyright Ann West This work is the intellectual property of the author. Permission is granted for this.
GridShib Grid-Shibboleth Integration Von Welch, Tom Barton, Kate Keahey, Frank Siebenlist GlobusWORLD 2005.
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
Middleware: Addressing the Top IT Issues on Campus Renee Woodten Frost Internet2 and University of Michigan CUMREC May 13, 2003.
InCommon Update Internet2 Meeting April 20, 2004 Ken Klingenstein and Carrie Regenstein.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Shibboleth A Federated Approach to Authentication and Authorization Fed/Ed PKI Meeting June 16, 2004.
Frontiers of Authentication and Authorization Copyright 2003 Kenneth J. Klingenstein Internet2 and UC-Boulder Camp Meeting, June 5 th, 2003.
Shibboleth Update RL “Bob” Morgan, Washington Steven Carmody, Brown Scott Cantor, Ohio State Marlena Erdos, IBM/Tivoli Michael Gettes, Georgetown Keith.
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
Shibboleth Update Advanced CAMP 7/31/02 RL “Bob” Morgan, Washington Steven Carmody, Brown Scott Cantor, Ohio State Marlena Erdos, IBM/Tivoli Michael Gettes,
Shibboleth A word which was made the criterion by which to distinguish the Ephraimites from the Gileadites. The Ephraimites, not being able to pronounce.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 NMI R3 Enterprise Directory Components.
Shibboleth: Status and Pilots. The Golden Age of Plywood.
Project Shibboleth Update, Demonstration and Discussion Michael Gettes May 20, 2003 TERENA Conference, Zagreb, Croatia Michael Gettes.
The Golden Age of Plywood Ken Klingenstein Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
NSF Middleware Initiative: Enterprise and Desktop Integration Technologies Consortium Renee Woodten Frost Assistant Director Internet2 Middleware Initiative.
Going Forward: Year 2 NMI and Higher Ed Middleware.
Shibboleth A word which was made the criterion by which to distinguish the Ephraimites from the Gileadites. The Ephraimites, not being able to pronounce.
A community-based CA: The (slow) rise of the house of Usher (The CA former known as CREN)
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
February 1, 2002 Internet2 Middleware Initiative and MACE RL "Bob" Morgan, University of Washington.
NSF Middleware Initiative: What’s It All About? Renee Woodten Frost Assistant Director Internet2 Middleware Initiative.
GridShib Grid-Shibboleth Integration An Overview Von Welch
Shibboleth Trust Model Shibboleth/SAML Communities (aka Federated Administrations) Club Shib Club Shib Application process Policy decision points at the.
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
Middleware and Network Security Update: Progress, Problems, and Opportunities for Interaction.
Middleware CAMP Feb Welcome Welcome to the Camp, I guess you all know why we're here. Tommy, by Pete Townsend, The Who We're not gonna take it Never.
Shibboleth: Overview and Status The Shibboleth Architecture Team.
Day 3 Roadmap and PKI Update. When do we get to go home? Report from the BoFs CAMP assessment, next steps PKI technical update Break Research Issues in.
Welcome to Base CAMP: Enterprise Directory Deployment Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein This.
NSF Middleware Initiative Purpose To design, develop, deploy and support a set of reusable, expandable set of middleware functions and services that benefit.
Shibboleth Update January, 2001 Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder.
InCommon® for Collaboration Institute for Computer Policy and Law May 2005 Renee Shuey Penn State Andrea Beesing Cornell David Wasley Internet 2.
October 2, 2001 Middleware: Pieces and Processes RL "Bob" Morgan, University of Washington.
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Renee Woodten Frost Internet2/University of Michigan.
Internet2 Spring Meeting NSF Middleware Initiative Purpose To design, develop, deploy and support a set of reusable, expandable set of middleware functions.
Welcome to CAMP Directory Workshop Ken Klingenstein, Internet2 and University of Colorado-Boulder.
01 October 2001 “...By Any Other Name…”. Consequences and Truths (Ken) The Pieces and the Processes (Bob) Directories (Keith) Shibboleth and SAML (Scott)
NSF Middleware Initiative and Enterprise Middleware: What Can It Do for My Campus? Mark Luker, EDUCAUSE Copyright Mark Luker, This work is the intellectual.
Vidmid Session Overview
Current Activities in Middleware
Virtual organization support services:
Virtual organization support services:
Michael R Gettes, Duke University On behalf of the shib project team
A History of the Next Five Years: (the rise of indoor plumbing)
Shibboleth: Status and Pilots
Shibboleth and Federations
Administering the Mesh/s of Trust: Old Whine in New Battles
Presentation transcript:

3 September 2015 Federated R US

Agenda  Background on Internet2 Middleware and NSF Middleware Initiative  The body of work  Directories  Shibboleth  Trust fabrics and federations  Federated applications

MACE (Middleware Architecture Committee for Education)  Purpose - to provide advice, create experiments, foster standards, etc. on key technical issues for core middleware within higher education  Membership - Bob Morgan (UW) Chair, Scott Cantor (Ohio State), Steven Carmody (Brown), Michael Gettes (Georgetown), Keith Hazelton (Wisconsin), Paul Hill (MIT), Jim Jokl (Virginia), Mark Poepping (CMU), Bruce Vincent (Stanford), David Wasley (California), Von Welch (Grid)  European members - Brian Gilmore (Edinburgh), Ton Verschuren (Netherlands), Diego Lopez (Spain)  Creates working groups in major areas, including directories, interrealm access control, PKI, video, P2P, etc.

The National Science Foundation Middleware Initiative (NMI)  NSF program to support and deploy middleware for research and education  Two types of awards System Integrators to do widely used tools and services Separate awards to academic pure research “throw it long” components  Issues periodic NMI releases of software, services, architectures, objectclasses and best practices – R4 due out the end of the year  Primary S.I.awardees: EDIT – Internet2, EDUCAUSE, SURA Grids – ISI, Wisc, Argonne, Michigan, Indiana  Two rounds of awards – 2001 and 2003

Making it happen  Much as at the network layer, plumb a ubiquitous common, persistent and robust core middleware infrastructure for the R&E community Foster effective and consistent campus implementations Motivate institutional funding and deployment strategies Solve the real world policy issues Integrate key applications to leverage the infrastructure Nurture open-source solutions Address scaling issues for the user and enterprise  in support of inter-institutional and interrealm collaborations, provide tools and services (e.g. registries, bridge PKI components, root directories) as required

Federated all the way down  Given the strong collaborations within the academic community, there is an urgent need to create inter-realm tools, so  Build consistent campus middleware infrastructure deployments, with outward facing objectclasses, service points, etc. and then  Federate (mulitlateral) those enterprise deployments with interrealm attribute transports, trust services, etc. and then  Leverage that federation to enable a variety of applications from network authentication to instant messaging, from video to web services, from p2p to virtual organizations, etc.

Internet2 Middleware: Key Concepts  Use federated administration as the lever; have the enterprise broker most services (authentication, authorization, resource discovery, etc.) in inter-realm interactions  Develop a consistent directory infrastructure within R&E  Provide security while not degrading privacy.  Foster interrealm trust fabrics: federations and virtual organizations  Leverage campus expertise and build rough consensus  Influence the marketplace; develop where necessary  Support for heterogenity and open standards

Interrealm and intrarealm  Intrarealm describes the services within an enterprise, such as a university or corporation. The services, such as authentication, authorization and directories, assume commonalities and trust.  Interrealm describes the relationships between autonomous systems or enterprises. No assumptions are made.  But of course, for most large universities, there are many pockets of semi-autonomy (colleges, medical schools and hospitals, athletic departments) and it may best be viewed as interrealm  And, of course, in large companies with many wholly- owned but acquired subsidiaries, the lack of a common infrastructure makes their architectures interrealm.

Upper and Core Middleware Land

Core Middleware Scope  Identity and Identifiers – namespaces, identifier crosswalks, real world levels of assurance, etc.  Authentication – campus technologies and policies, interrealm interoperability via PKI, Kerberos, etc.  Directories – enterprise directory services architectures and tools, standard objectclasses, interrealm and registry services  Authorization – permissions and access controls, delegation, privacy management, etc.  Integration Activities – open management tools, use of virtual, federated and hierarchical organizations, enabling common applications with core middleware

Campus Core Middleware Architecture: (Origin perspective)

Landmark Work  Convincing ourselves that we could do this and that it would make a difference…  Consensus standards – eduPerson, eduOrg, commObject  Best Practices and Deployment Strategies – LDAP Recipe, Group Management, Metadirectories  Tools – KX.509, LDAP Analyzer, LOOK  Software systems – OpenSAML, Shibboleth

The upcoming work  Authorization A group-oriented role based approach Presumes enterprise has done some structuring of authorizations and roles Permits delegation, audit controls, etc. –Implemented as attributes housed in directories –Anchored with registries for roles, policies, authorites, etc.  PKI  Middleware Diagnostics  Virtual Organization Support

The directory work  Incent campuses to deploy directories, and to do so in a roughly consistent fashion: The LDAP Recipe and Middleware Business Plans  Create standards (syntax and semantics) for key inter- institutional attributes eduPerson eduOrg H.350 (nee commObj)  Develop tools in support of those standards LDAP Analyzer Performance tools Grouper

eduPerson major attributes  Assumes inetOrgPerson, OrgPerson Name, address, phone, preferred language, etc.  Affiliations A full list (e.g. student, faculty, alum, continuing ed, etc.) Primary affiliation  Identity (login name)  Entitlements Licensed content, enrolled courses, etc.

Shibboleth  A word which was made the criterion by which to distinguish the Ephraimites from the Gileadites. The Ephraimites, not being able to pronounce sh, called the word sibboleth. See --Judges xii.  Hence, the criterion, test, or watchword of a party; a party cry or pet phrase.  - Webster's Revised Unabridged Dictionary (1913):Webster's Revised Unabridged Dictionary (1913)

Stage 1 - Addressing Three Scenario’s  Member of campus community accessing licensed resource Anonymity required  Member of a course accessing remotely controlled resource Anonymity required  Member of a workgroup accessing controlled resources Controlled by unique identifiers (e.g. name)  Taken individually, each of these situations can be solved in a variety of straightforward ways.  Taken together, they present the challenge of meeting the user's reasonable expectations for protection of their personal privacy.

Establishing a User Context

Getting Attributes and Determining Access

Milestones  Project formation - Feb 2000 Stone Soup  Process - began late summer 2000 with bi-weekly calls to develop scenario, requirements and architecture.  Linkages to SAML established Dec 2000  Architecture and protocol completion - Aug 2001  Design - Oct 2001  Coding began - Nov 2001  Alpha-1 release – April 24, 2002  OpenSAML release – July 15, 2002  v1.0 April 2003  v1.1 July 2003  (V2.0 early 2004)

Shibboleth-based federations  InQueue  InCommon  Club Shib  SWITCH  NSDL  State networks  Medical networks  Financial aid networks  Life-long learning communities

The Research and Education Federation Space REF Cluster InQueue (a starting point) InCommon SWITCH The Shib Research Club Other national nets Other clusters Other potential US R+E feds State of Penn Fin Aid Assoc NSDL Slippery slope - Med Centers, etc Indiana

Federated Applications  Personal Privacy and Resource Managers  Digital rights management  Role-based access controls  Desktop videoconferencing  Interrealm calendaring  Authenticated instant messaging  P2P  Shibbed *

Stanford Authz Model

Stanford Authz Goals  Simplification of authority policy, management and interpretation. We should be able to summarize the full rights and privileges of an individual "at a glance" or let departmental administrators view and manage together all authority in their department or division.  Consistent application of authority rules via infrastructure services and synchronization of administrative authority data across systems.  Integration of authority data with enterprise reference data to provide extended services such as delegation and automatic revocation of authority based on status and affiliation changes.  Role-based authority, that is, management of privileges based on job function and assignments rather than attached to individuals.

The CA formerly known as CREN  Lots of discussion for a looong time – HEPKI-TAG, HEBCA-BID, PKI Labs  Plan is finally emerging A few related certificate services –USHER-C4 - soon –USHER Basic - start detailed planning for implementation USHER CP –Others if warranted, eventually –All operate on high levels of assurance in I/A of the institution, and in their internal operation –Place varying degrees of pain, and power, to the institutions Helping on a packaging of open-source low-cost CA servers Work with EDUCAUSE on their related initiatives

Usher-Low  Modeled after Federal Citizen and Commerce CP/CPS (  Issues only institutional certs  Those certs can be used for any purposes  CP will place few constraints on campus operations User identification and key management Campus CA/RA activities  Will be operated itself at high levels of confidence  Will recommend a profile for campus use  Good for building local expertise, insuring some consistency in approaches among campuses, and may be suitable for many campus needs and some inter-campus uses  Will not work for signing federal grants, etc…  Operational soon

Usher-Basic  Modeled after FBCA Basic level CP  Issues only institutional certs  Those certs can be used for most purposes  CP will place more constraints on campus operations User identification and key management Campus CA/RA activities  Will be operated itself at high levels of confidence  Will recommend a profile for campus use  Good for many campus needs, many inter-campus uses, and many workings with the federal government  Will peer at the HEBCA  Detailed planning now starting; stand up sometime mid-next year

Virtual Organizations  Geographically distributed, enterprise distributed community that shares real resources as an organization.  Examples include team science (NEESGrid, HEP, BIRN, NEON), digital content managers (library cataloguers, curators, etc), life-long learning consortia, etc.  On a continuum from interrealm groups (no real resource management, few defined roles) to real organizations (primary identity/authentication providers)  A required cross-stitch on the enterprise trust fabric

Leveraging V.O.s VO Target Resource User Enterprise

Leveraging V.O.s Today VO Target Resource User Enterprise Federation

Leveraging V.O.s Tomorrow VO Target Resource User Enterprise Federation Authority System