External Interface Strategy 1 Machine-to-Machine Interface Strategy December 28, 2006 DRAFT.

Slides:



Advertisements
Similar presentations
Oct, 26 th, 2010 OGF 30, NSI-WG: Network Service Interface working group Web Services Overview Web Services for NSI protocol implementation
Advertisements

18 Copyright © 2005, Oracle. All rights reserved. Distributing Modular Applications: Introduction to Web Services.
Web Services Security Requirements Stephen T. Whitlock Security Architect Boeing.
Siebel Web Services Siebel Web Services March, From
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Web Service Ahmed Gamal Ahmed Nile University Bioinformatics Group
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
6/4/2015Page 1 Enterprise Service Bus (ESB) B. Ramamurthy.
Applied Cryptography Week 13 SAML Applied Cryptography SAML and XACML Mike McCarthy Week 13.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Peoplesoft: Building and Consuming Web Services
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Web Services Michael Smith Alex Feldman. What is a Web Service? A Web service is a message-oriented software system designed to support inter-operable.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
3 Dec 2003Market Operations Standing Committee1 Market Rule and Change Management Consultation Process John MacKenzie / Darren Finkbeiner / Ella Kokotsis,
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Ganesh Kirti Roger Sullivan Oracle Corporation “This presentation is for informational purposes only and may not be incorporated into a contract or agreement.”
Interoperability Tests for IEC Scott Neumann November 12, 2009.
Trade Software Developer Technical Seminar Document Imaging System March 7, 2012.
September, 2005What IHE Delivers 1 G. Claeys, Agfa Healthcare Audit Trail and Node Authentication.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
James Holladay, Mario Sweeney, Vu Tran. Web Services Presentation Web Services Theory James Holladay Tools – Visual Studio Vu Tran Tools – Net Beans Mario.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Copyright © 2004 by The Web Services Interoperability Organization (WS-I). All Rights Reserved 1 Interoperability: Ensuring the Success of Web Services.
Lead from the front Texas Nodal 1 EDS 3 Release 5: SCED Phase 1 Testing Aug 14, 2007.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Computer Emergency Notification System (CENS)
Lead from the front Texas Nodal 1 EDS 3 Release 5 Monday / Friday Market Updates November 30, 2007.
February 8, 2005IHE Europe Educational Event 1 Integrating the Healthcare Enterprise Basic Security Robert Horn Agfa Healthcare.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Machine to Machine Interface Update 1 Machine-to-Machine Interface Update January 10, 2007 Daryl Shing.
An XML based Security Assertion Markup Language
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
XML and Web Services (II/2546)
1/22/08 RTR Project Presentation to TPTF RTR Project Michael Daskalantonakis & Brian Cook.
12/4/2007 ERCOT Public INF MP Identity Management Jeff Floyd Gary Macomber.
Grid Operations Centre LCG SLAs and Site Audits Trevor Daniels, John Gordon GDB 8 Mar 2004.
Kemal Baykal Rasim Ismayilov
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
1 Registry Services Overview J. Steven Hughes (Deputy Chair) Principal Computer Scientist NASA/JPL 17 December 2015.
AMQP, Message Broker Babu Ram Dawadi. overview Why MOM architecture? Messaging broker like RabbitMQ in brief RabbitMQ AMQP – What is it ?
Enterprise Integration Project 1 Enterprise Integration Project Proof of Concept I Review Daryl Shing December 5 th, 2006.
Integrated Release Approach and Update TPTF 11/10/2008 Matt Mereness.
Integration Update 1 External Interfaces & Integration Aug Stephen Kerr.
BEA position on W3C ‘Web Services’ Standards Jags Ramnarayan 11th April 2001.
Introduction to Web Services Presented by Sarath Chandra Dorbala.
Lead from the front Texas Nodal 1 Texas Nodal Market Implementation Integration Update October 24, 2006 Daryl Shing, Enterprise.
External Interface Update 1 External Interface Update April 2, 2007 Daryl Shing.
Web Services Security Mike Shaw Architectural Engineer.
Sabri Kızanlık Ural Emekçi
WEB SERVICES From Chapter 19 of Distributed Systems Concepts and Design,4th Edition, By G. Coulouris, J. Dollimore and T. Kindberg Published by Addison.
Cryptography and Network Security
Enterprise Service Bus (ESB) (Chapter 9)
Tim Bornholtz Director of Technology Services
e-Invoicing – e-Ordering 20/11/2008
WEB SERVICES From Chapter 19, Distributed Systems
Data Transport Standard (DTS)
InterOp Technical Notes
Interoperability Test Message Patterns for IEC
Presentation transcript:

External Interface Strategy 1 Machine-to-Machine Interface Strategy December 28, 2006 DRAFT

External Interface Strategy 2 Deliverables Overall Strategy All interactions outside of user interfaces Alternative to screen-scraping Security approach Delivery approaches Technical interoperability Service Level Agreements (SLA) Auditing, Monitoring and Management Versioning Governance to manage technical issues List of Interfaces (services) Prioritization set with TPTF Importance of an interface Volatility of an interface Existence in underlying systems Support to Market testing for example EDS3 Uses the SoSA & Domain Model Constrained by System Capabilities Sufficient granularity to initiate MP work Represents requirements Interface Specification (per interface) Interface Approach (based on the strategy) Transport and Data Format e.g. XSD Signature & Capabilities Interoperability Market Participant Sandbox Environment Stubbed Applications Validate the Approach Validate the Security Validate Interoperability Identify Refactoring Early Plan Schedule to deliver all interface Specifications in iterations Solicitation of feedback

External Interface Strategy 3 Plan for Delivering the Complete Set of Interface Specifications 12/30/061/31/072/28/073/31/07 Draft Strategy Draft List of Interfaces Draft Interface Specifications Definition of Nodal Sandbox Plan to Deliver Complete Set of Interface Specifications Definition of Interfaces for Awards and Obligations Partial Set of Interfaces for Market Information Requests Updated Sandbox to include some Bidding and Notification Interfaces Final Strategy Final List of Interfaces Complete Set of Interface Specifications Updated Nodal Sandbox to Include Some Market Information Request Interfaces Operating Nodal Sandbox Definition of Interfaces for Bidding Interfaces for Notifications 4/30/07 Plan for Iterative Implementation of the Interfaces

External Interface Strategy 4 High Level Requirements Provision simple, reliable and secure Market Participant machine- to-machine interfaces by –Providing SIMPLICITY through a consistent industry standard approach across Nodal. Need to insulate Market Participants from variations in approach across Nodal systems (NMMS, MMS, CRR, CS, EDW etc..) –Providing RELIABILITY through a robust and reliable web services infrastructure. This infrastructure includes a common approach to message handling, auditing, exception handling, monitoring, notification, disaster recovery and process orchestration. –Providing SECURITY through an enterprise approach to authentication, authorization, data confidentiality and data integrity

External Interface Strategy 5 Functional Requirements Need to provide support for servicing requests from Market Participant software: –A variety of Web services would be provided to enable the processing of requests –Need to continue existing functionality as well as support new Nodal functionality Web Service Patterns –Market Participant initiated requests associated with bid, offers, trades… which must be received by the Market Participant –Awards, obligations, trades and bid submission results, which are published to the Market Participant(s) –Alerts which must be acknowledged –Trade confirmation or rejection –Notifications, which may be sent via web services or without acknowledgement –Large document download/upload request reply (settlement statements, extracts, models etc..)

External Interface Strategy 6 High Level Architecture MMSEMSCRR Enterprise Identity Management & Security NMMS Settle- ments & Billing EDW Web Service Interface Market Participant Simple & Consistent Web services interface Enterprise Integration Layer Reliable Web services infrastructureComprehensive security etc

External Interface Strategy 7 Implementation Approach Define Web services needed for Market Participants to request market information and initiate transactions –Leverage IEC for definition of message –Use the IEC Common Information Model (CIM) where appropriate Provide the means for Market Participant Systems to receive notification messages from ERCOT systems –Leverage OASIS WS-Notifications specification –Participants can decide to pull notifications or have notifications be pushed to them –Requires only two Web service interfaces, due to the nature of use by ERCOT (e.g. subscriptions are predefined and persistent, where there is no need for subscription requests)

External Interface Strategy 8 Application of IEC to Web Services Message structures based upon IEC defined for the input and output of operations (i.e. request and response) Header used for information needed for all messages, includes key control information such as verb, noun and source Request structure has parameters (some required, some optional) that are appropriate for the specific operation Reply structure indicates success, failure and errors as appropriate Payloads can be strongly typed or loosely coupled from message structures, where payloads can be compressed and encoded if needed Message structures used within WSDL Messages form the body of the underlying SOAP message

External Interface Strategy 9 Web Service Message Payloads Message payloads carry the data that is needed for a specific request or reply (e.g. a set of bids and offers) The noun in the message header identifies the type of the payload Payloads can be supplied in one of the following forms: –Any type of XML element of any namespace (with structure typically defined by an XSD) –An XML document that is encoded as a string, compressed and base64 encoded –Other base64 encoded content

External Interface Strategy 10 Asynchronous Messages WS-Notifications is new OASIS standard for publishing messages using Web services Market Participants (notification consumers) can choose to pull (i.e. poll for) notifications, or have them pushed (push is recommended for all Market Participants that can support the Web service receiver) Requires only two Web service interfaces (Notify, GetMessage), due to the nature of use by ERCOT (e.g. subscriptions are persistent) Push consumers must expose a Web service Many different types of notifications can be supported, the consumer can choose how to handle each type

External Interface Strategy 11 Security Requirements Industry good practices –Authentication –Confidentiality-protection –Integrity-protection –Prevent Replay Attacks –Access control –Auditing and logging –Consistent availability and performance Business requirements with security implications –Design a solution that is simple and readily implementable –Use industry standards –Enable leveraging of existing security infrastructure –Provide origin authentication at the transaction level

External Interface Strategy 12 Basic Message Flow Web Services Client Web Services Server 1. Signed SOAP message over HTTP/SSL with mutual authentication Security Infrastructure 2. SSL Certificate validation and authorization check Web Service Message Processor 3. Signed SOAP message Signature verification 4. SOAP Message Certificate validation and authorization check

External Interface Strategy 13 Security Standards Transport level security via SSL/TLS Message level security via signed SOAP messages according to the Web Services Security (WSS) standards

External Interface Strategy 14 Trust Model Use Verisign Trust Network (VTN) Class 3 certificates Provide two levels of authentication –Transport –Message Implementations must ensure that : –Only ERCOT brand of certificate is used –Certificate has not been revoked

External Interface Strategy 15 Authentication Transport-level –Implement mutual authentication via SSL/TLS Message-level –Use OASIS Web Services Security (WSS) 1.1 standards SOAP Message Security X.509 Token Profile –Signing entities are expected to be applications/systems with appropriate certificates

External Interface Strategy 16 Transport Level Confidentiality and Integrity Protection SSL/TLS is required while data travels on the Internet Deployments may implement additional data protection, based on their own security infrastructure Minimum security settings for SSL/TLS –SSL/TLS version MUST be at least 3.0 –The SSL/TLS cipher suite MUST include AES 128 bit for encryption –The SSL/TLS cipher suite MUST include SHA-1 for integrity protection

External Interface Strategy 17 Preventing Replay Attacks Each message must include: –A timestamp as specified by WSS –A random number as specified by WSS Clocks need not be synchronized Typical implementation –Reject expired messages –Cache the nonce for the expected amount of clock skew and reject messages whose nonce is in the cache

External Interface Strategy 18 Implementation-Specific Security Functions Access Control and Auditing –Use authenticated identity of message producer, as determined by the signing certificate of the SOAP message Consistent performance and availability

External Interface Strategy 19 What does this mean to Market Participants? Market Participants MUST –Deploy SSL/TLS Obtain client side certificate –Certificate is issued by Verisign under the ERCOT brand Implement mutual authentication Ensure minimum SSL/TLS security settings –Secure SOAP messages Obtain application/system signing certificate –Certificate is issued by Verisign under the ERCOT brand Sign all SOAP messages Use Web Services Security Standards and its X.509 Certificate Token Profile Message headers MUST include a timestamp and a nonce Validate all SOAP messages –Signature –Certificates –Revocation status of certificates –Timestamp and nonce (to prevent replay attacks)

External Interface Strategy 20 Security Summary Web Services Client will need at most two certificates –SSL/TLS –SOAP Message Signing Security rules are equally applicable to request, reply and notification messages Some security functions are deployment specific and each MP must determine the best method of implementation Implementation of industry standards promotes interoperability and flexibility

External Interface Strategy 21 Delivery Approach In advance of a Nodal go live and in accordance with agreed schedule and dependencies, ERCOT will provide the following: –Interface specifications for web services –Design artifacts, including XML schemas and WSDLs –Source code examples –A sand box environment for testing and validation of the interfaces The interface specifications, artifacts and implementation of the sand box environment would be staged An iterative implementation approach will be used, where feedback from each stage would be used to adjust subsequent stages

External Interface Strategy 22 Technical Interoperability Strategy is to achieve technical interoperability through the use of open standards, including: –W3C standards –OASIS WS-* standards –IEC Common Information Model and related standards (e.g. IEC ) The implementation of Web service interfaces must not be dependent upon any proprietary, third party products Key requirement is that implementation must be possible using tools that support SOAP-based Web Services (e.g. Java and.Net development tools) More details on technical interoperability will be provided as a consequence of existing Web services provided by ERCOT, detailed design and experience with the Sand Box environment

External Interface Strategy 23 Service Level Agreements Different categories of Web services will have different service level agreements The SLAs for some Web services are directly impacted by the variability in the amount of data that can be transferred (e.g. large bid sets) Market Participants will also have SLA obligations as related to Web services for notifications Web Services for bidding: –Must be over X% available for any given trading day –Validation of bid sets will be processed within M1 minutes –Bid set inquiries will be processed within S1 seconds, with an additional S2 seconds per bid Web services for obtaining real-time market information and providing acknowledgments and confirmations: –Must be over X% available for any given trading day –Requests involving less than 10KB data should be processed within S3 seconds, unless otherwise specified for a specific interface Web services for other than real time transactions and information requests: –Must be over Y% available –Requests involving less than 10KB data should be processed within S4 seconds, unless otherwise specified for a specific interface Notification interfaces: –ERCOT will post notifications to a Market Participant within S5 seconds of the time of internal posting –Notification service interface provided by Market Participant should be minimally Y% available for any given trading day. Any ‘downtime’ or periods of inaccessibility will directly impact the timeliness of notifications (e.g. validation of bid sets, alerts, etc.) from ERCOT Note: These values and additional SLAs will be finalized at some point in the future, after the finalization of vendor requirements

External Interface Strategy 24 Auditing, Monitoring and Management ERCOT will perform auditing, monitoring and management for all services it provides Internal auditing by ERCOT will be used to track and insure that SLAs are met by ERCOT All Web service requests will be logged by ERCOT in order to permit calculations related to SLAs The signatures supplied on SOAP messages will be recorded with transactions as a means of non-repudiation ERCOT is not responsible for the monitoring and management of Market Participant software and network connectivity, and therefore can not guarantee that notification interfaces provided by Market Participants are accessible as needed for timely delivery of notifications Delivery of Alerts are guaranteed based on Market Participant acknowledgements

External Interface Strategy 25 Versioning It is important to recognize that new versions of interfaces may be provided over time, largely as a consequence of: –Staging of initial implementation –New requirements –Upgrades to vendor products New versions of interfaces will be manifested by: –Changes to WSDLs –Changes to XML Schemas –Changes to software implementations New versions will be deployed within a Sand Box environment for a testing/trial period WSDL and XML schemas namespaces will include a date reference Messages will use the Header/Revision field to identify a specific revision, in order to enable ERCOT software to handle the desired version of a message definition for a given interface A detailed versioning strategy will be developed and provided to Market Participants as a part of the External Interface Specification

External Interface Strategy 26 Governance The Web service interfaces will be critical to the operations of both ERCOT and Market Participants The Web services will evolve for many reasons, especially as the needs of the market evolve Governance policies and processes will need to be defined for the Web service lifecycle that provide strict guidelines related to: –Design –Implementation –Testing –Deployment A comprehensive governance strategy will need to be developed and implemented by ERCOT with input from the TPTF and the API Subgroup

External Interface Strategy 27 Web Service Configuration Standards ERCOT will configure its Web servers with specific parameters that may be of consequence to use of Web services by Market Participants (e.g. for security) Market Participants will need to set up Web services to handle notifications from ERCOT ERCOT will define specific configuration details and parameters to be used by Market Participants Detailed Web service configuration standards will be provided to Market Participants as identified through detailed design efforts and experience with the Sand Box environment

External Interface Strategy 28 Public Forum A public forum will need to be provided within an ERCOT web site This would provide for: –Posting of interface specifications –Posting of design artifacts (e.g. XML Schemas, WSDLs) –Pages for frequently asked questions (FAQs) –Code examples Some information may not be publicly posted, and would only be available to QSEs (e.g. Security Detailed Design document) Consideration can be given to the use of a UDDI server to support the development efforts of the Market Participants

External Interface Strategy 29 Sand Box Environment Sand Box environment will: –Allow for the testing of machine-to-machine interaction between Market Participants and ERCOT –Provide a platform where interfaces can be incrementally deployed and validated –Mimic the machine-to-machine interaction of the future production environment –Be used for interoperability testing between the Market Participant and ERCOT –Provide a Pre-Market Trial Environment for Texas Nodal Staging of the Sand Box: –First deployment will provide for a simple ‘Who am I?’ service –Next deployment will provide a small set of Web services with a loop back stub –Subsequent deployments would provide incrementally greater functionality

External Interface Strategy 30 Sand Box: ‘Who Am I?’ FirewallFirewall FirewallFirewall Proxy Server SiteMinder TIBCO BUS HTTP Server Policy Server SiteMinder 6 LDAP EIF Oracle 10g Market Participant “Who Am I” Web Service Test Mode Sandbox initially implements a simple ‘Who am I?’ interface for initial connectivity testing

External Interface Strategy 31 Sand Box: ‘Loopback’ FirewallFirewall FirewallFirewall Proxy Server SiteMinder TIBCO BUS HTTP Server Policy Server SiteMinder 6 LDAP EIF Oracle 10g Market Participant MMS POC Web Service Loopback Mode Sandbox implements several interfaces as described by the External Interfaces Specification, with mimic response messages

External Interface Strategy 32 Dependencies and Assumptions All development of external interfaces is dependent upon access to the design documentation related to interfaces provided by ERCOT systems –Need interface specifications from MMS –Need interface specifications from EMS –Need interface specifications from CRR The set of specifications developed in the first quarter of 2007 may need to be modified as project teams update their requirements and design