VOStore meetings, 2005-03-07 Slide 1 Ticket-based access control for VOStore? Guy Rixon March 2005.

Slides:



Advertisements
Similar presentations
Lousy Introduction into SWITCHaai
Advertisements

Introduction of Grid Security
A PPARC funded project Single Sign-On Proposal Guy Rixon IVOA Interoperability Meeting Cambridge MA, May 2004.
Single sign-on authentication: introduction GWS-WG session, IVOA interop meeting, Kyoto, May 2005 Guy Rixon.
Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
Click to edit Master title style HEALTH INFORMATION 1 Identity & Access Management Presenter: Mike Davis (760) January 09, 2007.
© 2006 Open Grid Forum OGF19 Federated Identity Rule-based data management Wed 11:00 AM Mountain Laurel Thurs 11:00 AM Bellflower.
Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
A PPARC funded project AstroGrid Framework Consortium meeting, Dec 14-15, 2004 Edinburgh Tony Linde Programme Manager.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
EMI Development Plans for Identity Management Henri Mikkonen / HIP Moonshot, Grid and HPC Workshop London, UK.
FI-WARE Testbed Access Control temporary solution.
Digital Certificate Installation & User Guide For Class-2 Certificates.
1 State Records Center Searching and Requesting Inventory  Versatile web address:  Look for any new ‘Special.
Web Service Security CS409 Application Services Even Semester 2007.
MyProxy: A Multi-Purpose Grid Authentication Service
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 23: Internet Authentication Applications.
Lecture 23 Internet Authentication Applications
Andrew McNab - EDG Access Control - 14 Jan 2003 EU DataGrid security with GSI and Globus Andrew McNab University of Manchester
Understanding Security Lesson 6. Objective Domain Matrix Skills/ConceptsMTA Exam Objectives Understanding the System.Security Namespace Understand the.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
X-Road (X-tee) A platform-independent secure standard interface between databases and information systems to connect databases and information systems.
X.509 Certificate management in.Net By, Vishnu Kamisetty
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
©Copyrights 2011 Eom, Hyeonsang All Rights Reserved Distributed Information Processing 20 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Unit 1: Protection and Security for Grid Computing Part 2
Grid Security 1. Grid security is a crucial component Need for secure communication between grid elements  Authenticated ( verify entities are who they.
SAML CCOW Work Item HL7 Working Group Meeting San Antonio - January 2008 Presented by: David Staggs, JD CISSP VHA Office of Information Standards.
INFSO-RI Enabling Grids for E-sciencE Sofia, 22 March 2007 Security, Authentication and Authorisation Mike Mineter Training, Outreach.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Harshavardhan Achrekar - Grad Student Umass Lowell presents 1 Scenarios Authentication Patterns Direct Authentication v/s Brokered Authentication Kerberos.
SAML: An XML Framework for Exchanging Authentication and Authorization Information + SPML, XCBF Prateek Mishra August 2002.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
Access Control and Markup Languages Pages 183 – 187 in the CISSP 1.
The TAOS Authentication System: Reasoning Formally About Security Brad Karp UCL Computer Science CS GZ03 / M th November, 2008.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Authentication and Authorization Architecture for AstroGrid and the VO Guy Rixon Tony Linde Elizabeth Auden Nic Walton TIVO, June 2002.
A PPARC funded project Report from grid/web service WG Guy Rixon IVOA interoperability meeting Cambridge MA, May 2004.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
GWS-WG agenda and meeting goals Agenda Summary of reference implementations VOStore progress VOStore issues and plans –How to reconcile VOStore and VOSpace?
Copyright © 2003 Jorgen Thelin / Cape Clear Software 1 A Web Services Security Framework Jorgen Thelin Chief Scientist Cape Clear Software Inc.
Grid Authorization Landscape and Futures Von Welch NCSA
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Pkiuniversity.com. Alice Bob Honest Abe’s CA Simple PKI hierarchy.
Grid technology Security issues Andrey Nifatov A hacker.
Understanding Security
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
Fall 2006CS 395: Computer Security1 Key Management.
Security and Delegation The Certificate Perspective Jens Jensen Rutherford Appleton Laboratory Workshop at NIKHEF, 27 April 2010.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
INFSO-RI Enabling Grids for E-sciencE Sofia, 17 March 2009 Security, Authentication and Authorisation Mike Mineter Training, Outreach.
Unified Identity for Access Control Carl Ellison 7 April 2011 IDtrust.
Fourth Edition by William Stallings Lecture slides by Lawrie Brown
Hypertext Transfer Protocol
Outline What does the OS protect? Authentication for operating systems
Outline What does the OS protect? Authentication for operating systems
Azure AD Line Of Business Application Integration
The New Virtual Organization Membership Service (VOMS)
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
Presentation transcript:

VOStore meetings, Slide 1 Ticket-based access control for VOStore? Guy Rixon March 2005

VOStore meetings, Slide 2 We hold the following to be self-evident… VOStores need to be secure against misuse We want a single-sign-on system We have astro communities as sign-on points We want global interoperablity of VO stuff We want to interoperate with other systems (grid, D-Space, SRB, etc.) We (sometimes) want to do automated stuff We want detailed control of user privs Security is not simple!

VOStore meetings, Slide 3 Basic requirements Data are owned Do only operations authorized by data owner(s) E.g. check CRUD permissions E.g. check users share of group quota Storage is owned Do only operations authorized by storage owner(s) E.g. check user membership of authorized group E.g. check group quota

VOStore meetings, Slide 4 Delegation chain User User agent Workflow agent/service broker DSA/data processing VOStore User never talks to VOStore directly. Hence, need to associate chain of agents with users will to use VOStore

VOStore meetings, Slide 5 Identity delegation Service S trusts user U. U trusts agent A. U lets A authenticate as U. => S trusts U as much as A. => A can do anything U can to S. => A could misuse Us privileges. => U doesnt need to know which privileges are required. Agent A Service S User U

VOStore meetings, Slide 6 Privilege delegation Service S trusts user U. U does not entirely trust agent A. U gives A a ticket authorizing a specific action. Ticket is specific to A. A authenticates to S as itself. A gives S the ticket. => S allows A only the actions in the ticket. => A cant misuse Us privilege => U needs to know what tickets are required Agent A Service S User U

VOStore meetings, Slide 7 Delegation: trust boundaries Trust with ID Trust with ticket All agents/services UA Workflow DSA/data proc VOStore SSO

VOStore meetings, Slide 8 Proposal Access to VOStores should be controlled by tickets. Agents authenticate as agents, not as users. Tickets link agent identity to user identity. Tickets are warrants (digitally-signed statements). Tickets have globally-unique-for-all-time names. Tickets can express authorization constraints, e.g. quota usage managed by user group. Special case: identity warrant delegates all privileges associated with user identity.

VOStore meetings, Slide 9 How to send a ticket to a service Send the ticket with the request Agent A puts text of ticket in request to service S. E.g. WS-Security stuff in SOAP headers. Send the ticket in advance Agent A1, trusted by service S, sends a ticket in respect of untrusted agent A2. A2 gives name of ticket in request Works for HTTP-get as well as SOAP. Use a referee Agent A sends a ticket name and name of referee R, trusted by service S. S gets the ticket from R.

VOStore meetings, Slide 10 Authentication redefined Not: Is this agent acting on behalf of the user? But: Does this agent have a right to use the ticket? Two ways to check: 1.Ticket is associated with agents crypto key-pair. 2.Name of ticket is a secret Use the name as a temporary password. Works best with single-use tickets.

VOStore meetings, Slide 11 Community as source of tickets (1) User agentCommunityAgentVOStore Issue ticket {ticket, key-pair} Do something (ticket, key-pair) put (ticket,signature)

VOStore meetings, Slide 12 Community as source of tickets (2) User agentCommunityAgentVOStore Issue ticket Do something (ticket-name, key-pair) Authorize(ticket,public key) {ticket-name, key-pair} Put (ticket-name, signature)

VOStore meetings, Slide 13 Community as source of tickets (3) User agentCommunityAgentVOStore Issue ticket {ticket-name} Do something (ticket-name, referee) Put(ticket-name, referee) Get ticket (ticket-name) {ticket}