INFSO-RI-508833 Enabling Grids for E-sciencE www.eu-egee.org Getting Started Guy Warner NeSC Training Team Induction to Grid Computing and the National.

Slides:



Advertisements
Similar presentations
Introduction of Grid Security
Advertisements

Liang ZHAO, PKU EUChinaGrid 3 rd Tutorial Nov.25, 2006 Authentication and Authorization in gLite Liang ZHAO Peking University.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Grid Computing Basics From the perspective of security or An Introduction to Certificates.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Lecture 2: Security Rachana Ananthakrishnan Argonne National Lab.
Grid Security. Typical Grid Scenario Users Resources.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Security NeSC Training Team International Summer School for Grid Computing, Vico Equense,
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
INFSO-RI Enabling Grids for E-sciencE Security, Authorisation and Authentication Mike Mineter Training, Outreach and Education National.
Grid Security Overview The Globus Project™ Copyright (c) 2002 University of Chicago and The University of Southern California. All.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Use of Kerberos-Issued Certificates at Fermilab Kerberos  PKI Translation Matt Crawford & Dane Skow Fermilab.
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Computer Science Public Key Management Lecture 5.
GRID workshop Enabling Grids for E-sciencE iag.iucc.ac.il PKI, Certificates and CAs – Oh My! Hank Nussbacher Israel InterUniversity Computation.
INFSO-RI Enabling Grids for E-sciencE EGEE Security Basics for the User Guy Warner NeSC Training Team An Induction to EGEE for GOSC.
Web Server Administration Chapter 10 Securing the Web Environment.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Configuring Directory Certificate Services Lesson 13.
Grid Security 1. Grid security is a crucial component Need for secure communication between grid elements  Authenticated ( verify entities are who they.
1 Grid Security. 2 Grid Security Concerns Control access to shared services –Address autonomous management, e.g., different policy in different work groups.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
INFSO-RI Enabling Grids for E-sciencE Sofia, 22 March 2007 Security, Authentication and Authorisation Mike Mineter Training, Outreach.
Module 9: Fundamentals of Securing Network Communication.
Security, Authorisation and Authentication.
Security (and privacy) Larry Rudolph With help from Srini Devedas, Dwaine Clark.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Introduction to GILDA and gaining access.
INFSO-RI Enabling Grids for E-sciencE Security in gLite Gergely Sipos MTA SZTAKI With thanks for some slides to.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
EGEE-II INFSO-RI Enabling Grids for E-sciencE The GILDA training infrastructure.
User Management: Authentication & Authorization on the NorduGrid Balázs Kónya, AndersWäänänen 3 rd NorduGrid Workshop, 23 May, 2002 Helsinki.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
Authorisation, Authentication and Security Guy Warner NeSC Training Team Induction to Grid Computing and the EGEE Project, Vilnius,
EGEE is a project funded by the European Union under contract IST Grid computing Assaf Gottlieb Tel-Aviv University assafgot tau.ac.il
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
INFSO-RI Enabling Grids for E-sciencE GILDA and GENIUS Guy Warner NeSC Training Team An induction to EGEE for GOSC and the NGS NeSC,
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Digital Signatures and Digital Certificates Monil Adhikari.
1 Grid School Module 4: Grid Security. 2 Typical Grid Scenario Users Resources.
Security, Authorisation and Authentication Mike Mineter, Guy Warner Training, Outreach and Education National e-Science Centre
INFSO-RI Enabling Grids for E-sciencE Authorisation and Authentication in gLite Mike Mineter National e-Science Centre, Edinburgh.
EGEE is a project funded by the European Union CA overview and requirements Ognjen Prnjat, Nikos Vogiatzis GRNET EGEE-SEE regional kick-off, April 7-8.
EGEE-II INFSO-RI Enabling Grids for E-sciencE Using Certificate & Simple Job Submission Jinny Chien ASGC.
INFSO-RI Enabling Grids for E-sciencE NPM Security Alistair K Phipps (NeSC) JRA4 Face To Face, CERN, Geneva.
Shibboleth Use at the National e-Science Centre Hub Glasgow at collaborating institutions in the Shibboleth federation depending.
X509 Web Authentication From the perspective of security or An Introduction to Certificates.
The NGS Portal Guy Warner NeSC Training.
EGEE-II INFSO-RI Enabling Grids for E-sciencE Authentication, Authorisation and Security Mike Mineter, National e-Science Centre.
EGEE-II INFSO-RI Enabling Grids for E-sciencE Authentication, Authorisation and Security Emidio Giorgio INFN Catania.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
INFSO-RI Enabling Grids for E-sciencE Sofia, 17 March 2009 Security, Authentication and Authorisation Mike Mineter Training, Outreach.
Security, Authorisation and Authentication Mike Mineter,
Chapter 40 Internet Security.
Authentication, Authorisation and Security
Grid Security.
Security, Authorisation and Authentication
Grid Security Jinny Chien Academia Sinica Grid Computing.
CERN Certificates platform Emmanuel Ormancey / Anatoly Gladkov
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
Grid School Module 4: Grid Security
Grid Security Overview
Grid Security Infrastructure
Presentation transcript:

INFSO-RI Enabling Grids for E-sciencE Getting Started Guy Warner NeSC Training Team Induction to Grid Computing and the National Grid Service 10 th -11 th March 2005

Enabling Grids for E-sciencE INFSO-RI Induction to Grid Computing and the National Grid Service, NeSC, 10th-11th March Acknowledgements Some of the slides in this presentation are based on / motivated by: The presentation given by Carl Kesselman at the GGF Summer School This presentation may be found at – curriculum.htm Lectures given by Richard Sinott and John Watt at the University of Glasgow. These lectures may be found at – The presentation given by Simone Campana of CERN at First Latinamerican Grid Workshop, Merida, Venezuela. This presentation may be found at –

Enabling Grids for E-sciencE INFSO-RI Induction to Grid Computing and the National Grid Service, NeSC, 10th-11th March The Problem Question: How does a user securely access the Resource without having an account on the machines in between or even on the Resource? Question: How does the Resource know who a user is and that they are allowed access? User Resource

Enabling Grids for E-sciencE INFSO-RI Induction to Grid Computing and the National Grid Service, NeSC, 10th-11th March Overview Grid Security Infrastructure Authentication Encryption & Data Integrity Authorization Security

Enabling Grids for E-sciencE INFSO-RI Induction to Grid Computing and the National Grid Service, NeSC, 10th-11th March Approaches to Security: 1 The Poor Security House

Enabling Grids for E-sciencE INFSO-RI Induction to Grid Computing and the National Grid Service, NeSC, 10th-11th March Approaches to Security: 2 The Paranoid Security House

Enabling Grids for E-sciencE INFSO-RI Induction to Grid Computing and the National Grid Service, NeSC, 10th-11th March Approaches to Security: 3 The Realistic Security House

Enabling Grids for E-sciencE INFSO-RI Induction to Grid Computing and the National Grid Service, NeSC, 10th-11th March Approaches to Grid Security The Poor Security Approach: –Use unencrypted communications. –No or poor (easily guessed) identification means. –Private identification (key) left in publicly available location. The Paranoid Security Approach: –Don’t use any communications (no network at all). –Don’t leave computer unattended. The Realistic Security Approach: –Encrypt all sensitive communications –Use difficult to break identification means. –Keep identification secure at all times (e.g. encrypted on a memory stick). –Only allow access to trusted users.

Enabling Grids for E-sciencE INFSO-RI Induction to Grid Computing and the National Grid Service, NeSC, 10th-11th March The Risks of Poor User Security Launch attacks to other sites –Large distributed farms of machines, perfect for launching a Distributed Denial of Service attack. Illegal or inappropriate data distribution and access sensitive information –Massive distributed storage capacity ideal for example, for swapping movies. Damage caused by viruses, worms etc. –Highly connected infrastructure means worms spread faster than on the internet in general.

Enabling Grids for E-sciencE INFSO-RI Induction to Grid Computing and the National Grid Service, NeSC, 10th-11th March Authentication and Authorization Authentication –Are you who you claim to be? Authorisation –Do you have access to the resource you are connecting to? John Doe 755 E. Woodlawn Urbana IL Jane

Enabling Grids for E-sciencE INFSO-RI Induction to Grid Computing and the National Grid Service, NeSC, 10th-11th March The Trust Model Certification Domain A Server XServer Y Policy Authority Policy Authority Task Domain B Sub-Domain A1 GSI Certification Authority Sub-Domain B1 Authority Federation Service Virtual Organization Domain No Cross- Domain Trust slide based on presentation given by Carl Kesselman at GGF Summer School 2004

Enabling Grids for E-sciencE INFSO-RI Induction to Grid Computing and the National Grid Service, NeSC, 10th-11th March INSECURE SECURE Public Private Key Life Savings Alice Bob Life Savings Private KeyMessage Public Key

Enabling Grids for E-sciencE INFSO-RI Induction to Grid Computing and the National Grid Service, NeSC, 10th-11th March Public Key Infrastructure (PKI) PKI allows you to know that a given key belongs to a given user. PKI builds off of asymmetric encryption: –Each entity has two keys: public and private. –Data encrypted with one key can only be decrypted with other. –The public key is public. –The private key is known only to the entity. The public key is given to the world encapsulated in a X.509 certificate. slide based on presentation given by Carl Kesselman at GGF Summer School 2004

Enabling Grids for E-sciencE INFSO-RI Induction to Grid Computing and the National Grid Service, NeSC, 10th-11th March Certificates Similar to passport or driver’s license: Identity signed by a trusted party Name Issuer Public Key Signature slide based on presentation given by Carl Kesselman at GGF Summer School 2004 John Doe 755 E. Woodlawn Urbana IL BD Male 6’0” 200lbs GRN Eyes State of Illinois Seal

Enabling Grids for E-sciencE INFSO-RI Induction to Grid Computing and the National Grid Service, NeSC, 10th-11th March Certificate Authorities A small set of trusted entities known as Certificate Authorities (CAs) are established to sign certificates A Certificate Authority is an entity that exists only to sign user certificates Users authenticate themselves to CA, for example by use of their Passport or Identity Card. The CA signs it’s own certificate which is distributed in a secure manner. Name: CA Issuer: CA CA’s Public Key CA’s Signature slide based on presentation given by Carl Kesselman at GGF Summer School 2004

Enabling Grids for E-sciencE INFSO-RI Induction to Grid Computing and the National Grid Service, NeSC, 10th-11th March Delegation and Certificates Delegation : The act of giving an organization, person or service the right to act on your behalf. For example: A user delegates their authentication to a service to allow programs to run on remote sites. Stage1: Low Frequency Stage2: Medium Frequency Stage3: High Frequency ServiceCA Certificate Signs own User Certificate signs Proxy Certificate signs

Enabling Grids for E-sciencE INFSO-RI Induction to Grid Computing and the National Grid Service, NeSC, 10th-11th March User Authorisation to Access Resource slide based on presentation given by Carl Kesselman at GGF Summer School 2004

Enabling Grids for E-sciencE INFSO-RI Induction to Grid Computing and the National Grid Service, NeSC, 10th-11th March User Responsibilities Keep your private key secure. Do not loan your certificate to anyone. Report to your local/regional contact if your certificate has been compromised. Do not launch a delegation service for longer than your current task needs. If your certificate or delegated service is used by someone other than you, it cannot be proven that it was not you.

Enabling Grids for E-sciencE INFSO-RI Induction to Grid Computing and the National Grid Service, NeSC, 10th-11th March Summary via Certificates and Delegated Services Authentication Authorisation delegated to VO. Resource User

Enabling Grids for E-sciencE INFSO-RI Induction to Grid Computing and the National Grid Service, NeSC, 10th-11th March The Practical In your information pack is a sheet containing the details for logging on to your workstation and the passwords needed for logging on to your account on lab-07 – the server to be used in this tutorial. Login to your workstation Use the putty program (on your desktop) to connect to lab-07 Open a browser window to Follow the instructions from there.