Middleware, Ten Years In: Vapority into Reality into Virtuality Dr. Ken Klingenstein, Senior Director, Middleware and Security, Internet2 Technologist,

Slides:



Advertisements
Similar presentations
The Basics of Federated Identity. Overview of Federated Identity and Grids Workshop Session 1 - for all Basics and GridShib Session 2 – more for developers.
Advertisements

EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI AAI in EGI Status and Evolution Peter Solagna Senior Operations Manager
TF-EMC2 – Internet2 update Dr. Ken Klingenstein, Senior Director, Middleware and Security, Internet2 Technologist, University of Colorado at Boulder.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Drive-By Dialogues. Presenter’s Name Topics The Long Strange Trip of I2 – NLR Merger A Brief Comment on Optical Networking Middleware Developments Security.
Internet Scale Identity, Collaboration and Higher Education.
Fed-Ed Dec 08: Updates on Federations Dr. Ken Klingenstein, Senior Director, Middleware and Security, Internet2 Technologist, University of Colorado at.
Leading in a new IT environment: Old saws and new technologies.
The Co-mingled Universe of R&E Networking: the reprise Ken Klingenstein Director, Internet2 Middleware and Security Ken Klingenstein Director, Internet2.
Welcome Acknowledgments and thanks Security Acronymny: then and now What’s working What’s proving hard.
Presenter’s Name InCommon Approximately 80 members and growing steadily More than two million “users” Most of the major research institutions (MIT joining.
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
Intro to Identity for Developers Tom Barton, U Chicago Scott Cantor, Ohio State Patrick Michaud, U Washington.
Shib in the present and the future Ken Klingenstein Director, Internet2 Middleware and Security.
Accelerating Events in Internet Identity and Privacy Dr. Ken Klingenstein, Senior Director, Middleware and Security, Internet2 Technologist, University.
Updates on Internet Identity. Topics Consumer marketplace update The big consumer players – OIX - and the other big consumer players.
BfB: Supporting Collaboration with Infrastructure.
EGI-Engage EGI-Engage Engaging the EGI Community towards an Open Science Commons Project Overview 9/14/2015 EGI-Engage: a project.
External Identity and Authorization in GENI. Topics Federated identity and virtual organizations ABAC Creating and transporting attributes.
Digital Object Architecture
PEER (Public End-Entity Registry) (MLS -> SPIT -> BEER -> PEER)
VO Identity, Attributes, and Infrastructure: Some Basics.
Climate Sciences: Use Case and Vision Summary Philip Kershaw CEDA, RAL Space, STFC.
Federated Identity and the International Research Community Dr Ken Klingenstein Director, Internet2 Middleware and Security.
Australian Access Federation and other Middleware Initiatives Presented at TF-EMC2, Prague 4 Sep 2007 Patty McMillan, The University of Queensland.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
Federated Identity: What It Brings to Open Government Dr Ken Klingenstein Director, Internet2 Middleware and Security.
VO and Internet2 Middleware. Presenter’s Name Topics Motivations for Internet2 Middleware work Federated identity and InCommon Other IdM Groups, privileges,
Stuff, including interfederation stuff Dr Ken Klingenstein, Director, Middleware and Security, Internet2.
David L. Wasley Office of the President University of California Shibboleth Safe delivery of reliable authorization data David L. Wasley University of.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
Collaborative Platforms. Collaborations and Virtual Organizations IdM is a critical dimension of collaboration, crossing many applications.
COmanage and InCommon: Present and Future Activities and Interactions Heather Flanagan, COmanage Project Coordinator, Internet2.
A Role for Libraries in Helping Users Manage Collaboration.
Taking Care of Our Core Business: Managing Collaborations Dr. Ken Klingenstein, Senior Director, Internet2 Middleware and Security.
US of A and A Activities Ken Klingenstein, Director Internet2 Middleware Initiative.
Scared Straight… if you want to go outside… Authenticate Locally, Act Globally.
Middleware Futures Internet2 Member Meeting Arlington VA, April 2006 RL “Bob” Morgan, University of Washington and Internet2.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Report and plans Attribute.
Shibboleth Trust Model Shibboleth/SAML Communities (aka Federated Administrations) Club Shib Club Shib Application process Policy decision points at the.
Diego R. Lopez, RedIRIS JRES2005, Marseille On eduGAIN and the Coming GÉANT Middleware Infrastructure.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Interfederation RL “Bob” Morgan University of Washington and Internet2 Internet2 Member Meeting Chicago, Illinois December 2006.
Attribute Release and Scalable Consent \. Part of the original vision for federated identity and necessary for it to succeed Federated identity is less.
June 9, 2009 SURFfederatie: implementing a multi- protocol federation Hans Zandbelt & Joost van Dijk, SURFnet.
© Copyright AARNet Pty Ltd PRAGMA Update & some personal observations James Sankar Network Engineer - Middleware.
Growth. Interfederation PKI is globally scalable Unfortunately, its not locally deployable… Federation is locally deployable Can it.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
INDIGO – DataCloud Security and Authorization in WP5 INFN RIA
Internet identity: Forward in All Directions Dr Ken Klingenstein, Director, Middleware, Internet2.
Collaboration and Federated Identity Two powerful forces being leveraged – the rise of federated identity – the bloom in collaboration tools, most particularly.
AAI for a Collaborative Data Infrastructure
Consent-Informed Attribute Release (CAR) Serving SAML and OIDC/Oauth
InCommon and Federated Identity Update
EGI-Engage Engaging the EGI Community towards an Open Science Commons
The Future of Indoor Plumbing
Fed-Ed Dec 08: Updates on Federations
Context, Gaps and Challenges
BoF: Campus and Federation (and Interfederation) Policy Issues
Observations The phases of Internet-scale invention and the role of market-makers Skill sets for the new world order and nurturing its seed corn in common.
The Attribute and the ecosystem
Presentation transcript:

Middleware, Ten Years In: Vapority into Reality into Virtuality Dr. Ken Klingenstein, Senior Director, Middleware and Security, Internet2 Technologist, University of Colorado at Boulder

Topics Middleware, Ten Years In From Vapor to Reality Some of the successes Some of the failures Middleware, Ten Years Forward From Reality to Virtuality Organizations Resources Communities From Virtuality back to Reality

Before there was middleware apps

First Vapors When end-user PKI was months away… When the big application houses didn’t care about middleware We knew it was something about authentication and authorization We couldn’t agree about much – payloads or protocols or spelling

In the beginning Directories Authentication apps

Dealing with the apps Directories Authentication apps

Filling out the portfolio Directories Authentication Groups Privileges Authorization

Federation Authentication Directories Authentication Directories Federation

COmanage Authentication Directories Authentication Directories Federation

Vapors become Reality When end-user PKI was months away… When the big application houses care so much they have to own it Middleware as the new lock-in point Federation as identity infrastructure and attributes as the payloads IdM not a local industry anymore

Some of the successes Building a fundamental new layer of Internet infrastructure Engaging a broad and growing international group of expertise Crafting a larger world that works for the R&E needs Proving that security and privacy can work together

More successes Focusing on the schema early on Coming together around SAML, and getting the rest of the world to come along… Working towards scaling (rough consensus and running code) Seeing parts of other worlds

Some of the failures The directory of directories… End-to-end end-user PKI Establish resources to support the infrastructure Diagnostics The rest of the middleware stack

Middleware, Ten Years Forward Working on Attributes and Federation Growing our federations Interfederation and Soup The Attribute Ecosystem Learning the Tao of Attributes Building and Managing the Virtual Integration, Integration, Integration

Growing our Federations Deciding on the services Core services – identity/attributes for access controls Value added services – content aggregation, roaming, PKI and SSL services, collaboration platforms, Silver Finding the business models Finding the governance structures Making a marketplace

Interfederation and Soup Interfederation essential to scale Across vertical sectors Internationally To the consumer marketplace Confederation and Overlays will also exist Soup Institutional groups that cut across segments – geography, shared business purpose, etc Mix of special purpose and infrastructure federations tangled

Attribute ecosystem use cases… Obtaining student consent for information release FEMA needing first responders attributes and qualifications dynamically High-confidence attributes Access-ability use cases AAMC step-up authentication possibilities Public input processes Grid relying parties aggregating VO and campus The “IEEE” problem The “over legal age” and the difference in legal ages use cases Self-asserted attributes – friend, interests, preferences, etc

Attribute Ecosystem Key Issues Attribute Aggregation Attribute Metadata Sources of authority and delegation Schema management, mapping, etc User interface Privacy and legal issues

Attribute aggregation Gathering attributes from multiple sources From IdP or several IdP From other sources of authority From intermediaries such as portals Static and dynamic acquisition Many linking strategies Will require a variety of standardized mechanisms – Bulk feeds, user activated links, triggers

Attribute metadata Federated attributes need common meaning Representation of meaning At a system level At a user level LOA associated with the value assigned “Code+data equals programs” LOA itself faces “re-interpretations” Separation of components of LOA Use of “step-up” authentication

Sources of authority Who gets to assign semantics (and syntax) to an area? How can they delegate assignment of value? What needs to be retained for audit/diagnostic

Schema management, mappings Registries for schema Role of national level schema How to avoid mappings How to handle mappings

User Interface “It’s the attributes, urn:mace:incommon:entitlement:clue:zero”, deprecated… Needs include translation of oid to english, to inform of the consequences of release decision, recording consent and getting the defaults right so that this is seldom used Metaphors such as Infocard are useful, but will need extensions and utiization

Privacy management Two approaches emerging uApprove mlhttp:// ml InfoCard/Higgins Who sets attribute release policies? Who overrides the settings? What logs are kept?

GSA Workshop: 属性之道 The Tao of Attributes Begin exploring the attribute issues Using federal use cases, including Citizenship, voting residency Access-abilities First responder capabilities PI-person Motivate the larger requirements, drive privacy policies Explore rich query languages, etc. All-star cast at the end of September at NIH

Virtuality Virtual Communities Virtual Machine Appliances Virtual Services Internet protocols with trust and identity

Virtual Communities A virtual enterprise that wants to play real well with real enterprises. Needs coordinated identity management for collaboration and domain tools

Virtual Machine Appliances Allows clueless groups and other VO’s to handle collaborations Brilliant way to handle peak load requirements Vexing issues of application updates, coordination of configuration among apps, etc. Must fit fully in the attribute ecosystem and reshape themselves on need

Virtual Services Clouds as low-start-up, largely scalable cyber infrastructure Cycles, storage, collaboration Fits into the domestication paradigm Clouds as legally tangled, non-standard,confusion Location and ownership of data Ability to adapt to new protocols Proprietary cloud internals

Integration, Integration and Integration Of types of Internet identity Of identity with protocols Domestication of applications

Internet identity Federated identity Enterprise centric, exponentially growing, privacy preserving, rich attribute mechanisms Requires lawyers, infrastructure, etc User centric identity P2P, rapidly growing, light-weight Marketplace is fractured; products are getting heavier to deal with privacy, attributes, etc. Unifying layers emerging – Cardspace, Higgins, OAuth

Integration Different forms of Internet identity will exist, serving different purposes, arising from different constituencies The trick is the intelligent integration of the technologies, at user and application level Cross-overs are happening Shib and Openid SAML and high assurance PKI – holder of key Infocard/Higgins as an overarching user experience Federation and portal integration

Integration of identity and protocols Trust, Identity and the Internet - ISOC initiative to introduce trust and identity-leveraged capabilities to many RFC’s and protocols Acknowledges the assumptions of the original protocols about the fine nature of our friends on the Internet and the subsequent realities First target area is DKIM; subsequent targets include federated calendaring and sharing, firewall traversal

Domestication of Applications Identity, groups, roles, privileges What else to integrate? At what layers to specify the integration? How to integrate across the layered domestication specifications How much domestication is too much?

Virtuality back into Reality Our use cases continue to lead the corporate sector Our needs are more urgent than they are different Our students become the new consumers The shared vision is more powerful than the individuals who share it

We’ve Lost Some Along the Way…

We’ve Picked Up Some New Ones…

Final Thoughts Important, if somewhat invisible, work has been done There are significant opportunities ahead Its been a ride