Managing Credentials with MyProxy Jim Basney National Center for Supercomputing Applications University of Illinois

Slides:



Advertisements
Similar presentations
GridWorld 2006 Use of MyProxy for the FusionGrid Mary Thompson Monte Goode GridWorld 2006.
Advertisements

National Center for Supercomputing Applications MyProxy and NVO or Web SSO for Grid Portals GlobusWorld 2006 Washington, DC, USA September 12, 2006 Mike.
MyProxy Jim Basney Senior Research Scientist NCSA
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
MyProxy: A Multi-Purpose Grid Authentication Service
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Lecture 2: Security Rachana Ananthakrishnan Argonne National Lab.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 23: Internet Authentication Applications.
Lecture 23 Internet Authentication Applications
Jim Basney GSI Credential Management with MyProxy GGF8 Production Grid Management RG Workshop June.
Military Technical Academy Bucharest, 2006 GRID SECURITY INFRASTRUCTURE (GSI) - Globus Toolkit - ADINA RIPOSAN Department of Applied Informatics.
Grid Security. Typical Grid Scenario Users Resources.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
PKI Single Sign On & Auto Provisioning Frank Siebenlist (ANL) Rachana Ananthakrishnan (ANL) Charles Bacon (ANL)
National Center for Supercomputing Applications Integrating MyProxy with Site Authentication Jim Basney Senior Research Scientist National Center for Supercomputing.
Kerberos and PKI Cooperation Daniel Kouřil, Luděk Matyska, Michal Procházka Masaryk University AFS & Kerberos Best Practices Workshop 2006.
National Center for Supercomputing Applications MyProxy and GSISSH Update Von Welch National Center for Supercomputing Applications University of Illinois.
Deploying the TeraGrid PKI Grid Forum Korea Winter Workshop December 1, 2003 Jim Basney Senior Research Scientist National Center for Supercomputing Applications.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
GGF15 Workshop MyProxy Integration with PubCookie Marty Humphrey*, Jim Jokl*, and Jim Basney** *Department of Computer Science, University of Virginia,
National Center for Supercomputing Applications University of Illinois at Urbana-Champaign This material is based upon work supported by the National Science.
Understanding Active Directory
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Chapter 11: Active Directory Certificate Services
Federated Access to US CyberInfrastructure Jim Basney CILogon This material is based upon work supported by the National Science Foundation.
Use of Kerberos-Issued Certificates at Fermilab Kerberos  PKI Translation Matt Crawford & Dane Skow Fermilab.
Single Sign-On for Java Web Start Applications Using MyProxy Terry Fleury, Jim Basney, and Von Welch November 3, 2006.
MyProxy NMI Integration Jim Basney, NCSA Marty Humphrey, University of Virginia
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
11 CERTIFICATE SERVICES AND SECURE AUTHENTICATION Chapter 10.
TeraGrid ’06 National Center for Supercomputing Applications Managing Credentials on the TeraGrid with MyProxy Jim Basney.
National Computational Science National Center for Supercomputing Applications National Computational Science MyProxy: An Online Credential Repository.
Distributed Web Security for Science Gateways Jim Basney In collaboration with: Rion Dooley Jeff Gaynor
TeraGrid Science Gateways: Scaling TeraGrid Access Aaron Shelmire¹, Jim Basney², Jim Marsteller¹, Von Welch²,
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Unit 1: Protection and Security for Grid Computing Part 2
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
National Computational Science National Center for Supercomputing Applications National Computational Science NCSA-IPG Collaboration Projects Overview.
Module 9: Fundamentals of Securing Network Communication.
GridShib and MyProxy Grid Credential Management and Identity Federation Von Welch NCSA
Federated Environments and Incident Response: The Worst of Both Worlds? A TeraGrid Perspective Jim Basney Senior Research Scientist National Center for.
Using the MyProxy Online Credential Repository Jim Basney National Center for Supercomputing Applications University of Illinois
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Tutorial: Building Science Gateways TeraGrid 08 Tom Scavo, Jim Basney, Terry Fleury, Von Welch National Center for Supercomputing.
An OGSI CredentialManager Service Jim Basney, Shiva Shankar Chetan, Feng Qin, Sumin Song, Xiao Tu National Center for Supercomputing Applications, University.
National Computational Science National Center for Supercomputing Applications National Computational Science Credential Management in the Grid Security.
Identity Federation and Attribute-based Authorization through the Globus Toolkit, Shibboleth, GridShib, and MyProxy Tom Barton 1, Jim Basney 2, Tim Freeman.
The MyProxy Online Credential Repository Jim Basney NCSA
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
Leveraging the InCommon Federation to access the NSF TeraGrid Jim Basney Senior Research Scientist National Center for Supercomputing Applications University.
Tools for Grid/Campus Integration: GridShib and MyProxy Internet2 Advanced Camp July 1, 2005 Von Welch
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Fermilab CA Infrastructure EDG CA Managers Mtg June 13, 2003.
Module 13: Enterprise PKI Active Directory Certificate Services (AD CS)
National Computational Science National Center for Supercomputing Applications National Computational Science Integration of the MyProxy Online Credential.
Office of Science U.S. Department of Energy Grid Security at NERSC/LBL Presented by Steve Chan Network, Security and Servers
1 Grid School Module 4: Grid Security. 2 Typical Grid Scenario Users Resources.
Using the MyProxy Online Credential Repository Jim Basney National Center for Supercomputing Applications University of Illinois
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
The GRIDS Center, part of the NSF Middleware Initiative Grid Security Overview presented by Von Welch National Center for Supercomputing.
EGI-InSPIRE RI Grid Training for Power Users EGI-InSPIRE N G I A E G I S Grid Training for Power Users Institute of Physics Belgrade.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
1 Example security systems n Kerberos n Secure shell.
Authentication, Authorisation and Security
Grid Security.
Use of MyProxy for the FusionGrid
Presentation transcript:

Managing Credentials with MyProxy Jim Basney National Center for Supercomputing Applications University of Illinois

SC05http://myproxy.ncsa.uiuc.edu/2 What is MyProxy? l A service for managing X.509 PKI credentials u A credential repository and certificate authority l An Online Credential Repository u Issues short-lived X.509 Proxy Certificates u Long-lived private keys never leave the server l An Online Certificate Authority u Issues short-lived X.509 End Entity Certificates l Supporting multiple authentication methods u Passphrase, Certificate, PAM, SASL, Kerberos l Open Source Software u Included in Globus Toolkit 4.0 and CoG Kits u C, Java, Python, and Perl clients available

SC05http://myproxy.ncsa.uiuc.edu/3 MyProxy Logon l Authenticate to retrieve PKI credentials u End Entity or Proxy Certificate u Trusted CA Certificates u Certificate Revocation Lists (CRLs) l MyProxy maintains the user’s PKI context u Users don’t need to manage long-lived credentials u Enables server-side monitoring and policy enforcement (ex. passphrase quality checks) u CA certificates & CRLs updated automatically at login

SC05http://myproxy.ncsa.uiuc.edu/4 MyProxy Authentication l Key Passphrase l X.509 Certificate u Used for credential renewal l Pluggable Authentication Modules (PAM) u Kerberos password u One Time Password (OTP) u Lightweight Directory Access Protocol (LDAP) password l Simple Authentication and Security Layer (SASL) u Kerberos ticket (SASL GSSAPI)

SC05http://myproxy.ncsa.uiuc.edu/5 MyProxy Online Credential Repository l Stores X.509 End Entity and Proxy credentials u Private keys encrypted with user-chosen passphrases u Credentials may be stored directly or via proxy delegation u Users can store multiple credentials from different CAs l Access to credentials controlled by user and administrator policies u Set authentication requirements u Control whether credentials can be retrieved directly or if only proxy delegation is allowed u Restrict lifetime of retrieved proxy credentials l Can be deployed for a single user, a site, a virtual organization, a resource provider, a CA, etc.

SC05http://myproxy.ncsa.uiuc.edu/6 MyProxy Online Certificate Authority l Issues short-lived X.509 End Entity Certificates u Leverages MyProxy authentication mechanisms u Compatible with existing MyProxy clients l Ties in to site authentication and accounting u Using PAM and/or Kerberos authentication u “Gridmap” file maps username to certificate subject l LDAP support under development l Avoid need for long-lived user keys l Server can function as both CA and repository u Issues certificate if no credentials for user are stored

SC05http://myproxy.ncsa.uiuc.edu/7 PKI Overview l Public Key Cryptography u Sign with private key, verify signature with public key u Encrypt with public key, decrypt with private key l Key Distribution u Who does a public key belong to? u Certification Authority (CA) verifies user’s identity and signs certificate u Certificate is a document that binds the user’s identity to a public key l Authentication u Signature [ h ( random, … ) ] Subject: CA signs Issuer: CA Subject: Jim Issuer: CA

SC05http://myproxy.ncsa.uiuc.edu/8 PKI Enrollment CAUser Generate new key pair Sign new end entity certificate User Certificate request CA User CA

SC05http://myproxy.ncsa.uiuc.edu/9 Proxy Credentials l RFC 3820: Proxy Certificate Profile l Associate a new private key and certificate with existing credentials l Short-lived, unencrypted credentials for multiple authentications in a session u Restricted lifetime in certificate limits vulnerability of unencrypted key l Credential delegation (forwarding) without transferring private keys CAUser Proxy A signs Proxy B signs

SC05http://myproxy.ncsa.uiuc.edu/10 Proxy Delegation DelegatorDelegatee Generate new key pair Sign new proxy certificate Proxy Proxy certificate request Proxy

SC05http://myproxy.ncsa.uiuc.edu/11 MyProxy Repository MyProxy server Credential repository Retrieve proxy Store proxy Proxy delegation over private TLS channel MyProxy client

SC05http://myproxy.ncsa.uiuc.edu/12 MyProxy Certificate Authority MyProxy server Retrieve certificate Private TLS channel MyProxy client CA Site Authentication Service PAM

SC05http://myproxy.ncsa.uiuc.edu/13 MyProxy: Credential Mobility myproxy.teragrid.org tg-login.uc.teragrid.org tg-login.purdue.teragrid.org tg-login.sdsc.teragrid.org tg-login.ncsa.teragrid.orgca.ncsa.uiuc.edu Obtain certificate Store proxy Retrieve proxy tg-login.ornl.teragrid.org tg-login1.iu.teragrid.org tg-login.psc.teragrid.org

SC05http://myproxy.ncsa.uiuc.edu/14 MyProxy and Grid Portals

SC05http://myproxy.ncsa.uiuc.edu/15 User Registration Portals PURSE: Portal-based User Registration Service GAMA: Grid Account Management Architecture ESG

SC05http://myproxy.ncsa.uiuc.edu/16 MyProxy: Key Upload/Download l Store and retrieve keys and certificates directly over the network u Encrypted keys transferred over SSL/TLS encrypted channel u In contrast to using proxy delegation l Allows storing end-entity credentials l Key retrieval must be explicitly enabled by server administrator and key owner

SC05http://myproxy.ncsa.uiuc.edu/17 Credential Renewal l Long-lived jobs or services need credentials u Task lifetime is difficult to predict l Don’t want to delegate long-lived credentials u Fear of compromise l Instead, renew credentials as needed during the job’s lifetime u Renewal service provides a single point of monitoring and control l Renewal policy can be modified at any time u Disable renewals if compromise is detected or suspected u Disable renewals when jobs complete

SC05http://myproxy.ncsa.uiuc.edu/18 MyProxy: Credential Renewal MyProxy server Condor-G / Renewal Service Submit job Globus gatekeeper Submit job Retrieve proxy Refresh proxy Daniel Kouril and Jim Basney, "A Credential Renewal Service for Long-Running Jobs," 6th IEEE/ACM International Workshop on Grid Computing (Grid 2005), Seattle, WA, November 13-14, 2005.

SC05http://myproxy.ncsa.uiuc.edu/19 MyProxy and Pubcookie l Combine web and grid single sign-on u Authenticate to MyProxy with Pubcookie granting cookie Coming soon! Jonathan Martin, Jim Basney, and Marty Humphrey, "Extending Existing Campus Trust Relationships to the Grid through the Integration of Pubcookie and MyProxy," 2005 International Conference on Computational Science (ICCS 2005), Emory University, Atlanta, GA, May 22-25, MyProxy server Pubcookie Login Server Campus Authentication Server Verify login Web Application Server Browser Retrieve proxy Redirect to authenticate and obtain granting cookie

SC05http://myproxy.ncsa.uiuc.edu/20 Example: TeraGrid User Portal l Use TeraGrid-wide Kerberos username and password for portal authentication u Obtain PKI credentials for resource access across TeraGrid sites via portal & externally l Plan to use MyProxy CA with Kerberos PAM authentication u Leverage existing NCSA Online CA

SC05http://myproxy.ncsa.uiuc.edu/21 Example: LTER Grid Pilot Study l Build a portal for environmental acoustics analysis l Leverage existing LDAP usernames and passwords for portal authentication u Obtain PKI credentials for job submission and data transfer u Using MyProxy PAM LDAP authentication Long Term Ecological Research Network Information System

SC05http://myproxy.ncsa.uiuc.edu/22 Example: NERSC OTP PKI l Address usability issues for One Time Passwords u Obtain session credentials using OTP authentication l Prototyping MyProxy CA with PAM Radius authentication u ESnet Radius Authentication Fabric federates OTP authentication across sites National Energy Research Scientific Computing Center

SC05http://myproxy.ncsa.uiuc.edu/23 MyProxy Security l Keys encrypted with user-chosen passwords u Server enforces password quality u Passwords are not stored l Dedicated server less vulnerable than desktop and general-purpose systems u Professionally managed, monitored, locked down l Users retrieve short-lived credentials u Generating new proxy keys for every session l All server operations logged to syslog l Caveat: Private key database is an attack target u Compare with status quo

SC05http://myproxy.ncsa.uiuc.edu/24 Hardware-Secured MyProxy M. Lorch, J. Basney, and D. Kafura, "A Hardware-secured Credential Repository for Grid PKIs," 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid), April IBM 4758 MyProxy Server Retrieve proxy Proxy request Proxy certificate l Protect keys in tamper-resistant cryptographic hardware PKCS#11 Experimental

SC05http://myproxy.ncsa.uiuc.edu/25 MyProxy Server Administration l Install server certificate and CA certificate(s) l Configure /etc/myproxy-server.config policy u Template provided with examples l Optionally: u Configure password quality enforcement u Install cron script to delete expired credentials l Install boot script and start server u Example boot script provided l Use myproxy-admin commands to manage server u Reset passwords, query repository, lock credentials

SC05http://myproxy.ncsa.uiuc.edu/26 MyProxy Server Policies l Who can store credentials? u Restrict to specific users or CAs u Restrict to administrator only l Who can retrieve credentials? u Allow anyone with correct password u Allow only trusted services / portals l Maximum lifetime of retrieved credentials server-wide and per-credential

SC05http://myproxy.ncsa.uiuc.edu/27 MyProxy Server Replication l Primary/Secondary model (like Kerberos) u If primary is down, fail-over to secondary for credential retrieval u Store, delete, and change passphrase on primary only u Client-side fail-over under development l Simple configuration u Run myproxy-replicate via cron u Alternatively, use rsync over ssh Coming soon!

SC05http://myproxy.ncsa.uiuc.edu/28 Related Work l GT4 Delegation Service u Protocol based on WS-Trust and WSRF l UVA CredEx u WS-Trust credential exchange service l SACRED (RFC 3767) Credential Repository u l Kerberized Online CA (KX.509/KCA) u Kerberos -> PKI l Kerberos PKINIT u PKI -> Kerberos

SC05http://myproxy.ncsa.uiuc.edu/29 MyProxy Community l MyProxy is an open source, community project u Many contributions from outside NCSA l mailing list l Bug tracking: l Anonymous CVS access l Contributions welcome! u Feature requests, bug reports, patches, etc. u Please report your experiences

SC05http://myproxy.ncsa.uiuc.edu/30 Thank you! Questions/Comments? Contact: