Profile for Portal-based Credential Services (POCS) Yoshio Tanaka International Grid Trust Federation APGrid PMA AIST.

Slides:



Advertisements
Similar presentations
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Advertisements

Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Academia Sinica Grid Computing Certification Authority (ASGCCA) Yuan, Tein Horng Academia Sinica Computing Centre 13 June 2003.
CNIC Grid CA/SDG CA Self Audit Kejun (Kevin) Dong Computer Network Information Center (CNIC) Chinese Academy of Sciences APGridPMA F2F.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
David L. Wasley Office of the President University of California A PKI Certificate Policy for Higher Education A Work in Progress Draft David L.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
1 REUNA Certificate Authority Juan Carlos Martínez REUNA Chile Rio de Janeiro,27/03/2006, F2F meeting, TAGPMA.
National Institute of Advanced Industrial Science and Technology Auditing, auditing template and experiences on being audited Yoshio Tanaka
NRENs supporting Grids using current Grid technology TERENA NREN-GRID Workshop Amsterdam Milan Sova CESNET.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
David L. Wasley Office of the President University of California Higher Ed PKI Certificate Policy David L. Wasley University of California I2 Middleware.
NECTEC-GOC CA APGrid PMA face-to-face meeting. October, Sornthep Vannarat National Electronics and Computer Technology Center, Thailand.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
WebTrust SM/TM Principles and Criteria for Certification Authorities CA Trust Jeff
National Institute of Advanced Industrial Science and Technology Self-audit report of AIST GRID CA Yoshio Tanaka Information.
+1 (801) Standards for Registration Practices Statements IGTF Considerations.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
FP6−2004−Infrastructures−6-SSA E-infrastructure shared between Europe and Latin America The Brazilian Grid Certification Authority.
DataGrid WP6 CA meeting, CERN, 12 December 2002 IISAS Certification Authority Jan Astalos Department of Parallel and Distributed Computing Institute of.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
National Institute of Advanced Industrial Science and Technology Brief status report of AIST GRID CA APGridPMA Singapore September 16 Yoshio.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
NECTEC-GOC CA Self Audit 7 th APGrid PMA Face-to-Face meeting March 8 th, 2010 Large-Scale Simulation Research Laboratory Sornthep Vannarat Large-Scale.
National Center for Supercomputing Applications University of Illinois at Urbana-Champaign NCSA Two Factor CA Jim Basney
A Brief Overview of draft-ietf-sidr-cp-01.txt draft-ietf-sidr-cps-rirs-01.txt draft-ietf-sidr-cps-isp-00.txt Steve Kent BBN Technologies.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Sam Morrison APAC CA – APGridPMA - ISGC2010 APAC CA Self Audit and status update Sam Morrison ARCS.
HEPSYSMAN UCL, 26 Nov 2002Jens G Jensen, CLRC/RAL UK e-Science Certification Authority Status and Deployment.
Academia Sinica Grid Computing Certification Authority (ASGCCA)
Academia Sinica Grid Computing Certification Authority (ASGCCA) Academia Sinica Computing Centre.
All Hands Meeting 2005 BIRN Portal Architecture: Security Jana Nguyen
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Academia Sinica Grid Computing Certification Authority (ASGCCA) Academia Sinica Computing Centre.
NECTEC-GOC CA The 3 rd APGrid PMA face-to-face meeting. June, Suriya U-ruekolan National Electronics and Computer Technology Center, Thailand.
APGrid PMA face-to-face meeting, 9/16/2008 PRAGMA-UCSD CA Team Pacific Rim Application and Grid Middleware Assembly
0 NAREGI CA Status Report APGrid F2F meeting in Singapore June 4, 2007 Rumiko Masuko.
8-Mar-01D.P.Kelsey, Certificates, WP6, Amsterdam1 WP6: Certificates for DataGrid Testbeds David Kelsey CLRC/RAL, UK
MICS Authentication Profile Maintenance & Update Presented for review and discussion to the TAGPMA On 1May09 by Marg Murray.
FP6−2004−Infrastructures−6-SSA E-infrastructure shared between Europe and Latin America The Latin American Catch-all Grid Certification.
Baltic Grid Certification Authority 15th EUGridPMA, January 28th 2009, Nicosia1 Self-audit Hardi Teder EENet.
TR-GRID CA Self-Auditing Results and Status Update EUGridPMA Meeting September 12-14, 2011 Marrakesh Feyza Eryol, Onur Temizsoylu TUBITAK-ULAKBIM
FP6−2004−Infrastructures−6-SSA [ Empowering e Science across the Mediterranean ] Rome, Tutorial for Certification Authority Managers,
BG.ACAD CA HTTP :// CA. ACAD. BG S ELF - AUDIT REPORT 2014 Vladimir Dimitrov IICT-BAS ( 32 nd EUGridPMA Meeting Poznan, 8-10.
18 th EUGridPMA, Dublin / SRCE CA Self Audit SRCE CA Self Audit Emir Imamagić SRCE Croatia.
Academia Sinica Grid Computing Certification Authority F2F interview (Malaysia )
UGRID CA Self-audit report Sergii Stirenko 21 st EUGRIDPMA Meeting Utrecht 24 January 2011.
HellasGrid CA self Audit. In general We do operations well Our policy documents need work (mostly to make the text clearer in a few sections) 2.
Armenian e-Science Foundation Certification Authority Ara A. Grigoryan 1,2, Artem Harutyunyan 1,2,3, Arsen Hayrapetyan 1,2,4 1 Armenian e-Science Foundation;
29 th EUGridPMA meeting, September 2013, Bucharest AEGIS Certification Authority Dušan Radovanović University of Belgrade Computer Centre.
TNGrid CA 24 th EUGridPMA meeting Ljubljana, Slovenia, January, 2012 Heithem ABBES Mohamed JEMNI
PRACE user authentication and vetting Vincent RIBAILLIER, 29 th EUGridPMA meeting, Bucharest, September 9 th, 2013.
International Grid Trust Federation Session GGF 19 Chapel Hill, NC, USA Thursday, Feb CAOPS-WG session #1.
PKGrid CA Self-Audit 2012 Adeel-ur-Rehman Mansoor Sheikh.
AEGIS Certification Authority
UGRID CA Sergii Stirenko, Oleg Alienin
MaGrid CA Self audit and update
Emir Imamagić University Computing Centre (Srce)
Bill Yau HKU Grid Certificate Authority (HKU Grid CA) Self Audit & Status Report Bill Yau
MyIFAM CA Self-Audit Report APGridPMA F2F Meeting 1/4/2019
Presentation transcript:

Profile for Portal-based Credential Services (POCS) Yoshio Tanaka International Grid Trust Federation APGrid PMA AIST

Motivation There are many Grid project which provide portal-based user registration system. GEON Grid, Earth System Grid, etc. These portals issue certificates for users using credential management systems such as GAMA and PURSE, but there is no appropriate profile recognized by IGTF. Key pair is generated not at the client side but at the centralized server. Users do not need to take care about their certificates and private keys. Method of identity vetting can be flexible, but these portals are not doing strict vetting. They use online CA without HSM. Furthermore, some portals do not have a dedicated CA server. No CP/CPS. …

Portal server 2 GAMA architecture Portal server 1 GAMA server CACL MyProxyCAS AXIS Web Services wrapper … Servlet container import user retrieve credential Stand-alone applications retrieve credential DB gridportlets Java keystore gama GridSphere Servlet container create user

PURSE (Portal-based User Registration Service)

2. General Architecture A POCS is a system that issues Grid credentials to end entities via Web/Grid portals. There are different levels of assurance in POCS according to the policy and practices. Rudimentary Basic Medium High

3.1 Identity vetting rules A CA must define the role of registration authority (RA) which is responsible for the identity vetting of all end-entities. A POCS must describe the method for the identity vetting in its CP/CPS. A POCS must describe in its CP/CPS: How the identity (DN) assigned in the certificate is unique within the namespace of the issuer. How it attests to the validity of the identity. How it provides accountability.

3.1 Identity vetting rules (cont ’ d) Possible methods for identity vetting: In-person meeting with photo ID (high) Approval by the pre-approved subscriber ’ s supervisor (e.g. PI) (medium) Phone call (basic) address (rudimentary)

3.2 End-entity certificate expiration, renewal and re-keying Certificates (and private keys) managed in a software based token should only be re- keyed, not renewed. A certificate (and a private key) may be renewed if it is in high level and uses a hardware token for a period of up to 5 years (for equivalent RSA key length of 2048 bits) or 3 years (for equivalent RSA key length 1024 bits). Certifications may not be renewed or re- keyed for more than 5 years without a form of identity and eligibility validation, and this procedure must be described in the CP/CPS.

3.3 Removal of an authority from the authentication profile accreditation An accredited authority should be removed from the list of authorities accredited under this profile if it fails to comply with this authentication profile document, or with the IGTF Federation Document, via the voting process described in the charter of the PMA to which this authority is accredited.

4. Operational requirements POCS systems may have Portal server CA (signing) server Credential repository (e.g. My Proxy) POCS must describe in CP/CPS the architecture of the system. Possible architectures: Dedicated CA server is off-line or use FIPS Level 3 HSM (high) Dedicated CA server is on-line without HSM, but connection to the other computers is limited to the Portal server and the credential repository (medium) CA server and the credential repository are the same computer which has a limited connection to the Portal server (basic) All three servers are on the same computer (rudimentary)

4. Operational requirements (cont ’ d) The CA key length 2048 bit (high) 1024 bit (medium, basic, rudimentary) Lifetime of the CA key 20 years (2048 bit) 5 years (1024 bit)

4.1 Certificate Policy and Practices Statement Identification Every POCS CA must have a Certificate Policy and Certificate Practices Statement (CP/CPS Document) and assign it a globally unique object identifier (OID). CP/CPS should be structured as defined in RFC Whenever there is a change in the CP/CPS the OID of the document must change and the major changes must be announced to the accrediting PMA and approved before signing any certificates under the new CP/CPS. All the CP/CPS under which valid certificates are issued must be available on the web.

4.2 Certificate and CRL profile Details is still under consideration … Generation of the end-entity ’ s cryptographic data: By the applicant, or based on cryptographic data that can be held only by the applicant on a secure hardware token (high) By the POCS CA (medium, basic, rudimentary)

4.3 Revocation A CA which issues long-lived credentials must publish a CRL. The CA must react as soon as possible, but within one working day, to any revocation request received. The maximum CRL lifetime must be at least 30 days and the CA must issue a new CRL at least 7 days before expiration and immediately after a revocation. The CRLs must be published in a repository at least accessible via the web, as soon as issued. Revocation request can be made by end-entities, RAs and the CA. These requests must be properly authenticated. Others can request revocation if they can sufficiently prove compromise or exposure of the associated private key. A CA which issues short-lived credentials will not need to revoke certificates and will not need to publish a CRL.

4.4 CA key changeover When a POCS CA ’ s cryptographic data needs to be changed, such a transition shall be managed; from the time of distribution of the new cryptographic data, only the new key will be used for certificates signing purposes. The overlap of the old and new key must be at least as long as the time an issued certificate will be valid.

5. Site security The pass phrase of the encrypted private key must be kept also on an offline medium, separated from the encrypted keys and guarded in a safe place where only the authorized personnel of the CA have access. Alternatively, another documented procedure that is equally secure may be used.

6. Publication and Repository responsibilities Each authority must publish for their subscribers, relying parties and for the benefit of distribution by the PMA and the federation The CA root certificate or the set of CA certificates up to a self-signed root; A http or https URL of the PEM-formatted CA certificate; A http URL of the PME or DER formatted CRL (if applicable); A http or https URL of the web page of the CA for general information; The CP and/or CPS documents; An official contact address for inquiries and fault reporting; A physical or postal contact address.

6. Publication and Repository responsibilities (cont ’ d) The CA should provide a means to validate the integrity of its root of trust. Furthermore, the CA shall provide their trust anchor to a trust anchor repository, specified by the accrediting PMA, via the method specified in the policy of the trust anchor repository. The repository must be run at least on a best- effort basis, with an intended continuous availability. The originating authority must grant to the PMA and the Federation - by virtue of its accreditation - the right of unlimited re-distribution of this information.

7. Audits The CA must record and archive all requests for certificates, along with all the issued certificates, all the requests for revocation and the login/logout/reboot of the issuing machine. The CA must keep these records for at least three years. These records must be available to external auditors in the course of their work as auditor. Each CA must accept being audited by other accredited CAs to verify its compliance with the rules and procedures specified in its CP/CPS document. The CA should perform operational audits of the CA/RA staff at least once per year. A list of CA and RA personnel should be maintained and verified at least once per year.

8. Privacy and confidentiality Accredited CAs must define a privacy and data release policy compliant with the relevant national legislation. The CA is responsible for recording, at the time of validation, sufficient information regarding the subscribers to identify the subscriber. The CA is not required to release such information unless provided by a valid legal request according to national laws applicable to that CA.

9. Compromise and disaster recovery The CA must have an adequate compromise and disaster recovery procedure, and we willing to discuss this procedure in the PMA. The procedure need not be disclosed in the policy and practice statement.

9.1 Due diligence for end-entities The CA should make a reasonable effort to make sure that end-entities realize the importance of properly protecting their private data.