AN INTEGRATED FRAMEWORK FOR VO-ORIENTED AUTHORIZATION, POLICY-BASED MANAGEMENT AND ACCOUNTING Andrea Caltroni 3, Vincenzo Ciaschini 1, Andrea Ferraro 1,

Slides:



Advertisements
Similar presentations
29 June 2006 GridSite Andrew McNabwww.gridsite.org VOMS and VOs Andrew McNab University of Manchester.
Advertisements

EGEE-II INFSO-RI Enabling Grids for E-sciencE The gLite middleware distribution OSG Consortium Meeting Seattle,
Role Based VO Authorization Services Ian Fisk Gabriele Carcassi July 20, 2005.
Plateforme de Calcul pour les Sciences du Vivant SRB & gLite V. Breton.
High Performance Computing Course Notes Grid Computing.
The VOMS Attribute Authority and its relation with Shibboleth Presenter: Vincenzo Ciaschini 8 th TF-EMC2 Meeting Firenze, March 2007.
Implementing Finer Grained Authorization in the Open Science Grid Gabriele Carcassi, Ian Fisk, Gabriele, Garzoglio, Markus Lorch, Timur Perelmutov, Abhishek.
Andrew McNab - EDG Access Control - 14 Jan 2003 EU DataGrid security with GSI and Globus Andrew McNab University of Manchester
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Services Abderrahman El Kharrim
CoreGRID Workpackage 5 Virtual Institute on Grid Information and Monitoring Services Authorizing Grid Resource Access and Consumption Erik Elmroth, Michał.
INFSO-RI Enabling Grids for E-sciencE XACML and G-PBox update MWSG 14-15/09/2005 Presenter: Vincenzo Ciaschini.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
1 TAPAS Workshop Nicola Mezzetti - TAPAS Workshop Bologna Achieving Security and Privacy on the Grid Nicola Mezzetti.
Enabling Grids for E-sciencE ENEA and the EGEE project gLite and interoperability Andrea Santoro, Carlo Sciò Enea Frascati, 22 November.
Apr 30, 20081/11 VO Services Project – Stakeholders’ Meeting Gabriele Garzoglio VO Services Project Stakeholders’ Meeting Apr 30, 2008 Gabriele Garzoglio.
Mar 28, 20071/9 VO Services Project Gabriele Garzoglio The VO Services Project Don Petravick for Gabriele Garzoglio Computing Division, Fermilab ISGC 2007.
VOMRS/VOMS-Admin Convergence and VO Services Project Status Tanya Levshina Computing Division, Fermilab.
Maarten Litmaath (CERN), GDB meeting, CERN, 2006/02/08 VOMS deployment Extent of VOMS usage in LCG-2 –Node types gLite 3.0 Issues Conclusions.
June 24-25, 2008 Regional Grid Training, University of Belgrade, Serbia Introduction to gLite gLite Basic Services Antun Balaž SCL, Institute of Physics.
CEOS WGISS-21 CNES GRID related R&D activities Anne JEAN-ANTOINE PICCOLO CEOS WGISS-21 – Budapest – 2006, 8-12 May.
MTA SZTAKI Hungarian Academy of Sciences Introduction to Grid portals Gergely Sipos
Open Science Grid Open Science Grid: Beyond the Honeymoon Dane Skow Fermilab September 1, 2005.
US LHC OSG Technology Roadmap May 4-5th, 2005 Welcome. Thank you to Deirdre for the arrangements.
Conference name Company name INFSOM-RI Speaker name The ETICS Job management architecture EGEE ‘08 Istanbul, September 25 th 2008 Valerio Venturi.
E-infrastructure shared between Europe and Latin America FP6−2004−Infrastructures−6-SSA gLite Information System Pedro Rausch IF.
Andrew McNabSecurity Middleware, GridPP8, 23 Sept 2003Slide 1 Security Middleware Andrew McNab High Energy Physics University of Manchester.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
INFSO-RI Enabling Grids for E-sciencE EGEE is a project funded by the European Union under contract INFSO-RI Grid Accounting.
INFSO-RI Enabling Grids for E-sciencE G-PBox Auth meeting 13/9/2005 Presenter: Vincenzo Ciaschini.
Glite. Architecture Applications have access both to Higher-level Grid Services and to Foundation Grid Middleware Higher-Level Grid Services are supposed.
29/1/2002A.Ghiselli, INFN-CNAF1 DataTAG / WP4 meeting Cern, 29 January 2002 Agenda  start at  Project introduction, Olivier Martin  WP4 introduction,
Trust and Security for Next Generation Grids, Securing Grid-Based Supply Chains Marco Di Girolamo HP Italy Innovation Center, Italy On.
Globus and PlanetLab Resource Management Solutions Compared M. Ripeanu, M. Bowman, J. Chase, I. Foster, M. Milenkovic Presented by Dionysis Logothetis.
FP6−2004−Infrastructures−6-SSA E-infrastructure shared between Europe and Latin America gLite Information System Claudio Cherubino.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Last update 31/01/ :41 LCG 1 Maria Dimou Procedures for introducing new Virtual Organisations to EGEE NA4 Open Meeting Catania.
INFSO-RI Enabling Grids for E-sciencE Policy management and fair share in gLite Andrea Guarise HPDC 2006 Paris June 19th, 2006.
Segundo Taller Latino Americano de Computación GRID – Primer Taller Latino Americano de EELA – Primer Tutorial Latino Americano de EELA
Ákos FROHNER – DataGrid Security n° 1 Security Group TODO
VOX Project Status T. Levshina. 5/7/2003LCG SEC meetings2 Goals, team and collaborators Purpose: To facilitate the remote participation of US based physicists.
D.Spiga, L.Servoli, L.Faina INFN & University of Perugia CRAB WorkFlow : CRAB: CMS Remote Analysis Builder A CMS specific tool written in python and developed.
DataTAG is a project funded by the European Union International School on Grid Computing, 23 Jul 2003 – n o 1 GridICE The eyes of the grid PART I. Introduction.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Study on Authorization Christoph Witzig,
FESR Trinacria Grid Virtual Laboratory gLite Information System Muoio Annamaria INFN - Catania gLite 3.0 Tutorial Trigrid Catania,
II EGEE conference Den Haag November, ROC-CIC status in Italy
Claudio Grandi INFN Bologna Virtual Pools for Interactive Analysis and Software Development through an Integrated Cloud Environment Claudio Grandi (INFN.
SAM architecture EGEE 07 Service Availability Monitor for the LHC experiments Simone Campana, Alessandro Di Girolamo, Nicolò Magini, Patricia Mendez Lorenzo,
DGAS Distributed Grid Accounting System INFN Workshop /05/1009, Palau Giuseppe Patania Andrea Guarise 6/18/20161.
Grid Deployment Technical Working Groups: Middleware selection AAA,security Resource scheduling Operations User Support GDB Grid Deployment Resource planning,
E-science grid facility for Europe and Latin America Updates on Information System Annamaria Muoio - INFN Tutorials for trainers 01/07/2008.
1 Grid security Services and Support Vincenzo Ciaschini, INFN CNAF V INFN-GRID workshop 18-20/12/2006.
Enabling Grids for E-sciencE INFN Workshop – May 7-11 Rimini 1 Grid Accounting Status at INFN Riccardo Brunetti INFN-TORINO.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI EGI Services for Distributed e-Infrastructure Access Tiziana Ferrari on behalf.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Introduction Salma Saber Electronic.
Architectural Framework Presentation Vincenzo Ciaschini CNAF 15/5/06.
Job Priorities and Resource sharing in CMS A. Sciabà ECGI meeting on job priorities 15 May 2006.
Enabling Grids for E-sciencE Claudio Cherubino INFN DGAS (Distributed Grid Accounting System)
G-PBox Facts and status JRA1 Authz Coord Meeting January CNAF/INFN Bologna Andrea Ferraro.
Argus EMI Authorization Integration
Regional Operations Centres Core infrastructure Centres
StoRM: a SRM solution for disk based storage systems
Accounting at the T1/T2 Sites of the Italian Grid
Grid Computing.
a VO-oriented perspective
Report on GLUE activities 5th EU-DataGRID Conference
Resource and Service Management on the Grid
QoS and SLA in INFN Grid INFN team: Andrea Ceccanti, Vincenzo Ciaschini, Alberto Forti, Andrea Ferraro, Valerio Venturi Location Catania (Italy) Date 4/3/2008.
The Anatomy and The Physiology of the Grid
gLite The EGEE Middleware Distribution
Information Services Claudio Cherubino INFN Catania Bologna
Presentation transcript:

AN INTEGRATED FRAMEWORK FOR VO-ORIENTED AUTHORIZATION, POLICY-BASED MANAGEMENT AND ACCOUNTING Andrea Caltroni 3, Vincenzo Ciaschini 1, Andrea Ferraro 1, Antonia Ghiselli 1, Andrea Guarise 2 Giuseppe Patania 2, Rosario Piro 2, Gian Luca Rubini 1 [ 1) INFN-CNAF, Bologna, Italy; 2) INFN-TO, Torino, Italy; 3) INFN-PD, Padova, Italy] The Grid computing paradigm has introduced the Virtual Organization (VO) concept, which comprises a set of individuals and/or institutions having direct access to computers, software, data, and other resources for collaborative problem solving or other purposes. The sharing of resources is regulated by a context for Grid operations that allow discovering, accessing and monitoring, regardless of their physical location. This set of services acts as an intermediary between the physical resources and applications, it is called Grid Middleware. The EGEE middleware follows a service oriented architecture which will facilitate interoperability among Grid services and allow easier compliance with upcoming standard such as Open Grid Services Architecture (OGSA), that are also based on this principles. This architecture design is not bound to specific implementation of the services, the need is that they have to work together in a concerted way to achieve the goals of the end user. They can also be deployed and used allowing their exploitation in different contexts. Generally most services are managed by a VO, there is no requirement of having independent services instances per VO; for performance and scalability reasons service instances will in most cases serve multiple VOs. The main services, from EGEE point of view, are focused on this areas: security, Grid access, information and monitoring, job management, data management. In a production Grid the VO administrator has to manage the behavior of VO users. VOMS, G-PBox and DGAS are useful tools to do this. Introduction EGEE middleware This architecture shown in Fig.1 has a limitation regarding the authorization process, the user roles and capabilities (decided by a VO administrator using VOMS [1],[2]) cannot guarantee to access a specific service because, for example, a local resource administrator could have banned the access to all users for a limited time. In this case there is a conflict between a VO, which decide the user capabilities, and a local site where one ore more administrators manage resources owned by a local organization. This paper shows a proposal to extend this architecture using a policy framework (G- PBox) [3],[4] integrated with the VOMS and an accounting service (DGAS) [5] to have an homogeneous and VO oriented authorization process. VOMS, G-PBox, DGAS interactions 1/2 Fig.1 – EGEE middleware Grid Access Service API Access Services Auditing Authentication Authorization Accounting Package Manager Workload Management Computing Element Job Provenance Information & Monitoring Application Monitoring Metadata Catalog Storage Element File & Replica Catalog Data Management Security Services Job Management Services Data Services Information & Monitoring Services The EGEE grid middleware follows a service oriented architecture which allows a reliable interoperability among Grid services and an easier compliance with upcoming standards - such as Open Grid Services Architecture (OGSA) - that are also based on this principles. Extending the middleware Authentication Authorization Accounting Security Services Scope of VOMS, G-PBox, DGAS Job Management Services Fig.2 – Scope of VOMS, G-PBox, DGAS among Grid Services VOMS (Attribute Authority) G-PBox (Policy System) DGAS (Accounting System) VO Admin. Fig.3 – VO administrator task

2/2 VOMS and G-PBox together allow building and managing a smart Role-Based-Access-Control (RBAC) policy system, with VOMS providing attributes for groups and roles and G-PBox providing the permission profiles granted to the groups/roles defined by the VOMS. G-PBox and DGAS together allow the enforcement of policies regarding the accounting information for a user or a VO in its entirety. VOMS, G-PBox and DGAS communicate among each other using the GSI protocol and share the same sensitive data used by each tool. Figure 4 shows the strong interactions among the three components when a user submits a job. The first step is job submission(1) to the Resource Broker (RB), then the G-PBox plugin in the RB Policy-Enforcement-Point (PEP) asks(2) the VO G-PBox of the user about any policy concerning the user. These policies have been previously inserted by the user VO administrator or by a site administrator and propagated to the VO G-PBox). In the case of accounting policies, the VO G-PBox asks the VO DGAS for the required accounting parameters(3). The RB receives the answer from the VO G-PBox (5) and submits to the proper CE(6). In the CE a similar CE/G- PBox/DGAS process happens (7,8,9,10,11,12). VOMS G-PBox G-PBox plugin RB DGAS VO layer G-PBox plugin CE G-PBox DGAS Resource layer Fig.4 – User job submission One of the first use cases we analyzed was how to apply policies to the matchmaking done by the RB. The first such request we got was to have an RB capable of splitting resources in a series of classes, each with its own priority, and then split job assignment to resources based on such priority and the user's VOMS credentials. Needless to say, this job/resource match had to by dynamic, e.g. the credentials needed to access a specific class of resources had to be changeable without affecting in any way the configuration of the resources or of the broker. The chosen solution is to require a resource to publish a tag describing their class, in the information system, and then write policies associating a specific group/role combination to a class of resources. VOMS server Group A Group B Group C G-PBox Policies Group A : high and low priority CEs Group B : low priority CEs Group C : deny everywhere CE HIGH CE LOW RB Another PEP we implemented was a PEP for the Computing Element (CE), whose job was to take over grid user mapping to local accounts, based on policies. It’s implemented as an LCMAPS [6] plugin, which contacts G-PBox, sends it the credentials of the user and obtains a local account or pool account as a result, or a deny if the user is not allowed to submit jobs to the host. Fig.5 – User job submission The first experience of policies definition, related to different groups of a VO, and enforced by a Grid Resource Broker and checked by the CEs, demonstrated the effectiveness of such approach. Other policies, like CPU fair sharing and storage quota management, have been required and are going to be implemented. This framework is specific Grid independent and can be integrated with any service aiming to enforce policies in a distributed system where users and resource owner want to agree service level agreement and implement a production business model. [1] R. Alfieri, R. Cecchini, V. Ciaschini, L. dell'Agnello, A. Frohner, A. Gianoli, K. Lorentey, F. Spataro. VOMS, an Authorization System for Virtual Organizations. 1st European Across Grids Conference, Santiago de Compostela, February , [2] VOMS at INFN Authorization Working Group, [3] V. Ciaschini, A. Ferraro, A. Ghiselli, G. Rubini, R. Zappi, A. Caltroni. G-PBox: a policy framework for Grid environments. In Proceedings CHEP04, September [4] The G-PBox Home Page at INFN, [5] The Distributed Grid Accounting System (DGAS), [6] A local credential mapping service, G-PBox plugin CE DGAS plugin Grid user credential Local or pool account Fig.6 – User mapping Andrea Caltroni 3, Vincenzo Ciaschini 1, Andrea Ferraro 1, Antonia Ghiselli 1, Andrea Guarise 2 Giuseppe Patania 2, Rosario Piro 2, Gian Luca Rubini 1 [ 1) INFN-CNAF, Bologna, Italy; 2) INFN-TO, Torino, Italy; 3) INFN-PD, Padova, Italy] G-PBox DGAS plugin Conclusions and references A Resource Broker use case A Computing Element LCG compliant use case AN INTEGRATED FRAMEWORK FOR VO-ORIENTED AUTHORIZATION, POLICY-BASED MANAGEMENT AND ACCOUNTING