Internet2 Member Meeting, Arlington VA, April 2004 I2MI Authorization Agenda, 2004++ RL "Bob" Morgan, University of Washington.

Slides:



Advertisements
Similar presentations
The Challenges of CORBA Security It is important to understand that [CORBAsecurity] is only a (powerful) security toolbox and not the solution to all security.
Advertisements

Managing Roles & Privileges with Grouper and Signet Middleware Nate Klingenstein (some words stolen from Tom Barton & Lynn Mcrae) Helsinki EuroCAMP, April.
Integration Technologies for Grouper & Signet Tom Barton, U Chicago Joy Veronneau, Cornell Gary Brown, U Bristol Lynn McRae, Stanford.
Privilege Management and Spocp Presentation at Advance CAMP Authority Architecture – Broomfield, Colorado July 2, 2004 by Roland Hedberg.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
ECHO: NASA’s E os C learing HO use Integrating Access to Data Services Michael Burnett Blueprint Technologies, 7799 Leesburg.
XACML 2.0 and Earlier Hal Lockhart, Oracle. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
21 June 2006Copyright 2006 University of Kent1 Delegation of Authority (DyVOSE project) David Chadwick University of Kent.
Introduction To Windows NT ® Server And Internet Information Server.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
1 July 2005© 2005 University of Kent1 Seamless Integration of PERMIS and Shibboleth – Development of a Flexible PERMIS Authorisation Module for Shibboleth.
ADVANCED LINUX SECURITY. Abstract : Using mandatory access control greatly increases the security of an operating system. SELinux, which is an implementation.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
A Model for Enterprise Group and Affiliation Management RL “Bob” Morgan University of Washington CAMP, June 2005.
Combining KMIP and XACML. What is XACML? XML language for access control Coarse or fine-grained Extremely powerful evaluation logic Ability to use any.
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
1 1 Interoperating: MIT’s Fusion Center Prototype & JHU/APL’s Back End Attribute Exchange (Identity Management Testbed) January 2013.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
Authorization Scenarios with Signet RL “Bob” Morgan University of Washington Internet2 Member Meeting, September 2004.
Directory Services at UMass  Directory Services Overview  Some common definitions  What can a directory do or not do?  User Needs Assessment  What.
I2/NMI Update: Signet, Grouper, & GridShib Tom Barton University of Chicago.
OpenPASS Open Privacy, Access and Security Services “Quis custodiet ipsos custodes?”
Secure Credential Manager Claes Nilsson - Sony Ericsson
SharePoint Security Fundamentals Introduction to Claims-based Security Configuring Claims-based Security Development Opportunities.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
L8 - March 28, 2006copyright Thomas Pole , all rights reserved 1 Lecture 8: Software Asset Management and Text Ch. 5: Software Factories, (Review)
11 Usage policies for end point access control  XACML is Oasis standard to express enterprise security policies with a common XML based policy language.
SAML: An XML Framework for Exchanging Authentication and Authorization Information + SPML, XCBF Prateek Mishra August 2002.
Tutorial: Building Science Gateways TeraGrid 08 Tom Scavo, Jim Basney, Terry Fleury, Von Welch National Center for Supercomputing.
Kuali Rice A basic overview…. Kuali Rice Mission First and foremost to provide a consistent development framework and common middleware layer for Kuali.
Windows Role-Based Access Control Longhorn Update
Proposal for RBAC Features for SDD James Falkner Sun Microsystems October 11, 2006.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
February 1, 2002 Internet2 Middleware Initiative and MACE RL "Bob" Morgan, University of Washington.
Grouper Tom Barton University of Chicago. I2MM Spring Outline  Grouper’s place in the world  Some Grouper guts  Deployment scenarios.
Lecture 18 Page 1 CS 111 Online OS Use of Access Control Operating systems often use both ACLs and capabilities – Sometimes for the same resource E.g.,
Advanced CAMP: BoF Summaries. 2 Role-based Access Control (RBAC)
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
11 Restricting key use with XACML* for access control * Zack’-a-mul.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Current Middleware Picture Tom Barton University of Chicago Tom Barton University of Chicago.
Interfederation RL “Bob” Morgan University of Washington and Internet2 Internet2 Member Meeting Chicago, Illinois December 2006.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
Authorization: Welcome to the Funhouse RL “Bob” Morgan, University of Washington Internet2/Educause Advanced CAMP Boulder, Colorado July 2003.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
IBM Software Group © 2008 IBM Corporation IBM Tivoli Provisioning Manager 7.1 Security Aspects of TPM 7.1.
OGSA Attributes: Requirements, Definitions, and SAML Profile Abstract This document specifies elements and vocabulary for expressing attribute assertions.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Federate Locally, Federate Globally RL “Bob” Morgan University of Washington and Internet2 European Advanced CAMP Málaga, Spain October 2006 RL “Bob” Morgan.
J2EE Platform Overview (Application Architecture)
Secure Connected Infrastructure
Integrating Enterprise Applications Into SharePoint® Portal Server
Object-Oriented Software Engineering Using UML, Patterns, and Java,
XACML and the Cloud.
Power BI Security Best Practices
Notification Service May 19, 2006 Jon Atherton Mark Mara.
Privilege Management: the Big Picture
Scott Thorne & Chuck Shubert
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Signet & Privilege Management
BACHELOR’S THESIS DEFENSE
Groups and Permissions
InfiNET Solutions 5/21/
NSF Middleware Initiative: GridShib
Presentation transcript:

Internet2 Member Meeting, Arlington VA, April 2004 I2MI Authorization Agenda, RL "Bob" Morgan, University of Washington

The Authorization Space As everyone knows by now: “Authentication says who you are, authorization says what you can do.” OK as far as it goes, but... A higher-level definition: “configuration and operation of systems so actions in support of organization goals are permitted and other actions are prohibited” representation and enforcement of organizational policy in software all scales from macro-level policy (“comply with HIPAA”) to micro-level (“set permission on this file”)

A little philosophy (from Dennett) Ethics the origin of civilization / morality / cooperation requires: –mutual recognition, and –promises (making and keeping and verifying) –i.e., authentication and authorization... Exaptation everything useful today originated as something else –so: mechanisms/data will get applied in ways we don't expect... Decision-making is time-pressured and heuristic choices among myriad alternatives, can't know consequences –i.e., it's all risk management...

Risk management it's all about accountability that's why they're called “accounts” the basic principle don't spend more to control access to the resource than it would cost if it were stolen and: don't spend more than you have... everyone wants fine-grained policies but no one wants to actually manage them and even fewer want to look at the audit logs so: plan for the policies you can actually enforce

The authorization landscape The basic access-control scenario Possible components of infrastructure for authorization... and what I2MI is doing about them The Signet project

The basic access-control scenario The vanilla scenario: client-server, session-based client (or peer) connects to server, authenticates as a “subject” result of authentication is “security context” –and a session associated with that context –further operations in session take place in that context security attributes of subject are obtained, added to context –typically group memberships –“userid” (or subject name) is one attribute among many client requests operation on a resource server must answer the access-control question: –is this operation on this resource by this subject permitted?

The access-control decision Inputs are the session security context the policy applicable to the resource any other relevant security attributes of the subject environment (time of day, load, etc) Output is: yes or no there are more complicated policy scenarios too e.g., output is “how much” or “yes, and also do X” Where do all these policies and attributes come from?

Authorization challenges Requirements advancing in all directions more systems, more functions, more users more fundamental high-risk processes becoming automated more complex interconnection of systems, processes Our response: infrastructure for authorization i.e., manage policies, manage attributes, re-use instititional source data, make access-control decisions, etc. this has worked well for authentication... but authorization infra successes have been rare... and diversity in authz will likely remain the rule

the I2MI approach Scope the problem based on issues architects confront today find/develop models of problem and solution domains Seek out nascent solutions best (or at least good) practices at campuses sharable code vendor products emerging technology/research Develop/evangelize working technologies document, generalize, package, support

Some infrastructure components aka, things I2MI might be working on... authorization service authorization API in applications policy expression languages policy/attribute distribution objects directories and attribute definitions group management provisioning service privilege management service role-based access control (RBAC)

Authorization service aka “policy decision point” app sends request-for-decision, including context, etc service “decision engine” accesses policy, attributes, etc, produces and returns yes/no decision would also provide means of setting/managing policy and fetching attributes from other places but... a radical shift for most apps... also a different kind of infra service then we usually run so in real life campuses don't see urgency in this service

More infra components authorization API in applications first step to use of authz-decision service by app helps app to clarify “policy knobs” in application space can permit pluggable providers most applicable to new in-house applications a few standard ones available –OpenGroup aznAPI, Windows authz, OKI authz OSID... also little-used so far, but may be ready for prime time as apps are designed better for infra-readiness

Policy expression languages Syntax/structure/conventions for policy statements –e.g., access control lists, access rules e.g., XACML, XrML, SPOCP typically associated with engine(s) for rendering decisions based on policies in that language permit policies to be compared, manipulated, transported main requirement for use is good tools to create/modify/process policies some useful shared work learning how to use these –but no I2MI projects at this time

Transportable policy objects Policy/attribute objects for distributed systems e.g. X.509 attribute certificates –signed objects, so verifiable even when passed around –express permissions, etc to applications SAML, XACML, XrML, SPKI, Kerberos have similar objects complex to specify and to use –dealing with signatures is inherently tricky –embedding in applications also tricky may have near-term application in inter-campus, multi-tier models –but again no active I2MI projects

Directories, etc Directories, metadirectories, registries mainstream tools for managing, publishing person data we continue to promote LDAP directory deployment widening scope to include XML access methods (SAML and others) and schema methods work to be done in defining/publishing application data/policies Standardized attribute definitions e.g. eduPerson and CourseId not just names but values, including templates for values

Groups manage/express simple “member of” relationships groups are most basic form of “improved” authz data provide both level of indirection and aggregation prior group work focused on directory-based methods new group management work based on “groups registry” and methods for auto-management, import, export useful in itself and as component of other authz infra Grouper design work proceeding via mace-dir standard groups API may be related work

Provisioning service industry term for automated account management in applications, and user setup in other kinds of systems supports authorization by moving policy and user data to places where it can be used by apps at decision-time campuses typically do this in home-grown fashion –and big-time products are high-priced... new OASIS standard SPML may bear investigation

Privilege management yet another registry, for privilege info represent per-app/system permissions, conditions, qualifiers support organizational authority and hierarchy UI for management, viewing, and interfaces for integration export to provision apps, or publish for runtime consumption Signet project starting, based on Stanford Authority Manager MIT Roles system similar, more examples at other campuses Role-based access control more a design principle than a tool definition and use of organizational roles needs investigation

Authorization stuff coming soon Papers “authorization landscape” describing concepts, tools “privilege management recipe” using Stanford and other cases Toolkits Signet privilege management toolkit Grouper groups management toolkit Events Advanced CAMP June 30-July 2, all about authorization

Conclusion Authorization presents many challenges Understanding diversity of problems is part of developing solutions There are promising models and technologies I2MI is working on new infra projects to meet the needs Come help!