OSG AuthZ components Dane Skow Gabriele Carcassi.

Slides:



Advertisements
Similar presentations
Security Design and Solution in ARC1 Weizhong Qiang University of Oslo April 9, 2008.
Advertisements

29 June 2006 GridSite Andrew McNabwww.gridsite.org VOMS and VOs Andrew McNab University of Manchester.
Dec 14, 20061/10 VO Services Project – Status Report Gabriele Garzoglio VO Services Project WBS Dec 14, 2006 OSG Executive Board Meeting Gabriele Garzoglio.
Role Based VO Authorization Services Ian Fisk Gabriele Carcassi July 20, 2005.
GUMS status Gabriele Carcassi PPDG Common Project 12/9/2004.
OSG AuthZ Architecture AuthZ Components Legend VO Management Services Grid Site GUMS Site Services SAZ CE Gatekeeper Prima Is Auth? Yes / No SE SRM gPlazma.
Implementing Finer Grained Authorization in the Open Science Grid Gabriele Carcassi, Ian Fisk, Gabriele, Garzoglio, Markus Lorch, Timur Perelmutov, Abhishek.
Andrew McNab - EDG Access Control - 14 Jan 2003 EU DataGrid security with GSI and Globus Andrew McNab University of Manchester
EDINA 20 th March 2008 EDINA Geo/Grid - Security Prof. Richard O. Sinnott Technical Director, National e-Science Centre University of Glasgow, Scotland.
Open Science Grid Use of PKI: Wishing it was easy A brief and incomplete introduction. Doug Olson, LBNL PKI Workshop, NIST 5 April 2006.
Makrand Siddhabhatti Tata Institute of Fundamental Research Mumbai 17 Aug
VO Management in D-Grid, 2. WS, H. Enke (AstroGrid-D) AGD Grid Account Management.
DIRAC Web User Interface A.Casajus (Universitat de Barcelona) M.Sapunov (CPPM Marseille) On behalf of the LHCb DIRAC Team.
Andrew McNab - GridPP Security - 24 Feb 2003 GridPP Security Middleware Andrew McNab, University of Manchester
OSG Middleware Roadmap Rob Gardner University of Chicago OSG / EGEE Operations Workshop CERN June 19-20, 2006.
VOMS Alessandra Forti HEP Sysman meeting April 2005.
May 8, 20071/15 VO Services Project – Status Report Gabriele Garzoglio VO Services Project – Status Report Overview and Plans May 8, 2007 Computing Division,
Apr 30, 20081/11 VO Services Project – Stakeholders’ Meeting Gabriele Garzoglio VO Services Project Stakeholders’ Meeting Apr 30, 2008 Gabriele Garzoglio.
Mine Altunay OSG Security Officer Open Science Grid: Security Gateway Security Summit January 28-30, 2008 San Diego Supercomputer Center.
Using NMI Components in MGRID: A Campus Grid Infrastructure Andy Adamson Center for Information Technology Integration University of Michigan, USA.
Mar 28, 20071/9 VO Services Project Gabriele Garzoglio The VO Services Project Don Petravick for Gabriele Garzoglio Computing Division, Fermilab ISGC 2007.
VOMRS/VOMS-Admin Convergence and VO Services Project Status Tanya Levshina Computing Division, Fermilab.
May 11, 20091/17 VO Services Project – Stakeholders’ Meeting Gabriele Garzoglio VO Services Project Stakeholders’ Meeting May 11, 2009 Gabriele Garzoglio.
EU DataGrid (EDG) & GridPP Authorization and Access Control User VOMS C CA 2. certificate dn, ca, key 1. request 3. certificate 4. VOMS cred: VO, groups,
Grid User Management System Gabriele Carcassi HEPIX October 2004.
GUMS Gabriele Carcassi PPDG Collaboration meeting June 27, 2004.
Jan 10, 20091/16 VO Services Project – Stakeholders’ Meeting Gabriele Garzoglio VO Services Project Stakeholders’ Meeting Jan 10, 2009 Gabriele Garzoglio.
Global Grid Forum GridWorld GGF15 Boston USA October Abhishek Singh Rana and Frank Wuerthwein UC San Diegowww.opensciencegrid.org The Open Science.
Communicating Security Assertions over the GridFTP Control Channel Rajkumar Kettimuthu 1,2, Liu Wantao 3,4, Frank Siebenlist 1,2 and Ian Foster 1,2,3 1.
CHEP03 Mar 25Mary Thompson Fine-grained Authorization for Job and Resource Management using Akenti and Globus Mary Thompson LBL,Kate Keahey ANL, Sam Lang.
Maarten Litmaath (CERN), GDB meeting, CERN, 2006/02/08 VOMS deployment Extent of VOMS usage in LCG-2 –Node types gLite 3.0 Issues Conclusions.
EDG Security European DataGrid Project Security Coordination Group
June 24-25, 2008 Regional Grid Training, University of Belgrade, Serbia Introduction to gLite gLite Basic Services Antun Balaž SCL, Institute of Physics.
Mine Altunay July 30, 2007 Security and Privacy in OSG.
INFSO-RI Enabling Grids for E-sciencE LCAS/LCMAPS and WSS Site Access Control boundary conditions David Groep NIKHEF.
Overview of Privilege Project at Fermilab (compilation of multiple talks and documents written by various authors) Tanya Levshina.
Role Based VO Authorization Services Ian Fisk Gabriele Carcassi July 20, 2005.
EGEE User Forum Data Management session Development of gLite Web Service Based Security Components for the ATLAS Metadata Interface Thomas Doherty GridPP.
US LHC OSG Technology Roadmap May 4-5th, 2005 Welcome. Thank you to Deirdre for the arrangements.
INFSO-RI Enabling Grids for E-sciencE EGEE Security Joni Hahkala, UH-HIP On behalf of JRA3 JRA1 AH March 22-24, 2006.
Grid Authorization Landscape and Futures Von Welch NCSA
6/23/2005 R. GARDNER OSG Baseline Services 1 OSG Baseline Services In my talk I’d like to discuss two questions:  What capabilities are we aiming for.
VO Privilege Activity. The VO Privilege Project develops and implements fine-grained authorization to grid- enabled resources and services Started Spring.
USATLAS deployment We currently use VOMS Role based authorization in production within USATLAS. In the VO we have defined 4 groups/roles that satisfy our.
EMI INFSO-RI Argus Policies in Action Valery Tschopp (SWITCH) on behalf of the Argus PT.
Jun 12, 20071/17 AuthZ Interoperability – Status and Plan Gabriele Garzoglio AuthZ Interoperability Status and Plans June 12, 2007 Middleware Security.
OSG Site Admin Workshop - Mar 2008Using gLExec to improve security1 OSG Site Administrators Workshop Using gLExec to improve security of Grid jobs by Alain.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
Sep 25, 20071/5 Grid Services Activities on Security Gabriele Garzoglio Grid Services Activities on Security Gabriele Garzoglio Computing Division, Fermilab.
INFSO-RI Enabling Grids for E-sciencE SRMv2.2 in DPM Sophie Lemaitre Jean-Philippe.
Ákos FROHNER – DataGrid Security n° 1 Security Group TODO
INFSO-RI Enabling Grids for E-sciencE SAML-XACML interoperability Oscar Koeroo.
SESEC Storage Element (In)Security hepsysman, RAL 0-1 July 2009 Jens Jensen.
VOX Project Tanya Levshina. 05/17/2004 VOX Project2 Presentation overview Introduction VOX Project VOMRS Concepts Roles Registration flow EDG VOMS Open.
The GRIDS Center, part of the NSF Middleware Initiative Grid Security Overview presented by Von Welch National Center for Supercomputing.
Sep 17, 20081/16 VO Services Project – Stakeholders’ Meeting Gabriele Garzoglio VO Services Project Stakeholders’ Meeting Sep 17, 2008 Gabriele Garzoglio.
Site Authorization Service Local Resource Authorization Service (VOX Project) Vijay Sekhri Tanya Levshina Fermilab.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks OpenSAML extension library and API to support.
EMI is partially funded by the European Commission under Grant Agreement RI Argus Policies Tutorial Valery Tschopp (SWITCH) – Argus Product Team.
OSG Status and Rob Gardner University of Chicago US ATLAS Tier2 Meeting Harvard University, August 17-18, 2006.
Overview of the New Security Model Akos Frohner (CERN) WP8 Meeting VI DataGRID Conference Barcelone, May 2003.
Security recommendations DPM Jean-Philippe Baud CERN/IT.
Abhishek Singh Rana and Frank Wuerthwein UC San Diegowww.opensciencegrid.org The Open Science Grid ConsortiumCHEP 2006 Mumbai INDIA February gPLAZMA:
INFSO-RI Enabling Grids for E-sciencE GUMS vs. LCMAPS Oscar Koeroo.
Why you should care about glexec OSG Site Administrator’s Meeting Written by Igor Sfiligoi Presented by Alain Roy Hint: It’s about security.
Dynamic Accounts: Identity Management for Site Operations Kate Keahey R. Ananthakrishnan, T. Freeman, R. Madduri, F. Siebenlist.
FermiGrid - PRIMA, VOMS, GUMS & SAZ Keith Chadwick Fermilab
Jean-Philippe Baud, IT-GD, CERN November 2007
AuthZ Interop report out
Update on EDG Security (VOMS)
Presentation transcript:

OSG AuthZ components Dane Skow Gabriele Carcassi

Full privilege scenario User voms-proxy-init gums-host VOMS site GUMS Server Gatekeeper grid3-user…txt PRIMA centralized mapping account pool /  dynamic mappings (broken by accounting) role/group based mappings Submission site Execution site VOs

Compatibility scenario User grid-proxy-init gums-host VOMS Admin site GUMS Server gums-host Gatekeeper grid-mapfile grid3-user…txt both maps centralized mapping account pool  dynamic mappings  role/group based mappings Submission site Execution site VOs

“Ye olde Grid3” setup User grid-proxy-init Gatekeeper grid-mapfile edg-mkgridmap VOMS Admin grid3-user…txt  centralized mapping  account pool  dynamic mappings  role/group based mappings Submission site Execution site VOs

PRIMA module It’s a C library that implement the gatekeeper callout –Gets the credentials –Validates certificate and attributes –Formats a SAML message and sends it to GUMS –Parses the response –Returns the uid to the gatekeeper Distributed as part of VDT

Details PRIMA sends only the first VOMS FQAN, not the whole list encoded in the certificate. GUMS makes decisions only on one FQAN.

Attribute verification PRIMA can verify the VOMS attributes, but typically we do not do that –In OSG we lack a mechanism to easily distribute the certificates of the VO servers –GUMS verifies the presence in the VO periodically downloads the full list of users from the VO server (has to do that for maps generation) prevents forging a fake VO foresee to disable in case attribute verification is done at the gatekeeper end, and no maps are needed –Should attribute verification be delegated to the server?

PRIMA Complaints Mainly about the log –Not clear error information (the actual GUMS errors are not passed through the protocol) –Lacks a one liner entry with all information when successful (there is one, but, for example, lacks the FQAN)

What is GUMS? GUMS purpose is to manage the mapping between Grid Credentials to Site credentials –Centralized: one GUMS per site, one configuration file for all gatekeepers/services –PDP: enforcement is done at the gatekeeper/service (through grid-mapfiles or callouts) –Customizable: designed to be integrated with other site systems with little effort

Centralized management Designed by and for a site with a number of heterogeneous gatekeepers –For example, BNL GUMS has more than 10 gatekeepers (4 from STAR, 1 PHENIX, 6 ATLAS) + other ATLAS services (dCache, DIAL, …) –Some of these are OSG, some are test machines, some needs special test maps, … –One place of configuration allows control and consistency (For a small site, with one gatekeeper and 20 nodes, that is fine with a single account per VO, we currently recommend mapfiles and edg- mkgridmap.)

GUMS overview Tomcat server GUMS DB Business logic … VO … VO VOMS-Admin ldap VO Web UI (JSP) Cmd line Admin WS (Axis) Persistence (hibernate, ldap) PRIMA Web browser Glite trustmanager XML configuration AuthZ WS WS = Web Service UI = User Interface SAML + obligations over SOAP/HTTPS SOAP/HTTPS HTTPS filesystem

GUMS Policy example <userGroup className='gov.bnl.gums.LDAPGroup' server='grid-vo.nikhef.nl' query='ou=usatlas,o=atlas,dc=eu-datagrid,dc=org‘ persistanceFactory='mysql' name='usatlas' /> <userGroup className='gov.bnl.gums.VOMSGroup' url=' persistanceFactory='mysql' name='star' sslCertfile='/etc/grid-security/hostcert.pem' sslKey='/etc/grid-security/hostkey.pem'/> … …

GUMS Authorization GUMS admin can perform any operation through web service and web ui door Host can only perform read operations (map generation and mapping requests) for itself Configuration can be changed through filesystem only (automatically reloaded when changed)

GUMS performance BNL production server gives ~30 req/sec… –Not that good –Is not the bottleneck right now, as the production gatekeeper can only give ~5 req/sec Performance test show that –Overall delay (client-server-client) is ~220ms –The GUMS logic is responsible for up to 20ms –The rest is plain AXIS SOAP + SSL –It’s not glite trustmanager’s fault either…

GUMS performance JClarens group confirmed this while comparing SOAP with XML-RPC –XML-RPC without SSL: 373 req/sec – with SSL: 274 –SOAP without SSL: 218 req/sec – with SSL: 23 –10 times slower! Is it SOAP? Is it Axis implementation? At least, GUMS can run on a cluster –All state resides in the database, transactions are used, no session transfer needed, no cluster cache needed –Almost all… the configuration file is on filesystem, an needs to be updated on all machines (at the same time)

GUMS Complaints The configuration file is difficult –It usually takes people a few tries –We should simplify it –We should probably have ways to “share” parts of it (contact a location to get standard OSG groups definitions?)

Storage AuthZ (not in prod) site GUMS Server Gatekeeper GRAM gridFTP PRIMA Execution site SRM/ dCache gPLAZMA Storage Authorization Service Adds AuthZ params that are dCache specific. XACML policy. SAML + obligations over SOAP/HTTPS

Storage AuthZ gPlazma is dCache authorization infrastructure, which can be set to contact the Storage Authorization Service –Distributed as part of dCache, Beta quality The Storage AuthZ Service speaks the same SAML GUMS does, and is configured with a XACML policy –Contact GUMS to retrieve the mapping –Adds other AuthZ parameters (i.e. gid, user home path, …) –Prototype level

Other issues: maps GUMS is able to generate grid-mapfiles and also an inverse accounting map used by OSG accounting –Want to move away from them: creating a map means exploring all the policy, which breaks dynamic account mapping (i.e. for a pool, we have to assigns accounts to everybody) Assumption: we believe that inverse maps (uid-> DN) are not needed –For example, in accounting what you really need is a history of what uid was assigned to what DN. That changes with time. It’s better handled by looking at log files.

Conclusions GUMS and PRIMA are deployed in production on a number of OSG sites Privilege project depends on the following formats: –VOMS Proxy format (PRIMA) –AuthZ request: SAML + obligations (everything)