Database authentication in CORAL and COOL Database authentication in CORAL and COOL Giacomo Govi Giacomo Govi CERN IT/PSS CERN IT/PSS On behalf of the.

Slides:



Advertisements
Similar presentations
Chapter 20 Oracle Secure Backup.
Advertisements

Data Management Expert Panel - WP2. WP2 Overview.
Data Management Expert Panel. RLS Globus-EDG Replica Location Service u Joint Design in the form of the Giggle architecture u Reference Implementation.
19/06/2002WP4 Workshop - CERN WP4 - Monitoring Progress report
Chapter One The Essence of UNIX.
RLS Production Services Maria Girone PPARC-LCG, CERN LCG-POOL and IT-DB Physics Services 10 th GridPP Meeting, CERN, 3 rd June What is the RLS -
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
GGF Toronto Spitfire A Relational DB Service for the Grid Peter Z. Kunszt European DataGrid Data Management CERN Database Group.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
Distributed Systems: Client/Server Computing
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
(ITI310) SESSIONS : Active Directory By Eng. BASSEM ALSAID.
Session 6 Windows Platform Dina Alkhoudari. Learning Objectives What is Active Directory Logical components of active directory Physical components of.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
The LCG File Catalog (LFC) Jean-Philippe Baud – Sophie Lemaitre IT-GD, CERN May 2005.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
DIRAC Web User Interface A.Casajus (Universitat de Barcelona) M.Sapunov (CPPM Marseille) On behalf of the LHCb DIRAC Team.
ATLAS DQ2 Deletion Service D.A. Oleynik, A.S. Petrosyan, V. Garonne, S. Campana (on behalf of the ATLAS Collaboration)
LFC tutorial Jean-Philippe Baud, IT-GT, CERN July 2010.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
SEC835 Practical aspects of security implementation Part 1.
ESP workshop, Sept 2003 the Earth System Grid data portal presented by Luca Cinquini (NCAR/SCD/VETS) Acknowledgments: ESG.
EGEE-III INFSO-RI Enabling Grids for E-sciencE The Medical Data Manager : the components Johan Montagnat, Romain Texier, Tristan.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
The LCG File Catalog (LFC) Jean-Philippe Baud – Sophie Lemaitre IT-GD, CERN May 2005.
Oracle 10g Database Administrator: Implementation and Administration Chapter 2 Tools and Architecture.
INFNGrid Constanza Project: Status Report A.Domenici, F.Donno, L.Iannone, G.Pucciani, H.Stockinger CNAF, 6 December 2004 WP3-WP5 FIRB meeting.
1 Week #10Business Continuity Backing Up Data Configuring Shadow Copies Providing Server and Service Availability.
ATLAS Detector Description Database Vakho Tsulaia University of Pittsburgh 3D workshop, CERN 14-Dec-2004.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
INTRODUCTION TO DBS Database: a collection of data describing the activities of one or more related organizations DBMS: software designed to assist in.
David Adams ATLAS DIAL/ADA JDL and catalogs David Adams BNL December 4, 2003 ATLAS software workshop Production session CERN.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
EGEE User Forum Data Management session Development of gLite Web Service Based Security Components for the ATLAS Metadata Interface Thomas Doherty GridPP.
CERN - IT Department CH-1211 Genève 23 Switzerland t CORAL COmmon Relational Abstraction Layer Radovan Chytracek, Ioannis Papadopoulos (CERN.
6/23/2005 R. GARDNER OSG Baseline Services 1 OSG Baseline Services In my talk I’d like to discuss two questions:  What capabilities are we aiming for.
Impersonation Bharat Kadia CS-795. What is Impersonation ? Dictionary-: To assume the character or appearance of someone ASP.NET-: Impersonation is the.
Enabling Grids for E-sciencE EGEE-II INFSO-RI Medical Data Manager 1 Dicom retrieval : overview of the DPM One command line to retrieve a file:
Testing and integrating the WLCG/EGEE middleware in the LHC computing Simone Campana, Alessandro Di Girolamo, Elisa Lanciotti, Nicolò Magini, Patricia.
LCG Distributed Databases Deployment – Kickoff Workshop Dec Database Lookup Service Kuba Zajączkowski Chi-Wei Wang.
INFSO-RI Enabling Grids for E-sciencE /10/20054th EGEE Conference - Pisa1 gLite Configuration and Deployment Models JRA1 Integration.
CORAL CORAL a software system for vendor-neutral access to relational databases Ioannis Papadopoulos, Radoval Chytracek, Dirk Düllmann, Giacomo Govi, Yulia.
DGC Paris Spitfire A Relational DB Service for the Grid Leanne Guy Peter Z. Kunszt Gavin McCance William Bell European DataGrid Data Management.
1 A Scalable Distributed Data Management System for ATLAS David Cameron CERN CHEP 2006 Mumbai, India.
Status of tests in the LCG 3D database testbed Eva Dafonte Pérez LCG Database Deployment and Persistency Workshop.
Site Authorization Service Local Resource Authorization Service (VOX Project) Vijay Sekhri Tanya Levshina Fermilab.
LHCC Referees Meeting – 28 June LCG-2 Data Management Planning Ian Bird LHCC Referees Meeting 28 th June 2004.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
SAM architecture EGEE 07 Service Availability Monitor for the LHC experiments Simone Campana, Alessandro Di Girolamo, Nicolò Magini, Patricia Mendez Lorenzo,
DGAS Distributed Grid Accounting System INFN Workshop /05/1009, Palau Giuseppe Patania Andrea Guarise 6/18/20161.
1 Copyright © 2008, Oracle. All rights reserved. Repository Basics.
Amazon Web Services. Amazon Web Services (AWS) - robust, scalable and affordable infrastructure for cloud computing. This session is about:
9 Copyright © 2004, Oracle. All rights reserved. Getting Started with Oracle Migration Workbench.
FP6−2004−Infrastructures−6-SSA E-infrastructure shared between Europe and Latin America LFC Server Installation and Configuration.
Jean-Philippe Baud, IT-GD, CERN November 2007
Business System Development
(on behalf of the POOL team)
Database Readiness Workshop Intro & Goals
POOL File Catalog: Design & Status
Dirk Düllmann CERN Openlab storage workshop 17th March 2003
THE STEPS TO MANAGE THE GRID
Database Management System (DBMS)
An Introduction to Computer Networking
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Database authentication in CORAL and COOL Database authentication in CORAL and COOL Giacomo Govi Giacomo Govi CERN IT/PSS CERN IT/PSS On behalf of the CORAL team On behalf of the CORAL team

2 CORAL status A new release has been published: 1_7_0 Highlights: New IConnection interface split from ISession. Allows more sessions to share the same physical connection (when the back-end supports it: es. Oracle). Users based on the ISessionProxy are only marginally affected by this change. New system test exercising CORAL in a multithreaded environment corresponding to some experiment use cases. Several minor new features and bug fixes

3 Authentication for the CORAL supported DB’s DB Authentication is part of the connection protocol for most of the native DB connectivity libraries: Username/password credential passed explicitly –Hard-coded in the application code –Possibly transmitted in clear over the network Few other options: –Kerberos: supported by Oracle complicate to integrated in the existing Kerberos-based realm (AFS) not applicable to the main use case –Certificates: X509 supported by Oracle and MySQL Proxy certificates (used for the Grid) not supported

4 Architecture context ApplicationSchemaDB user ApplicationDB userSchema User Role SHARED DISTRIBUTED DB SERVER User Application SELF-CONTAINED DB userSchema DB SERVER TWO extreme models: 1) Application deployed in a dedicate computing infrastructure 2) Applications running in a shared, distributed comp. infrastructure SINGLE USER MULTI-USER

5 Architecture context (cont.) Case 1) Deployment not critical: connection and authentication parameters in the application configuration. File based database catalogue + credential store acceptable. Case 2) Large scale deployment critical: connection and authentication parameters have to be propagated with each jobs running in a remote cpu. File based database and credential store ruled out, no minimal security. Mapping between DB user and roles required. Real use cases are less ‘extreme’: Online applications, application-server based applications are close to model 1) Offline, applications running on the Grid are close to model 2)   Aim: satisfy case 2) with some acceptable level of security

6 Using LFC as a backend Using LFC as a backend Strategy: use the LCG File Catalogue Advantage: No extra deployment required Experiments may already depends on it LFC has a built-in Access Permission Mechanism Authentication is based on the grid certificates File access permission similar to standard file system –Role (group) based –ACL based Database-specific entries can be added to the catalogue Mapping logical connection strings to physical database replicas –Logical connection string + Role >> LFN –Replica Connect. String >> PFN –Authentication Credentials are attached as PFN metadata A role granted to the user will allow to access a specific file associated to the logical connection, providing replicas and their authentication parameters

7 Storing DB replicas in LFC Logical Connection String (LCS)Coral Role Folder in LFC Name server [LCS] File in LFC [LCS]/[Role] [GUID] Replica 0 Physical Connection String (PCS)+ DB username+password Replica N Physical Connection String (PCS)+ DB username+password Replica … Physical Connection String (PCS)+ DB username+password Example: LCS = “/Atlas/ECAL_calib/” Role = “calib_reader” LFC file = /database/Atlas/ECAL_calib/calib_reader Replica PCS= oracle:/atlas_ecal_calib/calib_writer Replica username=calib_reader password=xxxxxx Coral Role File in LFC [LCS]/[Role] File in LFC [LCS]/[Role] For each File-role LFC LFN LFC PFN

8 Integrating LFC Security Folder in LFC Name server [LCS] File in LFC [LCS]/[Role] Owned (R/W/X Access granted) by VO DB/application administrators (VO-Admin) Aim: - define replica sets - maintain passwords Owned by VO-Admin R-only access granted to specific LFC groups mapping VOMS roles Implemented with LFC ACL’s Command-Line tool available for VO-Admins: coral_replica_manager –add –l lcs –r role –h host –c pcs –u username –p passowrd coral_replica_manager –set_perm –g groupname –l lcs –r role [permission] More commands are available for: -List available replicas -Delete specific replicas -Set and validate replicas password -Set replica status

9 Mapping DB params to LFC fields Table Cns_file_replica (LFC PFN’s) Table Cns_file_replica (LFC PFN’s) Parameter Description DescriptionValuesColumn GUID File Id fileid status Replica availability ON/OFFstatus Access mode Replica capability ReadOnly/Updatef_type DB host Database server host Authent Authentication mechanism “password”,”none”poolname PCS+GUID +username Physical connection string (unique string) sfn Password DB Authentication credential fs

10 Integrating in CORAL A new component: LFCReplicaService –Implements ILookupService and IAuthenticationService interfaces Replica information (PCS + credentials) is retrieved in one go. –Replica looking up from logical connection string also retrieves authentication parameters –Authententication cannot be used without Lookup Usage through coral::ConnectionService completely transparent –Only the loading of LFCReplicaService has to be configured: –Env variable LFC_HOST (not CORAL specific) has to be set –No other change to user code required –Files dblookup.xml and authentication.xml no longer required

11Deployment Enable an LFC server to be used as a CORAL lookup+authentication service A site-related LFC super user has to create the /database folder in the LFC root (to keep separate the logical files mapped to database connections from logical files mapped to real files) In /database, a specific folder can be created for each VO (es. /database/atlas, /database/lhcb) An experiment specific LFC super user has to be entitled with full permission on the related folder Insert the replica entries: Run the command: coral_replica_manager –add –l lcs –r role –h host –c pcs –u username –p password Set the access permission to the replica for the different roles: coral_replica_manager –set_perm –g groupname –l lcs –r role [permission]

12 Still to finalize… Ordering of replicas –Current implementation: the original insertion order is maintained –For site-specific ordering, a client callback mechanism could be introduced. –Still to ensure: is the required information to implement specific algorithm available? –The HOST parameter in the PFN record is currently not available for defining the “site” Coral role-based authentication –In coral authentication role name has to be explicitly passed as a parameter when related credentials are requested –Role is implicitly defined in the VOMS schema –Coral default role will be mapped to the first valid role file accessible (unique in most of the use cases) What else is missing? What else is missing? Tests with real use pattern have to start! Tests with real use pattern have to start!

13Summary The CORAL team has developed a new component addressing the database authentication and connection string indirection for the applications running in the Grid environment The LFC catalogue is used as a repository for the replica information The access to the authentication parameters is protected by the Grid-certificates based access permission system of the LFC. Some benefit of this choice: LFC widely deployed in the Grid – no changes is required for the storage of db connection strings Little operation required for deployment The software has been released and is ready for real-use testing.