AAI in Europe ++ Ken Klingenstein Director, Internet2 Middleware and Security.

Slides:



Advertisements
Similar presentations
The Basics of Federated Identity. Overview of Federated Identity and Grids Workshop Session 1 - for all Basics and GridShib Session 2 – more for developers.
Advertisements

The Art of Federations. Topics Federations of what… Federated identity versus federations Federations in other sectors – business, gov, ad hoc R&E Federations.
The rise, slowly, of a middleware infrastructure Ken Klingenstein Director, Internet2 Middleware and Security Ken Klingenstein Director, Internet2 Middleware.
The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Trends in Identity Management Nate Klingenstein Internet2 EDUCAUSE Security Professional 2007.
Welcome to CAMP! Ken Klingenstein, Director, Internet2 Middleware Initiative.
US E-authentication and the Culture of Compliance RL “Bob” Morgan University of Washington CAMP, June 2005.
2006 © SWITCH Authentication and Authorization Infrastructures in e-Science (and the role of NRENs) Christoph Witzig SWITCH e-IRG, Helsinki, Oct 4, 2006.
Update on federations, PKI, and federated PKI for US feds and higher eds Tom Barton University of Chicago.
Drive-By Dialogues. Presenter’s Name Topics The Long Strange Trip of I2 – NLR Merger A Brief Comment on Optical Networking Middleware Developments Security.
1 eAuthentication in Higher Education Tim Bornholtz Session #47.
EAuthentication in Higher Education Tim Bornholtz Session 58.
The E-Authentication Initiative An Overview Peter Alterman, Ph.D. Assistant CIO for e-Authentication, NIH and Chair, Federal PKI Policy Authority The E-Authentication.
InCommon Policy Conference April Uses  In order to encourage and facilitate legal music programs, a number of universities have contracted with.
Welcome to CAMP Identity Management Integration Workshop Ann West NMI-EDIT EDUCAUSE/Internet2.
Federations and Security: A Multi-level Marketing Scheme Ken Klingenstein Director, Internet2 Middleware and Security.
Use case: Federated Identity for Education (Feide) Identity collaboration and federation in Norwegian education Internet2 International Workshop, Chicago,
Federated Security and the Federal Government Ken Klingenstein Director, Internet2 Middleware and Security.
Ray Collins27th September 2005LGfL Project – workshop report1 LGfL Project Report Proof of Principle of the Shibboleth Authentication & Authorisation Infrastructure.
The InCommon Federation The U.S. Access and Identity Management Federation
Shib in the present and the future Ken Klingenstein Director, Internet2 Middleware and Security.
Interfederation RL “Bob” Morgan University of Washington and Internet2 Digital ID World 2005 San Francisco.
1 The Partnership Challenge Higher education’s missions are realized in increasingly global, collaborative, online relationships –Higher educations’ digital.
Federations: success brings new challenges Ken Klingenstein Director, Internet2 Middleware and Security.
AARC Overview Licia Florio, David Groep 21 Jan 2015 presented by David Groep, Nikhef.
Australian Access Federation and other Middleware Initiatives Presented at TF-EMC2, Prague 4 Sep 2007 Patty McMillan, The University of Queensland.
2005 © SWITCH Perspectives of Integrating AAI with Grid in EGEE-2 Christoph Witzig Amsterdam, October 17, 2005.
InCommon Update Internet2 Meeting April 20, 2004 Ken Klingenstein and Carrie Regenstein.
Stuff, including interfederation stuff Dr Ken Klingenstein, Director, Middleware and Security, Internet2.
Supporting further and higher education Middleware and AA within the JISC Environment Nicole Harris, JISC Development Group.
David L. Wasley Office of the President University of California Shibboleth Safe delivery of reliable authorization data David L. Wasley University of.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Shibboleth A Federated Approach to Authentication and Authorization Fed/Ed PKI Meeting June 16, 2004.
Internet2 Middleware Initiative. Discussion Outline  What is Middleware why is it important why is it hard  What are the major components of middleware.
Federations 101 John Krienke Internet2 Fall 2006 Internet2 Member Meeting.
Integrated Institutional Identity Infrastructure: Implications and Impacts RL “Bob” Morgan University of Washington Internet2 Member Meeting, May 2005.
Shibboleth at Columbia Update David Millman R&D July ’05
PKI and the U.S. Federal E- Authentication Architecture Peter Alterman, Ph.D. Assistant CIO for e-Authentication National Institutes of Health Internet2.
Intro to Shibboleth and Federation… Ken Klingenstein Director, Internet2 Middleware and Security.
US of A and A Activities Ken Klingenstein, Director Internet2 Middleware Initiative.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
National Authentication and Authorization Infrastructures and NRENs Ken Klingenstein Director, Internet2 Middleware and Security.
Shibboleth Update Eleventh Federal & Higher Education PKI Coordination Meeting (Fed/Ed Thursday, June 16, 2005.
State of e-Authentication in Higher Education August 20, 2004.
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
The Feds and Shibboleth Peter Alterman, Ph.D. Asst. CIO, E-Authentication National Institutes of Health.
Identity Federations and the U.S. E-Authentication Architecture Peter Alterman, Ph.D. Assistant CIO, E-Authentication National Institutes of Health.
Shibboleth: Molecules, Music, and Middleware. Outline ● Terms ● Problem statement ● Solution space – Shibboleth and Federations ● Description of Shibboleth.
The UK Access Management Federation John Chapman Project Adviser – Becta.
Shibboleth Trust Model Shibboleth/SAML Communities (aka Federated Administrations) Club Shib Club Shib Application process Policy decision points at the.
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Welcome to Base CAMP: Enterprise Directory Deployment Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein This.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Identity Management, Federating Identities, and Federations November 21, 2006 Kevin Morooney Jeff Kuhns Renee Shuey.
Origins: The Requirements of Participating in Federations CAMP Shibboleth June 29, 2004 Barry Ribbeck & David Wasley.
InCommon® for Collaboration Institute for Computer Policy and Law May 2005 Renee Shuey Penn State Andrea Beesing Cornell David Wasley Internet 2.
Growth. Interfederation PKI is globally scalable Unfortunately, its not locally deployable… Federation is locally deployable Can it.
InCommon Update FedEd Meeting June 16, 2004 Carrie Regenstein.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Interoperability Shibboleth - gLite Christoph.
Federal Initiatives in IdM Dr. Peter Alterman Chair, Federal PKI Policy Authority.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Bob Jones EGEE Technical Director
Shibboleth Roadmap
JRA3 Introduction Åke Edlund EGEE Security Head
Context, Gaps and Challenges
HIMSS National Conference New Orleans Convention Center
Shibboleth and Federations
Presentation transcript:

AAI in Europe ++ Ken Klingenstein Director, Internet2 Middleware and Security

Topics  What and why AAI  The basic ingredients Shibboleth and SAML WS-Fed and WS-* Federations and InCommon, a US R&E federation PKi, in lots of ways…  In Europe  In the US The Federal e-Authentication Initiative Phase 1/2 – Certifying Shib, Shaping Policy Issues, etc Phase 3/4 – SAML 2.0 Profile, USperson deliverables, interfederation peering Work with Microsoft  Other international federations  What is easy / What is hard  What remains to be done

Topics  What is an AAI? Authentication and Authorization and Infrastructure The Hierarchical Model and Classic PKI The Federated Model and Local Authentication Relationship to virtual organizations and e-Science  Links to NRENs Management of bandwidth Management of security Conservation of organizations

Authentication and Authorization Infrastructure  Authentication – provides positive proof, at several possible strengths, of identity  Authorization – assign permissions to use resources, from web sites to supercomputer access, digital content to parking spaces  Infrastructure means: A reliable, robust, ubiquitous, service Initially to the R&E community but with applicability to other vertical sectors National in character, but of service to multi-national virtual organizations Built on either central, hierarchical or federated, enterprise models

Key Issues for AAI  In authentication, the key issues are strength of authentication (identity proofing, delivery of credential, repeated use of credential) and privacy/secrecy  In authorization, the key issues are permissions to use resources, delegation, audit and privacy  In infrastructure, the issues are ubiquity, robustness, ability to support a wide range of needs and uses, and funding

Hierarchical Model  Top level issuing authority controlling LOA, namespace, profiles, etc.  Creates subordinate CA’s to enterprises, agenicies, communities, etc.  Uses classic X.509 PKI for end-entity authentication  A very few national infrastructures, with limited delegation to enterprises.  Very short hierarchies used in Grids  Tough fit with privacy

Federated model  Enterprises and organizations provide local LOA, namespace, credentials, etc.  Uses a variety of end-entity local authentication – PKI, username/password, Kerberos, two-factor, etc.  Enterprises within a vertical sector federate to coordinate LOA’s, namespaces, metadate, etc.  Internal federations within large complex corporations have been “discovered”.  Privacy/security defined in the context of an enterprise or identity service provider

Lack of Infrastructure Reality  Lacking interrealm infrastructure, Collaborative applications can’t be safely deployed E-science fails to scale Dynamic bandwidth allocations can’t be made Virtual organizations create ad hoc, insecure, unreliable, non- transparent, difficult to audit duct-tape solutions Privacy spills occur

Federating Software  Shibboleth – an open source privacy preserving standards-based system  Liberty Alliance – large commercial standards group in federated identity management  Liberty and Shib have essentially converged around SAML 2.0, with Liberty Alliance moving into services and Shib being refactored and expanded  WS-* - MS (with IBM) “standards” that is slowly emerging, with some interoperability with SAML and Shib

Shibboleth  An architecture, consisting of both a payload definition (using SAML) of attributes and a set of privacy-preserving methods of exchanging such payloads.  A project that has managed the development of the architecture and code  A code package, running on a variety of systems, that implements the architecture.  (Note that other code sets are under development)

Federations  Persistent enterprise-centric trust facilitators  Sector-based, nationally-oriented  Federated operator handles enterprise I/A, management of centralized metadata operations  Members of federation exchange SAML assertions bi- laterally using a federated set of attributes  Members of federation determine what to trust and for what purposes on an application level basis  Steering group of members sets policy and operational direction for federation

Federations and PKI  The rough differences are payload format (SAML vs X.509) and typical length of validity of assertion (real-time vs long-term)  Federations use enterprise-oriented PKI heavily and make end-user PKI both more attractive and more tractable – adding privacy (secrecy), ease of verification, addition of role, etc.  The analytic framework (evaluation methodologies for risk in applications and strength of credentials) and infrastructure developed for PKI is useful for federations.  The same entity can offer both federation and PKI services

Shibboleth based Federations  In the US InQueue – several hundred enterprises globally in development, testing (and a little production) InCommon – institutions and partners in production service and posted operational practices State and system federations beginning  Internationally Full production federations in Switzerland, Finland, United Kingdom, etc; numerous other federations under way “League of federations” has been established to address development and peering

InCommon federation  Federation operations – Internet2  Federating software – Shibboleth 1.2 and above  Federation data schema - eduPerson or later and eduOrg or later  Federated approach to security and privacy, with policies posted by members in common formats  Became fully operational 9/04; currently around 15 members  Precursor federation, InQueue, has been in operation for about six months and will feed into InCommon; approximately 150 members 

InCommon Members 4/10/05 Dartmouth College Elsevier ScienceDirect Cornell University Internet2 OCLC OhioLink - The Ohio Library and Information Network The Ohio State University Penn State SUNY Buffalo University of California, Irvine University of California, Los Angeles University of California, Office of the President University of California, San Diego University of Rochester University of Southern California University of WashingtonDartmouth College Elsevier ScienceDirect Cornell University Internet2 OCLC OhioLink - The Ohio Library and Information Network The Ohio State University Penn State SUNY Buffalo University of California, Irvine University of California, Los Angeles University of California, Office of the President University of California, San Diego University of Rochester University of Southern California University of Washington

InCommon Uses  Institutional users acquiring content from popular providers (Napster, etc.) and academic providers (Elsevier, JSTOR, EBSCO, Pro-Quest, etc.)  Institutions working with outsourced service providers, e.g. grading services, scheduling systems, software sales  Inter-institutional collaborations, including shared courses and students, research computing sharing, etc.  (Shared network security monitoring, interactions between students and federal applications, wireless network access, peering with international activities, etc.)

InCommon pricing  Goals Cost recovery Manage federation “stress points”  Prices Application Fee: $700 (largely enterprise I/A, db) Yearly Fee –Higher Ed participant: $1000 per identity management system –Sponsored participant: $1000 –All participants: 20 Resourceproviderids included; additional resourceproviderids available at $50 each per year, available in bundles of 20

InCommon Management  Operational services by I2 Member services Backroom (CA, WAYF service, etc.)  Governance Steering Committee – drawn from CIO level leadership in the community - sets policies, priorities, etc. Project manager – Internet2  Contractual and policy issues were not easy and will evolve  Initially a LLC; likely to take 501(c)3 status in the long term

Trust in InCommon - initial  Members trust the federated operators to perform its activities well The operator (Internet2) posts its procedures Enterprises read the procedures and decide if they want to become members Contracts address operational and legal issues  Origins and targets establish trust bilaterally in out-of-band or no- band arrangements (using shared posting of practices) Origins must trust targets dispose of attributes properly Targets must trust origins to provide attributes accurately Risks and liabilities managed by end enterprises, in separate ways –Collaborative apps are generally approved within the federation –Higher risk apps address issues through contractual and legal means

Members Trusting Each Other: Participant Operational Practice Statement  Basic Campus identity management practices in a short, structured presentation Identity proofing, credential delivery and repeated authn Provisioning of enterprise-wide attributes, including entitlements and privileges  Basic privacy management policies Standard privacy plus Received attribute management and disposal  No audit, unclear visibility of policies

InCommon Progress  Relatively straightforward Syntax and semantics of exchanged attributes (Eduperson) Set up and operation of federation Selling the concept and value  More challenging Having applications make intelligent use of federated identity Handling indemnification Finding scalable paths for LOA components

Federal eAuthentication  Key driver for e-government, operating under the auspices of GSA  Leveraging key NIST guidelines  Setting the standard for a variety of federated identity requirements Identity proofing SAML bindings Credential assessment Risk assessment  Technical components driven through the InterOp Lab 

Federal eAuthentication federation  Original model was to certify a few key Credential Service Providers (CSP’s) to a variety of federal applications, both agency to agency and citizen to agency  Evolving model includes a federation of federal agencies, peering with other sector-based federations  Peering is intended to leverage other peering vehicles for trust  Peering could also include operational components such as attribute and identifier mappings, and correlation of contractual and financial approaches

Phase 1/2 of Interaction  Phase 1/2 work commissioned to identify issues and opportunities for interactions between higher ed and federal eAuthentication  Deliverables include Policy framework comparison submitted Oct 7 Technical interop of Shib demonstrated October 14 CAF/POP comparison submitted Jan 28 Next stages scope of work submitted mid-Feb

Phase 3/4 of the Interactions  Deliverables include: Recommended e-Authentication SAML 2.0 profile. Recommendations concerning a USperson object class Recommendations on the formation of a US Government federation Draft approach to interfederation peering  Deliverables due Sept 30, 2005

USPerson  Initial focus is on citizen-agency interactions  Extensible architecture; likely a UML model with various bindings  Intended for use by CSP’s, either directly, via peering mappings, etc.  Deliverables may include a small core of attributes, organizational superstructure, discussions on mechanisms for extensions, maintenance, authoritative sources, etc.  WACOW

InCommon-Fedfed Peering  New territory…  Technical Mapping LOA’s Mapping attributes SAML technical issues PKI technical issues  Policy What agreements need to be in place Where does liability flow What audit requirements will be needed

WS-Fed and Shib  Agreements to build WS-Fed interoperability into Shib Contracts signed; work to begin later this spring WS-Federation + Passive Requestor Profile + Passive Requestor Interoperability Profile  Discussions broached, by Microsoft, in building Shib interoperabilty into WS-Fed; no further discussions  Devils in the details Can WS-Fed-based SPs work in InCommon without having to muck up federation metadata with WS-Fed-specifics? All the stuff besides WS-Fed in the WS-* stack

International federation peering  Shibboleth-based federations in the UK, Netherlands, Finland, Switzerland, Australia, Spain, and others  International peering meeting October in Upper Slaughter, England  Issues include agreeing on policy framework, comparing policies, correlating app usage to trust level, aligning privacy needs, working with multinational service providers, scaling the WAYF function  Leading trust to Slaughter…

Upper Slaughter

Leading trust to Slaughter

Three types of issues  Internal federation issues Business drivers – educational, research, admin – helping each country find a reason Cookbook – key issues and common touchpoints Alignment with other trust services such as PKI  Inter-federation issues Needs for agreements –Authncontext, attributes Needs for legal frameworks –Assignment of roles within federation between –Treaties/MOU between federations Privacy  Union of federations issues (brand, membership, etc..)

Leading trust from Slaughter

Futures  Technically Privacy management software and GUI Widespread deployment of federating software Challenges to application developers to “think federated” Consensus on standards in LOA, attributes, privacy approaches, etc. Support for virtual organizations and Grids  Politically Advent of more federations Inter-sector peering International peering Integration, at multiple points, with PKI