Presentation is loading. Please wait.

Presentation is loading. Please wait.

Jens Jensen, STFC Sep EUGridPMA Manchester

Similar presentations


Presentation on theme: "Jens Jensen, STFC Sep EUGridPMA Manchester"— Presentation transcript:

1 Jens Jensen, STFC Sep. 2017 EUGridPMA Manchester
Pathfinder Stuff Jens Jensen, STFC Sep. 2017 EUGridPMA Manchester

2 Contents AAAI Pathfinder Er, that’s it.

3 AAAI Pathfinder GridPP VOMS DiRAC, ARCHER X.509 SAFE ssh IdP

4 AAAI Pathfinder GridPP PRACE EGI, EUDAT, Indigo DC X.509 IdP

5 GridPP, EGI, PRACE, EUDAT, GlobusConnect(?)
DB Pathfinder T3.2 STFC/Facilities Portal sshd User Reg’n portal SCARF Public Authn MyProxy Online CA HSM GridPP, EGI, PRACE, EUDAT, GlobusConnect(?)  VOMS

6 (links to) JISC and service AUP CRL (links to) CP and CPS
Moonshot (user) authenticated Account management Public Portal/server (no authentication required) Information Links to helpdesk (links to) JISC and service AUP CRL (links to) CP and CPS AUP Acceptance Name filter IdP check Attribute check Data Processing Acceptance Certificate Interface Acct DB Status (Re)new Revoke Management Interface (X.509 authenticated) Service API Forget

7 GridPP’s participation
Work with Suleman Tariq CA portal (user interface) If you have an IdP in Assent, you can authenticate to Not finished yet You can’t get a certificate (yet) Evaluated, but chose not to use MP client Chose not to use the CTS code No VOMS in interface; expecting attrs from Moonshot

8 Visiony Stuff Single identity provided by home org.
Or a “homeless” org. Access to both web and non-web resources Chicken and egg takeup: More resources make having an IdP more attractive Use Pathfinder to provide resources

9 Technical Points Moonshot requires client side libs (mech_eap.so)
X.509 certificates require higher LoA Aiming for BIRCH Need for IdP to communicate “loss of traceability” Infrastructure managed private keys Should improve usability

10 (Main) Risks (There is a proper risk register…) Not enough IdPs…
Of a sufficient LoA (IGTF BIRCH) Need to sign a contract! (little assurance in Assent itself) IdP cannot notify on loss of traceability IGTF accreditation delayed Users still manage certs through browser!

11 Database

12 Current Status Trusted IdPs: managed manually (whitelist) in service
No assurance in Assent Needs agreement (lawyers, legal) Compare UK eSc: HoD signed Option for individual user step up auc. Guidance from AARC? Needs to not just be a one off (traceability) Registration practices statement? Option for notification “step up” as well Complicated status: need UF indicator

13 Current Status – Person
Unauthenticated person Authenticated person Authenticated from good org Or has step-up (see prev.) Authenticated from good org with good attrs Authenticated from good org with good attrs and notify on loss of traceability Authenticated from good org with good attrs and notify on loss of traceability and AUP/dataprot.-accept

14 Final steps Need approval from reviewers! MyProxy ∫ (à la CTS)
No VOMS extensions though Not prod’n ready Temporary CA, database in cloud Writeup to be finished Still some funnies in the system 10-14 unauthorised requests are made before one is authorised(!) Still need the attributes! (see RFC 7056) Doesn’t pick up local biscuit even with IE Ensure logging is correct

15 Future directions ∫ with RCauth?
Could support IOTA branch for < MICS Lots of Globus dependencies for MyProxy Will need to approve each IdP (Need to define process for doing so) And debug its attributes… Like, what is the User-Name (RFC 7056)


Download ppt "Jens Jensen, STFC Sep EUGridPMA Manchester"

Similar presentations


Ads by Google