Presentation is loading. Please wait.

Presentation is loading. Please wait.

Managing Roles & Privileges with Grouper and Signet Middleware

Similar presentations


Presentation on theme: "Managing Roles & Privileges with Grouper and Signet Middleware"— Presentation transcript:

1 Managing Roles & Privileges with Grouper and Signet Middleware
Internet2 Spring Members Meeting, April 26, 2006 Tom Barton, University of Chicago Lynn McRae, Stanford University

2 Groups and Roles Roles and Groups Roles -- you know it when you see it
Who someone is (identity) People sharing a common trait, e.g., rank or privilege Roles -- you know it when you see it Institutional role, e.g., faculty, Dean Departmental roles, e.g., chair, admin Professional role, e.g., mathematician, buyer Project role, e.g., analyst, engineer Groups Any collection of people, role-holders or not? Depends on how you name it? Role vs group is not what matters

3 Groups and Privileges Two categories of information are used in making access control decisions Who you are aka “roles” cf RBAC What you can do aka “privileges” cf “value-based authority” Both types of information are conveyed through attributes about a person Grouper and Signet are tools that let you enrich descriptive attributes about people in both ways

4 Grouper Grouper Middleware software/toolkit
User access through a common UI Program access through a common API Defines a “Groups Registry” Brings scattered duplicative groups together for re-use Allows useful actions on these groups -- group math, group nesting, exclusion criteria Hierarchical name-space (name stems & substems) Can leverage existing group information Supports the creation of new groups By schools, departments, and individuals! Distributed/delegated model of control

5 Signet Signet Middleware software/toolkit
User access through a common UI Program access through a common API Brings privilege information together in one place -- a “Privilege Registry” Central granting, can apply across multiple systems Central reporting, history, auditing, review Accessible to managers AND holders of privileges Independent of specific vendors, systems, releases or technologies Distributed/delegated model of control

6 Relative Roles of Signet & Grouper
RBAC model Users are placed into groups Grouper allows local creation and management of group membership Privileges can then be assigned to groups Signet manages privileges to groups (as well as to individuals) Both “role” and privilege information can be leveraged by systems Grouper Signet

7 Access Control Decision
Q: Subject + Resource + Action + Context Subject = who wants to take an action, typically a person Resource = what is the action against, e.g., file, building, data, service, etc. Action = what they want to do, e.g., view, modify, enter, approve, run, etc. Context = time of day, academic term, weather, etc. A: Policy interpretation and decision, e.g. Resource and action are available to a group, e.g., Faculty at MIT, Students in a class Available to anyone with “entitlement” for the service

8 Access Control Decision
Resource Subject Identity Provider Service Provider Subject tries to access resource auth’d Context Provider evaluates required identity attributes against rules for resource Provider grants or denies access Rules Policy

9 Palace Access Who are you? What can you do? organization=RoyalCourt
M (MUSKETEER) Who are you? organization=RoyalCourt affiliation=musketeer What can you do? permission=palace_access

10 Identity & Access Management
Each person’s online activities are shaped by many Sources of Authority Institutional policy making bodies Resource managers Program/activity heads Self Management of the information it conveys should be distributed Hook up all of those Sources of Authority to the middleware Common middleware infrastructure should be operated centrally Departments/programs/activities should not have to build their own core middleware

11 Big picture

12 Big picture, without Grouper/Signet

13 “Groups is good” HR Identity Management Calendar WIKI
allow Bio-X Calendar define HR Affiliation: faculty Dept: Biology allow BioX Lists define What about my team? …my project? …my senior staff? The Boss allow BIO_X WIKI define

14 Departmental & other local groups
Identity Management allow Bio-X Calendar HR Affiliation: faculty Dept: Biology allow Bio-X Lists biology:bio-x biology:bio-x:admin biology:bio-x:staff allow Bio-X WIKI Grouper The Boss

15 Filling the gap HR Identity Library Management Shib SIS Courses
allow CS teaching Library CompSci resources SIS Courses Affiliation: faculty Instructor: CS-313 Allow CS-313 CourseWare grades Shib The Professor What about my TAs? … my auditors? … extensions/makeup? allow CS affiliates External Partner

16 Extending Course infrastructure
HR Identity Management allow CS teaching Library CompSci resources Affiliation: faculty Instructor: CS-313 SIS Courses U Allow CS-313 CourseWare grades Class:CS-313:TA = isMemberOf: CS-313 Shib Grouper allow CS affiliates External Partner The Professor

17 Extending Course infrastructure
HR Identity Management allow CS teaching Library CompSci resources Affiliation: faculty SIS Courses faculty: CS-313 U allow CS-313 CourseWare grades class:CS-313:TA = isMember: CS-313 Shib Course Ware Grouper allow CS affiliates External Partner The Professor

18 Creating new identity Identity Guest Management IDs Black board
student, guest Black board Affiliation: ??? staff, guest Printing Rula Lenska “Friends are here from Europe!” Sib faculty, staff, student guest Athletic Facilities

19 Creating new identity Identity Guest Management IDs Black board
student, guest Black board Affiliation: guest guestids:guests blackboard(music103) staff, guest Printing guestids:admin printing(max100) athletic(gym,after5) Grouper Sib faculty, staff, student guest Athletic Facilities Signet effective date expiration date Rula Lenska

20 Distributing control of authority
Finance phone Identity Management who can spend Requisitions ticket Affiliation: staff who can approve Reimburse- ments A.Greenspan “Unless the situation is reversed, these …trends will cause serious economic disruptions” who can view Reporting

21 Distributing control of authority
Finance Identity Management who can spend Requisitions Accounts Depts Affiliation: staff Scope school:dept1 (view,all) who can approve Reimburse- ments school:dept2 (approve,1472,$100) Grouper who can view Reporting Signet while staff A.Greenspan B.Bernake

22 Distributing control of authority
Finance Identity Management who can spend Requisitions school Affiliation: staff school:dept scope school:dept1 (view,all) who can approve Reimburse- ments school:dept:unit school:dept2 (approve,1472,$100) Grouper who can view Reporting Signet while staff A.Greenspan B.Bernake

23 The duck test… Grouper Signet
Binary info – you’re either in some list or not Locally tweak or combine other groups Identification layer of an encompassing access management scheme Identity- or affiliation-based access control or distribution Signet Structured, qualified info – limits, conditions, scope, … Assignments to individuals as well as groups Delegation and chain of authority essential for access decisions Enable functional, not just technical, people to manage privileges Supports policy control closer to source of authority Audit requirements

24 Consider Signet when … Complex group intersections and hierarchies become cumbersome Difficult to track who has what and when Can’t easily move people; need to delete/add Implementation of related access rules is scattered across systems different procedures, different contacts, managing changes across areas, over time You need to coordinate policy, privileges and audit activities across systems

25 Signet & Grouper Overview

26 Grouper Overview Mix of manual and automation processes manage a common Groups Registry Stored in an RDBMS Automation processes provision info from the Groups Registry into LDAP, AD, directly into application-specific databases, wherever the value of the info warrants spending the resources to place it there Two types of managed objects: groups and naming stems Groups are created & named with a naming stem Group management authority is delegatable By group or by naming stem

27 Grouper Groups Any “subject” can be a group member or privilegee
Persons, groups, site-defined subject types Uses Subject API developed by Grouper+Signet teams Subgroups (now), composite groups (v1.0), and aging (v1.1) of groups and memberships Privileges ADMIN, UPDATE, READ, VIEW, OPTIN, OPTOUT Group attribute set can be site-extended

28 Naming Stems Groups are created with naming stems
Limits the authority to create and name groups Support distinct activities with own authority Naming stems can be arranged hierarchically eg, uc, uc:nsit, uc:nsit:labs Privileges STEM Create subordinate naming stems Assign privs for this naming stem CREATE – create groups with this naming stem

29 Composite Groups Membership is defined by composing the memberships of 2 other groups A = B U C union A = B ∩ C intersection A = B – C relative complement Common use – “tweak” existing groups Whitelist or blacklist factored in to another group

30 Example: Computer Cluster Access
Allow access if in (nsit:labs:eligible – nsit:labs:barred) nsit:labs:eligible (manual) nsit:labs:barred (manual) nsit:labs:whitelist (manual) nsit:labs:blacklist (manual) uc:faculty (auto) uc:staff (auto) categories of barred students (auto) categories of entitled students (auto) time dependent student categories (auto)

31 Systems Integration API XML Import/Export Tool
Snapshots Groups Registry, including naming stems and privileges A single group All subordinate to a specified naming stem All matching a search condition Entire Registry

32 Signet Overview Analysts define privileges in functional terms and specify associated system-level permissions Signet presents this functional view in a Web UI where users assign privileges & delegate authority across all areas in which they have authority Signet internally maps assigned privileges into system-specific terms needed by applications Privileges are exported, transformed, & provisioned into applications and infrastructure services Signet provides automated lifecycle controls

33 Privileges Building Blocks
Functional view Subsystems Categories Functions Scope, Limits Prerequisites & Conditions System view Permissions Subject Action Resource

34 Functional View Subsystems contain… Functions Limits Scope Categories
The things a person can do; what they are getting privileges for Categories Provide useful arrangement of functions within a subsystem; for reporting, ease of use Limits Qualifiers, constraints for a privilege Scope Organizational hierarchy governing distributed delegation

35 Functional View Student Admin Course Support Financial Aid
Add/Drop students Which term Schedule Classes Which campus Financial Aid Process Applicants For school… Award Scholarships From Fund… Manage Accounts For fund… Clinical Trial Protocol A Patient Records Read/Write Materials Control Qty/day Admin Manage Grant $ constraints Lab Access Hours Subsystems Categories Functions Limits organizing actions

36 Systems View Permissions Resources
Atomic units of control that map to specific access rules in systems Includes limits that must be evaluated when interpreting permissions Resources The target of a specific privilege; things that have access rules to control their use

37 Functional View  Permissions
Calendar Student Admin reserve_time view_schedules Course Support Add/Drop students Course Schedule Classes update_course_data Facilities reserve_room Financial Aid Process Applicants Financial Award Scholarships view_fund_data Manage Accounts update_fund_data Student student_records categories functions applicant_data Functional View Resources/Permissions

38 Systems Integration API Permissions document
XML representation of privileges for an individual or group Will be compatible with XACML

39 Privileges Lifecycle Conditions Prerequisites
Provides automatic revocation of privileges Date controls -- from date, until date Will be based on person’s status, affiliation, etc. e.g., as long as person is at Stanford Prerequisites Pre-conditions that must be met to activate privileges e.g., training

40 Other features Assignments can be
To an individual To a Group With/without ability to further delegate Distributed delegation using organizational hierarchy Records “chain of command” Proxy assignment Temporary granting of one’s privilege to another

41 Privilege Elements by Example
By authority of the Dean grantor principal investigators grantee (group/role) who have completed training prerequisite can approve purchases function in the School of Medicine scope for research projects resource up to $100,000 limit until January 1, 2007 as long as a faculty member at… conditions Privilege Lifecycle

42 Generic Integration Architecture

43 Further Integration Tasks
Automated loading of groups & privileges Authentication service Application-specific integration capabilities Site-specific LDAP schema Authoring/maintaining subsystem metadata Solution requisites Which groups should be made available to the calendaring, list, & wiki systems? The Boss may need an automatic grant of a Signet privilege to manage his wiki space Implementing service policies – Grouper naming stems & privileges or Signet privileges

44 Subject API: Site IAM Integration Requirements
Subject - a person, group, application, or other type of object whose identity is managed by your IAM system Abstract the underlying technology and data model from a relying application Enable identifier namespaces to be selected to match application needs Username vs. opaque registryID vs. … Scenarios Map authenticated user to internal security principal Reference/search objects within application

45 Subject API: Integration with Site’s IAM

46 Source Adapter Configuration
Name the source & specify connection details Name the type or types of subjects residing there Identify attributes/columns distinguished as “subjectID”, “name” and “description” Specify back-end-specific searches for each type and each search method Select Search by identifier Search Sites should make consistent assignment of source and type names across all source adapter instances They are persisted by Subject API clients

47 Signet & Grouper Roadmaps
Now available Grouper v0.9. UI & API source release Signet 1.0. UI, binary release Subject API v0.1b Signet Roadmap v1.1, ? 2006 – full API source release v1.2, ? 2006, – rules processor Grouper Roadmap v1.0, May 2006 – group math v1.1, ? 2006 – group & membership aging Subject API v1.0, ? 2006 – minor changes, updates to reference implementations

48 Resources & Participation
Grouper team: University of Chicago & University of Bristol Signet team: Stanford University Internet2 Middleware Initiative Documents, software, cvs Details for subscribing to mailing lists Conference call agendas & dialing instructions


Download ppt "Managing Roles & Privileges with Grouper and Signet Middleware"

Similar presentations


Ads by Google