Presentation is loading. Please wait.

Presentation is loading. Please wait.

Users’ Authentication in the VRVS System David Collados California Institute of Technology November 20th, 2003TERENA - Authentication & Authorization.

Similar presentations


Presentation on theme: "Users’ Authentication in the VRVS System David Collados California Institute of Technology November 20th, 2003TERENA - Authentication & Authorization."— Presentation transcript:

1 Users’ Authentication in the VRVS System David Collados California Institute of Technology November 20th, 2003TERENA - Authentication & Authorization

2 What is VRVS? u The Virtual Rooms Videoconferencing System has been developed by Caltech since 1995 to provide a world wide videoconferencing service for education and research communities. u VRVS is a realtime distributed system which provide a scalable communication infrastructure for large collaboration dispersed all over the world. u Different technologies and protocols are supported (and mixed) and allow users to connect their preferred videoconference. u Supports Mbone, H.323, SIP, QuickTime, Access Grid, JMF and MPEG2. u The system is composed of 1 main server and several reflectors spread around the world.

3 VRVS Web Service Design u Unified Web User Interface to schedule and join/leave a meeting independently of any application. u Multi-platform: Windows, Linux, MacOS and Unix u Easy to use: Everybody knows how to click on a web page today. u Virtual Room Concept, Scheduling: Create a virtual space were people can exchange real-time information u Join or Leave a Collaborative session at anytime. No need to know in advance how many participants and booked ports capacity. u Full Documentation and Tutorial u Self service: No need for a technician or expert to organize and join you into a conference.

4 Mbone Tools (vic, vat/rat,..) VRVS Model Implementation done Partially done Work in progress Continuously in development QoS VRVS Reflectors (Unicast/Multicast) Real Time Protocol (RTP/RTCP) SIP Network Layer (TCP/IP) H.323QuickTimePlayerMPEGMinerva CollaborativeApplications VRVS Web User Interface

5 VRVS Deployment and Usage

6 VRVS Reflectors Deployment

7 VRVS Reflector Implementation u Avoids Duplication of Streams on a given Link u Can be set to Unicast or Multicast mode or both u Connection peer-to-peer with neighbors network servers. Connectionless (more reliable to network breaks) u Enables Optimized Routing u Enables Bandwidth Control u Provide low latency communication u Could be use for real-time interactivity or broadcast u Provide elegant solution to cross firewall/NAT u Remote Management Features. u Compliant with IETF RTPv2 Protocol, ready for new applications.

8 Monalisa: Real-Time Monitoring

9 Registered users and current usage as of (16 th November 2003) USA1609 Spain1038 Italy450 Switzerland405 Brazil379 France357 Germany324 UK260 Canada127 Japan123 Slovakia, Chile, Poland, Russia, Taiwan, Greece, Netherlands, etc… Number of Registered Users: 96 Countries & 6615 Users

10 Machines and OS VRVS supports different Operating Systems based on the needs and demands of final users: 1 st : Windows 2 nd : Linux 3 rd : Mac OS 4 th : Other UNIX 19.461 machines (16 th November 2003)

11 Some Examples

12 VRVS on Mac OS X

13 VRVS on Windows

14 Example 1: 20 participants BRAZIL (3 sites) + SWITZERLAND (CERN) + USA (Caltech)

15 Example 2: 17 participants JAPAN + UK + SWITZERLAND + BRAZIL + USA (SLAC + FERMILAB)

16 VRVS Virtual Setup 1 dual processor PC With special 4 outputs graphic card 6400 x 4800 pixels Most powerful VRVS End Node

17 Authentication and Authorization - Present Status -

18 Users’ Site (Apache) Database Authentication module for browsing most of the site. One single realm for the whole site. Caching just for the current browser session.

19 Authorization of Users 1/2 Each VRVS user belongs to a Community. The responsible/s for that community will authorize (or not) bookings from that user in their community.

20 Authorization of Users 2/2 Other mechanism of authorization is implemented when joining a meeting (Virtual Room access protected with password).

21 Administration Site (Tomcat) Database Authentication for the whole site. JDBC Realm implemented for MySQL DB. Administrators database with MD5 digest algorithm for stored passwords.

22 Authorization @ Admin Site Different roles defined in the DB attached to the users. The Call Detail Record example. Oriented to roles.

23 Authentication and Authorization - Future -

24 AA in the VRVS Future u AA independent of our system and distributed. u Internet2 initiative: Shibboleth. u RedIRIS initiative: PAPI. u Grid Security Infrastructure (GSI): public key encryption, X.509 certificates, SSL + extensions for delegation and single sign-on. u What do we integrate and how?

25 WWW.VRVS.ORG Contact@VRVS.org Support@VRVS.org


Download ppt "Users’ Authentication in the VRVS System David Collados California Institute of Technology November 20th, 2003TERENA - Authentication & Authorization."

Similar presentations


Ads by Google