Presentation is loading. Please wait.

Presentation is loading. Please wait.

MyVocs and GridShib: Integrated VO Management Jill Gemmill, John-Paul Robinson University of Alabama at Birmingham Tom Scavo, Von Welch National Center.

Similar presentations


Presentation on theme: "MyVocs and GridShib: Integrated VO Management Jill Gemmill, John-Paul Robinson University of Alabama at Birmingham Tom Scavo, Von Welch National Center."— Presentation transcript:

1 myVocs and GridShib: Integrated VO Management Jill Gemmill, John-Paul Robinson University of Alabama at Birmingham Tom Scavo, Von Welch National Center for Supercomputing Applications

2 Outline Introduction: What are we trying to do, and why? myVocs Overview GridShib Overview myVocs-GridShib Integration Q & A

3 Acknowledgments myVocs and GridShib are funded by the NSF National Middleware Initiative (NMI awards 0330543, 0438424 and 0438385). Opinions and recommendations are those of the authors and do not necessarily reflect the views of the National Science Foundation. We would also like to thank: –Serge Aumont, Olivier Salaun (CRU) –Nate Klingenstein –Tom Barton –Tim Freeman –Raj Kettimuthu

4 What’s a Virtual Organization? A set of collaborators bound together by a project of common interest –very large scale science projects eg: Teragrid –Half a dozen or so collaborators in a funded multidisciplinary project –Physicians at 60 cancer centers wanting to share clinical data to increase N or focus on special sub- populations –An Internet2 Working Group; a conference planning committee. In general, VO members are from different institutions

5 VO Requirements Ideally, VO resource access would use cross-domain SSO What architecture can support this requirement? –For myVocs: web-based applications –For grids: app’s that use grid certificates

6 What Cross-Domain Security Architectures Exist? GRIDS –Digital Certificates (X.509 / PKI) –Cross-domain trust can be managed scalably thru Bridged CA’s –Carry only a user identifier (DN) FEDERATIONS (SAML, Shibboleth, WS- Security) –Digitally signed security assertions –Carry Identity, AuthN method, other attributes

7 Don’t Existing Solutions Provide What Is Needed by VO’s? (No!) Single Domain solutions inadequate End-user certificate distribution and management has proven to be troublesome and non-scalable Essential VO (Group) Membership information not provided consistently by either one Most collaboration tools accessed by web browser (not client software w. certificate)

8 What does Shibboleth bring to the table? A large (and growing) installed base A standards-based, open source implementation Working SAML 1.1 code A standard attribute vocabulary (eduPerson) A well-developed, federated identity management infrastructure has sprung up around Shibboleth

9 Motivation 1 The size and vast number of VOs makes it difficult for administrators to manage the identity of each user in the VO (and VO members don’t want more passwords to remember) –Goal: Leverage existing identity management infrastructure eduPerson/Shibboleth infrastructure appeared promising for identity management

10 Motivation 2 Identity-based access control methods are inflexible and do not scale –Goal: Use attribute-based access control Shibboleth, an attribute transport mechanism linked to identity management, appeared promising

11 Motivation 3 The most important attribute for VOs is: “member of VO-XYZ” Who is authoritative for VO attributes? –The enterprise? (No) –The VO? (Yes!) How are VO attributes created? Where are VO attributes stored?

12 myVocs Overview A brief introduction to the myVocs system environment

13 myVocs Manages Attributes This point is central to myVocs (and deserves a slide of its own)

14 Virtual Organization Aspects Virtual Organizations are Collections of Attributes Virtual Organizations are Collaborations Manifest Virtual Organizations cross Institutional Boundaries Virtual Organizations are Autonomous

15 Virtual Organization Realities Lighten their load and use trusted attributes Resist complication of inconsistent policies Influence poor so little hope for attribute sponsors They are a lot like real organizations

16 myVocs Supports VOs myVocs lets you create and manage VOs and supplies key collaboration tools to the members of the VO

17 A Look Inside myVocs Attributes Users VO Roles VO Members VOs

18 A Look Inside myVocs Attributes Users VO Roles VO Membe rs VOs AppApp1AppNApp3App2

19 A Look Inside myVocs Attributes Users VO Roles VO Membe rs VOs App Mail List Your App CMSWiki

20 A Look Inside myVocs Attributes Users VO Roles VO Membe rs VOs App Mail List Your App CMSWiki Shibboleth IdP Shib SP

21 A Look Inside myVocs Attributes Users List Roles List Membe rs Lists App Mail List Your App CMSWiki Shibboleth IdP Shib SP

22 Why myVocs Uses Sympa Mailing lists are central to Collaborations Specify a collection of individuals Define useful member roles Generally autonomous Sympa mailing list software supports Shibboleth Sympa developers were active collaborators

23 Why myVocs Uses Sympa Simply by creating and managing mailing lists with a familiar web interface the end user can manage VOs their membership and privileges

24 A Look Inside myVocs Sympa Users List Roles List Membe rs Lists App Mail List Your App CMSWiki Shibboleth IdP Shib SP

25 A Look Inside myVocs Sympa Users List Roles List Membe rs Lists App Mail List Your App CMSWiki Shibboleth IdP Shib SP

26 A Look Inside myVocs Sympa Users List Roles List Membe rs Lists App Mail List Your App CMSWiki Shibboleth IdP Shib SP

27 A Look Inside myVocs VO Attribute Authority Users List Roles List Membe rs Lists App Mail List Your App CMSWiki Shibboleth IdP Shib SP

28 A Look Inside myVocs VO Attribute Authority Users VO Roles VO Membe rs VOs App Mail List Your App CMSWiki Shibboleth IdP Shib SP

29 A Look Inside myVocs VO Attribute Authority Users VO Roles VO Membe rs VOs App Mail List Your App CMSWiki VO IdP Shib SP

30 A Look Inside myVocs VO Attribute Authority Users VO Roles VO Membe rs VOs App Mail List Your App CMSWiki VO IdP VO SP

31 A Look Inside myVocs VO Attribute Authority App Mail List Your App CMSWiki VO IdP VO SP

32 A Look Inside myVocs VO Attribute Authority App Mail List Your App CMSWiki VO IdP VO SP

33 A Look Inside myVocs VO Attribute Authority App Mail List Your App CMSWiki VO IdP VO SP VO Space

34 A Look Inside myVocs VO Attribute Authority App Mail List Your App CMSWiki VO IdP VO SP VO Space

35 A Look Inside myVocs VO Attribute Authority App Mail List Your App CMSWiki VO IdP VO SP VO Space Shibboleth SP

36 This is myVocs VO Attribute Authority App Mail List Your App CMSWiki VO IdP VO SP VO Space Shibboleth SP myVocs

37 This is myVocs VO Attribute Authority App Mail List Your App CMSWiki VO IdP VO SP VO Space Shibboleth SP myVocs

38 A Look Inside myVocs VO Attribute Authority App Mail List Your App CMSWiki VO IdP VO SP VO Space Shibboleth SP UAB IdP

39 myVocs A Look Inside myVocs VO Attribute Authority App Mail List Your App CMSWiki VO IdP VO SP VO Space Shibboleth SP UAB IdP U. Chicago IdP

40 myVocs A Look Inside myVocs VO Attribute Authority App Mail List Your App CMSWiki VO IdP VO SP VO Space Shibboleth SP UAB IdP UIUC IdP U. Chicago IdP

41 myVocs A Look Inside myVocs VO Attribute Authority App Mail List Your App CMSWiki VO IdP VO SP VO Space Shibboleth SP UAB IdP UIUC IdP openidp.org IdP U. Chicago IdP

42 myVocs A Look Inside myVocs VO Attribute Authority App Mail List Your App CMSWiki VO IdP VO SP VO Space Shibboleth SP UAB IdP UIUC IdP openidp.org IdP U. Chicago IdP Identity Space

43 myVocs Manages Attributes Users VO Roles VO Membe rs VOs App Mail List Your App CMSWiki UAB IdP UIUC IdP openidp.org IdP U. Chicago IdP

44 myVocs Manages Attributes Users VO Roles VO Membe rs VOs App Mail List Your App CMSWiki UAB IdP UIUC IdP openidp.org IdP U. Chicago IdP

45 myVocs Manages Attributes Users VO Roles VO Membe rs VOs App Mail List Your App CMSWiki UAB IdP UIUC IdP openidp.org IdP U. Chicago IdP

46 myVocs Manages Attributes Users VO Roles VO Membe rs VOs App Mail List Your App CMSWiki UAB IdP UIUC IdP openidp.org IdP U. Chicago IdP

47 Shibboleth Drives myVocs The user accesses a web resource. The browser is guided through any required steps by standard Shibboleth mechanisms. The system components remain invisible.

48 Shibboleth Drives myVocs Client Web Browser CMS openidp.org VO Attribs WAYF VO SPVO IdP ID SP

49 Shibboleth Drives myVocs Client Web Browser CMS openidp.org VO Attribs WAYF VO SPVO IdP ID SP

50 Shibboleth Drives myVocs Client Web Browser CMS openidp.org VO Attribs WAYF VO SPVO IdP ID SP myVocs Shib

51 Shibboleth Drives myVocs Client Web Browser CMS openidp.org VO Attribs WAYF VO SPVO IdP ID SP myVocs ShibIdentity Federation Shib

52 Shibboleth Drives myVocs Client Web Browser CMS openidp.org VO Attribs WAYF VO SPVO IdP ID SP myVocs ShibIdentity Federation Shib

53 Shibboleth Drives myVocs Client Web Browser CMS openidp.org VO Attribs WAYF VO SPVO IdP ID SP myVocs ShibIdentity Federation Shib

54 Shibboleth Drives myVocs Client Web Browser CMS openidp.org VO Attribs WAYF VO SPVO IdP ID SP myVocs ShibIdentity Federation Shib

55 Shibboleth Drives myVocs Client Web Browser CMS openidp.org VO Attribs WAYF VO SPVO IdP ID SP myVocs ShibIdentity Federation Shib

56 Shibboleth Drives myVocs Client Web Browser CMS openidp.org VO Attribs WAYF VO SPVO IdP ID SP myVocs ShibIdentity Federation Shib

57 Shibboleth Drives myVocs Client Web Browser CMS openidp.org VO Attribs WAYF VO SPVO IdP ID SP myVocs ShibIdentity Federation Shib

58 Shibboleth Drives myVocs Client Web Browser CMS openidp.org VO Attribs WAYF VO SPVO IdP ID SP myVocs ShibIdentity Federation Shib

59 Shibboleth Drives myVocs Client Web Browser CMS openidp.org VO Attribs WAYF VO SPVO IdP ID SP myVocs ShibIdentity Federation Shib Identity Attributes

60 Shibboleth Drives myVocs Client Web Browser CMS openidp.org VO Attribs WAYF VO SPVO IdP ID SP myVocs ShibIdentity Federation Shib

61 Shibboleth Drives myVocs Client Web Browser CMS openidp.org VO Attribs WAYF VO SPVO IdP ID SP myVocs ShibIdentity Federation Shib VO Attribs

62 Shibboleth Drives myVocs Client Web Browser CMS openidp.org VO Attribs WAYF VO SPVO IdP ID SP myVocs ShibIdentity Federation Shib

63 myVocs Visual Experience User Selects VO Resource

64 myVocs Visual Experience User Selects Identity Provider

65 myVocs Visual Experience User Validates Identity

66 myVocs Visual Experience User Accesses VO Resource

67 myVocs User Experience

68

69

70

71 Last Year's Wish Today's Reality Make it possible for a VO to add it's own grid resources A good example: Enable registering a group of desktops owned by film animation students working on different campuses so they can render their animation on their own grid resources Keep up with what GridShib is doing

72 GridShib Overview

73 What is GridShib? GridShib enables secure attribute sharing among Grid virtual organizations and higher-educational institutions The goal of GridShib is to integrate the Globus Toolkit® with Shibboleth® GridShib adds attribute-based authorization to Globus Toolkit

74 Some Background Large scientific projects have spawned Virtual Organizations (VOs) The cyberinfrastructure and software systems to support VOs are called grids Globus Toolkit is the de facto standard software solution for grids Grid Security Infrastructure (GSI) provides basic security services for grids

75 Grid Authentication Globus Toolkit provides authentication services via X.509 credentials When requesting a service, the user presents an X.509 certificate, usually a proxy certificate GridShib leverages the existing authentication mechanisms in GT

76 Grid Authorization Today, Globus Toolkit provides identity- based authorization mechanisms: –Access control lists (called grid-mapfiles) map DNs to local identity (e.g., Unix logins) –Community Authorization Service (CAS) PERMIS and VOMS GridShib provides attribute-based authorization based on Shibboleth

77 GridShib Project Motivation VOs are difficult to manage –Goal: Leverage existing identity management infrastructure Identity-based access control methods are inflexible and do not scale –Goal: Use attribute-based access control Solution: Integrate GT and Shibboleth!

78 Tale of Two Technologies Grid Client Globus Toolkit X.509 Grid Security Infrastructure Existing GSI based on X.509…

79 Tale of Two Technologies Grid Client Globus Toolkit Shibboleth X.509 SAML Grid Security Infrastructure Shibboleth Federation Graft Shib/SAML onto GSI/X.509

80 Why Shibboleth? What does Shibboleth bring to the table? –A large (and growing) installed base on campuses around the world –A standards-based, open source implementation –A standard attribute vocabulary (eduPerson) A well-developed, federated identity management infrastructure has sprung up around Shibboleth!

81 GridShib Use Cases Three use cases under consideration: 1.Established grid user (non-browser) 2.New grid user (non-browser) 3.Portal grid user (browser) Initial efforts concentrated on the established grid user Current efforts are focused on the new grid user

82 Established Grid User User possesses an X.509 end entity certificate User may or may not use MyProxy Server to manage X.509 credentials User authenticates to Grid SP with proxy certificate obtained from MyProxy The current GridShib implementation addresses this use case

83 New Grid User User does not possess an X.509 end entity certificate User relies on GridShib CA to issue short- lived X.509 certificates User authenticates to Grid SP using short- lived X.509 credential The myVocs-GridShib integration addresses this use case

84 Software Components GridShib for Globus Toolkit –A plugin for GT 4.0 GridShib for Shibboleth –A plugin for Shibboleth 1.3 IdP GridShib CA –A web-based CA for new grid users Visit the GridShib Downloads page: http://gridshib.globus.org/download.html http://gridshib.globus.org/download.html

85 GridShib for Globus Toolkit GridShib for Globus Toolkit is a plugin for GT4 Features: –Standalone attribute requester –SAML attribute consumption –Attribute-based access control –Attribute-based local account mapping –SAML metadata consumption

86 Standalone Attribute Requester A standalone attribute requester will query a Shib AA for attributes –By “standalone” we mean a query separate from a Shib browser profile The attribute query is based on –The Subject DN of the proxy cert or –A SAML authn assertion embedded in an end-entity cert

87 GridShib for Shibboleth GridShib for Shibboleth is a plugin for a Shibboleth IdP v1.3 (or later) Features: –Name Mapper –SAML name identifier implementations X509SubjectName, emailAddress, etc. –Certificate Registry

88 GridShib Name Mapper The Name Mapper is a container for name mappings Multiple name mappings are supported: –File-based name mappings –DB-based name mappings NameMapFile NameMapTable NameMapper

89 GridShib Certificate Registry A Certificate Registry is integrated into GridShib for Shibboleth: https://authdev.it.ohio- state.edu/twiki/bin/view/GridShib/GridShibCertificateRegistry https://authdev.it.ohio- state.edu/twiki/bin/view/GridShib/GridShibCertificateRegistry An established grid user authenticates and registers an X.509 end-entity cert The Registry binds the cert to the principal name and persists the binding in a database On the backend, GridShib maps the DN in a query to a principal name in the DB

90

91 GridShib CA The GridShib Certificate Authority is a web-based CA for new grid users: https://authdev.it.ohio- state.edu/twiki/bin/view/GridShib/GridShibCertificateAuthority https://authdev.it.ohio- state.edu/twiki/bin/view/GridShib/GridShibCertificateAuthority The GridShib CA is protected by a Shib SP and backended by the MyProxy Online CA The CA issues short-term credentials suitable for authentication to a Grid SP Credentials are downloaded to the desktop via Java Web Start

92

93 GridShib Attribute Pull Profile In the “Classic GridShib” profile, a Grid SP “pulls” attributes from a Shib IdP The Client is assumed to have an account (i.e., local principal name) at the IdP The Grid SP and the IdP have been assigned a unique identifier (providerId) 3 4 2 1 IdP Grid SP CLIENTCLIENT CLIENTCLIENT

94 1 GridShib Attribute Pull Step 1 The Grid Client requests a service at the Grid SP The Client presents a X.509 certificate to the Grid SP The Client also provides a pointer to its preferred IdP –This is the so-called IdP Discovery problem IdP Grid SP CLIENTCLIENT CLIENTCLIENT

95 2 1 GridShib Attribute Pull Step 2 The Grid SP authenticates the Client and extracts the DN from the proxy cert The Grid SP queries the Attribute Authority (AA) at the IdP using the DN as a SAML name identifier IdP Grid SP CLIENTCLIENT CLIENTCLIENT

96 32 1 GridShib Attribute Pull Step 3 The AA authenticates the requester and maps the DN to a local principal name The AA returns an attribute assertion to the Grid SP –The assertion is subject to Attribute Release Policy (ARP) at the IdP IdP Grid SP CLIENTCLIENT CLIENTCLIENT

97 3 4 2 1 GridShib Attribute Pull Step 4 The Grid SP parses the attribute assertion and performs the requested service The attributes are cached as necessary A response is returned to the Grid Client IdP Grid SP CLIENTCLIENT CLIENTCLIENT

98 Future Work Solve IdP discovery problem for grids Provide name mapping maintenance tools (for administrators) Implement a profile for attribute push Produce SAML metadata Design metadata repositories and tools

99 Results of Integration

100 Motivation Review myVocs allows for VOs based on Shibboleth identities GridShib authorizes use of Grid Services based on Shibboleth identities Goal of Integration: Creation and Management of Grid VOs based on Shibboleth Identities

101 What we have enabled Turn-key Grid VO creation through the integration of GridShib and myVocs myVocs used to create and manage VOs GridShib allows myVocs users to create Grid credentials and access Grid resources Grid resources obtains, and allows access, based on attributes from myVocs

102 Key Components myVocs –VO creation and management GridShib CA creates Grid credentials from Shibboleth identities GridShib Certificate Registry and IdP Plugin maps Grid identities to Shibboleth identities GridShib GT plugin issues SAML attributes queries from GT to myVocs/Shibboleth

103 System Walk-through A quick tour of the integrated system Architecture view on these slides User view on the other projector

104

105 User Registers with myVocs Identity Auth

106

107

108

109 VO Admin Adds User to VO

110 Grid Logon Identity Auth Identity Grid Creds. Grid Id

111

112

113

114

115 Grid Service Invocation VO Attributes Grid Creds. Grid Id

116

117

118 Remaining Challenges Name binding on global scale Attribute Aggregation Defining VO membership, roles and attributes Group and role management

119 Questions? For more information: GridShib: http://gridshib.globus.org/http://gridshib.globus.org/ myVocs: http://www.myvocs.org/http://www.myvocs.org/ Email: jgemmill@uab.edu jpr@uab.edu tscavo@ncsa.uiuc.edu vwelch@ncsa.uiuc.edu

120

121


Download ppt "MyVocs and GridShib: Integrated VO Management Jill Gemmill, John-Paul Robinson University of Alabama at Birmingham Tom Scavo, Von Welch National Center."

Similar presentations


Ads by Google