Presentation is loading. Please wait.

Presentation is loading. Please wait.

Gridshib-tech-overview-dec051 GridShib A Technical Overview Tom Scavo NCSA.

Similar presentations


Presentation on theme: "Gridshib-tech-overview-dec051 GridShib A Technical Overview Tom Scavo NCSA."— Presentation transcript:

1 gridshib-tech-overview-dec051 GridShib A Technical Overview Tom Scavo trscavo@ncsa.uiuc.edu trscavo@ncsa.uiuc.edu NCSA

2 gridshib-tech-overview-dec052 Overview GridShib project details GridShib use cases GridShib implementation GridShib attribute pull profile GridShib-MyProxy integration GridShib browser profile

3 gridshib-tech-overview-dec053 What is GridShib? GridShib enables secure attribute sharing between Grid virtual organizations and higher-educational institutions The goal of GridShib is to integrate the Globus Toolkit® with Shibboleth® GridShib adds attribute-based authorization to Globus Toolkit

4 gridshib-tech-overview-dec054 Tale of Two Technologies Grid Client Globus Toolkit Shibboleth X.509 SAML Grid Security Infrastructure Shibboleth Federation Bridging Grid/X.509 with Shib/SAML

5 gridshib-tech-overview-dec055 Motivation Large scientific projects have spawned Virtual Organizations (VOs) The cyberinfrastructure and software systems to support VOs are called grids Globus Toolkit is the de facto standard software solution for grids Grid Security Infrastructure provides basic security services…but does it scale?

6 gridshib-tech-overview-dec056 Why Shibboleth? What does Shibboleth bring to the table? –A large (and growing) installed base –A standards-based, open source implementation –A standard attribute vocabulary (eduPerson) A well-developed, federated identity management infrastructure has sprung up around Shibboleth

7 gridshib-tech-overview-dec057 Shibboleth Federations A federation –Provides a common trust and policy framework –Issues credentials and distributes metadata –Provides discovery services for SPs Shibboleth-based federations: –InCommon (23 members) –InQueue (157 members) –SDSS (30 members) –SWITCH (23 members) –HAKA (8 members)

8 gridshib-tech-overview-dec058 InCommon Federation

9 gridshib-tech-overview-dec059 Introduction

10 gridshib-tech-overview-dec0510 GridShib Project GridShib is a project funded by the NSF Middleware Initiative (NMI awards 0438424 and 0438385) GridShib is a joint project of NCSA, University of Chicago, and Argonne National Laboratory Project web site http://gridshib.globus.org/ http://gridshib.globus.org/

11 gridshib-tech-overview-dec0511 Milestones Dec 2004, GridShib project commences Feb 2005, Developers onboard Apr 2005, Globus Toolkit 4.0 released May 2005, GridShib Alpha released Jul 2005, Shibboleth 1.3 released Sep 2005, GridShib Beta released GridShib-MyProxy integration TBA

12 gridshib-tech-overview-dec0512 Related Projects Globus Toolkit http://www.globus.org/toolkit/ http://www.globus.org/toolkit/ Shibboleth http://shibboleth.internet2.edu/ http://shibboleth.internet2.edu/ LionShare http://lionshare.its.psu.edu/ http://lionshare.its.psu.edu/ eSP-grid http://e- science.ox.ac.uk/oesc/projects/index.xml.ID= body.1_div.1#esp http://e- science.ox.ac.uk/oesc/projects/index.xml.ID= body.1_div.1#esp

13 gridshib-tech-overview-dec0513 Leveraged Standards X.509 Public Key Infrastructure (RFC 3280) Proxy certificates (RFC 3820) OASIS SAML 1.1 http://www.oasis- open.org/committees/tc_home.php?wg_abbrev =security#samlv11 http://www.oasis- open.org/committees/tc_home.php?wg_abbrev =security#samlv11 Internet2 Shibboleth http://shibboleth.internet2.edu/docs/internet2- mace-shibboleth-arch-protocols-latest.pdf http://shibboleth.internet2.edu/docs/internet2- mace-shibboleth-arch-protocols-latest.pdf

14 gridshib-tech-overview-dec0514 Use Cases There are three use cases under consideration: 1.Established grid user (non-browser) 2.New grid user (non-browser) 3.Portal grid user (browser)  Initial efforts have concentrated on the established grid user (i.e., user with existing long-term X.509 credentials )

15 gridshib-tech-overview-dec0515 Established Grid User User possesses an X.509 end entity certificate User may or may not use MyProxy Server to manage X.509 credentials User authenticates to Grid SP with proxy certificate (grid-proxy-init) The current GridShib implementation addresses this use case

16 gridshib-tech-overview-dec0516 New Grid User User does not possess an X.509 end entity certificate User relies on MyProxy Online CA to issue short-lived X.509 certificates User authenticates to Grid SP using short-lived X.509 credential Emerging GridShib Non-Browser Profiles address this use case

17 gridshib-tech-overview-dec0517 Portal Grid User User does not possess an X.509 cert User accesses Grid SP via a browser interface, that is, the client delegates a web application to request a service at the Grid SP MyProxy issues a short-lived X.509 certificate via a back-channel exchange GridShib Browser Profiles apply

18 gridshib-tech-overview-dec0518 GridShib Implementation

19 gridshib-tech-overview-dec0519 Software Components GridShib for Globus Toolkit –A plugin for GT 4.0 GridShib for Shibboleth –A plugin for Shibboleth 1.3 IdP Shibboleth IdP Tester –A test application for Shibboleth 1.3 IdP Visit the GridShib Download page: http://gridshib.globus.org/download.html http://gridshib.globus.org/download.html

20 gridshib-tech-overview-dec0520 The Actors Standard (non-browser) Grid Client Globus Toolkit with GridShib installed (which we call a “Grid SP”) Shibboleth IdP with GridShib installed IdP Grid SP CLIENTCLIENT

21 gridshib-tech-overview-dec0521 GridShib Attribute Pull Profile In the current implementation, a Grid SP “pulls” attributes from a Shib IdP The Client is assumed to have an account (i.e., local principal name) at the IdP The Grid SP and the IdP have been assigned a unique identifier (providerId) 3 4 2 1 IdP Grid SP CLIENTCLIENT

22 gridshib-tech-overview-dec0522 1 GridShib Attribute Pull Step 1 The Grid Client requests a service at the Grid SP The Client presents a standard proxy certificate to the Grid SP The Client also provides a pointer to its preferred IdP IdP Grid SP CLIENTCLIENT

23 gridshib-tech-overview-dec0523 IdP Discovery The Grid SP needs to know the Client’s preferred IdP One approach is to embed the IdP providerId in the proxy certificate This requires modifications to the MyProxy client software, however Currently the IdP providerId is configured into the Grid SP

24 gridshib-tech-overview-dec0524 2 1 GridShib Attribute Pull Step 2 The Grid SP authenticates the Client and extracts the DN from the proxy cert The Grid SP queries the Attribute Authority (AA) at the IdP IdP Grid SP CLIENTCLIENT

25 gridshib-tech-overview-dec0525 Attribute Query The Grid SP formulates a SAML attribute query: CN=GridShib,OU=NCSA,O=UIUC The Resource attribute is the Grid SP providerId The NameQualifier attribute is the IdP providerId The NameIdentifier is the DN from the proxy cert Zero or more AttributeDesignator elements call out the desired attributes

26 gridshib-tech-overview-dec0526 32 1 GridShib Attribute Pull Step 3 The AA authenticates the requester and returns an attribute assertion to the Grid SP The assertion is subject to Attribute Release Policy (ARP) IdP Grid SP CLIENTCLIENT

27 gridshib-tech-overview-dec0527 Attribute Assertion The assertion contains an attribute statement: CN=GridShib,OU=NCSA,O=UIUC member student The Subject is identical to the Subject of the query Attributes may be single-valued or multi-valued Attributes may be scoped (e.g., member@uchicago.edu )

28 gridshib-tech-overview-dec0528 Name Mapping An IdP does not issue X.509 certs so it has no prior knowledge of the DN Solution: Create a name mapping file at the IdP (similar to the grid-mapfile at the Grid SP) # Default name mapping file CN=GridShib,OU=NCSA,O=UIUC gridshib "CN=some user,OU=People,DC=doegrids" test The DN must conform to RFC 2253

29 gridshib-tech-overview-dec0529 3 4 2 1 GridShib Attribute Pull Step 4 The Grid SP parses the attribute assertion and performs the requested service A generalized attribute framework is being developed for GT A response is returned to the Grid Client IdP Grid SP CLIENTCLIENT

30 gridshib-tech-overview-dec0530 Future Work Solve the IdP Discovery problem –Implement shib-proxy-init Implement DB-based name mapping Provide name mapping maintenance tools (for administrators) Design an interactive name registry service (for users) Devise metadata repositories and tools

31 gridshib-tech-overview-dec0531 GridShib-MyProxy Integration

32 gridshib-tech-overview-dec0532 Shib Browser Profile Consider a Shib browser profile stripped to its bare essentials Authentication and attribute assertions are produced at steps 2 and 5, resp. The SAML Subject in the authentication assertion becomes the Subject of the attribute query at step 4 5 6 4 3 IdP SP CLIENTCLIENT 1 2

33 gridshib-tech-overview-dec0533 GridShib Non-Browser Profile Replace the SP with a Grid SP and the browser client with a non-browser client Three problems arise: –Client must possess X.509 credential to authenticate to Grid SP –Grid SP needs to know what IdP to query (IdP Discovery) –The IdP must map the SAML Subject to a local principal IdP Grid SP CLIENTCLIENT

34 gridshib-tech-overview-dec0534 The Role of MyProxy Consider a new grid user instead of the established grid user For a new grid user, we are led to a significantly different solution Obviously, we must issue an X.509 credential to a new grid user A short-lived credential is preferred Enter MyProxy Online CA…

35 gridshib-tech-overview-dec0535 MyProxy-first Attribute Pull MyProxy with Online CA MyProxy inserts a SAML authN assertion into a short-lived, reusable EEC IdP collocated with MyProxy 6 54 3 2 1 IdP Grid SP MyProxy CLIENTCLIENT

36 gridshib-tech-overview-dec0536 1 MyProxy-first Attribute Pull Step 1 A MyProxy Client sends a MyProxy Protocol request to a MyProxy Server Any authentication method supported by MyProxy may be used IdP Grid SP MyProxy CLIENTCLIENT

37 gridshib-tech-overview-dec0537 2 1 MyProxy-first Attribute Pull Step 2 The MyProxy Server authenticates the requester MyProxy issues an X.509 credential with embedded authN assertion The credential is returned in a MyProxy Protocol response IdP Grid SP MyProxy CLIENTCLIENT

38 gridshib-tech-overview-dec0538 Authentication Assertion MyProxy inserts an assertion containing a minimal authentication statement into the certificate: user@idp.example.org AuthenticationMethod may be used by Grid SP The NameQualifier attribute is the IdP providerId The IdP easily maps the NameIdentifier to the desired local principal

39 gridshib-tech-overview-dec0539 3 2 1 MyProxy-first Attribute Pull Step 3 A Grid Client requests a service at a Grid SP The client presents the decorated X.509 certificate obtained from MyProxy IdP Grid SP MyProxy CLIENTCLIENT

40 gridshib-tech-overview-dec0540 4 3 2 1 MyProxy-first Attribute Pull Step 4 The Grid SP authenticates the Client and processes the assertion The Grid SP queries the Shib Attribute Authority (AA) referred to in the assertion IdP Grid SP MyProxy CLIENTCLIENT

41 gridshib-tech-overview-dec0541 54 3 2 1 MyProxy-first Attribute Pull Step 5 The AA authenticates the requester and returns an attribute assertion to the Grid SP The assertion is subject to policy IdP Grid SP MyProxy CLIENTCLIENT

42 gridshib-tech-overview-dec0542 6 54 3 2 1 MyProxy-first Attribute Pull Step 6 The Grid SP parses the attribute assertion and makes an access control decision A response is returned to the Client IdP Grid SP MyProxy CLIENTCLIENT

43 gridshib-tech-overview-dec0543 MyProxy-first Advantages Relatively easy to implement Requires only one round trip by the client Requires no modifications to the Shib IdP Requires no modifications to the Client Supports multiple authentication mechanisms out-of-the-box Uses transparent, persistent identifiers: –No coordination of timeouts necessary –Mapping to local principal is straightforward

44 gridshib-tech-overview-dec0544 IdP-first Non-Browser Profiles The IdP-first profiles require no shared state between MyProxy and the IdP Supports separate security domains Leverages existing name identifier mappings at the IdP IdP-first profiles may be used with either Attribute Pull or Attribute Push

45 gridshib-tech-overview-dec0545 Attribute Pull or Push? attributes user AA Grid SP user AA request attributes Pull Push

46 gridshib-tech-overview-dec0546 IdP-first Attribute Pull MyProxy with Online CA MyProxy consumes and produces SAML authN assertions The Client authenticates to MyProxy with a SAML authN assertion 8 7 6 5 4 3 2 1 IdP Grid SP MyProxy CLIENTCLIENT

47 gridshib-tech-overview-dec0547 IdP-first Attribute Push The IdP “pushes” an attribute assertion to the Client The Client authenticates to MyProxy with a SAML authN assertion MyProxy consumes both SAML authN and attribute assertions 5 6 4 3 1 2 IdP Grid SP MyProxy CLIENTCLIENT

48 gridshib-tech-overview-dec0548 IdP-first Advantages Since IdP controls both ends of the flow: –Mapping NameIdentifier to a local principal is straightforward –Choice of NameIdentifier format is left to the IdP Attribute push simplifies IdP config and trust relationships Reusable by grid portal use case

49 gridshib-tech-overview-dec0549 GridShib Browser Profiles

50 gridshib-tech-overview-dec0550 IdP-first Browser Profiles As a consequence of the IdP-first Non- Browser profiles, MyProxy gains the ability to consumes SAML assertions If we replace the non-browser client with a web component, we can reuse that functionality in the following GridShib Browser Profile

51 gridshib-tech-overview-dec0551 IdP-first Attribute Pull The first three steps are normal Shib Browser/POST A Shib SP is protecting a web version of MyProxy Client 5 6 4 3 1 2 IdP Grid SP MyProxy CLIENTCLIENT SP 78 910

52 gridshib-tech-overview-dec0552 The 3-tier Problem How does the browser user delegate authority to the web component to retrieve an X.509 credential on its behalf? This problem is an instance of the so- called n-tier problem

53 gridshib-tech-overview-dec0553 Delegation Profile No widely accepted solution to this problem exists today The Shib dev team has proposed a SAML2-based solution: http://shibboleth.internet2.edu/docs/draf t-cantor-saml-sso-delegation-01.pdf http://shibboleth.internet2.edu/docs/draf t-cantor-saml-sso-delegation-01.pdf The implications for GridShib are not clear at this point


Download ppt "Gridshib-tech-overview-dec051 GridShib A Technical Overview Tom Scavo NCSA."

Similar presentations


Ads by Google