1 / 22

GridShib: Campus/Grid RBAC Integration Penn State Grid Computing Workshop August 5th, 2005

GridShib: Campus/Grid RBAC Integration Penn State Grid Computing Workshop August 5th, 2005. Von Welch vwelch@ncsa.uiuc.edu. Outline. Overview of Shibboleth and Globus Our Motivation and Use Cases Integration Approach Status. Shibboleth. http://shibboleth.internet2.edu/ Internet2 project

keaton-knox
Télécharger la présentation

GridShib: Campus/Grid RBAC Integration Penn State Grid Computing Workshop August 5th, 2005

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. GridShib:Campus/Grid RBAC IntegrationPenn State Grid Computing WorkshopAugust 5th, 2005 Von Welch vwelch@ncsa.uiuc.edu

  2. Outline • Overview of Shibboleth and Globus • Our Motivation and Use Cases • Integration Approach • Status PSU Grid Computing Workshop

  3. Shibboleth • http://shibboleth.internet2.edu/ • Internet2 project • Allows for inter-institutional sharing of web resources (via browsers) • Provides attributes for authorization between institutions • Allows for pseudonymity via temporary, meaningless identifiers called ‘Handles’ • Standards-based (SAML) • Being extended to non-web resources PSU Grid Computing Workshop

  4. Acknowledgements • NSF NMI project to allow the use of Shibboleth-issued attributes for authorization in NMI Grids built on the Globus Toolkit • Funded under NSF award SCI-0438424 • GridShib team: NCSA, U. Chicago, ANL • Tom Barton, David Champion, Tim Freemon, Kate Keahey, Tom Scavo, Frank Siebenlist, Von Welch • Working in collaboration with Steven Carmody, Scott Cantor, Bob Morgan and the rest of the Internet2 Shibboleth Design team PSU Grid Computing Workshop

  5. Shibboleth • Identity Provider composed of single sign-on (SSO) and attribute authority (AA) services • SSO: authenticates user locally and issues authentication assertion with Handle • Assertion is short-lived bearer assertion • Handle is also short-lived and non-identifying • Handle is registered with AA • Attribute Authority responds to queries regarding handle PSU Grid Computing Workshop

  6. Shibboleth • Service Provider composed of Assertion Consumer and Attribute Requestor • Assertion Consumer parses authentication assertion • Attribute Requestor: request attributes from AA • Attributes used for authorization • Where Are You From (WAYF) service determines user’s Identity Provider PSU Grid Computing Workshop

  7. Shibboleth (Simplified) SAML Shibboleth IdP Shibboleth SP LDAP (e.g.) AA AR Attributes Handle SSO ACS WWW Handle PSU Grid Computing Workshop

  8. Globus Toolkit • http://www.globus.org • Toolkit for Grid computing • Job submission, data movement, data management, resource management • Based on Web Services and WSRF • Security based on X.509 identity- and proxy-certificates • Maybe from conventional or on-line CAs • Some initial attribute-based authorization PSU Grid Computing Workshop

  9. Motivation • Many Grid VOs are focused on science or business other than IT support • Don’t have expertise or resources to run security services • Allow for leveraging of Shibboleth code and deployments run by campuses PSU Grid Computing Workshop

  10. Use Cases • Project leveraging campus attributes • Simplest case • Project-operated Shib service • Project operates own service, conceptually easy, but not ideal • Campus-operated, project-administered Shib • Ideal mix, but need mechanisms for provisioning of attribute administration PSU Grid Computing Workshop

  11. Integration Approach • Conceptually, replace Shibboleth’s handle-based authentication with X509 • Provides stronger security for non-web browser apps • Works with existing PKI install base • To allow leveraging of Shibboleth install base, require as few changes to Shibboleth AA as possible PSU Grid Computing Workshop

  12. GridShib (Simplified) SAML Shibboleth A Attributes DN Grid SSO DN SSL/TLS, WS-Security DN PSU Grid Computing Workshop

  13. Integration Areas • Assertion Transmission • Attribute Authority Discovery • Distribute Attribute Administration • User Registration • Pseudonymous Interaction • Authorization PSU Grid Computing Workshop

  14. Assertion Transmission • How to get SAML assertions from AA into Globus? • Initially: Pull mode with Globus acting as a Shibboleth Attribute Requestor • Will explore Pull modes to help with privacy and role combination • Implement Grid Name Mapper to map X509 DNs to local identities used to obtain attributes PSU Grid Computing Workshop

  15. Attribute Authority Discovery • No interactive WAYF service in the Grid • Place identifier of Identity Provider in cert • Either in long-term EEC or short-term Proxy Cert • Will explore pushing attributes • Avoids the problem • Might also address combined attributes from multiple AAs PSU Grid Computing Workshop

  16. Distributed Attribute Administration • Campus is ideal for running services, but may not know all attributes of users • How does a campus issue attributes for which it is not authoritative? • E.g. IEEE Membership of staff • In Grid case, Project Membership • This may be the largest hurdle due to social, political and/or legal issues • Need accepted cookbook for process • Plan on exploring signet • http://middleware.internet2.edu/signet/ PSU Grid Computing Workshop

  17. Getting Attributes into a Site’s Attribute Authority SIS Person Registry Loaders Attribute Authority HR Shib/ GridShib Core Business Systems Group Registry LDAP Grouper UI On-site Authorities uid: jdoe eduPersonAffiliation: … isMemberOf: … eduPersonEntitlement: … Privilege Registry Signet UI using Shibboleth Off-site Authorities PSU Grid Computing Workshop

  18. User Registration • How does the mapping from the User’s X509 DN to local Campus identity get made in NameMapper configuration? • In initial version, this will be manual process • Yes, far from ideal • We envision • Something akin to a registration service that authenticates user’s X509 and local credentials and puts mapping in automatically • Or a portal that hides all the X509 from the user and also handles this mapping • E.g. PURSE, GAMA PSU Grid Computing Workshop

  19. Pseudonymous Interaction • How to maintain Shibboleth pseudonymous functionality with X509? • Will develop online CA that issues certificates with non-identifying DNs • Register with AA just as SSO • Basically holder-of-key assertions PSU Grid Computing Workshop

  20. Authorization • Develop authorization framework in Globus Toolkit • Pluggable modules for processing authentication, gathering and processing attributes and rendering decisions • XACML used for expressing gathered identity, attribute and policy information • Convert Attributes into common format for policy evaluation • Allows for common evaluation of attributes expressed in SAML and X509 (and others…) PSU Grid Computing Workshop

  21. GridShib Status • Testing initial version internal to project • Will be a drop-in addition to GT 4.0 and Shibboleth 1.3 • Current adapting to last minute Shibboleth 1.3 changes and doing internal testing • Plan on beta release in 2-3 weeks • Looking for interested beta testers PSU Grid Computing Workshop

  22. Questions? • Project website: • http://grid.ncsa.uiuc.edu/GridShib/ • My email: • vwelch@ncsa.uiuc.edu PSU Grid Computing Workshop

More Related