80 likes | 93 Vues
Learn about the authentication and authorization workflows in the European Grid Infrastructure (EGI) and how trust, collaboration, and interoperability are key in providing secure access to IT resources for researchers. Explore the use of X.509 certificates, virtual organization membership, and attribute authorities to ensure uniform access rights across multiple service providers. Discover how EGI bridges other identity federations and enables interoperability for user convenience.
E N D
European Grid Infrastructure AAI in EGIStatus and Evolution Peter Solagna Senior Operations Managerpeter.solagna@egi.eu GergelySipos Technical Outreach Manager gergely.sipos@egi.eu
European Grid Infrastructure • European • Over 35 countries • Grid • Secure federation of IT resources, computing storage and applications • Infrastructure • More than 340 resource centres • HTC and cloud services • For European researchers and their international collaborators • EDGEGEEEGI • Supporting research for over 10 years • More than 200 user communities, 20k users EGI.eu
Authentication and Authorization in EGI - 1 Authentication: • X.509 personal certificates from IGTF Certification Authorities • CA available in every country • Supported by several Registration Authorities distributed • TerenaCertificate Service for eduGAIN users • Catch-all CA provided by EGI.eu Authorization: • Based on attributes provided by the user communities • Virtual Organization membership • Roles and groups within the VO
Authentication and Authorization in EGI - 2 TRUST TRUST Virtual Organization
The key is: collaboration • Authentication and Authorization workflows scale with the number of service providers and users • User identity is verified by the IGTF Certification Authorities who release the X509 certificates • The certificate enable uniform authentication of the user across resource centres • User communities have the tools to manage the membership of their users and their structure • Collaborate to the trust chain and to integrate the information provided by the Identity Providers • Authorization is based on the Virtual Organization membership and attributes not on the single user identity • The user capabilities based on groups and roles within the VO are reflected into uniform access rights across the sites that support the VO
Extend the X509 mechanism • For some users approaching EGI the X509 mechanism is a barrier • They do not have easy access to a Certification Authority • They would prefer to continue using their institutional credentials • VOs and Resource Providers implement portals to ease the access to the resources • The most effective solution is to bridge other identity federations (eduGAIN, institutional IdP) with the EGI AAI • Technical bridge: credentials translation, support in the middleware for other AuthN protocols • Policy bridge: build trust between SP and IdP, enable different level of trust
Extend federated AuthZ • Provide tools to the users to manage their user communities • Distributed Attribute Authorities connected with the user’s IdPs • Can be used also within application-specific environments for user authorization • Maintain uniform authorization across multiple service providers • Based on the attributes provided by the user communities • Apply the collaborative trust approach of EGI to new authentication technologies
Enable interoperability • E-infrastructures should collaborate in this evolution process • Enable SSO for users who has access to multiple infrastructures • Enable a European Authentication and Authorization Infrastructure that can be used by multiple resource federations and application specific frameworks