Top Banner
25 April 2005 NVO Team Meeting - Tucson 1 Interoperable Authentication And Authorization for the VO THE US NATIONAL VIRTUAL OBSERVATORY ckground: Single Sign-on Document Series GWS-WG http://www.ivoa.net/twiki/bin/view/IVOA/IvoaGridAndWebServices Security 101 Matthew Graham (see teamwg mail archive) VO-friendly, Community-based Authorization Framework, Pt. 1, 2 Ray http://chart.stsci.edu/twiki/pub/Main/TechWG/CommunityAuthorizationP1.pdf Ray Plante NVO@NCSA Von Welch & Jim Basney NCSA Grid Security Team Mike Freemon & Randy Butler National Middleware Initiative (NMI) Grid Center
28

25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

Jan 29, 2016

Download

Documents

Cecilia Wright
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 1

Interoperable AuthenticationAnd Authorization for the VO

THE US NATIONAL VIRTUAL OBSERVATORY

Background:• Single Sign-on Document Series GWS-WG http://www.ivoa.net/twiki/bin/view/IVOA/IvoaGridAndWebServices

• Security 101 Matthew Graham (see teamwg mail archive)

• VO-friendly, Community-based Authorization Framework, Pt. 1, 2 Ray Plante http://chart.stsci.edu/twiki/pub/Main/TechWG/CommunityAuthorizationP1.pdf

Ray PlanteNVO@NCSA

Von Welch & Jim BasneyNCSA Grid Security Team

Mike Freemon & Randy ButlerNational Middleware Initiative

(NMI) Grid Center

Page 2: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 2

What we’d like to see from interoperable security

• Trustworthy access to restricted resources– Proprietary data*– Remote storage– CPU cycles

Sufficient control and auditing by resource providers

• Single sign-on– User enters a username/password once per session– Can access many restricted resources in an operation from

different providers– Interoperates with public (non-restricted) data and services

seamlessly– Interoperability with Grid security

• A framework that can be leveraged by observatories – A common way to get at proprietary data– A common way to support security in portals

Page 3: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 3

What we’d not like to see from interoperable security

• A framework so cumbersome that no one uses it– Users & service providers– “Why do we even need this?”

• A hacking incident that erodes trust in the system– We’re used to relying on goodwill– The VO will raise our profile to hackers

Page 4: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 4

Certificate-based Security

• Beyond the browser: Good for “grid” applications– Web services talking to each other– Can handle users across administrative boundaries

• X.509 Certificates in wide use today– To support SSL connections– Libraries available

• Certificates presented at socket connection time assure identity of holder– Identities of user and service– Each end must already have copy of Certificate

Authority’s certificate– Each end holds own private key; cert contains public

key– “handshake” tests that each side has private key

corresponding to public key in cert

Page 5: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 5

Certificate Authorities: the root of Trust

• A service/user will trust a CA by acquiring the CA’s public key– Public key acquired “out-of-band” of a user request– Benefit from a small number of CAs

• Recommendation: Each VO project runs its own CA– IVOA level: trust chain too hard to track

Trust model to be discussed later…

– Organization level: too many CAs

• Recommendation: Accept other established CAs from scientific community as a matter of practice– DOE, NCSA/TeraGrid– Leverage their trust model

Page 6: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 6

Certificate Management

• User-managed certificates– User stores certificate & private key on local machine– User must “load” certificate into client applications

• e.g. web browser, Globus

– User must also “load” certificates of trusted CAs– Often considered part of the “pain” of certificates

• Portal-managed certificates– Portal manages certificate & private key on users

behalf– users don’t have to know certificates are being used– Possible to pass cert to client apps when needed

Page 7: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 7

Portal-Managed CertificatesRegistration

Service

CA

CertificateRepository(MyProxy)

LoginService

Restricted Service

Restricted Service

Restricted Service

Portal

Page 8: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 8

Portal-Managed CertificatesRegistration

Service

CA

CertificateRepository(MyProxy)

LoginService

Restricted Service

Restricted Service

Restricted Service

Portal

Page 9: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 9

Portal-Managed CertificatesRegistration

Service

CA

CertificateRepository(MyProxy)

LoginService

Restricted Service

Restricted Service

Restricted Service

Portal

Page 10: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 10

Portal-Managed CertificatesRegistration

Service

CA

CertificateRepository(MyProxy)

LoginService

Restricted Service

Restricted Service

Restricted Service

Portal

Page 11: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 11

Portal-Managed CertificatesRegistration

Service

CA

CertificateRepository(MyProxy)

LoginService

Restricted Service

Restricted Service

Restricted Service

Portal

Page 12: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 12

Portal-Managed CertificatesRegistration

Service

CA

CertificateRepository(MyProxy)

LoginService

Restricted Service

Restricted Service

Restricted Service

Portal

Page 13: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 13

Portal-Managed CertificatesRegistration

Service

CA

CertificateRepository(MyProxy)

LoginService

Restricted Service

Restricted Service

Restricted Service

Portal

Page 14: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 14

Portal-Managed CertificatesRegistration

Service

CA

CertificateRepository(MyProxy)

LoginService

Restricted Service

Restricted Service

Restricted Service

Portal

Page 15: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 15

Certificate Management

• Both certificate models will be important– Important to support portal-based management for

ease of use– The savvier users will manage own certs for use with

client applications that connect directly to services

• Recommendation: VO project runs the following services:– Registration service (to create certs)– Certificate Repository (MyProxy) to store certs for use

with portals– A login service for use with portals– Cert Download service: for retrieving certs for local

client appsExisting tools: PURSE (NMI), GAMA (SDSC)

Page 16: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 16

Portal-Managed CertificatesLocal

RegistrationService

CA

CertificateRepository(MyProxy)

LoginService

Restricted Service

Restricted Service

Restricted Service

Portal

NVORegistration

Service

e.g.,

VO Project

Page 17: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 17

Portal-Managed CertificatesLocal

RegistrationService

Restricted Service

Restricted Service

Restricted Service

Portal

CA

CertificateRepository(MyProxy)

LoginService

NVORegistration

Service

e.g.,

VO Project

Page 18: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 18

Portal-Managed CertificatesLocal

RegistrationService

Restricted Service

Restricted Service

Restricted Service

Portal

CA

CertificateRepository(MyProxy)

LoginService

NVORegistration

Service

e.g.,

VO Project

Page 19: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 19

Portal-Managed CertificatesLocal

RegistrationService

Restricted Service

Restricted Service

Restricted Service

Portal

CA

CertificateRepository(MyProxy)

LoginService

NVORegistration

Service

e.g.,

VO Project

Page 20: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 20

CA

CertificateRepository(MyProxy)

LoginService

NVORegistration

Service

e.g.,

VO Project

Portal-Managed CertificatesLocal

RegistrationService

Restricted Service

Restricted Service

Restricted Service

Portal

Page 21: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 21

Portal-Managed CertificatesLocal

RegistrationService

CA

CertificateRepository(MyProxy)

LoginService

Restricted Service

Restricted Service

Restricted Service

Portal

NVORegistration

Service

Login

In

terf

ace

Page 22: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 22

Trust Model

• The certificate “handshake”– Means that…

• User has private key issued to “Joe Astronomer”• Service has private key issued to “Fab Storage”

– Useful enough in some cases• Service can save per user state across sessions• Will control what user can do

– Did “Joe” give a phony name?

• The CA signature means that the CA has made an effort to verify the identity– How does a CA determine that users are who they say

they are?

Page 23: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 23

Commercial Trust Model: Thawte

• Weak certificates– Generic identity: name not included– Can do low trust activities (encrypt email)

• Strong certificates (has identity info in it):– Identity notarized by multiple somewhat-

trusted people—“Web of Trust”– Point system

• a notary can issue up to 35 points• Need 50 points to get strong cert

Page 24: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 24

An Astronomical Observatory

To gain access to telescope and resulting proprietary data

• User writes a proposal– Includes identity information: affiliation, email– Includes references to published work– Includes collaborators with references

• Observatory contacts PIs, Co-Is by email• Proposal is evidence that they are legit.

Can we leverage this process?

Page 25: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 25

Building a Trust Model

• How do we verify identities? – someone VO project trusts tells them (out-of-band) that the

user is who she says she is.– Registration Authorities (RA): enlisting the help of existing

institutions• Academic departments? (akin to Shibboleth model)• Observatories?

– How much is enough?– What process/software can we provide to RAs to validate

identities?

• Verification takes time and human involvement!– Can weak certificate enable some activity requiring less

trust?Allows user to get started right away!

• Need trusted system to issues certs to services– So that users can trust services to behave with their ID– Can build on trust model for users

Page 26: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 26

Authorization

• Authorization policies tend to be service specific– Provider will want to control who’s allowed to do what– Expect observatories to centralize authorization

management– Authorization policies assigned to groups

• Observatory: groups defined on the proposal level • Groups defined around archive-based research

• Recommendation: Leave authorization management to service providers. No interoperable standards are needed at this time*

Page 27: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 27

Authorization Use Case Drivers

• Types of restricted resources– Proprietary data– Remote storage– CPU cycles

Sufficient control and auditing by resource providers

• Types of proprietary data– Data from PI-driven telescope’s archive,

covered by observatory’s proprietary policy– VO workspace data (VOStore)– Data under Proprietary policy based on origin

of user* *Europe

Page 28: 25 April 2005NVO Team Meeting - Tucson1 Interoperable Authentication And Authorization for the VO T HE US N ATIONAL V IRTUAL O BSERVATORY Background: Single.

25 April 2005NVO Team Meeting - Tucson 28

Three models for handling authorization

• Map external identities to internal accounts– One account per group, groups define set of authorization policy

• Call out:– User accesses service with personal cert– Service calls out to authorization database to retrieve privileges

associated with user– Service tests user request against policies

• Certificate wrapping (Globus CAS):– User visits authorization database with personal cert, gets back

proxy cert with policies encoded inside (using SAML)

– User presents proxy cert to service

– Service test user request against policies

– Good for portal-based access but inconvenient for outside clients