European Grid Policy Management Authority
Download
Report
Transcript European Grid Policy Management Authority
Grid Security &
the EUGridPMA
EIROforum GG Meeting
David Groep, EUGridPMA Chair, 2005.09.14
Outline
Grid Security Infrastructure
Virtual Organisations
Authentication vs. Authorisation
Authentication Federation
EUGridPMA
Trust Basis and Minimum Requirements
International Grid Trust Federation
Roadmap
Authorization Federation …
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Grid Security Requirements
Control access to shared services
Initial focus on high-value resources:
supercomputers, large clusters, multi-PetaByte storage
Support multi-user collaborations
Composed of individuals acting alone – their home
organisation administration may not know about their
activities
Allow users/application communities to establish
relations
Both personal and community-based aggregation of
resources, based on personal or community-mediated
trust
Easy to use
single sign-on for users
David
Resource
Owner Always StaysEIROforum
in Control
Groep – [email protected]
GG meeting – Sept 2005 - ‹#›
Virtual Organisations in ‘Grid’
• A set of individuals or organisations,
• not under single hierarchical control,
• temporarily joining forces to solve a particular problem at hand,
• bringing to the collaboration a subset of their resources,
• sharing those at their discretion and
• each under their own conditions.
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Virtual vs. Organic structure
Virtual Community C
Person B
(Administrator)
Compute Server C1'
Person A
(Principal Investigator)
Person E
(Researcher)
Person D
(Researcher)
Person B
(Staff)
Compute Server C2
File server F1
(disk A)
Compute Server C1
Person A
(Faculty)
Person C
(Student)
Organization A
David Groep – [email protected]
Person D File server F1
(Staff) (disks A and B)
Person E
(Faculty)
Person F
(Faculty)
Compute Server C3
Organization B
Graphic from Frank Siebenlist, ANL & Globus Alliance
GGF OGSA Working Group
EIROforum GG meeting – Sept 2005 - ‹#›
Stakeholders in Grid Security
Conceptually, all members of a VO are equal
Users can provide their own services
Resource provider organisations may or may not have
personal members (they can just sell resources to a VO)
No a priori trust relationship between members
VO lifetime can vary from hours to decades
People (and resources) usually are members
of more than one VO
… but an relation is required
as a basis for authorising access
for traceability and liability
for incident handling, accounting
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Building Virtual Organisations
VOs today are rather long-lived
(but not too difficult to set up)
HEP physics experiments (10+ yrs)
Earth Observation missions (10+ yrs)
Earthquake engineering (10+ yrs)
LIGO (Gravitational waves) (10+ yrs?)
Projects-based ‘aggregate working groups’
EGEE bio-medical application area (2+ yr), …
…
Future is likely to bring many shorter-lived VOs
ad-hoc collaborations of scientists (~weeks)
commercial analysis outsourcing (~days)
…
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
VO embedding today
as part of a Grid ‘ecosystem’
where ecosystem takes care of end-to-end solution
Middleware
User support
‘Infrastructure’ (a collective of Resource Centres)
a single VO per project
user groups join up together and participate
in a single project
Implicit sharing agreement between users and centres
sharing across all user communities in the project
‘non-aligned’ VOs
need to build their own hosting environment
maybe supported by a ‘big’ partner from another ecosystem
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Many Grid Sites Need Interoperation
In Europe
Enabling Grid for E-sciencE (EGEE) (~160 sites)
Distributed European Infrastructure for Supercomputer
Applications (DEISA) (~15 sites)
South East European Grid (SEE-GRID) (~30 sites)
many national projects (VL-e, D-Grid, UK e-Science)
In the US
Open Science Grid (OSG) (~40 sites)
TeraGrid (~5 sites)
also many others, like NEESGRID, NASA IPG, …
Asia-Pacific
AP Grid (~10?)
Pacific Rim Applications and Grid Middleware Assembly (~15?)
…
LHC Computing Grid Project (global) (~160)
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Separating AuthN from AuthZ
Single Authentication token (“passport”)
issued by a trustworthy third party,
recognised by many resource providers, users, and VOs
satisfies traceability requirement
in itself does not grant any access
but provides high-quality unique binding between
an identifier and the subject*
X.509 certificates in a PKI, cryptographically secured
Authorisation (“visa”)
granted to a person/service or a set of them (a VO)
granted by the actual owner (e.g. a site)
based on the ‘passport’ name
providers define their lists of authorised users & VOs,
but can still ban individual users within a VO
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Grid Authorization today
Leverages authentication provided by PKI
Identity management decoupled from access control
Creation of short-lived ‘tokens’ (‘proxy’ certificates) for
single sign-on based on these identities
But:
Variety of mechanisms
Per-resource list of authorized users (“grid-mapfile”)
Directories of authorized users (VO-LDAP)
Embedded assertions (VOMS, CAS)
Variety of sources of authority
Semantics to describe roles and rights differs
No common namespace
Not integrated with other (site) AA mechanisms
yet
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Authentication
Well known X.509 PKIs
Secure web servers (‘https’) based on PKI
Various commercial providers
Entrust, Thawte, Verisign, SwissSign, …
Usually expensive but don’t actually subsume liability …
… a rogue person obtained a certificate from Verisign
asserting
he was from Microsoft …
Are implicitly trusted by many, since web browsers
pre-install the roots of trust
… but did you ever check the policies of all those CAs?
But use of commercial CAs solves the ‘pop-up’ problem
... so for (web) servers we would still need a pop-up free
service
National (government) PKIs
Slow in the uptake of the 1999/93/EC for the average citizen
(but Estonia is now there!)
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Hierarchical PKI
“Hierarchies” are the traditional method of organising trust
A Relying Party that trust a top-level policy can implicitly trust
all subordinates
Top-level CA
Intemediate CA 1
End-entity
issuing CA 1
Intermediate CA 2
Intemediate CA 3
EE issuer 2
But…
By signing a subordinate the CA assumes liability
It requires hierarchical control by the top-level CA on the
subordinates
(so that it en ensure policy compliance)
It implies a dependency relationship
(not very well suited to a multi-national trust relationship)
Cannot accommodate pre-existing CAs well
Grids
desire to leave the trust decisionEIROforum
optionGG
tomeeting
the Relying
David
Groep – [email protected]
– Sept 2005 - ‹#›
The Federated PKI for Grid
Authentication
CA 1
CA 2
charter
CA n
CA 3
guidelines
acceptance
process
relying
party n
relying
party 1
Federation consists of many independent CAs
Common minimum requirements
Defined and ‘strong’ acceptance process
“reasonable” trust level, as required by relying parties
no ‘hierarchical top’ to make formal guarantees
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Building the federation
PKI providers (‘CAs’) and Relying Parties (‘sites’)
together shape minimum requirements
(‘guidelines’)
Authorities testify compliance with these guidelines
Peer-review process within the federation
to (re) evaluate members on entry & periodically
Reduce effort on the relying parties
single document to review and assess for all CAs
Reduce cost on the CAs:
no audit statement needed by certified accountants
but participation in the federation does come with a price
Requires that the federation remains manageable in size
David
Ultimate
decision always remains
with
the RP
Groep – [email protected]
EIROforum
GG meeting
– Sept 2005 - ‹#›
Relying Party issues to be addressed
Relying Party requests:
1. standard accreditation profiles sufficient to assure
approximate parity in CAs
2. monitor [] signing namespaces for name overlaps
3. a forum [to] participate and raise issues
4. [operation of] a secure collection point for information
about CAs which you accredit
5. common practices where possible
[list courtesy of the Open Science Grid]
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Common Guidelines set for all CAs
Collective requirements
(technology agnostic)
Federation Document
• Namespace assignments
• Distribution layout
Classic X.509 CAs
with secured infrastructure
Technology specific
guidelines
Short-lived
Credential Services
‘experimental’ CAs
…
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Guidelines: common elements
Coordinated namespace
Subject names refer to a unique entity (person, host)
Basis for authorization decisions
Common Naming
Common structure for trust anchor distribution in the
federation
Trusted, redundant, download sources
Concerns and ‘incident’ handling
Guaranteed point of contact
Forum to raise issues and concerns
Requirement for documentation of processes
Detailed policy and practice statement
Open to auditing by federation peers
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Guidelines: secured X.509 CAs
Identity vetting procedures
Based on (national) photo ID’s
Face-to-face verification of applicants
via a network of Registration Authorities
Periodic renewal (once every year)
Record retention at least 3 years
Secure operation
off-line signing key or special (FIPS-140.3 or better)
hardware
Response to incidents
Timely revocation of compromised certificates
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Guidelines: short-lived credential service
Issue short-lived credentials (for grid: proxies)
based on another site-local authentication system
e.g. Kerberos CA based on existing administration
Same common guidelines apply
documented policies and processes
a reliable identity vetting mechanism
accreditation of the credential issuer with a PMA
identity vetting data retention
Same X.509 format, but no user-held secrets
New profile by TAGPMA in the Americas
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Guidelines: ‘Active Certificate Stores’
Secure key/cert storage for end-users
Protected by alternative means
by checking identity with the home organisation
via one-time pads issued by the credential store
…
Backed by a “traditional” CA
Releases short-lived tokens (RFC3820 “proxy”
certs)
ACS hosted by a trusted party
(CA, NREN, Operations Center, …)
Profile yet to be written
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Guidelines: ACS diagram
3./4. validate
1.
6. Proxy req
8. Issue
delegation
ACS Secured
Environment
5. issue
and store
CA
1a.&7.
authenticate
2. Request
Home
Organisation
Alternate
Mechanisms
David Groep – [email protected]
(on behalf of user)
EIROforum GG meeting – Sept 2005 - ‹#›
The EUGridPMA origins: the EDG CACG
The EU DataGrid in 2000 needed a PKI for the test bed
Both end-user and service/host PKI
CACG had the task of creating this PKI
for Grid Authentication only
no support for long-term encryption or digital signatures
Single CA was not considered acceptable
Single point of attack or failure
History
One CA per country, large region or international
organization
CA must have strong relationship with RAs
Some pre-existing CAs
A single hierarchy would have excluded existing CAs and
was not convenient to support with existing software
Coordinated group of peer CAs was most suitable choice
Based on “reasonable procedures” and “acceptable methods”
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
The EUGridPMA “constitution”
EUGridPMA founded April 2004 as a successor to the CACG
The European Policy Management Authority for Grid Authentication
in e-Science (hereafter called EUGridPMA) is a body
• to establish requirements and best practices for grid identity
providers
• to enable a common trust domain applicable to authentication of
end-entities in inter-organisational access to distributed
resources.
As its main activity the EUGridPMA
• coordinates a Public Key Infrastructure (PKI)
for use with Grid authentication middleware.
The EUGridPMA itself does not provide identity assertions,
but instead asserts that - within the scope of this charter –
the certificates issued by the Accredited Authorities
David
– [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
meet
or Groep
exceed
the relevant guidelines.
EUGridPMA Membership
EUGridPMA membership for (classic) CAs:
A single Certification Authority (CA)
per country,
large region (e.g. the Nordic Countries), or
international treaty organization.
The goal is to serve the largest possible
community with a small number of stable CAs
operated as a long-term commitment
Many CAs are operated by the (national) NREN
(CESNET, ESnet, Belnet, NIIF, EEnet, SWITCH, DFN, … )
or by the e-Science programme/science foundation
(UK eScience, VL-e, CNRS, … )
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
CA Coverage of the EUGridPMA
Green: CA Accredited
Yellow: RealSoonNow™
(BalticGrid, Turkey/ULAKBIM,
RedIRIS)
Other Accredited CAs:
DoEGrids (US)
GridCanada
ASCCG (Taipei)
ArmeSFO (Armenia)
CERN
Russia (“RDIG”)
Israel (IUCC)
Pakistan
IHEP (Beijing)
and can we leverage other (national) AuthN infrastructures?
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
EUGridPMA major relying parties
All EU 6th framework e-Infrastructure projects
EGEE
DEISA
SEE-GRID
LHC Computing Grid Project (“LCG”)
Open Science Grid (US)
National projects, like (non-exhaustive):
UK eScience programme
Virtual Lab e-Science, NL
…
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
ar
-0
1
Ju
n0
Se 1
p0
De 1
c0
M 1
ar
-0
2
Ju
n0
Se 2
p0
De 2
c02
M
ar
-0
3
Ju
n0
Se 3
p0
De 3
c0
M 3
ar
-0
4
Ju
n0
Se 4
p0
De 4
c04
M
History
accredited CAs
Growth of the CACG & EUGridPMA
35
30
25
20
15
10
5
0
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Extending Trust:
IGTF – the International Grid Trust Federation
common, global best practices for trust establishment
better manageability and response of the PMAs
APGridPMA
TAGPMA
The America’s
Grid PMA
David Groep – [email protected]
European
Grid PMA
Asia-Pacific
Grid PMA
EIROforum GG meeting – Sept 2005 - ‹#›
APGridPMA
13 members from the Asia-Pacific Region,
chaired by Yoshio Tanaka (AIST)
•AIST (.jp)
•APAC (.au)
•BMG (.sg)
•CMSD (.in)
•HKU CS SRG (.hk)
•KISTI (.kr)
•NCHC (.tw)
•NPACI (.us)
•Osaka U. (.jp)
•SDG (.cn)
•USM (.my)
•IHEP Beijing (.cn)
•ASGCC (.tw)
Launched June 1st, 2004
4 ‘production-quality’ CAs
Pioneered ‘experimental’
profile
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
TAGPMA
10 members to date,
chaired by Darcy Quesnel (Canarie)
•Canarie (.ca)
•OSG (.us)
•TERAGRID (.us)
•Texas H.E. Grid (.us)
•DOEGrids (.us)
Launched June 28th, 2005
Pioneered new “SLCGS”
(Kerberos CA & al.)
David Groep – [email protected]
•SDSC (.us)
•FNAL (.us)
•Dartmouth
(.us)
•Umich (.us)
•Brazil (.br)
EIROforum GG meeting – Sept 2005 - ‹#›
IGTF document structure
IGTF Federation Document
APGridPMA
• CA A1
•…
EUGridPMA
trust
relations
Subject
Namespace
Assignment
• CA E1
• CA E2
TAGPMA
•…
• CA T1
•…
Common Authentication Profiles
Classic
(EUGridPMA)
Distribution
Naming
Conventions
“SLCGS”
(TAGPMA)
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Relationships: IGTF, PMAs, TACAR and GGF
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Timeline
March 2005: IGTF Draft Federation Document
GGF13
June 28th: TAGPMA founded at GGF14
July 27th : APGridPMA approved draft 0.7
September: EUGridPMA meeting on approval
October 3-4 (planned): formal foundation of the
IGTF
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
TACAR
A trusted repository which can contain verified root-CA certificates
The certificates to be collected are those directly managed by the
member NRENs, or belonging either to a National Academic PKI in
the TERENA member countries (NPKIs), or to non-profit research
projects directly involving the academic community.
Authoritative source for validation of trust anchors
independent web administration makes for stronger trust
TACAR certificate itself published in paper/journals
over 20 CA root certificates collected
(not only for grid use)
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
EUGridPMA and TACAR
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Along the e-IRG Roadmap
e-IRG: e-Infrastructure Reflection Group Roadmap for i2010:
commitment to the federated approach
vision of an integrated AA infrastructure for eEurope
Towards an integrated AAI for academia in Europe and beyond
The e-IRG notes the timely operation of the EUGridPMA in
conjunction with the TACAR CA Repository and it expresses its
satisfaction for a European initiative that serves e-Science Grid
projects. […] The e-IRG strongly encourages the EUGridPMA /
TACAR to continue their valuable work […]
(Dublin, 2004)
The e-IRG encourages work towards a common federation for
academia and research institutes that ensures mutual recognition
of the strength and validity of their authorization assertions.
(The Hague, 2005)
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Authorization
Next: Authorization Interoperation?
Interoperation requirements for authorization
common semantics of attributes
honour ultimate source of authority:
but where is that source? what is the authorization
language?
Variety of different mechanisms
different target audience leads to different
approaches
(wireless) network roaming
Access to supercomputers, large clusters, storage
Access to licensed database content (e.g. genomics,
libraries)
Existing community organisation differences
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Authorization Attributes
Various mechanisms need glue
VO directory/VOMS mechanisms, Shibboleth, Géant2 AAI,
…
developments are getting under way
Variety in semantics
different names for roles and attributes
incompatible (policy) languages
Federations like the PMA needed for Authorization
coordinate semantics
secure collection of Authorization trust anchors
mutual recognition of authorization “value”
(not authorization itself, of course)
concertation via TERENA TF-EMC2, JSPG, …
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Making a Grid Community Actually Work
VOs need services to manage membership
directory service, attribute issuing
not so much ‘machines’, but ‘people’ and ‘time’
Operational problems and incidents
where can users go with their problems?
how to stop and prevent incidents?
contact management?
Central services
information services (where are my resources?)
brokering? Cataloguing?
Hosting provided by the “native” organisation
or home organisation of the PI? or …
A grid Ecosystem can help significantly here
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
Summary
Grid Security: Authentication and Authorization
Who am I:
Common trust domain exists via EUGridPMA and IGTF
Coordinated minimum requirements
different authentication profiles
Recognised by many projects & supported the e-IRG
What can I do:
no unified scheme for authorization (yet)
coordination under way in TF-EMC2 and EGEE
Authorisation Federations
are the next big challenge for Grid and an eEurope
How can I do it:
who runs the actual services:
Ecosystem, VO, PI home organisation, …
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›
http://www.eugridpma.org/
David Groep – [email protected]
EIROforum GG meeting – Sept 2005 - ‹#›