• No results found

Grid Security : Authentication and Authorization

N/A
N/A
Protected

Academic year: 2021

Share "Grid Security : Authentication and Authorization"

Copied!
34
0
0

Loading.... (view fulltext now)

Full text

(1)Grid Security : Authentication and Authorization. IFIP Workshop – 2/7/05 Jong Kim Dept. of Computer Sci. and Eng. Pohang Univ. of Sci. and Tech. (POSTECH).

(2) Contents . Grid Security  . . Current Status of Grid Security     . . . Grid Security. Authentication and Delegation Authorization Grid Security Infrastructure (GSI) OGSA Web Services Security. Things need more study . . Grid Security Challenges Grid Security Requirements. Authentication Interoperability Fine-grained Authorization. Summary. 2/34.

(3) Grid Security . Grid Computing . . . Distributed computing infrastructure with a plenty of resources which are heterogeneous and scattered geographically A controlled and coordinated resource sharing and resource use in dynamic, scalable, and distributed virtual organizations (VOs). Security for whom?   . Grid Security. Resource Providers? Virtual Organization? End-user (participants)? 3/34.

(4) Grid Security . What is Grid Security ? . Security architecture to enable dynamic, scalable, and distributed VOs protect resources for resource providers, computing entities for VOs, and end-processing for end-users. . Thru     . Grid Security. Authentication, Delegation, Authorization, Confidentiality, Privacy, … 4/34.

(5) Dynamic VO in the Grid . . Virtual organizations (VOs) are collections of diverse and distributed individuals that seek to share and use diverse resources in a coordinated fashion. Users can join into several VOs, while resource providers also partition their resources to several VOs. Bio VO. Chemical VO. Grid Security. 5/34.

(6) Grid Security Challenges . Dynamic VO establishment   . A VO is organized for some goal and disorganized after the goal is achieved. Users can join into or leave VOs. Resource providers can join into or leave VOs. Bio VO. Chemical VO. Grid Security. 6/34.

(7) Grid Security Challenges . Dynamic policy management  . Resource providers dynamically change their resources policies. VO managers manage VO users’ rights dynamically. Bio VO. Chemical VO. Grid Security. 7/34.

(8) Grid Security Challenges . Interoperability with different host environm ents    . Grid Security. Security services for diverse domains and hosting environments should interact with each other. At the protocol level, messages can be exchanged. At the policy level, each entity can specify its policy and the policy can be mutually comprehensive. At the identity level, a user can be identified from one domain in another domain.. 8/34.

(9) Grid Security Challenges . Integration with existing systems and techno logies   . It is unrealistic to use a single security technology to address Grid security issues. Existing security infrastructures cannot be replaced. Thus, a Grid security architecture must be   . Grid Security. Implemental, Extensible, and Integrate. 9/34.

(10) Grid Security Requirements . Authentication . . Delegation  . . Entities are provided with plug points for multiple authentication mechanisms. Users can delegate their access rights to services. Delegation policies also can be specified.. Single Logon . Grid Security. An entity is allowed to have continuous access rights for some reasonable period with single authentication. 10/34.

(11) Grid Security Requirements . Credential Lifespan and Renewal  . . A job initiated by a user may take longer than the life time of the user’s initial credential. In such case, the user needs to be notified prior to expiration of the credential, or be able to refresh it automatically.. Authorization  . Grid Security. Resources are used under a certain authorization policies. A service provider can specify its own authorization policy, with which users can invoke those policies. 11/34.

(12) Grid Security Requirements . Confidentiality . . Message Integrity . . It is ensured that unauthorized changes of messages or documents may be detected.. Privacy . . The confidentiality of the communication mechanism and messages or documents is supported.. A service requester and a service provider enforce privacy policies.. Other requirements . Grid Security. Policy exchange, secure logging, manageability, … 12/34.

(13) Contents . Grid Security  . . Current Status of Grid Security     . . Authentication and Delegation Authorization Grid Security Infrastructure (GSI) OGSA Web Services Security. Things need more study  . . Grid Security Challenges Grid Security Requirements. Authentication Interoperability Fine-grained Authorization. Summary. Grid Security. 13/34.

(14) Authentication and Delegation (1/3) . The use of X.509 Certificates  . . Authentication by a distinguished name in a certificate under shared common CAs Delegation and single sign-on through the use of X.509 proxy certificates. Username and Password Authentication supported in GT4  . Grid Security. Supporting WS-Security standard as opposed to X.509 credentials Only providing authentication and not advanced features such as delegation, confidentiality, integrity, etc. 14/34.

(15) Authentication and Delegation (2/3) . Delegation of proxy certificates   . Grid Security. Remote generation of user proxy Generation of a new private key & certificate using the original key Password or private key are not sent on network. .  

(16). 

(17) . 

(18) .  

(19) .  

(20) .  

(21) .  

(22) . 15/34.

(23) Authentication and Delegation (3/3) CA. : Delegation path. user. User Proxy. Single sign-on via “grid-id” Assignment of credentials to “user proxies”. Site 2. Site 1 GRAM. Process. GSI. Process. Ticket Kerberos Grid Security. Mutual user-resource authentication. Authenticated interprocess communication. Process. GRAM. Process. GSI Certificate. Process. Process. Mapping to local ids. Public Key 16/34.

(24) Authorization (1/4) Users want to delegate their rights to proxies in other systems.  Resource providers need an authorization service for user proxies submitted to their systems.  Delegation is the process of transferring rights of users to tasks or proxies. .  . . When too much rights are delegated, the abuse of rights is possible. When too less rights are delegated, proxies cannot be executed completely.. Thus, we need an authorization service in which users delegate restricted rights to proxies and resource providers can check valid uses of delegated rights.. Grid Security. 17/34.

(25) Authorization (2/4) . Pull Model. . Granting a user’s rights only on the specific conditions Delegating rights which a user specifies Managing rights with a user and resource providers Example : Akenti. Grid Security. 18/34.   .

(26) Authorization (3/4) . Push Model   . Grid Security. Granting a user’s rights according to his or her role Managing rights with a central administrator Example : CAS, PERMIS, VOMS. 19/34.

(27) Authorization (4/4) . Problems in related works . Akenti  . . CAS  . Grid Security. Writing specific conditions and rights manually Managing rights by users and resource providers Delegating all rights owned by user’s role Not delegating restricted rights. 20/34.

(28) Grid Security Infrastructure (GSI)  . The fundamental security services in the Glo bus Toolkit Based on standard PKI technologies  . . X.509 Certificates for asserting identity . . SSL protocol for authentication, message protection One-way, light-weight trust relationships by CAs For users, services, hosts, etc. Grid identity . Grid Security. A user is mapped to local identities using the distinguished name of the user’s certificate. 21/34.

(29) Grid Security Infrastructure (GSI) . X.509 Proxy Certificates  . . Enables single sign-on. Allows users to delegate their identities and rights to services.. Community Authorization Service (CAS)    . Grid Security. Enables fine-grained authorization policy. Resource providers set course-grained policy rules for foreign domain on CAS-identity. CAS sets policy rules for its local users. Requestors obtain capabilities from their local CAS.. 22/34.

(30) Grid Security Infrastructure (GSI). Grid Security. 23/34.

(31) Open Grid Services Architecture (OGS A) . A Grid system architecture  . . WS-Resource Framework (WSRF)  . . Based on Web services and technologies An open source collection of Grid services that follow OGSA principles are offered by the Globus project since GT3.0. A set of Web service specifications being developed by the OASIS organization Describing how to implement OGSA capabilities using Web services. Standardization  . Grid Security. Underway in the Global Grid Forum (GGF) and OASIS Many working groups on Grid security, such as OGSA Security, GSI, Authorization Frameworks and Mechanisms (AuthZ), Certificate Authority Operations (CAOPS), Grid Certificate Policy (GCP), and OGSA Authorization (OGSA-Authz) 24/34.

(32) Security in a Web Services World.  . The Web services security roadmap provides a layered approach to address Web services. The OGSA security models needs to be consistent with Web services security model.. Grid Security. 25/34.

(33) Contents . Grid Security  . . Current Status of Grid Security     . . Authentication and Delegation Authorization Grid Security Infrastructure (GSI) OGSA Web Services Security. Things need more study  . . Grid Security Challenges Grid Security Requirements. Authentication Interoperability Fine-grained Authorization. Summary. Grid Security. 26/34.

(34) Authentication Interoperability . Motivations  . . Use of different authentication schemes by different resource providers Use of different policies for different resource providers and organizations. Requirements  . Grid Security. Need an interoperable authentication method Need an automatic policy match and negotiation. 27/34.

(35) Example Case . Case    . . . User A is given access rights to resources B and C when running a process D for some time. How do we know he is accessing resources B and C for the process D? How do we know he is not redoing the previously allowed job? How do we know he has not exceeded his access time on using resources B and C in case that the resources given to the VO at which the user A belongs are larger than those given to the user A. Etc…. Need a fine control of resources . Grid Security. Also need for accounting. 28/34.

(36) Fine-grained Authorization Service . Motivations   . . Resource providers want their resources to be used by only VO members under their local polices. VO managers specify user access rights. A user delegates his or her rights to the job to run.. Requirements   . Combining polices from different sources Fine-grained resource control VO-based management of jobs and resources Provide a portion of their resources. Specify user’s access rights User. Resource Providers Grid Security. Delegate the user’s rights. VO Run the job under the restricted rights. Job 29/34.

(37) TAS : Tickets . A ticket is an XML record asserting that the issuer specifies a policy.   . A resource provider notifies the resource usage policy. A VO manager issues VO users’ attributes. A user delegates his or her rights to the submitted job.. Each ticket is signed by the private key of the issuer to protect the integrity of the ticket.  Tickets are unforgeable and exchangeable among VO entities for resource control.  Tickets are classified into .     Grid Security. resource ticket, attribute ticket, user ticket, and job ticket. 30/34.

(38) TAS : Job Ticket  . Generated by a user in order to request the rights Including necessary tickets for a job . Imported ticket field in the user ticket indicates other tickets.. 

(39)    

(40)         .          . . !!.    

(41)  .     .       !!    .   

(42)       . Grid Security. 31/34.

(43) TAS : Supported Grid Services . Dynamic VO Management  . . A VO is easily managed by sharing resource and attribute tickets. VO policies can be changed by re-issuing the corresponding tickets.. Fine-grained Rights Delegation  . Grid Security. Resource providers and VO managers delegate a set of permitted rights to users. A user also delegates his or her rights to the job using the user ticket.. 32/34.

(44) Summary . Grid Security . . . Needs to solve many security issues to provide dynamic, scalable VOs in Grid computing environment. Hard problem due to diversity, interoperability, integration, …. Fine-grained Authorization Services . Grid Security. As a Grid security service, it needs VO-wide fine-grained authorization of jobs and resources.. 33/34.

(45) References  . . . . . . Grid Security. F. Siebenlist, V. Welch, “Grid Security : The Globus Perspective,” GlobusWORLD 2004, http://www.globus.org/ V. Welch, F. Siebenlist, I. Foster, J. Bresnahan, K. Czajkowski, J. Gawor, C. Kesselman, S. Meder, L. Pearlman, S. Tuecke, “Security for Grid Services,” HPDC-12, June 2003. N. Nagaratnam, P. Janson, J. Dayka, A. Nadalin, F. Siebenlist, V. Welch, I. Foster, S. Tuecke, “The Security Architecture for Open Grid Services,” OGSA-SEC-WG document, GGF. S. H. Kim, J. Kim, S. J. Hong, S. W. Kim, "Workflow based Authorization Service in Grid", 4th International workshop on Grid Computing (Grid 2003), pp 94-100, Novebmer 2003. S. H. Kim, K. H. Kim, J. Kim, S. J. Hong, S. W. Kim, “Workflow-based Authorization Service in the Grid”, Journal of Grid Computing, vol. 2, no. 1, pp. 43-55, 2004. B. J. Kim, S. J. Hong, J. Kim, "Ticket-Based Fine-Grained Authorization Service in the Dynamic VO Environment," ACM Workshop on Secure Web Services, October 2004. B. J. Kim, K. H. Kim, S. J. Hong, J. Kim, "Ticket-based Grid Services Architecture for Dynamic Virtual Organizations,“ LNCS 3470 (Advances in Grid Computing: EGC 2005), pp. 394-403, 2005. 34/34.

(46)

References

Related documents

Lia- bility insurance will also cover claims arising from other damage caused to third parties in the Republic of Estonia If the insurance contract also covers home contents in

You can also implement strong authentication and risk-based authorization for critical applications, and enforce minimal access rights based on roles, attributes, and requests

 Under  the  President’s  proposal,  high‐income  households  will  continue  to  receive  a  portion  of  their  tax  cuts.    For  example,  households 

Spring Security provides a package able to delegate authentication requests to the Java Authentication and Authorization Service

2007 “Global civil Society – Opportunity or Obstacle for Democracy?” Development Dialogue 49:

There is considerable prior work on the (automatic) generation of application specific instruction set exten- sions [1, 4, 6, 7], including commercial efforts like Ten- silica’s

After the user is authenticated, Flash Media Rights Management Server uses an External Authorization Handler to determine whether the user is permitted to access specific

Requires % of EL1 Exhibition Manager and % of APS5 Exhibition Project Officer NC Section Heads Provision of curatorial and research support; for the development and delivery