external identity and authorization in geni. [email protected] topics federated identity and virtual...

29
External Identity and Authorization in GENI

Upload: simon-gregory

Post on 28-Dec-2015

223 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

External Identity and Authorization in GENI

Page 2: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

[email protected]

Federated identity

• Builds on deployed authentication services • Identity Provider (IdP) services at universities etc.

• IdPs handle logins (single sign-on) and assert attributes• Can supply roles, permissions, common attributes (name,

organization, affiliations, citizenship, capabilities, etc.)

• Uses SAML and metadata (aka Shibboleth)• International trust fabric now being deployed on Internet-

scale, first in R&E but expanding to other sectors• Greater than 150M world-wide, 5M US, exponential growth

Page 3: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

Duke Shibboleth Identity Provider (IdP)

HTTPSXMLRPC / SOAP

Users and “hands-free”

tools

Web Service Portal(SP)

Authenticated user identityAttributes for authorization

Page 4: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

[email protected]

Advantages

• Institutions maintain the accounts (they do it anyway)• Secure privacy-preserving login• Single sign on (SSO)• Expiration/revocation!

• Institutions can hold their users accountable

• Supplies attributes for access control (e.g., ABAC)• Standard attributes (student, faculty, etc.)• Groups: easy to create and maintain• Course enrollment, research group, etc.

• Use COmanage for Virtual Organizations (e.g., GENI)

Page 8: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

[email protected]

Duke’s Shibboleth IdP says:“The user is authenticated as [email protected], a Duke professor who is a member of the group cs.geni.test”.

Page 9: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

[email protected]

Code snipped from portal source: get session attributes.

Page 10: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

[email protected]

Config snippet from the portal’s web.xml descriptor. It says: “let OIOSAML filter access to this Web portal” with the configured IdP bindings.

Page 15: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

[email protected]

“Remove Chase from the group cs.geni.test”.

Page 16: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

[email protected]

On next login, Duke’s Shibboleth IdP says:“The user is authenticated as [email protected], a Duke professor who is not a member of any group.”

Page 18: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

[email protected]

Allocation policy considers group membership attributes of requester (ABAC).

Page 19: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

[email protected]

Attribute-Based Access Control (ABAC)

• This simple example illustrates ABAC.• The attributes are asserted by an IdP.• The resource broker policy trusts and understands

attributes from this source.• The policy uses the attributes to make a policy decision.• Authorization• Resource Control

• Shibboleth and ABAC work together.

Page 20: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

[email protected]

A Few Points about SFA 2.0

• SFA 1.0• Specified identity/trust mechanisms and attributes.

• SFA 2.0• Mechanisms of SFA 1.0 are optional• They are instances of an open framework.• Shibboleth+ABAC is SFA-compliant.• SFA server policies may choose which IdPs and

attributes to consider.

Page 21: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

[email protected]

COmanage and GENI • CO is a platform supporting the work of VOs, using enterprise tools

(including Shib and Grouper) reassembled for VO use • COmanage is a platform that allows federated identities to be

gathered, assigned attributes and fed to applications• Consistent identity and group management across apps

• Collaboration apps (wikis, listprocessors, IM, videoconferencing, file shares, etc)

• Domain apps (grids, ssh-based, etc.)• Provides scalable, secure, federated, flexible A/A to apps• A GENI cluster, or GENI itself, could be well-served on a

COmanage instance

Page 22: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

[email protected]

COManage Elements

Data Store

Page 23: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

[email protected]

Flows

Data Store

Users

Portal/Gateway SP

Collabmins(RA’s, PI’s, sysadmins, etc.)A/A

A/A

A/A

Page 24: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

[email protected]

Sample Flows of attributes

En

terprise

Data S

tore

Project comanage

Relyin

g P

arty

En

terprise

Page 25: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

[email protected]

What’s in a COmanage data store

Enterprise Attributes Project/VO attributes

Federated Id PI groups

Enrolled classes Wiki editing permissions

Display name Instrument permissions

Citizenship VO certificates

Enterprise affiliation …

Page 26: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

[email protected]

Collabmin GUI

Page 27: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

[email protected]

Demo 1

• Using enterprise-based identity to assign GENI privileges• Enterprise authentication• Enterprise located groups • Transported to portal by SAML, consumed and

carried within ORCA

Page 28: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

[email protected]

Demo 1 basics• On the user side, Duke identities (PI’s, RA’s, students) are

assigned ORCA permissions through standard Duke group management tools

• On the ORCA web portal side, Shib relying party code was added to the Java server.• It consumes assertions from Duke Shib identity provider• Those attributes are fed to an ORCA policy engine, which

creates ORCA native credentials and sends them on

• Users going to the ORCA portal are redirected to authenticate at Duke (unless already authenticated)

Page 29: External Identity and Authorization in GENI. kjk@internet2.edu Topics Federated identity and virtual organizations ABAC Creating and transporting attributes

[email protected]

Demo 2

• Using enterprise identity and VO attributes to control ORCA• Enterprise asserts identity• VO asserts groups and privileges• Integrated into the larger VO science and

collaboration environment• Permissions (fine-grain authz) also possible