ubiquitous internet access control: the papi system

15
Ubiquitous Internet Access Control: The PAPI System Trustbus02 – Aix-en-Provence, September 2002

Upload: others

Post on 12-Sep-2021

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Ubiquitous Internet Access Control: The PAPI System

Ubiquitous Internet Access Control: The PAPI System

Trustbus02 – Aix-en-Provence, September 2002

Page 2: Ubiquitous Internet Access Control: The PAPI System

2

Outline

Requirements on AA (Authentication and Authorization) technologies

The PAPI components

The PAPI protocol

Application scenarios

Current status and ongoing work

Page 3: Ubiquitous Internet Access Control: The PAPI System

3

Requirements on AA technologies

Preserve user privacy

Do not interfere with provider rights and accounting procedures

Do not impose management burdens either to providers or consumers

Fully permit user mobility

Transparency to the user

Compatibility with other access control systems

Web based, although extensible to other access technologies

Page 4: Ubiquitous Internet Access Control: The PAPI System

4

What is PAPI

PAPI enables distributed access control to information resources accross the Internet

Authentication is locally performed at the organization the user belongs to

Authorization is fully controlled by the provider

Based on standard HTTP procedures and public key cryptography

Does not require specific hardware or software

Page 5: Ubiquitous Internet Access Control: The PAPI System

5

The components of PAPI

The Authentication Server (AS)

Provides users with a (local) single authentication point

The Point of Access (PoA)

Performs actual access control by means of temporary cryptographic tokens, encoded as HTTP cookies

The Group-wide Point of Access (GPoA)

Combines a group of PoAs with similar access policies

Intended to simplify AS-PoA interactions

Page 6: Ubiquitous Internet Access Control: The PAPI System

6

The Authentication Server

Verifies user identity and rights

Each of these verifications is independently performed

Directories play a key role in rights management

Builds a set of digitally signed assertions about the user

According to privacy preservation rules

Sends the assertions to the appropriate (G)PoAs

By means of references to objects embedded in HTML

Page 7: Ubiquitous Internet Access Control: The PAPI System

7

The Point of Access

Evaluates assertions received from the AS

Verifying the signature and matching against any defined filter

If the assertion is acceptable, produces a initial couple of access tokens

If the request comes with access tokens, evaluates them

Access is granted only to requests carrying valid tokens

Two classes of tokens (long- and short-lived) to avoid unauthorized access by cookie copying

Page 8: Ubiquitous Internet Access Control: The PAPI System

8

The Group-wide Point of Access

A PoA that receives a request without access tokens can redirect it to a GPoA

The GPoA analyzes these requests

If valid, the PoA receives a signed assertion from its GPoA

The PoA process it as coming from any other AS

The hierarchy may be indefinitely extended

Trust management is simplified

An AS needs only to know about the GPoA

PoAs may be added under a GPoA without configuring them for valid ASes

Page 9: Ubiquitous Internet Access Control: The PAPI System
Page 10: Ubiquitous Internet Access Control: The PAPI System

10

The GPoA protocol

Browser

Auth data

PAPI

AS

Assertions

GPoA Access Tokens

GPoA

PoA

PoA Access Tokens

302+ Tokens

302 + Data

Page 11: Ubiquitous Internet Access Control: The PAPI System

11

Application scenariosDatacenter

PoA

WebServer

PoA

GPoA

Datacenter

Authentication Server

Institution A

Directory

Authentication Server

Institution B

Directory

WebServer

Page 12: Ubiquitous Internet Access Control: The PAPI System

12

Application scenariosAccess to local and remote services

PoAWeb

Server

PoA

GPoA

Authentication Server

Institution

Directory

Provider B

WebServer

PoA

Provider A

WebServer

Page 13: Ubiquitous Internet Access Control: The PAPI System

13

Application scenariosCentralized service

PoA

WebServer

GPoA A

Authentication Server

Institution A

Directory

PoA Provider A

WebServer

Institution B

Directory

GPoA B

PoA

PoA

Provider B

WebServer

Page 14: Ubiquitous Internet Access Control: The PAPI System

14

Current status

Version 1.1 in production

Available in open source from http://www.rediris.es/app/papi/

Runs on Apache servers

Authentication modules based on POP3, LDAP and index files

Version 1.2 nearly to be released

Includes ISAPI (Microsoft IIS) support

Enhanced proxy functionality

Simpler configuration

Growing installed base

Gaining experience on requirements and applicability

Page 15: Ubiquitous Internet Access Control: The PAPI System

15

Ongoing work

Alignment with other AA initiatives

Use of standard languages (SAML) for assertions and normalization of attributes

In the framework of the TF-AACE group

In collaboration with Internet2 (Shibboleth)

Dynamic assertion evaluation

Based on attribute queries made by (G)PoAs and answered by the AS

Running on top of WebServices (SOAP)

Performance enhancements

Going beyond the Web

Use of the AA model for other applications: videoconferencing, Grid services,...