www.egi.eu
EGI-Engage is co-funded by the Horizon 2020 Framework Programme
- f the European Union under grant number 654142
EGI IGTF Liaison
Evolving the EGI trust fabric using distributed responsibility
David Groep
- rcid.org/0000-0003-1026-6606
using distributed responsibility David Groep EGI IGTF Liaison - - PowerPoint PPT Presentation
Evolving the EGI trust fabric using distributed responsibility David Groep EGI IGTF Liaison www.egi.eu EGI-Engage is co-funded by the Horizon 2020 Framework Programme of the European Union under grant number 654142
www.egi.eu
EGI-Engage is co-funded by the Horizon 2020 Framework Programme
EGI IGTF Liaison
2 11/10/2015
EGI Security Policy top-level framework
Accepted Certification Authorities policy IGTF Classic IGTF MICS IGTF SLCS Virtual Organisation Membership Policy Registration Practices
Evolving the EGI Trust Fabric - Bari 2015
EGI (based on earlier joint JSPG work) puts user traceability on the IGTF providers
VO registration process is fairly light-weight: no audits, no documented procedures
3 11/10/2015
Performing reasonable identity vetting of users and providing traceability is non-trivial
e.g. through services like DFN-AAI and Trusted Certificate Service TCS
Evolving the EGI Trust Fabric - Bari 2015 Graphic from: Jan Meijer, UNINETT Graphic: IGTF 2015
4 11/10/2015
background: eduGAIN connected federations as of November 2014 – Brooke Schofield, TERENA
‘free VMs 4 ALL’ wLCG FIM4R pilot
But SSO single password & federation today also means: instant abuse in case it gets compromised, (WebSSO, imap, smtp, ssh, eduroam, TCS, …) unknown qualities of identity in each federation and each IdP and it works for Web only
Evolving the EGI Trust Fabric - Bari 2015
5 11/10/2015
Evolving the EGI Trust Fabric - Bari 2015
ELIXIR reference architecture Mikael Linden et al. WebFTS ‘FIM4R’ in wLCG Romain Wartel
6 11/10/2015
Cross-national federated access progressed tremendously
A great promise for easier collaboration
for web-based services through ‘OpenID Connect’ and ‘SAML’
And there are bridges – since for non-Web, command-line and brokerage ‘SAML2Int WebSSO’ does not work
Evolving the EGI Trust Fabric - Bari 2015
7 11/10/2015
Although many production federations are pretty good, and quite a few IdPs have good processes …
and processes are not designed for collaboration use cases
and may not provide traceability needed for valuable resources
address and all contact data), or do not collaborate in case of issues
Evolving the EGI Trust Fabric - Bari 2015
8 11/10/2015
So many production federations and IdPs are pretty good, but …
… so IGTF for ‘conventional’ assurances requires additional per-user controls … and the (‘uniqueified’) AP ‘DOGWOOD’ (IOTA) leaves an assurance gap
Evolving the EGI Trust Fabric - Bari 2015
Kantara-like Assurance Scale LoA 0: ‘like conventional unsigned email’
* somewhat my personal view … sorry for bias
1 2 …3,4 RP task
9 11/10/2015
elements must be taken up by somebody else – the VO or the sites
– Real names and pseudonyms – Enrolling users in a community – Keeping audit records – Auditability and tracing – Incident response
Evolving the EGI Trust Fabric - Bari 2015
Identity elements
10 11/10/2015
Who can absorb the responsibilities, if not the identity providers? Requirements:
process – but adding some requirements does work (e.g. SiRTFi on incident response) … so who can absorb the responsibility?
process – PRACE ‘home sites’, or XSEDE registration + NSF granting
Evolving the EGI Trust Fabric - Bari 2015
11 11/10/2015
Need for proper traceability does not go away, so …
Some communities have an existing registration system that is very robust
at the home sites
approval process
and HR Database
Evolving the EGI Trust Fabric - Bari 2015
12 11/10/2015
Evolving the EGI Trust Fabric - Bari 2015
13 11/10/2015
Evolving the EGI Trust Fabric - Bari 2015
14 11/10/2015
EGI – by design - supports loose and flexible user collaboration
Only a few VOs are ‘special’
managed) HR database, based on a separate face-to-face vetting process and eligibility checks, including government photo ID + institutional attestations
Evolving the EGI Trust Fabric - Bari 2015
*) https://documents.egi.eu/document/79
15 11/10/2015
What is needed it for the infrastructures (resource centres) to differentiate between ‘light-weight VOs’ and ‘heavily-managed VOs’
managed VOs’
they’re combined with higher-assurance IdPs (CAs)
Evolving the EGI Trust Fabric - Bari 2015
Logic foreseen for such a decision ( VO:/pvier && CA:IGTF-Classic,IGTF-MICS,”NL-eInfra-Zero-CA” ) || ( VO:/atlas && CA:IGTF-Classic,IGTF-MICS,IGTF-SLCS,IGTF-IOTA ) || ( VO:/* && CA:IGTF-Classic,IGTF-MICS,IGTF-SLCS )
16 11/10/2015
‘For site-controlled redistribution to work, all software in the infrastructure faces with redistributed responsibility must support it’ Key components
For some it’s there (like LCMAPS on next slide), for others its ‘fairly trivial’ to implement (Argus), but all needs to be deployed and used as well
i.e., a “PIP” in AUthZ lingo speak, or it will not scale, but this is planned
Evolving the EGI Trust Fabric - Bari 2015
17 11/10/2015
acceptable CAs and (IGTF) Assurance Profiles
For Argus
Evolving the EGI Trust Fabric - Bari 2015
# Example VO-CA-AP-file, please adapt according to requirements # First the VOMS entries /pvier "/C=NL/O=NIKHEF/CN=NIKHEF medium-security certification auth",\ file:TERENAeSciencePersonalCA.info, \ file:TERENAeSciencePersonalCA-3.info /dteam file:policy-igtf-mics.info,file:policy-igtf-classic.info
18 11/10/2015
But this software is not there quite yet
Meanwhile, we do want to experiment with FedAuth in production
making it a special IOTA CA scoped to VOs that do their own tracing
– because it satisfies the requirements – and the policy (also EGI’s) already allows for exceptions – And it’s deployed only as needed – so now only for wLCG
Evolving the EGI Trust Fabric - Bari 2015
19 11/10/2015
Can you combine two policies within the same infrastructure?
– In itself implements all the policy requirements of a traditional CA by insisting on LHC membership – the same requirement that already governs the Classic CERN CA
Evolving the EGI Trust Fabric - Bari 2015
* old Dutch saying: two people of different religion sleeping together? The Devil sleeps in between!
20 11/10/2015
ca-policy-egi-core IGTF Classic ca-AEGIS … IGTF MICS ca-TCS … IGTF SLCS ca-DFN-AAI … Evolving the EGI Trust Fabric - Bari 2015
‘lcg-CA’
configuration
ca-policy-lcg IGTF Classic ca-AEGIS … IGTF MICS ca-TCS … IGTF SLCS ca-DFN-AAI … ca-CERN- LCG-IOTA
For EGI-only sites: nothing changes! For EGI sites also under wLCG policy and installed post-EGEE: just install both policy packages “egi-core” and “lcg”
21 11/10/2015
whilst preparing for a future of differentiated assurance
the special, circumscribed, CERN LHC IOTA CA
since the VO (actually CERN) takes care of traceability through additional policy constraints “WLCG-CERN-IOTA-statement-MB-20151028”
Evolving the EGI Trust Fabric - Bari 2015 http://www.nikhef.nl/grid/tmp/WLCG-CERN-IOTA-statement-MB-20151028.pdf
22 11/10/2015
since we want to support loose collaborations – until we get VO+CA decision support in all middleware – foreseen in Argus & there in LCMAPS, needs bit more development – should also be deployed and honoured at all EGI sites
cases – including support for federated research and scholarship!
“ca-policy-egi-core” when so requested
Evolving the EGI Trust Fabric - Bari 2015
www.egi.eu
This work by Parties of the EGI-Engage Consortium is licensed under a Creative Commons Attribution 4.0 International License.
… and join the AARC session on Thursday!