Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns

Size: px
Start display at page:

Download "Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns"

Transcription

1 Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns Craig Lee, The Aerospace Corporation On behalf of Yuri Demchenko, Craig Lee, Canh Ngo, Cees de Laat Intercloud2014 Workshop 11 March 2014, Boston

2 Outline Background to this work Federation in Grid and s Inter Federation Framework (ICFF) and federation infrastructure patterns Federated Access Control and Federated Identity Management in clouds Additional information VO based federations in Grid (retrospective view) Intercloud2014 Federated Access Control Patterns Slide_2

3 Background to this work Federation BoF at OGF and follow on As the main motivation motivated work of current author team with wide consultation with Grid and community Research at the University of Amsterdam on developing of the Intercloud Architecture Framework (ICAF) Where the Intercloud Federation Framework is defined as a component for multi-provider infrastructure integration EGI (European Grid Initiative) Federated Task Force Building Federated model based on Grid VO based federation model Intercloud2014 Federated Access Control Patterns 3

4 Federation in Grid and s: Grid VO vs Virtual Infrastructure Grid federates resources and users by creating Virtual Organisations (VO) VO membership is maintained by assigning VO membership attributes to VO resources and members Resources remain under control of the resource owner organisation Grid Centers s remain members of their Home Organisations (HO) AuthN takes place at HO or Grid portal To access VO resources, VO members need to obtain VOMS certificate or VOMS credentials In clouds, both resources and user accounts are created/provisioned on-demand as virtualised components/entities accounts/identities can be provisioned together with access rights to virtual resources Intercloud2014 Federated Access Control Patterns 4

5 Federation: Actors and Roles Service Provider (CSP) Customer (organisational) Multitenancy is provided by virtualisation of cloud resources provided to all/multiple customers (end user) (Service) Broker Identity Provider (IDP) Carrier Service Operator Auditor Intercloud2014 Federated Access Control Patterns 5

6 Federation Scaling up and down Scalability is one of the main cloud feature To be considered in the context of hybrid cloud service model burst and outsourcing enterprise services to cloud services migration and replication between CSP Scaling up Identities provisioning Populating sessions context Scaling down Identity deprovisioning: Credentials revocation? Sessions invalidation vs restarting Initiated by provider and by user/customer Intercloud2014 Federated Access Control Patterns 6

7 Federation Models Identified models /customer side federation (1.1) Federating users/ho and CSP/cloud domains Customer doesn t have own IDP (IDP-HO) Provider s IDP is used (IDP-CSP) (1.2) Federating HO and CSP domains Customer has own IDP-HO1 It needs to federate with IDP-CSP, i.e. have ability to use HO identities at CSP services (1.3) Using 3rd party IDP for external users Example: Web server is run on cloud and external user are registered for services Provider (resources) side federation (2.1) Federating CSP s/multi-provider cloud resources Used to outsource and share resources between CSP Typical for community clouds Intercloud2014 Federated Access Control Patterns 7

8 Basic Federation model (1.1) Federating users/ho and CSP/cloud domains (no IDP-HO) HO1 Admin/Mngnt System Management (Ops&Sec) Provider A side Federation HO1.2 HO1.1 HO1.3 A1.2A1.1 A1.3 IDP-Xa Customer A1 (Running Service Xa) Customer Home Organisation (Infrastructure services) IDP-HO Federation relations CSP IDP/ Broker IDP-Xa is a virtualised service of the CSP IDP Simple/basic scenario 1: Federating Home Organisation (HO) and Service Provider (CSP) domains based services created for users from HO1 and managed by HO1 Admin/Management system Involved major actors and roles CSP Customer IDP/Broker accounts A1.1-3 are provisioned for each user 1-3 from HO with 2 options Individual accounts with new ID::pswd Mapped/federated accounts that allows SSO/login with user HO ID::pswd Federated accounts may use IDP/Broker (e.g. KeyStone) or those created for Service Xa TODO: Extend with AuthN/AutnZ service in Virtual Service Environment Intercloud2014 Federated Access Control Patterns 8

9 Basic Federation model (1.2) Federating HO and CSP domains (IDP-HO1 and IDP-CSP) HO1 Admin/Mngnt System Management (Ops&Sec) Provider A side Federation HO1.2 HO1.1 HO1.3 A1.2A1.1 A1.3 IDP-Xa Customer A1 (Running Service Xa) Customer Home Organisation (Infrastructure services) IDP-HO1 Federation relations CSP IDP/ Broker IDP-Xa can be implemented as instantiated service of the CSP IDP Simple/basic scenario 1: Federating Home Organisation (HO) and Service Provider (CSP) domains based services created for users from HO1 and managed by HO1 Admin/Management system Involved major actors and roles CSP Customer IDP/Broker accounts A1.1-3 are provisioned for each user 1-3 from HO with 2 options Individual accounts with new ID::pswd Mapped/federated accounts that allows SSO/login with user HO ID::pswd Federated accounts may use IDP/Broker (e.g. KeyStone) or those created for Service Xa TODO: Extend with AuthN/AutnZ service in Virtual Service Environment Intercloud2014 Federated Access Control Patterns 9

10 Basic Federation model (1.3) Using 3rd party IDP for external users Customer 1 Admin/Mngnt System Management (Ops&Sec) Provider A 2 side Federation 1 3 Direct or Dynamic link X Xa.2Xa.1 a.3 IDP-Xa Customer A1 (Running Service Xa) External s (Open Internet) Ext/3rdParty IDP-HO1 Federation relations CSP IDP/ Broker IDP-Xa can be implemented as instantiated service of the CSP IDP Simple/basic scenario 2: Federating Home Organisation (HO) and Service Provider (CSP) domains based services created for external users (e.g. website) and managed by Customer 1 Involved major actors and roles CSP Customer IDP/Broker accounts A1.1-3 are provisioned for each user 1-3 from HO with 2 options Individual accounts with new ID::pswd Mapped/federated accounts that allows SSO/login with user HO ID::pswd Federated accounts may use IDP/Broker (e.g. KeyStone) or those IDP-Xa created for Service Xa Intercloud2014 Federated Access Control Patterns 10

11 Basic Federation model Combined side federation (a) Enterprise Infrastructure (a) HO or (b) Custmr1 MgntSystem Management (Ops&Sec) Provider A 2 side Federation 1 Direct or Dynamic link X Xa.2Xa.1 a.3 IDP-Xa Customer A1 (Running Service Xa) (b) External s (Open Internet) 3 (a) IDP-HO1 (b) 3rd Party IDP Federation relations CSP IDP/ Broker IDP-Xa can be implemented as instantiated service of the CSP IDP Simple/basic scenario 2: Federating Home Organisation (HO) and Service Provider (CSP) domains based services created for external users (e.g. website) and managed by Customer 1 Involved major actors and roles CSP Customer IDP/Broker accounts A1.1-3 are provisioned for each user 1-3 from HO with 2 options Individual accounts with new ID::pswd Mapped/federated accounts that allows SSO/login with user HO ID::pswd Federated accounts may use IDP/Broker (e.g. KeyStone) or those IDP-Xa created for Service Xa Intercloud2014 Federated Access Control Patterns 11

12 Basic Federation model (2.1) Federating CSP s/multi-provider cloud resources HO1 Admin/Mngnt Provider A K2 Intercloud2014 Ak2 Kn1 Provider K HO1.2 HO1.1 HO1.3 A1.2A1.1 A1.3 Service Xa Ak1 IDP-K M2 Am1 M1 Provider M IDP-Xa IDP-HO1 side Infrastructure services IDP-M An1 CSP IDP-A Inter-provider federation for resources sharing Federation&Trust relations N2 N1 IDP-N Provider N Federated Access Control Patterns provider side federation for resources sharing Federation and Trust relations are established between CSP s via Identity management services, e.g. Identity Providers (IDP) May be bilateral or via 3rd party/broker service Includes translation or brokering Trust relations Namespaces Attributes semantics Policies Inter-provider federation is transparent to customers/users Provider side Federation 12

13 (a) Enterprise Infrastructure (a) HO or (b) Custmr1 MgntSystem 2 1 (b) External s (Open Internet) 3 (a) IDP-HO1 (b) 3rd Party IDP Federation Model - Combined Management (Ops&Sec) Provider A Ak2 Direct or Dynamic link Federation relations Service Xa Ak1 Xa.2Xa.1 Am1 Xa.3 IDP- Xa An1 CSP IDP-A Federation & Trust relations Instantiated IDP-A => IDP-Xa side federation Provider side federation Inter-provider federation for resources sharing K2 Kn1 Provider K IDP-K M2 M1 Provider M IDP-M N2 N1 IDP-N Provider N Intercloud2014 Federated Access Control Patterns 13

14 Basic AuthN and AuthZ services using Federated IDPs For additional Credentials validation IDP-Fed* IDP-Fed* IDP0 2 AuthN & Attrs methods: Push: Attrs obtained by Pull: Attrs fetched by AuthN Requester Identity Attrs Creds/Attrs Validation with Federated IDP* Creds/Attrs Validation with Home IDP0 AuthN ID Creds & Attrs AuthZ Attrs CVS AuthN Tok/Assert & ID Attrs PEP - Policy Enforcement Point PDP/ADF - Policy Decision Point IDP Identity Provider PAP - Policy Authority Point CtxHandler - Context Handler CVS Credentials Validation Service PDP PAP (Policy) Policy CtxHandler Collection and Validating AuthZ Attrs Policy Management PEP Resource Resource Attrs Intercloud2014 Federated Access Control Patterns 14

15 Basic AuthN and AuthZ services using Federated IDPs Federation/Trust domains Admin/Security Domain 0 ( HO) Federated IDPs IDP-Fed HO Identity Attrs Admin/Security Domain1 Service IDP-Fed* IDP0 Serv/Requester /Req Attrs ID Creds & Attrs Creds/Attrs Validation with Federated IDP-HO Creds/Attrs Validation with Home IDP0 AuthN CVS AuthN Token/Assert & ID Attrs AuthZ Attrs PDP CtxHandler PEP Resource Domain R PAP (Policy) Policy Collection and Validating AuthZ Attrs Policy Management Resource Resource Attrs Intercloud2014 Federated Access Control Patterns 15

16 Implementation: Intercloud Federation Infrastructure and Open exchange (OCX) OCX Services Federated Instance Customer A (University A) Cert Repo (TACAR) TTP Trusted Introducer FedIDP Broker Trust Broker Broker OCX and federated network infrastructure Trust Broker Service Broker Federated Instance Customer B (University B) Discovery (RepoSLA) Directory Directory (RepoSLA) GEANT Trans- European infrastructure Gateway Gateway Gateway Gateway AAA AAA AAA AAA (I/P/S)aaS Provider (I/P/S)aaS Provider (I/P/S)aaS Provider (I/P/S)aaS Provider IDP IDP IDP IDP Intercloud2014 Federated Access Control Patterns 16

17 Summary and Future work The proposed Intercloud Federation Framework is a part of the general Intercloud Architecture Framework and intends to provide a basis for further API and protocols definition It is based on wide discussion among OGF, EGI and cloud security community Currently the proposed approach and model are being implemented as a part of the GEANT infrastructure to support Intercloud services delivery to member universities Intercloud2014 Federated Access Control Patterns 17

18 Discussion and Questions Intercloud2014 Federated Access Control Patterns 18

19 Reference information and diagrams VO based Grid federation model AuthN and AuthZ services operation Intercloud2014 Federated Access Control Patterns 19

20 VO based Grid federation model Intercloud2014 Federated Access Control Patterns 20

21 VO2007: VO in Collaborative applications and Complex Resource Provisioning Two basic use cases considered Grid based Collaborative applications/environment (GCE) built using Grid middleware and integrated into existing Grid infrastructure Complex resource provisioning like Optical Lightpath provisioning (OLPP), or bandwidth-on-demand (BoD) VO based functionality (and requirements) to support dynamic security associations Dynamic Trust management Establishing dynamic trust management relations between VO members Attribute and metadata resolution and mapping VO-based access control service requires common VO-wide attributes that however can be mapped to the original ones Policy combination and aggregation To allow conflict resolution and policy harmonisation between VO members Flexible/distributed VO management infrastructure Intercloud2014 Federated Access Control Patterns Slide_21

22 VO2007: VO bridging inter-organisational barriers x1 Service xa VO users and services Service xd Service xe x2 Service xb x4 Virtual Organisation X x5 a1 a1 Service Bb A1 A2 Service Ab Barrier a1 Service Bc A3 Organisation A Service Aa Service Ac Organisation B Service Ba VO allows bridging inter-organisational barriers without changing local policies Requires VO Agreement and VO Security policy VO dynamics depends on implementation but all current implementations are rather static Intercloud2014 Federated Access Control Patterns Slide_22

23 Example VO Security services operation VO Context (VO ID/name) VO Mngnt Requestor Service xa (1b) (1a) Authentication Service (2) DB (3) Identity Provider Policy Authority (2a) Attribute Authority (4a) (4b) Resource Service xd (4) Authorisation Service Basic VOMS functionality in Grid s provide full resources and infrastructure services virtualisation Factory AuthN Directory VOMS* IP/STS Policy AttrA Trust Trust AuthZ Organisation A Trust Mngnt Virtual Organisation X LogAcc Factory AuthN Directory IP/STS Trust Policy AttrA Logging Accounting Trust AuthZ LogAcc Organisation B Intercloud2014 Federated Access Control Patterns Slide_23

24 VO2007: VOMS standard-de-facto for VO management VO Membership Service (VOMS) is a standard-de-facto for VO management and VO-based authorisation in Grid VO is represented as a complex, hierarchical structure with groups and subgroups Subgroup management may be delegated to different administrators Every user in a VO is characterised by the set of attributes Group/subgroup membership, roles and capabilities so-called 3- tuples Combination of all 3-tuples for the user is expressed as a Fully Qualified Attribute Name (FQAN) FQAN is included into VOMS X.509 Attribute Certificate (AC) VOMS infrastructure May contain multiple VOMS serves and synchronised VODB s Supports user calls for VOMS AC s and VOMS admin tasks VOM Registration is developed by Open Science Grid (OSG) project to support users self-registration Intercloud2014 Federated Access Control Patterns Slide_24

25 VO2007: Dynamic Security Associations Session establishes security context in the form of session key that can be a security token or simple UID bound to secure credential/context Session may associate/federate users, resources and actions/processes Job/workflow more long-lived association and may include few sessions May need to associate more distributed collection of users and resources for longer time required to deliver a final product or service Job and workflow may contain decision points that switch alternative flows/processes Security context may change during workflow execution or Job lifetime Job description may contain both user and resource lists and also provide security policy and trust anchor(s) (TA) Project or mission oriented cooperation established for longer time cooperation (involving people and resources) to conduct some activity This is actually the area of currently existing VO associations Inter-organisational association or federation established for longterm cooperation, may have a wide scope of cooperative areas This is the area of inter-university associations Shibboleth Attribute Authority Services (SAAS) is designed for this kind of federations Intercloud2014 Federated Access Control Patterns Slide_25

26 VO2007: Conceptual VO Operational Models -centric VO (VO-U) - manages user federation and provide attribute assertions on user (client) request Resource/Provider centric VO (VO-R) - supports provider federation and allows SSO/access control decision sharing between resource providers Agent centric VO (VO-A) - provides a context for interdomain agents operation, that process a request on behalf of the user and provide required trust context to interaction with the resource or service Project centric VO (VO-G) - combines centric and Provider centric features what actually corresponds to current VO use in Grid projects Intercloud2014 Federated Access Control Patterns Slide_26

27 VO2007: Conceptual VO Management Framework VO establishes own virtual administrative and security domains It may be separate or simply bridge VO-member domains VO management service should provide the following functionalities Registration and association of users and groups with the VO Management of user attributes (groups, roles, capabilities) Association of services with the VO Association of policies with the VO and its component services VO Registry service for wider VO implementation may be required VO naming should provide uniqueness for the VO names Intercloud2014 Federated Access Control Patterns Slide_27

28 VO2007: VO Security Services VO as a component of the Security infrastructure should provide the following security services Policy Authorities (e.g. GPBox) Trust management service (GridPMA) Identity Management Service (by HO) Attribute Authorities (VOMS) Authorization service (CAS) Authentication service Logging, Accounting Intercloud2014 Federated Access Control Patterns Slide_28

Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns

Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns Yuri Demchenko, Canh Ngo, Cees de Laat System and Network Engineering University of Amsterdam Amsterdam,

More information

Autonomic Cloud Workflows and Cloud Federation

Autonomic Cloud Workflows and Cloud Federation Autonomic Cloud Workflows and Cloud Federation Dr. Craig A. Lee, Senior Scientist, lee@aero.org The Aerospace Corporation GSAW, March 18, 2013 The Aerospace Corporation 2013 Introduction NIST Definition

More information

Using WS-Federation and WS-Security for Identity Management in Virtual Organisations

Using WS-Federation and WS-Security for Identity Management in Virtual Organisations Using WS-Federation and WS-Security for Identity Management in Virtual Organisations Demchenko, Yu. , Universiteit van Amsterdam Abstracts The paper provides insight into one of key

More information

Adding Federated Identity Management to OpenStack

Adding Federated Identity Management to OpenStack Adding Federated Identity Management to OpenStack David Chadwick University of Kent 3 December 2012 University of Kent 1 Some Definitions What is Identity? A whole set of attributes that in combination

More information

IGI Portal architecture and interaction with a CA- online

IGI Portal architecture and interaction with a CA- online IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following

More information

Defining Generic Architecture for Cloud Infrastructure as a Service Model

Defining Generic Architecture for Cloud Infrastructure as a Service Model Defining Generic Architecture for Cloud Infrastructure as a Service Model Yuri Demchenko 1 University of Amsterdam Science Park 904, Amsterdam, The Netherlands E-mail: y.demchenko@uva.nl Cees de Laat University

More information

Open Cloud exchange (OCX)

Open Cloud exchange (OCX) Open Cloud exchange (OCX) Draft Proposal and Progress GN3plus JRA1 Task 2 - Network Architectures for Cloud Services Yuri Demchenko SNE Group, University of Amsterdam 10 October 2013, GN3plus Symposium,

More information

Security Architecture for Open Collaborative Environment

Security Architecture for Open Collaborative Environment Security Architecture for Open Collaborative Environment Yuri Demchenko¹, Leon Gommans¹, Cees de Laat¹, Bas Oudenaarde¹, Andrew Tokmakoff², Martin Snijders², Rene van Buuren² ¹ Universiteit van Amsterdam,

More information

Cloud Service Level Agreements and Cloud Federation

Cloud Service Level Agreements and Cloud Federation Cloud Service Level Agreements and Cloud Federation Dr. Craig A. Lee, Senior Scientist, lee@aero.org The Aerospace Corporation GSAW, February 26, 2014 The Aerospace Corporation 2014 2 Introduction NIST

More information

Intercloud Architecture Framework for Heterogeneous Multi-Provider Cloud based Infrastructure Services Provisioning

Intercloud Architecture Framework for Heterogeneous Multi-Provider Cloud based Infrastructure Services Provisioning Intercloud Architecture Framework for Heterogeneous Multi-Provider Cloud based Infrastructure Services Provisioning 1 Yuri Demchenko, 1,2 Marc X. Makkes, 1,2 Rudolf Strijkers, 1 Canh Ngo, 1 Cees de Laat

More information

Title: Cloud Security, Access Control and Compliance

Title: Cloud Security, Access Control and Compliance HPCS 2015 TUTORIAL IV Title: Cloud Security, Access Control and Compliance http://www.uazone.org/demch/presentations.html hpcs2015tutorial-cloud-security-access-control-compliance-v02.pdf Yuri Demchenko

More information

ABFAB and OpenStack(in the Cloud)

ABFAB and OpenStack(in the Cloud) ABFAB and OpenStack(in the Cloud) David W Chadwick University of Kent 1 Authentication in OpenStack Keystone User Trust Relationship Swift/Glance etc. 2 Federated Authnwith External IdPs External IdP User

More information

Dynamic Access Control Infrastructure for On-demand Provisioned Cloud Services

Dynamic Access Control Infrastructure for On-demand Provisioned Cloud Services Dynamic Access Control Infrastructure for On-demand Provisioned Cloud Services Canh Ngo SNE Group, University of Amsterdam OGF-ISOD 33 September 19-21, 2011 Lyon, 2011 Agenda Introduction Scenario Motivation

More information

1 Novell Use Cases. 1.1 Use Case: Per Tenant Identity Provider Configuration. 1.1.1 Description/User Story. 1.1.2 Goal or Desired Outcome

1 Novell Use Cases. 1.1 Use Case: Per Tenant Identity Provider Configuration. 1.1.1 Description/User Story. 1.1.2 Goal or Desired Outcome 1 Novell Use Cases 1.1 Use Case: Per Tenant Identity Provider Configuration 1.1.1 Description/User Story Multi-tenant service providers, whether they are SaaS, PaaS, or IaaS vendors, benefit from quick

More information

DEFINING GENERIC ARCHITECTURE FOR CLOUD IAAS PROVISIONING MODEL

DEFINING GENERIC ARCHITECTURE FOR CLOUD IAAS PROVISIONING MODEL DEFINING GENERIC ARCHITECTURE FOR CLOUD IAAS PROVISIONING MODEL Yuri Demchenko, Cees de Laat System and Network Engineering Group, University of Amsterdam, Amsterdam, The Netherlands y.demchenko@uva.nl,

More information

SAML:The Cross-Domain SSO Use Case

SAML:The Cross-Domain SSO Use Case SAML:The Cross-Domain SSO Use Case Chris Ceppi Oblix Corporate Engineer Ed Kaminski OBLIX Federal Business Manager 410-349-1828 ekaminski@oblix.com Mike Blackin Principal Systems Engineer Oblix, Inc. 202-588-7397

More information

Licia Florio Project Development Officer licia@terena.org www.terena.org Identity Federations in Europe

Licia Florio Project Development Officer licia@terena.org www.terena.org Identity Federations in Europe APAN Conference Honolulu, Hawaii 24 January 2008 Licia Florio Project Development Officer licia@terena.org www.terena.org Identity Federations in Europe Outline Networking Organisations in Europe Requirements

More information

Globus Toolkit: Authentication and Credential Translation

Globus Toolkit: Authentication and Credential Translation Globus Toolkit: Authentication and Credential Translation JET Workshop, April 14, 2004 Frank Siebenlist franks@mcs.anl.gov http://www.globus.org/ Copyright (c) 2002 University of Chicago and The University

More information

D u k e S y s t e m s CF AUTHN/AUTHZ GEC10. Jeff Chase Duke University

D u k e S y s t e m s CF AUTHN/AUTHZ GEC10. Jeff Chase Duke University D u k e S y s t e m s CF AUTHN/AUTHZ GEC10 Jeff Chase Duke University GENI Security Architecture IMHO, security is a major recurring problem in GENI Control Framework (CF) architecture. The problem comes

More information

My Private Cloud. Project Objectives

My Private Cloud. Project Objectives My Private Cloud David W Chadwick University of Kent 1 Dec 2011 IEEE CloudCom 2011 1 Project Objectives Migrate (as much as possible in 6 months of) the trust, security and privacy preserving infrastructure

More information

Analisi di un servizio SRM: StoRM

Analisi di un servizio SRM: StoRM 27 November 2007 General Parallel File System (GPFS) The StoRM service Deployment configuration Authorization and ACLs Conclusions. Definition of terms Definition of terms 1/2 Distributed File System The

More information

BE09 Demonstrator David Brossard BT CTO. Involved Partners: ANDAGO, ATOS, BT, CRMPA, URJC

BE09 Demonstrator David Brossard BT CTO. Involved Partners: ANDAGO, ATOS, BT, CRMPA, URJC BE09 Demonstrator David Brossard BT CTO Involved Partners: ANDAGO, ATOS, BT, CRMPA, URJC All work and no play makes Jack a dull boy Table of Contents 1. 2. 3. 4. 5. 3 BE09 goal Key concepts Actors Scenario

More information

Defining InterCloud Architecture (for Cloud based Infrastructure Services provisioned on-demand) and Cloud Security Infrastructure

Defining InterCloud Architecture (for Cloud based Infrastructure Services provisioned on-demand) and Cloud Security Infrastructure Defining InterCloud Architecture (for Cloud based Infrastructure Services provisioned on-demand) and Cloud Security Infrastructure Yuri Demchenko SNE Group, University of Amsterdam Cloud Federation Workshop,

More information

Virtual Hosting Environments for Online Gaming TG6 TG8 Meeting Paris 2008 David Brossard Senior Researcher BT CTO

Virtual Hosting Environments for Online Gaming TG6 TG8 Meeting Paris 2008 David Brossard Senior Researcher BT CTO Virtual Hosting Environments for Online Gaming TG6 TG8 Meeting Paris 2008 David Brossard Senior Researcher BT CTO Involved Partners: ANDAGO, ATOS, BT, CRMPA, URJC Table of Contents 1. BEinGRID Overview

More information

Consumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014

Consumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014 Consumption IT Michael Shepherd Business Development Manager Cisco Public Sector May 1 st 2014 Short Bio Cloud BDM in Public Sector (SLED + FED) Cisco for 14 + years Focused on cloud for 4 + years Awareness,

More information

Adding Federated Identity Management to Openstack

Adding Federated Identity Management to Openstack Adding Federated Identity Management to Openstack David Chadwick d.w.chadwick@kent.ac.uk 5 April 2014 Cloud Computing Security and Identity Workshop, NMOC 1 OpenStack Large open source project to develop

More information

Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase

Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase Authentication and Authorisation for Research and Collaboration Federations 101 An Introduction to Federated Identity Management Peter Gietz, Martin Haase AARC NA2 Task 2 - Outreach and Dissemination DAASI

More information

Cloud federation. Prelude to Hybrid Clouds. CHEP 2015 Okinawa, Japan. Marek Denis CERN Geneva, Switzerland

Cloud federation. Prelude to Hybrid Clouds. CHEP 2015 Okinawa, Japan. Marek Denis CERN Geneva, Switzerland Cloud federation CHEP 2015 Okinawa, Japan Prelude to Hybrid Clouds Marek Denis CERN Geneva, Switzerland Basic definitions OpenStack: An Open Source Cloud Managing System which allows implementors to: --

More information

Identity, Privacy, and Data Protection in the Cloud XACML. David Brossard Product Manager, Axiomatics

Identity, Privacy, and Data Protection in the Cloud XACML. David Brossard Product Manager, Axiomatics Identity, Privacy, and Data Protection in the Cloud XACML David Brossard Product Manager, Axiomatics 1 What you will learn The issue with authorization in the cloud Quick background on XACML 3 strategies

More information

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2 DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.

More information

Access Control Framework of Personal Cloud based on XACML

Access Control Framework of Personal Cloud based on XACML Access Control Framework of Personal Cloud based on XACML 1 Jun-Young Park, 2 Young-Rok Shin, 3 Kyoung-Hun Kim, 4 Eui-Nam Huh 1First Author, 2 Kyung Hee University, {parkhans, shinyr}@khu.ac.kr 3 Gangdong

More information

Authorization Strategies for Virtualized Environments in Grid Computing Systems

Authorization Strategies for Virtualized Environments in Grid Computing Systems Authorization Strategies for Virtualized Environments in Grid Computing Systems Xinming Ou Anna Squicciarini Sebastien Goasguen Elisa Bertino Purdue University Abstract The development of adequate security

More information

Defining Inter-Cloud Architecture for Interoperability and Integration

Defining Inter-Cloud Architecture for Interoperability and Integration Defining Inter-Cloud Architecture for Interoperability and Integration 1 Yuri Demchenko, 1 Canh Ngo, 1,2 Marc X. Makkes, 1,2 Rudolf Strijkers, 1 Cees de Laat 1 University of Amsterdam System and Network

More information

Provisioning and deprovisioning in an identity federation

Provisioning and deprovisioning in an identity federation Provisioning and deprovisioning in an identity federation Problem description and solution proposals 19.12.2008/Mikael.linden@csc.fi Contents 1. Description of the context... 2 2. Problem description...

More information

GEC4. Miami, Florida

GEC4. Miami, Florida GENI Security Architecture GEC4 Stephen Schwab, Alefiya Hussain Miami, Florida 1 Outline Overview of Security Architecture Draft Work in progress Observations About Candidate Technologies Considerations

More information

and Deployment Roadmap for Satellite Ground Systems

and Deployment Roadmap for Satellite Ground Systems A Cloud-Based Reference Model and Deployment Roadmap for Satellite Ground Systems 2012 Ground System Architectures Workshop February 29, 2012 Dr. Craig A. Lee The Aerospace Corporation The Aerospace Corporation

More information

Big Data Challenges for e-science Infrastructure

Big Data Challenges for e-science Infrastructure Big Challenges for e-science Infrastructure Yuri Demchenko, SNE Group, University of Amsterdam AAA-Study Project COINFO2012 Conference 24-25 November 2012, Nanjing, China 23-25 November 2012, Nanjing Big

More information

The GISELA Science Gateway

The GISELA Science Gateway The GISELA Science Gateway Roberto Barbera (roberto.barbera@ct.infn.it) University of Catania and INFN - Italy TICAL 2012 Lima, 3 July 2012 Introduction and driving considerations The Catania Science Gateway

More information

Scaling TeraGrid Access: A Testbed for Identity Management and Attribute-based Authorization

Scaling TeraGrid Access: A Testbed for Identity Management and Attribute-based Authorization TERAGRID 2007 CONFERENCE, MADISON, WI 1 Scaling TeraGrid Access: A Testbed for Identity Management and Attribute-based Authorization Von Welch, Ian Foster, Tom Scavo, Frank Siebenlist, Charlie Catlett,

More information

Agent-Based Cloud Broker Architecture for Distributed Access Control

Agent-Based Cloud Broker Architecture for Distributed Access Control Agent-Based Cloud Broker Architecture for Distributed Access Control Manoj V. Thomas 1, and Chandra Sekaran K. Department of Computer Science and Engineering. NITK, Surathkal, Mangalore 575 025, India.

More information

Electronic Health Network - Case Study Consent2Share Share with Confidence

Electronic Health Network - Case Study Consent2Share Share with Confidence Electronic Health Network - Case Study Consent2Share Share with Confidence Jan 2015 About Consent2Share Complying with privacy regulations in an electronic environment is a very complex process. The Consent2Share

More information

Running List: Collab Stuff Framework Services Appliance

Running List: Collab Stuff Framework Services Appliance Running List: Collab Stuff Framework Services Appliance Next Steps Appliance Next Steps Service Internet2 to put together a service instance in skunkworks, using previous code, Shib, Grouper, etc. Dutch

More information

Development and deployment of integrated attribute based access control for collaboration

Development and deployment of integrated attribute based access control for collaboration Development and deployment of integrated attribute based access control for collaboration Collaborations and Virtual Organizations IdM is a critical dimension of collaboration, crossing many applications

More information

Identity Management Challenges for Intercloud Applications

Identity Management Challenges for Intercloud Applications Identity Management Challenges for Intercloud Applications David Núñez 1, Isaac Agudo 1, Prokopios Drogkaris 2 and Stefanos Gritzalis 2 1 Department of Computer Science, E.T.S. de Ingeniería Informática,

More information

Big Security for Big Data: Addressing Security Challenges for the Big Data Infrastructure

Big Security for Big Data: Addressing Security Challenges for the Big Data Infrastructure Big Security for Big : Addressing Security Challenges for the Big Infrastructure Yuri Demchenko SNE Group, University of Amsterdam On behalf of Yuri Demchenko, Canh Ngo, Cees de Laat, Peter Membrey, Daniil

More information

SD Departmental Meeting November 28 th, 2006. Ale de Vries Product Manager ScienceDirect Elsevier

SD Departmental Meeting November 28 th, 2006. Ale de Vries Product Manager ScienceDirect Elsevier ש בולת SD Departmental Meeting November 28 th, 2006 Ale de Vries Product Manager ScienceDirect Elsevier Shi... whát? : Shibboleth ש בולת [...] "stream, torrent". It derives from a story in the Hebrew Bible,

More information

Network Identity Management Concepts and Standards: The Key Role of Middleware

Network Identity Management Concepts and Standards: The Key Role of Middleware Network Identity Management Concepts and Standards: The Key Role of Middleware Keith Hazelton, University of Wisconsin IT Architect Internet2 Middleware Architecture Committee for Education hazelton@doit.wisc.edu

More information

Delegation for On-boarding Federation Across Storage Clouds

Delegation for On-boarding Federation Across Storage Clouds Delegation for On-boarding Federation Across Storage Clouds Elliot K. Kolodner 1, Alexandra Shulman-Peleg 1, Gil Vernik 1, Ciro Formisano 2, and Massimo Villari 3 1 IBM Haifa Research Lab, Israel 2 Engineering

More information

Defining Generic Architecture. Cloud Infrastructure as a Service (IaaS) Provisioning Model. for

Defining Generic Architecture. Cloud Infrastructure as a Service (IaaS) Provisioning Model. for Defining Generic Architecture for Cloud Infrastructure as a Service (IaaS) Provisioning Model Yuri Demchenko, Cees de Laat SNE Group, University of Amsterdam ISGC2011 Conference 22-25 March 2011, Taipei

More information

Using the VOM portal to manage policy within Globus Toolkit, Community Authorisation Service & ICENI resources

Using the VOM portal to manage policy within Globus Toolkit, Community Authorisation Service & ICENI resources Using the VOM portal to manage policy within Globus Toolkit, Community Authorisation Service & ICENI resources Asif Saleem Marko Krznarić Jeremy Cohen Steven Newhouse John Darlington London e-science Centre,

More information

GAARDS. Stephen Langella Stephen.Langella@osumc.edu. Globus World 2010 http://www.cagrid.org. Ekagra

GAARDS. Stephen Langella Stephen.Langella@osumc.edu. Globus World 2010 http://www.cagrid.org. Ekagra GAARDS Stephen Langella Stephen.Langella@osumc.edu Globus World 2010 http://www.cagrid.org Outline GAARDS Overview Deployment Overview Ongoing and Future Work Overview of GAARDS Provides an enterprise

More information

Grid Security : Authentication and Authorization

Grid Security : Authentication and Authorization Grid Security : Authentication and Authorization IFIP Workshop 2/7/05 Jong Kim Dept. of Computer Sci. and Eng. Pohang Univ. of Sci. and Tech. (POSTECH) Contents Grid Security Grid Security Challenges Grid

More information

S P I E Information Environments Shibboleth and Its Integration into Security Architectures. EDUCAUSE & Internet 2 Security Professionals Conference

S P I E Information Environments Shibboleth and Its Integration into Security Architectures. EDUCAUSE & Internet 2 Security Professionals Conference Shibboleth and Its Integration into Security Architectures Christian Fernau, Francisco Pinto University of Oxford EDUCAUSE & Internet 2 Security Professionals Conference Denver, CO 10-12 April 2006 16:47:29

More information

JISC. Technical Review of Using Cloud for Research. Guidance Notes to Cloud Infrastructure Service Providers. Introduction

JISC. Technical Review of Using Cloud for Research. Guidance Notes to Cloud Infrastructure Service Providers. Introduction JISC Technical Review of Using Cloud for Research Guidance Notes to Cloud Infrastructure Service Providers May, 2010 Introduction Provisioning and maintenance of research computing facilities is a core

More information

D. Regvart (CARNET), Y. Demchenko (UvA), S. Filiposka (UKiM), M. de Vos (SURFnet), T. Karaliotas (GRNET), K. Baumann (SWITCH), D.

D. Regvart (CARNET), Y. Demchenko (UvA), S. Filiposka (UKiM), M. de Vos (SURFnet), T. Karaliotas (GRNET), K. Baumann (SWITCH), D. 31-03-2014 Network Architectures for Cloud Services Milestone MS101 (MJ1.2.1) Contractual Date: 31-03-2014 Actual Date: 31-03-2014 Grant Agreement No.: 605243 Work Package/Activity: 12/JRA1 Task Item:

More information

Entitlements Access Management for Software Developers

Entitlements Access Management for Software Developers Entitlements Access Management for Software Developers Market Environment The use of fine grained entitlements and obligations control for access to sensitive information and services in software applications

More information

Access Control Infrastructure for On-Demand Provisioned Virtualised Infrastructure Services

Access Control Infrastructure for On-Demand Provisioned Virtualised Infrastructure Services Access Control Infrastructure for On-Demand Provisioned Virtualised Infrastructure Services Yuri Demchenko University of Amsterdam y.demchenko@uva.nl Canh Ngo University of Amsterdam T.C.Ngo@uva.nl Cees

More information

Biometric Single Sign-on using SAML

Biometric Single Sign-on using SAML Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP Ramesh.Nagappan@sun.com 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On

More information

Federated Authentication and Credential Translation in the EUDAT Collaborative Data Infrastructure

Federated Authentication and Credential Translation in the EUDAT Collaborative Data Infrastructure Federated Authentication and Credential Translation in the EUDAT Collaborative Data Infrastructure Ahmed Shiraz Memon (JSC - DE) Jens Jensen (STFC escience - UK) Ales Cernivec (XLAB - SL) Krzysztof Benedyczak

More information

Overview NIST Big Data Working Group Activities

Overview NIST Big Data Working Group Activities Overview NIST Big Working Group Activities and Big Architecture Framework (BDAF) by UvA Yuri Demchenko SNE Group, University of Amsterdam Big Analytics Interest Group 17 September 2013, 2nd RDA Plenary

More information

AEIJST - June 2015 - Vol 3 - Issue 6 ISSN - 2348-6732. Cloud Broker. * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha

AEIJST - June 2015 - Vol 3 - Issue 6 ISSN - 2348-6732. Cloud Broker. * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha Abstract Cloud Broker * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha Dept of ISE, The National Institute of Engineering, Mysore, India Cloud computing is kinetically evolving areas which

More information

TF-AACE. Deliverable B.2. Deliverable B2 - The Authentication Component =============================================

TF-AACE. Deliverable B.2. Deliverable B2 - The Authentication Component ============================================= TF-AACE Deliverable B.2 Define the components and protocols to guarantee a harmonized operation of A&A systems Deliverable B2 - The Authentication Component =============================================

More information

Secure Identity in Cloud Computing

Secure Identity in Cloud Computing Secure Identity in Cloud Computing Michelle Carter The Aerospace Corporation March 20, 2013 The Aerospace Corporation 2013 All trademarks, service marks, and trade names are the property of their respective

More information

Federated Identity Management

Federated Identity Management Federated Identity Management SWITCHaai Introduction Course Bern, 1. March 2013 Thomas Lenggenhager aai@switch.ch Overview What is Federated Identity Management? What is a Federation? The SWITCHaai Federation

More information

Defining the Big Data Architecture Framework (BDAF)

Defining the Big Data Architecture Framework (BDAF) Defining the Big Architecture Framework (BDAF) Outcome of the Brainstorming Session at the University of Amsterdam Yuri Demchenko (facilitator, reporter), SNE Group, University of Amsterdam 17 July 2013,

More information

Service-Oriented Architecture and Software Engineering

Service-Oriented Architecture and Software Engineering -Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based

More information

Protect Everything: Networks, Applications and Cloud Services

Protect Everything: Networks, Applications and Cloud Services Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active

More information

Разработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet

Разработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet Разработка программного обеспечения промежуточного слоя TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet Contents - SURFnet Middleware Services department: - eduroam, SURFfederatie,

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

Creating a Strong Security Infrastructure for Exposing JBoss Services

Creating a Strong Security Infrastructure for Exposing JBoss Services Creating a Strong Security Infrastructure for Exposing JBoss Services JBoss Enterprise SOA Platform Service Clients Service Gateway Enterprise Services Blake Dournaee, Product Management, Intel SOA Products

More information

Issues in federated identity management

Issues in federated identity management Issues in federated identity management Sandy Shaw EDINA IASSIST 24-27 May 2005, Edinburgh 1 Contents Federated identity management overview Open issues for federations 2 Introduction Federated identity

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Defining Generic Architecture for Cloud Infrastructure as a Service (IaaS) Provisioning Model

Defining Generic Architecture for Cloud Infrastructure as a Service (IaaS) Provisioning Model Defining Generic Architecture for Cloud Infrastructure as a Service (IaaS) Provisioning Model Yuri Demchenko SNE Group, University of Amsterdam ISOD BoF at TNC2011 16 May 2011, Prague ISOD BoF @ TNC2011

More information

3Si Managed Authentication Services Service Description

3Si Managed Authentication Services Service Description 3Si Managed Authentication Services Service Description [Pick the date] 3Si Managed Authentication Services Service Description [Type the document subtitle] JT www.3sicloud.com www.3sicloud.com enquiry@3sicloud.com

More information

UK Access Management Federation For Education and Research Operator

UK Access Management Federation For Education and Research Operator UK Access Management Federation for Education and Research Federation Operator Procedures 1 st August 2011 Version 2.1 ST/AAI/UKF/DOC/005 Contents 1 Introduction 3 2 Membership application processing 3

More information

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter

More information

PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY

PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY Shane Weeden IBM Session ID: CLD-W01 Session Classification: Advanced Agenda Cloud security

More information

Control Framework for e Science Data Infrastructure. Hui Zhang, Wenjun Wu, ZhenAn Li

Control Framework for e Science Data Infrastructure. Hui Zhang, Wenjun Wu, ZhenAn Li Open Social based Group Access Control Framework for e Science Data Infrastructure Hui Zhang, Wenjun Wu, ZhenAn Li Bih Beihang University, it Biji Beijing China Outline Access Control Framework for e Science

More information

Security Framework for Virtualised Infrastructure Services Provisioned On-demand

Security Framework for Virtualised Infrastructure Services Provisioned On-demand 2011 Third IEEE International Conference on Coud Computing Technology and Science Security Framework for Virtualised Infrastructure Services Provisioned On-demand Canh Ngo 1, Peter Membrey 2, Yuri Demchenko

More information

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Author: Creation Date: Last Updated: Version: I. Bailey May 28, 2008 March 23, 2009 0.7 Reviewed By Name Organization

More information

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015 Identity & Management The Cloud Perspective Andrea Themistou 08 October 2015 Agenda Cloud Adoption Benefits & Risks Security Evolution for Cloud Adoption Securing Cloud Applications with IAM Securing Cloud

More information

SharePoint 2013 Business Connectivity Services Hybrid Overview

SharePoint 2013 Business Connectivity Services Hybrid Overview SharePoint 2013 Business Connectivity Services Hybrid Overview Christopher J Fox Microsoft Corporation November 2012 Applies to: SharePoint 2013, SharePoint Online Summary: A hybrid SharePoint environment

More information

Oracle Access Manager. An Oracle White Paper

Oracle Access Manager. An Oracle White Paper Oracle Access Manager An Oracle White Paper NOTE: The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any

More information

Usage Control in Cloud Systems

Usage Control in Cloud Systems Usage Control in Cloud Systems Paolo Mori Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche Pisa Italy Agenda Examples of usage of Cloud services Usage Control Model Policy Language

More information

DAMe Deploying Authorization Mechanisms for Federated Services in the eduroam Architecture

DAMe Deploying Authorization Mechanisms for Federated Services in the eduroam Architecture DAMe Deploying Authorization Mechanisms for Federated Services in the eduroam Architecture Sascha Neinert Marseille, 06.02.2008, Sascha Neinert, 06.02.2008 Seite 1 Overview Project Goals Partners Network

More information

Federated Identity & Access Mgmt for Higher Education

Federated Identity & Access Mgmt for Higher Education Federated Identity & Access Mgmt for Higher Education Dr. Erik Vullings Program Manager Macquarie University s s E-Learning E Centre of Excellence (MELCOE) Erik.Vullings@melcoe.mq.edu.au 1/23/2006 1 Backing

More information

Axway API Gateway. Version 7.4.1

Axway API Gateway. Version 7.4.1 O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1

More information

Novell Cloud Security Service Reducing Risk by Securing the Cloud. Stefan Stiehl Senior Sales Technology Specialist sstiehl@novell.

Novell Cloud Security Service Reducing Risk by Securing the Cloud. Stefan Stiehl Senior Sales Technology Specialist sstiehl@novell. Novell Cloud Security Service Reducing Risk by Securing the Cloud Stefan Stiehl Senior Sales Technology Specialist sstiehl@novell.com Disclaimer for Product in Development Unpublished Work of Novell, Inc.

More information

Federation Proxy for Cross Domain Identity Federation

Federation Proxy for Cross Domain Identity Federation Proxy for Cross Domain Identity Makoto Hatakeyama NEC Corporation, Common Platform Software Res. Lab. 1753, Shimonumabe, Nakahara-Ku, Kawasaki, Kanagawa 211-8666, Japan +81-44-431-7663 m-hatake@ax.jp.nec.com

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth

Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth Marcos A. P. Leandro, Tiago J. Nascimento, Daniel R. dos Santos, Carla M. Westphall, Carlos B. Westphall

More information

EMI views on Cloud Computing

EMI views on Cloud Computing EMI views on Cloud Computing Florido Paganelli Lund University NorduGrid 2011, May 10th, Sundvolden, Norway Florido Paganelli (Lund University) EMI views on Cloud Computing NorduGrid2011 1 / 25 Outline

More information

UNI. UNIfied identity management. Krzysztof Benedyczak ICM, Warsaw University

UNI. UNIfied identity management. Krzysztof Benedyczak ICM, Warsaw University UNI TY UNIfied identity management Krzysztof Benedyczak ICM, Warsaw University Outline The idea Local database Groups, Entities, Identities and Attributes UNITY Authorization Local authentication Credentials

More information

Contents. 1010 Huntcliff, Suite 1350, Atlanta, Georgia, 30350, USA http://www.nevatech.com

Contents. 1010 Huntcliff, Suite 1350, Atlanta, Georgia, 30350, USA http://www.nevatech.com Sentinet Overview Contents Overview... 3 Architecture... 3 Technology Stack... 4 Features Summary... 6 Repository... 6 Runtime Management... 6 Services Virtualization and Mediation... 9 Communication and

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

Concepts and Architecture of the Grid. Summary of Grid 2, Chapter 4

Concepts and Architecture of the Grid. Summary of Grid 2, Chapter 4 Concepts and Architecture of the Grid Summary of Grid 2, Chapter 4 Concepts of Grid Mantra: Coordinated resource sharing and problem solving in dynamic, multi-institutional virtual organizations Allows

More information

Guideline on Implementing Cloud Identity and Access Management

Guideline on Implementing Cloud Identity and Access Management CMSGu2013-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Implementing Cloud Identity and Access Management National

More information

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,

More information

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart sascha.neinert@rus.uni-stuttgart.de

More information