Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns
|
|
|
- Mary Miller
- 10 years ago
- Views:
Transcription
1 Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns Craig Lee, The Aerospace Corporation On behalf of Yuri Demchenko, Craig Lee, Canh Ngo, Cees de Laat Intercloud2014 Workshop 11 March 2014, Boston
2 Outline Background to this work Federation in Grid and s Inter Federation Framework (ICFF) and federation infrastructure patterns Federated Access Control and Federated Identity Management in clouds Additional information VO based federations in Grid (retrospective view) Intercloud2014 Federated Access Control Patterns Slide_2
3 Background to this work Federation BoF at OGF and follow on As the main motivation motivated work of current author team with wide consultation with Grid and community Research at the University of Amsterdam on developing of the Intercloud Architecture Framework (ICAF) Where the Intercloud Federation Framework is defined as a component for multi-provider infrastructure integration EGI (European Grid Initiative) Federated Task Force Building Federated model based on Grid VO based federation model Intercloud2014 Federated Access Control Patterns 3
4 Federation in Grid and s: Grid VO vs Virtual Infrastructure Grid federates resources and users by creating Virtual Organisations (VO) VO membership is maintained by assigning VO membership attributes to VO resources and members Resources remain under control of the resource owner organisation Grid Centers s remain members of their Home Organisations (HO) AuthN takes place at HO or Grid portal To access VO resources, VO members need to obtain VOMS certificate or VOMS credentials In clouds, both resources and user accounts are created/provisioned on-demand as virtualised components/entities accounts/identities can be provisioned together with access rights to virtual resources Intercloud2014 Federated Access Control Patterns 4
5 Federation: Actors and Roles Service Provider (CSP) Customer (organisational) Multitenancy is provided by virtualisation of cloud resources provided to all/multiple customers (end user) (Service) Broker Identity Provider (IDP) Carrier Service Operator Auditor Intercloud2014 Federated Access Control Patterns 5
6 Federation Scaling up and down Scalability is one of the main cloud feature To be considered in the context of hybrid cloud service model burst and outsourcing enterprise services to cloud services migration and replication between CSP Scaling up Identities provisioning Populating sessions context Scaling down Identity deprovisioning: Credentials revocation? Sessions invalidation vs restarting Initiated by provider and by user/customer Intercloud2014 Federated Access Control Patterns 6
7 Federation Models Identified models /customer side federation (1.1) Federating users/ho and CSP/cloud domains Customer doesn t have own IDP (IDP-HO) Provider s IDP is used (IDP-CSP) (1.2) Federating HO and CSP domains Customer has own IDP-HO1 It needs to federate with IDP-CSP, i.e. have ability to use HO identities at CSP services (1.3) Using 3rd party IDP for external users Example: Web server is run on cloud and external user are registered for services Provider (resources) side federation (2.1) Federating CSP s/multi-provider cloud resources Used to outsource and share resources between CSP Typical for community clouds Intercloud2014 Federated Access Control Patterns 7
8 Basic Federation model (1.1) Federating users/ho and CSP/cloud domains (no IDP-HO) HO1 Admin/Mngnt System Management (Ops&Sec) Provider A side Federation HO1.2 HO1.1 HO1.3 A1.2A1.1 A1.3 IDP-Xa Customer A1 (Running Service Xa) Customer Home Organisation (Infrastructure services) IDP-HO Federation relations CSP IDP/ Broker IDP-Xa is a virtualised service of the CSP IDP Simple/basic scenario 1: Federating Home Organisation (HO) and Service Provider (CSP) domains based services created for users from HO1 and managed by HO1 Admin/Management system Involved major actors and roles CSP Customer IDP/Broker accounts A1.1-3 are provisioned for each user 1-3 from HO with 2 options Individual accounts with new ID::pswd Mapped/federated accounts that allows SSO/login with user HO ID::pswd Federated accounts may use IDP/Broker (e.g. KeyStone) or those created for Service Xa TODO: Extend with AuthN/AutnZ service in Virtual Service Environment Intercloud2014 Federated Access Control Patterns 8
9 Basic Federation model (1.2) Federating HO and CSP domains (IDP-HO1 and IDP-CSP) HO1 Admin/Mngnt System Management (Ops&Sec) Provider A side Federation HO1.2 HO1.1 HO1.3 A1.2A1.1 A1.3 IDP-Xa Customer A1 (Running Service Xa) Customer Home Organisation (Infrastructure services) IDP-HO1 Federation relations CSP IDP/ Broker IDP-Xa can be implemented as instantiated service of the CSP IDP Simple/basic scenario 1: Federating Home Organisation (HO) and Service Provider (CSP) domains based services created for users from HO1 and managed by HO1 Admin/Management system Involved major actors and roles CSP Customer IDP/Broker accounts A1.1-3 are provisioned for each user 1-3 from HO with 2 options Individual accounts with new ID::pswd Mapped/federated accounts that allows SSO/login with user HO ID::pswd Federated accounts may use IDP/Broker (e.g. KeyStone) or those created for Service Xa TODO: Extend with AuthN/AutnZ service in Virtual Service Environment Intercloud2014 Federated Access Control Patterns 9
10 Basic Federation model (1.3) Using 3rd party IDP for external users Customer 1 Admin/Mngnt System Management (Ops&Sec) Provider A 2 side Federation 1 3 Direct or Dynamic link X Xa.2Xa.1 a.3 IDP-Xa Customer A1 (Running Service Xa) External s (Open Internet) Ext/3rdParty IDP-HO1 Federation relations CSP IDP/ Broker IDP-Xa can be implemented as instantiated service of the CSP IDP Simple/basic scenario 2: Federating Home Organisation (HO) and Service Provider (CSP) domains based services created for external users (e.g. website) and managed by Customer 1 Involved major actors and roles CSP Customer IDP/Broker accounts A1.1-3 are provisioned for each user 1-3 from HO with 2 options Individual accounts with new ID::pswd Mapped/federated accounts that allows SSO/login with user HO ID::pswd Federated accounts may use IDP/Broker (e.g. KeyStone) or those IDP-Xa created for Service Xa Intercloud2014 Federated Access Control Patterns 10
11 Basic Federation model Combined side federation (a) Enterprise Infrastructure (a) HO or (b) Custmr1 MgntSystem Management (Ops&Sec) Provider A 2 side Federation 1 Direct or Dynamic link X Xa.2Xa.1 a.3 IDP-Xa Customer A1 (Running Service Xa) (b) External s (Open Internet) 3 (a) IDP-HO1 (b) 3rd Party IDP Federation relations CSP IDP/ Broker IDP-Xa can be implemented as instantiated service of the CSP IDP Simple/basic scenario 2: Federating Home Organisation (HO) and Service Provider (CSP) domains based services created for external users (e.g. website) and managed by Customer 1 Involved major actors and roles CSP Customer IDP/Broker accounts A1.1-3 are provisioned for each user 1-3 from HO with 2 options Individual accounts with new ID::pswd Mapped/federated accounts that allows SSO/login with user HO ID::pswd Federated accounts may use IDP/Broker (e.g. KeyStone) or those IDP-Xa created for Service Xa Intercloud2014 Federated Access Control Patterns 11
12 Basic Federation model (2.1) Federating CSP s/multi-provider cloud resources HO1 Admin/Mngnt Provider A K2 Intercloud2014 Ak2 Kn1 Provider K HO1.2 HO1.1 HO1.3 A1.2A1.1 A1.3 Service Xa Ak1 IDP-K M2 Am1 M1 Provider M IDP-Xa IDP-HO1 side Infrastructure services IDP-M An1 CSP IDP-A Inter-provider federation for resources sharing Federation&Trust relations N2 N1 IDP-N Provider N Federated Access Control Patterns provider side federation for resources sharing Federation and Trust relations are established between CSP s via Identity management services, e.g. Identity Providers (IDP) May be bilateral or via 3rd party/broker service Includes translation or brokering Trust relations Namespaces Attributes semantics Policies Inter-provider federation is transparent to customers/users Provider side Federation 12
13 (a) Enterprise Infrastructure (a) HO or (b) Custmr1 MgntSystem 2 1 (b) External s (Open Internet) 3 (a) IDP-HO1 (b) 3rd Party IDP Federation Model - Combined Management (Ops&Sec) Provider A Ak2 Direct or Dynamic link Federation relations Service Xa Ak1 Xa.2Xa.1 Am1 Xa.3 IDP- Xa An1 CSP IDP-A Federation & Trust relations Instantiated IDP-A => IDP-Xa side federation Provider side federation Inter-provider federation for resources sharing K2 Kn1 Provider K IDP-K M2 M1 Provider M IDP-M N2 N1 IDP-N Provider N Intercloud2014 Federated Access Control Patterns 13
14 Basic AuthN and AuthZ services using Federated IDPs For additional Credentials validation IDP-Fed* IDP-Fed* IDP0 2 AuthN & Attrs methods: Push: Attrs obtained by Pull: Attrs fetched by AuthN Requester Identity Attrs Creds/Attrs Validation with Federated IDP* Creds/Attrs Validation with Home IDP0 AuthN ID Creds & Attrs AuthZ Attrs CVS AuthN Tok/Assert & ID Attrs PEP - Policy Enforcement Point PDP/ADF - Policy Decision Point IDP Identity Provider PAP - Policy Authority Point CtxHandler - Context Handler CVS Credentials Validation Service PDP PAP (Policy) Policy CtxHandler Collection and Validating AuthZ Attrs Policy Management PEP Resource Resource Attrs Intercloud2014 Federated Access Control Patterns 14
15 Basic AuthN and AuthZ services using Federated IDPs Federation/Trust domains Admin/Security Domain 0 ( HO) Federated IDPs IDP-Fed HO Identity Attrs Admin/Security Domain1 Service IDP-Fed* IDP0 Serv/Requester /Req Attrs ID Creds & Attrs Creds/Attrs Validation with Federated IDP-HO Creds/Attrs Validation with Home IDP0 AuthN CVS AuthN Token/Assert & ID Attrs AuthZ Attrs PDP CtxHandler PEP Resource Domain R PAP (Policy) Policy Collection and Validating AuthZ Attrs Policy Management Resource Resource Attrs Intercloud2014 Federated Access Control Patterns 15
16 Implementation: Intercloud Federation Infrastructure and Open exchange (OCX) OCX Services Federated Instance Customer A (University A) Cert Repo (TACAR) TTP Trusted Introducer FedIDP Broker Trust Broker Broker OCX and federated network infrastructure Trust Broker Service Broker Federated Instance Customer B (University B) Discovery (RepoSLA) Directory Directory (RepoSLA) GEANT Trans- European infrastructure Gateway Gateway Gateway Gateway AAA AAA AAA AAA (I/P/S)aaS Provider (I/P/S)aaS Provider (I/P/S)aaS Provider (I/P/S)aaS Provider IDP IDP IDP IDP Intercloud2014 Federated Access Control Patterns 16
17 Summary and Future work The proposed Intercloud Federation Framework is a part of the general Intercloud Architecture Framework and intends to provide a basis for further API and protocols definition It is based on wide discussion among OGF, EGI and cloud security community Currently the proposed approach and model are being implemented as a part of the GEANT infrastructure to support Intercloud services delivery to member universities Intercloud2014 Federated Access Control Patterns 17
18 Discussion and Questions Intercloud2014 Federated Access Control Patterns 18
19 Reference information and diagrams VO based Grid federation model AuthN and AuthZ services operation Intercloud2014 Federated Access Control Patterns 19
20 VO based Grid federation model Intercloud2014 Federated Access Control Patterns 20
21 VO2007: VO in Collaborative applications and Complex Resource Provisioning Two basic use cases considered Grid based Collaborative applications/environment (GCE) built using Grid middleware and integrated into existing Grid infrastructure Complex resource provisioning like Optical Lightpath provisioning (OLPP), or bandwidth-on-demand (BoD) VO based functionality (and requirements) to support dynamic security associations Dynamic Trust management Establishing dynamic trust management relations between VO members Attribute and metadata resolution and mapping VO-based access control service requires common VO-wide attributes that however can be mapped to the original ones Policy combination and aggregation To allow conflict resolution and policy harmonisation between VO members Flexible/distributed VO management infrastructure Intercloud2014 Federated Access Control Patterns Slide_21
22 VO2007: VO bridging inter-organisational barriers x1 Service xa VO users and services Service xd Service xe x2 Service xb x4 Virtual Organisation X x5 a1 a1 Service Bb A1 A2 Service Ab Barrier a1 Service Bc A3 Organisation A Service Aa Service Ac Organisation B Service Ba VO allows bridging inter-organisational barriers without changing local policies Requires VO Agreement and VO Security policy VO dynamics depends on implementation but all current implementations are rather static Intercloud2014 Federated Access Control Patterns Slide_22
23 Example VO Security services operation VO Context (VO ID/name) VO Mngnt Requestor Service xa (1b) (1a) Authentication Service (2) DB (3) Identity Provider Policy Authority (2a) Attribute Authority (4a) (4b) Resource Service xd (4) Authorisation Service Basic VOMS functionality in Grid s provide full resources and infrastructure services virtualisation Factory AuthN Directory VOMS* IP/STS Policy AttrA Trust Trust AuthZ Organisation A Trust Mngnt Virtual Organisation X LogAcc Factory AuthN Directory IP/STS Trust Policy AttrA Logging Accounting Trust AuthZ LogAcc Organisation B Intercloud2014 Federated Access Control Patterns Slide_23
24 VO2007: VOMS standard-de-facto for VO management VO Membership Service (VOMS) is a standard-de-facto for VO management and VO-based authorisation in Grid VO is represented as a complex, hierarchical structure with groups and subgroups Subgroup management may be delegated to different administrators Every user in a VO is characterised by the set of attributes Group/subgroup membership, roles and capabilities so-called 3- tuples Combination of all 3-tuples for the user is expressed as a Fully Qualified Attribute Name (FQAN) FQAN is included into VOMS X.509 Attribute Certificate (AC) VOMS infrastructure May contain multiple VOMS serves and synchronised VODB s Supports user calls for VOMS AC s and VOMS admin tasks VOM Registration is developed by Open Science Grid (OSG) project to support users self-registration Intercloud2014 Federated Access Control Patterns Slide_24
25 VO2007: Dynamic Security Associations Session establishes security context in the form of session key that can be a security token or simple UID bound to secure credential/context Session may associate/federate users, resources and actions/processes Job/workflow more long-lived association and may include few sessions May need to associate more distributed collection of users and resources for longer time required to deliver a final product or service Job and workflow may contain decision points that switch alternative flows/processes Security context may change during workflow execution or Job lifetime Job description may contain both user and resource lists and also provide security policy and trust anchor(s) (TA) Project or mission oriented cooperation established for longer time cooperation (involving people and resources) to conduct some activity This is actually the area of currently existing VO associations Inter-organisational association or federation established for longterm cooperation, may have a wide scope of cooperative areas This is the area of inter-university associations Shibboleth Attribute Authority Services (SAAS) is designed for this kind of federations Intercloud2014 Federated Access Control Patterns Slide_25
26 VO2007: Conceptual VO Operational Models -centric VO (VO-U) - manages user federation and provide attribute assertions on user (client) request Resource/Provider centric VO (VO-R) - supports provider federation and allows SSO/access control decision sharing between resource providers Agent centric VO (VO-A) - provides a context for interdomain agents operation, that process a request on behalf of the user and provide required trust context to interaction with the resource or service Project centric VO (VO-G) - combines centric and Provider centric features what actually corresponds to current VO use in Grid projects Intercloud2014 Federated Access Control Patterns Slide_26
27 VO2007: Conceptual VO Management Framework VO establishes own virtual administrative and security domains It may be separate or simply bridge VO-member domains VO management service should provide the following functionalities Registration and association of users and groups with the VO Management of user attributes (groups, roles, capabilities) Association of services with the VO Association of policies with the VO and its component services VO Registry service for wider VO implementation may be required VO naming should provide uniqueness for the VO names Intercloud2014 Federated Access Control Patterns Slide_27
28 VO2007: VO Security Services VO as a component of the Security infrastructure should provide the following security services Policy Authorities (e.g. GPBox) Trust management service (GridPMA) Identity Management Service (by HO) Attribute Authorities (VOMS) Authorization service (CAS) Authentication service Logging, Accounting Intercloud2014 Federated Access Control Patterns Slide_28
Using WS-Federation and WS-Security for Identity Management in Virtual Organisations
Using WS-Federation and WS-Security for Identity Management in Virtual Organisations Demchenko, Yu. , Universiteit van Amsterdam Abstracts The paper provides insight into one of key
Adding Federated Identity Management to OpenStack
Adding Federated Identity Management to OpenStack David Chadwick University of Kent 3 December 2012 University of Kent 1 Some Definitions What is Identity? A whole set of attributes that in combination
IGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
Defining Generic Architecture for Cloud Infrastructure as a Service Model
Defining Generic Architecture for Cloud Infrastructure as a Service Model Yuri Demchenko 1 University of Amsterdam Science Park 904, Amsterdam, The Netherlands E-mail: [email protected] Cees de Laat University
Open Cloud exchange (OCX)
Open Cloud exchange (OCX) Draft Proposal and Progress GN3plus JRA1 Task 2 - Network Architectures for Cloud Services Yuri Demchenko SNE Group, University of Amsterdam 10 October 2013, GN3plus Symposium,
Intercloud Architecture Framework for Heterogeneous Multi-Provider Cloud based Infrastructure Services Provisioning
Intercloud Architecture Framework for Heterogeneous Multi-Provider Cloud based Infrastructure Services Provisioning 1 Yuri Demchenko, 1,2 Marc X. Makkes, 1,2 Rudolf Strijkers, 1 Canh Ngo, 1 Cees de Laat
Title: Cloud Security, Access Control and Compliance
HPCS 2015 TUTORIAL IV Title: Cloud Security, Access Control and Compliance http://www.uazone.org/demch/presentations.html hpcs2015tutorial-cloud-security-access-control-compliance-v02.pdf Yuri Demchenko
ABFAB and OpenStack(in the Cloud)
ABFAB and OpenStack(in the Cloud) David W Chadwick University of Kent 1 Authentication in OpenStack Keystone User Trust Relationship Swift/Glance etc. 2 Federated Authnwith External IdPs External IdP User
DEFINING GENERIC ARCHITECTURE FOR CLOUD IAAS PROVISIONING MODEL
DEFINING GENERIC ARCHITECTURE FOR CLOUD IAAS PROVISIONING MODEL Yuri Demchenko, Cees de Laat System and Network Engineering Group, University of Amsterdam, Amsterdam, The Netherlands [email protected],
SAML:The Cross-Domain SSO Use Case
SAML:The Cross-Domain SSO Use Case Chris Ceppi Oblix Corporate Engineer Ed Kaminski OBLIX Federal Business Manager 410-349-1828 [email protected] Mike Blackin Principal Systems Engineer Oblix, Inc. 202-588-7397
Licia Florio Project Development Officer [email protected] www.terena.org Identity Federations in Europe
APAN Conference Honolulu, Hawaii 24 January 2008 Licia Florio Project Development Officer [email protected] www.terena.org Identity Federations in Europe Outline Networking Organisations in Europe Requirements
Globus Toolkit: Authentication and Credential Translation
Globus Toolkit: Authentication and Credential Translation JET Workshop, April 14, 2004 Frank Siebenlist [email protected] http://www.globus.org/ Copyright (c) 2002 University of Chicago and The University
Analisi di un servizio SRM: StoRM
27 November 2007 General Parallel File System (GPFS) The StoRM service Deployment configuration Authorization and ACLs Conclusions. Definition of terms Definition of terms 1/2 Distributed File System The
Consumption IT. Michael Shepherd Business Development Manager. Cisco Public Sector May 1 st 2014
Consumption IT Michael Shepherd Business Development Manager Cisco Public Sector May 1 st 2014 Short Bio Cloud BDM in Public Sector (SLED + FED) Cisco for 14 + years Focused on cloud for 4 + years Awareness,
Adding Federated Identity Management to Openstack
Adding Federated Identity Management to Openstack David Chadwick [email protected] 5 April 2014 Cloud Computing Security and Identity Workshop, NMOC 1 OpenStack Large open source project to develop
Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase
Authentication and Authorisation for Research and Collaboration Federations 101 An Introduction to Federated Identity Management Peter Gietz, Martin Haase AARC NA2 Task 2 - Outreach and Dissemination DAASI
Cloud federation. Prelude to Hybrid Clouds. CHEP 2015 Okinawa, Japan. Marek Denis CERN Geneva, Switzerland
Cloud federation CHEP 2015 Okinawa, Japan Prelude to Hybrid Clouds Marek Denis CERN Geneva, Switzerland Basic definitions OpenStack: An Open Source Cloud Managing System which allows implementors to: --
Identity, Privacy, and Data Protection in the Cloud XACML. David Brossard Product Manager, Axiomatics
Identity, Privacy, and Data Protection in the Cloud XACML David Brossard Product Manager, Axiomatics 1 What you will learn The issue with authorization in the cloud Quick background on XACML 3 strategies
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.
Access Control Framework of Personal Cloud based on XACML
Access Control Framework of Personal Cloud based on XACML 1 Jun-Young Park, 2 Young-Rok Shin, 3 Kyoung-Hun Kim, 4 Eui-Nam Huh 1First Author, 2 Kyung Hee University, {parkhans, shinyr}@khu.ac.kr 3 Gangdong
Authorization Strategies for Virtualized Environments in Grid Computing Systems
Authorization Strategies for Virtualized Environments in Grid Computing Systems Xinming Ou Anna Squicciarini Sebastien Goasguen Elisa Bertino Purdue University Abstract The development of adequate security
Defining Inter-Cloud Architecture for Interoperability and Integration
Defining Inter-Cloud Architecture for Interoperability and Integration 1 Yuri Demchenko, 1 Canh Ngo, 1,2 Marc X. Makkes, 1,2 Rudolf Strijkers, 1 Cees de Laat 1 University of Amsterdam System and Network
Provisioning and deprovisioning in an identity federation
Provisioning and deprovisioning in an identity federation Problem description and solution proposals 19.12.2008/[email protected] Contents 1. Description of the context... 2 2. Problem description...
and Deployment Roadmap for Satellite Ground Systems
A Cloud-Based Reference Model and Deployment Roadmap for Satellite Ground Systems 2012 Ground System Architectures Workshop February 29, 2012 Dr. Craig A. Lee The Aerospace Corporation The Aerospace Corporation
Agent-Based Cloud Broker Architecture for Distributed Access Control
Agent-Based Cloud Broker Architecture for Distributed Access Control Manoj V. Thomas 1, and Chandra Sekaran K. Department of Computer Science and Engineering. NITK, Surathkal, Mangalore 575 025, India.
Electronic Health Network - Case Study Consent2Share Share with Confidence
Electronic Health Network - Case Study Consent2Share Share with Confidence Jan 2015 About Consent2Share Complying with privacy regulations in an electronic environment is a very complex process. The Consent2Share
Development and deployment of integrated attribute based access control for collaboration
Development and deployment of integrated attribute based access control for collaboration Collaborations and Virtual Organizations IdM is a critical dimension of collaboration, crossing many applications
Big Security for Big Data: Addressing Security Challenges for the Big Data Infrastructure
Big Security for Big : Addressing Security Challenges for the Big Infrastructure Yuri Demchenko SNE Group, University of Amsterdam On behalf of Yuri Demchenko, Canh Ngo, Cees de Laat, Peter Membrey, Daniil
Defining Generic Architecture. Cloud Infrastructure as a Service (IaaS) Provisioning Model. for
Defining Generic Architecture for Cloud Infrastructure as a Service (IaaS) Provisioning Model Yuri Demchenko, Cees de Laat SNE Group, University of Amsterdam ISGC2011 Conference 22-25 March 2011, Taipei
Grid Security : Authentication and Authorization
Grid Security : Authentication and Authorization IFIP Workshop 2/7/05 Jong Kim Dept. of Computer Sci. and Eng. Pohang Univ. of Sci. and Tech. (POSTECH) Contents Grid Security Grid Security Challenges Grid
S P I E Information Environments Shibboleth and Its Integration into Security Architectures. EDUCAUSE & Internet 2 Security Professionals Conference
Shibboleth and Its Integration into Security Architectures Christian Fernau, Francisco Pinto University of Oxford EDUCAUSE & Internet 2 Security Professionals Conference Denver, CO 10-12 April 2006 16:47:29
JISC. Technical Review of Using Cloud for Research. Guidance Notes to Cloud Infrastructure Service Providers. Introduction
JISC Technical Review of Using Cloud for Research Guidance Notes to Cloud Infrastructure Service Providers May, 2010 Introduction Provisioning and maintenance of research computing facilities is a core
Entitlements Access Management for Software Developers
Entitlements Access Management for Software Developers Market Environment The use of fine grained entitlements and obligations control for access to sensitive information and services in software applications
Biometric Single Sign-on using SAML
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP [email protected] 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On
Federated Authentication and Credential Translation in the EUDAT Collaborative Data Infrastructure
Federated Authentication and Credential Translation in the EUDAT Collaborative Data Infrastructure Ahmed Shiraz Memon (JSC - DE) Jens Jensen (STFC escience - UK) Ales Cernivec (XLAB - SL) Krzysztof Benedyczak
Overview NIST Big Data Working Group Activities
Overview NIST Big Working Group Activities and Big Architecture Framework (BDAF) by UvA Yuri Demchenko SNE Group, University of Amsterdam Big Analytics Interest Group 17 September 2013, 2nd RDA Plenary
AEIJST - June 2015 - Vol 3 - Issue 6 ISSN - 2348-6732. Cloud Broker. * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha
Abstract Cloud Broker * Prasanna Kumar ** Shalini N M *** Sowmya R **** V Ashalatha Dept of ISE, The National Institute of Engineering, Mysore, India Cloud computing is kinetically evolving areas which
TF-AACE. Deliverable B.2. Deliverable B2 - The Authentication Component =============================================
TF-AACE Deliverable B.2 Define the components and protocols to guarantee a harmonized operation of A&A systems Deliverable B2 - The Authentication Component =============================================
Secure Identity in Cloud Computing
Secure Identity in Cloud Computing Michelle Carter The Aerospace Corporation March 20, 2013 The Aerospace Corporation 2013 All trademarks, service marks, and trade names are the property of their respective
Federated Identity Management
Federated Identity Management SWITCHaai Introduction Course Bern, 1. March 2013 Thomas Lenggenhager [email protected] Overview What is Federated Identity Management? What is a Federation? The SWITCHaai Federation
Defining the Big Data Architecture Framework (BDAF)
Defining the Big Architecture Framework (BDAF) Outcome of the Brainstorming Session at the University of Amsterdam Yuri Demchenko (facilitator, reporter), SNE Group, University of Amsterdam 17 July 2013,
Service-Oriented Architecture and Software Engineering
-Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based
Protect Everything: Networks, Applications and Cloud Services
Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active
Разработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet
Разработка программного обеспечения промежуточного слоя TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet Contents - SURFnet Middleware Services department: - eduroam, SURFfederatie,
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Creating a Strong Security Infrastructure for Exposing JBoss Services
Creating a Strong Security Infrastructure for Exposing JBoss Services JBoss Enterprise SOA Platform Service Clients Service Gateway Enterprise Services Blake Dournaee, Product Management, Intel SOA Products
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY Shane Weeden IBM Session ID: CLD-W01 Session Classification: Advanced Agenda Cloud security
IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation
IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Author: Creation Date: Last Updated: Version: I. Bailey May 28, 2008 March 23, 2009 0.7 Reviewed By Name Organization
Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015
Identity & Management The Cloud Perspective Andrea Themistou 08 October 2015 Agenda Cloud Adoption Benefits & Risks Security Evolution for Cloud Adoption Securing Cloud Applications with IAM Securing Cloud
SharePoint 2013 Business Connectivity Services Hybrid Overview
SharePoint 2013 Business Connectivity Services Hybrid Overview Christopher J Fox Microsoft Corporation November 2012 Applies to: SharePoint 2013, SharePoint Online Summary: A hybrid SharePoint environment
Oracle Access Manager. An Oracle White Paper
Oracle Access Manager An Oracle White Paper NOTE: The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any
Usage Control in Cloud Systems
Usage Control in Cloud Systems Paolo Mori Istituto di Informatica e Telematica Consiglio Nazionale delle Ricerche Pisa Italy Agenda Examples of usage of Cloud services Usage Control Model Policy Language
DAMe Deploying Authorization Mechanisms for Federated Services in the eduroam Architecture
DAMe Deploying Authorization Mechanisms for Federated Services in the eduroam Architecture Sascha Neinert Marseille, 06.02.2008, Sascha Neinert, 06.02.2008 Seite 1 Overview Project Goals Partners Network
Axway API Gateway. Version 7.4.1
O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1
Federation Proxy for Cross Domain Identity Federation
Proxy for Cross Domain Identity Makoto Hatakeyama NEC Corporation, Common Platform Software Res. Lab. 1753, Shimonumabe, Nakahara-Ku, Kawasaki, Kanagawa 211-8666, Japan +81-44-431-7663 [email protected]
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth
Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth Marcos A. P. Leandro, Tiago J. Nascimento, Daniel R. dos Santos, Carla M. Westphall, Carlos B. Westphall
EMI views on Cloud Computing
EMI views on Cloud Computing Florido Paganelli Lund University NorduGrid 2011, May 10th, Sundvolden, Norway Florido Paganelli (Lund University) EMI views on Cloud Computing NorduGrid2011 1 / 25 Outline
UNI. UNIfied identity management. Krzysztof Benedyczak ICM, Warsaw University
UNI TY UNIfied identity management Krzysztof Benedyczak ICM, Warsaw University Outline The idea Local database Groups, Entities, Identities and Attributes UNITY Authorization Local authentication Credentials
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
Concepts and Architecture of the Grid. Summary of Grid 2, Chapter 4
Concepts and Architecture of the Grid Summary of Grid 2, Chapter 4 Concepts of Grid Mantra: Coordinated resource sharing and problem solving in dynamic, multi-institutional virtual organizations Allows
Guideline on Implementing Cloud Identity and Access Management
CMSGu2013-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Implementing Cloud Identity and Access Management National
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart [email protected]
