LIGO Authentication and Authorization 2.0



Similar documents
Identity and Access Management for LIGO: International Challenges

LIGO Mailing List Group Configuration

LIGO Cybersecurity Status

Cloud Computing. Lecture 5 Grid Case Studies

External and Federated Identities on the Web

SSO Questions. Request for 10 minute overview/demo on Grouper software package set-up (IT-oriented)

Enabling LIGO Applications on Scientific Grids

CAC AND KERBEROS FROM VISION TO REALITY

Authorization Strategies for Virtualized Environments in Grid Computing Systems

IGI Portal architecture and interaction with a CA- online

Authentication Methods

Single sign-on websites with Apache httpd: Integrating with Active Directory for authentication and authorization

Using the MyProxy Online Credential Repository

LinuxCon North America

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Development and deployment of integrated attribute based access control for collaboration

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft

Mac OS X Directory Services

Kerberos and Single Sign On with HTTP

XSEDE Service Provider Software and Services Baseline. September 24, 2015 Version 1.2

CA Performance Center

Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015

Cross-Realm Trust Interoperability, MIT Kerberos and AD

globus online Integrating with Globus Online Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory

VMware Identity Manager Administration

Linux VPS with cpanel. Getting Started Guide

TIBCO Spotfire Platform IT Brief

THE CCLRC DATA PORTAL

Leverage Active Directory with Kerberos to Eliminate HTTP Password

18.2 user guide No Magic, Inc. 2015

Okta Identity Management for Portals Built on Salesforce.com. An Architecture Review. Okta Inc. 301 Brannan Street San Francisco, CA 94107

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Configuring User Identification via Active Directory

Web app AAI Integration How to integrate web applications with AAI in general?

Q&A Session for Understanding Atrium SSO Date: Thursday, February 14, 2013, 8:00am Pacific

SSO Plugin. Release notes. J System Solutions. Version 3.6

Middleware integration in the Sympa mailing list software. Olivier Salaün - CRU

BMC Software Webinars 2013 Atrium Single Sign On (Atrium SSO)

MIGRATING DESKTOP AND ROAMING ACCESS. Migrating Desktop and Roaming Access Whitepaper

Big Data Operations Guide for Cloudera Manager v5.x Hadoop

External Identity and Authentication Providers For Apache HTTP Server

Overview. Edvantage Security

SMART Vantage. Installation guide

Integration with Active Directory. Jeremy Allison Samba Team

Smart Card Authentication. Administrator's Guide

Managed Servers ASA Extract FY14

Shibboleth Identity Provider (IdP) Sebastian Rieger

The GENIUS Grid Portal

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Drupal

Red Hat Enterprise ipa

CERN Single Sign On solution

Setup Guide Access Manager 3.2 SP3

NETWRIX IDENTITY MANAGEMENT SUITE

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies

Web Hosting. Hosting. Cloud File Hosting. The Genio Group (214)

SUSE Manager 1.2.x ADS Authentication

How Reflection Software Facilitates PCI DSS Compliance

Google Apps and Open Directory. Randy Saeks

StreamServe Persuasion SP5 Control Center

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Office 365 deployment checklists

Authentication Integration

Identity Management. Manager, Identity Management. Academic Technology Services. Michigan State University Board of Trustees

CS 356 Lecture 28 Internet Authentication. Spring 2013

MySQL Enterprise Monitor

Oracle Mobile Security Suite Workshop. Installation

Use of UniDesk Code of Practice

User-ID Best Practices

The Lattice Project: A Multi-Model Grid Computing System. Center for Bioinformatics and Computational Biology University of Maryland

Single Sign-On for the UQ Web

MDSplus Automated Build and Distribution System

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

APIS CARM NG Quick Start Guide for MS Windows

Red Hat Enterprise Identity (IPA) Centralized Management of Identities & Authentication

Roberto Barbera. Centralized bookkeeping and monitoring in ALICE

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management

Transcription:

LIGO Authentication and Authorization 2.0 CILogon Fall 2009 Workshop Urbana, IL Sep 29, 2009 Scott Koranda & Warren Anderson University of Wisconsin Milwaukee LIGO G0900910

Who we are LIGO Laboratory» CIT, MIT, LIGO detector sites in Hanford, WA and Livingston, LA» ~ 250 people LIGO Scientific Collaboration» 47+ institutions, groups, or organizations» Intersects with the LIGO Laboratory» Some organizations have subgroups GEO project is German/English collaboration with subgroups» ~ 660 people Virgo collaborators» Sister project» Some use LIGO computing resources» ~ 224 given LIGO.ORG Kerberos principal External collaborators» Radio astronomers, numerical relativists, neutrino scientists,...» Just beginning to need to solve authorization issues LIGO G0900910 2

Where We Were How to not scale in thousands of easy steps Systems evolved rather than being planned Coordination minimal or non existant between services/sites/admins Membership in LIGO Scientific Collaboration not tracked Independent management of services and users:» Works OK for ~100 users on ~10 services» Does not scale to ~1000 users on ~100 services LIGO G0900910 3

Where We Were The Mess We Made on the Web Web servers stood up by individuals and groups with private data» Each admin/scientist/application uses their own AuthN/Z scheme» Each admin administers AuthN/Z info independently of others» Usernames/passwords not coordinated between sites ~ 10 wiki like applications with many instances each, including homespun ilog» Each has an internal accounting system which is not shared ~ 3 problem tracking systems with many instances each Shared well known password used by all scientists for many sites» Found written down on whiteboards» Distributed in open emails» Posted on unprotected web pages by accident LIGO G0900910 4

Where We Were The Mess We Made on the Grid/Shell LIGO Data Grid (LDG)» We use slightly modified VDT for client/server distribution» Users get X.509 certificates for authentication. Most use DOEGrids PI of group at each university/institute provides verbal verification for chain of trust, which sometimes takes weeks/months Cert request/retrieve/renew scripts have problems on some platforms Users make mistakes some make many mistakes in a row» Users request LDG account Successful account requests added into grid map file at each LDG site Grid map files maintained at each site independently by site admin No mechanism for removing/updating accounts automatically General computing and critical systems» Only at laboratory sites at LHO, LLO, CIT, MIT» Not coordinated between sites» Use shared accounts for some critical systems LIGO G0900910 5

Where We Are Going Requirements Easy for users» Single sign on across as many services as possible» Minimize user management of credentials Easy for admins» Centralized management of user accounts» Hardened protocols/tools, widely used and well integrated into clients» Automate as much maintenance as possible Easy for collaboration management» Centralized management of personnel» High availability network outages do not prevent work from happening at observatories or compute centers» Quick turn around users can be added or removed everywhere in minutes LIGO G0900910 6

Where We Are Going Pieces of the Puzzle my.ligo.org» user database (mysql) with PHP front end (in house development) to collect, manage and report personnel data LIGO.ORG Kerberos realm» Authentication service» One KDC per compute site for robustness LDAP» Stores account and authorization information (user attributes)» No secrets in the LDAP!» One LDAP per compute site Grouper (I2)» Create and manage groups for authorization, pushed to LDAP Sympa» Mailing list engine to notify users/admins/managers of pending actions draws mailing lists from groups in LDAP LIGO G0900910 7

Where We Are Going More Pieces of the Puzzle MyProxy (NCSA/Globus)» Exchange Kerberos ticket for short lived X.509 credential/proxy» Embedded certificate authority (LIGO CA most likely)» One MyProxy server per compute site for robustness Shibboleth (I2)» Authentication via Kerberos (IdP)» Authorization via LDAP (IdP)» Web single sign on GridShib (NCSA/Globus)?» Ideally we would leverage a tool like GridShib for authorization to LDG services» But no Java services on LDG!» More on this later... LIGO G0900910 8

Where We Are Going The puzzle LIGO G0900910 9

Where We Are Going A day in the life morning New member joins UWM LSC group» Fills out myligo application with her information» myligo notifies UWM group managers via Sympa» UWM group manager approves application Kerberos credential created for user by myligo LDAP entry added for user by myligo User added to LSC members group Grid map files get updated with user certificate DN» User downloads and executes ligo logon script User gets Kerberos ticket and short lived X.509/proxy» User opens browser and goes to portal site to find where instructions and pipeline for running a pulsar search reside Shibboleth IdP authenticates her Portal site SP authorizes her because she is in LIGO members group LIGO G0900910 10

Where We Are Going A day in the life afternoon User goes to pulsar pipeline page» Pulsar pipeline page SP checks if she is member of pulsar analysis group» She is not, so access is politely denied with instructions to mail pulsar analysis group managers Sympa list to ask for access User mails pulsar analysis group managers and asks» Pulsar group manager goes to Grouper page, searches for her in Grouper/LDAP, adds her to pulsar analysis group, and emails to inform her User goes to pulsar pipeline page again, gets access, downloads pulsar pipeline and reads instructions User runs pipeline, which uses short lived credential/proxy to launch job on CIT cluster User has gone from zero to hero in one day LIGO G0900910 11

Where We Are What have you done for me lately? my.ligo.org is deployed» Basic operations supported, development is ongoing Kerberos realm is operational» Static web pages» moin wikis, twikis, media wikis» online document control system» mod_auth_kerb used right now Git software repository» Anonymous read via git protocol» Write access tunneled through OpenSSH Kerberos (directly with ticket or via PAM) GSI enabled OpenSSH (grid mapfile managed by hand!) LIGO G0900910 12

Where We Are What have you done for me lately? LDAP is operational» Twiki mapping from Kerberos principal to TwikiName via LDAP» Twiki authorization is done directly using LDAP Grouper 1.4 deployed» Back end to myligo, maintains all group membership» Only basic collaboration memberships supported» Still need to support most working groups LIGO G0900910 13

Where We Are What have you done for me lately? Sympa deployed» No management interface supported yet, but in use for some groups» Group membership pulled from LDAP» Email addresses pulled from LDAP» LDAP group membership managed by Grouper Shibboleth, MyProxy, GridShib still on horizon» Shibboleth testbed operational» MyProxy thoroughly tested but not deployed» No work on GridShib so far (more later...) LIGO G0900910 14

Where We Are Project Arc Our project is following the usual arc we ve reached panel 7 Project Contributors: Stuart Anderson, Warren Anderson, Phil Ehrens, Sam Finn, Jonathan Hanks, Scott Koranda, Diego Menéndez,Tom Nash, Shannon Roddy, Abe Singer,Hannah Williams (CIT, LHO, LLO, PSU, UWM) LIGO G0900910 15

What we need: GSI OpenSSH A critical tool for LIGO» No substitute for logging into a cluster to debug» The Grid vision should not prevent... Adoption by major Linux distributions» CentOS 5.3 and Debian Lenny are LIGO reference OS» Go vote now!» If primary OpenSSH developers won't adopt patch, should pursue Linux porters and/or specific Linux distributions? Specific logging for GSI authorizations» Can this already be done with syslog( ng)? Attribute based authorization ala' GridShib» eg. only members of LIGO pulsar group can login» Note that OpenSSH is not coded in Java! LIGO G0900910 16

What we need: MyProxy Major functionality is all present and tested» Used primarily to deliver short lived credentials from embedded CA Attribute based authorization and policy would be nice» eg. scott.koranda@ligo.org can obtain a short lived credential with a 72 hour lifetime because he is member of group Communities:LVC:LSC:LSCAdminGroup Short lived credential refresh» Condor jobs that cache a short lived credential/proxy should be able to use it to refresh and obtain a new short lived credential/proxy» Not uncommon for some LIGO jobs to run for a week» Need to authenticate to publish results Can we cross the web grid boundary?» SPNEGO helps when going grid to web...» If user authenticates first to IdP can we deliver grid credential? LIGO G0900910 17

What we need: GridShib Support for services NOT coded in Java! LIGO needs support for C and Python» GSI enabled OpenSSH C» globus gridftp server C» Globus Replica Location Service (RLS) C» LIGO Data Replicator (LDR) Python under Apache httpd» LIGO Archival System (LARS) Python under Apache httpd» Gravitational wave candidate event database (GraCEDb) Python under Apache httpd Would like attribute based authorization via GridShib for all of these LIGO G0900910 18

What we need: all Regular and timely releases» Prefer not tied to large Globus Toolkit releases Support for native packaging» LIGO quickly moving to using only native packaging» RPM/Yum for CentOS and Debian packages Transparent testing» Prefer transparent nightly build tests on 64 bit CentOS 5.3 and Debian Lenny LIGO G0900910 19

What we offer Small but dedicated team with which to collaborate» Use LIGO/Condor and LIGO/Globus interactions as model» Bi weekly (Condor) or monthly (Globus/CDIGS) calls» Responsible (we hope!) bug reporting and testing We prefer to consume rather than build our own» We don't do not invented here for computing infrastructure» If we can get what we need externally we will leverage it Production environment» We have lots of data» We have lots of scientists that need to analyze the data» This is not a drill! LIGO G0900910 20