26
Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

Embed Size (px)

Citation preview

Page 1: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

Weaving a Trust Fabric:Shibboleth & PKI & Grids

Keith Hazelton, Copyright 2003

University of Wisconsin-Madison Senior IT ArchitectInternet2 MACE member

Page 2: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 2

Copyright Keith Hazelton 2003. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Page 3: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 3

Two (loosely) Connected Presentations

• I. Shibboleth (with AuthN shim) as “WebISO plus”

• II. Weaving a trust fabric– Trust agreements & architectures– …or when that gets too confusing, reframe as– Risk management agreements & architectures

Page 4: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 4

I. Shib (with AuthN shim) as WebISO plus

• UW-Madison’s AuthN/Z Roadmap (Yours, too?)– Roll out an AuthN service for campus (web) app

developers & integrators– Roll out an Authority Information (AuthZInfo)

Management service for campus • managing biz-rule based group, affiliation & entitlement

assignments• Pops, Affils & Service Entitlements (PASE) Project

– Roll out a service for delivering AuthZInfo to apps– Decide whether to take the big step of tackling a run-

time AuthZ decision support service for campus

Page 5: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 5

UW-Madison AuthN/Z Roadmap

• Got as far as piloting PubCookie as AuthN service

• Along came Shibboleth• …And local interest in PKI heated up with

HIPAA• So, we’re now looking at a roadmap with two

routes• And we’ll be comparing the alternative routes

and making a choice

Page 6: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 6

The AuthN/Z Roadmap Alternative Routes• The low road

– AuthN service: PubCookie– AuthZInfo service: metadir functions + PASE– AuthZInfoAccess service: LDAP or SQL calls to ED

• The high road– AuthN service: Shibboleth SHIRE &

HandleServer-plus-AuthN-shim– AuthZInfo service: metadir functions + PASE– AuthZInfoAccess: Shibboleth (SHAR & AA)

• The routes join again at the future decision point on AuthZ service for PDP

Page 7: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 7

The High Road

• Shibboleth Plus: Promise of a unified infrastructure for intra- as well as inter-domain AuthN/Z

• Note: Shib as delivered assumes an existing WebISO

Page 8: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 8

The High Road

• But in a pure Shib world– the only web thing that needs an authentication step

is the Handle Server (HS) (!!!)– all target web apps leverage that single

authentication step

• So what’s the simplest AuthN shim for the HS?• (Traditional WebISO solutions would have lots

of redundant moving parts)

Page 9: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 9

The High Road

• Well, getting techie, HS runs as an Apache app• How do we protect Apache apps?• URL/directory based authN schemes• Use Apache config file fiddling to specify how• Shib 0.8 as shipped has way to do this with PKI

– Apache Asks for client SSL authentication via apache-ssl or mod_ssl

– Right environment variables get populated, presto!

Page 10: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 10

The High Road: Shib & PKI

• U California System developed PKI support code (David Walker)

• Adopted & adapted by UT-HSC Houston (Barry Ribbeck & Mark Jones)

• ..and by Dartmouth (Bob Brentrup, Omen Wild & Mark Franklin)

Page 11: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 11

The High Road: Shib & PKI

• Calif, Texas & Dartmouth pushing PKI, so happy to “force” its use for selected apps

• Meanwhile, Wisconsin not there yet• We’re pushing AuthN/Z service idea generally

– For us, PKI is NYRFPT (not prime-time ready)

• So, back to the drawing board• What if we could try for PKI as above, but fail

over to LDAP-supported un/pw AuthN over SSL

Page 12: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 12

The High Road: Shib & PKI

• More generally: Protect the HS app the Apache way with PKI, failover to {your favorite AuthN service here}

• So, coordinating with above named culprits, Ryan Muldoon at wisc.edu is developing an Apache module-based approach

• Apache config allows you to specify a list of AuthN methods in order of preference

Page 13: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 13

The High Road: Shib HS & AuthN Shim

• Apache security directives in config allow you to specify a list of AuthN methods in order of preference, So…

• Try PKI via above approach• Second on the list is a module that does your

favorite AuthN trick & populates env. vars. Like REMOTE_USER

• Ryan’s got one working at wisc.edu for un/pw with LDAP…intermittently (uses mod_perl)

Page 14: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 14

The High Road: Shib HS & AuthN Shim

• Kerberos shops could write a module for Kerberos AuthN, etc.

• Allows transparent…– migration to, or – experimentation with or – selective rollout…

• …of PKI behind Shib HS for a general web app AuthN solution

Page 15: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 15

The Journey Completed

• To extent we Shibbify our target resources, this takes us all the way to the roadmap junction with the runtime AuthZ service decision point

• We’ve authenticated by choice of methods (which can be passed along to targets)

• We’ve given targets controlled access to user attributes

• With all the knobs for privacy & anonymity we might want

Page 16: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 16

II. Weaving a Trust Fabric

Page 17: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 17

Weaving a Trust Fabric• How do typical conversations about risks to

IT resources go?– Alice: Please let my people use X– Bob: Sure, but how can I know over the ‘net that

person Y really is one of your people?– Alice: Well, I’ll give them this nifty identity

credential to present to you– Bob: But from what I know of your policies and

procedures, I am not at all sure if I want to trust that credential for accessing my extremely valuable X. Guess I’ll just give them all accounts….

Page 18: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 18

Weaving a Trust Fabric• Does this scale with all the conversations

between all the Alices & all the Bobs about all the X’s?

• So what we really want is agreement on some coarse grained, graduated scale of risk/(trust) (e.g., low, medium, high)

• And agreed-upon mappings between – an identity credential and this quantized risk/(trust)

measure– a resource and this quantized risk/(trust) measure

Page 19: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 19

Weaving a Trust Fabric• So then Alice says my people have “medium”

level identity credentials• And Bob says, for my valuable X resource, I

really want a “high” level credential (so he just gives them each a user account on his X system)

• This scales the risk/(trust) measure• How do we scale the Alice / Bob problem?• …federations or communities as the

agreeing parties

Page 20: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 20

Federations as Agreeing Parties

Page 21: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 21

The Trust Diagram

• In the PKI world, a Registration Authority (RA) handles – Initial identity proofing– Issuing of identity credential (X.509 certificate)– …with level of assurance (risk measure) included

• Reframe our PhotoID offices and account creation services as RAs

• Then federation partners have potential basis of agreement on risk measure

Page 22: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 22

The Trust Diagram

• In the PKI world, the CA’s CP & CPS– Explain policies & procedures around identity proofing,

protection of CA systems, etc.– On that basis different CAs can agree to map their

respective risk measures (your “green” is my “medium”)

• For GOF un/pw world, we could create CP & CPS-like things to facilitate mapping

• REALITY CHECK TIME:– How have we assessed risk in our GOF un/pw worlds???– Is all this pushing too hard on the security end of the security

convenience balance?

Page 23: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 23

Finding the Balance on Security vs. Convenience

• Big win for members of federation if we could use the scaling benefits of agreed-upon mappings of identity credentials to risk and resources to acceptable risk

• So, maybe its worth the CP/CPS-like work if we want to leverage & interoperate across– GOF un/pw– PKI certs– Grid® certs…

Page 24: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 24

Trust Weavers’ Guild

• Maximum benefit if we could map as equivalent– Campus GOF un/pw– PKI Lite certs– Grid CA issued identity certs– Federal AuthN Citizen & Commerce Class Cert (C4)– Some (probably lower assurance level of Fed Bridge

community certificates)– InCommon resource providers levels of acceptable

risk/(trust)

Page 25: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 25

Trust Weavers’ Guild

• Many, many ratholes & gotchas along the way• But even a patchy fabric with some holes would

be a welcome improvement over present state of affairs

Page 26: Weaving a Trust Fabric: Shibboleth & PKI & Grids Keith Hazelton, Copyright 2003 University of Wisconsin-Madison Senior IT Architect Internet2 MACE member

CAMP - June 4-6, 2003 26

Weaving a Trust Fabric Q & A

• Do you expect to confront these issues in the next year or two? Where?

• What’s your biggest point of skepticism on all this trust/risk stuff?