42
What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Embed Size (px)

Citation preview

Page 1: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

What Lies Ahead:Grids, Shibboleth, PKI

Ken Klingenstein,Director, Internet2 Middleware Initiative

Copyright Ken Klingenstein 2003. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish

requires written permission from the author.

Page 2: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 2

Overview

• Grids – next generation distributed computing, data and instrumentation environments

• Shibboleth – inter-institutional web services and enriched middleware architecture

• PKI – encryption and authentication tools

Page 3: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 3

A Map of Middleware Land

Page 4: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 4

Grid Basics

• Complex software environments for the sharing of cycles, storage, remote instrumentation, etc.

• The more general the software, the more that is left to the reader…

Page 5: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 5

Facts about Grids

• There are many distributed computing and resources sharing environments besides Grids.

• Much big science and medicine will be based on Grids• Grids come in many flavors• Global Grid Forum attempts to coordinate flavors • Among the flavors, there is a predominant strain

– Developed out of ISI, Argone, etc by Kesselman, Foster, et al

– Current instantiation is Globus Toolkit 2.0 (part of NMI)

– Next generation is Open Grid Services Architecture (OGSA)

Page 6: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 6

More facts about Grids

• Grids are stand-alones, tending not to recognize firewalls, enterprise services, usability requirements, privacy, politics of resource sharing, etc.

• Two distinct types of Grids are emerging– Intragrids – users on the outside access an

internal grid that supplies cycles, storage, etc transparently

– Intergrids – a shared mesh of resources among autonomous enterprises

Page 7: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 7

Globus and OGSA

• John McGee – ISI

Page 8: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 8

Shibboleth

•A word which was made the criterion by which to distinguish the Ephraimites from the Gileadites. The Ephraimites, not being able to pronounce sh, called the word sibboleth. See --Judges xii.

•Hence, the criterion, test, or watchword of a party; a party cry or pet phrase.

• - Webster's Revised Unabridged Dictionary (1913):

Page 9: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 9

Stage 1 - Addressing Three Scenario’s

•Member of campus community accessing licensed resource–Anonymity required

•Member of a course accessing remotely controlled resource–Anonymity required

•Member of a workgroup accessing controlled resources–Controlled by unique identifiers (e.g. name)

•Taken individually, each of these situations can be solved in a variety of straightforward ways. •Taken together, they present the challenge of meeting the user's reasonable expectations for protection of their personal privacy.

Page 10: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 10

Attribute-based authorization

•There is a spectrum of approaches available for attribute-based management of access to controlled resources, • At one end is the attribute-based approach, where attributes are exchanged about a prospective user until the controlled resource has sufficient information to make a decision. This approach does not degrade privacy.• At the other end is the identity-based approach, where the identity of a prospective user is passed to the controlled resource and is used to determine (perhaps with requests for additional attributes about the user) whether to permit access. Since this leads with identity, this approach requires the user to trust the target to protect privacy.

Page 11: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 11

Rethinking Privacy

•Passive privacy - The current approach. •A user passes identity to the target, and then worries about the target’s privacy policy. To comply with privacy, targets have significant regulatory requirements. The user has no control, and no responsibility. And no one is happy...

•Active privacy - A new approach. •A user (through their security domain) can release the attributes to the target that are appropriate and necessary. If the attributes are personally identifiable. If the attributes are personally identifiable, the user decides whether to release them. The user has control, along with commensurate responsibility. All parties are happy, maybe…

Page 12: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 12

Establishing a User Context

Page 13: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 13

Getting Attributesand Determining Access

Page 14: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 14

Milestones•Project formation - Feb 2000 Stone Soup

•Process - began late summer 2000 with bi-weekly calls to develop scenario, requirements and architecture.

•Linkages to SAML established Dec 2000

•Architecture and protocol completion - Aug 2001

•Design - Oct 2001

•Coding began - Nov 2001

•Alpha-1 release – April 24, 2002

•OpenSAML release – July 15, 2002

•v0.7 Shibboleth released Nov 25, 2002

•v0.8 March 1, 2003

•v1.0 April 2003

•v1.1 conversations ruminating; v1.2 may be the plateau

Page 15: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 15

Shibboleth and SAML

•SAML is specifying a format and a means to exchange authentication and authorization assertions•Shibboleth builds a general purpose public infrastructure around SAML by

–developing user-navigation services, –standards to manage the exchange of attributes, –standard sets of attributes to be exchanged, and –infrastructure and user tools to preserve and manage privacy.–supporting groups using a common policy model; a scaleable solution

to common needs•SAML is creating a middleware equivalent of an IP address. Shibboleth adds services equivalent to DNS, routing, etc, to create a middleware equivalent of the Internet.

Page 16: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 16

Code status

•v0.7 released November 2002 (note switch to numbering) (coding teams – MIT, Columbia, Ohio State, CMU)

•v0.7 much easier to install than alpha’s. C/C++ only on origin. Java still on target. Relatively safe to deploy and experiment

•Release issues – platform dependencies, fragile Apache components, binaries vs source, etc…

•v0.7 to v0.8

• new features – ARP’s redone, added robustness

• timeframes – march 1, 2003 general release

•V0.8 to 1.0 – bug fixes and re-packaging only; due out before spring I2 member meeting

Page 17: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 17

Early Adopters

•WebCT•Webassign•National Digital Science Library•EBSCO•The Library pilot

Page 18: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 18

What is the library pilot?

•A dozen+ campuses working with 6 information vendors•Using Shibboleth to control access to electronic resources•Good test case for privacy requirements, trust model needs

Page 19: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 19

Project Goals

•Explore and Evaluate the utility of the Shibboleth model (attributes) for controlling access to licensed resources•Identify problems and issues with this approach

–How well do existing licenses map to attributes?–Library “walk-in” customers

•Identify and address Shib deploy issues for campuses AND for vendors•Explore new possibilities

Page 20: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 20

Campus Participants

•Carnegie Mellon•Columbia•Dartmouth•Georgetown•London School of Economics•New York Unv.•Ohio State

Penn State

U. Colorado

U. Michigan

U. Washington

U. Wisconsin - Madison

UCOP (U. California System)

U.Texas Health Science Center

at Houston

Page 21: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 21

Vendor Participants

•EBSCO• ~ Elsevier•OCLC•Sfx (Ex libris)•JSTOR•McGraw Hill eBooks•Proquest

Page 22: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 22

Shibboleth Deployment Issues•Access Issues• Kiosks and walk-ins• logins for on-campus use•Licensing issues• reconciling license structures with directory structures• system and consortial issues• mitigating disintermediation•Functional issues• handling Shibbed and non-Shibbed resources• roll-out strategies• entitlements vs attributes• what attributes to pass• how to structure the attribute name space

Page 23: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 23

Next steps

•Convergence with other efforts•Shibboleth the architecture vs Shibboleth the web service•Shibboleth the technology vs Club Shib the trust model•Federated Digital Rights Management•Federated P2P •Privacy Management Systems – see http://www.ischool.washington.edu/shibbui/index.html•Personal Information Managers – see http://www.brown.edu/cgi-bin/httool.epl

Page 24: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 24

Personal Resource Manager

Page 25: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 25

Privacy Management Systems

Page 26: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 26

PMS-2

Page 27: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 27

Long-term implications of Shib

• Interrealm basic exchanges of information for access control– The web service: Digital rights management– The architecture: Desktop video-conferencing– The trust model:

• Accelerating related technologies– Privacy– PKI

Page 28: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 28

Trust models

• Authenticate locally, act globally raises the fundamental question “Why should a remote target trust your remote authentication and attributes?”

• “Solutions” are global trust, federated trust, virtual organization, no need for formal trust…

Page 29: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 29

Key Trust Structures•Hierarchies

–may assert stronger or more formal trust–requires bridges and policy mappings to connect hierarchies–appear larger scale

•Federated administration–basic bilateral (origins and targets in web services)–complex bilateral (videoconferencing with external MCU’s, digital rights

management with external rights holders)–multilateral

•Virtual organizations–Shared resources among a sparse, distributed set of users–Grids, virtual communities, some P2P applications–Want to leverage other trust structures above

Page 30: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 30

Federations

•A group of organizations (universities, corporations, content providers, etc.) who agree to exchange attributes using the SAML/Shibboleth/Liberty protocols. In doing so they agree to abide by common sets of rules.

•The required rules and functions could include:

–A registry to process applications and administer operations

–A set of best practices on associated technical issues, typically involving security and attribute management

–A set of agreements or best practices on policies and business rules governing the exchange and use of attributes.

–The set of attributes that are regularly exchanged (syntax and semantics).

–A mechanism (WAYF) to identify a user’s security domains

–Ways to federate and unfederate identities

Page 31: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 31

Federations in the last year

•Communicator Hub ID is one of the pioneering Liberty•Alliance-based services on the market, supporting vertical-industry B2B•offerings such as SecuritiesHub. SecuritiesHub, which is sponsored by eight leading Wall Street investment firms, including Credit Suisse First Boston, Goldman Sachs, JPMorgan, Lehman Brothers, Merrill Lynch, Morgan Stanley, Salomon Smith Barney and UBS Warburg.•Liberty Alliance (http://www.projectliberty.org/)•Federal e-Authentication Initiative (http://www.cio.gov/eauthentication/)•Not much use of federated .NET•Shibboleth and InCommon (http://middleware.internet2.edu/shibboleth)

Page 32: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 32

Federating organizations organization (FOO)

•To explore the issues in federations, and multiple federations, and subclubs, and…•Includes GM, Johnson and Johnson, Bechtel, Liberty, Microsoft, Fed e-AuthN•Discussions just started...•Friends of foo as an email list to stay informed of the discussions

Page 33: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 33

Authorization

•Expressions of authorization

• x.509 attribute certs, SAML expressions, rights languages, policy languages, meta…

•Linking expressions to infrastructure middleware

• groups in directories

• registries

• attribute authorities

• securing the feeds

•Making decisions on authorization

• entitlements vs attributes – who decides

• within the apps

• decision points versus enforcement points

Page 34: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 34

PKI

• Didn’t it die?• There is no substitute for many services that

PKI can provide• It is not a universal panacea • It will continue to evolve until we get it right

Page 35: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 35

Uses for PKI

• Server side SSL certificates• End-entity identity certs• VPN certs for channel encryption• Signed email• Attribute certs• Signing enterprise SAML assertions

Page 36: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 36

Types of PKI

• Intrarealm– Primarily stand-alone– Classic corporate VPN/web-authn/secure shell

• Interrealm– Hierarchical– Bridged– Federated enterprise

Page 37: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 37

PKI deployments

• Intra-realm– A moderate percentage of large corps– A few uses at a few institutions:

• Texas/Houston – web authn, secure shell, signed email• Virginia - VPN• MIT – web authn

• Inter-realm– Only public-sector activity, primarily government

and higher ed

Page 38: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 38

Shibboleth and PKI

•Complementary technologies•Technically:

–Shibboleth leverages existing campus authentication processes (and can use end-entity certificates for this process)

–Shibboleth uses PKI to implement a multi-domain trust model–Shibboleth’s primary use is for authorization and privacy–PKI’s primary use is establishing identity across domains–PKI can use Shibboleth to achieve privacy and authorization.

•Policy: –Shibboleth establishes a collaborative trust model (flexible, quick,

privacy-enabled, etc.)–PKI establishes a legal trust model (binding, hierarchical, formal,

etc.).

Page 39: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 39

Deploying A Campus PKI

• Establishing CA services– Out-source– In-source

• Getting a profile and a policy/practice doc• Solving the annoying problems

– Mobility– Operating system gotchas

• PKI-enabling applications

Page 40: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 40

PKI in the last year

•FPKI efforts and the FBCA•The HEBCA•The demise of CREN•Sean Smith and his interesting research…• faking security…macros and screen manipulation• faking privacy…unlocking the cert store and playing Go Fish

Page 41: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 41

Current Interrealm Activities

• Federal Bridge Certificate Authority• Higher Ed Bridge Certificate Authority

Page 42: What Lies Ahead: Grids, Shibboleth, PKI Ken Klingenstein, Director, Internet2 Middleware Initiative Copyright Ken Klingenstein 2003. This work is the intellectual

Base CAMP - February 5-7, 2003 42

Relating PKI to the federated approach

• Well, at one level, PKI identities should anchor federated activities.

• At a more operational level, federated activities need to either– Peer with PKI activities (at a bridge?)– Interact with other federated activities