INDIGO AAI An overview and status update!

Size: px
Start display at page:

Download "INDIGO AAI An overview and status update!"

Transcription

1 RIA INDIGO DataCloud INDIGO AAI An overview and status update! Andrea Ceccanti (INFN) on behalf of the INDIGO AAI Task Force!

2 INDIGO Datacloud An H2020 project approved in January 2015 in the EINFRA call 11 M 30 Months (Apr > Sept. 2017) Who: 26 partners from 11 European countries What: develop an open source platform for computing and data targeted at multi-disciplinary scientific communities Where: provisioned over hybrid (public and private) e-infrastructures 2

3 INDIGO objectives Provide seamless access to data and computing provisioned over private, public or hybrid e- infrastuctures Leverage and extend current Cloud technologies, fill the gaps, provide tools and services to support scientists, software developers, resource providers and e-infrastructures for the efficient exploitation of computing, data and network technologies: Better software for better science 3

4 The INDIGO approach Based on Open Source solutions widely supported by big communities whenever possible exploit general solutions instead of specific tools/services increased sustainability ensure that the framework offered to final users, as well as to developers, will have a low learning curve ease of adoption and integration 4

5 Example use case scenario Computational Portal as a service 5

6 Example use case scenario Computational Portal as a service A scientific community has an application (or a set of them) that should be accessed through a portal, and: Requires a dynamically instantiated batch queue as a back-end Exhibits unpredictable workload Supports multiple access profiles Should be deployable through Cloud providers, with features such as redundancy and elasticity May require cloud-bursting to other infrastructures Should support access to external reference data and data local to the application, which must be accessible in a distributed way 6

7 The AAI problem Heterogeneous authentication/authorization mechanisms but we need common AAI ground, persistent identifiers, support for delegation, easy integration in services To be effective, security should not impact usability we need support for federated identities We need AAI solutions that allow our users to manage authentication and authorization on dynamically provisioned resources in a secure way Without being security experts! INDIGO-DataCloud RIA

8 INDIGO AAI: approach How can we have common AuthN and AuthZ primitives that just work across several distributed infrastructures? Which tools should we provide to our users so that they have complete control on how AuthN and AuthZ is configured and performed on the resources (assembled from distributed providers) they will use for their research? How do we avoid reinventing the wheel? How do we exploit what is already available, leverage existing standards and ensure that what we develop is sustainable? INDIGO-DataCloud RIA

9 INDIGO AAI: main challenges Authentication/Identity Supporting federated authn mechanism Persistent INDIGO identifier Offline access Authorization Orthogonal to AuthN Attribute-based Dynamic Consistent across heterogeneous infrastructure Delegation 9

10 INDIGO AAI architecture 10

11 Authentication Slide courtesy of Paul Millar 11

12 Identity layer challenges Support multiple AuthN mechanisms SAML, OpenID-Connect, X.509 Harmonise Identities One INDIGO identity linked to multiple user authn mechanisms Persistent INDIGO identity identifier Link group membership and other attributes to INDIGO identity similarly to what VOMS does with VO attributes and X.509 certificates, but in a way that is orthogonal to the AuthN mechanism used 12

13 Identity in INDIGO The INDIGO identity layer speaks OpenID-connect The INDIGO Identity and Access Management Service is an OIDC provider Authenticates users with supported AuthN mechanism SAML, X.509, OIDC Provides to RP access to identity information through standard OIDC interfaces Can be seen as a first credential translation step 13

14 Why OpenID connect Standard and widely adopted in industry Don t reinvent the wheel Reduced integration complexity in relying services Lots of things we need are covered and standardized Dynamic Registration of clients/relying parties Token revocation Discovery Session management Distributed/Aggregated claims Mobile-friendly 14

15 INDIGO AuthN flow Access service INDIGO Service Marcus wants to access some service at INDIGO service Home IdP Indigo IAM

16 INDIGO AuthN flow Access service INDIGO Service INDIGO Services sees that Marcus is not authenticated, and redirects him to INDIGO IAM for authentication Home IdP Indigo IAM

17 INDIGO AuthN flow INDIGO Service redirect to IAM for AuthN Home IdP Indigo IAM

18 INDIGO AuthN flow INDIGO Service redirect to IAM for AuthN IAM lets Marcus choose how he wants to authenticate Marcus chooses his Home IdP Home IdP Indigo IAM

19 INDIGO AuthN flow INDIGO Service redirect to home IdP for AuthN Home IdP Indigo IAM

20 INDIGO AuthN flow INDIGO Service Home IdP authenticates Marcus and sends back an AuthN assertion Home IdP Indigo IAM

21 INDIGO AuthN flow INDIGO Service IAM validates assertion. Marcus is now authenticated at IAM. Home IdP Indigo IAM

22 INDIGO AuthN flow INDIGO Service send back to IS OIDC authz code Home IdP Indigo IAM

23 INDIGO AuthN flow INDIGO Service exchange authz code for OIDC ID-token access token Home IdP Indigo IAM

24 INDIGO AuthN flow INDIGO Service IS validates ID-Token. Marcus is now authenticated at IS Home IdP Indigo IAM

25 INDIGO AuthN flow INDIGO Service IS requests additional profile information about Marcus from IAM user info endpoint Home IdP Indigo IAM

26 IAM Status Implementation based on the Mitre OpenID connect server reference implementation Java-Spring-Server Certified open source OIDC server implementation Actively maintained also used as the base of the Shibboleth IdP OIDC implementation Main OIDC functionality covered Token issuing and management, Client registration/discovery, Scope management Simple and usable management web application provided 26

27 IAM Authentication status OAuth client/token/consent management Local username/password authentication External SAML IdP authentication Identity orthogonal to AuthN Group information available via OIDC External OIDC IdP authentication Certificate authentication AuthN mechanism exposed via OIDC done done done done done in progress in progress in progress 27

28 IAM Authentication status OAuth client/token/consent management Local username/password authentication External SAML IdP ETA: authentication June release Identity orthogonal to AuthN Group information available via OIDC External OIDC IdP authentication Certificate authentication AuthN mechanism exposed via OIDC done done done done done in progress in progress in progress 27

29 Authorization Slide courtesy of Paul Millar 28

30 Authorization challenges Consistency Provide solutions to dynamically define, propagate, compose and enforce authorization policies on resources at various levels of the infrastructure Scalability in a scalable way Manageability supporting cross-organizational user, group and privilege management as well as enrollment and registration flows Integration in a way that produces minimal integration friction in services 29

31 Authorization challenges Consistency Provide solutions to dynamically define, propagate, compose and enforce authorization policies on resources at various levels of the infrastructure Scalability in a scalable way Manageability supporting cross-organizational user, group and privilege management as well as enrollment and registration flows Integration in a way that produces minimal integration friction in services 30

32 AuthZ in INDIGO: OAuth 2 A standard framework for delegated authorization to access HTTP protected resources Decouples AuthZ from AuthN Natural solution for delegated authorization in HTTP services 31

33 Authorization in INDIGO INDIGO services are HTTP APIs protected by an OAuth Authorization Service In order to access resources, a client needs an access token OAuth scopes used to target the token to specific APIs/ services provide hints for finer grained authz Identity layer provides other attributes as base for AuthZ decisions 32

34 Scope-based authorization Each service registers the supported scopes when it registers at the authorization server (AS) The AS maintains policies that determine which client is authorized to request a given scope The request for a given scope is authorized by the user through the OAuth consent mechanism but is possible to define trusted, whitelisted client services for which user consent is not requested Authorization is enforced at the target service considering scopes and other relevant information 33

35 Scope-based authorization Indigo IAM Registered Scopes js:submit_job js:cancel_job ss:read ss:write Access SG Job Scheduler SG Science Gateway Storage Service

36 Scope-based authorization Indigo IAM Registered Scopes js:submit_job js:cancel_job ss:read ss:write Redirect for AuthN & consent Job Scheduler SG Science Gateway Storage Service

37 Scope-based authorization Indigo IAM Authorization requested Scientific Gateway would like to: Registered Scopes js:submit_job js:cancel_job ss:read ss:write Redirect for AuthN & consent know your identity submit jobs on JS on your behalf read files from SS on your behalf write files on SS on your behalf Cancel Accept SG Science Gateway Storage Service

38 Scope-based authorization Indigo IAM Registered Scopes js:submit_job js:cancel_job ss:read ss:write Returned id token & access token Job Scheduler SG Science Gateway Storage Service

39 Scope-based authorization Indigo IAM Registered Scopes js:submit_job js:cancel_job ss:read ss:write Submit job Job Scheduler SG Science Gateway Storage Service

40 Scope-based authorization Indigo IAM Registered Scopes js:submit_job js:cancel_job ss:read ss:write Submit job Job Scheduler Job scheduling is authorized by the js:submit_job scope SG Science Gateway Storage Service

41 Scope-based authorization Indigo IAM Registered Scopes js:submit_job js:cancel_job ss:read ss:write Job Scheduler Read job output data SG Science Gateway Storage Service

42 Scope-based authorization Indigo IAM Registered Scopes js:submit_job js:cancel_job ss:read ss:write Job Scheduler Read job output data Data access is authorized by the ss:read scope SG Science Gateway Storage Service

43 Fine-grained authorization OAuth scope-based AuthZ provides a first coarse grained authorization step Finer-grained authorization can be implemented at services on top of this step taking into account User identity attributes Service authorization policies Collaboration/VO policies Consistent authorization across services is enabled by callouts to the Argus authorization service 40

44 Fine-grained authorization Indigo IAM Authz! Service Collaboration Policies Policy distribution Read job output data Storage service SG Science Gateway AuthZ Callout Authz! Service Local Policies

45 Authorization status OAuth2 authorization First level of access control; Mitre OAuth2 implementation already provides most of what is needed for INDIGO use cases Some development now focused on filling the gaps e.g., providing the concept of service groups, in order to simplify OAuth scope management Fine-grained attribute-based authorization services on attributes provided by the OIDC identity layer; really service-dependent Consistency across services via callout to Argus is the scope of the second year of the project 42

46 Delegation 43

47 OAuth delegation 44

48 OAuth chained delegation? 45

49 OAuth token exchange OAuth flow to implement chained delegation among services! Under standardization Supports impersonation and delegation 46

50 IAM OAuth token exchange MitreID connect already has some non-standard form of chained delegation, which however does not (in its current form) solve our use cases i.e. delegate offline access to identity information across services Plan is to extend MitreID connect implementation with a subset of the OAuth token exchange standard i.e., the minimum functionality needed to support our use cases! ETA: June 47

51 The Token Translation Service What about integration with services that do not speak OpenIDconnect? The INDIGO Token Translation Service (TTS) maps INDIGO identity & attributes to external service credentials provides an extensible plugin-based architecture, and will initially support translations to ssh keypair S3 keys X.509 certificate 48

52 Timeline Architectural and design deliverables done See for all INDIGO deliverables! Development activities ongoing! First official INDIGO release expected end of July, 2016 but we will start make available services as soon as they are ready enough to be tested 49

53 Thanks! Questions?! 50

INDIGO-Datacloud Identity and Access Management Service

INDIGO-Datacloud Identity and Access Management Service INDIGO-Datacloud Identity and Access Management Service RIA-653549 Presented by Andrea Ceccanti (INFN) andrea.ceccanti@cnaf.infn.it WLCG AuthZ WG Meeting Dec, 14th 2017 IAM overview INDIGO IAM The Identity

More information

Beyond X.509: Token-based Authentication and Authorization with the INDIGO Identity and Access Management Service

Beyond X.509: Token-based Authentication and Authorization with the INDIGO Identity and Access Management Service Beyond X.509: Token-based Authentication and Authorization with the INDIGO Identity and Access Management Service Andrea Ceccanti andrea.ceccanti@cnaf.infn.it Workshop CCR Rimini, June 12th 2018 INDIGO

More information

INDIGO-DataCloud Architectural Overview

INDIGO-DataCloud Architectural Overview INDIGO-DataCloud Architectural Overview RIA-653549 Giacinto Donvito (INFN) INDIGO-DataCloud Technical Director 1 st INDIGO-DataCloud Periodic Review Bologna, 7-8 November 2016 Outline General approach

More information

Best Practices: Authentication & Authorization Infrastructure. Massimo Benini HPCAC - April,

Best Practices: Authentication & Authorization Infrastructure. Massimo Benini HPCAC - April, Best Practices: Authentication & Authorization Infrastructure Massimo Benini HPCAC - April, 03 2019 Agenda - Common Vocabulary - Keycloak Overview - OAUTH2 and OIDC - Microservices Auth/Authz techniques

More information

AAI in EGI Current status

AAI in EGI Current status AAI in EGI Current status Peter Solagna EGI.eu Operations Manager www.egi.eu EGI-Engage is co-funded by the Horizon 2020 Framework Programme of the European Union under grant number 654142 User authentication

More information

[GSoC Proposal] Securing Airavata API

[GSoC Proposal] Securing Airavata API [GSoC Proposal] Securing Airavata API TITLE: Securing AIRAVATA API ABSTRACT: The goal of this project is to design and implement the solution for securing AIRAVATA API. Particularly, this includes authenticating

More information

Storage Management in INDIGO

Storage Management in INDIGO Storage Management in INDIGO Paul Millar paul.millar@desy.de with contributions from Marcus Hardt, Patrick Fuhrmann, Łukasz Dutka, Giacinto Donvito. INDIGO-DataCloud: cheat sheet A Horizon-2020 project

More information

2. HDF AAI Meeting -- Demo Slides

2. HDF AAI Meeting -- Demo Slides 2. HDF AAI Meeting -- Demo Slides Steinbuch Centre for Computing Marcus Hardt KIT University of the State of Baden-Wuerttemberg and National Research Center of the Helmholtz Association www.kit.edu Introduction

More information

Guidelines on non-browser access

Guidelines on non-browser access Published Date: 13-06-2017 Revision: 1.0 Work Package: Document Code: Document URL: JRA1 AARC-JRA1.4F https://aarc-project.eu/wp-content/uploads/2017/03/aarc-jra1.4f.pdf 1 Table of Contents 1 Introduction

More information

AARC Blueprint Architecture

AARC Blueprint Architecture AARC Blueprint Architecture Published Date: 18-04-2017 Revision: 1.0 Work Package: Document Code: Document URL: JRA1 AARC-BPA-2017 https://aarc-project.eu/blueprint-architecture AARC Blueprint Architecture

More information

EGI-InSPIRE. GridCertLib Shibboleth authentication for X.509 certificates and Grid proxies. Sergio Maffioletti

EGI-InSPIRE. GridCertLib Shibboleth authentication for X.509 certificates and Grid proxies. Sergio Maffioletti EGI-InSPIRE GridCertLib Shibboleth authentication for X.509 certificates and Grid proxies Sergio Maffioletti Grid Computing Competence Centre, University of Zurich http://www.gc3.uzh.ch/

More information

Partner Center: Secure application model

Partner Center: Secure application model Partner Center: Secure application model The information provided in this document is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including

More information

The EGI AAI CheckIn Service

The EGI AAI CheckIn Service The EGI AAI CheckIn Service Kostas Koumantaros- GRNET On behalf of EGI-Engage JRA1.1 www.egi.eu EGI-Engage is co-funded by the Horizon 2020 Framework Programme of the European Union under grant number

More information

Federated access to e-infrastructures worldwide

Federated access to e-infrastructures worldwide Federated access to e-infrastructures worldwide Marco Fargetta, INFN Catania - Italy (marco.fargetta@ct.infn.it) DCIs developed in the last decade 2 Evolution Research organisations are moving to cloud

More information

RCauth.eu / MasterPortal update

RCauth.eu / MasterPortal update RCauth.eu / MasterPortal update Mischa Sallé msalle@nikhef.nl 5 th AARC face-to-face meeting, Aθηνα 21 March 2017 Mischa Sallé (Nikhef) 1 / 11 Reminder of motivation Access to X.509 resources made easy

More information

WP JRA1: Architectures for an integrated and interoperable AAI

WP JRA1: Architectures for an integrated and interoperable AAI Authentication and Authorisation for Research and Collaboration WP JRA1: Architectures for an integrated and interoperable AAI Christos Kanellopoulos Agenda Structure and administrative matters Objectives

More information

EUDAT. Towards a pan-european Collaborative Data Infrastructure

EUDAT. Towards a pan-european Collaborative Data Infrastructure EUDAT Towards a pan-european Collaborative Data Infrastructure Giuseppe Fiameni (g.fiameni@cineca.it) Claudio Cacciari SuperComputing, Application and Innovation CINECA Johannes Reatz RZG, Germany Damien

More information

Sentinet for BizTalk Server SENTINET

Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and API Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication

More information

Authentication. Katarina

Authentication. Katarina Authentication Katarina Valalikova @KValalikova k.valalikova@evolveum.com 1 Agenda History Multi-factor, adaptive authentication SSO, SAML, OAuth, OpenID Connect Federation 2 Who am I? Ing. Katarina Valaliková

More information

SAP Security in a Hybrid World. Kiran Kola

SAP Security in a Hybrid World. Kiran Kola SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal

More information

dcache integration into HDF

dcache integration into HDF dcache integration into HDF Storage service at DESY for Helmholtz Data Federation (HDF) Paul Millar Karlsruhe, 2018-08-30 This project has received funding from the European Union s Horizon 2020 research

More information

Sentinet for Windows Azure VERSION 2.2

Sentinet for Windows Azure VERSION 2.2 Sentinet for Windows Azure VERSION 2.2 Sentinet for Windows Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Isolated Deployment Model... 3 Collocated Deployment Model...

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS 03 EXECUTIVE OVERVIEW 05 INTRODUCTION 07 MORE CLOUD DEPLOYMENTS MEANS MORE ACCESS 09 IDENTITY FEDERATION IN

More information

5 OAuth EssEntiAls for APi AccEss control layer7.com

5 OAuth EssEntiAls for APi AccEss control layer7.com 5 OAuth Essentials for API Access Control layer7.com 5 OAuth Essentials for API Access Control P.2 Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the

More information

Tutorial: Building the Services Ecosystem

Tutorial: Building the Services Ecosystem Tutorial: Building the Services Ecosystem GlobusWorld 2018 Steve Tuecke tuecke@globus.org What is a services ecosystem? Anybody can build services with secure REST APIs App Globus Transfer Your Service

More information

Sentinet for Microsoft Azure SENTINET

Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Cloud Deployment Model... 3 Hybrid Deployment Model...

More information

Technical Overview. Version March 2018 Author: Vittorio Bertola

Technical Overview. Version March 2018 Author: Vittorio Bertola Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which

More information

SLCS and VASH Service Interoperability of Shibboleth and glite

SLCS and VASH Service Interoperability of Shibboleth and glite SLCS and VASH Service Interoperability of Shibboleth and glite Christoph Witzig, SWITCH (witzig@switch.ch) www.eu-egee.org NREN Grid Workshop Nov 30th, 2007 - Malaga EGEE and glite are registered trademarks

More information

Credential Management in the Grid Security Infrastructure. GlobusWorld Security Workshop January 16, 2003

Credential Management in the Grid Security Infrastructure. GlobusWorld Security Workshop January 16, 2003 Credential Management in the Grid Security Infrastructure GlobusWorld Security Workshop January 16, 2003 Jim Basney jbasney@ncsa.uiuc.edu http://www.ncsa.uiuc.edu/~jbasney/ Credential Management Enrollment:

More information

Federated Services for Scientists Thursday, December 9, p.m. EST

Federated Services for Scientists Thursday, December 9, p.m. EST IAM Online Federated Services for Scientists Thursday, December 9, 2010 1 p.m. EST Rachana Ananthakrishnan Argonne National Laboratory & University of Chicago Jim Basney National Center for Supercomputing

More information

The computing architecture for the ISOLPHARM_Ag project. Lisa Zangrando. Lisa Zangrando INFN-PD

The computing architecture for the ISOLPHARM_Ag project. Lisa Zangrando. Lisa Zangrando INFN-PD The computing architecture for the ISOLPHARM_Ag project INFN-PD The ISOLPHARM project ISOLPHARM is an INFN project devoted to the discovery and development of high purity radiopharmaceuticals exploiting

More information

API Security Management with Sentinet SENTINET

API Security Management with Sentinet SENTINET API Security Management with Sentinet SENTINET Overview 1 Contents Introduction... 2 Security Mediation and Translation... 3 Security Models... 3 Authentication... 4 Authorization... 5 Bidirectional Security

More information

FeduShare Update. AuthNZ the SAML way for VOs

FeduShare Update. AuthNZ the SAML way for VOs FeduShare Update AuthNZ the SAML way for VOs FeduShare Goals: Provide transparent sharing of campus resources in support of (multiinstitutional) collaboration Support both HTTP and non-web access using

More information

Allowing the user to define the attribute release 21 May 2014

Allowing the user to define the attribute release 21 May 2014 Allowing the user to define the attribute release policy @TNC2014 21 May 2014 Program Introduction to User Managed Access (UMA) Demo A GN3+ JRA3T2 work item User Managed Access Kantara project.. address

More information

GDPR, PSD2, CIAM, and the Role of User-Managed Access 2.0

GDPR, PSD2, CIAM, and the Role of User-Managed Access 2.0 GDPR, PSD2, CIAM, and the Role of User-Managed Access 2.0 Eve Maler VP Innovation & Emerging Technology, ForgeRock @xmlgrrl eve.maler@forgerock.com Chair and founder, Kantara UMA Work Group @UMAWG tinyurl.com/umawg

More information

5 OAuth Essentials for API Access Control

5 OAuth Essentials for API Access Control 5 OAuth Essentials for API Access Control Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the user in control of delegating access to an API. This allows

More information

An integrated IaaS and PaaS architecture for scientific computing

An integrated IaaS and PaaS architecture for scientific computing An integrated IaaS and PaaS architecture for scientific computing RIA-653549 Giacinto Donvito INFN-Bari On behalf of INDIGO Collaboration INDIGO: The consortium 26 partners from 11 countries The exagon

More information

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) Version 1.0 Author: Bharadwaj Pulugundla (Verizon) 25.10.2015 Table of content 1. Introduction... 3

More information

A solution for Access Delegation based on SAML. Ciro Formisano Ermanno Travaglino Isabel Matranga

A solution for Access Delegation based on SAML. Ciro Formisano Ermanno Travaglino Isabel Matranga A solution for Access Delegation based on SAML Ciro Formisano Ermanno Travaglino Isabel Matranga Access Delegation in distributed environments SAML 2.0 Condition to Delegate Implementation Future plans

More information

Federated Identities and Services: the CHAIN-REDS vision

Federated Identities and Services: the CHAIN-REDS vision Co-ordination & Harmonisation of Advanced e-infrastructures for Research and Education Data Sharing Federated Identities and Services: the CHAIN-REDS vision Federico Ruggieri, GARR/INFN Joint CHAIN-REDS/ELCIRA

More information

Federated Authentication with Web Services Clients

Federated Authentication with Web Services Clients Federated Authentication with Web Services Clients in the context of SAML based AAI federations Thomas Lenggenhager thomas.lenggenhager@switch.ch Mannheim, 8. March 2011 Overview SAML n-tier Delegation

More information

Identity management. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014

Identity management. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014 Identity management Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 Outline 1. Single sign-on 2. SAML and Shibboleth 3. OpenId 4. OAuth 5. (Corporate IAM) 6. Strong identity 2

More information

Liferay Security Features Overview. How Liferay Approaches Security

Liferay Security Features Overview. How Liferay Approaches Security Liferay Security Features Overview How Liferay Approaches Security Table of Contents Executive Summary.......................................... 1 Transport Security............................................

More information

globus online Globus Nexus Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory

globus online Globus Nexus Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory globus online Globus Nexus Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory Computation Institute (CI) Apply to challenging problems Accelerate by building the research

More information

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products CIAM: Need for Identity Governance & Assurance Yash Prakash VP of Products Key Tenets of CIAM Solution Empower consumers, CSRs & administrators Scale to millions of entities, cloud based service Security

More information

Office 365 and Azure Active Directory Identities In-depth

Office 365 and Azure Active Directory Identities In-depth Office 365 and Azure Active Directory Identities In-depth Jethro Seghers Program Director SkySync #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM Agenda Introduction Identities Different forms of authentication

More information

Building the Modern Research Data Portal using the Globus Platform. Rachana Ananthakrishnan GlobusWorld 2017

Building the Modern Research Data Portal using the Globus Platform. Rachana Ananthakrishnan GlobusWorld 2017 Building the Modern Research Data Portal using the Globus Platform Rachana Ananthakrishnan rachana@globus.org GlobusWorld 2017 Platform Questions How do you leverage Globus services in your own applications?

More information

The SciTokens Authorization Model: JSON Web Tokens & OAuth

The SciTokens Authorization Model: JSON Web Tokens & OAuth The SciTokens Authorization Model: JSON Web Tokens & OAuth Jim Basney Brian Bockelman This material is based upon work supported by the National Science

More information

CAS s IDP system and resources in Education Cloud

CAS s IDP system and resources in Education Cloud CAS s IDP system and resources in Education Cloud DAREN ZHA CANS2015, Chengdu Outline CAS s IDP system and Education Cloud introduction Problems of interoperation A interoperation plan CAS s Education

More information

openid connect all the things

openid connect all the things openid connect all the things @pquerna CTO, ScaleFT CoreOS Fest 2017-2017-07-01 Problem - More Client Devices per-human - Many Cloud Accounts - More Apps: yay k8s - More Distributed Teams - VPNs aren

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Warm Up to Identity Protocol Soup

Warm Up to Identity Protocol Soup Warm Up to Identity Protocol Soup David Waite Principal Technical Architect 1 Topics What is Digital Identity? What are the different technologies? How are they useful? Where is this space going? 2 Digital

More information

Single Sign-On Best Practices

Single Sign-On Best Practices AUGUST 2018 WHITE PAPER Single Sign-On Best Practices Protecting Access in the Cloud Table of Contents Executive Summary... 3 Objectives... 3 Security Challenges... 4 Standards... 5 Conclusion... 6 Additional

More information

Introduction to SciTokens

Introduction to SciTokens Introduction to SciTokens Brian Bockelman, On Behalf of the SciTokens Team https://scitokens.org This material is based upon work supported by the National Science Foundation under Grant No. 1738962. Any

More information

UMA and Dynamic Client Registration. Thomas Hardjono on behalf of the UMA Work Group

UMA and Dynamic Client Registration. Thomas Hardjono on behalf of the UMA Work Group UMA and Dynamic Client Registration Thomas Hardjono on behalf of the UMA Work Group 1 UMA is... A web protocol that lets you control authorization of data sharing and service access made on your behalf

More information

User Management. Juan J. Doval DEIMOS SPACE S.L.U. NextGEOSS, April 2018

User Management. Juan J. Doval DEIMOS SPACE S.L.U. NextGEOSS, April 2018 User Management Juan J. Doval DEIMOS SPACE S.L.U. NextGEOSS, April 2018 Agenda Introduction User Management Roadmap Related Activities 1 Introduction NextGEOSS High-Level Architecture DataHub harvest and

More information

Intro to the Identity Experience Engine. Kim Cameron, Microsoft Architect of Identity ISSE Paris November 2016

Intro to the Identity Experience Engine. Kim Cameron, Microsoft Architect of Identity ISSE Paris November 2016 Intro to the Identity Experience Engine Kim Cameron, Microsoft Architect of Identity ISSE Paris November 2016 Intro to the Identity Experience Engine (IEE) Withering away of the enterprise domain boundary

More information

Single Sign-On for PCF. User's Guide

Single Sign-On for PCF. User's Guide Single Sign-On for PCF Version 1.2 User's Guide 2018 Pivotal Software, Inc. Table of Contents Table of Contents Single Sign-On Overview Installation Getting Started with Single Sign-On Manage Service Plans

More information

OpenIAM Identity and Access Manager Technical Architecture Overview

OpenIAM Identity and Access Manager Technical Architecture Overview OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...

More information

ForgeRock Access Management Core Concepts AM-400 Course Description. Revision B

ForgeRock Access Management Core Concepts AM-400 Course Description. Revision B ForgeRock Access Management Core Concepts AM-400 Course Description Revision B ForgeRock Access Management Core Concepts AM-400 Description This structured course comprises a mix of instructor-led lessons

More information

ISACA Silicon Valley. APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems

ISACA Silicon Valley. APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems ISACA Silicon Valley APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems Why Should You Care About APIs? Because cloud and mobile computing are built

More information

TECHNICAL GUIDE SSO SAML. At 360Learning, we don t make promises about technical solutions, we make commitments.

TECHNICAL GUIDE SSO SAML. At 360Learning, we don t make promises about technical solutions, we make commitments. TECHNICAL GUIDE SSO SAML At 360Learning, we don t make promises about technical solutions, we make commitments. This technical guide is part of our Technical Documentation. 2 360Learning is a Leading European

More information

SA1 CILogon pilot - motivation and setup

SA1 CILogon pilot - motivation and setup SA1 CILogon pilot - motivation and setup Tamas Balogh & Mischa Sallé tamasb@nikhef.nl msalle@nikhef.nl AARC General Meeting, Milan 4 November 2015 Tamas Balogh & Mischa Sallé (Nikhef) 1 / 11 Outline 1

More information

DocuSign Single Sign On Implementation Guide Published: June 8, 2016

DocuSign Single Sign On Implementation Guide Published: June 8, 2016 DocuSign Single Sign On Implementation Guide Published: June 8, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents

More information

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1 Inside Symantec O 3 Sergi Isasi Senior Manager, Product Management SR B30 - Inside Symantec O3 1 Agenda 2 Cloud: Opportunity And Challenge Cloud Private Cloud We should embrace the Cloud to respond to

More information

Overview SENTINET 3.1

Overview SENTINET 3.1 Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7

More information

Integration Patterns for Legacy Applications

Integration Patterns for Legacy Applications Integration Patterns for Legacy Applications Index Why should I integrate my apps with Okta? 3 Scope 5 When to use this ebook 6 How to read this ebook 7 Integration patterns supported by Okta 8 RADIUS

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications

More information

A RESTful Approach to Identity-based Web Services

A RESTful Approach to Identity-based Web Services A RESTful Approach to Identity-based Web Services Marc J. Hadley Hubert A. Le Van Gong Sun Microsystems, Inc. 1 Outline > Identity-based web services intro > RESTful ID-WSF > OAuth Extensions > Permissioned

More information

API Security Management SENTINET

API Security Management SENTINET API Security Management SENTINET Overview 1 Contents Introduction... 2 Security Models... 2 Authentication... 2 Authorization... 3 Security Mediation and Translation... 5 Bidirectional Security Management...

More information

GLOBUS TOOLKIT SECURITY

GLOBUS TOOLKIT SECURITY GLOBUS TOOLKIT SECURITY Plamen Alexandrov, ISI Masters Student Softwarepark Hagenberg, January 24, 2009 TABLE OF CONTENTS Introduction (3-5) Grid Security Infrastructure (6-15) Transport & Message-level

More information

Sentinet for BizTalk Server VERSION 2.2

Sentinet for BizTalk Server VERSION 2.2 for BizTalk Server VERSION 2.2 for BizTalk Server 1 Contents Introduction... 2 SOA Repository... 2 Security... 3 Mediation and Virtualization... 3 Authentication and Authorization... 4 Monitoring, Recording

More information

Challenges in Authenticationand Identity Management

Challenges in Authenticationand Identity Management Sep 05 ISEC INFOSECURITY TOUR 2017 05.09.2017, Buenos Aires, Argentina Challenges in Authenticationand Identity Management CAMINANTE NO HAY CAMINO, SE HACE CAMINO AL ANDAR 2016 SecurIT Who is MerStar?

More information

Goal. TeraGrid. Challenges. Federated Login to TeraGrid

Goal. TeraGrid. Challenges. Federated Login to TeraGrid Goal Federated Login to Jim Basney Terry Fleury Von Welch Enable researchers to use the authentication method of their home organization for access to Researchers don t need to use -specific credentials

More information

The Modern Web Access Management Platform from on-premises to the Cloud

The Modern Web Access Management Platform from on-premises to the Cloud The Modern Web Access Management Platform from on-premises to the Cloud Single Sign On, Access Controls, Session Management and how to use Access Management to protect applications both on premises and

More information

OPENID CONNECT 101 WHITE PAPER

OPENID CONNECT 101 WHITE PAPER OPENID CONNECT 101 TABLE OF CONTENTS 03 04 EXECUTIVE OVERVIEW WHAT IS OPENID CONNECT? Connect Terminology Relationship to OAuth 08 Relationship to SAML CONNECT IN MORE DETAIL Trust Model Discovery Dynamic

More information

dcache: challenges and opportunities when growing into new communities Paul Millar on behalf of the dcache team

dcache: challenges and opportunities when growing into new communities Paul Millar on behalf of the dcache team dcache: challenges and opportunities when growing into new Paul Millar communities on behalf of the dcache team EMI is partially funded by the European Commission under Grant Agreement RI-261611 Orientation:

More information

EGI Check-in service. Secure and user-friendly federated authentication and authorisation

EGI Check-in service. Secure and user-friendly federated authentication and authorisation EGI Check-in service Secure and user-friendly federated authentication and authorisation EGI Check-in Secure and user-friendly federated authentication and authorisation Check-in provides a reliable and

More information

Securing Modern API and Microservice Based Applications by Design A closer look at security concerns for modern applications Farshad Abasi / Forward

Securing Modern API and Microservice Based Applications by Design A closer look at security concerns for modern applications Farshad Abasi / Forward Securing Modern API and Microservice Based Applications by Design A closer look at security concerns for modern applications Farshad Abasi / Forward Security / 2018-11-22 About Me Farshad Abasi Based in:

More information

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith ArcGIS Enterprise Security: An Introduction Gregory Ponto & Jeff Smith Agenda ArcGIS Enterprise Security Model Portal for ArcGIS Authentication Authorization Building the Enterprise Encryption Collaboration

More information

CA SSO Cloud-Enabled with SSO/Rest

CA SSO Cloud-Enabled with SSO/Rest CA SSO Cloud-Enabled with SSO/Rest SSO/Rest Solves Many Challenges Applications in the Cloud AJAX / Mobile / Thick Client Application Integration "Agent-less" Infrastructure Server-side Application Integration

More information

Certification Exam Guide SALESFORCE CERTIFIED IDENTITY AND ACCESS MANAGEMENT DESIGNER. Summer Salesforce.com, inc. All rights reserved.

Certification Exam Guide SALESFORCE CERTIFIED IDENTITY AND ACCESS MANAGEMENT DESIGNER. Summer Salesforce.com, inc. All rights reserved. Certification Exam Guide SALESFORCE CERTIFIED IDENTITY AND ACCESS MANAGEMENT DESIGNER Summer 18 2018 Salesforce.com, inc. All rights reserved. S ALESFORCE CERTIFIED IDENTITY AND ACCESS MANAGEMENT DESIGNER

More information

WSO2 Identity Management

WSO2 Identity Management WSO2 Identity Management Panagiotis Kranidiotis panagiotiskranidiotis@gmailcom 4 Νοεμβρίου 2017 Few things about me First engagement with open source technologies in 1995 Open source consultant and systems

More information

DARIAH-AAI. DASISH AAI Meeting. Nijmegen, March 9th,

DARIAH-AAI. DASISH AAI Meeting. Nijmegen, March 9th, DARIAH-AAI DASISH AAI Meeting Nijmegen, March 9th, 2014 www.dariah.eu What is DARIAH? DARIAH: Digital Research Infrastructure for the Arts and Humanities One of the few ESFRI research infrastructures for

More information

User Management. Juan J. Doval DEIMOS SPACE S.L.U. NextGEOSS, September 25 th 2017

User Management. Juan J. Doval DEIMOS SPACE S.L.U. NextGEOSS, September 25 th 2017 User Management Juan J. Doval DEIMOS SPACE S.L.U. NextGEOSS, September 25 th 2017 Agenda Introduction User Management Federation Objectives 1 Introduction NextGEOSS High-Level Architecture DataHub harvest

More information

Identity Provider for SAP Single Sign-On and SAP Identity Management

Identity Provider for SAP Single Sign-On and SAP Identity Management Implementation Guide Document Version: 1.0 2017-05-15 PUBLIC Identity Provider for SAP Single Sign-On and SAP Identity Management Content 1....4 1.1 What is SAML 2.0.... 5 SSO with SAML 2.0.... 6 SLO with

More information

30 Nov Dec Advanced School in High Performance and GRID Computing Concepts and Applications, ICTP, Trieste, Italy

30 Nov Dec Advanced School in High Performance and GRID Computing Concepts and Applications, ICTP, Trieste, Italy Advanced School in High Performance and GRID Computing Concepts and Applications, ICTP, Trieste, Italy Why the Grid? Science is becoming increasingly digital and needs to deal with increasing amounts of

More information

Authorization Strategies for Virtualized Environments in Grid Computing Systems

Authorization Strategies for Virtualized Environments in Grid Computing Systems Authorization Strategies for Virtualized Environments in Grid Computing Systems Xinming Ou Anna Squicciarini Sebastien Goasguen Elisa Bertino Purdue University Abstract The development of adequate security

More information

ShibVomGSite: A Framework for Providing Username and Password Support to GridSite with Attribute based Authorization using Shibboleth and VOMS

ShibVomGSite: A Framework for Providing Username and Password Support to GridSite with Attribute based Authorization using Shibboleth and VOMS ShibVomGSite: A Framework for Providing Username and Password Support to GridSite with Attribute based Authorization using Shibboleth and VOMS Joseph Olufemi Dada & Andrew McNab School of Physics and Astronomy,

More information

Novell Access Manager 3.1

Novell Access Manager 3.1 Technical White Paper IDENTITY AND SECURITY www.novell.com Novell Access Manager 3.1 Access Control, Policy Management and Compliance Assurance Novell Access Manager 3.1 Table of Contents: 2..... Complete

More information

Best practices and recommendations for attribute translation from federated authentication to X.509 credentials

Best practices and recommendations for attribute translation from federated authentication to X.509 credentials Best practices and recommendations for attribute translation from federated authentication to X.509 credentials Published Date: 13-06-2017 Revision: 1.0 Work Package: Document Code: Document URL: JRA1

More information

Microsoft Graph API Deep Dive

Microsoft Graph API Deep Dive Microsoft Graph API Deep Dive Donald Hessing Lead Architect, Capgemini, The Netherlands Microsoft Certified Master (MCM) Agenda Introduction to Microsoft Graph API What is now and what is new in GA and

More information

A Guanxi Shibboleth based Security Infrastructure for e-social Science

A Guanxi Shibboleth based Security Infrastructure for e-social Science A Guanxi Shibboleth based Security Infrastructure for e-social Science Wei Jie 1 Alistair Young 2 Junaid Arshad 3 June Finch 1 Rob Procter 1 Andy Turner 3 1 University of Manchester, UK 2 UHI Millennium

More information

SAP IoT Application Enablement Best Practices Authorization Guide

SAP IoT Application Enablement Best Practices Authorization Guide SAP IoT Application Enablement Best Practices Authorization Guide TABLE OF CONTENTS 1 INITIAL TENANT SETUP... 3 1.1 Configure Trust... 3 1.1.1 Technical Background... 6 1.2 Establish Trust... 6 1.3 Set

More information

Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation

Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation Enhancing cloud applications by using external authentication services After you complete this section, you should understand: Terminology such as authentication, identity, and ID token The benefits of

More information

Ramnish Singh IT Advisor Microsoft Corporation Session Code:

Ramnish Singh IT Advisor Microsoft Corporation Session Code: Ramnish Singh IT Advisor Microsoft Corporation Session Code: Agenda Microsoft s Identity and Access Strategy Geneva Claims Based Access User access challenges Identity Metasystem and claims solution Introducing

More information

Grid Middleware and Globus Toolkit Architecture

Grid Middleware and Globus Toolkit Architecture Grid Middleware and Globus Toolkit Architecture Lisa Childers Argonne National Laboratory University of Chicago 2 Overview Grid Middleware The problem: supporting Virtual Organizations equirements Capabilities

More information

What Does Logout Mean?

What Does Logout Mean? What Does Logout Mean? Michael B. Jones, Identity Standards Architect, Microsoft Brock Allen, Software Security Consultant, Solliance OAuth Security Workshop, March 2018, Trento, Italy Logout can mean

More information

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE OUR ORGANISATION AND SPECIALIST SKILLS Focused on delivery, integration and managed services around Identity and Access Management.

More information

API Gateway. Version 7.5.1

API Gateway. Version 7.5.1 O A U T H U S E R G U I D E API Gateway Version 7.5.1 15 September 2017 Copyright 2017 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.5.1 No part

More information