Single Sign-On in In-VIGO: Role-based Access via Delegation Mechanisms Using Short-lived User Identities

Size: px
Start display at page:

Download "Single Sign-On in In-VIGO: Role-based Access via Delegation Mechanisms Using Short-lived User Identities"

Transcription

1 Single Sign-On in In-VIGO: Role-based Access via Delegation Mechanisms Using Short-lived User Identities Sumalatha Adabala, Andréa Matsunaga, Maurício Tsugawa, Renato Figueiredo, José A. B. Fortes ACIS Laboratory, University of Florida, Gainesville, Florida / adabala, ammatsun, tsugawa, renato, fortes@acis.ufl.edu Abstract Single Sign-On (SSO) is an essential desired feature of computational grids. Its implementation is challenging because resources cross administrative domains and are managed by heterogeneous access schemes. This paper presents an approach for Single Sign-On in a deployed functioning grid called In-VIGO. The approach relies on decoupling grid user accounts from local user accounts and making use of role-based access control lists. Rolebased accesses via delegation mechanisms using shortlived user identities enable In-VIGO to handle interactive applications and application-specific authentication mechanisms. This capability is not present in existing grid architectures. SSO implementations for usage scenarios in In-VIGO are described to highlight the applicability of the proposed approach. In particular, access to interactive applications with their own security mechanisms, such as, and access to remote data can be achieved using proxies that delegate In-VIGO user access via short-lived user identities. 1. Introduction One of the main goals of grid computing is to "enable the sharing, selection, and aggregation of a wide variety of geographically distributed computing resources" [1]. Grid resources typically span administrative domains managed by independent authentication and authorization schemes and policies. Single Sign-On (SSO) allows grid users to access all authorized services and resources seamlessly, on the basis of a single authentication that is performed when they initially access the grid. Since the user has to remember only one username/password, and needs to type this information once, user productivity is improved and security breaches due to user behavior, such as users writing down their passwords, are eliminated. Automated access to authorized services and resources, managed by independent authentication systems without user interaction also greatly improve the performance and transparency of grid middleware. Support for SSO in existing grid security architectures is based on: Delegation of user credentials, e.g. proxy credentials with GSI [2], which map directly to local credentials on resources Mapping user credentials to "capabilities", e.g. restricted proxies with CAS [3][4] or resource claims with Secure Highly Available Resource Peering (SHARP) [5], which in turn are mapped to local credentials on resources. All participating sites/entities developing trust channels to share user credential information, e.g..net Passport [5] and the Liberty Alliance approach. Representation of grid user identity information, which is typically based either on username/password pairs (e.g..net Passport [6]) or PKI-based credentials [2][3][4][5], is uniform within each of the above SSO approaches, but is not consistent across them. Virtual computation and information grids such as In- VIGO (the acronym stands for In-Virtual Information Grid Organizations) provide users with services that access virtual resources, which consist of machines, data, applications and networks that are distributed across administrative domains, as well as grids managed by different SSO schemes. This paper presents a novel approach to support SSO in such virtual grids, to enable seamless access to authorized entities as varied as machines, data, applications, networks, and SSO-enabled grids in a uniform manner. It is based on the realization that in virtual grids users do not own resources and their information and computation needs are serviced by transient/virtual entities that meet their quality of service requirements. This allows an approach based on Role- Based Access Control (RBAC) [7], where principals who access entities are grouped into "roles", while "procedures" or "permissions" that describe access policies are defined on the entities, and permissions assigned to

2 roles enable authorization. The virtual grid middleware maps the credentials of a principal to a role, and accesses entities on behalf of the role, via short-lived identities that proxy the role s permissions and are directly authorized by the entity. The translation between the roles and shortlived proxy identities is handled by the middleware, and this decoupling implies that the proposed approach is not tied to any user credential representation or resource access scheme. Finally, with hierarchical rather than system-wide namespaces for roles, mapping between role namespaces of similar principals, provides an elegant solution to overlaying underlying entities. The proposed approach is currently being implemented and evaluated in In-VIGO [11]. User credentials are maintained as username/password pairs, and SSO support in the In-VIGO middleware enables users to: Invoke tool executions on GSI-enabled and SSHenabled resources, via the platform dependent authentication mechanisms, by mapping user roles to UNIX accounts, which can be recycled shadow accounts [7] or temporary accounts created on demand for a job. Access data via filesystem-dependent authorization mechanisms, by using middleware-controlled distributed filesystem proxies [9] that map the shortlived IDs of the jobs running on behalf of the users to their remote data. Access applications that implement their own authentication mechanism, via proxies that provide temporary credentials on behalf of the user. Further, mapping between In-VIGO user roles makes it possible to overlay multiple In-VIGO portals and other portals. The rest of the paper is organized as follows: Section 2 sets the context for this work, including motivation and related work, with an overview of In-VIGO, a virtual grid architecture; Section 3 describes the authentication and authorization scheme for enabling SSO in virtual grids; Section 4 describes the implementation of the proposed approach in In-VIGO; Section 5 evaluates the proposed approach; and finally Section 6, concludes this paper and outlines future work. 2. In-VIGO Overview In-VIGO is an information grid that allows users to run tools in science and engineering on distributed grid resources. Once a user signs onto In-VIGO via a web browser interface, access to distributed resources/entities, i.e. machines, data, networks and applications, initiated due to user actions and requests is managed by the In- VIGO middleware. Accesses to these resources/entities, which may be distributed across administrative domains, are managed by site-specific authentication and authorization schemes and policies. In order to make SSO possible, In-VIGO middleware must translate the privileges associated with a user action/request to the local privileges required to access the resources Virtualization in In-VIGO The In-VIGO approach, as depicted in Figure 1, is to add three layers of virtualization to the traditional grid computing model. These virtualization layers hide implementation specifics in lower layers, and allow gridwide operations that would be impossible otherwise. The first virtualization layer creates pools of virtual resources that are the primitive components of a virtual computing grid, namely virtual machines, virtual data, virtual applications and virtual networks. This layer decouples the process of allocating applications to resources from that of managing jobs across administrative domains, physical machines and local software configurations. In the second layer, grid applications are instantiated as services which can be connected as needed to create virtual information grids. This layer decouples the process of using and composing services from that of managing the execution of the underlying grid applications. In the third layer, aggregated services (possibly presented to users via portals) export interfaces that are virtualized in order to enable displaying by different access devices. This layer decouples the process of generating interfaces of services from the process of rendering them on specific devices Motivation for Delegation via Short-lived User Identities and Related Work SSO offers benefits such as simpler administration, better administrative control, improved user productivity, better network security, and consolidation of heterogeneous networks over multiple sign-on. In this section we present the requirements that motivate the proposed authentication and authorization scheme to enable SSO in In-VIGO. Enabling SSO in grid environments by providing grid users with local user IDs on the resources has prohibitive administrative overheads due to large numbers of transient users. In In-VIGO, users do not own resources and their information and computation needs are serviced by transient/virtual entities composed of virtual networks, data, applications and machines that meet their quality of service requirements. This allows complete decoupling of the grid user from the local user on the resource. The In-VIGO middleware owns the resources, i.e. has local identities on the resources, which are recycled among grid users, i.e. local identities are mapped to grid users for the

3 Grid users Virtual interfaces Portal Portal Portal Portal Virtual information grids Service Service Service Service Virtual computing grids Virtual Machines Virtual Applications Virtual Data Virtual Networks Machines Applications Data Networks Figure 1: High-level view of In-VIGO architecture. duration of resource use. Thus for example, an In-VIGO user does not have an account in any of the machines participating in the grid, and jobs are started by In-VIGO on behalf of the user using local accounts which could be recycled shadow accounts [8] or temporary accounts created on demand for a job. One advantage of this approach is that a grid user is not required to be registered in all administrative domains, reducing administration tasks. Also once registered with In-VIGO, a user can potentially have access to all the grid resources available to In-VIGO. SSO enabled by delegating the grid identity to a local identity via a direct mapping, such as access control list or capability list, has high administrative overheads, due to lack of flexibility, e.g. when updating access privileges, and scalability, e.g. when adding new users and resources. In In-VIGO role-based access delegation mechanisms are used to avoid such overheads. Another benefit of decoupling grid identities from local resource-specific identities is that SSO in In-VIGO is not tied to any user credential representation or resource access scheme. This enables In-VIGO to provide users with interactive access to unmodified applications that implement their own authentication mechanisms (e.g. Virtual Network Computing [10]), as well as other SSOenabled grids. The infrastructures offered by the projects listed below can be integrated into In-VIGO and be used for SSO. It should be noted that none of them offer a complete solution that meet the requirements of In-VIGO: Secure Highly Available Resource Peering (SHARP) [5] is a framework for distributed resource management across trust domains in a planetary scale grid. It supports resource claims based on cryptographically protected records, which assert that specified principals control some resources over designated time intervals, along with secure mechanisms to subdivide and delegate claims across a network of resource managers. Resource-specific site authorities redeem claims held by resource consumers by providing them with access to the required resources. Grid Security Infrastructure (GSI) [2] is an infrastructure based on public key encryption, X.509 certificates, and typically the Transport Layer Security (TLS) protocol [14] to authenticate and

4 authorize users to access resources, supporting delegation, identity mapping and single sign-on. Globus Toolkit version 3 (GT3) includes an implementation of GSI based on web services security protocols and standards [15]. It does not support application specific authentication (e.g. ), and grid user to local user mapping is limited to UNIX accounts. For policy enforcement across administrative domains, Community Authorization Service (CAS) [3][4] can be used. MyProxy [13] is an online credential repository for the grid that provides management of GSI credentials so that users do not need to worry about private keys and certificate files. For example, MyProxy allows grid portals to retrieve proxy credentials on behalf of a user, facilitating the use of grids for users holding credentials from multiple organizations. Since it only manages GSI credentials, MyProxy inherits the limitations of GSI..NET Passport [6] is a SSO infrastructure developed by Microsoft that offers a web service based central authentication server, where participant sites can ask authentication service. It is only concerned with authentication, and does not offer any kind of user mapping. Shibboleth is a joint project of Internet2/MACE and IBM that aims to develop standards-based interinstitutional sharing and controlled access to services available via the web. The current version is implemented as an Apache web server module, and it is oriented to control access to documents available through the web server. Shibboleth focuses on inter-institutional collaboration, and leaves intrainstitutional authentication responsibility to each organization. It requires resources to be accessible through web services, which rules out legacy applications (e.g. ). All of these approaches rely on a uniform resource credential representation, so when resources or applications that implement their own authentication mechanism are integrated, the resources and applications must either be modified, or gateway services that translate credential representations must be implemented. 3. SSO in In-VIGO: Authentication and Authorization Infrastructure The authentication and authorization infrastructure in In-VIGO must provide users with SSO access to services composed of virtual resources, machines, data, applications and networks that span administrative domains, as well as other SSO-enabled grids/services in a uniform manner. This is enabled by completely decoupling In-VIGO user identities from the local identities that are authenticated and authorized by site- or platform-specific schemes, and access resources on behalf of users actions. This decoupling is achieved by using RBAC mechanisms to group users and enforce the access policies of resources Roles of User Actions Within the RBAC framework, In-VIGO principals, i.e. users or actions initiated by users, are grouped into one or more roles. Roles are a collection of permissions or procedures defined on In-VIGO entities, i.e. resources like machines, data, applications, networks or collections of resources like grids. For example, the role tool_x_machine_y_licensed_users groups users with the permissions, such as software license, to run a tool X on machine Y. The In-VIGO administrators and tool installers define one or more role entry conditions, i.e. which users and user actions can enter a role, and how roles interact. The role associated with a user or user action, may be explicitly selected by the user or implicitly associated with an action initiated by the user. For example, a user may select to run a job on a machine Y, and as a result the role machine_y_users is assigned to the job, else the user may specify QOS (memory and processing) requirements for his job that match the available resources on machine Y, and as a result the job is assigned the role machine_y_users. When role entry conditions are conflicting, the role that denies access overrides others in accordance with the principle of least privilege. Thus for example, if a user can belong to a role, access_all_machines, that allows access to all machines at a site, but also belongs to a role, deny_access_subset_x_machines, that is denied access to a subset of machines at the same site, then an action initiated by him is allowed access to any of the machines other than those he is denied access to. Role hierarchies are allowed, i.e. one role can inherit from another. In the previous example, a new role access_subset_y_machines, that inherits from roles access_all_machines and deny_access_subset_x_machines can be defined to describe users who can access machines other than the subset X of machines at the site. Role namespaces are hierarchical, i.e. each entity that defines roles has its own namespace. This is simpler than trying to enforce a single In-VIGO wide namespace for all roles defined on various resources, by resource-specific administrators. Thus for example the role machines:tool_x_users defined on the entity machines, groups users with access to machines with tool X installed, and is distinct from the role applications:tool_x_users defined on the entity applications, which groups users with permission to run tool X.

5 3.2. Permission Groups: Describing Access Policies of Entities Permissions or procedures are access operations defined on the entities/resources in In-VIGO. These can be mapped to access policies that are implemented and enforced by resource-specific authorization schemes. The mapping of roles to permission groups is implemented by the In-VIGO administrator and middleware. For example, a permission group large_data_sets defined on a simulation tool Y describes the operation of running the tool Y with large data sets. In order to allow research users to run simulations with large data sets, the administrator can define a user role (e.g. research_users) that maps to the large_data_sets permission group Short-lived Identities Each permission group, or sets of permission groups defined on a resource or entity are associated with one or more local identities, owned by the In-VIGO middleware, on the resource or entity. These local identities have the access privileges that match the resource access privileges defined by the permission groups. The security component of In-VIGO middleware maps user roles to permission groups, which in turn are mapped to local identities on a given resource. Delegation is accomplished by accessing resources via the local identities on behalf of the In-VIGO user. This is typically enabled by proxies or services in the middleware that provide resources with the local identities for authentication and authorization. The local identities may be recycled among users, or created temporarily ondemand. Local identities or credentials may be capabilities, e.g. restricted GSI proxies, SHARP resource claims, or username/password pairs, e.g..net username and password, to access the resource, so this approach does not tie into a resource access scheme and resources managed by other grid security infrastructure can be integrated into SSO in In-VIGO without any modifications. 4. Implementation Virtualization in In-VIGO creates environments for the applications to run without modification. In some cases, to achieve this goal, the In-VIGO virtualization layer needs to create proxies. These proxies enable In-VIGO middleware to use short-term IDs and offer SSO to end users. The current implementation of In-VIGO supports the following scenarios: Namespace mapping. Mappings via proxies and short-term IDs Namespace Mapping Namespace mapping in In-VIGO is implemented in the information system layer, exchanging user information with other portals. For example, In-VIGO can accept and authenticate users coming from the ACIS web site [12], where researchers have a workspace to discuss ongoing research. This is achieved by the role-based mapping information exchange between the In-VIGO information system and the ACIS web site user management layer, each of which has its own namespace, i.e. roles in In- VIGO hierarchy are distinct from roles defined in the ACIS hierarchy. A similar approach allows overlaying multiple In-VIGO portals over underlying resources. For example, In-VIGO developers access resources via their own instances of the In-VIGO portal by mapping user roles in the developer portals to roles in the main In- VIGO Role Based Access to Application Functionality Requestor (user) (1) Request for authorization, i.e. user logs in (3) Session request + permission groups Policy Resource (Application) (2) User class list Authorization service Figure 2: A push model of authorization is used to implement RBAC of application functionality in In-VIGO. When an In-VIGO user starts a session by selecting an application and explicitly setting one or more user classes, the application session is created, and the user interface module of In-VIGO obtains the corresponding set of application permission groups from the application authorization service. Requests from the user along with the application permission groups, which serves as a capability, are directed to the application session by the user interface module.

6 Shadow account shadow1 NFS client Case (a) File account facc1 export /home/f/x to VDFS proxy mount S1:/home/F/X BackEnd BE1 NFS server Shadow account shadow2 NFS client SSH Case (b) SSH channels SSH VDFS export /home/f/y to mount BE2:/home/F/Y BackEnd BE2 File Server S1 Figure 3: Mapping (a) user X file system to shadow1@be1 (private network scenario) and (b) user Y file system to shadow2@be2 (scenario where communication is protected through tunneling) using VDFS proxies. User privileges determine the functionality of applications accessible through In-VIGO. Thus a user with researcher privileges may be allowed to start parameter sweep jobs with a simulator tool, while a user with regular user privileges may be allowed execute single jobs with the same tool. RBAC of applications is achieved by mapping users into one or more user classes, i.e. roles, and assigning application permission groups to roles, where permission groups predicate application functions/features Proxies to Authenticate and Authorize Shortterm IDs Virtual Distributed File System (VDFS): Shortterm ID to User data mapping In-VIGO uses shadow accounts in resources available in the grid to execute grid user jobs. Since shadow accounts are recyclable, they need to have access to data belonging to any grid user. However, no shadow account should have access to grid user data other than that owned by the user assigned to the shadow account. VDFS provides the necessary isolation between users in regard to data access, allowing a shadow account (shortterm ID) to have access to user data. If user data is needed across administrative or physical domains, thus traversing the internet, the privacy and session-key authentication can be guaranteed by the use of secure tunnels for the necessary communication : User to short-term ID mapping Virtual Network Computing () [10] is a remote display system which allows users to view computing environments on the internet. enables In-VIGO to offer applications that need a graphical user interface (GUI) to grid users. is a client/server application: the server receives keyboard and mouse inputs from the client, and transmits display information. The server is started by In-VIGO using a shadow account. client runs in the client browser (as an applet) driven by the grid user. server requires user authentication, so the grid user needs to be mapped to the shadow account (short-term ID) that is running the server. When starting server, In-VIGO generates a random password, and sets appropriate credentials in a hidden place in the In-VIGO portal. In-VIGO only presents this location (containing credentials to authenticate to the server) to the appropriate grid user. The grid user only needs to access this location to download the client applet with the correct credentials.

7 User Web Server In-VIGO Backend Web Browser Request (HTTPS) HTML Apache (Reverse proxy) Request (HTTP) HTML Web Server Applet protocol Port Forwarding protocol Server Public network Private network Figure 4: Single Sign-On in In-VIGO Collaborative environments: mapping multiple grid users to short-term ID The mapping of grid users to short-term IDs, as described in section 0, makes another interesting application possible: the virtual shared workspace. By creating multiple credentials (one for each participant of a working group) to be accepted in server authentication, In-VIGO can create a virtual environment where users can share a desktop. The server provides native support for shared devices, multiplexing the input (keyboard, output) from different clients, and multicasting the output (display) to each user s client. The sharing of basic I/O devices for user interactivity can therefore be leveraged from the -based setup described in 0. In addition, proxy-based mappings for virtual distributed file system mount points can complement this setup by providing mechanisms for dynamic many-to-one mappings of shadow accounts (short-term user ID) to file accounts (data repositories), enabling collaboration also to take place across user file systems. 5. Evaluation Feasibility and Deployability: all case scenarios presented in this paper are successfully being used in the deployed In-VIGO system. Authentication Security Strengthening: the authentication mechanism of the original underling system is maintained and in some cases it is strengthened because short-term credentials are seamlessly created in behalf of the user in a way that the user does not need to repeatedly type or keep different passwords. Granularity and Extensibility: In-VIGO is able to provide finer-grain resource access control than existing solutions since all primary resources (machines, applications, data, and networks) can be separately accessed; In-VIGO allows policies to be flexibly and extensively defined. Privacy considerations: In-VIGO uses shadow accounts when running jobs in grid resources. Only the In-VIGO resource management layer knows the mapping between grid users to shadow accounts. Also, in some cases, In-VIGO encapsulates shadow accounts in a virtual resource. In this environment, grid users do not have a way of knowing what other grid users are doing. Accountability: while maintaining good privacy between grid users, In-VIGO resource management can keep track of all actions requested by a user and all jobs successfully executed. 6. Conclusions and Future Work This paper describes a security architecture to enable SSO for virtual grids that uses delegation mechanisms via short-lived user identities to uniformly support diverse resource access schemes, and role-based access to decouple users from resource policy providers. Case studies of SSO support for grid usage scenarios in the context of In-VIGO were presented. In the current implementation, mapping of users to roles and mapping of roles to permissions are created and maintained in a non-standard format, in a centralized information system by the In-VIGO administrator. Future work will look at existing standard formats such as SAML for managing the information. The security component that implements this mapping currently provides a Java

8 based API to other implicitly trusted components of the In- VIGO middleware. This component can be implemented as a secure grid service. The language and platform independence enabled by this will allow grid middleware, other than In-VIGO, to leverage the proposed SSO approach. Caching of the short-lived IDs maybe required to amortize the overheads introduced by the grid services approach. On-going research is investigating these aspects. 7. Acknowledgements This material is based upon work supported by the National Science Foundation under Grants No. EIA , EIA , ACI , EEC and NSF Middleware Initiative (NMI) collaborative grants ANI /ANI , and by the Army Research Office Defense University Research Initiative in Nanotechnology. The authors also acknowledge two SUR grants from IBM and a gift from VMware Corporation. Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation, Army Research Office, IBM, or VMware. References [1] Grid Computing Info Centre, <URL: [2] R. Butler, D. Engert, I. Foster, C. Kesselman, S. Tuecke, J. Volmer, and V. Welch, Design and deployment of a national scale authentication infrastructure, IEEE Computer, 33(12):60-66, [3] Pearlman, L., Welch, V., Foster, I., Kesselman, C., Tuecke, S., The Community Authorization Service: Status and Future, CHEP [4] Pearlman, L., Welch, V., Foster, I., Kesselman, C. and Tuecke, S., A Community Authorization Service for Group Collaboration, IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, [5] J. Chase, B. Chun, Y. Fu, S. Schwab, and A. Vahdat, Sharp: An architecture for secure resource peering. [6] Microsoft, Microsoft.NET passport Review Guide, June 2003, <URL: de.asp>. [7] J. Barkley, Comparing Simple Role Based Access Control Models and Access Control Lists, Proceedings of the Second ACM Workshop on Role Based Access Control, November [8] R. J. Figueiredo, J. A. B. Fortes, R. Eigenmann, N. H. Kapadia, S. Adabala, J. Miguel-Alonso, V. Taylor, M. Livny, L. Vidal, and J. Chen, A Network-Computing Infrastructure for Tool Experimentation Applied to Computer Architecture Education, Workshop on Computer Architecture Education at the 27th Annual International Symposium on Computer Architecture (ISCA'2000), June 2000, Vancouver, Canada. [9] R. J. Figueiredo, N. H. Kapadia, and J. A. B. Fortes. The PUNCH virtual file system: Seamless access to decentralized storage services in a computational grid, In Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing (HPDC'01), San Francisco, California, August [10] T. Richardson, Q. Stafford-Fraser, K. R. Wood, and A. Hopper, "Virtual Network Computing", IEEE Internet Computing, Vol., No. 1, 1-2/1998. [11] The In-VIGO Portal <URL: [12] The ACIS web site <URL: [13] J. Novotny, S. Tuecke, and V. Welch, An Online Credential Repository for the Grid: MyProxy, Proceedings of the Tenth International Symposium on High Performance Distributed Computing (HPDC-10), IEEE Press, August [14] T. Dierks and C. Allen, "The TLS Protocol, Version 1.0", RFC 2246, January 1999, <URL:ftp://ftp.ietf.org/rfc/rfc2246.txt> [15] V. Welch, F. Siebenlist, I. Foster, J. Bresnahan, K. Czajkowski, J. Gawor, C. Kesselman, S. Meder, L. Pearlman, and S. Tuecke, Security for Grid Services, Twelfth International Symposium on High Performance Distributed Computing (HPDC-12), IEEE Press, June [16] M. Erdos and S. Cantor, Shibboleth-Architecture DRAFT v05, May. 2002, <URL:

Credentials Management for Authentication in a Grid-Based E-Learning Platform

Credentials Management for Authentication in a Grid-Based E-Learning Platform Credentials Management for Authentication in a Grid-Based E-Learning Platform Felicia Ionescu, Vlad Nae, Alexandru Gherega University Politehnica of Bucharest {fionescu, vnae, agherega}@tech.pub.ro Abstract

More information

UNICORE Globus: Interoperability of Grid Infrastructures

UNICORE Globus: Interoperability of Grid Infrastructures UNICORE : Interoperability of Grid Infrastructures Michael Rambadt Philipp Wieder Central Institute for Applied Mathematics (ZAM) Research Centre Juelich D 52425 Juelich, Germany Phone: +49 2461 612057

More information

ShibVomGSite: A Framework for Providing Username and Password Support to GridSite with Attribute based Authorization using Shibboleth and VOMS

ShibVomGSite: A Framework for Providing Username and Password Support to GridSite with Attribute based Authorization using Shibboleth and VOMS ShibVomGSite: A Framework for Providing Username and Password Support to GridSite with Attribute based Authorization using Shibboleth and VOMS Joseph Olufemi Dada & Andrew McNab School of Physics and Astronomy,

More information

J. Basney, NCSA Category: Experimental October 10, MyProxy Protocol

J. Basney, NCSA Category: Experimental October 10, MyProxy Protocol GWD-E J. Basney, NCSA Category: Experimental October 10, 2005 MyProxy Protocol Status of This Memo This memo provides information to the Grid community. Distribution is unlimited. Copyright Notice Copyright

More information

Distributed File System Support for Virtual Machines in Grid Computing

Distributed File System Support for Virtual Machines in Grid Computing Distributed File System Support for Virtual Machines in Grid Computing Ming Zhao, Jian Zhang, Renato Figueiredo Advanced Computing and Information Systems Electrical and Computer Engineering University

More information

An authorization Framework for Grid Security using GT4

An authorization Framework for Grid Security using GT4 www.ijcsi.org 310 An authorization Framework for Grid Security using GT4 Debabrata Singh 1, Bhupendra Gupta 2,B.M.Acharya 3 4, Sarbeswar Hota S O A University, Bhubaneswar Abstract A Grid system is a Virtual

More information

A Roadmap for Integration of Grid Security with One-Time Passwords

A Roadmap for Integration of Grid Security with One-Time Passwords A Roadmap for Integration of Grid Security with One-Time Passwords April 18, 2004 Jim Basney, Von Welch, Frank Siebenlist jbasney@ncsa.uiuc.edu, franks@mcs.anl.gov, vwelch@ncsa.uiuc.edu 1 Introduction

More information

Jithendar Paladugula, Ming Zhao, Renato Figueiredo

Jithendar Paladugula, Ming Zhao, Renato Figueiredo Support for Data-Intensive, Variable- Granularity Grid Applications via Distributed File System Virtualization: A Case Study of Light Scattering Spectroscopy Jithendar Paladugula, Ming Zhao, Renato Figueiredo

More information

A Multipolicy Authorization Framework for Grid Security

A Multipolicy Authorization Framework for Grid Security A Multipolicy Authorization Framework for Grid Security Bo Lang,,2 Ian Foster,,3 Frank Siebenlist,,3 Rachana Ananthakrishnan, Tim Freeman,3 Mathematics and Computer Science Division, Argonne National Laboratory,

More information

A User-level Secure Grid File System

A User-level Secure Grid File System A User-level Secure Grid File System Ming Zhao, Renato J. Figueiredo Advanced Computing and Information Systems (ACIS) Electrical and Computer Engineering University of Florida {ming, renato}@acis.ufl.edu

More information

GLOBUS TOOLKIT SECURITY

GLOBUS TOOLKIT SECURITY GLOBUS TOOLKIT SECURITY Plamen Alexandrov, ISI Masters Student Softwarepark Hagenberg, January 24, 2009 TABLE OF CONTENTS Introduction (3-5) Grid Security Infrastructure (6-15) Transport & Message-level

More information

Dynamic Creation and Management of Runtime Environments in the Grid

Dynamic Creation and Management of Runtime Environments in the Grid Dynamic Creation and Management of Runtime Environments in the Grid Kate Keahey keahey@mcs.anl.gov Matei Ripeanu matei@cs.uchicago.edu Karl Doering kdoering@cs.ucr.edu 1 Introduction Management of complex,

More information

Science gateways made easy: the In-VIGO approach

Science gateways made easy: the In-VIGO approach Science gateways made easy: the In-VIGO approach A. Matsunaga, M. Tsugawa, S. Adabala, R. Figueiredo, H. Lam and J. Fortes Advanced Computing and Information Systems Laboratory University of Florida June

More information

A RESOURCE MANAGEMENT FRAMEWORK FOR INTERACTIVE GRIDS

A RESOURCE MANAGEMENT FRAMEWORK FOR INTERACTIVE GRIDS A RESOURCE MANAGEMENT FRAMEWORK FOR INTERACTIVE GRIDS Raj Kumar, Vanish Talwar, Sujoy Basu Hewlett-Packard Labs 1501 Page Mill Road, MS 1181 Palo Alto, CA 94304 USA { raj.kumar,vanish.talwar,sujoy.basu}@hp.com

More information

An OGSI CredentialManager Service Jim Basney a, Shiva Shankar Chetan a, Feng Qin a, Sumin Song a, Xiao Tu a, and Marty Humphrey b

An OGSI CredentialManager Service Jim Basney a, Shiva Shankar Chetan a, Feng Qin a, Sumin Song a, Xiao Tu a, and Marty Humphrey b UK Workshop on Grid Security Experiences, Oxford 8th and 9th July 2004 An OGSI CredentialManager Service Jim Basney a, Shiva Shankar Chetan a, Feng Qin a, Sumin Song a, Xiao Tu a, and Marty Humphrey b

More information

Authorization Strategies for Virtualized Environments in Grid Computing Systems

Authorization Strategies for Virtualized Environments in Grid Computing Systems Authorization Strategies for Virtualized Environments in Grid Computing Systems Xinming Ou Anna Squicciarini Sebastien Goasguen Elisa Bertino Purdue University Abstract The development of adequate security

More information

Supporting Application- Tailored Grid File System Sessions with WSRF-Based Services

Supporting Application- Tailored Grid File System Sessions with WSRF-Based Services Supporting Application- Tailored Grid File System Sessions with WSRF-Based Services Ming Zhao, Vineet Chadha, Renato Figueiredo Advanced Computing and Information Systems Electrical and Computer Engineering

More information

A VO-friendly, Community-based Authorization Framework

A VO-friendly, Community-based Authorization Framework A VO-friendly, Community-based Authorization Framework Part 1: Use Cases, Requirements, and Approach Ray Plante and Bruce Loftis NCSA Version 0.1 (February 11, 2005) Abstract The era of massive surveys

More information

INDIGO AAI An overview and status update!

INDIGO AAI An overview and status update! RIA-653549 INDIGO DataCloud INDIGO AAI An overview and status update! Andrea Ceccanti (INFN) on behalf of the INDIGO AAI Task Force! indigo-aai-tf@lists.indigo-datacloud.org INDIGO Datacloud An H2020 project

More information

GAMA: Grid Account Management Architecture

GAMA: Grid Account Management Architecture GAMA: Grid Account Management Architecture Karan Bhatia, Sandeep Chandra, Kurt Mueller San Diego Supercomputer Center {karan,chandras,kurt}@sdsc.edu Abstract Security is a critical component of grid systems

More information

DEPLOYING MULTI-TIER APPLICATIONS ACROSS MULTIPLE SECURITY DOMAINS

DEPLOYING MULTI-TIER APPLICATIONS ACROSS MULTIPLE SECURITY DOMAINS DEPLOYING MULTI-TIER APPLICATIONS ACROSS MULTIPLE SECURITY DOMAINS Igor Balabine, Arne Koschel IONA Technologies, PLC 2350 Mission College Blvd #1200 Santa Clara, CA 95054 USA {igor.balabine, arne.koschel}

More information

Globus Toolkit Firewall Requirements. Abstract

Globus Toolkit Firewall Requirements. Abstract Globus Toolkit Firewall Requirements v0.3 8/30/2002 Von Welch Software Architect, Globus Project welch@mcs.anl.gov Abstract This document provides requirements and guidance to firewall administrators at

More information

Using the MyProxy Online Credential Repository

Using the MyProxy Online Credential Repository Using the MyProxy Online Credential Repository Jim Basney National Center for Supercomputing Applications University of Illinois jbasney@ncsa.uiuc.edu What is MyProxy? Independent Globus Toolkit add-on

More information

The Community Authorization Service: Status and Future

The Community Authorization Service: Status and Future The Authorization Service: Status and Future L. Pearlman, C. Kesselman USC Information Sciences Institute, Marina del Rey, CA V. Welch, I. Foster, S. Tuecke Argonne National Laboratory, Argonne, IL Virtual

More information

Authentication for Virtual Organizations: From Passwords to X509, Identity Federation and GridShib BRIITE Meeting Salk Institute, La Jolla CA.

Authentication for Virtual Organizations: From Passwords to X509, Identity Federation and GridShib BRIITE Meeting Salk Institute, La Jolla CA. Authentication for Virtual Organizations: From Passwords to X509, Identity Federation and GridShib BRIITE Meeting Salk Institute, La Jolla CA. November 3th, 2005 Von Welch vwelch@ncsa.uiuc.edu Outline

More information

Credential Management in the Grid Security Infrastructure. GlobusWorld Security Workshop January 16, 2003

Credential Management in the Grid Security Infrastructure. GlobusWorld Security Workshop January 16, 2003 Credential Management in the Grid Security Infrastructure GlobusWorld Security Workshop January 16, 2003 Jim Basney jbasney@ncsa.uiuc.edu http://www.ncsa.uiuc.edu/~jbasney/ Credential Management Enrollment:

More information

USING SAML TO LINK THE GLOBUS TOOLKIT TO THE PERMIS AUTHORISATION INFRASTRUCTURE

USING SAML TO LINK THE GLOBUS TOOLKIT TO THE PERMIS AUTHORISATION INFRASTRUCTURE USING SAML TO LINK THE GLOBUS TOOLKIT TO THE PERMIS AUTHORISATION INFRASTRUCTURE David Chadwick 1, Sassa Otenko 1, Von Welch 2 1 ISI, University of Salford, Salford, M5 4WT, England. 2 National Center

More information

A Guanxi Shibboleth based Security Infrastructure for e-social Science

A Guanxi Shibboleth based Security Infrastructure for e-social Science A Guanxi Shibboleth based Security Infrastructure for e-social Science Wei Jie 1 Alistair Young 2 Junaid Arshad 3 June Finch 1 Rob Procter 1 Andy Turner 3 1 University of Manchester, UK 2 UHI Millennium

More information

A AAAA Model to Support Science Gateways with Community Accounts

A AAAA Model to Support Science Gateways with Community Accounts A AAAA Model to Support Science Gateways with Community Accounts Von Welch 1, Jim Barlow, James Basney, Doru Marcusiu NCSA 1 Introduction Science gateways have emerged as a concept for allowing large numbers

More information

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University Identity Management and Federated ID (Liberty Alliance) ISA 767, Secure Electronic Commerce Xinwen Zhang, xzhang6@gmu.edu George Mason University Identity Identity is the fundamental concept of uniquely

More information

[GSoC Proposal] Securing Airavata API

[GSoC Proposal] Securing Airavata API [GSoC Proposal] Securing Airavata API TITLE: Securing AIRAVATA API ABSTRACT: The goal of this project is to design and implement the solution for securing AIRAVATA API. Particularly, this includes authenticating

More information

Role-Based Access Control for the Open Grid Services Architecture - Data Access and Integration (OGSA-DAI)

Role-Based Access Control for the Open Grid Services Architecture - Data Access and Integration (OGSA-DAI) Wright State University CORE Scholar Browse all Theses and Dissertations Theses and Dissertations 2007 Role-Based Access Control for the Open Grid Services Architecture - Data Access and Integration (OGSA-DAI)

More information

Virtual Machine Systems

Virtual Machine Systems Virtual Machine Systems Question Can a small operating system simulate the hardware of some machine so that Another operating system can run in that simulated hardware? More than one instance of that operating

More information

UGP and the UC Grid Portals

UGP and the UC Grid Portals UGP and the UC Grid Portals OGF 2007 Documentation at: http://www.ucgrid.org Prakashan Korambath & Joan Slottow Research Computing Technologies UCLA UGP (UCLA Grid Portal) Joins computational clusters

More information

CILogon Project

CILogon Project CILogon Project GlobusWORLD 2010 Jim Basney jbasney@illinois.edu National Center for Supercomputing Applications University of Illinois at Urbana-Champaign This material is based upon work supported by

More information

Sentinet for Microsoft Azure SENTINET

Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Cloud Deployment Model... 3 Hybrid Deployment Model...

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Guidelines on non-browser access

Guidelines on non-browser access Published Date: 13-06-2017 Revision: 1.0 Work Package: Document Code: Document URL: JRA1 AARC-JRA1.4F https://aarc-project.eu/wp-content/uploads/2017/03/aarc-jra1.4f.pdf 1 Table of Contents 1 Introduction

More information

Goal. TeraGrid. Challenges. Federated Login to TeraGrid

Goal. TeraGrid. Challenges. Federated Login to TeraGrid Goal Federated Login to Jim Basney Terry Fleury Von Welch Enable researchers to use the authentication method of their home organization for access to Researchers don t need to use -specific credentials

More information

Identity-Enabled Web Services

Identity-Enabled Web Services Identity-Enabled s Standards-based identity for 2.0 today Overview s are emerging as the preeminent method for program-toprogram communication across corporate networks as well as the Internet. Securing

More information

Leveraging the InCommon Federation to access the NSF TeraGrid

Leveraging the InCommon Federation to access the NSF TeraGrid Leveraging the InCommon Federation to access the NSF TeraGrid Jim Basney Senior Research Scientist National Center for Supercomputing Applications University of Illinois at Urbana-Champaign jbasney@ncsa.uiuc.edu

More information

Grids and Security. Ian Neilson Grid Deployment Group CERN. TF-CSIRT London 27 Jan

Grids and Security. Ian Neilson Grid Deployment Group CERN. TF-CSIRT London 27 Jan Grids and Security Ian Neilson Grid Deployment Group CERN TF-CSIRT London 27 Jan 2004-1 TOC Background Grids Grid Projects Some Technical Aspects The three or four A s Some Operational Aspects Security

More information

IVOA/AstroGrid SSO system and Grid standards

IVOA/AstroGrid SSO system and Grid standards IVOA/AstroGrid SSO system and Grid standards Guy Rixon and Keith Noddle Presentation to Astro-RG at GGF17 IVOA/AstroGrid SSO system and Grid standards; Astro-RG session, GGF17, Tokyo, May 2006 Slide 1

More information

Integrating Legacy Authorization Systems into the Grid: A Case Study Leveraging AzMan and ADAM

Integrating Legacy Authorization Systems into the Grid: A Case Study Leveraging AzMan and ADAM Integrating Legacy Authorization Systems into the Grid: A Case Study Leveraging AzMan and ADAM Weide Zhang, David Del Vecchio, Glenn Wasson and Marty Humphrey Department of Computer Science, University

More information

Novell Access Manager 3.1

Novell Access Manager 3.1 Technical White Paper IDENTITY AND SECURITY www.novell.com Novell Access Manager 3.1 Access Control, Policy Management and Compliance Assurance Novell Access Manager 3.1 Table of Contents: 2..... Complete

More information

Liferay Security Features Overview. How Liferay Approaches Security

Liferay Security Features Overview. How Liferay Approaches Security Liferay Security Features Overview How Liferay Approaches Security Table of Contents Executive Summary.......................................... 1 Transport Security............................................

More information

RB-GACA: A RBAC based Grid Access Control Architecture

RB-GACA: A RBAC based Grid Access Control Architecture RB-GACA: A RBAC based Grid Access Control Architecture Weizhong Qiang, Hai Jin, Xuanhua Shi, Deqing Zou, Hao Zhang Cluster and Grid Computing Lab Huazhong University of Science and Technology, Wuhan, 430074,

More information

THE GLOBUS PROJECT. White Paper. GridFTP. Universal Data Transfer for the Grid

THE GLOBUS PROJECT. White Paper. GridFTP. Universal Data Transfer for the Grid THE GLOBUS PROJECT White Paper GridFTP Universal Data Transfer for the Grid WHITE PAPER GridFTP Universal Data Transfer for the Grid September 5, 2000 Copyright 2000, The University of Chicago and The

More information

30 Nov Dec Advanced School in High Performance and GRID Computing Concepts and Applications, ICTP, Trieste, Italy

30 Nov Dec Advanced School in High Performance and GRID Computing Concepts and Applications, ICTP, Trieste, Italy Advanced School in High Performance and GRID Computing Concepts and Applications, ICTP, Trieste, Italy Why the Grid? Science is becoming increasingly digital and needs to deal with increasing amounts of

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications

More information

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources Workspace ONE UEM v9.6 Have documentation feedback? Submit a Documentation Feedback

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name:_Unversity of Regina Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

Supporting Secure Ad-hoc User Collaboration in Grid Environments

Supporting Secure Ad-hoc User Collaboration in Grid Environments Supporting Secure Ad-hoc User Collaboration in Grid Environments HPDC11 Paper Abstract Markus Lorch, Dennis Kafura Department of Computer Science Virginia Tech Contact e-mail: mlorch@vt.edu Abstract We

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources being accessed, and that Participants

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

Grid Computing Security hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 1

Grid Computing Security hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 1 Grid Computing Security 20.10.2006 hack.lu 2006 :: Security in Grid Computing :: Lisa Thalheim 1 What to expect from this talk Collection of bits about GC I thought you might find interesting Mixed bag:

More information

Sentinet for Windows Azure VERSION 2.2

Sentinet for Windows Azure VERSION 2.2 Sentinet for Windows Azure VERSION 2.2 Sentinet for Windows Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Isolated Deployment Model... 3 Collocated Deployment Model...

More information

Implementing Secure Socket Layer

Implementing Secure Socket Layer This module describes how to implement SSL. The Secure Socket Layer (SSL) protocol and Transport Layer Security (TLS) are application-level protocols that provide for secure communication between a client

More information

Architecture Assessment Case Study. Single Sign on Approach Document PROBLEM: Technology for a Changing World

Architecture Assessment Case Study. Single Sign on Approach Document PROBLEM: Technology for a Changing World Technology for a Changing World Architecture Assessment Case Study Single Sign on Approach Document PROBLEM: Existing portal has Sign on Capabilities based on the SQL Server database and it s not having

More information

Grid Architectural Models

Grid Architectural Models Grid Architectural Models Computational Grids - A computational Grid aggregates the processing power from a distributed collection of systems - This type of Grid is primarily composed of low powered computers

More information

A Novel Adaptive Proxy Certificates Management Scheme in Military Grid Environment*

A Novel Adaptive Proxy Certificates Management Scheme in Military Grid Environment* A Novel Adaptive Proxy Certificates Management Scheme in Military Grid Environment* Ying Liu, Jingbo Xia, and Jing Dai Telecommunication Engineering Institute, Air Force Engineering University, Xi an,

More information

XSEDE Canonical Use Case 4 Interactive Login

XSEDE Canonical Use Case 4 Interactive Login XSEDE Canonical Use Case 4 Interactive Login Architectural Response Table of Contents Contents Introduction Structure of this Document Canonical Use Case 4 Architectural Response Quality of Service Attributes

More information

DIRAC Distributed Secure Framework

DIRAC Distributed Secure Framework DIRAC Distributed Secure Framework A Casajus Universitat de Barcelona E-mail: adria@ecm.ub.es R Graciani Universitat de Barcelona E-mail: graciani@ecm.ub.es on behalf of the LHCb DIRAC Team Abstract. DIRAC,

More information

Large Scale Sky Computing Applications with Nimbus

Large Scale Sky Computing Applications with Nimbus Large Scale Sky Computing Applications with Nimbus Pierre Riteau Université de Rennes 1, IRISA INRIA Rennes Bretagne Atlantique Rennes, France Pierre.Riteau@irisa.fr INTRODUCTION TO SKY COMPUTING IaaS

More information

Performance of Cryptographic Protocols for High-Performance, High-Bandwidth and High-Latency Grid Systems

Performance of Cryptographic Protocols for High-Performance, High-Bandwidth and High-Latency Grid Systems Performance of Cryptographic Protocols for High-Performance, High-Bandwidth and High-Latency Grid Systems Himanshu Khurana, Radostina Koleva and Jim Basney National Center for Supercomputing Applications

More information

OGCE User Guide for OGCE Release 1

OGCE User Guide for OGCE Release 1 OGCE User Guide for OGCE Release 1 1 Publisher s Note Release 2 begins the migration to open standards portlets. The following has been published by the Open Grids Computing Environment: OGCE Release 2

More information

Experiences using Bridge CAs for Grids Jim Jokl a, Jim Basney b, and Marty Humphrey a

Experiences using Bridge CAs for Grids Jim Jokl a, Jim Basney b, and Marty Humphrey a UK Workshop on Grid Security Experiences, Oxford 8th and 9th July 2004 Experiences using Bridge CAs for Grids Jim Jokl a, Jim Basney b, and Marty Humphrey a a University of Virginia, Charlottesville, VA,

More information

Identity, Authentication and Authorization. John Slankas

Identity, Authentication and Authorization. John Slankas Identity, Authentication and Authorization John Slankas jbslanka@ncsu.edu Identity Who or what a person or thing is; a distinct impression of a single person or thing presented to or perceived by others;

More information

Day 1 : August (Thursday) An overview of Globus Toolkit 2.4

Day 1 : August (Thursday) An overview of Globus Toolkit 2.4 An Overview of Grid Computing Workshop Day 1 : August 05 2004 (Thursday) An overview of Globus Toolkit 2.4 By CDAC Experts Contact :vcvrao@cdacindia.com; betatest@cdacindia.com URL : http://www.cs.umn.edu/~vcvrao

More information

THE VEGA PERSONAL GRID: A LIGHTWEIGHT GRID ARCHITECTURE

THE VEGA PERSONAL GRID: A LIGHTWEIGHT GRID ARCHITECTURE THE VEGA PERSONAL GRID: A LIGHTWEIGHT GRID ARCHITECTURE Wei Li, Zhiwei Xu, Bingchen Li, Yili Gong Institute of Computing Technology of Chinese Academy of Sciences Beijing China, 100080 {zxu, liwei, libingchen,

More information

THEBES: THE GRID MIDDLEWARE PROJECT Project Overview, Status Report and Roadmap

THEBES: THE GRID MIDDLEWARE PROJECT Project Overview, Status Report and Roadmap THEBES: THE GRID MIDDLEWARE PROJECT Project Overview, Status Report and Roadmap Arnie Miles Georgetown University adm35@georgetown.edu http://thebes.arc.georgetown.edu The Thebes middleware project was

More information

ArcGIS Server and Portal for ArcGIS An Introduction to Security

ArcGIS Server and Portal for ArcGIS An Introduction to Security ArcGIS Server and Portal for ArcGIS An Introduction to Security Jeff Smith & Derek Law July 21, 2015 Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context

More information

Using the Horizon vrealize Orchestrator Plug-In

Using the Horizon vrealize Orchestrator Plug-In Using the Horizon vrealize Orchestrator Plug-In VMware Horizon 6 version 6.2.3, VMware Horizon 7 versions 7.0.3 and later Modified on 4 JAN 2018 VMware Horizon 7 7.4 You can find the most up-to-date technical

More information

glite Grid Services Overview

glite Grid Services Overview The EPIKH Project (Exchange Programme to advance e-infrastructure Know-How) glite Grid Services Overview Antonio Calanducci INFN Catania Joint GISELA/EPIKH School for Grid Site Administrators Valparaiso,

More information

A Distributed Media Service System Based on Globus Data-Management Technologies1

A Distributed Media Service System Based on Globus Data-Management Technologies1 A Distributed Media Service System Based on Globus Data-Management Technologies1 Xiang Yu, Shoubao Yang, and Yu Hong Dept. of Computer Science, University of Science and Technology of China, Hefei 230026,

More information

Enterprise SOA Experience Workshop. Module 8: Operating an enterprise SOA Landscape

Enterprise SOA Experience Workshop. Module 8: Operating an enterprise SOA Landscape Enterprise SOA Experience Workshop Module 8: Operating an enterprise SOA Landscape Agenda 1. Authentication and Authorization 2. Web Services and Security 3. Web Services and Change Management 4. Summary

More information

SAP Security in a Hybrid World. Kiran Kola

SAP Security in a Hybrid World. Kiran Kola SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal

More information

Business White Paper IDENTITY AND SECURITY. Access Manager. Novell. Comprehensive Access Management for the Enterprise

Business White Paper IDENTITY AND SECURITY.  Access Manager. Novell. Comprehensive Access Management for the Enterprise Business White Paper IDENTITY AND SECURITY Novell Access Manager Comprehensive Access Management for the Enterprise Simple, Secure Access to Network Resources Business Driver 1: Cost Novell Access Manager

More information

Identität und Autorisierung als Grundlage für sichere Web-Services. Dr. Hannes P. Lubich IT Security Strategist

Identität und Autorisierung als Grundlage für sichere Web-Services. Dr. Hannes P. Lubich IT Security Strategist Identität und Autorisierung als Grundlage für sichere Web-Services Dr. Hannes P. Lubich IT Security Strategist The Web Services Temptation For every $1 spent on software $3 to $5 is spent on integration

More information

EnterSpace Data Sheet

EnterSpace Data Sheet EnterSpace 7.0.4.3 Data Sheet ENTERSPACE BUNDLE COMPONENTS Policy Engine The policy engine is the heart of EnterSpace. It evaluates digital access control policies and makes dynamic, real-time decisions

More information

Management Intranet: Integrating Web-based Network Management Applications

Management Intranet: Integrating Web-based Network Management Applications Management Intranet: Integrating Web-based Network Management Applications Jim Turner Cisco Systems Inc. 125 Rio Robles San Jose, CA 95134 USA jiturner@cisco.com Swami Jayaraman Cisco Systems Inc. 125

More information

Distributed Data Management with Storage Resource Broker in the UK

Distributed Data Management with Storage Resource Broker in the UK Distributed Data Management with Storage Resource Broker in the UK Michael Doherty, Lisa Blanshard, Ananta Manandhar, Rik Tyer, Kerstin Kleese @ CCLRC, UK Abstract The Storage Resource Broker (SRB) is

More information

Report. Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution

Report. Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution CERN-ACC-2013-0237 Wojciech.Sliwinski@cern.ch Report Middleware Proxy: A Request-Driven Messaging Broker For High Volume Data Distribution W. Sliwinski, I. Yastrebov, A. Dworak CERN, Geneva, Switzerland

More information

Grid Computing Fall 2005 Lecture 5: Grid Architecture and Globus. Gabrielle Allen

Grid Computing Fall 2005 Lecture 5: Grid Architecture and Globus. Gabrielle Allen Grid Computing 7700 Fall 2005 Lecture 5: Grid Architecture and Globus Gabrielle Allen allen@bit.csc.lsu.edu http://www.cct.lsu.edu/~gallen Concrete Example I have a source file Main.F on machine A, an

More information

John Heimann Director, Security Product Management Oracle Corporation

John Heimann Director, Security Product Management Oracle Corporation John Heimann Director, Security Product Management Oracle Corporation Oracle9i Application Server v2 Security What s an Application Server? Development and deployment environment Web(HTML,XML,SOAP) J2EE

More information

Ramnish Singh IT Advisor Microsoft Corporation Session Code:

Ramnish Singh IT Advisor Microsoft Corporation Session Code: Ramnish Singh IT Advisor Microsoft Corporation Session Code: Agenda Microsoft s Identity and Access Strategy Geneva Claims Based Access User access challenges Identity Metasystem and claims solution Introducing

More information

UCLA Grid Portal (UGP) A Globus Incubator Project

UCLA Grid Portal (UGP) A Globus Incubator Project UCLA Grid Portal (UGP) A Globus Incubator Project OGF 2007 Documentation at: http://www.ucgrid.org Prakashan Korambath & Joan Slottow Research Computing Technologies UCLA Academic Technology Services UGP

More information

Identity management. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014

Identity management. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014 Identity management Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 Outline 1. Single sign-on 2. SAML and Shibboleth 3. OpenId 4. OAuth 5. (Corporate IAM) 6. Strong identity 2

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources being accessed, and that Participants

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources being accessed, and that Participants

More information

Oracle Communications Services Gatekeeper

Oracle Communications Services Gatekeeper Oracle Communications Services Gatekeeper Security Guide Release 5.1 E36134-01 June 2013 Oracle Communications Services Gatekeeper Security Guide, Release 5.1 E36134-01 Copyright 2011, 2013, Oracle and/or

More information

Middleware Integration and Deployment Strategies for Cyberinfrastructures

Middleware Integration and Deployment Strategies for Cyberinfrastructures Middleware Integration and Deployment Strategies for Cyberinfrastructures Sebastien Goasguen 1, Krishna Madhavan 1, David Wolinsky 2, Renato Figueiredo 2, Jaime Frey 3, Alain Roy 3, Paul Ruth 4 and Dongyan

More information

Science Clouds: Early Experiences in Cloud Computing for Scientific Applications

Science Clouds: Early Experiences in Cloud Computing for Scientific Applications Science Clouds: Early Experiences in Cloud Computing for Scientific Applications Chicago, October 2008 Kate Keahey, Renato Figueiredo, Jose Fortes, Tim Freeman, Mauricio Tsugawa University of Chicago University

More information

DIRAC distributed secure framework

DIRAC distributed secure framework Journal of Physics: Conference Series DIRAC distributed secure framework To cite this article: A Casajus et al 2010 J. Phys.: Conf. Ser. 219 042033 View the article online for updates and enhancements.

More information

EXPERIENCE WITH PKI IN A LARGE-SCALE DISTRIBUTED ENVIRONMENT

EXPERIENCE WITH PKI IN A LARGE-SCALE DISTRIBUTED ENVIRONMENT EXPERIENCE WITH PKI IN A LARGE-SCALE DISTRIBUTED ENVIRONMENT Daniel Kouřil, Michal Procházka, Luděk Matyska CESNET z. s. p. o., Zikova 4, 160 00 Praha 6, Czech Republic, and Masaryk University, Botanická

More information

Introduction to Grid Technology

Introduction to Grid Technology Introduction to Grid Technology B.Ramamurthy 1 Arthur C Clarke s Laws (two of many) Any sufficiently advanced technology is indistinguishable from magic." "The only way of discovering the limits of the

More information

The Grid Authentication System for Mobile Grid Environment

The Grid Authentication System for Mobile Grid Environment IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 02, 2014 ISSN (online): 2321-0613 The Grid Authentication System for Mobile Grid Environment A.Sudha 1 S.M.Karpagavalli

More information

OpenIAM Identity and Access Manager Technical Architecture Overview

OpenIAM Identity and Access Manager Technical Architecture Overview OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Concordia University of Edmonton Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that

More information

Web-based access to the grid using. the Grid Resource Broker Portal

Web-based access to the grid using. the Grid Resource Broker Portal Web-based access to the grid using the Grid Resource Broker Portal Giovanni Aloisio, Massimo Cafaro ISUFI High Performance Computing Center Department of Innovation Engineering University of Lecce, Italy

More information