KoM WP3 Task3.2 Overview and Next steps. Yuri Demchenko University of Amsterdam

Similar documents
Defining InterCloud Architecture Framework (ICAF) for Interoperability and Integration

Professional Education on Cloud Computing Technology and Services Engineering

PoS(ISGC 2011 & OGF 31)115

ISOD BCP Document Discussion and Recommendations

INDIGO AAI An overview and status update!

INDIGO-DataCloud Architectural Overview

Deliverable reference number: D.4.1. AAA Architectures for multi-domain optical networking scenario's

Cloud Standardization

Enhanced Privacy ID (EPID), 156

On-Demand Provisioning of Cloud and Grid based Infrastructure Services for Collaborative Projects and Groups

Attributes used for Authorisation in Network Resource Provisioning

Federated Authentication with Web Services Clients

glite Java Authorisation Framework (gjaf) and Authorisation Policy coordination

[GSoC Proposal] Securing Airavata API

Topics of Discussion

Federated access to e-infrastructures worldwide

Intercloud Architecture Framework for Heterogeneous Cloud based Infrastructure Services Provisioning On-Demand

Extend your datacenter with the power of Citrix Open Cloud

EGI-InSPIRE. GridCertLib Shibboleth authentication for X.509 certificates and Grid proxies. Sergio Maffioletti

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1

European Grid Infrastructure

Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC)

globus online Globus Nexus Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory

Sentinet for BizTalk Server SENTINET

Open Cloud exchange (OCX): Architecture and Functional Components

EU Phosphorus Project Harmony. (on

PERMIS An Application Independent Authorisation Infrastructure. David Chadwick

Lightpath AAA Gap Analysis

Milestone deliverable reference number M.4.1 (Part 1 of the Deliverable D.4.1)

Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard

2. HDF AAI Meeting -- Demo Slides

NIST Cloud Computing Security Working Group

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

Overview of International Standards for Cloud Computing

Storage Management in INDIGO

Cloud Essentials for Architects using OpenStack

A Holistic View of Telco Clouds

Table of Contents 1.1. Introduction. Overview of vsphere Integrated Containers 1.2

Challenges in Authenticationand Identity Management

Guidelines on non-browser access

Higher Education external Attribute Authority. Mihály Héder István Tétényi (MTA SZTAKI) 19-May-2015

Security Readiness Assessment

Sentinet for Windows Azure VERSION 2.2

The challenges of (non-)openness:

Network Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010

SLCS and VASH Service Interoperability of Shibboleth and glite

Dynamic Security Context Management in Grid-based Applications

Grid Computing. MCSN - N. Tonellotto - Distributed Enabling Platforms

Cloud Customer Architecture for Securing Workloads on Cloud Services

* Inter-Cloud Research: Vision

VMware Hybrid Cloud Solution

INDIGO-Datacloud Identity and Access Management Service

Table of Contents DevOps Administrators

Authorisation Policy coordination and glite Java Authorisation Framework (gjaf)

Sentinet for Microsoft Azure SENTINET

Intercloud Federation using via Semantic Resource Federation API and Dynamic SDN Provisioning

WP JRA1: Architectures for an integrated and interoperable AAI

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

Identität und Autorisierung als Grundlage für sichere Web-Services. Dr. Hannes P. Lubich IT Security Strategist

1. What is Cloud Computing (CC)? What are the Pros and Cons of CC? Technologies of CC 27

Cloud Computing and Service-Oriented Architectures

OpenIAM Identity and Access Manager Technical Architecture Overview

Table of Contents 1.1. Overview. Containers, Docker, Registries vsphere Integrated Containers Engine

An integrated IaaS and PaaS architecture for scientific computing

AAI in EGI Current status

The Latest EMC s announcements

Chapter 3 Virtualization Model for Cloud Computing Environment

SAP Security in a Hybrid World. Kiran Kola

MCSE Server Infrastructure. This Training Program prepares and enables learners to Pass Microsoft MCSE: Server Infrastructure exams

Cloud Standards: Vincent Franceschini CTO Intelligent Data Fabrics, Hitachi Data Systems Chairman Emeritus, SNIA

Customer s journey into the private cloud with Cisco Enterprise Cloud Suite

Identity Management in ESA Grid on-demand Infrastructure

Goal. TeraGrid. Challenges. Federated Login to TeraGrid

Exam C Foundations of IBM Cloud Reference Architecture V5

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK

1z0-479 oracle. Number: 1z0-479 Passing Score: 800 Time Limit: 120 min.

Introduction to Cloud Computing

Single Sign-On for PCF. User's Guide

Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter

EGI-InSPIRE. Cloud Services. Steven Newhouse, EGI.eu Director. 23/05/2011 Cloud Services - ASPIRE - May EGI-InSPIRE RI

M2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres

RCauth.eu / MasterPortal update

AWS Integration Guide

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

Przejmij kontrolę nad użytkownikiem, czyli unifikacja dostępu do aplikacji w zróżnicowanym środowisku

Overview SENTINET 3.1

CA SSO Cloud-Enabled with SSO/Rest

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Module Day Topic. 1 Definition of Cloud Computing and its Basics

ARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018

AARC Blueprint Architecture

MCSE- Windows Server 2012

Cisco Container Platform

Security Models for Cloud

Foundations and Concepts

Cisco Cloud Strategy. Uwe Müller. Leader PreSales Cloud & Datacenter Germany

TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer

ISACA Silicon Valley. APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems

Transcription:

KoM WP3 Task3.2 Overview and Next steps Yuri Demchenko University of Amsterdam

Task 3.2 Development of Security and Access Control Mechanisms in a Multi-cloud Federated Environment [M2-M24] Task leader: Yuri Demchenko (UvA) Mechanisms to be developed should allow users to access all federated resources using their home institution account Develop appropriate trust and identity management mechanisms WP3 Task 3.2 Federated Access Control 2

Task 3.2 Activity Details (from DoW) Design and implementation of federation mechanisms at the IaaS level that will allow cloud inter-provider federation Usage scenario: Independent private cloud providers (members of a federation) that share the same API can reserve/allocate part of their resources to be used in a communal pool of resources (aka distributed community cloud) that can be used any user belonging to the federation. Actually re-use/re-factor Grid VO model The mechanisms to be developed should enable federated access control and resource management Authentication, authorization and auditing Resource allocation prioritization - Control & signaling? Support lightweight decentralized business models Evaluate brokered federation operation and management Leverage the experience with similar systems, such as the JiT Cloud and OurGrid middleware whose development are led by UFCG WP3 Task 3.2 Federated Access Control 3

Task 3.2 interaction with other tasks Task 3.1 Operation and Support of the Production Infrastructure [M1-M24] Task 3.2 Development of Security and Access Control Mechanisms in a Multi-cloud Federated Environment [M2-M24] Task 3.3 Adaptation and Deployment of Cloud Federation Mechanism [M1- M24] Task 3.4 Exploitation of Shared Resources in an Opportunistic Federated Cloud [M1-M24] Task 3.5 Adaptation of CSGrid middleware [M1-M24] Task 3.2 will contribute with the security analysis and taxonomy [M2-M?] Task 3.2 expect to receive from other tasks use cases and scenarios [M?-M?] Task 3.2 jointly with other tasks will specify requirements and define security/access control policy [M?- M?] Security interface definition, to be implemented by applications Security mechanisms developments Security mechanisms integration WP3 Task 3.2 Federated Access Control 4

Interaction with other WPs Should be done via general WP3 interaction WP3 <-> WP5 Use cases WP3 Task 3.2 Federated Access Control 5

How to enable effective collaboration? Knowing involved people Planning work Interaction Common development platform WP3 Task 3.2 Federated Access Control 6

Deliverables and Milestones: Security Issues need to be addressed MS3.1: Infrastructure configured to allow access to users and developers of EUBrazilCC (M3) All application users and system developers with access to a minimal part of the infrastructure that allows them to use it for their needs MS3.2 Deployment of opportunistic private cloud (M12) Prototype able to connect desktops within a LAN to a private cloud in an opportunistic way MS3.3 Deployment of federation mechanisms (M16) Prototype able to connect IaaS providers that share the same API using the Network of Favours incentive mechanism D3.1 Adaptation Requirements for CSGrid Middleware (M6) D3.2 Infrastructure Assessment Report (M12) D3.3 Prototype of the CSGrid Adaptation Mechanisms (M12) D3.4 Implementation of the Mechanisms to Federate Clouds and Exploit Shared Resources Opportunistically (M16) D3.5 Final Infrastructure Assessment Report (M24) WP3 Task 3.2 Federated Access Control 7

Initial Steps in Security Development Define what to protect IaaS infrastructure or separate Compute, Storage, Network Cloud applications Collaborating user community Identify/specify used protocols Cloud management protocols: OCCI, CDMI, OVF Grid resources access and management: SE, CE, VOMS, SLCP Legacy security solutions and migration strategy Grid on clouds vs native cloud solutions VO based vs Cloud Identity Federation model Access control models and policy platform/profile RBAC/ABAC, Identity Federation/Delegation, Security Token Service, Trust establishment and delegation WP3 Task 3.2 Federated Access Control 8

Federated Identity and Delegation in Clouds Existing federated identity schemes can be used to create consistent authentication between distributed computing resources (specifically cloud infrastructures) and a user/client VOMS and (X509 Proxy Certificate or SAML VOMS credentials) Shibboleth (with SAML assertions) ABFAB and Moonshot project (Federated IdM and Trust Management) CILogon and InCommon Federation (in US) OpenID and similar services Identity Federation in clouds EGI Identity Federation OpenStack KeyStone Identity Broker/gateway AWS Identity and Access Management (IAM) Traditional approach in clouds requires the Cloud Service Provider (CSP) to be involved into federation establishment Need to limit CSP role to an initial Trusted Introducer Avoid CSP role as (identity) broker or (authorisation) gateway WP3 Task 3.2 Federated Access Control 9

Federation in Grid and Clouds: Grid VO vs Cloud Virtual Infrastructure Grid federates resources and users by creating Virtual Organisations (VO) VO membership is maintained by assigning VO membership attributes to VO resources and members Resources remain under control of the Grid Resource Centers s remain members of their Home Organisations (HO) AuthN happens at HO or Grid portal To access VO resources, VO members need to obtain VOMS certificate X.509 Proxy Certificate is used to AuthZ users/jobs at Grid resources In clouds, both resources and user accounts are created/provisioned on-demand as virtualised components/entities accounts/identities can be provisioned together with access rights to virtual resources WP3 Task 3.2 Federated Access Control 10

Cloud Federation Scaling up and down Scalability is one of the main cloud feature To be considered in the context of hybrid cloud service model Cloud burst and outsourcing enterprise services to cloud Cloud services migration and replication between CSP Scaling up Identities provisioning Populating sessions context Scaling down Identity de-provisioning: Credentials revocation? Sessions invalidation vs restarting Initiated by provider and by user/customer WP3 Task 3.2 Federated Access Control 11

Discussion how to proceed Who is involved? Design and development team cooperation WP3 Task 3.2 Federated Access Control 12

Supporting material Federated Identity and delegation Approach and tools Multi-tenant Access Control for Cloud Infrastructure Services GAAA-TK (Generic AAA Toolkit) Security context and session management, delegation Policy and attribute profiles Policy management and evaluation Federation in clouds and Intercloud Federation Framework (ICFF) Operational models and components Intercloud Architecture Framework (ICAF) Multilayer Cloud Services Model (CSM) ICCMP, ICFF, ICOMF, ICSF (Intercloud Security Framework) WP3 Task 3.2 Federated Access Control 13

Basic Cloud Federation model Combined side federation (a) Enterprise Infrastructure (a) HO or (b) Custmr1 MgntSystem Management (Ops&Sec) Cloud Provider A 2 Xa.2 1 3 Direct or Dynamic link Xa Xa.1.3 Cloud IDP-Xa Customer A1 (Running Service Xa) (b) External s (Open Internet) (a) IDP-HO1 (b) 3rd Party IDP Federation relations CSP IDP/ Broker Simple/basic scenario 2: Federating Home Organisation (HO) and Cloud Service Provider (CSP) domains Cloud based services created for external users (e.g. website) and managed by Customer 1 Involved major actors and roles CSP Customer IDP/Broker Cloud accounts A1.1-3 are provisioned for each user 1-3 from HO with 2 options Individual accounts with new ID::pswd Mapped/federated accounts that allows SSO/login with user HO ID::pswd Federated accounts may use Cloud IDP/Broker (e.g. KeyStone) or those IDP-Xa created for Service Xa side Federation IDP-Xa can be implemented as instantiated service of the CSP IDP WP3 Task 3.2 Federated Access Control 14

Basic Cloud Federation model Federating CSP s/multi-provider cloud resources HO1 Admin/Mngnt Cloud Provider A Rsr K2 Rsr Ak2 Rsr Kn1 Cloud Provider K HO1.2HO1.1 HO1.3 Cloud Service Xa Rsr Ak1 RsrIDP-K M2 A1.2 Cloud Provider M A1.1 A1.3 Rsr Am1 Rsr M1 IDP-Xa IDP-HO1 side Infrastructure services IDP-M Rsr An1 Inter-provider federation for resources sharing CSP IDP-A Federation&Trust relations Rsr N2 Rsr N1 IDP-N Cloud Provider N WP3 Task 3.2 Federated Access Control Cloud provider side federation for resources sharing Federation and Trust relations are established between CSP s via Identity management services, e.g. Identity Providers (IDP) May be bilateral or via 3rd party/broker service Includes translation or brokering Trust relations Namespaces Attributes semantics Policies Inter-provider federation is transparent to customers/users Provider side Federation 15

Authorisation in a Federated Cloud Environment PEP (Policy Enforcement Point) PDP (Policy Decision Point) PAP (Policy Authotity Point) CVS (Credentials Validation Service) WP3 Task 3.2 Federated Access Control 16

GAAA Authorisation Framework and GAAA Toolkit (GAAA-TK) WP3 Task 3.2 Federated Access Control 17

GEYSERS project Network+IT IaaS infrastructure provisioning Security Infrastructure Logical Infrastructure Composition Layer (LICL) FUSE ESB env, OSGi bundles Packages: AuthN/AuhZ and Dynamic Access Control Infra (DACI) Network Control Plane (NCP+) AuthnSvc&AuthzSvc Web services SecurityGateway library GAAA Toolkit Java Library provides core functionality GAAA-ISOD profile (Infrastructure Services On Demand ) Client VR service CSSI CSSI CSSI/GAAPI Policy Enforcement Point SecurityGateway Library AuthN AuthZ TokenSvc AuthnSv c SecurityGateway AuthzSvc TokenSv c DACI Policy Man. DACI Man. DACI Trust DACI Context DA CS AuthNSvc AuthZSvc TokenSvc DACS instance AAI for LICL (eu.geysers.licl.aai.*) GAAA-ISOD Toolkit AAI Components DACI Integration (via SecurityGateway) WP3 Task 3.2 Federated Access Control 18

Dynamic Access Control Infrastructure (DACI) Common Security Service Interface (CSSI) DACS instance[i] SecurityGateway Consolidate a common interface to access security services DACI Management Authentication Authority SAML-XACML Layer Authz-token Svc DACI Configuration DACI Monitoring Attr DB Attribute Authority Identity Management Service PIP (Authz Ctx Hdlr) PDP Obligation Handler PAP Authorization Service Authz-token Authority Authz Token Service DACS Man. Service DACI Policy Management DACI Context Management DACI Trust Management DACS Trust Manager Provisioned on demand security services (DACS) DACI: Dynamic Access Control Infrastructure DACS: Dynamic Access Control Services Update authz-policies upon reconfiguring Virtual Infrastructure Dynamic Trust Establishment: DSA, Bootstrapping WP3 Task 3.2 Federated Access Control 19

Security Services Reference Model Common Security Service Interface (CSSI) Common Security Service Layer Dynamic Access Control Infrastructure (DACI) Trust establishment protocol for VI, Dynamic Security Associations (DSA), bootstrapping protocol Authentication & Identity Man. Trust Management (Dynamic trust establishment, Bootstrapping) SLA Management Authorization & Policy Man. Security Context Management Security Service Lifecycle Management (SSLM) Note: Integration with SLA management/negotiation is needed to ensure consistency WP3 Task 3.2 Federated Access Control 20

Multi-tenant Access Control for Cloud Infrastructure Services Apply MT-AC in hierarchy A high-level provider is a tenant of the low-level provider Grant permissions -> Delegate granted permissions Security context management using tokens as session credentials P a domain (1) authz request (2) grant token P a Authz Service c ai P a (3) grant token (4) access token P bi Authz Service c ai P b1 P b2 P bk (5) request access token (6)response P bi Resource Service P bi domain P c1 P c2 Exchanging tokens in Intercloud MT-AC in hierarchy Amsterdam, May 21, 21

GAAA-TK Implementation for complex infrastructure provisioning (GEYSERS project) End-users AuthzService request response LICL interface Authz Interface PEP Obligation Service (e.g. accounting) Token Authority Information Model service Context Handler PDP TenantMgrSvc interface (provider) Token service Context resolution service Tenant Management Service Tenant s Authz Policy DB Provider s Delegation Policy DB Policy Generator Tenant DB TokenService Context DB Tenant s delegation policy DB TenantAdmin Service ContextService Tenant administration interface (tenant) Amsterdam, May 21, 22

InterCloud Architecture Framework (ICAF) Multi-layer Cloud Services Model (CSM) Combines IaaS, PaaS, SaaS into multi-layer model with inter-layer interfaces Including interfaces definition between cloud service layers and virtualisation platform InterCloud Control and Management Plane (ICCMP) Allows signaling, monitoring, dynamic configuration and synchronisation of the distributed heterogeneous clouds Including management interface from applications to network infrastructure and virtualisation platform InterCloud Federation Framework (ICFF) Defines set of protocols and mechanisms to ensure heterogeneous clouds integration at service and business level Addresses Identity Federation, federated network access, etc. InterCloud Operations Framework (ICOF) RORA model: Resource, Ownership, Role, Action RORA model provides basis for business processes definition, SLA and access control Broker and federation operation Intercloud Security Framework (ICSF) Dynamic Security Infrastructure provisioning and protocols WP3 Task 3.2 Federated Access Control 23

Operations Support System Management Security Infrastructure Multilayer Cloud Services Model (CSM) http://www.ietf.org/id/draft-khasnabish-cloud-reference-framework-06.txt /Client Services * Identity services (IDP) * Visualisation /Customer Side Functions and Resources Endpoint Functions 1 Federated Access and * Service Gateway Delivery Infrastructure (FADI) * Portal/Desktop IaaS Cloud Management Software (Generic Functions) Content/Data Services * Data * Content * Sensor * Device Cloud Management Platforms OpenNebula PaaS OpenStack PaaS-IaaS Interface IaaS Virtualisation Platform Interface Other CMS Administration and Management Functions (Client) Inter-cloud Functions * Registry and Discovery * Federation Infrastructure Cloud Services (Infrastructure, Platform, Application, Software) VM SaaS PaaS-IaaS IF VM VPN Layer C6 /Customer side Functions Layer C5 Services Access/Delivery Layer C4 Cloud Services (Infrastructure, Platforms, Applications, Software) Layer C3 Virtual Resources Composition and Control (Orchestration) CSM layers (C6) /Customer side Functions (C5) Intercloud Access and Delivery Infrastructure (C4) Cloud Services (Infrastructure, Platform, Applications) (C3) Virtual Resources Composition and Orchestration (C2) Virtualisation Layer (C1) Hardware platform and dedicated network infrastructure Virtualisation Platform KVM XEN VMware Network Virtualis Layer C2 Virtualisation Storage Resources Proxy (adaptors/containers) - Component Services and Resources Compute Resources Hardware/Physical Resources Network Infrastructure Layer C1 Physical Hardware Platform and Network Control/ Mngnt Links Data Links Contrl&Mngnt Links Data Links WP3 Task 3.2 Federated Access Control Slide_24

General use case for infrastructure provisioning: Workflow => Logical (Cloud) Infrastructure Enterprise/Scientific workflow Input Data Storage Data Instrum. Data Data Filtering Special Proc 1 Special Proc 2 Data Archive Visual Present Campus A CE Visualisation Visualisation Campus B CE Group A Resource/ Service Provider VR1 VR2 VR3 VR6 VR4 VR5 Cloud 1 IaaS Cloud 2 PaaS VR7 Enterprise/Project based Intercloud Infrastructure Group B Enterprise/Scientific workflow Is mapped to heterogeneous cloud infrastructure containing IaaS, PaaS components Resource/ Service Provider Cloud IaaS Provider Cloud PaaS Provider WP3 Task 3.2 Federated Access Control 25

General use case for infrastructure provisioning: Logical Infrastructure => Network Infrastructure (1) Resource and Cloud Provider Domains Cloud 1 IaaS Cloud 2 PaaS Campus A Infrastructure VR1 VR3 VR5 VR7 Campus B Infrastructure VR2 VR4 VR6 Campus A CE Cloud Carrier Network Infrastructure Visualisation Visualisation Campus B CE Group A Resource/ Service Provider VR1 VR2 VR3 VR6 VR4 VR5 Cloud 1 IaaS Cloud 2 PaaS VR7 Enterprise/Project based Intercloud Infrastructure Group B Distributed heterogeneous cloud infrastructure requires separately provisioned network infrastructure that can be outsourced to Cloud Carrier Resource/ Service Provider Cloud IaaS Provider Cloud PaaS Provider WP3 Task 3.2 Federated Access Control 26

General use case for infrastructure provisioning: Logical Infrastructure => Network Infrastructure (2) Resource and Cloud Provider Domains Campus A Infrastructure VR1 VR3 VR5 VR7 Campus B Infrastructure VR2 VR4 VR6 Campus A CE Network Provider 1 Cloud Carrier or Network Provider 2 Federated InterCloud infratsructure Visualisation Visualisation Campus B CE Group A Resource/ Service Provider VR1 VR2 VR3 VR6 VR4 VR5 Cloud 1 IaaS Cloud 2 PaaS VR7 Enterprise/Project based Intercloud Infrastructure Group B Provisioning network infrastructure may involve multiple providers Introducing OCX (Open Cloud exchange) Resource/ Service Provider Cloud IaaS Provider Cloud PaaS Provider WP3 Task 3.2 Federated Access Control 27

Intercloud Federation Infrastructure and Open Cloud exchange (OCX) OCX Services Federated Cloud Instance Customer A (University A) Broker Trust Broker Broker Trust Broker Federated Cloud Instance Customer B (University B) Cert Repo (TACAR) FedIDP TTP Trusted Introducer OCX and federated network infrastructure Cloud Service Broker Discovery Directory (RepoSLA) Directory (RepoSLA) Gateway Gateway Gateway Gateway AAA AAA AAA AAA (I/P/S)aaS Provider (I/P/S)aaS Provider (I/P/S)aaS Provider (I/P/S)aaS Provider IDP IDP IDP IDP WP3 Task 3.2 Federated Access Control 28

OCX Hierarchical Topology Model CSP GEANT NREN University VR4 VR6 VR7 OCX Visualisation CE DFlow VR3 VR5 IP/L3 L2 L1 VR4 VR6 VR7 OCX Visualisation CE L0 VR3 VR5 WP3 Task 3.2 Federated Access Control 29