1 / 16

Toward Production Level Operation of Authentication System for High Performance Computing Infrastructure in Japan

Toward Production Level Operation of Authentication System for High Performance Computing Infrastructure in Japan. Eisaku Sakane and Kento Aida National Institute of Informatics. Introduction. High Performance Computing Infrastructure (HPCI)

aminia
Download Presentation

Toward Production Level Operation of Authentication System for High Performance Computing Infrastructure in Japan

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Toward Production Level Operation of Authentication System for High Performance Computing Infrastructure in Japan EisakuSakaneand KentoAida National Institute of Informatics Eisaku Sakane and Kento Aida, National Institute of Informatics

  2. Introduction • High Performance Computing Infrastructure (HPCI) • national project promoted by Ministry of Education, Culture, Sports, Science and Technology (MEXT) in Japan • distributed computing infrastructure for high performance computing • “K computer”, supercomputers and high performance storage • first production level infrastructure for high performance computing in Japan • Roadmap • – Mar 2011 basic design • network, authentication, user management, shared storage, testbed for advanced software • Apr – Dec 2011 detailed design • Jan – Oct 2012 test operation • Nov 2012 – production level operation This talk presents pilot operations of the authentication system for HPCI. Eisaku Sakane and Kento Aida, National Institute of Informatics

  3. HPCI Overview (at Nov. 2012) user management authentication CA system HPCI ID registration HPCI acct. shib. SP review proposals apply certificate portal acct. registration certificaterepository shib. IdP single sign-on shib. IdP shib. IdP helpdesk shib. SP HPCISecretariat (organized in 2011) computer resource computer resource computer resource NII AICS (K-computer) Supercomputer Centers in 9 Universities shared storage network infrastructure AICS, U. Tokyo More resources will be connected after 2012. Eisaku Sakane and Kento Aida, National Institute of Informatics

  4. SINET4 SINET4: Science Information NETwork 4 Eisaku Sakane and Kento Aida, National Institute of Informatics

  5. SINET4 (cont’d) • 80Gbps backbone (planned in 2011) • L3VPN, L2VPN/VPLS, QoS • connection to 700+ academic sites • IX for commercial networks • 134(30Gbps) in Tokyo • 22(11Gbps) in Osaka user user user user CA university university portal IX (Tokyo) QoS IX (Osaka) commercial network VPN non-commercial network university university AICS LAN storage user compt. resource storage storage storage user user user compt. resource compt. resource compt. resource resource provider resource provider Eisaku Sakane and Kento Aida, National Institute of Informatics

  6. AICS and Supercomputer Centers in Japanese Universities Hokkaido Univ.: SR11000/K1(5.4Tflops, 5TB) PCCluster (0.5Tflops, 0.64TB) AICS, RIKEN: K computer (10 Pfflops, 4PB) Available in 2012 Kyoto Univ. T2K Open Supercomputer (61.2 Tflops, 13 TB) Tohoku Univ.: NEC SX-9(29.4Tflops, 18TB) NEC Express5800 (1.74Tflops, 3TB) Osaka Univ.: SX-9 (16Tflops, 10TB) SX-8R (5.3Tflops, 3.3TB) PCCluster (23.3Tflops, 2.9TB) Univ. of Tsukuba: T2KOpen Supercomputer 95.4Tflops, 20TB Univ. of Tokyo: T2KOpen Supercomputer (140 Tflops, 31.25TB) Kyushu Univ.: PC Cluster (55Tflops, 18.8TB) SR16000 L2 (25.3Tflops, 5.5TB) PC Cluster (18.4Tflops, 3TB) Nagoya Univ.: FX1(30.72Tflops, 24TB) HX600(25.6Tflops, 10TB) M9000(3.84Tflops, 3TB) A 1 Pflops machine without accelerator will be installed by the end of 2011 Tokyo Institute of Technology: Tsubame 2 (2.4 Pflops, 100TB) source: Y. Ishikawa, Univ. of Tokyo Eisaku Sakane and Kento Aida, National Institute of Informatics

  7. Storage HPCI WEST HUB HPCI EAST HUB University of Tokyo AICS, RIKEN • 12 PB+ storage • 10 PB+ storage Hokkaido University Tohoku University Gfarm2 is used as the global shared file system University of Tsukuba Kyushu University Tokyo Institute of Technology Nagoya University Osaka University Kyoto University source: Y. Ishikawa, Univ. of Tokyo Eisaku Sakane and Kento Aida, National Institute of Informatics

  8. Authentication • The goal is enabling single sign-on computer resources and shared storage in HPCI. • survey of existing software technologies and operation of grid infrastructures • account management • centralized or distributed? portal sign-on the portal with HPCI acct. HPCI acct/password single sign-on user (2) ssh login to computers without password % gsi-ssh host.univ.ac.jp • login to computers • access to shared storage Eisaku Sakane and Kento Aida, National Institute of Informatics

  9. Shibboleth + GSI • Shibboleth for account management of HPCI • HPCI account = account to sign-on HPCI • federation of HPCI accounts managed in distributed way using Shibboleth • A user has a HPCI account in one supercomputer center. • Grid Security Infrastructure (GSI) for single sign-on • de facto in grid communities • enabling single sign-on using PKI • creating proxy certificate and delegation • mapping “Distinguished Name (DN)” in a client certificate and a local account in supercomputer centers • grid-mapfile "/C=JP/O=NII/OU=CGRD/CN=Kento Aida” aida Eisaku Sakane and Kento Aida, National Institute of Informatics

  10. Pilot Operations • 1st phase: Apr – Dec 2011 • objective: for operation organizations to get used to operate GSI and Shibboleth systems • National Institute of Informatics • operating CA system and Portal • building an experimental CA system including a certificate repository • UMS provided by Shibbolized NAREGI Middleware v1.1 • building an authentication portal with a proxy certificate repository • portal provided by Shibbolized NAREGI M/W • Supercomputer centers • building Shibboleth IdP • setting up a GSI-enabled ssh server and client as SP Eisaku Sakane and Kento Aida, National Institute of Informatics

  11. Architecture National Institute of Informatics Certificate Management System Portal (Shib. SP) • apply certificate • sign-on HPCI SINET 4 Cert. Repository Proxy Cert. Repository CA System (Shib.SP) web browser Shib. DS Supercomputer Centers • login to compt. resources Shib. IdP Account DB GSI-SSH client GSI-SSH Server storage Supercomputer Centers, AICS Eisaku Sakane and Kento Aida, National Institute of Informatics

  12. Screenshots Eisaku Sakane and Kento Aida, National Institute of Informatics

  13. Result of 1st phase • We confirmed the followings • Sign-on the authentication portal with Shibboleth federation mechanism • getting a end-user certificate via the authentication portal • generation a proxy certificate and downloading it to end-user’s terminal computer • logging in 9 supercomputer centers by using GSI-enabled SSH • The system works as single sign-on system. • Documents for HPCI users and administrators were revised according to feedback from participating organizations • Problem • port number (22/tcp) collision between SSH and GSI-enabled SSH • Administrators are reluctant to stop sshd or replace with gsi-sshd because of security policy of supercomputer center. • We will unify the port number for gsi-sshdwith another port number. Eisaku Sakane and Kento Aida, National Institute of Informatics

  14. Pilot Operations (cont’d) • 2nd phase: Jan 2012 – • objective: evaluation of the authentication system and feedback • building a production level CA system • preparing dedicated machines, HSM • performing key ceremony • examinations on normal or abnormal operations • replacing certificates in 1st phase with new certificates issued by new CA • building an authentication portal for HPCI • collaboration with the HPCI secretariat • the role of the HPCI secretariat • proposal to use HPCI (including registration of HPCI ID) • notification of review • coordination among resource providers, … • HPCI-ID is important because it connects subject DN with local account. • combination examination between NII(CA), supercomputer centers (RPs) and HPCI secretariat Eisaku Sakane and Kento Aida, National Institute of Informatics

  15. Connecting Subject DN with LN • Flow until subject DN and local account name (LN) are connected • A HPCI-ID is assigned to an end-user. • The HPCI secretariat notifies CA and RPs of the HPCI-ID. • CA manage subject DN with HPCI-ID. • RP manages local account name with HPCI-ID. • RP inquires the information of CA, then generates grid-mapfile. HPCI secretariat HPCI-ID HPCI-ID CA RP aida (LN) HPCI-ID "/C=JP/O=NII/OU=CGRD/CN=Kento Aida” aida /C=JP/O=NII/OU=CGRD/CN=Kento Aida Eisaku Sakane and Kento Aida, National Institute of Informatics

  16. Conclusions • This talk presents an evaluation experiment of the authentication systemfor HPCI. • current status and future work • network • SINET4 has started production level operation in 2011. • authentication • entering on 2ndphase of evaluation experiment • built a production level CA system in NII and evaluated its performance • starting test operation of the production level system from Feb 2012 • considering when we switch hash algorithm in digital signature to SHA-2 • user management • still preparing to start HPCI secretariat • starting test operation as soon as possible Eisaku Sakane and Kento Aida, National Institute of Informatics

More Related