1 / 26

Shibboleth & Grid Integration

Shibboleth & Grid Integration. STFC and University of Oxford (and University of Manchester). Overview. Motivation Why Shibboleth? Previous work: ShibGrid Other projects Just starting: SARoNGS Conclusions. Motivation. We want to encourage more users to use the Grid All areas of research

Download Presentation

Shibboleth & Grid Integration

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Shibboleth & Grid Integration STFC and University of Oxford (and University of Manchester)

  2. Overview • Motivation • Why Shibboleth? • Previous work: ShibGrid • Other projects • Just starting: SARoNGS • Conclusions

  3. Motivation • We want to encourage more users to use the Grid • All areas of research • Single researcher to large projects • Security infrastructure must enable this • Certificates are often a barrier • Generalised not specific • Straightforward to use

  4. Why Shibboleth? • JISC is encouraging all institutions to transition from Athens to “Federated Access Management” • This technology is currently based on Shibboleth • It will become familiar to all academic users • The Grid should also use this common technology for authentication

  5. Shibboleth Overview • Web-based federated access management system based on SAML • Based on separation of authentication and authorisation • Authentication: Identity Provider (IdP) at user’s home institution • Authorisation: Service Provider (SP) based on information about the user from the IdP • Discovery: Where Are You From (WAYF) service • User can remain anonymous at the SP

  6. Shibboleth Authentication and Authorisation Web server (Thanks to Kang Tang)

  7. ShibGrid Use cases • Access to the Grid solely with Shibboleth • Use standard Grid certificates when something extra is required – still many advantages • Access to the Grid through a Portal • NGS portal/project portals • Access to the Grid through other access methods • Globus, Java GSI-SSH Terminal, CoG, etc., • Registration (for NGS) using Shibboleth

  8. ShibGrid access to the NGS (via Portal) Shibboleth Authentication and Authorisation (Thanks to Kang Tang)

  9. Other Components • Grid proxy download tool • For non portal Grid access methods • Grid proxy upload tool • Registration service • Data Protection Act/Acceptable Use Policy • Check the user’s institution is supported • Check the user has correct configuration • Link to NGS user registration

  10. Logon via Shibboleth…

  11. …Choose your home institution…

  12. …background log-in in using Kerberos…

  13. …welcome to the Portal…

  14. …and we have an automatically-generated Grid proxy

  15. Other Projects • “There’s more than one way to skin a cat” • This list is not exhaustive... • UK – SHEBANGS, ShibGrid, GridSite, DyVOSE/VOTES/BRIDGES/GLASS and GridShibPERMIS • US – GridShib • Switzerland – SWITCH (gLite) • Australia – MAMS

  16. Other Shib+Grid Projects: We want to support all use cases. SARoNGS GEMS: Grid enabling MIMAS data set. SARoNGS: Universal solution: VO, compute and data support. SHEBANGS: Shib+Grid: research with VO support. Computation focus. SARoNGS: Full production service for NGS and MIMAS, etc. ShibGrid: Production quality, no VO support. Computation focus. ShibGrid: Possible production service VPMan: VO-based resource access control. NGS: Full VO/VOMS support. NGS: No VO-based access control.

  17. Just starting: SARoNGS • Will provide a standard production bridge for all UK Academics from the UK Federation into the Grid world. • Integrated access to compute and data resources • Will provide a much simpler model for integrating resource. • Will combine expertise from ShibGrid, SHEBANGS and MIMAS.

  18. The SARoNGS CTS (NGS default) (Credential Translation Service) Shib-enabled MyProxy CA VOMS Server Via email to VO manager Request Authorisation certificate (by DN) Request certificate NGS default CTS NGS MyProxy Server Store proxy Add VOMS AC Registration Forms Human Interface Machine Interface Retrieve credential Shibboleth Service Provider Redirect User’s browser Portal – logon Requests from tools MyProxy username/password

  19. The SARoNGS CTS (VO-based) Shib-enabled MyProxy CA Request certificate VO-based CTS NGS MyProxy Server Store proxy Generate VOMS AC PERMIS Policy Registration Forms (optional) Human Interface Machine Interface Retrieve credential PERMIS Access Control Shibboleth Service Provider Redirect User’s browser Portal – logon Requests from tools MyProxy username/password

  20. Conclusions • There has been much research but this must now be brought together to form a core production service • We are working towards fully integrating the Grid with the national access management federation: • Compute (initially NGS) • Data (initially MIMAS)

  21. Questions

  22. More than just portal access… • Registration service • Data Protection Act/Acceptable Use Policy • Check the user’s institution is supported • Check the user has correct configuration • Link to NGS user registration • Grid proxy download tool • For non portal Grid access methods • Grid proxy upload tool

  23. Architectural Design • Don’t change the user • Prevent extra logical steps: portal first • Easy to deploy in project portals • Support other access methods • Don’t change other services • Work within Shibboleth and GSI frameworks

  24. Requirements highlights • User/Project • Transparent access to eScience facilities, consistent with other SSO-enabled components. • Access to components at home or away (even Internet Café). • Fit in with local authentication schemes. • Don’t want to know about certificates. • Want to use own project portal. • NGS • Must be compatible with GT2 and registration system. • VOMS in the future.

  25. ShibGrid MyProxy Checks • IdP (trusted) authentication/authorisation • Standard Shibboleth • Portal (not trusted): • Standard MyProxy checks • + check the attribute assertion was created for the portal • Users: • Authentication: at IdP • Authorisation: • Is user registered? • username attribute = username used? • Attributes used to construct low-assurance certificate DNs

More Related