27
The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Embed Size (px)

Citation preview

Page 1: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

The Rest of the World, in 75 minutes…

Ken Klingenstein

Director, Internet2 Middleware and Security

Page 2: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Topics

Directory Activities:

Eduperson, CourseID, Entitlements, others…

Shibboleth Update:

Core Code, Federations, GUI’s, Project Management

Grids:

GGF and EGA, Campus Grids, Integration with enterprises

PKI:

HEBCA, USHER, TACAR and EuroPMA

Diagnostics:

Middleware diagnostics, performance and security diagnostics, the SURFnet Detective

Page 3: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Directory activities

Eduperson• Entitlements and TargetID• Affiliate vs Member

Localperson

CourseID

Page 4: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Shibboleth Today

V1.2 on the streets, v1.3 in development

Software still is “simple” but getting increasingly complex. Software is still early.

Identified as the national R&E federation technology in the US, the UK, Australia, Switzerland, Finland, and perhaps others…

Increasingly “at” Burton, Catalyst, DigitalID Conferences

Interoperability discussions and commitments being made among federating software developers

Page 5: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Core software development

V1.0 April 2003, v 1.2 May 2004

V1.3 targeted for fall; priorities include portal support, perhaps artifact SAML profile

SAML 2.0, OpenSAML 2.0 and the meaning of Shibboleth

WS-Fed interoperability

Shib as WebISO

SOAP and SAML –interim and long-term

Whole-grain Shib

Refactoring into core and module for long-term management

Integrated documentation and install guides

Page 6: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

SAML 2.0

Historic relationship of SAML and Shib

Contributions from both Liberty and Shibboleth to spec.

TC under OASIS, with contributing editor S. Cantor, Individual

Largely done, perhaps final committee work by end of August, then approval by Nov or IBM…

Refactors a lot, in Shib and vendor products – how quickly will vendors adopt?

OpenSAML 2.0 will happen…

Page 7: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Coordination of Shib development

Development now taking place in several countries, with significant investments outside the original development crew.

A reasonable re-layering of architecture and code might be helpful

Management role models:• Likely: OpenLDAP, Apache• Less likely: GGF

Alignment of licensing and copyright could be challenging

Page 8: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Federations

Seem to be happening. InQueue has > 50. InCommon is nearing completion of policies, pricing, membership decisions. Ten phase 1 participants doing the lifting

Shib R&E feds in UK, Australia, Switzerland, Finland, others; non-Shib FEIDE in Norway

Federations in business still bilateral, nonpersistent

International federation peering in UK in October

Some activity in US federal gov

Other efforts, such as Salsa-NetAuth, plan to leverage federations

Page 9: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Coupled systems

The major GUI’s – SysAdmin, Autograph, PRM

Other AA backend plug-ins

Alternative WAYF approaches• Interim• Long-term

Other trust fabrics

Page 10: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

GUI’s to manage Shibboleth

Page 11: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

SysPriv ARP GUI

A tool to help administrators (librarians, central IT sysadmins, etc) set attribute release policies enterprise-wide

• For access to licensed content• For linking to outsourced service providers• Has implications for end-user attribute release manager

(Autograph)

GUI design now actively underway, lead by Stanford

Plumbing to follow shortly

Page 12: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

End-user attribute release manager(Autograph)

Intended to allow end-users to manage release policies themselves and, perhaps, understand the consequences of their decisions

Needs to be designed for everyone even though only 3% will use it beyond the defaults.

To scale, must ultimately include extrapolation on settings, exportable formats, etc.

Page 13: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Privacy Management Systems

Page 14: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Personal Resource Manager

Page 15: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Grids

GGF and EGA – two standards organizations, no standards…

Enterprise Grids – a developing approach

The Terrorgrid – of integration and security

Integration with enterprises – leveraging enterprise infrastructure and R&E federations

Page 16: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

PKI

HEBCA

USHER

TACAR and EuroGrid PMA

Buy a global higher ed root

Page 17: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Virtual Organizations

Geographically distributed, enterprise distributed community that shares real resources as an organization.

Examples include team science (NEESGrid, HEP, BIRN, NEON), digital content managers (library cataloguers, curators, etc), life-long learning consortia, etc.

On a continuum from interrealm groups (no real resource management, few defined roles) to real organizations (primary identity/authentication providers)

Want to leverage enterprise middleware and external trust fabrics

Page 18: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Virtual Organizations

Some things seem consistent across almost all VO’s• The need to manage and delegate VO authorizations• Unique naming, and managed resource discovery• A set of collaboration tools, including a list manager, calendar,

shared web content management, etc that are seamlessly integrated into users’ everyday environment

• A need to factor in, and leverage, local domain requirements and capabilities

Some things are specific to each VO• The members and the resources being managed• Requirements for advanced services, such as Grids and instrument

management

Page 19: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Virtual organizations

Need a model to support a wide variety of use cases• Native v.o. infrastructure capabilities, differences in enterprise

readiness, etc.• Variations in collaboration modalities• Requirements of v.o.’s for authz, range of disciplines, etc

JISC in the UK has lead; builds on NSF NMI

Tool set likely to include seamless listproc, web sharing, shared calendaring, real-time video, privilege management system, etc.

Page 20: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Leveraging V.O.s Today

VO

Target Resource

User

Enterprise

Federation

Page 21: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Leveraged V.O.s Tomorrow

VO

Target Resource

User

Enterprise

Federation

Collaborative Tools Authority Systemetc

Page 22: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Middleware DiagnosticsProblem Statement

• The number and complexity of distributed application initiatives and products has exploded within the last 5 years

• Each must create its own framework for providing diagnostic tools and performance metrics

• Distributed applications have become increasingly dependent not only on the system and network infrastructure that they are built upon, but also each other

• Middleware diagnostics need to integrate with network performance diagnostics and security diagnostics

Page 23: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Goals

• Create an event collection and dissemination infrastructure that uses existing system, network and application data (Unix/WIN logs, SNMP, Netflow©, etc.)

• Establish a standardized event record that normalizes all system, network and application events into a common data format

• Build a rich tool platform to collect, distribute, access, filter, aggregate, tag, trace, probe, anonymize, query, archive, report, notify, perform forensic and performance analysis

Page 24: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Cisco NetFlow Events

RMON Events

Event Record Standard

• Normalization of each diagnostic data feed type (SHIB, HTTP, Syslog, RMON, etc.) into a common event record

• The tagging of specific events to help downstream correlation processes

DB Access Log

SHIB log

HTTP Access log

GRID Application Log

NormalizationAnd EventTagging

NETFLOW:TIME:SRC:DST:…RMON:HOST:TIME:DSTPORT..DB:TIME:HOST:REQ:ASTRONSHIB:TIME:HOST:UID…HTTP:TIME:HOST:URL…GRIDAPP:TIME:HOST:UID:…

Variable Star Catalog DBApplication

Page 25: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Diagnostic Data Pipelining

Data flows can be constructed to provide the desired function and policy within a enterprise or federation

Filter

C-4

Network Events

ArchiveDBAnonimizationTagging AggregationNormalization

C-3

C-1

P-1C-2

P-2

P-3

P-4

P-5

C-* Collection Module HostP-* Processing Module Host

Host or Security Events

Page 26: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

Event Record

Event Descriptor Meta Field

Event Descriptor

• Version Number• Observation Description Pointer• ID – unique event identifier• Time - start/stop• IP Address(es) – source/(destination)• Source Class – application, network, system, compound, bulk, management• Event Name Tag – Native language ID, user defined• Status – normal, informational, warning, measurement, critical, error, etc. • Major Source Name – filename, Netflow, Syslogd, SNMP, shell program, etc.• Minor Source Name – logging process name (named), SNMP variable name, etc.• Raw Data Encoding Mechanism – Binary, ASN1, ASCII, XML, etc.• Raw Event Data Description Pointer

Raw Event Data

Page 27: The Rest of the World, in 75 minutes… Ken Klingenstein Director, Internet2 Middleware and Security

A context for diagnostics

SURFnet detective

Integrated I2 diagnostic efforts