New Developments in Authentication and Access Management Alan Robiette JISC Development Group...

18
New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002

Transcript of New Developments in Authentication and Access Management Alan Robiette JISC Development Group...

Page 1: New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.

New Developments in Authentication and Access

Management

Alan RobietteJISC Development Group

JISC-NSF-DLI2 Meeting, 2002

Page 2: New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.

24 June 2002 JISC-NSF-DLI2 Projects Meeting 2

Outline

• Overview and terminology• Authentication – problems and progress• Authorisation – problems and progress• Summary and conclusions

Page 3: New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.

24 June 2002 JISC-NSF-DLI2 Projects Meeting 3

The High-Level Problem

• We need national-scale services for• Authentication (linking people to electronic IDs)• Authorisation (linking IDs to privileges)• Profiling (linking IDs to personal preferences)• Accounting (in the sense of tracking and recording

usage, whether or not for actual billing)

• All in an interoperable framework which can be realistically implemented by our institutions

• Not to mention all our third-party suppliers …

Page 4: New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.

24 June 2002 JISC-NSF-DLI2 Projects Meeting 4

Authentication

• On a local scale, largely a solved problem• Various solutions exist, some with single sign-on

(Internet2 promoting WebISO for web resources)

• Digital certificates are on the increase• Not least because Grid environments require

them

• Public-key technology will itself evolve• XML-based schemes are likely to emerge• E.g. XKMS, Web Services Security

Page 5: New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.

24 June 2002 JISC-NSF-DLI2 Projects Meeting 5

Authentication Issues on a National Scale

• Naming and name-space management• How is uniqueness assured nationally?• What happens in the case of multiple affiliations?

• Location of the authentication process• Universally agreed that this is best carried out at

and by the institution itself

• Should real IDs be generally visible to off campus providers?

• Trade-offs between privacy, convenience and accountability

Page 6: New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.

24 June 2002 JISC-NSF-DLI2 Projects Meeting 6

Authorisation Issues

• Determining an individual’s privileges• What attributes (roles) is it useful to consider?• Which are generic and which application-specific?• How many could be defined sector-wide?

• Location of the access control decision• At the resource itself (greatest provider control)?• At the institution (i.e. devolution of trust)?• At some intermediate point (e.g. as in the present

case in the UK, at the Athens server)?

Page 7: New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.

24 June 2002 JISC-NSF-DLI2 Projects Meeting 7

Where Should Control Be Applied?

• Logically at the resource itself• The resource owner should determine who gets

access and who does not; but this may require more user information to be disclosed

• For electronic information, this is often delegated (e.g. on the basis of a contract)

• A better model for a bibliographic database than for a supercomputer? Or even a telescope?

• Where third party services are involved, are there legal issues to consider?

Page 8: New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.

24 June 2002 JISC-NSF-DLI2 Projects Meeting 8

Where is the Complexity Felt?

• Do we best achieve interoperability by having the same software interface at

• All service providers’ servers?• All campuses?• All users’ local environments (wherever they are)?• More than one of these?

• And where the complexity ends up, so do most of the costs …

Page 9: New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.

24 June 2002 JISC-NSF-DLI2 Projects Meeting 9

Other Concerns

• The single sign-on question• How important is “seamlessness”?

• The portal problem• To address this properly is quite hard

• Standards and interoperability• There aren’t many, especially for authorisation

• The international scene• A system for JISC services is all very well, but

what about integrating resources from the wider world?

Page 10: New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.

24 June 2002 JISC-NSF-DLI2 Projects Meeting 10

Current UK Developments

• EduServ’s development plan for Athens• Single sign-on introduced Spring 2002• Distributed authentication will be trialled this

summer

• JISC call for projects issued Summer 2002• With the objective of exploring a range of

emerging technologies

• JISC is actively working with Internet2-MACE in the US and TERENA in Europe

Page 11: New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.

24 June 2002 JISC-NSF-DLI2 Projects Meeting 11

Authentication Goals

• To investigate practical and management issues in embedding X.509 certificate regimes in institutions of varying kinds

• With some particular technology options to be explicitly specified for piloting

• To investigate “mixed economy” approaches in which X.509 certificates are used alongside (say) Athens IDs and passwords

Page 12: New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.

24 June 2002 JISC-NSF-DLI2 Projects Meeting 12

Authorisation Goals

• To explore a range of authorisation schemes and assess their applicability in both Grid and Information Environment scenarios

• To include trialling of (at least)• Globus CAS (Globus Project)• Akenti (Lawrence Berkeley Lab)• PAPI (Spanish academic and research network)• NB Evaluation of Shibboleth (Internet2) already

planned

Page 13: New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.

24 June 2002 JISC-NSF-DLI2 Projects Meeting 13

Developments Elsewhere (1)

• Shibboleth (Internet2)• Devolves authentication and attribute assertion to

campuses• Resource owner requests attributes from campus

and makes decisions based on the response• Model allows both campus and user control over

attribute release (strong emphasis on privacy)• Open source reference implementation due to be

released Autumn 2002• Publishers getting involved in trial programme

Page 14: New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.

24 June 2002 JISC-NSF-DLI2 Projects Meeting 14

Developments Elsewhere (2)

• PAPI (Spanish national network)• Distributed architecture: authentication and

authorisation both carried out at campus (i.e. campuses have to be trusted by resource owners)

• Multi-tier architecture – easy to interface to existing publishers’ services

• Open source and in use in a number of sites/consortia in Spain, including some publisher involvement

Page 15: New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.

24 June 2002 JISC-NSF-DLI2 Projects Meeting 15

PAPI Architecture

Basic PAPI architecture with PoA only

Page 16: New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.

24 June 2002 JISC-NSF-DLI2 Projects Meeting 16

Is a Common View Emerging?

• What is clearly needed is a single, widely accepted vendor-independent scheme

• At first sight the different projects (PAPI, Shibboleth, AthensNG) look very distinct

• However they share many components and a common architecture appears feasible

• PAPI plans to investigate adding support for Shibboleth resource providers

• Proprietary nature of Athens remains problematic

Page 17: New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.

24 June 2002 JISC-NSF-DLI2 Projects Meeting 17

And What About the Grid?

• Currently the Grid community’s problems appear more complex

• Grid middleware relies heavily on X.509 identity certificates, which are far from universal otherwise

• Even in the longer term, it may not be possible to standardise on one single Grid authorisation solution

• But there may be analogies with other relatively complex problems, e.g. medical middleware

Page 18: New Developments in Authentication and Access Management Alan Robiette JISC Development Group JISC-NSF-DLI2 Meeting, 2002.

24 June 2002 JISC-NSF-DLI2 Projects Meeting 18

Conclusions

• Authorisation in particular remains a tough problem

• But some of the emerging solutions look promising, for quite large sets of commonly encountered applications

• And the extent of international cooperation in this area is also encouraging!