SlideShare une entreprise Scribd logo
1  sur  17
SARoNGS Jens Jensen <j.jensen at rl.ac.uk> JISC access management event 30 June 2008
NGS “ To provide coherent electronic access for UK researchers to all computational and data based resources and facilities required to carry out their research, independent of resource or researcher location” 4 core sites, 7 partners, 7-9 affiliates
What is it? S hibboleth  A ccess to R esources  o n the N ational  G rid  S ervice But what does it do? Funded by JISC! Shebangs MIMAS VPMan ShibGrid SARoNGS
Goals Broaden the NGS user base Ease access for researchers who are not technology specialists London marathon ’06 image: Ian Wilson: CC Attribution 2.0
Goals Provide access to resources Encourage collaborations in Virtual Organisations
Goals Prevent unauthorised access Easier support for service provider
Goals Deliver a production service!
Currently People use X.509 certificates to access NGS resources Trusted globally - IGTF Sometimes seen as challenging to use
In SARoNGS People who have certificates can keep using them Created transparently for people who don’t have them Users don’t even know they have certificates!
Architecture CTS MyProxy User and management portals The NGS Grid VO Management CTS access control research resources (MIMAS)‏
More detailed Arch.
What’s in it for you? If you’re a user: non-certificate access to the NGS, mainly via portals
What’s in it for you? If you are a service provider: hook into NGS SP/portal (if you wish)‏ (particularly if you require X.509)‏ Using NGS’ VO management infrastructure (Fine print: note UK Fed. restrictions)‏
What’s in it for you? If you are a foreign federation We’ve got stuff you can reuse (Fine print: we’re built for the UK Federation)‏
What’s in it for you? (soon)‏ More Shibbolised resources NGS SRB Oracle OGSA-DAI iRODS Shibbolised in the ASPiS project
Gaps? Further services Attributes… Real VOs… Assurance
SARoNGS summary Integrated security Production ready Usable Interoperable Registered

Contenu connexe

Tendances

Integrating figshare into our RDM workflow: University of Salford
Integrating figshare into our RDM workflow: University of SalfordIntegrating figshare into our RDM workflow: University of Salford
Integrating figshare into our RDM workflow: University of Salford
David Clay
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
Phil Agcaoili
 

Tendances (20)

PoolParty Semantic Suite - Solutions for Sustainable Development - weadapt.or...
PoolParty Semantic Suite - Solutions for Sustainable Development - weadapt.or...PoolParty Semantic Suite - Solutions for Sustainable Development - weadapt.or...
PoolParty Semantic Suite - Solutions for Sustainable Development - weadapt.or...
 
GDPRov: provenance for GDPR
GDPRov: provenance for GDPR GDPRov: provenance for GDPR
GDPRov: provenance for GDPR
 
20161201 witdom bdva summit
20161201 witdom bdva summit20161201 witdom bdva summit
20161201 witdom bdva summit
 
NordForsk Open Access Reykjavik 14-15/8-2014:NeIC
NordForsk Open Access Reykjavik 14-15/8-2014:NeICNordForsk Open Access Reykjavik 14-15/8-2014:NeIC
NordForsk Open Access Reykjavik 14-15/8-2014:NeIC
 
ARLG 2019: T Davey (JISC)
ARLG 2019: T Davey (JISC)ARLG 2019: T Davey (JISC)
ARLG 2019: T Davey (JISC)
 
Decentralised entity registry “WikiReg”
Decentralised entity registry “WikiReg”Decentralised entity registry “WikiReg”
Decentralised entity registry “WikiReg”
 
Integrating figshare into our RDM workflow: University of Salford
Integrating figshare into our RDM workflow: University of SalfordIntegrating figshare into our RDM workflow: University of Salford
Integrating figshare into our RDM workflow: University of Salford
 
SafeNet: Progress and Data Gathering
SafeNet: Progress and Data GatheringSafeNet: Progress and Data Gathering
SafeNet: Progress and Data Gathering
 
Bitcoin and IoT
Bitcoin and IoTBitcoin and IoT
Bitcoin and IoT
 
II-SDV 2016 IRIX Software Engineering
II-SDV 2016 IRIX Software EngineeringII-SDV 2016 IRIX Software Engineering
II-SDV 2016 IRIX Software Engineering
 
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtDavid Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
Blockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab SlidesBlockchain and IOT and the GxP Lab Slides
Blockchain and IOT and the GxP Lab Slides
 
Securing, storing and enabling safe access to data
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to data
 
Block Chain Record Management
Block Chain Record ManagementBlock Chain Record Management
Block Chain Record Management
 
Personal Data Receipts - Michele Nati - Lead Technologist Privacy and Trust -...
Personal Data Receipts - Michele Nati - Lead Technologist Privacy and Trust -...Personal Data Receipts - Michele Nati - Lead Technologist Privacy and Trust -...
Personal Data Receipts - Michele Nati - Lead Technologist Privacy and Trust -...
 
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
Personal data and blockchain: Opportunities and Challenges - Michele Nati - L...
 
Long Term Preservation Dale Peters
Long Term Preservation Dale PetersLong Term Preservation Dale Peters
Long Term Preservation Dale Peters
 
Safe use of personal data in research
Safe use of personal data in researchSafe use of personal data in research
Safe use of personal data in research
 
Semantic Blockchains in the Supply Chain
Semantic Blockchains in the Supply ChainSemantic Blockchains in the Supply Chain
Semantic Blockchains in the Supply Chain
 
Southern Risk Council - Cybersecurity Update 10-9-13
Southern Risk Council - Cybersecurity  Update 10-9-13Southern Risk Council - Cybersecurity  Update 10-9-13
Southern Risk Council - Cybersecurity Update 10-9-13
 

En vedette (7)

Studies in advanced access mgmt: GFIVO project (Cal Racey)
Studies in advanced access mgmt: GFIVO project (Cal Racey)Studies in advanced access mgmt: GFIVO project (Cal Racey)
Studies in advanced access mgmt: GFIVO project (Cal Racey)
 
Biodiversidad Lourdes Y Ruben
Biodiversidad Lourdes Y RubenBiodiversidad Lourdes Y Ruben
Biodiversidad Lourdes Y Ruben
 
German Photographer
German PhotographerGerman Photographer
German Photographer
 
Shintau And VPMan proejcts (David Chadwick)
Shintau And VPMan proejcts (David Chadwick)Shintau And VPMan proejcts (David Chadwick)
Shintau And VPMan proejcts (David Chadwick)
 
Antes
AntesAntes
Antes
 
STA Travel Family & Friends Offer
STA Travel Family & Friends OfferSTA Travel Family & Friends Offer
STA Travel Family & Friends Offer
 
Transifex: A truly international Web
Transifex: A truly international WebTransifex: A truly international Web
Transifex: A truly international Web
 

Similaire à SARoNGS project (Jens Jensen)

Nectar cloud workshop ndj 20110331.2
Nectar cloud workshop ndj 20110331.2Nectar cloud workshop ndj 20110331.2
Nectar cloud workshop ndj 20110331.2
Nick Jones
 

Similaire à SARoNGS project (Jens Jensen) (20)

Parallel session: trust and identity
Parallel session: trust and identityParallel session: trust and identity
Parallel session: trust and identity
 
Cultivating Sustainable Software For Research
Cultivating Sustainable Software For ResearchCultivating Sustainable Software For Research
Cultivating Sustainable Software For Research
 
Oracle Blockchain Cloud Service
Oracle Blockchain Cloud ServiceOracle Blockchain Cloud Service
Oracle Blockchain Cloud Service
 
20171106_OracleWebcast_ITTrends_EFavuzzi_KPatenge
20171106_OracleWebcast_ITTrends_EFavuzzi_KPatenge20171106_OracleWebcast_ITTrends_EFavuzzi_KPatenge
20171106_OracleWebcast_ITTrends_EFavuzzi_KPatenge
 
Membership Intro Presentation
Membership Intro PresentationMembership Intro Presentation
Membership Intro Presentation
 
Project On-Science
Project On-ScienceProject On-Science
Project On-Science
 
Access Control in ESDIN: Shibboleth
Access Control in ESDIN: ShibbolethAccess Control in ESDIN: Shibboleth
Access Control in ESDIN: Shibboleth
 
Accenture’s INTIENT Research Platform
Accenture’s INTIENT Research PlatformAccenture’s INTIENT Research Platform
Accenture’s INTIENT Research Platform
 
The e-Ciber Superfacility Project
The e-Ciber Superfacility ProjectThe e-Ciber Superfacility Project
The e-Ciber Superfacility Project
 
SKA NZ R&D BeSTGRID Infrastructure
SKA NZ R&D BeSTGRID InfrastructureSKA NZ R&D BeSTGRID Infrastructure
SKA NZ R&D BeSTGRID Infrastructure
 
Shibboleth Access Management Federations as an Organisational Model for SDI
Shibboleth Access Management Federations as an Organisational Model for SDIShibboleth Access Management Federations as an Organisational Model for SDI
Shibboleth Access Management Federations as an Organisational Model for SDI
 
ION Hangzhou - Opening Remarks
ION Hangzhou - Opening RemarksION Hangzhou - Opening Remarks
ION Hangzhou - Opening Remarks
 
Nectar cloud workshop ndj 20110331.2
Nectar cloud workshop ndj 20110331.2Nectar cloud workshop ndj 20110331.2
Nectar cloud workshop ndj 20110331.2
 
Cloud Computing Needs for Earth Observation Data Analysis: EGI and EOSC-hub
Cloud Computing Needs for Earth Observation Data Analysis: EGI and EOSC-hubCloud Computing Needs for Earth Observation Data Analysis: EGI and EOSC-hub
Cloud Computing Needs for Earth Observation Data Analysis: EGI and EOSC-hub
 
Authentication Methods: Shibboleth
Authentication Methods: ShibbolethAuthentication Methods: Shibboleth
Authentication Methods: Shibboleth
 
Service-Oriented Architecture Methods to Develop Networked Library Services
Service-Oriented Architecture Methods to Develop Networked Library ServicesService-Oriented Architecture Methods to Develop Networked Library Services
Service-Oriented Architecture Methods to Develop Networked Library Services
 
Prompting an EOSC in Practice, Isabel Campos, CSIC & Member of the High Level...
Prompting an EOSC in Practice, Isabel Campos, CSIC & Member of the High Level...Prompting an EOSC in Practice, Isabel Campos, CSIC & Member of the High Level...
Prompting an EOSC in Practice, Isabel Campos, CSIC & Member of the High Level...
 
SGCI OAC webinar 4 18-19
SGCI OAC webinar 4 18-19SGCI OAC webinar 4 18-19
SGCI OAC webinar 4 18-19
 
Federated Cloud Computing
Federated Cloud ComputingFederated Cloud Computing
Federated Cloud Computing
 
OGC Interoperability Experiments and Authentication
OGC Interoperability Experiments and AuthenticationOGC Interoperability Experiments and Authentication
OGC Interoperability Experiments and Authentication
 

Plus de JISC.AM

Identity Assurance Profiles
Identity Assurance ProfilesIdentity Assurance Profiles
Identity Assurance Profiles
JISC.AM
 
Names project (Amanda Hill)
Names project (Amanda Hill)Names project (Amanda Hill)
Names project (Amanda Hill)
JISC.AM
 
Identity: Future directions (David Orrell, Eduserv Foundation)
Identity: Future directions (David Orrell, Eduserv Foundation)Identity: Future directions (David Orrell, Eduserv Foundation)
Identity: Future directions (David Orrell, Eduserv Foundation)
JISC.AM
 
Identity: Future directions (David Orrell, Eduserv Foundation)
Identity: Future directions (David Orrell, Eduserv Foundation)Identity: Future directions (David Orrell, Eduserv Foundation)
Identity: Future directions (David Orrell, Eduserv Foundation)
JISC.AM
 

Plus de JISC.AM (20)

Identity Assurance Profiles
Identity Assurance ProfilesIdentity Assurance Profiles
Identity Assurance Profiles
 
Assurance
AssuranceAssurance
Assurance
 
I2 Fedsoup
I2 FedsoupI2 Fedsoup
I2 Fedsoup
 
Cuckoo (Graham Mason, Ed Beddows)
Cuckoo (Graham Mason, Ed Beddows)Cuckoo (Graham Mason, Ed Beddows)
Cuckoo (Graham Mason, Ed Beddows)
 
Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)Federated Futures (Nicole Harris)
Federated Futures (Nicole Harris)
 
Introduction to Shib 2.0 (Chad La Joie)
Introduction to Shib 2.0 (Chad La Joie)Introduction to Shib 2.0 (Chad La Joie)
Introduction to Shib 2.0 (Chad La Joie)
 
The Identity Project (Rhys Smith)
The Identity Project (Rhys Smith)The Identity Project (Rhys Smith)
The Identity Project (Rhys Smith)
 
Shibboleth 2.0 IdP slides - Installfest (Edited)
Shibboleth 2.0 IdP slides - Installfest (Edited)Shibboleth 2.0 IdP slides - Installfest (Edited)
Shibboleth 2.0 IdP slides - Installfest (Edited)
 
Shibboleth 2.0 SP slides - Installfest
Shibboleth 2.0 SP slides - InstallfestShibboleth 2.0 SP slides - Installfest
Shibboleth 2.0 SP slides - Installfest
 
Names project (Amanda Hill)
Names project (Amanda Hill)Names project (Amanda Hill)
Names project (Amanda Hill)
 
Identity: Future directions (David Orrell, Eduserv Foundation)
Identity: Future directions (David Orrell, Eduserv Foundation)Identity: Future directions (David Orrell, Eduserv Foundation)
Identity: Future directions (David Orrell, Eduserv Foundation)
 
Identity: Future directions (David Orrell, Eduserv Foundation)
Identity: Future directions (David Orrell, Eduserv Foundation)Identity: Future directions (David Orrell, Eduserv Foundation)
Identity: Future directions (David Orrell, Eduserv Foundation)
 
Internet2 Fall MM 2007 - Jane Charlton
Internet2 Fall MM 2007 - Jane CharltonInternet2 Fall MM 2007 - Jane Charlton
Internet2 Fall MM 2007 - Jane Charlton
 
'Connecting poeple to resources' by Nicole Harris at UKSG 2007
'Connecting poeple to resources' by Nicole Harris at UKSG 2007'Connecting poeple to resources' by Nicole Harris at UKSG 2007
'Connecting poeple to resources' by Nicole Harris at UKSG 2007
 
Openid
OpenidOpenid
Openid
 
Federated Access Management 102
Federated Access Management 102Federated Access Management 102
Federated Access Management 102
 
Federated Access Management (Sconul Access Conference)
Federated Access Management (Sconul Access Conference)Federated Access Management (Sconul Access Conference)
Federated Access Management (Sconul Access Conference)
 
Federated Access Management (SFEU)
Federated Access Management (SFEU)Federated Access Management (SFEU)
Federated Access Management (SFEU)
 
OpenID and Usercentric Identity: It's All About Me
OpenID and Usercentric Identity: It's All About MeOpenID and Usercentric Identity: It's All About Me
OpenID and Usercentric Identity: It's All About Me
 
McShib2: UK federation update
McShib2: UK federation updateMcShib2: UK federation update
McShib2: UK federation update
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

SARoNGS project (Jens Jensen)

  • 1. SARoNGS Jens Jensen <j.jensen at rl.ac.uk> JISC access management event 30 June 2008
  • 2. NGS “ To provide coherent electronic access for UK researchers to all computational and data based resources and facilities required to carry out their research, independent of resource or researcher location” 4 core sites, 7 partners, 7-9 affiliates
  • 3. What is it? S hibboleth A ccess to R esources o n the N ational G rid S ervice But what does it do? Funded by JISC! Shebangs MIMAS VPMan ShibGrid SARoNGS
  • 4. Goals Broaden the NGS user base Ease access for researchers who are not technology specialists London marathon ’06 image: Ian Wilson: CC Attribution 2.0
  • 5. Goals Provide access to resources Encourage collaborations in Virtual Organisations
  • 6. Goals Prevent unauthorised access Easier support for service provider
  • 7. Goals Deliver a production service!
  • 8. Currently People use X.509 certificates to access NGS resources Trusted globally - IGTF Sometimes seen as challenging to use
  • 9. In SARoNGS People who have certificates can keep using them Created transparently for people who don’t have them Users don’t even know they have certificates!
  • 10. Architecture CTS MyProxy User and management portals The NGS Grid VO Management CTS access control research resources (MIMAS)‏
  • 12. What’s in it for you? If you’re a user: non-certificate access to the NGS, mainly via portals
  • 13. What’s in it for you? If you are a service provider: hook into NGS SP/portal (if you wish)‏ (particularly if you require X.509)‏ Using NGS’ VO management infrastructure (Fine print: note UK Fed. restrictions)‏
  • 14. What’s in it for you? If you are a foreign federation We’ve got stuff you can reuse (Fine print: we’re built for the UK Federation)‏
  • 15. What’s in it for you? (soon)‏ More Shibbolised resources NGS SRB Oracle OGSA-DAI iRODS Shibbolised in the ASPiS project
  • 16. Gaps? Further services Attributes… Real VOs… Assurance
  • 17. SARoNGS summary Integrated security Production ready Usable Interoperable Registered