SlideShare une entreprise Scribd logo
1  sur  41
Télécharger pour lire hors ligne
National Center for Supercomputing Applications
University of Illinois at Urbana–Champaign
Trusting External Identity
Providers for Global
Research Collaborations
Jim Basney
jbasney@ncsa.illinois.edu
IGTF at CERN (Sep 19 2016)
slideshare.net/jbasney
MIND THE GAP
About Jim
• Doing IAM at NCSA since 2001
• Operating IGTF CAs since 2007
• Operating CILogon since 2010
• Operating NCSA SAML IdP since 2016
• Contributing to IAM in LIGO, LSST, XSEDE
• Working to improve the security of e-infrastructure
• Cybersecurity Center of Excellence (trustedci.org)
• Software Assurance Marketplace (continuousassurance.org)
Topics
• Who do we trust to provide identity and access
management services for our research collaborations?
• When do we decide to implement it ourselves versus
relying on others?
• How do we create incentives for establishing trust?
• How do we bridge the gaps in trust, functionality, and
reliability?
Topics
• What new challenges appear when moving from 1 to 10
to 100 to 1000+ identity providers?
• Why does identity information flow more easily in
some federations and not others?
• How do we determine what identity assurance we need
and find providers who can meet those needs?
• How do we mitigate the risks of using external
identities?
• How do we effectively federate services operated by
the research community, higher education institutions,
NRENs, and commercial providers?
Gaps
• Incentives for trust/interoperability
• Needs/Priorities/Approaches:
• e-Research
• Higher Education
• Commercial
• Protocol standards and implementations
• Scaling to 2000+ IdPs
• Operational reliability
MIND THE GAP
Federations
!"#$%"&'()*+&
&
!"#$%%&'()*'(#$+*,-&).'/#0&-1#23#%-+4*&)'/#$4(#'%-4-1)%#&'5)-4/#
2003: IGTF established
2004: InCommon established
2005: SAML 2.0 adopted
2011: eduGAIN operational
2016: InCommon joins eduGAIN
CILogon
• Enables use of
federated identities
for access to
e-infrastructure
• Translates across
federations and
protocols
https://cilogon.org/
What new challenges appear when moving
from 1 to 10 to 100 to 1000 identity providers?
Scaling to 100+ CAs / 2000+ IdPs
• Risk management
• Interoperability
• Operational challenges
Expanding the identity trust boundary
Local IGTF eduGAIN Social IDs
1 IdP 98 CAs 2187 IdPs 1-20 IdPs
Trusted implicitly Peer review by
CA operators and
research project
representatives
Registration by
NREN federation
operators
Contractual
relationships
Local
policy/procedures
(undocumented?)
3 regional Policy
Management
Authorities
38 federations
adopted eduGAIN
Policy Framework
Internal
procedures
(not public?)
Direct relationship
with subscribers
Registration
Authorities
(e.g., VOs, e-
infrastructures)
vet subscribers
Direct relationship
with subscribers
(home IdPs)
Consumer
relationship with
subscribers
Users/Services Users/Services Users Users/Devices
Technology
IGTF eduGAIN Social IDs
X.509 SAML OpenID Connect (OIDC)
Certificates Assertions ID Tokens
Distinguished Names SAML2 NameID
(Transient, Persistent),
ePPN, ePTID
OIDC (public, pairwise)
sub claim
VOMS attributes
(group, role, …)
eduPerson attributes
(displayName, mail, …)
Claims
(name, email, …)
Characteristics of User Identifiers
• https://wiki.shibboleth.net/confluence/x/eYBC
• Persistent: doesn’t change across multiple sessions
(in contrast to transient identifiers)
• Revocable: user-identifier link can be severed
• Reassignable: a revoked identifier can be linked to a
different user (typically after some hiatus period)
• Opaque: identifier does not reveal the user’s identity
(in contrast to transparent identifiers)
Characteristics of User Identifiers
• https://wiki.shibboleth.net/confluence/x/eYBC
• Targeted: specific to a client or relying party, so the
user’s activities can not be correlated across applications
(in contrast to shared identifiers)
• Portable: usable across security domains
• Global: globally unique (e.g., qualified using a DNS
domain owned by the issuer)
Attributes and Identifiers
• X.509, SAML, and OIDC all support both user attributes
and identifiers
• In IGTF, CAs provide persistent identifiers (DNs) and
VOs provide attributes (e.g., VOMS)
• In eduGAIN, universities provide attributes
(eduPersonAffiliation) with transient identifiers
• Persistent identifiers are the exception!
• eduPersonPrincipalName may be re-assigned
• For social identity providers, an email address is often
used as the identifier
• May be re-assignable (e.g., Yahoo!)
Why does identity information flow more
easily in some federations and not others?
IGTF / X.509 eduGAIN / SAML Social IDs / OIDC
Grid Acceptable Use,
Accounting, and
Incident Response
policies provide a
framework for exchange
of user identity info
Attribute release policies
vary widely across
federations:
130 of 2187 IdPs
release the R&S
attribute bundle
Information flow is
driven by user consent,
a required step in the
OIDC protocol
CA issues certificate to
user who uses it with e-
infrastructure
IdP issues assertions
through browser
redirects for every
authentication
IdP is involved in every
authentication, using
data for commercial
purposes
CA is operated by
research organization
IdP is operated by
academic institution
IdP is operated by
commercial entity
https://technical.edugain.org/entities
When do we decide to implement IAM
ourselves versus relying on others?
Motivations and Driving Use Cases
• IGTF
• Enable access to e-infrastructure
• Per-user accounting, access control, incident response
• eduGAIN
• Access to online academic journals by library patrons
• Strong privacy protections
• Access to contracted cloud services
• Social IdPs
• Facilitate social connections
• Advertising and user activity tracking for commercial purposes
Unique IAM needs for e-Science
• Commercial CAs
• Why are IGTF requirements different from CA/Browser Forum?
• Acceptance of 3 year server certificates?
• Relax namespace requirements for server certificates?
• Rely on standard DV/OV/EV verification for server certs?
• Comodo, DigiCert, QuoVadis CAs now in IGTF distribution
• Pros/Cons of keeping separate
• Not impacted by attacks on wider commercial CAs
• Can’t use commodity CA services – letsencrypt.org
• Commercial IdPs
• Lack of support for scalable, multi-lateral federation
• Privacy concerns around commercial cloud/social providers
Unique IAM needs for e-Science
• Virtual Organizations
• Many small VOs well served by Google Apps?
• Large VOs are like other large multi-national organizations?
• Scaling to 100+ CAs / 2000+ IdPs
• Non-browser applications (SAML ECP)
• Increasing use of web apps, clouds, and mobile apps in
e-science
• Delegation, long-running workflows (proxy certificates)
• Interoperability across e-infrastructures
• Related to cloud interoperability?
How do we mitigate the risks of using external
identities?
Scoped Identifiers - Namespace constraints
• Enforcing a unique namespace for each issuer (CA, IdP)
reduces the impact of compromise of any one issuer
• Namespace constraints not a standard feature of X.509
• S/MIME verification based on email address in subjectAltName
• HTTPS verification based on domain name in subjectAltName
• Not required by CA/Browser Forum
• Constraints on DNs not relevant for S/MIME & HTTPS use cases
• Instead: HTTP Public Key Pinning (HPKP, RFC 7469)
• Namespace constraints not a standard feature of SAML
• Not needed for primary use cases: bi-lateral federation, attribute-
based authorization, transient identifiers
• Shibboleth metadata extension for multi-lateral federation
Office365 Auth Bypass Vulnerability
• Jointly discovered in Dec 2015 by Klemen Bratec from
Šola prihodnosti Maribor and Ioannis Kakavas from
Greek Research and Technology Network
• Microsoft Office 365 SAML Service Provider
implementation failed to check scope of IDPEmail
attribute used for authorization
• Allowed Office365 tenant to impersonate users from
another Office365 tenant
• Microsoft fixed the vulnerability within 7 hours of report
http://www.economyofmechanism.com/office365-authbypass
Namespace constraints
TO Issuer "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OSG CA 1" 
PERMIT Subject "/DC=org/DC=opensciencegrid/.*"
access_id_CA X509 '/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OSG CA 1'
pos_rights globus CA:sign
cond_subjects globus '"/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OSG CA 1"
"/DC=org/DC=opensciencegrid/*"'
<EntitiesDescriptor xmlns="urn:oasis:names:tc:SAML:2.0:metadata"
xmlns:shibmd="urn:mace:shibboleth:metadata:1.0" ...>
<EntityDescriptor entityID="https://idp.ncsa.illinois.edu/idp/shibboleth">
<IDPSSODescriptor ...>
<Extensions>
<shibmd:Scope regexp="false">ncsa.illinois.edu</shibmd:Scope> ...
Namespace constraints
• OpenID Connect (OIDC) relies on unique issuer identifier
for globally unique identifier
The sub (subject) and iss (issuer) Claims, used together, are the only Claims that an
RP can rely upon as a stable identifier for the End-User, since the sub Claim MUST
be locally unique and never reassigned within the Issuer for a particular End-User, as
described in Section 2. Therefore, the only guaranteed unique identifier for a given
End-User is the combination of the iss Claim and the sub Claim.
How do we effectively federate services
operated by the research community, higher
education institutions, NRENs, and commercial
providers?
Operational Gaps – Network Challenges
• IPv6
• 29 of 69 IGTF CRL distribution points have AAAA records
• 16 of 38 eduGAIN federation metadata distribution points
have AAAA records
• X.509 CRLs, SAML metadata, and CDNs
• CILogon and Comodo using CloudFlare CDN for CRLs
• samlbits.org CDN for SAML metadata
• Per-entity metadata
https://spaces.internet2.edu/display/perentity
We love CloudFlare!
Operational Gaps – Algorithm Agility
• SSLv3 ® TLSv1 ® TLSv1.2
• CILogon currently sees 85% TLSv1.2
• Browsers good at updating; CLIs & web apps not so much…
• MD5 ® SHA-1 ® SHA-512 ® SHA-256
• 2013-2015 IGTF transition
https://www.eugridpma.org/documentation/hashrat/sha2-timeline
• 2013-2014 InCommon transition
https://spaces.internet2.edu/x/AYbYAg
• RSA key bits: 512 ® 1024 ® 2048 ® 4096
Operational Gaps – Software Maintenance
• Shibboleth IdPv3 EOL Jul 31, 2016
https://spaces.internet2.edu/x/0IIQBg
Operational Gaps – Software Maintenance
• OpenSSL 1.0 changes CA filename hashing algorithm
• OpenSSL 1.1 (Aug 2016) changes APIs…
Date: Mon, 15 Feb 2010
It has come to the attention of the IGTF that the developers of the OpenSSL software
(www.openssl.org) are about to release a new version of their software (version 1.0)
which is fundamentally incompatible with both any pre-existing versions of their own
software, as well as bring incompatibility with many other software products that use a
directory-based trust anchor store (such as Apache's mod_ssl, the gLite Trust
Manager, gridSite or VOMS)...
Operational Gaps – Reliability
• eduGAIN CCS - https://technical.edugain.org/eccs/
• 2047 IdPs: 1300 OK / 396 error / 179 warning / 172 disabled
How do we determine what identity assurance
we need and find providers who can meet those
needs?
Identity Assurance
• InCommon Assurance program
www.incommon.org/assurance/
• Silver (LOA 2) and Bronze (LOA 1)
• IGTF CILogon Silver CA
• Lacking incentives: apps didn’t show up
• Implementation hurdles: audits and contractual
agreements
• Virginia Tech certified at LOA 2 but didn’t renew
• Too onerous to map from existing certifications
(e.g., DOE Labs)
• FICAM - idmanagement.gov
• Google certified at LOA 1 but didn’t renew
Identity Assurance
• IGTF
• Peer review
• Active engagement from relying parties
• Move to technology-agnostic assurance profiles
https://www.igtf.net/ap/authn-assurance/
• REFEDS Assurance WG - https://wiki.refeds.org/x/MgDI
• Apply IGTF-style assurance to SAML IdPs?
• CILogon-FNAL-LIGO-OSG engaged
• Still a question of incentives:
• Enable university IdPs to simply self-assert what they do
• Enable e-research IdPs to assert a higher assurance
Identity Assurance – Multi-Factor Auth
• e-Science use cases requiring multi-
factor authentication
• Blue Waters supercomputer at NCSA
• TACC resources (XSEDE)
• and others…
• NCSA Two Factor CA (IGTF)
• InCommon MFA Interoperability
Profile Working Group
• https://spaces.internet2.edu/x/CY5HBQ
• InCommon MFA Profile – spec almost fits
on one page!
• http://id.incommon.org/assurance/mfa
How do we bridge the gaps in trust,
functionality, and reliability?
Bridging the gaps: eduGAIN reality
• Some % of IdPs will always be broken
• Automate error handling
• Provide work-arounds
• identity linking, account recovery, catch-all IdPs
• Increase awareness
• Make it easy for participants to declare their practices /
requirements (attributes, assurance, error handling, etc.)
• Monitoring / alerts
• Sharing requirements (e.g., FIM4R)
Bridging the gaps: showing appreciation
To: participants@incommon.org
Dear fellow InCommon participants,
In August 2016, researchers from 136 InCommon IdPs successfully
used CILogon (an R&S SP) to access Globus, OOI, XSEDE, and
other cyberinfrastructure. The full IdP list is published at
<http://www.cilogon.org/stats>. Thanks for your support!
Bridging the gaps: role for e-infrastructure
• Continued need for e-infrastructure IdPs / federations
• Potential new roles for IGTF
Thanks!
jbasney@ncsa.illinois.edu
keybase.io/jbasney
F867 03EA 84ED 456A 7D3E
388E 04DA 0074 775D 6316
@JimBasney
slideshare.net/jbasney

Contenu connexe

Tendances

Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceVignesh Ganesan I Microsoft MVP
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3DigitalPersona
 
Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Priyanka Aash
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCloudIDSummit
 
Addressing Password Creep
Addressing Password CreepAddressing Password Creep
Addressing Password CreepDigitalPersona
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summaryBrandon Dunlap
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyDavid J Rosenthal
 
Creating Successful Extranets on SharePoint
Creating Successful Extranets on SharePointCreating Successful Extranets on SharePoint
Creating Successful Extranets on SharePointedynamic
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementPrashanth BS
 
PCI and Remote Vendors
PCI and Remote VendorsPCI and Remote Vendors
PCI and Remote VendorsObserveIT
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarJohn Lewis
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference ArchitectureHannu Kasanen
 
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT OperationsLeading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT OperationsOneLogin
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesOneLogin
 

Tendances (20)

IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access management
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
 
Addressing Password Creep
Addressing Password CreepAddressing Password Creep
Addressing Password Creep
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
Creating Successful Extranets on SharePoint
Creating Successful Extranets on SharePointCreating Successful Extranets on SharePoint
Creating Successful Extranets on SharePoint
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
PCI and Remote Vendors
PCI and Remote VendorsPCI and Remote Vendors
PCI and Remote Vendors
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference Architecture
 
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT OperationsLeading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
 

En vedette

Getting Social With Social: Using social media education to build relationshi...
Getting Social With Social: Using social media education to build relationshi...Getting Social With Social: Using social media education to build relationshi...
Getting Social With Social: Using social media education to build relationshi...Lindsay Nyquist
 
A sore throat or strep throat
A sore throat or strep throatA sore throat or strep throat
A sore throat or strep throatMegan Perkins
 
A sore throat or strep throat
A sore throat or strep throatA sore throat or strep throat
A sore throat or strep throatMegan Perkins
 
CILogon 2.0 MAGIC SC16
CILogon 2.0 MAGIC SC16CILogon 2.0 MAGIC SC16
CILogon 2.0 MAGIC SC16jbasney
 
SAML Security Contacts
SAML Security ContactsSAML Security Contacts
SAML Security Contactsjbasney
 
CILogon 2.0 at 2016 Internet2 Global Summit
CILogon 2.0 at 2016 Internet2 Global SummitCILogon 2.0 at 2016 Internet2 Global Summit
CILogon 2.0 at 2016 Internet2 Global Summitjbasney
 
Washtech presentation
Washtech presentationWashtech presentation
Washtech presentationsorgho
 
Tt 200 2014 tt_btc full
Tt 200 2014 tt_btc fullTt 200 2014 tt_btc full
Tt 200 2014 tt_btc fulllý Lác
 
презентациякитай
презентациякитайпрезентациякитай
презентациякитайnasten4ik_29
 
Commissione pariopportunitalmaschile
Commissione pariopportunitalmaschileCommissione pariopportunitalmaschile
Commissione pariopportunitalmaschileFrancesco Eterno
 
Diseño presentación corporativa SENTIMOTO LTD
Diseño presentación corporativa SENTIMOTO LTDDiseño presentación corporativa SENTIMOTO LTD
Diseño presentación corporativa SENTIMOTO LTDMarcel Molina Valenzuela
 
Applying to Graduate School
Applying to Graduate SchoolApplying to Graduate School
Applying to Graduate SchoolScott Wilson
 
Cybersecurity for Conservation
Cybersecurity for ConservationCybersecurity for Conservation
Cybersecurity for Conservationjbasney
 

En vedette (20)

Getting Social With Social: Using social media education to build relationshi...
Getting Social With Social: Using social media education to build relationshi...Getting Social With Social: Using social media education to build relationshi...
Getting Social With Social: Using social media education to build relationshi...
 
A sore throat or strep throat
A sore throat or strep throatA sore throat or strep throat
A sore throat or strep throat
 
A sore throat or strep throat
A sore throat or strep throatA sore throat or strep throat
A sore throat or strep throat
 
Misde
MisdeMisde
Misde
 
CILogon 2.0 MAGIC SC16
CILogon 2.0 MAGIC SC16CILogon 2.0 MAGIC SC16
CILogon 2.0 MAGIC SC16
 
SAML Security Contacts
SAML Security ContactsSAML Security Contacts
SAML Security Contacts
 
Hashtags & friends
Hashtags & friendsHashtags & friends
Hashtags & friends
 
Bendaharawan
BendaharawanBendaharawan
Bendaharawan
 
Ptkp
PtkpPtkp
Ptkp
 
CILogon 2.0 at 2016 Internet2 Global Summit
CILogon 2.0 at 2016 Internet2 Global SummitCILogon 2.0 at 2016 Internet2 Global Summit
CILogon 2.0 at 2016 Internet2 Global Summit
 
Washtech presentation
Washtech presentationWashtech presentation
Washtech presentation
 
Brianna
BriannaBrianna
Brianna
 
Tt 200 2014 tt_btc full
Tt 200 2014 tt_btc fullTt 200 2014 tt_btc full
Tt 200 2014 tt_btc full
 
презентациякитай
презентациякитайпрезентациякитай
презентациякитай
 
Commissione pariopportunitalmaschile
Commissione pariopportunitalmaschileCommissione pariopportunitalmaschile
Commissione pariopportunitalmaschile
 
Diseño presentación corporativa SENTIMOTO LTD
Diseño presentación corporativa SENTIMOTO LTDDiseño presentación corporativa SENTIMOTO LTD
Diseño presentación corporativa SENTIMOTO LTD
 
Applying to Graduate School
Applying to Graduate SchoolApplying to Graduate School
Applying to Graduate School
 
Cybersecurity for Conservation
Cybersecurity for ConservationCybersecurity for Conservation
Cybersecurity for Conservation
 
Module 2
Module 2Module 2
Module 2
 
Magazzini
MagazziniMagazzini
Magazzini
 

Similaire à Trusting External Identity Providers for Global Research Collaborations

TechFuse 2012: Cloud and Mobile Computing
TechFuse 2012: Cloud and Mobile ComputingTechFuse 2012: Cloud and Mobile Computing
TechFuse 2012: Cloud and Mobile ComputingAvtex
 
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptxirfanullahkhan64
 
Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44Jisc
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014Kelly Grizzle
 
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You ThinkCIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You ThinkCloudIDSummit
 
Should healthcare abandon the cloud final
Should healthcare abandon the cloud finalShould healthcare abandon the cloud final
Should healthcare abandon the cloud finalsapenov
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern ArchitecturesSecureAuth
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseEvan Hodges
 
Cloud Native Journey in Synchrony Financial
Cloud Native Journey in Synchrony FinancialCloud Native Journey in Synchrony Financial
Cloud Native Journey in Synchrony FinancialVMware Tanzu
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huangKen Huang
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
 
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...apidays
 
Navigating The Clouds With An Enterprise IT Strategy
Navigating The Clouds With An Enterprise IT StrategyNavigating The Clouds With An Enterprise IT Strategy
Navigating The Clouds With An Enterprise IT Strategyredmiller1
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Cloud Security Alliance Lviv Chapter
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementManish Harsh
 
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119lior mazor
 

Similaire à Trusting External Identity Providers for Global Research Collaborations (20)

Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
TechFuse 2012: Cloud and Mobile Computing
TechFuse 2012: Cloud and Mobile ComputingTechFuse 2012: Cloud and Mobile Computing
TechFuse 2012: Cloud and Mobile Computing
 
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud Management
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptx
 
Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44Trust and identity in the Géant project - Networkshop44
Trust and identity in the Géant project - Networkshop44
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
 
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You ThinkCIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
 
Should healthcare abandon the cloud final
Should healthcare abandon the cloud finalShould healthcare abandon the cloud final
Should healthcare abandon the cloud final
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern Architectures
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise
 
Cloud Native Journey in Synchrony Financial
Cloud Native Journey in Synchrony FinancialCloud Native Journey in Synchrony Financial
Cloud Native Journey in Synchrony Financial
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huang
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
APIsecure 2023 - Approaching Multicloud API Security USing Metacloud, David L...
 
Navigating The Clouds With An Enterprise IT Strategy
Navigating The Clouds With An Enterprise IT StrategyNavigating The Clouds With An Enterprise IT Strategy
Navigating The Clouds With An Enterprise IT Strategy
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
 
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
 

Plus de jbasney

Guidance and Survey Results from the Trustworthy Data Working Group
Guidance and Survey Results from the Trustworthy Data Working GroupGuidance and Survey Results from the Trustworthy Data Working Group
Guidance and Survey Results from the Trustworthy Data Working Groupjbasney
 
Federated Identity Needs for the Large Synoptic Survey Telescope (LSST)
Federated Identity Needs for the Large Synoptic Survey Telescope (LSST)Federated Identity Needs for the Large Synoptic Survey Telescope (LSST)
Federated Identity Needs for the Large Synoptic Survey Telescope (LSST)jbasney
 
CILogon & SciTokens: OIDC/OAuth Federation
CILogon & SciTokens: OIDC/OAuth FederationCILogon & SciTokens: OIDC/OAuth Federation
CILogon & SciTokens: OIDC/OAuth Federationjbasney
 
CILogon 2.0 - IAM Online Webinar Series
CILogon 2.0 - IAM Online Webinar SeriesCILogon 2.0 - IAM Online Webinar Series
CILogon 2.0 - IAM Online Webinar Seriesjbasney
 
Lightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure
Lightweight Cybersecurity Risk Assessment Tools for CyberinfrastructureLightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure
Lightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructurejbasney
 
CILogon 2.0 at Oct 2017 CICI PI meeting
CILogon 2.0 at Oct 2017 CICI PI meetingCILogon 2.0 at Oct 2017 CICI PI meeting
CILogon 2.0 at Oct 2017 CICI PI meetingjbasney
 
11th FIM4R Workshop: US Projects Update
11th FIM4R Workshop: US Projects Update11th FIM4R Workshop: US Projects Update
11th FIM4R Workshop: US Projects Updatejbasney
 
CILogon PEARC17
CILogon PEARC17CILogon PEARC17
CILogon PEARC17jbasney
 
CILogon 2.0 at 2017 Internet2 Global Summit
CILogon 2.0 at 2017 Internet2 Global SummitCILogon 2.0 at 2017 Internet2 Global Summit
CILogon 2.0 at 2017 Internet2 Global Summitjbasney
 
CTSC+SWAMP: cybersecurity resources for your campus
CTSC+SWAMP: cybersecurity resources for your campusCTSC+SWAMP: cybersecurity resources for your campus
CTSC+SWAMP: cybersecurity resources for your campusjbasney
 
CILogon: An Integrated Identity and Access Management Platform for Science
CILogon: An Integrated Identity and Access Management Platform for ScienceCILogon: An Integrated Identity and Access Management Platform for Science
CILogon: An Integrated Identity and Access Management Platform for Sciencejbasney
 
CILogon 2.0 Update at TechEx 2016
CILogon 2.0 Update at TechEx 2016CILogon 2.0 Update at TechEx 2016
CILogon 2.0 Update at TechEx 2016jbasney
 
CTSC at TNC16
CTSC at TNC16CTSC at TNC16
CTSC at TNC16jbasney
 
FeduShare TechEx15
FeduShare TechEx15FeduShare TechEx15
FeduShare TechEx15jbasney
 
CILogon 2.0 at REFEDS 30
CILogon 2.0 at REFEDS 30CILogon 2.0 at REFEDS 30
CILogon 2.0 at REFEDS 30jbasney
 
CILogon and InCommon: Technical Update
CILogon and InCommon: Technical UpdateCILogon and InCommon: Technical Update
CILogon and InCommon: Technical Updatejbasney
 

Plus de jbasney (16)

Guidance and Survey Results from the Trustworthy Data Working Group
Guidance and Survey Results from the Trustworthy Data Working GroupGuidance and Survey Results from the Trustworthy Data Working Group
Guidance and Survey Results from the Trustworthy Data Working Group
 
Federated Identity Needs for the Large Synoptic Survey Telescope (LSST)
Federated Identity Needs for the Large Synoptic Survey Telescope (LSST)Federated Identity Needs for the Large Synoptic Survey Telescope (LSST)
Federated Identity Needs for the Large Synoptic Survey Telescope (LSST)
 
CILogon & SciTokens: OIDC/OAuth Federation
CILogon & SciTokens: OIDC/OAuth FederationCILogon & SciTokens: OIDC/OAuth Federation
CILogon & SciTokens: OIDC/OAuth Federation
 
CILogon 2.0 - IAM Online Webinar Series
CILogon 2.0 - IAM Online Webinar SeriesCILogon 2.0 - IAM Online Webinar Series
CILogon 2.0 - IAM Online Webinar Series
 
Lightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure
Lightweight Cybersecurity Risk Assessment Tools for CyberinfrastructureLightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure
Lightweight Cybersecurity Risk Assessment Tools for Cyberinfrastructure
 
CILogon 2.0 at Oct 2017 CICI PI meeting
CILogon 2.0 at Oct 2017 CICI PI meetingCILogon 2.0 at Oct 2017 CICI PI meeting
CILogon 2.0 at Oct 2017 CICI PI meeting
 
11th FIM4R Workshop: US Projects Update
11th FIM4R Workshop: US Projects Update11th FIM4R Workshop: US Projects Update
11th FIM4R Workshop: US Projects Update
 
CILogon PEARC17
CILogon PEARC17CILogon PEARC17
CILogon PEARC17
 
CILogon 2.0 at 2017 Internet2 Global Summit
CILogon 2.0 at 2017 Internet2 Global SummitCILogon 2.0 at 2017 Internet2 Global Summit
CILogon 2.0 at 2017 Internet2 Global Summit
 
CTSC+SWAMP: cybersecurity resources for your campus
CTSC+SWAMP: cybersecurity resources for your campusCTSC+SWAMP: cybersecurity resources for your campus
CTSC+SWAMP: cybersecurity resources for your campus
 
CILogon: An Integrated Identity and Access Management Platform for Science
CILogon: An Integrated Identity and Access Management Platform for ScienceCILogon: An Integrated Identity and Access Management Platform for Science
CILogon: An Integrated Identity and Access Management Platform for Science
 
CILogon 2.0 Update at TechEx 2016
CILogon 2.0 Update at TechEx 2016CILogon 2.0 Update at TechEx 2016
CILogon 2.0 Update at TechEx 2016
 
CTSC at TNC16
CTSC at TNC16CTSC at TNC16
CTSC at TNC16
 
FeduShare TechEx15
FeduShare TechEx15FeduShare TechEx15
FeduShare TechEx15
 
CILogon 2.0 at REFEDS 30
CILogon 2.0 at REFEDS 30CILogon 2.0 at REFEDS 30
CILogon 2.0 at REFEDS 30
 
CILogon and InCommon: Technical Update
CILogon and InCommon: Technical UpdateCILogon and InCommon: Technical Update
CILogon and InCommon: Technical Update
 

Dernier

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Dernier (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Trusting External Identity Providers for Global Research Collaborations

  • 1. National Center for Supercomputing Applications University of Illinois at Urbana–Champaign Trusting External Identity Providers for Global Research Collaborations Jim Basney jbasney@ncsa.illinois.edu IGTF at CERN (Sep 19 2016) slideshare.net/jbasney MIND THE GAP
  • 2. About Jim • Doing IAM at NCSA since 2001 • Operating IGTF CAs since 2007 • Operating CILogon since 2010 • Operating NCSA SAML IdP since 2016 • Contributing to IAM in LIGO, LSST, XSEDE • Working to improve the security of e-infrastructure • Cybersecurity Center of Excellence (trustedci.org) • Software Assurance Marketplace (continuousassurance.org)
  • 3. Topics • Who do we trust to provide identity and access management services for our research collaborations? • When do we decide to implement it ourselves versus relying on others? • How do we create incentives for establishing trust? • How do we bridge the gaps in trust, functionality, and reliability?
  • 4. Topics • What new challenges appear when moving from 1 to 10 to 100 to 1000+ identity providers? • Why does identity information flow more easily in some federations and not others? • How do we determine what identity assurance we need and find providers who can meet those needs? • How do we mitigate the risks of using external identities? • How do we effectively federate services operated by the research community, higher education institutions, NRENs, and commercial providers?
  • 5. Gaps • Incentives for trust/interoperability • Needs/Priorities/Approaches: • e-Research • Higher Education • Commercial • Protocol standards and implementations • Scaling to 2000+ IdPs • Operational reliability MIND THE GAP
  • 6. Federations !"#$%"&'()*+& & !"#$%%&'()*'(#$+*,-&).'/#0&-1#23#%-+4*&)'/#$4(#'%-4-1)%#&'5)-4/# 2003: IGTF established 2004: InCommon established 2005: SAML 2.0 adopted 2011: eduGAIN operational 2016: InCommon joins eduGAIN
  • 7. CILogon • Enables use of federated identities for access to e-infrastructure • Translates across federations and protocols https://cilogon.org/
  • 8. What new challenges appear when moving from 1 to 10 to 100 to 1000 identity providers?
  • 9. Scaling to 100+ CAs / 2000+ IdPs • Risk management • Interoperability • Operational challenges
  • 10. Expanding the identity trust boundary Local IGTF eduGAIN Social IDs 1 IdP 98 CAs 2187 IdPs 1-20 IdPs Trusted implicitly Peer review by CA operators and research project representatives Registration by NREN federation operators Contractual relationships Local policy/procedures (undocumented?) 3 regional Policy Management Authorities 38 federations adopted eduGAIN Policy Framework Internal procedures (not public?) Direct relationship with subscribers Registration Authorities (e.g., VOs, e- infrastructures) vet subscribers Direct relationship with subscribers (home IdPs) Consumer relationship with subscribers Users/Services Users/Services Users Users/Devices
  • 11. Technology IGTF eduGAIN Social IDs X.509 SAML OpenID Connect (OIDC) Certificates Assertions ID Tokens Distinguished Names SAML2 NameID (Transient, Persistent), ePPN, ePTID OIDC (public, pairwise) sub claim VOMS attributes (group, role, …) eduPerson attributes (displayName, mail, …) Claims (name, email, …)
  • 12. Characteristics of User Identifiers • https://wiki.shibboleth.net/confluence/x/eYBC • Persistent: doesn’t change across multiple sessions (in contrast to transient identifiers) • Revocable: user-identifier link can be severed • Reassignable: a revoked identifier can be linked to a different user (typically after some hiatus period) • Opaque: identifier does not reveal the user’s identity (in contrast to transparent identifiers)
  • 13. Characteristics of User Identifiers • https://wiki.shibboleth.net/confluence/x/eYBC • Targeted: specific to a client or relying party, so the user’s activities can not be correlated across applications (in contrast to shared identifiers) • Portable: usable across security domains • Global: globally unique (e.g., qualified using a DNS domain owned by the issuer)
  • 14. Attributes and Identifiers • X.509, SAML, and OIDC all support both user attributes and identifiers • In IGTF, CAs provide persistent identifiers (DNs) and VOs provide attributes (e.g., VOMS) • In eduGAIN, universities provide attributes (eduPersonAffiliation) with transient identifiers • Persistent identifiers are the exception! • eduPersonPrincipalName may be re-assigned • For social identity providers, an email address is often used as the identifier • May be re-assignable (e.g., Yahoo!)
  • 15. Why does identity information flow more easily in some federations and not others? IGTF / X.509 eduGAIN / SAML Social IDs / OIDC Grid Acceptable Use, Accounting, and Incident Response policies provide a framework for exchange of user identity info Attribute release policies vary widely across federations: 130 of 2187 IdPs release the R&S attribute bundle Information flow is driven by user consent, a required step in the OIDC protocol CA issues certificate to user who uses it with e- infrastructure IdP issues assertions through browser redirects for every authentication IdP is involved in every authentication, using data for commercial purposes CA is operated by research organization IdP is operated by academic institution IdP is operated by commercial entity
  • 17. When do we decide to implement IAM ourselves versus relying on others?
  • 18. Motivations and Driving Use Cases • IGTF • Enable access to e-infrastructure • Per-user accounting, access control, incident response • eduGAIN • Access to online academic journals by library patrons • Strong privacy protections • Access to contracted cloud services • Social IdPs • Facilitate social connections • Advertising and user activity tracking for commercial purposes
  • 19. Unique IAM needs for e-Science • Commercial CAs • Why are IGTF requirements different from CA/Browser Forum? • Acceptance of 3 year server certificates? • Relax namespace requirements for server certificates? • Rely on standard DV/OV/EV verification for server certs? • Comodo, DigiCert, QuoVadis CAs now in IGTF distribution • Pros/Cons of keeping separate • Not impacted by attacks on wider commercial CAs • Can’t use commodity CA services – letsencrypt.org • Commercial IdPs • Lack of support for scalable, multi-lateral federation • Privacy concerns around commercial cloud/social providers
  • 20. Unique IAM needs for e-Science • Virtual Organizations • Many small VOs well served by Google Apps? • Large VOs are like other large multi-national organizations? • Scaling to 100+ CAs / 2000+ IdPs • Non-browser applications (SAML ECP) • Increasing use of web apps, clouds, and mobile apps in e-science • Delegation, long-running workflows (proxy certificates) • Interoperability across e-infrastructures • Related to cloud interoperability?
  • 21. How do we mitigate the risks of using external identities?
  • 22. Scoped Identifiers - Namespace constraints • Enforcing a unique namespace for each issuer (CA, IdP) reduces the impact of compromise of any one issuer • Namespace constraints not a standard feature of X.509 • S/MIME verification based on email address in subjectAltName • HTTPS verification based on domain name in subjectAltName • Not required by CA/Browser Forum • Constraints on DNs not relevant for S/MIME & HTTPS use cases • Instead: HTTP Public Key Pinning (HPKP, RFC 7469) • Namespace constraints not a standard feature of SAML • Not needed for primary use cases: bi-lateral federation, attribute- based authorization, transient identifiers • Shibboleth metadata extension for multi-lateral federation
  • 23. Office365 Auth Bypass Vulnerability • Jointly discovered in Dec 2015 by Klemen Bratec from Šola prihodnosti Maribor and Ioannis Kakavas from Greek Research and Technology Network • Microsoft Office 365 SAML Service Provider implementation failed to check scope of IDPEmail attribute used for authorization • Allowed Office365 tenant to impersonate users from another Office365 tenant • Microsoft fixed the vulnerability within 7 hours of report http://www.economyofmechanism.com/office365-authbypass
  • 24. Namespace constraints TO Issuer "/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OSG CA 1" PERMIT Subject "/DC=org/DC=opensciencegrid/.*" access_id_CA X509 '/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OSG CA 1' pos_rights globus CA:sign cond_subjects globus '"/DC=org/DC=cilogon/C=US/O=CILogon/CN=CILogon OSG CA 1" "/DC=org/DC=opensciencegrid/*"' <EntitiesDescriptor xmlns="urn:oasis:names:tc:SAML:2.0:metadata" xmlns:shibmd="urn:mace:shibboleth:metadata:1.0" ...> <EntityDescriptor entityID="https://idp.ncsa.illinois.edu/idp/shibboleth"> <IDPSSODescriptor ...> <Extensions> <shibmd:Scope regexp="false">ncsa.illinois.edu</shibmd:Scope> ...
  • 25. Namespace constraints • OpenID Connect (OIDC) relies on unique issuer identifier for globally unique identifier The sub (subject) and iss (issuer) Claims, used together, are the only Claims that an RP can rely upon as a stable identifier for the End-User, since the sub Claim MUST be locally unique and never reassigned within the Issuer for a particular End-User, as described in Section 2. Therefore, the only guaranteed unique identifier for a given End-User is the combination of the iss Claim and the sub Claim.
  • 26. How do we effectively federate services operated by the research community, higher education institutions, NRENs, and commercial providers?
  • 27. Operational Gaps – Network Challenges • IPv6 • 29 of 69 IGTF CRL distribution points have AAAA records • 16 of 38 eduGAIN federation metadata distribution points have AAAA records • X.509 CRLs, SAML metadata, and CDNs • CILogon and Comodo using CloudFlare CDN for CRLs • samlbits.org CDN for SAML metadata • Per-entity metadata https://spaces.internet2.edu/display/perentity
  • 29. Operational Gaps – Algorithm Agility • SSLv3 ® TLSv1 ® TLSv1.2 • CILogon currently sees 85% TLSv1.2 • Browsers good at updating; CLIs & web apps not so much… • MD5 ® SHA-1 ® SHA-512 ® SHA-256 • 2013-2015 IGTF transition https://www.eugridpma.org/documentation/hashrat/sha2-timeline • 2013-2014 InCommon transition https://spaces.internet2.edu/x/AYbYAg • RSA key bits: 512 ® 1024 ® 2048 ® 4096
  • 30. Operational Gaps – Software Maintenance • Shibboleth IdPv3 EOL Jul 31, 2016 https://spaces.internet2.edu/x/0IIQBg
  • 31. Operational Gaps – Software Maintenance • OpenSSL 1.0 changes CA filename hashing algorithm • OpenSSL 1.1 (Aug 2016) changes APIs… Date: Mon, 15 Feb 2010 It has come to the attention of the IGTF that the developers of the OpenSSL software (www.openssl.org) are about to release a new version of their software (version 1.0) which is fundamentally incompatible with both any pre-existing versions of their own software, as well as bring incompatibility with many other software products that use a directory-based trust anchor store (such as Apache's mod_ssl, the gLite Trust Manager, gridSite or VOMS)...
  • 32. Operational Gaps – Reliability • eduGAIN CCS - https://technical.edugain.org/eccs/ • 2047 IdPs: 1300 OK / 396 error / 179 warning / 172 disabled
  • 33. How do we determine what identity assurance we need and find providers who can meet those needs?
  • 34. Identity Assurance • InCommon Assurance program www.incommon.org/assurance/ • Silver (LOA 2) and Bronze (LOA 1) • IGTF CILogon Silver CA • Lacking incentives: apps didn’t show up • Implementation hurdles: audits and contractual agreements • Virginia Tech certified at LOA 2 but didn’t renew • Too onerous to map from existing certifications (e.g., DOE Labs) • FICAM - idmanagement.gov • Google certified at LOA 1 but didn’t renew
  • 35. Identity Assurance • IGTF • Peer review • Active engagement from relying parties • Move to technology-agnostic assurance profiles https://www.igtf.net/ap/authn-assurance/ • REFEDS Assurance WG - https://wiki.refeds.org/x/MgDI • Apply IGTF-style assurance to SAML IdPs? • CILogon-FNAL-LIGO-OSG engaged • Still a question of incentives: • Enable university IdPs to simply self-assert what they do • Enable e-research IdPs to assert a higher assurance
  • 36. Identity Assurance – Multi-Factor Auth • e-Science use cases requiring multi- factor authentication • Blue Waters supercomputer at NCSA • TACC resources (XSEDE) • and others… • NCSA Two Factor CA (IGTF) • InCommon MFA Interoperability Profile Working Group • https://spaces.internet2.edu/x/CY5HBQ • InCommon MFA Profile – spec almost fits on one page! • http://id.incommon.org/assurance/mfa
  • 37. How do we bridge the gaps in trust, functionality, and reliability?
  • 38. Bridging the gaps: eduGAIN reality • Some % of IdPs will always be broken • Automate error handling • Provide work-arounds • identity linking, account recovery, catch-all IdPs • Increase awareness • Make it easy for participants to declare their practices / requirements (attributes, assurance, error handling, etc.) • Monitoring / alerts • Sharing requirements (e.g., FIM4R)
  • 39. Bridging the gaps: showing appreciation To: participants@incommon.org Dear fellow InCommon participants, In August 2016, researchers from 136 InCommon IdPs successfully used CILogon (an R&S SP) to access Globus, OOI, XSEDE, and other cyberinfrastructure. The full IdP list is published at <http://www.cilogon.org/stats>. Thanks for your support!
  • 40. Bridging the gaps: role for e-infrastructure • Continued need for e-infrastructure IdPs / federations • Potential new roles for IGTF
  • 41. Thanks! jbasney@ncsa.illinois.edu keybase.io/jbasney F867 03EA 84ED 456A 7D3E 388E 04DA 0074 775D 6316 @JimBasney slideshare.net/jbasney