SlideShare une entreprise Scribd logo
1  sur  37
Facilitating Scientific Collaborations by
Delegating Identity Management
Reducing Barriers and
Roadmap for Incremental Implementation
Robert Cowles, Craig Jackson, Von Welch (PI)
May 5th, 2015
2
The XSIM Team
Robert Cowles – BrightLite Information
Security, former CISO of SLAC.
Craig Jackson – CACR Policy Analyst,
former practicing attorney.
Von Welch – CACR Director, long time
distributed science security researcher.
3
Our talk…
• Context – scientific collaboration,
resource providers and identity.
• Barriers and potential mitigation
• Our VO Identity Model
4
The “Good Old Days”
Scientists were
employees or
students – physically
co-located.
Image credit: Wikipedia
4
5
Then remote access…
Scientists start being
remote from the
computers.
But still affiliated
with computing
centers.
Image credit: All About Apple Museum
Creative Commons Attribution-Share Alike 2.5 Italy
5
6
Growth of the scientific
collaboration
Number of scientists, institutions, resources.
Large, expensive, rare/unique instruments.
Increasing amounts of data.
Image credit: Ian Bird/CERN
6
7
VO Identity Management
A number of approaches have been tried:
VOMS, Glide-ins, Science gateways,
COManage, Community/group
accounts, etc.
We now have 15 years of applied
experimentation in VO IdM.
8
Extreme Scale Identity
Management for Science (XSIM)
• Research and develop a VO-IdM model to
express the trust relationships between
resource providers (RPs) and
collaboratories
• Validate the model and determine the
motivations that lead to the different choices
• Develop guidance to collaboratories and
RPs in architecting their IdM and trust
choices
9
Interviewees
Collaboratories
•Atlas
•BaBar
•Belle-II
•CMS
•Darkside
•Engage
•Earth System Grid
•Fermi Space Telescope
•LIGO
•LSST/DESC
Resource Providers
•Atlas Great Lakes T2
•FermiGrid
•GRIF
•U. Nebraska (CMS)
•LCLS
•RAL
•GRIF/LAL
•LLNL
•NERSC
•Blue Waters
10
Seemingly Contradictory Demands
• Current Processes and Policies
• Strong identification, authentication, and
authorization of user communities
• User communities
• Large scale with dynamic membership
• Span multiple resource providers
• Desire ease-of-use (e.g. single sign-on)
• Self management
Barriers and Mitigations
12
Identified Barriers
• Historical Inertial
• Risk Aversion
• Compliance and Assurance
Requirements
• Technology Limitations
13
Deemed Export
• “ … the release of controlled technology
to a foreign person … “
• An export license is required, EXCEPT:
• Research involving public information
• Fundamental research
• Suppliers of grid or cloud computing
• Can eliminate requirement for identity
proofing (needs legal review)
14
Unclassified Foreign Visits
• DOE O 142.3A (2010)
• Policy for access to computing resources
responsibility of DOE CIO; no policy
exists
• Access to scientific information and
commercially available technology is not
within scope of the order
• Can eliminate requirement for identity
proofing (needs legal review)
15
Inertia and Risk
• Significant policy and cultural investment
in current risk profile for cyber security
• DOE recognized need to shift to risk-
based security with O 205.1B in 2011
• Cyber program can be flexible if risks are
documented and residual risks accepted
• Transitive trust may significantly reduce
costs with little increase in residual risk
16
Traceability
• Throughout history of LHC grid, this has
been a requirement by the RPs
• With transitive trust, RP has no ability to
contact individuals
• OSG Traceability Project investigated
and found that, except in improbable
circumstances, sufficient information was
always available
17
Technology Limitations
• Many tools (source code systems, ssh,
etc.) assume traditional authentication
• Technology advances are coming rapidly
• Virtualization
• Grid and cloud computing
• Increased ability to share resources
within a group and increase isolation and
security from other groups
XSIM VO IdM Model
19
Roadmap for Incremental
Implementation
• Delegation of IdM is not all-or-nothing
• Partial delegation – certain functions –
can create a simpler workflow (for RPs
and users)
• Trusting the VO and accepting the risk
can significantly decrease administrative
costs
20
Transitive Trust
Classically RPs produced
and consumed all IdM data.
Brokered trust
relationships entail VOs &
TTPs generating user data,
to be consumed by RPs.
Transitive trust
relationships forego all
user data consumption by
RP.
21
Virtual Organization (VO)
• Created to manage scientific community
• Role in Transitive Trust IdM model
• Resource Providers (RPs) trust the VO to
manage its community
• Little or no individual user information is
transferred from the VO to the RP
• Central participant in Incident Response
VO IdM Model: Data-centric
Production & Consumption
Identity data is produced to
provide functionality to other
workflows when needed.
Identity data is consumed to
perform these functions.
Functionality
authentication
authorization
allocation/scheduling
accounting
auditing
user support
incident response
Model IdM Data
(1)User identifier
(2)User contact info
(3)VO membership/role
Examples of IdM Delegation
24
Identity Data Flow in the “Classic Model”
Authn
Authz
Audit
Accounting
Incident
Response
UserSupport
User Ids
&
Contact
info
RP produces
and consumes
all IdM
information.
RP
25
NERSC Scientific Gateway
• Defined “collaboration account” to enable
a team of researchers shared access to
resources in a secure, scalable manner
• NERSC delegates only authorization for
access to the collaboration account
• The VO determines user privileges and
resource access while NERSC controls
authentication, auditing, and accounting
26
NERSC Collaboration Account
RP
Authn
Authz
Allocations/
Scheduling
Incident
Response
UserSupport
Membership
And role
VO
User Ids
&
Contact
infoAudit
27
XSEDE Science Gateway
• Defn: Integrated set of tools customized
for a specific community
• Initially developed idea of “community
accounts” identifying projects, not users
• It was found that some identity needed to
be transmitted for purposes of accounting
• More recently, virtualization and cloud
computing have moved accounting
responsibility to the VO
28
XSEDE Science Gateway Model
User Ids
RP
Authn
Authz
Allocations/
Scheduling
Incident
Response
UserSupport
Contact
info
Science
Gatewa
y
GW Id
Audit
29
ATLAS use of PanDA
• PanDA – distributed job submission and
execution in a grid environment
• Uses a pilot job to allow VO control over
scheduling and can optionally run job
under submitting user’s identity
• All USATLAS sites (including DOE Labs)
do NOT use the identity changing option
• Complete delegation – RP’s depend on
ATLAS VO for user contact
30
Identity Data Flow in Multi-user Pilot Jobs
User
Identity
PKI
RP
Authn
Authz
Allocations/
Scheduling
Incident
Response
UserSupport
VO
Membership
User
contact
info
VO
Audit
31
Reference
Robert Cowles, Craig Jackson and Von
Welch. Facilitating Scientific Collaborations
by Delegating Identity Management:
Reducing Barriers & Roadmap for
Incremental Implementation
http://cacr.iu.edu/sites/cacr.iu.edu/files/FSCbyDIM0408.pdf
Will be presented at CLHS 15 in June 2015
32
Conclusion
Virtual Organizations have become essential for
scientific computing and XSIM has developed a
model for describing VO IdM based on IdM data
production and consumption.
Existing policies allow for delegation of IdM
functions within context of acceptable risk
Strategies exist for incremental increase in trust
and delegation of IdM functions
33
Thank you. Questions?
Von Welch (vwelch@iu.edu)
http://cacr.iu.edu/collab-idm
We thank the Department of Energy Next-Generation Networks for
Science (NGNS) program (Grant No. DE-FG02-12ER26111) for
funding this effort.
The views and conclusions contained herein are those of the author and should not be interpreted as
necessarily representing the official policies or endorsements, either expressed or implied, of the
sponsors or any organization.
34
Extra Slides
35
Research
Robert Cowles, Craig Jackson, and Von
Welch. Identity Management Factors for HEP
Virtual Organizations. 20th International
Conference on Computing in High Energy and
Nuclear Physics (CHEP2013), 2013
https://iopscience.iop.org/1742-6596/513/3/032022
36
Develop Model and Validate
Robert Cowles, Craig Jackson, and Von Welch. Identity
Management for Virtual Organizations: An Experience-Based
Model. eScience 2013, 2013
http://www.computer.org/csdl/proceedings/escience/2013/5083/00/5083a278-abs.html
Robert Cowles, Craig Jackson, Von Welch, and Shreyas
Cholia. A Model for Identity Management in Future Scientific
Collaboratories International Symposium on Grids and
Clouds (ISGC) 2014, 2014
http://pos.sissa.it/archive/conferences/210/026/ISGC2014_026.pdf
37
Develop Guidance
Von Welch, Robert Cowles, and Craig Jackson. XSIM OSG
IdM Guidance OSG-doc-1199, July 2014
http://osg-docdb.opensciencegrid.org/cgi-bin/ShowDocument?docid=1199
Robert Cowles, Craig Jackson, and Von Welch. Facilitating
Scientific Collaborations by Delegating Identity Management:
Reducing Barriers and Roadmap for Incremental
Implementation. March, 2015.
http://cacr.iu.edu/sites/cacr.iu.edu/files/FSCbyDIM0408.pdf

Contenu connexe

Tendances

II-SDV 2012 Patent Prior-Art Searching with Latent Semantic Analysis
II-SDV 2012 Patent Prior-Art Searching with Latent Semantic AnalysisII-SDV 2012 Patent Prior-Art Searching with Latent Semantic Analysis
II-SDV 2012 Patent Prior-Art Searching with Latent Semantic AnalysisDr. Haxel Consult
 
Supporting Research Data Management at the University of Stirling
Supporting Research Data Management at the University of StirlingSupporting Research Data Management at the University of Stirling
Supporting Research Data Management at the University of StirlingLisa Haddow
 
Data quality supporting AI in Life Sciences webinar 10 dec 2018
Data quality supporting AI in Life Sciences webinar 10 dec 2018Data quality supporting AI in Life Sciences webinar 10 dec 2018
Data quality supporting AI in Life Sciences webinar 10 dec 2018Pistoia Alliance
 
2010 za con_stephen_kreusch
2010 za con_stephen_kreusch2010 za con_stephen_kreusch
2010 za con_stephen_kreuschJohan Klerk
 
Competency framework: engineers, statisticians, data scientists, librarians, ...
Competency framework: engineers, statisticians, data scientists, librarians, ...Competency framework: engineers, statisticians, data scientists, librarians, ...
Competency framework: engineers, statisticians, data scientists, librarians, ...African Open Science Platform
 
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...FIA2010
 
The Evidence Hub: Harnessing the Collective Intelligence of Communities to Bu...
The Evidence Hub: Harnessing the Collective Intelligence of Communities to Bu...The Evidence Hub: Harnessing the Collective Intelligence of Communities to Bu...
The Evidence Hub: Harnessing the Collective Intelligence of Communities to Bu...Anna De Liddo
 
FSCI Persistent Identifiers
FSCI Persistent IdentifiersFSCI Persistent Identifiers
FSCI Persistent IdentifiersARDC
 
Ethics In DW & DM
Ethics In DW & DMEthics In DW & DM
Ethics In DW & DMabethan
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpValery Boronin
 
“Semantic Technologies for Smart Services”
“Semantic Technologies for Smart Services” “Semantic Technologies for Smart Services”
“Semantic Technologies for Smart Services” diannepatricia
 
Infrastructure, Standards, and Policies for Research Data Management
Infrastructure, Standards, and Policies for Research Data Management Infrastructure, Standards, and Policies for Research Data Management
Infrastructure, Standards, and Policies for Research Data Management Jian Qin
 
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMADomenico Catalano
 
Blockchain & Pharma
Blockchain & PharmaBlockchain & Pharma
Blockchain & PharmaCraig Ford
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 

Tendances (20)

Thesis Defense MBI
Thesis Defense MBIThesis Defense MBI
Thesis Defense MBI
 
II-SDV 2012 Patent Prior-Art Searching with Latent Semantic Analysis
II-SDV 2012 Patent Prior-Art Searching with Latent Semantic AnalysisII-SDV 2012 Patent Prior-Art Searching with Latent Semantic Analysis
II-SDV 2012 Patent Prior-Art Searching with Latent Semantic Analysis
 
Ucsd research-it-09-11-18
Ucsd research-it-09-11-18Ucsd research-it-09-11-18
Ucsd research-it-09-11-18
 
Supporting Research Data Management at the University of Stirling
Supporting Research Data Management at the University of StirlingSupporting Research Data Management at the University of Stirling
Supporting Research Data Management at the University of Stirling
 
Data quality supporting AI in Life Sciences webinar 10 dec 2018
Data quality supporting AI in Life Sciences webinar 10 dec 2018Data quality supporting AI in Life Sciences webinar 10 dec 2018
Data quality supporting AI in Life Sciences webinar 10 dec 2018
 
2010 za con_stephen_kreusch
2010 za con_stephen_kreusch2010 za con_stephen_kreusch
2010 za con_stephen_kreusch
 
Competency framework: engineers, statisticians, data scientists, librarians, ...
Competency framework: engineers, statisticians, data scientists, librarians, ...Competency framework: engineers, statisticians, data scientists, librarians, ...
Competency framework: engineers, statisticians, data scientists, librarians, ...
 
Uma sec council_june_22_v4
Uma sec council_june_22_v4Uma sec council_june_22_v4
Uma sec council_june_22_v4
 
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
Theodore Zahariadis (Synelixis Solutions): Fundamental Limitation of Current ...
 
The Evidence Hub: Harnessing the Collective Intelligence of Communities to Bu...
The Evidence Hub: Harnessing the Collective Intelligence of Communities to Bu...The Evidence Hub: Harnessing the Collective Intelligence of Communities to Bu...
The Evidence Hub: Harnessing the Collective Intelligence of Communities to Bu...
 
FSCI Persistent Identifiers
FSCI Persistent IdentifiersFSCI Persistent Identifiers
FSCI Persistent Identifiers
 
Ethics In DW & DM
Ethics In DW & DMEthics In DW & DM
Ethics In DW & DM
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can Help
 
“Semantic Technologies for Smart Services”
“Semantic Technologies for Smart Services” “Semantic Technologies for Smart Services”
“Semantic Technologies for Smart Services”
 
Infrastructure, Standards, and Policies for Research Data Management
Infrastructure, Standards, and Policies for Research Data Management Infrastructure, Standards, and Policies for Research Data Management
Infrastructure, Standards, and Policies for Research Data Management
 
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
Blockchain & Pharma
Blockchain & PharmaBlockchain & Pharma
Blockchain & Pharma
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Sgci all-hands-9-16-16
Sgci all-hands-9-16-16Sgci all-hands-9-16-16
Sgci all-hands-9-16-16
 

En vedette

Secure Data Sharing and Related Matters – An NIH View
Secure Data Sharing and Related Matters – An NIH ViewSecure Data Sharing and Related Matters – An NIH View
Secure Data Sharing and Related Matters – An NIH ViewPhilip Bourne
 
Cybersecurity for Science
Cybersecurity for ScienceCybersecurity for Science
Cybersecurity for ScienceVon Welch
 
Importance of expertise when analysing sport
Importance of expertise when analysing sportImportance of expertise when analysing sport
Importance of expertise when analysing sportKeane Wheeler
 
Connecting Librarians to Researchers
Connecting Librarians to ResearchersConnecting Librarians to Researchers
Connecting Librarians to ResearchersQSR International
 
Big Qualitative Data, Big Team, Little Time - A Path to Publication
Big Qualitative Data, Big Team, Little Time - A Path to PublicationBig Qualitative Data, Big Team, Little Time - A Path to Publication
Big Qualitative Data, Big Team, Little Time - A Path to PublicationQSR International
 
Winning the Tour de France, Research Data and Data Stewardship
Winning the Tour de France, Research Data and Data StewardshipWinning the Tour de France, Research Data and Data Stewardship
Winning the Tour de France, Research Data and Data StewardshipTU Delft, Netherlands
 
Improving Your Literature Reviews with NVivo 10 for Windows
Improving Your Literature Reviews with NVivo 10 for WindowsImproving Your Literature Reviews with NVivo 10 for Windows
Improving Your Literature Reviews with NVivo 10 for WindowsQSR International
 
Getting Started and Finishing your Dissertation Using NVivo
Getting Started and Finishing your Dissertation Using NVivoGetting Started and Finishing your Dissertation Using NVivo
Getting Started and Finishing your Dissertation Using NVivoQSR International
 

En vedette (9)

Secure Data Sharing and Related Matters – An NIH View
Secure Data Sharing and Related Matters – An NIH ViewSecure Data Sharing and Related Matters – An NIH View
Secure Data Sharing and Related Matters – An NIH View
 
Cybersecurity for Science
Cybersecurity for ScienceCybersecurity for Science
Cybersecurity for Science
 
Importance of expertise when analysing sport
Importance of expertise when analysing sportImportance of expertise when analysing sport
Importance of expertise when analysing sport
 
Connecting Librarians to Researchers
Connecting Librarians to ResearchersConnecting Librarians to Researchers
Connecting Librarians to Researchers
 
Big Qualitative Data, Big Team, Little Time - A Path to Publication
Big Qualitative Data, Big Team, Little Time - A Path to PublicationBig Qualitative Data, Big Team, Little Time - A Path to Publication
Big Qualitative Data, Big Team, Little Time - A Path to Publication
 
Winning the Tour de France, Research Data and Data Stewardship
Winning the Tour de France, Research Data and Data StewardshipWinning the Tour de France, Research Data and Data Stewardship
Winning the Tour de France, Research Data and Data Stewardship
 
Improving Your Literature Reviews with NVivo 10 for Windows
Improving Your Literature Reviews with NVivo 10 for WindowsImproving Your Literature Reviews with NVivo 10 for Windows
Improving Your Literature Reviews with NVivo 10 for Windows
 
A GMPLS Story
A GMPLS StoryA GMPLS Story
A GMPLS Story
 
Getting Started and Finishing your Dissertation Using NVivo
Getting Started and Finishing your Dissertation Using NVivoGetting Started and Finishing your Dissertation Using NVivo
Getting Started and Finishing your Dissertation Using NVivo
 

Similaire à Facilitating Scientific Collaborations by Delegating Identity Management

Welch owasp-feb-2015
Welch owasp-feb-2015Welch owasp-feb-2015
Welch owasp-feb-2015Von Welch
 
Identity Management for Virtual Organizations: A Model
Identity Management for Virtual Organizations: A ModelIdentity Management for Virtual Organizations: A Model
Identity Management for Virtual Organizations: A ModelVon Welch
 
Facilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity ManagementFacilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity Management Von Welch
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksLiming Zhu
 
Distributed Trust Architecture: The New Foundation of Everything
Distributed Trust Architecture: The New Foundation of EverythingDistributed Trust Architecture: The New Foundation of Everything
Distributed Trust Architecture: The New Foundation of EverythingLiming Zhu
 
Distributed Trust Architecture: The New Reality of ML-based Systems
Distributed Trust Architecture: The New Reality of ML-based SystemsDistributed Trust Architecture: The New Reality of ML-based Systems
Distributed Trust Architecture: The New Reality of ML-based SystemsLiming Zhu
 
State of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - KeynoteState of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - KeynoteNeo4j
 
BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...
BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...
BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...Big Data Value Association
 
Emerging Technologies in Synthetic Representation and Digital Twin
Emerging Technologies in Synthetic Representation and Digital TwinEmerging Technologies in Synthetic Representation and Digital Twin
Emerging Technologies in Synthetic Representation and Digital TwinLiming Zhu
 
Meeting Federal Research Requirements
Meeting Federal Research RequirementsMeeting Federal Research Requirements
Meeting Federal Research RequirementsICPSR
 
A Successful Data Strategy for Insurers in Volatile Times (ASEAN)
A Successful Data Strategy for Insurers in Volatile Times (ASEAN)A Successful Data Strategy for Insurers in Volatile Times (ASEAN)
A Successful Data Strategy for Insurers in Volatile Times (ASEAN)Denodo
 
#ALAAC15 Linked Data Love
#ALAAC15 Linked Data Love #ALAAC15 Linked Data Love
#ALAAC15 Linked Data Love Kristi Holmes
 
Beyond Meta-Data: Nano-Publications Recording Scientific Endeavour
Beyond Meta-Data: Nano-Publications Recording Scientific EndeavourBeyond Meta-Data: Nano-Publications Recording Scientific Endeavour
Beyond Meta-Data: Nano-Publications Recording Scientific EndeavourKNOWeSCAPE2014
 
Linked Open Data_mlanet13
Linked Open Data_mlanet13Linked Open Data_mlanet13
Linked Open Data_mlanet13Kristi Holmes
 
Direct Project HIT Standards 10.27
Direct Project HIT Standards 10.27Direct Project HIT Standards 10.27
Direct Project HIT Standards 10.27Brian Ahier
 
A Successful Data Strategy for Insurers in Volatile Times (EMEA)
A Successful Data Strategy for Insurers in Volatile Times (EMEA)A Successful Data Strategy for Insurers in Volatile Times (EMEA)
A Successful Data Strategy for Insurers in Volatile Times (EMEA)Denodo
 
Cyber Resilient Energy Delivery Consortium - Overview
Cyber Resilient Energy Delivery Consortium - OverviewCyber Resilient Energy Delivery Consortium - Overview
Cyber Resilient Energy Delivery Consortium - OverviewCheri Soliday
 

Similaire à Facilitating Scientific Collaborations by Delegating Identity Management (20)

Welch owasp-feb-2015
Welch owasp-feb-2015Welch owasp-feb-2015
Welch owasp-feb-2015
 
Identity Management for Virtual Organizations: A Model
Identity Management for Virtual Organizations: A ModelIdentity Management for Virtual Organizations: A Model
Identity Management for Virtual Organizations: A Model
 
Facilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity ManagementFacilitating Scientific Collaborations by Delegating Identity Management
Facilitating Scientific Collaborations by Delegating Identity Management
 
Responsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risksResponsible AI & Cybersecurity: A tale of two technology risks
Responsible AI & Cybersecurity: A tale of two technology risks
 
Distributed Trust Architecture: The New Foundation of Everything
Distributed Trust Architecture: The New Foundation of EverythingDistributed Trust Architecture: The New Foundation of Everything
Distributed Trust Architecture: The New Foundation of Everything
 
Distributed Trust Architecture: The New Reality of ML-based Systems
Distributed Trust Architecture: The New Reality of ML-based SystemsDistributed Trust Architecture: The New Reality of ML-based Systems
Distributed Trust Architecture: The New Reality of ML-based Systems
 
State of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - KeynoteState of Florida Neo4J Graph Briefing - Keynote
State of Florida Neo4J Graph Briefing - Keynote
 
Burton - Security, Privacy and Trust
Burton - Security, Privacy and TrustBurton - Security, Privacy and Trust
Burton - Security, Privacy and Trust
 
Sgci esip-7-20-18
Sgci esip-7-20-18Sgci esip-7-20-18
Sgci esip-7-20-18
 
BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...
BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...
BDVe Webinar Series - Ocean Protocol – Why you need to care about how you sha...
 
Emerging Technologies in Synthetic Representation and Digital Twin
Emerging Technologies in Synthetic Representation and Digital TwinEmerging Technologies in Synthetic Representation and Digital Twin
Emerging Technologies in Synthetic Representation and Digital Twin
 
Meeting Federal Research Requirements
Meeting Federal Research RequirementsMeeting Federal Research Requirements
Meeting Federal Research Requirements
 
A Successful Data Strategy for Insurers in Volatile Times (ASEAN)
A Successful Data Strategy for Insurers in Volatile Times (ASEAN)A Successful Data Strategy for Insurers in Volatile Times (ASEAN)
A Successful Data Strategy for Insurers in Volatile Times (ASEAN)
 
#ALAAC15 Linked Data Love
#ALAAC15 Linked Data Love #ALAAC15 Linked Data Love
#ALAAC15 Linked Data Love
 
Beyond Meta-Data: Nano-Publications Recording Scientific Endeavour
Beyond Meta-Data: Nano-Publications Recording Scientific EndeavourBeyond Meta-Data: Nano-Publications Recording Scientific Endeavour
Beyond Meta-Data: Nano-Publications Recording Scientific Endeavour
 
Linked Open Data_mlanet13
Linked Open Data_mlanet13Linked Open Data_mlanet13
Linked Open Data_mlanet13
 
Direct Project HIT Standards 10.27
Direct Project HIT Standards 10.27Direct Project HIT Standards 10.27
Direct Project HIT Standards 10.27
 
A Successful Data Strategy for Insurers in Volatile Times (EMEA)
A Successful Data Strategy for Insurers in Volatile Times (EMEA)A Successful Data Strategy for Insurers in Volatile Times (EMEA)
A Successful Data Strategy for Insurers in Volatile Times (EMEA)
 
Intro to RDM
Intro to RDMIntro to RDM
Intro to RDM
 
Cyber Resilient Energy Delivery Consortium - Overview
Cyber Resilient Energy Delivery Consortium - OverviewCyber Resilient Energy Delivery Consortium - Overview
Cyber Resilient Energy Delivery Consortium - Overview
 

Plus de Von Welch

Extreme-scale Identity Management for Scientific Collaborations
Extreme-scale Identity Management for Scientific CollaborationsExtreme-scale Identity Management for Scientific Collaborations
Extreme-scale Identity Management for Scientific CollaborationsVon Welch
 
CACR Overview
CACR OverviewCACR Overview
CACR OverviewVon Welch
 
Trustworthy Computational Science: Lessons Learned and Next Steps
Trustworthy Computational Science: Lessons Learned and Next StepsTrustworthy Computational Science: Lessons Learned and Next Steps
Trustworthy Computational Science: Lessons Learned and Next StepsVon Welch
 
Trustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveTrustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveVon Welch
 
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands Meeting
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands MeetingXSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands Meeting
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands MeetingVon Welch
 
Cybersecurity for Science
Cybersecurity for ScienceCybersecurity for Science
Cybersecurity for ScienceVon Welch
 
CACR Director's Update 2015
CACR Director's Update 2015CACR Director's Update 2015
CACR Director's Update 2015Von Welch
 
Campus Identities for Research.
Campus Identities for Research.Campus Identities for Research.
Campus Identities for Research.Von Welch
 

Plus de Von Welch (8)

Extreme-scale Identity Management for Scientific Collaborations
Extreme-scale Identity Management for Scientific CollaborationsExtreme-scale Identity Management for Scientific Collaborations
Extreme-scale Identity Management for Scientific Collaborations
 
CACR Overview
CACR OverviewCACR Overview
CACR Overview
 
Trustworthy Computational Science: Lessons Learned and Next Steps
Trustworthy Computational Science: Lessons Learned and Next StepsTrustworthy Computational Science: Lessons Learned and Next Steps
Trustworthy Computational Science: Lessons Learned and Next Steps
 
Trustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade PerspectiveTrustworthy Computational Science: A Multi-decade Perspective
Trustworthy Computational Science: A Multi-decade Perspective
 
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands Meeting
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands MeetingXSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands Meeting
XSIM and CTSC OSG Satellite Presentations at 2015 OSG All Hands Meeting
 
Cybersecurity for Science
Cybersecurity for ScienceCybersecurity for Science
Cybersecurity for Science
 
CACR Director's Update 2015
CACR Director's Update 2015CACR Director's Update 2015
CACR Director's Update 2015
 
Campus Identities for Research.
Campus Identities for Research.Campus Identities for Research.
Campus Identities for Research.
 

Dernier

Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Onlineanilsa9823
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 

Dernier (20)

Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 

Facilitating Scientific Collaborations by Delegating Identity Management

  • 1. Facilitating Scientific Collaborations by Delegating Identity Management Reducing Barriers and Roadmap for Incremental Implementation Robert Cowles, Craig Jackson, Von Welch (PI) May 5th, 2015
  • 2. 2 The XSIM Team Robert Cowles – BrightLite Information Security, former CISO of SLAC. Craig Jackson – CACR Policy Analyst, former practicing attorney. Von Welch – CACR Director, long time distributed science security researcher.
  • 3. 3 Our talk… • Context – scientific collaboration, resource providers and identity. • Barriers and potential mitigation • Our VO Identity Model
  • 4. 4 The “Good Old Days” Scientists were employees or students – physically co-located. Image credit: Wikipedia 4
  • 5. 5 Then remote access… Scientists start being remote from the computers. But still affiliated with computing centers. Image credit: All About Apple Museum Creative Commons Attribution-Share Alike 2.5 Italy 5
  • 6. 6 Growth of the scientific collaboration Number of scientists, institutions, resources. Large, expensive, rare/unique instruments. Increasing amounts of data. Image credit: Ian Bird/CERN 6
  • 7. 7 VO Identity Management A number of approaches have been tried: VOMS, Glide-ins, Science gateways, COManage, Community/group accounts, etc. We now have 15 years of applied experimentation in VO IdM.
  • 8. 8 Extreme Scale Identity Management for Science (XSIM) • Research and develop a VO-IdM model to express the trust relationships between resource providers (RPs) and collaboratories • Validate the model and determine the motivations that lead to the different choices • Develop guidance to collaboratories and RPs in architecting their IdM and trust choices
  • 9. 9 Interviewees Collaboratories •Atlas •BaBar •Belle-II •CMS •Darkside •Engage •Earth System Grid •Fermi Space Telescope •LIGO •LSST/DESC Resource Providers •Atlas Great Lakes T2 •FermiGrid •GRIF •U. Nebraska (CMS) •LCLS •RAL •GRIF/LAL •LLNL •NERSC •Blue Waters
  • 10. 10 Seemingly Contradictory Demands • Current Processes and Policies • Strong identification, authentication, and authorization of user communities • User communities • Large scale with dynamic membership • Span multiple resource providers • Desire ease-of-use (e.g. single sign-on) • Self management
  • 12. 12 Identified Barriers • Historical Inertial • Risk Aversion • Compliance and Assurance Requirements • Technology Limitations
  • 13. 13 Deemed Export • “ … the release of controlled technology to a foreign person … “ • An export license is required, EXCEPT: • Research involving public information • Fundamental research • Suppliers of grid or cloud computing • Can eliminate requirement for identity proofing (needs legal review)
  • 14. 14 Unclassified Foreign Visits • DOE O 142.3A (2010) • Policy for access to computing resources responsibility of DOE CIO; no policy exists • Access to scientific information and commercially available technology is not within scope of the order • Can eliminate requirement for identity proofing (needs legal review)
  • 15. 15 Inertia and Risk • Significant policy and cultural investment in current risk profile for cyber security • DOE recognized need to shift to risk- based security with O 205.1B in 2011 • Cyber program can be flexible if risks are documented and residual risks accepted • Transitive trust may significantly reduce costs with little increase in residual risk
  • 16. 16 Traceability • Throughout history of LHC grid, this has been a requirement by the RPs • With transitive trust, RP has no ability to contact individuals • OSG Traceability Project investigated and found that, except in improbable circumstances, sufficient information was always available
  • 17. 17 Technology Limitations • Many tools (source code systems, ssh, etc.) assume traditional authentication • Technology advances are coming rapidly • Virtualization • Grid and cloud computing • Increased ability to share resources within a group and increase isolation and security from other groups
  • 18. XSIM VO IdM Model
  • 19. 19 Roadmap for Incremental Implementation • Delegation of IdM is not all-or-nothing • Partial delegation – certain functions – can create a simpler workflow (for RPs and users) • Trusting the VO and accepting the risk can significantly decrease administrative costs
  • 20. 20 Transitive Trust Classically RPs produced and consumed all IdM data. Brokered trust relationships entail VOs & TTPs generating user data, to be consumed by RPs. Transitive trust relationships forego all user data consumption by RP.
  • 21. 21 Virtual Organization (VO) • Created to manage scientific community • Role in Transitive Trust IdM model • Resource Providers (RPs) trust the VO to manage its community • Little or no individual user information is transferred from the VO to the RP • Central participant in Incident Response
  • 22. VO IdM Model: Data-centric Production & Consumption Identity data is produced to provide functionality to other workflows when needed. Identity data is consumed to perform these functions. Functionality authentication authorization allocation/scheduling accounting auditing user support incident response Model IdM Data (1)User identifier (2)User contact info (3)VO membership/role
  • 23. Examples of IdM Delegation
  • 24. 24 Identity Data Flow in the “Classic Model” Authn Authz Audit Accounting Incident Response UserSupport User Ids & Contact info RP produces and consumes all IdM information. RP
  • 25. 25 NERSC Scientific Gateway • Defined “collaboration account” to enable a team of researchers shared access to resources in a secure, scalable manner • NERSC delegates only authorization for access to the collaboration account • The VO determines user privileges and resource access while NERSC controls authentication, auditing, and accounting
  • 27. 27 XSEDE Science Gateway • Defn: Integrated set of tools customized for a specific community • Initially developed idea of “community accounts” identifying projects, not users • It was found that some identity needed to be transmitted for purposes of accounting • More recently, virtualization and cloud computing have moved accounting responsibility to the VO
  • 28. 28 XSEDE Science Gateway Model User Ids RP Authn Authz Allocations/ Scheduling Incident Response UserSupport Contact info Science Gatewa y GW Id Audit
  • 29. 29 ATLAS use of PanDA • PanDA – distributed job submission and execution in a grid environment • Uses a pilot job to allow VO control over scheduling and can optionally run job under submitting user’s identity • All USATLAS sites (including DOE Labs) do NOT use the identity changing option • Complete delegation – RP’s depend on ATLAS VO for user contact
  • 30. 30 Identity Data Flow in Multi-user Pilot Jobs User Identity PKI RP Authn Authz Allocations/ Scheduling Incident Response UserSupport VO Membership User contact info VO Audit
  • 31. 31 Reference Robert Cowles, Craig Jackson and Von Welch. Facilitating Scientific Collaborations by Delegating Identity Management: Reducing Barriers & Roadmap for Incremental Implementation http://cacr.iu.edu/sites/cacr.iu.edu/files/FSCbyDIM0408.pdf Will be presented at CLHS 15 in June 2015
  • 32. 32 Conclusion Virtual Organizations have become essential for scientific computing and XSIM has developed a model for describing VO IdM based on IdM data production and consumption. Existing policies allow for delegation of IdM functions within context of acceptable risk Strategies exist for incremental increase in trust and delegation of IdM functions
  • 33. 33 Thank you. Questions? Von Welch (vwelch@iu.edu) http://cacr.iu.edu/collab-idm We thank the Department of Energy Next-Generation Networks for Science (NGNS) program (Grant No. DE-FG02-12ER26111) for funding this effort. The views and conclusions contained herein are those of the author and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the sponsors or any organization.
  • 35. 35 Research Robert Cowles, Craig Jackson, and Von Welch. Identity Management Factors for HEP Virtual Organizations. 20th International Conference on Computing in High Energy and Nuclear Physics (CHEP2013), 2013 https://iopscience.iop.org/1742-6596/513/3/032022
  • 36. 36 Develop Model and Validate Robert Cowles, Craig Jackson, and Von Welch. Identity Management for Virtual Organizations: An Experience-Based Model. eScience 2013, 2013 http://www.computer.org/csdl/proceedings/escience/2013/5083/00/5083a278-abs.html Robert Cowles, Craig Jackson, Von Welch, and Shreyas Cholia. A Model for Identity Management in Future Scientific Collaboratories International Symposium on Grids and Clouds (ISGC) 2014, 2014 http://pos.sissa.it/archive/conferences/210/026/ISGC2014_026.pdf
  • 37. 37 Develop Guidance Von Welch, Robert Cowles, and Craig Jackson. XSIM OSG IdM Guidance OSG-doc-1199, July 2014 http://osg-docdb.opensciencegrid.org/cgi-bin/ShowDocument?docid=1199 Robert Cowles, Craig Jackson, and Von Welch. Facilitating Scientific Collaborations by Delegating Identity Management: Reducing Barriers and Roadmap for Incremental Implementation. March, 2015. http://cacr.iu.edu/sites/cacr.iu.edu/files/FSCbyDIM0408.pdf

Notes de l'éditeur

  1. Formerly Advanced Identity Management for Extreme-Scale Scientific Collaboration Started September, 2013. Single investigator project – about 1 FTE total.
  2. Bottom right photo is Lester Welch at controls of Linac, USC.
  3. XXX FIX: Audit missing
  4. XXX FIX: Audit missing
  5. XXX FIX: Audit missing