Australian eResearch Infrastructure Proposal Dr. Erik Vullings From an interoperability point of view on Authentication and Authorization using Middleware, Australia requires two frameworks: Shibboleth® for accessing common services found on the Internet, such as portals, Institutional Repositories, Content Management Systems, Wikis, etc., and PKI for accessing Grid Services, Grid Storage Facilities and High Performance Computing clusters, especially since most of these services are based on the Globus toolkit which requires PKI certificates. And clearly, interoperability between those frameworks is required. Additionally, from an eResearch point of view, many projects need a similar IT infrastructure: they need a website to disseminate their results, a CMS, Wiki, Forum, Mailing List, Calendar, Collaboration tools like Instant Messaging, VoIP, AV conferencing etc. As many of these projects are only funded for short durations, a lot of valuable research time is lost by building these common project IT infrastructures over and over again. Also, as some content must be protected, and some content can be openly accessible, authentication and authorization becomes a major issue. MAMS (Meta Access Mgmt System) proposes to restructure existing services in three layers: Layer 1: Federation Services, offers common services across the federation like a Where Are You From (WAYF) service, which also contains a list of trusted Identity Providers and Service Providers in the HE federation. In addition, it will contain the Australian CA and a MyProxy server, both protected via Shibboleth. This will allow Shibboleth users to convert their SAML assertion into a long-lived PKI certificate (of an appropriate LOA class) at the CA, or a short-lived (proxy) certificate via MyProxy. Finally, it will have a Federation Gateway to move from and to other federations. Layer 2: Trusted Identity Providers (e.g. HE institutions) and generic Service Providers (e.g. repositories), all protected via Shibboleth. Layer 3: eResearch Project or Virtual Organization layer, which contains generic IT infrastructure components that any eResearch project will require (compare this to web hosting facilities offered by an ISP: you can select the services you need before you start your project, and it will be setup for your use when you start). The main access point will be the VO’s Service Provider access point, which is a recognized SP in the Federation, and therefore can receive SAML assertions from an IdP. In addition, it will obtain a proxy certificate for users from the Federation MyProxy server, so the VO portal (GridSphere) will have access to a proxy certificate which can be used to access Grid/HPC services. The VO-SP will be integrated with a VO-IdP to access all Shibboleth protected services within the project. The portal will also be enriched by a Group Manager, similar to VOMS, so authorization within a VO can leverage this information. Middleware Infrastructure Federation Services Federation Services WAYF CA SP Federation Members: Identity Providers & Service Providers Virtual Org. Services (VO, e-Res. dept, Institutions, Project) IdP MyProxy SP server Fed. Gateway SP IdP SP IdP1@USYD IdP2@ANU SP1: Repos. SP2: CMS … … Layer 1 IdPn@MQ SPm: Wiki Layer 2 SP: VOj SP: Grid VO Portal SP: Forum SP: HPC MyProxy Client SP: Wiki VO IdP SP: Storage SP: CMS Layer 3 Improving eResearch IT Infrastructures MAMS is currently developing such a layer 3 eResearch collaboration platform, called the IAM suite (Identity & Access Management suite, pronounced as [I am sweet]), which should enable eResearch projects to get a rich, SSO environment right out of the box. Any additional software development should be focussed on developing research-domain specific components, and not on generic components that many environments will need. The IAM suite should be configurable to suite particular needs, for example, to turn on or off some components, or to choose between different alternative applications (e.g. choose Wiki1 instead of Wiki2). In addition, it would be good if the tools can be managed from a central body (for applying updates and patches, helpdesk support, etc.), which aligns with the NCRIS vision of supporting many different research areas. As already indicated in the introduction, each IAM suite comes with it’s own IdP, including ShARPE and Autograph (if necessary). We do this to avoid burdening IdP administrators when a new project starts with adding many SPs: instead, only one SP needs to be configured for each project. Another often encountered problem is the access management of a suite of tools. It is envisioned that we can leverage Shibboleth for solving this too by providing a group manager inside the suite that can be used for authorization within external tools. For example, a Wiki can be configured to have a public area and a private area, a group of authors, and some managers. When Shibbolizing the application, we define three roles: member, author, and manager. Within the Group Manager of the suite, we would define a group for each role, and the membership of a group would be transported to the Wiki’s SP in a SAML assertion from the VO-IdP, and mapped to the appropriate role within the Wiki. A final note is that we prefer to use Open Source Software projects as much as possible for a number of reasons: No licensing costs; no hassles with vendors Easier to Shibbolize if source code is available Often have a larger community that is more willing to help out than in case of vendor products Improving the Request for Proposals Process In an ideal world, we would prefer to see the current RfP process improved by: Signing in-principal contract with the grant-funding body before submission. The reason is to avoid delays after funding has been received, and since there is often little to negotiate, no need to postpone it. Furthermore, it shows commitment of the organization to the project, which is important. Signing the Federation agreement for joining as an SP Include a brief summary of the project’s main problem statement, the stakeholders affected by this problem, the ideal solution they are striving for, and what would happen if they wouldn’t do anything. Also include a list of deliverables and the desired project URL. Submitting a checklist with components that you would like your SP to have Installing the IAM suite: Between the informal decision to fund a proposal and the public announcement, install the IAM suite in the desired domain, include the components that have been checked, and add the summary and deliverables list to the project’s home page. The public announcement can now leverage the project’s homepage to point to it for further information. Generic Components of the IAM suite We see the need for two categories of generic components: small and simple components that can easily fit as portlets inside a portal such as GridSphere provides, and more advanced applications that are better used standalone. In the latter category, think of applications like a Wiki or a Forum. Current development efforts are directed towards: A Shibbolized version of the JSR168-compliant OSS GridSphere project: this will be the project’s main entry point, acting as the known and trusted SP in the Federation, consisting of the following additional portlets (besides the ones that already come with GridSphere): o Login option for non-Federation members o Group Module for managing groups o Authorization Manager for setting up RBAC for external Shibbolized components o Presence indicator, indicating the status of its members’ communication tools (e.g. is the person currently online for Instant Messaging, VoIP, etc.) o Shibbolized version of IM, so we can use Shibboleth to link a member’s existing IM account with his identity o MyProxy client to obtain short-lived proxy certificates from the Federation MyProxy server o A Content Management System, FedoraWeb, based on the Fedora institutional repository (either internal to the project, or acting as the project’s front end for the institutional Fedora implementation). Note that Fedora should be searchable using our Authenticated Federated Search engine, which can do a distributed search across institutional repositories on behalf of a locally (at the IR) authenticated user. o VO-WAYF, for finding a Virtual Organization’s IdP members o VO-IdP, with ShARPE and Autograph (optional), to manage which attributes to release to which SP. Note that basic identity information (e.g. eduPerson) will be derived from the Federation member’s IdP, but this information is enriched with attributes defined in GridSphere, e.g. group membership, IM account name, VoIP accounts etc. o Calendar application: might be external too o PeoplePicker (starting soon): selecting members in the federation External applications: o Wiki o Forum o In the near future, we may add other tools like Grid-specific tools or applications like WikiCalc; this will mainly depend on requests coming from the eResearch community. IAM Suite Federation Italic: After July 2006 h arc Se Receive assertions AFS adaptor Federation SP Fedora (internal or external, e.g. IR) GTK GTK Storage Cluster GTK Specific tools GTK Equipm. via IdP VO-WAYF GridSphere VO-IdP GroupModule ShARPE AuthN IM Autograph FedoraWeb Receive proxy cert. Lo gin MyProxy Presence PeoplePicker Calendar AuthZ Mgnr Re c ass eive ert ion s VO-SP VO-SP Forum Wiki VO-SP VO-SP LMS Etc. “Not our main focus” Who Could Use the IAM Suite Its intended audience is primarily focused at eResearch projects and Virtual Organizations or Virtual Communities as they are sometimes called. A simplified version of the suite can be used as a Federation gateway (similar to the myVocs project, but including a WAYF, allowing you to enter additional Federation specific attributes, and the option to manage ARPs using ShARPE): it consists of a trusted SP accepting all IdP’s SAML assertions in the own Federation, and converting it to IdP endpoints sitting in other Federations (and vice versa). Clearly, it could also be used for departments or organizations that don’t have a web presence yet.