Slides

advertisement
The Australian Access
Federation
TERENA Networking
Conference 2008
Australian Access Federation; 21-May-08
Alex Reid
Director, eResearch/Middleware
AARNet
Alex Reid, AARNet
Agenda
The Context
AAF Overview
The Shibboleth Part
The PKI Part
Model
Certificate Management
Security Levels, LoAs
Progress Report
2
Australian Access Federation; 21-May-08
Alex Reid, AARNet
Only a Selection…
To explain all nature is too difficult a task for any one man
or even for any one age. `Tis much better to do a little
with certainty, and leave the rest for others that come
after you, than to explain all things.
– Sir Isaac Newton
3
Australian Access Federation; 21-May-08
Alex Reid, AARNet
Context: Australia in the World
4
Australian Access Federation; 21-May-08
Alex Reid, AARNet
Context: Australia
5
Australian Access Federation; 21-May-08
Alex Reid, AARNet
Context: HE/Research Infrastructure
 Backing Australia’s Ability (BAA)
Systemic Infrastructure Initiative (SII)
 Meta-Access Management System (MAMS)
 PKI System
 Middleware Action Plan & Strategy (MAPS)
National Collaborative Research Infrastructure Strategy (NCRIS)
 8 discipline areas
 Platforms for Collaboration





6
Network
Federation
Australian Research Collaboration Service (ARCS)
Australian National Data Service (ANDS)
National Computational Infrastructure (NCI)
Australian Access Federation; 21-May-08
Alex Reid, AARNet
AAF Overview
 Players: CAUDIT, AusCERT (Uni of Queensland),
Macquarie University, AARNet
 MAPS
 Funding:
Development
Operation
 Management & Legal frameworks
 Scope:
HE/Research
Other education – later
Interaction with other entities:
 Government – later
 International (New Zealand, maybe others later)
7
Australian Access Federation; 21-May-08
Alex Reid, AARNet
Other Related Projects
 People Picker (federated directory)
 ShibPAC – Shib-enabled command line access to HPC
facilities (eg for ssh or portal access)
 Pluggable AuthN Module (PAM) – needs to be installed
for each HPC (takes username/password)
 FAPPS – Federated Account Approval & Provisioning
System
 SICS – Shibboleth Integrated Credential Service (meets
IGTF’s Member Integrated Credential Service profile)
 Cross-certification with HEBCA
8
Australian Access Federation; 21-May-08
Alex Reid, AARNet
Shibboleth Part
 MAMS – Meta Access Management System
 Testbed Federation
 Mini-grant scheme
Id Providers
Service Providers
 Operation:
Test operation (full production but no agreements) since 2006
Shibboleth 1.3
WAYF operated by AARNet, resilient configuration
20 universities (incl. 2 form NZ), 23 other entities, participating at
level-2 (more at level-1, purely test) – 700,000 identities
Additional features: ShARPE, Autograph, IAMSuite, etc
9
Australian Access Federation; 21-May-08
Alex Reid, AARNet
Shibbolised Services (SPs)












10
‘Fez’, the Fedora GUI that provides access to UQ’s repository and eSpace.
Access to domestic and international users of QUT’s e-Grad School services.
Shibbolising GU’s Wiki.
GU’s Digital-information sharing services (e-Prints, e-Science Data, and CQA
Student Artworks).
Access to the ENUM registration service (AARNet).
Grid-enabled Archive of Nanostructural Imagery (GRANI) project services.
Grid Portal ShibGridSphere & ShibMyProxy – secure testbed for Grid services
(MonashU).
eLecture repository (DeakinU).
ShibbGridSphere portal access for the LIGO (laser) group to data repository
and HPC (MelbourneU).
Reciprocal borrowing among 5 WA university libraries.
Online Librarian (MurdochU + MacquarieU),
Plone and SRB (JCU).
Australian Access Federation; 21-May-08
Alex Reid, AARNet
The Federation Schema





Supplanting old auEduPerson schema
Derived from Use Cases
International corresponding members
Working Party locked in a room
Draws from existing schemas:
 Person, eduPerson, organizationalPerson, inetOrgPerson, SCHAC
 3 Groupings: Core, Recommended, Other
 Includes HE as well as Research/Grid community
 Core attributes:
 auEduPersonPersistentID -> auEduPersonSharedToken
 displayName
 eduPersonAffiliation
 eduPersonEntitlement
 eduPersonScopedAffiliation
 eduPersonTargetedID
11
Australian Access Federation; 21-May-08
Alex Reid, AARNet
PKI Part
 Origins
 Rationale
 Uses
Grids
Server certificates (including Shibboleth)
Client certificates (all staff & students??)
 Structure
 Browser recognition of root certificate
Webtrust Audit
Microsoft, Apple, Mozilla
 Certificate service to others – maybe
12
Australian Access Federation; 21-May-08
Alex Reid, AARNet
Original PKI Objectives
 Sharing resources between universities, eg course material
 Need for graduated degrees of security
 Digitally signing & encrypting documents
 Lightweight nature of trust relationship compared with
Shibboleth
 Lower cost than full Shibboleth implementation
 Authentication, authorisation, integrity, confidentiality, nonrepudiation
 Sample Use Cases:
Official emails to students [signing]
Official personnel emails to staff [signing & encrypting]
Students submitting essays, etc [signing]
Researcher access to remote resources (eg Grid computing)
13
Australian Access Federation; 21-May-08
Alex Reid, AARNet
PKI Arrangements
 Pilot developed by AusCERT 2005
 Policies under development
 WebTrust Audit:
Resources to carry out work
Expert advice on system setup
Cost of setup (highly secure, resilient)
Cost of initial audit
Cost of annual audits
 Certificate Management Systems:
Central CA software
Institutional RA software
14
Australian Access Federation; 21-May-08
Alex Reid, AARNet
AAF PKI Model
AAF PKI Model
AusCERT
Root CA
?
HEBCA
FBCA
15
AusCERT
AusCERT AusCERT
AusCERT
CA Level 1
CA Level
CA Level 2
CA Level
CA Level 4
CA Level
Old
Old
CA
CA
Institutions
Institutions
Institutions
CA Level
RA RA
RA RA RA
CA Level 3
CA Level
Trust
GRID CA
VO
FabricIDP
CA
Level3
CA
Level
1
CA
Level
CA
Level
Policy Management
Authority (PMA)
Australian Access Federation; 21-May-08
Server
VO IDP
CA
Hosted CA
Institutions
CALevel
Level
CA
Level
1 1
CA Level
RA RA
Alex Reid, AARNet
Certificate Management System Selection
 23 criteria (17 mandatory, 6 desireable)
 Products considered: RSA CM, RedHat CS, OpenCA, EJBCA,
Microsoft
 Initially [Dec-07], RSA CM:
 Common Criteria security evaluation – Evaluation Assurance Level 4
(EAL4) - see http://en.wikipedia.org/wiki/Evaluation_Assurance_Level as
at 2007-12-07
 Is in DSD Evaluated Product list
 It is believed that this product meets most of the technical requirements
outlined in Appendix A. Furthermore discussions with RSA have
indicated that they are willing to customise aspects of their product to
support the AAF PKI model
 But on closer examination proved problematical
 OpenCA failed on many fronts
 RedHat [Feb-08]: OSS in 2009, but not in the DSD Evaluated Product
list (EPL) [may impede cross-recognition with Aust Govt Gatekeeper]
16
Australian Access Federation; 21-May-08
Alex Reid, AARNet
CMS Selection Criteria
17
Criteria
Requirement
support the customised certificate profiles and extensions planned for AAF.
support hardware security modules listed in the DSD Evaluated Products List (EPL).
support export of CRLs and CARLs to 3rd party directories (for example LDAP).
support multiple OCSP responders in load balanced and/or failover configuration. OCSP responders must be capable of utilizing
hardware crypto-acceleration. OCSP responders must support queries about certificates issued by multiple CAs and issue valid
responses (as specified in RFC 2560) signed by CA designated responder keys (authorised responders)
support digitally signed audit logs.
support digital certificate generation and management.
Common Criteria EAL4+ certified or in the process of being certified.
EPL certified
local and remote administration capability.
local and remote web-based administration.
token management support for key archival and recovery
capable of implementing the certification authority, registration authority, key recovery and validation authority roles.
capable of enforcing operator role separation
provide scalability with multiple Registration Authorities for a CA.
support SHA-256 and SHA-512
support cryptographic elliptic curve standards proposed by NIST
run on Linux platform.
capable of securely archiving and recovering encryption keys of users.
support deployment into separated network security zones for the CA and RA software components. The application should support
network filtering between the zones and the wider network.
support PKI applications over multiple protocol interfaces such as LDAP, SSL-LDAP, HTTP, HTTPS, CMP and SCEP and also
interoperates with other PKI-aware products.
support integration with FIPS 140-1 Level 3 -certified Hardware Security Modules (HSMs)
interface to allow bulk creation or revocation of certificates
Mandatory
Desirable
Mandatory
Mandatory
API to allow automation of certain tasks and workflows
Desirable
Australian Access Federation; 21-May-08
Mandatory
Mandatory
Mandatory
Desirable
Mandatory
Desirable
Mandatory
Mandatory
Mandatory
Desirable
Mandatory
Desirable
Mandatory
Mandatory
Mandatory
Mandatory
Mandatory
Mandatory
Alex Reid, AARNet
PKI Security Levels
Certificate
Level
Level 1



No proactive identity check provided to the RA.
Identity information provided by a body that the RA has a trust relationship.
Example: A student being enrolled in at least one subject is sufficient for the
certificate issuing however identity information has only been supplied by QTAC (or
similar state body).
Level 2



Subject must provide proof of identity by appearing IN PERSON at the RA.
Individual cannot provide the required 100 points of identification.
Example: Short term contractors at an institution requiring access to PKI-protected
systems whose credentials are insufficient credentials to meet the 100 points check
but can provide some credentials (e.g. drivers licence, credit card, etc).
Level 3



Subject must provide proof of identity by appearing IN PERSON at the RA.
Individual must accrue at least 100 points of identity.
Example: Foreign staff with valid passports and written references from acceptable
referees.

Subject must provide the same information for Level 3 certification in addition to
character background check.
For example a positive check is also conducted by an appropriate external agency.
Level 4
18
Description

Australian Access Federation; 21-May-08
Alex Reid, AARNet
Levels of Assurance
 Can we postpone the discussion on LoA until the
federation is launched?
 This could reduce complexity of initial implementation
 Upgrading the federation to a higher level of assurance
than the startup baseline may require new/updated
agreements, extra costs to meet that baseline for ALL
identities serviced by an IdP, and redeployment of
technology
Will we fall under the footsteps of other federations that are now
struggling to retrofit LoAs?
 Will federation members be happy to redeploy IdP and
SPs later?
19
Australian Access Federation; 21-May-08
Alex Reid, AARNet
LoA Relationship to Other CAs
FBCA Certificate Levels
CAUDIT PKI Pilot
20
Australian Government
Gatekeeper – Individual
Certificate
Rudimentary
Level 1
Grade 1
Basic
Level 2
Grade 2
Medium
Level 3
Grade 3
Not Applicable
Level 4
Not Applicable
High
Not Applicable
Not Applicable
Australian Access Federation; 21-May-08
Alex Reid, AARNet
How to Set LoAs, if Deployed?
21
Australian Access Federation; 21-May-08
Alex Reid, AARNet
LoA – Current Issues
 What are the federation business drivers?
 What level of high value/sensitivity resources and
collaboration environments do we want to address in the
federation?
 What trade off should we make between complexity of
deployment and potential interoperation with other
federations?
 Do we retrofit LoAs as other federations are now having to
do, or do we implement them upfront?
 Where do we set the bar (minimum floor of trust)?
 How should we measure that the IdPs and SPs are at the
appropriate level?
 What are the guidelines and how will they be measured?
22
Australian Access Federation; 21-May-08
Alex Reid, AARNet
Overall Progress to Date
 Shibboleth:
Test operation (full production but no agreements) since 2006
 Schema agreed (?)
 PKI:
Acquired some of hardware, software
Some testing undertaken
WebTrust Audit later this year
 Operational arrangements – proposals drafted
 Governance, Management, Financial, Legal status still “in discussion”,
but some principles clear:
Owned by the sector
Financed by the sector
Simple legal arrangements: Truth is ever to be found in the simplicity,
and not in the multiplicity and confusion of things
23
Australian Access Federation; 21-May-08
– Sir Isaac Newton.
Alex Reid, AARNet
alex.reid@aarnet.edu.au
Thank You.
Questions?
www.aaf.edu.au
www.federation.org.au/FedManager/jsp/index.jsp
www.aaf.edu.au/attributes
www.aaf.edu.au/aaf-federated-access-managementanimation
24
Australian Access Federation; 21-May-08
Alex Reid, AARNet
Download