Enabling Grids for E-sciencE Authentication, Authorisation and Security www.eu-egee.org EGEE-II INFSO-RI-031688 Security Services Enabling Grids for E-sciencE EGEE-II INFSO-RI-031688 Authentication, Authorisation and Security 2 Security Overview Enabling Grids for E-sciencE Security Authentication Grid Security Infrastructure Encryption & Authorization Data Integrity EGEE-II INFSO-RI-031688 Authentication, Authorisation and Security 3 Basis of security & authentication Enabling Grids for E-sciencE • Asymmetric encryption… plain text plain text Encrypted text Private Key Public Key – Private key and public key are in pair. it is impossible to derive one key from another key. – a message encrypted by one key can be decrypted only by another one. • Examples of public key algorithms: – Diffie-Helmann (1977) – RSA (1978) EGEE-II INFSO-RI-031688 Authentication, Authorisation and Security 4 An Example of Public Key Algorithms Enabling Grids for E-sciencE • Public keys are exchanged John’s keys – Paul gets John’s public key.. • Paul ciphers using the public key of John • John decrypts using his private key; public Paul ciao private John 3$r 3$r ciao • Make sure of data confidentiality EGEE-II INFSO-RI-031688 Authentication, Authorisation and Security 5 Data Integrity - Digital Signature Enabling Grids for E-sciencE • Paul calculates the hash of the message • Paul encrypts the hash using his private key: the encrypted hash is the digital signature. • Paul sends the signed message to John. • John calculates the hash of the message • Decrypts signature, to get Hash A, using Paul’s public key. • If hashes equal: 1. message wasn’t modified; Paul’s keys 2. hash A is from Paul’s private key (Paul encrypted it) public EGEE-II INFSO-RI-031688 private Paul message Hash A Digital Signature message Digital Signature John Hash B =? Hash A message Digital Signature Authentication, Authorisation and Security 6 Digital Signature (cont.) Enabling Grids for E-sciencE • With Digital Signature, it is easy to know.. – I receive the message that you intended to send me – You are really the one person who sent this message EGEE-II INFSO-RI-031688 Authentication, Authorisation and Security 7 Digital Certificate ( or Certificate) Enabling Grids for E-sciencE • Certificate – It is based on Digital Signature mechanism. – Grid authenticates users or resources by verifying their certificate. – Certificate is issued by one of the national Certification Authorities. Public Key User’s Information CA’s Digital Signature user’s certificate Sign CA EGEE-II INFSO-RI-031688 user key Authentication, Authorisation and Security 8 X.509 Certificates Enabling Grids for E-sciencE • An X.509 Certificate contains: owner’s public key; Public key identity of the owner; Subject:C=CH, O=CERN, OU=GRID, CN=Andrea Sciaba 8968 info on the CA; Issuer: C=CH, O=CERN, OU=GRID, CN=CERN CA time of validity; Expiration date: Aug 26 08:08:14 2005 GMT Serial number; Optional extensions Serial number: 625 (0x271) Optional Extensions CA Digital signature – digital signature of the CA EGEE-II INFSO-RI-031688 Authentication, Authorisation and Security 9 Proxy certificate (my agent) Enabling Grids for E-sciencE information information CA’s signature user’s signature user cert user key EGEE-II INFSO-RI-031688 sign proxy certificate proxy key Authentication, Authorisation and Security 10 Proxy delegation (my agent’s agent) Enabling Grids for E-sciencE information information user’s signature proxy1’s signature proxy1 cert proxy1 key EGEE-II INFSO-RI-031688 sign proxy2 cert proxy2 key Authentication, Authorisation and Security 11 Proxy delegation chain Enabling Grids for E-sciencE information information information information user’s signature proxy1’s signature proxy2’s signature Proxy N-1r’s signature Sign Sign proxy1 cert proxy2 cert proxy3 cert proxy1 key proxy2 key proxy3 key … proxyN cert proxy N key • Every proxy can represent the user • Proxy certificates extend X.509 certificates – Short-lived certificates signed by the user’s certificate or a proxy – Reduces security risk, enables delegation • “Single sign on” can be attained. EGEE-II INFSO-RI-031688 Authentication, Authorisation and Security 12 Evolution of VO management Enabling Grids for E-sciencE • VOMS information – VO Administration : check which VO the user belongs to Add VO information on user’s proxy certificate. • voms-proxy-init – a gLite command to User’s Digital Signature VO: TWGrid proxy certificate Contact the VOMS with user’s proxy certificate Retrieve the certificate that contains VO information on it. EGEE-II INFSO-RI-031688 Authentication, Authorisation and Security 13 Summary of AA - 1 Enabling Grids for E-sciencE • Authentication based on X.509 PKI infrastructure – Trust between Certificate Authorities (CA) and sites, CAs and users is established (offline) – CAs issue (long lived) certificates identifying sites and individuals (much like a passport) Commonly used in web browsers to authenticate to sites – In order to reduce vulnerability, on the Grid user identification is done by using (short lived) proxies of their certificates • Proxies can – Be delegated to a service such that it can act on the user’s behalf – Include additional attributes (like VO information via the VO Membership Service VOMS) – Be stored in an external proxy store (MyProxy) – Be renewed (in case they are about to expire) EGEE-II INFSO-RI-031688 Authentication, Authorisation and Security 14 Summary of AA - 2 Enabling Grids for E-sciencE • Authentication – User obtains certificate from Certificate Authority – Connects to UI by ssh (UI is the user’s interface to Grid) – Uploads certificate to UI – Single logon – to UI - create proxy – Grid Security Infrastructure Annually CA VO mgr UI VO service • Authorisation – User joins Virtual Organisation – VO negotiates access to Grid nodes and resources – Authorisation tested by resource: Credentials in proxy determine user’s rights EGEE-II INFSO-RI-031688 GSI VO database Daily update Mapping to access rights Authentication, Authorisation and Security 15 User Responsibilities Enabling Grids for E-sciencE • Keep your private key secure – on USB drive only • Do not loan your certificate to anyone. • Report to your local/regional contact if your certificate has been compromised. • Do not launch a delegation service for longer than your current task needs. If your certificate or delegated service is used by someone other than you, it cannot be proven that it was not you. EGEE-II INFSO-RI-031688 Authentication, Authorisation and Security 16
© Copyright 2025 Paperzz