CANARIE is part of Canada’s national digital infrastructure that drives improved research effectiveness in Canada– a tremendous Canadian asset that supports knowledge creation and innovation CANARIE staff provide the network expertise and programs to enhance the effectiveness of research in CanadaThis expertise ensures connectivity to Canadian hubs of innovation and research – over 1000 institutions are connected and over 140,000 researchers rely on CANARIEIt is made up of 19,000 km of fibre optic cable – about half the circumference of the earthIt links Canadian researchers to their peers in 80 countriesCANARIE offers state-of-the-art speed – 100 G – on our core corridors. You could download every single iTunes movie – 2500 of them – in 7 seconds on our 100G networkCANARIE receives funding from Industry Canada in five year “tranches” – our current mandate expires in March 2012 – since CANARIE’s creation in 1993, $470M has been invested
Currently over 30 participants, including all of the larger universities in Canada.
A common security model could be leveraged as well, but this would be very difficult due the differences in the requirements. Some work could progress. “Science Studio” will hook into a centralized security solution when that security solution becomes available.
One service is good, but many using the same ‘infrastructure’ is better:Common approach to governance & oversightGenerally coordinating with with same point of contactsBuild both for traversal up and downwards
Agenda<br />Review understanding of Canada Lightsource& challenges<br />Background about CAF<br />Overview of available Technologies<br />Demo?<br />Review various deployment scenarios<br />2<br />
Canada’s Digital Infrastructure: CANARIE<br />Why CANARIE?<br />To improve the effectiveness of research in Canada<br />
What is the Access Federation?<br />A collection of trust frameworks for the Canadian electronic identity ecosystem <br />Targets the challenge of secure accessto the network and to online resources<br />Home for different flavours of trust frameworks<br />Recognizes autonomy of its participants<br />Participants in the ecosystem<br />The Federation Operator (CANARIE)<br />Identity Providers (IdP) <br />offer authentication/authorization of their identities<br />Service Provider (SP) who offer services . <br />End Users<br />4<br />
Access Federation Services<br />eduRoam<br />a wireless access authentication trust framework based on the RADIUS protocol and 802.1x.<br />Shibboleth<br /> an online authentication and authorization trust framework based on the SAML protocol<br />Services are implementations of a specific trust framework<br />5<br />
Eligibility for Access Federation<br />Must be CANARIE member to use service<br />Currently over 32 participants, including all of the larger universities in Canada.<br />Eligible participants include:<br />higher education institutions<br />public research institutions<br />sponsored service providers<br />Participation for other CANARIE members being examined. <br />Entitlement will be on service by service requirements due to different needs per service.<br />6<br />
The Challenge (as we hear it…)<br />How can I leverage a federated identity ecosystem safely, securely, and reliably to deliver my services, even if my services are not delivered via the web?<br />8<br />
The Who & The What<br />Who is your audience or client and how diverse a group are they?<br />What are you trying to deliver or improve?<br />9<br />
Proposed Deployment<br />Can be any computing infrastructure, looking for candidates<br />Proposed requirements to participate<br />Member of one or more federations trust fabrics (RADIUS &/or SAML)<br />Canada manages both eduroamand Shibso these would be our choices<br />On the target site:<br />Has administrative control over the target to log into (unix box)<br />Has deployed local Moonshot enhancements to said unit (a patched SSHd and Moonshot enhanced GSS libraries)<br />Manages a RADIUS server for their site that<br /> is connected to eduroam and is a SAML SP in the Shib Fed.<br />runs Moonshot enhancements<br />Has made necessary configurations in each of the pieces to allow access<br />Has provisioned the necessary information to an acount to permit sign in<br />17<br />
Implementation Questions<br />How does the local environment interact with Moonshot?<br />GSS exposes the data via attribute release from querying it:<br />How does this map to local environment variables?<br />implicit trust that the attributes in those variables are trustworthy & immutable via GSS API call – is this ok? <br />How is the GSS API call secured against a multi-homed multi-user environment?<br />If on same system, can I query for various GSS sessions and walk the users on the system? (doubtful, but want to ask to verify)<br />Assumption is GSS takes care of partitioning users.<br />20<br />
Implementation Questions<br />How do the central components interact with Moonshot?<br />See a need for a formalized schema map to benefit 80% and let 20% extend.<br />Most cost effective is set one standard (based on input) ‘internationally’ with ability to extend<br />Does this style of schema exist elsewhere (e.g. GridShib toolkit?)<br />Various origin datasources are in play so centralized schema in different formats (e.g. 3NF tables for SQL, ldapobjectclass definitions, and SAML profiles would be great to level the playing field.<br />Thoughts on how long/big/worthwhile this is and how repetitive it will be?<br />Thoughts on how elements go from ‘core’ from the extensions? (aka Governance?)<br />21<br />
Total Cost of Ownership<br />How will the account provisioning and maintenance work?<br />Representing a federated cred in a remote environment…how?<br />How will the policy decision on access work?<br />If at the ‘edge’ or end points, need a way to manage mass deployment (>1000’s of systems – think EC2)<br />OR centralize this somehow<br />Need to harmonize the way to deal with schema and consistent view of data across RADIUS & SAML & DB & LDAP…thoughts?<br />Complex is ok, as long as automation can prevail, but what skills will be required to keep the lights on for this software ecosystem?<br />22<br />
Possible Limitations<br />RADIUS attribute passing is limited to 253 bytes per attribute <br />My understanding is that Moonshot takes care of packing/unpacking long attributes over RADIUS protocol<br />Not an issue, but as a more rich attribute definition is built out, there could be large profiles (think XML & x509 certs BASE64’d into this) which may suffer over RADIUS’ UDP. Should we be concerned?<br />Updated: RADIUS attributes cannot exceed 4096 in their entirety. Could pose some challenges…<br />23<br />
Use Case – Wireless Access<br />Without eduRoam<br />User arrives, needs to get onto wireless<br />Needs to talk to IT staff to get credential in system created and a password set<br />User waits for account<br />User uses known password, signs into wireless<br />When user is complete, IT should be notified to delete account and terminate access (right?)<br />IT deletes account(right?)<br />Done<br />With eduRoam<br />User arrives, needs to get onto wireless, has eduRoam enabled ID<br />Open laptop<br />User is authenticated to home system and is online<br />Done<br />26<br />
How does eduroam work?<br />802.1X - to authenticate clients before allowing access to the network<br />EAP framework – with secure EAP methods to protect user credentials<br />RADIUS - authentication server infrastructure<br />RADIUS proxying – to route authentication requests to a users home institution<br />Separate IP address space – treated as external to institution (compliance with service agreements, etc)<br />End Users have standard internet access with as few filters as possible (if any at all).<br />
Reciprocity - Hallmark of eduroam<br />Eduroam is about you treating guest credentials how you would like to be treated:<br />Just think about what you would like when you travel:<br />No filtered connections<br />No traffic shaping<br />Public IP address (where possible)<br />NAT is not necessarily appropriate, but if you already private IP folks now, probably works out ok.<br />31<br />
Material <br />Past Presentations:<br />This presentation builds on CANHEIT 2010:<br />Prezi on Building federated applications:<br />http://bit.ly/fedapps<br />33<br />
Use Case – New Employee Access to Online Resources<br />Without Shibboleth<br />User arrives, needs to have access to web resource for <br />Active Directory<br />Twiki.canarie.ca<br />Staff.canarie.ca<br />Collaborate.canarie.ca<br />Shared online resources in 3rd party wiki<br />Needs to talk to staff for each service to get credential in each system created and a password set<br />User waits for account for each service<br />User uses known password, signs into each service and sets a password<br />When user leaves the organization, each service should be notified to delete account and terminate access everywhere (right?)<br />Each service deletes account(right?)<br />Done<br />With Shibboleth <br />User arrives, needs to have access to web resource for <br />Active Directory<br />Twiki.canarie.ca<br />Staff.canarie.ca<br />Collaborate.canarie.ca<br />Shared online resources in 3rd party wiki<br />IT staff creates central account and assigns privileges to access resources centrally.<br />User waits for account<br />User changes password and all services rely on this password.<br />When user leaves the organization, this one account should be notified for deletion (right?)<br />Done<br />34<br />
Shib Value Proposition<br />Game changer for integration effort with shib ready services<br />Reduces integration from customization to configuration<br />Avoid weeks of custom project integration and then maintenance until, well, forever <br />Lowers cost of doing business – do better with less.<br />Establishes a centralized policy enforcement point and easier auditability<br />For new work, establishes publicly accepted framework to implement to & not your own homegrown framework<br />35<br />
Rightsize Your Information Sharing<br />Log in, share NetID+attr.<br />Log in, share Opaque ID<br />Log in, share NetID<br />Log in, share nothing<br />Wireless<br />External<br />Website<br />personal-<br />ization<br />is desired<br />Internal<br />Website<br />personal-<br />ization<br />is desired<br />linkage<br />elsewhere<br />desired<br />Internal<br />Website<br />personal-<br />ization<br />is desired<br />linkage<br />elsewhere<br />desired<br />Data <br />needed<br />(ghosted)<br />SAML as conduit for Information release<br />
Serves as the base inherited elements for local or SITG activity to enhance or build upon
Most efficient way to insure least effort for SP/IdP to participate any way they want, including promotion to eduGain
Local Fed. can haveneed their own isolated SP/IdPs
Encourages organic growth on path to full Federation involvement.
The Federation enables SITG to form their own special metadata sourced from the core metadata</li></ul>SP<br />Idp<br />Higher Assurance <br />Local Fed<br />Local Fed<br />Idp<br />SP<br />Idp<br />SP<br />SP<br />SP<br />Idp<br />
For more info, please contact<br />Chris.firstname.lastname@example.org<br />Twitter: @teamktown<br />38<br />
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.