SlideShare a Scribd company logo
A Credential Store for
Multi-Tenant Science
Gateways
Thejaka Kanewala, Suresh Marru, Jim Basney, Marlon Pierce.
Agenda
 Terminology
 Problems / Challenges
 Solutions proposed
Science Gateways
 Computationally expensive experiments are run in
resources such as Grids, Clouds.
 Science Gateways …
 Hide complexities in using underlying cyber infrastructure
resources.
 Provides a domain specific user interface to scientists.
 Help scientists to build communities.
 Create experiments
 Share experiments
 Share data
 …
Organization of a Science Gateway
Organization of a Science
Gateway (contd …)
 Front end portal
 Science domain specific
 Web User Interface (UI)
 Middleware
 Bridges the communication between front end portal
server and backend computational resources.
 Implements other application logic (provenance data
management, application execution, storing metadata,
processing results from execution, etc …)
 Backend resources
Challenges
1. Resource Credential Delegation.
2. Management of heterogeneous credentials associated
grids, clouds and local resources.
3. Management of gateway credentials in an isolated
manner in a middleware that supports multiple
gateways.
4. Maintain accountability at the resource.
Problem 1. Resource Credential
Delegation
Problem 1. Resource Credential
Delegation (Community Account)
Resource Credential Delegation
(contd …)
 How to solve ?
 Hand over credentials to gateway user.
 Hard code resource credentials at the middleware layer.
 Each time gateway administrator retrieves credentials they
need to update in the middleware.
 Hard coding credentials in the file system – Requires to change
configuration files in the middleware, also needs additional
mechanisms to secure passwords.
Problem 2. Heterogeneous
Credentials
 The gateway middleware connects various types of
resources.
 Clouds
 Grids
 Local Clusters
 Different resources have different authentication
mechanisms.
 MyProxy based authentication.
 SSH/Password/Key based authentication.
 Incorporating a new authentication mechanism should
not incorporate changes to the middleware.
Problem 3. Multi-Tenancy
 Multiple science gateways connecting to a single
gateway middleware.
 Need to make sure the credentials used by one gateway
does not interfere with another gateway.
 Proper isolation of gateways is needed when it comes to
multiple gateways.
Problem 4. Maintain Accountability
at the Resource
 Maintain comprehensive audit records at the resource.
 In a disaster the resource should be able to find out which
user is responsible by looking at its own records, without
consulting the gateway middleware.
 Middleware should supply experiment invoking user’s
attributes to resource.
Credential Store
 A secure generic data store to maintain heterogeneous
authentication data.
 Utilities to perform delegation and key generation.
 A pluggable module to gateway middleware.
 Involves 3 main operations
 Gateway registration
 Persisting credentials
 Query credentials during application invocation
Credential Store – Gateway
Registration
 Multiple science gateways need to operate in isolation
to each other.
 Each gateway portal servers establishes trust with the
gateway middleware using a TLS mutual authentication.
Credential Store – Credential
Persistence
 Capable of handling different types of credentials.
 Each credential type is stored as a serialized byte stream in
the store.
 Credentials are stored in a secure manner
 Secured at 3 layers
 Each entry is encrypted using a key derived from the gateway
id and a token.
 Use database authentication mechanism to restrict access to
database records.
 Data files are secured with proper Unix file security.
 Each action on the credential store is recorded in an audit
log
Credential Store – Credential
Persistence (contd …)
Credential Store – Credential
Persistence (contd …)
 Different mechanisms to persist credentials.
 Delegation based credential persistence.
 Key generation based credential persistence.
 Credential persistence by manually invoking credential
store service API.
Delegation based persistence
 Mainly used for MyProxy credentials.
 Uses OAuth protocol to delegate credentials into Credential
Store and uses OA4MP.
Key Generation Based Persistence
 Some resources only support SSH keys.
 Most of the time users doesn't want to persist their SSH
keys in a third party store.
 Generate SSH keys within the Credential Store and hand
over public key to user.
 One time Manual Step: User needs to store given public
key in the resource.
Raw Credential Persistence
 If there is no support for delegation based credential
persistence we can use direct credential deposit.
Credential Retrieval
 Given the token id, read credentials from the Credential Store.
 Decorates retrieved credentials (certificates) with actual user
attributes (for MyProxy only).
Credential Renewal
 When persisting credentials, lifetime of the credentials are
extracted and stored in a separate column.
 Credential Store periodically checks for validity of
credentials.
 Near expiring credentials are notified to owners of the
credentials.
 MyProxy: Register gateway middleware as a trusted renewer
in the MyProxy server. Use gateway middleware credentials to
renew other credentials.
 SSH Keys does not expire: Provides a mechanism to remove
credentials from the Credential Store.
Credential Store – High-level
Architecture
Implementation
 Implemented as a module in Apache Airavata Gateway
Middleware.
 Credentials are stored in a relational database.
 Implemented using Java and related security packages.
 Available in Apache Airavata 0.11 release.
Next …
 Incorporate audit log integrity.
 Incorporate other delegation mechanisms such as
OpenId,etc …
 Possible delegation mechanisms for SSH keys.
Thank you !
Q/A

More Related Content

PDF
Binary studio academy 2013 c++ group (andrey and max)
PDF
IRJET- Blockchain based Certificate Issuing and Validation
PPTX
Digital Certificate Verification based on blockchain ethereum
PPTX
PPTX
PDF
Security Basics
PDF
M-Pass: Web Authentication Protocol
PDF
Strong zero knowledge authentication based on the session keys (sask)
Binary studio academy 2013 c++ group (andrey and max)
IRJET- Blockchain based Certificate Issuing and Validation
Digital Certificate Verification based on blockchain ethereum
Security Basics
M-Pass: Web Authentication Protocol
Strong zero knowledge authentication based on the session keys (sask)

What's hot (12)

PDF
Blockchain Poc for Certificates and Degrees
DOCX
6.designing secure and efficient biometric based secure access mechanism for ...
PPTX
Security of the database
PPTX
SCWCD : Secure web
PPTX
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PDF
Blockchain PoC For Education
PDF
Blockchain Presentation
PPT
AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...
DOC
Certification authority
PDF
Database security
DOCX
decentralized access control with anonymous authentication of data stored in ...
PPTX
Secure Code Warrior - Insufficient data encoding
Blockchain Poc for Certificates and Degrees
6.designing secure and efficient biometric based secure access mechanism for ...
Security of the database
SCWCD : Secure web
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
Blockchain PoC For Education
Blockchain Presentation
AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORD...
Certification authority
Database security
decentralized access control with anonymous authentication of data stored in ...
Secure Code Warrior - Insufficient data encoding
Ad

Viewers also liked (19)

PDF
RESTLess Design with Apache Thrift: Experiences from Apache Airavata
PPTX
008 benefits mnagement
PDF
Cridential Amoraindotama
PDF
Pri sm credential scheme
PDF
Magento credential in indonesia
PPTX
İda Buluşmaları 2013-1401
PPTX
Gestalt Coaching Presentation for INTAGIO - Updated
PPT
The Management Consultancy Industry
PPTX
Agency credential of blueray part 1
PDF
Digital Credential - TVPLUS
PPTX
Tribeca Şirket Tanıtım Sunumu
PDF
Digital Agency Credential - 1 minute to know a bit about Calkboard
PDF
Wiktor Leo Burnett Credential 2011
PPT
Credential Rusu+Bortun Brand Growers
PDF
Think Digital Vietnam - Digital Marketing Agency Credential
PDF
Creative Sponge - Agency Credentials
PDF
TEN Creative Design Agency Creds
PDF
LEAP Agency Company Profile
PPT
Management Consultancy Proposals
RESTLess Design with Apache Thrift: Experiences from Apache Airavata
008 benefits mnagement
Cridential Amoraindotama
Pri sm credential scheme
Magento credential in indonesia
İda Buluşmaları 2013-1401
Gestalt Coaching Presentation for INTAGIO - Updated
The Management Consultancy Industry
Agency credential of blueray part 1
Digital Credential - TVPLUS
Tribeca Şirket Tanıtım Sunumu
Digital Agency Credential - 1 minute to know a bit about Calkboard
Wiktor Leo Burnett Credential 2011
Credential Rusu+Bortun Brand Growers
Think Digital Vietnam - Digital Marketing Agency Credential
Creative Sponge - Agency Credentials
TEN Creative Design Agency Creds
LEAP Agency Company Profile
Management Consultancy Proposals
Ad

Similar to Apache Airavata Credential Store (9)

PDF
SCREAM-15: Authentication and Authorization Considerations for a Multi-tenant...
PDF
Credential store using HashiCorp Vault
PDF
Industry Best Practices For SSH - DevOps.com Webinar
PDF
Industry Best Practices for SSH Access
PDF
Ijarcet vol-2-issue-4-1398-1404
PDF
Apache Airavata Sharing Service
PDF
Security
PPTX
Beyond the Science Gateway
PDF
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
SCREAM-15: Authentication and Authorization Considerations for a Multi-tenant...
Credential store using HashiCorp Vault
Industry Best Practices For SSH - DevOps.com Webinar
Industry Best Practices for SSH Access
Ijarcet vol-2-issue-4-1398-1404
Apache Airavata Sharing Service
Security
Beyond the Science Gateway
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...

More from smarru (8)

PPTX
Cyberinfrastructure Experiences with Apache Airavata
PPTX
Google Summer of Code at Apache Software Foundation
PPTX
Gsoc airavata
PPTX
Learning Open Source through GSOC
PDF
Apache Student Induction ApacheCon 2013
PDF
Apache Airavata ApacheCon2013
PPTX
Ogce Workflow Suite
PPTX
Ogce Workflow Suite Tg09
Cyberinfrastructure Experiences with Apache Airavata
Google Summer of Code at Apache Software Foundation
Gsoc airavata
Learning Open Source through GSOC
Apache Student Induction ApacheCon 2013
Apache Airavata ApacheCon2013
Ogce Workflow Suite
Ogce Workflow Suite Tg09

Recently uploaded (20)

DOCX
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
PDF
17 Powerful Integrations Your Next-Gen MLM Software Needs
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PDF
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Nekopoi APK 2025 free lastest update
PDF
Cost to Outsource Software Development in 2025
PDF
Salesforce Agentforce AI Implementation.pdf
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
PPTX
Weekly report ppt - harsh dattuprasad patel.pptx
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PPTX
Patient Appointment Booking in Odoo with online payment
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
Greta — No-Code AI for Building Full-Stack Web & Mobile Apps
17 Powerful Integrations Your Next-Gen MLM Software Needs
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Wondershare Filmora 15 Crack With Activation Key [2025
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
How AI/LLM recommend to you ? GDG meetup 16 Aug by Fariman Guliev
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Nekopoi APK 2025 free lastest update
Cost to Outsource Software Development in 2025
Salesforce Agentforce AI Implementation.pdf
Design an Analysis of Algorithms II-SECS-1021-03
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
Weekly report ppt - harsh dattuprasad patel.pptx
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Odoo Companies in India – Driving Business Transformation.pdf
Operating system designcfffgfgggggggvggggggggg
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
Patient Appointment Booking in Odoo with online payment
Navsoft: AI-Powered Business Solutions & Custom Software Development

Apache Airavata Credential Store

  • 1. A Credential Store for Multi-Tenant Science Gateways Thejaka Kanewala, Suresh Marru, Jim Basney, Marlon Pierce. Agenda  Terminology  Problems / Challenges  Solutions proposed
  • 2. Science Gateways  Computationally expensive experiments are run in resources such as Grids, Clouds.  Science Gateways …  Hide complexities in using underlying cyber infrastructure resources.  Provides a domain specific user interface to scientists.  Help scientists to build communities.  Create experiments  Share experiments  Share data  …
  • 3. Organization of a Science Gateway
  • 4. Organization of a Science Gateway (contd …)  Front end portal  Science domain specific  Web User Interface (UI)  Middleware  Bridges the communication between front end portal server and backend computational resources.  Implements other application logic (provenance data management, application execution, storing metadata, processing results from execution, etc …)  Backend resources
  • 5. Challenges 1. Resource Credential Delegation. 2. Management of heterogeneous credentials associated grids, clouds and local resources. 3. Management of gateway credentials in an isolated manner in a middleware that supports multiple gateways. 4. Maintain accountability at the resource.
  • 6. Problem 1. Resource Credential Delegation
  • 7. Problem 1. Resource Credential Delegation (Community Account)
  • 8. Resource Credential Delegation (contd …)  How to solve ?  Hand over credentials to gateway user.  Hard code resource credentials at the middleware layer.  Each time gateway administrator retrieves credentials they need to update in the middleware.  Hard coding credentials in the file system – Requires to change configuration files in the middleware, also needs additional mechanisms to secure passwords.
  • 9. Problem 2. Heterogeneous Credentials  The gateway middleware connects various types of resources.  Clouds  Grids  Local Clusters  Different resources have different authentication mechanisms.  MyProxy based authentication.  SSH/Password/Key based authentication.  Incorporating a new authentication mechanism should not incorporate changes to the middleware.
  • 10. Problem 3. Multi-Tenancy  Multiple science gateways connecting to a single gateway middleware.  Need to make sure the credentials used by one gateway does not interfere with another gateway.  Proper isolation of gateways is needed when it comes to multiple gateways.
  • 11. Problem 4. Maintain Accountability at the Resource  Maintain comprehensive audit records at the resource.  In a disaster the resource should be able to find out which user is responsible by looking at its own records, without consulting the gateway middleware.  Middleware should supply experiment invoking user’s attributes to resource.
  • 12. Credential Store  A secure generic data store to maintain heterogeneous authentication data.  Utilities to perform delegation and key generation.  A pluggable module to gateway middleware.  Involves 3 main operations  Gateway registration  Persisting credentials  Query credentials during application invocation
  • 13. Credential Store – Gateway Registration  Multiple science gateways need to operate in isolation to each other.  Each gateway portal servers establishes trust with the gateway middleware using a TLS mutual authentication.
  • 14. Credential Store – Credential Persistence  Capable of handling different types of credentials.  Each credential type is stored as a serialized byte stream in the store.  Credentials are stored in a secure manner  Secured at 3 layers  Each entry is encrypted using a key derived from the gateway id and a token.  Use database authentication mechanism to restrict access to database records.  Data files are secured with proper Unix file security.  Each action on the credential store is recorded in an audit log
  • 15. Credential Store – Credential Persistence (contd …)
  • 16. Credential Store – Credential Persistence (contd …)  Different mechanisms to persist credentials.  Delegation based credential persistence.  Key generation based credential persistence.  Credential persistence by manually invoking credential store service API.
  • 17. Delegation based persistence  Mainly used for MyProxy credentials.  Uses OAuth protocol to delegate credentials into Credential Store and uses OA4MP.
  • 18. Key Generation Based Persistence  Some resources only support SSH keys.  Most of the time users doesn't want to persist their SSH keys in a third party store.  Generate SSH keys within the Credential Store and hand over public key to user.  One time Manual Step: User needs to store given public key in the resource.
  • 19. Raw Credential Persistence  If there is no support for delegation based credential persistence we can use direct credential deposit.
  • 20. Credential Retrieval  Given the token id, read credentials from the Credential Store.  Decorates retrieved credentials (certificates) with actual user attributes (for MyProxy only).
  • 21. Credential Renewal  When persisting credentials, lifetime of the credentials are extracted and stored in a separate column.  Credential Store periodically checks for validity of credentials.  Near expiring credentials are notified to owners of the credentials.  MyProxy: Register gateway middleware as a trusted renewer in the MyProxy server. Use gateway middleware credentials to renew other credentials.  SSH Keys does not expire: Provides a mechanism to remove credentials from the Credential Store.
  • 22. Credential Store – High-level Architecture
  • 23. Implementation  Implemented as a module in Apache Airavata Gateway Middleware.  Credentials are stored in a relational database.  Implemented using Java and related security packages.  Available in Apache Airavata 0.11 release.
  • 24. Next …  Incorporate audit log integrity.  Incorporate other delegation mechanisms such as OpenId,etc …  Possible delegation mechanisms for SSH keys.

Editor's Notes

  • #2: Describe the outline Science gateways Middlewares Multi tenancy
  • #3: Often accessing and using resources needs awareness and knowledge about the resources e.g. :- users needs to be aware about job schedulers such as pbs, torque etc … Scientist focus is on the experiment
  • #4: Emphasise end users doesn’t need to have credentials to run applications in resource Need 2 diagrams - express the problem - express the solution Spent too much time Put a text box explaining portal server and middleware server are operated by 2 different entities
  • #11: Need a figure
  • #14: Mutual TLS
  • #15: Gateway id is extracted from the certificate provided by the client (subject key identifier)
  • #20: Can remove
  • #21: Modify the figure For other credentials we write an audit record
  • #23: Correct typo – Gateway Middleware Change colors Change font – hard to read Explain how to handle kerberos credentials (backup slides) ============================================= We are not providing an another authentication mechanisms. Not a single sign on mechanisms like MyProxy. A token based resource credential management service only.