SlideShare a Scribd company logo
Grid Security
Typical Grid Scenario
Users
Resources
What do we want from security?
 Identity
 Authentication
 Privacy
 Integrity
 Authorization
 Single sign-on
 Delegation
Identity & Authentication
 Each entity should have an identity
 Who are you?
 Example: Unix login name
 Authentication:
 Prove your identity
 Stops masquerading imposters
 Examples:
 Passport
 Username and password
Privacy
Medical Record
Patient no: 3456
Integrity
Run myHome/whoami
Run myHome/rm –f *
Message Protection
 Sending message securely
 Integrity
 Detect whether message has been tampered
 Privacy
 No one other than sender and receiver should be able to
read message
Authorization establishes rights to do
actions
 What can a particular identity do?
Examples:
 Are you allowed to read this file?
 Are you allowed to run a job on this machine?
 Unix read/write/execute permissions
 Must authenticate first
 Authentication != authorization
Single sign on
 Log on once
 Type password once
 Use any grid resource without typing password
again
Delegation
Delegation
 Resources on the grid can act as you
 Example: Execution jobs can transfer files
 Delegation can be restricted
 For example: Delegation only valid for a short period of
time
Solutions using cryptography
Cryptographic Keys, the building block of
cryptography, are collections of bits
 The more bits that you
have, the stronger is the
key
 Public key cryptography
has two keys:
 Public key
 Private key
0 1 0 1 0 0 1 1 1 0
1 0 1 1 1 1 0 1 1 1
Encryption takes data and a key, feeds it
into a function and gets encrypted data out
 Encrypted data is, in
principal, unreadable
unless decrypted
Encryption
Function
<data>
Decryption feeds encrypted data & a key
into a function and gets the original data
 Encryption and
decryption functions are
linked
Decryption
Function
<data>
Digital Signatures let you verify aspects of
the data
 Who created the data
 That the data has not
been tampered with
 Does not stop other
people reading the data
 Combine
encryption+signature
Public Key Infrastructure (PKI) provides
Identity
 X.509 certificate
 Associates an identity with
a public key
 Signed by a Certificate
Authority
Owner
John Doe
755 E. Woodlawn
Urbana IL 61801
BD 08-06-65
Male 6’0” 200lbs
GRN Eyes
State of
Illinois
Seal
Certificates are similar to passports or
identity cards
Name
Issuer
Public Key
Validity
Signature
Valid Till: 01-02-2008
Certification Authorities (CAs) sign
certificates
 CAs are small set of
trusted entities
 CA certificates must be
distributed securely
Issuer?
Name
Validity
Public Key
Each CA has a Certificate Policy (CP)
 The Certificate Policy states:
 To whom the CA will issue certificates
 How the CA identifies people to whom it will issue
certificates
 Lenient CAs don’t pose security threat because
resources determine the CAs they trust.
Grid Security Infrastructure (GSI) allows
users & apps to securely access resources
 Based on PKI
 A set of tools, libraries and protocols used in
Globus
 Uses SSL for authentication and message
protection
 Adds features needed for Single-Sign on
 Proxy Credentials
 Delegation
In GSI, each user has a set of credentials
they use to prove their identity on the grid
 Consists of a X509 certificate and private key
 Long-term private key is kept encrypted with a pass
phrase
 Good for security, inconvenient for repeated usage
GSI Proxy credentials are short-lived
credentials created by user
 Short term binding of user’s identity to alternate
private key
 Same identity as certificate
 Stored unencrypted for easy repeated access
 Short lifetime in case of theft
GSI: Single Sign-on
 Single sign-on
 Uses proxies
 Type in password once, make a proxy with no password
 Features:
 Allow easy repeated access to credentials
 Limit risk of misuse on theft
 Allow process to perform jobs for user
GSI delegation allows another entity to run
using your credentials
 Other entity gets a proxy with your identity
 Other entity can run as you
 only for limited time
 for specific purpose
 For example, a compute job might want to transfer
files on your behalf.
Authorization
 Types
 Server side authorization
 Client side authorization
 Examples
 Self authorization
 Identity authorization
Gridmap is a list of mappings from allowed
DNs to user name
"/C=US/O=Globus/O=ANL/OU=MCS/CN=Ben Clifford” benc
"/C=US/O=Globus/O=ANL/OU=MCS/CN=MikeWilde” wilde
 Commonly used in Globus for server side
 ACL + some attribute
 Controlled by administrator
 Open read access
MyProxy
 Developed at NCSA
 Credential Repository with different access
mechanism (e.g username/pass phrase)
 Can act as a credential translator from
username/pass phrase to GSI
 Online CA
 Supports various authentication schemes
 Passphrase, Certificate, Kerberos
MyProxy: Use Cases
 Credential need not be stored in every machine
 Used by services that can only handle username
and pass phrases to authenticate to Grid. E.g. web
portals
 Handles credential renewal for long-running tasks
 Can delegate to other services

More Related Content

PPTX
Public key infrastructure
DOC
Certification authority
PPT
IIW-11 Pseudonyms for Privacy
PDF
Pki and OpenSSL
PDF
Basic security concepts essential for all architects
PDF
[POSS 2019] MicroServices authentication and authorization with LemonLDAP::NG
PDF
Certification Authority - Sergio Lietti
PPT
Lynn Fy07 Q4 Msdn Events Copy
Public key infrastructure
Certification authority
IIW-11 Pseudonyms for Privacy
Pki and OpenSSL
Basic security concepts essential for all architects
[POSS 2019] MicroServices authentication and authorization with LemonLDAP::NG
Certification Authority - Sergio Lietti
Lynn Fy07 Q4 Msdn Events Copy

What's hot (20)

PDF
10. grid security
PDF
3441355 ln motileng_ssl_report
PPTX
130522 Analysis of Electronic Signatures in the Cdn Justice Sector
DOCX
6.designing secure and efficient biometric based secure access mechanism for ...
PPT
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
PPT
Marco Casassa Mont: Pki overview
PPTX
Blockchain Self Sovereign Identity
PPTX
Verifiable Credentials, Self Sovereign Identity and DLTs
PDF
Blockchain PoC For Education
PPT
Cordacon 2018 - Cordentity - Hyperledger Indy + Corda
PDF
Demystifying OAuth 2.0
ODP
Securing GIS data
PPTX
Alpha Education
PDF
Jdbc 7
PDF
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...
PDF
Blockchanes
PDF
Oauth Behind The Scenes
PPTX
Secure Code Warrior - Insufficient data encoding
DOC
Demonstration of secure socket layer(synopsis)
PDF
Blockchain based approach to KYC sharing
10. grid security
3441355 ln motileng_ssl_report
130522 Analysis of Electronic Signatures in the Cdn Justice Sector
6.designing secure and efficient biometric based secure access mechanism for ...
Secure Gate / Reverse Proxy - WAF 1ere génération / Datelec
Marco Casassa Mont: Pki overview
Blockchain Self Sovereign Identity
Verifiable Credentials, Self Sovereign Identity and DLTs
Blockchain PoC For Education
Cordacon 2018 - Cordentity - Hyperledger Indy + Corda
Demystifying OAuth 2.0
Securing GIS data
Alpha Education
Jdbc 7
Hyperledger Indy Platform - Privacy, Security and Power for Digital Identity ...
Blockchanes
Oauth Behind The Scenes
Secure Code Warrior - Insufficient data encoding
Demonstration of secure socket layer(synopsis)
Blockchain based approach to KYC sharing
Ad

Similar to Grid security (20)

PDF
Grid security seminar mohit modi
PPTX
Current standard implementations for security/authorization in distributed c...
PPT
Introduction to distributed security concepts and public key infrastructure m...
PPT
Vinod Rebello
PPT
ok_mary_pki1234public_key_encryption.ppt
PDF
Security issues in grid computing
PPT
ok_mary_pki.ppt an introduction to Distributed Concept
PPT
grid authentication
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
PPTX
Crypto passport authentication
PPTX
How to write secure code
PDF
Single Sign-on Framework in Tizen
PPT
Unit_5 grid and cloud comuting security.pt
PDF
Mohit seminar gs.cse2012
PDF
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Grid security seminar mohit modi
Current standard implementations for security/authorization in distributed c...
Introduction to distributed security concepts and public key infrastructure m...
Vinod Rebello
ok_mary_pki1234public_key_encryption.ppt
Security issues in grid computing
ok_mary_pki.ppt an introduction to Distributed Concept
grid authentication
Crypto passport authentication
Crypto passport authentication
Crypto passport authentication
Crypto passport authentication
Crypto passport authentication
Crypto passport authentication
Crypto passport authentication
How to write secure code
Single Sign-on Framework in Tizen
Unit_5 grid and cloud comuting security.pt
Mohit seminar gs.cse2012
Single Sign-On, Two Factor & more: Advanced Authentication & Authorization at...
Ad

Recently uploaded (20)

PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Cell Structure & Organelles in detailed.
PDF
Pre independence Education in Inndia.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Cell Types and Its function , kingdom of life
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
master seminar digital applications in india
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Insiders guide to clinical Medicine.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Renaissance Architecture: A Journey from Faith to Humanism
Microbial disease of the cardiovascular and lymphatic systems
Anesthesia in Laparoscopic Surgery in India
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Microbial diseases, their pathogenesis and prophylaxis
2.FourierTransform-ShortQuestionswithAnswers.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Cell Structure & Organelles in detailed.
Pre independence Education in Inndia.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Cell Types and Its function , kingdom of life
human mycosis Human fungal infections are called human mycosis..pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
master seminar digital applications in india
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Insiders guide to clinical Medicine.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape

Grid security

  • 3. What do we want from security?  Identity  Authentication  Privacy  Integrity  Authorization  Single sign-on  Delegation
  • 4. Identity & Authentication  Each entity should have an identity  Who are you?  Example: Unix login name  Authentication:  Prove your identity  Stops masquerading imposters  Examples:  Passport  Username and password
  • 7. Message Protection  Sending message securely  Integrity  Detect whether message has been tampered  Privacy  No one other than sender and receiver should be able to read message
  • 8. Authorization establishes rights to do actions  What can a particular identity do? Examples:  Are you allowed to read this file?  Are you allowed to run a job on this machine?  Unix read/write/execute permissions  Must authenticate first  Authentication != authorization
  • 9. Single sign on  Log on once  Type password once  Use any grid resource without typing password again
  • 11. Delegation  Resources on the grid can act as you  Example: Execution jobs can transfer files  Delegation can be restricted  For example: Delegation only valid for a short period of time
  • 13. Cryptographic Keys, the building block of cryptography, are collections of bits  The more bits that you have, the stronger is the key  Public key cryptography has two keys:  Public key  Private key 0 1 0 1 0 0 1 1 1 0 1 0 1 1 1 1 0 1 1 1
  • 14. Encryption takes data and a key, feeds it into a function and gets encrypted data out  Encrypted data is, in principal, unreadable unless decrypted Encryption Function <data>
  • 15. Decryption feeds encrypted data & a key into a function and gets the original data  Encryption and decryption functions are linked Decryption Function <data>
  • 16. Digital Signatures let you verify aspects of the data  Who created the data  That the data has not been tampered with  Does not stop other people reading the data  Combine encryption+signature
  • 17. Public Key Infrastructure (PKI) provides Identity  X.509 certificate  Associates an identity with a public key  Signed by a Certificate Authority Owner
  • 18. John Doe 755 E. Woodlawn Urbana IL 61801 BD 08-06-65 Male 6’0” 200lbs GRN Eyes State of Illinois Seal Certificates are similar to passports or identity cards Name Issuer Public Key Validity Signature Valid Till: 01-02-2008
  • 19. Certification Authorities (CAs) sign certificates  CAs are small set of trusted entities  CA certificates must be distributed securely Issuer? Name Validity Public Key
  • 20. Each CA has a Certificate Policy (CP)  The Certificate Policy states:  To whom the CA will issue certificates  How the CA identifies people to whom it will issue certificates  Lenient CAs don’t pose security threat because resources determine the CAs they trust.
  • 21. Grid Security Infrastructure (GSI) allows users & apps to securely access resources  Based on PKI  A set of tools, libraries and protocols used in Globus  Uses SSL for authentication and message protection  Adds features needed for Single-Sign on  Proxy Credentials  Delegation
  • 22. In GSI, each user has a set of credentials they use to prove their identity on the grid  Consists of a X509 certificate and private key  Long-term private key is kept encrypted with a pass phrase  Good for security, inconvenient for repeated usage
  • 23. GSI Proxy credentials are short-lived credentials created by user  Short term binding of user’s identity to alternate private key  Same identity as certificate  Stored unencrypted for easy repeated access  Short lifetime in case of theft
  • 24. GSI: Single Sign-on  Single sign-on  Uses proxies  Type in password once, make a proxy with no password  Features:  Allow easy repeated access to credentials  Limit risk of misuse on theft  Allow process to perform jobs for user
  • 25. GSI delegation allows another entity to run using your credentials  Other entity gets a proxy with your identity  Other entity can run as you  only for limited time  for specific purpose  For example, a compute job might want to transfer files on your behalf.
  • 26. Authorization  Types  Server side authorization  Client side authorization  Examples  Self authorization  Identity authorization
  • 27. Gridmap is a list of mappings from allowed DNs to user name "/C=US/O=Globus/O=ANL/OU=MCS/CN=Ben Clifford” benc "/C=US/O=Globus/O=ANL/OU=MCS/CN=MikeWilde” wilde  Commonly used in Globus for server side  ACL + some attribute  Controlled by administrator  Open read access
  • 28. MyProxy  Developed at NCSA  Credential Repository with different access mechanism (e.g username/pass phrase)  Can act as a credential translator from username/pass phrase to GSI  Online CA  Supports various authentication schemes  Passphrase, Certificate, Kerberos
  • 29. MyProxy: Use Cases  Credential need not be stored in every machine  Used by services that can only handle username and pass phrases to authenticate to Grid. E.g. web portals  Handles credential renewal for long-running tasks  Can delegate to other services

Editor's Notes

  • #3: Large resources Shared across various domain User pool Restrict access to the resource, yet allow for collaboration
  • #6: - Real life: sensitive data : caBig cancer research; proprietary data.
  • #11: Long running jobs Jobs require access to different things
  • #14: Keys are building blocks 256 bits key is stronger than 128 bits Computing things using larger key also takes more time. Most algorithms are well established and tools have been already developed for performing the computations
  • #15: Data is treated as bit streams.
  • #16: Decryption again is a mathematical function of taking the encrypted data and key and getting original data If you encrypt with a particular algorithm, you want to decrypt with the same one
  • #17: Generated and sent with the message
  • #18: Provides a owner tag Any entity that possess the private key, assumes that entity. So if you have my private key, you are me as far as PKI fabric is concerned.
  • #24: Motivation: - Encrypted private key requires some warm body, - long term credential – prevent theft. Same identity as the certificate proxy is created off New key pair signed by your certificate Clock synchronization issues