[OGSA-AUTHZ] Teleconference - Some topics for discussion

Yuri Demchenko demch at science.uva.nl
Thu Sep 7 05:02:07 CDT 2006


Hi David and All,

I will not be able to attend GGF, so it is important for me to present 
and discuss some issues related to current OGSA-AUTHZ documents.

A) Document "Functional Components of Grid Service Provider 
Authorisation Service Middleware"
https://forge.gridforum.org/sf/go/doc13724?nav=1

This is very useful document but in current version it looks rather like 
justification for CVS and less reflects other possible 
implementations/models for AuthZ service

1) Section 5 and diagrams may look too PERMIS or "attributes push/pull" 
model biased.

All 4 interaction models on Fig. 1-4 use unclear functionality of PEP or 
PDP that decides to call to CVS.

It would be useful to define it e.g. as a ContextHandler (CtxHandler) in 
XACML style. This will not affect CVS justification because of XACML 
doesn't define validation related functions at all but will give more 
connection to XACML.

Defining CtxHandler functionality will give us more flexibility in 
defining other interactions between PEP and PDP.

So, functionally (and graphically/topologically) I would define 
CtxHandler as a module via which external to PEP-PDP communication 
services are called out.

2) I would also clarify the use of "Authenticated Name" and why User 
AuthN is inside the PEP

Indeed we need to use requestor's "Authenticated Name" but in which way: 
as authentic or as valid :-) How it is ensured in this model?

3) The document uses words "push" and "pull" in relation to attributes.

At the same time this document
GFD-I.038 "Conceptual Grid Authorization Framework and Classification"
defines also authorisation decision "push" and "pull" models.

Does CVS work for both "push" and "pull" AuthZ models?

To cut a long story short and to avoid further and future confusion for 
readers who are not deeply involved in such (rather historical) 
discussion, I would propose not to use these words in this and other 
OGSA-AUTHZ documents except in introduction or overview sections ;-)

If we can not avoid this discussion, I would be ready to provide other 
argumentation.

3) There is one important functionality that seems mission from the 
"Functional Components of Grid Service Provider Authorisation Service 
Middleware" - this is AuthZ session management in a simple meaning and 
more extended.

What if PDP will return "intermediate" state like in XACML?

In *authorisation* push scenario a requestor provides set of 
capabilities/attributes based on preliminary AuthZ decision which should 
definitely have validity period. How we process/validate this scenario? 
Do we have means to revoke AuthZ session related credentials?

3) on Fig. 5 it is not clear what is "Credential Authenticator" and 
"Credential Decoder". If I understood their functionality correctly, I 
would prefer "Credential Verifier" and "Credential Resolver"

Also in relation to this picture we need to clarify relation between 
terms "attributes" and "credentials".


B) Document "CVS Requirements"
https://forge.gridforum.org/sf/go/doc13701?nav=1

1) some more rather generic CVS requirements are missing, like

- CVS can be called from PEP and PDP, or via CtxHandler module
- what kind of messages/interface used
- what type of policies are suggested and if some existing can be used
- accepted creds/attrs formats

2) Additionally, should we define CVS operations on 
credentials/attributes?  CVS caching capability?

3) this document also should explain CVS positioning to STS and also to 
GT4-AuthZ and GAAA-AuthZ

4) from the (security) middleware developers point of view, it would be 
useful to explain/put some requirements how the CVS can be integrated 
into overall AuthZ service or infrastructure, in sense of configuration 
of namespaces, CA/Trust anchors, trusted authorities, etc.

These may be many issues but I see them as important if I would try to 
implement proposed CVS functionality as a part of the AuthZ service, 
especially for dynamic services and multidomain scenarios.

We can discuss some of these issues later today.

Yuri


David Chadwick wrote:
> Hi Blair
> 
> Don't worry. Your input at the meeting will be sufficient. Some people
> are not able to attend GGF, so the telecom is much more important to
> them than to yourself.
> 
> regards
> 
> David.
> 
> 
> Blair Dillaway wrote:
>> David,
>>
>> While I'd like to participate in this call, I can't make the scheduled
>> time. I do have some feedback on the revised charter document. I can
>> provide that at GGF next week.
>>
>> Regards,
>> Blair Dillaway 
>>
>>> -----Original Message-----
>>> From: owner-ogsa-authz at ggf.org 
>>> [mailto:owner-ogsa-authz at ggf.org] On Behalf Of David Chadwick
>>> Sent: Friday, September 01, 2006 2:37 PM
>>> To: ogsa Authz
>>> Subject: [OGSA-AUTHZ] Teleconference
>>>
>>> Dear WG members
>>>
>>> Now that the holidays are over, I am proposing to hold a 
>>> teleconference next week on either Thursday 7 Sept or Friday 
>>> 8th Sept to discuss the documents currently on the table. Can 
>>> you please indicate which day you prefer.
>>>
>>> This teleconference will give people who are not attending 
>>> the next GGF meeting to have their say prior to the meeting 
>>> in Washington the following week. I know that Yuri has a 
>>> number of issues he wants to discuss.
>>>
>>> The time will be 2pm UK, 3pm Europe, 11pm Tokyo, 9am New 
>>> York, 6am California.
>>>
>>> Regards
>>>
>>> David
>>>
>>> -- 
>>>
>>> *****************************************************************
>>> David W. Chadwick, BSc PhD
>>> Professor of Information Systems Security The Computing 
>>> Laboratory, University of Kent, Canterbury, CT2 7NF Skype 
>>> Name: davidwchadwick
>>> Tel: +44 1227 82 3221
>>> Fax +44 1227 762 811
>>> Mobile: +44 77 96 44 7184
>>> Email: D.W.Chadwick at kent.ac.uk
>>> Home Page: http://www.cs.kent.ac.uk/people/staff/dwc8/index.html
>>> Research Web site: http://sec.cs.kent.ac.uk Entrust key 
>>> validation string: MLJ9-DU5T-HV8J PGP Key ID is 0xBC238DE5
>>>
>>> *****************************************************************
>>>
>>>
> 



More information about the ogsa-authz-wg mailing list