[ogsa-wg] [ogsa-authn-bof] Authentication in OGSA

David Chadwick d.w.chadwick at kent.ac.uk
Mon Jan 22 16:42:17 CST 2007


Hi Blair

Blair Dillaway wrote:
> David,
> 
> Marty gave the reason why authZ isn't mentioned. But, I'll interpret
> your comment more generally as to why SAML for authN isn't an option. 

I wasnt actually raising this as an issue..

> 
> We had a discussion about whether to include authN profiles for other
> token types, SAML and Kerberos in particular since there are already
> SOAP Message Security profiles. They weren't included based on two
> considerations:
> 1)there was a strong desire to keep the number of options to a minimum
> to reduce implementation/testing requirements as well as to make
> interoperability more certain

sensible. The more options you have, the more a server needs to 
implement in order to cater for all clients.

> 2) X.509 and/or username-password are believed to be the most widely
> deployed intra-org authN mechanisms with Kerberos and SAML less likely
> to be present.

The only way you will find out if your beliefs are true or not is to 
perform some sort of census with the users to find out what they are 
really using. Has anyone tried this or not?

regards

David


> 
> We can certainly discuss this at OGF19 if people think inclusion of SAML
> or Kerberos options would be valuable additions.
> 
> Regards,
> Blair
> 
> 
> 
> 
> -----Original Message-----
> From: Marty Humphrey [mailto:humphrey at cs.virginia.edu] 
> Sent: Monday, January 22, 2007 1:24 PM
> To: 'David Chadwick'; Blair Dillaway
> Cc: 'OGSA Authentication WG BoF'; 'Jim Basney'; ogsa-wg at gridforum.org
> Subject: RE: [ogsa-wg] [ogsa-authn-bof] Authentication in OGSA
> 
> Hi David,
> 
> First, I presume that "their Authz requirements" refers to the HPC
> Profile
> group, yes?
> 
> If so, then I'll speak up. AuthZ is out of scope. AuthN *is* in scope. 
> 
> Note that I am personally very supportive of the GFD.66 effort -- after
> all,
> my group is one of the few groups who have actually implemented it! (in
> our
> .NET code). I could see this GFD.66 coming into play as an Extension if
> the
> demand warrants it.
> 
> Perhaps some of this more philosophical discussion should take place
> next
> week in North Carolina (OGF 19)? It's difficult to sufficiently explain
> oneself in email at times.
> 
> -- Marty 
> 
> -----Original Message-----
> From: ogsa-wg-bounces at ogf.org [mailto:ogsa-wg-bounces at ogf.org] On Behalf
> Of
> David Chadwick
> Sent: Monday, January 22, 2007 4:14 PM
> To: Blair Dillaway
> Cc: OGSA Authentication WG BoF; Jim Basney; ogsa-wg at gridforum.org
> Subject: Re: [ogsa-wg] [ogsa-authn-bof] Authentication in OGSA
> 
> Hi Blair
> 
> Interestingly you say very little about their Authz requirements or why,
> 
> for example, GFD.66 cannot meet them. Do you have more info about this?
> 
> thanks
> 
> David
> 
> 
> 
> Blair Dillaway wrote:
>> (adding the other authors back to this thread)
>>
>> This discussion, and a side conversation with Alan, makes me think a
>> little more context may be useful.  I can agree with the comments by
>> Alan and others since I believe they are considering different
>> requirements and priorities.
>>
>> As background, I first discussed the HPC Profile WG's security
>> requirements with the chairpersons at SC06. A reason for that
> discussion
>> was to see if their requirements could be met as part of the more
>> general OGSA-AuthN proposal, OGSA-AuthZ, etc.  While we generally
> agreed
>> those efforts may meet the security requirements in the long term, the
>> HPC Profile WG needs a very near term interoperability solution for
> the
>> HPC base use case. That use case only considers intra-domain use of
> HPC
>> compute resources with batch job scheduling. The solution also needs
> to
>> be compatible with existing products  and customer environments to
> allow
>> for rapid adoption. 
>>
>> These requirements drove the draft the document under discussion. The
>> rationale for supporting TLS/SSL and X.509-based authentication is
>> probably well understood and not terribly controversial. There are a
>> couple of important reasons for also supporting username-password
> client
>> authentication. First, some existing HPC products only support this
>> mechanism. Second, many organizations are unwilling to deploy and
> manage
>> an X.509 client certification infrastructure solely for internal
> access
>> control.
>>
>> Its perfectly reasonable to debate the HPC requirements and the
> proposed
>> authN mechanisms, but that isn't the focus of this thread.
>>
>> As Alan has stated, he is focused on grid authN use cases. I agree
> with
>> him, and the reasons cited, why username-password authN is
> inappropriate
>> for many grid environments. I think the only real issue here is
> whether
>> there are interesting grid uses cases for which the proposed HPC
> profile
>> authN mechanisms are suitable. If so, then perhaps broader usage
>> guidance appropriate should be incorporated into the document. I do
>> agree its inappropriate to ask the HPC Profile WG to wait for some
>> future activity to address their current needs.
>>
>> Regards,
>> Blair Dillaway
>>
>> -----Original Message-----
>> From: ogsa-authn-bof-bounces at ogf.org
>> [mailto:ogsa-authn-bof-bounces at ogf.org] On Behalf Of Von Welch
>> Sent: Monday, January 22, 2007 11:39 AM
>> To: Steven Newhouse
>> Cc: OGSA Authentication WG BoF; ogsa-wg at gridforum.org
>> Subject: Re: [ogsa-authn-bof] [ogsa-wg] Authentication in OGSA
>>
>> [Dropped security-area from cc list. Please leave it off.]
>>
>> I agree with Steven. We need to separate what is specified from what  
>> is acceptable in certain deployment scenarios. There certainly are  
>> deployment scenarios where PKI is required, just as there are  
>> scenarios where it is undesirable. I think the choice of focus on PKI
> 
>> and username/password offers promise of supporting a broad range of  
>> deployment scenarios.
>>
>> Von
>>
>>
>>
>>
>> On Jan 22, 2007, at 1:32 PM, Steven Newhouse wrote:
>>
>>>> I specifically
>>>> think these additions are not supported, nor are they supportable,  
>>>> for
>>>> high-performance computing resource access under OGSA either in
>>>> philosophy or in implementation as written.
>>> 'access under OGSA' is a bit of a null statement IMHO. Both of the
>>> proposed mechanisms (username/password & X.509 certificates) are  
>>> viable
>>> in some deployment scenarios - perhaps not in others. The key
>>> requirement is to keep moving.
>>>
>>> Waiting for the results of WG's that are just having BoFs is not  
>>> really
>>> a viable solution.
>>>
>>> Steven
>>> -- 
>>> ----------------------------------------------------------------
>>> Dr Steven Newhouse   Mob:+44(0)7920489420  Tel:+44(0)23 80598789
>>> Director, Open Middleware Infrastructure Institute-UK (OMII-UK)
>>> c/o Suite 6005, Faraday Building (B21), Highfield Campus,
>>> University of Southampton, Highfield, Southampton, SO17 1BJ, UK
>>>
>>> --
>>>   ogsa-wg mailing list
>>>   ogsa-wg at ogf.org
>>>   http://www.ogf.org/mailman/listinfo/ogsa-wg
>>>
>> _______________________________________________
>> ogsa-authn-bof mailing list
>> ogsa-authn-bof at ogf.org
>> http://www.ogf.org/mailman/listinfo/ogsa-authn-bof
>> --
>>   ogsa-wg mailing list
>>   ogsa-wg at ogf.org
>>   http://www.ogf.org/mailman/listinfo/ogsa-wg
>>
> 

-- 

*****************************************************************
David W. Chadwick, BSc PhD
Professor of Information Systems Security
The Computing Laboratory, University of Kent, Canterbury, CT2 7NF
Skype Name: davidwchadwick
Tel: +44 1227 82 3221
Fax +44 1227 762 811
Mobile: +44 77 96 44 7184
Email: D.W.Chadwick at kent.ac.uk
Home Page: http://www.cs.kent.ac.uk/people/staff/dwc8/index.html
Research Web site: http://sec.cs.kent.ac.uk
Entrust key validation string: MLJ9-DU5T-HV8J
PGP Key ID is 0xBC238DE5

*****************************************************************


More information about the ogsa-wg mailing list