aai @ chuv - switch · 2010. 8. 27. · •presentation of the chuv ... 3 aai authentication 4...

26
CHUV AAI @ CHUV Vincent Bex Systems Engineer [email protected] Patrick Zosso Infrastructure Project Manager [email protected]

Upload: others

Post on 10-Sep-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUV

AAI @ CHUV

Vincent BexSystems Engineer

[email protected]

Patrick ZossoInfrastructure Project Manager

[email protected]

Page 2: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUV

• Presentation of the CHUV

• Security concepts at CHUV

• The challenge

• AAI implementation for UNIL students

Agenda

Page 3: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUV

Some indicators• 7100 Employees + 400 Students

• 1300 Beds

• 2 campuses and several small remotesites

Presentation

Page 4: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUVPresentation

• Equipments• PC 7000

• Printers 1930

• Servers 250

• Applications 750

• Storage• 70Tbytes

Page 5: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUVPresentation

• Locations• One LAN spread on 2 main campuses

• 23 Small remote sites

• 385 network equipments• VPN

• Firewalls

• Routers

• Switches

• WiFi

• …

Page 6: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUV

• Security concepts at CHUV

• The challenge

• AAI implementation for UNIL students

Agenda

Page 7: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUV

Internet

Intranet

DataCenter

DMZ

tcp any

http://www.switch.aaiOrhttp://kodc2.nfrdi.re.kr:8001

Security concepts at CHUV

Page 8: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUV

Internet

Intranet

DataCenter

DMZHTTPProxy

tcp 8080

tcp any

Security concepts at CHUV

Page 9: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUV

Internet

Intranet

DataCenter

DMZ

UnilStudent

HTTPProxy

tcp 8080

tcp any

LDAP

HTTPProxy

Security concepts at CHUV

Page 10: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUV

• The challenge

• AAI implementation for UNIL students

Agenda

Page 11: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUVThe Challenge

The situation:

• Users who are not CHUV employees (UNIL students) needto access internet from our premises

• They use specific PCs from the library

• They use PCs configured to automatically logon with ageneric account

Page 12: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUVThe Challenge

The needs:

• We need to identify the users who access internet forpolicy enforcement purpose

Page 13: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUVThe Challenge

The environment:

• Our proxies are currently BlueCoat appliances

• BlueCoat does not support mod_shib authentication

• Shibboleth is “easy” to implement on IIS or Apache

• We need to force the PCs to use the proxy

Page 14: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUVThe Challenge

The solution:

• A dedicated BlueCoat proxy

• A Service Provider on Debian 4.0

• Apache 2.2 with mod_shib enabled

• Open LDAP

• Two CGI scripts

• A GPO to force the user’s PCs to use the proxy

Page 15: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUV

• AAI implementation for UNIL students

Agenda

Page 16: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUVAAI implementation for UNIL students

Internet1

HTTPRequest/response

1 Internet access request

HTTP Proxy

Page 17: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUV

Internet

HTTP Redirection

2

HTTP Proxy

2 Redirection to a perl script protected by ShibbolethHTTP

Request/response

AAI implementation for UNIL students

Page 18: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUV

InternetServer to server connection

3

3

HTTP Proxy

3 AAI authenticationHTTP

Request/response

HTTP Redirection

AAI implementation for UNIL students

Page 19: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUV

Internet

4

HTTP Proxy

Server to server connection

HTTPRequest/response

HTTP Redirection

4 Creating the LDAP user

AAI implementation for UNIL students

Page 20: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUV

Internet

5

HTTP Proxy

Server to server connection

HTTPRequest/response

HTTP Redirection

5 Creating and sending the authentication form

AAI implementation for UNIL students

Page 21: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUV

Internet

6

HTTP Proxy

Server to server connection

HTTPRequest/response

HTTP Redirection

6 The proxy requests authentication to the LDAP server

AAI implementation for UNIL students

Page 22: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUV

Internet

7

HTTP Proxy

Server to server connection

HTTPRequest/response

HTTP Redirection

7 LDAP user gets deleted

AAI implementation for UNIL students

Page 23: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUV

Internet

8

HTTP Proxy

Server to server connection

HTTPRequest/response

HTTP Redirection

8 Redirection to the requested URL

AAI implementation for UNIL students

Page 24: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUV

Internet9

HTTP Proxy

Server to server connection

HTTPRequest/response

HTTP Redirection

9 Internet access

AAI implementation for UNIL students

Page 25: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUV

Internet1

2

3

3

7

5

4

9

1 Internet access request2 Redirection to a perl script protected by Shibboleth3 AAI authentication4 Creating the LDAP user

8

5 Creating and sending the authentication form6 The proxy requests authentication to the LDAP server7 LDAP user gets deleted8 Redirection to the requested URL9 Internet access

6

HTTP Proxy

Server to server connection

HTTPRequest/response

HTTP redirect

AAI implementation for UNIL students

Page 26: AAI @ CHUV - SWITCH · 2010. 8. 27. · •Presentation of the CHUV ... 3 AAI authentication 4 Creating the LDAP user 8 5 Creating and sending the authentication form 6 The proxy

CHUV

Q&A

Q&A