papi: simple and ubiquitous access to internet information services
DESCRIPTION
PAPI: Simple and Ubiquitous Access to Internet Information Services. JISC/CNI Conference - Edinburgh, 27 June 2002. Outline. Requirements on AA (Authentication and Authorization) technologies The PAPI components The PAPI protocol Application scenarios Current status and ongoing work. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: PAPI: Simple and Ubiquitous Access to Internet Information Services](https://reader036.vdocument.in/reader036/viewer/2022082817/56812b20550346895d8f1c28/html5/thumbnails/1.jpg)
PAPI: Simple and Ubiquitous Access to Internet Information Services
JISC/CNI Conference - Edinburgh, 27 June 2002
![Page 2: PAPI: Simple and Ubiquitous Access to Internet Information Services](https://reader036.vdocument.in/reader036/viewer/2022082817/56812b20550346895d8f1c28/html5/thumbnails/2.jpg)
2
Outline
• Requirements on AA (Authentication
and Authorization) technologies
• The PAPI components
• The PAPI protocol
• Application scenarios
• Current status and ongoing work
![Page 3: PAPI: Simple and Ubiquitous Access to Internet Information Services](https://reader036.vdocument.in/reader036/viewer/2022082817/56812b20550346895d8f1c28/html5/thumbnails/3.jpg)
3
Requirements on AA technologies• Preserve user privacy• Do not interfere with provider rights
and accounting procedures• Do not impose management burdens
either to providers or consumers• Fully permit user mobility• Transparency to the user• Compatibility with other access control
systems• Web based, although extensible to
other access technologies
![Page 4: PAPI: Simple and Ubiquitous Access to Internet Information Services](https://reader036.vdocument.in/reader036/viewer/2022082817/56812b20550346895d8f1c28/html5/thumbnails/4.jpg)
4
What is PAPI
• PAPI enables distributed access control to information resources accross the Internet Authentication is locally performed at the
organization the user belongs to Authorization is fully controlled by the
provider
• Based on standard HTTP procedures and public key cryptography Does not require specific hardware or
software
![Page 5: PAPI: Simple and Ubiquitous Access to Internet Information Services](https://reader036.vdocument.in/reader036/viewer/2022082817/56812b20550346895d8f1c28/html5/thumbnails/5.jpg)
5
The components of PAPI
• The Authentication Server (AS) Provides users with a (local) single
authentication point
• The Point of Access (PoA) Performs actual access control by means
of temporary cryptographic tokens, encoded as HTTP cookies
• The Group-wide Point of Access (GPoA) Combines a group of PoAs with similar
access policies Intended to simplify AS-PoA interactions
![Page 6: PAPI: Simple and Ubiquitous Access to Internet Information Services](https://reader036.vdocument.in/reader036/viewer/2022082817/56812b20550346895d8f1c28/html5/thumbnails/6.jpg)
6
The Authentication Server
• Verifies user identity and rights Each of these verifications is
independently performed Directories play a key role in rights
management
• Builds a set of digitally signed assertions about the user According to privacy preservation rules
• Sends the assertions to the appropriate (G)PoAs By means of references to objects
embedded in HTML
![Page 7: PAPI: Simple and Ubiquitous Access to Internet Information Services](https://reader036.vdocument.in/reader036/viewer/2022082817/56812b20550346895d8f1c28/html5/thumbnails/7.jpg)
7
The Point of Access
• Evaluates assertions received from the AS Verifying the signature and matching
against any defined filter If the assertion is acceptable, produces a
initial couple of access tokens
• If the request comes with access tokens, evaluates them Access is granted only to requests carrying
valid tokens Two classes of tokens (long- and short-
lived) to avoid unauthorized access by cookie copying
![Page 8: PAPI: Simple and Ubiquitous Access to Internet Information Services](https://reader036.vdocument.in/reader036/viewer/2022082817/56812b20550346895d8f1c28/html5/thumbnails/8.jpg)
8
The Group-wide Point of Access
• A PoA that receives a request without access tokens can redirect it to a GPoA
• The GPoA analyzes these requests If valid, the PoA receives a signed assertion
from its GPoA The PoA process it as coming from any
other AS The hierarchy may be indefinitely
extended
• Trust management is simplified An AS needs only to know about the GPoA PoAs may be added under a GPoA without
configuring them for valid ASes
![Page 9: PAPI: Simple and Ubiquitous Access to Internet Information Services](https://reader036.vdocument.in/reader036/viewer/2022082817/56812b20550346895d8f1c28/html5/thumbnails/9.jpg)
9
The PAPI base protocol
Browser
AuthenticationData
AuthenticationServer
Access Tokens PoA1Access Tokens PoA2
Point ofAccess
Point ofAccess
SignedAssertions Signed Assertion
Signed Assertion
Access Tokens
Access Tokens
![Page 10: PAPI: Simple and Ubiquitous Access to Internet Information Services](https://reader036.vdocument.in/reader036/viewer/2022082817/56812b20550346895d8f1c28/html5/thumbnails/10.jpg)
10
The GPoA protocol
Browser
Auth data
PAPI
AS
Assertions
GPoA Access Tokens
GPoA
PoA
PoA Access Tokens
302+ Tokens
302 + Data
![Page 11: PAPI: Simple and Ubiquitous Access to Internet Information Services](https://reader036.vdocument.in/reader036/viewer/2022082817/56812b20550346895d8f1c28/html5/thumbnails/11.jpg)
11
Application scenariosDatacenter
PoA
WebServer
PoA
GPoA
Datacenter
Authentication Server
Institution A
Directory
Authentication Server
Institution B
Directory
WebServer
![Page 12: PAPI: Simple and Ubiquitous Access to Internet Information Services](https://reader036.vdocument.in/reader036/viewer/2022082817/56812b20550346895d8f1c28/html5/thumbnails/12.jpg)
12
Application scenariosAccess to local and remote services
PoAWeb
Server
PoA
GPoA
Authentication Server
Institution
Directory
Provider B
WebServer
PoA
Provider A
WebServer
![Page 13: PAPI: Simple and Ubiquitous Access to Internet Information Services](https://reader036.vdocument.in/reader036/viewer/2022082817/56812b20550346895d8f1c28/html5/thumbnails/13.jpg)
13
Application scenariosCentralized service
PoA
WebServer
GPoA A
Authentication Server
Institution A
Directory
PoA Provider A
WebServer
Institution B
Directory
GPoA B
PoA
PoA
Provider B
WebServer
![Page 14: PAPI: Simple and Ubiquitous Access to Internet Information Services](https://reader036.vdocument.in/reader036/viewer/2022082817/56812b20550346895d8f1c28/html5/thumbnails/14.jpg)
14
Current status
• Version 1.1 in production Available in open source from
http://www.rediris.es/app/papi/ Runs on Apache servers Authentication modules based on POP3,
LDAP and index files
• Version 1.2 nearly to be released Includes ISAPI (Microsoft IIS) support Enhanced proxy functionality Simpler configuration
• Growing installed base Gaining experience on requirements and
applicability
![Page 15: PAPI: Simple and Ubiquitous Access to Internet Information Services](https://reader036.vdocument.in/reader036/viewer/2022082817/56812b20550346895d8f1c28/html5/thumbnails/15.jpg)
15
Ongoing work
• Alignment with other AA initiatives Use of standard languages (SAML) for
assertions and normalization of attributes In the framework of the TF-AACE group
• In collaboration with Internet2 (Shibboleth)
• Dynamic assertion evaluation Based on attribute queries made by
(G)PoAs and answered by the AS Running on top of WebServices (SOAP)
• Performance enhancements• Going beyond the Web
Use of the AA model for other applications: videoconferencing, Grid services,...