papi: simple and ubiquitous access to internet information services

15
PAPI: Simple and Ubiquitous Access to Internet Information Services JISC/CNI Conference - Edinburgh, 27 June 2002

Upload: sopoline-mendoza

Post on 30-Dec-2015

27 views

Category:

Documents


0 download

DESCRIPTION

PAPI: Simple and Ubiquitous Access to Internet Information Services. JISC/CNI Conference - Edinburgh, 27 June 2002. Outline. Requirements on AA (Authentication and Authorization) technologies The PAPI components The PAPI protocol Application scenarios Current status and ongoing work. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: PAPI: Simple and Ubiquitous Access to Internet Information Services

PAPI: Simple and Ubiquitous Access to Internet Information Services

JISC/CNI Conference - Edinburgh, 27 June 2002

Page 2: PAPI: Simple and Ubiquitous Access to Internet Information Services

2

Outline

• Requirements on AA (Authentication

and Authorization) technologies

• The PAPI components

• The PAPI protocol

• Application scenarios

• Current status and ongoing work

Page 3: PAPI: Simple and Ubiquitous Access to Internet Information Services

3

Requirements on AA technologies• Preserve user privacy• Do not interfere with provider rights

and accounting procedures• Do not impose management burdens

either to providers or consumers• Fully permit user mobility• Transparency to the user• Compatibility with other access control

systems• Web based, although extensible to

other access technologies

Page 4: PAPI: Simple and Ubiquitous Access to Internet Information Services

4

What is PAPI

• PAPI enables distributed access control to information resources accross the Internet Authentication is locally performed at the

organization the user belongs to Authorization is fully controlled by the

provider

• Based on standard HTTP procedures and public key cryptography Does not require specific hardware or

software

Page 5: PAPI: Simple and Ubiquitous Access to Internet Information Services

5

The components of PAPI

• The Authentication Server (AS) Provides users with a (local) single

authentication point

• The Point of Access (PoA) Performs actual access control by means

of temporary cryptographic tokens, encoded as HTTP cookies

• The Group-wide Point of Access (GPoA) Combines a group of PoAs with similar

access policies Intended to simplify AS-PoA interactions

Page 6: PAPI: Simple and Ubiquitous Access to Internet Information Services

6

The Authentication Server

• Verifies user identity and rights Each of these verifications is

independently performed Directories play a key role in rights

management

• Builds a set of digitally signed assertions about the user According to privacy preservation rules

• Sends the assertions to the appropriate (G)PoAs By means of references to objects

embedded in HTML

Page 7: PAPI: Simple and Ubiquitous Access to Internet Information Services

7

The Point of Access

• Evaluates assertions received from the AS Verifying the signature and matching

against any defined filter If the assertion is acceptable, produces a

initial couple of access tokens

• If the request comes with access tokens, evaluates them Access is granted only to requests carrying

valid tokens Two classes of tokens (long- and short-

lived) to avoid unauthorized access by cookie copying

Page 8: PAPI: Simple and Ubiquitous Access to Internet Information Services

8

The Group-wide Point of Access

• A PoA that receives a request without access tokens can redirect it to a GPoA

• The GPoA analyzes these requests If valid, the PoA receives a signed assertion

from its GPoA The PoA process it as coming from any

other AS The hierarchy may be indefinitely

extended

• Trust management is simplified An AS needs only to know about the GPoA PoAs may be added under a GPoA without

configuring them for valid ASes

Page 9: PAPI: Simple and Ubiquitous Access to Internet Information Services

9

The PAPI base protocol

Browser

AuthenticationData

AuthenticationServer

Access Tokens PoA1Access Tokens PoA2

Point ofAccess

Point ofAccess

SignedAssertions Signed Assertion

Signed Assertion

Access Tokens

Access Tokens

Page 10: PAPI: Simple and Ubiquitous Access to Internet Information Services

10

The GPoA protocol

Browser

Auth data

PAPI

AS

Assertions

GPoA Access Tokens

GPoA

PoA

PoA Access Tokens

302+ Tokens

302 + Data

Page 11: PAPI: Simple and Ubiquitous Access to Internet Information Services

11

Application scenariosDatacenter

PoA

WebServer

PoA

GPoA

Datacenter

Authentication Server

Institution A

Directory

Authentication Server

Institution B

Directory

WebServer

Page 12: PAPI: Simple and Ubiquitous Access to Internet Information Services

12

Application scenariosAccess to local and remote services

PoAWeb

Server

PoA

GPoA

Authentication Server

Institution

Directory

Provider B

WebServer

PoA

Provider A

WebServer

Page 13: PAPI: Simple and Ubiquitous Access to Internet Information Services

13

Application scenariosCentralized service

PoA

WebServer

GPoA A

Authentication Server

Institution A

Directory

PoA Provider A

WebServer

Institution B

Directory

GPoA B

PoA

PoA

Provider B

WebServer

Page 14: PAPI: Simple and Ubiquitous Access to Internet Information Services

14

Current status

• Version 1.1 in production Available in open source from

http://www.rediris.es/app/papi/ Runs on Apache servers Authentication modules based on POP3,

LDAP and index files

• Version 1.2 nearly to be released Includes ISAPI (Microsoft IIS) support Enhanced proxy functionality Simpler configuration

• Growing installed base Gaining experience on requirements and

applicability

Page 15: PAPI: Simple and Ubiquitous Access to Internet Information Services

15

Ongoing work

• Alignment with other AA initiatives Use of standard languages (SAML) for

assertions and normalization of attributes In the framework of the TF-AACE group

• In collaboration with Internet2 (Shibboleth)

• Dynamic assertion evaluation Based on attribute queries made by

(G)PoAs and answered by the AS Running on top of WebServices (SOAP)

• Performance enhancements• Going beyond the Web

Use of the AA model for other applications: videoconferencing, Grid services,...