Beyond X.509: token-based authentication and authorization for HEP

被引:4
|
作者
Ceccanti, Andrea [1 ]
Vianello, Enrico [1 ]
Caberletti, Marco [1 ]
Giacomini, Francesco [1 ]
机构
[1] INFN CNAF, Via Berti Pichat 6-2, I-40137 Bologna, Italy
关键词
D O I
10.1051/epjconf/201921409002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
X.509 certificates and VOMS have proved to be a secure and reliable solution for authentication and authorization on the Grid, but also showed usability issues and required the development of ad-hoc services and libraries to support VO-based authorization schemes in Grid middleware and experiment computing frameworks. The need to move beyond X.509 certificates is recognized as an important objective in the HEP R&D roadmap for software and computing, to overcome the usability issues of the current AAI and embrace recent advancement in web technologies widely adopted in industry, but also to enable the secure composition of computing and storage resources provisioned across heterogeneous providers in order to meet the computing needs of HL-LHC. A flexible and usable AAI based on modern web technologies is a key enabler of such secure composition and has been a major topic of research of the recently concluded INDIGO-DataCloud project. In this contribution, we present an integrated solution, based on the INDIGO-DataCloud Identity and Access Management service that demonstrates how a next generation, token-based VO-aware AAI can be built in support of HEP computing use cases, while maintaining compatibility with the existing, VOMS-based AAI used by the Grid.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Beyond X.509 Token-based authentication and authorization in practice
    Ceccanti, Andrea
    Vianello, Enrico
    Giacomini, Francesco
    [J]. 24TH INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP 2019), 2020, 245
  • [2] X.509 Authentication/Authorization in FermiCloud
    Kim, Hyunwoo
    Timm, Steven C.
    [J]. 2014 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2014, : 732 - 737
  • [3] A Secure Token-Based Communication for Authentication and Authorization Servers
    Kubovy, Jan
    Huber, Christian
    Jaeger, Markus
    Kueng, Josef
    [J]. FUTURE DATA AND SECURITY ENGINEERING, FDSE 2016, 2016, 10018 : 237 - 250
  • [4] Token-Based Authorization and Authentication for Secure Internet of Vehicles Communication
    Manogaran, Gunasekaran
    Rawal, Bharat S.
    Saravanan, Vijayalakshmi
    Priyan, M. K.
    Xin, Qin
    Shakeel, P.
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (04)
  • [5] XML based X.509 authorization in CERNET grid
    Liu, W
    Wu, JP
    Duan, HX
    Li, X
    Ren, P
    [J]. GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 2004, 3251 : 325 - 332
  • [6] Token-based Authentication for Smartphones
    Koschuch, Manuel
    Hudler, Matthias
    Eigner, Hubert
    Saffer, Zsolt
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON DATA COMMUNICATION NETWORKING (DCNET 2013), 2013, : 49 - 54
  • [7] Token-based authorization in StoRM WebDAV
    Ceccanti, Andrea
    Vianello, Enrico
    Michelotto, Diego
    [J]. 24TH INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP 2019), 2020, 245
  • [8] Web-based authorization based on X.509 Privilege Management Infrastructure
    Forné, J
    Hinarejos, MF
    [J]. 2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2003, : 565 - 568
  • [9] MQTT-Auth: a Token-based Solution to Endow MQTT with Authentication and Authorization Capabilities
    Calabretta, Marco
    Pecori, Riccardo
    Vecchio, Massimo
    Veltri, Luca
    [J]. JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2018, 14 (04) : 320 - 331
  • [10] Token-based graphical password authentication
    John Charles Gyorffy
    Andrew F. Tappenden
    James Miller
    [J]. International Journal of Information Security, 2011, 10 : 321 - 336