Beyond X.509: token-based authentication and authorization for HEP

被引:4
|
作者
Ceccanti, Andrea [1 ]
Vianello, Enrico [1 ]
Caberletti, Marco [1 ]
Giacomini, Francesco [1 ]
机构
[1] INFN CNAF, Via Berti Pichat 6-2, I-40137 Bologna, Italy
关键词
D O I
10.1051/epjconf/201921409002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
X.509 certificates and VOMS have proved to be a secure and reliable solution for authentication and authorization on the Grid, but also showed usability issues and required the development of ad-hoc services and libraries to support VO-based authorization schemes in Grid middleware and experiment computing frameworks. The need to move beyond X.509 certificates is recognized as an important objective in the HEP R&D roadmap for software and computing, to overcome the usability issues of the current AAI and embrace recent advancement in web technologies widely adopted in industry, but also to enable the secure composition of computing and storage resources provisioned across heterogeneous providers in order to meet the computing needs of HL-LHC. A flexible and usable AAI based on modern web technologies is a key enabler of such secure composition and has been a major topic of research of the recently concluded INDIGO-DataCloud project. In this contribution, we present an integrated solution, based on the INDIGO-DataCloud Identity and Access Management service that demonstrates how a next generation, token-based VO-aware AAI can be built in support of HEP computing use cases, while maintaining compatibility with the existing, VOMS-based AAI used by the Grid.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] SciTokens SSH: Token-based Authentication for Remote Login to Scientific Computing Environments
    Gao, You Alex
    Basney, Jim
    Withers, Alex
    [J]. PRACTICE AND EXPERIENCE IN ADVANCED RESEARCH COMPUTING 2020, PEARC 2020, 2020, : 465 - 468
  • [42] Role-based access control with X.509 attribute certificates
    Chadwick, DW
    Otenko, A
    Ball, E
    [J]. IEEE INTERNET COMPUTING, 2003, 7 (02) : 62 - 69
  • [43] NeoMAN: Negotiation Management Method for IKE Protocol based on X.509
    Zhao, Zhen
    Ko, Kwang Sun
    Kim, Jung Han
    Kim, In Hyuk
    Eom, Young Ik
    [J]. ALPIT 2008: SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED LANGUAGE PROCESSING AND WEB INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 335 - 340
  • [44] An X.509 Based Licensed Digital Signature Framework for Hierarchical Organizations
    Ugur, Alper
    Sogukpinar, Ibrahim
    [J]. RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS, 2010, 84 : 398 - 408
  • [45] Machine Learning-Based Malicious X.509 Certificates' Detection
    Li, Jiaxin
    Zhang, Zhaoxin
    Guo, Changyong
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (05): : 1 - 24
  • [46] Using X.509 attribute certificates for role-based EAM
    Shin, DW
    Ahn, GJ
    Cho, SR
    [J]. RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY, 2003, 128 : 49 - 60
  • [47] A JSON']JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications
    Ethelbert, Obinna
    Moghaddam, Faraz Fatemi
    Wieder, Philipp
    Yahyapour, Ramin
    [J]. 2017 IEEE 5TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2017), 2017, : 47 - 53
  • [48] Exploiting X.509 certificate and multi-agent system architecture for role-based access control and authentication management
    Fugkeaw, Somchart
    Manpanpanich, Piyawit
    Juntapremjitt, Sekpon
    [J]. 2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 733 - +
  • [49] Token-based authentication and access delegation for HW-accelerated telco cloud solution
    Ince, Semih
    Espes, David
    Gogniat, Guy
    Santoro, Renaud
    Lallet, Julien
    [J]. PROCEEDINGS OF THE 2022 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (IEEE CLOUDNET 2022), 2022, : 109 - 117
  • [50] Security vulnerabilities assessment of the X.509 protocol by syntax-based testing
    Turcotte, Y
    Tal, O
    Knight, S
    Dean, T
    [J]. MILCOM 2004 - 2004 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1- 3, 2004, : 1572 - 1578