Beyond X.509 Token-based authentication and authorization in practice

被引:1
|
作者
Ceccanti, Andrea [1 ]
Vianello, Enrico [1 ]
Giacomini, Francesco [1 ]
机构
[1] INFN CNAF, Viale Berti Pichat 6-2, I-40127 Bologna, Italy
关键词
D O I
10.1051/epjconf/202024503021
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
One of the key challenges identified by the HEP R&D roadmap for software and computing is the ability to integrate heterogeneous resources in support of the computing needs of HL-LHC. In order to meet this objective, a flexible Authentication and Authorization Infrastructure (AAI) has to be in place, to allow the secure composition of computing and storage resources provisioned across heterogeneous providers (e.g., Grid, private and commercial Clouds, HPC centers). At CHEP 2018, we presented how a flexible AAI based on modern, standard Web technologies (OpenID Connect, OAuth and JSON Web Tokens) and centered on the INDIGO Identity and Access Management (IAM) service could support the transition of the WLCG infrastructure to a token-based AAI. In the meanwhile, INDIGO IAM has been selected by the WLCG Management Board as the solution that will be adopted by LHC experiments, and is also at the core of the AAI envisioned to support the computing needs of the ESCAPE project. In this contribution, which represents a follow up to last-year plenary talk, we describe the work done recently on the IAM service to support WLCG requirements.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Beyond X.509: token-based authentication and authorization for HEP
    Ceccanti, Andrea
    Vianello, Enrico
    Caberletti, Marco
    Giacomini, Francesco
    [J]. 23RD INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP 2018), 2019, 214
  • [2] X.509 Authentication/Authorization in FermiCloud
    Kim, Hyunwoo
    Timm, Steven C.
    [J]. 2014 IEEE/ACM 7TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2014, : 732 - 737
  • [3] A Secure Token-Based Communication for Authentication and Authorization Servers
    Kubovy, Jan
    Huber, Christian
    Jaeger, Markus
    Kueng, Josef
    [J]. FUTURE DATA AND SECURITY ENGINEERING, FDSE 2016, 2016, 10018 : 237 - 250
  • [4] Token-Based Authorization and Authentication for Secure Internet of Vehicles Communication
    Manogaran, Gunasekaran
    Rawal, Bharat S.
    Saravanan, Vijayalakshmi
    Priyan, M. K.
    Xin, Qin
    Shakeel, P.
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (04)
  • [5] XML based X.509 authorization in CERNET grid
    Liu, W
    Wu, JP
    Duan, HX
    Li, X
    Ren, P
    [J]. GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 2004, 3251 : 325 - 332
  • [6] Token-based Authentication for Smartphones
    Koschuch, Manuel
    Hudler, Matthias
    Eigner, Hubert
    Saffer, Zsolt
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON DATA COMMUNICATION NETWORKING (DCNET 2013), 2013, : 49 - 54
  • [7] Token-based authorization in StoRM WebDAV
    Ceccanti, Andrea
    Vianello, Enrico
    Michelotto, Diego
    [J]. 24TH INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP 2019), 2020, 245
  • [8] Web-based authorization based on X.509 Privilege Management Infrastructure
    Forné, J
    Hinarejos, MF
    [J]. 2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2003, : 565 - 568
  • [9] MQTT-Auth: a Token-based Solution to Endow MQTT with Authentication and Authorization Capabilities
    Calabretta, Marco
    Pecori, Riccardo
    Vecchio, Massimo
    Veltri, Luca
    [J]. JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2018, 14 (04) : 320 - 331
  • [10] Token-based graphical password authentication
    John Charles Gyorffy
    Andrew F. Tappenden
    James Miller
    [J]. International Journal of Information Security, 2011, 10 : 321 - 336