Beyond X.509 Token-based authentication and authorization in practice

被引:1
|
作者
Ceccanti, Andrea [1 ]
Vianello, Enrico [1 ]
Giacomini, Francesco [1 ]
机构
[1] INFN CNAF, Viale Berti Pichat 6-2, I-40127 Bologna, Italy
关键词
D O I
10.1051/epjconf/202024503021
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
One of the key challenges identified by the HEP R&D roadmap for software and computing is the ability to integrate heterogeneous resources in support of the computing needs of HL-LHC. In order to meet this objective, a flexible Authentication and Authorization Infrastructure (AAI) has to be in place, to allow the secure composition of computing and storage resources provisioned across heterogeneous providers (e.g., Grid, private and commercial Clouds, HPC centers). At CHEP 2018, we presented how a flexible AAI based on modern, standard Web technologies (OpenID Connect, OAuth and JSON Web Tokens) and centered on the INDIGO Identity and Access Management (IAM) service could support the transition of the WLCG infrastructure to a token-based AAI. In the meanwhile, INDIGO IAM has been selected by the WLCG Management Board as the solution that will be adopted by LHC experiments, and is also at the core of the AAI envisioned to support the computing needs of the ESCAPE project. In this contribution, which represents a follow up to last-year plenary talk, we describe the work done recently on the IAM service to support WLCG requirements.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Inter-Cloud Authentication through X.509 for Defense Organization
    Ul Arifeen, Fahan
    Siddiqui, Raees A.
    Ashraf, Sajjad
    Waheed, Salman
    [J]. 2015 12TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2015, : 299 - 306
  • [22] Validating X.509 Certificates Based on Their Quality
    Wazan, Ahmad Samer
    Laborde, Romain
    Barrere, Francois
    Benzekri, Abdelmalek
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2055 - 2060
  • [23] TBAS: Token-based authorization service architecture in Internet of things scenarios
    Lee, Shih-Hsiung
    Huang, Ko-Wei
    Yang, Chu-Sing
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (07):
  • [24] Token-Based Authentication Techniques on Open Source Cloud Platforms
    Banerjee, Amit
    Hasan, Mahamudul
    [J]. SISTEMAS & TELEMATICA, 2018, 16 (47): : 9 - 29
  • [25] An Updateable Token-Based Schema for Authentication and Access Management in Clouds
    Emadinia, Tayyebe
    Moghaddam, Faraz Fatemi
    Wieder, Philipp
    Dabbaghi, Shirin
    Yahyapour, Ramin
    [J]. 2019 7TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2019), 2019, : 50 - 56
  • [26] A Token-based Authentication and Key Agreement Protocol for Cloud Computing
    Xu, Zisang
    Xu, Jianbo
    Kuang, Li-Dan
    [J]. 2021 IEEE 6TH INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD 2021), 2021, : 38 - 43
  • [27] Anonymity 2.0 - X.509 extensions supporting privacy-friendly authentication
    Benjumea, Vicente
    Choi, Seung G.
    Lopez, Javier
    Yung, Moti
    [J]. CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 265 - +
  • [28] Adoption of a token-based authentication model for the CMS Submission Infrastructure
    Perez-Calero Yzquierdo, Antonio
    Mascheroni, Marco
    Kizinevic, Edita
    Khan, Farrukh Aftab
    Kim, Hyunwoo
    Flechas, Maria Acosta
    Tsipinakis, Nikos
    Haleem, Saqib
    Wurthwein, Frank
    [J]. 26TH INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS, CHEP 2023, 2024, 295
  • [29] Attribute-Based Encryption goes X.509
    Reimair, Florian
    Feichtner, Johannes
    Teufl, Peter
    [J]. 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2015, : 393 - 400
  • [30] Risk Assessment of X.509 Certificate by Evaluating Certification Practice Statements
    Hawanna, Varsharani
    Kulkarni, V. Y.
    Rane, R. A.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 501 - 506