Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Add basic info for AARC2 douments


Tip
titleFirst draft version of the AARC Blueprint Architecture (AARC-BPA-2017)

The first version purpose of the draft AARC Blueprint Architecture has been released. The working document of the ‘AARC Blueprint Architecture’ is available on Google Docs and we would like to encourage the technical architects and implementers in the various research and e-infrastructure and scientific communities to review it, and provide their feedback either in the document itself or via the public AARC Connect mailing list.(BPA) is to provide set of interoperable architectural building blocks for software architects and technical decision makers, who are designing and implementing access management solutions for international research collaborations.

JRA1: Architectures for an integrated and interoperable AAI

...


High-level Objectives

 

  • focus on the integration aspects of the blueprint architecture 

  • provide recommendations and guidelines for implementers, service providers and infrastructure operators on implementing scalable and interoperable AAIs across e-infrastructures and scientific communities

  • work in close collaboration with the policy, pilots, and the training and outreach activities of AARC2

  • work on the evolution of the blueprint architecture, with a focus on identity provider / service provider (IdP/SP) proxies, scalable authorisation solutions for multi-service provider environments and other solutions for integrating with R&E federations and cross-sector AAIs

 

Documents

 

IDTitleSummaryLinks
AARC2-JRA1.1AGuidelines for interoperable exchange of user and community information between AAIs

AARC2-JRA1.1BGuidelines for the discovery of authoritative attribute providers across different operational domains

AARC2-JRA1.1CGuidelines for handling user registration and user consent for releasing attributes across different operational domains

AARC2-JRA1.1DGuidelines for federated access to non-web services across different operational domains

AARC2-JRA1.2AGuidelines for scalable and consistent authorisation across multi-SP environments

AARC2-JRA1.2BRequirements and guidelines for SPs using alternative mechanisms and protocols for federated access

AARC2-JRA1.2CStep-up authentication requirements and guidelines for SPs

AARC2-JRA1.3AGuidelines for account linking & LoA elevation in cross-sector AAIs

AARC2-JRA1.3BGuidelines for registering OIDC Relying Parties in AAIs for international research collaboration

AARC2-JRA1.3CGuidelines for AAI interoperability with non-R&E Identity Providers in support of international research collaboration

AARC2-JRA1.3DGuidelines for AAI interoperability with eIDAS Identity Providers in support of international research collaboration

AARC2-JRA1.3EAAI tools & technologies enabling OIDC for international research collaboration

AARC2-JRA1.4ARoles, responsibilities and security considerations for VOs

AARC2-JRA1.4BGuidelines for combining group membership and role information in multi-AA environments

AARC2-JRA1.4CGuidelines for scalable account (de)provisioning of VO members

AARC2-JRA1.4DGuidelines for implementing, operating and using VO platforms
  • analyse how much has been developed to leverage federated access with other authentication systems used in the R&E communities, in the eGov space and in the commercial sector;

  • research a possible solution to link identities in the contest of higher levels of assurance, attribute providers and guest identities;

  • assess existing technologies to provide SSO for non-Web applications (cloud, storage and so on) and offer recommendations for their usage;

  • develop a risk-based model for existing AAI solutions;

  • propose models for supporting guest identities (NRENs’ in-house solutions vs commercially-offered solutions should be explored);

  • define a blueprint architecture to enable web and non-web SSO capabilities across different infrastructures, integrating attribute providers/group management tools operated by user-communities;

  • provide models for federated authorisation: how to integrate attributes and permissions from diverse communities, making them available at the federation level in a consistent and secure way.

 

Structure of the activity

 

Task IDTaskLeader
Task 0 (JRA1.0)Activity ManagementChristos Kanellopoulos (grnet) (GRNET)
Task 1 (JRA1.1)Requirements GatheringPeter Solagna (EGI.eu)
Task 2 (JRA1.2)Blueprint ArchitecturesMarcus Hardt (KIT)
Task 3 (JRA1.3)Guest IdentitiesJens Jensen - STFC UKRI (STFC)
Task 4 (JRA1.4)Models for implementing Attribute Providers and Token Translation ServicesDavide Vaghetti (GARR)

 

Activity StructureImage Removed



 










                                                                   Structure of the Architecture activity

...