Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Each member of the LSC is assigned an albert.einstein identity and they manage this account and their credentials via the my.ligo.org application. This pilot aims to investigate the infrastructure and organisational changes required to support the increased use of federated institutional entities alongside existing internal credentials. In particular it will identify technological components and deploy a pilot service to be used for evaluation. It will also work to understand the current limitations of federated identities as applied to the LSC, and recommend alternative approaches where relevant.


SAML proxies are increasingly being used to easily connect all of resources within a collaboration 's resources into the eduGAIN network federation and this would demonstrate it's success application for a large, established collaboration.

...

The goal of this AARC project is design and deploy a pilot SAML proxy instance so that LSC users can make better use of would allow users to use their Institutional Identities in a federated manner. SAML proxies are increasingly being used to easily connect all of a collaboration's resources into the eduGAIN network and this would demonstrate it's success for a large, established collaboration. It  It will also investigate the limitations of a SAML proxy and recommend alternatives alternative solutions to these issues. Finally, we will look at other areas where the SAML proxy can be utilised.

Description

Following discussions within the LSC it was decided that the pilot will would deploy SATOSA and pyFF to create a SAML proxy between the eduGAIN institutional identity providers and the LSC's service providers. This would allow LSC and Virgo members to use their institutional credentials to access LSC resources directly. Institutional identies identifies would be mapped to a user's albert.einstein identity via an a internal account linking, and LIGO specific information; in particular group and identity information would be used to annotate the account. SATOSA will act as the central SAML Proxy of the project, while pyFF will be used to aggregate SAML metadata from Edugain EduGAIN and the LSC, and also provide the discovery service interface.

Components

  1. Metadata Aggregator: PyFF
  2. Discovery Service: PyFF
  3. Account Linking: COManage

Image Removed

Architecture

SATOSA

ComponentDescriptionTechnologyWhy did we choose it
SAML ProxySAML IdP to SAML SP ProxySATOSAPopular Python based package that includes services for adding attributes from external source
Metadata aggregationAggregate and process SAML metadata from multiple sourcesPyFFPopular Python based package that allows you to customise SAML metadata processing and also supports Metadata Query Service
Discovery ServicePresent list of IdPs to userPyFFPyFF already used to aggregate metadata, and includes a good, theme-able discovery service interface
Attribute StoreSource of additional user attributes and group membershipGrouper + LDAPLSC user group membership and extended attributes already managed and stored in Grouper
Account Linking ServiceLink institutional IdP identity to LSC user identityCOManageCOManage provides workflows for linking accounts and is already used with the GW Astronomy community for collaboration management.


Architecture

Image Added

...

PyFF Discovery Service

Image Removed

Use Cases

Successful Federated Identity Login

StepActionScreenshot
1

Visit SP Website and select Satosa SAML Proxy from the list of IdPs

2Select Home IdP from DS

Image RemovedImage Added

3Login at Institutional IdP

4Access SP

...

StepActionScreenshot
1

Visit SP Website and select Satosa SAML Proxy from the list of IdPs

2Select Home IdP from DS

Image RemovedImage Added

3Login at Institutional IdP

4Account Linking

5Access SP

Results

A Pilot pilot instance has been was deployed and has been registered in the eduGAIN metadata and is undergoing testing.

Further information

underwent extensive testing using a number of existing LSC resources. Within the pilot, account linking between institutional identities and a user LSC identity was performed using a manual administration step.

Limitations


There are two areas where the use of federated identities is limited. Firstly, the the LIGO detectors are situated in remote locations loss of access to the internet are common and it would be impossible for anybody working thereto  connect to their home IdPs. Therefore, people working at or visiting the detectors will need to continue to use their LSC credentials and the local IdP replicas. Secondly, the LSC rely on X509 certificates to access compute clusters and other resources. Most users obtain their certificates from the CILogon service using the ligo-proxy-init command line tool which uses SAML ECP to obtain a certificate without a web browser. Although some institutional IdPs support ECP this is severely limited, and not expected to improve. Therefore, for users who require this they will still require a dedicated password to access this resource via the LIGO IdP.

Sustainability


Going forward an instance of COManage will be deployed to handle the account linking workflow, and as well as more aspects of user management. To move the pilot into production the SATOSA and PyFF services must be deployed in a fault tolerant manner. The LSC has recently deployed a fault tolerant instance of the main Identity Provider, and we will be take a similar approach to deploy thisFollowing the completion of this pilot the service will be adopted into the LSC Identity and Access Management core services. A fault tolerant service will be maintained in the cloud.