Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Following discussions within the LSC it was decided that the pilot would deploy SATOSA create a SAML proxy between the eduGAIN institutional identity providers and the LSC's service providers. This would allow LSC and Virgo members to use their institutional credentials to access LSC resources directly. Institutional identifies would be mapped to a user's albert.einstein identity via a internal account linking, and LIGO specific information; in particular group and identity information would be used to annotate the account. SATOSA will act as the central SAML Proxy of the project, while pyFF will be used to aggregate SAML metadata from EduGAIN and the LSC, and also provide the discovery service interface.

Components

ComponentDescriptionTechnology
Description
Why did we choose it
Link
SAML Proxy
SATOSA
SAML IdP to SAML SP ProxySATOSAPopular Python based package that includes services for adding attributes from external source
https://github.com/IdentityPython/SATOSA
Metadata aggregation
PyFF
Aggregate and process SAML metadata from multiple sourcesPyFFPopular Python based package that allows you to customise SAML metadata processing and also supports Metadata Query Service
http://pyff.io/
Discovery Service
PyFF
Present list of IdPs to userPyFFPyFF already used to aggregate metadata, and includes a good, theme-able discovery service interface
Attribute Store
LDAP
Source of additional user attributes and group membershipGrouper + LDAPLSC user group membership and extended attributes already managed and stored in Grouper
Account Linking Service
COManage
Link institutional IdP
attributes
identity to LSC user
account

...

identityCOManageCOManage provides workflows for linking accounts and is already used with the GW Astronomy community for collaboration management.

...


Architecture

Image Modified

...

PyFF Discovery Service

Image Removed

Use Cases

Successful Federated Identity Login

StepActionScreenshot
1

Visit SP Website and select Satosa SAML Proxy from the list of IdPs

2Select Home IdP from DS

Image RemovedImage Added

3Login at Institutional IdP

4Access SP

...

StepActionScreenshot
1

Visit SP Website and select Satosa SAML Proxy from the list of IdPs

2Select Home IdP from DS

Image RemovedImage Added

3Login at Institutional IdP

4Account Linking

5Access SP

Results

A Pilot pilot instance has been was deployed and has been registered in the eduGAIN metadata and is undergoing testing.

Further information

underwent extensive testing using a number of existing LSC resources. Within the pilot, account linking between institutional identities and a user LSC identity was performed using a manual administration step.

Limitations


There are two areas where the use of federated identities is limited. Firstly, the the LIGO detectors are situated in remote locations loss of access to the internet are common and it would be impossible for anybody working thereto  connect to their home IdPs. Therefore, people working at or visiting the detectors will need to continue to use their LSC credentials and the local IdP replicas. Secondly, the LSC rely on X509 certificates to access compute clusters and other resources. Most users obtain their certificates from the CILogon service using the ligo-proxy-init command line tool which uses SAML ECP to obtain a certificate without a web browser. Although some institutional IdPs support ECP this is severely limited, and not expected to improve. Therefore, for users who require this they will still require a dedicated password to access this resource via the LIGO IdP.

Sustainability


Going forward an instance of COManage will be deployed to handle the account linking workflow, and as well as more aspects of user management. To move the pilot into production the SATOSA and PyFF services must be deployed in a fault tolerant manner. The LSC has recently deployed a fault tolerant instance of the main Identity Provider, and we will be take a similar approach to deploy thisFollowing the completion of this pilot the service will be adopted into the LSC Identity and Access Management core services. A fault tolerant service will be maintained in the cloud.