Community Presentations

GridWorld/GGF15
October 3-6, 2005
Boston, MA, USA

Community Activity: Leveraging Site Infrastructute for Multi-Site Grids
Monday, 03-October 11:00a – 7:30p
Von Welch, NCSA

Virtual organizations (VOs) need a variety of information services to provide their structure. For example, it is typical for a Grid to have a certificate authority to provide identity information, an attribute authority to provide information regarding the roles of their users and a resource directory that provides an enumeration of the resources available to the VO. When a VO spans a number of underlying organizations (as opposed to a Grid deployed at a single campus), the best practice today is for the VO to establish their own services to enable its day-to-day functioning. Deploying and operating these services in a security, reliable manner is non-trivial, especially for small to medium virtual organizations, particularly when one considers that these services have a number of security implications in terms of being consulted as part of authorization decisions by end resources.

However, there have been some steps in the Grid community to allow for these services to be provided by leveraging and federation the services already provided by the sites on which the VO is based. For example, Fermilab provides a Kerberos CA allowing other sites in a VO to base their Grid authentication on the Kerberos authentication infrastructure already deployed at Fermilab. And campus infrastructures are increasingly deploying outward-facing infrastructure such as Shibboleth, which has several initial efforts focusing on interoperability with existing Grid technologies (Condor and the Globus Toolkit).

In this workshop we will explore the how VOs spanning multiple sites can benefit from increased leveraging of the infrastructure of those sites. We will consider both traditional high-performance computing sites as well as other types of institutions such as academic campuses. We will also explore some of the challenges involved in this model, for example:

• There are no ubiquitous standards for site authentication, attribute, directory, etc. infrastructure. This implies that we need translation mechanisms to achieve interoperability. What translation mechanisms exist today and how well to they work?

• While some information that sites can provide, such as identifiers for authentication, is generic and can be easily consumed by a VO, the VO may need to define other strucuture, such as roles for its users, which is not something sites possess today. How can a VO define this information, while still using the site infrastructures to propagate it?

• Many sites have privacy concerns regarding information about their users. How can sites share information with VOs while addressing these concerns?

The workshop plans to produce an informational document capturing the following:
• List of current success stories for leveraging site infrastructure to form multi-site VOs;
• Enumeration of existing tools, APIs, standards and technologies for leveraging site infrastructure;
• Current barriers to leveraging of multiple site infrastructures by VOs.

Agenda:

11:00-11:45 Ken Klingstein "Overview of Campus IT"

11:45-12:30 Arnie Miles "Exposing Computational Resources Across Administrative Domains: Condor Shibboleth Integration"

12:30-2:00 Lunch

2:00-2:30 Jim Basney "Integrating MyProxy with Site Authentication"

2:30-3:00 Marty Humphrey "MyProxy integration with Pubcookie"

3:00-3:30 Von Welch "GridShib: Campus/Grid RBAC Integration"

3:30-4:00 Coffee Break/GridShib Demo

4:00-4:30 David Chadwick "X.509 Privilege Management Infrastructures for Dynamic Delegation of Authority between Sites"

4:30-5:00 Rana/Wuerthwein "Multi-Site VOs and Multi-VO Sites in Open Science Grid"

5:00-5:30 Tom Barton "Signet and Grouper for Distributed Attribute Administration"

5:30-6:00 Break (Signet/Grouper Demo)

6:00-6:30 Dane Skow "Use of Kerberos- Issued Certificates at FermiLab"

6:30-7:30 Panel Discussion (all presenters; Von Welch moderator)

7:30 Adjourn

Confirmed Speakers:
• Ken Klingensten (Internet2) – Campus IT
• Von Welch (NCSA) – Shibboleth and Globus
• Jim Basney (NCSA) – MyProxy Integration with local Authentication
• Tom Barton (U. Chicago)– Signet and Grouper for Distributed Attribute Management
• Arnie Miles (Georgetown U.) – Shibboleth and Condor

Workshop organizers:
Tom Barton, Jim Basney, Steven Carmody, Ken Klingensten, Frank Siebenlist, Von Welch.

 

 

 

 


 

 

 

Contact Webmaster.
OGFSM, Open GridForumSM, Grid ForumSM, and the OGF Logo are trademarks of OGF