|
GridWorld/GGF15
October 3-6, 2005
Boston, MA, USA
Community Activity: Leveraging
Site Infrastructute for Multi-Site Grids
Monday, 03-October 11:00a – 7:30p
Von Welch, NCSA
Virtual organizations (VOs) need a variety of information
services to provide their structure. For example, it is typical
for a Grid to have a certificate authority to provide identity information,
an attribute authority to provide information regarding the roles
of their users and a resource directory that provides an enumeration
of the resources available to the VO. When a VO spans a number of
underlying organizations (as opposed to a Grid deployed at a single
campus), the best practice today is for the VO to establish their
own services to enable its day-to-day functioning. Deploying and
operating these services in a security, reliable manner is non-trivial,
especially for small to medium virtual organizations, particularly
when one considers that these services have a number of security
implications in terms of being consulted as part of authorization
decisions by end resources.
However, there have been some steps in the Grid community
to allow for these services to be provided by leveraging and federation
the services already provided by the sites on which the VO is based.
For example, Fermilab provides a Kerberos CA allowing other sites
in a VO to base their Grid authentication on the Kerberos authentication
infrastructure already deployed at Fermilab. And campus infrastructures
are increasingly deploying outward-facing infrastructure such as
Shibboleth, which has several initial efforts focusing on interoperability
with existing Grid technologies (Condor and the Globus Toolkit).
In this workshop we will explore the how VOs spanning
multiple sites can benefit from increased leveraging of the infrastructure
of those sites. We will consider both traditional high-performance
computing sites as well as other types of institutions such as academic
campuses. We will also explore some of the challenges involved in
this model, for example:
• There are no ubiquitous standards for site
authentication, attribute, directory, etc. infrastructure. This
implies that we need translation mechanisms to achieve interoperability.
What translation mechanisms exist today and how well to they work?
• While some information that sites can provide,
such as identifiers for authentication, is generic and can be easily
consumed by a VO, the VO may need to define other strucuture, such
as roles for its users, which is not something sites possess today.
How can a VO define this information, while still using the site
infrastructures to propagate it?
• Many sites have privacy concerns regarding
information about their users. How can sites share information with
VOs while addressing these concerns?
The workshop plans to produce an informational document
capturing the following:
• List of current success stories for leveraging site infrastructure
to form multi-site VOs;
• Enumeration of existing tools, APIs, standards and technologies
for leveraging site infrastructure;
• Current barriers to leveraging of multiple site infrastructures
by VOs.
Agenda:
11:00-11:45 Ken
Klingstein "Overview of Campus IT"
11:45-12:30 Arnie
Miles "Exposing Computational Resources Across Administrative
Domains: Condor Shibboleth Integration"
12:30-2:00 Lunch
2:00-2:30 Jim Basney "Integrating
MyProxy with Site Authentication"
2:30-3:00 Marty
Humphrey "MyProxy integration with Pubcookie"
3:00-3:30 Von
Welch "GridShib: Campus/Grid RBAC Integration"
3:30-4:00 Coffee Break/GridShib Demo
4:00-4:30 David
Chadwick "X.509 Privilege Management Infrastructures for Dynamic
Delegation of Authority between Sites"
4:30-5:00 Rana/Wuerthwein
"Multi-Site VOs and Multi-VO Sites in Open Science Grid"
5:00-5:30 Tom
Barton "Signet and Grouper for Distributed Attribute Administration"
5:30-6:00 Break (Signet/Grouper Demo)
6:00-6:30 Dane Skow
"Use of Kerberos- Issued Certificates at FermiLab"
6:30-7:30 Panel Discussion (all presenters; Von Welch moderator)
7:30 Adjourn
Confirmed Speakers:
• Ken Klingensten (Internet2) – Campus IT
• Von Welch (NCSA) – Shibboleth and Globus
• Jim Basney (NCSA) – MyProxy Integration with local
Authentication
• Tom Barton (U. Chicago)– Signet and Grouper for Distributed
Attribute Management
• Arnie Miles (Georgetown U.) – Shibboleth and Condor
Workshop organizers:
Tom Barton, Jim Basney, Steven Carmody, Ken Klingensten, Frank Siebenlist,
Von Welch.
|