Tip | ||
---|---|---|
| ||
The first version of the draft AARC Blueprint Architecture has been released. The working document of the ‘AARC Blueprint Architecture’ is available on Google Docs and we would like to encourage the technical architects and implementers in the various research and e-infrastructure and scientific communities to review it, and provide their feedback either in the document itself or via the public AARC Connect mailing list. |
JRA1: Architectures for an integrated and interoperable AAI
Work Package Leader: GRNET, Christos Kanellopoulos (grnet)
The high-level objectives of this activity are:
analyse how much has been developed to leverage federated access with other authentication systems used in the R&E communities, in the eGov space and in the commercial sector;
research a possible solution to link identities in the contest of higher levels of assurance, attribute providers and guest identities;
assess existing technologies to provide SSO for non-Web applications (cloud, storage and so on) and offer recommendations for their usage;
develop a risk-based model for existing AAI solutions;
propose models for supporting guest identities (NRENs’ in-house solutions vs commercially-offered solutions should be explored);
define a blueprint architecture to enable web and non-web SSO capabilities across different infrastructures, integrating attribute providers/group management tools operated by user-communities;
provide models for federated authorisation: how to integrate attributes and permissions from diverse communities, making them available at the federation level in a consistent and secure way.
The activity is structured in four tasks:
Task ID | Task | Leader |
---|---|---|
Task 1 (JRA1.1) | Requirements Gathering | Peter Solagna (EGI.eu) |
Task 2 (JRA1.2) | Blueprint Architectures | Marcus Hardt (KIT) |
Task 3 (JRA1.3) | Guest Identities | Jens Jensen - STFC UKRI (STFC) |
Task 4 (JRA1.4) | Models for implementing Attribute Providers and Token Translation Services | Davide Vaghetti (GARR) |
JRA1.1 Requirements gathering
Task Leader: EGI.eu, Peter Solagna
Goals of the task:
- Describe the authentication and authorisation technologies used by the different e-Infrastructures, including research communities, libraries and educational service providers and identify the existing gaps that prevent their interoperability. Explore how the current e-Infrastructures can support broader cross-domain collaboration, for instance when dealing with commercial services and or with e-Government initiatives.
- Prioritise the work to undertake on the basis of the community requirements, results of pilots carried out by the GN3plus project and FIM4R group and on the technical analysis of existing pilots to support groups, token translation and SSO for non-web.
- Explore how the current e-Infrastructures can support broader cross-domain collaboration, for instance when dealing with commercial services and or with e-Government initiatives.
- Gather information on the penetration of AAIs and eduGAIN in R&E sector, libraries and e-Government.
- Gather information on the interoperation experiments between R&E federations (including eduGAIN) and eGOV in the different European countries. Determine the maturity level and portability of the solutions enabling non-Web SSO, which is important when access to computing and storage services in several e-Infrastructures and cloud is considered.
- Document relevant standards bodies and other interoperation activities and their role in supporting AAI
Actions and activities of the task
First action of the task has been to prepare and circulate a questionnaire among the relevant communities (circulated on the 1st of July 2015) to gather requirements both on the technical architecture and the dissemination/training activities.
The questionnaire can be downloaded here: AARC Requirements questionnaire
The first round of requirements will be collected until July 10th 2015
JRA1.2 - Blueprint Archtectures
Task Leader: KIT, Marcus Hardt
First action was to start the discussion about the points raised at the JRA1 presentation in the kickoff.
Please read and comment in the Report from the kickoff meeting.
JRA1.3 - Guest identities
Task Leader: STFC, Jens Jensen - STFC UKRI
Guest identities are about making use of external IdPs. The basic idea is to accept social media logins:
- Assign a suitable Level of Assurance (LoA) to them
- Allow users to build reputation
- Allow reputation to be communicated - e.g. from one community to another
- Investigate a "web of trust" - whether users can vouch for each other, say.
- Within AARC, links to NA3 (policy and LoA for guest identities) and SA1 (piloting guest identities)
JRA1.3
- Accommodating "guest identities" - please find the deliverable-in-progress AARC MJRA1.2 (everyone with the link can comment; if you need write access please request it.)
JRA1.4 - Models for implementing Attribute Providers and Token Translation Services
Task Leader: GARR, Andrea Biancini.
Within this task we will evaluate how Attribute Providers and Token Translation services could be used to extend the current scope of existing identity federations to existing communities of users and projects.
The overall goal of this task is twofold:
...
integrate different AAIs with existing federations (already interfederated in eduGAIN); in this respect the main communities considered will be:
...
NRENs, with SSO for web applications
...
libraries, using IP-based access
...
PRACE and EGI, using x509 certs
| |
This is the wiki space of the Working Group in the Architecture Area of the AARC Community and AEGIS. Participation in the working group is open to individuals who are interested in following and contributing to the evolution of the AARC Blueprint Architecture and its supporting Guideline documents. Discussions about the ongoing work of the WG take place in the aarc-architecture mailing list. The group holds a weekly call every other Monday at 14:00 CE(ST) |
Section | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Active Draft Document
Guidelines
ID | Title | Summary | Links | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
AARC-G052 | OAuth 2.0 Proxied Token Introspection | This specification extends the OAuth 2.0 Token Introspection (RFC7662) method to allow conveying meta-information about a token from an Authorization Server (AS) to the protected resource even when there is no direct trust relationship between the protected resource and the token issuer. The method defined in this specification, termed "proxied" token introspection, requires access tokens to be presented in JWT format containing the iss claim for identifying the issuer of the token. Proxied token introspection assumes that the AS which is trusted by the protected resource has established a trust relationship with the AS which has issued the token that needs to be validated. | Google doc |
| ||||||
AARC-G056 | AARC profile for expressing community identity attributes | This document defines a profile for expressing the attributes of a researcher’s digital identity. The profile contains a common list of attributes and definitions based on existing standards and best practises in research & education. The attributes include identifiers, profile information, and community attributes such as group membership and role information. | Google doc |
| ||||||
AARC-I058 | Methods for establishing trust between OAuth 2.0 Authorization Servers | This document explores different approaches for establishing trust among entities such as OAuth 2.0 Authorization Servers (AS) and Resource Servers (RS) residing in distinct domains. These interactions are facilitated through trusted third parties referred to as Trust Anchors, which are entities issuing authoritative statements about entities that participate in an identity federation. | Google doc |
| ||||||
AARC-G073 | Guidelines for refreshing tokens between proxies | This document explores the refresh token flow in a scenario where client applications interact with resource servers through interconnected OpenID Providers (OIDC). Specifically, it focuses on the case where an AARC-compliant Infrastructure Proxy [AARC-G045] acts as an intermediary between the client and a Community AAI. To address challenges related to refresh token handling in this configuration, the document specifies a secure refresh token flow that leverages introspection to ensure the validity of refresh tokens before issuing new access tokens. The document describes the flows for both obtaining and using refresh tokens. | Google doc |
| ||||||
AARC-G080 | AARC Blueprint Architecture 2025 | The AARC Blueprint Architecture (BPA) provides a set of building blocks for software architects and technical decision makers who are designing and implementing access management solutions for international research collaborations. This document describes the evolution of the AARC Blueprint Architecture, starting with a summary of the changes since AARC-BPA-2019. | Google doc (Initial Revision) |
| ||||||
AARC-G081 | Recommendations for Token Lifetimes | This document provides an overview over various types of tokens, or more generally, about assertions used to identify and authorise users. We analyse the different properties of tokens and categorise available authorisation patterns to give recommendations about the life times of tokens associated with specific properties and authorisation levels. The document is between policy and architecture working group | Google doc |
|
Upcoming / Inactive Drafts
Guidelines
ID | Title | Summary | Links | Status | ||||
---|---|---|---|---|---|---|---|---|
AARC-G058 | Establishing trust between OAuth 2.0 Authorization Servers | Specification for establishing trust among OAuth Proxies (based on AARC-I058) |
| |||||
AARC-G079 | AARC Community-based Access Entity Category | This document provides guidelines for using the Community-based Access Entity Category to support the release of attributes to Service Providers that have a proven need to receive a set of community-managed information about their users in order to effectively provide their service to the users. | Google doc |
| ||||
AARC-G059 | Guidelines for expressing affiliation information | The goal of this document is to define how affiliation information should be expressed when transported across AARC BPA-compliant AAIs. Two different types of affiliation have been identified, namely Affiliation within the Home Organisation, such as a university, research institution or private company; and Affiliation within the Community, such as cross-organisation collaborations. Both affiliation types should be communicated to the service providers that rely on affiliation information in order to control access to resources. Will supersede AARC-G025 | Google doc |
Waiting for feedback from voPerson schema (see voPerson issue#40) | ||||
AARC-G060 | A framework for IdP hinting | Google doc |
| |||||
AARC-G064 | A specification for hinting which IdPs to show in discovery | Google doc |
| |||||
AARC-G053 | Specification for expressing user authentication via REFEDS R&S and/or Sirtfi compliant authentication providers | Google doc |
| |||||
AARC-G054 | Specification for expressing authenticating authorities | Google doc |
| |||||
AARC-I028 (was AARC2-JRA1.2B) | Best practices for integrating OpenID Connect / OAuth2 based end services | Capture what OIDC-based services need to understand, which schemes to follow in order to benefit from federated identities, that currently are exclusively in the SAML world. This will probably include pointers to documents that specify mappings between SAML and OIDC expression of attributes, entitlements or claims. OIDC/OAuth2 client registration is covered in AARC-G032 |
| |||||
AARC-G038 AARC2-JRA1.4C | Best practises for scalable account (de)provisioning of VO members | Best practises for scalable account provisioning, management, and deprovisioning, particularly from the perspective of the standard protocols used to manage accounts (such as LDAP, VOOT, SCIM, etc.) | doc |
| ||||
AARC-G032 (was AARC2-JRA1.3B) | Guidelines for registering OIDC Relying Parties in AAIs for international research collaboration | This document describes different ways to accomplish an OpenID Connect client registration, specifically providing guidance for International Research Collaborations that need to implement one of these systems. |
| |||||
AARC-G036 (was AARC2-JRA1.4A) | Roles, responsibilities and security considerations for VOs | DROPPED. Most of the content is now in DJRA1.3; it was proposed to gather the remaining information into a document describing how roles and the requirements on roles be managed (e.g. "there must always be a security contact"); however, we have decided that we will not have enough time to do justice to the topic. Virtual Organisations (VOs) have several roles and responsibilities; some are identified as community responsibilities, and others arise from relations to infrastructures (e.g. security contact, technical contact). Can we minimise the number of places that need this information, in order to improve maintainability and scalability? |
| |||||
AARC-G037 (was AARC2-JRA1.4B) | Guidelines for combining group membership and role information in multi-AA environments | When combining information from several AAs, one needs to consider the different semantics, different levels of assurance, and different purposes of the AAs and their attributes. |
| |||||
AARC-G030 (AARC2-JRA1.2D) | Requirements and Implementations for Authentication Freshness (was: Guidelines for step-up authentication via forced reauthentication) | This document describes mechanisms for forcing a user to perform an additional login (reauthentication) in order to ensure that the user who is accessing a protected resource is the same person who initially authenticated at the start of the session. Forced reauthentication can therefore provide additional protection for sensitive resources. |
| |||||
AARC2-JRA1.1B | Guidelines for the discovery of authoritative attribute providers across different operational domains |
| ||||||
AARC2-JRA1.1C | Guidelines for handling user registration and user consent for releasing attributes across different operational domains |
| ||||||
AARC2-JRA1.1D | Guidelines for federated access to non-web services across different operational domains |
| ||||||
AARC2-JRA1.3C | Guidelines for AAI interoperability with non-R&E Identity Providers in support of international research collaboration |
| ||||||
AARC2-JRA1.3D | Guidelines for AAI interoperability with eIDAS Identity Providers in support of international research collaboration |
| ||||||
AARC2-JRA1.3E | AAI tools & technologies enabling OIDC for international research collaboration |
| ||||||
AARC2-JRA1.4D | Guidelines for implementing, operating and using VO platforms | it was suggested this incorporate anything from JRA1.4A not included in DJRA1.3 plus guidance on evaluating and selecting a proxy platform. However, as we have too many documents already and not enough time to do them justice, JRA1 have decided to drop this document. However, EOSC Hub is currently (as of March 2019) putting together an evaluation form. It was suggested at the F2F in April 2019 that this document be resurrected? |
|
...
provide a model for implementing pilots:
on Attribute Authorities, and
on Token Translation Services.
Documents and deliverables:
The project activities, so far, produced the following relevant documentation:
...
Flows for AAs [JRA1.4-1 Information flows for AAs]
...