EUGridPMA 63

Europe/Zurich
2/R-030 (CERN)

2/R-030

CERN

30
Show room on map
Description

Please be aware that an INDIGO IAM Hackathon will be held at CERN the following week https://indico.cern.ch/event/1460011/

Accommodation

  • An economic option is the CERN Hostel, which can be booked via this form
  • There are many hotels in Geneva and near Geneva Airport, all of which are easily accessible via the Tram 

Directions to CERN

On the CERN website you can find directions to CERN.

Public Transport

Transports Publics Genevois (TPG) provide good coverage of the area. If you are staying in a Hotel (not the CERN Hostel) you will be given a complementary travel card. Tram 18 takes you between CERN and the City Centre with a 'Billet Tout Genève validité 60''. Tickets can be purchased from machines at each stop. 

Registration
Participants
Participants
  • Baptiste Grenier
  • Berk Balci
  • Daniel Kouřil
  • David Groep
  • David Kelsey
  • Derek Simmel
  • Eisaku Sakane
  • Ian Collier
  • Jose Carlos Luna Duran
  • Lidija Milosavljevic
  • Maarten Kremers
  • Marcus Hardt
  • Mischa Sallé
  • Nicolas Liampotis
  • Scott Rea
  • Tom Dack
  • +9
Zoom Meeting ID
69932140028
Host
Hannah Short
Useful links
Join via phone
Zoom URL
    • 09:15 09:30
      EUGridPMA+: Welcome, agenda, minutes last meeting, note taker, introductions 15m
      Speaker: David Groep (Nikhef National institute for subatomic physics (NL))
    • 09:30 10:20
      T&I in GEANT 5-2 50m
      Speaker: Mr Maarten Kremers (SURF)
    • 10:20 10:45
      IGTF fabric updates: status of authorities and trust fabric news 25m
      Speakers: Cosmin Nistor, David Groep (Nikhef National institute for subatomic physics (NL))
    • 10:45 11:15
      Coffee 30m
    • 11:15 11:45
      GEANT Trusted Certificate Service Gen 5 30m
      Speaker: David Groep (Nikhef National institute for subatomic physics (NL))
    • 11:45 13:00
      Lunch 1h 15m
    • 13:00 15:00
      Token-based operations - security discussion 2h
      Speakers: David Kelsey (Science and Technology Facilities Council STFC (GB)), Hannah Short (CERN), Maarten Litmaath (CERN), Dr Mischa Sallé (NWO-I Nikhef)
      • Assume that (at least physics) workflows all go through a workflow manager
        • Sven: make sure that direct submission is not possible in that case
      • Having a refresh token on the WFMS is not ideal fpr several reasons
        • Petr: too many token requests to IAM (believe that it cannot handle the throughput) 
        • Luna: only know if IAM is available at the point when you want to refresh (at that point it's too late) 
      • No list of trusted token issuers permitted on the grid. This is done by the experiment publishing which issuers it uses. 
        • What should an issuer need to do to get on this list? Several policies. 
        • Luna: Such a list could also be used for revocation? Revocation of an entire issuer (would require a semi automatic way for software to read the list)
      • Token issuer can effectively block itself by stopping publishing its JWKs
      • Mischa: Suggestion that JWKs be hosted separately to the issuer - benefit to security as otherwise JWKs would be compromised at the same time the issuer compromised
        • Maarten: Brian B has also suggested a CDN
        • Mischa: SciTokens puts them in github
      • There should eventually be 1 token issuer per VO plus probably issuers for WFMS
      • Several solutions proposed for issue of how to do tokens for aynchronous workflows
        • Very long tokens (not ideal for security)
        • Local token issuers for the WFMS 
      • Could you have a future token? No, can't know when a job will run 
      • FTS = 3rd party copy. Flow for writing also requires reading at the end to make sure it worked fine. 
        • Identity of DDM is used 
        • Some difference of opinion on whether an individual user could be blocked inside a DDM or WFMS
      • DavidC: for central suspension we need to be able to tell all token issuers not to issue for a particular user
      • Marcus: one way would to have long lived but revocable access tokens
        • This can be expensive and increase load on the issuer (if the same process) 
      • WFMS issuers should be constrained on audience, scope etc to mitigate risk
      • In WFMS we are talking 200K running jobs. Status sent every few minutes, need a valid access token. 
        • If the compute node is talking back to WFMS every 10 minutes why can't it do a refresh flow at the same time? 
      • Could refresh tokens not be stored in the data base? Perhaps with signing, but this is not commonly done
      • Enrico: shouldn't this be a client credential rather than a refresh token? Possibly the wrong workflow. Client credential could be passed around the infrastructure and used wen required to get an access token. 
      • Whatever gets put onto the grid needs to have a finite lifetime (client credentials current don't)
      • One of the initial aims was to use standard solutions - but perhaps we've done all we can and after a certain point within the infrastructure we will have to do our own thing
      • If we are doing something proprietary, how does that affect downstream parties (e.g. sites or EOSC compute or cloud). If we are non standard we will potentially lose them.
      • It is still not clear exactly what performance would be required of INDIGO IAM (and by when) to avoid experiments doing workarounds
      • We should escalate things to the OIDC Federation where possible to make it part of the standard
      • We have to GUT working group to try and get to a unified OIDC standard, which should help integration
      • Trying to extended the standard may actually help as additional expertise would join
      • What would be out of the standard spec? Spec is very flexible
        • Access token revocation not done at the issuer
      • How is middleware defining who to trust? Manually adding it to their config
      • Anyone creating a token issuer should be aware of what policies it should follow
      • Raise github issue to externalise JWK endpoint in the well-known endpoint? for several reasons: 
        • Don't rely on IAM to be up to validate the tokens
        • Can block an issuer without the input of the issuer
        • However, this does shift the risk to wherever the JWKs are hosted
        • or use RPMs for this? 
      • What performance needed for INDIGO IAM? Perhaps we can make this possible, collaborate with SKA ? Separate low throughput attribute authority from high throughput access token issuer 
      • This is fundamentally a cost benefit analysis, with experiments more likely (in some cases) to trust issuers that they run themselves

       

      Actions

      • DavidG DaveK Hannah (and others?): Write a page of what policies are required for a token issuer and share with TTT working group
      • Petr/Maarten: provide required performance for IAM (potentially for a few models) and a timeframe for Berk/Enrico to analse faesibility 

       

      "Thank god X.509 is still there" - M L 

       

       

    • 15:00 15:30
      Tea 30m
    • 15:30 16:55
      AARC Architecture - token profiles and life times 1h 25m
      Speakers: Marcus Hardt (Kalrsruhe Institute of Technology), Marcus Hardt (KIT), Dr Mischa Sallé (NWO-I Nikhef), Thomas Dack, Mr Tom Dack
    • 18:00 20:00
      Dinner 2h

      Luigia Meyrin (a short walk from CERN or from Hospital de la Tour tram)
      Table booked for 15 name Hannah

    • 09:15 10:15
      Wallet ecosystem and new federation models in AARC TREE 1h

      Wallets and VCs, Gov eID assurance, and new models

      Speaker: Mr Maarten Kremers (SURF)
    • 10:15 10:45
      Coffee 30m
    • 10:45 12:00
      I082 and PDK 1h 15m

      Actions:

      • Hannah: put lightweight community policy onto a webpage and send for comments
    • 12:00 13:00
      Lunch 1h
    • 13:00 14:30
      AARC and federation ISGC planning 1h 30m
    • 14:30 14:45
      Closing 15m