Access Control in Grid Computing Environments

By By Jason Hogg, Program Manager, and Blair Dillaway, Software Architect, Microsoft Corp.

May 7, 2007

Large-scale grid computing environments are complicated, involving many users, data and computational resources, network channels and administrative domains. This complexity makes it hard, if not impossible, to describe all of the entities and relationships required to provide access control using existing approaches which lack formal mechanisms for describing and evaluating security policies. To date, there has not been a simple, flexible language available to navigate these complex security issues associated with distributed computing environments.

Microsoft has recently focused on this problem and developed a solution called the Security Policy Assertion Language (SecPAL). The project — undertaken by the advanced technology incubation group of Microsoft’s Chief Research and Strategy Officer and Microsoft Research Cambridge — resulted in a declarative, logic-based language providing comprehensive support for:

  • Describing  trust relationships both within and across organizational boundaries.
  • Expressing principal identities and attributes capable of being authenticated.
  • Creating  access policies which help describe the desired access to a variety of services and resources.
  • Controlling delegation of rights, allowing one principal to allow another to exercise a subset of their rights in a specific context.
  • Expressing audit policies which can capture critical security decisions and support forensic analysis.

To help demonstrate the unique SecPAL approach and the capabilities above, we have outlined a simple use-case below in which we describe the policies necessary to allow a user from within a virtual organization (called Research Grid VO) to submit grid jobs to a computational cluster in an external organization (called the Center for High-Performance Computing). The scenario is illustrated in Figure 1.

Figure 1
Figure 1: Example multi-organizational scenario 

A fundamental concept within SecPAL is the security assertion, a statement made by a principal that may: define a binding between a principal and an attribute; specify a principal’s permissions to operate on a resource; express a trust or delegation policy; express an authorization policy; revoke a prior assertion; or declare principal identifier alias relationships.

In our example, the Master Scheduler could establish a trust-relationship directly with our end-user Bob. However, this interaction quickly becomes unmanageable for any sizable environment. Rather, the common practice is for CHPC to establish a trust relationship with an authority, such as the Research Grid Security Token Service (STS), responsible for certifying grid users.

Example 1 illustrates such a policy whereby the CHPC administrator expresses that he trusts the VO-ResearchGrid-STS to make assertions about the grid’s users. In this case, he trusts the STS to identify grid users and their rfc822 email names (certifying those are true for up to one year). Here, we use a SecPAL simplified English grammar for readability. The Microsoft implementation also supports serializing such policies as XML for cross-platform interoperability.

CHPCAdmin says VO-ReseachGrid-STS can say %p possesses %a (from %t1 until %t2) where

       %t2 – %t1 <= "366.00:00:00",
       %t1 <= CurrentTime() <= %t2,
       %a matches rfc822Name:”.*@contoso.edu”

Example 1: Policy establishing a trust relationship between CHPC and the Research Grid Virtual Organization

This policy includes variables, another important concept within SecPAL. Variables are substituted for concrete values at policy evaluation time. In this policy, variable “%a” represents an attribute which must match the given rfc822 e-mail name pattern, the %p variable represents any principal, and the variables %t1 and %t2 represent date-time values which are constrained to represent a time-span of no more than 366 days.

The CHPC master scheduler would have a local authorization policy controlling who may use the job management services. This typically will rely on the organizational trust policy because the scheduler service administrator typically won’t be responsible for cross-organizational relationships. Given the above trust policy, the scheduler administrator could write the local authorization policy to restrict access based on the rfc822 names of principal’s requesting use of the job management services. It would only believe such names if they are certified by an authority trusted by the CHPC  administrator. For example, if only users with rfc822 names in the contoso.edu domain are authorized, the policy would look like:

CHPCAdmin says %p can execute service:”http://www.chpc.org/scheduleJob” if

       %p possesses %a
 where
       %a matches rfc822Name:” .*@contoso.edu “

Example 2: Policy restricting access to the job scheduler

For our user Bob to schedule a job, he first needs to obtain an identity token from the Research Grid STS, which contains his e-mail name. This might require he authenticate using a Contoso-supplied authentication credential (such as an X.509 certificate, Kerberos token or SAML token), which is accepted by grid services. The grid token obtained from the STS would contain the assertion:

VO-ReseachGrid-STS says Bob possesses rfc822Name:”[email protected]
        (from “2007-01-01” until “2007-12-31”)

Example 3: SecPAL token used by Bob for authentication

Now Bob can submit a request to initiate a job on the CHPC cluster by sending an authenticated message containing his SecPAL token along with the job information needed by the CHPC master scheduler. The scheduler can then formulate a SecPAL query similar to that shown in Example 4, which would evaluate Bob’s credentials against the CHPC security policies, thus allowing the scheduler to allow Bob’s job to be scheduled.

CHPCAdmin can execute service:”http://www.chpc.org/scheduleJob”?

Example 4: Authorization Query generated by CHPC Scheduler to verify access rights

Bob also can take advantage of SecPAL to formulate a delegation of his rights to access a data file on a server at Birch University, where the job data may reside. For example, the right for the master scheduler to delegate the right to read “jobData” can be expressed as the first policy in Example 5, which Bob can supply with his job request. The scheduler can then delegate that specific access to the job when it’s run as in the second assertions. The file service at Birch University can then use the second assertion in Example 5 to authorize Bob-Job to read the file because it can deduce Bob has authorized the delegation of this right.

Bob says Scheduler can say %p read file://BirchFileShare/jobData (from %t1` tio %t2) if %t2-%t1<5 days Scheduler says Bob-Job read file://BirchFileShare/jobData [from 2007-04- 28 to 2007-05-01]?

Example 5: Simple delegation of a single user access right

This example demonstrates some of the power and flexibility of SecPAL to address important grid security needs in a straightforward manner. Independent assessment and experimentation is now an important next step in SecPAL’s development to ensure it will meet the industry’s needs for a flexible, robust and high-assurance security solution. Professors Martin Humphrey of the University of Virginia and Panos Periorellis of University of Newcastle Upon Tyne (England) have begun investigating the benefits of SecPAL. Initial results indicate SecPAL enables a fine-grained, dynamic and delegation-aware mechanism capable of easily coping across organizations with a wide variety of different security policies, and further enabling increased interoperability in distributed computing environments.

Microsoft is now making its implementation available to other researchers to experiment with the SecPAL approach to addressing grid security requirements. Researchers interested in evaluating SecPAL can go to http://research.microsoft.com/projects/secpal for more project information. The .NET implementation, sample code for a number of common authorization patterns and community site facilitating discussions about the use of SecPAL can be found at www.codeplex.com/secpal. Microsoft hopes to collaborate with grid computing communities to develop a viable and comprehensive security solution for grid computing that promotes continued interoperability.

Subscribe to HPCwire's Weekly Update!

Be the most informed person in the room! Stay ahead of the tech trends with industry updates delivered to you every week!

Intel’s Silicon Brain System a Blueprint for Future AI Computing Architectures

April 24, 2024

Intel is releasing a whole arsenal of AI chips and systems hoping something will stick in the market. Its latest entry is a neuromorphic system called Hala Point. The system includes Intel's research chip called Loihi 2, Read more…

Anders Dam Jensen on HPC Sovereignty, Sustainability, and JU Progress

April 23, 2024

The recent 2024 EuroHPC Summit meeting took place in Antwerp, with attendance substantially up since 2023 to 750 participants. HPCwire asked Intersect360 Research senior analyst Steve Conway, who closely tracks HPC, AI, Read more…

AI Saves the Planet this Earth Day

April 22, 2024

Earth Day was originally conceived as a day of reflection. Our planet’s life-sustaining properties are unlike any other celestial body that we’ve observed, and this day of contemplation is meant to provide all of us Read more…

Intel Announces Hala Point – World’s Largest Neuromorphic System for Sustainable AI

April 22, 2024

As we find ourselves on the brink of a technological revolution, the need for efficient and sustainable computing solutions has never been more critical.  A computer system that can mimic the way humans process and s Read more…

Empowering High-Performance Computing for Artificial Intelligence

April 19, 2024

Artificial intelligence (AI) presents some of the most challenging demands in information technology, especially concerning computing power and data movement. As a result of these challenges, high-performance computing Read more…

Kathy Yelick on Post-Exascale Challenges

April 18, 2024

With the exascale era underway, the HPC community is already turning its attention to zettascale computing, the next of the 1,000-fold performance leaps that have occurred about once a decade. With this in mind, the ISC Read more…

Intel’s Silicon Brain System a Blueprint for Future AI Computing Architectures

April 24, 2024

Intel is releasing a whole arsenal of AI chips and systems hoping something will stick in the market. Its latest entry is a neuromorphic system called Hala Poin Read more…

Anders Dam Jensen on HPC Sovereignty, Sustainability, and JU Progress

April 23, 2024

The recent 2024 EuroHPC Summit meeting took place in Antwerp, with attendance substantially up since 2023 to 750 participants. HPCwire asked Intersect360 Resear Read more…

AI Saves the Planet this Earth Day

April 22, 2024

Earth Day was originally conceived as a day of reflection. Our planet’s life-sustaining properties are unlike any other celestial body that we’ve observed, Read more…

Kathy Yelick on Post-Exascale Challenges

April 18, 2024

With the exascale era underway, the HPC community is already turning its attention to zettascale computing, the next of the 1,000-fold performance leaps that ha Read more…

Software Specialist Horizon Quantum to Build First-of-a-Kind Hardware Testbed

April 18, 2024

Horizon Quantum Computing, a Singapore-based quantum software start-up, announced today it would build its own testbed of quantum computers, starting with use o Read more…

MLCommons Launches New AI Safety Benchmark Initiative

April 16, 2024

MLCommons, organizer of the popular MLPerf benchmarking exercises (training and inference), is starting a new effort to benchmark AI Safety, one of the most pre Read more…

Exciting Updates From Stanford HAI’s Seventh Annual AI Index Report

April 15, 2024

As the AI revolution marches on, it is vital to continually reassess how this technology is reshaping our world. To that end, researchers at Stanford’s Instit Read more…

Intel’s Vision Advantage: Chips Are Available Off-the-Shelf

April 11, 2024

The chip market is facing a crisis: chip development is now concentrated in the hands of the few. A confluence of events this week reminded us how few chips Read more…

Nvidia H100: Are 550,000 GPUs Enough for This Year?

August 17, 2023

The GPU Squeeze continues to place a premium on Nvidia H100 GPUs. In a recent Financial Times article, Nvidia reports that it expects to ship 550,000 of its lat Read more…

Synopsys Eats Ansys: Does HPC Get Indigestion?

February 8, 2024

Recently, it was announced that Synopsys is buying HPC tool developer Ansys. Started in Pittsburgh, Pa., in 1970 as Swanson Analysis Systems, Inc. (SASI) by John Swanson (and eventually renamed), Ansys serves the CAE (Computer Aided Engineering)/multiphysics engineering simulation market. Read more…

Intel’s Server and PC Chip Development Will Blur After 2025

January 15, 2024

Intel's dealing with much more than chip rivals breathing down its neck; it is simultaneously integrating a bevy of new technologies such as chiplets, artificia Read more…

Choosing the Right GPU for LLM Inference and Training

December 11, 2023

Accelerating the training and inference processes of deep learning models is crucial for unleashing their true potential and NVIDIA GPUs have emerged as a game- Read more…

Comparing NVIDIA A100 and NVIDIA L40S: Which GPU is Ideal for AI and Graphics-Intensive Workloads?

October 30, 2023

With long lead times for the NVIDIA H100 and A100 GPUs, many organizations are looking at the new NVIDIA L40S GPU, which it’s a new GPU optimized for AI and g Read more…

Baidu Exits Quantum, Closely Following Alibaba’s Earlier Move

January 5, 2024

Reuters reported this week that Baidu, China’s giant e-commerce and services provider, is exiting the quantum computing development arena. Reuters reported � Read more…

Shutterstock 1179408610

Google Addresses the Mysteries of Its Hypercomputer 

December 28, 2023

When Google launched its Hypercomputer earlier this month (December 2023), the first reaction was, "Say what?" It turns out that the Hypercomputer is Google's t Read more…

AMD MI3000A

How AMD May Get Across the CUDA Moat

October 5, 2023

When discussing GenAI, the term "GPU" almost always enters the conversation and the topic often moves toward performance and access. Interestingly, the word "GPU" is assumed to mean "Nvidia" products. (As an aside, the popular Nvidia hardware used in GenAI are not technically... Read more…

Leading Solution Providers

Contributors

Shutterstock 1606064203

Meta’s Zuckerberg Puts Its AI Future in the Hands of 600,000 GPUs

January 25, 2024

In under two minutes, Meta's CEO, Mark Zuckerberg, laid out the company's AI plans, which included a plan to build an artificial intelligence system with the eq Read more…

China Is All In on a RISC-V Future

January 8, 2024

The state of RISC-V in China was discussed in a recent report released by the Jamestown Foundation, a Washington, D.C.-based think tank. The report, entitled "E Read more…

Shutterstock 1285747942

AMD’s Horsepower-packed MI300X GPU Beats Nvidia’s Upcoming H200

December 7, 2023

AMD and Nvidia are locked in an AI performance battle – much like the gaming GPU performance clash the companies have waged for decades. AMD has claimed it Read more…

Nvidia’s New Blackwell GPU Can Train AI Models with Trillions of Parameters

March 18, 2024

Nvidia's latest and fastest GPU, codenamed Blackwell, is here and will underpin the company's AI plans this year. The chip offers performance improvements from Read more…

Eyes on the Quantum Prize – D-Wave Says its Time is Now

January 30, 2024

Early quantum computing pioneer D-Wave again asserted – that at least for D-Wave – the commercial quantum era has begun. Speaking at its first in-person Ana Read more…

GenAI Having Major Impact on Data Culture, Survey Says

February 21, 2024

While 2023 was the year of GenAI, the adoption rates for GenAI did not match expectations. Most organizations are continuing to invest in GenAI but are yet to Read more…

The GenAI Datacenter Squeeze Is Here

February 1, 2024

The immediate effect of the GenAI GPU Squeeze was to reduce availability, either direct purchase or cloud access, increase cost, and push demand through the roof. A secondary issue has been developing over the last several years. Even though your organization secured several racks... Read more…

Intel’s Xeon General Manager Talks about Server Chips 

January 2, 2024

Intel is talking data-center growth and is done digging graves for its dead enterprise products, including GPUs, storage, and networking products, which fell to Read more…

  • arrow
  • Click Here for More Headlines
  • arrow
HPCwire