and (optionally) between such attribute and a local-
ID value usable by an application. These phases are
specified into distinct sections: AttributeRepository
and TranslationMap. Both define attribute types
where to find the information needed to the
authorization process. For example in the VOMS
management, the
voms type defines the use of
VOMS extensions for checking rules. Otherwise the
second mapping always gets the information from
pluggable storage module (
AttributeMap) that
stores associations in a memory map and in turn
specifies their behaviour (i.e.
regex value allows
for keys specification as regular expressions).
3.2 Practical Steps for Access Secure
Web Services Implementation
The full process requires the installation and
configuration of the java environment, related
libraries (i.e. cryptographic libraries) and other tools
(i.e. logging services) together with digital
certificates for CAs and hosts involved. Client
interaction with web service requires the installation
of users digital credentials. Both
glite-
security-trustmanager and edg-java-
security provide client and server java libraries to
be used in applications. Trust Manager software
gives configuration files and scripts to modify
standard Tomcat 5 configuration and interact with it
through the secure connection (8443 port) validated
by host credentials. Web services deployment
usually means the availability of the application as a
single Web ARchive (WAR) file: the security
process setup requires the settings of the modules
and libraries and files inclusions before the
automatic packaging made with Ant tools. Java
libraries for server authentication and authorization
should be available in the specific library application
directory as well as the Axis ones. The configuration
of the Authorization Framework requires the setup
of the manager file to specify authorization policy
applied, the registration of the Axis Handler with the
service itself in the service deployment descriptor
(
server-config.wsdd) and the definition of
handler parameters (i.e. log4j configuration file,
location of the manager file, default policy, etc.) in a
text file (called
AuthzHandlerConfig.txt)
whose location is specified in the web application
descriptor (
web.xml). Once deployed in the
container, every client java application accesses the
secure web service by using authentication and
authorization libraries.
4 CONCLUSIONS
Strategy for securing web service application to be
shared in grid environment as WAR file, addresses
secure communication and access control.
Implementation of security constraints are realized
by using specific grid software. Trust Manager (by
gLite) provides digital authentication supporting
proxy methods. Authorization Framework (by EDG)
realizes the authorization process required to access
control to web services by means of a message
handler technique to validating messages and an
authorization engine that describing policy in XML
format is compatible with the VOMS system used
for VO level managing. This allows for setting
specific access role for such shared resources based
on VOMS attributes. Despite of software
implementation, the security design is applicable for
every java web services. Moreover the use of XML
technologies allows to increase security by applying
in future development web services security-focused
specifications introduced by WS-Security, XML
signatures or XML encryption standards.
REFERENCES
Foster, I. et al 2001. The Anatomy of the Grid: Enabling
Scalable Virtual Organizations. In Journal
Supercomputer Applications, 15(3).
The Globus Security Infrastructure (GSI) of the Globus
Toolkit. At URL: http://www.globus.org
Public-Key Infrastructure (X.509). At url:
http//www.ietf.org/.
Alfieri, R. et. al, 2005. From gridmap-file to VOMS:
managing authorization in a Grid environment. In
Future Generation Computer System 21 549-558.
Italian National Institute of Nuclear Physics (INFN) grid
infrastructure. At url: http://grid-it.cnaf.infn.it).
LCG middleware (at url: http://lcg.web.cern.ch/LCG/) for
the LHC (Large Hadron Collider) projects
European DataGrid (EDG) project (at url: http://eu-
datagrid.web.cern.ch/eu-datagrid/)
gLite (at url: http://glite.web.cern.ch) software for the
Enabling Grids for E-sciencE (EGEE) project (at url:
URL: http://egee-intranet.web.cern.ch).
DataGrid Software Architecture Models, 2004. At URL:
https://edms.cern.ch/document/439938/1
Pastore, et al., 2004. Enabling Access to astronomical
databases through the grid: a case study. In Proc. of
Astronomical Data Analysis III Conference.
AUTHORIZATION AND ACCESS CONTROL TO SECURE WEB SERVICES IN A GRID INFRASTRUCTURE
267