This wiki is obsolete, see the NorduGrid web pages for up to date information.
ARC1/Infosys/Access Use cases
Information access control use cases
Use case 1: Public monitor |
|
Description |
General public wishes to see basic information about a grid infrastructure (or a set of such), see Appendix for some examples. Public members are completely anonymous and do not identify themselves via certificates or other documents or means. No information about person's identity or location is available, not even a reliable IP address. Such individuals include visitors at an exhibition, journalists, policy-makers, school children and in general any creature or tool. |
Participants |
|
Pre-requisits |
|
Devious flows |
|
Use case 2: Information access by infrastructure administrators |
|
Description |
An privileged individual, e.g. an administrator or an operator-on-duty of a grid infrastructure that serves many VOs (such as EGEE or Open Science Grid) wishes to monitor status of the inrastructure. See Appendix for examples of monotored information. While the use case may be trivially addressed by making the administrator the member of every VO, this may not always be possible, as one can imagine mutually exclusive VO membership policies, or the procedure of obtaining the VO membership may be too time-consuming for practical purposes. This document does not intend to make any implementation suggestions. |
Participants |
|
Pre-requisits |
|
Devious flows |
|
Use case 3: Information access by VO members |
|
Description |
A VO member wishes to access information about resources that serve the respective VO; see some examples in the Appendix. A typical purpose is to discover resources and services that authorise the given VO members, and assess their status and capacity. If the VO supports roles and/or groups, the access pattern and amount of accessible information may depend on or be limited to the role or group affiliation of the individual in the VO. Roles and group membership in general are changing dynamically. Every VO defines which information should be visible to different roles and groups and to the outsiders. |
Participants |
|
Pre-requisits |
|
Devious flows |
|
Use case 4: Information access by peers |
|
Description |
A grid user wishes to share information about his/her activities and/or resource usage with a colleague or a number of other individuals, not constituting an established VO. Every participant is identified by their personal credentials, such as e.g. proxy certificates. A user may chose to share all the information available to him/herself with the selected peers, or a subset of this information, see some examples in the Appendix. In case the peers do not belong to the same VO as the user, they will not be able to see VO-specific information, such as e.g. the ist of VO resources or users. The case is similar to Use case 3 and can be regarded as a sub-case of it. While addressing this use case may imply addressing all the Use cases ##1-6, the reverse is not true. Moreover, applying the solution of this use case to e.g. Use case #3 may turn out to be suboptimal, especially for the very large VOs. |
Participants |
|
Pre-requisits |
|
Devious flows |
|
Use case 5: Personal user information access |
|
Description | A user accesses complete set of information about resources available to him/her and grid tasks that are owned by him/her. This is the most basic and most common use case. A typical purpose is to discover resources and services that authorise the given individual, and assess their status and capacity. |
Participants |
|
Pre-requisits | Resources and services advertise the necessary information |
Devious flows |
|
Use case 6: System administrator information access |
|
Description | System administrator wishes to access remotely (via standard grid monitoring tools) a complete set of information about the system he/she is in charge of. See the Appendix for some indicative examples. The use case is similar to the Use case 2 and can be regarded as a sub-case of it. |
Participants |
|
Pre-requisits |
|
Devious flows |
|
Use case 7: Locate ISISes available for registration |
|
Description | A privileged user, typically a system administrator, wants to discover ISISes to which he/she can register his system. For this, he/she needs a complete set of information pertaining to registration policies about all the available ISISes, such as for example those listed in the Appendix. At that point, the admnistrator is not expected to be a member of any VO, but is expected to be in possession of valid grid credentials. Alternatively, an ALIS service may attempt an automated ISIS discovery and matchmaking, without human assistance. In this case, the service should present the valid grid credentials, too. |
Participants |
|
Pre-requisits |
|
Devious flows |
|
Use case 8: Authorisation of ALIS-to-ISIS registration and de-registration |
|
Description |
An administrator wishes to register his/her service (ALIS) to a suitable ISIS (e.g. selected as described in the Use case 7). A reverse operation (forced de-registration) can also be foreseen. ISIS then choses whether to grant the registration request or no, based on the local policies and credentials presented by ALIS. The human administrator is not expected to present any personal credentials or to interact with grid security systems in any manner, and thus remains anonymous. In case ISIS policies require presence of personal credentials of ALIS administrators, there must be a way to associate an individual with a set of resources, on behalf of which he/she can operate (a "reverse proxy"?) In case ISIS is not a standalone service, but a part of a "cloud", the policies of ISISes forming such a "cloud" are expected to be synchronised. In case Virtual Otganizations are defined as consisting of not just humans, but also of devices and services, authorisation process can make use of the ALIS VO-affiliation. In this case, there must be a way to validate that ALIS belongs to a VO. |
Participants |
|
Pre-requisits |
|
Devious flows |
|
Use case 9: Inter-ISIS information synchronisation inside the "cloud" |
|
Description | The use case assumes existence of a "cloud" of ISISes. Since different ALIS instances may register to different (but not all) ISISes in the "cloud", there must be a procedure for inter-ISIS information synchronisation inside the "cloud".
This synchronisation can be "anonymous" w.r.t. credentials of the registered ALISes, if the "perimeter" access control rules are synchronised between all the ISISes. In general, different ISISes may chose to exercise different registration policies, and only a subset of the registered ALISes may turn out to satisfy the common policy and get their registration entries propagated to all the ISISes in the "cloud". |
Participants | ISISes constituting a "cloud" |
Pre-requisits |
|
Devious flows |
|
Appendix: Examples of service/resource description attributes
Description of a grid infrastructure
Possible examples of anonymously available public information:
- Geographical location of resources and services
- Nature of each resource (storage, computer, database etc)
- Total capacity of each resource
- Current occupancy of each resource
- Lists of served VOs
- Project affiliations
- Administrative resource ownership
- etc
Examples of information available for authorised infrastructure operators:
- The list of the infrastructure services and their nature, such as:
- computational resources
- storage facilities
- VOs and associated services
- data indexing services
- logging/accounting services
- information indexing services
- etc
- Status of each service, such as:
- Up
- Down
- Scheduled maintenance
- Unknown
- Total capacity of each resource, when relevant
- Current load of each resource, depending on its nature, e.g.:
- nr of running jobs
- percentage of used storage
- nr of VO members
- etc
- etc
VO-specific information
Examples of information accessible by VO members only:
- List of services, including e.g.
- computing resources
- storage
- databases
- etc
- Details of jobs belonging to the fellow VO members, e.g.:
- status
- resource consumption
- etc
- Details of data owned by the VO members, e.g.:
- dataset/file names
- dataset/file size
- dataset/file location
- VO-specific metadata
- etc
- List of other VO members
- etc
User-specific information
Examples of information accessible by explicitly authorized users only:
- Details of jobs belonging to this user, e.g.:
- location
- status
- resource utilization
- etc
- Details of data owned by this user, e.g.:
- logical names
- physical names
- dataset/file size
- dataset/file location
- VO-specific metadata
- etc
- etc
System-specific information
Examples of information accessible by local system administrators only:
- Status of the system and the services
- Load, depending on the nature of the system, such as:
- number of jobs
- storage occupancy
- number of concurrent database accesses
- etc
- List of authorised VOs and users
- Details of the installed software
- etc
ISIS information
Examples of information published by ISIS, accessible by authorised users:
- Authorised VOs
- Authorised domains
- Authorised service types
- Geographical location
- Contact information
- etc