Conveners
Implementations of AAI
- Nicolas Liampotis (GRNET)
Description
This session includes contributions focusing on:
- Use cases and experiences from the integration of community AAIs with the EGI federated AAI infrastructure (from the perspective of VREs, scientific gateways, data analytic frameworks, analytics services, and data exploitation platforms);
- EGI and (other) e-infrastructure service providers requirements and experience in integrating their own existing AAI infrastructure with the EGI federated AAI;
- The latest technical advancements of federated AAI solutions, related use cases and technical developments aiming at advancing the EGI federated AAI infrastructure.
Arnout Terpstra
(SURFnet)
06/05/2019, 15:45
The AARC2 Service Activity 1 Pilots (SA1) demonstrated the feasibility of deploying Authentication and Authorisation Infrastructures (AAI) for research communities and e-infrastructures that fit the overarching AAI model defined by the AARC Blueprint Architecture (BPA). To this end, this activity demonstrated through (pre-)production pilots that:
- The AARC BPA and the related policy...
Slavek Licehammer
(CESNET)
06/05/2019, 16:15
Most of the current AAI infrastructures are aligned with AARC Blueprint Architecture model, where the most distinct component is the authentication proxy. Even though the proxy solves most of the issues for registering services and enabling users to access them, there is still a significant group of services with additional requirements on access control.
Using the proxy, services obtain...
Peter Gietz
(DAASI International / DARIAH)
06/05/2019, 16:30
Introduction
The DARIAH research infrastructure offers the DARIAH AAI as one of the core technical services for researchers in arts and humanities. It enables researchers to log in to various DARIAH services, by either using their own campus account or an account registered at the DARIAH homeless IDP. in any case the DARIAH AAI adds information, such as group memberships specific to the...
Ms
Aida Palacio
(IFCA-UC),
Fernando Aguilar
(CSIC)
06/05/2019, 16:45
The EGI Federated Cloud, continuing with the Grid AAI, based its initial authentication and authorization mechanisms on the usage of X.509 certificates and VOMS proxies. Although these technologies have made possible the initial usage and movement into production of the Federated Cloud as an Infrastructure as a Service cloud, it has also been shown to be an obstacle for the integration of...