| Notes EUGridPMA, May 2018 Host: KIT Attendees: David*, Uros*, Ian*, Hannah* (note taker), Walter*, Melanie*, Ingrid*, Scott*, Cosmin, Eric, Jan, Lidija, Miroslav, Valentin*, Reimer*, Emir*, Feyza, Nuno, Mischa, Jouke, JK, Marc*, Nabil*, Pawel*, Marcus**in the room
 Thank Yous: Local hosts, in particular Ingridand Hannah Short for taking these notes
 Notes Wednesday 23rd  
	Announcements
	
		Please upload slides to https://indico.nikhef.nl/event/1198/Volunteers wanted for hosting the autumn meetingDinner 19:00 Gasthaus Gutenberg, see logistics and maps at https://www.eugridpma.org/meetings/2018-05/Thursday/Friday, catch the 08:30 shuttle to KIT North CampusKatrin visit rescheduled to start at 13:00 on ThursdayScott volunteered for January EUGridPMA in Abu DhabiNew CPS for CESNET, added to the agenda for Friday morningAPGridPMA Update (Eric from Academia Sinica, chair of APGridPMA)
	
		New chair (Eric Yen) and vice chair (Eisaku Sakane) elected last October in Japan2 meetings per year, often co-hosted, each CA must give a self auditing report per yearConnection with Australia lost for a long time. Next meeting in NZ (August) should clarify status.Regional catch-all CAs serving many countries~50% CAs are not yet supporting IPv6In October meeting
		
			Federated Identity Management presented following user demand for friendly workflowsRemote identity vetting, propose to use existing IGTF resources(see slides for full list)Supporting AAI, helping others to join eduroam and eduGAIN. Webinars organisedRPs from AU and NZ to be invited, want to extend experiences with user engagement beyond physics/astro to bio-sciences etcIdentity & Access Management WG hosting series of meetings to boost participation and engagementLittle engagement from present EUGridPMA attendants to attend August meeting  in NZIGTF All-hands, possibly to be hosted at ISGC in Taipei in March 2019 - all encouraged to attendSelf Audit Status (Cosmin)
	
		GermanGrid (presentation on Friday) there is an open question r.e. private key storage for new CPSRDIG, no response via email, should incorporate recent changes. @DavidG will follow up AustrianGrid, likely to be gone within a year and replaced with TCS. Terms of retiring CA defined in CP/CPS. Maintainer is retired and voluntary.MD (Moldova) CA Update
	
		Storage updated, restricted access to secure roomUser certificate request process explained. Host certificates are requested by user that have user certificates and are host admin (known through tight-knit community). Certificate revocation upon user request, expiration or violation. Old certificates must be revoked before new ones can be issued - this is why the CRL is quite long.MD-Grid CA based on old CP/CPSFollowing RFC 3647New CA = MD-Grid-CA-T and has 11 month overlap with old CA. Not yet registered in TACARWebsite contains old and new informationIssuing digicert certificates. Joined TCS several years agoQ, is SHA1 ok? OK for root certificates. MD CA used SHA256. SHA1 certificate on webpage is just a fingerprint.OIDC Federation (Mischa, David, Jouke)
	
		Introductory slides for those not familiar with OIDCResearch communities would like to use OIDC (user and developer friendly) but standard does not easily scale to multiple Identity Providers, so current focus on dynamic OIDC federations For research communities, we need to trust both the OPs (OIDC Providers, roughly Identity Providers) and the RPs (standard OIDC relies on RPs trusting OPs but OPs knowing nothing much about RPs)Multiple federation aspected from SAML and x509 can be reused; policies, assurance profiles, token translationDiscovery, registration and trust are decoupledTrusted 3rd parties needed at scale, a heirarchy of trust relationshipsMetadata is sent with registration requests and [the key material therein] must be short lived [could be one or a few days] - this may have operational impactSome test scripts are available on github. Google is developing OIDC libraries in multiple languages and will (hopefully) include OIDC Fed requirementsOngoing work in the GEANT Project to address infinitely large scenariosAt last IGTF meeting heard from stakeholders looking for OIDC FederationMonitoring work in other groups
		
			Still seems early stagesTrainig material should be added to a website at some stageMobile client registration discussion started, some concern about users having full control over devices so may be out of scopeSWAMID have a fairly complete spec., based on URLsWork in REFEDS [oidcre group] for new claims in OIDCWLCG Authorisation WG should be trying to keep the bigger picture in mindRequest is that people with RPs and OPs join the pilot - WLCG might make sense (happy to at least explore the idea) and possibly WATTSQ: Where are the policies for this? Aim is to make existing policies technology agnostic. Some templates should be created. May be enough to use e.g. CoCo & Sirtfi, however we need policies in addition to profiles. Should come up with minimum necessary policy.Some pertinent links:SWAMID profile for OIDCfed
 https://github.com/OpenIDC/fedoidc/blob/master/doc/profile/swamid.rst
 PoC for OIDCfed based on an 'out-of-band' profile. Roland and Davide
 have been debugging the setup today but I think it should work now
 https://github.com/rohe/oidc-oob-federation
 There should be a new website coming soon at oidcfed.org and oidcfed.net
 Basic OIDC primers / talks, in particular the second has nice clear
 introductory material under 'presentations':
 - Roland's material:
 https://github.com/rohe/ojou_course
 - Davide and Andrea (Biancini), nice intro:
 https://github.com/ConsortiumGARR/oidcprimer
TAGPMA Issues & Developments
	
		Last Face-to-face at Internet2 Global SummitLatin American meetings have been less successful, possibly co-locate with RedCLARAInterest in OIDC FedOSG CA Retirement, many DoE sites do not know where to get their host certificates
		
			Funding crash means that OSG CA RA will cease operations on May 31stUser certificates have workaroundsHost certificates are more problematic. e.g. Fermilab 1300 host certificates needed, BNL get 100, many Tier 2/3 sitesDoE labs cannot get certifcates from InCommon CA, possibly political problems. It is also quite expensive ($175 per cert) A free alternative is LetsEncrypt. Criticism of some security practices - e.g. phishing.LetsEncrypts (LE)
		
			Offering CA in CABForum offering Domain Validation90 day host certificates, auto renewDNS records to identify host ownersQuestion to IGTF of what would need to change to allow LE host certsPosition paper available from OSG security officerCurrent situation
		
			Nobody willing to host the OSG CA, moved out of IU for strategic reasonsUsers redirected to CERN or CiLogonServices redirected to Incommon IGTF CA Digicert may be able to provide a fee-per-certificate serviceOSG thinks LE could be used in an equivalent way to IOTA & Community ID. OSG members have a site registration step that could be queriedSome work already done to identify risks (but from the OSG perspective so biased)BREAKING NEWS, DoE labs can now get certificates from InCommon CA at a feeShould we be starting a conversation about how to allow IGTF accredited host certs? Comments
		
			DV validated certs offered for free (work in progress for higher LoA certs) - need to be aware that the current assumptions may changeWould need LE to participate in community and current model is fee-basedCurrently backed by Identris Do we require LE to come to IGTF? Is that realistic? Is DV enough? Too much trust placed in internet & DNS etc (only checked at point of issue)If motivation is purely financial, there may be other options within IGTFThe RA aspect is possibly more complicated and costly than the CA, this could have been underestimatedIf this is only a small use case, there is less of a case for introducting low/no assurance CAs to IGTFOSG Guideance at https://opensciencegrid.org/docs/security/host-certs/There's a TAGPMA WG and EUGridPMA participation is welcome with a small fee ;) Notes Thursday 24th 
	Introduction to KIT from Andreas 
	
		Helmholtz does long term research and large scale computing facilities KIT is a merger of Technical Uni. of Karlsruhe and this Nuclear Research facilityPolicy Starter Pack
	
		Acceptable Assurance Policy should be more guiding, leverage AARC guidelines on profiles and help readers to pick the right oneWe should test the pack on several communities to understand relevant questions and blocking points (e.g. HDF, EOSC)Need to add clarity on involving management from the beginningEOSC-Hub will be sending a survey to their participating communities to understand AAI requirements, this could be useful input. Expect 15-20 responsesUnclear to many how policie are managed and adopted in complex scenarios involving hybrid community-infrastructure-services environmentsClear usage for new communities, less clear for communities purely leveraging generic infrastructures or those already operational. Important thing is that using the Policy Starter Pack should not put you in conflict with interoperating with infrastructuresFIM4R contributors may be the right policy people from communitiesMaybe we need to re-brand as "Policy Development Kit" rather than "Starter Pack" since it is probably relevant for those trying to update policies in line with e.g. GDPRProper moment to collaborate with EOSC Hub, should include policy questions in agenda with communitiesAdd question to EOSC survey to collect Policy ContactsTry and add some nicer schematicsAUP
	
		How do we say that other communities can layer more specific requirements on top of this? -> changed starting sentenceNeed for citation -> should remove this, should be annotated in Policy Development KitPersonal data governance -> replaced original text to point to privacy statments instead of duplication informationReplace SLA clause (8)Privacy statement has to be shown explicitly GDPRSRCE CA UpdateAttribute Authority Operations Policy Notes Friday 25th Actions 
	@DavidG to chase Eygene from RDIG@DavidG to chase Willy from AustrianGrid on dates for CA retirement@Cosmin and @Feyza to review self assessment of MD CA@All volunteer to be RPs and OPs in OIDC Fed Pilot@Hannah and @Mischa to add considerations for OIDC Fed into ongoing WLCG Authorisation Work@All send email to Derek if want to be in TAGPMA LE emailing list@Pawel to add a question to the EOSC survey to collect policy contact@David/Dave/Uros/Hannah ask for policy contacts from FIM4R List   |