Outside the HEP computing ecosystem, it is vanishingly rare to encounter user X509 certificate authentication (and proxy certificates are even more rare). The web never widely adopted the user certificate model, but increasingly sees the need for federated identity services and distributed authorization. For example, Dropbox, Google and Box instead use bearer tokens issued via the OAuth2 protocol to authorize actions on their services. Thus, the HEP ecosystem has the opportunity to reuse recent work in industry that now covers our needs. We present a token-based ecosystem for authorization tailored for use by CMS. We base the tokens on the SciTokens profile for the standardized JSON Web Token (JWT) format. The token embeds a signed descript...
Since 2017, the Worldwide LHC Computing Grid (WLCG) has been working towards enabling token based au...
Thesis (Ph.D.)--University of Washington, 2013User authentication and authorization are two of the m...
The World Wide Web is increasingly being used to deliver services. The file based authorization sche...
X.509 certificates and VOMS have proved to be a secure and reliable solution for authentication and ...
One of the key challenges identified by the HEP R&D roadmap for software and computing is the abilit...
One of the key challenges identified by the HEP R&D roadmap for software and computing is the abilit...
Support for token-based authentication and authorization has emerged in recent years as a key requir...
The WLCG is modernizing its security infrastructure, replacing X.509 client authentication with the ...
Access to WLCG resources is authenticated using an x509 and PKI infrastructure. Even though HEP user...
The popular OAuth 2.0 Framework specifies the use of Bearer Tokens for the transmission of authoriza...
Distributed authorization provides the ability to control access to resources spread over the Intern...
Abstract—Controlled sharing is fundamental to distributed systems; yet, on the Web, and in the Cloud...
Authentication, authorization, and digital identity management are core features required by secure ...
The OSG Consortium provides researchers with the ability to bring their distributed high throughput ...
Open authorization (OAuth) is an open protocol, which allows secure authorization in a simple and st...
Since 2017, the Worldwide LHC Computing Grid (WLCG) has been working towards enabling token based au...
Thesis (Ph.D.)--University of Washington, 2013User authentication and authorization are two of the m...
The World Wide Web is increasingly being used to deliver services. The file based authorization sche...
X.509 certificates and VOMS have proved to be a secure and reliable solution for authentication and ...
One of the key challenges identified by the HEP R&D roadmap for software and computing is the abilit...
One of the key challenges identified by the HEP R&D roadmap for software and computing is the abilit...
Support for token-based authentication and authorization has emerged in recent years as a key requir...
The WLCG is modernizing its security infrastructure, replacing X.509 client authentication with the ...
Access to WLCG resources is authenticated using an x509 and PKI infrastructure. Even though HEP user...
The popular OAuth 2.0 Framework specifies the use of Bearer Tokens for the transmission of authoriza...
Distributed authorization provides the ability to control access to resources spread over the Intern...
Abstract—Controlled sharing is fundamental to distributed systems; yet, on the Web, and in the Cloud...
Authentication, authorization, and digital identity management are core features required by secure ...
The OSG Consortium provides researchers with the ability to bring their distributed high throughput ...
Open authorization (OAuth) is an open protocol, which allows secure authorization in a simple and st...
Since 2017, the Worldwide LHC Computing Grid (WLCG) has been working towards enabling token based au...
Thesis (Ph.D.)--University of Washington, 2013User authentication and authorization are two of the m...
The World Wide Web is increasingly being used to deliver services. The file based authorization sche...