240 likes | 415 Views
Using PHINMS and Web-Services for Interoperability. Raja Kailar, Ph.D. CTO, Business Networks International Inc. Tim Morris – PHINMS Project Sponsor CDC/NCPHI Director, DISS. Overview. PHINMS Web Services extension phases Interoperability considerations Scalable Messaging Architectures
E N D
Using PHINMS and Web-Services for Interoperability Raja Kailar, Ph.D. CTO, Business Networks International Inc. Tim Morris – PHINMS Project Sponsor CDC/NCPHI Director, DISS
Overview • PHINMS Web Services extension phases • Interoperability considerations • Scalable Messaging Architectures • Non-PHIN Networks
Current Message Transport Modes Direct-Send Route-not-Read
Maintainability/Scalability: Current Challenges • Route-not-Read has single point of failure, performance bottleneck • Direct-Send difficult to install (Firewall, DMZ etc) • Lifecycle management of client certificates used for Sender authentication by Receiver’s proxy web-server
Transport - Long Term Goals • Scalability • Support for thousands of messaging nodes • Maintainability • Adding new nodes, or renewing certificates at a node should not require manual updates at all other nodes 7
Transport Architectures Under Consideration • Option 1: • Identity provider based Centralized/Federated authentication • Option 2: • Regional gateways with routing capability
Option 1: Identity Provider based Centralized/Federated Authentication
What is an Identity Provider? • User identity proofing • e.g., Is this John Doe living at 123 Main St, TN? • Identity binding to digital credentials • e.g., John Doe = Certificate with Serial No. 12312 • Periodic renewal of credentials, re-binding of identities • Online authentication Service • e.g., Client-Certificates, Login and Password • Standard based authentication and/or authorization (session) tokens • e.g., SAML assertions 10
What is SAML? • Security Assertion Markup Language • Open standard for communicating information: • Authentication • Authorization • Attribute • Platform and Language independent (XML based) • Can be used to support single sign-on and identity federation
Identity Providers – Advantages and Challenges Advantages • Centralized control over authentication and/or authorization • User identity management burden shifted from services that use identity Challenges • Establishing trusted identity providers • More than technology • Service requestor and responder need to agree on same authentication/authorization mechanisms • Centralizing trust can create single point of failure, target for hack attacks • Standards (e.g., SAML, WSS) are evolving • Where is authorization performed?
Regional Gateways Messaging/routing • Nodes authenticate to gateway • Send/Poll model at each regional gateway • Gateways perform message routing 15
Regional Gateways – Advantages and Challenges Advantages • No single point of failure • Local control of identities and processes • De-couples intra-regional interfaces from inter-regional ones Challenges • Authentication/authorization not necessarily end-to-end • Gateways may act as trusted intermediaries (transitive trust) • Need policies, binding agreements between regional gateways • End-to-End routing, encryption • Acknowledgements in multi-hop mode
Multiple Protocol Support: Challenges • Addition of each new protocol requires upgrade of messaging node software • Complexity of messaging nodes go up (multiple security credentials, protocols etc)
Inter-Network Gateways – Advantages and Challenges Advantages • Facilitates re-use of existing messaging systems to support new data routes and business use cases Challenges • Agreements (policy, business, service-level) between different networks on gateway protocols, routing, security • Trust on gateways • End-to-end messaging security properties • Authentication • Confidentiality
Summary • Current models are secure but may not scale to large number of nodes • New models are scalable/maintainable, but there are security challenges: • Centralizing authentication / authorization • Regional gateways (transitive trust) • Security - Technology is a small part of the problem. Bigger challenges are: • Establishing trust in identity proofing, authentication and authorization • Policy, Governance, Agreements on inter-organizational or inter-regional entities 24