using phinms and web-services for interoperability

24
Using PHINMS and Web-Services for Interoperability The findings and conclusions in this presentation are those of the author and do not necessarily represent the views of the Centers for Disease Control and Prevention/the Agency for Toxic Substances and Disease Registry. Raja Kailar, Ph.D. CTO, Business Networks International Inc. Tim Morris – PHINMS Project Sponsor CDC/NCPHI Director, DISS

Upload: garnet

Post on 14-Jan-2016

57 views

Category:

Documents


1 download

DESCRIPTION

Using PHINMS and Web-Services for Interoperability. Raja Kailar, Ph.D. CTO, Business Networks International Inc. Tim Morris – PHINMS Project Sponsor CDC/NCPHI Director, DISS. Overview. PHINMS Web Services extension phases Interoperability considerations Scalable Messaging Architectures - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Using PHINMS and Web-Services for Interoperability

Using PHINMS and Web-Services for Interoperability

The findings and conclusions in this presentation are those of the author and do not necessarily represent the views of the Centers for Disease Control and Prevention/the Agency for Toxic Substances and Disease Registry.

Raja Kailar, Ph.D. CTO, Business Networks International

Inc.

Tim Morris – PHINMS Project SponsorCDC/NCPHI Director, DISS

Page 2: Using PHINMS and Web-Services for Interoperability

2

Overview

• PHINMS Web Services extension phases

• Interoperability considerations– Scalable Messaging Architectures– Non-PHIN Networks

Page 3: Using PHINMS and Web-Services for Interoperability

3

PHINMS 2.8 - Web-Services Adapter

PHINMS Sender

PHINMSReceiver

Web ServiceAdapter

Phase I: Web-Services Adapters

Web-ServiceClient

(receiver)

Web ServiceClient Web

ServiceAdapter

TQWQ

Web ServiceClient

(receiver)

Responses, RNR Data

Requests

PollPoll

Page 4: Using PHINMS and Web-Services for Interoperability

4

PHINMS 3.0 - Web-Services Reliable Messaging

ebMS

WS-RM

ebMS

WS-RM

Phase II: Core Transport Extensions for WS-Reliable Messaging

ebMS

WS-RM

Web ServiceAdapter

TQ WQ

Web ServiceAdapter

SENDER

RECEIVER

Page 5: Using PHINMS and Web-Services for Interoperability

Current Message Transport Modes

Route-not-Read Direct-Send

Page 6: Using PHINMS and Web-Services for Interoperability

Maintainability/Scalability: Current Challenges

• Route-not-Read has single point of failure, performance bottleneck

• Direct-Send difficult to install (Firewall, DMZ etc)

• Lifecycle management of client certificates used for Sender authentication by Receiver’s proxy web-server

Page 7: Using PHINMS and Web-Services for Interoperability

7

Transport - Long Term Goals

• Scalability– Support for thousands of messaging nodes

• Maintainability– Adding new nodes, or renewing certificates

at a node should not require manual updates at all other nodes

Page 8: Using PHINMS and Web-Services for Interoperability

Transport Architectures Under Consideration

• Option 1: – Identity provider based Centralized/Federated

authentication

• Option 2: – Regional gateways with routing capability

Page 9: Using PHINMS and Web-Services for Interoperability

Option 1: Identity Provider based Centralized/Federated Authentication

Page 10: Using PHINMS and Web-Services for Interoperability

10

What is an Identity Provider?

• User identity proofing– e.g., Is this John Doe living at 123 Main St, TN?

• Identity binding to digital credentials– e.g., John Doe = Certificate with Serial No. 12312

• Periodic renewal of credentials, re-binding of identities

• Online authentication Service– e.g., Client-Certificates, Login and Password

• Standard based authentication and/or authorization (session) tokens– e.g., SAML assertions

Page 11: Using PHINMS and Web-Services for Interoperability

What is SAML?

• Security Assertion Markup Language• Open standard for communicating

information:– Authentication– Authorization– Attribute

• Platform and Language independent (XML based)

• Can be used to support single sign-on and identity federation

Page 12: Using PHINMS and Web-Services for Interoperability

12

Identity Provider and SAML Based Authentication Approach

RequestingParty

(Initiator)

Relying Party

(Responder)

Identity Provider

(SAML Authentication

And/or Authorization Authority)

1) ID + Authentication

Credentials 2) Assertion(s)

3) SOAP Request+

Assertions

0) TrustRelationship

Page 13: Using PHINMS and Web-Services for Interoperability

Identity Providers – Advantages and Challenges

Advantages• Centralized control over authentication and/or

authorization• User identity management burden shifted from

services that use identity

Challenges• Establishing trusted identity providers

– More than technology– Service requestor and responder need to agree on

same authentication/authorization mechanisms• Centralizing trust can create single point of failure,

target for hack attacks• Standards (e.g., SAML, WSS) are evolving• Where is authorization performed?

Page 14: Using PHINMS and Web-Services for Interoperability

Option 2: Regional Gateways with Routing Capability

Page 15: Using PHINMS and Web-Services for Interoperability

15

Regional Gateways

Messaging/routing– Nodes authenticate

to gateway

– Send/Poll model at each regional gateway

– Gateways perform message routing

Page 16: Using PHINMS and Web-Services for Interoperability

Regional Gateways – Advantages and Challenges

Advantages– No single point of failure– Local control of identities and processes– De-couples intra-regional interfaces from inter-regional ones

Challenges– Authentication/authorization not necessarily end-to-end

• Gateways may act as trusted intermediaries (transitive trust)

• Need policies, binding agreements between regional gateways

– End-to-End routing, encryption– Acknowledgements in multi-hop mode

Page 17: Using PHINMS and Web-Services for Interoperability

Interoperation with Non-PHIN Networks

Page 18: Using PHINMS and Web-Services for Interoperability

18

Approach 1: Multiple Protocol Support

Iowa

PHIN Non-PHIN

SanDiego

CDCebMS +2-way SSL

Transport + SecurityProtocol 2

CDC

Page 19: Using PHINMS and Web-Services for Interoperability

Multiple Protocol Support: Challenges

• Addition of each new protocol requires upgrade of messaging node software

• Complexity of messaging nodes go up (multiple security credentials, protocols etc)

Page 20: Using PHINMS and Web-Services for Interoperability

20

Approach 2: Inter-Network Gateways

Iowa

PHIN Non-PHIN

IdentityProvider

SanDiego

Inter-NetworkGateway

CDC

CDC Gateway,On Behalf of Iowa,Message Type X

Authenticate

Service=GatewayAction=send

MessageRecipient= San Diego @Other Network

Arguments=Message Type X

Poll

Hub

Page 21: Using PHINMS and Web-Services for Interoperability

21

Example – Non-PHIN to PHIN Message Flow

Iowa

PHIN Non-PHIN

IdentityProvider

SanDiego

Inter-NetworkGateway

CDC

Send to Iowa,Message Type X

Authenticate

From-PartyId=CDC GatewayService=NonPHINMessages

Action=sendArguments=Message Type X from San

Diego

Page 22: Using PHINMS and Web-Services for Interoperability

22

Inter-Network Gateway Architecture

PROTOCOLTRANSLATOR

INTER-NETWORKSECUREROUTER

PHIN(ebMS 2.0)

Non-PHIN(e.g., Web-Services)

Non-PHIN(e.g, Web-Services)

PHIN(ebMS 2.0)

Page 23: Using PHINMS and Web-Services for Interoperability

Inter-Network Gateways – Advantages and Challenges

Advantages– Facilitates re-use of existing messaging systems to

support new data routes and business use cases

Challenges– Agreements (policy, business, service-level)

between different networks on gateway protocols, routing, security

– Trust on gateways• End-to-end messaging security properties

– Authentication– Confidentiality

Page 24: Using PHINMS and Web-Services for Interoperability

24

Summary

• Current models are secure but may not scale to large number of nodes

• New models are scalable/maintainable, but there are security challenges:• Centralizing authentication / authorization• Regional gateways (transitive trust)

• Security - Technology is a small part of the problem. Bigger challenges are:• Establishing trust in identity proofing,

authentication and authorization• Policy, Governance, Agreements on inter-

organizational or inter-regional entities