Security
Conclusions
We have presented the basic security architecture of the Legion system, and
we have demonstrated that our design is sufficiently flexible to accommodate
a wide variety of security-related mechanisms. This flexibility is
critical to the successful deployment and use of metacomputing
software. One-size-fits-all software dictated by a single group will never
satisfy the requirements of the wide range of users and resource
providers in a large-scale, cross-domain environment.
We have also demonstrated that flexibility does not come at the price of
complete lack of control. Within the flexible Legion framework, we
showed how a number of important site-wide and application-wide
security policies could be achieved. Naturally, the set of policies
presented is only a small fraction of the policies that will be needed
across the complete Legion environment.
The Legion system, including the security features described here, is
publicly available. It is widely deployed on hundreds of
machines at dozens of sites spanning multiple trust domains. Key
portions of the software, such as the PCD described in the
Section entitled "Core Objects", have been vetted and approved by system
administrators at sites such as the San Diego Supercomputing Center and
the US Naval Oceanographic Office (NAVO). In the future, we plan to
continue deployment of Legion, developing additional mechanism and
adapting to new site-local policies as required. We are also in the
process of measuring the performance impact of key Legion security
mechanisms.
|