Using Smart-Card
authentication in already existing infrastructures is not a
trivial thing, especially if in addition to that, different
directories are used in heterogeneous networks. The German
Aerospace Center (Deutsches Zentrum fĂĽr Luft- und Raumfahrt;
DLR) has solved this challenge by implementing a middleware.
Security is a basic virtue of IT--especially if in the case of
illegal access to the systems, human life or costly materials
are endangered. Accordingly sophisticated is the security plan
in the Space-Control center of the German Aerospace Center in
Oberpfaffenhofen. Here the Columbus-Module of International
Space Station ISS is controlled round the clock.
As in many other enterprises with high security requirements,
the concept of DLR is based on separate networks of different
protection levels that are physically not connected to each
other: in the so-called Ops network the actual navigation of the
research module in Earth’s orbit takes place. Among other
services, it also controls the life-support-systems. Here,
strictest security measures, as used by banks, are applied so
that no unauthorized person can send commands to ISS. Parallel
to this, there is the network “Ops Support”. In this particular
segment different help software is used by the flight
controller, for instance, a tool for the most precise daily
scheduling of the ISS crew. The security demands here are
comparable with the standards in sensitive areas of other
industries. An error in the system or extern fraudulent
manipulation of the IT infrastructure could cause serious
disruption of the space mission - apart from high costs. “Office
Network” requires lower security. Only in this section of the
infrastructure can the internet be accessed. Office programs and
emails dominate this section. DLR outsourced most parts of the
IT system operations to external service providers.
A basic technical problem hereby is that the
active directory normally wants to be the master within the domain.
However, at DLR according to ESA specifications, LDAP has to be the
master and the Windows domain controller in the Ops support
sub-system has to be second in line.
“To change the
existing active directory was not a reasonable option.”, points Mr.
Fein. “Running in the Windows domain are important tools of NASA
that were designed for Windows and that assume a Windows
environment.”
Columbus
Columbus is a laboratory module of the ISS and is
being run by the European Space Agency, ESA. After
it was transported by the space shuttle Atlantis to
the ISS, Columbus was docked in February 2008. On
board the Columbus module different experiments are
being carried out, among others in the realm of
material research or researching the sun. The
control of the module is the responsibility of the
German Center for Air and Space travel in
Oberpfaffenhofen. In connection with the control,
highest standards of security and availability have
to be applied to the IT: the Columbus module can, in
the worst-case scenario, operate for 24 hours on its
own. Should the flight control in Oberpfaffenhofen
fail, despite high redundancies of the systems and
of the control rooms, control centers in the USA and
Russia can still control the most important
functions of the Columbus. In case of major failure
or breakdown, the module would have to be evacuated
and the crew would have to be recalled to other
parts of the ISS.
|
|
|
|
The choice and
evaluation of an adequate solution as a bridge between the
different system worlds could be approached very
First of all a back-up control room was set up to evaluate
this solution. The DLR Control Center is able to test new IT
solutions during the training and advanced education of flight
controllers in practical simulations of normal activity. In this
way it was easily detected where the chosen solution had to be
adapted to the individual need.
This includes, for instance, the use of more PC's per work area:
Through strict division of the three networks, the flight
controllers at DLR operate with three calculators, each of them
being separately and fixedly assigned to one of the three
networks. Normally, at the authentication with Smart-Card, a user
is logged out or the PC is locked when the card is taken out of
the reading device. In the control center this was not permitted
to happen—the users register with one card at all three computers.
This card also serves as an entry control to the flight control
room and to the buildings. “Within our security context that
includes rigid multilevel access controls and physically separated
networks, we can tolerate that the user stays registered in the
Ops support network, even if the Smart-Card is removed.”,
according to Mr. Fein. “In the high-security Ops network that runs
the control of the Columbus-Module, this would not be permitted.”
Comtarsia implemented the required functions.
Another hurdle was the highly heterogeneous environment.
Smart-Cards are being used in two subsystems: Ops and Ops support.
Still, in both systems there are two different solutions being
used for authentication. This has both historical and technical
reasons: Smart-Cards had been used already for awhile in a
high-security Ops network that is based on a Linux server and
clients. The software used there for user authentication would
have been, according to Fein and Stössner, very difficult to be
transferred into a Windows domain. In addition, the already
introduced Smart-Card system of the Linux infrastructure was not
compatible with the Windows world. Thus, it was technically not
prudent to implement this in extending it to other subsystems.
This obstacle was solved using Comtarsia solution
as an authentication interface between the two subsystem worlds. The
introduction of the solution took place, without problems, after
implementing all necessary changes. The specific use started in June
2008. Log on to the PC in the Ops Support System is carried out in
several steps: first with the help of Smart-Card data and the users
PIN, a client’s certificate is issued and user authentication is
established by the LDAP server. If the registration at LDAP is
successful, a sign-on request at the “Sign-on Gate” service from
Comtarsia is sent, that is installed directly with the Windows
domain controller. This process starts the automatic user
administration in the active directory: the user is registered
directly at the Windows domain; if the user isn't found there, LDAP
creates a new account with the new attributes. With each log on,
Sign-on Gate updates the user information, for instance information
on the group membership, in order to synchronize the information
deposited in the leading LDAP with the one of the active directory.
In order to avoid bypass of log on to the Windows work station with
Smart-Card and PIN number, random created passwords will appear in
the background with the Windows log on.
Fein and Stössner are satisfied with these achievements so far.
“The whole project was successfully brought to its end without any
considerable trouble”, says Fein. “All individually desired changes
were quickly implemented, we would implement the project anytime the
same way.” The return on investment (ROI) was not an issue. “As far
as we know, there was no alternative to meeting the specifications
of ESA with the existing infrastructure.”, according to Fein.
Additional to that, DLR sees it as positive that the needed function
extensions from Comtarsia will be implemented in future versions of
the Sign-on solution. This way, implementation of the solution
remains release-capable. Updates or new versions can be downloaded
without any complicated adjustments.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - |
Project Specifications:
Project name: German Center for Air and Space Travel
Branch: Air and space travel.
Project category: user authentication
Main products: Comtarsia Sign-on Gate, Comtarsia Log on
Client.
System environment: Windows, Linux, LDAP
Involvement (Costs and personnel): no information.
Challenges: integration of existing Windows domain with active
directory in a leading LDAP.
Introduction of Smart-Card authentication (PKI) in existing
infrastructure.
Result: successfully introduced.
Project status/time-frame: a period of 1 ½ years, productive
since June 2008.
Involved suppliers/providers: INSYEN AG, Comtarsia IT Services
GesmbH
Contact person: Harold Stössner (INSYEN)
Juergen Fein (DLR)
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|