See the Executive Summary of the meeting

DCE Program Group Minutes
San Diego Meeting, April 1998
By Eliot M. Solomon,
DCE Program Group Chair

San Diego was the site of the first United States meeting of the DCE Program since the introduction of the new strategy at the Amsterdam meeting. The relation between DCE and The Open Group's IT DialTone program is being clarified, and the Open Group's commitment to DCE has been reaffirmed. The DCE Forum is functioning well. Together with previous work such as the LDAP NSI, DCE Web, and Jade I, these efforts will ensure DCE an important place on the Internet. And, to ensure that the DCE Program continues to deliver the solutions needed by business, we introduced the basis of a new strategy for DCE, placing an increased emphasis on delivering value to the enterprise.

Skip to Thursday's recap

Return to the DCE Program home page

Wednesday Morning: The Value of DCE

As the meeting began on Wednesday morning, everyone present filled out a survey to help us identify what users value in DCE. The morning was spent discussing where DCE needs to go, and how DCE relates to the Open Group's IT DialTone initiative. We started off with three presentations suggesting how we could position DCE, then had a discussion session to review and consider what had been presented.

Eliot's Presentation
· PowerPoint
· html

The Future of DCE: Planning for DCE II
Eliot Solomon recapped the major themes of the new strategy for DCE that were initially presented at the Amsterdam meeting in January. These included:

  • Maximizing Delivered Value
  • Providing more complete business solutions
  • Reducing the "total cost of ownership" of DCE
  • Focusing on Enterprise Computing, and particularly high-availability and mission-critical computing
  • Providing secure and reliable linkages between the core of the enterprise and Internet and intranet environments

One way to increase the completeness of the solution offered by DCE is shown at the right. Building on the traditional "secure core" of DCE, extensions add more functions that applications can build on. End-user solutions in turn can be built more easily and quickly on top of the core and the extensions.

solutions rainbow

The discussion that followed addressed possible definitions of the layers and the processes that would be used for them. The term DCE II could be applied to all the layers. The core would include DCE 2.0, the next release of the "traditional DCE." Extensions would be "optional" or "discretionary" layers that extend the value of DCE. Solutions would usually be proprietary applications that use DCE to solve specific end user problems, or that help users get the advantages of their DCE infrastructure.

Gerry's Presentation
· PowerPoint
· html

Deborah's Presentation
· PowerPoint
· html

Program Status and Reports
Sally Long
gave a presentation proposing a new "strategy" for DCE. The objective of the new strategy is to emphasize "Delivered Value" for the enterprise. Delivered value is the net benefit that the use of DCE can deliver to an organization.

Dave Lounsbury updated us on JADE II, which provides an easily downloadable DCE secure runtime written in pure Java. It can easily put DCE in places it has never been before. Vendors and others have shown interest in JADE II, but no firm commitments have been made to funding the JADE II work at the Research Institute. Dave asked the Program Group to make sure that vendors know their (the customers') priorities for DCE and the Internet. Dave described a demonstration in which a prototype version of JADE II was loaded into a variety of browsers and Network Computers. In response to a question, Dave indicated that the size of the JADE II client downloaded was slightly more than 300Kbytes.

We heard from representatives of two vertical industries that are working with the DCE Program. Gerry Gebel gave a presentation about the Securities Industry Middleware Council. Barry Howard of Lawrence Livermore National Lab talked about the National Labs, which are organizing a "vertical industry" council to work with the DCE Forum. He identified these issues as important to the labs:

  • security issues, including PKI, trust, and other similar issues
  • LDAP usage and integration
  • the increasing importance of Windows NT as an end-user environment presence

Trust and interoperable security are very important to Livermore. Interoperability with non-DCE security services is critical to the mission of the Labs. Apparent divergence in standards are of particular concern to Livermore. The most immediate examples include GSS API and various kerberos implementations, also identified as critical by Forum members from Oak Ridge National Lab and Sandia National Lab.

Deborah May gave an update on the DCE Forum. She emphasized the accomplishments of the Forum since the last member meeting, most of which have progressed significantly and are the focus of individual sessions during this meeting. The Forum continues to evolve to meet user's needs - if you're not already a member, contact Deborah at d.may@opengroup.org to join.

Eliot's Draft to the Architecture Board

Report from the Architecture Board
Board of Directors and Architecture Board member Karl Matzke gave a report on the work of the Architecture Board. The IT DialTone effort continues to make progress. While the architecture "population" effort is well underway, an organized requirements gathering process is just starting. IT DialTone will emphasize analysis of business requirements more than have previous IT standards efforts, including those of The Open Group. Requirements will be gathered from CIOs, vertical markets, and Program Groups. Karl asked the members of the DCE Program Group to participate by completing the Architecture Board survey.

Eliot Solomon described the presentation he made to the Architecture Board relating the DCE Program to the IT DialTone architecture. In it, DCE is aligned with the IT DialTone concept of an "Application Environment." DCE would become a application environment optimized for enterprise computing with a substantial component of mission critical or near-mission critical applications.

In the discussion that followed, members suggested descriptions of the characteristics of DCE and its target market. Organizations with applications characterized by large amounts of file access or with repetitive work, whether or not it relies on transaction monitors, would fit the model. Organizations with a need for integrated, enterprise-wide administration and system management would also be included.

The proposal to the Architecture Board will be discussed further in the DCE Forum. The formal presentation to the Architecture Board will take place in July, the week before the next Members' meeting.

Sally and Randy's Presentation
· PowerPoint
· html

DCE Forum: Problem Resolution
Randall Burris and Sally Long
led a DCE Forum discussion on "problem resolution." Many Customer Forum participants have asked for a better way to deal with DCE problems that have multi-vendor implications. Sally opened the discussion with an overview of the historical model for problem resolution, including the The Open Group's original process for support. She then described some of the problems with the current support mechanisms. An interactive discussion was held to define options for addressing the problem resolution issue. This discussion was a good starting point and the DCE Forum will continue to work this issue over the next few months.

Survey Results

Presentation
· PowerPoint
· html

DCE Futures - Ideas and Rankings

Discussion of New DCE Strategy
In an extended discussion period, all those attending the meeting discussed the material presented to this point. We broke into small groups to review three posed questions, then came back together to share our conclusions. The three questions were:

  • Does the strategy make sense?
  • How can your company benefit from this strategy?
  • What can your organization do to support this strategy? OR
    What do you need to be able to "pitch" this strategy to your organization?

The overwhelming majority felt the strategy made sense. Some concern was expressed about the IT DialTone initiative. Some participants felt the new strategy was not sufficiently different from the original intent of DCE to be any better accepted. The benefits that the participants anticipated from the strategy related particularly to security, and to secure communications over the Internet. The planned inclusion of Java tools and capabilities in DCE was also seen as a positive step.

Concerns expressed included questions about support and maintenance, and accountability for problem resolution. Several participants felt that they needed more specific information about schedules for the program; some expressed concerns about funding, and the program's long-term stability. A number of participants indicated that improved reliability, availability, and scalability (RAS) in DCE were required before they could make major additional commitments. Improved operation, administration and management (OA&M) capabilities were also identified as an urgent requirement.

Thanks to Alexandra Martin and Jodi Smith-Bennett of The Open Group for facilitating the discussion and tabulating the results.

Skip to Thursday's recap

Return to the DCE Program home page

Wednesday Afternoon: Vendors, Forum, and Friends

Wednesday afternoon was focused on DCE and DCE-related offerings from vendors and The Open Group's Research Institute. There was also a presentation from the Forum on work done since the Amsterdam meetings to address issues with intercell trust.

Paul's Presentation
· PowerPoint
· html

The Research Institute
Paul Dale
, , Sr. Vice President of the Research Institute, described his group's skills and capabilities for delivering technology and consulting services to organizations. Among the projects his group is involved with include JADE I and II, Java-Kerberos, and ADAGE. JADE allows deployment of DCE clients on demand as Java applets, in conjunction with a JADE client (JADE I) and with no pre-installed software (future development). Java-Kerberos is a pure Java implementation of Kerberos 5, supporting Kerberos authentication and message protection, as well as multiple cache mechanisms. ADAGE (Authorization for Distributed Applications and Groups) simplifies the administration of authorization policy by providing rich support for groups, sets, roles, rules, relations, and constraints. It also supports trust models for enterprise-wide policies and provides a toolkit for application developers. In terms of consulting services the RI can offer, Paul explained the benefits of infrastructure investment analysis and risk analysis for companies who are planning to expand or modify their technology infrastructure.

 

Joint Meeting with the Management Program Group
The DCE Program Group and the Management Program Group met together in San Diego for the first time. The joint interest between the two Program Groups is in identifying requirements for managing DCE, and for using DCE to manage other things. The DCE Program Group has identified the need for tools to manage the DCE environment as a key interest of the DCE community.

In order for the Management PG to help us, they need a better understanding of what DCE experts believe is needed to facilitate managing DCE. We held a discussion on what we mean by managing DCE and identified some areas where management in DCE is needed. These included:

  • host configuration management
  • access controls
  • a high-level management language for scripting, coherent so it works across multiple domains, and even facilitates mergers and sharing of data in organizations
  • easier-to-make multiple updates
  • common management across vendors
  • a simple GUI-based task interface rather than one using the command line
  • a better set of interfaces to manage the different parts of DCE
  • handling directory services
  • handling performance issues. This a continuous issue - what is needed is some solution akin to pinging the health of the critical services in the DCE environment.

These are just ideas, and don't clearly address the basic questions of "What do we want to manage and what are DCE's requirements?" It was decided that a small group of representatives from each Program Group would be identified to make progress in clarifying DCE's requirements and the next steps to be taken. An action was taken to identify both a Primary contact and a set of interested participants from the DCE Program Group by the end of May 1998. If you are interested, please contact Eliot Solomon.

Digital's Presentation
· PowerPoint
· html

IBM's Presentation
· html

DASCOM's Presentation
· PowerPoint
· html

Gradient's Presentation
· PowerPoint
· html

DCE Vendors

  • Digital Equipment Company
    K. V. Sastry, Engineering Manager

    K.V. began his presentation with a recap of Digital's current and planned DCE product sets for various platforms, including Digital UNIX, Windows 95, and NT. He then indicated that his group was exploring new technologies, including the following: for Digital UNIX, IA-64 support, enhanced support for TruClusters, additional DFS features, easier management security, and development tools; for NT and Windows 95, slim client, CDS preferencing, and DHCP support. K.V. then described the Digital DCE Toolkit, which was designed to simplify the development and deployment of distributed applications.

  • IBM
    Jamil Bissar, Product Manager

    Jamil began with some key messages about IBM's direction for DCE, including support for Internet standards (PKI, LDAP, integration with Kerberos authentication), and extensive IBM middleware exploitation allowing for greater leverage of the infrastructure (GSO, Txseries, DFS, Component Broker). He then presented an architectural overview of IBM's eNetwork Security paradigm, a comprehensive, End-to-End security enterprise solution including these and other technologies. Jamil concluded with a detailed schedule of upcoming DCE releases on a wide array of platforms.

  • DASCOM
    Neil Readshaw, Product Manager

    Neil's presentation, entitled JADE: A Case Study, described the process of building DCE applications for the Internet. Neil first explained the motivations behind integrating Java and DCE, covering topics such as authentication and authorization, interoperability between Java and non-Java environments, preserving investments in existing DCE servers. After explaining the JADE object model, he then described a real-world implementation of the technology via Dascom's IntraVerse NetSEAT product. Neil rounded out the discussion by describing the IntraVerse system architecture, as well as the five major benefits of the JADE approach. The presentation concluded with packaging, product availability, and upcoming event information.

  • Gradient
    Brian Breton, Product Manager

    Brian started off his presentation with an introduction to Gradient's PC-DCE product family. The discussion then turned to NetCrusader, Gradient's solution for interoperating across security domains. His discussion touched on, among other things, the product's architecture, Internet security, and junction support. Brian then went into some depth about object security, especially as it relates to PC-DCE/OrbixSecurity integration, secure CORBA access, and secure Java access. The presentation concluded with a detailed description of using NetCrusader Commander for graphical management.

Doug Engert's Presentation
·
PowerPoint
· html

DCE Forum: Models of Intercell Trust
At the Amsterdam Meeting, members of the Customer Forum identified extension of trust between cells as a problem that should be addressed. The ability to grant access to DCE-secured resources when the requester is outside the cell, and perhaps outside the enterprise is essential to a growing number of DCE users. The Forum agreed to:

  • Prepare a "taxonomy" of cross cell trust and authentication models based on real world models of trust, both intra- and inter-enterprise. This will be the basis of a formal requirements specification for cross-cell security.

Barry Howard led this DCE Forum discussion, providing some insight from the experiences of the National Labs in sharing DFS and other file system resources among diverse user communities.

One of the more provocative suggestions made during the discussion related to the use of Public Key as a mechanism for establishing trust. If a certificate-based login mechanism were used, the trust problem would become identical to the problem of establishing trust in a certificate, at least with respect to authentication services. While this does not solve the problem, it transforms it from a DCE-specific problem to a more general problem.

One approach to

Return to Wednesday's recap

Thursday: Inter-cell, inter-realm, inter-enterprise
Thursday's meetings addressed the strategic goal of adding value to DCE. First our vendors described their plans for DCE, and their own approaches to adding value. We then discussed two areas in which value could be added: robust directory services, and documentation.


Ron B. Williams's Presentation
· PowerPoint
· html

Jeff Hodges' Presentation
· PowerPoint
· html

Ed Reed's Presentation
· PowerPoint
· html

Joyce Ethridge's Presentation
· PowerPoint
· html

Ellen Stoke's Presentation
· PowerPoint
· html

New Directions in Directory Services

We were pleased to have an excellent level of participation from our vendors.

  • Ron B. Williams of Kaiser Permanente described the IT and business environments at Kaiser. The sorts of "things" that need to be located, the dynamic configuration of the business and its work, and the criticality of the process of tracking items critical to the health and safety of clients were outlined. He identified the implications for the directory and related services.
  • Jeff Hodges of Stanford University described Stanford's registy and directory infrastructure to address their need for a highly decentralized enterprise consisting of multiple systems of records. Jeff provided insight into the similarities and differences between registries and directories and how to most effectively use each. He showed how Stanford has combined the two in their overall system.
  • Ed Reed of Novell described the approach Novell has taken in their NDS product of focusing on the services which are enabled by the directory. Ed talked extensively about distributed vs. centralized directories, identifying the strengths and use models that each is best suited for.
  • Joyce Ethridge of Microsoft described a number of approaches to the implementation of distributed directories. She described the rationale behind the design of Microsoft's Active Directory (AD) product. Trade-offs between aspects of performance, between price and performance, and between technology futures and the imperatives of installed base were considered.
  • Ellen Stokes of IBM gave a wrap-up presentation summarizing best practices in the planning and deployment of directories.

Bibliography

http://www.ietf.org/
http://www.stanford.edu/group/itss-ccs/project/registry/
http://www.stanford.edu/group/itss-ccs/project/registry/registries.html
http://www.stanford.edu/group/itss-ccs/project/sunetid/
http://www.stanford.edu/group/networking/directory/
http://www.KingsMountain.com/ldapRoadmap.html
http://www.stanford.edu/~hodges/talks/

Robert Bissell's Presentation
· PowerPoint
· html

Steve Bergeron's Presentation
· PowerPoint
· html

Inter-cell and Multi-cell management
Managing and administering an enterprise environment of multiple cells is a challenge. In many ways it is similar to the issue of managing an enterprise with diverse technology domains. Two vendors of management tools discussed their approaches to managing multiple cells of DCE.

  • Robert Bissell of UnixPros described his company's products for monitoring the health of DCE cells.
  • Steve Bergeron of Dascom described the security, management, and administrative tools, DASCOM provides, including IntraVerse, Cell Manager, and COMET.

Marcus Ranum's Presentation
· PowerPoint
· html

Peter Dinsmore's Presentation
· PowerPoint
· html

Brian Breton's Presentation
· PowerPoint
· html

Boundary Protections: Firewalls and such
Firewalls and other boundary protections were not a significant consideration when DCE was designed. DCE was expected to defend systems against incursions from the local network. Defending against a hostile "outside" network from which sophisticated and sustained attacks might be launched was not part of the orginal design.

  • Marcus Ranum of Network Flight Recorder described the business context in which boundary protective services are created and delivered.
  • Peter Dinsmore of Network Associates (formerly Trusted Information Systems) described theory and practice in the construction of proxy firewall systems. Issues that complicate the construction of a DCE firewall were identified.
  • Brian Breton of Gradient described techniques available today to allow services inside a corporate environment to be presented to users outside a protective barrier.

Dave Hemsath's Presentation
· pdf format

RFC 68.4
·pdf format
·html
·Latest draft

DCE Security Joint Meeting
The meeting featured a demonstration of a public key login to DCE. Dave Hemsath presented the results of the joint effort of the DCE Program Group, the Security Program Group, and the Securities Industry Middleware Council (SIMC).

DCE PROGRAM HOME PAGE

DCE FORUM HOME PAGE

OPEN GROUP HOME PAGE