Cyber Authentication Technology Solutions Interface Architecture and Specification Version 2.0: Deployment Profile
|
|
|
- Charleen White
- 10 years ago
- Views:
Transcription
1 Cyber Authentication Technology Solutions Interface Architecture and Specification Version 2.0: Status: Baseline for RFP #3 Final r7.2 Date modified: 25 March, :53 File name: CA - V2.0 Final r7.2_en.doc For further information contact: Bob Sunday Cyber-Authentication Program Chief Information Officer Branch Treasury Board Secretariat [email protected] Approved by: TBS, DCIO Cyber-Auth DG Committee
2 Revision Record Sheet VERSION NO. DESCRIPTION DATE ISSUED 0.1 Initial text 17 th 0.2 Draft to be reviewed for Approval at 28 th October RFP #3 Tiger Team Workshop draft r4 Recommended Document for approval by governance as Baseline document. September th October th November 2010 Status Early Draft - Work in Progress First Draft Recommended Baseline AUTHOR & NOTES Bob Sunday, TBS Bob Sunday, TBS Bob Sunday, TBS With a lot of help from the RFP #3 Tiger Team and their colleagues draft r5 Recommened Baseline document to be approved by Cyber-Auth DG Coimmittee 19 th November 2010 Recommended Baseline Bob Sunday, TBS Final r6 Finalized Baseline document to be attached to the draft RFP #3 25 th November 2010 Baseline for RFP #3 Bob Sunday, TBS Final r7 Finalized Baseline document to be attached to the draft RFP #3 14 th December 2010 Baseline for RFP #3 Bob Sunday, TBS Draft r7.1 Baseline document (with proposed updates) to be attached to the final RFP #3 9 th February 2011 Baseline for RFP #3 Bob Sunday, TBS Final r7.2 Baseline document to be attached to the final RFP #3 25 th March 2011 Baseline for RFP #3 Bob Sunday, TBS Foreword Release Note for this version Final r7.2 This Cyber Authentication Technology Solutions - Interface Architecture and Specification - Version 2.0: is the updated Baseline revision to the Cyber-Auth Tactical Solution (CATS) Interface Architecture and Specification. This version is the official baseline document approved for distribution with the final RFP #3 by the Cyber-Auth DG Committee. Subsequent changes to this baseline document will be processed with official change requests and dispositions. CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 2 of 53
3 Table of Contents 1 INTRODUCTION The Cyber Authentication Program Vision Overview of the CATS2 IA&S Compliance to CATS2 IA&S Notation Changes from the CATS1 Interface Architecture and Specification Focus is on deployment rather than underlying technology of Level of Assurance is explicitly required Authentication responses must be returned IDP Discovery must be implemented Single Logout uses back-channel requests Language passing uses a GC Language Cookie Notification of Credential Revocation A Number of Miscellaneous Corrections/Updates Document References DEPLOYMENT REQUIREMENTS (NORMATIVE) Constraints on the Kantara Initiative Profile Additional Constraints on the [SAML2 *] specifications Additional Extensions relative to the [SAML2 *] specifications Other GC Requirements Required Assertion Attributes GC Cyber-Auth Levels of Assurance Communicating Language Preferences Name Identifier Management Protocol Security Exception Handling APPENDIX A: ADDITIONAL FUNCTIONS BEYOND CYBER-AUTH (NORMATIVE)...52 A.1. GC Language Cookie A.1.1 GC Language Cookie is in a Common GC Domain A.1.2 Obtaining the GC Language Cookie A.1.3 Setting the GC Language Cookie CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 3 of 53
4 1 Introduction 1.1 The Cyber Authentication Program Vision The Cyber Authentication Program at the Government of Canada has a Vision which is partially described in the following diagram: Figure 1: Cyber-Auth Vision CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 4 of 53
5 1.2 Overview of the CATS2 IA&S User Program User Interface Owned & Defined by: Department Subject to: TBS Policies and Standards Department/Agency (SP or RP) Credential User Interface Owned & Defined by: Credential Provider Subject to: GC Branding Requirements Credential Service Interface Owned & Defined by: GC (TBS/CIO) Subject to: TBS Policies and Standards Credential Provider (IDP or CP) Figure 2: Business View of Authentication Interfaces This CATS2 IA&S [CATS2 IA&S] is a deployment level profile for participation in the Government of Canada s Cyber-Auth environment. It describes the messaging interface referred to as the Credential Service Interface in Figure 2: Business View of Authentication Interfaces It applies to deployments configured to participate as both Service Providers (SPs) and Identity Providers (IDPs). In the GC context, SPs are also called Relying Parties (RPs), typically departmental online services, and IDPs are called Credential Providers (CPs) or Credential Service Providers (CSPs). The GC also refers to a Credential Broker Service (CBS) which is a system entity that acts as both an IdP for RPs and as an RP when it communicates with underlying IdPs; SAML documents refer to this as a Proxying Identity Provider NOTE: In this document we use the terminology of SP and IDP. Other Cyber-Auth documents may use the terms RP, CP and CSP. SAML and Kantara Initiative documentation use the terms SP and IDP. This document does not use the term CBS as it is a composite implementation of the SP and IdP roles. This deployment profile is an evolution of the former GC document Cyber-Auth Tactical Solution (CATS) Interface Architecture and Specification [CATS1 IA&S]. This deployment profile is not a tutorial or guidance document. Further guidance and use cases may be provided by the GCCFGB. CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 5 of 53
6 1.3 Compliance to CATS2 IA&S Implementation Profile SAML2 Specifications Profiles Bindings Protocols Authentication Context Metadata Assertions Figure 3: The Cyber-Auth Interface Architecture Building Blocks This deployment profile is based on but does not require full compliance with the Profile [] published by the Kantara Initiative. The normative requirements of this GC in terms of the applicable sections of the Profile are detailed in Section 2 of this document. The Profile is based on the SAML 2.0 specifications created by the Security Services Technical Committee (SSTC) of OASIS. The Profile constrains the base SAML 2.0 features, elements, attributes and other values required for approved egovernment federations and deployments. Unless otherwise specified, SAML operations and features follow those found in the OASIS SAML 2.0 specifications [SAML2 *]. NOTE: Interoperability testing conducted by external bodies, such as the Kantara Initiative, may assist confirmation of compliance. As such, GC acquisitions which require compliance with this deployment profile may also require the underlying software to comply with external interoperability testing. However, these external tests do not form a complete and final confirmation of compliance with these GC deployment requirements. Additional testing may be required by the GC Credential Federation Governance Body (GCCFGB) to allow participation in the GCCF. CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 6 of 53
7 1.3.1 Notation This specification uses normative text to describe the use of SAML capabilities. The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this specification are to be interpreted as described in [RFC2119]: they MUST only be used where it is actually required for interoperation or to limit behavior which has potential for causing harm (e.g., limiting retransmissions) These keywords are thus capitalized when used to unambiguously specify requirements over protocol and application features and behavior that affect the interoperability and security of implementations. 1.4 Changes from the CATS1 Interface Architecture and Specification This document differs from the [CATS1 IA&S] in a number of areas: Focus is on deployment rather than underlying technology of Level of Assurance is explicitly required Authentication responses must be returned IDP Discovery must be implemented Single Logout uses back-channel requests Language passing uses a GC Language Cookie Notification of Credential Revocation A Number of Miscellaneous Corrections/Updates These changes are generally described below; the full detailed normative conformance requirements for this deployment profile are specified within this document in Section 2 titled: Deployment Requirements (Normative) Focus is on deployment rather than underlying technology This deployment profile document relaxes the rules (but not the conformance requirements) that have previously required the underlying software products at the SPs and IDPs to have passed Liberty Alliance Interoperability testing. The new rules will require the deployment of the IDP Service and the SP Service to be interoperability tested and certified against the rules in this deployment profile document. Kantara Initiative test plan documents identify many test cases that are useful in testing many sections of this deployment profile and these will greatly assist the GCCF in determining conformance. Also, using COTS software that has passed the Liberty Alliance or Kantara Initiative Interoperability testing will greatly improve the chances of successfully meeting these deployment requirements. This change of focus means that the GC Credential Federation Governance Body (GCCFGB) will be the authoritative body to determine whether a deployment (SP or IDP) has been sufficiently tested for the service to become a member of the federation. CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 7 of 53
8 1.4.2 of Level of Assurance is explicitly required The GCCF supports multiple Levels of Assurance (LoAs) and therefore, stating desired LoA (by SP) and provided LoA (by IDP) is required. for Level of Assurance is required as specified in [SAML2 Assur]. The GC Cyber-Auth LoA s are described in [ITSG-31] and the associated URI s are specified in this in Section 2.4.2, GC Cyber-Auth Levels of Assurance. SPs must request a specific GC Level of Assurance with the exact compare operator. Note that the SP may state that more than one LoA is acceptable. E.g. this is useful when a level 2 is required but the SP is willing to accept (and perhaps pay for) a level 3 if a level 2 is not possible. IDPs must be configured to support the specific GC LoA(s) for which they are certified. IDPs must reject any authentication request for a GC LoA for which they are not certified with an appropriate status code. IDPs must provide the exact LoA requested. The Metadata requirements include additional support for Level of Assurance as specified in [SAML2 Assur] Authentication responses must be returned Existing COTS products differ in their ability to send Authentication responses in certain circumstances while processing the <AuthnRequest>. In CATS1 deployments this led to an inadequate user experience (e.g. when user cancelled login). The Kantara Initiative Profile [] now requires that responses be produced and sent regardless of the success or failure of the <AuthnRequest>. This requirement is supported by this CATS2 IA&S and will lead to improved user messaging and better continuity of user dialogue IDP Discovery must be implemented In a single credential provider environment there was no need to choose which credential provider the user wished to go to. Thus, the CATS1 requirement for the IDP Discovery Profile to allow the user to choose their credential provider was deferred for both SPs and IDPs With the GC environment now supporting multiple IDPs, a mechanism to support the SP and the user in choosing the IDP was necessary. This CATS2 IA&S does not change the specification in [CATS1 IA&S], but it does mandate that now the IDP Discovery Profile must be included in the deployment. This may require changes at existing SPs and IDPs Single Logout uses back-channel requests Existing deployments support Single Logout using SAML front-channel bindings. This requires sending the user s browser to each SP in turn (i.e. serialization of the logouts at each SP). It also increases the probability that an error will cause the user to be left in an uncertain state. To improve this situation, CATS2 adds the support for back-channel bindings to handle Single Logout and removes front-channel propagation of Logout to the other affected RPs. This adds support for SOAP bindings for Logout Requests and Responses as specified in the Profile []. The department can now choose between: CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 8 of 53
9 Retaining control of the user session while instructing the IDP to logout the user. Passing control of the user session to the IDP to give the IDP the ability to inform the user of specific error situations that may arise and on completion returning the user to the SP Language passing uses a GC Language Cookie The Government of Canada s Official Languages Act (OLA) and Common Look and Feel Policy require a way to communicate the user's current language preference in all cases, even when authentication fails and an assertion is not produced. CATS1 did not have a way to send the user s current language to the IDP. So, GC Access Key had to present a bilingual 1st page and was not able to return any change of language when authentication did not succeed. This did not fully meet the requirements of the OLA. Cyber-Auth in CATS2 now does this by utilizing a GC Language Cookie. This session based cookie will be updated and read by SPs and IDPs whenever knowledge of language is required to meet the GC OLA. Note: While this facility is needed for Cyber- Authentication, its use is applicable to other situations in the GC, such as Portals. To allow it to be placed in a more relevant future GC standard, it has been specified in a generic way and placed in an appendix in this document Notification of Credential Revocation When a credential provider revokes a credential that has been in use in a department, there is no method in CATS1 for the department to be notified. A number of GC Departments require this capability to manage their enrolments. CATS2 adds support for the IDPs to send this information in back-channel requests using the SAML Name Identifier Management Protocol (and Profile). These enhancements allow SPs to specify their desire for receiving these messages through Metadata and also require IDPs to notify SPs in the event that a credential previously used at the SP has been revoked. IDPs are only required to send these NameID termination messages to SPs for whom they have previously sent assertions for the same principal A Number of Miscellaneous Corrections/Updates A number of miscellaneous corrections/updates are required: To properly handle PAI s that are sent to multiple departments, <NameID> in the assertion may include SPNameQualifier. This fixes a bug in CATS1. All logouts will be global. That is, all logouts will generate a full Single Logout profile across all SPs involved in the user s session. There will no longer be a requirement for the IDP or the SP to propose local versus global logout. This fixes a usability problem. RelayState must not be returned in an Authentication Response message unless it was received in the corresponding Authentication Request message. This fixes a bug in CATS1. CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 9 of 53
10 SessionNotOnOrAfter should not be returned in an Authentication Response message in order for the SP to determine its own timeout duration. This fixes a usability problem. The SP s logo and display name will be added to the SP s Metadata. This positions CATS2 for possible co-branding requirements. 1.5 Document References [CATS1 IA&S] Cyber-Auth Tactical Solution Interface Architecture and Specification Version 1.0 dated 23 January, 2009 [CATS2 IA&S] This document Cyber-Auth Technology Solutions Interface Architecture and Specification Version 2.0: [] Kantara Initiative egovernment Implementation Profile of SAML V2.0 Version 2.0 available from ntara-egov-saml2-profile-2.0.pdf [ITSG-31] [RFC 1766] [RFC2119] [SAML2 *] [SAML2 Assur] [SAML2 Bind] IT Security Guidance: User Authentication Guidance for IT Systems published by Communications Security Establishment Canada and available from Tags for the Identification of Languages Key words for use in RFCs to Indicate Requirement Levels All the SAML2 document references are available at or alternatively at OASIS Committee Specification 01, SAML V2.0 Identity Assurance Profiles Version 1.0, November OASIS Standard, Bindings for the OASIS Security Assertion Markup Language (SAML) V2.0, March [SAML2 Core] OASIS Standard, Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0, March [SAML2 Errata] OASIS SAML V2.0 Approved Errata, 1 December CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 10 of 53
11 approved-errata pdf [SAML2 Meta] [SAML2 MetaUI] [SAML2 Prof] OASIS Standard, Metadata for the OASIS Security Assertion Markup Language (SAML) V2.0, March OASIS Working Draft 06, Metadata Extensions for Login and Discovery User Interface Version 1.0, November OASIS Standard, Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0, March CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 11 of 53
12 2 Deployment Requirements (Normative) 2.1 Constraints on the Kantara Initiative Profile This specification builds upon the SAML 2.0 suite of specifications [SAML2 *] and the profile of SAML2 referred to as Kantara Initiative egovernment Implementation Profile of SAML2 version 2.0 [] This deployment profile is based on but does not require full compliance with the Profile [] published by the Kantara Initiative (see the note in Section 1.3 on page 4). While the Kantara profile is an implementation profile for vendors of software products, this Cyber-Auth profile is a deployment profile which further constrains and explains the deployment of Service Providers and Credential Providers in the GC Cyber-Auth environment. Where this CATS2 IA&S does not explicitly provide SAML2 guidance, one MUST implement in accordance with applicable OASIS SAML 2.0 requirements The following table is in the order and description of the requirements in [], Sections 2 & 3 which are repeated word for word in the first column. The table is annotated with the support required by the GC Cyber-Auth Program: typically this is either or or n/a (not applicable). Whenever further details are required to fully explain the GC requirement, they are provided in the 3 rd column. There are also requirements which are additional to these requirements and they are specified in the subsequent sections. Cyber-Auth also has constraints on the SAML v2.0 specifications and has a few Cyber-Auth specific requirements egov 2.2 Metadata and Trust Management Identity Provider, Service Provider, and Discovery Service implementations MUST support the use of SAML V2.0 Metadata [SAML2Meta] in conjunction with their support of the SAML V2.0 profiles referenced by subsequent sections. Additional expectations around the use of particular metadata elements related to profile behavior may be encountered in those sections. CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 12 of 53
13 egov Metadata Profiles Implementations MUST support the SAML V2.0 Metadata Interoperability Profile Version 1.0 [MetaIOP]. In addition, implementations MUST support the use of the <md:keydescriptor> element as follows: Cyber-Auth Deployments MUST NOT use the SAML V2.0 Metadata Interoperability Profile Version 1.0 [MetaIOP]. Implementations MUST support the <ds:x509certificate> element as input to subsequent requirements. for other key representations, and for other mechanisms for credential distribution, is OPTIONAL. No OPTIONAL mechanisms are supported Implementations MUST support some form of path validation of signing, TLS, and encryption credentials used to secure SAML exchanges against one or more trusted certificate authorities. for PKIX [RFC5280] is RECOMMENDED; implementations SHOULD document the behavior of the validation mechanisms they employ, particular with respect to limitations or divergence from PKIX [RFC5280]. Cyber-Auth Deployments MUST follow the requirements specified in Section Security CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 13 of 53
14 Implementations MUST support the use of OCSP [RFC2560] and Certificate Revocation Lists (CRLs) obtained via the "CRL Distribution Point" X.509 extension [RFC5280] for revocation checking of those credentials. Cyber-Auth Deployments MUST follow the requirements specified in Section Security Implementations MAY support additional constraints on the contents of certificates used by particular entities, such as "subjectaltname" or "DN", key usage constraints, or policy extensions, but SHOULD document such features and make them optional to enable where possible. No OPTIONAL additional constraints are supported Note that these metadata profiles are intended to be mutually exclusive within a given deployment context; they are alternatives, rather than complimentary or compatible uses of the same metadata information. Implementations SHOULD support the SAML V2.0 Metadata Extension for Entity Attributes Version 1.0 [MetaAttr] and provide policy controls on the basis of SAML attributes supplied via this extension mechanism. n/a egov Metadata Exchange CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 14 of 53
15 It is OPTIONAL for implementations to support the generation or exportation of metadata, but implementations MUST support the publication of metadata using the Well-Known-Location method defined in section 4.1 of [SAML2 Meta] (under the assumption that entityid values used are suitable for such support). The GC Credential Federation Governance Body maintains and distributes current metadata. To terminate Federation member use of non-current metadata, the GC CFGB stops distributing it. In addition, the GC CFGB may revoke a certificate in the metadata file for reasons including, but not limited to terminating a Federation member s participation, certificate compromise, and key changes. Federation members MUST submit the XML metadata document to the GC CFGB. Federation members MUST only accept XML metadata documents from the GC CFGB. Implementations MUST support the following mechanisms for the importation of metadata: local file remote resource at fixed location accessible via HTTP 1.1 [RFC2616] or HTTP 1.1 over TLS/SSL [RFC2818] In the case of HTTP resolution, implementations MUST support use of the "ETag" and "Last- Modified" headers for cache management. Implementations SHOULD support the use of more than one fixed location for the importation of metadata, but MAY leave their behavior unspecified if a single entity's metadata is present in more than one source. The GC Credential Federation Governance Body maintains and distributes current metadata as specified above. Any additional procedures will be established by the GCCFGB CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 15 of 53
16 Importation of multiple entities' metadata contained within an <md:entitiesdescriptor> element MUST be supported. Importation of multiple entities' metadata contained within an <md:entitiesdescriptor> element SHOULD be supported. The GC Credential Federation Governance Body maintains and distributes current metadata. If necessary, this distribution may be modified to allow vendor software that does not support Importation of multiple entities' metadata contained within an <md:entitiesdescriptor> element Finally, implementations SHOULD allow for the automated updating/reimportation of metadata without service degradation or interruption. egov Metadata Verification CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 16 of 53
17 Verification of metadata, if supported, MUST include XML signature verification at least at the root element level, and SHOULD support the following mechanisms for signature key trust establishment: Direct comparison against known keys. Some form of path-based certificate validation against one or more trusted certificate authorities, along with certificate revocation lists and/or OCSP [RFC2560]. for PKIX [RFC5280] is RECOMMENDED; implementations SHOULD document the behavior of the validation mechanisms they employ, particular with respect to limitations or divergence from PKIX [RFC5280]. Federation members MUST sign their metadata using the signing certificate issued by the GC ICM Service. At consumption time, the Federation member relying upon the metadata MUST check the revocation status of the certificate used to sign the metadata. o Only CRL s are supported egov 2.3 Name Identifiers CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 17 of 53
18 In conjunction with their support of the SAML V2.0 profiles referenced by subsequent sections, Identity Provider and Service Provider implementations MUST support the following SAML V2.0 name identifier formats, in accordance with the normative obligations associated with them by [SAML2Core]: Cyber-Auth Deployments MUST support persistent Cyber-AuthDeployments MUST NOT support transient urn:oasis:names:tc:saml:2.0:nameidformat:persistent urn:oasis:names:tc:saml:2.0:nameidformat:transient for other formats is OPTIONAL. Cyber-AuthDeployments MUST NOT support other formats egov 2.4 Attributes In conjunction with their support of the SAML V2.0 profiles referenced by subsequent sections, Identity Provider and Service Provider implementations MUST support the generation and consumption of <saml2:attribute> elements that conform to the SAML V2.0 X.500/LDAP Attribute Profile [SAML-X500]. Cyber-AuthDeployments MUST follow the requirements specified in Section Required Assertion Attributes CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 18 of 53
19 The ability to support <saml2:attributevalue> elements whose values are not simple strings (e.g., <saml2:nameid>, or other XML values) is OPTIONAL. Such content could be base64- encoded as an alternative. Cyber-Auth Deployments MUST follow the requirements specified in Section Required Assertion Attributes egov 2.5 Browser Single Sign-On This section defines an implementation profile of the SAML V2.0 Web Browser SSO Profile [SAML2Prof]. egov Identity Provider Discovery Service Provider and Discovery Service implementations MUST support the Identity Provider Discovery Service Protocol Profile in conformance with section of [IDPDisco]. Cyber-Auth Deployments MUST support the Identity Provider Discovery Profile specified in [SAML2 Prof] Cyber-Auth Deployments MUST NOT support the Identity Provider Discovery Service protocol Profile specified in [SAML2 Disco] egov Authentication Requests egov Binding and Security Requirements CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 19 of 53
20 Identity Provider and Service Provider implementations MUST support the use of the HTTP-Redirect binding [SAML2Bind] for the transmission of <saml2p:authnrequest> messages, including the generation or verification of signatures in conjunction with this binding. for other bindings is OPTIONAL. Cyber-Auth Deployments MUST NOT support other bindings egov Message Content In addition to standard core- and profile-driven requirements, Service Provider implementations MUST support the inclusion of at least the following <saml2p:authnrequest> child elements and attributes (when appropriate): As specified below AssertionConsumerServiceURL Cyber-Auth Deployments SHOULD NOT use AssertionConsumerServiceURL The IDP will obtain this from the metadata ProtocolBinding If present, ProtocolBinding attribute MUST be urn:oasis:names:tc:saml:2.0:bindings: HTTP-POST. CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 20 of 53
21 ForceAuthn ForceAuthn MAY be used to require the IDP to force the end user to authenticate to the IDP regardless of the end user s authentication session status at the IDP. When ForceAuthn is used, the IDP MUST ensure that the principal does not change their NameID from any previous authentication in this session even if it has expired. if ForceAuthn is used and the authentication is successful, this will reset the IDPs AuthnInstant for this principal. IsPassive IsPassive MAY be used if the SP does not wish for the IDP to take direct control of the end user s browser (i.e., show the end user a page). If IsPassive is true, the end user MUST be able to authenticate in some passive manner, otherwise the resulting response MUST NOT contain an <Assertion>. This feature allows the SP to determine whether it should alert the end user that he or she is about to interact with the IDP. An example of a passive situation is: the SP discovers through the common domain cookie that the end user may have an active session at a particular IDP. CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 21 of 53
22 AttributeConsumingServiceIndex Cyber-Auth Deployments MUST NOT specify AttributeConsumingServiceIndex. <saml2p:requestedauthncontext> The authentication request MUST include <RequestedAuthnContext> The <RequestedAuthnContext> MUST include a Level of Assurance as specified in [SAML2 Assur]. The GC Cyber-Auth LoA s are defined in Section GC Cyber-Auth Levels of Assurance. SPs MUST request a specific level of assurance with the exact comparison operator. The SP MAY request more than one level of assurance in priority order. E.g. this is useful when a level 2 is required but the SP is willing to accept a level 3 if a level 2 is not possible. CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 22 of 53
23 <saml2p:nameidpolicy> <SPNameQualifier> MAY be present o The GCCFGB may establish affiliation groups of GCCF SPs that will use a common Persistent Anonymous Identifier. In this case SPs MAY use the <SPNameQualifier> in the Authentication Request to indicate their desire for this common PAI. <NameIDPolicy> MAY contain AllowCreate attribute. o o In general, AllowCreate will be set to true so that if the end user has never used the selected IDP to access the SP, an end user identifier can be created, and SAML messages can be exchanged between the parties. However, AllowCreate set to false may be useful if the SP wishes to disable credential registration flows in the user interface at the IDP If Format is present it MUST be urn:oasis:names:tc:saml:2.0:nameidformat:persistent. CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 23 of 53
24 Identity Provider implementations MUST support all <saml2p:authnrequest> child elements and attributes defined by [SAML2Core], but MAY provide that support in the form of returning appropriate errors when confronted by particular request options. However, implementations MUST fully support the options enumerated above, and be configurable to utilize those options in a useful manner as defined by [SAML2Core]. Implementations MAY limit their support of the <saml2p:requestedauthncontext> element to the value "exact" for the Comparison attribute, but MUST otherwise support any allowable content of the element. Identity Provider implementations MUST support verification of requested AssertionConsumerServiceURL locations via comparison to <md:assertionconsumerservice> elements supplied via metadata using casesensitive string comparison. It is OPTIONAL to support other means of comparison (e.g., canonicalization or other manipulation of URL values) or alternatve verification mechanisms. Cyber-Auth Deployments MUST only support exact for the Comparison attribute. Cyber-Auth Deployments MUST NOT support other means of comparison egov Responses egov Binding and Security Requirements CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 24 of 53
25 Identity Provider and Service Provider implementations MUST support the use of the HTTP-POST and HTTP-Artifact bindings [SAML2Bind] for the transmission of <saml2p:response> messages. for other bindings, and for artifact types other than urn:oasis:names:tc:saml:2.0:artifact- 04, is OPTIONAL. Identity Provider and Service Provider implementations MUST support the generation and consumption of unsolicited <saml2p:response> messages (i.e., responses that are not the result of a <saml2p:authnrequest> message). Identity Provider implementations MUST support the issuance of <saml2p:response> messages (with appropriate status codes) in the event of an error condition, provided that the user agent remains available and an acceptable location to which to deliver the response is available. The criteria for "acceptability" of a response location are not formally specified, but are subject to Identity Provider policy and reflect its responsibility to protect users from being sent to untrusted or possibly malicious parties. Note that this is a stronger requirement than the comparable language in [SAML2Prof]. Cyber-Auth Deployments MUST support HTTP POST bindings Cyber-Auth Deployments MUST NOT support HTTP Artifact bindings Cyber-Auth Deployments MUST NOT support other bindings Cyber-Auth Deployments MUST discard unsolicited <saml2p:response> messages No Cyber-Auth use case has been identified which requires these The GCCFGB defines acceptability of a response location to mean the metadata registered <AssertionConsumerServiceURL> CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 25 of 53
26 Identity Provider and Service Provider implementations MUST support the signing of <saml2:assertion> elements in responses; support for signing of the <saml2p:response> element is OPTIONAL. Identity Provider and Service Provider implementations MUST support the use of XML Encryption via the <saml2:encryptedassertion> element when using the HTTP-POST binding; support for the <saml2:encryptedid> and <saml2:encryptedattribute> elements is OPTIONAL. egov Message Content The Web Browser SSO Profile allows responses to contain any number of assertions and statements. Identity Provider implementations MUST allow the number of <saml2:assertion>, <saml2:authnstatement>, and <saml2:attributestatement> elements in the <saml2p:response> message to be limited to one. In turn, Service Provider implementations MAY limit support to a single instance of those elements when processing <saml2p:response> messages. Cyber-Auth Deployments MUST NOT support signing of the <saml2p:response> element Cyber-Auth Deployments MUST NOT deploy OPTIONAL support Cyber-Auth Deployments MUST only send <saml2p:response> messages containing at most a single <saml2:assertion> CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 26 of 53
27 Identity Provider implementations MUST support the inclusion of a Consent attribute in <saml2p:response> messages, and a SessionIndex attribute in <saml2:authnstatement> elements. Service Provider implementations that provide some form of session semantics MUST support the <saml2:authnstatement> element's SessionNotOnOrAfter attribute. Service Provider implementations MUST support the acceptance/rejection of assertions based on the content of the <saml2:authnstatement> element's <saml2:authncontext> element. Implementations also MUST support the acceptance/rejection of particular <saml2:authncontext> content based on the identity of the Identity Provider. [IAP] provides one such mechanism via SAML V2.0 metadata and is RECOMMENDED; though this specification is in draft form, the technical details are not expected to change prior to eventual approval. Cyber-Auth IDP Deployments MUST NOT include a Consent attribute in <saml2p:response> messages No Cyber-Auth use case has been identified which requires this. See section 2.2 for constraints on Cyber-Auth IDP deployments egov Artifact Resolution CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 27 of 53
28 Pursuant to the requirement in section for support of the HTTP-Artifact binding [SAML2Bind] for the transmission of <saml2p:response> messages, implementations MUST support the SAML V2.0 Artifact Resolution profile [SAML2Prof] as constrained by the following subsections. egov Artifact Resolution Requests Identity Provider and Service Provider implementations MUST support the use of the SAML SOAP (using HTTP as a transport) binding [SAML2Bind] for the transmission of <saml2p:artifactresolve> messages. Implementations MUST support the use of SAML message signatures and TLS server authentication to authenticate requests; support for TLS client authentication, or other forms of authentication in conjunction with the SAML SOAP binding, is OPTIONAL. egov Artifact Resolution Responses Identity Provider and Service Provider implementations MUST support the use of the SAML SOAP (using HTTP as a transport) binding [SAML2Bind] for the transmission of <saml2p:artifactresponse> messages. n/a n/a n/a Cyber-Auth deployments MUST NOT support the HTTP-Artifact binding CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 28 of 53
29 Implementations MUST support the use of SAML message signatures and TLS server authentication to authenticate responses; support for TLS client authentication, or other forms of authentication in conjunction with the SAML SOAP binding, is OPTIONAL. n/a egov 2.6 On Browser Holder of Key Single Sign- This section defines an implementation profile of the SAML V2.0 Holder-of-Key Web Browser SSO Profile Version 1.0 [HoKSSO]. Cyber-Auth Deployments MUST NOT support The implementation requirements defined in section 2.5 for the non-holder-of-key profile apply to implementations of this profile. n/a egov 2.7 SAML 2.0 Proxying Section of [SAML2Core] defines a formalized approach to proxying the SAML 2.0 Authentication Request protocol between multiple Identity Providers. This section defines an implementation profile for this behavior suitable for composition with the Single Sign-On profiles defined in sections 2.5 and 2.6. Cyber-Auth Deployments MUST support when configured to operate as a Proxying IDP CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 29 of 53
30 The requirements of the profile are imposed on Identity Provider implementations acting as a proxy. These requirements are in addition to the technical requirements outlined in section of [SAML2Core], which also MUST be supported. Cyber-Auth Deployments MUST support when configured to operate as a Proxying IDP egov Authentication Requests Proxying Identity Provider implementations MUST support the mapping of incoming to outgoing <saml2p:requestedauthncontext> and <saml2p:nameidpolicy> elements, such that deployers may choose to pass through values or map between different vocabularies as required. Proxying Identity Provider implementations MUST support the suppression/eliding of <saml2p:requesterid> elements from outgoing <saml2p:authnrequest> messages to allow for hiding the identity of the Service Provider from proxied Identity Providers. Cyber-Auth Deployments MUST support when configured to operate as a Proxying IDP Cyber-Auth Deployments MUST support when configured to operate as a Proxying IDP egov Responses Proxying Identity Provider implementations MUST support the mapping of incoming to outgoing <saml2:authncontext> elements, such that deployers may choose to pass through values or map between different vocabularies as required. Cyber-Auth Deployments MUST support when configured to operate as a Proxying IDP CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 30 of 53
31 Proxying Identity Provider implementations MUST support the suppression of <saml2:authenticatingauthority> elements from outgoing <saml2:authncontext> elements to allow for hiding the identity of the proxied Identity Provider from Service Providers. Cyber-Auth Deployments MUST support when configured to operate as a Proxying IDP egov 2.8 Single Logout This section defines an implementation profile of the SAML V2.0 Single Logout Profile [SAML2Prof]. For clarification, the technical requirements for each message type below reflect the intent to normatively require initiation of logout by a Service Provider using either the front- or backchannel, and initiation/propagation of logout by an Identity Provider using the back-channel. egov Logout Requests egov Binding and Security Requirements Identity Provider implementations MUST support the SAML SOAP (using HTTP as a transport) binding [SAML2Bind] for the issuance of <saml2p:logoutrequest> messages, and MUST support the SAML SOAP (using HTTP as a transport) and HTTP-Redirect bindings [SAML2Bind] for the reception of <saml2p:logoutrequest> messages. CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 31 of 53
32 Service Provider implementations MUST support the SAML SOAP (using HTTP as a transport) binding [SAML2Bind] for both issuance and reception of <saml2p:logoutrequest> messages. for other bindings is OPTIONAL. Cyber-Auth SP deployments MAY support HTTP Redirect bindings for issuance of <saml2p:logoutrequest> messages No other bindings are supported Implementations MUST support the use of SAML message signatures and TLS server authentication to authenticate <saml2p:logoutrequest> messages; support for TLS client authentication, or other forms of authentication in conjunction with the SAML SOAP binding, is OPTIONAL. Identity Provider and Service Provider implementations MUST support the use of XML Encryption via the <saml2:encryptedid> element when using the HTTP-Redirect binding. egov User Interface Behavior Cyber-Auth Deployments MUST follow the requirements specified in Section Security CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 32 of 53
33 Identity Provider implementations MUST support both user-initiated termination of the local session only and user-initiated Single Logout. Upon receipt of a <saml2p:logoutrequest> message via a front-channel binding, Identity Provider implementations MUST support user intervention governing the choice of propagating logout to other Service Providers, or limiting the operation to the Identity Provider. Of course, implementations MUST return status information to the requesting entity (e.g. partial logout indication) as appropriate. Service Provider implementations MUST support both user-initiated termination of the local session only and user-initiated Single Logout. Identity Provider implementations MUST also support the administrative initiation of Single Logout for any active session, subject to appropriate policy. Cyber-Auth deployments MUST NOT deploy support for user intervention governing the choice of propagating logout to other SPs, or limiting the operation to the Identity Provider. At all times, a Single Logout Request will generate a global logout for the principal s session. Cyber-Auth SP deployments MAY only deploy support for Single Logout (i.e. global logout). Cyber-Auth IDP deployments MUST propagate the logout without user intervention to all SPs involved in the session and respond to the originating SP. The GCCFGB will specify, for each Cyber-Auth IDP deployment, what, if any, support for administrative initiation of Single Logout is required. egov Logout Responses egov Binding and Security Requirements CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 33 of 53
34 Identity Provider implementations MUST support the SAML SOAP (using HTTP as a transport) and HTTP-Redirect bindings [SAML2Bind] for the issuance of <saml2p:logoutresponse> messages, and MUST support the SAML SOAP (using HTTP as a transport) binding [SAML2Bind] for the reception of <saml2p:logoutresponse> messages. Service Provider implementations MUST support the SAML SOAP (using HTTP as a transport) binding [SAML2 Bind] for both issuance and reception of <saml2p:logoutresponse> messages. Note: HTTP Redirect bindings for issuance of <saml2p:logoutresponse> messages are deprecated and SHOULD ONLY be used if the <saml2p:logoutrequest> message was sent using this binding. for other bindings is OPTIONAL. Cyber-Auth Deployments MUST NOT deploy OPTIONAL support Implementations MUST support the use of SAML message signatures and TLS server authentication to authenticate <saml2p:logoutresponse> messages; support for TLS client authentication, or other forms of authentication in conjunction with the SAML SOAP binding, is OPTIONAL. egov 3 Conformance Classes Cyber-Auth Deployments MUST NOT deploy OPTIONAL support egov 3.1 Standard CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 34 of 53
35 Conforming Identity Provider and/or Service Provider implementations MUST support the normative requirements in sections 2.2, 2.3, 2.4, and 2.5. egov Algorithms Signature and Encryption Implementations MUST support the signature and digest algorithms identified by the following URIs in conjunction with the creation and verification of XML Signatures [XMLSig]: (defined in [RFC4051]) (defined in [XMLEnc]) Implementations SHOULD support the signature and digest algorithms identified by the following URIs in conjunction with the creation and verification of XML Signatures [XMLSig]: (defined in [RFC4051]) This requirement extends to the algorithms used for signing URL-encoded SAML messages as described in section of [SAML-Bindings] CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 35 of 53
36 Implementations MUST support the block encryption algorithms identified by the following URIs in conjunction with the use of XML Encryption [XMLEnc]: Implementations MUST support the key transport algorithms identified by the following URIs in conjunction with the use of XML Encryption [XMLEnc]: Algorithms used MUST be CSEC Approved Cryptographic Algorithms for Electronic Authentication and Authorization Applications as documented in ITSA (current revision) There are no current GC use cases which require this. CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 36 of 53
37 Implementations SHOULD support the key agreement algorithms identified by the following URIs in conjunction with the use of XML Encryption [XMLEnc]: defined in [XMLEnc11]) (This is a Last Call Working Draft of XML Encryption 1.1, and this normative requirement is contingent on W3C ratification of this specification without normative changes to this algorithm's definition.) Algorithms used MUST be CSEC Approved Cryptographic Algorithms for Electronic Authentication and Authorization Applications as documented in ITSA (current revision) for other algorithms is OPTIONAL. CA Deployments MUST NOT support other algorithms. egov 3.2 Standard with Logout Conforming Identity Provider and/or Service Provider implementations MUST meet the conformance requirements in section 3.1, and MUST in addition support the normative requirements in section 2.8. See section 2.8 above egov 3.3 Full CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 37 of 53
38 Conforming Identity Provider and/or Service Provider implementations MUST meet the conformance requirements in section 3.1, and MUST in addition support the normative requirements in sections 2.6, 2.7, and 2.8. Cyber-Auth deployments MUST NOT be configured to meet section 2.6 Cyber-Auth deployments MUST be configured to meet section 2.7 when configured to operate as a Proxying IDP End of table CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 38 of 53
39 2.2 Additional Constraints on the [SAML2 *] specifications In addition to the constraints imposed by this deployment profile on the Profile [] published by the Kantara Initiative, this Cyber-Auth deployment requirements document also imposes some additional constraints on the underlying SAML 2.0 specifications published by the Security Services Technical Committee (SSTC) of OASIS. SAML2 * [SAML2 Core ] Section 2.7.2, Line 1061 <SessionNotOnOrAfter> Cyber-Auth IDP deployments SHOULD NOT specify the SessionNotOnOrAfter attribute. This allows the SP to choose its own required duration for its security context. If a GCCF IDP is unable to configure this value to not be sent, then it MUST set this value to a high value as determined by the GCCFGB. [SAML2 Core] Section 3.2.1, Line 1489 <saml:issuer> [SAML2 Core ] Section 3.4.1, Line 2017 <saml:subject> SP Authentication Request <saml:issuer> MUST be present MUST be the entity_id assigned by the GCCFGB. SP Authentication Request <saml:subject> MUST NOT be included. no Cyber-Auth use cases require the <saml:subject> element CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 39 of 53
40 [SAML2 Core ] Section 3.4.1, Line 2029 <saml:conditions> [SAML2 Core] Section 3.4.1, Line 2068 ProtocolBinding SAML2 * [SAML2 Core] Section 3.6.1, Line 2421 <ManageNameIDRequest> SP Authentication Request <saml:conditions> MUST NOT be included. no Cyber-Auth use cases require the <saml:conditions> element SP Authentication Request ProtocolBinding MAY be used If ProtocolBinding is present it MUST be urn:oasis:names:tc:saml:2.0:bindings:http- POST IDP deployments MUST send in a timely manner a <ManageNameIDRequest> with <Terminate> for a credential that has been revoked to any SP that has an endpoint defined for the <ManageNameIDService> and for which it has previously sent an assertion for the principal. IDP deployments MUST NOT send any other <ManageNameIDRequest> messages. SP deployments MUST respond to <ManageNameIDRequest> messages [SAML2 Bind] Section 3.5.3, Line 785 <RelayState> <RelayState> MAY NOT be included in a response message unless it has been provided in a corresponding request message. CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 40 of 53
41 SAML2 * [SAML2 Assur] Section 3, Line 276 <assurance-certification> [SAML2 Meta] Section 2.3.2, Line 371 <entityid> Metadata for Cyber-Auth IDPs MUST specify the supported Level(s) of Assurance in the <assurance-certification> attribute as defined in [SAML2 Assur], Section 3 Identity Assurance Certification Attribute Profile The URI values to be used for the 4 levels of Assurance are defined in Section GC Cyber- Auth Levels of Assurance. Multiple LoA values MAY be specified in the IDP s Metadata but only a single value is returned in an authentication response. <entityid> MUST be agreed upon by the entity and the GCCFGB [SAML2 Meta] Section , Line 443 <Organization> [SAML2 Meta] Section , Line 476 <ContactPerson> It is RECOMMENDED that <Organization> be present and include either OrganizationName or OrganizationDisplayName. <ContactPerson> is RECOMMENDED Cyber-Auth suggests including include either Address or TelephoneNumber [SAML2 Meta] Section 2.4.1, Line 550 <RoleDescriptor> Metadata element <RoleDescriptor> MUST NOT be used CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 41 of 53
42 SAML2 * [SAML2 Meta] Section 2.4.3, Line 683 <IDPSSODescriptor> including Section 2.4.2, Line 643 <SSODescriptorType> WantAuthnRequestsSigned MUST be set to true. Exactly two instances of <SingleLogoutService> MUST be present (one for each of the Bindings: SOAP and HTTP Redirect) Exactly one <SingleSignOnService> MUST be present. Exactly one < ManageNameIDService> MUST be present to receive responses to NameID termination messages. The binding MUST be set to urn:oasis:names:tc:saml:2.0:bindings:soap. CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 42 of 53
43 SAML2 * [SAML2 Meta] Section 2.4.4, Line 736 <SPSSODescriptor> including Section 2.4.2, Line 643 <SSODescriptorType> AuthnRequestsSigned MUST be set to true. WantAssertionsSigned MUST be set to true. <AssertionConsumerService> MUST be included Exactly one <AssertionConsumerService> MUST have the Binding set to urn:oasis:names:tc:saml:2.0:bindings:http- POST. Exactly one < ManageNameIDService> MAY be present to communicate the desire to receive NameID termination messages from IDPs. The binding MUST be set to urn:oasis:names:tc:saml:2.0:bindings:soap. [SAML2 Meta] Section 2.4.5, Line 828 <AuthnAuthorityDescriptor> <AuthnAuthorityDescriptor> MUST NOT be used [SAML2 Meta] Section 2.4.6, Line 861 <PDPDescriptor> <PDPDescriptor> MUST NOT be used CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 43 of 53
44 SAML2 * [SAML2 Meta] Section 2.5, Line 938 <AffiliationDescriptor> <AffiliationDescriptor> MAY be used The GCCFGB may establish affiliation groups of GCCF SPs that will use a common Persistent Anonymous Identifier. In this case the GCCFGB will supply metadata defining these groups. [SAML2 MetaUI] Section <md:uiinfo> End of table SP metadata MAY include the elements <mdui:displayname> and <mdui:logo> The IDP MAY use these metadata elements to inform the user about the entity requesting an authentication during the associated authentication dialogue. 2.3 Additional Extensions relative to the [SAML2 *] specifications In addition to the constraints imposed by this deployment profile on the Profile [] published by the Kantara Initiative, this Cyber-Auth deployment requirements document also extends the underlying SAML 2.0 specifications published by the Security Services Technical Committee (SSTC) of OASIS. None defined SAML2 * CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 44 of 53
45 SAML2 * End of table 2.4 Other GC Requirements In addition to the constraints imposed by this deployment profile on the Profile [] published by the Kantara Initiative, and the additional constraints and extensions on the underlying SAML 2.0 specifications published by the Security Services Technical Committee (SSTC) of OASIS, this Cyber-Auth Deployment Requirements document also imposes some additional requirements for the GC s Cyber-Auth environment Required Assertion Attributes Cyber-Auth Requirement [SAML2 Core] Section 2.7.3, Line 1165 <AttributeStatement> [SAML2 Core] Section 2.7.3, Line 1165 <AttributeStatement> [SAML2 Core] Section 2.7.3, Line 1165 <AttributeStatement> End of table Extended Extended Cyber-Auth SP and IDP Deployments MUST support Cyber-Auth mandatory attributes: As defined in Mandatory Attributes Cyber-Auth IDP Deployments MAY support Cyber- Auth optional attributes: As defined in Optional Attributes Cyber-Auth SP Deployments SHALL NOT support receiving any other attributes A Cyber-Auth SP Deployment MUST discard any other attributes and not use the attribute values for any processing. CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 45 of 53
46 Mandatory Attributes Name (URI) Description Format Datatype End of table The version of the interface specification MUST be 2.0 for this interface specification [CATS2 IA&S] xs:string Optional Attributes Name (URI) Description Format Datatype ca:gc:cyberauthentication:basic:specver ca:gc:cyberauthentication:basic:assurancelevel urn:oid: End of table Deprecated: only included for transition from version 1 of [CATS1 IA&S] The confidence level of the end authentication mechanism Deprecated: only included for transition from version 1 of [CATS1 IA&S] The end user s preferred language (it is expected that this will be set when the end user changes their language preference during interaction with the IDP) MUST be one of 1, 2, 3, 4, or test MUST conform to the definition of the Accept-Language header field defined in [RFC2068] with one exception: the sequence "Accept-Language" ":" # should be omitted. xs:string xs:string CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 46 of 53
47 2.4.2 GC Cyber-Auth Levels of Assurance Authentication Requests and Responses for the GC Cyber-Auth credentials will carry the required GC Level of Assurance. There are 4 Levels of Assurance that are defined in [ITSG-31] and used by the GC Cyber-Auth Program. The URI s representing these GC LoAs have the following values: The schemas corresponding to these values are available from the GCCFGB Communicating Language Preferences To meet the GC s Policy requirements, a method was required to send the user's (not the browser's) current language preference from the SP to the IDP and from the IDP to the SP in all cases, even when authentication fails and an assertion is not produced. Cyber-Auth will do this by utilizing a session cookie in a Common Domain defined by the GCCFGB (which may be the same domain established for the IDP Discovery Profile). This session cookie will carry the language attribute, the values of which are defined in [RFC 1766]. Acceptable values for the Cyber- Auth language attribute include: en fr Both SPs and IDPs MUST read this cookie and use this language setting in any user interface pages which are displayed. Both SPs and IDPs MUST ensure this cookie is set to the user s current language preference prior to issuing a message on an HTTP- Redirect or an HTTP-Post binding. Since it is expected that this GC Language Cookie will be used whether or not the user is within an authentication request/response scenario, it should be updated at the earliest possible time. Details of the GC Language Cookie in the Common Domain are provided in an annex to this document. CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 47 of 53
48 2.4.4 Name Identifier Management Protocol A number of GC Departments require notification in the event of a credential revocation. To support this capability, [CATS2 IA&S] adds support for the SAML Name Identifier Management Protocol (and Profile). SPs specify their desire for receiving these messages by adding a <ManageNameIDService> element to their SPSSODescriptor in the SP s Metadata. IDPs MUST send a <ManageNameIDRequest> to notify SPs in the event that a NameID previously sent to the SP has been revoked at the IdP. IDPs MUST send these NameID termination messages to SPs for whom they have previously sent assertions for the same principal and SHOULD NOT send these NameID termination messages to other SPs. The messages are sent on the back-channel and SHOULD be sent in a timely manner that is approved by the GCCFGB. To support this IDPs MUST add a <ManageNameIDService> element to their IDPSSODescriptor in the IDP s Metadata. CATS2 makes use of Persistent Anonymous Identifiers (PAIs) which are SAML Persistent Identifiers [SAML2 Core, 3.7] and [SAML2 Errata, E78]. This requires IDPs to maintain " a persistent opaque identifier for a principal..." and A given value, once associated with a principal, MUST NOT be assigned to a different principal at any time in the future Security To establish trust and secure communications this interface specification relies heavily on X.509v3 cryptographic key pairs. This section outlines the different certificates that are required as well as specifics on their use The GC ICM Service Certificates The GC Internal Credential Management Service (GC ICM), operated by PWGSC on behalf of the GC, provides trust and security to the GC Credential Federation. Possession of valid certificates issued by the GC ICM Service is required for interoperation in the GC Credential Federation. The GC ICM Service issues three certificates to each SP (one used for TLS, one used for digital signature and one used for encryption), and two certificates to each IDP (one used for TLS and one used for digital signature). These certificates MUST be maintained in compliance with the Subscriber responsibilities (as specified by the GC CFGB) Digital Signature All SAML messages, or parts thereof, MUST be signed by the sender using the GC ICM Service signature certificate that was issued to them. The signature allows the recipient of the message to authenticate the sender, and confirm that the message has not been altered since the time of signature. CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 48 of 53
49 The recipient MUST authenticate the sender and verify the signature upon receipt of the message. The recipient MUST verify the revocation status of the sender certificate used to sign the message. Federation member systems MUST use the following method for revocation verification: CRL the CRL location (in the directory or web site) can be statically configured into the software, and CRL downloaded periodically. See GC ICM documentation (available from GCCFGB) for details regarding distinguished name location and directory hostname. If certificate revocation status cannot be determined, the Federation member system MUST reject the message Encryption Encryption ensures that only the intended recipient can decipher the message and gain access to confidential information. All confidential information in a SAML message MUST be encrypted. Encryption MUST use the public key of the intended recipient s GC ICM-issued encryption certificate TLS web sites For Front-Channel Bindings This interface specification specifies front-channel bindings using HTTP over TLS (HTTPS) to transport messages. Any site managed by a Federation member and using HTTP bindings over TLS MUST secure the TLS session by using a certificate trusted by default by commercially available browsers. Use of SSLv3.0/TLS MUST be compliant with CSE guidelines (e.g., ITSA-11G) and departmental policies. HTTPS over TLS (v1.1 or higher) MUST be used unless not supported by the browser HTTPS over TLS (v1.0) MAY be used HTTPS over SSL (v3.0 or higher) MAY be used only if TLS (v1.0 or higher) is not supported by the browser. Earlier versions of SSL MUST NOT be used For Back-Channel Bindings This interface specification specifies back-channel bindings using SOAP over TLS to transport messages. CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 49 of 53
50 Any site managed by a Federation member and using SOAP Bindings over TLS MUST secure the TLS session by using a certificate issued by the GC ICM. Use of SSLv3.0/TLS MUST be compliant with CSE guidelines (e.g., ITSA-11G) and departmental policies. TLS (v1.1 or higher) MUST be used Earlier versions of TLS or SSL MUST NOT be used Exception Handling Cyber-Auth Interface The Cyber-Auth member SAML service MUST handle error conditions gracefully Specifically, the Cyber-Auth member SAML service MUST handle the list of possible errors provided in Errors to be handled Errors to be handled The following table lists errors that the Federation member SAML service MUST handle gracefully (i.e. in a controlled user-friendly manner as per the ability of the IDP or SP to respond). The table categorizes errors by SAML event. Error Condition Error Processing <Response> Incorrect/Unknown <Issuer> Incorrect Version Unrecognized InResponseTo Unacceptable IssueInstant Status not Success CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 50 of 53
51 Error Processing <Assertion> Signature Invalid Signature Certificate Revoked Cannot determine revocation status <Assertion> Time Invalid Cannot Decrypt <Assertion> Incorrect Recipient Incorrect Version Error Processing <AuthnRequest> Unknown <Issuer> Signature Invalid Signature Certificate Revoked Cannot determine revocation status Error processing SLO Request Unknown <Issuer> Signature Invalid Signature Certificate Revoked Cannot determine revocation status Error processing SLO <Response> Unknown <Issuer> Signature Invalid Unknown status Signature Certificate Revoked Cannot determine revocation status CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 51 of 53
52 Appendix A: Additional Functions Beyond Cyber-Auth (Normative) A.1. GC Language Cookie This Appendix defines a method by which an SP or a IDP can discover which language the principal is currently using. This method relies on a cookie that is written in a domain that is common between IDPs and SPs in the GCCF deployment. This domain is established by the GCCFGB and may be the same as the Common Domain used for the IDP Discovery Profile and is known as the <common-domain> in this profile, and the cookie containing the last language in use is known as the GC Language Cookie. In the GCCF, both SP and IDP entities are required to host web servers in the common domain as defined by the GCCFGB. A.1.1 GC Language Cookie is in a Common GC Domain The name of the cookie MUST be "_gc_lang". The format of the cookie value MUST be a single valued text string. The common domain cookie writing service (see below) SHOULD update the language value whenever the user indicates a different language preference. The intent is that the most recently established language is the one in the cookie. The values of the GC language cookie are defined in [RFC 1766]. Acceptable values for the GC Language Cookie include: en fr The cookie MUST be set with a Path prefix of "/". The Domain MUST be set to ".<commongc-domain>" where <common-gc-domain> is the common gc domain established by the GCCFGB for use with this method (it may also be used with the IDP Discovery Profile). There MUST be a leading period. The cookie MUST be marked as secure. Cookie syntax should be in accordance with IETF RFC The cookie MUST be sessiononly. A.1.2 Obtaining the GC Language Cookie Prior to presenting an authentication dialogue to the principal, a IDP MUST know which language the principal desires communication in. To do this, the IDP MUST invoke an exchange designed to present the GC Language Cookie to the IDP after it is read by an HTTP server in the common domain. The specific means by which the service provider reads the cookie are implementation-specific so long as it is able to cause the user agent to present cookies that have been set with the appropriate parameters. One possible implementation strategy is described as follows and should be considered non-normative. Additionally, it may be sub-optimal for some applications. Have previously established a DNS and IP alias for itself in the common domain. Redirect the user agent to itself using the DNS alias using a URL specifying "https" as the URL CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 52 of 53
53 scheme. The structure of the URL is private to the implementation and may include session information needed to identify the user agent. Redirect the user agent back to itself. A.1.3 Setting the GC Language Cookie Prior to invoking an Authentication Request, an SP MUST ensure the GC Language Cookie is set to the principal s preferred language. Prior to sending an Authentication Response (including error responses), an IDP MUST ensure the GC Language Cookie is set to the principal s preferred language. At any time that the principal chooses to change their language, the SP or the IDP MAY set the GC Language cookie. The means by which the SP or IDP sets the cookie are implementation-specific so long as the cookie is successfully set with the parameters given above. One possible implementation strategy follows and should be considered non-normative. The SP or IDP may: Have previously established a DNS and IP alias for itself in the common domain. Redirect the user agent to itself using the DNS alias using a URL specifying "https" as the URL scheme. The structure of the URL is private to the implementation and may include session information needed to identify the user agent. Set the cookie on the redirected user agent using the parameters specified above. Redirect the user agent back to itself. CA - V2.0 Final r7.2_en.doc 25 March, :53 Page 53 of 53
Kantara egov and SAML2int comparison
Kantara egov and SAML2int comparison 17.8.2010/[email protected] This document compares the egovernment Implementation profile of SAML 2.0, created by the egovernment WG of Kantara Initiative, and the
SAML 2.0 protocol deployment profile
SAML 2.0 protocol deployment profile FOR THE FINNISH PUBLIC SECTOR Version Date Changes 1.0 8.12.2010 Implementation by Ubisecure Solutions, Fujitsu Services and CSC IT Center for Science. Approved by
SAML 2.0 INT SSO Deployment Profile
1 2 3 4 5 6 SAML 2.0 INT 7 8 9 Version: 0.1 Date: 2011-12-2 10 Editor: TBD 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Contributors: The full list of contributors can be referenced here: URL Status: This
Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0
1 2 3 4 5 6 7 8 9 10 11 Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0 Version 3.2.2 Editor: Kyle Meadors, Drummond Group Inc. Abstract: This document describes the test steps to
Federal Identity, Credentialing, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile
Federal Identity, Credentialing, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile Version 1.0.2 December 16, 2011 Document History Status Release
OIO Web SSO Profile V2.0.5
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Federal Identity, Credential, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile
Federal Identity, Credential, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile Version 1.0 September 27, 2010 Document History This is the first
E-Authentication Federation Adopted Schemes
E-Authentication Federation Adopted Schemes Version 1.0.0 Final May 4, 2007 Document History Status Release Date Comment Audience Template 0.0.0 1/18/06 Outline PMO Draft 0.0.1 1/19/07 Initial draft Internal
Identity Assurance Hub Service SAML 2.0 Profile v1.2a
1 2 3 4 Identity Assurance Hub Service SAML 2.0 Profile v1.2a Identity Assurance Programme, 07 August 2015 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Document identifier: IDAP/HubService/Profiles/SAML Editors:
Revised edition. OIO Web SSO Profile V2.0.9 (also known as OIOSAML 2.0.9) Includes errata and minor clarifications
OIO Web SSO Profile V2.0.9 (also known as OIOSAML 2.0.9) Revised edition Includes errata and minor clarifications Danish Agency for Digitisation September 2012 Contents > 1 Introduction 8 1.1 Referenced
Revised edition. OIO Web SSO Profile V2.0.8 (also known as OIOSAML 2.0.8) Includes errata and minor clarifications
OIO Web SSO Profile V2.0.8 (also known as OIOSAML 2.0.8) Revised edition Includes errata and minor clarifications Danish Agency for Digitisation December 2011 Contents > 1 Introduction 8 1.1 Referenced
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
National Identity Exchange Federation. Web Browser User-to-System Profile. Version 1.0
National Identity Exchange Federation Web Browser User-to-System Profile Version 1.0 August 18, 2014 Table of Contents TABLE OF CONTENTS 1 1. TARGET AUDIENCE AND PURPOSE 2 2. TERMINOLOGY 2 3. REFERENCES
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
Certification Final Report SAML 2.0 Interoperability Test First Quarter 2011 (1Q11) March 31, 2011
Certification Final Report SAML 2.0 Interoperability Test First Quarter 2011 (1Q11) March 31, 2011 Prepared & Administered by: DRUMMOND GROUP INC. www.drummondgroup.com Copyright Drummond Group Inc. 2011
Appendix 1 Technical Requirements
1 av 13 Appendix 1 Technical Requirements Version 2.4.7 Technical requirements for membership in the Skolfederation The Skolfederation has, like many other federation initiatives, the goal to use the following
Securing Web Services With SAML
Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion
Feide Integration Guide. Technical Requisites
Feide Integration Guide Technical Requisites Document History Version Date Author Comments 1.1 Apr 2015 Jaime Pérez Allow the use of the HTTP-POST binding. 1.0 Oct 2014 Jaime Pérez First version of this
SAML 2.0 Interoperability Testing Procedures
1 2 3 4 5 6 7 8 9 10 11 Version 2.0 7 July 2006 Editors: Eric Tiffany, Contributors: Greg Whitehead, Hewlett-Packard Sampo Kellomäki, Symlabs Nick Ragouzis, Enosis Abstract: 12 13 14 15 16 17 18 19 20
IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0
International Virtual Observatory Alliance IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 IVOA Proposed Recommendation 20151029 Working group http://www.ivoa.net/twiki/bin/view/ivoa/ivoagridandwebservices
GFIPM Web Browser User-to-System Profile Version 1.2
About the Document Justice organizations are looking for ways to provide secured access to multiple agency information systems with a single logon. The Global Federated Identity and Privilege Management
Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0 OASIS Standard,
RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0
Forum RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0 Copyright 2007-2014, The CA / Browser Forum, all rights reserved. Verbatim copying and distribution
SAML Federated Identity at OASIS
International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for
IAM Application Integration Guide
IAM Application Integration Guide Date 03/02/2015 Version 0.1 DOCUMENT INFORMATIE Document Title IAM Application Integration Guide File Name IAM_Application_Integration_Guide_v0.1_SBO.docx Subject Document
The Vetuma Service of the Finnish Public Administration SAML interface specification Version: 3.5
The Vetuma Service of the Finnish Public Administration SAML interface specification Version: 3.5 Vetuma Authentication and Payment Table of Contents 1. Introduction... 3 2. The General Features of the
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
Portalverbundprotokoll Version 2. S-Profil. Konvention PVP2-S-Profil 2.1.0. Ergebnis der AG
Portalverbundprotokoll Version 2 S-Profil Konvention PVP2-S-Profil 2.1.0 Ergebnis der AG Kurzbeschreibung Das S-Profil von PVP2 verwendet SAML WebSSO für die Authentifizierung von Benutzern mit Webbrowser.
SAML Implementation Guidelines
1 2 3 4 SAML Implementation Guidelines Working Draft 01, 27 August 2004 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 Document identifier: sstc-saml-implementation-guidelines-draft-01 Location:
Extending DigiD to the Private Sector (DigiD-2)
TECHNISCHE UNIVERSITEIT EINDHOVEN Department of Mathematics and Computer Science MASTER S THESIS Extending DigiD to the Private Sector (DigiD-2) By Giorgi Moniava Supervisors: Eric Verheul (RU, PwC) L.A.M.
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN 1 Venkadesh.M M.tech, Dr.A.Chandra Sekar M.E., Ph.d MISTE 2 1 ResearchScholar, Bharath University, Chennai 73, India. [email protected] 2 Professor-CSC
SAML Authentication Quick Start Guide
SAML Authentication Quick Start Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved.
Federal Identity, Credential, and Access Management Trust Framework Solutions. Relying Party Guidance For Accepting Externally-Issued Credentials
Federal Identity, Credential, and Access Management Trust Framework Solutions Relying Party Guidance For Accepting Externally-Issued Credentials Version 1.1.0 Questions? Contact the FICAM TFS Program Manager
OIO SAML Profile for Identity Tokens
> OIO SAML Profile for Identity Tokens Version 1.0 IT- & Telestyrelsen October 2009 Content > Document History 3 Introduction 4 Related profiles 4 Profile Requirements 6 Requirements 6
SAML Single-Sign-On (SSO)
C O L A B O R A T I V E I N N O V A T I O N M A N A G E M E N T Complete Feature Guide SAML Single-Sign-On (SSO) 1. Features This feature allows administrators to setup Single Sign-on (SSO) integration
TIB 2.0 Administration Functions Overview
TIB 2.0 Administration Functions Overview Table of Contents 1. INTRODUCTION 4 1.1. Purpose/Background 4 1.2. Definitions, Acronyms and Abbreviations 4 2. OVERVIEW 5 2.1. Overall Process Map 5 3. ADMINISTRATOR
IBM WebSphere Application Server
IBM WebSphere Application Server SAML 2.0 web single-sign-on 2012 IBM Corporation This presentation describes support for SAML 2.0 web browser Single Sign On profile included in IBM WebSphere Application
Lecture Notes for Advanced Web Security 2015
Lecture Notes for Advanced Web Security 2015 Part 6 Web Based Single Sign-On and Access Control Martin Hell 1 Introduction Letting users use information from one website on another website can in many
SAML Authentication within Secret Server
SAML Authentication within Secret Server Secret Server allows the use of SAML Identity Provider (IdP) authentication instead of the normal authentication process for single sign-on (SSO). To do this, Secret
IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
Security Assertion Markup Language (SAML) V2.0 Technical Overview
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 Security Assertion Markup Language (SAML) V2.0 Technical Overview Committee Draft 02 25 March 2008
HTTP State Management
HTTP State Management Candidate Version 1.1 27 Feb 2007 Open Mobile Alliance OMA-TS-HTTPSM-V1_1-20070227-C OMA-TS-HTTPSM-V1_1-20070227-C Page 2 (17) Use of this document is subject to all of the terms
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
SAML V2.0 Asynchronous Single Logout Profile Extension Version 1.0
SAML V2.0 Asynchronous Single Logout Profile Extension Version 1.0 Committee Specification 01 22 November 2012 Specification URIs This version: http://docs.oasis-open.org/security/saml/post2.0/saml-async-slo/v1.0/cs01/saml-async-slo-v1.0-
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
Feide Technical Guide. Technical details for integrating a service into Feide
Feide Technical Guide Technical details for integrating a service into Feide May 2015 Document History Version Date Initials Comments 1.0 Nov 2009 TG First issue 1.2 Nov 2009 TG Added SLO description 1.3
Security Assertion Markup Language (SAML) V2.0 Technical Overview
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 Security Assertion Markup Language (SAML) V2.0 Technical Overview Working Draft 10, 9 October 2006 Document
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014
Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent
Secure Semantic Web Service Using SAML
Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA
An Oracle White Paper August 2010. Oracle OpenSSO Fedlet
An Oracle White Paper August 2010 Oracle OpenSSO Fedlet Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
Software Design Document SAMLv2 IDP Proxying
Software Design Document SAMLv2 IDP Proxying Federation Manager 7.5 Version 0.2 Please send comments to: [email protected] This document is subject to the following license: COMMON DEVELOPMENT AND
OIOSAML Rich Client to Browser Scenario Version 1.0
> OIOSAML Rich Client to Browser Scenario Version 1.0 Danish Agency for Digitization December 2011 Contents > 1 Introduction 4 1.1 Purpose 1.2 Background 4 4 2 Goals and Assumptions 5 3 Scenario Details
igovt logon service Context Mapping Service (icms) Messaging Specification Release 9.6
igovt logon service Context Mapping Service (icms) Messaging Specification Release 9.6 Subject Client Author Context Mapping Service Messaging Specification for the igovt logon service The Department of
PARTNER INTEGRATION GUIDE. Edition 1.0
PARTNER INTEGRATION GUIDE Edition 1.0 Last Revised December 11, 2014 Overview This document provides standards and guidance for USAA partners when considering integration with USAA. It is an overview of
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
A Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
OSOR.eu eid/pki/esignature Community Workshop in Brussels, 13. November 2008 IT Architect Søren Peter Nielsen - [email protected]
The OIOSAML Toolkits Accelerating a common egov infrastructure using open source reference implementations OSOR.eu eid/pki/esignature Community Workshop in Brussels, 13. November 2008 IT Infrastructure
Spring Security SAML module
Spring Security SAML module Author: Vladimir Schäfer E-mail: [email protected] Copyright 2009 The package contains the implementation of SAML v2.0 support for Spring Security framework. Following
WebLogic Server 7.0 Single Sign-On: An Overview
WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
TELSTRA RSS CA Subscriber Agreement (SA)
TELSTRA RSS CA Subscriber Agreement (SA) Last Revision Date: December 16, 2009 Version: Published By: Telstra Corporation Ltd Copyright 2009 by Telstra Corporation All rights reserved. No part of this
An overview of configuring WebEx for single sign-on. To configure the WebEx application for single-sign on from the cloud service (an overview)
Chapter 83 WebEx This chapter includes the following sections: An overview of configuring WebEx for single sign-on Configuring WebEx for SSO Configuring WebEx in Cloud Manager For more information about
Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect
Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner
Security Assertion Markup Language (SAML) 2.0 Technical Overview
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Security Assertion Markup Language (SAML) 2.0 Technical Overview Working Draft 03, 20 February 2005 Document identifier:
PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
XML Document Management Architecture
XML Document Management Architecture Candidate Version 2.0 02 Dec 2010 Open Mobile Alliance OMA-AD-XDM-V2_0-20101202-C OMA-AD-XDM-V2_0-20101202-C Page 2 (30) Use of this document is subject to all of the
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
000-575. IBM Tivoli Federated Identity Manager V6.2.2 Implementation. Version: Demo. Page <<1/10>>
000-575 IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version: Demo Page 1.What is the default file name of the IBM Tivoli Directory Integrator log? A. tdi.log B. ibmdi.log C. ibmdisrv.log
Strategies for the implementation of a Public Key Authentication Framework (PKAF) in Australia
Miscellaneous Publication Strategies for the implementation of a Public Key Authentication Framework (PKAF) in Australia SAA MP75 1996 STRATEGIES FOR THE IMPLEMENTATION OF A PUBLIC KEY AUTHENTICATION FRAMEWORK
SAML Authentication with BlackShield Cloud
SAML Authentication with BlackShield Cloud Powerful Authentication Management for Service Providers and Enterprises Version 3.1 Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCARD
ETSI TR 103 123 V1.1.1 (2012-11)
TR 103 123 V1.1.1 (2012-11) Technical Report Electronic Signatures and Infrastructures (ESI); Guidance for Auditors and CSPs on TS 102 042 for Issuing Publicly-Trusted TLS/SSL Certificates 2 TR 103 123
ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance
ITL BULLETIN FOR JULY 2012 Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance Paul Turner, Venafi William Polk, Computer Security Division, Information
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Logout Support on SP and Application
Logout Support on SP and application Logout Support on SP and Application Possibilities and and Limitations SWITCHaai Team [email protected] Single Logout: Is it possible? Single Logout will work only in some
Single Sign-on. Overview. Using SSO with the Cisco WebEx and Cisco WebEx Meeting. Overview, page 1
Overview, page 1 Using SSO with the Cisco WebEx and Cisco WebEx Meeting Applications, page 1 Requirements, page 2 Configuration of in Cisco WebEx Messenger Administration Tool, page 3 Sample Installation
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
OIOSAML 2.0 Toolkits Test results May 2009
OIOSAML 2.0 Toolkits Test results May 2009 5. September 2008 - Søren Peter Nielsen: - Lifted and modified from http://docs.google.com/a/nemsso.info/doc?docid=dfxj3xww_7d9xdf7gz&hl=en by Joakim Recht 12.
SAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Summer 15 @salesforcedocs Last updated: July 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
Introducing Shibboleth
workshop Introducing Shibboleth MPG-AAI Workshop Clarin Centers Prague 2009 2009-11-06 MPG-AAI MPG-AAI a MPG-wide Authentication & Authorization Infrastructure for access control to web-based resources
OpenSSO: Cross Domain Single Sign On
OpenSSO: Cross Domain Single Sign On Version 0.1 History of versions Version Date Author(s) Changes 0.1 11/30/2006 Dennis Seah Contents Initial Draft. 1 Introduction 1 2 Single Domain Single Sign-On 2
SAML v2.0 for.net Developer Guide
SAML v2.0 for.net Developer Guide Copyright ComponentSpace Pty Ltd 2004-2015. All rights reserved. www.componentspace.com Contents 1 Introduction... 1 1.1 Features... 1 1.2 Benefits... 1 1.3 Prerequisites...
Danske Bank Group Certificate Policy
Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...
Get Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : C2150-575 Title : IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version : Demo 1.What is the default file name of the
Structured Data Capture (SDC) Draft for Public Comment
Integrating the Healthcare Enterprise 5 IHE Quality, Research, and Public Health Technical Framework Supplement 10 Structured Data Capture (SDC) 15 Draft for Public Comment 20 Date: June 6, 2014 Author:
