Integrating Web Applications with Shibboleth
|
|
|
- Shanon French
- 9 years ago
- Views:
Transcription
1 Integrating Web Applications with Shibboleth Application Authentication Done Right July 11, 2016 Eric Goodman, UCOP IAM Architect Jeffrey Crawford, UCSC Application Admin
2 What is Shibboleth? Shibboleth An open-source, higher-ed funded application Implements SAML protocol to support federated authentication Authenticates users of web apps by leveraging existing user accounts So what is SAML? Security Assertion Markup Language Protocol (standard), NOT an application Communicates Authentication information Describes who(ish), how and when the user logged in XML-based Secure Uses asymmetric key cryptography for message signing/encryption SAML is the UC Standard for cross-campus authentication 2
3 UC Standards? UC IT Architecture Committee (ITAC) Working sub-committee to the UC IT Leadership Council (ITLC) Mission: establish the enterprise architecture and technology infrastructure necessary to promote and support interoperability and sharing of IT solutions among and between campuses Foundation for Collaboration on Technology Enabled UC Solutions, Pillar II Develops principles, standards and practices of Enterprise Architecture across UC Facilitates knowledge sharing and collaboration across campuses. Supports implementations of UC-wide initiatives through consultation and maintenance of EA Body of Knowledge 3
4 More on ITAC, Standards, Etc. Enterprise Architecture Body of Knowledge (EA BoK) Repository of IT principles, standards, guidelines and other EA Artifacts (EAAs) Reviewed by campus communities and adopted by CIOs SAML for app authentication (EAA-006) is one of the standards Formally adopted at more than half of campuses De-facto standard via UCTrust (i.e., all campuses support this) UCTrust Subcommittee of ITAC Mission: provide input on design and implementation of identity management solutions for the UC system and to foster collaboration on IAM solutions among the campuses Members provide direct support of SSO (Shibboleth) integration 4
5 Federated Authentication and UC Enterprise Architecture Standards You are here 5
6 More info ITAC UCCSC Presentation and overview 3:00 Monday, Porter D246 Website UCTrust Website 6
7 What is Shibboleth? Shibboleth An open-source, higher-ed funded application Implements SAML protocols to support federated authentication So what is SAML? Security Assertion Markup Language Protocol (standard), NOT an application Communicates Authentication information Describes who(ish), how and when the user logged in XML-based Secure Uses asymmetric key cryptography for message signing/encryption SAML is the UC Standard for cross-campus authentication 7
8 Why Shibboleth? and it was so, that when those Ephraimites which were escaped said, Let me go over; that the men of Gilead said unto him, Art thou an Ephraimite? If he said, Nay; Then said they unto him, Say now Shibboleth: and he said Sibboleth: for he could not frame to pronounce it right. Then they took him, and slew him at the passages of Jordan: and there fell at that time of the Ephraimites forty and two thousand Judges 12:5 6, King James Bible 8
9 Comparison of Authn Approaches Local authentication Pass-thru (proxy) authentication Authentication as a service 9
10 Local Authentication Use application-specific passwords 10
11 Local Authentication 11
12 Local Authentication - Scaling Passwords Everywhere! 12
13 Local Authentication Pros Flexibility Different usernames and passwords for each site Simple to set up Cons Usability Different usernames and passwords for each site Doesn t integrate with anything else Password changes are per-application App must support password reset/i forgot my password Security Strong risk that users will reuse passwords Passwords are confidential data and require extra security! 13
14 Pass-thru (proxy) Authentication Externalizes authentication Application impersonates user Verifier can be LDAP, AD, Kerberos, etc. 14
15 Pass-thru Authentication 15
16 Pass-thru Authentication - Scaling Passwords transmitted everywhere! 16
17 Pass-thru Authentication Pros Same username password at each site Single database for account/password changes Cons Each app directly handles/transmits passwords Trains users to enter UC password on any site User has no way to validate website Application is the user AuthN service can t distinguish you and application 17
18 Federated Authentication Authentication as a service Uses the SAML protocol 18
19 Federated Authentication - Scaling 19
20 Federated Authentication Pros A single, trusted application handles the passwords Users always enter UC passwords on same website Application sees approved user info, does not act as user Authentication process handled centrally Can leverage central services; multi-factor authentication, expired accounts Single Sign On Supports logins from multiple campuses without requiring new accounts Easy to Export E.g., safe to install and run in cloud environments (like AWS) Cons Largely Web-Only Complexity of initial install Onboarding process at UC is currently clunky Vendor adoption 20
21 Federated Authentication: SAML and Shibboleth How it Works 21
22 Shibboleth components Identity Provider (IdP) Run by the campus (organization) Performs authentication (login) Provides verifiable attributes describing user Service Provider (SP) Run at the application level ( protected resource ) Communicates with and validates info from IdP 22
23 Things to get used to with SAML IdP and SP don t directly communicate AuthN info is shared via SAML messages SAML messages are carried by user s browser Encryption and signing are important! IdP does not control application session Tells SP about the user being authenticated After login/authentication is complete, IdP is done SP session is managed locally Means that Logout is a whole different animal SP does not control login process Asks IdP to do authentication AuthN UI/flow is managed by the IdP The IdP provides the user data (including username) SP must use/map the IdP s data for local profiles 23
24 Demo login (if time) 24
25 SAML Technical Notes Shibboleth SP software runs as a separate daemon/service SP software maintains its own session Application/web server can leverage session, but map to its own env SP software translates SAML into http headers or web variables Application reads SAML attributes to identify user $_SERVER[ attribute_name ]; request.getheader("attribute_name"); App can register users on the fly using this info I.e., Create profile dynamically using IdP-provided information Other notes Apps built from scratch are easy to integrate with Shibboleth Third party apps can be more difficult depending on architecture Applications that read REMOTE_USER generally integrate well j2ee applications based on tomcat? use AJP if possible 25
26 SAML Attributes eduperson (InCommon/Internet2) Attributes edupersonaffiliation edupersonentitlement edupersonnickname edupersonorgdn edupersonorgunitdn edupersonprimaryaffiliation edupersonprimaryorgunitdn edupersonprincipalname edupersonscopedaffiliation edupersontargetedid UCTrust Attributes UCNetID UCTrustAssurance UCCampusEmployeeID UCTrustShortCampusID (deprecated) UCPathEmplid UCCampusStudentId UCEmployeeStatus??? UCStudentGradeLevel??? Local Attributes (campus specific) CruzID (UCSC) FacultySystemID (hypothetical) 26
27 Using SAML in an App Install Shibboleth SP software (shibd) Official RPMs/Installers RHEL, CentOS, SUSE, Windows Unofficial (Li/U)nux systems, MacOS (MacPorts), Java Servlets Configure web server Apache Load module (mod_shib) Protect content using normal Location directives IIS Enable ISAPI filter (isapi_shib.dll) Protect in shibboleth2.xml using shibboleth config syntax 27
28 Using SAML in an App Configure Shibboleth Software shibboleth2.xml Controls shibboleth options (config, basic settings) Protection directives for IIS must go here Uses a Shib-specific syntax attribute-map.xml Maps SAML attributes to variables/headers Protection directives (Apache only) Via standard <Location /> style configs 28
29 Configuring Shibboleth Set entityid in ApplicationDefaults <ApplicationDefaults entityid=" REMOTE_USER="eppn persistent-id targeted-id"> For https, change this in Sessions section <Sessions lifetime="28800" timeout="3600" relaystate="ss:mem" checkaddress="false" handlerssl="true" cookieprops="https"> 29
30 Configuring Shibboleth (cont) Load Metadata (the config. info for campus IdPs) <MetadataProvider type="xml" uri=" backingfilepath="incommon-metadata.xml reloadinterval="7200"> </MetadataProvider> Identify login service? <SSO discoveryprotocol="samlds" discoveryurl=" SAML2 SAML1 </SSO> 30
31 Using SAML in an App Test with local campus IdP May require loading local campus IdP configuration May require configuration of campus IdP (by local IdM team) Process varies, work with your campus contact: Register application with InCommon InCommon provides a registry of verified SP/IdP config info Called Metadata Shibboleth automatically loads/updates configs from InCommon Work with campus contact to list your app in InCommon Work with campus contact to integrate with other campuses Request appropriate attributes 31
32 Vendors and SAML SAML support is frequently minimal Vendors don t always use Shibboleth (the app) Vendors may require manual configuration of IdP info Rather than Shib s auto config via InCommon metadata Some vendors are limited to one campus (IdP) SAML Proxy service may help Available via UCOP for UC applications SSO does not always mean SAML Can mean we integrate with AD (or LDAP) I.e., Pass-thru or proxy authentication Not what we use at UC for systemwide apps Include SAML support in initial plans and RFPs 32
33 Question & Answer 33
34 For further questions Eric Goodman, UCOP IAM Architect Jeffrey Crawford, UCSC App Admin Campus IAM contacts 34
Web based single sign on. Caleb Racey Web development officer Webteam, customer services, ISS
Web based single sign on Caleb Racey Web development officer Webteam, customer services, ISS Overview The need for single sign on (SSO) User and admin perspectives Current state off SSO provision pubcookie
Single Sign On at Colorado State. Ron Splittgerber
Single Sign On at Colorado State Ron Splittgerber Agenda Identity Management Authentication Authorization The Problem The Solution: Federation Trust Between Institutions Trust Between Institution and Federal
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications
Federated Identity Management and Shibboleth Noreen Hogan Asst. Director Enterprise Admin. Applications Federated Identity Management Management of digital identity/credentials (username/password) Access
Shibboleth Identity Provider (IdP) Sebastian Rieger [email protected]
Shibboleth Identity Provider (IdP) Sebastian Rieger [email protected] Gesellschaft für wissenschaftliche Datenverarbeitung mbh Göttingen, Germany CLARIN AAI Hands On Workshop, 25.02.2009, Oxford
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources Paul Riddle University of Maryland Baltimore County EDUCAUSE Mid-Atlantic Regional Conference January 16, 2008 Copyright
IAM, Enterprise Directories and Shibboleth (oh my!)
IAM, Enterprise Directories and Shibboleth (oh my!) Gary Windham Senior Enterprise Systems Architect University Information Technology Services [email protected] What is IAM? Identity and Access
Best Practices for Libraries and Library Service Providers
Best Practices for Libraries and Library Service Providers These best practices were developed by the InCommon Library Consortium in 2009. The consortium was formed to explore various potential solutions.
Shibboleth On-line Authentication System
Shibboleth On-line Authentication System Jon Browne Senior Consultant Drew Heald BSc (Hons), MPhil, MCP Systems Developer IBIS Business Consultants Ltd Accessing a Web Resource Request Client W W W Server
Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect
Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner
Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5
Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5 TABLE OF CONTENTS Introduction... 1 Purpose and Target Audience... 1 Commonly Used Terms... 1 Overview of Shibboleth User
Integration of Shibboleth and (Web) Applications
workshop Integration of Shibboleth and (Web) Applications MPG-AAI Workshop Clarin Centers Prague 2009 2009-11-06 (Web) Application Protection Models Classical Application behind Shibboleth Standard Session
Using Shibboleth for Single Sign- On
Using Shibboleth for Single Sign- On One Logon to Rule them all.. Kirk Yaros Director, Enterprise Services Mott Community College 1 Agenda Overview of Mott Overview of Shibboleth and Mott s Project Review
Integrating Multi-Factor Authentication into Your Campus Identity Management System
Integrating Multi-Factor Authentication into Your Campus Identity Management System Mike Grady, Unicon David Walker, Internet2 (both associated with the Internet2 Scalable Privacy Project) Agenda Multi-Context
Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase
Authentication and Authorisation for Research and Collaboration Federations 101 An Introduction to Federated Identity Management Peter Gietz, Martin Haase AARC NA2 Task 2 - Outreach and Dissemination DAASI
Shibboleth Authentication. Information Systems & Computing Identity and Access Management May 23, 2014
Shibboleth Authentication Information Systems & Computing Identity and Access Management May 23, 2014 For every question an answer: Why should I care about SAML? What is a Shibboleth? What is a Federation?
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle [email protected]
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle [email protected] Berne, 13. August 2014 Introduction App by University of St. Gallen Universities
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin [email protected]
Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin [email protected] International Center for Advanced Internet Research Outline Security Mechanisms Access Control Schemes
Getting Started with Single Sign-On
Getting Started with Single Sign-On I. Introduction Your institution is considering or has already purchased Collaboratory from Treetop Commons, LLC. One benefit provided to member institutions is Single
Biometric Single Sign-on using SAML
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP [email protected] 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On
Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015
Federation At Fermilab Al Lilianstrom National Laboratories Information Technology Summit May 2015 About Fermilab Since 1967, Fermilab has worked to answer fundamental questions and enhance our understanding
TIB 2.0 Administration Functions Overview
TIB 2.0 Administration Functions Overview Table of Contents 1. INTRODUCTION 4 1.1. Purpose/Background 4 1.2. Definitions, Acronyms and Abbreviations 4 2. OVERVIEW 5 2.1. Overall Process Map 5 3. ADMINISTRATOR
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Getting Started with Single Sign-On
Getting Started with Single Sign-On I. Introduction NobleHour sets out to incentivize civic engagement by enabling users within companies, educational institutions, and organizations to conduct and coordinate
WebNow Single Sign-On Solutions
WebNow Single Sign-On Solutions Technical Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2015 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,
Federating with Web Applications
Federating with Web Applications Janusz Ulawski HEAnet Ltd November 11, 2010 Agenda 1 Providing access to your WebApp 2 Federated Access Software with SAML 2.0 support 3 Federating your WebApp Shibboleth
Get Cloud Ready: Secure Access to Google Apps and Other SaaS Applications
Get Cloud Ready: Secure Access to Google Apps and Other SaaS Applications Matt Weisberg Vice President & CIO, Weisberg Consulting, Inc. [email protected] Paul McKeith Technical Sales, Novell, Inc. [email protected]
AA enabling a closed source legacy application
AA enabling a closed source legacy application Jan Du Caju ICT security officer K.U.Leuven Belgium AA enabling a closed source legacy application Introduction: context association K.U.Leuven Case: AA enabling
External and Federated Identities on the Web
External and Federated Identities on the Web Jan Pazdziora Sr. Principal Software Engineer Identity Management Special Projects, Red Hat 1 st October 2015 Scope and problem statement Applications get deployed
Authentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
S P I E Information Environments Shibboleth and Its Integration into Security Architectures. EDUCAUSE & Internet 2 Security Professionals Conference
Shibboleth and Its Integration into Security Architectures Christian Fernau, Francisco Pinto University of Oxford EDUCAUSE & Internet 2 Security Professionals Conference Denver, CO 10-12 April 2006 16:47:29
About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack
Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack About Me KVM, API, DB, Upgrades, SystemVM, Build system, various subsystems Contributor and Committer
Connecting Web and Kerberos Single Sign On
Connecting Web and Kerberos Single Sign On Rok Papež ARNES [email protected] Terena networking conference Malaga, Spain, 10.6.2009 Kerberos Authentication protocol (No) authorization Single Sign On
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Biometric Single Sign-on using SAML Architecture & Design Strategies
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems [email protected] 1 Setting Expectations What you can take away! Understand
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
An introduction of several development activities related to Shibboleth and Web browser-based simple PKI
An introduction of several development activities related to Shibboleth and Web browser-based simple PKI Toyokazu Akiyama 1, Motonori Nakamura 2, Takeshi Nishimura 2, Kazutsuna Yamaji 2, Yukiko Kawai 1
Single Sign-On for the UQ Web
Single Sign-On for the UQ Web David Gwynne Infrastructure Architect, ITIG, EAIT Taxonomy Authentication - Verification that someone is who they claim to be - ie, only the relevant user
Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department [email protected]
Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department [email protected] Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
UW System Identity & Access Management (IAM) Recommended Strategic Roadmap
UW System Identity & Access Management (IAM) Recommended Strategic Roadmap Fall 2015 ITMC (Rev 1/11) Our challenge CIOs charged IAM-TAG with recommending an IAM strategy that would: Establish an identity
ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES
CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML
Federated Identity Management
Federated Identity Management SWITCHaai Introduction Course Bern, 1. March 2013 Thomas Lenggenhager [email protected] Overview What is Federated Identity Management? What is a Federation? The SWITCHaai Federation
Shibboleth N-Tier Support. Chad La Joie [email protected]
Shibboleth N-Tier Support Chad La Joie [email protected] Agenda Use Case Terminology Shibboleth Solution Future Effort Resources 2 Use Case Current use case comes from University of Chicago University
Shibboleth Configuration from 100,000 Feet, in 15 Minutes or Less! Steve Thorpe Systems Programmer / Analyst MCNC
Shibboleth Configuration from 100,000 Feet, in 15 Minutes or Less! Steve Thorpe Systems Programmer / Analyst MCNC Helpful Skill Sets Include Basic Knowledge Of: Your OS: Linux or Windows Experience using
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
Shibboleth SP Simple Installation Guide For LINUX
Division of IT Shibboleth SP Simple Installation Guide For LINUX University of Missouri Revision History AM July 2012 Created AM July 26, 2012 Changed links to SP download AM August 29, 2012 Updated for
Lets get a federated identity. Intro to Federated Identity. Feide OpenIdP. Enter your email address. Do you have access to your email?
Lets get a feated identity Intro to Feated Identity EuroCAMP Training for APAN32 This work is licensed un a Creative Commons Attribution ShareAlike 3.0 Unported License. Do you have access to your email?
DocuSign Single Sign On Implementation Guide Published: March 17, 2016
DocuSign Single Sign On Implementation Guide Published: March 17, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
Federation and Cloud Services
Federation and Cloud Services for the K12 Community Quilt/InCommon K12 Pilot Project Summary Two Cases: Illinois and Nebraska What is Envisioned, Experiences, and Challenges Bernie Acs{[email protected]},
IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
Secure the Web: OpenSSO
Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1 Agenda Need for identity-based
Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper
Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper TABLE OF CONTENTS INTRODUCTION... 3 Where we came from... 3 The User s Dilemma with the Cloud... 4 The Administrator
U S E R D O C U M E N TA T I O N ( A L E P H I N O
U S E R D O C U M E N TA T I O N ( A L E P H I N O 5. 0 ) Single-Sign-On Alephino Version 5.0 1/9 last updated: 17/09/2014 Table of contents 1 Mode of operation...3 2 Configuration examples with the Apache
Canadian Access Federation: Trust Assertion Document (TAD)
Participant Name: RESEARCH RESEARCH LTD. 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources
Toward campus portal with shibboleth middleware
Toward campus portal with shibboleth middleware Eisuke Ito and Masanori Nakakuni [email protected] u.ac.jp, Kyushu University nak@fukuoka u.ac.jp, Fukuoka University Outline 1. Background 2. Shibboleth 3.
SAML Authentication within Secret Server
SAML Authentication within Secret Server Secret Server allows the use of SAML Identity Provider (IdP) authentication instead of the normal authentication process for single sign-on (SSO). To do this, Secret
Three Case Studies in Access Management
Three Case Studies in Access Management IAM Online June 10, 2015-2 pm EDT Andy Morgan, Oregon State University Mandeep Saini, GÉANT Albert Wu, UCLA Moderator: Tom Barton, University of Chicago Fit for
OIX IDAP Alpha Project - Technical Findings
OIX IDAP Alpha Project - Technical Findings Warwickshire County Council - using a Federated UK Government ID in trusted Local Authority transactions. By Graham Dunnings and Ian Litton 1 Table of Contents
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011
NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity
How Single-Sign-On Improves The Usability Of Protected Services For Geospatial Data
2014 Fifth International Conference on Computing for Geospatial Research and Application How Single-Sign-On Improves The Usability Of Protected Services For Geospatial Data Andreas Matheus University of
Identity Management: The authentic & authoritative guide for the modern enterprise
Identity Management: The authentic & authoritative guide for the modern enterprise Ellen Newlands, Product Manager Dmitri Pal, Director, Engineering 06-26-15 Goals of the Presentation Introduce Identity
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation Approved for Public Release Distribution Unlimited 13-1871 2013 The MITRE Corporation All Rights Reserved } OpenID Connect and OAuth2 protocol
USING ESPRESSO [ESTABLISHING SUGGESTED PRACTICES REGARDING SINGLE SIGN ON] TO STREAMLINE ACCESS
USING ESPRESSO [ESTABLISHING SUGGESTED PRACTICES REGARDING SINGLE SIGN ON] TO STREAMLINE ACCESS Andy Ingham (UNC-Chapel Hill) NASIG Annual Conference, June 4, 2011 What I hope to cover Problem statement
Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
Multi Factor Authentication API
GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...
Alfresco Share SAML. 2. Assert user is an IDP user (solution for the Security concern mentioned in v1.0)
Alfresco Share SAML Version 1.1 Revisions 1.1 1.1.1 IDP & Alfresco user logs in using saml login page (Added info about saving the username and IDP login date as a solution for the Security concern mentioned
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO Scope... 2 Prerequisites Tasks... 2 Procedure... 2 Step 1: Configure EPM s WebLogic domain for SP Federation Services... 2 Step 2:
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
An overview of configuring WebEx for single sign-on. To configure the WebEx application for single-sign on from the cloud service (an overview)
Chapter 190 WebEx This chapter includes the following sections: "An overview of configuring WebEx for single sign-on" on page 190-1600 "Configuring WebEx for SSO" on page 190-1601 "Configuring WebEx in
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies
JOSSO 2.4. Internet Information Server (IIS) Tutorial
JOSSO 2.4 Internet Information Server (IIS) Tutorial JOSSO 2.4 : Internet Information Server (IIS) Tutorial 1. Introduction... 1 2. Prerequisites... 2 3. Defining Identity Appliance Elements... 3 3.1.
