A Federated Authorization and Authentication Infrastructure for Unified Single Sign On
|
|
|
- Beatrice Day
- 10 years ago
- Views:
Transcription
1 A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a Stuttgart Abstract: Currently federated authorization and authentication infrastructures are deployed to offer services to large groups of users while increasing the usability and scalability of the security architecture. Connection of domains using a variety of technologies brings new challenges and requires the utilization of standardized communication languages between these components. The presented architecture aims to unify types of federations previously separate by using these languages with generic security architecture, able to provide a unified Single Sign On. Introduction Over the last years the number of services available on the web has continually grown. The role of the user is changing from a passive consumer of information towards an active participant. Everyone now can publish his personal beliefs, discuss them with others, and participate in online communities. At the same time the need for controlling the access to these services has increased. Internal information shall be accessible only by members of the organization; private data shall only be viewed by friends, and commercial services are provided only for paying customers. Active users are no longer anonymous but get identities; they register, create accounts and provide information about themselves. The process of identifying a previously registered user is called Authentication. To grant or deny access to services for authenticated users is a process called Authorization. These security aspects are decoupled from the logic of single applications and developed as a generic, reusable authentication and authorization infrastructure (AAI).
2 Usually users have one account at each provider of a service. This has two disadvantages. From the service provider s view, it is an effort to manage lots of accounts. A trade-off has to be found to get sufficiently detailed, reliable and up-to-date user information on the one hand, and not to discourage users with time-consuming registration and account management procedures on the other hand. From the user s view it is hard to remember multiple logins and passwords, so often they are reused at the cost of security. A federated identity management allows using identity information across security domains, so providers of service can work together with providers of identities. Users can use one login with one password for multiple services now. They can also login once, at one service provider, and need not login again at the next service provider. This is called Single Sign On (SSO). Not only the number of services but also the number of users is increasing, particularly those users with mobile devices, expecting connectivity everywhere. More and more wireless access points become available at academic institutions, but still they cannot be utilized by visiting students and scientists without administrative effort. By federating the academic institutions and forming an international AA infrastructure the goal of network connectivity everywhere is within reach. Scenario Peter studies computer sciences at the University of Stuttgart, in Germany. Currently he works as an exchange student at the University of Murcia, in Spain. As he knows Murcia is part of the eduroam federation, he does not have register for a new account for the crowded students computer lab. He just opens his laptop anywhere on the campus, and his wireless supplicant tells him about a well-known SSID eduroam. He enters his credentials [email protected] and gains network access. Then he goes to the Universities e-learning portal to look up his new schedule and sees he is already logged in as [email protected]. Also the page is displayed in German, but of course he switches to Spanish to better learn the new language. His schedule also lists a programming tutorial. A link gets him to the download page of the needed development environment. Being a computer science student, he is allowed to download and use this commercial software for free. Unfortunately the download as fast as he would like as a student he is only given a limited bandwidth. The important thing about this scenario is what the user does not do: he does not use a Spanish guest account, and he does not log in a second time for access to the e-learning portal application. He only needs his account at his home institution where he has registered once. He can use this one account to access any service provider within the federation.
3 Federation Technologies Currently a variety of technologies is used to build federated authentication and authorization infrastructures. The European eduroam [2] federation provides network services to roaming academic users. Following the idea open your laptop and be online user visiting a participating institution see an SSID eduroam, connect to the local network, input their username@homedomain and get access to the internet. This is based on a hierarchical setup of RADIUS [3] servers that proxy authentication requests to each user s home domain. Access points enforce users to login using the 802.1x standard. The users credentials are securely transmitted across multiple RADIUS servers inside an encrypted tunnel (often using EAP-TTLS or Protected EAP). Shibboleth [4] is a middleware which provides federated Single Sign On for Web Services. It implements and extends the OASIS SAML specification (v1.1). Several national federations have successfully been built with this middleware (SWITCHaai) or are in the process of being built (DFN-AAI). Users accessing a Shibboleth protected Web Service are redirected to an Identity Provider at their home domain. They enter username and password there, and then are redirected back to the Web Service. Transport of messages is done using SOAP over HTTP, or HTTPS. edugain [5] is the GÉANT Authorisation Infrastructure for the research and education community. Many national federations already have been established, but are based on differing AAI solutions as Shibboleth, PAPI, A-select or Liberty Alliance, for example. With edugain these federations can be connected to form a higher-level federation, a confederation. Users accessing resources in foreign federations are redirected to a What Federation Are You From (WFAYF) service, that redirects them to the Identity Provider of their home domain next. edugain is currently based on SAML 1.1. All of these federations have in common the separation between providers of services and providers of identities. Each of them has the typical use case involving three entities, user, service- and identity provider. Information about users is managed by the home institutions, the rules controlling access to services are managed by the providers of the services. Mutual trust between all providers within a federation is a requirement, this trust is often realised in form of a public key infrastructure based on certificates. Nevertheless each of these federations only supports one type of service, being either access to the network or access to web services. The proposed system would unify these types of federations, to result in one multi-purpose federation. This unified federation looks more uniform to users while providing more types of services. Usage of a reduced set of technologies based on well-defined and well-known standards simplifies the deployment of such a federation. Furthermore concepts as attribute-based access control can be reused for other type of services, network access for example, to provide greater flexibility.
4 Standardized Languages for Communication SAML [6] is an acronym for Security Assertion Markup Language. It is a standardized way to express security assertions, encoded in XML. Syntax and semantics are defined for statements describing authentication, authorization and attributes of certain subjects. An authentication statement contains information about a subject, the method used for authentication, and the time the authentication took place. An authorization statement describes on which resource a certain subject may perform a certain action. An attribute statement contains a sequence of attributes that are associated with the given subject. These parts are generic enough to be applied to any kind of service or resource, web or non-web. SAML also defines bindings. A binding is an underlying transport and communication protocol; this is usually SOAP over HTTP as SAML is mostly used with Web Services. Nevertheless it is designed to be generic and flexible, to be of use in more scenarios than the Web only. Profiles define a flow of messages for a scenario the Browser/POST profile for example provides Single Sign On for browser users requesting access to Web Services. XACML [7] stands for extensible Access Control Markup Language, and it is a standardized way to express security policies. Like SAML it is encoded in XML. A policy describes a set of rules that apply if a certain subject wants to access a certain service. These rules may permit or deny the access, or permit only under some conditions. If more than one rule applies the combining-algorithm of the policy is used. Policies can be used for two things in the scenario described above. First, the Provider of a Service wants to ensure that only the intended users can access his service. He defines rules and policies describing what users shall get a permit, and what users shall get a deny. Second, a user wants to publish only some of the information describing him, and consider the rest as private. He would define a policy describing which attributes can be released, possibly specific for certain services. Again, these policies and rules are generic, and can be applied to any resource or service, regardless of the other, supplementing technologies that are involved. Both SAML and XACML are well-defined and stable standards, produced by OASIS. Using these languages ensures interoperability of different systems. It also simplifies the analysis of important parts of a security infrastructure if analysts already understand the syntax and semantics. Finally it allows harmonizing the view and treatment of services that previously were considered as of different type, and required different technologies for each type of service.
5 Architecture The architecture of the proposed system will build upon the existing eduroam [2] infrastructure. The goal is to extend this infrastructure, not to replace it. Authentication will be performed in the same way as in current eduroam, via proxying through a hierarchy of RADIUS servers. The RADIUS servers at both ends of the proxy-chain will be extended with additional modules. The RADIUS server from the home institution will be enabled to create a token, containing a SAML authentication statement, which is sent to the user s client during the network authentication phase. The RADIUS server at the visited institution will have two added functionalities. First, it will be enabled to request user attributes with a SAML attribute request. Second, the resulting SAML attribute statements will be given to a policy decision point that can apply the local security policies to it. These policies will be described in XACML. The token will be received and securely stored by a piece of middleware on the user s device. If the user accesses a protected web service at some later point in time, the provider of this service has two options: he can send an interface to the user, so he can select his home institution, be redirected, and enter his credentials (again). This is currently the usual way for shibboleth-based federations. But he can also contact the client middleware and get the token that was received during the network authentication phase. Possession of the token proves that the client has already been authenticated by a trusted member of the federation. Then the user does not need to give his credentials a second time. As long as his token is valid, he is logged in. It is crucial that tokens are digitally signed by the entity that issues them; else malevolent users can change the contents. To prevent theft of tokens, they are encrypted before storing them on the client device. Only service providers that can authenticate themselves and prove they are part of the federation can request the token from the client middleware. To allow deployment of this system in federations based on a number of technologies, the functionality to request, receive and verify the tokens will not be implemented directly into the service providers. Rather the service providers will refer to their corresponding edugain aware entities, the bridging elements, to provide this functionality. This new system will then be usable within federations based on SAML, but also within such that are based on other technologies. Conclusions The proposed architecture enhances the existing eduroam roaming infrastructure. Authorization capabilities are added to the existing authentication facilities. Policies can be described in a standardized way to control access to the network based on characteristics of the users, rather than on their identities alone.
6 The token acquired during the network authentication phase can be given to web service providers, thereby connecting both worlds. This allows the user to sign on only once, as long as the token is valid. A unified Single Sign On for network access as well as web services is realised. A prototype for this system is currently being implemented. Tests using SAML authentication and attribute statements in combination with XACML policies were successfully executed to control access to the network. The architecture as described above is currently being refined, to fulfil the requirements of a European-wide unified federation. Such a unified federation is expected to encourage the development of currently separated federations, reducing the complexity while increasing the usefulness and utilization of existing infrastructures that are gradually extended. Outlook The bringing together of the web service federations and the network federations combines only two types of services. The integration of access control to Grid services into the described architecture has been addressed in other projects already. The new architecture of this system will be tested for it s suitability to also be used in the Grid context. The network federation suggest examination of a further new concept, locationawareness. In contrast to web services the physical location of a user becomes important for access to the network. A printer service could only be sensibly be included if user get access to printers that are nearby. As the number of possibilities and ways to access the network access increases constantly, mechanisms for dynamic discovery of such services will be needed. The clients need to be able to learn the properties of each available network to make a decision which to use best. The basic architecture as described above is expected to be generic enough to remain unchanged, and also the standardized languages for communications between components, SAML and XACML, will continue to be central parts. Acknowledgement The results published in this paper were developed in the DAMe [1] project, a sub project of the GÉANT2 joint research activity 5 that is co-funded by the European Commission within the Sixth R&D Framework Programme (FP6). The DAMe project is developed together with the University of Murcia, Spain, DFN, Germany, and RedIRIS, Spain. The author would like to thank all the partners involved in that project. References [1] Deploying Authorization Mechanisms for Federated Services in the eduroam Architecture (DAMe)
7 [2] Licia Florio, Klaas Wierenga: Eduroam, providing mobility for roaming users. In: Proceedings of EUNIS, Manchester 2005 [3] C. Rigney et al.: Remote Authentication Dial In User Service (RADIUS). RFC 2865, June 2000 [4] Tom Scavo, Scott Cantor: Shibboleth Architecture Technical Overview. June 2005 [5] D. R. Lopez et al.: GÉANT2 Authorisation and Authentication Infrastructure (AAI) Architecture second edition. April 2007 [6] Eve Maler, Prateek Mishra, Rob Philpott et al.: Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V1.1. September 2003 [7] Simon Godik, Tim Moses et al.: extensible Access Control Markup Language (XACML) Version 1.1. August 2003
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]
Licia Florio Project Development Officer [email protected] www.terena.org Identity Federations in Europe
APAN Conference Honolulu, Hawaii 24 January 2008 Licia Florio Project Development Officer [email protected] www.terena.org Identity Federations in Europe Outline Networking Organisations in Europe Requirements
DAMe Deploying Authorization Mechanisms for Federated Services in the eduroam Architecture
DAMe Deploying Authorization Mechanisms for Federated Services in the eduroam Architecture Sascha Neinert Marseille, 06.02.2008, Sascha Neinert, 06.02.2008 Seite 1 Overview Project Goals Partners Network
An Infocard-based proposal for unified SSO to eduroam
An Infocard-based proposal for unified SSO to eduroam Enrique de la Hoz, Antonio García, Diego López, Samuel Muñoz University of Alcala (Spain), RedIRIS (Spain) TNC2009, Málaga (Spain), June 9 th 2009
Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase
Authentication and Authorisation for Research and Collaboration Federations 101 An Introduction to Federated Identity Management Peter Gietz, Martin Haase AARC NA2 Task 2 - Outreach and Dissemination DAASI
Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin [email protected]
Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin [email protected] International Center for Advanced Internet Research Outline Security Mechanisms Access Control Schemes
Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm
Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect
IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0
International Virtual Observatory Alliance IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 IVOA Proposed Recommendation 20151029 Working group http://www.ivoa.net/twiki/bin/view/ivoa/ivoagridandwebservices
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
TF-AACE. Deliverable B.2. Deliverable B2 - The Authentication Component =============================================
TF-AACE Deliverable B.2 Define the components and protocols to guarantee a harmonized operation of A&A systems Deliverable B2 - The Authentication Component =============================================
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN 1 Venkadesh.M M.tech, Dr.A.Chandra Sekar M.E., Ph.d MISTE 2 1 ResearchScholar, Bharath University, Chennai 73, India. [email protected] 2 Professor-CSC
Research and Implementation of Single Sign-On Mechanism for ASP Pattern *
Research and Implementation of Single Sign-On Mechanism for ASP Pattern * Bo Li, Sheng Ge, Tian-yu Wo, and Dian-fu Ma Computer Institute, BeiHang University, PO Box 9-32 Beijing 100083 Abstract Software
WebLogic Server 7.0 Single Sign-On: An Overview
WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of
How Single-Sign-On Improves The Usability Of Protected Services For Geospatial Data
2014 Fifth International Conference on Computing for Geospatial Research and Application How Single-Sign-On Improves The Usability Of Protected Services For Geospatial Data Andreas Matheus University of
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
Joint Research Activity 5 Task Force Mobility
Joint Research Activity 5 Task Force Mobility Network authentication with Network Roaming with eduroam Stefan Winter TREFpunkt 13, Örebro, Sweden 12 Oct 2005 1 Overview Differences
D.I.M. allows different authentication procedures, from simple e-mail confirmation to electronic ID.
Seite 1 von 11 Distributed Identity Management The intention of Distributed Identity Management is the advancement of the electronic communication infrastructure in justice with the goal of defining open,
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Federated Identity Management
Federated Identity Management SWITCHaai Introduction Course Bern, 1. March 2013 Thomas Lenggenhager [email protected] Overview What is Federated Identity Management? What is a Federation? The SWITCHaai Federation
Architecture Guidelines Application Security
Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Securing Web Services With SAML
Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
CryptoNET: Security Management Protocols
CryptoNET: Security Management Protocols ABDUL GHAFOOR ABBASI, SEAD MUFTIC CoS, School of Information and Communication Technology Royal Institute of Technology Borgarfjordsgatan 15, SE-164 40, Kista,
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Application of the PAPI authn and authz system to the TJ-II Remote Participation environment. Madrid, 21 March 2003
Application of the PAPI authn and authz system to the TJ-II Remote Participation environment Madrid, 21 March 2003 Outline An introduction to PAPI A short tour on PAPI internals Applying PAPI in the TJ-II
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
Federated Identity Management. Willem Elbers (MPI-TLA) EUDAT training
Federated Identity Management Willem Elbers (MPI-TLA) EUDAT training Date: 26 June 2012 Outline FIM and introduction to components Federation and metadata National Identity federations and inter federations
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
Distributed Identity Management Model for Digital Ecosystems
International Conference on Emerging Security Information, Systems and Technologies Distributed Identity Management Model for Digital Ecosystems Hristo Koshutanski Computer Science Department University
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle [email protected]
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle [email protected] Berne, 13. August 2014 Introduction App by University of St. Gallen Universities
Federated Identity Management
Federated Identity Management SWITCHaai Team [email protected] Agenda 2 What is Federated Identity Management? What is a Federation? The SWITCHaai Federation Interfederation Evolution of Identity Management
OIO SAML Profile for Identity Tokens
> OIO SAML Profile for Identity Tokens Version 1.0 IT- & Telestyrelsen October 2009 Content > Document History 3 Introduction 4 Related profiles 4 Profile Requirements 6 Requirements 6
Biometric Single Sign-on using SAML
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP [email protected] 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On
Biometric Single Sign-on using SAML Architecture & Design Strategies
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems [email protected] 1 Setting Expectations What you can take away! Understand
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
SWIFT: Advanced identity management
SWIFT: Advanced identity management Elena Torroglosa, Alejandro Pérez, Gabriel López, Antonio F. Gómez-Skarmeta and Oscar Cánovas Department of Information and Communications Engineering University of
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Authentication and Authorization Systems in Cloud Environments
Authentication and Authorization Systems in Cloud Environments DAVIT HAKOBYAN Master of Science Thesis Stockholm, Sweden 2012 TRITA-ICT-EX-2012:203 Abstract The emergence of cloud computing paradigm offers
SAML Federated Identity at OASIS
International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for
WiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
Leveraging New Business Models with Identity Management An e-learning case study
Leveraging New Business Models with Identity Management An e-learning case study José M. del Álamo DIT, Universidad Politécnica de Madrid, Ciudad Universitaria s/n, 28040 Madrid, Spain [email protected],
Authentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
SAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
Oasis Security Services Use Cases And Requirements
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 Oasis Security Services Use Cases And Requirements Consensus Draft 1, 30 May 2001 Purpose This document describes
Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department [email protected]
Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department [email protected] Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
SCAS: AN IMPROVED SINGLE SIGN-ON MODEL BASE ON CAS
SCAS: AN IMPROVED SINGLE SIGN-ON MODEL BASE ON CAS 1,2 XIANG LIYUN, 1 FANG ZHIYI, 1 SUN HONGYU 1 College of Computer Science and Technology, Jilin University, Changchun, China 2 Department of Computer
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
Digital Identity and Identity Management Technologies.
I. Agudo, Digital Identity and Identity Management Technologies, UPGRADE - The European Journal of the Informatics Professional, vol. 2010, pp. 6-12, 2010. NICS Lab. Publications: https://www.nics.uma.es/publications
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
The Security Framework 4.1 Programming and Design
Tel: (301) 587-3000 Fax: (301) 587-7877 E-mail: [email protected] Web: www.setecs.com Security Architecture for Development and Run Time Support of Secure Network Applications Sead Muftic, President/CEO
Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been
Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been difficult and time-consuming. This paper describes the security
IGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
Extending DigiD to the Private Sector (DigiD-2)
TECHNISCHE UNIVERSITEIT EINDHOVEN Department of Mathematics and Computer Science MASTER S THESIS Extending DigiD to the Private Sector (DigiD-2) By Giorgi Moniava Supervisors: Eric Verheul (RU, PwC) L.A.M.
Belnet Networking Conference 2013
Belnet Networking Conference 2013 Thursday 12 December 2013 @ http://events.belnet.be Workshop roaming services: eduroam / govroam Belnet Aris Adamantiadis, Nicolas Loriau Bruxelles 05 December 2013 Agenda
USING FEDERATED AUTHENTICATION WITH M-FILES
M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication
Monitoring of RADIUS Infrastructure Best Practice Document
Monitoring of RADIUS Infrastructure Best Practice Document Produced by the AMRES-led working group on Network Monitoring (AMRES BPD 111) Authors: Jovana Palibrk, Ivan Ivanović, Esad Saitović, Marina Vermezović,
Single Sign-On: Reviewing the Field
Outline Michael Grundmann Erhard Pointl Johannes Kepler University Linz January 16, 2009 Outline 1 Why Single Sign-On? 2 3 Criteria Categorization 4 Overview shibboleth 5 Outline Why Single Sign-On? Why
When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations
White Paper. Authentication and Access Control - The Cornerstone of Information Security. Vinay Purohit September 2007. Trianz 2008 White Paper Page 1
White Paper Authentication and Access Control - The Cornerstone of Information Security Vinay Purohit September 2007 Trianz 2008 White Paper Page 1 Table of Contents 1 Scope and Objective --------------------------------------------------------------------------------------------------------
Implementing Identity Provider on Mobile Phone
Implementing Identity Provider on Mobile Phone Tsuyoshi Abe, Hiroki Itoh, and Kenji Takahashi NTT Information Sharing Platform Laboratories, NTT Corporation 3-9-11 Midoricho, Musashino-shi, Tokyo 180-8585,
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.
Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.
Server based signature service. Overview
1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...
Application Note Secure Enterprise Guest Access August 2004
Application Note Secure Enterprise Guest Access August 2004 Introduction More and more enterprises recognize the need to provide easy, hassle-free high speed internet access to people visiting their offices,
ARCHITECT S GUIDE: Mobile Security Using TNC Technology
ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 [email protected] www.trustedcomputinggroup.org
The back story of our Wireless (reading will help you understand what is going on in the building):
Wireless Network The back story of our Wireless (reading will help you understand what is going on in the building): At Robeson we have a non-broadcasting wireless network. This means that if you are using
DocuSign Single Sign On Implementation Guide Published: March 17, 2016
DocuSign Single Sign On Implementation Guide Published: March 17, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents
Interwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
IdentiFi and Eduroam Roaming Wireless Service Integration CONFIGURATION GUIDE
IdentiFi and Eduroam Roaming Wireless Service Integration CONFIGURATION GUIDE TABLE OF CONTENTS Introduction... 3 Prerequisites... 3 Design and Deployment Overview... 4 Configuring the wireless SSID and
MONDESIR Eunice WEILL-TESSIER Pierre FEDERATED IDENTITY. ASR 2006/2007 Final Project. Supervisers: Maryline Maknavicius-Laurent, Guy Bernard
MONDESIR Eunice WEILL-TESSIER Pierre FEDERATED IDENTITY ASR 2006/2007 Final Project Supervisers: Maryline Maknavicius-Laurent, Guy Bernard Federated Identity Project topic Superviser: Maryline Maknavicius
User and Machine Authentication and Authorization Infrastructure for Distributed Wireless Sensor Network Testbeds
J. Sens. Actuator Netw. 2013, 2, 109-121; doi:10.3390/jsan2010109 Article OPEN ACCESS Journal of Sensor and Actuator Networks ISSN 2224-2708 www.mdpi.com/journal/jsan User and Machine Authentication and
MIGRATING DESKTOP AND ROAMING ACCESS. Migrating Desktop and Roaming Access Whitepaper
Migrating Desktop and Roaming Access Whitepaper Poznan Supercomputing and Networking Center Noskowskiego 12/14 61-704 Poznan, POLAND 2004, April white-paper-md-ras.doc 1/11 1 Product overview In this whitepaper
Cloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014
Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
Federated AAA middleware and the QUT SSO environment
Federated AAA middleware and the QUT SSO environment Bradley Beddoes Senior Network Programmer AAA eview Project Manager [email protected] Shaun Mangelsdorf Network Programmer [email protected]
