The GLASS Project: Supporting Secure Shibboleth-based Single Sign-On to Campus Resources
|
|
|
- Eric Atkins
- 10 years ago
- Views:
Transcription
1 The GLASS Project: Supporting Secure Shibboleth-based Single Sign-On to Campus Resources J. Watt, R.O. Sinnott, J. Jiang National e-science Centre, University of Glasgow Abstract Higher and Further education institutions in the UK are in the process of migrating their IT infrastructures to exploit Shibboleth technologies for federated access management. Ease of use and secure access are paramount to the successful uptake of these technologies, both from the end user and system administrator perspective. The JISC-funded GLASS project is a one-year project investigating the use of Shibboleth to support single sign-on to a variety of campus resources at the University of Glasgow including browser-based access; the Moodle online virtual learning environment; the WebSURF online student records facility, and a network filestore browser. This paper describes the implementation issues and experiences gained in rolling out the Shibboleth technologies to support federated access management. 1. Introduction The academic community in the UK is in the first stages of deploying a nationwide federated access management infrastructure to support local authentication mechanisms. Part of the motivation for this is driven by the desire to simplify collaboration between institutions, and also to make the end user experience easier for non-technical end users (both staff and students). In general, if two institutions wish to collaborate, any computing resources needed at either location will be managed by their own systems administrators. Typically, this results in students or staff being allocated remote accounts on all non-local resources. As the number of collaborating institutions increases, so does the number of separate accounts the user will hold. The result of this is a clutch of different usernames and passwords which inevitably will be misplaced or confused. Further, if a local member of an institution has their privileges or contract revoked, there is no immediate way for any collaborating remote institutions to know if this user is still valid. The Shibboleth [1] federated access management system aims to rectify this issue by providing an infrastructure where the job of authenticating and providing information about a user is the sole responsibility of the user s home institution, and this single authentication step will be recognised across all resources within the Shibboleth federation. Individual resources will still be able to exercise full control over access to their systems, normally by the presentation of specific roles by Shibboleth, but the step of confirming a user s identity will have already been established by the home institution. In addition, Shibboleth supports the notion of single sign-on, whereby users will only have to enter their home username and password once each session to access and use multiple different resources in the federation. The Joint Information Systems Committee (JISC) is steering the academic community in the United Kingdom towards federated access management over the next few years. The MATU (Middleware Assisted Take-Up) [2] service will be coordinating the changeover from the prevalent Athens-style authentication [3] to Shibboleth based on the SDSS Federation [4] (of which Glasgow is a member currently operating two Identity Providers and four Service Providers). The one-year JISC-funded GLASS (GLASgow early adoption of Shibboleth) [5] project aims to investigate how the centralised directory structure which is being rolled out at the University of Glasgow for unified account management can be utilised in a Shibboleth environment. The university has adopted the Novell NSure account management system [6], which provides the infrastructure necessary to support easy creation/deletion of accounts, unique IDs, a secure audit trail and the propagation of this information to any related user databases in real time. The project has investigated how Shibboleth can utilise the NSure directory information to allow one-stop authentication from the primary staff/student information directory, and also how any access control attributes required may be integrated into this system. It should be noted that none of the applications within this paper rely on any non-identity based user
2 attributes (such as role or an eduperson [7] type attribute) for access control, so no changes to the NSure directory or schema are required. However, this kind of functionality is required to enable finegrained access control to protected resources. We will detail how we have tackled this problem through the use of multiple attribute authorities. The University has defined 4 initial key services which would benefit from single sign-on: Moodle online virtual learning environment WebSURF online personal record update facility WebMail browser based student A Network filestore browser The implementation for the final item, the network filestore, is incomplete at the time of writing, so this paper will focus on the issues encountered in Shibboleth-enabling the Moodle and WebSURF services which already exist, and also an opensource version of Novell Webmail called Hula [8] 2. Shibboleth Shibboleth is an Internet2 Middleware initiative to establish a federated authentication mechanism based on SAML [9]. The SAML profile calls for the creation of several trusted entities who are responsible for exchanging information about users, and these entities communicated through encrypted channels, thus preserving information privacy. An Identity Provider (IdP), sometimes referred to as an Origin is a body which releases digital credentials about its users. These credentials are typically released as multi-valued attributes, containing any information about the user which could be used to make an access control decision. The attributes may consist of direct, real-world attributes such as Surname, Postal Address, Telephone number, or more abstract credentials like role, privilege or licences. There is no generic authentication method required for use with Shibboleth rather it is intended to support your local authentication system. Hence, systems like CAS [10] and Pubcookie [11] are popular, whereas in our infrastructure, we make use of the mod_auth_ldap [12] plug-in for Apache [13] which allows the login to use an LDAP directory. The IdP is responsible for defining the subset of user attributes which will be released to the federation of trusted sites (called an Attribute Release Policy or ARP), but has no policy on what should be done with them. A Service Provider (SP) is therefore defined, who acts as the resource or service which is to be Shibboleth protected. The Service Provider receives attributes from the IdP according to its own Attribute Acceptance Policy (AAP) and exposes them internally to applications running on the SP as HTTP headers. Any application may use the information encoded in these headers to make its access control decisions. A further (optional) entity is defined, called a Where Are You From (WAYF) service, which is provided by the UK SDSS federation. A WAYF normally takes the form of an intermediate web page listing all of the subscribed institutions which the user selects their home institution from. A normal invocation of a Shibboleth-protected resource proceeds as follows. The user types the URL of the desired resource into their browser, at this point the SP will detect that the user is requesting a Shibboleth-protected resource and will forward the user to the WAYF service. The user selects their home institution from the drop-down list, and then the user is forwarded to their IdP for authentication utilising their local username/password. Our implementation of Shibboleth uses the mod_auth_ldap Apache module to communicate with the central campus LDAP server for authentication and attribute retrieval. This module by default does the query and reception in nonencrypted cleartext which exposes the link between the Identity Provider and the campus LDAP as exploitable by packet sniffing software. There are two solutions being considered, one involves setting up a secure SSL connection between these two nodes which has proven to be problematic due to the lack of a clear defined standard for SSL to LDAP, but also NSure has stricter requirements on how external connections may and may not be made to its directories. The second solution involves migration of the Identity Provider to sit behind the same network switch as the campus LDAP. Then the fact that the IdP-LDAP connection is unencrypted is no longer an issue as this part of the network would be invisible to the outside world. Obviously the first option offers greater flexibility so efforts are ongoing in this area to supply a location-independent Identity Provider. 3. Moodle Moodle is an open-source course management system which allows educators and teachers to create online virtual learning environments [14]. Moodle now has over 100,000 registered users in over 150 countries and is being adopted by educational institutions worldwide. As is the case in Glasgow, most institutions end up deploying multiple Moodles on a departmental basis, each controlling the content of their individual sites. In the current regime, a student who is logged into Moodle in one department will have to log in again if they change to a different Moodle site, the irony being that the separate Moodles will probably be extracting their authentication details from the very
3 same central directory. Moodle also transmits and receives its login information in cleartext, which carries heavy security implications if the resource is being accessed from outside the campus. this may not be desirable in the production environment. It should be noted that after the initial login to the Moodle, the Shibboleth single sign-on functions correctly. We are investigating ways in which an initial login to Moodle can detect whether or not a Shibboleth session is active and create the appropriate user session. 4. Figure 1: The University of Glasgow central campus Moodle Moodle ships with login modules supporting various types of authentication mechanism, and a Shibboleth module is supplied with the standard build. The module is configured within the Moodle system admin page, where a configuration page allows various fields that Moodle can use (Surname, UID, address etc.) to be mapped to HTTP headers that Shibboleth uses to expose its attributes. In Glasgow, the central Moodle uses five standard LDAP attributes to create a user session: uid (or cn); givenname; first name; surname and address. The Moodle session username is created from the uid attribute as this is unique across campus. The other information can be used by Moodle in its accounting/audit feature. The standard Shibboleth configuration contains a global Apache directive which states: allowoverride None This means that Apache will not consider parsing.htaccess files if the Shibboleth login fails. This is desirable for normal operation, but Moodle uses a.htaccess file to provide user attributes if a Shibboleth session already exists. Hence this macro must be set to all to allow single sign-on to be achieved. Since this change need only be applied to the Moodle directory, this directive does not negatively impact upon any other Shibboleth protected services on that resource. There is a further complication in that if the user had logged into Shibboleth from a different page than Moodle, the first time they visit Moodle they are pointed to a page which allows them to choose between the normal generic login and a Shibboleth login. This problem is alleviated if the Moodle front page is set to a Shibboleth only authentication, but The NSure account system offers an service (NetMail) [15] viewable via a web browser interface. The NetMail service is deployed in its own web container, which would make Shibboleth enabling this application almost impossible without specific code changes from Novell. However, an open-source UNIX version of the NetMail service called Hula is available which aims to provide a version of NetMail configurable for non-windows platforms, and more importantly can be run inside a separate web server application like Apache. Hula is called from the mod_python Apache plug-in module, and provides the same functionality as the proprietary NSure system. There was no way to tie this work into the live WebMail system at present, so this effort remains documented to speed up any future implementation. 5. WebSURF WebSURF [16] is a browser-based application which allows students and staff to view and update central student records at any time and from any internet-enabled location. Students can use WebSURF to register for courses, check and maintain personal information and view their examination results. University staff can also use the system to view student records or update faculty information. The WebSURF software was written by the Management Information Services group at the University of Glasgow. In the current live implementation, WebSURF is a J2EE application which runs in a JBoss container utilising JAAS for login security. For students, an LDAP login module is used for communication with the central campus LDAP server. For staff, a remote EJB bean queries various staff authentication mechanisms which require pre-registration. For interfacing with Shibboleth, the generic JAAS module in JBoss was replaced with the SPIE JAAS module from the University of Oxford [17]. The SPIE JAAS Shibboleth module allows JBoss to pass security context information received from Shibboleth to the WebSURF application, or indeed any application running in JBoss. SPIE JAAS allows Shibboleth attributes to be accessed through standard JSP Servlet API calls. As such, it is quite
4 easy to integrate with other existing applications with little changes to code. Shibboleth authenticates the user (if not already done so) and receives their attributes, passing this information to the SPIE JAAS Login module through the mod_jk2 connector under the Shib-Attributes HTTP header. The SPIE Login module is responsible for extracting the user ID (in our case, the uid attribute) from the header, and passes the other extracted attributes to the SPIE JAAS Module. The SPIE JAAS Module creates a random key for the passed attribute set and passes the key back to the SPIE Login module for it to use as a temporary password for the session. Once formed, the password and username extracted from the attribute assertion are presented to the original application login page as if this information was input manually. The SPIE JAAS module can also perform rudimentary access control based on any attributes that have been defined to be used as a user role, although this is not strictly necessary for WebSURF. How the SPIE JAAS functionality has been integrated within the framework of our WebSURF system is shown in Figure 1. Figure 2: The SPIE JAAS Login module operating in a Shibboleth-protected JBoss application server. The SAML exchange with the Shibboleth federation will only be done if a session doesn t already exist. A test application was deployed to mimic the WebSURF deployment environment as closely as possible. Using information retrieved by Shibboleth from the central campus LDAP, our application was able to utilise the unique user ID attribute to form an application session within JBoss. The application was able to use already established security contexts from Shibboleth, thereby fulfilling the single sign-on requirement. Since WebSURF takes its login information from the generic JAAS module, the SPIE JAAS module will provide exactly the same information so no modification of the production WebSURF code will be necessary. However, the databases and resources utilised by the production version of WebSURF are too sensitive to allow deployment of the tool as it stands, and the tool is not designed for any more than one single deployment at the University of Glasgow. We negotiated a partial rewrite of the WebSURF functionality to demonstrate a test deployment which looks and operates like a normal WebSURF session, retaining an identical login implementation, but without compromising highly sensitive information sources. 6. Storing Attributes By default, Shibboleth is configured with a single LDAP connector which it uses to retrieve user attributes. Since it is unlikely that a single attribute authority will be supplying all information about a user within an institution, there is provision in the Shibboleth configuration for the use of multiple data connectors so attributes from many sources may be located. A slightly different motivation for this may be found in the prevalent use of existing authentication mechanisms across campus in our example, the Novell NSure system. With these established solutions comes a certain reluctance on the institution s part to allow a new piece of software to start demanding that particular attributes or schemas may be appended or at worst, replaced. For example, in our current use case, the central campus LDAP directory was queried by the mod_auth_ldap Apache plug in to confirm the identity asserted by the username/password combination given by the user when prompted. However, since the central LDAP has not adopted the eduperson schema, there would exist no placeholder for the user attributes within that directory (as our portal pages require the edupersonentitlement attribute to provide user roles in the organisation). However, using the principal identifier used to parse the central LDAP, we can search other LDAPs (AAs) for attributes pertaining to that user s rights as long as the user entries contain this one piece of linking information (uid) to associate the user entries across multiple LDAPs, possibly with distinct Distinguished Names (DNs). The University of Glasgow has, as part of its unified account mechanism, guaranteed that the uid attribute is unique for all users across campus, therefore this attribute may be confidently used to link user entries in separate LDAP servers to uniquely identify users. This provision allows departments within Universities to set up their own Attribute Authorities (LDAP servers for example) to issue roles to their employees, adopting completely separate LDAP
5 namespaces if they so wish, but providing the uid attribute is the same as the central campus LDAP, this AA may be parsed by Shibboleth for user attributes. There are several precautionary measures that need to be taken however when configuring the Shibboleth JNDI connectors (which make the connection to LDAP). By default, a connector will return an error if a user is not found in a directory. While this is a desirable feature for robustness, it has the effect that a user would need an entry in every LDAP directory that the IdP searches. An error in one directory causes a global error that returns no attributes, even if a valid set is located in another LDAP. The solution to this is to use a configuration parameter in the JNDI connector definition of propagateerrors= false noresultiserror= false This has the effect of ignoring errors occurring from a user s lack of entries in certain directories. As an illustration (Figure 3), consider the situation where a clinical medicine researcher may wish to collaborate with a department hosting geographical databases in order to link patient illness to census data, for example. He already holds an attribute in his home department (Clin_projectY) but requires roles to access the geography resources. In this case, the researcher would request a particular role (Geo_project1) from the geographical department, who would create a new user within their own LDAP representing the researcher, remembering to issue the user the same unique uid as the central LDAP, and allocate the appropriate role there. This allows the collaborating department to fully control the attributes pertaining to access of its own services, yet if this user is removed from the University, it will not be critical for the department to remove this user s attribute as the user will fail the very first authentication step and the user s attributes would never get requested. Figure 3: Distributed attributes from multiple campus Attribute Authorities, linked by a common institutionally unique 'uid'. In contrast to the above distributed attributes model, we have investigated in previous projects the idea of Dynamic Delegation. Put simply, this allows departments to collaborate by issuing roles and the right to issue roles to its fellow collaborators directly, rather than retaining them locally. Using the previous clinical/geographic example, the researcher would request an attribute to allow them to access the geographical database, and the geography department would issue the role directly to the researcher s LDAP server in clinical medicine. Therefore roles for many departments would be stored in a single placeholder representing the user s home department. See Figure 4 for a schematic of this interaction. Since this model involves surrendering some control over your own attributes (as they are being stored externally) there must be a secure infrastructure to allow these roles to propagate in a controlled manner. The PERMIS Delegation Issuing Service (DIS) [18] is a web service which allows such a model to be implemented, but the attributes are stored in LDAP in the form of X.509 Attribute Certificates, which are digitally signed offering another layer of security. ACs are issued according to a local policy, so initially a collaborating department would know nothing of an external department s attribute set. The external department therefore issues a Role Allocation Policy to the home department, allowing the external department s role to be issued in the user s home LDAP while obeying any restrictions that the external department wishes to enforce.
6 Figure 4: Use of the Delegation Issuing Service to allocate external department's roles to the user's home department. This allows a single Attribute Authority to contain all the information regarding a user's privileges across campus. The DyVOSE (Dynamic Virtual Organisations in e- Science Education) [19] project investigated a use case involving PERMIS-protected access to databases located in two different locations, enforced by two separately authored policies. The two sites agreed to exchange Role Allocation Policies which allowed the remote institution to allocate roles required for access to its services to a user based at their home institution. The Attribute Certificates themselves are issued by the DIS Web Service on behalf of privileged users (systems administrators or directors). This means that these users do not require a signing key pair to issue ACs to their subordinates, the advantage gained being that subsequent revocation of any user s key pair at any point in a signing chain will not invalidate any legally issued end-user certificates that this revoked user had handed out. It should be noted that all certificate usage and interaction is done in the background, and no certificates need to be handled by the user. Also, because the roles are stored in the form of signed digital certificates, it means that the certificate needs to be decoded by openssl, for instance, in order to extract an attribute string. This model is appropriate for fine-grained access control, but is unlikely to be adopted by an institutional-level security system. It would be expected that individual departments/projects would make the decision to adopt this technology. 7. Scoping Attributes One of the immediate issues with operating Shibboleth in a large scale federation such as the UK Access Management Federation [20] is that of implied trust. When a new Shibboleth Service Provider is implemented, the default behaviour is to accept the authentication assertions issued by any Identity Provider in the federation. Typically, coarse grained access control can be enforced using the attributes passed by Shibboleth, however there could arise a situation where two Service Providers require the same value of a generic attribute (such as edupersonentitlement) purely coincidentally. For example, Site A requires an edupersonentitlement attribute of full_access to gain access to their biological data, whereas Site B requires the same attribute to access its particle physics data. Even if these sites are unaware of each other s existence, if a user authenticates at Site A and then finds the URL of the Site B service, their authentication assertion will be trusted anyway, but their authorisation token will be correct to access a system they are not intended to access, purely because the same attribute value has been presented. A solution to this is to scope the user attributes provided by Shibboleth. Using this concept, an Identity Provider may be configured to only release a certain attribute to a specific Service Provider (or set of Service Providers). In a similar way, Service Providers may be configured to only accept attributes from a particular Identity Provider, so the situation described above is avoided as Site A will not be able to assert Site B s edupersonentitlement attribute. Related to location scope is attribute value scope. Using this allows not only the location of an attribute to be filtered, but also its value. This is useful as a user may have many attributes relating to several projects, some of which may not be desirable to release to just anyone. Using value scope, a Service Provider can only accept the subset of attributes that it is interested in and reject the rest. This rejection happens within the Shibboleth Apache module so the sensitive attributes can never get through to the service itself. 8. Conclusions We have demonstrated that it is possible to integrate Shibboleth with a central institution authentication infrastructure without impacting on their operations. We successfully integrated Moodle, a bespoke student WebSURF application, and our own Grid resources with the University s unified account management system. We have adopted an infrastructure which allows the campus LDAP to be the authoritative source of user authentication information, yet through the use of multiple attribute authorities, we have shown it would be possible for individual departments or groups within the University to issue attributes and roles to their users for access to their own systems or for access to resources provided by collaborators. This work is being used in several other projects at the National e-science Centre at the University of Glasgow including the EPSRC pilot project Meeting the Design Challenges of nanocmos Electronics
7 project [21]. This and other projects are providing real life use cases testing this security infrastructure, and we expect will demonstrate scalability not just at institutional level but across national level Shibboleth-based access management federations. 9. Acknowledgements Many thanks to Dr. Christian Fernau of the University of Oxford for his help in configuring their SPIE JAAS module, and also to Lukas Haemmerle of SWITCH, Switzerland for his help with the Moodle Shibboleth authentication module. Thanks to Robert Stewart of the Management Information Service at the University of Glasgow for information and executables for the WebSURF application, and to Dave Anderson of IT Services for his help with accessing the central campus LDAP server at the University of Glasgow. Thanks are also due to Scott Cantor, Nate Klingenstein and Chad Le Joie for their help through the Shibboleth support mailing list. GLASS is funded from a grant from JISC whom we also acknowledge here. [16] WebSURF Student Records Update Service, University of Glasgow (Robert Stewart, Management Information Services), [17] SPIE JAAS Module Architecture, SPIE Project, University of Oxford, earch [18] D.W.Chadwick, A.Otenko, The PERMIS X.509 Role Based Privilege Management Infrastructure, Future Generation Computer Systems, 936 (2002) 1-13 December Elsevier Science BV. [19] J.Watt, J.Koetsier, A.Stell, R.O.Sinnott, DyVOSE Project: Experiences in Applying Privilege Management Infrastructures in UK e- Science All Hands Meeting Proceedings, Nottingham, September 2006 [20] The UK Access Management Federation for Education and Research, [21] Meeting the Design Challenges of nanocmos Electronics EPSRC Pilot Project References [1] Internet2 Shibboleth Technology, [2] eduserve Middleware Assisted Take-Up Service (MATU) [3] eduserve Athens for Education, [4] SDSS Federation [5] JISC Funded Glasgow University Early Adoption of Shibboleth (GLASS) Project [6] NSure, Novell Identity Manager [7] eduperson Specification [8] The Hula Project, Novell, [9] Security Assertion Markup Language (SAML) v2, March [10] Community Authorisation Server [11] Pubcookie: Open-source software for intrainstitutional web authentication, [12] mod_authz_ldap: X509 Certificates and LDAP [13] Apache Web Server, [14] Moodle A Free Open Source Course Management System for Online Learning [15] Novell NetMail
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
IAM, Enterprise Directories and Shibboleth (oh my!)
IAM, Enterprise Directories and Shibboleth (oh my!) Gary Windham Senior Enterprise Systems Architect University Information Technology Services [email protected] What is IAM? Identity and Access
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5
Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5 TABLE OF CONTENTS Introduction... 1 Purpose and Target Audience... 1 Commonly Used Terms... 1 Overview of Shibboleth User
Remote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
SINGLE SIGN-ON AND AUTHORIZATION FOR DYNAMIC VIRTUAL ORGANIZATIONS
58 SINGLE SIGN-ON AND AUTHORIZATION FOR DYNAMIC VIRTUAL ORGANIZATIONS R.O. Sinnott 1, O. Ajayi 1, A.J. Stell 1, J. Watt 1, J. Jiang 1, J. Koetsier 2 National e-science Centre 1 University of Glasgow, Glasgow,
Authentication and access control in Sympa mailing list server
Authentication and access control in Sympa mailing list server February 2004 Serge Aumont & Olivier Salaün Comité Réseau des Universités http://www.cru.fr Campus de Beaulieu, Rennes France 1 Introduction
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
IT@Intel. Improving Security and Productivity through Federation and Single Sign-on
White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
IGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
SchoolBooking SSO Integration Guide
SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
REDCap General Security Overview
REDCap General Security Overview Introduction REDCap is a web application for building and managing online surveys and databases, and thus proper security practices must instituted on the network and server(s)
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.
ORACLE DATABASE SECURITY Cristina-Maria Titrade 1 Abstract This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource
Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies
Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900
OAuth 2.0 Developers Guide Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 Table of Contents Contents TABLE OF CONTENTS... 2 ABOUT THIS DOCUMENT... 3 GETTING STARTED... 4
Authentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
Canadian Access Federation: Trust Assertion Document (TAD)
Participant Name: University of Lethbridge 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources
OpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com
PingFederate. SSO Integration Overview
PingFederate SSO Integration Overview 2006-2012 Ping Identity Corporation. All rights reserved. PingFederate SSO Integration Overview Version 6.6 January, 2012 Ping Identity Corporation 1001 17th Street,
Single Sign-On Implementation Guide
Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
WebLogic Server 7.0 Single Sign-On: An Overview
WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
Google Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
S P I E Information Environments Shibboleth and Its Integration into Security Architectures. EDUCAUSE & Internet 2 Security Professionals Conference
Shibboleth and Its Integration into Security Architectures Christian Fernau, Francisco Pinto University of Oxford EDUCAUSE & Internet 2 Security Professionals Conference Denver, CO 10-12 April 2006 16:47:29
Authentication and access control in Sympa mailing list software
Authentication and access control in Sympa mailing list software May 2004 Serge Aumont & Olivier Salaün Comité Réseau des Universités http://www.cru.fr Campus de Beaulieu, Rennes France 1 Introduction
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
WebNow Single Sign-On Solutions
WebNow Single Sign-On Solutions Technical Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2015 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,
Web based single sign on. Caleb Racey Web development officer Webteam, customer services, ISS
Web based single sign on Caleb Racey Web development officer Webteam, customer services, ISS Overview The need for single sign on (SSO) User and admin perspectives Current state off SSO provision pubcookie
Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department [email protected]
Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department [email protected] Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation
Configuring. Moodle. Chapter 82
Chapter 82 Configuring Moodle The following is an overview of the steps required to configure the Moodle Web application for single sign-on (SSO) via SAML. Moodle offers SP-initiated SAML SSO only. 1 Prepare
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications
Federated Identity Management and Shibboleth Noreen Hogan Asst. Director Enterprise Admin. Applications Federated Identity Management Management of digital identity/credentials (username/password) Access
White Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
White Paper March 1, 2005. Integrating AR System with Single Sign-On (SSO) authentication systems
White Paper March 1, 2005 Integrating AR System with Single Sign-On (SSO) authentication systems Copyright 2005 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service
SOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
Shibboleth N-Tier Support. Chad La Joie [email protected]
Shibboleth N-Tier Support Chad La Joie [email protected] Agenda Use Case Terminology Shibboleth Solution Future Effort Resources 2 Use Case Current use case comes from University of Chicago University
Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Drupal
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Certificate technology on Pulse Secure Access
Certificate technology on Pulse Secure Access How-to Guide Published Date July 2015 Contents Introduction: 3 Creating a Certificate signing request (CSR): 3 Import Intermediate CAs: 5 Using Trusted Client
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]
Enabling SSO between Cognos 8 and WebSphere Portal
Guideline Enabling SSO between Cognos 8 and WebSphere Portal Product(s): Cognos 8 Area of Interest: Security Enabling SSO between Cognos 8 and WebSphere Portal 2 Copyright Your use of this document is
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
Certified Secure Web Application Secure Development Checklist
www.certifiedsecure.com [email protected] Tel.: +31 (0)70 310 13 40 Loire 128-A 2491 AJ The Hague The Netherlands About Certified Secure Checklist Certified Secure exists to encourage and fulfill
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
Certificate technology on Junos Pulse Secure Access
Certificate technology on Junos Pulse Secure Access How-to Introduction:... 1 Creating a Certificate signing request (CSR):... 1 Import Intermediate CAs: 3 Using Trusted Client CA on Juno Pulse Secure
IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0
International Virtual Observatory Alliance IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 IVOA Proposed Recommendation 20151029 Working group http://www.ivoa.net/twiki/bin/view/ivoa/ivoagridandwebservices
Revolution R Enterprise DeployR 7.1 Enterprise Security Guide. Authentication, Authorization, and Access Controls
Revolution R Enterprise DeployR 7.1 Enterprise Security Guide Authentication, Authorization, and Access Controls The correct bibliographic citation for this manual is as follows: Revolution Analytics,
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
Canadian Access Federation: Trust Assertion Document (TAD)
Participant Name: RESEARCH RESEARCH LTD. 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources
Microsoft Active Directory Oracle Enterprise Gateway Integration Guide
An Oracle White Paper May 2011 Microsoft Active Directory Oracle Enterprise Gateway Integration Guide 1/33 Disclaimer The following is intended to outline our general product direction. It is intended
SecureAuth Authentication: How SecureAuth performs what was previously impossible using X.509 certificates
SecureAuth Authentication: How SecureAuth performs what was previously impossible using X.509 certificates As enterprises move their applications to the Web and mobile platforms, providing strong security
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Axway API Gateway. Version 7.4.1
O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources Paul Riddle University of Maryland Baltimore County EDUCAUSE Mid-Atlantic Regional Conference January 16, 2008 Copyright
esoc SSA DC-I Part 1 - Single Sign-On and Access Management ICD
esoc European Space Operations Centre Robert-Bosch-Strasse 5 64293 Darmstadt Germany Tel: (49)615190-0 Fax: (49)615190485 www.esa.int SSA DC-I Part 1 - Single Sign-On and Access Management ICD Prepared
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.
This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and
Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
OpenSSO: Cross Domain Single Sign On
OpenSSO: Cross Domain Single Sign On Version 0.1 History of versions Version Date Author(s) Changes 0.1 11/30/2006 Dennis Seah Contents Initial Draft. 1 Introduction 1 2 Single Domain Single Sign-On 2
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle [email protected]
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle [email protected] Berne, 13. August 2014 Introduction App by University of St. Gallen Universities
Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5
Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5 Disclaimer The following is intended to outline our general product
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
Identity Management in Quercus. CampusIT_QUERCUS
Identity Management in Quercus Student Interaction. Simplified CampusIT_QUERCUS Document information Document version 1.0 Document title Identity Management in Quercus Copyright All rights reserved. No
SAML Authentication Quick Start Guide
SAML Authentication Quick Start Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved.
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
Protected Trust Directory Sync Guide
Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide 2 Overview Protected Trust Directory Sync enables your organization to synchronize the users and distribution lists in Active Directory
Spring Security 3. rpafktl Pen source. intruders with this easy to follow practical guide. Secure your web applications against malicious
Spring Security 3 Secure your web applications against malicious intruders with this easy to follow practical guide Peter Mularien rpafktl Pen source cfb II nv.iv I I community experience distilled
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
Creating federated authorisation
Creating federated authorisation for a Django survey application Ed Crewe Background - the survey application Federated authorisation What do I mean by this? 1. Users login at a third party identity provider
enterprise^ IBM WebSphere Application Server v7.0 Security "publishing Secure your WebSphere applications with Java EE and JAAS security standards
IBM WebSphere Application Server v7.0 Security Secure your WebSphere applications with Java EE and JAAS security standards Omar Siliceo "publishing enterprise^ birmingham - mumbai Preface 1 Chapter 1:
LISTSERV LDAP Documentation
LISTSERV LDAP Documentation L Soft Sweden AB 2007 28 November 2007 Overview LISTSERV version 15.5 can interface to LDAP servers to authenticate user logins, to insert LDAP attributes in mail merge distributions
