Liberty Alliance Project Setting the Standard for Federated Network Identity
|
|
|
- Claude Hicks
- 10 years ago
- Views:
Transcription
1 Liberty Alliance Project Setting the Standard for Network Identity Privacy, Identity Management and Services using Liberty technologies in Mobile Environment. Identity Management Rise of electronic networks: Need stronger or relevant (business related) use of identity verification and authorization Company extranets Online trading Identity fraud (#1 consumer complaint): Worldwide monetary losses from identity theft were approximately $8.75 billion in 2002, and are expected to triple to roughly $24 billion in 2003* Timo Skyttä Nokia Mobile Software Strategic Architecture 1 Importance of Identity Management crosses industries and sections: It is required in any B2C, B2B or B2E transaction whether the entities are private businesses or governmental organizations * Aberdeen research 2 Identity & Identity Management Federation reflects how relationships are kept in the real-world Not all identity information is held in one place No centralized single point of failure Opportunity for any trusted business to become a trusted identity provider More than single sign-on What is the Liberty Alliance? A business alliance, formed in Sept 2001 with the goal of establishing an open standard for federated identity management Global membership consists of consumer-facing companies and technology vendors as well as policy and government organizations The only open organization working to address the technology and business issues of federated identity management It s how personal information is authenticated, shared and managed 3 4 1
2 Some current challenges for Mobile Industry (related to Identity Management) Tightening privacy legislation in EU use of MSISDN (phone number) as an identifier automatically attached to outgoing HTPP-requests becomes questionable Number portability makes it difficult to associate a phone number to a certain provider of services needs to invent a new reference mechanism Many of the mechanisms used in Fixed internet, based on HTTP redirect, cause too many round trips and delays in mobile environment Consumer awareness and concern over generic privacy and misuse use of personal information is growing, need for a trusted environment A mass market phone doesn t have full keyboard, and is not likel y to have one in the foreseeable future -> data entry difficulties -> service adoption problems User s want personalized services to get quicker access to the content they want, mobile phone screen is small, can present only a limited amount of information personalization is key, do not compromise user s privacy unnecessarily when doing this To solve Identity Management, including personalized service access, do not create a mobile specific, but a mobile aware solution. This drives adoption both in Mobile and Fixed internet 5 Make the life of user and service provider easy, but trusted and secure Nokia architecture - Identity Manager as the outermost Personal Security & Privacy tool towards services Service User Interface (browsing/messaging/java app s) Services without All other services any need to invoke Identity know anything Manager at login, about the user, when using a form, i.e. NO login, installing/using an NO on-line forms, ID mechanism or NO hidden ID when initiating a mechanisms transaction NOR transactions Services Identity Manager User Interface (invoked if needed) Secure user authentication Identity Manager User Profile Authentication & Authorizations Privacy & Identity Secure storage 6 Before Liberty Use Case After Liberty Use Case Timo must log-in to portal with an ID and password After selecting a TV site he must log-in again Log-in s like above can require 80+ clicks and more than 30 seconds of time on a typical mobile phone keypad Users often give up in frustration, limiting use of mobile data services 7 Timo has chosen to link his three favorite sites When Timo logs into the portal, the mobile operator automatically authenticates him Timo clicks on the TV and is automatically signed-on Timo goes to his bookmarks and instantly logs-on to his 8 2
3 Thank You Additional material Questions? 9 10 Liberty Alliance Vision Mission: To serve as the premier open Alliance for federated network identity management & services by ensuring interoperability, supporting privacy and promoting adoption of its specifications, guidelines and best practices. Goals: Provide open standard and business guidelines for federated identity management spanning all network devices Provide open and secure standard for SSO with decentralized authentication and open authorization Allow consumers/businesses to maintain personal information more securely, and on their terms 11 Liberty Alliance IS IS a member community delivering technical specifications, business and privacy best practices IS providing a venue for testing interoperability and identifying business requirements IS developing an open, federated identity standard that can be built into other companies branded products and services IS driving convergence of open standards Defining Liberty Liberty Alliance IS NOT IS NOT a consumer-facing product or service IS NOT developed and supported by one company IS NOT based on a centralized model 12 3
4 Privacy, Liaison Privacy 16 Responsible Final How does Liberty work? Management Board Business Marketing Expert Group Requirements and use cases Responsible for evangelism and public relations Business templates and guidelines Accelerates market creation founding sponsors for overall governance, legal, finances, and operations voting authority for specifications Public Policy Expert Group security, and global public policy issues to privacy groups and government agencies guidelines and best practices for publication Technology Expert Group Technical architecture & specifications Services Expert Group Service marketing requirements Technical specifications Defines service interoperability & conformance programs Conformance Expert Group Technical req. Licensing req. Monitor Logo usage Manage Conformance testing program for Core specifications The Business Case The Role of Identity in Web Services All members provide feedback on early drafts The Problem Today Identity Management is a strategic capability that will solve real business problems Burton Group, July 2003 Companies need solutions How to leverage new trends to generate revenue How to lower lower costs And still address customer worries about privacy & security Companies are spending billions of dollars on Web Service projects (figures vary by analyst) Very few enterprises have completed projects 15 Current barriers to wide-scale adoption Lack of technical standards for managing identity Lack of interoperability between products and services Lack of a federated model Lack of privacy and security best practices Lack of business best practices 16 4
5 Identity problems exploding: No common method to approach identity Fragmentation of customers identities across different many different sources Growing privacy / regulatory pressures Increasing potential and risk of identity theft Convergence of internet and mobile world Desire to provide higher value-add services to customers Industries Ready for Identity Wireless Number Portability Act enabling customers to retain their mobile phone number when changing carriers Emerging privacy legislation makes use of phone number as an identifier towards services quite difficult Limited data entry capabilities (small screens, small keypads) Users want immediate access to personalized services Exploitation of data services and m-commerce Finance - State and national legislation driving need to protect privacy and identity - Increasing opportunity to drive new partnerships and initiatives dependent upon identity initiatives Healthcare HIPAA legislation organizations are responsible for ensuring identifiable information is protected while stored or in transit 17 Government Increasing incentives for e-filing and online tax returns Bush administration s eauthentication mandate (led by GSA) 18 Recent Accomplishments January 2002 Liberty begins specification development July 2002 Liberty releases Phase 1 specifications Liberty Progress & Momentum April 2003 Liberty releases Phase 2 specification drafts; demonstrates interoperability among 20 products; donates Phase 1 specifications to OASIS (SAML) June 2003 Liberty releases first business guidelines; releases Phase 1 Japanese specifications
6 Increasingly Diverse Involvement Growth in government, non-profit and education sector involvement GSA, DoD, Canada Post, Hong Kong Post, Royal Mail, TRUSTe, Universitat-Hamburg, U. of Chicago, ISTPA More than 150 member organizations globally Liberty Alliance Members Driven by end-users, government orgs and vendors Led by Technology, Business and Public Policy Expert Groups Close relationships with other standards groups OMA, OASIS, The Open Group, Internet2 Increasing global involvement 25% of members are headquartered in Europe/APAC Liberty-enabled products & services Sample Download Statistics Communicator (available) Computer Associates (Q4*) DataKey (available) DigiGan (Q3*) Ericsson (Q4) Entrust (Q1 2004) France Telecom (Q4 2003) Fujitsu Invia (available) Gemplus (TBD) HP (available) July Systems (available) Netegrity (2004) NeuStar (available) Nokia (2004) Novell (available) NTT (TBD) NTT Software (available) Oblix (2004) PeopleSoft (available) Phaos Technology (available) Ping Identity (available) PostX (available) RSA (Q4) Salesforce.com (TBD) Sigaba (available) Sun Microsystems (available) Trustgenix (available) Ubisecure (available) Verisign (Q4*) Vodafone (2004) WaveSet (available) SourceID enables Liberty federation and SSO and is a good indicator of Liberty interest. Download statistics below* More than 1,000 downloads in 100 days Majority of downloads are by global 1000 corporations 72.85% are from companies *not* members of the Alliance 22.8% of the downloads are from governmental or academic institutions Telecommunications/wireless, financial services and manufacturing sectors have highest number of downloads Immediate interest in Liberty s Phase 2 specifications Approximately 5,000 downloads of specification-related documents from Liberty s website three weeks following launch 800 downloads of Liberty s Privacy Best Practices document from Liberty s website three weeks following launch *Delivery dates being confirmed 23 *SourceID sponsored by Liberty member Ping Identity Corporation 24 6
7 Circle of Trust Concepts & Liberty Architecture 25 Identity Management Concepts What is (digital) identity? App, Site, or Profiles Consumer Profiles Common Profile Info Credentials Unique Identifier Credentials Address, etc. Employer Profiles App, Site, or Profiles Represents principals (users, apps, etc.) Name, number, other identifier, Unique in some scope Persistent, long-lived or one-time May be anonymous, pseudonym or true name May have multiple credentials Different strengths, different apps Can change w/more frequency Attributes, entitlements, policies More transient, fluid information Often specific to apps or sites 26 Circle of Trust Concept Circle of Trust Model H G F A Network Identity Network Identity Network Hub Provider Identity Hub Provider Hub Provider E B C D 27 H G F A Network Identity Network Identity Network Hub Provider Identity Hub Provider Hub Provider E B C D Identity Service Provider (s) (IdP) (e.g. Financial Institution, HR) Trusted entity Authentication infrastructure Maintains Core Identity attributes Offers value-added services (optional) Affiliated Service Providers Maintain additional user attributes Offers complimentary service Don't (necessarily) invest in authentication infrastructure 28 7
8 Liberty Identity Federation Framework (ID-FF) Enables identity federation and management through features such as identity/account linkage, simplified sign on, and simple session management The Complete Liberty Architecture Liberty Identity Services Interface Specifications (ID-SIS) Enables interoperable identity services such as personal identity profile service, alert service, calendar service, wallet service, contacts service, geo-location service, presence service and so on. Liberty Identity Web Services Framework (ID-WSF) Provides the framework for building interoperable identity services, permission based attribute sharing, identity service description and discovery, and the associated security profiles ID-FF ID-FF Architectural Overview 1.2 ID-FF Implementation Guidelines 1.2 ID-FF Static Conformance Req. 1.2 ID-FF Protocols and Schemas 1.2 ID-FF Bindings and Profiles 1.2 Liberty Specification Map Liberty Glossary Liberty Trust Model Guidelines Identity Services Templates Core Identity Services Protocols Web Services Bindings & Profiles ID-Personal Profile Imp.. Guidelines 1.0 ID-Personal Profile 1.0 ID-Personal Profile SCR. 1.0 ID-WSF Architectural Overview 1.0 ID-WSF Static Conformance Req. 1.0 ID-WSF Data Services Template 1.0 ID-WSF Discovery Service 1.0 ID-WSF Security Mechanisms 1.0 IDĒmployee Profile l Imp Guidelines 1.0 ID-Employee Profile 1.0 ID-Employee Profile SCR 1.0 ID -WSF Security & Privacy Overview 1.0 ID-WSF Interaction Service 1.0 ID-WSF SOAP Binding 1.0 ID -WSF Impl. Guidelines 1.0 ID-SIS ID-WSF ID-WSF Client Profiles 1.0 Liberty Authentication Privacy & Security Liberty SASL -based Liberty Reverse HTTP Liberty specifications build on existing standards Context 1.2 Best Practises SOAP AuthN 1.0 Binding 1.0 (SAML, SOAP, WSS, XML, etc.) 29 Liberty Meta Data 1.2 Normative Non-Normative 30 Where does Liberty Fit? OASIS SAML Liberty Alliance Spin-offs (e.g., Meta Data spec) Other enabling standards OASIS WS security SOAP, XML, WSDL, HTTP, HTML Liberty Alliance: a diverse industry consortium that is developing specifications for federated network identity, simplified sign-on, and authorization among diverse network and applications domains Other enabling standards: SPML (Service Provisioning Markup Language) XML Access Control Markup Language (XACML) XML Key Management Specification (XKMS) XML Digital Signature WS-security: mechanisms implemented in SOAP headers designed to enhance SOAP messaging providing a quality of protection through message integrity, message confidentiality, and single message authentication SAML 1.1 (Security Assertion MarkUp Language): a set of XML and SOAP-based services, protocols, and formats for exchanging authentication and authorization information ** See archived Liberty Webinar for more SAML information 31 What Should You Do Now? 32 8
9 Liberty Alliance solves the identity crisis The only global body working to define and drive open technology standards and guidelines for federated identity Addresses business, policy and technical issues associated with federated identity Alliance of global organizations working together to enable the deployment of identity-based web services Consider joining the Alliance Additional Information Learn more about the technical aspects of Liberty Alliance Free webinar from HP Identity See the specifications and white papers at
Identity opens the participation age. Dr. Rainer Eschrich. Program Manager Identity Management Sun Microsystems GmbH
Identity opens the participation age Open Web Single Sign- On und föderierte SSO Dr. Rainer Eschrich Program Manager Identity Management Sun Microsystems GmbH Agenda The Identity is the Network Driving
Federated Identity in the Enterprise
www.css-security.com 425.216.0720 WHITE PAPER The proliferation of user accounts can lead to a lowering of the enterprise security posture as users record their account information in order to remember
Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance
Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance Christina Stephan, MD Co-Chair Liberty Alliance ehealth SIG National Library of Medicine
A secure and auditable Federated Identity and Access Management Infrastructure. Serge Bertini Director, Security Canada
A secure and auditable Federated Identity and Access Management Infrastructure Serge Bertini Director, Security Canada The Role of the Identity While Perimeters dissolve Applications become more distributed
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
The Primer: Nuts and Bolts of Federated Identity Management
The Primer: Nuts and Bolts of Federated Identity Management Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities. With so
The Primer: Nuts and Bolts of Federated Identity Management
The Primer: Nuts and Bolts of Federated Identity Management Executive Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities.
Trusting XBRL: Using the Liberty Web Services Framework to Secure and Authenticate XBRL Documents
Trusting XBRL: Using the Liberty Web Services Framework to Secure and Authenticate XBRL Documents Farrukh Najmi and Eve Maler [email protected], [email protected] Sun Microsystems, Inc. Goals for today's
SAML Federated Identity at OASIS
International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for
Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
Software Requirement Specification Web Services Security
Software Requirement Specification Web Services Security Federation Manager 7.5 Version 0.3 (Draft) Please send comments to: [email protected] This document is subject to the following license:
OIO SAML Profile for Identity Tokens
> OIO SAML Profile for Identity Tokens Version 1.0 IT- & Telestyrelsen October 2009 Content > Document History 3 Introduction 4 Related profiles 4 Profile Requirements 6 Requirements 6
SAML:The Cross-Domain SSO Use Case
SAML:The Cross-Domain SSO Use Case Chris Ceppi Oblix Corporate Engineer Ed Kaminski OBLIX Federal Business Manager 410-349-1828 [email protected] Mike Blackin Principal Systems Engineer Oblix, Inc. 202-588-7397
Interoperable Provisioning in a Distributed World
Interoperable Provisioning in a Distributed World Mark Diodati, Burton Group Ramesh Nagappan, Sun Microsystems Sampo Kellomaki, SymLabs 02/08/07 IAM 302 Contacts Mark Diodati ([email protected])
This way, Bluewin will be able to offer single sign-on for service providers within the circle.
Clareity Security and The National Association of Realtors Develop a SAML Toolkit for the Real Estate Industry Ask any REALTOR about the systems they use and the passwords they deploy. The word mess will
Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone
Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone Although single sign-on (SSO) technology based on Liberty standards is being rapidly adopted by businesses, governments and
Managing Trust in e-health with Federated Identity Management
ehealth Workshop Konolfingen (CH) Dec 4--5, 2007 Managing Trust in e-health with Federated Identity Management Dr. rer. nat. Hellmuth Broda Distinguished Director and CTO, Global Government Strategy, Sun
Software Design Document SAMLv2 IDP Proxying
Software Design Document SAMLv2 IDP Proxying Federation Manager 7.5 Version 0.2 Please send comments to: [email protected] This document is subject to the following license: COMMON DEVELOPMENT AND
Secure the Web: OpenSSO
Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1 Agenda Need for identity-based
Privacy, Security, and Trust with Federated Identity Management
Privacy, Security, and Trust with Federated Identity Management Dr. Hellmuth Broda Distinguished Director and European CTO, Sun Microsystems Spokesperson, Member of the Business Marketing Expert Group,
An Oracle White Paper August 2010. Oracle OpenSSO Fedlet
An Oracle White Paper August 2010 Oracle OpenSSO Fedlet Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
Extending DigiD to the Private Sector (DigiD-2)
TECHNISCHE UNIVERSITEIT EINDHOVEN Department of Mathematics and Computer Science MASTER S THESIS Extending DigiD to the Private Sector (DigiD-2) By Giorgi Moniava Supervisors: Eric Verheul (RU, PwC) L.A.M.
IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN 1 Venkadesh.M M.tech, Dr.A.Chandra Sekar M.E., Ph.d MISTE 2 1 ResearchScholar, Bharath University, Chennai 73, India. [email protected] 2 Professor-CSC
RSA Solution Brief. Federated Identity Manager RSA. A Technical Overview. RSA Solution Brief
RSA Federated Identity Manager A Technical Overview Federated identity management extends the management of digital identities for authorization and access beyond domain and corporate boundaries to externally
OIO Web SSO Profile V2.0.5
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Biometric Single Sign-on using SAML
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP [email protected] 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On
SAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
FEDERATED IDENTITY MANAGEMENT:
FEDERATED IDENTITY MANAGEMENT: An Overview of Concepts and Standards Eve Maler Sun Microsystems, Inc. Last updated 5 January 2006 maler-fed-id 1/5/06 Page 1 Originally presented at XML 2005 in Atlanta,
The Emerging Infrastructure for Identity and Access Management
The Emerging Infrastructure for Identity and Access Management Copyright 2001 The Burton Group. All rights reserved. Open Group In3 Conference January 23, 2002 Jamie Lewis, CEO and Research Chair, [email protected]
Securing Web Services With SAML
Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion
Federation Proxy for Cross Domain Identity Federation
Proxy for Cross Domain Identity Makoto Hatakeyama NEC Corporation, Common Platform Software Res. Lab. 1753, Shimonumabe, Nakahara-Ku, Kawasaki, Kanagawa 211-8666, Japan +81-44-431-7663 [email protected]
Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102
Cloud Standards Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 2011 IBM Corporation Agenda Overview on Cloud Standards Identity and Access Management Discussion 2 Overview on Cloud
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
IBM WebSphere Application Server
IBM WebSphere Application Server SAML 2.0 web single-sign-on 2012 IBM Corporation This presentation describes support for SAML 2.0 web browser Single Sign On profile included in IBM WebSphere Application
The OMA Perspective On SOA in Telecoms
The OMA Perspective On SOA in Telecoms Adopting SOA for Telecom Workshop, Open Standards Forum 2008 Ditton Manor, 30 September 3 October 2008 Musa Unmehopa» Chairman OMA Architecture Working Group» Distinguished
Connected Data. Connected Data requirements for SSO
Chapter 40 Configuring Connected Data The following is an overview of the steps required to configure the Connected Data Web application for single sign-on (SSO) via SAML. Connected Data offers both IdP-initiated
Research and Implementation of Single Sign-On Mechanism for ASP Pattern *
Research and Implementation of Single Sign-On Mechanism for ASP Pattern * Bo Li, Sheng Ge, Tian-yu Wo, and Dian-fu Ma Computer Institute, BeiHang University, PO Box 9-32 Beijing 100083 Abstract Software
Biometric Single Sign-on using SAML Architecture & Design Strategies
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems [email protected] 1 Setting Expectations What you can take away! Understand
Implementing Identity Provider on Mobile Phone
Implementing Identity Provider on Mobile Phone Tsuyoshi Abe, Hiroki Itoh, and Kenji Takahashi NTT Information Sharing Platform Laboratories, NTT Corporation 3-9-11 Midoricho, Musashino-shi, Tokyo 180-8585,
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
DIGIPASS as a Service. Google Apps Integration
DIGIPASS as a Service Google Apps Integration April 2011 Table of Contents 1. Introduction 1.1. Audience and Purpose of this Document 1.2. Available Guides 1.3. What is DIGIPASS as a Service? 1.4. About
LIBERTY ALLIANCE. Case Study: Aetna Enhances Secure Provider Portal with SSO and SAML 2.0. The Company. Key Objectives
Case Study: Aetna Enhances Secure Provider Portal with SSO and SAML 2.0 The Company Aetna is one of the nation s leading diversified health care benefits companies, serving approximately 37.2 million people
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
Revised edition. OIO Web SSO Profile V2.0.9 (also known as OIOSAML 2.0.9) Includes errata and minor clarifications
OIO Web SSO Profile V2.0.9 (also known as OIOSAML 2.0.9) Revised edition Includes errata and minor clarifications Danish Agency for Digitisation September 2012 Contents > 1 Introduction 8 1.1 Referenced
SAML Authentication Quick Start Guide
SAML Authentication Quick Start Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved.
Open Source Identity Integration with OpenSSO
Open Source Identity Integration with OpenSSO April 19, 2008 Pat Patterson Federation Architect [email protected] blogs.sun.com/superpat Agenda Web Access Management > The Problem > The Solution >
For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce.
Chapter 41 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:
T-Check in Technologies for Interoperability: Web Services and Security Single Sign-On
T-Check in Technologies for Interoperability: Web Services and Security Single Sign-On Lutz Wrage Soumya Simanta Grace A. Lewis Saul Jaspan December 2007 TECHNICAL NOTE CMU/SEI-2008-TN-026 Integration
ELM Manages Identities of 4 Million Government Program Users with. Identity Server
ELM Manages Identities of 4 Million Government Program Users with Identity Server ELM Implements Single Sign-on With WSO2 Identity Server to Streamline Administration, Improve Productivity, and Reduce
Enabling SAML for Dynamic Identity Federation Management
Enabling SAML for Dynamic Identity Federation Management Patricia Arias, Florina Almenárez, Andrés Marín and Daniel Díaz-Sánchez University Carlos III of Madrid http://pervasive.gast.it.uc3m.es/ WMNC 2009
NIST s Guide to Secure Web Services
NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:
Revised edition. OIO Web SSO Profile V2.0.8 (also known as OIOSAML 2.0.8) Includes errata and minor clarifications
OIO Web SSO Profile V2.0.8 (also known as OIOSAML 2.0.8) Revised edition Includes errata and minor clarifications Danish Agency for Digitisation December 2011 Contents > 1 Introduction 8 1.1 Referenced
<Insert Picture Here> Oracle Security Developer Tools (OSDT) August 2008
Oracle Security Developer Tools (OSDT) August 2008 Items Introduction OSDT 10g Architecture Business Benefits Oracle Products Currently Using OSDT 10g OSDT 10g APIs Description OSDT
User-centric Mobile Identity Management Services 1
User-centric Mobile Identity Management Services 1 Tewfiq El Maliki and Jean-Marc Seigneur Abstract. Digital identity is the ground necessary to guarantee that the Internet infrastructure is strong enough
Liberty Alliance. CSRF Review. .NET Passport Review. Kerberos Review. CPSC 328 Spring 2009
CSRF Review Liberty Alliance CPSC 328 Spring 2009 Quite similar, yet different from XSS Malicious script or link involved Exploits trust XSS - exploit user s trust in the site CSRF - exploit site s trust
SAML basics A technical introduction to the Security Assertion Markup Language
SAML basics A technical introduction to the Security Assertion Markup Language WWW2002 Eve Maler, XML Standards Architect XML Technology Center Sun Microsystems, Inc. Agenda The problem space SAML concepts
Configuring Salesforce
Chapter 94 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart [email protected]
The Role of Federation in Identity Management
The Role of Federation in Identity Management August 19, 2008 Andrew Latham Solutions Architect Identity Management 1 The Role of Federation in Identity Management Agenda Federation Backgrounder Federation
Identity Management for Converged Networks
Identity Management for Converged Networks A Lucent/Sun white paper February 2006 Editor: Arnaud Sahuguet, Bell Labs research Contributors: Fulup Ar Foll, Sun Microsystems Rick Hull, Bell Labs research
Leveraging SAML for Federated Single Sign-on:
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
