Shibboleth 2: A Guide for Deployers. Scott Cantor [email protected] Internet2 / The Ohio State University
|
|
|
- Sydney Floyd
- 10 years ago
- Views:
Transcription
1 Shibboleth 2: A Guide for Deployers Scott Cantor [email protected] Internet2 / The Ohio State University
2 Outline Introduction to Shibboleth and Related Topics Software Architecture Deploying an Identity Provider Service Providers Futures 2
3 What is Shibboleth? Began life as an experimental project in standardsbased inter-organizational access control, primarily in the library access management space. Stable, second-generation SSO platform for web applications: Open Source (Apache-licensed) Standards-Based (de jure, not de facto) Multi-Protocol (SAML 2, SAML 1, WS-Federation RP) Federated (Multi-Domain) Attribute-Based, Privacy-Enabling 3
4 What is SAML? Security Assertion Markup Language Application of XML for the exchange and use of security-related information OASIS standard since 2003 (Final?) 2.0 revision approved in 2005, integrating capabilities from several federation efforts and profiles, including Shibboleth Widely adopted commercially (now including Microsoft), less so non-commercially due to XMLitis 4
5 SAML 2.0 Structure 5
6 Why Federations? "Noun" usage somewhat unique to higher education (Lack of) "Vision" of companies behind standard was to enable point to point exchanges, an "identity VPN" Shibboleth project goal was to scale to hundreds of organizations, potentially thousands of services Federations evolved out of a need for policy and technology to support NxN "mesh" of SAML-enabled peers The "I" in the SAML equivalent of a PKI 6
7 Federations Can range from the very simple to the very complex (can you guess which ones do better?) Commonly organized around geo-political boundaries Policy: Membership obligations Legal agreements to enforce obligations Identity management obligations Technology: Technical standards and attribute definitions Enumerating participants and facilitating reliable operations Brokering trust in the keys used at runtime for authentication and encryption 7
8 Metadata XML document format defined in SAML Used by Shibboleth software to: identify the systems allowed to request or provide authentication identify capabilities and endpoints to allow successful interoperation across multiple protocols identify public keys belonging to particular trusted systems Basis of virtually all runtime software behavior Metadata often signed by federation keys that act as trust roots much like CAs were intended to 8
9 Other Terms Identity Provider the login service Single Sign-On Service place you're sent to login by SP Attribute Service SOAP endpoint for attribute queries Service Provider the application end Assertion Consumer Service place for response to SP entityid unique identifiers for IdPs and SPs discovery figuring out which IdP to use 9
10 Basic Example Identity Provider SSOS Service Provider ACS (3) (4) (5) (6) (1) (2) 1. HTTP Request to SP 2. <samlp:authnrequest> encoded in URL Redirect 3. <samlp:authnrequest> passed to SSO Service via HTTP GET 4. <samlp:response> in HTML FORM (action=post) containing <saml:assertion> 5. HTTP POST to Assertion Consumer Service 6. HTTP Response
11 Complications Discovery is assumed / out of scope, but some possible mechanisms are defined Example assumes Redirect/POST bindings, others exist and can be mixed/matched, smaller implementations unlikely to support them all Encryption of assertion and inclusion of attributes can be adjusted in combination to achieve desired flow/compatibility/security Metadata exchange usually assumed to be out of band, though not required to be 11
12 Why Shibboleth? Federated access to external/outsourced services Single infrastructure for a larger range of needs Identity alone is insufficient, and LDAP requires additional effort in some cases Application portability Commercial interoperability Deployable for large-scale federated use 12
13 Why Not Shibboleth? IdP isn't self-contained or plug and play Java skills not necessarily common SP is NOT designed for developers, but for administrators with necessary rights SP will NOT provide an application API; if that's your perspective on SSO, it's not a good fit Configuration and operation is heavily XML-based 13
14 Commercial Alternatives Shibboleth End to end, like the Internet's supposed to be Metadata-driven, focused on scaling of basic trusted exchanges Integration with infrastructure Loose coupling between identities and your application's use of them Commercial Gatewayed, like the Internet actually is GUI-driven, focused on explicit "deep" relationships Sell you their infrastructure Tightly controlled account linking behavior 14
15 Federating Opportunities Outsourced services Financial Aid / Scholarship information Travel Reservations Discounted Purchasing Government Agencies (NIH, NSF) Grids Collaboration platforms itunesu Library resource access 15
16 FAQs Which version should I start with? Always use the latest version available Does the new version interoperate with older versions? Completely, dating back to 1.3 Do I have to use SSL? Only if you care about security How do I get started? If you're playing, there's If you're serious, you need both an IdP and SP Does a test system need to be accessible, registered in DNS, etc? New defaults assume no back-channel between IdP and SP, so all contact is via your browser 16
17 Skill Sets Identity Provider Administration of web server / OS XML, XML, XML, and some XML Java web deployment Java development if customizing Basics of SSL / PKI concepts Integration skills for authentication and attribute backend(s) Service Provider Administration of web server, especially plugins/extensions XML, XML, and some XML Basics of SSL / PKI concepts Basics of web development environment (e.g. accessing headers, redirection) Understanding of session handling in a web environment Understanding of session handling in a web environment 17
18 Prerequisites Identity Provider Source(s) of authentication Source(s) of attributes Means of managing policies on attribute release Means of managing metadata for SPs Service Provider Supported web server with at least one hosted application Means of managing metadata for IdP(s) Strategy for IdP discovery At least one SP you control for testing 18
19 Resources replanning(camp)workshops/
20 Software Architecture
21 Identity Provider Written in Java, requires a container with Servlet 2.4 support Requires very non-buggy JAXP parser, often causes problems with commercial containers "Yet another multi-protocol software platform" Spring-based component framework and extension model Does NOT include database/directory or identity management tools Has no UI / direct user controls at the moment 21
22 Java Container Keys Certs Credential Resolver Profile Handler SOAP (8443) Meta data Metadata Provider Authentication Manager Filter Policy Trust Engine Attribute Resolver Login Handler Attribute Filter Browser Facing (443) JNDI/ LDAP JDBC RDBMS Kerberos Custom 22
23 Profile Handlers Implement protocols for SSO, attribute query, eventually logout, diagnostics, others SAML 2.0 Browser SSO Profile Attribute Query SAML 1.1 Shibboleth SSO Extension Attribute Query 23
24 Authentication Manager Incoming request determines selection of a LoginHandler Requested authentication class IsPassive ForceAuthn LoginHandler interacts with user to authenticate user PreviousSession handles SSO based on previous login UsernamePassword simple JAAS-backed option REMOTE_USER relies on container / web server 24
25 Attribute Resolver Directed dependency graph of plugins that performs like a virtual directory Data Connectors load attributes from data stores Attribute Definitions transform/combine/expose connector attributes for encoding into SAML Principal Connectors reverse map SAML subjects into local users (for queries) Connectors can failover for redundancy or consolidating distributed data stores 25
26 Attribute Filter Policy engine for rules governing which attributes are released to SPs Policies can apply based on a variety of criteria, and rules are run to permit or deny each attribute value Policies and rules for: Requesting SP Comparisons or regular expressions over values User identity Authentication method Other attribute values (e.g. FERPA release flags) 26
27 Service Provider Written in C++ for Apache, IIS, or Sun web servers Apache can front-end other web servers: Java containers, Zope, etc. "Yet another multi-protocol software platform" DLL-based component framework and extension model Does NOT include database/directory or identity management tools 27
28 Browser Facing (443) Keys Certs Meta data Service Handler IPC shibd Credential Resolver Metadata Provider Trust Engine Session Cache Attribute Extractor Attribute Resolver Attribute Filter Request Filter Request Map Attribute Map Attribute Policy Web Server 28
29 General Design No formal API; logged-in-user information available through protected headers or env. variables Requires identity to be externalized from application Applications can interact with SP using declarative configuration or simple redirection protocols Module inside web server filters requests, applies policy, attaches data from active sessions Services requests to special URLs for processing SAML messages and performing functions on behalf of applications Heavy lifting and state management delegated to a separate process 29
30 Service Handlers Implement protocols for SSO, logout, diagnostics, others SAML 2.0 Browser SSO Profile Browser SLO Profile NameID Management Profile SAML 1.1 Browser SSO Profile WS-Federation Passive Requester Profile Metadata generation, status, and session dump 30
31 Sessions Sessions tracked by cookie specific to SP, used to recover user identity data and attach to requests, honor logout, enforce timeouts Applications use or ignore SP session as they choose, choices vary widely by scenario Storage plugins provided for in-memory, ODBC, and memcache 31
32 Attribute Handling Extensive plugin architecture for turning SAML assertion data into attributes for application to consume Environment or header names all configurable Data can be filtered analagously to IdP (controls "release" to applications) Additional attributes can be "resolved" via plugins that query SAML authorities or local sources 32
33 Deploying an Identity Provider
34 A Real-World Example Access to a federated wiki run by Internet2 Requires the edupersonprincipalname attribute to identify and auto-provision users Sets address and a display name locally if available from IdP Demonstrate an example using LDAP as an authentication/attribute store Identify some deployment choices as we go along 34
35 Basic Steps Install / setup Java container and web server if necessary Tomcat or Apache + Tomcat Download and install IdP software Set entityid, publish IdP metadata, supply SP metadata Configure Authentication Configure Attribute Resolution Release attributes to SP 35
36 Container / JVM Endorse XML libraries in container Install JCE stub as JVM security extension Setup SSL connectors on 443/8443 Adjust JVM heap size Create context deployment fragment 36
37 Initial Installation Download and unzip UI customizations currently maintained in source tree, applied with reinstallation Run install.sh or install.bat script installation location (default highly advised) hostname password for keystore Sanity check, start Tomcat:
38 Add SP Metadata to IdP This particular SP hosts and self-signs its metadata, obtaining the key is "out of scope" Install a reference to its metadata, verified by the signing key Most SP-oriented maintenance performed with relying-party.xml Typically rely on the DefaultRelyingParty, but if you need specific rules for an SP, remember that nothing is inherited from the default element settings 38
39 Add SP Metadata to IdP <MetadataProvider id="urlmd" xsi:type="filebackedhttpmetadataprovider" xmlns="urn:mace:shibboleth:2.0:metadata" metadataurl=" backingfile="c:\opt\shibboleth-idp/metadata/spaces-metadata.xml"> <MetadataFilter xsi:type="chainingfilter"> <MetadataFilter xsi:type="requiredvaliduntil" maxvalidityinterval="0" /> <MetadataFilter xsi:type="signaturevalidation" trustengineref="spacesmetadatatrustengine" requiresignedmetadata="true" /> <MetadataFilter xsi:type="entityrolewhitelist"> <RetainedRole>samlmd:SPSSODescriptor</RetainedRole> </MetadataFilter> </MetadataFilter> </MetadataProvider> <security:trustengine id="spacesmetadatatrustengine" xsi:type="security:staticexplicitkeysignature"> <security:credential id="spacescredentials" xsi:type="security:x509filesystem"> <security:certificate> C:/opt/shibboleth-idp/credentials/spaces.crt </security:certificate> </security:credential> </security:trustengine> 39
40 Add IdP Metadata to SP Procedurally could be similar, with the IdP hosting a self-signed file with OOB key exchange With lack of connectivity to example machine, the file will be copied manually to the SP and referenced locally Copy /opt/shibboleth-idp/metadata/idpmetadata.xml to /etc/shibboleth on SP Add reference to shibboleth2.xml: <MetadataProvider type="xml" path="idp-example-metadata.xml"/> 40
41 Authentication Primary settings for authentication in handler.xml Default configuration is for authentication by container / web server, switch to UsernamePassword handler, which points to a JAAS configuration file <!-- Username/password login handler --> <LoginHandler xsi:type="usernamepassword" jaasconfigurationlocation="file://c:\opt\shibboleth-idp/conf/login.config"> <AuthenticationMethod> urn:oasis:names:tc:saml:2.0:ac:classes:passwordprotectedtransport </AuthenticationMethod> </LoginHandler> LoginHandler identifies the technical authentication methods supported by the handler Can be annotated as to whether they support advanced SAML features 41
42 JAAS Configuration For simple name/password handling, the included handler relies on JAAS Good composition options and flexibility of back-ends Atrociously bad error handling LDAP example already in place, just uncomment and adjust settings edu.vt.middleware.ldap.jaas.ldaploginmodule required host="idp.example.org" port="10389" base="ou=people,dc=example,dc=org" ssl="false" serviceuser="uid=admin,ou=system" servicecredential="secret" userfield="uid"; 42
43 Attribute Resolution eduperson / LDAP examples already in attributeresolver.xml Need at least one DataConnector to pull raw bits from directory or database Need AttributeDefinition per-attribute to expose outside of IdP Variety of plugins available for non-trivial transforms and scripting to generate attributes Each AttributeDefinition needs AttributeEncoder for each SAML version to generate wire format 43
44 LDAP Data Connector Uncomment and adjust Returns all attributes in entry by default Can build filter around variety of request data, including other internal attributes <!-- Example LDAP Connector --> <resolver:dataconnector id="myldap" xsi:type="ldapdirectory" xmlns="urn:mace:shibboleth:2.0:resolver:dc" ldapurl="ldap://idp.example.org:10389" basedn="ou=people,dc=example,dc=org" principal="uid=admin,ou=system" principalcredential="myservicepassword"> <FilterTemplate> <![CDATA[ (uid=$requestcontext.principalname) ]]> </FilterTemplate> </resolver:dataconnector> 44
45 edupersonprincipalname Can be computed by appending a "scope" to a directory attribute, using the "Scoped" plugin Here, pull directly from LDAP using the "Prescoped" plugin <resolver:attributedefinition id="edupersonprincipalname" xsi:type="prescoped" xmlns="urn:mace:shibboleth:2.0:resolver:ad" sourceattributeid="edupersonprincipalname"> <resolver:dependency ref="myldap" /> <resolver:attributeencoder xsi:type="saml1scopedstring" xmlns="urn:mace:shibboleth:2.0:attribute:encoder" name="urn:mace:dir:attribute-def:edupersonprincipalname"/> <resolver:attributeencoder xsi:type="saml2scopedstring" xmlns="urn:mace:shibboleth:2.0:attribute:encoder" name="urn:oid: " friendlyname="edupersonprincipalname" /> </resolver:attributedefinition> 45
46 mail Pulled directly from directory using "Simple" plugin <resolver:attributedefinition id=" " xsi:type="simple" xmlns="urn:mace:shibboleth:2.0:resolver:ad" sourceattributeid="mail"> <resolver:dependency ref="myldap" /> <resolver:attributeencoder xsi:type="saml1string" xmlns="urn:mace:shibboleth:2.0:attribute:encoder" name="urn:mace:dir:attribute-def:mail" /> <resolver:attributeencoder xsi:type="saml2string" xmlns="urn:mace:shibboleth:2.0:attribute:encoder" name="urn:oid: " friendlyname="mail" /> </resolver:attributedefinition> 46
47 displayname Computed within IdP from the givenname and sn directory attributes using the "Template" plugin <resolver:attributedefinition id="displayname" xsi:type="template" xmlns="urn:mace:shibboleth:2.0:resolver:ad"> <resolver:dependency ref="myldap" /> <resolver:attributeencoder xsi:type="saml1string" xmlns="urn:mace:shibboleth:2.0:attribute:encoder" name="urn:mace:dir:attribute-def:displayname" /> <resolver:attributeencoder xsi:type="saml2string" xmlns="urn:mace:shibboleth:2.0:attribute:encoder" name="urn:oid: " friendlyname="displayname" /> <Template><![CDATA[${givenname} ${sn}]]></template> <SourceAttribute>givenname</SourceAttribute> <SourceAttribute>sn</SourceAttribute> </resolver:attributedefinition> 47
48 Release the Attributes Default is to release nothing, so a policy in attribute-filter.xml is added for the SP <AttributeFilterPolicy> <PolicyRequirementRule xsi:type="basic:attributerequesterstring" value=" /> <AttributeRule attributeid="edupersonprincipalname"> <PermitValueRule xsi:type="basic:any" /> </AttributeRule> <AttributeRule attributeid="mail"> <PermitValueRule xsi:type="basic:any" /> </AttributeRule> <AttributeRule attributeid="displayname"> <PermitValueRule xsi:type="basic:any" /> </AttributeRule> </AttributeFilterPolicy> 48
49 A Note About NameIDs Shibboleth favors using SAML Attributes in place of the SAML NameID construct that appears in the assertion subject Commercial interop often requires reconfiguration to allow use of a non-transient NameID format Configured and released exactly like Attributes; only difference is the type of AttributeEncoder used 49
50 Clustering DNS is not a redundancy tool IdP session management is private to IdP unless container-managed authentication is used Officially supports clustering using Terracotta, in use by several large deployers At least one example of JBoss Groups known Back-channels make sticky sessions an incomplete solution, though possibly usable in some contexts 50
51 Service Providers
52 Basic Setup Binary install, generates self-signed keypair In shibboleth2.xml: Set entityid Supply IdP metadata source(s) and enter an IdP's entityid in the default <SessionInitiator> Extract metadata from /Shibboleth.sso/Metadata to enroll in federation or supply to IdP Define protection rules for content
53 More Setup Customizing error templates: don't be that guy Discovery In principal, a per-sp exercise, but you might choose to run a shared DS on behalf of campus apps DS software available from Internet2 (Java) and SWITCH (PHP), or there's always the simple web page of links Customizing attribute handling Uncomment or create mapping definitions and choose header names via attribute-map.xml Map selected attributes into REMOTE_USER if needed 53
54 Session Strategies Simple/small apps protect entire scope of app with SP session consume REMOTE_USER and attributes on each request allows easy portability to any proper SSO design More complex scenarios usual stategy is to protect an "entry/setup" script with SP session to establish a typical application session can time-out SP session quickly to save resources, or preserve for logout handling requires application changes for logout to work 54
55 Supporting a Campus Documentation Site: Overview / FAQ Formal documentation on supported attributes Instructions and configuration files for campus and federated use Message to deployers: install software in the usual manner follow instructions, copying in campus-specific files send registration request, with certificate test SP, check logs 55
56 Registration Approaches or web submission, the latter allows authenticated submissions of certificates Typical information: Service name / description Contact information Technical/platform details Requested attributes Web hostname(s) Certificate Verifiable phone number Rigor of processes depend on institutional culture 56
57 External Services Existing federation SPs: Timeline likely driven by your ability to get approval to release attributes and ensure users are supported Technical effort / involvement often quite low For some services, might be literally the 5 minutes to add a filter policy A typical outsourced SP coming online: You won't be the bottleneck If it's not in the RFP/contract, chances are low Use of a federation strongly advisable 57
58 Metadata Management External use Federations rely on MAD if I ask for bilateral vetting, others can ask me for it Pay a relative pittance and you solve a bunch of ongoing management and security problems Internal use Maintaining IdP metadata for SPs easy, but if you're in a federation anyway, just point them there Maintaining SP metadata has a range of solutions from the very manual to the highly automated Tools for this not a current project focus 58
59 Help Desk Implications Most problems either with authentication or application after initial testing Rule of thumb: if you're stopped at the IdP, treat centrally, otherwise application owner should take responsibility Strongly advise against SPs, especially externals, delegating triage responsibility to IdPs Biggest problem by far is application developers and owners refusing to own their part 59
60 Common Errors Clock skew Client address mismatches between IdP/SP Looping and other errors when SSL not used could make this easier for people, somewhat stubborn about it Hostname issues causing failures at IdP IIS file permissions 60
61 Futures
62 Logout SP includes extensive support for SAML 2 logout features, but leaves UI to deployer IdP currently lacks logout support, likely to offer back-channel profile eventually Front-channel profile requires substantial UI/design study Note most SPs unlikely to support logout in the medium term Seems to be largely an intranet concern; consider the implications when logout is usually partial 62
63 SSO Delegation Similar to CAS proxying, but with additional requirements: privacy, federation, standards-based Starting point is to achieve SSO-level security via bearer tokens between sites, improve later Can be transparent to applications but not usable without explicit opt-in via SP configuration Policy controls at IdP likely to evolve 63
64 User Consent Typical use of Shibboleth relies on administrative control over attribute release Consequence? Useless for collaborative / one-off scenarios Solution? Default to user approval of attribute release: Hide non-privacy-sensitive "technical" attributes users can't understand anyway Disclose and require approval on initial access if "intelligible" attributes are being requested Whitelist contractual arrangements where consent is OOB Major issue: requires SPs to disclose attribute requirements and federations to track them 64
Shibboleth Identity Provider (IdP) Sebastian Rieger [email protected]
Shibboleth Identity Provider (IdP) Sebastian Rieger [email protected] Gesellschaft für wissenschaftliche Datenverarbeitung mbh Göttingen, Germany CLARIN AAI Hands On Workshop, 25.02.2009, Oxford
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
How To Use Netiq Access Manager 4.0.1.1 (Netiq) On A Pc Or Mac Or Macbook Or Macode (For Pc Or Ipad) On Your Computer Or Ipa (For Mac) On An Ip
Setup Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Spring Security 3. rpafktl Pen source. intruders with this easy to follow practical guide. Secure your web applications against malicious
Spring Security 3 Secure your web applications against malicious intruders with this easy to follow practical guide Peter Mularien rpafktl Pen source cfb II nv.iv I I community experience distilled
Standalone SAML Attribute Authority With Shibboleth
CESNET Technical Report 5/2013 Standalone SAML Attribute Authority With Shibboleth IVAN NOVAKOV Received 10. 12. 2013 Abstract The article defines what a standalone attribute authority is and how it can
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
Identity Server Guide Access Manager 4.0
Identity Server Guide Access Manager 4.0 June 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF
Single Sign-On for the UQ Web
Single Sign-On for the UQ Web David Gwynne Infrastructure Architect, ITIG, EAIT Taxonomy Authentication - Verification that someone is who they claim to be - ie, only the relevant user
Running Multiple Shibboleth IdP Instances on a Single Host
CESNET Technical Report 6/2013 Running Multiple Shibboleth IdP Instances on a Single Host IVAN NOVAKOV Received 10.12.2013 Abstract The article describes a way how multiple Shibboleth IdP instances may
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
Introduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Logout Support on SP and Application
Logout Support on SP and application Logout Support on SP and Application Possibilities and and Limitations SWITCHaai Team [email protected] Single Logout: Is it possible? Single Logout will work only in some
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
Access Gateway Guide Access Manager 4.0 SP1
Access Gateway Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
Setup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
Federating with Web Applications
Federating with Web Applications Janusz Ulawski HEAnet Ltd November 11, 2010 Agenda 1 Providing access to your WebApp 2 Federated Access Software with SAML 2.0 support 3 Federating your WebApp Shibboleth
StreamServe Persuasion SP5 StreamStudio
StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other
Federated Identity Management. Willem Elbers (MPI-TLA) EUDAT training
Federated Identity Management Willem Elbers (MPI-TLA) EUDAT training Date: 26 June 2012 Outline FIM and introduction to components Federation and metadata National Identity federations and inter federations
IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
Integration of Office 365 with existing faculty SSO
Integration of Office 365 with existing faculty Best Practice Document Produced by the MARnet-led working group on campus wireless infrastrucure and security Authors: Vasko Sazdovski (MARnet), Boro Jakimovski
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
Spring Security SAML module
Spring Security SAML module Author: Vladimir Schäfer E-mail: [email protected] Copyright 2009 The package contains the implementation of SAML v2.0 support for Spring Security framework. Following
NetIQ Identity Manager Setup Guide
NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
AD FS 2.0 Step-by-Step Guide: Federation with Shibboleth 2 and the InCommon Federation
AD FS 2.0 Step-by-Step Guide: Federation with Shibboleth 2 and the InCommon Federation Microsoft Corporation Published: October 2010 Version: 1.0 Author: Dave Martinez, Principal, Martinez & Associates
Computer Services Documentation
Computer Services Documentation Shibboleth Documentation {Shibboleth & Google Apps Integration} John Paul Szkudlapski June 2010 Note: These case studies, prepared by member organisations of the UK federation,
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
000-575. IBM Tivoli Federated Identity Manager V6.2.2 Implementation. Version: Demo. Page <<1/10>>
000-575 IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version: Demo Page 1.What is the default file name of the IBM Tivoli Directory Integrator log? A. tdi.log B. ibmdi.log C. ibmdisrv.log
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Single Sign-On Implementation Guide
Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,
Fairsail. Implementer. Single Sign-On with Fairsail and Microsoft Active Directory Federation Services 2.0. Version 1.92 FS-SSO-XXX-IG-201406--R001.
Fairsail Implementer Microsoft Active Directory Federation Services 2.0 Version 1.92 FS-SSO-XXX-IG-201406--R001.92 Fairsail 2014. All rights reserved. This document contains information proprietary to
OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com
OpenSSO: Simplify Your Single-Sign-On Needs Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com 1 Agenda Enterprise security needs What is OpenSSO? OpenSSO features > > > > SSO and
OIOSAML 2.0 Toolkits Test results May 2009
OIOSAML 2.0 Toolkits Test results May 2009 5. September 2008 - Søren Peter Nielsen: - Lifted and modified from http://docs.google.com/a/nemsso.info/doc?docid=dfxj3xww_7d9xdf7gz&hl=en by Joakim Recht 12.
SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013
SSL VPN Server Guide Access Manager 3.2 SP2 June 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A
Novell Access Manager
Access Gateway Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 November 16, 2010 www.novell.com Novell Access Manager 3.1 SP2 Access Gateway Guide Legal Notices Novell, Inc., makes no representations
Moodle and Office 365 Step-by-Step Guide: Federation using Active Directory Federation Services
Moodle and Office 365 Step-by-Step Guide: Federation using Active Directory Federation Services This document is provided as-is. Information and views expressed in this document, including URL and other
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
Configuring. Moodle. Chapter 82
Chapter 82 Configuring Moodle The following is an overview of the steps required to configure the Moodle Web application for single sign-on (SSO) via SAML. Moodle offers SP-initiated SAML SSO only. 1 Prepare
Single Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Get Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : C2150-575 Title : IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version : Demo 1.What is the default file name of the
SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011
NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources Paul Riddle University of Maryland Baltimore County EDUCAUSE Mid-Atlantic Regional Conference January 16, 2008 Copyright
CA SiteMinder Secure Proxy Server
CA SiteMinder Secure Proxy Server Administration Guide 12.52 SP1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
Secure the Web: OpenSSO
Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1 Agenda Need for identity-based
Crawl Proxy Installation and Configuration Guide
Crawl Proxy Installation and Configuration Guide Google Enterprise EMEA Google Search Appliance is able to natively crawl secure content coming from multiple sources using for instance the following main
Securing Web Services With SAML
Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion
WebNow Single Sign-On Solutions
WebNow Single Sign-On Solutions Technical Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2015 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO Scope... 2 Prerequisites Tasks... 2 Procedure... 2 Step 1: Configure EPM s WebLogic domain for SP Federation Services... 2 Step 2:
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE SAML 2.0 CONFIGURATION GUIDE Roy Heaton David Pham-Van Version 1.1 Published March 23, 2015 This document describes how to configure OVD to use SAML 2.0 for user
Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML
Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML --------------------------------------------------------------------------------------------------------------------------- Contents Overview...
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
IUCLID 5 Guidance and Support
IUCLID 5 Guidance and Support Web Service Installation Guide July 2012 v 2.4 July 2012 1/11 Table of Contents 1. Introduction 3 1.1. Important notes 3 1.2. Prerequisites 3 1.3. Installation files 4 2.
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
IAM, Enterprise Directories and Shibboleth (oh my!)
IAM, Enterprise Directories and Shibboleth (oh my!) Gary Windham Senior Enterprise Systems Architect University Information Technology Services [email protected] What is IAM? Identity and Access
USING FEDERATED AUTHENTICATION WITH M-FILES
M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication
Introducing Shibboleth
workshop Introducing Shibboleth MPG-AAI Workshop Clarin Centers Prague 2009 2009-11-06 MPG-AAI MPG-AAI a MPG-wide Authentication & Authorization Infrastructure for access control to web-based resources
About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack
Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack About Me KVM, API, DB, Upgrades, SystemVM, Build system, various subsystems Contributor and Committer
Using Shibboleth for Single Sign- On
Using Shibboleth for Single Sign- On One Logon to Rule them all.. Kirk Yaros Director, Enterprise Services Mott Community College 1 Agenda Overview of Mott Overview of Shibboleth and Mott s Project Review
Symplified I: Windows User Identity. Matthew McNew and Lex Hubbard
Symplified I: Windows User Identity Matthew McNew and Lex Hubbard Table of Contents Abstract 1 Introduction to the Project 2 Project Description 2 Requirements Specification 2 Functional Requirements 2
Single Sign-on. Overview. Using SSO with the Cisco WebEx and Cisco WebEx Meeting. Overview, page 1
Overview, page 1 Using SSO with the Cisco WebEx and Cisco WebEx Meeting Applications, page 1 Requirements, page 2 Configuration of in Cisco WebEx Messenger Administration Tool, page 3 Sample Installation
DEPLOYMENT GUIDE. SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity
DEPLOYMENT GUIDE SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity Table of Contents SAML Overview...3 Integration Topology...3 Deployment Requirements...4 Configuration Steps...4 Step
2 Downloading Access Manager 3.1 SP4 IR1
Novell Access Manager 3.1 SP4 IR1 Readme May 2012 Novell This Readme describes the Novell Access Manager 3.1 SP4 IR1 release. Section 1, Documentation, on page 1 Section 2, Downloading Access Manager 3.1
Authentication and access control in Sympa mailing list server
Authentication and access control in Sympa mailing list server February 2004 Serge Aumont & Olivier Salaün Comité Réseau des Universités http://www.cru.fr Campus de Beaulieu, Rennes France 1 Introduction
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
SAML 2.0 SSO Deployment with Okta
SAML 2.0 SSO Deployment with Okta Simplify Network Authentication by Using Thunder ADC as an Authentication Proxy DEPLOYMENT GUIDE Table of Contents Overview...3 The A10 Networks SAML 2.0 SSO Deployment
Interwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
IT@Intel. Improving Security and Productivity through Federation and Single Sign-on
White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing
From centralized to single sign on
The LemonLDAP::NG project Abstract LemonLDAP::NG is a modular WebSSO (Web Single Sign On) software based on Apache::Session modules. It simplifies the build of a protected area with a few changes in the
WWPass External Authentication Solution for IBM Security Access Manager 8.0
WWPass External Authentication Solution for IBM Security Access Manager 8.0 Setup guide Enhance your IBM Security Access Manager for Web with the WWPass hardware authentication IBM Security Access Manager
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com
Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper
Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper TABLE OF CONTENTS INTRODUCTION... 3 Where we came from... 3 The User s Dilemma with the Cloud... 4 The Administrator
Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase
Authentication and Authorisation for Research and Collaboration Federations 101 An Introduction to Federated Identity Management Peter Gietz, Martin Haase AARC NA2 Task 2 - Outreach and Dissemination DAASI
Federal Identity, Credential, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile
Federal Identity, Credential, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile Version 1.0 September 27, 2010 Document History This is the first
Shibboleth Configuration from 100,000 Feet, in 15 Minutes or Less! Steve Thorpe Systems Programmer / Analyst MCNC
Shibboleth Configuration from 100,000 Feet, in 15 Minutes or Less! Steve Thorpe Systems Programmer / Analyst MCNC Helpful Skill Sets Include Basic Knowledge Of: Your OS: Linux or Windows Experience using
Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
PingFederate. IWA Integration Kit. User Guide. Version 3.0
PingFederate IWA Integration Kit Version 3.0 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate IWA Integration Kit User Guide Version 3.0 April, 2012 Ping Identity Corporation
Kantara egov and SAML2int comparison
Kantara egov and SAML2int comparison 17.8.2010/[email protected] This document compares the egovernment Implementation profile of SAML 2.0, created by the egovernment WG of Kantara Initiative, and the
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Shibboleth N-Tier Support. Chad La Joie [email protected]
Shibboleth N-Tier Support Chad La Joie [email protected] Agenda Use Case Terminology Shibboleth Solution Future Effort Resources 2 Use Case Current use case comes from University of Chicago University
SharePoint 2013 Logical Architecture
SharePoint 2013 Logical Architecture This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
Shibboleth Authentication. Information Systems & Computing Identity and Access Management May 23, 2014
Shibboleth Authentication Information Systems & Computing Identity and Access Management May 23, 2014 For every question an answer: Why should I care about SAML? What is a Shibboleth? What is a Federation?
Authentication and access control in Sympa mailing list software
Authentication and access control in Sympa mailing list software May 2004 Serge Aumont & Olivier Salaün Comité Réseau des Universités http://www.cru.fr Campus de Beaulieu, Rennes France 1 Introduction
