Disclaimer. SAP 2008 / SAP TechEd 08 / SIM202 / Page 2
|
|
|
- Brice West
- 10 years ago
- Views:
Transcription
1 SIM202 SAML 2.0 and Identity Federation Yonko Yonchev, NW PM Security SAP AG Dimitar Mihaylov, NW Security and Identity Management SAP Labs Bulgaria Tsvetomir Tsvetanov, Active Global Support SAP America
2 Disclaimer This presentation outlines our general product direction and should not be relied on in making a purchase decision. This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue any course of business outlined in this presentation or to develop or release any functionality mentioned in this presentation. This presentation and SAP's strategy and possible future developments are subject to change and may be changed by SAP at any time for any reason without notice. This document is provided without a warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. SAP assumes no responsibility for errors or omissions in this document, except if such damages were caused by SAP intentionally or grossly negligent. SAP 2008 / SAP TechEd 08 / SIM202 / Page 2
3 Agenda 1. What is Identity Federation 2. SAML 2.0 and Identity Federation 2.1 Federation and SSO use cases 2.2 SAML 2.0 for Web application SSO and Federation 3. SAML 2.0 on the SAP NetWeaver Roadmap SAP 2008 / SAP TechEd 08 / SIM202 / Page 4
4 Identity Federation in Wikipedia SAP 2008 / SAP TechEd 08 / SIM202 / Page 5
5 Identity Federation Formalized in Standard Definitions SAP 2008 / SAP TechEd 08 / SIM202 / Page 6
6 Identity Federation: More Than Just Cross Company SSO Airline 2. Carry over Mary s identity??? Hotel 1. Book flight as registered travel agency customer 2. Need hotel accommodation Authenticate users across multiple IT systems and/or organizations Use negotiated identifiers to assemble identity from user information, stored across distinct organizations Collaborate on a contract-basis with contracts defining responsibility boundaries and requirements. Mary Single Sign On (SSO), Single Log- Out (SLO), access policy provisioning across autonomous security domains Use contractual agreement on how to refer to the user as configuration input Support different technical flavors: user controlled or enterprise controlled desktop oriented or service oriented Technical View SAP 2008 / SAP TechEd 08 / SIM202 / Page 7
7 Terms and Concepts: Roles of the Information Systems Involved in Identity Federation Identity Provider (IdP) Authoritative site with responsibility to authenticate end users and assert their identity information in a trusted fashion to trust partners Responsible for management of the user identity lifecycle Service Providers (SPs) Have a trust relationship to an IdP to accept and trust asserted information provided by the IdP on behalf of a user Delegate identity lifecycle and access management load to IdP May still manage local information for a user (e.g. SP-side service specific attributes and personalization related information) A Service Provider (e.g. a Portal) can function as an IdP for other SPs Trust Relationship Identity Provider (IdP) Federation Service Providers (SPs) SAP 2008 / SAP TechEd 08 / SIM202 / Page 8
8 Terms and Concepts: Identity Identity: The essence of an entity, often described by one's characteristics, traits, preferences and attributes Anonymity: Having an identity that is unknown or concealed Identifier: A data object that uniquely refers to a particular entity Pseudonym: A privacy-preserving identifier User Id: user account identifier for a particular system Federated identity: Existence of an agreement between providers on a set of identifiers and/or attributes to use to refer to a principal Account linkage: Relating a principal's accounts at two different providers so that they can communicate about the principal SAP 2008 / SAP TechEd 08 / SIM202 / Page 9
9 Terms and Concepts: Identity Attributes Classes of attributes that describe an identity Authentication credentials: e.g. account id, password, one-time PIN Transaction attributes: part of authentication process, e.g. group memberships, customer ID, organizational roles Profile attributes: information not tied to authentication process, e.g. address, home address, birth date Provider-specific attributes: user preferences, buying history Provisioning Authentication Credentials shared / distinct Authentication Credentials Transaction Attributes shared Transaction Attributes Profile Attributes shared Profile Attributes IdP Identity Provider-spec. Attributes distinct Provider-spec. Attributes SP Identity SAP 2008 / SAP TechEd 08 / SIM202 / Page 10
10 Identity Federation: Identity Models Distinct Identity Model Full Identity data initially provisioned across systems e.g. with a Virtual Directory Server Accounts managed independently according to IdP and SP functional requirements Shared Identity Model User Identity Providers (IdP) and federated Service Providers (SP) agree on a common unique identifier (aka Alias, Pseudonym or Opaque Id) used to refer to the user Sharing authentication credentials means that the SP can rely upon IdP to authenticate the user Requires user consent on shared attributes SAP 2008 / SAP TechEd 08 / SIM202 / Page 11 Full set of distinct attributes Identity Provider (IdP) e.g. Portal server, AS Java shared attributes distinct attributes Identity Provider (IdP) e.g. AS Java provisioning user identities from Identity Center Federation Trust Relationship Federation Trust Relationship Full set of distinct attributes Service Provider (SP) e.g. Portal, AS ABAP, AS Java, distinct attributes Service Provider (SP) e.g. Portal, AS ABAP, AS Java,
11 Identity Federation: IdP, SP and Identity Models as a Reflection of Real-life Governments as Identity Provider Governments are an Identity Provider because they issue a Passport as proof of identification Every country vouches for its citizens Governments as Service Provider When an USA citizen travels to Germany, Germany verifies the identity of the USA citizen by checking its passport. Germany trusts the Identity Provider (USA) to vouch for all its citizens. It still makes its own access control decision (to let the person in or not) based on identity data (including attributes) that is being asserted USA Government (Identity Provider) Trusted Relationship German Government (Service Provider) SAP 2008 / SAP TechEd 08 / SIM202 / Page 12
12 Identity Attribute Sharing: Contracts Define What can be Shared For business or privacy legislation reasons not all identity information may be transmitted to remote systems. The contract provides a skeleton about the information that can be shared. In the case of trust established indirectly via intermediary brokers, the contract may even include special agreements per target system or target system group. Ideally for data protection and privacy reasons, the user (administrator or normal user) is able to: Assign and audit policies for different trust relationships, or be queried for the data that is requested from the federation authority (user identity provider) by the accessed via federation resource (service providers) Enforce contractual agreement with security solutions for integrity and confidentiality protection, or cryptographic mechanisms SAP 2008 / SAP TechEd 08 / SIM202 / Page 13
13 Contracts and Trust in Federation Agreements Contracts underlie trust in business can be negotiated off-line or via the technology. Contractual agreements must include effective measures for non-repudiation and enforcement to maintain trust The trust contract may be a pair wise (point-to-point) agreement between different parties or different contracts between each party and common or different brokers (star-like trust setup) Direct Authentication Indirect Business Agreements Direct Indirect None Pair wise Direct Pair wise Indirect Brokered Direct Brokered Indirect Community Direct Community Indirect SAP 2008 / SAP TechEd 08 / SIM202 / Page 14
14 Identity Federation: Protocol Characteristics Employment of effective cryptographic means for non-repudiation and trust enforcement Securely Identify Trusted Systems: use system certificates and public keys to securely and effectively identify systems involved as user agents in federated transactions Digital Signatures: warrant message integrity and non-repudiation Message Encryption: warrant confidentiality of exchanged information Push and Pull Single Sign-On Push SSO: SSO exchange is triggered by a request to the Identity Provider, which pushes a Security Token to the Service Provider Pull SSO: SSO exchange is triggered by a request to the Service Provider, which then pulls a Security Token from the Identity Provider Account Linking Link distinct identity accounts to provide Single Sign-On IdP and SP agree on some common unique identifier (CUID) and bind each of their internal, local user identities to this CUID Allows IdP and SP to refer to the user by their CUID during SSO without disclosing information about their local internal representation of the user SAP 2008 / SAP TechEd 08 / SIM202 / Page 15
15 Identity Federation: Protocol Characteristics Account de-linking (de-federation) Deletion of the common unique identifier for a federated user Removes ability to SSO with SP Where are you from (WAYF) Persistent information associated with the user (such as an HTTP cookie) to identify to which IdP an SSO request from the SP is to be directed (in the case where SP has trust relationship with multiple IdPs) Session Management Session Management of the user s local session at the SP(s) after single signed-on such as logoff or session time-out (session lifetime / inactivity time) Single Logout User-initiated global logout of all sessions asserted by a given identity provider IdP is responsible for maintaining a list of all SPs to which the user has been SSO-ed in a given session. IdP sends a logout request to each of these SPs on behalf of the user SAP 2008 / SAP TechEd 08 / SIM202 / Page 16
16 Agenda 1. What is Identity Federation 2. SAML 2.0 and Identity Federation 2.1 Federation and SSO use cases 2.2 SAML 2.0 for Web application SSO and Federation 3. SAML 2.0 on the SAP NetWeaver Roadmap SAP 2008 / SAP TechEd 08 / SIM202 / Page 17
17 SAML Overview An XML Framework for marshaling security and identity information and exchanging it across administrative domain boundaries SAML profiles describe a variety of use cases using the framework SAML Core technology: Assertions about subjects Assertions contain statements: Authentication, Attribute, Authorization Decision Entity (or system entity): An active element of a computer/network system Principal: An entity whose identity can be authenticated Subject: A principal in the context of a security application SAP 2008 / SAP TechEd 08 / SIM202 / Page 18
18 SAML 2.0 Terms and Concepts: System Roles Asserting party (SAML authority): An entity that produces SAML assertions Identity provider: An entity that creates, maintains, and manages identity information for principals and provides principal authentication to other trusted service providers Relying party: An entity that use received assertions and decides to take an action based on the information Service provider: An entity that provides services to principals or other entities and has an established trust association to an Identity Provider SAP 2008 / SAP TechEd 08 / SIM202 / Page 20
19 SAML 2.0 in a Nutshell SAML 2.0 System Roles in Perspective IdP Identity Provider (asserting role) [Externally] Authenticates the user Produces assertions to transfer a user's identity to service providers optionally transfer additional user attributes to service providers Keeps track of the service providers that have received assertions for a certain user SP Service Provider (relying role) Offers services/resources to users Consumes assertions The SAML 2.0 Protocol Deliverables Profiles Combinations of assertions, protocols and bindings to support a specific use case Bindings Mappings of the SAML Protocols onto standard messaging and communication protocols Protocols Requests and Responses for obtaining assertions and doing identity management Assertions Authentication, Attribute and entitlement information Authentication Context Detailed data on type and strength of initial authentication Metadata Configuration data for Identity and Service providers SAP 2008 / SAP TechEd 08 / SIM202 / Page 21
20 SAML 2.0 Use Cases: Single Sign-On Account Mapping Assignment of users with same user ID Example: Account Linking Opaque-ID Local UName SP bob sp.com Opaque-ID Local UName bob123 IdP IdP.com joe xyz.com alice abc.com Account Linking Opaque Id-based linking of users with different user IDs Attribute Federation Supports rule based authentication at SP Authentication with defined attributes User Agent (Browser) Browser Identity Store bob SSO request to SP with target (TARGET= ) 1 authentication request 2 Authentication at IdP as bob 3 Artefact Artifact Artefact Artifact Redirect to target ressource 7 IdP 4 <ArtifactResolve> 5 <ArtifactResponse> 6 Use service as bob123" SP Identity Store bob123 SAP 2008 / SAP TechEd 08 / SIM202 / Page 22
21 SAML 2.0 Use Cases: Persistent Federation Establish a permanent, long-term federation IdP and SP share only <NameID> - SP logs in user account that is locally mapped to the asserted by IdP <NameID> Local User ID SP NameID bob sp.com bob qwe.com joe xyz.com Access Resource 2 SP IdP <AuthnRequest> using Redirect (@Format= nameid-format:persistent ) 3 Credential Challenge Create Security 4 Context User login as bob 5 user action or (auto) submit SAP 2008 / SAP TechEd 08 / SIM202 / Page 23 HTML Form with <Response> (NameID= ) User Agent (Browser) Local User ID IdP NameID bob123 IdP.com bob123 IdpXYZ.net alice idpabc.com Check if NameID already HTTP Post <Response> maps to local account 7 Credential Challenge & Opt-in? 8 Provide credentials for account bob123 9 Resource HTTP Redirect with Cookie identifying local session)
22 SAML 2.0 Use Cases: Transient Federation User not required to provide credentials at SP Federation at SP not intended to be managed on a long term basis Local User ID bob joe sue tom IdP Create Security Context SAP 2008 / SAP TechEd 08 / SIM202 / Page 24 Status Gold Gold Silver Silver User Agent (Browser) Local User ID GoldUser SilverUser 1 Access Resource 2 <AuthnRequest> using Redirect (@Format= nameid-format:transient ) 3 Credential Challenge 4 User login with bob 5 user action or HTML Form with (auto) submit <Response> 6 (NameID=<generated>, HTTP Post <Response> Status=Gold) 7 Resource (HTTP Redirect with Cookie identifying local session) SP Validate IdP Signature Log in SP account GoldUser, according to local SP attribute mapping rules
23 SAML 2.0 Single Logout User previously authenticated at IdP User is interacting with SP1 and SP2 and terminates session with SP1 SP1 sends <LogoutRequest> with user <NameID> and <SessionIndex> via HTTP Redirect IdP determines that other SPs are participating in the session and sends <LogoutRequest> to SP2 (using a different protocol binding, e.g. SOAP) User Agent (Browser) 2 1 IdP SP1 SP2 Select Logout <LogoutRequest> via HTTP Redirect <LogoutRequest> via SOAP over HTTP 4 <LogoutResponse> via SOAP over HTTP 5 <LogoutResponse> via HTTP Redirect 3 SAP 2008 / SAP TechEd 08 / SIM202 / Page 26
24 Demo 1 Setup: Browser SSO and Federation with SAML 2.0 POST in Company Extranet Enterprise (Security Domain A) Travel Agency (Security Domain B) WatsonM outsources business to AccountXYZ Enterprise Portal employee of needs access to Travel Agency Web site Mary Watson SAP 2008 / SAP TechEd 08 / SIM202 / Page 27
25 SAP 2008 / SAP TechEd 08 / SIM202 / Page 28 DEMO
26 SAML 2.0 POST Web Browser SSO: Behind the Curtains 1. Service request (protected access) 2. Service needs authentication 3.<SAMLRequest> in POST (HTTP Body) in a HTML Form 4. Login request of IdP 5. Send Credentials 6. Send SAML-Assertion as <SAMLResponse> with secured user name identifier in HTTP Body User Agent (Browser) 7. Forward <SAMLResponse> as POST parameter to Assertion Consumer Service of SP Resource 8. Send data of the service to the user Resource SAP 2008 / SAP TechEd 08 / SIM202 / Page 29
27 Demo 2 Setup: Browser SSO and Federation in Company Intranet with SAML 2.0 Browser Artifact Local Subsidiary (Administrative Domain A) ERP (Administrative Domain B) WatsonM Uses systems from finance department AccountXYZ Enterprise Portal employee of needs access to Browser-enabled Budgeting application Mary Watson SAP 2008 / SAP TechEd 08 / SIM202 / Page 33
28 SAP 2008 / SAP TechEd 08 / SIM202 / Page 34 DEMO
29 SAML 2.0 Browser Artifact Web Browser SSO: Behind the Curtains 1. Service request (protected access) 2. Service needs authentication 3. <AuthnRequest> Redirect/Post 4. Login request of IdP 5. Send Credentials 6. Transfer SAMLart Browser Artifact in GET (HTTP redirect) 7. Send SAMLart as URL parameter to SP 8. SOAP request to Assertion Resolution Service in IdP 9. Answer with a SAML-Assertion, containing secured user name identifier 10. Send data of the service to the user SAP 2008 / SAP TechEd 08 / SIM202 / Page 35 User Agent Client (Browser) 5 Login Login request 4 SAMLart 6 <AuthnRequest> 3 <ArtifactResolve> SAMLart 7 Ressource Resource 10 <AuthnRequest> 2 1 Service request Single Logout Service (SLO) Single Sign-On Service (SSO) Artifact Resolution Service (ARS) 8 9 Assertion Consumer Service (ACS) Single Logout Service (SLO) Resource Ressource Identity Provider -Lite - <ArtifactResponse> Service Provider -Lite -
30 Agenda 1. What is Identity Federation 2. SAML 2.0 and Identity Federation 2.1 Federation and SSO use cases 3.1 SAML 2.0 for Web application SSO and Federation 3. SAML 2.0 on the SAP NetWeaver Roadmap SAP 2008 / SAP TechEd 08 / SIM202 / Page 39
31 Current Support for SAML in SAP NetWeaver SAML Browser Artifact Scenario for desktop application SSO NW 04 NW 7.00 NW 7.10 SAML 1.1 Accepting SAML Assertions Java X X X SAML 1.1 Accepting SAML Assertions - ABAP - - X SAML 1.1 Issuing SAML Assertions CE Portal - - X Limitations: Authorization Information is not supported Authentication scenarios only Use SSL for Transport Security WSS SAML Token Profiles 1.0 for SSO and user id propagation for WS access NW 04 NW 7.00 NW 7.10 Sender Vouches Subject Java - - X Sender Vouches Subject - ABAP - X (SP14 and higher) X SAP 2008 / SAP TechEd 08 / SIM202 / Page 40
32 Security and Identity Management Roadmap Highlights Role & Authorization Mgmt. Identity Management Enterprise SOA and Standards Security Management Meta-roles definition and assignment Central Identity Management for heterogeneous landscapes Standards-based principal propagation Enhanced support for WS-* standards Harmonization of security administration Role management Harmonized simplification and authorization TCO reduction Support planned for concepts Web browser SSO and Identity Federation scenarios with SAML 2.0 Business process IdP-Lite and SP-Lite Business role integrated identity management management Standards-based single sign-on infrastructure (SAML) Identity federation support (SAMLv2) Add. WS-* standards (WS-Sec.Conversation, WS-Trust) Centralized policybased security administration Extended SOA scenario support Model driven security management SAP 2008 / SAP TechEd 08 / SIM202 / Page / and beyond 2009
33 Lite Protocol Interoperability Matrix from Liberty SAP 2008 / SAP TechEd 08 / SIM202 / Page 42 Feature IDP IDP-Lite SP SP-Lite Web SSO, <AuthnRequest>, HTTP redirect MUST MUST MUST MUST Web SSO, <Response>, HTTP POST MUST MUST MUST MUST Web SSO, <Response>, HTTP POST MUST MUST MUST MUST Artifact Resolution, SOAP MUST MUST MUST MUST Enhanced Client/Proxy SSO, PAOS MUST MUST MUST MUST Name Identifier Management, HTTP redirect (IDP-initiated) Name Identifier Management, SOAP (IDP-initiated) MUST MUST NOT MUST MUST NOT MUST MUST NOT OPTIONAL MUST NOT Name Identifier Management, HTTP redirect MUST MUST NOT MUST MUST NOT Name Identifier Management, SOAP (SP-initiated) MUST MUST NOT OPTIONAL MUST NOT Single Logout (IDP-initiated), HTTP redirect MUST MUST MUST MUST Single Logout (IDP-initiated), SOAP MUST OPTIONAL MUST OPTIONAL Single Logout (SP-initiated), HTTP redirect MUST MUST MUST MUST Single Logout (SP-initiated), SOAP MUST OPTIONAL MUST OPTIONAL Identity Provider Discovery (cookie) MUST MUST OPTIONAL OPTIONAL
34 Future Scenarios Services Based Federation Office Application (Administrative Domain A) ERP (Administrative Domain B) integrates functionality of AccountXYZ WatsonM uses needs access to Mary Watson SAP 2008 / SAP TechEd 08 / SIM202 / Page 46
35 Holder of Key Subject Confirmation for WSS SAML Tokens Planned for Future Releases Service Consumer: 1. Identify Logical Port configuration for service consumption 2. Request SAML assertion from pre-configured SAML Assertion Issuer 3. Return SAML assertion (digitally signed) 4. Send Service Request with enclosed SAML assertion SAML Assertion Issuer Service Provider: 5. Verify assertion s digital signature with system X.509 certificate of SAML Assertion Issuer 6. Use assertion for user authentication 7. Return service response on success By decoupling the SAML identity provider from the service consumer, administrators have the option to use a third system to issue SAML assertions X.509 Certificate based trust relationship client application Service call via Logical Port 4. Service Provider Application 6. SAP 2008 / SAP TechEd 08 / SIM202 / Page 47
36 Summarizing the SAML Use Cases at SAP Standardize on SAML for SSO Standards based authentication for Web based applications and Web Services Supporting heterogeneous environments as well Identity Propagation using trusted SAML Identity Provider proxies Single Log Out Federation between different Security Domains (Circles of Trust) Within a company or between companies Including non SAP-Systems Central User Mapping based in IdP functionality Provisioning of Identity Attributes SAP 2008 / SAP TechEd 08 / SIM202 / Page 48
37 Building Your Business with SDN Subscriptions SDN Subscriptions offers developers and consultants like you, an annual license to the complete SAP NetWeaver platform software, related services, and educational content, to keep you at the top of your profession. SDN Software Subscriptions: (currently available in U.S. and Germany) A one year low cost, development, test, and commercialization license to the complete SAP NetWeaver software platform Automatic notification for patches and updates Continuous learning presentations and demos to build expertise in each of the SAP NetWeaver platform components A personal SAP namespace SAP NetWeaver Content Subscription: (available globally) An online library of continuous learning content to help build skills. Starter Kit To learn more or to get your own SDN Subscription, visit us at the Community Clubhouse or at SAP 2008 / SAP TechEd 08 / SIM202 / Page 49
38 Further Information SAP Public Web: SAP Developer Network (SDN): Business Process Expert (BPX) Community: Related SAP Education and Certification Opportunities Related Workshops/Lectures at SAP TechEd 2007 SIM206, SSO in Heterogeneous Systems Landscapes and SAML, Lecture SIM207, Towards Interoperable SSO for Web Services, Lecture SAP 2008 / SAP TechEd 08 / SIM202 / Page 50
39 Thank you! SAP 2008 / SAP TechEd 08 / SIM202 / Page 51
40 Feedback Please complete your session evaluation. Be courteous deposit your trash, and do not take the handouts for the following session. Thank You! SAP 2008 / SAP TechEd 08 / SIM202 / Page 52
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver SAP Product Management, SAP NetWeaver Identity Management
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
Next Generation SSO for SAP Applications with SAML 2.0. SAP TG Solution Management Security April 2010
Next Generation SSO for SAP Applications with SAML 2.0 SAP TG Solution Management Security April 2010 Disclaimer This presentation outlines our general product direction and should not be relied on in
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0
1 2 3 4 5 6 7 8 9 10 11 Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0 Version 3.2.2 Editor: Kyle Meadors, Drummond Group Inc. Abstract: This document describes the test steps to
SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011
NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
IBM WebSphere Application Server
IBM WebSphere Application Server SAML 2.0 web single-sign-on 2012 IBM Corporation This presentation describes support for SAML 2.0 web browser Single Sign On profile included in IBM WebSphere Application
Security Assertion Markup Language (SAML) 2.0 Technical Overview
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Security Assertion Markup Language (SAML) 2.0 Technical Overview Working Draft 03, 20 February 2005 Document identifier:
IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
Siebel CRM On Demand Single Sign-On. An Oracle White Paper December 2006
Siebel CRM On Demand Single Sign-On An Oracle White Paper December 2006 Siebel CRM On Demand Single Sign-On Introduction... 3 Single Sign-On with Siebel CRM On Demand... 4 Customer Requirements... 4 SSO
How to create a SP and a IDP which are visible across tenant space via Config files in IS
How to create a SP and a IDP which are visible across tenant space via Config files in IS This Documentation is explaining the way to create a SP and IDP which works are visible to all the tenant domains.
Software Design Document SAMLv2 IDP Proxying
Software Design Document SAMLv2 IDP Proxying Federation Manager 7.5 Version 0.2 Please send comments to: [email protected] This document is subject to the following license: COMMON DEVELOPMENT AND
Securing Web Services With SAML
Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion
Extending DigiD to the Private Sector (DigiD-2)
TECHNISCHE UNIVERSITEIT EINDHOVEN Department of Mathematics and Computer Science MASTER S THESIS Extending DigiD to the Private Sector (DigiD-2) By Giorgi Moniava Supervisors: Eric Verheul (RU, PwC) L.A.M.
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On Public Speakers Las Vegas, Oct 19-23 Christian Cohrs, Area Product Owner Barcelona, Nov 10-12 Regine Schimmer, Product Management
SAML Federated Identity at OASIS
International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for
Biometric Single Sign-on using SAML Architecture & Design Strategies
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems [email protected] 1 Setting Expectations What you can take away! Understand
E-Authentication Federation Adopted Schemes
E-Authentication Federation Adopted Schemes Version 1.0.0 Final May 4, 2007 Document History Status Release Date Comment Audience Template 0.0.0 1/18/06 Outline PMO Draft 0.0.1 1/19/07 Initial draft Internal
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper
Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper TABLE OF CONTENTS INTRODUCTION... 3 Where we came from... 3 The User s Dilemma with the Cloud... 4 The Administrator
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
SAP NetWeaver AS Java
Chapter 75 Configuring SAP NetWeaver AS Java SAP NetWeaver Application Server ("AS") Java (Stack) is one of the two installation options of SAP NetWeaver AS. The other option is the ABAP Stack, which is
IT@Intel. Improving Security and Productivity through Federation and Single Sign-on
White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Security Assertion Markup Language (SAML) V2.0 Technical Overview
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 Security Assertion Markup Language (SAML) V2.0 Technical Overview Committee Draft 02 25 March 2008
DEPLOYMENT GUIDE. SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity
DEPLOYMENT GUIDE SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity Table of Contents SAML Overview...3 Integration Topology...3 Deployment Requirements...4 Configuration Steps...4 Step
000-575. IBM Tivoli Federated Identity Manager V6.2.2 Implementation. Version: Demo. Page <<1/10>>
000-575 IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version: Demo Page 1.What is the default file name of the IBM Tivoli Directory Integrator log? A. tdi.log B. ibmdi.log C. ibmdisrv.log
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies
IAM Application Integration Guide
IAM Application Integration Guide Date 03/02/2015 Version 0.1 DOCUMENT INFORMATIE Document Title IAM Application Integration Guide File Name IAM_Application_Integration_Guide_v0.1_SBO.docx Subject Document
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE SAML 2.0 CONFIGURATION GUIDE Roy Heaton David Pham-Van Version 1.1 Published March 23, 2015 This document describes how to configure OVD to use SAML 2.0 for user
Security Assertion Markup Language (SAML) V2.0 Technical Overview
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 Security Assertion Markup Language (SAML) V2.0 Technical Overview Working Draft 10, 9 October 2006 Document
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
McAfee Cloud Identity Manager
SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Get Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : C2150-575 Title : IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version : Demo 1.What is the default file name of the
Single Sign-on. Overview. Using SSO with the Cisco WebEx and Cisco WebEx Meeting. Overview, page 1
Overview, page 1 Using SSO with the Cisco WebEx and Cisco WebEx Meeting Applications, page 1 Requirements, page 2 Configuration of in Cisco WebEx Messenger Administration Tool, page 3 Sample Installation
Certification Final Report SAML 2.0 Interoperability Test First Quarter 2011 (1Q11) March 31, 2011
Certification Final Report SAML 2.0 Interoperability Test First Quarter 2011 (1Q11) March 31, 2011 Prepared & Administered by: DRUMMOND GROUP INC. www.drummondgroup.com Copyright Drummond Group Inc. 2011
Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Department Service Integration with e-pramaan
Department Service Integration with e-pramaan How to integrate a.net Application.NET specific integration details are provided in this document. Read e-pramaan Departments Integration Document before proceeding.
Federal Identity, Credential, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile
Federal Identity, Credential, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile Version 1.0 September 27, 2010 Document History This is the first
Single Log-Out. Andreas Åkre Solberg Malaga, June 2009
Single Log-Out Andreas Åkre Solberg Malaga, June 2009 Sessions On Web HTTP originally stateless Using Cookies to keep state Cookies in RFC2965 Set a session ID first time user visits, sent back to site
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN 1 Venkadesh.M M.tech, Dr.A.Chandra Sekar M.E., Ph.d MISTE 2 1 ResearchScholar, Bharath University, Chennai 73, India. [email protected] 2 Professor-CSC
HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services
1 HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided
Application Gateway with Apache
Application Gateway with Apache Multi-backend scenarios Nghia Nguyen SAP NetWeaver RIG Americas, SAP Labs, LLC Introduction Session Objectives and Requirements Use Cases and Scenarios Limitations Configuring
Logout Support on SP and Application
Logout Support on SP and application Logout Support on SP and Application Possibilities and and Limitations SWITCHaai Team [email protected] Single Logout: Is it possible? Single Logout will work only in some
Biometric Single Sign-on using SAML
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP [email protected] 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On
OSOR.eu eid/pki/esignature Community Workshop in Brussels, 13. November 2008 IT Architect Søren Peter Nielsen - [email protected]
The OIOSAML Toolkits Accelerating a common egov infrastructure using open source reference implementations OSOR.eu eid/pki/esignature Community Workshop in Brussels, 13. November 2008 IT Infrastructure
SAP Single Sign-On 2.0 Overview Presentation
SAP Single Sign-On 2.0 Overview Presentation March 2016 Public Agenda SAP security portfolio Overview SAP Single Sign-On Single sign-on main scenarios Capabilities Summary 2016 SAP SE or an SAP affiliate
Federal Identity, Credentialing, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile
Federal Identity, Credentialing, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile Version 1.0.2 December 16, 2011 Document History Status Release
SAML and OAUTH Technologies WebSphere Application Server
SAML and OAUTH Technologies WebSphere Application Server Bill O'Donnell STSM WebSphere Foundation Security Architect Session TAW-1701 Session TAW-1698 Please Note IBM s statements regarding its plans,
Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence. Greg Wcislo
Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence Greg Wcislo Introduction We will not go into detailed how-to, however links to multiple how-to whitepapers will
OIO Web SSO Profile V2.0.5
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
DocuSign Single Sign On Implementation Guide Published: March 17, 2016
DocuSign Single Sign On Implementation Guide Published: March 17, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents
Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
2015-11-30. Web Based Single Sign-On and Access Control
0--0 Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking
Federated Identity in the Enterprise
www.css-security.com 425.216.0720 WHITE PAPER The proliferation of user accounts can lead to a lowering of the enterprise security posture as users record their account information in order to remember
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions Introduction This paper provides an overview of the integrated solution and a summary of implementation options
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
SAML 2.0 Interoperability Testing Procedures
1 2 3 4 5 6 7 8 9 10 11 Version 2.0 7 July 2006 Editors: Eric Tiffany, Contributors: Greg Whitehead, Hewlett-Packard Sampo Kellomäki, Symlabs Nick Ragouzis, Enosis Abstract: 12 13 14 15 16 17 18 19 20
Secure the Web: OpenSSO
Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1 Agenda Need for identity-based
Glossary of Key Terms
and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which
SAP NetWeaver Fiori. For more information, see "Creating and enabling a trusted provider for Centrify" on page 108-10.
Chapter 108 Configuring SAP NetWeaver Fiori The following is an overview of the steps required to configure the SAP NetWeaver Fiori Web application for single sign-on (SSO) via SAML. SAP NetWeaver Fiori
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
SAML Authentication Quick Start Guide
SAML Authentication Quick Start Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved.
PHP Integration Kit. Version 2.5.1. User Guide
PHP Integration Kit Version 2.5.1 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate PHP Integration Kit User Guide Version 2.5.1 December, 2012 Ping Identity Corporation 1001
PARTNER INTEGRATION GUIDE. Edition 1.0
PARTNER INTEGRATION GUIDE Edition 1.0 Last Revised December 11, 2014 Overview This document provides standards and guidance for USAA partners when considering integration with USAA. It is an overview of
idp Connect for OutSystems applications
idp Connect for OutSystems applications THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
CA CloudMinder. Getting Started with SSO 1.5
CA CloudMinder Getting Started with SSO 1.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your
TIB 2.0 Administration Functions Overview
TIB 2.0 Administration Functions Overview Table of Contents 1. INTRODUCTION 4 1.1. Purpose/Background 4 1.2. Definitions, Acronyms and Abbreviations 4 2. OVERVIEW 5 2.1. Overall Process Map 5 3. ADMINISTRATOR
How to Implement Enterprise SAML SSO
How to Implement Enterprise SSO THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY How to Implement Enterprise SSO Introduction Security Assertion Markup Language, or, provides numerous The advantages and
National Identity Exchange Federation. Web Browser User-to-System Profile. Version 1.0
National Identity Exchange Federation Web Browser User-to-System Profile Version 1.0 August 18, 2014 Table of Contents TABLE OF CONTENTS 1 1. TARGET AUDIENCE AND PURPOSE 2 2. TERMINOLOGY 2 3. REFERENCES
OIO SAML Profile for Identity Tokens
> OIO SAML Profile for Identity Tokens Version 1.0 IT- & Telestyrelsen October 2009 Content > Document History 3 Introduction 4 Related profiles 4 Profile Requirements 6 Requirements 6
Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Single Sign On (SSO) Implementation Manual. For Connect 5 & MyConnect Sites
Single Sign On (SSO) Implementation Manual For Connect 5 & MyConnect Sites Version 6 Release 5.7 September 2013 1 What is Blackboard Connect Single Sign On?... 3 How it Works... 3 Drawbacks to Using Single
This section includes troubleshooting topics about single sign-on (SSO) issues.
This section includes troubleshooting topics about single sign-on (SSO) issues. SSO Fails After Completing Disaster Recovery Operation, page 1 SSO Protocol Error, page 1 SSO Redirection Has Failed, page
Landscape Deployment Recommendations for. SAP Fiori Front-End Server
Landscape Deployment Recommendations for SAP Fiori Front-End New Rollout Channel The rollout channel for publishing landscape deployment recommendations changed. Please have a look at our announcement.
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
CA SiteMinder. Federation Security Services Release Notes. r12.0 SP3
CA SiteMinder Federation Security Services Release Notes r12.0 SP3 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational
Single Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
Revised edition. OIO Web SSO Profile V2.0.9 (also known as OIOSAML 2.0.9) Includes errata and minor clarifications
OIO Web SSO Profile V2.0.9 (also known as OIOSAML 2.0.9) Revised edition Includes errata and minor clarifications Danish Agency for Digitisation September 2012 Contents > 1 Introduction 8 1.1 Referenced
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
AD FS 2.0 Step-by-Step Guide: Federation with Ping Identity PingFederate
AD FS 2.0 Step-by-Step Guide: Federation with Ping Identity PingFederate Ping Identity Corporation and Microsoft Corporation Published: November 2010 Version: 1.0 Author: Dave Martinez, Principal, Martinez
