Shibboleth Service Provider Workshop

Size: px
Start display at page:

Download "Shibboleth Service Provider Workshop"

Transcription

1 Shibboleth Service Provider Workshop Bart Ophelders - Philip Brusten [email protected] June 2010

2 Shibboleth Service provider workshop This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. 2

3 Acknowledgements What's new in Shibboleth 2 Chad La Joie [SAMLConf] os.pdf Liberty interoperability testing: Shibboleth 2.0 InstallFest Service Provider Material Ann Arbor, MI SP Hands-on Session SWITCH 3

4 Program Introduction: What is Shibboleth? Shibboleth 2.x: What has changed? Concept of Federation Resource Registry A word on ADFS Installation Bootstrapping SP Configuration 4

5 Introduction: What is Shibboleth? Quote from The Shibboleth System is a standards based, open source software package for web single sign-on across or within organizational boundaries. It allows sites to make informed authorization decisions for individual access of protected online resources in a privacy-preserving manner. 5

6 Introduction: What is Shibboleth? Terminology Authentication: says who we are Authorization: says which resource we can access SP: Service Provider (Resource) IdP: Identity Provider (Home organisation) WAYF: Where Are You From DS: Discovery Service 6

7 Identity Provider Architecture Shibboleth v1.3 HTTP redirect HTTP interaction WAYF Shibboleth module x User Agent/Browser Webserver Webserver Identity Provider Shibboleth service Service Provider Components: Identity Provider (IdP) Service Provider (SP) Where Are You From (WAYF) User Agent (UA) 7

8 Identity Provider Architecture Shibboleth v1.3 HTTP redirect HTTP interaction WAYF Shibboleth module x User Agent/Browser Webserver Webserver Identity Provider Shibboleth service Service Provider SAML1.1 profile: Browser/Artifact Initial request from UA to document X No active Shibboleth session, UA redirected to WAYF 8

9 Identity Provider Architecture Shibboleth v1.3 HTTP redirect HTTP interaction WAYF Shibboleth module x User Agent/Browser Webserver Webserver Identity Provider Shibboleth service Service Provider WAYF asks UA to choose an IdP (if not already set in cookie) Redirect UA to selected IdP 9

10 Identity Provider Architecture Shibboleth v1.3 HTTP redirect HTTP interaction WAYF Shibboleth module x User Agent/Browser Webserver Webserver Identity Provider Shibboleth service Service Provider IdP prompts the UA for credentials (Username/Password, x509, digipass, etc). IdP uses backend to verify credentials (LDAP, ADDS, SQL, etc) 10

11 Identity Provider Architecture Shibboleth v1.3 HTTP redirect HTTP interaction WAYF Shibboleth module x User Agent/Browser Webserver Webserver Identity Provider Shibboleth service Service Provider IdP resolves attributes for the authenticated principal and creates SAML assertion (authentication & attribute statement) Redirects UA with references to these assertions (Artifacts). 11

12 Identity Provider Architecture Shibboleth v1.3 HTTP redirect HTTP interaction WAYF Shibboleth module x User Agent/Browser Webserver Webserver Identity Provider Shibboleth service Service Provider Shibboleth service or daemon dereferences the Artifacts on a secure backchannel with SSL mutual authentication. Invisible for the UA. 12

13 Identity Provider Architecture Shibboleth v1.3 HTTP redirect HTTP interaction WAYF Shibboleth module x User Agent/Browser Webserver Webserver Identity Provider Shibboleth service Service Provider The Shibboleth service verifies and filters the information and gives it to the Shibboleth module (via RPC or TCP). The Shibboleth module or Webserver will authorise the principal. 13

14 Identity Provider Architecture Shibboleth v1.3 HTTP redirect HTTP interaction WAYF Shibboleth module x User Agent/Browser Webserver Webserver Identity Provider Shibboleth service Service Provider 2 The active sessions with every component will provide the single sign-on experience. 14

15 Program Introduction: What is Shibboleth? Shibboleth 2.x: What has changed? Concept of Federation Resource Registry A word on ADFS Installation Bootstrapping SP Configuration 15

16 Shibboleth 2.x: What has changed? General SAML2 protocols Authentication Request Protocol (SP initiated) Force re-authentication Passive authentication Assertion Query and Request Protocol Artifact Resolution Protocol Single Logout Protocol (Not supported by the IdP yet) NameID Management Protocol NameID Mapping Protocol Encryption and signing of sensitive information Distributed configuration (pull) Federation Metadata Attribute-map Attribute-filter 16

17 Shibboleth 2.x: What has changed? Identity Provider Own authentication modules LDAP Kerberos IP-based PreviousSession (SSO) REMOTE_USER (cfr. CAS) No SAML2 force authentication Very flexible attribute resolving Very flexible attribute filtering (with constraints) Clean audit logs etc 17

18 Shibboleth 2.x: What has changed? Discovery Service Successor of WAYF SAML2 Identity Provider Discovery Profile Multi-federation support 18

19 Shibboleth 2.x: What has changed? Service Provider Multi-protocol support New attribute filtering policy language Support for ODBC based storage of state Significant performance improvements 19

20 Identity Provider Architecture Shibboleth v2.x HTTP redirect HTTP interaction DS Shibboleth module x User Agent/Browser Webserver Webserver Identity Provider Shibboleth service Service Provider SAML2.0 profile: Web browser SSO + HTTP POST binding Initial request from UA to document X No active Shibboleth session, UA redirected to DS 20

21 Identity Provider Architecture Shibboleth v2.x HTTP redirect HTTP interaction DS SP takes back control Shibboleth module x User Agent/Browser Webserver Webserver Identity Provider Shibboleth service Service Provider DS asks UA to choose an IdP (if not already set in cookie) Redirect UA back to SP with selected IdP as parameter. 21

22 Identity Provider Architecture Shibboleth v2.x HTTP redirect HTTP interaction DS Shibboleth module x User Agent/Browser Webserver Webserver Identity Provider Shibboleth service Service Provider SP sends SAML Authentication request to the IdP. IdP prompts the UA for credentials, if necessary. IdP uses backend to verify credentials (LDAP, ADDS, SQL, etc) 22

23 Identity Provider Architecture Shibboleth v2.x HTTP redirect HTTP interaction DS Shibboleth module x Webserver Identity Provider User Agent/Browser SAML response Authentication statement Attribute statement Webserver Shibboleth service Service Provider The IdP resolves and filters the principal s attribute information and constructs a SAML assertion. This assertion can optionally be signed and/or encrypted. Next, the IdP POSTs a response to the SP. 23

24 Identity Provider Architecture Shibboleth v2.x HTTP redirect HTTP interaction DS Shibboleth module x User Agent/Browser Webserver Webserver Identity Provider No callback! Shibboleth service Service Provider The Shibboleth service decrypts, verifies and filters the response and gives it to the Shibboleth module (via RPC or TCP). The Shibboleth module or Webserver will authorise the principal. 24

25 Identity Provider Architecture Shibboleth v2.x HTTP redirect HTTP interaction DS Shibboleth module x User Agent/Browser Webserver Webserver Identity Provider Shibboleth service Service Provider 2 Again, the active sessions with every component will provide the single sign-on experience. 25

26 Program Introduction: What is Shibboleth? Shibboleth 2.x: What has changed? Concept of Federation Resource Registry A word on ADFS Installation Bootstrapping SP Configuration 26

27 Concept of Federation Group of entities, both IdPs and SPs. Can map on existing Associations (e.g.: BELNET, Associatie K.U.Leuven, K.U.Leuven, etc) App X K.U.Leuven Toledo App Y K.U.Leuven W&K App Z App Z Federation K.U.Leuven Federation Associatie K.U.Leuven 27

28 Concept of Federation Benefits Scalable Simplifies things WAYF service (IdP discovery) Metadata Describes entities (protocol support, contact information, etc) PKI management Trust Since Shibboleth v2.x = single point of trust Digitally signed 28

29 Program Introduction: What is Shibboleth? Shibboleth 2.x: What has changed? Concept of Federation Resource Registry A word on ADFS Installation Bootstrapping SP Configuration 29

30 Resource Registry Metadata management tool Based on open source from SWITCH and modified by INTIENT and K.U.Leuven Adapted for K.U.Leuven Multi-federation support Identity Provider 1-many link Service Provider 1-many link 30

31 Resource Registry 31

32 Resource Registry For now only internal use In a later stage available for: Resource Registry Administrators To approve resources from a certain IdP Resource Administrators For administering SP information (self-service) Home Organisation Administrators For administering IdP information (self-service) Federation Administrators Signing metadata file Roles can be assigned independently 32

33 Resource Registry Currently hosting: Federation K.U.Leuven Federation Associatie K.U.Leuven Federation K.U.Leuven UZLeuven Test federation K.U.Leuven 33

34 Program Introduction: What is Shibboleth? Shibboleth 2.x: What has changed? Concept of Federation Resource Registry A word on ADFS Installation Bootstrapping SP Configuration 34

35 A word on ADFS Active Directory Federation Services v1 Part of Microsoft Windows Server 2003 R2 WS-Federation Passive Requester Profile (WS-F PRP) Shibboleth v1.3 has implemented WS-Federation: Passive Requestor Interoperability Profile specification for both IdP & SP Two ways of working NT-Token based Claim based 35

36 Identity Provider A word on ADFS E.g. Implementation at K.U.Leuven ADFS Web Agents Account partners TRUST TRUST K.U.Leuven OWA Resources - OWA - EVault - Sharepoint - etc TRUST TRUST EVault Webserver IdP K.U.Leuven FS Sharepoint 36

37 A word on ADFS 37

38 A word on AD FS 2.0 Version 2.0 Officially released on 5 May 2010 Windows Server 2008 and Windows Server 2008 R2 Only claims based Compatible with ADFS v1.0 Liberty Interoperable Implementation Tables SAML2.0 operational modes: IdP lite SP lite 38

39 A word on AD FS

40 A word on AD FS

41 A word on AD FS 2.0 Identity Providers Windows Live ID Other 5) Use claims in token Application STS STS 4) Submit token WIF Token Internet Token 3) Authenticate user and get token for selected identity 2) Select an identity that matches those requirements Browser or Client CardSpace 2.0 User 1) Access application and learn token requirements Shamelessly copied from David Chappell s presentation at TechEd

42 Program Introduction: What is Shibboleth? Shibboleth 2.x: What has changed? Concept of Federation Resource Registry A word on ADFS Installation Bootstrapping SP Configuration 42

43 Environment RedHat Enterprise Linux 5.5 (Tikanga) Debian 5.0 (Lenny) Windows Server 2008 R2 Username: shib / root Passwords: P@ssw0rd Remote Access Linux: ssh Windows: Remote desktop 43

44 Environment RedHat Enterprise Linux 5.5 (Tikanga) 8 virtual machines DNS: worksh-rh-n.cc.kuleuven.be IP: N Debian 5.0 (Lenny) 4 virtual machines DNS: worksh-db-n.cc.kuleuven.be IP: N Windows Server 2008 R2 10 virtual machines DNS: worksh-w8-n.cc.kuleuven.be IP: N

45 Environment Shibboleth IdP DNS: worksh-idp.cc.kuleuven.be IP: (only accessible through VMs: /24) 45

46 Environment Shibboleth standard base $WORKSH_HOST = worksh-[rh db w8]-n.cc.kuleuven.be 46

47 Environment Key/Certificate generation - We ve done it for you Webserver Located at $PKI Signed by TerenaSSL CA Shibboleth SP Self-signed worksh-idp.cc.kuleuven.be: /home/shib/shibbolethspworkshop/certificates/shibboleth-sp Certificate: sp-[rh db w8]-n-cert.pem Key: sp-[rh db w8]-n-key.pem Save at $PKI Test certificates openssl x509 in $cert issuer noout 47

48 SSL certificates Use of self-signed certificates in backend No need for commercial certificates Longer lifetime No truststore to maintain for commercial CAs Revocation (just remove certificate) Trustbase of commercial signed certificates can become quite large Separate certificate for front- and backend 48

49 Environment Tools An absolute must: Syntax friendly editor RHEL: vim Debian: vim $ apt-get install vim Windows: notepad++ or SciTE HTTP client RHEL: links Debian: links Windows: local browser SCP or WinSCP Check your time now! Always work case sensitive! 49

50 mod_auth mod_shib mod_ssl... Installation - Overview IIS Shibboleth service Apache Shibboleth handler /Shibboleth.sso Shibboleth handler /Shibboleth.sso ISAPI filter Shibboleth RPC port 1600 Unix socket 50

51 RHEL webserver $ yum install httpd mod_ssl php DocumentRoot: /var/www/html ($DOCROOT) Configuration: /etc/httpd Logs: /var/log/httpd ($WEB_LOG) ServerName $ vim /etc/httpd/conf/httpd.conf Line 265: ServerName $WORKSH_HOST Start/Stop service $ service httpd start $ service httpd status httpd (pid ####) is running 51

52 RHEL webserver Prepare test application $ mkdir /var/www/html/secure $ vim /var/www/html/secure/index.php <?php header('location: 52

53 RHEL webserver - SSL $ vim /etc/httpd/conf.d/ssl.conf SSLCertificateFile /etc/pki/$worksh_host.pem SSLCertificateKeyFile /etc/pki/$worksh_host.key SSLCertificateChainFile /etc/pki/terenasslchain.crt $ service httpd configtest $ service httpd restart $ openssl s_client connect localhost:443 53

54 Debian webserver $ apt-get install libapache2-mod-php5 DocumentRoot: /var/www ($DOCROOT) Configuration: /etc/apache2 Logs: /var/log/apache2 ($WEB_LOG) ServerName $ vim /etc/apache2/sites-available/default $ vim /etc/apache2/sites-available/default-ssl Line 2, add: ServerName $WORKSH_HOST Start/Stop service $ apache2ctl start $ apache2ctl status 54

55 Debian webserver Prepare test application $ mkdir /var/www/secure $ vim /var/www/secure/index.php <?php header('location: 55

56 Debian webserver - SSL $ a2enmod ssl $ vim /etc/apache2/sites-available/default-ssl SSLCertificateFile /etc/pki/$worksh_host.pem SSLCertificateKeyFile /etc/pki/$worksh_host.key SSLCertificateChainFile /etc/pki/terenasslchain.crt $ a2ensite default-ssl $ apache2ctl configtest $ /etc/init.d/apache2 restart $ openssl s_client connect localhost:443 56

57 Windows Server Apache Download: : Win32 Binary including OpenSSL 0.9.8m (MSI Installer) DocumentRoot: c:\htdocs ($DOCROOT) Configuration: c:\apache2.2 Logs: c:\apache2.2\logs ($WEB_LOG) ServerName C:\Apache2.2\conf\httpd.conf Line 171: ServerName $WORKSH_HOST Start/Stop service using the Apache monitor in the tray 57

58 Windows Server Apache Prepare test application $ mkdir C:\htdocs\secure Create index.html file <html> <head> <title>redirect</title> <meta http-equiv="refresh" content="0;url=/shibboleth.sso/session"> </head> </html> 58

59 Windows Server 2008 Apache - SSL c:\apache2.2\conf\httpd.conf LoadModule ssl_module modules/mod_ssl.so [..] Include conf/extra/httpd-ssl.conf #Include c:/opt/shibboleth-sp/etc/shibboleth/apache22.config c:\apache2.2\conf\extra\httpd-ssl.conf SSLCertificateFile c:/pki/$worksh_host.pem SSLCertificateKeyFile c:/pki/$worksh_host.key SSLCertificateChainFile c:/pki/terenasslchain.crt Restart Apache2.2 via the tray $ openssl s_client connect localhost:443 59

60 Windows Server IIS IIS Server Manager: Add Web Server (IIS) Role with ASP.NET ASP IIS 6 Management compatibility ISAPI filter ISAPI extensions IIS Management console IIS Management Scripts and Tools (Powershell) Documents: c:\inetpub\wwwroot\ ($DOCROOT) $ net start w3svc 60

61 Windows Server IIS Prepare test application $ mkdir C:\inetpub\wwwroot\secure Create Default.asp file <% Response.Redirect "/Shibboleth.sso/Session" %> 61

62 Windows Server 2008 IIS - SSL Import certificate $ certutil p changeit importpfx c:\pki\$worksh_host.p12 $ Get-ChildItem cert:\localmachine\my Or use MMC Certificate snap-in 62

63 Windows Server 2008 IIS - SSL Configure IIS Right click website Edit bindings 63

64 Windows Server 2008 IIS - SSL Add.. Select SSL certificate Result 64

65 Shibboleth SP installation $ cd /etc/yum.repos.d $ wget th/rhel_5/security:shibboleth.repo $ yum install shibboleth[.x86_64] (Accept GPG key 0x7D0A1B3D) Certificates $ cp $PKI/sp-rh-N-cert.pem $SHIB_CONF/sp-cert.pem $ cp $PKI/sp-rh-N-key.pem $SHIB_CONF/sp-key.pem $ service shibd start Done by RPM after installation /etc/httpd/conf.d/shib.conf /etc/rc.d/init.d/shibd 65

66 Shibboleth SP installation $ cd /etc/apt/sources.list.d/ $ vim lenny-backports.list deb lenny-backports main contrib non-free $ apt-get update $ apt-get install debian-backports-keyring $ apt-get update $ apt-get -t lenny-backports install libapache2-mod-shib2 $ cp $PKI/sp-db-N-cert.pem $SHIB_CONF/sp-cert.pem $ cp $PKI/sp-db-N-key.pem $SHIB_CONF/sp-key.pem $ chown _shibd $SHIB_CONF/sp-key.pem 66

67 Shibboleth SP installation Configuration files provided by deb packages /etc/apache2/mods-available/shib2.load /etc/init.d/shibd Create/etc/apache2/mods-available/shib2.conf <Location /secure> AuthType shibboleth require shibboleth </Location> $ a2enmod shib2 $ /etc/init.d/shibd restart $ /etc/init.d/apache2 restart 67

68 Shibboleth SP installation Download MSI packet from Run shibboleth-sp win32.msi 68

69 Shibboleth SP installation 69

70 Shibboleth SP installation 70

71 Shibboleth SP installation 71

72 Shibboleth SP installation 72

73 Shibboleth SP installation 73

74 Shibboleth SP installation 74

75 Shibboleth SP installation After installation it is better to restart the OS Copy the self-signed keypair $ copy $PKI/sp-w8-N-cert.pem $SHIB_CONF/sp-cert.pem $ copy $PKI/sp-w8-N-key.pem $SHIB_CONF/sp-key.pem Restart Shibboleth service 75

76 Sanity checks Shibboleth ISAPI filter must be the first in the ordered list 76

77 Sanity checks Access Shibboleth handler from your browser Access session handler from your browser A valid session was not found. See how a Shibboleth error looks like 77

78 Program Introduction: What is Shibboleth? Shibboleth 2.x: What has changed? Concept of Federation Resource Registry A word on ADFS Installation Bootstrapping SP Configuration 78

79 Bootstrapping the SP Goals: 1. Working SP against a single IdP 2. Enable debugging of session attributes 3. Avoid clock complaints 79

80 Bootstrapping the SP Choose your entityid Should be: Unique Locally scoped Logical representative Unchanging Seen on the wire, configuration files, metadata, log files, etc 80

81 Bootstrapping the SP Relax some requirements, set your entityid and default IdP entityid $SHIB_CONF/shibboleth2.xml logger="syslog.logger" clockskew=" "> <Host name= $WORKSH_HOST redirecttossl="443"> <ApplicationDefaults id="default" policyid="default" entityid=" <SessionInitiator type="chaining" Location="/Login" isdefault="true" id="intranet" relaystate="cookie" entityid= <Handler type="session" Location="/Session" showattributevalues="true"/> 81

82 Bootstrapping the SP Provide metadata remotely from test IdP $SHIB_CONF/shibboleth2.xml <MetadataProvider type="chaining"> <MetadataProvider type="xml" uri=" backingfilepath="idp-metadata.xml" reloadinterval="3600"/> Backup at $SHIB_RUN Uncomment whole <MetadataProvider> Comment <MetadataFilter> Normally: Provide your SP s metadata to IdP But, already done for you :-) Metadata self-generated by your Service Provider 82

83 Bootstrapping the SP For IIS: Get site id (Run powershell as Administrator) $ Import-Module WebAdministration $ dir IIS:\Sites Set correct site ID and name <InProcess logger="native.logger"> <ISAPI normalizerequest="true" safeheadernames="true"> <Site id="1" name= $WORKSH_HOST"/> 83

84 Bootstrapping the SP Quick test Make sure configuration works $ shibd tc $SHIB_CONF/shibboleth2.xml WIN$ shibd check $SHIB_CONF/shibboleth2.xml Service Provider reloads shibboleth2.xml automatically when it changes Try it with a browser /secure/ is protected by shibboleth2.xml (<RequestMap>) Login with shibn / P@ssw0rd Get session information (you should see various attributes) 85

85 Bootstrapping SP - Logout Local logout This won t delete your session on the IdP! Close the browser in order to remove ALL your session cookies Or delete session cookies using the browser or an extension, e.g.: Firefox Web Developer extension 86

86 Bootstrapping SP Discovery Service Change the default SessionInitiator $SHIB_CONF/shibboleth2.xml <SessionInitiator type="chaining" Location="/Login" isdefault="false" id="intranet" relaystate="cookie" <SessionInitiator type="chaining" Location="/DS" id="ds" relaystate="cookie" isdefault="true"> [ ] <SessionInitiator type="samlds" URL=" </SessionInitiator> Try again 87

87 Program Introduction: What is Shibboleth? Shibboleth 2.x: What has changed? Concept of Federation Resource Registry A word on ADFS Installation Bootstrapping SP Configuration 88

88 Configuration Basic configuration Attribute handling Session Initiation Access control Adding a separate application Service provider handlers Session Initiators/Discovery 89

89 Basic configuration Goals: 1. Understand purpose and structure of SP configuration files 2. Increase log level to DEBUG 3. Configure metadata and add signature verification 90

90 Important directories $SHIB_CONF Master and supporting configuration files Locally maintained metadata files HTML templates (customize them to adapt look&feel to your application) Logging configuration files (*.logger) Credentials (certificates and private keys) $SHIB_RUN UNIX socket Remotely fetched files (metadata, attribute-map) $SHIB_LOG shibd.log & transaction.log $WEB_LOG (written by Shibboleth module/isapi filter) native.log 91

91 Configuration files in $SHIB_CONF shibboleth2.xml main configuration file apache*.config Apache module loading attribute-map.xml attribute handling attribute-policy.xml attribute filtering settings *.logger logging configuration *Error.html HTML templates for error messages locallogout.html SP-only logout template globallogout.html single logout template Recommendation: Adapting *.html files to match the look & feel of the protected application improves user experience. 92

92 shibboleth2.xml structure Outer elements of the shibboleth2.xml configuration file <OutOfProcess> / <InProcess> <UnixListener> / <TCPListener> <StorageService> <SessionCache> <ReplayCache> <ArtifactMap> <RequestMapper> Needed for session initiation and access control <ApplicationDefaults> Contains the most important settings of your SP <SecurityPolicies> 93

93 ApplicationDefaults structure You are most likely to change something in here: <ApplicationDefaults> <Sessions> Defines handlers and how sessions are initiated and managed <Errors> Used to display error messages. Provide here logo, and CSS <RelyingParty> (*) To modify settings for certain IdPs/federations <MetadataProvider> Defines the metadata to be used by the SP <TrustEngine> Which mechanisms to use for signatures validation <AttributeExtractor> Attribute map file to use <AttributeResolver> Attribute resolver file to use <AttributeFilter> Attribute filter file to use <CredentialResolver> Defines certificate and private key to be use <ApplicationOverride> (*) Can override any of the above for certain applications 94

94 Logging First thing to do in case of problems shibd.log and transaction.log written by shibd, native.log written by Shibboleth module/filter *.logger files contain predefined settings for output location and default logging level (INFO) along with useful categories to raise to DEBUG Log time is in UTC (~GMT) 95

95 Logging Raise categories $ vim $SHIB_CONF/shibd.logger log4j.rootcategory=debug, shibd_log To implement *.logger changed: $ touch shibboleth2.xml $ tail f /var/log/shibboleth/shibd.log Try again 96

96 Metadata features Metadata describes the other components (IdPs) that the Service Provider can communicate with Four primary methods built-in: Local file (you manage it) Remote file (periodic refresh, local backup) Dynamic resolution of entityid (=URL) "Null" source that disables security ( OpenID model) Security comes from metadata filtering, either by you or the SP: Signature verification White and blacklists 97

97 Signature verification The Test IdPs metadata is signed. Until now, it was loaded without checking, which is not secure and not recommended! First, increase security: $SHIB_CONF/shibboleth2.xml Uncomment MetadataFilter for signature verification: <MetadataProvider type="xml [ ] uri= > <MetadataFilter type="signature certificate="sp-cert.pem"/> </MetadataProvider> 98

98 Signature verification Run $ shibd tc $SHIB_CONF/shibboleth2.xml WIN$ shibd check $SHIB_CONF\shibboleth2.xml and in the output you will see: WARN OpenSAML.MetadataFilter.Signature [3]: filtering out group at root of instance after failed signature check: ERROR OpenSAML.Metadata.Chaining [3]: failure initializing MetadataProvider: SignatureMetadataFilter unable to verify signature at root of metadata instance. Metadata could not be loaded because it was signed with a different key (we broke the setup). So, let s get the right key 99

99 Signature verification Get certificate from IdP: $ cd $SHIB_CONF $ wget Then fix it: $SHIB_CONF/shibboleth2.xml <MetadataProvider type="xml [ ] > <MetadataFilter type="signature certificate= worksh-idp.cc.kuleuven.be.pem"/> </MetadataProvider> Run again $ shibd tc $SHIB_CONF/shibboleth2.xml WIN$ shibd check $SHIB_CONF\shibboleth2.xml 100

100 Configuration Basic configuration Attribute handling Session Initiation Access control Adding a separate application Service provider handlers Session Initiators/Discovery 101

101 Attribute handling Goals: 1. Understand how attributes are transported 2. Learn how attributes are mapped and filtered 3. See how attributes can be used as identifiers 4. Add an attribute mapping and filtering rule 102

102 SP attribute terminology Push Delivering attributes with SSO assertion via web browser Pull Querying for attributes after SSO via back-channel (SP -> IdP) Extraction Decoding SAML information into neutral data structures mapped to environment or header variables Filtering Blocking invalid, unexpected, or unauthorized values based on application or community criteria Resolution Resolving a SSO assertion into a set of additional attributes (e.g. queries) 103

103 Scoped attributes Common term for attributes that consist of a relation between a value and a scope, usually an organizational domain name E.g. affiliation = [email protected] Makes values globally usable or unique Lots of special treatment in Shibboleth to make them more useful and "safe" Alternatively, split value and scope into separate attributes: affiliation= student and homeorganization= kuleuven.be 104

104 Attribute mappings SAML attributes from any source are "extracted" using the configuration rules in /etc/shibboleth/attribute-map.xml Each element is a rule for decoding a SAML attribute and assigning it a local id which becomes its mapped variable name Attributes can have one or more id and multiple attributes can be mapped to the same id The id can also be used as header name in the webserver for this attribute 105

105 Dissecting an Advanced Attribute Rule <Attribute id="affiliation" aliases="aff affil" name="urn:mace:dir:attribute-def:edupersonscopedaffiliation"> <AttributeDecoder xsi:type="scopedattributedecoder" </Attribute> casesensitive="false"/> id The primary "id" to map into, also used in web server environment aliases Optional alternate names to map into name SAML attribute name or NameID format to map from AttributeDecoder xsi:type Decoder plugin to use (defaults to simple/string) casesensitive How to compare values at runtime (defaults to true) 106

106 Adding attribute mappings Add first and lastname SAML 2 attribute mappings: $SHIB_CONF/attribute-map.xml <Attribute name="urn:oid: " id="sn aliases= surname /> <Attribute name="urn:oid: " id="givenname"/> After saving, changes take effect immediately but NOT for any existing sessions Therefore, restart your browser (or delete your session cookies) and continue on next slide 107

107 K.U.Leuven attribute mappings Attribute-map made compatible with 1.3 naming conventions $SHIB_CONF/shibboleth2.xml <! <AttributeExtractor type="xml" validate="true" path="attributemap.xml"/> --> <AttributeExtractor type="xml" uri=" backingfilepath="attribute-map.xml" reloadinterval="7200"/> 108

108 Common identifiers Local userid/netid/uid ( intranet userid ), e.g. u Usually readable, persistent but not permanent, often reassigned, not unique address, e.g. [email protected] Usually readable, persistent but not permanent, often reassigned, unique edupersonprincipalname, e.g. u @kuleuven.be Usually readable, persistent but not permanent, can be reassigned, unique edupersontargetedid / SAML 2.0 persistent ID Not readable, semi-permanent, not reassigned, unique 109

109 Common identifiers Legacy attribute placeholder for the SAML 2.0 persistent NameID format: opaque pairwise (IdP/SP) original motivation was privacy, but strongest features are lack of reassignment and immunity to name changes <saml:nameid Format="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent" NameQualifier=" SPNameQualifier=" stringupto256chars </saml:nameid> In web server environment, persistentid=

110 REMOTE_USER Special single-valued variable that all web applications should support for container-managed authentication of a unique user. Any attribute, once extracted/mapped, can be copied to REMOTE_USER Multiple attributes can be examined in order of preference, but only the first value will be used. IIS doesn t support to set the REMOTE_USER 111

111 Changing REMOTE_USER In case your application needs to have a remote user for authentication, you just could make Shibboleth put an attribute (e.g. sn ) as REMOTE_USER: $SHIB_CONF/shibboleth2.xml REMOTE_USER= sn eppn persistent-id targeted-id" If sn attribute is available, it will be put into REMOTE_USER Attribute sn has precedence over eppn in this case This allows very easy shibbolization of some web applications 112

112 Attribute filtering Answers the "who can say what" question on behalf of an application Service Provider can make sure that only allowed attributes and values are made available to application Some examples: constraining the possible values or value ranges of an attribute (e.g. edupersonaffiliation, telephonenumber,...) limiting the scopes/domains an IdP can speak for (e.g. university x cannot assert [email protected]) limiting custom attributes to particular sources 113

113 Default filter policy As default, attributes are filtered out unless there is a rule! Shared rule for legal affiliation values Shared rule for scoped attributes Generic policy applying those rules and letting all other attributes through. Check $SHIB_LOG/shibd.log for signs of filtering in case of problems with attributes not being available. You would find something like no rule found, removing all values of attribute (#attribute name#) 114

114 Configuration Basic configuration Attribute handling Session Initiation Access control Adding a separate application Service provider handlers Session Initiators/Discovery 115

115 Session initiation Goals: 1. Learn how to initiate a Shibboleth session 2. Understand their advantages and disadvantages 3. Know where to require a session, what to protect 116

116 Content protection and session initiation Before access control (will be covered later on) can occur, a Shibboleth session must be initiated Session initiation and content protection go hand in hand Requiring a session means the user has to authenticate Only authenticated users can access protected content 117

117 Content protection settings Protect hosts, directories, files or queries Apache.htaccess (dynamic) or httpd.conf (static) Apache / IIS / other RequestMap Requires Shibboleth to know exact hostname Very powerful and flexible thanks to boolean/regex operations Try accessing You should get access because the directory is not protected 118

118 Content protection with.htaccess Prepare webserver (<Directory name= $DOCROOT >) AllowOverride AuthConfig Let s protect the directory by requiring a Shibboleth session: $ mkdir $DOCROOT/secure2 $ vim $DOCROOT/secure2/.htaccess AuthType shibboleth require shibboleth ShibRequestSetting requiresession 1 Synonym for the last line (used in Shibboleth 1.3): ShibRequireSession On 119

119 Test content protection rule Clear session and then access Authentication is enforced and access should be granted By now, all authenticated users get access Content protection with authorization will be covered later 120

120 Content protection with RequestMap $ vim $DOCROOT/secure2/.htaccess AuthType shibboleth require shibboleth $SHIB_CONF/shibboleth2.xml <Host name= $WORKSH_HOST redirecttossl= 443 > </Host> <Path name= secure2 authtype= shibboleth requiresession= true /> Module (mod_shib or ISAPI filter) provides request URL to shibd to process it Clearing session and then accessing /secure2/ now, one also is forced to authenticate 121

121 RequestMap Fragility By default, Apache "trusts" the user s web browser about what the requested hostname is and reports that value internally To illustrate the problem, try accessing this URL: Script can be accessed unprotected/without a session? How to fix? Make Apache use configured ServerName httpd.conf UseCanonicalName On IIS: normalizerequest 122

122 Other content settings Requesting types of authentication E.g enforce X.509 user certificate authentication Redirect to SSL Custom error handling pages to use Redirection-based error handling In case of an error, redirect user to custom error web page with error message/type as GET arguments forceauthn Disable Single-Sign on and force a re-authentication ispassive Check whether a user has an SSO session and if he has, automatically create a session on SP without any user interaction Supplying a specific IdP to use for authentication 123

123 Lazy Sessions The mode of operation so far prevents an application from running without a login. Two other very common cases: Public and private access to the same resources Separation of application and SP session Semantics are: if valid session exists process it as usual (attributes in environment array, REMOTE_USER, etc.) But if a session does NOT exist or is invalid, ignore it and pass on control to webserver/scripts 124

124 Lazy Sessions example Construct URL Shibboleth handler: Session Initiator: /Login Target location:?target= Other options: Most parameters can come from three places, in order of precedence: Query string parameter to Shibboleth handler A content setting (Webserver config or RequestMap) <SessionInitiator> element 125

125 Lazy Sessions example $ vim $DOCROOT/secure3/.htaccess AuthType shibboleth require shibboleth IIS: RequestMap entry for secure3 Save PHP/ASP script from worksh-idp.cc.kuleuven.be: /home/shib/shibbolethspworkshop/examples/lazy_session.[php asp] at $DOCROOT/secure3/lazy_session.[php asp] Access asp] 126

126 Where to require a Shibboleth session Whole application with required Shibboleth session Easiest way to protect a set of documents No other authentication methods possible like this Whole application with lazy Shibboleth session Also allows for other authentication methods Authorization can only be done in application Only page that sets up application session Well-suited for dual login Application can control session time-out Generally the best solution 127

127 Configuration Basic configuration Attribute handling Session Initiation Access control Adding a separate application Service provider handlers Session Initiators/Discovery 128

128 Access control Goals: 1. Create some simple access control rules 2. Get an overview about the three ways to authorize users 3. Understand their advantages and disadvantages 129

129 Access control Two implementations are provided by the SP:.htaccess "require" rule processing XML-based policy syntax attached to content via RequestMap Third option: Integrate access control into webapplication 130

130 Access control 1.a httpd.conf 1.b.htaccess 2. XML AccessControl 3. Application Access Control + Easy to configure Can also protect locations or virtual files URL Regex Dynamic Easy to configure Platform independent Powerful boolean rules URL Regex Dynamic Very flexible and powerful with arbitrarily complex rules URL Regex Support - Only works for Apache Not dynamic Very limited rules Only works for Apache Only usable with real files and directories XML editing Configuration error can prevent SP from restarting You have to implement it yourself You have to maintain it yourself 131

131 1. Apache httpd.conf or.htaccess Work almost like known Apache require rules require affiliation staff require sn bar Special rules: shibboleth (no authorization) valid-user (require a session, but NOT identity) user (REMOTE_USER as usual) group (group files as usual) authncontextclassref, authncontextdeclref Default is boolean "OR, use ShibRequireAll for AND rule Regular expressions supported using special syntax: require mail ~ ^.*@(icts law).kuleuven.be$ 132

132 Side note: Aliases If in the attribute-map.xml file, there is a definition like: <Attribute name="urn:mace:dir:attribute-def:edupersonaffiliation" id="shib-ep-affiliation" aliases="affiliation aff affil"> [ ]/> This allows using rules aliases in authorization rules, e.g.: require affiliation staff #instead of require Shib-EP-Affiliation staff Aliases can also be used in RequestMap 133

133 1. Example.htaccess file Require a user to be staff member $DOCROOT/staff-only/.htaccess AuthType Shibboleth ShibRequestSetting requiresession 1 require unscoped-affiliation staff Access with user staff, access should be granted Try the same with shibn user, access should be denied 134

134 1. Advanced.htaccess file Require a user to be a student or to have an entitlement: $ mkdir $DOCROOT/toledo $ vim $DOCROOT/toledo/.htaccess AuthType Shibboleth ShibRequestSetting requiresession 1 require unscoped-affiliation student require entitlement ~.*toledo.* Access: with user student and staff, access should be granted. Try again with shibn, access should be denied. 135

135 2. XML access control Can be used for access control independent from web server and operating system XML Access control rules can be embedded inside RequestMap or can also be dynamically loaded from external file. WARNING: Can bring down entire webserver Same special rules as.htaccess, adds boolean operators (AND,OR,NOT) 136

136 2. XML access control example Same as previous example but now with XML access control embedded in RequestMap $ vim $DOCROOT/toledo/.htaccess AuthType Shibboleth require shibboleth $ vim $SHIB_CONF/shibboleth2.xml <Host name= $WORKSH_HOST"> [..] <Path name= toledo" authtype="shibboleth" requiresession="true"> <AccessControl> <OR> <RuleRegex require="entitlement">.*toledo.*</ruleregex> <Rule require="unscoped-affiliation">student</rule> </OR> </AccessControl> </Path> </Host> 137

137 3. Application managed access control #PHP: Application can access and use Shibboleth attributes by reading them from the web server environment Attributes then can be used for authentication/access control/authorization if ($_SERVER[ affiliation ] == staff ) #Perl: { grantaccess() } if ($ENV{ affiliation } == staff ) { &grantaccess() } #ASP: if (Request.ServerVariables( affiliation ) == staff ){ { grantaccess() } 138

138 3. Application managed access control Default is to use environment variables instead of HTTP headers (Apache) Cannot be manipulated in any way from outside Unfortunately not all webservers support a mechanism to create custom variables within webserver (IIS,Sun/iPlanet) Solution: AuthType shibboleth ShibRequestSetting requiresession 1 require shibboleth ShibUseHeaders On 139

139 Configuration Basic configuration Attribute handling Session Initiation Access control Adding a separate application Service provider handlers Session Initiators/Discovery 140

140 Adding a separate (Shibboleth) application Goals: 1. Define another application 2. Protect new application 3. Know how to configure them if necessary 141

141 Terminology Service Provider (physical) An installation of the software on a server Service Provider/ Resource (logical) Web resources viewed externally as a unit Each entityid identifies exactly one logical SP SP Application Web resources viewed internally as a unit Each applicationid identifies exactly one logical application A user session is bound to exactly one application 142

142 Virtualization concepts A single physical SP can host any number of logical SPs A logical SP can then include any number of "applications" Web virtual hosting is often related but is also independent Applications can inherit or override default configuration settings on a piecemeal basis Multiple physical SPs can also act as a single logical SP Clustering for load balancing and failover 143

143 Adding an application Goal: Add a second application with a different entityid living in its own virtual host $SHIB_CONF/shibboleth2.xml <RequestMap applicationid="default"> <Host name= $IP applicationid="alt"/> [..] <ApplicationOverride id="alt" entityid=" </ApplicationDefaults> 144

144 Adding an application For the additional application, canonical names should be turned off again (unless you use Vhosts) httpd.conf UseCanonicalName Off Test application: The IdP will throw an ERROR (entityid is not trusted) Error Message: SAML 2 SSO profile is not configured for relying party ' Check logging $SHIB_LOG/shibd.log and $WEB_LOG/native.log (DEBUG) You should see the new entityid 145

145 Adding an application <ApplicationOverride> Rule of thumb is that any settings you don't override inside the element will be inherited from the <ApplicationDefaults> element that surrounds the override. Limitations: You have to supply all the settings needed in the <Sessions> element because of the need to override the handlerurl. You do NOT have to redefine all of the handler child elements. The handlerurl MUST be unique for each SP and MUST map to the same applicationid Respect the XML sequence! 146

146 Clustering Configure multiple physical installations to share an entityid, and possibly credentials Configuration files often can be identical across servers that share an external hostname Session management: SP itself now clusterable via ODBC or memcached Host shibboleth service on one system 147

147 Configuration Basic configuration Attribute handling Session Initiation Access control Adding a separate application Service provider handlers Session Initiators/Discovery 148

148 Service provider handlers Goals: 1. Understand the idea of a handler 2. Get an overview about the different types of handlers 3. Know how to configure them if necessary 149

149 SP handlers "Virtual" applications inside the SP with API access: SessionInitiator (requests) E.g. /Shibboleth.sso/Login AssertionConsumerService (incoming SAML response) E.g. /Shibboleth.sso/SAML/POST LogoutInitiator (SP signout) E.g. /Shibboleth.sso/Logout SingleLogoutService (incoming SLO) ManageNameIDService (advanced SAML) ArtifactResolutionService (advanced SAML) Generic (diagnostics, other useful features) E.g. /Shibboleth.sso/Session /Shibboleth.sso/Status /Shibboleth.sso/Metadata 150

150 SP handlers The URL of a handler = handlerurl + the Location of the handler. e.g. for a virtual host testsp.example.org with handlerurl of "/Shibboleth.sso", a handler with a Location of "/Login" will be Handlers aren t always SSL-only, but usually should be (handlerssl="true"). Metadata basically consists of entityid, keys and handlers Handlers are never "protected" by the SP But sometimes by IP address (e.g. with acl= ) 151

151 Configuration Basic configuration Attribute handling Session Initiation Access control Adding a separate application Service provider handlers Session Initiators/Discovery 152

152 Session initiators/discovery Goals: 1. Understand the concepts of discovery/session initiation 2. Chains and protocol precedence 3. Overview about various discovery mechanisms 153

153 Session initiators / Discovery concepts Session initiator Handler that created a SAML authn request for an IdP or uses a discovery mechanism to identify the IdP Discovery (in Shibboleth) Identifying the IdP of a particular user WAYF service Old name in Shibboleth for a particular way to do discovery Handler chain Sequence of handlers that share configuration and run consecutively until something useful happen or an error occurs 154

154 Intranet case Single IdP, multiple protocols, no discovery: <SessionInitiator type="chaining" Location="/Login" id="intranet" isdefault="true" relaystate="cookie" entityid="urn:mace:kuleuven.be:kulassoc:kuleuven.be"> <SessionInitiator type="saml2" defaultacsindex="1" template="bindingtemplate.html"/> <SessionInitiator type="shib1" defaultacsindex="5"/> </SessionInitiator> Protocol precedence controlled by order of SessionInitiators within a chain Common properties defined at the top are inherited by SessionInitiators in chain 155

155 Change protocol precedence Example: switch order of chain <SessionInitiator type="chaining" Location="/Login" id="intranet" isdefault="true" relaystate="cookie" entityid="urn:mace:kuleuven.be:kulassoc:kuleuven.be"> <SessionInitiator type="shib1" defaultacsindex="5"/> <SessionInitiator type="saml2" defaultacsindex="1" template="bindingtemplate.html"/> </SessionInitiator> Still allows either protocol, but if the IdP supports Shibboleth profile of SAML1, it will be preferred 156

156 Identity provider discovery Protocol SessionInitiators work when the IdP is known For consistency, discovery is implemented with alternate SessionInitiators that operate only when the IdP is NOT known A typical federated chain includes one or more "protocol" handlers followed by a single "discovery" handler at the end, like a safety net 157

157 Typical discovery methods External options: Older WAYF model, specific to Shibboleth/SAML1, SP loses control if a problem occurs Newer SAMLDS model, recently standardized, supports multiple SSO protocols and allows the SP to control the process Internal options: Implemented by an application (e.g. Toledo) Followed by a redirect with the entityid: /Shibboleth.sso/Login?entityID=urn:mace:kuleuven.be:kulassoc:kuleuven.be Advanced "Cookie", "Form", and "Transform" SessionInitiators 158

158 Discovery service case (default) Multiple protocols, discovery via DS: <SessionInitiator type="chaining" Location="/DS" id= DS" isdefault="true" relaystate="cookie > <SessionInitiator type="saml2" defaultacsindex="1" template="bindingtemplate.html"/> <SessionInitiator type="shib1" defaultacsindex="5"/> <SessionInitiator type="samlds" </SessionInitiator> URL=" Same as intranet case, but omits entityid and adds the safety net at the bottom Last SessionInitiator in chain tells the DS to return the user to this location with a lazy session redirect that will invoke an earlier handler (SAML2 or Shib1) in the chain 159

159 External discovery/wayf + Easy to use Choice can be cached in cookie DS displays only applicable IdPs - Loss of control, UI fidelity Impact of errors List of IdPs can become very long 160

160 Conclusions Introduction: What is Shibboleth? Shibboleth 2.x: What has changed? Concept of Federation Resource Registry A word on ADFS Installation Bootstrapping SP Configuration 161

Shibboleth Service Provider. Bart Ophelders - Philip Brusten [email protected]

Shibboleth Service Provider. Bart Ophelders - Philip Brusten shib@kuleuven.be Shibboleth Service Provider Bart Ophelders - Philip Brusten [email protected] November 2011 Shibboleth Service provider workshop This work is licensed under a Creative Commons Attribution-ShareAlike 3.0

More information

Shibboleth SP Hands-on. Shilen Patel - [email protected] Rob Carter - [email protected] Gonzalo Guzman - [email protected]

Shibboleth SP Hands-on. Shilen Patel - shilen@duke.edu Rob Carter - rob@duke.edu Gonzalo Guzman - gonz@mcnc.org Shibboleth SP Hands-on Shilen Patel - [email protected] Rob Carter - [email protected] Gonzalo Guzman - [email protected] Credits and Acknowledgements 2 These slides were created by Lukas Hämmerle and Chad La Joie

More information

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access

More information

Federating with Web Applications

Federating with Web Applications Federating with Web Applications Janusz Ulawski HEAnet Ltd November 11, 2010 Agenda 1 Providing access to your WebApp 2 Federated Access Software with SAML 2.0 support 3 Federating your WebApp Shibboleth

More information

Shibboleth SP Simple Installation Guide For LINUX

Shibboleth SP Simple Installation Guide For LINUX Division of IT Shibboleth SP Simple Installation Guide For LINUX University of Missouri Revision History AM July 2012 Created AM July 26, 2012 Changed links to SP download AM August 29, 2012 Updated for

More information

Shibboleth Identity Provider (IdP) Sebastian Rieger [email protected]

Shibboleth Identity Provider (IdP) Sebastian Rieger sebastian.rieger@gwdg.de Shibboleth Identity Provider (IdP) Sebastian Rieger [email protected] Gesellschaft für wissenschaftliche Datenverarbeitung mbh Göttingen, Germany CLARIN AAI Hands On Workshop, 25.02.2009, Oxford

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

Fairsail. Implementer. Single Sign-On with Fairsail and Microsoft Active Directory Federation Services 2.0. Version 1.92 FS-SSO-XXX-IG-201406--R001.

Fairsail. Implementer. Single Sign-On with Fairsail and Microsoft Active Directory Federation Services 2.0. Version 1.92 FS-SSO-XXX-IG-201406--R001. Fairsail Implementer Microsoft Active Directory Federation Services 2.0 Version 1.92 FS-SSO-XXX-IG-201406--R001.92 Fairsail 2014. All rights reserved. This document contains information proprietary to

More information

Integration of Shibboleth and (Web) Applications

Integration of Shibboleth and (Web) Applications workshop Integration of Shibboleth and (Web) Applications MPG-AAI Workshop Clarin Centers Prague 2009 2009-11-06 (Web) Application Protection Models Classical Application behind Shibboleth Standard Session

More information

Shibboleth 2: A Guide for Deployers. Scott Cantor [email protected] Internet2 / The Ohio State University

Shibboleth 2: A Guide for Deployers. Scott Cantor cantor.2@osu.edu Internet2 / The Ohio State University Shibboleth 2: A Guide for Deployers Scott Cantor [email protected] Internet2 / The Ohio State University Outline Introduction to Shibboleth and Related Topics Software Architecture Deploying an Identity

More information

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication

More information

Implementation Guide SAP NetWeaver Identity Management Identity Provider

Implementation Guide SAP NetWeaver Identity Management Identity Provider Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before

More information

Using SAML for Single Sign-On in the SOA Software Platform

Using SAML for Single Sign-On in the SOA Software Platform Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software

More information

Configuring. Moodle. Chapter 82

Configuring. Moodle. Chapter 82 Chapter 82 Configuring Moodle The following is an overview of the steps required to configure the Moodle Web application for single sign-on (SSO) via SAML. Moodle offers SP-initiated SAML SSO only. 1 Prepare

More information

Shibboleth SP Simple Installation Guide For Windows and IIS

Shibboleth SP Simple Installation Guide For Windows and IIS Division of IT Shibboleth SP Simple Installation Guide For University of Missouri October 1. Background 1.1. What is a Service Provider? To put it simply, a service provider is the website you are trying

More information

Setup Guide Access Manager 3.2 SP3

Setup Guide Access Manager 3.2 SP3 Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

Using Shibboleth for Single Sign- On

Using Shibboleth for Single Sign- On Using Shibboleth for Single Sign- On One Logon to Rule them all.. Kirk Yaros Director, Enterprise Services Mott Community College 1 Agenda Overview of Mott Overview of Shibboleth and Mott s Project Review

More information

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved. Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

OIOSAML 2.0 Toolkits Test results May 2009

OIOSAML 2.0 Toolkits Test results May 2009 OIOSAML 2.0 Toolkits Test results May 2009 5. September 2008 - Søren Peter Nielsen: - Lifted and modified from http://docs.google.com/a/nemsso.info/doc?docid=dfxj3xww_7d9xdf7gz&hl=en by Joakim Recht 12.

More information

XIA Configuration Server

XIA Configuration Server XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration

More information

Installing an SSL certificate on the InfoVaultz Cloud Appliance

Installing an SSL certificate on the InfoVaultz Cloud Appliance Installing an SSL certificate on the InfoVaultz Cloud Appliance This document reviews the prerequisites and installation of an SSL certificate for the InfoVaultz Cloud Appliance. Please note that the installation

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Siteminder Integration Guide

Siteminder Integration Guide Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with

More information

Standalone SAML Attribute Authority With Shibboleth

Standalone SAML Attribute Authority With Shibboleth CESNET Technical Report 5/2013 Standalone SAML Attribute Authority With Shibboleth IVAN NOVAKOV Received 10. 12. 2013 Abstract The article defines what a standalone attribute authority is and how it can

More information

PHP Integration Kit. Version 2.5.1. User Guide

PHP Integration Kit. Version 2.5.1. User Guide PHP Integration Kit Version 2.5.1 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate PHP Integration Kit User Guide Version 2.5.1 December, 2012 Ping Identity Corporation 1001

More information

Identity Server Guide Access Manager 4.0

Identity Server Guide Access Manager 4.0 Identity Server Guide Access Manager 4.0 June 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF

More information

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...

More information

Novell Access Manager

Novell Access Manager Access Gateway Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 November 16, 2010 www.novell.com Novell Access Manager 3.1 SP2 Access Gateway Guide Legal Notices Novell, Inc., makes no representations

More information

FERMILAB CENTRAL WEB HOSTING SINGLE SIGN ON (SSO) ON CWS LINUX WITH SAML AND MOD_AUTH_MELLON

FERMILAB CENTRAL WEB HOSTING SINGLE SIGN ON (SSO) ON CWS LINUX WITH SAML AND MOD_AUTH_MELLON FERMILAB CENTRAL WEB HOSTING SINGLE SIGN ON (SSO) ON CWS LINUX WITH SAML AND MOD_AUTH_MELLON Contents Information and Security Contacts:... 3 1. Introduction... 4 2. Installing Module... 4 3. Create Metadata

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

AA enabling a closed source legacy application

AA enabling a closed source legacy application AA enabling a closed source legacy application Jan Du Caju ICT security officer K.U.Leuven Belgium AA enabling a closed source legacy application Introduction: context association K.U.Leuven Case: AA enabling

More information

Setup Guide Access Manager Appliance 3.2 SP3

Setup Guide Access Manager Appliance 3.2 SP3 Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS

More information

How To Use Netiq Access Manager 4.0.1.1 (Netiq) On A Pc Or Mac Or Macbook Or Macode (For Pc Or Ipad) On Your Computer Or Ipa (For Mac) On An Ip

How To Use Netiq Access Manager 4.0.1.1 (Netiq) On A Pc Or Mac Or Macbook Or Macode (For Pc Or Ipad) On Your Computer Or Ipa (For Mac) On An Ip Setup Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE

INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE SAML 2.0 CONFIGURATION GUIDE Roy Heaton David Pham-Van Version 1.1 Published March 23, 2015 This document describes how to configure OVD to use SAML 2.0 for user

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

SAML single sign-on configuration overview

SAML single sign-on configuration overview Chapter 46 Configurin uring Drupal Configure the Drupal Web-SAML application profile in Cloud Manager to set up single sign-on via SAML with a Drupal-based web application. Configuration also specifies

More information

Federated Identity Management Solutions

Federated Identity Management Solutions Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single

More information

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite. Abstract

Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite. Abstract Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite Abstract This white paper outlines the deployment and configuration of a Single Sign-On solution for EMC Documentum

More information

multiple placeholders bound to one definition, 158 page approval not match author/editor rights, 157 problems with, 156 troubleshooting, 156 158

multiple placeholders bound to one definition, 158 page approval not match author/editor rights, 157 problems with, 156 troubleshooting, 156 158 Index A Active Directory Active Directory nested groups, 96 creating user accounts, 67 custom authentication, 66 group members cannot log on, 153 mapping certificates, 65 mapping user to Active Directory

More information

owncloud 8 and DigitalOcean Matthew Davidson Bluegrass Linux User Group 03/09/2015

owncloud 8 and DigitalOcean Matthew Davidson Bluegrass Linux User Group 03/09/2015 owncloud 8 and DigitalOcean Matthew Davidson Bluegrass Linux User Group 03/09/2015 owncloud 8 and DigitalOcean The following slides are based off the notes that I used to build owncloud 8, on a server

More information

How to Configure Captive Portal

How to Configure Captive Portal How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,

More information

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1 PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity

More information

The GOV.UK Verify onboarding process

The GOV.UK Verify onboarding process To help us improve, this site uses cookies. Docs» GOV.UK Verify documentation GOV.UK Verify Onboarding Guide This guide is for government service providers wanting to learn about and integrate with GOV.UK

More information

Howto: Create a virtual platform Shibboleth

Howto: Create a virtual platform Shibboleth CAROUX Félicien NEMPONT Maxime Promotion FI-2010 Howto: Create a virtual platform Shibboleth Scientific & IT Project 2009-2010 Supervisor: M. LANDRU Jacques (Telecom Lille 1) M. SAGNIMORTE Thomas (Oxylane)

More information

Apache and Virtual Hosts Exercises

Apache and Virtual Hosts Exercises Apache and Virtual Hosts Exercises Install Apache version 2 Apache is already installed on your machines, but if it was not you would simply do: # apt-get install apache2 As the root user. Once Apache

More information

Federated Identity Management. Willem Elbers (MPI-TLA) EUDAT training

Federated Identity Management. Willem Elbers (MPI-TLA) EUDAT training Federated Identity Management Willem Elbers (MPI-TLA) EUDAT training Date: 26 June 2012 Outline FIM and introduction to components Federation and metadata National Identity federations and inter federations

More information

How To Use Saml 2.0 Single Sign On With Qualysguard

How To Use Saml 2.0 Single Sign On With Qualysguard QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,

More information

Load Balancing Microsoft AD FS. Deployment Guide

Load Balancing Microsoft AD FS. Deployment Guide Load Balancing Microsoft AD FS Deployment Guide rev. 1.1.1 Copyright 2002 2015 Loadbalancer.org, Inc. Table of Contents About this Guide...4 Loadbalancer.org Appliances Supported...4 Loadbalancer.org Software

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more

More information

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER M-FILES CORPORATION ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER VERSION 2.3 DECEMBER 18, 2015 Page 1 of 15 CONTENTS 1. Version history... 3 2. Overview... 3 2.1. System Requirements... 3 3. Network

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Administration guide version 1.0.1 Publication history Date Description Revision 2015.09.24 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Access Gateway Guide Access Manager 4.0 SP1

Access Gateway Guide Access Manager 4.0 SP1 Access Gateway Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS

More information

Enterprise SSL Support

Enterprise SSL Support 01 Enterprise SSL Support This document describes the setup of SSL (Secure Sockets Layer) over HTTP for Enterprise clients, servers and integrations. 1. Overview Since the release of Enterprise version

More information

Running Multiple Shibboleth IdP Instances on a Single Host

Running Multiple Shibboleth IdP Instances on a Single Host CESNET Technical Report 6/2013 Running Multiple Shibboleth IdP Instances on a Single Host IVAN NOVAKOV Received 10.12.2013 Abstract The article describes a way how multiple Shibboleth IdP instances may

More information

CA SiteMinder. SAML Affiliate Agent Guide. 6.x QMR 6

CA SiteMinder. SAML Affiliate Agent Guide. 6.x QMR 6 CA SiteMinder SAML Affiliate Agent Guide 6.x QMR 6 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Authentication and Single Sign On

Authentication and Single Sign On Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML

Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML --------------------------------------------------------------------------------------------------------------------------- Contents Overview...

More information

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as

More information

Single Sign-On for the UQ Web

Single Sign-On for the UQ Web Single Sign-On for the UQ Web David Gwynne Infrastructure Architect, ITIG, EAIT Taxonomy Authentication - Verification that someone is who they claim to be - ie, only the relevant user

More information

APACHE HTTP SERVER 2.2.8

APACHE HTTP SERVER 2.2.8 LEVEL 3 APACHEHTTP APACHE HTTP SERVER 2.2.8 HTTP://HTTPD.APACHE.ORG SUMMARY Apache HTTP Server is an open source web server application regarded as one of the most efficient, scalable, and feature-rich

More information

Security Workshop. Apache + SSL exercises in Ubuntu. 1 Install apache2 and enable SSL 2. 2 Generate a Local Certificate 2

Security Workshop. Apache + SSL exercises in Ubuntu. 1 Install apache2 and enable SSL 2. 2 Generate a Local Certificate 2 Security Workshop Apache + SSL exercises in Ubuntu Contents 1 Install apache2 and enable SSL 2 2 Generate a Local Certificate 2 3 Configure Apache to use the new certificate 4 4 Verify that http and https

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

User s guide. APACHE 2.0 + SSL Linux. Using non-qualified certificates with APACHE 2.0 + SSL Linux. version 1.3 UNIZETO TECHNOLOGIES S.A.

User s guide. APACHE 2.0 + SSL Linux. Using non-qualified certificates with APACHE 2.0 + SSL Linux. version 1.3 UNIZETO TECHNOLOGIES S.A. User s guide APACHE 2.0 + SSL Linux Using non-qualified certificates with APACHE 2.0 + SSL Linux version 1.3 Table of contents 1. PREFACE... 3 2. GENERATING CERTIFICATE... 3 2.1. GENERATING REQUEST FOR

More information

365 Services. 1.1 Configuring Access Manager. 1.1.1 Prerequisite. 1.1.2 Adding the Office 365 Metadata. docsys (en) 2 August 2012

365 Services. 1.1 Configuring Access Manager. 1.1.1 Prerequisite. 1.1.2 Adding the Office 365 Metadata. docsys (en) 2 August 2012 1 1Configuring Single Sign-On For Office 365 Services NetIQ Access Manager is compatible with Office 365 and provides single sign on access to Office 365 services. Single sign on access is supported for

More information

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services 1 HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,

More information

2 Downloading Access Manager 3.1 SP4 IR1

2 Downloading Access Manager 3.1 SP4 IR1 Novell Access Manager 3.1 SP4 IR1 Readme May 2012 Novell This Readme describes the Novell Access Manager 3.1 SP4 IR1 release. Section 1, Documentation, on page 1 Section 2, Downloading Access Manager 3.1

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

esoc SSA DC-I Part 1 - Single Sign-On and Access Management ICD

esoc SSA DC-I Part 1 - Single Sign-On and Access Management ICD esoc European Space Operations Centre Robert-Bosch-Strasse 5 64293 Darmstadt Germany Tel: (49)615190-0 Fax: (49)615190485 www.esa.int SSA DC-I Part 1 - Single Sign-On and Access Management ICD Prepared

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Installation of PHP, MariaDB, and Apache

Installation of PHP, MariaDB, and Apache Installation of PHP, MariaDB, and Apache A few years ago, one would have had to walk over to the closest pizza store to order a pizza, go over to the bank to transfer money from one account to another

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

Setting Up SSL on IIS6 for MEGA Advisor

Setting Up SSL on IIS6 for MEGA Advisor Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority

More information

Federation of OpenStack clouds

Federation of OpenStack clouds Federation of OpenStack clouds August 2014 Author: Luca Tartarini Supervisor(s): Marek Denis CERN openlab Summer Student Report 2014 Project Specification Rackspace and CERN are implementing federated

More information

Administering Jive for Outlook

Administering Jive for Outlook Administering Jive for Outlook TOC 2 Contents Administering Jive for Outlook...3 System Requirements...3 Installing the Plugin... 3 Installing the Plugin... 3 Client Installation... 4 Resetting the Binaries...4

More information

Release Notes RSA Authentication Agent 7.1.3 for Web for IIS 7.0, 7.5, and 8.0 Web Server

Release Notes RSA Authentication Agent 7.1.3 for Web for IIS 7.0, 7.5, and 8.0 Web Server Release Notes RSA Authentication Agent 7.1.3 for Web for IIS 7.0, 7.5, and 8.0 Web Server April, 2014 Introduction This document describes what is new and what has changed in RSA Authentication Agent 7.1.3

More information

Lets get a federated identity. Intro to Federated Identity. Feide OpenIdP. Enter your email address. Do you have access to your email?

Lets get a federated identity. Intro to Federated Identity. Feide OpenIdP. Enter your email address. Do you have access to your email? Lets get a feated identity Intro to Feated Identity EuroCAMP Training for APAN32 This work is licensed un a Creative Commons Attribution ShareAlike 3.0 Unported License. Do you have access to your email?

More information

Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5

Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5 Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5 TABLE OF CONTENTS Introduction... 1 Purpose and Target Audience... 1 Commonly Used Terms... 1 Overview of Shibboleth User

More information

Computer Services Documentation

Computer Services Documentation Computer Services Documentation Shibboleth Documentation {Shibboleth & Google Apps Integration} John Paul Szkudlapski June 2010 Note: These case studies, prepared by member organisations of the UK federation,

More information

SAML Security Option White Paper

SAML Security Option White Paper Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions

More information

1 of 24 7/26/2011 2:48 PM

1 of 24 7/26/2011 2:48 PM 1 of 24 7/26/2011 2:48 PM Home Community Articles Product Documentation Learning Center Community Articles Advanced Search Home > Deployments > Scenario 3: Setting up SiteMinder Single Sign-On (SSO) with

More information

Office 365 deployment checklists

Office 365 deployment checklists Chapter 128 Office 365 deployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of issues.

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,

More information

Agenda. How to configure

Agenda. How to configure [email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

Office 365 deploym. ployment checklists. Chapter 27

Office 365 deploym. ployment checklists. Chapter 27 Chapter 27 Office 365 deploym ployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of

More information

Securing the OpenAdmin Tool for Informix web server with HTTPS

Securing the OpenAdmin Tool for Informix web server with HTTPS Securing the OpenAdmin Tool for Informix web server with HTTPS Introduction You can use HTTPS to protect the IBM OpenAdmin Tool (OAT) for Informix web server from eavesdropping, tampering, and message

More information

Section 1, Configuring Access Manager, on page 1 Section 2, Configuring Office 365, on page 4 Section 3, Verifying Single Sign-On Access, on page 5

Section 1, Configuring Access Manager, on page 1 Section 2, Configuring Office 365, on page 4 Section 3, Verifying Single Sign-On Access, on page 5 Configuring Single Sign-On For Office 365 Services NetIQ Access Manager is compatible with Microsoft Office 365 and provides single sign-on access to Office 365 services. Single sign-on access is supported

More information

GlobalSign Enterprise Solutions Google Apps Authentication User Guide

GlobalSign Enterprise Solutions Google Apps Authentication User Guide GlobalSign Enterprise Solutions Google Apps Authentication User Guide Using EPKI for Google Apps for Business Single Sign-on and Secure Document Sharing v.1.1 1 Table of Contents Table of Contents... 2

More information

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia ei09095@fe.up.pt. Pedro Borges ei09063@fe.up.pt Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................

More information

Integrating Multi-Factor Authentication into Your Campus Identity Management System

Integrating Multi-Factor Authentication into Your Campus Identity Management System Integrating Multi-Factor Authentication into Your Campus Identity Management System Mike Grady, Unicon David Walker, Internet2 (both associated with the Internet2 Scalable Privacy Project) Agenda Multi-Context

More information

Single sign-on for ASP.Net and SharePoint

Single sign-on for ASP.Net and SharePoint Single sign-on for ASP.Net and SharePoint Author: Abhinav Maheshwari, 3Pillar Labs Introduction In most organizations using Microsoft platform, there are more than one ASP.Net applications for internal

More information