TF-AACE. Deliverable B.2. Deliverable B2 - The Authentication Component =============================================
|
|
|
- Kelly Cross
- 10 years ago
- Views:
Transcription
1 TF-AACE Deliverable B.2 Define the components and protocols to guarantee a harmonized operation of A&A systems Deliverable B2 - The Authentication Component ============================================= In the Deliverables list, Delivery B2 is specified as "Define the components and protocols to guarantee a harmonized operation of A&A systems". I believe there is a consensus that the authentication and authorisation services are separate and the main components of an authentication and authorisation service so let us start from there and discuss authentication. (I can t really understand what you mean here; maybe you mean that AuthZ and AuthT are separated and that there is consensus on the fact that authentication should be done at the home institution and that PKI is one of the techniques to provide it?) The purpose is not to agree on how to do authentication but on how to describe how authentication can be done. To move this deliverable forward I will in this message present an initial opinion on what models there are of Authentication Services. Initially at least this discussion will be held on the tf-aace list. Some Initial Definitions shall we use for this the AuthZ Grid definitions? ======================== Identity -- A defined name assigned by an Identity Authority guaranteed to be unique within the Authority's namespace. It may refer to one particular person, process, service, or machine. Identity is, according to my online-dictionary (Babylon), the "qualities that identify a person or a thing". Identification is, for example, to pick out Torbjörn Wiberg, using his identity, in a group photo of tf-aace members. (do we need to define this?) Authentication -- The process by which one party proves to an independent party its right to assert a given Identity. Authentication is the process of me convincing somebody that I am Torbjörn Wiberg by referring to some qualities of my identity. I think we should also define here the Authorisation
2 Authorization -- the process by which the receiver of a request determines whether the request should be permitted Web Authentication or... ========================= An authentication service can be a service designed to authenticate users of a web resource or it can be a more general authentication service like Kerberos. The service can be provided as a library or as a network based infraservice (middleware service). I would say something more here. A Web based authentication system is very simple and all the functionalities are located at the edge of the network, where there is installed an access control device to protect the network from unauthorised accesses. When the users get connected to systems, which uses a Web based authorisation they are redirected normally to a Web page, where they are asked to provide their credential (User name and password, normally). Then the access control device will authenticate users against these credentials. The way the credentials are carried out depends on the implementations. Federation and Identity ======================= When we come to identity in combination with the concept of a federation, there are at least two different relevant definitions and some variants in the services. Shibboleth is said to develop system components that facilitates inter-institutional sharing of web resources. On the front page of the web site it is stated that a key concept is Federated Administration. In the explanation of this notation it is said that a "trust fabric exists between campuses". This trust is manifested by for example the fact that the user's home campus is trusted by the members of the federation to carry out the authentication irrespectively of where in the federation the authentication is requested. So what is carried out perhaps can be said to be Federated Authentication. The same meaning of the word is used in FEIDE. My unreflected interpretation of the notation is the same as well. Shibboleth and Feide though differs in that Feide has an internal index service and "knows" which member of the federation that shall authenticate a certain user. In Shibboleth, the user directs the system to the authenticating organisation.
3 Perhaps you could say that Shibboleth is an Authentication Gateway and Feide is an Authentication Broker. PAPI also assumes that the authentication shall be done at home by an Authentication Service component. In PAPI a federation of authenticating organisations and access points (PoAs) to content providers is set up. Each authenticated user is attributed with a list of content providers whose resources are available to the user. This list is used by the other system component in PAPI - the PoA - to control the access to the resources of the content providers. As far as I understand PAPI the focus is on the Access Control Component of this federated structure and it can work with different Authentication Services as long as they can include a list of available content resources as a part of their authentication response. PAPI also assumes that the authentication shall be done at home by some Authentication Service component. Authorization shall happen at the target site, performed by an Authorization component. PAPI also has federation approach where the access points to content providers (PoAs) trust the authenticating organisations to do the authentication properly. As Shibboleth, PAPI has additional requirements on the authentication. Its response shall contain a set of assertions to be used by the authorisation component in PAPI. And again, Federated Authentication in these contexts is when a federation of organisations share the responsibility to authenticate the members of their community. The notion of a Federated Network Identity is introduced by Liberty Alliance in the white paper "Introduction to the Liberty Alliance Identity Architecture" and other documents, see " 20Final.pdf", revision 1.0, march It denotes a situation where several identities are linked together in the authentication process. One of the ideas behind this is that the use of the distributed identities shall be controlled by the user, thus giving a better protection of privacy. The Authentication Service can be provided as a Federated Authentication Service and/or as an Authentication Service for Federated Network Identities. The Authentication Mechanism ============================ In the authentication process, the user presents its authentication data, its credentials, to the authentication service. The authentication data belongs to or is derived from the electronic identity. It can for instance be a username/password, or a piece of data, a challenge encrypted with a private key belonging to the electronic identity, digital certificate, something related to the hardware WHAT ELSE CAN IT BE?
4 The authentication mechanisms match the Username/Password with such pairs in a Username/Password (or rather hashed password) database or decodes the encrypted challenge with the corresponding public key. Other mechanisms are based on one-time password that are either generated by some device or sent to for instance your mobile phone. In A-Select the user chooses what authentication mechanism to use from a list of alternatives the system associates you with. To me it makes sense to call such an Authentication Service an Authentication Portal. WHAT OTHER MECHANISMS ARE USED? Characterisation of the Application =================================== The development of the area has in part been stimulated by the wish from the ISPs to be able to protect the network as a resource from unauthenticated users. That is the network is the application. Much of the IETF work has this focus. This has been a natural starting point but it is important to have an application higher up in the abstraction hierarchy as your model application. As far as I understand Shibboleth has chosen the problem of serving Content Providers while preserving reasonable user privacy as a major application. They dont trust the application with full information about the user's identity and the application has to trust the Authentication Service follows the rules agreed upon for authentication. Feide, on the other hand, has chosen trusted internal distributed applications as their first model. You are expected to trust the application with information of Your identity, since the purpose of the application includes keeping and updating information about for instance Your studies. Another type of application is the small application that, due to the trend that every student and every personnel is becoming a user of our systems, for reasons of efficiency and quality needs to use a central authentication service rather than maintaining one of their own. Many of the typical channels in a personal portal belong to this category. Models of an Authentication Service =================================== What then are the different possible models in a taxonomy of authentication services? I see models along the following dimensions, and hope that You can add to the list of dimensions, or have opinions about what constitutes these dimensions.
5 First there are Authentication Services for different types of applications. The (inter)network itself is the resource, Content Providers, Business Applications, Small Applications,... Second there are Web Authentication Services and more general Authentication Services. Third there are different authentication mechanisms, and there are Authentication Service Portals where you as a user choses the authentication mechanism to use at this particular occasion. Fourth there are Federated Authentication Gateways and Authentication Brokers, where in the first case You and in the second case the authentication service chooses which member of the federation shall carry out the authentication. Fifth there are Authentication Services for Federated Network Identities where the identity is constructed out of distributed identity fragments. (If this is a dimension, it is a dimension of identity types. Is it??) Sixth, the service can be provided as an Authentication Server Infraservice, a server providing a network based infraservice for authentication, or as a library that can be linked with the application. What points in this space are at all of interest? When I hear presentations of A-select, Shibboleth and Feide's Mellon/Moria I have a feeling that we will eventually arrive at a situation where my (and everybody else's) personal Authentication Service is an Authentication Portal where two of the alternatives are an Authentication Gateway and an Authentication Broker. Most of the time the choice in the Authentication Portal can be made without my guidance since the binding between the model and resource is stored in my profile. But every now and then I arrive at a new resource and I have to register my preferred choice of authentication model for that particular resource.
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart [email protected]
Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin [email protected]
Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin [email protected] International Center for Advanced Internet Research Outline Security Mechanisms Access Control Schemes
Licia Florio Project Development Officer [email protected] www.terena.org Identity Federations in Europe
APAN Conference Honolulu, Hawaii 24 January 2008 Licia Florio Project Development Officer [email protected] www.terena.org Identity Federations in Europe Outline Networking Organisations in Europe Requirements
Application of the PAPI authn and authz system to the TJ-II Remote Participation environment. Madrid, 21 March 2003
Application of the PAPI authn and authz system to the TJ-II Remote Participation environment Madrid, 21 March 2003 Outline An introduction to PAPI A short tour on PAPI internals Applying PAPI in the TJ-II
Feide login (currently username/password)
Identity collaboration and federation in Norwegian education OECD workshop on Identity Management, Trondheim, 2006-05-08 Ingrid Melve, UNINETT Chief Technical Officer Feide login (currently username/password)
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]
Network Security. Chapter 9 Integrating Security Services into Communication Architectures
Network Security Chapter 9 Integrating Security Services into Communication Architectures Network Security (WS 00): 09 Integration of Security Services Motivation: What to do where?! Analogous to the methodology
GT 6.0 GSI C Security: Key Concepts
GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts Overview GSI uses public key cryptography (also known as asymmetric cryptography) as the basis for its functionality. Many of the
Web Authentication Application Note
What is Web Authentication? Web Authentication Application Note Web authentication is a Layer 3 security feature that causes the router to not allow IP traffic (except DHCP-related packets) from a particular
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
IGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
Globus Toolkit: Authentication and Credential Translation
Globus Toolkit: Authentication and Credential Translation JET Workshop, April 14, 2004 Frank Siebenlist [email protected] http://www.globus.org/ Copyright (c) 2002 University of Chicago and The University
Information Security Group Active-client based identity management
Active-client based identity management Chris Mitchell Royal Holloway, University of London www.chrismitchell.net 1 Acknowledgements This is joint work with Haitham Al-Sinani, also of Royal Holloway. 2
Middleware integration in the Sympa mailing list software. Olivier Salaün - CRU
Middleware integration in the Sympa mailing list software Olivier Salaün - CRU 1. Sympa, its middleware connectors 2. Sympa web authentication 3. CAS authentication 4. Shibboleth authentication 5. Sympa
Single Sign-On: Reviewing the Field
Outline Michael Grundmann Erhard Pointl Johannes Kepler University Linz January 16, 2009 Outline 1 Why Single Sign-On? 2 3 Criteria Categorization 4 Overview shibboleth 5 Outline Why Single Sign-On? Why
Canadian Access Federation: Trust Assertion Document (TAD)
Participant Name: University of Lethbridge 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Canadian Access Federation: Trust Assertion Document (TAD)
Participant Name: RESEARCH RESEARCH LTD. 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources
Windows Web Based VPN Connectivity Details & Instructions
VPN Client Overview UMDNJ s Web based VPN utilizes an SSL (Secure Socket Layer) Based Cisco Application that provides VPN functionality without having to install a full client for end users running Microsoft
2 Transport-level and Message-level Security
Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective The Globus Security Team 1 Version 4 updated September 12, 2005 Abstract This document provides an overview of the Grid Security
The Role of Federation in Identity Management
The Role of Federation in Identity Management August 19, 2008 Andrew Latham Solutions Architect Identity Management 1 The Role of Federation in Identity Management Agenda Federation Backgrounder Federation
IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Qualtrics Single Sign-On Specification
Qualtrics Single Sign-On Specification Version: 2010-06-25 Contents Introduction... 2 Implementation Considerations... 2 Qualtrics has never been used by the organization... 2 Qualtrics has been used by
A Shibboleth View of Federated Identity. Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR
A Shibboleth View of Federated Identity Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR Short Section Title Agenda Assumptions and Trends Identity Management and Shibboleth Shibboleth
MAC Web Based VPN Connectivity Details and Instructions
MAC Web Based VPN Connectivity Details and Instructions UMDNJ s Web-based VPN utilizes an SSL Based Cisco Application that provides VPN functionality without having to install a full client for end users
S P I E Information Environments Shibboleth and Its Integration into Security Architectures. EDUCAUSE & Internet 2 Security Professionals Conference
Shibboleth and Its Integration into Security Architectures Christian Fernau, Francisco Pinto University of Oxford EDUCAUSE & Internet 2 Security Professionals Conference Denver, CO 10-12 April 2006 16:47:29
Lets get a federated identity. Intro to Federated Identity. Feide OpenIdP. Enter your email address. Do you have access to your email?
Lets get a feated identity Intro to Feated Identity EuroCAMP Training for APAN32 This work is licensed un a Creative Commons Attribution ShareAlike 3.0 Unported License. Do you have access to your email?
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
NIST s Guide to Secure Web Services
NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:
An Anti-Phishing mechanism for Single Sign-On based on QR-Code
An Anti-Phishing mechanism for Single Sign-On based on QR-Code Syamantak Mukhopadhyay School of Electronics and Computer Science University of Southampton Southampton, UK [email protected] David
Swivel Secure and the Cloud
Swivel Secure and the Cloud Authentication for Cloud Application Abstract This document describes the issues relating to authenticating to cloud applications and how the Swivel authentication platform
Integrating Multi-Factor Authentication into Your Campus Identity Management System
Integrating Multi-Factor Authentication into Your Campus Identity Management System Mike Grady, Unicon David Walker, Internet2 (both associated with the Internet2 Scalable Privacy Project) Agenda Multi-Context
How To Secure A Wireless Network With A Wireless Device (Mb8000)
MB8000 Network Security and Access Control Overview MB8000 employs almost all of the current popular WLAN security mechanisms. These include wireless-user isolation, closed system (by turning off SSID
Digital Identity Management
Digital Identity Management Techniques and Policies E. Bertino CS Department and ECE School CERIAS Purdue University [email protected] Digital Identity Management What is DI? Digital identity (DI)
Mobile Access Software Blade
Mobile Access Software Blade Dimension Data BYOD event Jeroen De Corel SE BeLux 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd.
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
Identity Management with Spring Security. Dave Syer, VMware, SpringOne 2011
Identity Management with Spring Security Dave Syer, VMware, SpringOne 2011 Overview What is Identity Management? Is it anything to do with Security? Some existing and emerging standards Relevant features
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
Federated AAA middleware and the QUT SSO environment
Federated AAA middleware and the QUT SSO environment Bradley Beddoes Senior Network Programmer AAA eview Project Manager [email protected] Shaun Mangelsdorf Network Programmer [email protected]
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
OpenLogin: PTA, SAML, and OAuth/OpenID
OpenLogin: PTA, SAML, and OAuth/OpenID Ernie Turner Chris Fellows RightNow Technologies, Inc. Why should you care about these features? Why should you care about these features? Because users hate creating
Designing federated identity management architectures for addressing the recent attacks against online financial transactions.
Designing federated identity management architectures for addressing the recent attacks against online financial transactions. Dr. Christos K. Dimitriadis Security Officer INTRALOT S.A. Scope and Agenda
Identity: The Key to the Future of Healthcare
Identity: The Key to the Future of Healthcare Chief Medical Officer Anakam Identity Services July 14, 2011 Why is Health Information Technology Critical? Avoids medical errors. Up to 98,000 avoidable hospital
Remote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Evaluate the Usability of Security Audits in Electronic Commerce
Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka
TIB 2.0 Administration Functions Overview
TIB 2.0 Administration Functions Overview Table of Contents 1. INTRODUCTION 4 1.1. Purpose/Background 4 1.2. Definitions, Acronyms and Abbreviations 4 2. OVERVIEW 5 2.1. Overall Process Map 5 3. ADMINISTRATOR
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Single Sign-On for the UQ Web
Single Sign-On for the UQ Web David Gwynne Infrastructure Architect, ITIG, EAIT Taxonomy Authentication - Verification that someone is who they claim to be - ie, only the relevant user
Adding Federated Identity Management to OpenStack
Adding Federated Identity Management to OpenStack David Chadwick University of Kent 3 December 2012 University of Kent 1 Some Definitions What is Identity? A whole set of attributes that in combination
Linux Web Based VPN Connectivity Details and Instructions
Linux Web Based VPN Connectivity Details and Instructions UMDNJ s Web-based VPN utilizes an SSL Based Cisco Application that provides VPN functionality without having to install a full client for end users
This Working Paper provides an introduction to the web services security standards.
International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand
A Data Synchronization based Single Sign-on Schema Supporting Heterogeneous Systems and Multi-Management Mode
A Data Synchronization based Single Sign-on Schema Supporting Heterogeneous Systems and Multi-Management Mode Haojiang Gao 1 Beijing Northking Technology Co.,Ltd Zhongguancun Haidian Science Park Postdoctoral
Secure PostgreSQL Deployments
Secure PostgreSQL Deployments pgcon.br 2009 Campinas, Brazil Magnus Hagander Redpill Linpro AB There's much to security Identify the threats Apply the correct measures Don't do things just because you
Creating federated authorisation
Creating federated authorisation for a Django survey application Ed Crewe Background - the survey application Federated authorisation What do I mean by this? 1. Users login at a third party identity provider
Introducing Shibboleth
workshop Introducing Shibboleth MPG-AAI Workshop Clarin Centers Prague 2009 2009-11-06 MPG-AAI MPG-AAI a MPG-wide Authentication & Authorization Infrastructure for access control to web-based resources
DAMe Deploying Authorization Mechanisms for Federated Services in the eduroam Architecture
DAMe Deploying Authorization Mechanisms for Federated Services in the eduroam Architecture Sascha Neinert Marseille, 06.02.2008, Sascha Neinert, 06.02.2008 Seite 1 Overview Project Goals Partners Network
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
WEB SERVICES SECURITY
WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
This way, Bluewin will be able to offer single sign-on for service providers within the circle.
Clareity Security and The National Association of Realtors Develop a SAML Toolkit for the Real Estate Industry Ask any REALTOR about the systems they use and the passwords they deploy. The word mess will
IAM, Enterprise Directories and Shibboleth (oh my!)
IAM, Enterprise Directories and Shibboleth (oh my!) Gary Windham Senior Enterprise Systems Architect University Information Technology Services [email protected] What is IAM? Identity and Access
Distributed Identity Management Model for Digital Ecosystems
International Conference on Emerging Security Information, Systems and Technologies Distributed Identity Management Model for Digital Ecosystems Hristo Koshutanski Computer Science Department University
Single Sign-On Framework in Tizen Contributors: Alexander Kanavin, Jussi Laako, Jaska Uimonen
Single Sign-On Framework in Tizen Contributors: Alexander Kanavin, Jussi Laako, Jaska Uimonen Introduction Architecture Demonstration 2 What is the problem that Single Sign-on systems are aiming to solve?
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
