SAML V2.0 Asynchronous Single Logout Profile Extension Version 1.0
|
|
|
- Gary Gardner
- 10 years ago
- Views:
Transcription
1 SAML V2.0 Asynchronous Single Logout Profile Extension Version 1.0 Committee Specification November 2012 Specification URIs This version: cs01.odt (Authoritative) cs01.html cs01.pdf Previous version: N/A Latest version: (Authoritative) Technical Committee: OASIS Security Services (SAML) TC Chairs: Thomas Hardjono M.I.T. Nate Klingenstein Internet2 Editors: Chad La Joie Internet2 Scott Cantor Internet2 Additional artifacts: This prose specification is one component of a Work Product which also includes: XML schema: Related work: This specification is related to: Security Assertion Markup Language (SAML) v2.0. OASIS Standard. Declared XML namespace: urn:oasis:names:tc:saml:2.0:protocol:ext:async-slo Abstract: This document defines an extension to the SAML 2.0 Single Logout Protocol that allows the initiator to indicate that it does not expect to receive a response from the session authority. This improves user interface interoperability in deployments that want the identity provider to control the user experience during logout. Standards Track Work Product Copyright OASIS Open All Rights Reserved. Page 1 of 10
2 Status: This document was last revised or approved by the OASIS Security Services (SAML) TC on the above date. The level of approval is also listed above. Technical Committee members should send comments on this Work Product to the Technical Committee s list. Others should send comments to the Technical Committee by using the "Send A Comment" button on the Technical Committee s web page at For information on whether any patents have been disclosed that may be essential to implementing this Work Product, and any offers of patent licensing terms, please refer to the Intellectual Property Rights section of the Technical Committee web page ( Citation format: When referencing this Work Product the following citation format should be used: [SAML-Async-SLO] SAML V2.0 Asynchronous Single Logout Profile Extension Version November OASIS Committee Specification Standards Track Work Product Copyright OASIS Open All Rights Reserved. Page 2 of 10
3 Notices Copyright OASIS Open All Rights Reserved. All capitalized terms in the following text have the meanings assigned to them in the OASIS Intellectual Property Rights Policy (the "OASIS IPR Policy"). The full Policy may be found at the OASIS website. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published, and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this section are included on all such copies and derivative works. However, this document itself may not be modified in any way, including by removing the copyright notice or references to OASIS, except as needed for the purpose of developing any document or deliverable produced by an OASIS Technical Committee (in which case the rules applicable to copyrights, as set forth in the OASIS IPR Policy, must be followed) or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by OASIS or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and OASIS DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY OWNERSHIP RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. OASIS requests that any OASIS Party or any other party that believes it has patent claims that would necessarily be infringed by implementations of this OASIS Committee Specification or OASIS Standard, to notify OASIS TC Administrator and provide an indication of its willingness to grant patent licenses to such patent claims in a manner consistent with the IPR Mode of the OASIS Technical Committee that produced this specification. OASIS invites any party to contact the OASIS TC Administrator if it is aware of a claim of ownership of any patent claims that would necessarily be infringed by implementations of this specification by a patent holder that is not willing to provide a license to such patent claims in a manner consistent with the IPR Mode of the OASIS Technical Committee that produced this specification. OASIS may include such claims on its website, but disclaims any obligation to do so. OASIS takes no position regarding the validity or scope of any intellectual property or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; neither does it represent that it has made any effort to identify any such rights. Information on OASIS' procedures with respect to rights in any document or deliverable produced by an OASIS Technical Committee can be found on the OASIS website. Copies of claims of rights made available for publication and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this OASIS Committee Specification or OASIS Standard, can be obtained from the OASIS TC Administrator. OASIS makes no representation that any information or list of intellectual property rights will at any time be complete, or that any claims in such list are, in fact, Essential Claims. The name "OASIS" is a trademark of OASIS, the owner and developer of this specification, and should be used only to refer to the organization and its official outputs. OASIS welcomes reference to, and implementation and use of, specifications, while reserving the right to enforce its marks against misleading uses. Please see for above guidance. Standards Track Work Product Copyright OASIS Open All Rights Reserved. Page 3 of 10
4 Table of Contents 1 Introduction Terminology Normative References Single Logout Protocol Extension for Asynchronous Requests Element <aslo:asynchronous> Asynchronous Logout Request Processing Metadata Considerations Conformance... 8 Appendix A Acknowledgments... 9 Appendix B Revision History Standards Track Work Product Copyright OASIS Open All Rights Reserved. Page 4 of 10
5 Introduction This document defines an extension to the Single Logout Protocol that allows the initiator to indicate that it does not expect to receive a response from the session authority. The SAML 2 Single Logout Protocol, defined in section 3.7 of [SAMLCore], provides for request delivery over front- and back-channel mechanisms. When logout is begun with an SP-initiated front-channel request, either the session authority or service provider may present a user interface to the user but neither entity knows, or can indicate, that it will perform this task. If both present such a UI, this would likely lead to user confusion. This extension allows the SP to signal to the session authority that the session authority is expected to present the UI. In addition, an entity may wish to directly initiate a logout (e.g., an administrator destroying a user's session). If such behavior is triggered by the delivery of a SAML 2 logout request (instead of via a proprietary mechanism), this extension informs the sessions authority that a response is not necessary. 1.1 Terminology The key words MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL in this document are to be interpreted as described in [RFC 2119]. Conventional XML namespace prefixes are used throughout the listings in this specification to stand for their respective namespaces as follows, whether or not a namespace declaration is present in the example: Prefix XML Namespace Comments samlp: urn:oasis:names:tc:saml:2.0:protocol This is the SAML V2.0 protocol namespace defined in the SAML V2.0 core specification [SAMLCore] aslo: urn:oasis:names:tc:saml:2.0:protocol:ext:async-slo The namespace defined by this document. xsd: This namespace is defined in the W3C XML Schema specification [Schema1]. In schema listings, this is the default namespace and no prefix is shown. xsi: This is the XML Schema namespace for schemarelated markup that appears in XML instances [Schema1]. This specification uses the following typographical conventions in text: <ns:element>, Attribute, Datatype, OtherCode. This specification uses the following typographical conventions in XML listings: Listings of XML schemas appear like this. Listings of XML examples appear like this. These listings are non-normative. 1.2 Normative References [RFC 2119] S. Bradner. Key words for use in RFCs to Indicate Requirement Levels. IETF RFC 2119, March [SAMLCore] [SAML2Errata] OASIS Approved Standard, Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0, March OASIS Approved Errata, SAML V2.0 Errata, May Standards Track Work Product Copyright OASIS Open All Rights Reserved. Page 5 of 10
6 [SAMLMeta] OASIS Approved Standard, Metadata for the OASIS Security Assertion Markup Language (SAML) V2.0, March [Schema1] H. S. Thompson et al. XML Schema Part 1: Structures. World Wide Web Consortium Recommendation, May See xmlschema / Standards Track Work Product Copyright OASIS Open All Rights Reserved. Page 6 of 10
7 Single Logout Protocol Extension for Asynchronous Requests 2.1 Element <aslo:asynchronous> The <aslo:asynchronous> element indicates that the containing <samlp:logoutrequest> is an asynchronous request and should be processed as described in the following section. The <aslo:asynchronous> element MUST appear within the <samlp:extensions> element of a <samlp:logoutrequest> element. The use of the <aslo:asynchronous> element outside of that context is not defined by this specification. <element name="asynchronous" type="aslo:asynchronoustype" /> <complextype name="asynchronoustype" /> 2.2 Asynchronous Logout Request Processing When a session authority receives a <samlp:logoutrequest> containing the asynchronous request extension, the session authority SHALL process the request as described in section of [SAMLCore] except that the session authority MUST NOT send a <samlp:logoutresponse> to the request initiator. Note, because no <samlp:logoutresponse> is sent back to the request initiator, the session authority MUST provide all relevant feedback. For example, in the case of front-channel bindings, the session authority would display a web page indicating the success or failure of the logout process. 2.3 Metadata Considerations SAML metadata MAY be used to indicate support for this protocol extension at particular protocol endpoints, using the extension capabilities of the metadata schema. Support for this extension is expressed in SAML V2.0 metadata [SAMLMeta] by adding a boolean-typed XML attribute to an element derived from the md:endpointtype complex type, indicating that SAML request messages sent to that endpoint MAY include this extension. The following schema fragment defines the aslo:supportsasynchronous attribute: <attribute name="supportsasynchronous" type="boolean"/> Standards Track Work Product Copyright OASIS Open All Rights Reserved. Page 7 of 10
8 Conformance A logout request initiator conforms to this specification if it supports the inclusion of the <aslo:asynchronous> element as defined in section 2.1 of this specification. A session authority conforms to this specification if it can processes a logout request as defined primarily by [SAMLCore], as supplemented by section 2.2 of this specification. Standards Track Work Product Copyright OASIS Open All Rights Reserved. Page 8 of 10
9 Appendix A Acknowledgments The editors would like to acknowledge the contributions of the OASIS Security Services Technical Committee, whose voting members at the time of publication were: Scott Cantor, Internet2 Chad LaJoie, Internet2, Nate Klingenstein, Internet2, Thomas Hardjono, M.I.T. Frederick Hirsch, Nokia Corporation Hal Lockhart, Oracle Anil Saldhana, Red Hat Duane DeCouteau, Veteran's Health Administration Standards Track Work Product Copyright OASIS Open All Rights Reserved. Page 9 of 10
10 Appendix B Revision History Revision Date Editor Changes Made WD01 July 6, 2012 Chad La Joie Initial version WD02 Sep 4, 2012 Scott Cantor Added metadata portion, and a bit of cleanup. Standards Track Work Product Copyright OASIS Open All Rights Reserved. Page 10 of 10
SAML 2.0 INT SSO Deployment Profile
1 2 3 4 5 6 SAML 2.0 INT 7 8 9 Version: 0.1 Date: 2011-12-2 10 Editor: TBD 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Contributors: The full list of contributors can be referenced here: URL Status: This
XACML Profile for Role Based Access Control (RBAC)
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 XACML Profile for Role Based Access Control (RBAC) Committee Draft 01, 13 February 2004 Document identifier: cs-xacml-rbac-profile-01 Location:
Word Specification Sample
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 Word Specification Sample Working Draft 03, 12 June 2002 Document identifier: wd-spectools-word-sample-03 Location:
Customer Information Quality Specifications Version 3.0 Name (xnl), Address (xal), Name and Address (xnal) and Party (xpil)
Customer Information Quality Specifications Version 3.0 Name (xnl), Address (xal), Name and Address (xnal) and Party (xpil) Public Review Draft 03 08 April 2008 Specification URIs: This Version: http://docs.oasis-open.org/ciq/v3.0/prd03/specs/ciq-specs-v3-prd3.html
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes
Identity in the Cloud Use Cases Version 1.0
Identity in the Cloud Use Cases Version 1.0 Committee Note 01 08 May 2012 Specification URIs This version: http://docs.oasis-open.org/id-cloud/idcloud-usecases/v1.0/cn01/idcloudusecases-v1.0-cn01.pdf (Authoritative)
Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0 OASIS Standard,
MACE-Dir SAML Attribute Profiles
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 MACE-Dir SAML Attribute Profiles April 2008 Document identifier: internet2-mace-dir-saml-attributes-200804a Location: http://middleware.internet2.edu/dir Editors:
Security Assertion Markup Language (SAML) V2.0 Technical Overview
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 Security Assertion Markup Language (SAML) V2.0 Technical Overview Committee Draft 02 25 March 2008
Chris Smith, Platform Computing Marvin Theimer, Microsoft Glenn Wasson, UVA July 14, 2006 Updated: October 2, 2006
GWD-R (draft-ogf-jsdl-hpcp) JSDL-WG Marty Humphrey, UVA Chris Smith, Platform Computing Marvin Theimer, Microsoft Glenn Wasson, UVA July 14, 2006 Updated: October 2, 2006 JSDL HPC Profile Application Extension,
Liberty ID-WSF Multi-Device SSO Deployment Guide
: Version: 1.0-02 Liberty ID-WSF Multi-Device SSO Deployment Guide Version: 1.0-02 Editors: Paul Madsen, NTT Contributors: Hiroki Itoh, NTT Kiyohiko Ishikawa, NHK Fujii Arisa, NHK Abstract: This document
Bindings for the Service Provisioning Markup Language (SPML) Version 1.0
1 2 3 Bindings for the Service Provisioning Markup Language (SPML) Version 1.0 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 OASIS Standard, Approved October 2003 Document identifier:
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Specification
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Specification Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft
Universal Business Process 2.0 - Part 2: ebcppa
Universal Business Process 2.0 - Part 2: ebcppa Universal Business Language 2.0 ebbp 2.0 Business Process Definitions 2.0 ebcppa 2.0. Building Blocks 1.0 Publication Date April-2006 Version 0.6.1 Document
Kantara egov and SAML2int comparison
Kantara egov and SAML2int comparison 17.8.2010/[email protected] This document compares the egovernment Implementation profile of SAML 2.0, created by the egovernment WG of Kantara Initiative, and the
Feide Integration Guide. Technical Requisites
Feide Integration Guide Technical Requisites Document History Version Date Author Comments 1.1 Apr 2015 Jaime Pérez Allow the use of the HTTP-POST binding. 1.0 Oct 2014 Jaime Pérez First version of this
[MS-ASMS]: Exchange ActiveSync: Short Message Service (SMS) Protocol
[MS-ASMS]: Exchange ActiveSync: Short Message Service (SMS) Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications
eb Service Oriented Architecture Catalog of Patterns
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 eb Service Oriented Architecture Catalog of Patterns Working Draft 001, 18 August 2004 Document identifier: tbd Location: http://www.oasis-open.org/committees/ebsoa/
How To Write A Wsdl Standard For Csta (Ecma) And Cst A) (Ecmma)
ECMA-348 5 th Edition / June 2012 Web Services Description Language (WSDL) for CSTA Phase III Reference number ECMA-123:2009 Ecma International 2009 COPYRIGHT PROTECTED DOCUMENT Ecma International 2012
Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0
sm Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Related Usage Models... 5 Reference Framework...
Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0
sm Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Reference Framework... 5 Applicability... 6 Related Usage Models...
[MS-DVRD]: Device Registration Discovery Protocol. Intellectual Property Rights Notice for Open Specifications Documentation
[MS-DVRD]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Standard Registry Development and Publication Process
Document number: DSP4006 Date: 2007-12-12 Version: 1.1.0 Standard Registry Development and Publication Process Document type: Specification Document status: Informational Document language: E Copyright
Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0
1 2 3 4 5 6 7 8 9 10 11 Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0 Version 3.2.2 Editor: Kyle Meadors, Drummond Group Inc. Abstract: This document describes the test steps to
XML Document Management Architecture
XML Document Management Architecture Candidate Version 2.0 02 Dec 2010 Open Mobile Alliance OMA-AD-XDM-V2_0-20101202-C OMA-AD-XDM-V2_0-20101202-C Page 2 (30) Use of this document is subject to all of the
HTTP State Management
HTTP State Management Candidate Version 1.1 27 Feb 2007 Open Mobile Alliance OMA-TS-HTTPSM-V1_1-20070227-C OMA-TS-HTTPSM-V1_1-20070227-C Page 2 (17) Use of this document is subject to all of the terms
Web Services Security SOAP Messages with Attachments (SwA) Profile 1.1
1 2 3 4 Web Services Security SOAP Messages with Attachments (SwA) Profile 1.1 OASIS Standard, 1 February 2006 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Document identifier:
Common definitions and specifications for OMA REST interfaces
Common definitions and specifications for OMA REST interfaces Candidate Version 1.0 11 Jan 2011 Open Mobile Alliance OMA-TS-REST_Common-V1_0-20110111-C OMA-TS-REST_Common-V1_0-20110111-C Page 2 (20) Use
Web Services Security: SAML Token Profile 1.1
1 2 3 4 5 6 7 8 9 10 11 12 13 Web Services Security: SAML Token Profile 1.1 OASIS Standard, 1 February 2006 Document Identifier: wss-v1.1-spec-os-samltokenprofile OASIS Identifier: {WSS: SOAP Message Security
SAML 2.0 Interoperability Testing Procedures
1 2 3 4 5 6 7 8 9 10 11 Version 2.0 7 July 2006 Editors: Eric Tiffany, Contributors: Greg Whitehead, Hewlett-Packard Sampo Kellomäki, Symlabs Nick Ragouzis, Enosis Abstract: 12 13 14 15 16 17 18 19 20
Digital Signature Web Service Interface
1 2 Digital Signature Web Service Interface 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 1 Introduction This document describes an RPC interface for a centralized
Shibboleth Architecture
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Shibboleth Architecture Technical Overview Working Draft 02, 8 June 2005 Document identifier: draft-mace-shibboleth-tech-overview-02 Location: http://shibboleth.internet2.edu/shibboleth-documents.html
Web Services Manageability Concepts (WS-Manageability)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 Web Services Manageability Concepts (WS-Manageability) Version 1.0 September
Network Working Group
Network Working Group Request for Comments: 2413 Category: Informational S. Weibel OCLC Online Computer Library Center, Inc. J. Kunze University of California, San Francisco C. Lagoze Cornell University
Bindings for the OASIS Security Assertion Markup Language (SAML) V2.0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 Bindings for the OASIS Security Assertion Markup Language (SAML) V2.0 OASIS Standard,
Unstructured Information Management Architecture (UIMA) Version 1.0
Unstructured Information Management Architecture (UIMA) Version 1.0 Working Draft 05 29 May 2008 Specification URIs: This Version: http://docs.oasis-open.org/[tc-short-name] / [additional path/filename].html
Certificate profile for certificates issued by Central Signing services
Certificate profile for certificates issued by Central Signing services ELN-0608-v1.0 Version 1.0 2013-10-30 1 (6) 1 INTRODUCTION 3 1.1 REQUIREMENT KEY WORDS 3 1.2 XML NAME SPACE REFERENCES 3 1.3 STRUCTURE
Reference Architecture for Service Oriented Architecture Version 1.0
Reference Architecture for Service Oriented Architecture Version 1.0 Public Review Draft 1 23 April 2008 Specification URIs: This Version: http://docs.oasis-open.org/soa-rm/soa-ra/v1.0/soa-ra-pr-01.html
Cloud Infrastructure Management Interface - Common Information Model (CIMI-CIM)
1 2 3 4 5 Document Number: DSP0264 Version: 0.0.09 Date: 2011-09-07 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Cloud Infrastructure Management Interface - Common Information Model (CIMI-CIM)
[MS-ACCDT]: Access Template File Format. Intellectual Property Rights Notice for Open Specifications Documentation
[MS-ACCDT]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,
SAML 2.0 protocol deployment profile
SAML 2.0 protocol deployment profile FOR THE FINNISH PUBLIC SECTOR Version Date Changes 1.0 8.12.2010 Implementation by Ubisecure Solutions, Fujitsu Services and CSC IT Center for Science. Approved by
Network Working Group. Category: Standards Track October 2006
Network Working Group B. Volz Request for Comments: 4704 Cisco Systems, Inc. Category: Standards Track October 2006 The Dynamic Host Configuration Protocol for IPv6 (DHCPv6) Client Fully Qualified Domain
Cyber Authentication Technology Solutions Interface Architecture and Specification Version 2.0: Deployment Profile
Cyber Authentication Technology Solutions Interface Architecture and Specification Version 2.0: Status: Baseline for RFP #3 Final r7.2 Date modified: 25 March, 2011 13:53 File name: CA - V2.0 Final r7.2_en.doc
SAML and OAUTH comparison
SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, [email protected], twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single
Federation Operator Practice (FOP): Metadata Registration Practice Statement
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 Preface to the Template Document Federation
Authentication Context Classes for Levels of Assurance for the Swedish eid Framework
Authentication Context Classes for Levels of Assurance for the Swedish eid Framework Version 1.0 2013-07-01 1 (5) 1 INTRODUCTION 3 2 DEFINED AUTHENTICATION CONTEXT CLASSES 3 2.1 LEVEL OF ASSURANCE LEVEL
Open Cloud Computing Interface - Monitoring Extension
GFD-I OCCI-WG Augusto Ciuffoletti, Università di Pisa September 22, 2014 Updated: April 13, 2015 Open Cloud Computing Interface - Monitoring Extension Status of this Document This document provides information
SD Specifications Part 1 NFC (Near Field Communication) Interface Simplified Addendum
SD Specifications Part 1 NFC (Near Field Communication) Interface Simplified Addendum Version 1.00 November 8, 2013 Addendum to: SD Specifications Part 1 Physical Layer Simplified Specification Version
SAML Federated Identity at OASIS
International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for
The Global Justice Reference Architecture (JRA) Web Services Service Interaction Profile
The Global Justice Reference Architecture (JRA) Web Services Service Interaction Profile V 1.1 by The Global Infrastructure/Standards Working Group August 1, 2007 Table of Contents Acknowledgements...
Single Logout. TF-EMC2 2010 Vienna 17 th February 2010. Kristóf Bajnok NIIF Institute
TF-EMC2 2010 Vienna 17 th February 2010 Kristóf Bajnok NIIF Institute TF-EMC2 2010 Vienna 17 th February 2010 Kristóf Bajnok NIIF Institute Everybody wants to logout... Single sign-on is a powerful toy
[MS-BDSRR]: Business Document Scanning: Scan Repository Capabilities and Status Retrieval Protocol
[MS-BDSRR]: Business Document Scanning: Scan Repository Capabilities and Status Retrieval Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft
Presence SIMPLE Architecture
Presence SIMPLE Architecture Approved Version 1.1 27 Jun 2008 Open Mobile Alliance OMA-AD-Presence_SIMPLE-V1_1-20080627-A OMA-AD-Presence_SIMPLE-V1_1-20080627-A Page 2 (21) Use of this document is subject
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
Outage Notification. "Acknowledgment: This material is based upon work supported by the Department of Energy under Award Number DE-OE0000193.
Outage Notification "Acknowledgment: This material is based upon work supported by the Department of Energy under Award Number DE-OE0000193." Disclaimer: "This report was prepared as an account of work
Open Source Software used in the product
Open Source Software used in the product The software in this product contains parts licensed under various Open Source licenses. Please refer to the below list for further information on the software
Non-Proprietary User Agreement No. NPUSR00xxxx SAMPLE BETWEEN
11//08/2012 ExT JGI - Umbrella The Department of Energy has opted to utilize the following agreement for Designated Non-Proprietary User Facilities transactions. Because these transactions are widespread
IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0
International Virtual Observatory Alliance IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 IVOA Proposed Recommendation 20151029 Working group http://www.ivoa.net/twiki/bin/view/ivoa/ivoagridandwebservices
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
OPEN DATA CENTER ALLIANCE SM USAGE MODEL: E-DISCOVERY AND FORENSICS
OPEN DATA CENTER ALLIANCE SM USAGE MODEL: E-DISCOVERY AND FORENSICS Version Date Editor Description of Change 1.0 27 Aug 2014 Security WG Initial release Contributors Christophe Gévaudan UBS Tino Hirschmann
docs.rackspace.com/api
docs.rackspace.com/api Rackspace Cloud Big Data Release (2015-06-30) 2015 Rackspace US, Inc. This document is intended for software developers who are interested in developing applications using the Rackspace
Content Management Interoperability Services (CMIS) Version 1.1
Content Management Interoperability Services (CMIS) Version 1.1 OASIS Standard Specification URIs This version: http://docs.oasis-open.org/cmis/cmis/v1.1/os/.pdf (Authoritative) http://docs.oasis-open.org/cmis/cmis/v1.1/os/.html
[MS-CCEIP]: Corporate Customer Experience Improvement Program Client-to-Server Protocol
[MS-CCEIP]: Corporate Customer Experience Improvement Program Client-to-Server Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes
Adobe XML Architecture
Adobe XML Architecture XML Data Package Specification Version 2.0 Adobe Systems Incorporated October 2003 2003 Adobe Systems Incorporated. All rights reserved. This publication and the information herein
DocuSign Single Sign On Implementation Guide Published: March 17, 2016
DocuSign Single Sign On Implementation Guide Published: March 17, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents
DualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.
DualShield Integration Guide Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,
WI-FI ALLIANCE INTELLECTUAL PROPERTY RIGHTS POLICY
WI-FI ALLIANCE INTELLECTUAL PROPERTY RIGHTS POLICY BACKGROUND The purpose of the Wi-Fi Alliance ( WFA ) is to promote the IEEE 802.11 wireless networking standard by encouraging manufacturers of wireless
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
ENHANCED HOST CONTROLLER INTERFACE SPECIFICATION FOR UNIVERSAL SERIAL BUS (USB) 2.0 - ADOPTERS AGREEMENT
ENHANCED HOST CONTROLLER INTERFACE SPECIFICATION FOR UNIVERSAL SERIAL BUS (USB) 2.0 - ADOPTERS AGREEMENT This Enhanced Host Controller Interface Specification for Universal Serial Bus (USB) 2.0 - Adopters
IBM WebSphere Application Server
IBM WebSphere Application Server OAuth 2.0 service provider and TAI 2012 IBM Corporation This presentation describes support for OAuth 2.0 included in IBM WebSphere Application Server V7.0.0.25. WASV70025_OAuth20.ppt
Oracle Endeca Information Discovery Integrator
Oracle Endeca Information Discovery Integrator Third-Party Version 3.1.1 December 2013 Copyright and disclaimer Copyright 2003, 2014, Oracle and/or its affiliates. All rights reserved. Oracle and Java
Get Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : C2150-575 Title : IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version : Demo 1.What is the default file name of the
Novell LDAP Proxy Server
AUTHORIZED DOCUMENTATION Best Features Guide Novell LDAP Proxy Server 1.0 October 2011 www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use
Service Provisioning Markup Language (SPML) Version 1.0
1 2 3 Service Provisioning Markup Language (SPML) Version 1.0 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 OASIS Standard, Approved October 2003 Document identifier: os-pstc-spml-core-1.0.doc
