Software Design Document SAMLv2 IDP Proxying
|
|
|
- Gloria Chase
- 10 years ago
- Views:
Transcription
1 Software Design Document SAMLv2 IDP Proxying Federation Manager 7.5 Version 0.2 Please send comments to: This document is subject to the following license: COMMON DEVELOPMENT AND DISTRIBUTION LICENSE (CDDL) Version 1.0
2
3 Contents 1 Introduction Document Status Revision History Summary Scope Context Glossary References Overview Use Case 1: Use Case 2: Use Case 3: Use case 4: Design Considerations Assumptions and Dependencies Goals and Guidelines Development Method Architectural Strategies System Architecture SAMLv2 IDP proxing in single sign on case without introduction cookie (persistent) SAMLv2 IDP proxying in single sign on case with introduction cookie (persistent) SAMLv2 IDP proxying in single sign on (transient) SAMLv2 IDP proxing in single logout case Detailed System Architecture SAMLv2 metadata changes SPI com.sun.identity.saml2.profile Interface SAML2IDPProxy...17 getpreferredidp IDP proxying in SSO IDP Proxying in SLO Appendices Copyright 2007 Sun Microsystems, Inc. All rights reserved. iii
4 , Version iv Copyright 2007 Sun Microsystems, Inc. All rights reserved.
5 1 Introduction 1.1 Document Status Project Name FM 7.5 Document Title SAMLv2 IDP Proxying Date of Issue April 5, 2007 Current Version 0.2 Author Wei Sun Issuing Organization Sun Microsystems, Inc. Feedback 1.2 Revision History Date Version Author Comments March 28, Wei Sun Initial draft April 5, Wei Sun Incorporated comments from Burt and Qingwen 1.3 Summary The functionality being developed is to enable SAMLv2 IDP proxying feature. It gives the capability of identity provider to proxy the authentication requests from service provider to various identity providers to which the user has authenticated. Hence it provides a seamless access to all the trusted providers. 1.4 Scope The current implementation scope is limited to SAMLv2 based SSO. Similar feature has been implemented in IDFF based SSO. 1.5 Context This feature is defined in Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) v2.0. It is part of Authentication Request Protocol section. A set of processing rule defined in the specification MUST be implemented. Copyright 2007 Sun Microsystems, Inc. All rights reserved. 1
6 , Version Introduction 1.6 Glossary COT Circle Of Trust. A federation of service providers and identity providers that have business relationships and operational agreements and with whom users can transact business in a secure and apparently seamless environment. IDP SP Identity Provider : system entity that manages identity information on behalf of Principals and provides assertions of Principal authentication to other providers. Service Provider : typically a website providing services and/or goods. SAMLv2 Security Assertion Markup language Version 2 SSO Assertion Single Sign On : encompasses the capability to authenticate with an Identity Provider and have that authentication honored by Service Providers. SAML term representing security information (authn, authz or attribute) typically sent from a IDP to a SP - typically as a XML document. 1.7 References [1] OASIS SAMLv2 specification [2] Identity Federation Use Case: Dynamic Proxying [3] Federation Manager 7.5 Software Requirement Specification [4] SAMLv2 IDP proxying SRS 2 Copyright 2007 Sun Microsystems, Inc. All rights reserved.
7 2 Overview SAMLv2 core specification states: If an identity provider that receives an <AuthnRequest> has not yet authenticated the presenter or cannot directly authenticate the presenter, but believes that the presenter has already authenticated to another identity provider or a non-saml equivalent, it may respond to the request by issuing a new <AuthnRequest> on its own behalf to be presented to the other identity provider, or a request in whatever non-saml format the entity recognizes. The original identity provider is termed the proxying identity provider. Upon the successful return of a <Response> (or non-saml equivalent) to the proxying provider, the enclosed assertion or non-saml equivalent MAY be used to authenticate the presenter so that the proxying provider can issue an assertion of its own in response to the original <AuthnRequest>, completing the overall message exchange [1]. Goal: The identity provider proxying allows the identity providers (IDP) to proxy the authentication request from a service provider (SP) to different identity provider that has authenticated the user already. 2.1 Use Case 1: This use case is designed for IDP proxying while single sign on without introduction cookie. Pre Condition: SP1 has successfully federated to IDP1. SP2 has successfully federated to IDP2. (Refer to Figure 1). introduction cookie is not enabled for SP1. IDP1 IDP2 trust trust SP1 SP2 Processing: Figure 1 The user accesses the resource hosted by SP1. SP1 sends <AuthnRequest> to IDP1 for authentication (persistent case). No user session in IDP1 and IDP proxying feature is enabled for SP1. IDP1 shall pick up an IDP from a list of IDP specified in the configuration. For instance IDP2 is picked up. IDP1 forms a <AuthnRequest> and sends to IDP2. If the user has authenticated to IDP2, IDP2 sends <AuthnResponse> which contains <Assertion> to IDP1. If the user has not authenticated to IDP2, Copyright 2007 Sun Microsystems, Inc. All rights reserved. 3
8 , Version Overview IDP2 asks the user to authenticate. Upon successfully login, IDP2 sends <AuthnResponse> which contains <Assertion> to IDP1. IDP1 forms <AuthnResponse> and sends to SP1. SP1 checks the current policy setting against <AuthnResponse> information and grants the user access to the resource hosted by SP1. Refer to Figure 2. Success Scenario: The user gains access to SP1. Error condition: SP1 and IDP1 receive <AuthnResponse> with an error <Status> and may gets a second-level <StatusCode> of AuthnFailed or UnknownPrincipal. IDP1 trust IDP2 trust trust SP1 Figure 2 SP2 2.2 Use Case 2: This use case is designed for IDP proxying while single sign on with introduction cookie. Pre Condition: SP1 has successfully federated to IDP1. SP2 has successfully federated to IDP2. (Refer to Figure 1). introduction cookie is enabled for SP1. Processing: The user accesses the resource hosted by SP1. SP1 sends <AuthnRequest> to IDP1 for authentication (persistent case). No user session in IDP1. IDP proxying feature is enabled for SP1 and introduction cookie is enabled. IDP1 redirects to SAMLv2 IDP discovery URL. SAMLv2 IDP discovery returns the preferred IDP's provider id. For instances, it turns IDP2's provider id. IDP1 forms a <AuthnRequest> and sends to IDP2. If the user has authenticated to IDP2, IDP2 sends <AuthnResponse> which contains <Assertion> to IDP1. If the user has not authenticated to IDP2, IDP2 asks the user to authenticate. Upon successfully login, IDP2 sends <AuthnResponse> which contains <Assertion> to IDP1. IDP1 forms <Assertion> and sends to SP1. SP1 checks the current policy setting against <Assertion> information and grants the user access to the resource hosted by SP1. Refer to Figure 2. 4 Copyright 2007 Sun Microsystems, Inc. All rights reserved.
9 Overview, Version Success Scenario: The user gains access to SP1. Error condition: SP1 and IDP1 receive <AuthnResponse> with an error <Status> and may gets a second-level <StatusCode> of AuthnFailed or UnknownPrincipal. 2.3 Use Case 3: Use case 2 is similar to use case1. The only difference is IDP1 does not contain any user information. It only acts as IDP proxy. The user information only stores in IDP2. Processing: The user accesses the resource hosted by SP1. SP1 sends <AuthnRequest> to IDP1 for authentication (transient case). IDP proxying feature is enabled for SP1. IDP1 shall pick up an IDP from a list of IDP specified in the configuration or get preferred IDP provider ID by asking idp discovery url. For instance IDP2 is picked up. IDP1 forms a <AuthnRequest> and sends to IDP2. If the user has authenticated to IDP2, IDP2 sends <AuthnResponse> which contains <Assertion> to IDP1. If the user has not authenticated to IDP2, IDP2 asks the user to authenticate. Upon successfully login, IDP2 sends <AuthnResponse> which contains <Assertion> to IDP1. IDP1 forms <Assertion> and sends to SP1. SP1 checks the current policy setting against <Assertion> information and grants the user access to the resource hosted by SP1. Refer to Figure 2. Success Scenario: The user gains access to SP1. Error condition: SP1 and IDP1 receive <AuthnResponse> with an error <Status> and may gets a second-level <StatusCode> of AuthnFailed or UnknownPrincipal. 2.4 Use case 4: Processing: This use case is designed for IDP proxying while single logout. The user initiates an <LogoutRequest> from SP1 to IDP1. IDP1 would check IDPSession and find out the partner providers. The partner provider is formed due to the single sign on process with SP1. IDP1 sends <LogoutRequest> to each partner providers. Partner provider terminates the user session and sends <LogoutResponse> to IDP1. Upon received all <LogoutResponse> from partner providers. IDP1 forms <LogoutResponse> and sends to SP1. SP1 terminates its user session. Success Scenario: The user successfully log out from SP1, IDP1 and IDP2. Copyright 2007 Sun Microsystems, Inc. All rights reserved. 5
10 , Version Overview Error condition: SP1 and IDP1 receive <LogoutResponse> with top-level <StatusCode> indicating error. 6 Copyright 2007 Sun Microsystems, Inc. All rights reserved.
11 Design Considerations, Version 3 Design Considerations 3.1 Assumptions and Dependencies SP and IDP MUST have capability to set up the trust base. SP and IDP MUST achieve single sign on via SAMLv2 protocol (persistent and transient). SP and IDP MUST achieves single logout via SAMLv2 protocol. The extended config metadata should define the attributes needed for this feature. There should be APIs to access those attributes defined in the extended config metadata. 3.2 Goals and Guidelines The goal is to provide capacity of IDP proxying capability to Federation Manager 7.5. The following deliverable should be expected: -- saml2.jar should include this feature. -- need to modify samlv2 extended config metadata template to include the attributes needed by this feature. --SAML v2 console should be able to edit the attributes needed by this feature. --Javadoc for the SPI should be published. 3.3 Development Method Development of this feature set will follow OpenSSO mandated development process and guidelines. Copyright 2007 Sun Microsystems, Inc. All rights reserved. 7
12 , Version Architectural Strategies 4 Architectural Strategies This feature is intended to integrate in the existing SAMLv2 frame work. The user should follow the normal single sign on and single logout process. The following points we need address during the implementation: (a) We should be able to configure SAMLv2 IDP proxying feature. (b) We should provide SPI for picking up the preferred IDP. (c) The implementation of this feature should be integrated in the existing SAMLv2 single sign on and single logout flow. (d) The implementation shall be able to turn off IDP proxying per each connection request. For instance, if the configuration of a SP has IDP proxying enabled, user should be able to pass a parameter such as idpproxy=false to SSO init URL and IDP proxying would not happen for this connection. 8 Copyright 2007 Sun Microsystems, Inc. All rights reserved.
13 System Architecture, Version 5 System Architecture The following diagram shows the sequence of message exchange and processing for SAMLv2 IDP proxying. Each sequence diagram is related to the use case listed in section SAMLv2 IDP proxing in single sign on case without introduction cookie (persistent) Copyright 2007 Sun Microsystems, Inc. All rights reserved. 9
14 , Version System Architecture 1. The user accesses the resource hosted by SP1. 2. SP1 creates <AuthnRequest> 3. SP1 sends <AuthnRequest> to IDP1 for authentication (persistent case). No user session in IDP1 and IDP proxying feature is enabled for SP1. 4. IDP1 processes the <AuthnRequest> such as signature validation etc. 5. IDP1 picks up an IDP from a list of IDP specified in the configuration. For instance IDP2 is picked up. 6. IDP1 forms an <AuthnRequest> 7. IDP1 sends the <AuthnRequest> to IDP2. 8. If the user has authenticated to IDP2 previously. IDP2 creates <AuthnResponse> which contains <Assertion>. If the user has not authenticated to IDP2, IDP2 asks the user to authenticate. Upon successfully login. IDP2 creates <AuthnResponse>. 9. IDP2 sends <AuthnResponse> to IDP1 10. IDP1 forms a new <AuthnResponse> 11. IDP1 sends the <AuthnResponse> to SP SP1 checks the current policy setting against <AuthnResponse> information and grants the user access to the resource hosted by SP SAMLv2 IDP proxying in single sign on case with introduction cookie (persistent) 10 Copyright 2007 Sun Microsystems, Inc. All rights reserved.
15 System Architecture, Version Copyright 2007 Sun Microsystems, Inc. All rights reserved. 11
16 , Version System Architecture 1. The user accesses the resource hosted by SP1. 2. SP1 creates <AuthnRequest> 3. SP1 sends <AuthnRequest> to IDP1 for authentication (persistent case). No user session in IDP1. IDP proxying feature is enabled for SP1 and introduction cookie is enabled. 4. IDP1 processes the <AuthnRequest> including signature validation. 5. IDP1 redirects to SAMLv2 IDP discovery URL. 6. SAMLv2 IDP discovery returns the preferred IDP's provider id. For instances, it turns IDP2's provider id. 7. IDP1 forms an <AuthnRequest> 12 Copyright 2007 Sun Microsystems, Inc. All rights reserved.
17 System Architecture, Version 8. IDP1 sends <AuthnRequest> to IDP2. 9. If the user has authenticated to IDP2 previously. IDP2 creates <AuthnReponse> which contains <Assertion>. If the user has not authenticated to IDP2, IDP2 asks the user to authenticate. Upon successfully login. IDP2 creates <AuthnResponse>. 10. IDP2 sends <AuthnResponse> to IDP IDP1 forms a new <AuthnResponse> 12. IDP1 sends <AuthnResponse> to SP SP1 checks the current policy setting against <AuthnResponse> information and grants the user access to the resource hosted by SP SAMLv2 IDP proxying in single sign on (transient) The sequence diagram is the same as 5.1 and 5.2. The only difference is IDP1 does not contain any user information. It only acts as IDP proxy. The user information only stores in IDP2. Copyright 2007 Sun Microsystems, Inc. All rights reserved. 13
18 , Version System Architecture 5.4 SAMLv2 IDP proxing in single logout case 1. The user initiates logout to SP1 2. SP1 creates <logoutrequest> 3. SP1 sends <LogoutRequest> to IDP1. 4. IDP1 would check IDPSession and find out the partner providers. The partner provider is formed due to the single sign on process with SP1. 5. IDP1 sends <LogoutRequest> to each partner providers. For instance, IDP2 is one of the partner 14 Copyright 2007 Sun Microsystems, Inc. All rights reserved.
19 System Architecture, Version provider. 6. Partner provider IDP2 terminates the user session 7. IDP2 sends <LogoutResponse> to IDP1. 8. Upon received all <LogoutResponse> from partner providers. IDP1 terminates the user session 9. IDP1 forms <LogoutResponse> and sends to SP SP1 terminates its user session. 11. Redirect to Login page Copyright 2007 Sun Microsystems, Inc. All rights reserved. 15
20 , Version Detailed System Architecture 6 Detailed System Architecture 6.1 SAMLv2 metadata changes The following attributes should be included in SAMLv2 extended config MetaData: <Attribute name=enableidpproxy> <Value>false</Value> </Attribute> <Attribute name=idpproxylist> <Value></Value> </Attribute> <Attribute name=idpproxycount> <Value>-1</Value> </Attribute> <Attribute name=useintroductionforidpproxy> <Value>false</Value> </Attribute> This is specified for a service provider. EnabledIDProxy: is the key to turn SAMLv2 IDP proxy feature on or off. IdpProxyList: specifies the identity providers trusted by the requester (SP) to authenticate the presenter (user). IdpProxyCount: specifies the number of proxying indirections permissible between the identity provider that receives this <AuthnRequest> and the identity provider who ultimately authenticates the principals. A count of zero means no proxying. UseIntroductionForIDPProxy: if the key is on, samlv2 introduction cookie would be used to pick up a preferred IDP verse going through the idp proxy list. 16 Copyright 2007 Sun Microsystems, Inc. All rights reserved.
21 Detailed System Architecture, Version 6.2 SPI com.sun.identity.saml2.profile Interface SAML2IDPProxy public interface SAML2IDPProxy This interface SAML2IDPProxy is used to find a preferred Identity Authenticating provider to proxy the authentication request. Method Summary String getpreferredidp(authnrequest authnrequest, String hostproviderid, HttpServletRequest request, HttpServletResponse response) Returns the preferred IDP. Method Detail getpreferredidp String getpreferredidp(authnrequest authnrequest, String hostproviderid, String realm, HttpServletRequest request, HttpServletResponse response) throws SAML2Exception Returns the preferred IDP. Parameters: authnrequest - original authnrequest hostproviderid - ProxyIDP providerid. realm-realm request - HttpServletRequest response - HttpServletResponse Returns: providerid of the authenticating provider to be proxied. null to disable the proxying and continue for the local authenticating provider. Copyright 2007 Sun Microsystems, Inc. All rights reserved. 17
22 , Version Detailed System Architecture Throws: SAML2Exception - if error occurs. 6.3 IDP proxying in SSO In current SAMLv2 implementation, SPSSOFederate class is the class which performs the required processing logic for sending Authentication Request from SP to IDP. We should change AuthnRequest creation to include idp proxying elements/attributes based on the extended meta configuration. The AuthnRequest arrives on the IDP site: IDPSSOFederate class. It should be able to act on SP role and recreate the AuthnRequest. This class should call SAML2IDPProxy SPI to find out the authentication IDP's provider id and send it to the authentication IDP. Once the authentication IDP sends back the AuthnReponse to IDPSSOFederate (SP role). It should be able to switch it role to IDP and forward the AuthnResponse to the real requester (SP). 6.4 IDP Proxying in SLO In current SAMLv2 implementation, SPSingleLogout class is the class which initiates the LogoutRequest from SP to IDP. The LogoutRequest arrives on the IDP site: IDPSingleLogout class. It should find the partner provider based on federation session. Partner provider are those providers who have previously federated via this IDP proxy. Now IDPSingleLogout class acts on SP role, and creates new LogoutRequest to each partner provider. After collecting all the LogoutResponse from each IDP. IDPSingleLogout acts on IDP role again and send back LogoutResponse to original SP. 18 Copyright 2007 Sun Microsystems, Inc. All rights reserved.
23 Appendices, Version 7 Appendices TBD Copyright 2007 Sun Microsystems, Inc. All rights reserved. 19
How to create a SP and a IDP which are visible across tenant space via Config files in IS
How to create a SP and a IDP which are visible across tenant space via Config files in IS This Documentation is explaining the way to create a SP and IDP which works are visible to all the tenant domains.
Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0
1 2 3 4 5 6 7 8 9 10 11 Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0 Version 3.2.2 Editor: Kyle Meadors, Drummond Group Inc. Abstract: This document describes the test steps to
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
E-Authentication Federation Adopted Schemes
E-Authentication Federation Adopted Schemes Version 1.0.0 Final May 4, 2007 Document History Status Release Date Comment Audience Template 0.0.0 1/18/06 Outline PMO Draft 0.0.1 1/19/07 Initial draft Internal
OIO Web SSO Profile V2.0.5
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Software Requirement Specification Web Services Security
Software Requirement Specification Web Services Security Federation Manager 7.5 Version 0.3 (Draft) Please send comments to: [email protected] This document is subject to the following license:
SAML Federated Identity at OASIS
International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for
OpenSSO: Cross Domain Single Sign On
OpenSSO: Cross Domain Single Sign On Version 0.1 History of versions Version Date Author(s) Changes 0.1 11/30/2006 Dennis Seah Contents Initial Draft. 1 Introduction 1 2 Single Domain Single Sign-On 2
Department Service Integration with e-pramaan
Department Service Integration with e-pramaan How to integrate a.net Application.NET specific integration details are provided in this document. Read e-pramaan Departments Integration Document before proceeding.
Single Sign On (SSO) Implementation Manual. For Connect 5 & MyConnect Sites
Single Sign On (SSO) Implementation Manual For Connect 5 & MyConnect Sites Version 6 Release 5.7 September 2013 1 What is Blackboard Connect Single Sign On?... 3 How it Works... 3 Drawbacks to Using Single
Alfresco Share SAML. 2. Assert user is an IDP user (solution for the Security concern mentioned in v1.0)
Alfresco Share SAML Version 1.1 Revisions 1.1 1.1.1 IDP & Alfresco user logs in using saml login page (Added info about saving the username and IDP login date as a solution for the Security concern mentioned
Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow
Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to ServiceNow Table of Contents
An Oracle White Paper August 2010. Oracle OpenSSO Fedlet
An Oracle White Paper August 2010 Oracle OpenSSO Fedlet Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta
Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta Configuration Guide Product Release Document Revisions Published Date 1.0 1.0 May 2016 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San
Single Log-Out. Andreas Åkre Solberg Malaga, June 2009
Single Log-Out Andreas Åkre Solberg Malaga, June 2009 Sessions On Web HTTP originally stateless Using Cookies to keep state Cookies in RFC2965 Set a session ID first time user visits, sent back to site
Liberty Alliance. CSRF Review. .NET Passport Review. Kerberos Review. CPSC 328 Spring 2009
CSRF Review Liberty Alliance CPSC 328 Spring 2009 Quite similar, yet different from XSS Malicious script or link involved Exploits trust XSS - exploit user s trust in the site CSRF - exploit site s trust
IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
Enabling SAML for Dynamic Identity Federation Management
Enabling SAML for Dynamic Identity Federation Management Patricia Arias, Florina Almenárez, Andrés Marín and Daniel Díaz-Sánchez University Carlos III of Madrid http://pervasive.gast.it.uc3m.es/ WMNC 2009
Identity opens the participation age. Dr. Rainer Eschrich. Program Manager Identity Management Sun Microsystems GmbH
Identity opens the participation age Open Web Single Sign- On und föderierte SSO Dr. Rainer Eschrich Program Manager Identity Management Sun Microsystems GmbH Agenda The Identity is the Network Driving
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
DocuSign Information Guide. Single Sign On Functionality. Overview. Table of Contents
DocuSign Information Guide Single Sign On Functionality Overview The DocuSign Single Sign On functionality allows your system administrators to maintain user information in one location and your users
TIB 2.0 Administration Functions Overview
TIB 2.0 Administration Functions Overview Table of Contents 1. INTRODUCTION 4 1.1. Purpose/Background 4 1.2. Definitions, Acronyms and Abbreviations 4 2. OVERVIEW 5 2.1. Overall Process Map 5 3. ADMINISTRATOR
Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack
Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack About Me KVM, API, DB, Upgrades, SystemVM, Build system, various subsystems Contributor and Committer
SAML 2.0 Interoperability Testing Procedures
1 2 3 4 5 6 7 8 9 10 11 Version 2.0 7 July 2006 Editors: Eric Tiffany, Contributors: Greg Whitehead, Hewlett-Packard Sampo Kellomäki, Symlabs Nick Ragouzis, Enosis Abstract: 12 13 14 15 16 17 18 19 20
Disclaimer. SAP 2008 / SAP TechEd 08 / SIM202 / Page 2
SIM202 SAML 2.0 and Identity Federation Yonko Yonchev, NW PM Security SAP AG Dimitar Mihaylov, NW Security and Identity Management SAP Labs Bulgaria Tsvetomir Tsvetanov, Active Global Support SAP America
IAM Application Integration Guide
IAM Application Integration Guide Date 03/02/2015 Version 0.1 DOCUMENT INFORMATIE Document Title IAM Application Integration Guide File Name IAM_Application_Integration_Guide_v0.1_SBO.docx Subject Document
T his feature is add-on service available to Enterprise accounts.
SAML Single Sign-On T his feature is add-on service available to Enterprise accounts. Are you already using an Identity Provider (IdP) to manage logins and access to the various systems your users need
Department Service Integration with e-pramaan
Department Service Integration with e-pramaan How to integrate a PHP Application PHP specific integration details are provided in this document. Read e-pramaan Departments Integration Document before proceeding.
White Paper March 1, 2005. Integrating AR System with Single Sign-On (SSO) authentication systems
White Paper March 1, 2005 Integrating AR System with Single Sign-On (SSO) authentication systems Copyright 2005 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service
Certification Final Report SAML 2.0 Interoperability Test First Quarter 2011 (1Q11) March 31, 2011
Certification Final Report SAML 2.0 Interoperability Test First Quarter 2011 (1Q11) March 31, 2011 Prepared & Administered by: DRUMMOND GROUP INC. www.drummondgroup.com Copyright Drummond Group Inc. 2011
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
2015-11-30. Web Based Single Sign-On and Access Control
0--0 Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking
This section includes troubleshooting topics about single sign-on (SSO) issues.
This section includes troubleshooting topics about single sign-on (SSO) issues. SSO Fails After Completing Disaster Recovery Operation, page 1 SSO Protocol Error, page 1 SSO Redirection Has Failed, page
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx VMware Identity Manager SEPTEMBER 2015 V 2 Configuring Single Sign-On from VMware Identity Manager to WebEx Table of Contents
Federal Identity, Credential, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile
Federal Identity, Credential, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile Version 1.0 September 27, 2010 Document History This is the first
PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
Securing Splunk with Single Sign On & SAML
Copyright 2015 Splunk Inc. Securing Splunk with Single Sign On & SAML Nachiket Mistry Sr. So=ware Engineer, Splunk Rama Gopalan Sr. So=ware Engineer, Splunk Disclaimer During the course of this presentajon,
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Federal Identity, Credentialing, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile
Federal Identity, Credentialing, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile Version 1.0.2 December 16, 2011 Document History Status Release
DocuSign Single Sign On Implementation Guide Published: March 17, 2016
DocuSign Single Sign On Implementation Guide Published: March 17, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents
Revised edition. OIO Web SSO Profile V2.0.9 (also known as OIOSAML 2.0.9) Includes errata and minor clarifications
OIO Web SSO Profile V2.0.9 (also known as OIOSAML 2.0.9) Revised edition Includes errata and minor clarifications Danish Agency for Digitisation September 2012 Contents > 1 Introduction 8 1.1 Referenced
PHP Integration Kit. Version 2.5.1. User Guide
PHP Integration Kit Version 2.5.1 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate PHP Integration Kit User Guide Version 2.5.1 December, 2012 Ping Identity Corporation 1001
Software Design Document Logging/Audit
Software Design Document Logging/Audit FM 7.5 Version 0.2 (Draft) Please send comments to: [email protected] Contents 1 Introduction......1 1.1 Document Status...1 1.2 Revision History...1 1.3
Securing Web Services With SAML
Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion
Revised edition. OIO Web SSO Profile V2.0.8 (also known as OIOSAML 2.0.8) Includes errata and minor clarifications
OIO Web SSO Profile V2.0.8 (also known as OIOSAML 2.0.8) Revised edition Includes errata and minor clarifications Danish Agency for Digitisation December 2011 Contents > 1 Introduction 8 1.1 Referenced
IBM WebSphere Application Server
IBM WebSphere Application Server SAML 2.0 web single-sign-on 2012 IBM Corporation This presentation describes support for SAML 2.0 web browser Single Sign On profile included in IBM WebSphere Application
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
DEPLOYMENT GUIDE. SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity
DEPLOYMENT GUIDE SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity Table of Contents SAML Overview...3 Integration Topology...3 Deployment Requirements...4 Configuration Steps...4 Step
National Identity Exchange Federation. Web Browser User-to-System Profile. Version 1.0
National Identity Exchange Federation Web Browser User-to-System Profile Version 1.0 August 18, 2014 Table of Contents TABLE OF CONTENTS 1 1. TARGET AUDIENCE AND PURPOSE 2 2. TERMINOLOGY 2 3. REFERENCES
Extending DigiD to the Private Sector (DigiD-2)
TECHNISCHE UNIVERSITEIT EINDHOVEN Department of Mathematics and Computer Science MASTER S THESIS Extending DigiD to the Private Sector (DigiD-2) By Giorgi Moniava Supervisors: Eric Verheul (RU, PwC) L.A.M.
HP Software as a Service
HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty
Introducing Shibboleth
workshop Introducing Shibboleth MPG-AAI Workshop Clarin Centers Prague 2009 2009-11-06 MPG-AAI MPG-AAI a MPG-wide Authentication & Authorization Infrastructure for access control to web-based resources
SAML Authentication within Secret Server
SAML Authentication within Secret Server Secret Server allows the use of SAML Identity Provider (IdP) authentication instead of the normal authentication process for single sign-on (SSO). To do this, Secret
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes
Spring Security SAML module
Spring Security SAML module Author: Vladimir Schäfer E-mail: [email protected] Copyright 2009 The package contains the implementation of SAML v2.0 support for Spring Security framework. Following
SAML Profile for Privacy-enhanced Federated Identity Management
SAML Profile for Privacy-enhanced Federated Identity Management Rainer Hörbe, Identinetics GmbH Abstract This profile for the SAML WebSSO use case specifies an enhancement that allows users to limit their
Software Design Document Securing Web Service with Proxy
Software Design Document Securing Web Service with Proxy Federated Access Manager 8.0 Version 0.3 Please send comments to: [email protected] This document is subject to the following license: COMMON
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO Scope... 2 Prerequisites Tasks... 2 Procedure... 2 Step 1: Configure EPM s WebLogic domain for SP Federation Services... 2 Step 2:
OIOSAML Rich Client to Browser Scenario Version 1.0
> OIOSAML Rich Client to Browser Scenario Version 1.0 Danish Agency for Digitization December 2011 Contents > 1 Introduction 4 1.1 Purpose 1.2 Background 4 4 2 Goals and Assumptions 5 3 Scenario Details
Session Service Architecture
Session Service Architecture Open Web Single Sign-On Version 1.0 Please send comments to: [email protected] Author Alan Chu ([email protected]) Session Service Architecture, Version 1.0 This document is subject
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
Server based signature service. Overview
1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...
It is I, SAML. Ana Mandić Development Lead @ Five Minutes Ltd
It is I, SAML Ana Mandić Development Lead @ Five Minutes Ltd About Five Minutes We design and develop top notch mobile apps for leading mobile platforms 50 full-time employees Offices in Zagreb, Osijek
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
DualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.
DualShield Integration Guide Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,
Automated Testing of SAML 2.0 Service Providers. Andreas Åkre Solberg UNINETT [email protected] http://rnd.feide.no
Automated Testing of SAML 2.0 Service Providers Andreas Åkre Solberg UNINETT [email protected] http://rnd.feide.no Background 0% of SAML 2.0 implementations do SAML 100% correct. SAML includes alot of
Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications
Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to AirWatch Applications
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Specification
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Specification Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
Centrify Mobile Authentication Services
Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject
MLSListings Single Sign On Implementation Guide. Compatible with MLSListings Applications
MLSListings Single Sign On Implementation Guide Compatible with MLSListings Applications February 2010 2010 MLSListings Inc. All rights reserved. MLSListings Inc. reserves the right to change details in
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]
Add Microsoft Azure as the Federated Authenticator in WSO2 Identity Server
Add Microsoft Azure as the Federated Authenticator in WSO2 Identity Server This blog will explain how to use Microsoft Azure as a Federated Authenticator for WSO2 Identity Server 5.0.0. In this example
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
OpenSSO Monitoring Euro User Groups Winter 2010
OpenSSO Monitoring Euro User Groups Winter 2010 Victor Ake Identity Architect ForgeRock.com Agenda What is new in OpenSSO Express 9 Monitoring OpenSSO Express 9 What is new in OpenSSO Expresss 9 Web container
Research and Implementation of Single Sign-On Mechanism for ASP Pattern *
Research and Implementation of Single Sign-On Mechanism for ASP Pattern * Bo Li, Sheng Ge, Tian-yu Wo, and Dian-fu Ma Computer Institute, BeiHang University, PO Box 9-32 Beijing 100083 Abstract Software
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Summer 15 @salesforcedocs Last updated: July 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
ACTIVID APPLIANCE AND MICROSOFT AD FS
ACTIVID APPLIANCE AND MICROSOFT AD FS SAML 2.0 Channel Integration Handbook ActivID Appliance 7.2 July 2013 Released Document Version 1.0 hidglobal.com Table of Contents 1.0 Introduction...3 1.1 Scope
Centrify Mobile Authentication Services for Samsung KNOX
Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under
SAML v2.0 for.net Developer Guide
SAML v2.0 for.net Developer Guide Copyright ComponentSpace Pty Ltd 2004-2015. All rights reserved. www.componentspace.com Contents 1 Introduction... 1 1.1 Features... 1 1.2 Benefits... 1 1.3 Prerequisites...
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
USING ESPRESSO [ESTABLISHING SUGGESTED PRACTICES REGARDING SINGLE SIGN ON] TO STREAMLINE ACCESS
USING ESPRESSO [ESTABLISHING SUGGESTED PRACTICES REGARDING SINGLE SIGN ON] TO STREAMLINE ACCESS Andy Ingham (UNC-Chapel Hill) NASIG Annual Conference, June 4, 2011 What I hope to cover Problem statement
GFIPM Web Browser User-to-System Profile Version 1.2
About the Document Justice organizations are looking for ways to provide secured access to multiple agency information systems with a single logon. The Global Federated Identity and Privilege Management
Open Source Identity Integration with OpenSSO
Open Source Identity Integration with OpenSSO April 19, 2008 Pat Patterson Federation Architect [email protected] blogs.sun.com/superpat Agenda Web Access Management > The Problem > The Solution >
IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0
International Virtual Observatory Alliance IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 IVOA Proposed Recommendation 20151029 Working group http://www.ivoa.net/twiki/bin/view/ivoa/ivoagridandwebservices
