Software Design Document SAMLv2 IDP Proxying

Size: px
Start display at page:

Download "Software Design Document SAMLv2 IDP Proxying"

Transcription

1 Software Design Document SAMLv2 IDP Proxying Federation Manager 7.5 Version 0.2 Please send comments to: This document is subject to the following license: COMMON DEVELOPMENT AND DISTRIBUTION LICENSE (CDDL) Version 1.0

2

3 Contents 1 Introduction Document Status Revision History Summary Scope Context Glossary References Overview Use Case 1: Use Case 2: Use Case 3: Use case 4: Design Considerations Assumptions and Dependencies Goals and Guidelines Development Method Architectural Strategies System Architecture SAMLv2 IDP proxing in single sign on case without introduction cookie (persistent) SAMLv2 IDP proxying in single sign on case with introduction cookie (persistent) SAMLv2 IDP proxying in single sign on (transient) SAMLv2 IDP proxing in single logout case Detailed System Architecture SAMLv2 metadata changes SPI com.sun.identity.saml2.profile Interface SAML2IDPProxy...17 getpreferredidp IDP proxying in SSO IDP Proxying in SLO Appendices Copyright 2007 Sun Microsystems, Inc. All rights reserved. iii

4 , Version iv Copyright 2007 Sun Microsystems, Inc. All rights reserved.

5 1 Introduction 1.1 Document Status Project Name FM 7.5 Document Title SAMLv2 IDP Proxying Date of Issue April 5, 2007 Current Version 0.2 Author Wei Sun Issuing Organization Sun Microsystems, Inc. Feedback 1.2 Revision History Date Version Author Comments March 28, Wei Sun Initial draft April 5, Wei Sun Incorporated comments from Burt and Qingwen 1.3 Summary The functionality being developed is to enable SAMLv2 IDP proxying feature. It gives the capability of identity provider to proxy the authentication requests from service provider to various identity providers to which the user has authenticated. Hence it provides a seamless access to all the trusted providers. 1.4 Scope The current implementation scope is limited to SAMLv2 based SSO. Similar feature has been implemented in IDFF based SSO. 1.5 Context This feature is defined in Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) v2.0. It is part of Authentication Request Protocol section. A set of processing rule defined in the specification MUST be implemented. Copyright 2007 Sun Microsystems, Inc. All rights reserved. 1

6 , Version Introduction 1.6 Glossary COT Circle Of Trust. A federation of service providers and identity providers that have business relationships and operational agreements and with whom users can transact business in a secure and apparently seamless environment. IDP SP Identity Provider : system entity that manages identity information on behalf of Principals and provides assertions of Principal authentication to other providers. Service Provider : typically a website providing services and/or goods. SAMLv2 Security Assertion Markup language Version 2 SSO Assertion Single Sign On : encompasses the capability to authenticate with an Identity Provider and have that authentication honored by Service Providers. SAML term representing security information (authn, authz or attribute) typically sent from a IDP to a SP - typically as a XML document. 1.7 References [1] OASIS SAMLv2 specification [2] Identity Federation Use Case: Dynamic Proxying [3] Federation Manager 7.5 Software Requirement Specification [4] SAMLv2 IDP proxying SRS 2 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

7 2 Overview SAMLv2 core specification states: If an identity provider that receives an <AuthnRequest> has not yet authenticated the presenter or cannot directly authenticate the presenter, but believes that the presenter has already authenticated to another identity provider or a non-saml equivalent, it may respond to the request by issuing a new <AuthnRequest> on its own behalf to be presented to the other identity provider, or a request in whatever non-saml format the entity recognizes. The original identity provider is termed the proxying identity provider. Upon the successful return of a <Response> (or non-saml equivalent) to the proxying provider, the enclosed assertion or non-saml equivalent MAY be used to authenticate the presenter so that the proxying provider can issue an assertion of its own in response to the original <AuthnRequest>, completing the overall message exchange [1]. Goal: The identity provider proxying allows the identity providers (IDP) to proxy the authentication request from a service provider (SP) to different identity provider that has authenticated the user already. 2.1 Use Case 1: This use case is designed for IDP proxying while single sign on without introduction cookie. Pre Condition: SP1 has successfully federated to IDP1. SP2 has successfully federated to IDP2. (Refer to Figure 1). introduction cookie is not enabled for SP1. IDP1 IDP2 trust trust SP1 SP2 Processing: Figure 1 The user accesses the resource hosted by SP1. SP1 sends <AuthnRequest> to IDP1 for authentication (persistent case). No user session in IDP1 and IDP proxying feature is enabled for SP1. IDP1 shall pick up an IDP from a list of IDP specified in the configuration. For instance IDP2 is picked up. IDP1 forms a <AuthnRequest> and sends to IDP2. If the user has authenticated to IDP2, IDP2 sends <AuthnResponse> which contains <Assertion> to IDP1. If the user has not authenticated to IDP2, Copyright 2007 Sun Microsystems, Inc. All rights reserved. 3

8 , Version Overview IDP2 asks the user to authenticate. Upon successfully login, IDP2 sends <AuthnResponse> which contains <Assertion> to IDP1. IDP1 forms <AuthnResponse> and sends to SP1. SP1 checks the current policy setting against <AuthnResponse> information and grants the user access to the resource hosted by SP1. Refer to Figure 2. Success Scenario: The user gains access to SP1. Error condition: SP1 and IDP1 receive <AuthnResponse> with an error <Status> and may gets a second-level <StatusCode> of AuthnFailed or UnknownPrincipal. IDP1 trust IDP2 trust trust SP1 Figure 2 SP2 2.2 Use Case 2: This use case is designed for IDP proxying while single sign on with introduction cookie. Pre Condition: SP1 has successfully federated to IDP1. SP2 has successfully federated to IDP2. (Refer to Figure 1). introduction cookie is enabled for SP1. Processing: The user accesses the resource hosted by SP1. SP1 sends <AuthnRequest> to IDP1 for authentication (persistent case). No user session in IDP1. IDP proxying feature is enabled for SP1 and introduction cookie is enabled. IDP1 redirects to SAMLv2 IDP discovery URL. SAMLv2 IDP discovery returns the preferred IDP's provider id. For instances, it turns IDP2's provider id. IDP1 forms a <AuthnRequest> and sends to IDP2. If the user has authenticated to IDP2, IDP2 sends <AuthnResponse> which contains <Assertion> to IDP1. If the user has not authenticated to IDP2, IDP2 asks the user to authenticate. Upon successfully login, IDP2 sends <AuthnResponse> which contains <Assertion> to IDP1. IDP1 forms <Assertion> and sends to SP1. SP1 checks the current policy setting against <Assertion> information and grants the user access to the resource hosted by SP1. Refer to Figure 2. 4 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

9 Overview, Version Success Scenario: The user gains access to SP1. Error condition: SP1 and IDP1 receive <AuthnResponse> with an error <Status> and may gets a second-level <StatusCode> of AuthnFailed or UnknownPrincipal. 2.3 Use Case 3: Use case 2 is similar to use case1. The only difference is IDP1 does not contain any user information. It only acts as IDP proxy. The user information only stores in IDP2. Processing: The user accesses the resource hosted by SP1. SP1 sends <AuthnRequest> to IDP1 for authentication (transient case). IDP proxying feature is enabled for SP1. IDP1 shall pick up an IDP from a list of IDP specified in the configuration or get preferred IDP provider ID by asking idp discovery url. For instance IDP2 is picked up. IDP1 forms a <AuthnRequest> and sends to IDP2. If the user has authenticated to IDP2, IDP2 sends <AuthnResponse> which contains <Assertion> to IDP1. If the user has not authenticated to IDP2, IDP2 asks the user to authenticate. Upon successfully login, IDP2 sends <AuthnResponse> which contains <Assertion> to IDP1. IDP1 forms <Assertion> and sends to SP1. SP1 checks the current policy setting against <Assertion> information and grants the user access to the resource hosted by SP1. Refer to Figure 2. Success Scenario: The user gains access to SP1. Error condition: SP1 and IDP1 receive <AuthnResponse> with an error <Status> and may gets a second-level <StatusCode> of AuthnFailed or UnknownPrincipal. 2.4 Use case 4: Processing: This use case is designed for IDP proxying while single logout. The user initiates an <LogoutRequest> from SP1 to IDP1. IDP1 would check IDPSession and find out the partner providers. The partner provider is formed due to the single sign on process with SP1. IDP1 sends <LogoutRequest> to each partner providers. Partner provider terminates the user session and sends <LogoutResponse> to IDP1. Upon received all <LogoutResponse> from partner providers. IDP1 forms <LogoutResponse> and sends to SP1. SP1 terminates its user session. Success Scenario: The user successfully log out from SP1, IDP1 and IDP2. Copyright 2007 Sun Microsystems, Inc. All rights reserved. 5

10 , Version Overview Error condition: SP1 and IDP1 receive <LogoutResponse> with top-level <StatusCode> indicating error. 6 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

11 Design Considerations, Version 3 Design Considerations 3.1 Assumptions and Dependencies SP and IDP MUST have capability to set up the trust base. SP and IDP MUST achieve single sign on via SAMLv2 protocol (persistent and transient). SP and IDP MUST achieves single logout via SAMLv2 protocol. The extended config metadata should define the attributes needed for this feature. There should be APIs to access those attributes defined in the extended config metadata. 3.2 Goals and Guidelines The goal is to provide capacity of IDP proxying capability to Federation Manager 7.5. The following deliverable should be expected: -- saml2.jar should include this feature. -- need to modify samlv2 extended config metadata template to include the attributes needed by this feature. --SAML v2 console should be able to edit the attributes needed by this feature. --Javadoc for the SPI should be published. 3.3 Development Method Development of this feature set will follow OpenSSO mandated development process and guidelines. Copyright 2007 Sun Microsystems, Inc. All rights reserved. 7

12 , Version Architectural Strategies 4 Architectural Strategies This feature is intended to integrate in the existing SAMLv2 frame work. The user should follow the normal single sign on and single logout process. The following points we need address during the implementation: (a) We should be able to configure SAMLv2 IDP proxying feature. (b) We should provide SPI for picking up the preferred IDP. (c) The implementation of this feature should be integrated in the existing SAMLv2 single sign on and single logout flow. (d) The implementation shall be able to turn off IDP proxying per each connection request. For instance, if the configuration of a SP has IDP proxying enabled, user should be able to pass a parameter such as idpproxy=false to SSO init URL and IDP proxying would not happen for this connection. 8 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

13 System Architecture, Version 5 System Architecture The following diagram shows the sequence of message exchange and processing for SAMLv2 IDP proxying. Each sequence diagram is related to the use case listed in section SAMLv2 IDP proxing in single sign on case without introduction cookie (persistent) Copyright 2007 Sun Microsystems, Inc. All rights reserved. 9

14 , Version System Architecture 1. The user accesses the resource hosted by SP1. 2. SP1 creates <AuthnRequest> 3. SP1 sends <AuthnRequest> to IDP1 for authentication (persistent case). No user session in IDP1 and IDP proxying feature is enabled for SP1. 4. IDP1 processes the <AuthnRequest> such as signature validation etc. 5. IDP1 picks up an IDP from a list of IDP specified in the configuration. For instance IDP2 is picked up. 6. IDP1 forms an <AuthnRequest> 7. IDP1 sends the <AuthnRequest> to IDP2. 8. If the user has authenticated to IDP2 previously. IDP2 creates <AuthnResponse> which contains <Assertion>. If the user has not authenticated to IDP2, IDP2 asks the user to authenticate. Upon successfully login. IDP2 creates <AuthnResponse>. 9. IDP2 sends <AuthnResponse> to IDP1 10. IDP1 forms a new <AuthnResponse> 11. IDP1 sends the <AuthnResponse> to SP SP1 checks the current policy setting against <AuthnResponse> information and grants the user access to the resource hosted by SP SAMLv2 IDP proxying in single sign on case with introduction cookie (persistent) 10 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

15 System Architecture, Version Copyright 2007 Sun Microsystems, Inc. All rights reserved. 11

16 , Version System Architecture 1. The user accesses the resource hosted by SP1. 2. SP1 creates <AuthnRequest> 3. SP1 sends <AuthnRequest> to IDP1 for authentication (persistent case). No user session in IDP1. IDP proxying feature is enabled for SP1 and introduction cookie is enabled. 4. IDP1 processes the <AuthnRequest> including signature validation. 5. IDP1 redirects to SAMLv2 IDP discovery URL. 6. SAMLv2 IDP discovery returns the preferred IDP's provider id. For instances, it turns IDP2's provider id. 7. IDP1 forms an <AuthnRequest> 12 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

17 System Architecture, Version 8. IDP1 sends <AuthnRequest> to IDP2. 9. If the user has authenticated to IDP2 previously. IDP2 creates <AuthnReponse> which contains <Assertion>. If the user has not authenticated to IDP2, IDP2 asks the user to authenticate. Upon successfully login. IDP2 creates <AuthnResponse>. 10. IDP2 sends <AuthnResponse> to IDP IDP1 forms a new <AuthnResponse> 12. IDP1 sends <AuthnResponse> to SP SP1 checks the current policy setting against <AuthnResponse> information and grants the user access to the resource hosted by SP SAMLv2 IDP proxying in single sign on (transient) The sequence diagram is the same as 5.1 and 5.2. The only difference is IDP1 does not contain any user information. It only acts as IDP proxy. The user information only stores in IDP2. Copyright 2007 Sun Microsystems, Inc. All rights reserved. 13

18 , Version System Architecture 5.4 SAMLv2 IDP proxing in single logout case 1. The user initiates logout to SP1 2. SP1 creates <logoutrequest> 3. SP1 sends <LogoutRequest> to IDP1. 4. IDP1 would check IDPSession and find out the partner providers. The partner provider is formed due to the single sign on process with SP1. 5. IDP1 sends <LogoutRequest> to each partner providers. For instance, IDP2 is one of the partner 14 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

19 System Architecture, Version provider. 6. Partner provider IDP2 terminates the user session 7. IDP2 sends <LogoutResponse> to IDP1. 8. Upon received all <LogoutResponse> from partner providers. IDP1 terminates the user session 9. IDP1 forms <LogoutResponse> and sends to SP SP1 terminates its user session. 11. Redirect to Login page Copyright 2007 Sun Microsystems, Inc. All rights reserved. 15

20 , Version Detailed System Architecture 6 Detailed System Architecture 6.1 SAMLv2 metadata changes The following attributes should be included in SAMLv2 extended config MetaData: <Attribute name=enableidpproxy> <Value>false</Value> </Attribute> <Attribute name=idpproxylist> <Value></Value> </Attribute> <Attribute name=idpproxycount> <Value>-1</Value> </Attribute> <Attribute name=useintroductionforidpproxy> <Value>false</Value> </Attribute> This is specified for a service provider. EnabledIDProxy: is the key to turn SAMLv2 IDP proxy feature on or off. IdpProxyList: specifies the identity providers trusted by the requester (SP) to authenticate the presenter (user). IdpProxyCount: specifies the number of proxying indirections permissible between the identity provider that receives this <AuthnRequest> and the identity provider who ultimately authenticates the principals. A count of zero means no proxying. UseIntroductionForIDPProxy: if the key is on, samlv2 introduction cookie would be used to pick up a preferred IDP verse going through the idp proxy list. 16 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

21 Detailed System Architecture, Version 6.2 SPI com.sun.identity.saml2.profile Interface SAML2IDPProxy public interface SAML2IDPProxy This interface SAML2IDPProxy is used to find a preferred Identity Authenticating provider to proxy the authentication request. Method Summary String getpreferredidp(authnrequest authnrequest, String hostproviderid, HttpServletRequest request, HttpServletResponse response) Returns the preferred IDP. Method Detail getpreferredidp String getpreferredidp(authnrequest authnrequest, String hostproviderid, String realm, HttpServletRequest request, HttpServletResponse response) throws SAML2Exception Returns the preferred IDP. Parameters: authnrequest - original authnrequest hostproviderid - ProxyIDP providerid. realm-realm request - HttpServletRequest response - HttpServletResponse Returns: providerid of the authenticating provider to be proxied. null to disable the proxying and continue for the local authenticating provider. Copyright 2007 Sun Microsystems, Inc. All rights reserved. 17

22 , Version Detailed System Architecture Throws: SAML2Exception - if error occurs. 6.3 IDP proxying in SSO In current SAMLv2 implementation, SPSSOFederate class is the class which performs the required processing logic for sending Authentication Request from SP to IDP. We should change AuthnRequest creation to include idp proxying elements/attributes based on the extended meta configuration. The AuthnRequest arrives on the IDP site: IDPSSOFederate class. It should be able to act on SP role and recreate the AuthnRequest. This class should call SAML2IDPProxy SPI to find out the authentication IDP's provider id and send it to the authentication IDP. Once the authentication IDP sends back the AuthnReponse to IDPSSOFederate (SP role). It should be able to switch it role to IDP and forward the AuthnResponse to the real requester (SP). 6.4 IDP Proxying in SLO In current SAMLv2 implementation, SPSingleLogout class is the class which initiates the LogoutRequest from SP to IDP. The LogoutRequest arrives on the IDP site: IDPSingleLogout class. It should find the partner provider based on federation session. Partner provider are those providers who have previously federated via this IDP proxy. Now IDPSingleLogout class acts on SP role, and creates new LogoutRequest to each partner provider. After collecting all the LogoutResponse from each IDP. IDPSingleLogout acts on IDP role again and send back LogoutResponse to original SP. 18 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

23 Appendices, Version 7 Appendices TBD Copyright 2007 Sun Microsystems, Inc. All rights reserved. 19

How to create a SP and a IDP which are visible across tenant space via Config files in IS

How to create a SP and a IDP which are visible across tenant space via Config files in IS How to create a SP and a IDP which are visible across tenant space via Config files in IS This Documentation is explaining the way to create a SP and IDP which works are visible to all the tenant domains.

More information

Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0

Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0 1 2 3 4 5 6 7 8 9 10 11 Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0 Version 3.2.2 Editor: Kyle Meadors, Drummond Group Inc. Abstract: This document describes the test steps to

More information

Using SAML for Single Sign-On in the SOA Software Platform

Using SAML for Single Sign-On in the SOA Software Platform Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software

More information

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access

More information

E-Authentication Federation Adopted Schemes

E-Authentication Federation Adopted Schemes E-Authentication Federation Adopted Schemes Version 1.0.0 Final May 4, 2007 Document History Status Release Date Comment Audience Template 0.0.0 1/18/06 Outline PMO Draft 0.0.1 1/19/07 Initial draft Internal

More information

OIO Web SSO Profile V2.0.5

OIO Web SSO Profile V2.0.5 ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

More information

Software Requirement Specification Web Services Security

Software Requirement Specification Web Services Security Software Requirement Specification Web Services Security Federation Manager 7.5 Version 0.3 (Draft) Please send comments to: [email protected] This document is subject to the following license:

More information

SAML Federated Identity at OASIS

SAML Federated Identity at OASIS International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for

More information

OpenSSO: Cross Domain Single Sign On

OpenSSO: Cross Domain Single Sign On OpenSSO: Cross Domain Single Sign On Version 0.1 History of versions Version Date Author(s) Changes 0.1 11/30/2006 Dennis Seah Contents Initial Draft. 1 Introduction 1 2 Single Domain Single Sign-On 2

More information

Department Service Integration with e-pramaan

Department Service Integration with e-pramaan Department Service Integration with e-pramaan How to integrate a.net Application.NET specific integration details are provided in this document. Read e-pramaan Departments Integration Document before proceeding.

More information

Single Sign On (SSO) Implementation Manual. For Connect 5 & MyConnect Sites

Single Sign On (SSO) Implementation Manual. For Connect 5 & MyConnect Sites Single Sign On (SSO) Implementation Manual For Connect 5 & MyConnect Sites Version 6 Release 5.7 September 2013 1 What is Blackboard Connect Single Sign On?... 3 How it Works... 3 Drawbacks to Using Single

More information

Alfresco Share SAML. 2. Assert user is an IDP user (solution for the Security concern mentioned in v1.0)

Alfresco Share SAML. 2. Assert user is an IDP user (solution for the Security concern mentioned in v1.0) Alfresco Share SAML Version 1.1 Revisions 1.1 1.1.1 IDP & Alfresco user logs in using saml login page (Added info about saving the username and IDP login date as a solution for the Security concern mentioned

More information

Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow

Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to ServiceNow Table of Contents

More information

An Oracle White Paper August 2010. Oracle OpenSSO Fedlet

An Oracle White Paper August 2010. Oracle OpenSSO Fedlet An Oracle White Paper August 2010 Oracle OpenSSO Fedlet Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated

More information

SAML Security Option White Paper

SAML Security Option White Paper Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions

More information

Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta

Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta Configuration Guide Product Release Document Revisions Published Date 1.0 1.0 May 2016 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San

More information

Single Log-Out. Andreas Åkre Solberg Malaga, June 2009

Single Log-Out. Andreas Åkre Solberg Malaga, June 2009 Single Log-Out Andreas Åkre Solberg Malaga, June 2009 Sessions On Web HTTP originally stateless Using Cookies to keep state Cookies in RFC2965 Set a session ID first time user visits, sent back to site

More information

Liberty Alliance. CSRF Review. .NET Passport Review. Kerberos Review. CPSC 328 Spring 2009

Liberty Alliance. CSRF Review. .NET Passport Review. Kerberos Review. CPSC 328 Spring 2009 CSRF Review Liberty Alliance CPSC 328 Spring 2009 Quite similar, yet different from XSS Malicious script or link involved Exploits trust XSS - exploit user s trust in the site CSRF - exploit site s trust

More information

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more

More information

Enabling SAML for Dynamic Identity Federation Management

Enabling SAML for Dynamic Identity Federation Management Enabling SAML for Dynamic Identity Federation Management Patricia Arias, Florina Almenárez, Andrés Marín and Daniel Díaz-Sánchez University Carlos III of Madrid http://pervasive.gast.it.uc3m.es/ WMNC 2009

More information

Identity opens the participation age. Dr. Rainer Eschrich. Program Manager Identity Management Sun Microsystems GmbH

Identity opens the participation age. Dr. Rainer Eschrich. Program Manager Identity Management Sun Microsystems GmbH Identity opens the participation age Open Web Single Sign- On und föderierte SSO Dr. Rainer Eschrich Program Manager Identity Management Sun Microsystems GmbH Agenda The Identity is the Network Driving

More information

Implementation Guide SAP NetWeaver Identity Management Identity Provider

Implementation Guide SAP NetWeaver Identity Management Identity Provider Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before

More information

DocuSign Information Guide. Single Sign On Functionality. Overview. Table of Contents

DocuSign Information Guide. Single Sign On Functionality. Overview. Table of Contents DocuSign Information Guide Single Sign On Functionality Overview The DocuSign Single Sign On functionality allows your system administrators to maintain user information in one location and your users

More information

TIB 2.0 Administration Functions Overview

TIB 2.0 Administration Functions Overview TIB 2.0 Administration Functions Overview Table of Contents 1. INTRODUCTION 4 1.1. Purpose/Background 4 1.2. Definitions, Acronyms and Abbreviations 4 2. OVERVIEW 5 2.1. Overall Process Map 5 3. ADMINISTRATOR

More information

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion. Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On

More information

About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack

About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack About Me KVM, API, DB, Upgrades, SystemVM, Build system, various subsystems Contributor and Committer

More information

SAML 2.0 Interoperability Testing Procedures

SAML 2.0 Interoperability Testing Procedures 1 2 3 4 5 6 7 8 9 10 11 Version 2.0 7 July 2006 Editors: Eric Tiffany, Contributors: Greg Whitehead, Hewlett-Packard Sampo Kellomäki, Symlabs Nick Ragouzis, Enosis Abstract: 12 13 14 15 16 17 18 19 20

More information

Disclaimer. SAP 2008 / SAP TechEd 08 / SIM202 / Page 2

Disclaimer. SAP 2008 / SAP TechEd 08 / SIM202 / Page 2 SIM202 SAML 2.0 and Identity Federation Yonko Yonchev, NW PM Security SAP AG Dimitar Mihaylov, NW Security and Identity Management SAP Labs Bulgaria Tsvetomir Tsvetanov, Active Global Support SAP America

More information

IAM Application Integration Guide

IAM Application Integration Guide IAM Application Integration Guide Date 03/02/2015 Version 0.1 DOCUMENT INFORMATIE Document Title IAM Application Integration Guide File Name IAM_Application_Integration_Guide_v0.1_SBO.docx Subject Document

More information

T his feature is add-on service available to Enterprise accounts.

T his feature is add-on service available to Enterprise accounts. SAML Single Sign-On T his feature is add-on service available to Enterprise accounts. Are you already using an Identity Provider (IdP) to manage logins and access to the various systems your users need

More information

Department Service Integration with e-pramaan

Department Service Integration with e-pramaan Department Service Integration with e-pramaan How to integrate a PHP Application PHP specific integration details are provided in this document. Read e-pramaan Departments Integration Document before proceeding.

More information

White Paper March 1, 2005. Integrating AR System with Single Sign-On (SSO) authentication systems

White Paper March 1, 2005. Integrating AR System with Single Sign-On (SSO) authentication systems White Paper March 1, 2005 Integrating AR System with Single Sign-On (SSO) authentication systems Copyright 2005 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service

More information

Certification Final Report SAML 2.0 Interoperability Test First Quarter 2011 (1Q11) March 31, 2011

Certification Final Report SAML 2.0 Interoperability Test First Quarter 2011 (1Q11) March 31, 2011 Certification Final Report SAML 2.0 Interoperability Test First Quarter 2011 (1Q11) March 31, 2011 Prepared & Administered by: DRUMMOND GROUP INC. www.drummondgroup.com Copyright Drummond Group Inc. 2011

More information

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation

New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole

More information

2015-11-30. Web Based Single Sign-On and Access Control

2015-11-30. Web Based Single Sign-On and Access Control 0--0 Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking

More information

This section includes troubleshooting topics about single sign-on (SSO) issues.

This section includes troubleshooting topics about single sign-on (SSO) issues. This section includes troubleshooting topics about single sign-on (SSO) issues. SSO Fails After Completing Disaster Recovery Operation, page 1 SSO Protocol Error, page 1 SSO Redirection Has Failed, page

More information

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx Configuring Single Sign-on from the VMware Identity Manager Service to WebEx VMware Identity Manager SEPTEMBER 2015 V 2 Configuring Single Sign-On from VMware Identity Manager to WebEx Table of Contents

More information

Federal Identity, Credential, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile

Federal Identity, Credential, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile Federal Identity, Credential, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile Version 1.0 September 27, 2010 Document History This is the first

More information

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1 PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity

More information

How To Use Saml 2.0 Single Sign On With Qualysguard

How To Use Saml 2.0 Single Sign On With Qualysguard QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,

More information

Securing Splunk with Single Sign On & SAML

Securing Splunk with Single Sign On & SAML Copyright 2015 Splunk Inc. Securing Splunk with Single Sign On & SAML Nachiket Mistry Sr. So=ware Engineer, Splunk Rama Gopalan Sr. So=ware Engineer, Splunk Disclaimer During the course of this presentajon,

More information

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Federal Identity, Credentialing, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile

Federal Identity, Credentialing, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile Federal Identity, Credentialing, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile Version 1.0.2 December 16, 2011 Document History Status Release

More information

DocuSign Single Sign On Implementation Guide Published: March 17, 2016

DocuSign Single Sign On Implementation Guide Published: March 17, 2016 DocuSign Single Sign On Implementation Guide Published: March 17, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents

More information

Revised edition. OIO Web SSO Profile V2.0.9 (also known as OIOSAML 2.0.9) Includes errata and minor clarifications

Revised edition. OIO Web SSO Profile V2.0.9 (also known as OIOSAML 2.0.9) Includes errata and minor clarifications OIO Web SSO Profile V2.0.9 (also known as OIOSAML 2.0.9) Revised edition Includes errata and minor clarifications Danish Agency for Digitisation September 2012 Contents > 1 Introduction 8 1.1 Referenced

More information

PHP Integration Kit. Version 2.5.1. User Guide

PHP Integration Kit. Version 2.5.1. User Guide PHP Integration Kit Version 2.5.1 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate PHP Integration Kit User Guide Version 2.5.1 December, 2012 Ping Identity Corporation 1001

More information

Software Design Document Logging/Audit

Software Design Document Logging/Audit Software Design Document Logging/Audit FM 7.5 Version 0.2 (Draft) Please send comments to: [email protected] Contents 1 Introduction......1 1.1 Document Status...1 1.2 Revision History...1 1.3

More information

Securing Web Services With SAML

Securing Web Services With SAML Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion

More information

Revised edition. OIO Web SSO Profile V2.0.8 (also known as OIOSAML 2.0.8) Includes errata and minor clarifications

Revised edition. OIO Web SSO Profile V2.0.8 (also known as OIOSAML 2.0.8) Includes errata and minor clarifications OIO Web SSO Profile V2.0.8 (also known as OIOSAML 2.0.8) Revised edition Includes errata and minor clarifications Danish Agency for Digitisation December 2011 Contents > 1 Introduction 8 1.1 Referenced

More information

IBM WebSphere Application Server

IBM WebSphere Application Server IBM WebSphere Application Server SAML 2.0 web single-sign-on 2012 IBM Corporation This presentation describes support for SAML 2.0 web browser Single Sign On profile included in IBM WebSphere Application

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

DEPLOYMENT GUIDE. SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity

DEPLOYMENT GUIDE. SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity DEPLOYMENT GUIDE SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity Table of Contents SAML Overview...3 Integration Topology...3 Deployment Requirements...4 Configuration Steps...4 Step

More information

National Identity Exchange Federation. Web Browser User-to-System Profile. Version 1.0

National Identity Exchange Federation. Web Browser User-to-System Profile. Version 1.0 National Identity Exchange Federation Web Browser User-to-System Profile Version 1.0 August 18, 2014 Table of Contents TABLE OF CONTENTS 1 1. TARGET AUDIENCE AND PURPOSE 2 2. TERMINOLOGY 2 3. REFERENCES

More information

Extending DigiD to the Private Sector (DigiD-2)

Extending DigiD to the Private Sector (DigiD-2) TECHNISCHE UNIVERSITEIT EINDHOVEN Department of Mathematics and Computer Science MASTER S THESIS Extending DigiD to the Private Sector (DigiD-2) By Giorgi Moniava Supervisors: Eric Verheul (RU, PwC) L.A.M.

More information

HP Software as a Service

HP Software as a Service HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty

More information

Introducing Shibboleth

Introducing Shibboleth workshop Introducing Shibboleth MPG-AAI Workshop Clarin Centers Prague 2009 2009-11-06 MPG-AAI MPG-AAI a MPG-wide Authentication & Authorization Infrastructure for access control to web-based resources

More information

SAML Authentication within Secret Server

SAML Authentication within Secret Server SAML Authentication within Secret Server Secret Server allows the use of SAML Identity Provider (IdP) authentication instead of the normal authentication process for single sign-on (SSO). To do this, Secret

More information

[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol

[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol [MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes

More information

Spring Security SAML module

Spring Security SAML module Spring Security SAML module Author: Vladimir Schäfer E-mail: [email protected] Copyright 2009 The package contains the implementation of SAML v2.0 support for Spring Security framework. Following

More information

SAML Profile for Privacy-enhanced Federated Identity Management

SAML Profile for Privacy-enhanced Federated Identity Management SAML Profile for Privacy-enhanced Federated Identity Management Rainer Hörbe, Identinetics GmbH Abstract This profile for the SAML WebSSO use case specifies an enhancement that allows users to limit their

More information

Software Design Document Securing Web Service with Proxy

Software Design Document Securing Web Service with Proxy Software Design Document Securing Web Service with Proxy Federated Access Manager 8.0 Version 0.3 Please send comments to: [email protected] This document is subject to the following license: COMMON

More information

Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO

Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO Scope... 2 Prerequisites Tasks... 2 Procedure... 2 Step 1: Configure EPM s WebLogic domain for SP Federation Services... 2 Step 2:

More information

OIOSAML Rich Client to Browser Scenario Version 1.0

OIOSAML Rich Client to Browser Scenario Version 1.0 > OIOSAML Rich Client to Browser Scenario Version 1.0 Danish Agency for Digitization December 2011 Contents > 1 Introduction 4 1.1 Purpose 1.2 Background 4 4 2 Goals and Assumptions 5 3 Scenario Details

More information

Session Service Architecture

Session Service Architecture Session Service Architecture Open Web Single Sign-On Version 1.0 Please send comments to: [email protected] Author Alan Chu ([email protected]) Session Service Architecture, Version 1.0 This document is subject

More information

Perceptive Experience Single Sign-On Solutions

Perceptive Experience Single Sign-On Solutions Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark

More information

Server based signature service. Overview

Server based signature service. Overview 1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...

More information

It is I, SAML. Ana Mandić Development Lead @ Five Minutes Ltd

It is I, SAML. Ana Mandić Development Lead @ Five Minutes Ltd It is I, SAML Ana Mandić Development Lead @ Five Minutes Ltd About Five Minutes We design and develop top notch mobile apps for leading mobile platforms 50 full-time employees Offices in Zagreb, Osijek

More information

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved. Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,

More information

DualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.

DualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved. DualShield Integration Guide Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,

More information

Automated Testing of SAML 2.0 Service Providers. Andreas Åkre Solberg UNINETT [email protected] http://rnd.feide.no

Automated Testing of SAML 2.0 Service Providers. Andreas Åkre Solberg UNINETT andreas@uninett.no http://rnd.feide.no Automated Testing of SAML 2.0 Service Providers Andreas Åkre Solberg UNINETT [email protected] http://rnd.feide.no Background 0% of SAML 2.0 implementations do SAML 100% correct. SAML includes alot of

More information

Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications

Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to AirWatch Applications

More information

[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Specification

[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Specification [MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Specification Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft

More information

Copyright: WhosOnLocation Limited

Copyright: WhosOnLocation Limited How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and

More information

Centrify Mobile Authentication Services

Centrify Mobile Authentication Services Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject

More information

MLSListings Single Sign On Implementation Guide. Compatible with MLSListings Applications

MLSListings Single Sign On Implementation Guide. Compatible with MLSListings Applications MLSListings Single Sign On Implementation Guide Compatible with MLSListings Applications February 2010 2010 MLSListings Inc. All rights reserved. MLSListings Inc. reserves the right to change details in

More information

Title: A Client Middleware for Token-Based Unified Single Sign On to edugain

Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]

More information

Add Microsoft Azure as the Federated Authenticator in WSO2 Identity Server

Add Microsoft Azure as the Federated Authenticator in WSO2 Identity Server Add Microsoft Azure as the Federated Authenticator in WSO2 Identity Server This blog will explain how to use Microsoft Azure as a Federated Authenticator for WSO2 Identity Server 5.0.0. In this example

More information

Federated Identity Management Solutions

Federated Identity Management Solutions Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

OpenSSO Monitoring Euro User Groups Winter 2010

OpenSSO Monitoring Euro User Groups Winter 2010 OpenSSO Monitoring Euro User Groups Winter 2010 Victor Ake Identity Architect ForgeRock.com Agenda What is new in OpenSSO Express 9 Monitoring OpenSSO Express 9 What is new in OpenSSO Expresss 9 Web container

More information

Research and Implementation of Single Sign-On Mechanism for ASP Pattern *

Research and Implementation of Single Sign-On Mechanism for ASP Pattern * Research and Implementation of Single Sign-On Mechanism for ASP Pattern * Bo Li, Sheng Ge, Tian-yu Wo, and Dian-fu Ma Computer Institute, BeiHang University, PO Box 9-32 Beijing 100083 Abstract Software

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Single Sign-On Implementation Guide Salesforce, Summer 15 @salesforcedocs Last updated: July 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of

More information

ACTIVID APPLIANCE AND MICROSOFT AD FS

ACTIVID APPLIANCE AND MICROSOFT AD FS ACTIVID APPLIANCE AND MICROSOFT AD FS SAML 2.0 Channel Integration Handbook ActivID Appliance 7.2 July 2013 Released Document Version 1.0 hidglobal.com Table of Contents 1.0 Introduction...3 1.1 Scope

More information

Centrify Mobile Authentication Services for Samsung KNOX

Centrify Mobile Authentication Services for Samsung KNOX Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under

More information

SAML v2.0 for.net Developer Guide

SAML v2.0 for.net Developer Guide SAML v2.0 for.net Developer Guide Copyright ComponentSpace Pty Ltd 2004-2015. All rights reserved. www.componentspace.com Contents 1 Introduction... 1 1.1 Features... 1 1.2 Benefits... 1 1.3 Prerequisites...

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

USING ESPRESSO [ESTABLISHING SUGGESTED PRACTICES REGARDING SINGLE SIGN ON] TO STREAMLINE ACCESS

USING ESPRESSO [ESTABLISHING SUGGESTED PRACTICES REGARDING SINGLE SIGN ON] TO STREAMLINE ACCESS USING ESPRESSO [ESTABLISHING SUGGESTED PRACTICES REGARDING SINGLE SIGN ON] TO STREAMLINE ACCESS Andy Ingham (UNC-Chapel Hill) NASIG Annual Conference, June 4, 2011 What I hope to cover Problem statement

More information

GFIPM Web Browser User-to-System Profile Version 1.2

GFIPM Web Browser User-to-System Profile Version 1.2 About the Document Justice organizations are looking for ways to provide secured access to multiple agency information systems with a single logon. The Global Federated Identity and Privilege Management

More information

Open Source Identity Integration with OpenSSO

Open Source Identity Integration with OpenSSO Open Source Identity Integration with OpenSSO April 19, 2008 Pat Patterson Federation Architect [email protected] blogs.sun.com/superpat Agenda Web Access Management > The Problem > The Solution >

More information

IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0

IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 International Virtual Observatory Alliance IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 IVOA Proposed Recommendation 20151029 Working group http://www.ivoa.net/twiki/bin/view/ivoa/ivoagridandwebservices

More information