A Standards-based Mobile Application IdM Architecture
|
|
|
- Brittney Morton
- 10 years ago
- Views:
Transcription
1 A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted services. This explains how an identity management architecture, with the help of both SAML and OAuth, can support the two broad categories web applications delivered through the browser and native applications installed onto the device by providing a single consistent and cohesive identity infrastructure for both.
2 Table of Contents Abstract Introduction Use Cases Browser SSO for Web Applications Consumer Native Application Enterprise Native Application Key Identity Standards SAML OAuth OpenID OpenID Connect (Emerging) How it Works Web Applications Native Applications Native Application with Federation The Role of OAuth Getting Tokens Delivering Tokens to Applications Storing Tokens Using Tokens Refreshing Tokens Revocation Other Considerations Best Practices Web Applications Native Applications Conclusion References
3 Introduction Mobile devices are an increasingly important channel for delivery of data and services. Highly capable phones, tablets, and thick desktop applications are enabling new levels of mobility and functionality. A comprehensive authentication and authorization framework should provide support for both web applications that rely on a browser on the mobile device and native applications that rely on a downloaded distinct application installed onto the native OS. These two data access models are shown below: Both application models have benefits. Native applications: Offer performance advantages, with no need to download the UI every time (HTML5 s caching changes this) Enable the ability to work offline and meaningfully interact with the application--even when not connected Are more effective at integrating mobile device capabilities into the application, such as camera, GPS, Contact List, etc. Provide easier payment integration (through the markets) Web applications: Are multi-platform out of the box Allow for easy and timely updates Eliminate the need for a middle-man in the distribution channel p3
4 Presented here is a standards-based cloud identity management framework, which can address both models needs for mobile application development. The intended audience is three-fold: Web 2.0 service providers building mobile applications for consumers, enterprises building mobile applications for their employees or customers and SaaS vendors building mobile applications for their customers. Use Cases Currently, there are three high-level, mobile application use cases relevant to the Web 2.0 service provider, enterprise and SaaS vendor market. These use cases span access to data via a mobile browser or a native mobile application. Browser SSO for Web Applications An enterprise subscribes to a SaaS vendor, which has created a version of its website that s optimized for mobile browsers. Employees interact with the application through their mobile browsers and authenticate to the mobile SaaS site via SSO based on their existing corporate credentials. A variation would have a mobile consumer interacting with Web 2.0 service provider, but with SSO from a social network provider such as Facebook and LinkedIn. Consumer Native Application A Web 2.0 service provider builds and distributes a native application for popular mobile operating systems, like ios and Android. Consumers download and install the application and then link the application to an existing or new account with the enterprise. Once linked, the application can read/write consumer-specific data from/to the provider s servers to create a more customized experience. Enterprise Native Application A SaaS provider builds a native application for popular mobile operating systems, like ios and Android. Employees of enterprise customers download and install the application, and then link it to an existing or new account at the Saas provider using their enterprise credentials for authentication. Once linked, the application can read/write employee-appropriate data from/to the SaaS providers to create a more customized experience. A variation would have an enterprise migrating desktop applications to mobile native applications and leveraging existing authentication mechanisms for SSO using their enterprise credentials. p4
5 Key Identity Standards There are several existing standards that play a role in the Mobile App IDm Architecture. The combination of these protocols enables seamless and secure access to data regardless of the device. SAML The Security Assertion Markup Language (SAML) is an XML-based standard for exchanging authentication and authorization data between security domains. For example, exchanging authentication between an Identity Provider (a producer of assertions) and a Service Provider (a consumer of assertions). SAML is the industry standard choice for a Single Sign On (SSO) mechanism for enterprise or cloud web applications. Learn more about SAML. OAuth OAuth is an open standard for authentication and authorization for RESTful APIs. In a common deployment model, OAuth allows users to share information like a user profile or calendar stored on one website with another website through APIs all without divulging their credentials to the requesting site. Learn more about OAuth. OpenID 2.0 OpenID 2.0 is an open standard for web SSO and is optimized more for consumer deployments than for enterprise or Cloud. Consequently, SAML and OpenID complement each other well. Learn more about OpenID. OpenID Connect (Emerging) OpenID Connect is an emerging suite of lightweight specifications that provide a framework for communicating identity via RESTful APIs. OpenID Connect is seen as the evolution of OpenID 2.0, and is built as a profile of OAuth 2.0 rather than a completely distinct protocol foundation. OpenID Connect profiles OAuth 2.0 for SSO functionality and API access to identity attributes. Learn more about OpenID Connect. The relevance of these protocols for mobile applications is shown in the diagram below SSO (SAML for enterprise and cloud deployments, OpenID for consumer) can be used for both web applications and during the authentication step for native mobile applications (denoted below by straddling the line between web and native). OAuth is relevant for authentication and authorization of both consumer and enterprise mobile native applications. p5
6 How it Works Federated authentication for both web and native mobile applications is based on the exchange and delivery of tokens to the application. Tokens are issued by an Identity Provider (IdP) typically in exchange for the user authenticating to the IdP. Tokens either carry a set of user attributes directly, for example, as a self-contained aggregation, or act only as a reference or pointer to a set of attributes at a remote service. Rather than a Service Provider (SP) directly validating a user s credentials such as username or password, federation presumes that the user authenticates to an IdP, which generates a token targeted for the SP. As described below, the token flows vary slightly between web applications and native applications. Web Applications For web applications, the token is issued by an IdP, and then delivered through the browser, typically using cookies or the query string, to the application. Once the application validates the token, it serves up appropriate application HTML to the browser. The browser plays only a passive role in the delivery of the token to the application it neither modifies the token, nor stores it for future use, but merely passes it on. Federated authentication for web applications is shown on the next page: p6
7 In a cloud portal scenario where a mobile enterprise employee accesses various cloud applications by first logging into their enterprise, then requesting access to a specific resource, the sequence is this: 1. Mobile employee authenticates to their enterprise. 2. Enterprise creates a token expressing relevant identity attributes of the employee and delivers it through the mobile browser to the cloud service provider. 3. The cloud service provider validates the token, extracts the identity attributes, makes an authorization decision and, if appropriate, delivers application HTML to the mobile browser. Note: The above diagram shows the flow beginning at the enterprise, but the employee could also begin at the cloud service provider. After being directed to the enterprise, the employee authenticates and the above flow continues. With SSO for enterprise and cloud-based applications, SAML is the dominant protocol and token format choice. In the consumer space, OpenID is the equivalent although OpenID does not actually define the token format. For the above enterprise to cloud application scenario, the enterprise plays the role of the SAML Identity Provider, and the cloud application provider plays the role of SAML Service Provider. p7
8 Native Applications Unlike the web application client (namely the browser), native applications play a more active role in obtaining the tokens they will subsequently use to invoke APIs. For native mobile applications, just as with web applications, a user s credentials are typically exchanged for a token. In the diagram below, the native application relies on the mobile browser for this exchange. The token is then used on API calls to acquire user information. The two scenarios for native applications defined below represent the user directly exchanging credentials for an access token or the user entering credentials at an identity provider (such as a SAML IdP or OpenID IdP) and exchanging a token for an access token. In both scenarios, the browser is used to collect credentials for (or deliver a token) to the service provider in exchange for an access token. After installing the native application, the user is prompted to authorize this application. The native application launches a web browser, in which: 1. User authenticates to the server and authorizes the issuance of a token 2. Token is delivered through the browser to the native application 3. Native application presents token on API calls 4. Application returns user data as JSON p8
9 Native applications can store the tokens they receive. This means the tokens issued to the application will generally exist for longer periods of time either for the length of a session, or, for some types of tokens, much longer. Native Application with Federation The current reality is that an Authorization Server (AS) and Resource Server (RS) are typically co-located, so the above application provider would host its own AS to issue tokens to be presented to its own RS APIs. Activity around signed JSON Web Token (JWT) will likely enable a model where an RS could consume and trust tokens issued by an AS in a different domain. The web application and native application token exchange transactions can be chained together, with a passive token exchange preceding an active exchange. This scenario is shown below. 1. User authenticates to their enterprise IdP. 2. The enterprise creates a token, which is delivered through the browser to the cloud service provider. 3. Based on the identity attributes within the token, the cloud service provider issues a different token through the browser down to the native application. 4. The native application presents a token on API calls. 5. Application returns application data as JSON. p9
10 In the above, SAML enables SSO from the enterprise to the cloud service provider. For Web 2.0 providers, OpenId can be used to authenticate the consumer using service such as Google. The SaaS provider would play the roles of SAML SP and OAuth Authorization Server, and the enterprise would play the role of SAML IdP. The Role of OAuth OAuth is the emerging choice for the protocol where native applications obtain tokens to subsequently use on API calls. In the above flow, it is an OAuth Authorization Server that issues access tokens to the native application client these tokens are then presented to the Resource Server. Getting Tokens The OAuth Authorization Server needs to authenticate the user and then optionally obtain their consent for the application to access their data before issuing tokens back to the native application. OAuth provides a number of grant types potentially relevant to native applications: Resource owner credentials. The native application directly collects the username and password within its own UI and then trades those credentials to the AS for tokens (and discards the username/password). Authorization code. The user authenticates to the AS in a browser, which issues and delivers an authorization code to the native application and is then subsequently exchanged for tokens. Implicit in which the user authenticates to the AS in a browser. This authentication directly results in the issuance and delivery of an access token to the native application. The implicit grant type is designed for widget type applications running in web pages and although it can be used for native applications, it neither supports client authentication nor refresh tokens. The authorization code grant type offers significant advantages compared to the resource owner credentials grant type: It does not preclude stronger authentication mechanisms beyond username/password. It does not preclude web-based SSO, allowing the user to authenticate to the AS via some separate identity provider. It does not preclude the user leveraging their existing browser stores for authentication stores, whether native to the browser or through extensions. For the native application to use a browser for user authentication, a browser window must be launched. For example, on Android: p10
11 Note: The value of the redirect_uri is shown here as a custom scheme of x-myapp. See the next section for a discussion of this mechanism. A new browser window is launched, in which the user will authenticate. As discussed before, the user can authenticate directly to the Authorization Server or through SSO from an IdP-- their enterprise for cloud scenarios or their preferred social network for consumer scenarios. After authentication, it may be appropriate to show the user a consent screen, indicating the requested scopes to be authorized, as shown below. The above indicates a Salesforce consent screen, displayed after the user had SSOd from their enterprise using SAML. Note: The authorization code grant type can also be used for embedded browsers for example, as a WebView on Android as opposed to a separate window as shown above. Some think that an embedded browser offers improved usability so the user is not removed from the application context for authentication. However, users are familiar with browsers launching in a separate window and will have stored passwords in the device s main browser not the browser specific to the native application. p11
12 Delivering Tokens to Applications Once the AS has issued a token(s), it needs to be delivered to the application for storage and subsequent use on API calls. How the token(s) are delivered back to the client will depend on the specific grant type used to request the token. For the Resource Owner credentials grant type, the AS simply includes the token(s) in its response to the client request, as shown here: For the Authorization code grant type, the AS returns the authorization code as a parameter to the client s registered Redirect_URI. A mechanism is needed to move the authorization code from the browser to the client so that it can be exchanged for the more fundamental token(s). There are a number of possible mechanisms to accomplish this, including: User copy and paste. The AS returns a page to the browser with the authorization code for the user to read and paste into the native application. Monitor cookies. The AS result page will save the authorization code to a cookie, so that the native application monitoring the browser s cookie jar can extract it. Monitor browser window title. The AS result page will include the authorization code in the HTML Title of the returned page, so that the native application monitoring the title can extract it. What appears to be the emerging best practice is to rely on the native application registering itself as the handler for a custom URI scheme on installation, so that when the AS sends the authorization code to a Redirect_URI using this scheme, then the browser invokes the native application and hands off the authorization code for subsequent exchange by the native application for the desired token(s). In Android, the native application can use the intent mechanism to register itself as the handler for the custom scheme (shown below as x-myapp) by adding an extra block to the AndroidManifest.xml. p12
13 After user authentication and authorization, when the AS sends the authorization code to the redirect_uri (x-myapp://redirect), the above activity kicks in and the authorization code can be extracted. Once the native application has the authorization code, it is exchanged for the desired access token as shown in the request/response pair below: HTTP/ OK Content-Type: application/json; charset=utf-8 { token_type : Bearer, expires_in : 600, refresh_token : oqwqwmuil2ndemhsweyfo0gyalvgkm, access_token : lsbbci4jg8msjisqzlbrzexgd4mkunhokyf } Storing Tokens In ios, the tokens can be stored in the key chain: Android offers comparable functionality. p13
14 Using Tokens The native application retrieves the access token from local storage and includes the token on API calls to the RS, for example: Refreshing Tokens Access tokens are generally short-lived, so after they expire, the native application will need to obtain fresh ones. The refresh tokens the authorization server returned are exchanged for fresh access tokens, as in this request/response pair shown below: Note that in the above, not only does the client receive a fresh access token, it also received a fresh refresh token. This sort of rolling refresh helps to mitigate the risk of a stolen refresh token, as the authorization server would revoke the older one upon issuing the new. Revocation Native applications offer an important new channel by which enterprise employees can access cloud services. But, because the access is enabled by the issuance of long-lived tokens to the native application, the channel complicates revocation of employee access to those services when their employment changes or ends. Unlike for web applications accessed through SSO, for which an employee s access to SaaS applications can be controlled by simply no longer p14
15 issuing short-lived SAML SSO assertions, revoking the native application channel requires more explicit operation by the enterprise. More scalable than demanding an enterprise admin login to the SaaS control panel to revoke tokens is for the enterprise to push a Remove User message to the appropriate cloud service providers using a protocol such as SCIM (Simple Cloud User Management). Upon receiving the message, each cloud service provider would revoke all access and refresh tokens previously issued to the user on various native applications. An example of such a SCIM message is: Whether accomplished administratively or automatically, once the access and refresh tokens were revoked, the native application would no longer be able to access the relevant APIs, nor obtain new access tokens. Other Considerations 1. Native applications are currently enjoying great popularity, primarily because of the enhanced functionality relative to simple web applications. HTML5 promises to balance the situation. If so, web browser SSO will remain important, and continue to complement OAuth-based native application enablement. 2. While web and native application models were discussed here as distinct options, you can also combine them. For example, a native application embeds web content as in an Android WebView. Platforms like PhoneGap, which allow developers to author native applications using web technologies like HTML5 and CSS, get access to native APIs and app stores, highlight this scenario. These hybrids present interesting identity management challenges. For instance, if the containing native application is authorized (and issued an access token as a result), how would you translate that into the SAML SSO necessary to ensure seamless web access in the embedded browser? 3. For some, even if the OAuth authorization dance for a given native application is performed only rarely (as enabled by refresh tokens), the need to do this for each and every native application on a device is seen as an undesirable usability burden especially if multiple native applications fall under the same domain such as separate native applications created by a electronics retailer, or the applications a given employee uses to interact with their SaaS services. In such situations, there can be value in a native application SSO experience, where the user authenticates and authorizes a single native application, and subsequently, appropriate other native applications need not have the user go through an explicit OAuth authorization dance but can instead benefit from that initial explicit authorization to obtain the desired tokens. p15
16 Best Practices In the following sections, we discuss practical considerations of applying SAML and OAuth to enable mobile web and native applications, as well as presenting best practices for deployment. Web Applications Fundamentally, SSO works in mobile browsers the same way it does for desktop browsers as redirects. However, mobile browsers may be more constrained in the maximum URL length they support, and so the SSO mechanisms that rely on passing messages within the URL query string, such as OpenID 2.0 and SAML HTTP Redirect binding, may not be appropriate. For such browsers, alternative SSO mechanisms like the SAML HTTP POST or Artifact bindings may be preferred. Similarly, screen size limitations argue for appropriately designed IdP login pages, as well perhaps as SP selector UI. OpenID Connect defines a display parameter, with values of none, popup, or mobile, allowing the Client to guide the Authorization Server s login and consent UI. OpenID Connect also mitigates the above mentioned URL length issue by adopting a databy-reference model (similar to SAML s artifiact) and obviate the need for sending large data objects in the URL string through the browser. For enterprise employee access to SaaS web applications, SSO provides control by revoking access when an employee is terminated. Once an employee leaves, the enterprise will no longer issue SAML assertions for that employee, blocking unauthorized access to cloud applications. Native Applications We consider different stages of the lifecycle for a native application citing examples of how these stages are addressed in both ios and Android. Conclusion Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted services. An identity management architecture for such clients must support the two broad categories web applications delivered through the browser and native applications installed onto the device. The desired architecture does not impose different identities and authorizations for the two application models, but provides a single consistent and cohesive identity infrastructure for both. Critically, the architecture will be built on open industry standards to guarantee interoperability across websites, business partners, and SaaS providers and their customers. Fortunately, there exist identity management standards, SAML and OAuth, which, both in isolation and combination, can address the identity requirements of both application models. p16
17 References 1. OAuth and Android - Dropbox is wrong; never ask for passwords 2. OAuth and REST in Android: Part Android Client-side OAuth 4. An OAuth Consumer implementation in Objective-C Single Sign-On for Desktop and Mobile Applications using SAML and OAuth Applications_using_SAML_and_OAuth 6. OpenID Connect 7. Simple Cloud Identity Management (SCIM) Ping Identity provides cloud identity security solutions to the world s foremost companies, government organizations and cloud businesses. For more information, dial U.S. toll-free or , [email protected] or visit pingidentity.com Ping Identity Corporation. All rights reserved. Ping Identity, PingFederate, PingFederate Express, PingConnect, PingEnable, the Ping Identity logo, SignOn.com, Auto-Connect and Single Sign-On Summit are registered trademarks, trademarks or servicemarks of Ping Identity Corporation. All other product and service names mentioned are the trademarks of their respective companies. p17
OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900
OAuth 2.0 Developers Guide Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 Table of Contents Contents TABLE OF CONTENTS... 2 ABOUT THIS DOCUMENT... 3 GETTING STARTED... 4
Simple Cloud Identity Management (SCIM)
Simple Cloud Identity Management (SCIM) Abstract The Simple Cloud Identity Management (SCIM) specification defines a simple, RESTful protocol for identity account management operations. SCIM s model is
The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs
The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs Executive Overview A key technical underpinning of the Cloud is the Application Programming Interface (API). APIs provide consistent
Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
OpenID Connect 1.0 for Enterprise
OpenID Connect 1.0 for Enterprise By Paul Madsen Executive Overview In order to meet the challenges presented by the use of mobile apps and cloud services in the enterprise, a new generation of identity
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
MOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com
MOBILITY Transforming the mobile device from a security liability into a business asset. pingidentity.com Table of Contents Introduction 3 Three Technologies That Securely Unleash Mobile and BYOD 4 Three
How to Extend Identity Security to Your APIs
How to Extend Identity Security to Your APIs Executive Overview The number of users and devices requesting access to applications is growing exponentially and enterprises are scrambling to adapt their
How To Use Kiteworks On A Microsoft Webmail Account On A Pc Or Macbook Or Ipad (For A Webmail Password) On A Webcomposer (For An Ipad) On An Ipa Or Ipa (For
GETTING STARTED WITH KITEWORKS DEVELOPER GUIDE Version 1.0 Version 1.0 Copyright 2014 Accellion, Inc. All rights reserved. These products, documents, and materials are protected by copyright law and distributed
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Axway API Gateway. Version 7.4.1
O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1
ACR Connect Authentication Service Developers Guide
ACR Connect Authentication Service Developers Guide Revision History Date Revised by Version Description 29/01/2015 Sergei Rusinov 1.0 Authentication using NRDR account Background The document describes
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com
2015-11-30. Web Based Single Sign-On and Access Control
0--0 Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking
SAML 101. Executive Overview WHITE PAPER
SAML 101 Executive Overview Today s enterprise employees use an ever-increasing number of applications, both enterprise hosted and in the Cloud, to do their jobs. What s more, they are accessing those
Enabling SSO for native applications
Enabling SSO for native applications Paul Madsen Ping Identity Session ID: IAM F42B Session Classification: Intermediate Mobile Modes Source - 'How to Connect with Mobile Consumers' Yahoo! Overview Enterprise
Identity Management with Spring Security. Dave Syer, VMware, SpringOne 2011
Identity Management with Spring Security Dave Syer, VMware, SpringOne 2011 Overview What is Identity Management? Is it anything to do with Security? Some existing and emerging standards Relevant features
PingFederate. SSO Integration Overview
PingFederate SSO Integration Overview 2006-2012 Ping Identity Corporation. All rights reserved. PingFederate SSO Integration Overview Version 6.6 January, 2012 Ping Identity Corporation 1001 17th Street,
UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL39027649-SS. Single Sign-On (SSO) Solution
UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL39027649-SS Single Sign-On (SSO) Solution For University Information Systems (UIS) May 9, 2013 2 University of Colorado
OAuth 2.0. Weina Ma [email protected]
OAuth 2.0 Weina Ma [email protected] Agenda OAuth overview Simple example OAuth protocol workflow Server-side web application flow Client-side web application flow What s the problem As the web grows, more
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
An Oracle White Paper Dec 2013. Oracle Access Management OAuth Service
An Oracle White Paper Dec 2013 Oracle Access Management OAuth Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may
An Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
Pick Your Identity Bridge
Pick Your Identity Bridge Options for connecting users and resources across the hybrid cloud Executive Overview Enterprises are increasing their use of software as a service (SaaS) for two principal reasons:
USING FEDERATED AUTHENTICATION WITH M-FILES
M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
Identity. Provide. ...to Office 365 & Beyond
Provide Identity...to Office 365 & Beyond Sponsored by shops around the world are increasingly turning to Office 365 Microsoft s cloud-based offering for email, instant messaging, and collaboration. A
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0)
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0) July 2015 Oracle API Gateway OAuth User Guide, 11g Release 2 (11.1.2.4.0) Copyright 1999, 2015, Oracle and/or its
Mobile Security. Policies, Standards, Frameworks, Guidelines
Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf
Fairsail REST API: Guide for Developers
Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,
CA Single Sign-On Migration Guide
CA Single Sign-On Migration Guide Web access management (WAM) systems have been a part of enterprises for decades. It is critical to control access and audit applications while reducing the friction for
The Role of Identity Enabled Web Services in Cloud Computing
The Role of Identity Enabled Web Services in Cloud Computing April 20, 2009 Patrick Harding CTO Agenda Web Services and the Cloud Identity Enabled Web Services Some Use Cases and Case Studies Questions
SAML Authentication Quick Start Guide
SAML Authentication Quick Start Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved.
Connecting Users with Identity as a Service
Ping Identity has demonstrated support for multiple workforce and external identity use cases, as well as strong service provider support. Gregg Kreizman Gartner 1 Connecting Users with Identity as a Service
Extend and Enhance AD FS
Extend and Enhance AD FS December 2013 Sponsored By Contents Extend and Enhance AD FS By Sean Deuby Introduction...2 Web Service SSO Architecture...3 AD FS Overview...5 Ping Identity Solutions...7 Synergy
An Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
EHR OAuth 2.0 Security
Hospital Health Information System EU HIS Contract No. IPA/2012/283-805 EHR OAuth 2.0 Security Final version July 2015 Visibility: Restricted Target Audience: EHR System Architects EHR Developers EPR Systems
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Onegini Token server / Web API Platform
Onegini Token server / Web API Platform Companies and users interact securely by sharing data between different applications The Onegini Token server is a complete solution for managing your customer s
WHITEPAPER. NAPPS: A Game-Changer for Mobile Single Sign-On (SSO)
WHITEPAPER NAPPS: A Game-Changer for Mobile Single Sign-On (SSO) INTRODUCTION The proliferation of mobile applications, including mobile apps custom to an organization, makes the need for an SSO solution
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
The Primer: Nuts and Bolts of Federated Identity Management
The Primer: Nuts and Bolts of Federated Identity Management Executive Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities.
How To Use Salesforce Identity Features
Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
OAuth Guide Release 6.0
[1]Oracle Communications Services Gatekeeper OAuth Guide Release 6.0 E50767-02 November 2015 Oracle Communications Services Gatekeeper OAuth Guide, Release 6.0 E50767-02 Copyright 2012, 2015, Oracle and/or
How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
SAP Cloud Identity Service Document Version: 1.0 2014-09-01. SAP Cloud Identity Service
Document Version: 1.0 2014-09-01 Content 1....4 1.1 Release s....4 1.2 Product Overview....8 Product Details.... 9 Supported Browser Versions....10 Supported Languages....12 1.3 Getting Started....13 1.4
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Flexible Identity Federation
Flexible Identity Federation Administration guide version 1.0.1 Publication history Date Description Revision 2015.09.24 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Administering Jive Mobile Apps
Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0
Windows Live Cloud Identity Connector Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Windows Live Cloud Identity Connector User Guide Version 1.0 April, 2011 Ping Identity
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Summer 15 @salesforcedocs Last updated: July 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle [email protected]
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle [email protected] Berne, 13. August 2014 Introduction App by University of St. Gallen Universities
SECUREAUTH IDP AND OFFICE 365
WHITEPAPER SECUREAUTH IDP AND OFFICE 365 STRONG AUTHENTICATION AND SINGLE SIGN-ON FOR THE CLOUD-BASED OFFICE SUITE EXECUTIVE OVERVIEW As more and more enterprises move to the cloud, it makes sense that
Google Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
Federation architectures for mobile applications OAuth 2.0 Drivers OAuth 2.0 Overview Mobile walkthrough
Agenda Federation architectures for mobile applications OAuth 2.0 Drivers OAuth 2.0 Overview Mobile walkthrough Enter OAuth 2.0 Defines authorization & authentication framework for RESTful APIs An open
PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
Copyright Pivotal Software Inc, 2013-2015 1 of 10
Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10
Login with Amazon. Developer Guide for Websites
Login with Amazon Developer Guide for Websites Copyright 2014 Amazon Services, LLC or its affiliates. All rights reserved. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates.
OAuth: Where are we going?
OAuth: Where are we going? What is OAuth? OAuth and CSRF Redirection Token Reuse OAuth Grant Types 1 OAuth v1 and v2 "OAuth 2.0 at the hand of a developer with deep understanding of web security will likely
OpenID connect @ Deutsche telekom. Dr. Torsten Lodderstedt, Deutsche Telekom AG
OpenID connect @ Deutsche telekom Dr. Torsten Lodderstedt, Deutsche Telekom AG service ecosystem and Telekom Login Dr. Torsten Lodderstedt / OpenID Workshop @ IIW #18 2014-05-05 2 Open Standards: Our History
Lecture Notes for Advanced Web Security 2015
Lecture Notes for Advanced Web Security 2015 Part 6 Web Based Single Sign-On and Access Control Martin Hell 1 Introduction Letting users use information from one website on another website can in many
Identity Implementation Guide
Identity Implementation Guide Version 37.0, Summer 16 @salesforcedocs Last updated: May 26, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
OpenLogin: PTA, SAML, and OAuth/OpenID
OpenLogin: PTA, SAML, and OAuth/OpenID Ernie Turner Chris Fellows RightNow Technologies, Inc. Why should you care about these features? Why should you care about these features? Because users hate creating
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
AIRTEL INDIA OPEN API. Application Developer Guide for OAuth2 Authentication and Authorization. Document Version 1.1
AIRTEL INDIA OPEN API Application Developer Guide for OAuth2 Authentication and Authorization Document Version 1.1 This Application Developer Guide has been prepared for Airtel India. Copyright Intel Corporation
Enable Your Applications for CAC and PIV Smart Cards
Enable Your Applications for CAC and PIV Smart Cards Executive Summary Since HSPD-2 was signed in 2004, government agencies have issued over 5 million identity badges. About 90% of government workers and
HOL9449 Access Management: Secure web, mobile and cloud access
HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation Approved for Public Release Distribution Unlimited 13-1871 2013 The MITRE Corporation All Rights Reserved } OpenID Connect and OAuth2 protocol
Single Sign-On Implementation Guide
Version 27.0: Spring 13 Single Sign-On Implementation Guide Last updated: February 1, 2013 Copyright 2000 2013 salesforce.com, inc. All rights reserved. Salesforce.com is a registered trademark of salesforce.com,
CLAIMS-BASED IDENTITY FOR WINDOWS
CLAIMS-BASED IDENTITY FOR WINDOWS TECHNOLOGIES AND SCENARIOS DAVID CHAPPELL FEBRUARY 2011 SPONSORED BY MICROSOFT CORPORATION CONTENTS Understanding Claims-Based Identity... 3 The Problem: Working with
Leveraging SAML for Federated Single Sign-on:
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
TrustedX - PKI Authentication. Whitepaper
TrustedX - PKI Authentication Whitepaper CONTENTS Introduction... 3 1... 4 Use Scenarios... 5 Operation... 5 Architecture and Integration... 6 SAML and OAuth 7 RESTful Web Services 8 Monitoring and Auditing...
Integrating Single Sign-on Across the Cloud By David Strom
Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio
OAuth 2.0: Theory and Practice. Daniel Correia Pedro Félix
OAuth 2.0: Theory and Practice Daniel Correia Pedro Félix 1 whoami Daniel Correia Fast learner Junior Software Engineer Passionate about everything Web-related Currently working with the SAPO SDB team
Federated Identity and Single Sign-On using CA API Gateway
WHITE PAPER DECEMBER 2014 Federated Identity and Single Sign-On using Federation for websites, Web services, APIs and the Cloud K. Scott Morrison VP Engineering and Chief Architect 2 WHITE PAPER: FEDERATED
Safewhere*Identify 3.4. Release Notes
Safewhere*Identify 3.4 Release Notes Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations.
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK
Antti Pyykkö, Mikko Malinen, Oskari Miettinen GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK TJTSE54 Assignment 29.4.2008 Jyväskylä University Department of Computer Science
Centrify Mobile Authentication Services
Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject
SAML and OAUTH comparison
SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, [email protected], twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single
SAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
