RTCWEB Generic Identity Service
|
|
|
- Amie Horton
- 10 years ago
- Views:
Transcription
1 RTCWEB Generic Identity Service IETF 83 Eric Rescorla IETF 83 RTCWeb Generic Identity Provision 1
2 What are we trying to accomplish? Allow Alice and Bob to have a secure call Authenticated with their identity providers On any site Even untrusted/partially trusted ones Advantages Use one identity on any calling site Security against active attack by calling site Support for federated cases IETF 83 RTCWeb Generic Identity Provision 2
3 Topology Signaling Server HTTPS (JSEP) HTTPS (JSEP) JS API JS API Alice s Browser Media (DTLS-SRTP) Bob s Browser Get Assertion Verify Assertion Verify Assertion Get Assertion Identity Provider Identity Provider IETF 83 RTCWeb Generic Identity Provision 3
4 Terminology Authenticating Party (AP): The entity which is trying to establish its identity. Identity Provider (IdP): The entity which is vouching for the AP s identity. Relying Party (RP): The entity which is trying to verify the AP s identity. IETF 83 RTCWeb Generic Identity Provision 4
5 Types of IdP Authoritative: Attests for identities within their own namespace Often multiple Authoritatives IdPs exist with different scopes Examples: DNSSEC, RFC 4474, Facebook Connect (for the Facebook ID) Third-party: Attests for identities in a name-space they don t control Often multiple Third-Party IdPs share the same space Can attest to real-world identities Examples: SSL/TLS certificates, the State of California (driver s licenses) IETF 83 RTCWeb Generic Identity Provision 5
6 Authoritative vs. Third-Party IdPs: Trust Relationship No need to explicitly trust authoritative IdPs is whoever example.com says it is The problem is authenticating example.com Third-party IdPs need to be explicitly trusted Example: how do I know GoDaddy is a legitimate CA? Answer: the browser manufacturer vetted them They are allowed to attest to any domain name Inherently problematic as discussed at plenary IETF 83 RTCWeb Generic Identity Provision 6
7 User Relationships with IdPs Authenticating Party Has some account with the IdP May have established their identity Especially for third-party IdPs Can authenticate to the IdP in the future (e.g., with a password) Relying party Doesn t have any account relationship with the IdP Must be able to verify the IdP s identity Needs to trust third-party IdPs Note: privacy issues. IETF 83 RTCWeb Generic Identity Provision 7
8 Web-based IdP Systems Facebook Connect Google login OAuth OpenID BrowserID IETF 83 RTCWeb Generic Identity Provision 8
9 Example: Facebook Connect (sorta OAuth) AP is a user with a Facebook account They may or may not be logged in at the moment (Where logged in == cookies) RP is a Web server Idea is to bootstrap Facebook authentication... rather than have your own account system RP registers with Facebook and gets an application key Facebook wants to control authentication experience IETF 83 RTCWeb Generic Identity Provision 9
10 Facebook Connect Call Flow (not logged in) 1 Alice GET /... Redirect to RP id=1234&redirect uri= GET /dialog/oauth?client id=1234&redirect uri= Login and permissions dialog Facebook IETF 83 RTCWeb Generic Identity Provision 10
11 Facebook Connect Call Flow (not logged in) 2 Alice GET /... Redirect to RP id=1234&redirect uri= GET /dialog/oauth?client id=1234&redirect uri= GET /auth?code=5678 Hello, user Login and permissions dialog Redirect to Facebook GET /oauth/access token?client id=1234&client secret=<secret>&code=5678 access token= GET /me?access token= user= ,... IETF 83 RTCWeb Generic Identity Provision 11
12 Example: BrowserID Effectively client-side certificates But user not exposed to certificates Why this example? Easy to understand Familiar-looking technology Less need to wrap your head around redirects, etc. IETF 83 RTCWeb Generic Identity Provision 12
13 BrowserID (no key pair) Alice GET /... <script src=" navigator.id.get(function(assertion){...}); RP BrowserID.org [Generate Keys] Get certificate + Cookie Certificate [Sign Assertion] Signed assertion + Certificate Hello, user IETF 83 RTCWeb Generic Identity Provision 13
14 IETF 83 RTCWeb Generic Identity Provision 14
15 What are we trying to accomplish? Repurpose existing identity infrastructure for user-to-user authentication Requirements/objectives Use existing accounts Minimal (preferably no) changes to IdP Easy to support at calling site Better if no change Generic support in browser Single downward interface between PeerConnection object and IdP Should be able to support new IdPs/protocols without changing browser IETF 83 RTCWeb Generic Identity Provision 15
16 Example IdP Interaction: BrowserID Example IdP Interaction: BrowserId Alice sbrower WebRTC JS Code Offer Bob sbrower WebRTC JS Code Peer Connection Peer Connection Fingerprint Signed Fingerprint Signed Fingerprint Alice BrowserID Signer BrowserID Verifier Get Certificate Check Certificate Identity Provider IETF 82 WebRTC Security Architecture 21 IETF 83 RTCWeb Generic Identity Provision 16
17 Example JSEP TransportInfo with BrowserID "ufrag":"8hhy", "fingerprint":{ "algorithm":"sha-1", "value":"4aadb9b13f82183b540212df3e5d496b19e57cab", }, "candidates:[... ], "identity":{ "idp":{ // Standardized "domain":"browserid.org", "method":"default" }, "assertion": // Contents are browserid-specific "\"assertion\": { \"digest\":\"<hash of the contents from the browser>\", \"audience\": \"[TBD]\" \"valid-until\": , }, \"certificate\": { \" \": \"[email protected]\", \"public-key\": \"<ekrs-public-key>\", \"valid-until\": , }" // certificate is signed by example.org } } IETF 83 RTCWeb Generic Identity Provision 17
18 Example JSEP TransportInfo with Facebook Connect (Or any private identity service) { } "pwd":"asd88fgpdd777uzjyhagzg", "ufrag":"8hhy", "fingerprint":{ "algorithm":"sha-1", "value":"4aadb9b13f82183b540212df3e5d496b19e57cab", }, "candidates:[... ], "identity":{ "idp":{ "domain": "example.org" "protocol": "bogus" }, "assertion":\"{\"identity\":\"[email protected]\", \"contents\":\"abcdefghijklmnopqrstuvwyz\", \"signature\":\" \"}" } * Assumption here is that we have changed JSEP to emit transport-infos IETF 83 RTCWeb Generic Identity Provision 18
19 But we want it to be generic... This means defined interfaces... that work for any IdP IETF 83 RTCWeb Generic Identity Provision 19
20 What needs to be defined Information from the signaling message that is authenticated [IETF] Minimally: DTLS-SRTP fingerprint Generic carrier for identity assertion Depends on signaling protocol Interface from PeerConnection to the IdP [IETF] A specific set of messages to exchange Sent via postmessage() or WebIntents JavaScript calling interfaces to PeerConnection [W3C] Specify the IdP Interrogate the connection identity information IETF 83 RTCWeb Generic Identity Provision 20
21 What needs to be tied to user identity? Only data which is verifiably bound is trustworthy Need to assume attacker has modified anything else Initial analysis (depends on protocol) Fingerprint (MUST) ICE candidates Media parameters IETF 83 RTCWeb Generic Identity Provision 21
22 Security Properties of ICE Candidates Effect of modifying ICE candidates Advertise candidates to route media through attacker Makes a MITM attack easier Mostly irrelevant if DTLS keying used Route to /dev/null (DoS) Silly if you are in signaling path! Signaling service can affect ICE candidates anyway Provide a malicious TURN server Return blackhole server reflexive addresses This drives data through signaling service General conclusion from last meeting: don t protect ICE parameters IETF 83 RTCWeb Generic Identity Provision 22
23 Security Properties of Media Parameters Which media flows Calling service has control of this anyway But the UI needs to show what is being used For consent reasons Which codecs Calling service can influence these Might be nice to secure them But too limiting SRTP should provide security regardless of codec selection IETF 83 RTCWeb Generic Identity Provision 23
24 Generic Structure for Identity Assertions "identity":{ "idp":{ // Standardized "domain":"idp.example.org", // Identity domain "method":"default" // Domain-specific method }, "assertion": "..." // IdP-specific } IETF 83 RTCWeb Generic Identity Provision 24
25 Generic Downward Interface (Implemented by PeerConnection) Instantiate IdP Proxy with JS from IdP Probably invisible IFRAME Maybe a WebIntent (more later) Send (standardized) messages to IdP proxy via postmessage() SIGN to get assertion VERIFY to verify assertion IdP proxy responds SUCCESS with answer ERROR with error IETF 83 RTCWeb Generic Identity Provision 25
26 Where is the IdP JS fetched from? Deterministically constructed from IdP domain name and method Why in /.well-known? Trust-relationship derives from control of the domain Must not be possible for non-administrative users of domain to impersonate IdP IETF 83 RTCWeb Generic Identity Provision 26
27 How does PeerConnection know IdP domain? Authenticating Party IdP domain configured into browser User logs into browser via UI WebIntents again Specified by the calling site Authenticate this call with Facebook connect Need a new API point for this Relying party Carried in the generic part of the identity assertion IETF 83 RTCWeb Generic Identity Provision 27
28 Generic Message Structure { } "type": "...", // "SIGN","VERIFY","SUCCESS",... "id": "1", // used for correlation IETF 83 RTCWeb Generic Identity Provision 28
29 Incoming Message Checks (IdP Proxy) Messages MUST come from rtcweb://.../ This prevents ordinary JS from instantiating IdP proxy Remember, it s just an IFRAME But you can t set your origin to arbitrary values Messages MUST come from parent window Prevents confusion about which proxy IETF 83 RTCWeb Generic Identity Provision 29
30 Incoming Message Checks (PeerConnection) Messages MUST come from IdP origin domain Prevents navigation by attackers in other windows Messages MUST come from IdP proxy window Prevents confusion about which proxy IETF 83 RTCWeb Generic Identity Provision 30
31 Signature process PeerConnection -> IdP proxy: { "type":"sign", "id":1, "message":"abcdefghijklmnopqrstuvwyz" } IdPProxy -> PeerConnection: { "type":"success", "id":1, "message": { "idp":{ "domain": "example.org" "protocol": "bogus" }, "assertion":\"{\"identity\":\"[email protected]\", \"contents\":\"abcdefghijklmnopqrstuvwyz\", \"signature\":\" \"}" } } IETF 83 RTCWeb Generic Identity Provision 31
32 Verification Process PeerConnection -> IdP Proxy: { "type":"verify", "id":2, "message":\"{\"identity\":\"[email protected]\", \"contents\":\"abcdefghijklmnopqrstuvwyz\", \"signature\":\" \"}" } IdP Proxy -> PeerConnection: { "type":"success", "id":2, "message": { "identity" : { "name" : "[email protected]", "displayname" : "Bob" }, "contents":"abcdefghijklmnopqrstuvwyz" } } IETF 83 RTCWeb Generic Identity Provision 32
33 Meaning of Successful Verification IdP has verified assertion Identity is given in identity name is the actual identity (RFC822 format) displayname is a human-readable string Contents is the original message the AP passed in IETF 83 RTCWeb Generic Identity Provision 33
34 Processing Successful Verifications Authoritative IdPs RHS of identity.name matches IdP domain No more checks needed Third-party IdPs RHS of identity.name does not match IdP domain IdP MUST be trusted by policy These checks performed by PeerConnection IETF 83 RTCWeb Generic Identity Provision 34
35 How do I stand up a new IdP? 1. Get some users (the hard part) 2. Implement handlers for SIGN and VERIFY messages Probably < 100 lines of JS 3. Put the right JS at /.well-known/idp-proxy 4. Profit IETF 83 RTCWeb Generic Identity Provision 35
36 Integrated IdP Support Things work fine with no browser-side IdP support But specialized support is nice too Sign-in to browser in Chrome BrowserID in Firefox Better UI/performance properties Still specify IdP by URL IdP JS detects that the browser has built-in support Calls go directly to the browser code (polyfill) IETF 83 RTCWeb Generic Identity Provision 36
37 Do you need to use identity all the time? Not everyone will have an IdP account Not all calls should be authenticated (e.g., whistle-blowers) System degrades gracefully One-sided identity calls are secure from the other side s perspective Unauthenticated calls can be checked via clumsier mechanisms (fingerprints, etc.) UI challenges to display to the user what has happened Tighter browser innovation (e.g., with address book or social features) allows a better job IETF 83 RTCWeb Generic Identity Provision 37
38 Big open issues Should we allow third-party IdPs or not? Better mechanisms for talking to the IdP This get service from other site problem exists in a number of contexts WebIntents? Interop with SIP (see, e.g., draft-wing-identity-media) Where does this go in JSEP? IETF 83 RTCWeb Generic Identity Provision 38
39 Questions? IETF 83 RTCWeb Generic Identity Provision 39
40 Facebook Connect Call Flow (logged in) Alice GET /... Redirect to RP id=1234&redirect uri= GET /dialog/oauth?client id=1234&redirect uri= GET /auth?code=5678 Hello, user Redirect to Facebook GET /oauth/access token?client id=1234&client secret=<secret>&code=5678 access token= GET /me?access token= user= ,... IETF 83 RTCWeb Generic Identity Provision 40
41 Facebook Connect Privacy Features RP needs to register with Facebook User approves policy separately for each RP Including which user information to share Facebook learns about every authentication transaction Including user/rp pair IETF 83 RTCWeb Generic Identity Provision 41
42 BrowserID: Why no MITM Attacks? Alice attacker.com example.com GET /... GET /... <script src=" navigator.id.get(function(assertion){...}); [Sign Assertion] Signed assertion + Certificate Signed assertion + Certificate Hello, user IETF 83 RTCWeb Generic Identity Provision 42
43 BrowserID: Audience Parameter Alice attacker.com example.com GET /... GET /... <script src=" navigator.id.get(function(assertion){...}); [Sign Assertion] Signed assertion(audience=attacker.com) + Certificate Signed assertion + Certificate Audience mismatch error IETF 83 RTCWeb Generic Identity Provision 43
44 Preventing assertion forwarding BrowserID assertions are scoped to origin (audience parameter) RPs check that the origin in the assertion matches their domain This prevents assertion forwarding Why does this work? BrowserID JS is part of the TCB Browser enforces origin of requests from the calling site RP transitively trusts origin/audience because it trusts BrowserID.org IETF 83 RTCWeb Generic Identity Provision 44
45 Browser-ID Privacy Features Client generates a key pair Idp signs a binding between key pair and user ID Client generates assertions based on key pair Sends along certificate RP fetches IdP public key This need only happen once IdP never learns where you are visiting No relationship between RP and IdP IETF 83 RTCWeb Generic Identity Provision 45
46 Example: BrowserID (existing key pair) Alice GET /... <script src=" navigator.id.get(function(assertion){...}); RP BrowserID.org [Sign Assertion] Signed assertion + Certificate Hello, user IETF 83 RTCWeb Generic Identity Provision 46
47 BrowserID Security Architecture Browser myfavoritebeer.com (RP) HTTP myfavoritebeer.com (RP) postmessage() postmessage() browserid.org (IdP) Login as HTTP browserid.org (RP) IETF 83 RTCWeb Generic Identity Provision 47
48 PostMessage: Sender otherwindow.postmessage(message, targetorigin); otherwindow: the window to send the message to message: the message to send targetorigin: the expected origin of the other window IETF 83 RTCWeb Generic Identity Provision 48
49 Why do we need targetorigin? Malicious pages can navigate other windows This creates a race condition RP creates the new window to IdP with w = createwindow() Attacker navigates w to his own site RP does w.postmessage(secret,...) Attacker gets the secret targetorigin stops this IETF 83 RTCWeb Generic Identity Provision 49
50 PostMessage: receiver window.addeventlistener( message, function(event) {... }); Event properties: data: the message passed by the sender origin: the sender s origin source: the sender s window Important: origin value can be trusted Enforced by the browser May not be the current origin of source, however IETF 83 RTCWeb Generic Identity Provision 50
51 IFRAMEs What if I don t want another window to open? Solution: IFRAMEs Browser example.org postmessage() postmessage() idp.org IETF 83 RTCWeb Generic Identity Provision 51
52 IFRAME Security Properties Isolated from the main page More or less the same rules as a separate window Can be easily navigated by the main page Can be invisible (both good and bad) IETF 83 RTCWeb Generic Identity Provision 52
53 Logins generally done in separate windows IETF 83 RTCWeb Generic Identity Provision 53
54 Why aren t logins done in IFRAMEs? Scenario: you are on example.org example.org wants to log you in with idp.org Both Facebook Connect and BrowserID use a separate window Why? IdP is soliciting the user s password User needs to know they are using the right IdP A separate window means they can examine the URL bar Also concerns about clickjacking/redressing Other option is to navigate the entire page to an interstitial page IETF 83 RTCWeb Generic Identity Provision 54
55 How Clickjacking Works Attacker embeds the victim site s page in an IFRAME IFRAME is in front but marked transparent The attacker s page shows through Attacker gets the victim to click on his page Really the victim site s page Victim has just taken action on the victim site IETF 83 RTCWeb Generic Identity Provision 55
56 IFRAMEs, Clickjacking, and Permissions Grants Browser example.org Browser example.org idp.org (invisible) Grant permissions to example.org? Click here for porn Real frame hierarchy What the user sees IETF 83 RTCWeb Generic Identity Provision 56
57 Preventing Framing IdP policy is to have the login page be top-level Good RPs comply with this policy But we re concerned about malicious RPs IdPs use framebusting JavaScript to prevent being framed This is harder than it sounds... but standard procedure IETF 83 RTCWeb Generic Identity Provision 57
58 IFRAMEs don t have to be visible idp = document.createelement( IFRAME ); $(idp).hide(); This takes up no space on the screen It s just JS from the IFRAME source running on the page Can still postmessage() to and from it Invisible IFRAMEs are a very important tool IETF 83 RTCWeb Generic Identity Provision 58
59 IETF 83 RTCWeb Generic Identity Provision 59
60 Web-based IdP Objectives: User Perspective Single-sign on No need to make a new account for each service Don t need to remember lots of passwords Privacy Avoid creating a super-cookie Only authenticate to sites I have approved Control exposure of my personal information IETF 83 RTCWeb Generic Identity Provision 60
61 Web-based IdP Objectives: Site Perspective Low friction Avoid the need for account creation... the source of a lot of user rolloff Leverage existing user information E.g., information you ve stored in your FB account IETF 83 RTCWeb Generic Identity Provision 61
IETF Security Architecture Update
IETF Security Architecture Update IETF 84 Eric Rescorla [email protected] IETF 84 RTCWEB Security Architecture 1 Overview Draft update Identity origin indication Consent freshness and ICE IETF 84 RTCWEB Security
RTC-Web Security Considerations
RTC-Web Security Considerations IETF 80 Eric Rescorla [email protected] IETF 80 RTC-Web Security Issues 1 The Browser Threat Model Core Web Security Guarantee: users can safely visit arbitrary web sites and
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Addressing threats to real-world identity management systems
Addressing threats to real-world identity management systems Wanpeng Li and Chris J Mitchell Information Security Group Royal Holloway, University of London Agenda Single sign-on and identity management
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
Relax Everybody: HTML5 Is Securer Than You Think
Relax Everybody: HTML5 Is Securer Than You Think Martin Johns (@datenkeller) SAP AG Session ID: ADS-W08 Session Classification: Advanced Motivation For some reason, there is a preconception that HTML5
OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900
OAuth 2.0 Developers Guide Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 Table of Contents Contents TABLE OF CONTENTS... 2 ABOUT THIS DOCUMENT... 3 GETTING STARTED... 4
How To Use Salesforce Identity Features
Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
Glossary of Key Terms
and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which
OpenID Single Sign On and OAuth Data Access for Google Apps. Ryan Boyd @ryguyrg Dave Primmer May 2010
OpenID Single Sign On and OAuth Data Access for Google Apps Ryan Boyd @ryguyrg Dave Primmer May 2010 Why? View live notes and questions about this session on Google Wave: http://bit.ly/magicwave Agenda
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
OAuth Web Authorization Protocol Barry Leiba
www.computer.org/internet computing OAuth Web Authorization Protocol Barry Leiba Vol. 16, No. 1 January/February, 2012 This material is presented to ensure timely dissemination of scholarly and technical
webrtc and XMPP Philipp Hancke, XMPP Summit 2013
webrtc and XMPP Philipp Hancke, XMPP Summit 2013 What is this webrtc thing and why should XMPP developers care? I assume you know what XMPP is you might have heard of Jingle the XMPP framework for establishing
Lecture Notes for Advanced Web Security 2015
Lecture Notes for Advanced Web Security 2015 Part 6 Web Based Single Sign-On and Access Control Martin Hell 1 Introduction Letting users use information from one website on another website can in many
Login with Amazon. Developer Guide for Websites
Login with Amazon Developer Guide for Websites Copyright 2014 Amazon Services, LLC or its affiliates. All rights reserved. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates.
Working with Indicee Elements
Working with Indicee Elements How to Embed Indicee in Your Product 2012 Indicee, Inc. All rights reserved. 1 Embed Indicee Elements into your Web Content 3 Single Sign-On (SSO) using SAML 3 Configure an
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
Identity Implementation Guide
Identity Implementation Guide Version 37.0, Summer 16 @salesforcedocs Last updated: May 26, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0
Windows Live Cloud Identity Connector Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Windows Live Cloud Identity Connector User Guide Version 1.0 April, 2011 Ping Identity
White Paper. FFIEC Authentication Compliance Using SecureAuth IdP
White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by
Webmail Using the Hush Encryption Engine
Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
THE DEPUTIES ARE STILL CONFUSED RICH LUNDEEN
THE DEPUTIES ARE STILL CONFUSED RICH LUNDEEN Hi my name is Rich I have a twi1er @webstersprodigy I have a website h1p://webstersprodigy.net What is the same origin policy? Simple answer: content from one
Identity. Provide. ...to Office 365 & Beyond
Provide Identity...to Office 365 & Beyond Sponsored by shops around the world are increasingly turning to Office 365 Microsoft s cloud-based offering for email, instant messaging, and collaboration. A
The Devil is Phishing: Rethinking Web Single Sign On Systems Security. Chuan Yue USENIX Workshop on Large Scale Exploits
The Devil is Phishing: Rethinking Web Single Sign On Systems Security Chuan Yue USENIX Workshop on Large Scale Exploits and Emergent Threats (LEET 2013) Web Single Sign On (SSO) systems Sign in multiple
FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com
WebRTC for Service Providers FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
JVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
Identity Management with Spring Security. Dave Syer, VMware, SpringOne 2011
Identity Management with Spring Security Dave Syer, VMware, SpringOne 2011 Overview What is Identity Management? Is it anything to do with Security? Some existing and emerging standards Relevant features
Social Application Guide
Social Application Guide Version 2.2.0 Mar 2015 This document is intent to use for our following Magento Extensions Or any other cases it might help. Copyright 2015 LitExtension.com. All Rights Reserved
mod_auth_pubtkt a pragmatic Web Single Sign-On solution by Manuel Kasper, Monzoon Networks AG [email protected]
mod_auth_pubtkt a pragmatic Web Single Sign-On solution by Manuel Kasper, Monzoon Networks AG [email protected] The login hell Solutions use client certificates and OCSP and get killed by end users?
Copyright Pivotal Software Inc, 2013-2015 1 of 10
Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10
2015-11-30. Web Based Single Sign-On and Access Control
0--0 Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking
Building WebRTC Solutions with the Avaya WebRTC Collaboration Environment Snap-in. Joel Ezell Lead Architect, Collaboration Environment R&D
Building WebRTC Solutions with the WebRTC Collaboration Environment Snap-in Joel Ezell Lead Architect, Collaboration Environment R&D Use Cases for Collaboration Environment 3.0 WebRTC Outbound only Click
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Simple But Not Secure: An Empirical Security Analysis of OAuth 2.0-Based Single Sign-On Systems
Simple But Not Secure: An Empirical Security Analysis of OAuth 2.0-Based Single Sign-On Systems San-Tsai Sun University of British Columbia Vancouver, Canada [email protected] ABSTRACT Social login is
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
A Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web
SPRESSO: A Secure, Privacy-Respecting Single Sign-On System for the Web Daniel Fett University of Trier, Germany [email protected] Ralf Küsters University of Trier, Germany [email protected] Guido
Next Generation Clickjacking
Next Generation Clickjacking New attacks against framed web pages Black Hat Europe, 14 th April 2010 Paul Stone [email protected] Coming Up Quick Introduction to Clickjacking Four New Cross-Browser
FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com
WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany [email protected] www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com
Research on the Security of OAuth-Based Single Sign-On Service
Research on the Security of OAuth-Based Single Sign-On Service R. Zhu 1,2, J. Xiang 1,2, and D. Zha 3 1 Data Assurance and Communication Security Research Center, CAS, Beijing, China 2 State Key Laboratory
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
ADFS Integration Guidelines
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
Web Tracking for You. Gregory Fleischer
Web Tracking for You Gregory Fleischer 1 INTRODUCTION 2 Me Gregory Fleischer Senior Security Consultant at FishNet Security 3 Disclaimer Why do you hate? 4 Reasons For Tracking TradiFonal reasons for tracking
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
Leveraging SAML for Federated Single Sign-on:
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
Information Security Group Active-client based identity management
Active-client based identity management Chris Mitchell Royal Holloway, University of London www.chrismitchell.net 1 Acknowledgements This is joint work with Haitham Al-Sinani, also of Royal Holloway. 2
Barry L. Zimmerman, Director Ventura County Human Services Agency
Barry L. Zimmerman, Director Ventura County Human Services Agency Introducing Foster Health Link Caregiver participation in focus groups and system testing prior to implementation Targeted communication
CUSTOMER Android for Work Quick Start Guide
Mobile Secure Cloud Edition Document Version: 1.0 2016-01-25 CUSTOMER Content 1 Introduction to Android for Work.... 3 2 Prerequisites....4 3 Setting up Android for Work (Afaria)....5 4 Setting up Android
Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft
Finding and Preventing Cross- Site Request Forgery Tom Gallagher Security Test Lead, Microsoft Agenda Quick reminder of how HTML forms work How cross-site request forgery (CSRF) attack works Obstacles
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Axway API Gateway. Version 7.4.1
O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1
CLAIMS-BASED IDENTITY FOR WINDOWS
CLAIMS-BASED IDENTITY FOR WINDOWS TECHNOLOGIES AND SCENARIOS DAVID CHAPPELL FEBRUARY 2011 SPONSORED BY MICROSOFT CORPORATION CONTENTS Understanding Claims-Based Identity... 3 The Problem: Working with
Server based signature service. Overview
1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...
Single Sign-On for the Internet: A Security Story. Eugene Tsyrklevich [email protected] Vlad Tsyrklevich [email protected]
Single Sign-On for the Internet: A Security Story Eugene Tsyrklevich [email protected] Vlad Tsyrklevich [email protected] BlackHat USA, Las Vegas 2007 Introduction With the explosion of Web 2.0 technology,
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0)
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0) July 2015 Oracle API Gateway OAuth User Guide, 11g Release 2 (11.1.2.4.0) Copyright 1999, 2015, Oracle and/or its
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE SAML 2.0 CONFIGURATION GUIDE Roy Heaton David Pham-Van Version 1.1 Published March 23, 2015 This document describes how to configure OVD to use SAML 2.0 for user
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Summer 15 @salesforcedocs Last updated: July 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh
Web applications Web security: web basics Myrto Arapinis School of Informatics University of Edinburgh HTTP March 19, 2015 Client Server Database (HTML, JavaScript) (PHP) (SQL) 1 / 24 2 / 24 URLs HTTP
Recent Advances in Web Application Security
Recent Advances in Web Application Security Author: Neelay S Shah Principal Security Consultant Foundstone Professional Services Table of Contents Introduction 3 Content Security Policy 3 Best Practices
Securing End-to-End Internet communications using DANE protocol
Securing End-to-End Internet communications using DANE protocol Today, the Internet is used by nearly.5 billion people to communicate, provide/get information. When the communication involves sensitive
WebRTC: Why You Should Care and How Avaya Can Help You. Joel Ezell Lead Architect, Collaboration Environment R&D
WebRTC: Why You Should Care and How Can Help You Joel Ezell Lead Architect, Collaboration Environment R&D What is WebRTC? A set of standards being defined by the IETF (protocols) and the W3C (JavaScript
Implementing Identity Provider on Mobile Phone
Implementing Identity Provider on Mobile Phone Tsuyoshi Abe, Hiroki Itoh, and Kenji Takahashi NTT Information Sharing Platform Laboratories, NTT Corporation 3-9-11 Midoricho, Musashino-shi, Tokyo 180-8585,
Proto Balance SSL TLS Off-Loading, Load Balancing. User Manual - SSL. http://www.protonet.co.za/
Proto Balance SSL TLS Off-Loading, Load Balancing http://www.protonet.co.za/ User Manual - SSL Copyright c 2003-2010 Shine The Way 238 CC. All rights reserved. March 13, 2010 Contents 1. Introduction........................................................................
White Paper: Multi-Factor Authentication Platform
White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all
Single Sign-On Implementation Guide
Version 27.0: Spring 13 Single Sign-On Implementation Guide Last updated: February 1, 2013 Copyright 2000 2013 salesforce.com, inc. All rights reserved. Salesforce.com is a registered trademark of salesforce.com,
ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER
M-FILES CORPORATION ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER VERSION 2.3 DECEMBER 18, 2015 Page 1 of 15 CONTENTS 1. Version history... 3 2. Overview... 3 2.1. System Requirements... 3 3. Network
WebCallerID: Leveraging cellular networks for Web authentication
Journal of Computer Security 19 (2011) 869 893 869 DOI 10.3233/JCS-2011-0424 IOS Press WebCallerID: Leveraging cellular networks for Web authentication Francis Hsu a, Hao Chen a, and Sridhar Machiraju
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements
Joint White Paper: Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements Submitted Date: April 10, 2013 Submitted
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Online Data Services. Security Guidelines. Online Data Services by Esri UK. Security Best Practice
Online Data Services Security Guidelines Online Data Services by Esri UK Security Best Practice 28 November 2014 Contents Contents... 1 1. Introduction... 2 2. Data Service Accounts, Security and Fair
How To Manage Your Web 2.0 Account On A Single Sign On On A Pc Or Mac Or Ipad (For A Free) On A Password Protected Computer (For Free) (For An Ipad) (Free) (Unhack)
Single Sign-On for the Internet: A Security Story [email protected] [email protected] BlackHat USA, Las Vegas 2007 How do you manage your 169 Web 2.0 accounts today? Does your SSO consist of A login
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Logout Support on SP and Application
Logout Support on SP and application Logout Support on SP and Application Possibilities and and Limitations SWITCHaai Team [email protected] Single Logout: Is it possible? Single Logout will work only in some
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
Secure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
