Information Security Group Active-client based identity management
|
|
|
- Aleesha Hampton
- 10 years ago
- Views:
Transcription
1 Active-client based identity management Chris Mitchell Royal Holloway, University of London 1
2 Acknowledgements This is joint work with Haitham Al-Sinani, also of Royal Holloway. 2
3 Agenda Introduction A problem not another new protocol Active-client identity management A solution not another new protocol! Mappings to specific systems Other functionality Concluding remarks 3
4 User authentication The need for authentication of human users is a fundamental security requirement (perhaps the fundamental requirement). Despite its importance, it is almost universally acknowledged that providing user authentication remains a huge practical problem. 4
5 Context Identity management within an organisation (or, more generally, in a managed environment) is, to a large extent, a solved problem. In Windows, for example, Active Directory provides identity management functionality. The focus here is on identity management for the unmanaged Internet end user (e.g. you or me at home). With the growth in mobile Internet access via a range of devices, this is a problem of ever-increasing importance. 5
6 Passwords In practice, as many observers have noted, we are still using passwords for almost everything. Again, as widely acknowledged, the use of passwords has many shortcomings, not least because users today have so many Internet relationships, all needing authentication. In such a context, password re-use and use of weak passwords are almost inevitable. 6
7 Solutions Usual approach to this problem is to propose yet another new way of doing user authentication, e.g. using a cryptographic protocol. However, perhaps there are already enough good technological solutions? Maybe the problem is adoption of the solutions we already have? How do we fix this? Of course, this is partly a business case and sociological issue, but maybe it is also a problem which requires new technical thinking? 7
8 New thinking required It is easy for those of us doing technical research to claim that this is not our problem. We provide the technology and the commercial world should just get on with it. However, life is not so simple. We as academics should be thinking about how to devise technological solutions which are easier to adopt. Key issues for easy adoption are transparency, ease of use, and backwards compatibility. 8
9 Identity management Identity management systems have been designed to simplify user authentication. Such a system enables an Identity Provider (IdP) to support authentication of a User (and assertion of user attributes) to a Service Provider (SP). Recent years have seen the emergence of a wide range of such systems, e.g. OpenID, Liberty, Shibboleth, CardSpace and OAuth. Each has its own set of protocols governing communications between the main parties. 9
10 Infrastructure support As well as its own protocols, each system may also have a unique supporting infrastructure, including public key certificates, shared keys, passwords, etc. Some systems have gained traction recently, e.g. Facebook s adoption of OAuth (Facebook Connect), and significant use of OpenID. However, the systems that have been most widely used are also those which have the most significant problems (e.g. phishing vulnerabilities). 10
11 Agenda Introduction A problem not another new protocol Active-client identity management A solution not another new protocol! Mappings to specific systems Other functionality Concluding remarks 11
12 Well known problems We start by reviewing some of the well known problems with existing authentication solutions. These problems apply very broadly. 12
13 The phishing threat Many identity management systems are susceptible to phishing attacks, in which a malicious (or fake) SP redirects a user browser to a fake IdP. The user then reveals to the fake IdP secrets that are shared with a genuine IdP. This arises because, in the absence of a system-aware client agent, schemes rely on browser redirects. 13
14 Lack of consistency One huge problem faced by any user is that the user experience of every identity management system is different. We all know that users fail to make good security decisions, even when confronted with relatively simple decisions. The lack of consistency is likely to make the situation much worse, with users simply not understanding the complex privacy- and security-relevant decisions they are being asked to make. 14
15 Privacy When using third party IdPs which provide assertions about user attributes, there is a danger that a user will damage their privacy by revealing attributes, i.e. Personally Identifiable Information (PII), unintentionally to an SP. This is a threat when using systems like OAuth (e.g. as instantiated by Facebook Connect). In general, getting privacy settings right is highly non-trivial. 15
16 Another new infrastructure? It is tempting to try to devise another new scheme which has the practical advantages of OAuth and OpenID, but yet provides robust protection against phishing and privacy loss. That is, devise a client-based scheme with the user convenience of other systems, but which somehow avoids the fate of CardSpace. 16
17 Problems However, it seems that a new solution is: unlikely to succeed when others (some with a great deal of inertia and incorporating very nice features, e.g. CardSpace) have failed; likely to create yet another different user experience, increasing the likelihood of serious mistakes. Thus maybe this is not the right approach. 17
18 A new approach? The goal of this talk is to consider a new approach to the problem. It does not involve proposing any new protocols or infrastructures. The goal is to try to make it easier to use existing systems, and also to make their use more secure (less prone to phishing) and privacy-enhancing (consistent interface and explicit user consent). 18
19 Agenda Introduction A problem not another new protocol Active-client identity management A solution not another new protocol! Mappings to specific systems Other functionality Concluding remarks 19
20 Active and passive clients Identity management systems can be divided into two broad classes: passive-client systems (e.g. OpenID), which assume only that the client system has a browser; active-client systems (e.g. CardSpace), where special software must be installed on the client to support the identity management system. 20
21 Active-client systems Here a browser incorporates an active client, which acts as an intermediary between SPs and IdPs, and is aware of the identity system. All SP-IdP communications involve this active client. The active client might prompt the user to select a digital identity, choose an IdP, review an identity token created by the IdP, and/or approve a transaction. Phishing attacks are mitigated. The active client can also give a consistent user experience and a greater degree of user control. Examples include CardSpace and Liberty (when using a Liberty-enabled client (LEC)). 21
22 Passive-client systems In such a scheme, the browser is HTTPredirected by an SP to an IdP (and vice versa). No direct client control over site with which it is communicating. A major disadvantage is that a malicious SP (e.g. a phishing site) can redirect the browser to a fake IdP (e.g. to fraudulently obtain user credentials). Examples include OpenID, Liberty (browser-post profile), Shibboleth, and Facebook Connect (OAuth). 22
23 Agenda Introduction A problem not another new protocol Active-client identity management A solution not another new protocol! Mappings to specific systems Other functionality Concluding remarks 23
24 A universal active-client solution The scheme we propose involves an activeclient user agent. This is a single tool which supports a wide range of ID management systems yet provides a single interface to the user. The consistent user interface should maximise user understanding of what is happening (and reduce risk of errors). It also avoids the need for passive browser redirects, hence mitigating phishing attacks. 24
25 Motivation for scheme One motivation for the scheme comes from considering CardSpace (and its open source twin, Higgins). Before proceeding we thus need to spend a bit of time describing CardSpace. 25
26 CardSpace: a brief description CardSpace acts as client-based agent, and provides a consistent card-based user interface. That is, sets of user credentials (relationships with IdPs) are represented to users as cards. CardSpace also defines a set of protocols for interactions between IdPs, Clients (user machines) and SPs. 26
27 CardSpace operation The user, interacting with the browser via the identity selector, may have identities issued by one or more IdPs. Each identity is represented by an InfoCard held by the identity selector, and this InfoCard is the means by which the user interacts with the identity selector to choose which identity to use. Each IdP runs a Security Token Service (STS), to generate security tokens. A Self-issued Identity Provider may be provided by a client platform to allow use of self-issued tokens. 27
28 CardSpace Identity Selector 28
29 CardSpace architecture 29
30 CardSpace interaction model 30
31 Operation I 1. Service requester gets the security policy of the target service. We suppose that the policy requires the requester to get a token issued by an IdP s STS. 2. (optional) The service requester gets the policy of the authentication/authorisation STS (to determine properties of required token). 3. The requester asks the identity selector to provide a security token meeting the policy of the target service. 4. The identity selector first gets the user to choose an InfoCard capable of meeting the target service requirements, and then gets the policy of the selected IdP s STS. 31
32 Operation II 5. The InfoCard indicates the method to be used to authenticate the user to the IdP STS; the user sends an appropriate credential to the IdP STS, and the identity selector gets back a token. 6. The token is given to the service requester. 7. (optional) The service requester presents the token to the STS, which generates a token for the target service. 8. The service requester presents the token to the target service to get access. 32
33 User authentication Before issuing a token, an IdP will typically need to authenticate the user. This user authentication takes place via the local CardSpace software Two key advantages: provides consistent user experience; limits possibility of phishing attacks. 33
34 An observation The user interface of CardSpace and the underlying communications protocols are not inherently tied together. Why not keep the simple/intuitive user interface, and use it as the front end for a tool which manages user credentials in a consistent way regardless of the underlying identity management system? 34
35 An observation (continued) Credential sets could identify with which identity management system (or systems) they should be used. For example, each credential set could be stored as a self-describing XML document. Indeed, these credential sets could include username/password pairs. 35
36 A universal client adapter We now describe our scheme, called IDSpace (in homage to role CardSpace played in developing the idea). IDSpace has two main components a browser plugin (the IDSpace extension) and a separate piece of software (the IDSpace client software). Both execute on the user platform. 36
37 IDSpace high level architecture 37
38 IDSpace components The IDSpace system possesses a number of components, as shown on the next slide: Card Selector: presents a card-based interface to user to enable choice of IdP and credentials; ccard store: stores credential cards (ccards) containing credential info (used by Card Selector); Credential store: separate secure storage for keys, passwords, attributes, etc., associated with ccards; Kernel: core component controlling system operation; Page Scanner: scans web pages; Activator: activates the Card Selector. 38
39 IDSpace client architecture 39
40 Sketch of protocol I The IDSpace works as follows. 1. User browses an SP login page. 2. The IDSpace Page Scanner examines the page to see which identity systems are supported. 3. The user is offered a choice (e.g. via right clicking) of systems to use. [There are many options for implementing this step.] 4. The IDSpace Activator activates the IDSpace Card Selector. 40
41 Sketch of protocol II 5. The IDSpace Data Transporter passes metadata (e.g. selected identity system, SP identity, SP policy) to the IDSpace Kernel. 6. The Kernel interacts with the Card Selector, which allows the user to choose a ccard (and possibly an identity system). 7. The Kernel interacts with the selected IdP to obtain a token for use by the SP. If necessary the IdP authenticates the user via the Card Selector. 8. The Token Displayer asks the user for permission to send the token to the SP. 41
42 User experience The user interacts with a single piece of software (the Card Selector) regardless of which underlying system is in use. This enables the user to use a single simple interface to: choose (and manage) credentials; be authenticated to an IdP; give consent for release of PII to an SP. 42
43 Agenda Introduction A problem not another new protocol Active-client identity management A solution not another new protocol! Mappings to specific systems Other functionality Concluding remarks 43
44 Mappings Each identity system operates differently, and hence each system maps slightly differently onto IDSpace. Main relevant characteristic is whether an identity system is: passive-client based, or active-client based. We look at these two cases. 44
45 Role of IDSpace (active-client case) In such a case the IDSpace client software plays the role of the active client. IDSpace acts as a type of universal client, integrating the various systems and handling credential information and user authentication in a unified and consistent way. Thus, for example, IDSpace can transparently replace the Microsoft CardSpace software. 45
46 Role of IDSpace (passive-client case) The IDSpace client software essentially converts a passive-client (redirect-based) system into an active-client system. Redirects are no longer under the control of the SP (and IdP). The IDSpace client also manages authentication of the user to the IdP. The operation of IDSpace is completely transparent to the IdP and SP. 46
47 Features Regardless of the ID system protocols supported by the SP and IdP, IDSpace is transparent to both parties. That is, no parties (except the user who installs and uses the software) need to be aware of its presence. As long as the SP and IdP share at least one identity system, then IDSpace operation is possible. 47
48 Agenda Introduction A problem not another new protocol Active-client identity management A solution not another new protocol! Mappings to specific systems Other functionality Concluding remarks 48
49 Password management Password managers are commonplace. However, apart from schemes built into browsers, they do not appear to be widely used. PassCard is a browser-plugin-based scheme we have described previously which allows CardSpace to be used as a password manager. The idea behind PassCard could readily be extended to allow IDSpace to provide password management facilities (with username/password pairs being represented as ccards). 49
50 Moving into the cloud Cloud-based identity management systems offer some advantages over client-based schemes (not least portability). Indeed, cloud-based variants of CardSpace have been proposed in which InfoCards are cloud-based. One possible extension of IDSpace would be to make it cloud-based. 50
51 Identity system interoperation In other work, we have proposed and prototyped a series of client-based (browser plug-in based) schemes to support interoperation between an IdP and an SP supporting different identity systems. This functionality could also be supported by an IDSpace client. 51
52 Role of client agents IDSpace is just one example of the potential power of a client-based security agent. There are many other ways in which clienthosted software might be used to assist users in making difficult security-relevant decisions when using Internet services. Indeed, this paper is really intended to encourage the research community to think more about using client-based schemes to improve user security. 52
53 IDSpace the bigger picture Thanks to David Hollands for this picture 53
54 Agenda Introduction A problem not another new protocol Active-client identity management A solution not another new protocol! Mappings to specific systems Other functionality Concluding remarks 54
55 IDSpace works! A preliminary prototype of IDSpace has recently been built by my co-author (Haitham Al-Sinani), and is still under development. Unfortunately it is not yet in a demonstrable state. However, we soon hope to make available a usable prototype. 55
56 Related work Copies of published papers on PassCard and the various identity management interoperation schemes can be found on my home page: Many are also available as RHUL technical reports: 56
57 Questions? For further information please contact: Haitham Al-Sinani Chris Mitchell Address: Information Security Group Royal Holloway University of London Egham TW20 0EX UK 57
Addressing threats to real-world identity management systems
Addressing threats to real-world identity management systems Wanpeng Li and Chris J Mitchell Information Security Group Royal Holloway, University of London Agenda Single sign-on and identity management
Negotiating Trust in Identity Metasystem
Negotiating Trust in Identity Metasystem Mehmud Abliz Department of Computer Science University of Pittsburgh Pittsburgh, Pennsylvania 15260 [email protected] Abstract Many federated identity management
PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN
PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN CONNECTING TO THE CLOUD DAVID CHAPPELL DECEMBER 2009 SPONSORED BY AMAZON AND MICROSOFT CORPORATION CONTENTS The Challenge:
On the Application of Trust and Reputation Management and User-centric Techniques for Identity Management Systems
On the Application of Trust and Reputation Management and User-centric Techniques for Identity Management Systems Ginés Dólera Tormo Security Group NEC Laboratories Europe Email: [email protected]
Privacy in Cloud Computing Through Identity Management
Privacy in Cloud Computing Through Identity Management Bharat Bhargava 1, Noopur Singh 2, Asher Sinclair 3 1 Computer Science, Purdue University 2 Electrical and Computer Engineering, Purdue University
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
Adding Federated Identity Management to OpenStack
Adding Federated Identity Management to OpenStack David Chadwick University of Kent 3 December 2012 University of Kent 1 Some Definitions What is Identity? A whole set of attributes that in combination
An Anti-Phishing mechanism for Single Sign-On based on QR-Code
An Anti-Phishing mechanism for Single Sign-On based on QR-Code Syamantak Mukhopadhyay School of Electronics and Computer Science University of Southampton Southampton, UK [email protected] David
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
SAML and OAUTH comparison
SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, [email protected], twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single
An Efficient Windows Cardspace identity Management Technique in Cloud Computing
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. VII (May-Jun. 2014), PP 61-66 An Efficient Windows Cardspace identity Management Technique
Identity Management in Telcos. Jörg Heuer, Deutsche Telekom AG, Laboratories. Munich, April 2008
Identity Management in Telcos Jörg Heuer, Deutsche Telekom AG, Laboratories. Munich, April 2008 1 Agenda. Introduction User-centric Identity and Telcos Comprehensive Identity Models IDM Reference Architecture
CLAIMS-BASED IDENTITY FOR WINDOWS
CLAIMS-BASED IDENTITY FOR WINDOWS TECHNOLOGIES AND SCENARIOS DAVID CHAPPELL FEBRUARY 2011 SPONSORED BY MICROSOFT CORPORATION CONTENTS Understanding Claims-Based Identity... 3 The Problem: Working with
OpenID and identity management in consumer services on the Internet
OpenID and identity management in consumer services on the Internet Kari Helenius Helsinki University of Technology [email protected] Abstract With new services emerging on the Internet daily, users need
QR-SSO : Towards a QR-Code based Single Sign-On system
QR-SSO : Towards a QR-Code based Single Sign-On system Syamantak Mukhopadhyay School of Electronics and Computer Science University of Southampton Southampton, UK [email protected] David Argles School
Implementing two-factor authentication: Google s experiences. Cem Paya ([email protected]) Information Security Team Google Inc.
Implementing two-factor authentication: Google s experiences Cem Paya ([email protected]) Information Security Team Google Inc. Google services and personalization Identity management at Google 1. Internal
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
A Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
Swivel Secure and the Cloud
Swivel Secure and the Cloud Authentication for Cloud Application Abstract This document describes the issues relating to authenticating to cloud applications and how the Swivel authentication platform
This way, Bluewin will be able to offer single sign-on for service providers within the circle.
Clareity Security and The National Association of Realtors Develop a SAML Toolkit for the Real Estate Industry Ask any REALTOR about the systems they use and the passwords they deploy. The word mess will
Microsoft.NET Passport, a solution of single sign on
Microsoft.NET Passport, a solution of single sign on Zheng Liu Department of Computer Science University of Auckland [email protected] Abstract: As the World Wide Web grows rapidly, accessing web-based
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
An Identity Management Survey. on Cloud Computing
Int. Journal of Computing and Optimization, Vol. 1, 2014, no. 2, 63-71 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijco.2014.458 An Identity Management Survey on Cloud Computing Ardi BENUSI
Lecture Notes for Advanced Web Security 2015
Lecture Notes for Advanced Web Security 2015 Part 6 Web Based Single Sign-On and Access Control Martin Hell 1 Introduction Letting users use information from one website on another website can in many
Privacy and Practicality of Identity Management Systems
Privacy and Practicality of Identity Management Systems Waleed A Alrodhan Technical Report RHUL MA 2010 14 17 November 2010 Department of Mathematics Royal Holloway, University of London Egham, Surrey
A Taxonomy of Single Sign-On Systems
A Taxonomy of Single Sign-On Systems Andreas Pashalidis and Chris J. Mitchell Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom {A.Pashalidis, C.Mitchell}@rhul.ac.uk http://www.isg.rhul.ac.uk
How to create a SP and a IDP which are visible across tenant space via Config files in IS
How to create a SP and a IDP which are visible across tenant space via Config files in IS This Documentation is explaining the way to create a SP and IDP which works are visible to all the tenant domains.
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the
White Paper. What is an Identity Provider, and Why Should My Organization Become One?
White Paper What is an Identity Provider, and Why Should My Organization Become One? May 2015 Executive Overview Tame Access Control Security Risks: Become an Identity Provider (IdP) Organizations today
MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION A SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PAIRED WITH THE FACT THAT THREATS
OpenLogin: PTA, SAML, and OAuth/OpenID
OpenLogin: PTA, SAML, and OAuth/OpenID Ernie Turner Chris Fellows RightNow Technologies, Inc. Why should you care about these features? Why should you care about these features? Because users hate creating
Identity Federation Broker for Service Cloud
2010 International Conference on Sciences Identity Federation Broker for Cloud He Yuan Huang 1, Bin Wang 1, Xiao Xi Liu 1, Jing Min Xu 1 1 IBM Research China {huanghey, wangbcrl, liuxx, xujingm}@cn.ibm.com
Mobile Security. Policies, Standards, Frameworks, Guidelines
Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf
Getting Started with AD/LDAP SSO
Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories
Comparing Identity Management Frameworks in a Business Context
Comparing Identity Management Frameworks in a Business Context Jaap-Henk Hoepman, Rieks Joosten, and Johanneke Siljee [email protected], [email protected], [email protected] TNO, the Netherlands
Cloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
OAuth Web Authorization Protocol Barry Leiba
www.computer.org/internet computing OAuth Web Authorization Protocol Barry Leiba Vol. 16, No. 1 January/February, 2012 This material is presented to ensure timely dissemination of scholarly and technical
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015
Federation At Fermilab Al Lilianstrom National Laboratories Information Technology Summit May 2015 About Fermilab Since 1967, Fermilab has worked to answer fundamental questions and enhance our understanding
SECUREAUTH IDP AND OFFICE 365
WHITEPAPER SECUREAUTH IDP AND OFFICE 365 STRONG AUTHENTICATION AND SINGLE SIGN-ON FOR THE CLOUD-BASED OFFICE SUITE EXECUTIVE OVERVIEW As more and more enterprises move to the cloud, it makes sense that
IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
Logout in Single Sign-on Systems
Logout in Single Sign-on Systems Sanna Suoranta, Asko Tontti, Joonas Ruuskanen, Tuomas Aura IFIP IDMAN, London, UK, 8-9.4.2013 Logout in Single Sign-on Systems Motivation Single sign-on (SSO) systems SSO
Economics of Identity Management Systems - Towards an Economically Adaptive User-Centric IdMS. Mohammed H. Almeshekah
Economics of Identity Management Systems - Towards an Economically Adaptive User-Centric IdMS Mohammed H. Almeshekah Supervisor: Dr. Geraint Price Submitted as part of the requirements for the award of
Final Project Report December 9, 2012. Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540
Final Project Report December 9, 2012 Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540 CONTENTS Project Proposal... 4 Project title... 4 Faculty Advisor... 4 Introduction...
Single Sign-On for the Internet: A Security Story. Eugene Tsyrklevich [email protected] Vlad Tsyrklevich [email protected]
Single Sign-On for the Internet: A Security Story Eugene Tsyrklevich [email protected] Vlad Tsyrklevich [email protected] BlackHat USA, Las Vegas 2007 Introduction With the explosion of Web 2.0 technology,
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
Digital Identity Management
Digital Identity Management Roohul Halim Syed Atif Shaharyar Email: {rooha433, syesh740}@student.liu.se Supervisor: Anna Vapen, {[email protected]} Project Report for Information Security Course Linköpings
An Infocard-based proposal for unified SSO to eduroam
An Infocard-based proposal for unified SSO to eduroam Enrique de la Hoz, Antonio García, Diego López, Samuel Muñoz University of Alcala (Spain), RedIRIS (Spain) TNC2009, Málaga (Spain), June 9 th 2009
Alternative authentication what does it really provide?
Alternative authentication what does it really provide? Steve Pannifer Consult Hyperion Tweed House 12 The Mount Guildford GU2 4HN UK [email protected] Abstract In recent years many new technologies
The Primer: Nuts and Bolts of Federated Identity Management
The Primer: Nuts and Bolts of Federated Identity Management Executive Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities.
The Devil is Phishing: Rethinking Web Single Sign On Systems Security. Chuan Yue USENIX Workshop on Large Scale Exploits
The Devil is Phishing: Rethinking Web Single Sign On Systems Security Chuan Yue USENIX Workshop on Large Scale Exploits and Emergent Threats (LEET 2013) Web Single Sign On (SSO) systems Sign in multiple
SWIFT: Advanced identity management
SWIFT: Advanced identity management Elena Torroglosa, Alejandro Pérez, Gabriel López, Antonio F. Gómez-Skarmeta and Oscar Cánovas Department of Information and Communications Engineering University of
OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900
OAuth 2.0 Developers Guide Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 Table of Contents Contents TABLE OF CONTENTS... 2 ABOUT THIS DOCUMENT... 3 GETTING STARTED... 4
The Password Problem Will Only Get Worse
The Password Problem Will Only Get Worse New technology for proving who we are Isaac Potoczny-Jones Galois & SEQRD [email protected] @SyntaxPolice Goals & Talk outline Update the group on authentication
Global Identity Management of Virtual Machines Based on Remote Secure Elements
Global Identity Management of Virtual Machines Based on Remote Secure Elements Hassane Aissaoui, P. Urien, Guy Pujolle To cite this version: Hassane Aissaoui, P. Urien, Guy Pujolle. Global Identity Management
Symplified I: Windows User Identity. Matthew McNew and Lex Hubbard
Symplified I: Windows User Identity Matthew McNew and Lex Hubbard Table of Contents Abstract 1 Introduction to the Project 2 Project Description 2 Requirements Specification 2 Functional Requirements 2
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation Approved for Public Release Distribution Unlimited 13-1871 2013 The MITRE Corporation All Rights Reserved } OpenID Connect and OAuth2 protocol
Windows Phone 8 Security Overview
Windows Phone 8 Security Overview This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows Phone 8 and understand how it can play a role in their organizations.
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
How To Secure Cloud Computing
Next Generation Cloud Computing Issues and Solutions Jeon SeungHwan 1, Yvette E. Gelogo 1 and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeong-dong, Daeduk-gu, Daejeon,
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
X Series Application Note 43:
X Series Application Note 43: Using the Remote Viewing & Web Pages of the X - Series & GR Series Recorders The Remote Viewing function of the X-Series and GR Series Recorders provide the user with the
Can We Reconstruct How Identity is Managed on the Internet?
Can We Reconstruct How Identity is Managed on the Internet? Merritt Maxim February 29, 2012 Session ID: STAR 202 Session Classification: Intermediate Session abstract Session Learning Objectives: Understand
Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm
Error oracle attacks and CBC encryption Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm Agenda 1. Introduction 2. CBC mode 3. Error oracles 4. Example 1 5. Example 2 6. Example 3 7. Stream ciphers
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com
User Identity and Authentication
User Identity and Authentication WordPress, 2FA, and Single Sign-On Isaac Potoczny-Jones [email protected] http://tozny.com About the Speaker Galois, Inc. - @galoisinc. Research & Development for computer
Extending DigiD to the Private Sector (DigiD-2)
TECHNISCHE UNIVERSITEIT EINDHOVEN Department of Mathematics and Computer Science MASTER S THESIS Extending DigiD to the Private Sector (DigiD-2) By Giorgi Moniava Supervisors: Eric Verheul (RU, PwC) L.A.M.
Designing federated identity management architectures for addressing the recent attacks against online financial transactions.
Designing federated identity management architectures for addressing the recent attacks against online financial transactions. Dr. Christos K. Dimitriadis Security Officer INTRALOT S.A. Scope and Agenda
