An SAML Based SSO Architecture for Secure Data Exchange between User and OSS
|
|
|
- Dylan Hodge
- 9 years ago
- Views:
Transcription
1 An SAML Based SSO Architecture for Secure Data Exchange between User and OSS Myungsoo Kang 1, Choong Seon Hong 1,Hee Jung Koo 1, Gil Haeng Lee 2 1 Department of Computer Engineering, Kyung Hee University 2 Electroncs and Telecommunications Research Institute [email protected], [email protected], [email protected] and [email protected] Abstract Due to the extensive use of e-commerce or other network applications through the internet, a great magnitude of attention has been paid to information security issue. Albeit existing SSL based transmission is unbefitting for the applications which require partial encryption of data. Also the PKI based service is very complex due to its structure and code and requires much cost and effort during test. Considering the above facts, we use SAML (Security Assertion Markup Language) based XML which provide 'Single Sign On' between businesses. XML based technology can encrypt part of data or entire data and then transmit to the end receiver and exchange the data easily between systems due to its simple structure. We designed an authentication system which can exchange the security information between user and OSS in VPN. We tested, analyzed and compared the performance of each authentication system using assertion and artifact. 608
2 Introduction Information Security Techniques: Password Authentication. Public Key Infrastructure. PKI based service is very complex due to its structure and code and requires much cost. Secure Socket Layer Unbefitting for the applications which require partial encryption of data.. XML based services. Discovered for more robust and penetration free communication. Suggested Technique: SAML (Security Assertion Markup Language) Provides more secure Single Sign On (SSO) between businesses. Allow dealer to exchange information about Authentication,Authorizat ion and Profile. 1. Introduction Due to the extensive use of e-commerce or other network applications through the internet, a great magnitude of attention has been paid to information security issue. Security techniques commenced with authentication (password) and then Public Key Infrastructure, Secure Socket Layer and today's XML based security service are discovered for more robust and penetration free communication. Albeit existing SSL based transmission is suitable for applications which require encryption of whole data but is unbefitting for the applications which require partial encryption of data. Also the PKI based service is very complex due to its structure and code and requires much cost and effort during test. On the contrary, XML based technology can encrypt part of data or entire data and then transmit to the end receiver and exchange the data easily between systems due to its simple structure. Considering the above facts, we use SAML (Security Assertion Markup La nguage) which provide 'single sign-on (SSO)' between businesses and can all ow for a dealer to exchange the information about the authentication, authoriz ation and profile. SAML provide SSO between businesses and more secure S SO service as compared with existing authentication system. In session 2, we explained about structure of SAML and authentication sce nario. Also we spoke about concept of SSO. In session 3, we defined about m odel of SSO authentication system. Also we proposed a process about SSO in VPN and SSO service using SAML assertion, artifact. And then we tested per formance through simulation in session 4. Finally in session 5, we related to c onclusion and future work. 609
3 Related Work To define how the SAML assertion is inserted/abstracte d in framework of message or protocol To define method for management for connecting request and response assertion (SOAP- HTTP method) Security Assertion Markup Language (SAML) Profile Binding Assertion Protocol Message form of XML, transmission about each assertion formed into a pair of response and request Authentication Assertion Certify successful authentication about request (publisher, information for request, time of occurrence) Attribute Assertion Verify qualification about request Authorization Assertion Decide access admission about resource which user requests. Browser Source site Destination site Step 1 Authentication based Assertion/ password Send response and Step Artifact 2 Redirect path to the destination With artifact Step 3 Send artifact to the destination site Step 4 request SAML Step 5 SAML response Step 6 Response to the browser Fig. 1. Structure of SAML Fig. 2. SAML Pull model 2. Related Work In this section, we talk about basic structure of SAML and assertion which do a duty of user identity. And we also relate about authentication scenario using previous things and then we dispose of basic structure and process about single sign-on. 2.1 Analysis of SAML structure Outline and Structure of SAML SAML is a XML (extensible Markup Language) based framework developed in OASIS (Organization for the Advancement of Structured Information Standards). SAML can let businesses exchange an authentication, authorization and profile information securely. [1] The advantage of SAML is: - It can use merits of XML because SAML is based on XML. - It can act as SSO using SAML - It can be used with protocols like ebxml, SOAP. Independent SAML (on platform) is organized by Assertion, Profile, Binding and Protocol Authentication Scenario using SAML One assertion is generated through source site (SS) when one user is certificated at first. It is generated into token format. When user access destination site (DS), DS doesn t ask user identification information but ask SS that information. At that time user sends to DS with token generated. An authentication model is divided into 2 models. : Pull and Push models In SAML Pull model, end host requests an assertion to SS. SS generates an artifact through an authentication and authorization process and then give it to user. When the user request a resource to another DS, SS sends to the user generated artifact and redirects a path to DS at once. DS gives artifact sent from the user to SS and then gets an assertion going for artifact. In SAML Push model, SS generates an assertion after authe/autho process. User requests resource of DS to SS. SS sends to the user assertion generated and redirects a path to DS at once. After DS gets the assertion from the user, DS can certificate user without special authe/autho process with SS. As above, an assertion has enough information which can certificate and authorize user s identification information. 610
4 Related Work (cont d) Fig. 3. An operation process of Single sign-on (1) Fig. 4. An operation process of Single Sign-on (2) Single Sign-on Scenario Single sign-on is special method which can use many sites using only one ID. It is developed because of businesses which manage many sites and need to manage each ID integrally. [3] An individual can use many sites comfortably through once, using only single authentication process, and a business can manage members integrally so it can maximize a marketing effect. (1)User access sp1(service provider 1) using URL. (2)Sp1 requests IdP(Id Provider) to certify user s identification. (3)IdP requests certification as redirection into login browser to the user. (4)User enters ID and password. (5)IdP certifies user based on user s identification and then give it to sp1. (6)Sp1 verifies the user based on identification sent. (7)Sp1 gives successful browser to the user who is verified. When previous user wants to use sp2 (service provider 2) s service again, an authentication process is composed following below: (1)User requests an access to sp2. (2)Sp2 requests user s information to the IdP. (3)IdP gets the requests from sp2 and then verifies based on session value. If so, IdP can know that the user was that one who has logged in sp1 before. Through this, IdP notifies sp2 that the user was verified. (4)Sp2 gets response from IdP and verifies that the user logged in previously to sp1. (5)Sp2 gives browser authentication to user and then the user can user service. 611
5 Proposed Scheme Fig. 5. An operation process of Single Sign-on in VPN (1) Fig. 6. An operation process of Single Sign-on in VPN (2) 3 Proposed Scheme In this session, we explain about structure of authentication system and parts of an each module. That authentication system provides single sign-on using SAML to exchange information securely between user and OSS (Operations Support System) with the emphasis on proposal. 3.1 SAML based Management System in VPN Fig.5 shows an authentication structure in VPN. Each different network is connected via backbone network. Both user and OSS give and take some information through VPN tunneling. The proposed authentication system can let both user and OSS certify with different VPN servers using only one ID under VPN. 3.2 Single Sign on Process in VPN The scenario of this paper is on requesting for a user to exchange information with OSS of a different network. A scenario of SSO authentication system in VPN is shown below in Fig.5: (1)A user is certified into VPN server to access specified OSS. (2)VPN server requests for a login server of VPN management system (VPN MS) to certify user. [2] (3)The login server requests an authentication to the user. (4)User gives ID and password to the login server. (5)Login server gets the information from the user and then verifies user through searching database. If the user verifies, login server notifies VPN server successful authentication. (6)VPN server gets response from login server and then notifies the user successful login. (7)After this process, user can exchange information with OSS through VPN tunneling. When the user exchanges information with OSS in different network, an authentication process is followed below (Fig.6): (1)User connects to VPN server to access specified OSS. Now the user can access with assertion received from VPN server. (2)VPN server requests an authentication to the login server of VPN MS. [4] (3) Login server knows that the user has been logged into other VPN server based on assertion received. So it notifies VPN server that user was verified without specified authentication process. (4)VPN server gets response from login server and then notifies the user successful login. (5)After that, user can connect to OSS through VPN tunneling. 612
6 Proposed Scheme (cont d) Fig. 7. Authentication System based on Assertion (1) Fig. 8. Authentication System based on Assertion (2) 3.3 The Single Sign on Process using Assertion in VPN There are two cases about a form of trading validation between server and client. One is a trade as generating assertion of document. Another thing is a method which trades small data called artifact like pointer. Fig.7 is about a part of a first authentication which takes charge of data exchange into VPN server between user and OSS. (1)User connects to VPN server for accessing to specified OSS as URL form at first. (2)VPN server requests validation about user to VPN MS and login server in VPN MS also requests login to the user. The login server generates an assertion through certification based on user s information. Login server stores this assertion or gives it to the user. After successful login, again, user attempt to access VPN server to connect to OSS in different network (Fig.8). (1)User requests connection to the VPN server to access other OSS as URL form. (2) VPN server shows a list of VPN servers, which are under the control of VPN MS, to the user. (3)User selects one VPN server which has been logged in previously. VPN server gets the data selected from the user. (4)VPN server on the left network sends a redirection message (to VPN server selected) to the user. User can see a browser which is from VPN server and has been logged in before. (5) VPN server on the right of network, requests to the user that he let the assertion to the VPN server on the left. User responses and then can get own assertion generated before. (6)After this, user passes over the assertion gotten from VPN server on the right side to the left VPN server. (7)VPN server certifies the user based on assertion gotten and then notifies him whether he is certified or not. As above, user can connect many OSSs through only one certification about VPN server without specified authentication process via a login server in VPN MS. 3.4 The Single Sign on Process using Artifact in VPN Next, we explain about an authentication process of system which provides single sign on using artifact. This process is the same partially but it is different that artifact is exchanged between businesses. A login server which gets from login data from user generates an assertion and artifact through certification. The artifact is data which has small thing like ID. It is similar to a pointer of assertion and transmitted by attached behind URL. Login server stores the assertion to the database and then gives the artifact to the user. When user connects to other OSS using artifact VPN server, it is also different compared to the case of assertion that user is certified. In 5th process of Fig. 7, the user who gets a redirection message from VPN server on the left side redirects to the right VPN server with artifact. The artifact is forwarded by including in URL at redirection. It is possible that user can be certified by sending artifact automatically to the VPN server without downloading assertion or submitting form data. Using this method, user can be certified and then connect data with OSS through VPN tunneling. 613
7 Proposed Scheme (cont d) Cookie check Cookie check Fig. 9. Internal structure of SAML based data transmission 3.5 SAML based Data-transmission Modules In the SAML based authentication system for single sign on in VPN, you can see internal structure about data transmission among VPN server, VPN client and VPN MS in Fig.9. User gives and takes some value like URL, ID/password, assertion/cookie etc. VPN MS has a login server and LDAP. The login server is composed of a SAML conversion module, a parsing module of SAML, a SSO module and a certification module. [5] A SAML conversion module takes charge of converting XML based data from outside into SAML based data. A parsing module of SAML performs a grammar test to certify converted SAML by using normal programming language. A SSO module has two modules: cookie test module and authentication module. Cookie test module classifies using this cookie whether parsed data is verified things or not. Also that module tests whether user has a session through login process before or not. A certification module authenticates user using his identification information, that is, assertion 614
8 Simulation and Analysis of Performance Table 1. Response time (second) classified by authentication method and users Fig. 10. Graph about response time according to 3 kinds of method We tested a SAML based authentication system proposed in this paper by installation in a following computing environment. - Computer environment: Compaq server 1.7GHz 256MB Redhat 9.0, Hancom Linux - Language: C -Web Server: Apache Installation:OPENSAML1.1/OPENSSL-0.9.7d/OPENLDAP/PUBCOOKIE We defined the time when user logged in OSS at first and then logged in another OSS using session and assertion, as response time (single sign on time). We measured and analyzed response time in case of two situation i.e. Non-SAML based system or SAML based system using assertion, artifact. We classified the number of user connecting to VPN server by 200, 400, 600, 800, 1000 and presented response time according to 3 methods in Table 1. In Table 1, a SAML based response time takes longer than Non-SAML based response time. This is because of a conversion of XML based data into SAML and parsing SAML based data. Among the results of SAML based measurement, an artifact based response time is less than an assertion based response time. This is because the assertion is a kind of XML based text file so this is large in quality than artifact. In Fig. 10, we can compare the difference of 3 kinds of authentication method each other. 615
9 Conclusion After analyzing current authentication system, we adopt SAML. SAML provides SSO between businesses and more secure SSO service as compared with existing authentication system. We discuss a design of an authentication system which can exchange the security information between user and OSS in VPN. For accessing OSS User is certified to VPN VPN server requests an authentication to VPN management system. After verifying, based on id and password it generates SAML assertion and sends it to the user. Then a user can access with assertion. VPN server verifies him on the basis of the assertion and then user is allowed the communication between the user and OSS. Linux based Compaq servers used for testing. We have analyzed and compared the performance of each authentication system using assertion and artifact. 5 Conclusion Due to the extensive use of e-commerce or other network applications through the internet, a great magnitude of attention has been paid to information security issue. Today's XML based security service are discovered for more robust and penetration free communication. XML based SAML can allow for a dealer to exchange the information about the authentication, authorization and profile. SAML provide SSO between businesses and more secure SSO service as compared with existing authentication system. It can use merits of XML because SAML is based on XML. In this paper, at first, we analyzed trend about existing authentication system and then adopted SAML into real system. We designed an authentication system which can exchange the security information between user and OSS in VPN. For accessing OSS, a user is certified through VPN at first. When user accesses VPN server, VPN server requests an authentication to the VPN management system by sending requirement message. The login server of VPN management system verify the user on the basis of id, password and then generate the SAML assertion. By transmitting the assertion to the user, verification is completed. After that, he can access with the assertion and VPN server verifies him on the basis of the assertion and then user is allowed the communication between the user and OSS. This project was tested in the Linux based Compaq servers by installing login server and application server. We have analyzed and compared the performance of each authentication system using assertion and artifact. 616
10 Acknowledgement : This work was supported by University ITRC of MIC References [1] Gross, T: Security analysis of the SAML single sign-on browser/artifact profile, Comput-er Security Applications Conference 2003, Proceedings. 19t h Annual, Pages: , 03 [2] Qiu Xuesong, Xiong Ao, Meng Luoming: The study and implementation the VPN service management system, Computers and Communications, Proceedings. ISCC Fifth IEEE Symposium on, Pages:66-71, 3-6 July 2000 [3] Gary Ellison, Jeff Hodges, Susan Landau: Security and Privacy Concerns of Internet Single Sign-On, Liberty v1.6, September 2002 [4] Miyoshi, J., Ishii, H.: Network-based single sign-on architecture for IP-V PN,Communications, Computers and signal Processing, PACRIM IEEE Pacific Rim Conference on, Pages: vol.1, Volume:1, Aug [5] Qiu Xuesong, Xiong Ao, Meng Luoming: The study and implementation the VPN service management system, Computers and Communications, Proceedings. ISCC Fifth IEEE Symposium on, Pages:66-71, 3-6 J uly
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
SAML Security Analysis. Huang Zheng Xiong Jiaxi Ren Sijun
SAML Security Analysis Huang Zheng Xiong Jiaxi Ren Sijun outline The intorduction of SAML SAML use case The manner of SAML working Security risks on SAML Security policy on SAML Summary my course report
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN 1 Venkadesh.M M.tech, Dr.A.Chandra Sekar M.E., Ph.d MISTE 2 1 ResearchScholar, Bharath University, Chennai 73, India. [email protected] 2 Professor-CSC
Authentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
Research and Implementation of Single Sign-On Mechanism for ASP Pattern *
Research and Implementation of Single Sign-On Mechanism for ASP Pattern * Bo Li, Sheng Ge, Tian-yu Wo, and Dian-fu Ma Computer Institute, BeiHang University, PO Box 9-32 Beijing 100083 Abstract Software
IBM WebSphere Application Server
IBM WebSphere Application Server SAML 2.0 web single-sign-on 2012 IBM Corporation This presentation describes support for SAML 2.0 web browser Single Sign On profile included in IBM WebSphere Application
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS
APPLICATION NOTE IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS SAML 2.0 combines encryption and digital signature verification across resources for a more
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
MONDESIR Eunice WEILL-TESSIER Pierre FEDERATED IDENTITY. ASR 2006/2007 Final Project. Supervisers: Maryline Maknavicius-Laurent, Guy Bernard
MONDESIR Eunice WEILL-TESSIER Pierre FEDERATED IDENTITY ASR 2006/2007 Final Project Supervisers: Maryline Maknavicius-Laurent, Guy Bernard Federated Identity Project topic Superviser: Maryline Maknavicius
Siebel CRM On Demand Single Sign-On. An Oracle White Paper December 2006
Siebel CRM On Demand Single Sign-On An Oracle White Paper December 2006 Siebel CRM On Demand Single Sign-On Introduction... 3 Single Sign-On with Siebel CRM On Demand... 4 Customer Requirements... 4 SSO
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
IT@Intel. Improving Security and Productivity through Federation and Single Sign-on
White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing
IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0
International Virtual Observatory Alliance IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 IVOA Proposed Recommendation 20151029 Working group http://www.ivoa.net/twiki/bin/view/ivoa/ivoagridandwebservices
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
IGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
SAML Authentication Quick Start Guide
SAML Authentication Quick Start Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved.
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
WebNow Single Sign-On Solutions
WebNow Single Sign-On Solutions Technical Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2015 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,
000-575. IBM Tivoli Federated Identity Manager V6.2.2 Implementation. Version: Demo. Page <<1/10>>
000-575 IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version: Demo Page 1.What is the default file name of the IBM Tivoli Directory Integrator log? A. tdi.log B. ibmdi.log C. ibmdisrv.log
How to Implement Enterprise SAML SSO
How to Implement Enterprise SSO THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY How to Implement Enterprise SSO Introduction Security Assertion Markup Language, or, provides numerous The advantages and
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
Trend of Federated Identity Management for Web Services
30 Trend of Federated Identity Management for Web Services Chulung Kim, Sangyong Han Abstract While Web service providers offer different approaches to implementing security, users of Web services demand
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
JVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
Get Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : C2150-575 Title : IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version : Demo 1.What is the default file name of the
Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML
Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML --------------------------------------------------------------------------------------------------------------------------- Contents Overview...
OIOSAML Rich Client to Browser Scenario Version 1.0
> OIOSAML Rich Client to Browser Scenario Version 1.0 Danish Agency for Digitization December 2011 Contents > 1 Introduction 4 1.1 Purpose 1.2 Background 4 4 2 Goals and Assumptions 5 3 Scenario Details
SAML AS AN SSO STANDARD FOR CUSTOMER IDENTITY MANAGEMENT. How to Create a Frictionless, Secure Customer Identity Management Strategy
SAML AS AN SSO STANDARD FOR CUSTOMER IDENTITY MANAGEMENT How to Create a Frictionless, Secure Customer Identity Management Strategy PART 1: WHAT IS SAML? SAML in Context Security Assertion Markup Language
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
2015-11-30. Web Based Single Sign-On and Access Control
0--0 Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
SAML and OAUTH comparison
SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, [email protected], twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single
CA Adapter. Installation and Configuration Guide for Windows. r2.2.9
CA Adapter Installation and Configuration Guide for Windows r2.2.9 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
PRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta
Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta Configuration Guide Product Release Document Revisions Published Date 1.0 1.0 May 2016 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
CBIO Security White Paper
One Canon Plaza Lake Success, NY 11042 www.ciis.canon.com CBIO Security White Paper Introduction to Canon Business Imaging Online Canon Business Imaging Online ( CBIO ) is a cloud platform for Canon s
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Operating Level Agreement for NYU Login Service
Operating Level Agreement for NYU Login Service This Operating Level Agreement (OLA) documents the agreement regarding support of Single Sign-On (SSO) services for a Partner Service, which has been integrated
HP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
SAML Federated Identity at OASIS
International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for
Securing Web Services With SAML
Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
PARTNER INTEGRATION GUIDE. Edition 1.0
PARTNER INTEGRATION GUIDE Edition 1.0 Last Revised December 11, 2014 Overview This document provides standards and guidance for USAA partners when considering integration with USAA. It is an overview of
OIO Web SSO Profile V2.0.5
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
TIB 2.0 Administration Functions Overview
TIB 2.0 Administration Functions Overview Table of Contents 1. INTRODUCTION 4 1.1. Purpose/Background 4 1.2. Definitions, Acronyms and Abbreviations 4 2. OVERVIEW 5 2.1. Overall Process Map 5 3. ADMINISTRATOR
SAML Authentication with BlackShield Cloud
SAML Authentication with BlackShield Cloud Powerful Authentication Management for Service Providers and Enterprises Version 3.1 Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCARD
OpenSSO: Cross Domain Single Sign On
OpenSSO: Cross Domain Single Sign On Version 0.1 History of versions Version Date Author(s) Changes 0.1 11/30/2006 Dennis Seah Contents Initial Draft. 1 Introduction 1 2 Single Domain Single Sign-On 2
How To Use Netiq Access Manager 4.0.1.1 (Netiq) On A Pc Or Mac Or Macbook Or Macode (For Pc Or Ipad) On Your Computer Or Ipa (For Mac) On An Ip
Setup Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
SAP NetWeaver AS Java
Chapter 75 Configuring SAP NetWeaver AS Java SAP NetWeaver Application Server ("AS") Java (Stack) is one of the two installation options of SAP NetWeaver AS. The other option is the ABAP Stack, which is
Identity Server Guide Access Manager 4.0
Identity Server Guide Access Manager 4.0 June 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]
A Data Synchronization based Single Sign-on Schema Supporting Heterogeneous Systems and Multi-Management Mode
A Data Synchronization based Single Sign-on Schema Supporting Heterogeneous Systems and Multi-Management Mode Haojiang Gao 1 Beijing Northking Technology Co.,Ltd Zhongguancun Haidian Science Park Postdoctoral
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO Scope... 2 Prerequisites Tasks... 2 Procedure... 2 Step 1: Configure EPM s WebLogic domain for SP Federation Services... 2 Step 2:
Single Sign On Integration Guide. Document version: 20.01.12
Single Sign On Integration Guide Document version: 20.01.12 Table of Contents About this document... 3 Purpose... 3 Target... 3 Support... 3 Overview... 4 SAML... 5 SAML in general... 5 How SAML is used
Implementing Identity Provider on Mobile Phone
Implementing Identity Provider on Mobile Phone Tsuyoshi Abe, Hiroki Itoh, and Kenji Takahashi NTT Information Sharing Platform Laboratories, NTT Corporation 3-9-11 Midoricho, Musashino-shi, Tokyo 180-8585,
Lecture Notes for Advanced Web Security 2015
Lecture Notes for Advanced Web Security 2015 Part 6 Web Based Single Sign-On and Access Control Martin Hell 1 Introduction Letting users use information from one website on another website can in many
Liberty Alliance. CSRF Review. .NET Passport Review. Kerberos Review. CPSC 328 Spring 2009
CSRF Review Liberty Alliance CPSC 328 Spring 2009 Quite similar, yet different from XSS Malicious script or link involved Exploits trust XSS - exploit user s trust in the site CSRF - exploit site s trust
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE Legal Marks No portion of this document may be reproduced or copied in any form, or by
Setup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
Symplified I: Windows User Identity. Matthew McNew and Lex Hubbard
Symplified I: Windows User Identity Matthew McNew and Lex Hubbard Table of Contents Abstract 1 Introduction to the Project 2 Project Description 2 Requirements Specification 2 Functional Requirements 2
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Secure Semantic Web Service Using SAML
Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA
Secure Data Transfer
Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol
SCAS: AN IMPROVED SINGLE SIGN-ON MODEL BASE ON CAS
SCAS: AN IMPROVED SINGLE SIGN-ON MODEL BASE ON CAS 1,2 XIANG LIYUN, 1 FANG ZHIYI, 1 SUN HONGYU 1 College of Computer Science and Technology, Jilin University, Changchun, China 2 Department of Computer
Design and Implementaion of a Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Grid and Web Services Security
Design and Implementaion of a Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Grid and Web Services Security Dongkyoo Shin, Jongil Jeong, and Dongil Shin Department of Computer
HP Software as a Service
HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty
PHP Integration Kit. Version 2.5.1. User Guide
PHP Integration Kit Version 2.5.1 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate PHP Integration Kit User Guide Version 2.5.1 December, 2012 Ping Identity Corporation 1001
Entrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013
SSL VPN Server Guide Access Manager 3.2 SP2 June 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A
DEPLOYMENT GUIDE. SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity
DEPLOYMENT GUIDE SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity Table of Contents SAML Overview...3 Integration Topology...3 Deployment Requirements...4 Configuration Steps...4 Step
SAML single sign-on configuration overview
Chapter 46 Configurin uring Drupal Configure the Drupal Web-SAML application profile in Cloud Manager to set up single sign-on via SAML with a Drupal-based web application. Configuration also specifies
About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack
Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack About Me KVM, API, DB, Upgrades, SystemVM, Build system, various subsystems Contributor and Committer
Novell Access Manager
Novell Access Manager Product Overview Kiran Mova Agenda Introduction Architecture IDP AG SSL VPN Administration Console How it works? Web SSO Federation SSO Protect HTTP Resources Protect non-http Resources
Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.
This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and
How Single-Sign-On Improves The Usability Of Protected Services For Geospatial Data
2014 Fifth International Conference on Computing for Geospatial Research and Application How Single-Sign-On Improves The Usability Of Protected Services For Geospatial Data Andreas Matheus University of
WebLogic Server 7.0 Single Sign-On: An Overview
WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of
DualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.
DualShield Integration Guide Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,
Single Sign-On for the UQ Web
Single Sign-On for the UQ Web David Gwynne Infrastructure Architect, ITIG, EAIT Taxonomy Authentication - Verification that someone is who they claim to be - ie, only the relevant user
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
OSOR.eu eid/pki/esignature Community Workshop in Brussels, 13. November 2008 IT Architect Søren Peter Nielsen - [email protected]
The OIOSAML Toolkits Accelerating a common egov infrastructure using open source reference implementations OSOR.eu eid/pki/esignature Community Workshop in Brussels, 13. November 2008 IT Infrastructure
SAML Single-Sign-On (SSO)
C O L A B O R A T I V E I N N O V A T I O N M A N A G E M E N T Complete Feature Guide SAML Single-Sign-On (SSO) 1. Features This feature allows administrators to setup Single Sign-on (SSO) integration
PingFederate. SSO Integration Overview
PingFederate SSO Integration Overview 2006-2012 Ping Identity Corporation. All rights reserved. PingFederate SSO Integration Overview Version 6.6 January, 2012 Ping Identity Corporation 1001 17th Street,
