IAM, Enterprise Directories and Shibboleth (oh my!)
|
|
|
- Ernest Melton
- 9 years ago
- Views:
Transcription
1 IAM, Enterprise Directories and Shibboleth (oh my!) Gary Windham Senior Enterprise Systems Architect University Information Technology Services
2 What is IAM? Identity and Access Management (IAM) is a framework consisting of technical, policy, and governance components that allows an organization to: identify individuals link identities with roles, responsibilities and affiliations assign privileges, access, and entitlements based on identity and associations IAM permits data stewards and service providers to control access to information and/or services, according to an individual's identity, roles and responsibilities
3 What is IAM? (cont) A middleware layer, used by many services Comprised of four main areas: Credentialing (assignment of an unique token to an entity needing access to resources) Authentication (act of validating proof of identity) Authorization (act of affording access to only appropriate resources and functions) Accountability (ensuring against illegitimate utilization of an entity s authority flows from the first 3 functions)
4 IAM Functions Consolidates information about a person and their roles (identities) across an organization or organizations. Makes this information available, in appropriate and policy-guided ways, to services and applications. Allows for integration of services and authority management which can grant, change, or rescind access based on status or affiliation with the organization. Provides the mechanism for appropriate, auditable access to services, critical for security architectures and to ensure compliance.
5 IAM Example Scenario Hi! I m Lisa. (Identity) and here s my NetID / password to prove it. (Authentication) I want to open the Portal to check my . (Authorization : Allowing Lisa to use the services for which she s authorized) And I want to change my grade in last semester s Physics course. (Denial of Authorization : Preventing her from doing things she s not supposed to do) Source: Keith Hazelton UW-Madison/Internet2 MACE
6 Functional View of IAM environment Source: Internet2 Middleware Initiative
7 The State of UA IAM Today The UA NetID service was designed as an authentication mechanism, not authorization. Together, the UA NetID authentication service and WebAuth (UA s Web Single Sign-On Environment) provide a solid middleware foundation for authentication but more is needed for a full-fledged IAM environment Some campus applications/services rely on NetID authentication as implicit authorization. The move to a permanent NetID will only exacerbate this problem Applications/services requiring more granular authorization typically use one (or more) of the following approaches: Run queries (canned or custom) against UIS Create and maintain local, application-specific repositories of authorization data Query the LDAP phonebook directory (inclusion in which is not guaranteed)
8 Enterprise Directory Service (EDS)
9 What is an Enterprise Directory? A lightweight directory services (LDAP) repository containing core bio/demo data for students, staff, faculty, and other University affiliates Groups, roles, etc, can be easily represented as well Contains key institutional and person data reflected from systems of record, represented as name-value pairs that can be easily retrieved and utilized by a variety of applications The enterprise directory does not replace the databases supporting the institutional systems of record Rather, it provides a unified view of selected subsets of these records or other information maintained by departments at the institution Optimized for reads can service hundreds of requests per second
10 What does the EDS contain? The EDS contains a select subset of bio/demo attributes related to employees, students and other affiliates EDS also provides a subset of attributes specified by the eduperson LDAP schema. EduPerson specifies a common set of attributes related to affiliates of higher education institutions, and was developed by EDUCAUSE and Internet2 edupersonaffiliation and edupersonprimaryaffiliation are of particular interest Many attributes, particularly those carrying term-specific or position/title-specific data are multi-valued, meaning that one attribute name may be associated with multiple values Some attributes group multiple, co-related pieces of information into a single, token-delimited string reduces attribute bloat resulting from several pieces of information which need to be represented multiple times (e.g. term-specific data, employee position information, etc) examples of such attributes include studentacademicprogram, studenttermstatus and employeeincumbentrecord
11 Where EDS fits in
12 Provisioning and Consumption of EDS data EDS is currently provisioned with SIS and PSOS data via a daily UIS batch feed The future data provisioning process will incorporate daily feeds from EPM in conjunction with real-time event notifications from PeopleSoft to reflect status changes (e.g. a student record transitions from admitted to enrolled ) Employee- and student-specific codes (e.g. PSOS employee type/status codes, SIS majors, colleges, etc) go into EDS unfiltered assumes that the consuming application understands meaning of codes See the EDS attribute documentation ( for full details Because the EDS attribute names are (mostly) divorced from SIS/PSOS/ UIS schemas and nomenclature, populating them with PeopleSoft data should not be a huge migration effort SIS- and PSOS-specific codes that change during the PeopleSoft migration will obviously change in EDS as well Attributes composed of multiple, co-related data elements (e.g. employeeincumbentposition, which contains the PCN, budget department and position end-date) may incur format changes depending on how PeopleSoft models these elements
13 Inclusion in EDS Data for the following populations are included in the EDS directory: Students (must meet one of the following criteria) admitted for a future term registered for a future term orientation session enrolled in a current/future term has been enrolled within the past academic year Employees incumbent in a budgeted position within the last 100 days Departmental Sponsored Visitors currently sponsored, non-expired
14 EDS Schema and Attributes Entries in the EDS consist of attributes belonging to the following LDAP object classes: person inetorgperson eduperson arizonaeduperson arizonaedustudent arizonaeduemployee All entries will contain the first 4 object classes listed above these contain base information about the person and his/her affiliation with the University If a person is active in a student and/or employee role, attributes from the relevant object classes will be present as well A complete list of attribute names and descriptions is available on the EDS documentation site:
15 EDS Directory Structure and Naming The EDS consists of a flat namespace for person data: ou=people,dc=eds,dc=arizona,dc=edu Entries are uniquely identified via the uaid attribute This attribute will most likely contain the PeopleSoft EMPLID value after the migration to Mosaic Group data (coming soon) will occupy a separate branch: ou=groups,dc=eds,dc=arizona,dc=edu The group branch may incorporate sub-branches in order to reflect organization structure and permit delegation of group membership and management functions
16 Sample EDS data (Employee)
17 Sample EDS data (Student)
18 Sample EDS data (Student & Employee)
19 EDS Access Mechanisms REST/DSML Data returned in an XML format (specifically, DSMLv1) Takes a simple HTTP GET request as input Caller can user any standard identifier (NetID, SID/EID or UA_ID) to retrieve attribute values for the desired individual Each person is treated as a discrete resource with a globally unique URI endpoint. An example request, for the fictitious NetID johndoe, would look like this: Access to this interface requires authentication, using the application username and password provided obtained during the registration process Username/password are transmitted to the REST service via standard HTTP Basic authentication Credentials and data are encrypted (in transit) via HTTPS
20 REST/DSML Output Example
21 EDS Access Mechanisms (cont) LDAP The Enterprise Directory Service is based on an LDAPv3-compliant directory Can be accessed via the LDAPS (LDAP-over-SSL) protocol Access to the directory server provided via common registration process used for both REST/DSML and LDAP access uses the same access credentials (username/password) required to access the REST interface Attributes provided via the LDAP interface are identical to those provided via the REST/DSML interface However, results not in XML format BER encoding format requires use of LDAP API client library LDAP interface offers more flexibility to application programmers at the cost of increased complexity Can perform searches based on combinations of different attributes (search filters) Can retrieve multiple entries in a result, rather than only a single person entry For connection details and programming examples, please refer to the EDS documentation:
22 EDS REST/DSML code sample
23 EDS LDAP code sample
24 Availability and Registration EDS has been generally available since mid-february FERPA training is a prerequisite for requesting EDS access FERPA training verified against UIS table during registration process EDS access is granted to applications, which are associated with one-or-more departmental points of contact EDS access is requested via a self-service registration application, available at Access credentials expire, and must be renewed annually Registered points of contact will receive notification well in advance of credential expiration
25 Shibboleth
26 What is Shibboleth? An open software system for web single sign-on Developed by Internet2 Enables web applications deployed in most typical web server environments to authenticate and authorize users via a single protocol Facilitates federated identity Enables fine-grained assertion of identity data to federated and external partners privacy and security are key elements
27 Where Shibboleth fits in
28 Key Concept #1: Federated Identity Federated identity supplies user information to applications offered by different organizations, enabling: single sign-on one identity for common access across applications and organizations provisioning of authoritative data Identity information can include anything from the user's full identity, role information, academic or employment information to simply the fact that the user has successfully authenticated, leaving the user anonymous There are several major advantages of federated identity: 1. It delivers authoritative user attributes directly from the institution responsible for the credentials 2. Organizations do not have to maintain credentials for inter-institutional affiliates in order to provision application access 3. User data is protected. Storage at a single, hardened location and stringent release policies minimize the chance of privacy violation 4. Users across organizations and institutions can utilize their local authentication mechanisms to access remote resources enhances end-user experience and scales easily to new participants
29 Key Concept #2: Attributes The "currency" of the Shibboleth software is attributes. named set of values about an authenticated user values are typically strings, but can be more complex XML-based data. When a user logs into your service provider software, Shibboleth obtains a set of attributes for that user and maps them (based on rules you create) into environment variables and/or HTTP headers for your application to consume Attributes not stored within Shibboleth itself pulled from other sources (e.g. LDAP directory or database) Attribute data retrieved from sources can be enriched/transformed by both identity and service providers Shibboleth is capable of using arbitrary, different attribute names for each interface, decoupling the name in any protocol from all other systems Identity providers and consumers have unlimited flexibility in choosing what attributes to provide and consume
30 How does it work? Shibboleth is an implementation of the SAML (Security Assertion Markup Language) specifications for web single sign-on and attribute exchange adds additional layers of public-key trust management and configuration features specifically designed for web-based deployment designed to interoperate with other open and proprietary implementations of SAML and with applications, portals, etc that offer SAML support
31 How does it work (cont)? Shibboleth is comprised of two major components: Identity Provider (IdP) supplies information about users to services Service Provider (SP) gathers information about users to protect resources (static content, application functionality, etc) Interaction between the IdP and SP are governed by the Shibboleth and SAML specifications IdP s are typically centrally managed by the institution s IT organization SP s are installed in a service s web application container Apache and Microsoft IIS environments are supported SP runtime environment consists of both an Apache module (or ISAPI filter) and a standalone daemon (or service, in Windows environments) Java application servers (e.g. Tomcat, Jboss, Weblogic, etc) can be accomodated by front-ending with Apache and mod_jk, mod_wl (or similar)
32 IdP and SP components While the IdP and SP software are typically implemented as discrete, monolithic services, internally they are composed of multiple services some are externally addressable by distinct URI endpoints, others are internal components that handle discrete phases of the SAML authentication/attribute exchange process IdP Authentication Authority Attribute Authority SSO Artifact Resolution Service SP Attribute Requester Assertion Consumer Service Resource Manager WAYF Where Are you From service (more on this later)
33 1. User requests WebAuth The Shibboleth 2. You are Protocol not (intra-institutional resource use case) authenticated, redirect to IdP SSO 7b 1a 3b Client Web Browser 4a 3c 3a Credentials 3. I don t know you. Authenticate using WebAuth 4. I know you now. Send client (via form POST) to resource s ACS 2 Web Resource Assertion Consumer Service (ACS) 2 SSO Service 7a Resource Manager (RM) 1b 4c Handle Handle 4b EDS Attributes 6b Attribute Requester Resource Provider Web Site 7. Based on attribute values, allow access to resource Attributes 5 6a Handle 5. I don t know your attributes. Ask the attribute authority Source: Kathryn Huxtable, Internet2 Attribute Authority (AA) Identity Provider Web Site 6. Return the attributes allowed by release policy 33
34 The 2a. You Shibboleth are not Protocol (federated use case) authenticated, redirect to federation WAYF 2b. Where are you from? 7b 1a 1. User requests resource Client Web Browser 2b 2c 3b 4a 3c WebSSO 3. I don t know you. Authenticate using org s WebSSO 3a Credentials 2c. Redirect to your home institution s IdP 4. I know you now. Send client to resource s ACS Web Resource Assertion Consumer Service (ACS) 2a WAYF 2c SSO Service 7a Resource Manager (RM) 1b 4c Handle Handle 4b EDS Attributes 6b Attribute Requester Resource Provider Web Site 7. Based on attribute values, allow access to resource Attributes 5. I don t know your attributes. Ask the attribute authority 5 6a Source: Kathryn Huxtable, Internet2 Handle Attribute Authority (AA) Identity Provider Web Site 6. Return the attributes allowed by release policy 34
35 Where Are You From Service (WAYF)
36 Wow, that s all really complex what does it mean to me? The complexity of the protocol is handled transparently by the IdP and SP software components Shibboleth security is applied declaratively to resources within the web application container (e.g. via Apache <Location> directives or IIS virtual URLs) Complex access control rules involving multiple attributes can be declaratively configured via XML The Shibboleth SP facilitates direct access to the attributes in the SAML assertion via the application environment
37 Show me the attributes! Attributes released to a particular SP depend on an attribute release policy (ARP) maintained by the IdP ARPs usually are written to release the same set of attibutes to all members of a particular federation (identified via federation metadata) UA maintains an internal federation consisting of campus service providers who wish to utilize Shibboleth for intra-campus authentication and authorization The ARP for this federation releases all the attributes contained in the EDS Membership in this federation is governed by the same policies as EDS access UA is also a member of the InCommon federation an identity federation made up of North American higher education institutions and partners The ARP for this federation releases very basic information by default: edupersonaffiliation, edupersonprimaryaffiliation and edupersontargetedid
38 Really show me the attributes Attributes are provisioned to consuming applications, by the SP software, via environment variables (or HTTP headers in some cases) In most cases, retrieving an attribute is as simple as referencing an environment variable or an object property. Examples for retrieving the employeeprimarydept attribute in a few different environments follow: Apache/PHP $_SERVER( Shib-employeePrimaryDept ) Java HttpServletRequest.getHeader("Shib-employeePrimaryDept ) ASP Request.ServerVariables("HTTP_SHIB_EMPLOYEEPRIMARYDEPT ) Cold Fusion CGI.SHIB_EMPLOYEEPRIMARYDEPT
39 Really show me the attributes (cont) The EDS attribute list represents, for the most part, the set of attributes available via Shibboleth UITS provides an UA-specific SP attribute-map.xml file, which provisions these attributes using the same names as described in the EDS attribute list but prefixed with the string "Shib-" (in order to avoid any potential HTTP environment/request header namespace collisions) some exceptions, due to attributes that don t map one-to-one with EDS attributes; see the documentation site for details Federated use cases require coordination between the SP and the IdP organizations to ascertain what attributes will be released by the IdP and how they should be mapped at the SP
40 Attribute example
41 Lazy Sessions Application developers who wish to delay the Shibboleth SSO process can utilize an advanced feature called lazy sessions The Shibboleth SP registers a series of virtual URIs with the underlying web application container Application developers can simply issue an HTTP Redirect to the Shibboleth session initiator URI (typically, /Shibboleth.sso/Login), with query-string parameters indicating the return point, in order to launch the Shibboleth SSO process
42 InCommon Federation UA is an InCommon federation member InCommon is a higher education federation of identity and service providers Provides common policies, practices and framework for sharing identity information across institutions Enables collaboration and enhances trust The de-facto standard for identity federation in higher ed
43 InCommon Members
44 Availability and Registration Shibboleth has been generally available since mid-february FERPA training is a prerequisite for requesting Shibboleth access FERPA training verified against UIS table during registration process Shibboleth access is granted to applications, which are associated with one-or-more departmental points of contact Shibboleth access is requested via a self-service registration application, available at Upon registration, the point-of-contact will receive instructions to complete the set-up process (including certificate generation, inclusion in UA metadata, etc) Federated SP deployments require additional set-up please contact [email protected] if you have a need to establish federated service with InCommon members or external entities
45 Resources This presentation available online at:
46 Q & A
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
OAuth Guide Release 6.0
[1]Oracle Communications Services Gatekeeper OAuth Guide Release 6.0 E50767-02 November 2015 Oracle Communications Services Gatekeeper OAuth Guide, Release 6.0 E50767-02 Copyright 2012, 2015, Oracle and/or
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications
Federated Identity Management and Shibboleth Noreen Hogan Asst. Director Enterprise Admin. Applications Federated Identity Management Management of digital identity/credentials (username/password) Access
Getting Started with Single Sign-On
Getting Started with Single Sign-On I. Introduction Your institution is considering or has already purchased Collaboratory from Treetop Commons, LLC. One benefit provided to member institutions is Single
WebNow Single Sign-On Solutions
WebNow Single Sign-On Solutions Technical Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2015 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources Paul Riddle University of Maryland Baltimore County EDUCAUSE Mid-Atlantic Regional Conference January 16, 2008 Copyright
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Authentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5
Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5 TABLE OF CONTENTS Introduction... 1 Purpose and Target Audience... 1 Commonly Used Terms... 1 Overview of Shibboleth User
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
HP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Remote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
Symplified I: Windows User Identity. Matthew McNew and Lex Hubbard
Symplified I: Windows User Identity Matthew McNew and Lex Hubbard Table of Contents Abstract 1 Introduction to the Project 2 Project Description 2 Requirements Specification 2 Functional Requirements 2
IGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis
Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
Copyright 2012, Oracle and/or its affiliates. All rights reserved.
1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?
How To Use Salesforce Identity Features
Identity Implementation Guide Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0)
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0) July 2015 Oracle API Gateway OAuth User Guide, 11g Release 2 (11.1.2.4.0) Copyright 1999, 2015, Oracle and/or its
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
USING FEDERATED AUTHENTICATION WITH M-FILES
M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication
Canadian Access Federation: Trust Assertion Document (TAD)
Participant Name: University of Lethbridge 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources
Getting Started with Single Sign-On
Getting Started with Single Sign-On I. Introduction NobleHour sets out to incentivize civic engagement by enabling users within companies, educational institutions, and organizations to conduct and coordinate
Single Sign On at Colorado State. Ron Splittgerber
Single Sign On at Colorado State Ron Splittgerber Agenda Identity Management Authentication Authorization The Problem The Solution: Federation Trust Between Institutions Trust Between Institution and Federal
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper
Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper TABLE OF CONTENTS INTRODUCTION... 3 Where we came from... 3 The User s Dilemma with the Cloud... 4 The Administrator
Get Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : C2150-575 Title : IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version : Demo 1.What is the default file name of the
API Architecture. for the Data Interoperability at OSU initiative
API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models
Approaches to Enterprise Identity Management: Best of Breed vs. Suites
Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity
OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com
OpenSSO: Simplify Your Single-Sign-On Needs Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com 1 Agenda Enterprise security needs What is OpenSSO? OpenSSO features > > > > SSO and
Microsoft Office 365 Using SAML Integration Guide
Microsoft Office 365 Using SAML Integration Guide Revision A Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.
PARTNER INTEGRATION GUIDE. Edition 1.0
PARTNER INTEGRATION GUIDE Edition 1.0 Last Revised December 11, 2014 Overview This document provides standards and guidance for USAA partners when considering integration with USAA. It is an overview of
Axway API Gateway. Version 7.4.1
O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1
Identity Management. Manager, Identity Management. Academic Technology Services. Michigan State University Board of Trustees
Identity Management and Shibboleth h at MSU Jim Green Manager, Identity Management Michigan State t University it Academic Technology Services Identity Management Definition: Identity management is the
Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact
Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Robert C. Broeckelmann Jr., Enterprise Middleware Architect Ryan Triplett, Middleware Security Architect Requirements
000-575. IBM Tivoli Federated Identity Manager V6.2.2 Implementation. Version: Demo. Page <<1/10>>
000-575 IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version: Demo Page 1.What is the default file name of the IBM Tivoli Directory Integrator log? A. tdi.log B. ibmdi.log C. ibmdisrv.log
Identity and Access Management for Federated Resource Sharing: Shibboleth Stories
Identity and Access Management for Federated Resource Sharing: Shibboleth Stories http://arch.doit.wisc.edu/keith/apan/ apanshib-060122-01.ppt Keith Hazelton ([email protected]) Sr. IT Architect,
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO Scope... 2 Prerequisites Tasks... 2 Procedure... 2 Step 1: Configure EPM s WebLogic domain for SP Federation Services... 2 Step 2:
IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide
IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
Shibboleth Identity Provider (IdP) Sebastian Rieger [email protected]
Shibboleth Identity Provider (IdP) Sebastian Rieger [email protected] Gesellschaft für wissenschaftliche Datenverarbeitung mbh Göttingen, Germany CLARIN AAI Hands On Workshop, 25.02.2009, Oxford
The GLASS Project: Supporting Secure Shibboleth-based Single Sign-On to Campus Resources
The GLASS Project: Supporting Secure Shibboleth-based Single Sign-On to Campus Resources J. Watt, R.O. Sinnott, J. Jiang National e-science Centre, University of Glasgow [email protected] Abstract
ADFS Integration Guidelines
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
Secure the Web: OpenSSO
Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1 Agenda Need for identity-based
Single Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University
Identity and Access Management (IAM) Roadmap DRAFT v2 North Carolina State University April, 2010 Table of Contents Executive Summary... 3 IAM Dependencies... 4 Scope of the Roadmap... 4 Benefits... 4
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
SAML and OAUTH comparison
SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, [email protected], twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES
CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Summer 15 @salesforcedocs Last updated: July 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
HP Software as a Service
HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Securing Web Services With SAML
Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion
CA Adapter. Installation and Configuration Guide for Windows. r2.2.9
CA Adapter Installation and Configuration Guide for Windows r2.2.9 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
Toward campus portal with shibboleth middleware
Toward campus portal with shibboleth middleware Eisuke Ito and Masanori Nakakuni [email protected] u.ac.jp, Kyushu University nak@fukuoka u.ac.jp, Fukuoka University Outline 1. Background 2. Shibboleth 3.
KMx Enterprise: Integration Overview for Member Account Synchronization and Single Signon
KMx Enterprise: Integration Overview for Member Account Synchronization and Single Signon KMx Enterprise includes two api s for integrating user accounts with an external directory of employee or other
Siebel CRM On Demand Single Sign-On. An Oracle White Paper December 2006
Siebel CRM On Demand Single Sign-On An Oracle White Paper December 2006 Siebel CRM On Demand Single Sign-On Introduction... 3 Single Sign-On with Siebel CRM On Demand... 4 Customer Requirements... 4 SSO
StreamServe Persuasion SP5 StreamStudio
StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other
Microsoft Active Directory Authentication with SonicOS 3.0 Enhanced and SonicOS SC 1.0 (CSM 2100CF)
Microsoft Active Directory Authentication with SonicOS 3.0 Enhanced and SonicOS SC 1.0 (CSM 2100CF) Introduction SonicWALL Unified Threat Management (UTM) appliances running SonicOS Enhanced 3.0 support
Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008
Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Nature of Document: Guideline Product(s): IBM Cognos Express Area of Interest: Infrastructure 2 Copyright and Trademarks Licensed Materials
Spring Security 3. rpafktl Pen source. intruders with this easy to follow practical guide. Secure your web applications against malicious
Spring Security 3 Secure your web applications against malicious intruders with this easy to follow practical guide Peter Mularien rpafktl Pen source cfb II nv.iv I I community experience distilled
Authentication and access control in Sympa mailing list server
Authentication and access control in Sympa mailing list server February 2004 Serge Aumont & Olivier Salaün Comité Réseau des Universités http://www.cru.fr Campus de Beaulieu, Rennes France 1 Introduction
Canadian Access Federation: Trust Assertion Document (TAD)
Participant Name: RESEARCH RESEARCH LTD. 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources
Architecture Guidelines Application Security
Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation
Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase
Authentication and Authorisation for Research and Collaboration Federations 101 An Introduction to Federated Identity Management Peter Gietz, Martin Haase AARC NA2 Task 2 - Outreach and Dissemination DAASI
OpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
