Liberty ID-WSF Multi-Device SSO Deployment Guide
|
|
|
- Joan Wilcox
- 9 years ago
- Views:
Transcription
1 : Version: Liberty ID-WSF Multi-Device SSO Deployment Guide Version: Editors: Paul Madsen, NTT Contributors: Hiroki Itoh, NTT Kiyohiko Ishikawa, NHK Fujii Arisa, NHK Abstract: This document profiles how to use the Liberty Identity Web Services Framework (ID-WSF) to support single sign-on for users that crosses devices, i.e. the session is initiated from one device or user-agent, and subsequently transferred to a second, as might be desirable in the enjoyment of long running media, e.g. streaming video. Filename: draft-liberty-idwsf-mdsso-deployguide-v pdf 1
2 : Version: Notice This document has been prepared by Sponsors of the Liberty Alliance. Permission is hereby granted to use the document solely for the purpose of implementing the Specification. No rights are granted to prepare derivative works of this Specification. Entities seeking permission to reproduce portions of this document for other uses must contact the Liberty Alliance to determine whether an appropriate license for such use is available. Implementation or use of certain elements of this document may require licenses under third party intellectual property rights, including without limitation, patent rights. The Sponsors of and any other contributors to the Specification are not and shall not be held responsible in any manner for identifying or failing to identify any or all such third party intellectual property rights. This Specification is provided "AS IS," and no participant in the Liberty Alliance makes any warranty of any kind, express or implied, including any implied warranties of merchantability, non-infringement of third party intellectual property rights, and fitness for a particular purpose. Implementers of this Specification are advised to review the s website ( for information concerning any Necessary Claims Disclosure Notices that have been received by the Liberty Alliance Management Board. Copyright 2008 AOL LLC; British Telecommunications plc; Computer Associates International, Inc.; Drummond Group, Inc.; Ericsson; France Télécom; Fugen Solutions, Inc.; GSA Office of Governmentwide Policy; Hewlett-Packard Company; Intel Corporation; Luminance Consulting Services; Neustar, Inc.; New Zealand Government State Services Commission; NEC Corporation; NHK (Japan Broadcasting Corporation) Science & Technical Research Laboratories; Nippon Telegraph and Telephone Corporation; Oracle Corporation; SUNET; Sun Microsystems, Inc.; Symlabs, Inc.; Zenn New Media. All rights reserved. Licensing Administrator c/o IEEE-ISTO 445 Hoes Lane Piscataway, NJ , USA [email protected] 2
3 : Version: Contents 1. Introduction Namespaces Security Context Application Context Transfer Context Transfer Mechanism Profile of ID-WSF for Multi-Device SSO Security Considerations References
4 : Version: Introduction Multi-Device SSO (MD SSO) refers to users enjoying single sign-on across multiple devices and/or user agents - thereby able to enjoy uninterrupted delivery from service provides to those devices. The following is a representative scenario for the MD SSO use case: 1. While commuting home from work, Alice uses her mobile to browse free media content. 2. Alice begins watching a movie on mobile while riding the bus. 3. As she nears her bus stop, Alice decides to watch the rest of the movie on her home HD. She stops the movie and purchases HD version. 4. IdP transmits Alice s identity to SP. 5. On arriving home, Alice swipes her phone by her set top box. Alice watches the rest of movie from where she had previously stopped watching. More generally, the user would be able to access different SPs from the second device, but with the same degree of cross-device convenience Namespaces This document uses the following namespaces: The prefix xs: stands for the W3C XML schema namespace ( [Schema1-2]. The prefix xml: stands for the W3C XML namespace ( [XML]. The prefix saml: stands for the OASIS SSTC SAML2.0 Assertion namespace (urn:oasis:names:tc:saml:2.0:assertion) [SAMLCore2]. The prefix samlp: stands for the OASIS SSTC SAML2.0 Protocol namespace (urn:oasis:names:tc:saml:2.0:protocol) [SAMLCore2]. The prefix ims: stands for the Liberty ID-WSF Authentication Service Identity Mapping Service namespace (urn:liberty:ims: ) [LibertySOAPAuthn]. The prefix sec: stands for the Liberty ID-WSF Security Mechanisms Core namespace (urn:liberty:sec: ) [LibertySecMech]. The prefix as: stands for the Liberty ID-WSF Authentication Service namespace (urn:liberty:as: ) [LibertySecMech]. 4
5 : Version: Security Context Enabling SSO across devices implies the transfer of a security context from the first device to the second. By using the passed security context, the second device will be able to re-establish a new security session on the behalf of the user. An <Assertion> carried within the <SecurityContext> element of the <Metadata> element of an ID-WSF <End- PointReference> captures the invocation context necessary for interacting with the SSOS service instance represented by the containing ID-WSF EPR. 5
6 : Version: Application Context For a user to be able to enjoy uninterrupted service at some SP from one device to another implies that the application context (i.e. what they were doing) they ended at the first device can be reestablished at the second. If the server is unable to track this (and thereby free the device/clients from the burden), it will be necessary for such context to be transferred from the first device to the second. Such application context MAY be optionally passed as an <ApplicationContext> element. <xs:element name="applicationcontext"> <xs:complextype> <xs:sequence> <xs:any namespace="##other" processcontents="lax" minoccurs="0" maxoccurs="unbounded"/> </xs:sequence> </xs:complextype> </xs:element> The specifics of the context to capture and share between devices will depend on the application, e.g. the relevant data would be very different for a game than for a streaming video. The <ApplicationContext> schema is defined to allow such flexibility. 6
7 : Version: Transfer Context The security and optional application context are packaged for transfer in a <TransferContext> element. <xs:element name="transfercontext"> <xs:complextype> <xs:sequence> <xs:element ref="wsa:endpointreference"/> <xs:element ref="applicationcontext" minoccurs="0"/> <xs:any namespace="##other" processcontents="lax" minoccurs="0" maxoccurs="unbounded"/> </xs:sequence> </xs:complextype> </xs:element> It is the <TransferContext> element that is sent from the first device to the second. 7
8 : Version: Transfer Mechanism The specifics of how the security and application context are passed from the first device to the second are not defined by this profile. Different options (e.g. BlueTooth, Near Field Communication, etc) may have different security characteristics for interception of the SSOS EPR and embedded SAML Assertion. 8
9 : Version: Profile of ID-WSF for Multi-Device SSO The following sequence profiles the use of Liberty ID-WSF Authentication and Single Sign-On Services in combination to support the Multi-Device SSO Use Case: 1. User authenticates to IDP from Device A through AS (using a SASL negotiated mechanism) <soap:envelope> <soap:body> <SASLRequest mechanism="gssapi"> <Data> Q29ub3IgQ2FoaWxsIGNhc3VhbGx5IG1hbm dszxmgcgfzc3dvcmrzcg== </Data> </SASLRequest> </soap:body> </soap:envelope> 2. IDP returns to Device A the SSOS EPR. The IDP MAY also return the DS EPR. The IDP SHOULD ensure that the lifetimes of the EPR and embedded SAML Assertion are sufficiently long to allow them to be transferred to the second device before their expiration. The IDP SHOULD set the ConfirmationMethod of the SubjectConfirmation of the embedded SAML Assertion as urn:oasis:names:tc:saml:1.0:cm:bearer. <soap:envelope> <soap:body> <sa:saslresponse xmlns:sa="urn:liberty:sa: " xmlns:disco="urn:liberty:disco : "> <Status code="sa:ok"/> <wsa:endpointreference> <wsa:address> IdPSSOService </wsa:address> <wsa:metadata> <disco:servicetype>urn:liberty:ss os: </disco:servicetyp e> <disco:providerid> sco:providerid> <ds:securitycontext> <disco:securitymechid> urn:liberty:security: :null:be arer </disco:securitymechid> <sec:token> <saml2:assertion ID="i1b cab657f34e5ef189 f28ea10dd86926 " Version="2.0" IssueInstant=" T22:12:33Z"> <Issuer> </saml2:assertion> </sec:token> </ds:securitycontext> </wsa:metadata> </wsa:endpointreference> </sa:saslresponse> </soap:body> </soap:envelope> 9
10 : Version: Device A uses the SSOS EPR to request and obtain SAML Assertions for presentation to SP1 (and other SPs). Device A sends an <saml:authnrequest> to the endpoint within the SSOS EPR, using as a security token the SAML Assertion from the <ds:securitycontext> element in the EPR. <soap:envelope> <soap:header> <wse:security> <saml2:assertion ID="i1b cab657f34e5ef189f28 ea10dd86926 " Version="2.0" IssueInstant=" T22:12:33Z"> <Issuer> </saml2:assertion> </wse:security> </soap:header> <soap:body> <samlp:authnrequest> <saml2:audiencerestriction> <saml2:audience> /saml2:audience> </saml2:audiencerestriction> </samlp:authnrequest> </soap:body> </soap:envelope> 4. The SSOS returns to Device A a SAML Assertion targeted at SP1. 5. After presenting SSO Assertion to SP1 (specifics will depend on the binding), user enjoys service at SP1. 6. Some time later (e.g when initiated by user selecting Move Session to Device B ), Device A prepares a package for delivery to Device B. If Device A is not adding application context, the SSOS EPR that Device A obtained, placed within the <TransferContext> element, constitutes the package. The SSOS EPR MUST be generated according to the rules of the ID-WSF 2.0 Discovery Service specification. Device A MAY supplement the SSOS EPR within the <TransferContext> with appropriate application context. If doing so, Device A MUST insert the appropriate <ApplicationContext> element following the <EndpointReference> element within the <TransferContext> element. <mdsso:transfercontext> <wsa:endpointreference> <wsa:address> </wsa:address> <wsa:metadata> <disco:servicetype>urn:liberty:ssos: </disco :ServiceType> <disco:providerid> om:8080</disco:providerid> <ds:securitycontext> <disco:securitymechid> urn:liberty:security: :null:bearer </disco:securitymechid> <sec:token> <saml2:assertion ID="i1b cab657f34e5ef189f28ea10dd86926 " Version="2.0" IssueInstant=" T22:12 :33Z"> <Issuer> uer> </saml2:assertion> </sec:token> </ds:securitycontext> </wsa:metadata> 10
11 : Version: </wsa:endpointreference> <mdsso:applicationcontext> <vid:appdata> <vid:name>king Kong</vid:Name> <vid:time>1:42:7</vid:time> </vid:appdata> </mdsso:applicationcontext> </mdsso:transfercontext> 7. Device A sends the <TransferContext> package to Device B. 8. Device B uses the SSOS EPR token received from Device A at the SSOS endpoint to obtain SSO Assertions for presentation to SPs. <soap:envelope> <soap:header> <wse:security> <saml2:assertion ID="i1b cab657f34e5ef189f28 ea10dd86926 " Version="2.0" IssueInstant=" T22:12:33Z"> <Issuer> </saml2:assertion> </wse:security> </soap:header> <soap:body> <samlp:authnrequest> <saml2:audiencerestriction> <saml2:audience> /saml2:audience> </saml2:audiencerestriction> </samlp:authnrequest> </soap:body> </soap:envelope> 9. SSOS returns a SAML Assertion to Device B targeted at relevant SPs. 10. With the SAML Assertion returned by the IDP, User enjoys access to SP1 resources from Device B (or other SPs). 11. Device B MAY use any application context delivered to it within the <TransferContext> package to reestablish any application context that was terminated at Device A. <mdsso:applicationcontext> <vid:appdata> <vid:name>king Kong</vid:Name> <vid:time>1:42:7</vid:time> </vid:appdata> </mdsso:applicationcontext> How Device B reestablishes application context is out of scope. 11
12 : Version: Security Considerations Were the SAML assertion within the <EndpointReference> passed from Device A to Device B be intercepted by an attacker, it would serve as a bearer token for that attacker t0 impersonate the user at the SSOS and, as such, possibly at federated SPs. Depending on the security characteristics of the mechanism used for transferring the <TransferContext> package from one device to another, this risk may be significant. To mitigate the risk of interception, the SAML assertion could be constrained such that it could be presented only be Device B (by, for instance, using a SAML holder of key confirmation method) or such that it could only be used at the SSOS to request a secondary assertion targeted at a particular SP. Support for such enhanced security will be explored in subsequent drafts of these guidelines. 12
13 : Version: References Normative [LibertySecMech] Hirsch, Frederick, eds. "Liberty ID-WSF Security Mechanisms Core," Version 2.0-errata-v1.0, (21 April, 2007). [LibertySOAPAuthn] Hodges, Jeff, Aarts, Robert, Madsen, Paul, Cantor, Scott, eds. " Liberty ID-WSF Authentication, Single Sign-On, and Identity Mapping Services Specification," v2.0-errata , (28 November, 2006). [SAMLCore2] Cantor, Scott, Kemp, John, Philpott, Rob, Maler, Eve, eds. (15 March 2005). "Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2.0," SAML V2.0, OA- SIS Standard, Organization for the Advancement of Structured Information Standards [Schema1-2] Thompson, Henry S., Beech, David, Maloney, Murray, Mendelsohn, Noah, eds. (28 October 2004). "XML Schema Part 1: Structures Second Edition," Recommendation, World Wide Web Consortium [XML] Bray, Tim, Paoli, Jean, Sperberg-McQueen, C. M., Maler, Eve, Yergeau, Francois, eds. (04 February 2004). "Extensible Markup Language (XML) 1.0 (Third Edition)," Recommendation, World Wide Web Consortium 13
Cross Operation of Single Sign-On, Federation, and Identity Web Services Frameworks
: Version: 1.1 Cross Operation of Single Sign-On, Federation, and Identity Web Services Frameworks Version: 1.1 Editors: Sampo Kellomäki, Symlabs, Inc. Contributors: Conor Cahill, Intel Rob Lockhart, IEEE-ISTO
Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0 OASIS Standard,
SAML V2.0 Asynchronous Single Logout Profile Extension Version 1.0
SAML V2.0 Asynchronous Single Logout Profile Extension Version 1.0 Committee Specification 01 22 November 2012 Specification URIs This version: http://docs.oasis-open.org/security/saml/post2.0/saml-async-slo/v1.0/cs01/saml-async-slo-v1.0-
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes
Liberty ID-WSF Authentication, Single Sign-On, and Identity Mapping Services Specification
: Version: v2.0 Liberty ID-WSF Authentication, Single Sign-On, and Identity Mapping Services Specification Version: v2.0 Editors: Jeff Hodges, NeuStar, Inc. Robert Aarts, Hewlett-Packard Paul Madsen, NTT
Security Assertion Markup Language (SAML) V2.0 Technical Overview
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 Security Assertion Markup Language (SAML) V2.0 Technical Overview Committee Draft 02 25 March 2008
SAML 2.0 Interoperability Testing Procedures
1 2 3 4 5 6 7 8 9 10 11 Version 2.0 7 July 2006 Editors: Eric Tiffany, Contributors: Greg Whitehead, Hewlett-Packard Sampo Kellomäki, Symlabs Nick Ragouzis, Enosis Abstract: 12 13 14 15 16 17 18 19 20
SAML 2.0 INT SSO Deployment Profile
1 2 3 4 5 6 SAML 2.0 INT 7 8 9 Version: 0.1 Date: 2011-12-2 10 Editor: TBD 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Contributors: The full list of contributors can be referenced here: URL Status: This
Bindings for the OASIS Security Assertion Markup Language (SAML) V2.0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 Bindings for the OASIS Security Assertion Markup Language (SAML) V2.0 OASIS Standard,
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Specification
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Specification Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft
OIOSAML Rich Client to Browser Scenario Version 1.0
> OIOSAML Rich Client to Browser Scenario Version 1.0 Danish Agency for Digitization December 2011 Contents > 1 Introduction 4 1.1 Purpose 1.2 Background 4 4 2 Goals and Assumptions 5 3 Scenario Details
An Oracle White Paper August 2010. Oracle OpenSSO Fedlet
An Oracle White Paper August 2010 Oracle OpenSSO Fedlet Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
OIO SAML Profile for Identity Tokens
> OIO SAML Profile for Identity Tokens Version 1.0 IT- & Telestyrelsen October 2009 Content > Document History 3 Introduction 4 Related profiles 4 Profile Requirements 6 Requirements 6
Research and Implementation of Single Sign-On Mechanism for ASP Pattern *
Research and Implementation of Single Sign-On Mechanism for ASP Pattern * Bo Li, Sheng Ge, Tian-yu Wo, and Dian-fu Ma Computer Institute, BeiHang University, PO Box 9-32 Beijing 100083 Abstract Software
Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0
1 2 3 4 5 6 7 8 9 10 11 Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0 Version 3.2.2 Editor: Kyle Meadors, Drummond Group Inc. Abstract: This document describes the test steps to
SAML and OAUTH comparison
SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, [email protected], twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single
IT@Intel. Improving Security and Productivity through Federation and Single Sign-on
White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing
This way, Bluewin will be able to offer single sign-on for service providers within the circle.
Clareity Security and The National Association of Realtors Develop a SAML Toolkit for the Real Estate Industry Ask any REALTOR about the systems they use and the passwords they deploy. The word mess will
IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0
International Virtual Observatory Alliance IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 IVOA Proposed Recommendation 20151029 Working group http://www.ivoa.net/twiki/bin/view/ivoa/ivoagridandwebservices
Authentication Context for the OASIS Security Assertion Markup Language (SAML) V2.0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 Authentication Context for the OASIS Security Assertion Markup Language (SAML)
DocuSign Information Guide. Single Sign On Functionality. Overview. Table of Contents
DocuSign Information Guide Single Sign On Functionality Overview The DocuSign Single Sign On functionality allows your system administrators to maintain user information in one location and your users
Federated Identity Management for Protecting Users from ID Theft
Federated Identity Management for Protecting Users from ID Theft Paul Madsen NTT Advanced Technology 250 Cambridge Avenue, Suite 104, Palo Alto, CA 94306, USA [email protected] Yuzo Koga NTT Information
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]
Siebel CRM On Demand Single Sign-On. An Oracle White Paper December 2006
Siebel CRM On Demand Single Sign-On An Oracle White Paper December 2006 Siebel CRM On Demand Single Sign-On Introduction... 3 Single Sign-On with Siebel CRM On Demand... 4 Customer Requirements... 4 SSO
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
SAML Privacy-Enhancing Profile
SAML Privacy-Enhancing Profile Moritz Horsch 1, Max Tuengerthal 2, Tobias Wich 2 1 Technische Universität Darmstadt, Hochschulstraße 10, 64289 Darmstadt [email protected] 2 ecsec GmbH,
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
Kantara egov and SAML2int comparison
Kantara egov and SAML2int comparison 17.8.2010/[email protected] This document compares the egovernment Implementation profile of SAML 2.0, created by the egovernment WG of Kantara Initiative, and the
HP Software as a Service
HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty
Identity opens the participation age. Dr. Rainer Eschrich. Program Manager Identity Management Sun Microsystems GmbH
Identity opens the participation age Open Web Single Sign- On und föderierte SSO Dr. Rainer Eschrich Program Manager Identity Management Sun Microsystems GmbH Agenda The Identity is the Network Driving
HP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
DualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.
DualShield Integration Guide Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,
SAML Federated Identity at OASIS
International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
Certification Final Report SAML 2.0 Interoperability Test First Quarter 2011 (1Q11) March 31, 2011
Certification Final Report SAML 2.0 Interoperability Test First Quarter 2011 (1Q11) March 31, 2011 Prepared & Administered by: DRUMMOND GROUP INC. www.drummondgroup.com Copyright Drummond Group Inc. 2011
IBM WebSphere Application Server
IBM WebSphere Application Server SAML 2.0 web single-sign-on 2012 IBM Corporation This presentation describes support for SAML 2.0 web browser Single Sign On profile included in IBM WebSphere Application
Identity Assurance Hub Service SAML 2.0 Profile v1.2a
1 2 3 4 Identity Assurance Hub Service SAML 2.0 Profile v1.2a Identity Assurance Programme, 07 August 2015 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Document identifier: IDAP/HubService/Profiles/SAML Editors:
SAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
PHP Integration Kit. Version 2.5.1. User Guide
PHP Integration Kit Version 2.5.1 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate PHP Integration Kit User Guide Version 2.5.1 December, 2012 Ping Identity Corporation 1001
Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0
sm Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Reference Framework... 5 Applicability... 6 Related Usage Models...
2015-11-30. Web Based Single Sign-On and Access Control
0--0 Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
Glossary for the OASIS Security Assertion Markup Language (SAML) V2.0
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 Glossary for the OASIS Security Assertion Markup Language (SAML) V2.0 OASIS Standard,
Federal Identity, Credential, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile
Federal Identity, Credential, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile Version 1.0 September 27, 2010 Document History This is the first
IBM WebSphere Application Server
IBM WebSphere Application Server OAuth 2.0 service provider and TAI 2012 IBM Corporation This presentation describes support for OAuth 2.0 included in IBM WebSphere Application Server V7.0.0.25. WASV70025_OAuth20.ppt
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart [email protected]
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Interoperable Provisioning in a Distributed World
Interoperable Provisioning in a Distributed World Mark Diodati, Burton Group Ramesh Nagappan, Sun Microsystems Sampo Kellomaki, SymLabs 02/08/07 IAM 302 Contacts Mark Diodati ([email protected])
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
Federal Identity, Credentialing, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile
Federal Identity, Credentialing, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile Version 1.0.2 December 16, 2011 Document History Status Release
Trusting XBRL: Using the Liberty Web Services Framework to Secure and Authenticate XBRL Documents
Trusting XBRL: Using the Liberty Web Services Framework to Secure and Authenticate XBRL Documents Farrukh Najmi and Eve Maler [email protected], [email protected] Sun Microsystems, Inc. Goals for today's
CA Nimsoft Service Desk
CA Nimsoft Service Desk Configure Outbound Web Services 7.13.7 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject
Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone
Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone Although single sign-on (SSO) technology based on Liberty standards is being rapidly adopted by businesses, governments and
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
Liberty Alliance Project Setting the Standard for Federated Network Identity
Liberty Alliance Project Setting the Standard for Network Identity Privacy, Identity Management and Services using Liberty technologies in Mobile Environment. Identity Management Rise of electronic networks:
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN 1 Venkadesh.M M.tech, Dr.A.Chandra Sekar M.E., Ph.d MISTE 2 1 ResearchScholar, Bharath University, Chennai 73, India. [email protected] 2 Professor-CSC
Software Requirement Specification Web Services Security
Software Requirement Specification Web Services Security Federation Manager 7.5 Version 0.3 (Draft) Please send comments to: [email protected] This document is subject to the following license:
Software Design Document SAMLv2 IDP Proxying
Software Design Document SAMLv2 IDP Proxying Federation Manager 7.5 Version 0.2 Please send comments to: [email protected] This document is subject to the following license: COMMON DEVELOPMENT AND
Trend of Federated Identity Management for Web Services
30 Trend of Federated Identity Management for Web Services Chulung Kim, Sangyong Han Abstract While Web service providers offer different approaches to implementing security, users of Web services demand
RSA Solution Brief. Federated Identity Manager RSA. A Technical Overview. RSA Solution Brief
RSA Federated Identity Manager A Technical Overview Federated identity management extends the management of digital identities for authorization and access beyond domain and corporate boundaries to externally
Implementing Identity Provider on Mobile Phone
Implementing Identity Provider on Mobile Phone Tsuyoshi Abe, Hiroki Itoh, and Kenji Takahashi NTT Information Sharing Platform Laboratories, NTT Corporation 3-9-11 Midoricho, Musashino-shi, Tokyo 180-8585,
OAuth Guide Release 6.0
[1]Oracle Communications Services Gatekeeper OAuth Guide Release 6.0 E50767-02 November 2015 Oracle Communications Services Gatekeeper OAuth Guide, Release 6.0 E50767-02 Copyright 2012, 2015, Oracle and/or
Release Notes. IBM Tivoli Identity Manager Oracle Database Adapter. Version 5.0.1. First Edition (December 7, 2007)
IBM Tivoli Identity Manager Version 5.0.1 First Edition (December 7, 2007) This edition applies to version 5.0 of Tivoli Identity Manager and to all subsequent releases and modifications until otherwise
Shibboleth Architecture
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Shibboleth Architecture Technical Overview Working Draft 02, 8 June 2005 Document identifier: draft-mace-shibboleth-tech-overview-02 Location: http://shibboleth.internet2.edu/shibboleth-documents.html
Oracle Business Intelligence Enterprise Edition LDAP-Security Administration. White Paper by Shivaji Sekaramantri November 2008
Oracle Business Intelligence Enterprise Edition LDAP-Security Administration White Paper by Shivaji Sekaramantri November 2008 OBIEE LDAP-Security Administration Before You Start... 3 Executive Overview...
RSA Two Factor Authentication
RSA Two Factor Authentication VERSION: 1.0 UPDATED: MARCH 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 16 Copyright Notices Copyright 2002-2014 KEMP Technologies, Inc..
Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0
sm Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Related Usage Models... 5 Reference Framework...
Enabling SAML for Dynamic Identity Federation Management
Enabling SAML for Dynamic Identity Federation Management Patricia Arias, Florina Almenárez, Andrés Marín and Daniel Díaz-Sánchez University Carlos III of Madrid http://pervasive.gast.it.uc3m.es/ WMNC 2009
[MS-ASMS]: Exchange ActiveSync: Short Message Service (SMS) Protocol
[MS-ASMS]: Exchange ActiveSync: Short Message Service (SMS) Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications
XBRL Processor Interstage XWand and Its Application Programs
XBRL Processor Interstage XWand and Its Application Programs V Toshimitsu Suzuki (Manuscript received December 1, 2003) Interstage XWand is a middleware for Extensible Business Reporting Language (XBRL)
An Anti-Phishing mechanism for Single Sign-On based on QR-Code
An Anti-Phishing mechanism for Single Sign-On based on QR-Code Syamantak Mukhopadhyay School of Electronics and Computer Science University of Southampton Southampton, UK [email protected] David
SAM Context-Based Authentication Using Juniper SA Integration Guide
SAM Context-Based Authentication Using Juniper SA Integration Guide Revision A Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete
Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase
Authentication and Authorisation for Research and Collaboration Federations 101 An Introduction to Federated Identity Management Peter Gietz, Martin Haase AARC NA2 Task 2 - Outreach and Dissemination DAASI
An SAML Based SSO Architecture for Secure Data Exchange between User and OSS
An SAML Based SSO Architecture for Secure Data Exchange between User and OSS Myungsoo Kang 1, Choong Seon Hong 1,Hee Jung Koo 1, Gil Haeng Lee 2 1 Department of Computer Engineering, Kyung Hee University
OIO Web SSO Profile V2.0.5
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Liberty Alliance. CSRF Review. .NET Passport Review. Kerberos Review. CPSC 328 Spring 2009
CSRF Review Liberty Alliance CPSC 328 Spring 2009 Quite similar, yet different from XSS Malicious script or link involved Exploits trust XSS - exploit user s trust in the site CSRF - exploit site s trust
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
igovt logon service Context Mapping Service (icms) Messaging Specification Release 9.6
igovt logon service Context Mapping Service (icms) Messaging Specification Release 9.6 Subject Client Author Context Mapping Service Messaging Specification for the igovt logon service The Department of
Internet Information Services Integration Kit. Version 2.4. User Guide
Internet Information Services Integration Kit Version 2.4 User Guide 2014 Ping Identity Corporation. All rights reserved. PingFederate Internet Information Services User Guide Version 2.4 June, 2014 Ping
