Federated Identity Management

Size: px
Start display at page:

Download "Federated Identity Management"

Transcription

1 Federated Identity Management AKA, Identity Federation or just Federation Siju Mammen SANReN 28th March 2013

2 Table of contents What is Federation? Main Actors in the Federation game Research and Education Federations Protocols Architecture Attributes Services offered in typical Reserach and Education Federations How to implement a Federation Where to go from here Siju Mammen (SANReN) Federated Identity Management 28th March / 18

3 What is Federation? Part 1 Where does it all start? Before talking about federation I want to introduce the problem that it tries to solve. Modern internet users access a wide range of sites, everything from social media and to message boards and porn sites - each with potentially a different log-in credential. Given this situation, some clever people probably thought: Wouldn t it be nice to use the same username and password at all the sites I access? And really, can t I just fill in my details once and when I access a site, they automatically get these details? Moreover, why can t I just sign-on once and automatically have access to every site that I m subscribed to without having to repeatedly enter my username and password? Siju Mammen (SANReN) Federated Identity Management 28th March / 18

4 What is Federation? Part 2 So what can we do about it? The central idea is that you exist as a digital person (cyber-self) similar to how you exist as a legal person. Your digital credentials (username and password) is a validation of your cyber-self similar to how an ID or driver s license validates your person. Just as your ID or driver s license contains attributes allowing you to buy a beer (i.e. your age), you digital credentials give a service access to attributes that may be used to authorise access to that service. Practically this means that you can use your Gmail account to log into Linkedin This in its core is what an Identity Federation is, where an entity trusts someone else to store and provide the user s information. To cater for this idea various protocols and other technologies have been developed to make this into a reality. Siju Mammen (SANReN) Federated Identity Management 28th March / 18

5 What is Federation? Part 3 Great, so lets start deplying it. Whats the hold up? Unfortunately the story doesn t end there - does anyone see the problem? For most internet use, the user s attributes are not verified by anyone apart from the user themselves. And that is fine for most use cases on the internet, but there are applications that require a degree of certainty that the user is who they say they are, and that their attributes are correct. Luckily there is a relatively easy means to solve this problem. Use a digital identity that has some way to verify the user s attributes. How? Simple: If a user is formally associated with an institution, he/she should use the credentials from that institution to log onto sites. This is possible because the user can just as well use any log-in credentials to access sites provided that they support federation. And now the service that is accessed can have some confidence that the user s attributes are accurate. Siju Mammen (SANReN) Federated Identity Management 28th March / 18

6 What is Federation? Part 4 So lets get all institutions to allow for Federated login. That shouldn t be too hard. Right? It turns out that institutions generally do not wish for their user credentials to be used in a Federated manner. There are many reasons for this, but the most important one are legal concerns around privacy and consent as well as liability issues if the user s credentials are abused. So what now? Realistically there are 2 options and both involve contracts: 1 Let the institution and the service that wants verified users use the technologies that have been developed for federation, and in the background form some sort of legal contract between them to safeguard each other. 2 Formalise the entire Federation and make it an exclusive club where both the institutions providing the identities and the people providing the services need to follow certain policies to be part of it. And in this case legal issues need to be catered for in the policies. Siju Mammen (SANReN) Federated Identity Management 28th March / 18

7 What is Federation? Part 5 Answer the question already And now I am finally able to define what is meant by an identity federation: It is the trust framework created between select organisations, built upon the technologies, policies and procedures that have been agreed on with the end goal to allow users to use their existing digital identities from an organisation to access various services. Siju Mammen (SANReN) Federated Identity Management 28th March / 18

8 So what does it mean to Start a Federation? The most complicated part of creating a Federation is the Technologies, right? Siju Mammen (SANReN) Federated Identity Management 28th March / 18

9 Roleplayers in the Federation stage All the world s a stage - but who are the actors? Identity Provider - IdP The organisation that provides the user credentials Service Provider - SP Whoever provides the web service that you want to access Discovery Service Allows you to find your home institution Federation Agent An optional entity that manages the Federation Siju Mammen (SANReN) Federated Identity Management 28th March / 18

10 Research and education identity federations The concept of Federation is not new and especially in the Research & education sphere, it is quite widely deployed in developed nations as shown in the following diagram: Siju Mammen (SANReN) Federated Identity Management 28th March / 18

11 Technology part 1: Protocol We need to standardise our grammar! In the entire sphere of Federated Identity Management we have 3 or 4 protocols to choose from SAML 2.0 WS-Federation OpenID Connect Information Card based identities Practically we only have one choice: SAML 2.0. However we do have a choice of implementations of SAML 2.0 including: simplesamlphp Shibboleth Siju Mammen (SANReN) Federated Identity Management 28th March / 18

12 Technology part 2: Attributes Let s make sure we are all speaking the same language The availability of attributes to be provisioned if required is one of the main advantages of Federation. And they do not actually pose a real technical challenge. The problem comes in with the way that different organisations decide to name their attributes differently. E.g. First Name vs Given Name To make sure everyone understands one another, within a formal federation, a Schema is often agreed on to avoid these forms of confusion. The schema is usually quite minimal and generally represents only the required fields for attribute exchange in the federation. Siju Mammen (SANReN) Federated Identity Management 28th March / 18

13 Technology part 3.1: Mesh Architecture Maybe everyone should connect to everyone Siju Mammen (SANReN) Federated Identity Management 28th March / 18

14 Technology part 3.2: Hub-and-spoke architecture Central management is useful Siju Mammen (SANReN) Federated Identity Management 28th March / 18

15 Services Why should anyone go through all this effort? The simple answer to this question is Services. Federation allows the creators of services to deploy them without having to worry about the overhead of maintaining a database of users. Examples of services include: Library services Grid services Video conferencing Cloud Services (maybe) Certification Services Commercial Services Siju Mammen (SANReN) Federated Identity Management 28th March / 18

16 Implementing a Federation What needs to be done, and who needs to do it? While there is no set procedure to implement a federation, the following aspects will always have to be decided on (my opinion is provided in brackets): Identify the scope of the Federation (R&E institutes and related services) Choose a protocol to use within the Federation (SAML 2.0) Identify a schema or set of attributes to be used within the Federation (eduperson as a Starting point) Decide on the architecture of the Federation (start with hub and spoke) Define the policies of the Federation (build on the policies of other Federations) Siju Mammen (SANReN) Federated Identity Management 28th March / 18

17 Next Steps What will happen from here on: SANReN will organise a workshop workshop from the 6th to the 8th May. Purpose is to introduce institutions to Federations. With the end goal of forming a Steering Committee and various working groups to take the project forward What we need from you: Get your institution to participate in the workshop Help market the idea Learn more about Federation and if interested come to the workshop yourself. Siju Mammen (SANReN) Federated Identity Management 28th March / 18

18 Questions Thank you Siju Mammen (SANReN) Federated Identity Management 28th March / 18

South Africa's Federated Identity Management Initiative

South Africa's Federated Identity Management Initiative Abstract South Africa's Federated Identity Management Initiative Siju A. MAMMEN SANREN, Building 43d, CSIR, Meiring Naude Rd. Brummeria, Pretoria, South Africa Tel: +27 12 841 4213, Fax +27 12 841 4223,

More information

White Paper. What is an Identity Provider, and Why Should My Organization Become One?

White Paper. What is an Identity Provider, and Why Should My Organization Become One? White Paper What is an Identity Provider, and Why Should My Organization Become One? May 2015 Executive Overview Tame Access Control Security Risks: Become an Identity Provider (IdP) Organizations today

More information

Identity Federation For Authenticating and Authorizing Researchers

Identity Federation For Authenticating and Authorizing Researchers Identity Federation For Authenticating and Authorizing Researchers Cletus Okolie NOC Manager Eko-Konnect Research and Education Initiative Outline What are IdFs? IdF components Software Packages for IdF

More information

CLAIMS-BASED IDENTITY FOR WINDOWS

CLAIMS-BASED IDENTITY FOR WINDOWS CLAIMS-BASED IDENTITY FOR WINDOWS TECHNOLOGIES AND SCENARIOS DAVID CHAPPELL FEBRUARY 2011 SPONSORED BY MICROSOFT CORPORATION CONTENTS Understanding Claims-Based Identity... 3 The Problem: Working with

More information

Lets get a federated identity. Intro to Federated Identity. Feide OpenIdP. Enter your email address. Do you have access to your email?

Lets get a federated identity. Intro to Federated Identity. Feide OpenIdP. Enter your email address. Do you have access to your email? Lets get a feated identity Intro to Feated Identity EuroCAMP Training for APAN32 This work is licensed un a Creative Commons Attribution ShareAlike 3.0 Unported License. Do you have access to your email?

More information

E-Learning Courses. Course Category

E-Learning Courses. Course Category Course Category Health and Safety E-Learning Courses Course Title Creating a Safe and Healthy Office Fire Safety at Work Health and Safety at Work Health and Safety for Managers Course Description The

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

ONLINE SAFETY TEACHER S GUIDE:

ONLINE SAFETY TEACHER S GUIDE: TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.

More information

Logout in Single Sign-on Systems

Logout in Single Sign-on Systems Logout in Single Sign-on Systems Sanna Suoranta, Asko Tontti, Joonas Ruuskanen, Tuomas Aura IFIP IDMAN, London, UK, 8-9.4.2013 Logout in Single Sign-on Systems Motivation Single sign-on (SSO) systems SSO

More information

Step-up-authetication as a service

Step-up-authetication as a service Step-up-authetication as a service Pieter van der Meulen Technical Product Manager For more details see the report at: http://www.surfnet.nl/ Documents/rapport_Step-up_Authentication-as-a- Service_Architecture_and_Procedures_final.pdf

More information

Federated Identity Management Checklist

Federated Identity Management Checklist Federated Identity Management Checklist This document lists the minimum (marked with an *) and recommended policy, process, and technical steps required to implement Federated Identity Management and operate

More information

SD Departmental Meeting November 28 th, 2006. Ale de Vries Product Manager ScienceDirect Elsevier

SD Departmental Meeting November 28 th, 2006. Ale de Vries Product Manager ScienceDirect Elsevier ש בולת SD Departmental Meeting November 28 th, 2006 Ale de Vries Product Manager ScienceDirect Elsevier Shi... whát? : Shibboleth ש בולת [...] "stream, torrent". It derives from a story in the Hebrew Bible,

More information

ABFAB and OpenStack(in the Cloud)

ABFAB and OpenStack(in the Cloud) ABFAB and OpenStack(in the Cloud) David W Chadwick University of Kent 1 Authentication in OpenStack Keystone User Trust Relationship Swift/Glance etc. 2 Federated Authnwith External IdPs External IdP User

More information

Wholesaling Lease Options FREE Bonus

Wholesaling Lease Options FREE Bonus Wholesaling Lease Options FREE Bonus The Best Internet Tools I Use In My Real Estate Business That You Might Never Have Heard Of! I am a huge fan of using technology that WORKS and that makes my life EASIER.

More information

RealMe. Technology Solution Overview. Version 1.0 Final September 2012. Authors: Mick Clarke & Steffen Sorensen

RealMe. Technology Solution Overview. Version 1.0 Final September 2012. Authors: Mick Clarke & Steffen Sorensen RealMe Technology Solution Overview Version 1.0 Final September 2012 Authors: Mick Clarke & Steffen Sorensen 1 What is RealMe? RealMe is a product that offers identity services for people to use and manage

More information

Clip1ATK72_MP3 96K Panelists Tony Lucich and John Ruegg, and Interviewer Di Graski

Clip1ATK72_MP3 96K Panelists Tony Lucich and John Ruegg, and Interviewer Di Graski 1 [00:03:02] We are so pleased to welcome Tony Lucich, who is from Orange County, California. Tony, may we ask you to tell us your role in Orange County and why you re passionate about identity provision

More information

Thinking Cloud Services Look Before You Leap

Thinking Cloud Services Look Before You Leap Thinking Cloud Services Look Before You Leap Brian V. Cummings brian.cummings@tcs.com Tata Consultancy Services Friday, March 16, 2012 Session 10358 Preamble Cloud security literature consistently boils

More information

Federated Identity for Cloud Computing and Cross-organization Collaboration

Federated Identity for Cloud Computing and Cross-organization Collaboration Federated Identity for Cloud Computing and Cross-organization Collaboration Steve Moitozo Strategy and Architecture SIL International 20110616.2 (ICCM) Follow me @SteveMoitozo2 2 Huge Claims You want federated

More information

Federated Identity Management Solutions

Federated Identity Management Solutions Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology jkallela@cc.hut.fi Abstract Federated identity management allows users to access multiple services based on a single

More information

Safewhere*Identify 3.4. Release Notes

Safewhere*Identify 3.4. Release Notes Safewhere*Identify 3.4 Release Notes Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations.

More information

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department jmikhael@masdar.ac.ae

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department jmikhael@masdar.ac.ae Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department jmikhael@masdar.ac.ae Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation

More information

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia ei09095@fe.up.pt. Pedro Borges ei09063@fe.up.pt

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia ei09095@fe.up.pt. Pedro Borges ei09063@fe.up.pt Computer Systems Security 2013/2014 Single Sign-On Bruno Maia ei09095@fe.up.pt Pedro Borges ei09063@fe.up.pt December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................

More information

Разработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet

Разработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet Разработка программного обеспечения промежуточного слоя TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet Contents - SURFnet Middleware Services department: - eduroam, SURFfederatie,

More information

PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN

PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN CONNECTING TO THE CLOUD DAVID CHAPPELL DECEMBER 2009 SPONSORED BY AMAZON AND MICROSOFT CORPORATION CONTENTS The Challenge:

More information

Federated Wikis Andreas Åkre Solberg andreas@uninett.no

Federated Wikis Andreas Åkre Solberg andreas@uninett.no Federated Wikis Andreas Åkre Solberg andreas@uninett.no Wikis in the beginning...in the beginning wikis were wide open. Great! - But then the spammers arrived. Password protected wikis Create yet another

More information

Single Sign On. SSO & ID Management for Web and Mobile Applications

Single Sign On. SSO & ID Management for Web and Mobile Applications Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing

More information

Augmented reality enhances learning at Manchester School of Medicine

Augmented reality enhances learning at Manchester School of Medicine Augmented reality enhances learning at Manchester School of Medicine Welcome to the Jisc podcast. The University of Manchester is taking a unique approach to prescription training for its medical students

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Single Sign On at Colorado State. Ron Splittgerber

Single Sign On at Colorado State. Ron Splittgerber Single Sign On at Colorado State Ron Splittgerber Agenda Identity Management Authentication Authorization The Problem The Solution: Federation Trust Between Institutions Trust Between Institution and Federal

More information

T his feature is add-on service available to Enterprise accounts.

T his feature is add-on service available to Enterprise accounts. SAML Single Sign-On T his feature is add-on service available to Enterprise accounts. Are you already using an Identity Provider (IdP) to manage logins and access to the various systems your users need

More information

Information Security Group Active-client based identity management

Information Security Group Active-client based identity management Active-client based identity management Chris Mitchell Royal Holloway, University of London www.chrismitchell.net 1 Acknowledgements This is joint work with Haitham Al-Sinani, also of Royal Holloway. 2

More information

OpenLogin: PTA, SAML, and OAuth/OpenID

OpenLogin: PTA, SAML, and OAuth/OpenID OpenLogin: PTA, SAML, and OAuth/OpenID Ernie Turner Chris Fellows RightNow Technologies, Inc. Why should you care about these features? Why should you care about these features? Because users hate creating

More information

Shibboleth Development and Support Services. OpenID and SAML. Fiona Culloch, EDINA. EuroCAMP, Stockholm, 7 May 2008

Shibboleth Development and Support Services. OpenID and SAML. Fiona Culloch, EDINA. EuroCAMP, Stockholm, 7 May 2008 OpenID and SAML Fiona Culloch, EDINA EuroCAMP, Stockholm, 7 May 2008 What is OpenID for? In principle, an OpenID is a universal username, valid across multiple, unrelated services E.g., I have fculloch.protectnetwork.org

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

Okta Identity Management for Portals Built on Salesforce.com. An Architecture Review. Okta Inc. 301 Brannan Street San Francisco, CA 94107

Okta Identity Management for Portals Built on Salesforce.com. An Architecture Review. Okta Inc. 301 Brannan Street San Francisco, CA 94107 Okta Identity Management for Portals Built on Salesforce.com An Architecture Review Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 Okta: A Platform for Cloud

More information

TRUST AND IDENTITY EXCHANGE TALK

TRUST AND IDENTITY EXCHANGE TALK TRUST AND IDENTITY EXCHANGE TALK Ken Klingenstein, Internet2 2015 Internet2 Trust and Identity Why It Matters An Identity Layer for the Internet Benefits for the Rest of the Stack What It Is Technologies

More information

USING FEDERATED AUTHENTICATION WITH M-FILES

USING FEDERATED AUTHENTICATION WITH M-FILES M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication

More information

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML

More information

Hospitality Cloud+Plus. How Technology Can Benefit Your Hotel LIMOTTA IT. LIMOTTAIT.com/hospitality 888 884 6278

Hospitality Cloud+Plus. How Technology Can Benefit Your Hotel LIMOTTA IT. LIMOTTAIT.com/hospitality 888 884 6278 Hospitality Cloud+Plus How Technology Can Benefit Your Hotel LIMOTTA IT LIMOTTAIT.com/hospitality 888 884 6278 Content + + About Us PCI Compliance + Virtualization + + + Unified Technology Single Sign

More information

Open Source Identity Integration with OpenSSO

Open Source Identity Integration with OpenSSO Open Source Identity Integration with OpenSSO April 19, 2008 Pat Patterson Federation Architect pat.patterson@sun.com blogs.sun.com/superpat Agenda Web Access Management > The Problem > The Solution >

More information

Mid-Project Report August 14 th, 2012. Nils Dussart 0961540

Mid-Project Report August 14 th, 2012. Nils Dussart 0961540 Mid-Project Report August 14 th, 2012 Nils Dussart 0961540 CONTENTS Project Proposal... 3 Project title... 3 Faculty Advisor... 3 Project Scope and Individual Student Learning Goals... 3 Proposed Product

More information

Neustar Intelligent Cloud Services

Neustar Intelligent Cloud Services Neustar Intelligent Cloud Services Position Paper: W3C Workshop on Identity in the Browser Submitted on April 20, 2011 Primary Contact John Hwang Product Manager, Neustar 571-434-4693 john.hwang@neustar.biz

More information

Easy Casino Profits. Congratulations!!

Easy Casino Profits. Congratulations!! Easy Casino Profits The Easy Way To Beat The Online Casinos Everytime! www.easycasinoprofits.com Disclaimer The authors of this ebook do not promote illegal, underage gambling or gambling to those living

More information

Social Return on Investment

Social Return on Investment Social Return on Investment Valuing what you do Guidance on understanding and completing the Social Return on Investment toolkit for your organisation 60838 SROI v2.indd 1 07/03/2013 16:50 60838 SROI v2.indd

More information

Wireless Printing through the Google Cloud

Wireless Printing through the Google Cloud Wireless Printing through the Google Cloud Wireless printing is lacking in quite a few libraries and for good reason. Between driver issues, security concerns, operating systems differences, staff training,

More information

Identity Management. Critical Systems Laboratory

Identity Management. Critical Systems Laboratory Identity Management Critical Systems What is Identity Management? Identity: a set of attributes and values, which might or might not be unique Storing and manipulating identities Binding virtual identities

More information

INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Make and register your lasting power of attorney a guide

Make and register your lasting power of attorney a guide LP12 Make and register your lasting power of attorney a guide Financial decisions including: running your bank and savings accounts making or selling investments paying your bills buying or selling your

More information

Vodafone Hosted Services - A Guide to Selecting and Preparing Your Own Domain

Vodafone Hosted Services - A Guide to Selecting and Preparing Your Own Domain Vodafone Hosted Services Domain and email packages User guide Welcome. This guide will help you to choose and purchase your Vodafone Hosted Services packages. From here you can select and buy your own

More information

THIS HAD BETTER BE GOOD

THIS HAD BETTER BE GOOD THIS HAD BETTER BE GOOD A nd trust me, it is. What would you think if I told you that you can make an international call of high quality sound, and it would cost you nothing? I know, it sounds like one

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

Identity Federation Management to make Operational and Business Efficiency through SSO

Identity Federation Management to make Operational and Business Efficiency through SSO 2012 International Conference on Industrial and Intelligent Information (ICIII 2012) IPCSIT vol.31 (2012) (2012) IACSIT Press, Singapore Identity Federation Management to make Operational and Business

More information

IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0

IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 International Virtual Observatory Alliance IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 IVOA Proposed Recommendation 20151029 Working group http://www.ivoa.net/twiki/bin/view/ivoa/ivoagridandwebservices

More information

SAML SSO Configuration

SAML SSO Configuration SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting

More information

Single Sign-On (SSO), Identity Exchange Hub, Remote Identity Proofing

Single Sign-On (SSO), Identity Exchange Hub, Remote Identity Proofing Single Sign-On (SSO), Identity Exchange Hub, Remote Identity Proofing Brian Seggie Director of Security 1 Why are we doing this? Leverage large MICAM investment ($30 M) Improve identity verification to

More information

IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

ShibboLEAP Project. Final Report: School of Oriental and African Studies (SOAS) Colin Rennie

ShibboLEAP Project. Final Report: School of Oriental and African Studies (SOAS) Colin Rennie ShibboLEAP Project Final Report: School of Oriental and African Studies (SOAS) Colin Rennie May 2006 Shibboleth Implementation at SOAS Table of Contents Introduction What this document contains Who writes

More information

Awareness Training for VIM Volunteers and Staff

Awareness Training for VIM Volunteers and Staff Awareness Training for VIM Volunteers and Staff To have every volunteer: Understand what HIPAA is. Know the meaning of Protected Health Information (PHI). Understand the significance of Treatment, Payment,

More information

PEER PRESSURE TEACHER S GUIDE:

PEER PRESSURE TEACHER S GUIDE: TEACHER S GUIDE: PEER PRESSURE LEARNING OBJECTIVES Students will be able to identify peer pressure as both a positive and negative force. Students will understand how peer pressure impacts everyone. Students

More information

Analysis and Implementation of a SSO Solution for Several Web Portal

Analysis and Implementation of a SSO Solution for Several Web Portal Aalto University Bachelor s Thesis Analysis and Implementation of a SSO Solution for Several Web Portal Author: Xavi Magrinyà Supervisor: Professor Petri Vuorimaa A Thesis submitted in fulfilment of the

More information

Department of the Interior Privacy Impact Assessment

Department of the Interior Privacy Impact Assessment Department of the Interior August 15, 2014 Name of Project: email Enterprise Records and Document Management System (eerdms) Bureau: Office of the Secretary Project s Unique ID: Not Applicable A. CONTACT

More information

HIPAA RULES AND REGULATIONS

HIPAA RULES AND REGULATIONS HIPAA RULES AND REGULATIONS INTRODUCTION Everyone who works in or around health care has heard about the HIPAA, the Health Insurance Portability and Accountability Act. And certainly, everyone who is in

More information

OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900

OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 OAuth 2.0 Developers Guide Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 Table of Contents Contents TABLE OF CONTENTS... 2 ABOUT THIS DOCUMENT... 3 GETTING STARTED... 4

More information

FTP-Stream Integrating Active Directory Federation Services

FTP-Stream Integrating Active Directory Federation Services FTP-Stream Integrating Active Directory Federation Services 1 Overview Active Directory Federation Services (ADFS) is a standards-based service that allows the secure sharing of identity information between

More information

The partnership has also led to a joint library catalogue between Suffolk and Cambridgeshire.

The partnership has also led to a joint library catalogue between Suffolk and Cambridgeshire. Case study: SPINE 2 What Our questionnaire response tells us that SPINE (Shared Partnership in the East) is: A partnership of library authorities comprising Cambridgeshire, Suffolk and Norfolk, focused

More information

Ping Identity, Euro Cloud award entry

Ping Identity, Euro Cloud award entry Ping Identity, Euro Cloud award entry Category: Best Cloud Offering Product: PingFederate 6.6 About Ping Identity Ping Identity is the cloud identity security leader, specialising in cloud identity, security,

More information

Network License File. Program CD Workstation

Network License File. Program CD Workstation Setting up Network Licensing for Visual Water Designer These directions will provide a detailed description of how to set up and run the network license version of Visual Water Designer. A network license

More information

Why is it important?

Why is it important? Keeping safe online Why is it important? The obvious reason avoid danger or unhappiness now. But ALSO Protect your future. Ever want to get a job? Or go to college? Or apply for a scholarship? Everyone

More information

In fact, one of the biggest challenges that the evolution of the Internet is facing today, is related to the question of Identity Management [1].

In fact, one of the biggest challenges that the evolution of the Internet is facing today, is related to the question of Identity Management [1]. 1. Introduction Using the Internet has become part of the daily habits of a constantly growing number of people, and there are few human activities that can be performed without accessing the enormous

More information

Why Your Business Needs a Website: Ten Reasons. Contact Us: 727.542.3592 Info@intensiveonlinemarketers.com

Why Your Business Needs a Website: Ten Reasons. Contact Us: 727.542.3592 Info@intensiveonlinemarketers.com Why Your Business Needs a Website: Ten Reasons Contact Us: 727.542.3592 Info@intensiveonlinemarketers.com Reason 1: Does Your Competition Have a Website? As the owner of a small business, you understand

More information

City of De Pere. Halogen How To Guide

City of De Pere. Halogen How To Guide City of De Pere Halogen How To Guide Page1 (revised 12/14/2015) Halogen Performance Management website address: https://global.hgncloud.com/cityofdepere/welcome.jsp The following steps take place to complete

More information

SAML Security Option White Paper

SAML Security Option White Paper Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions

More information

Federated Identity Management. Willem Elbers (MPI-TLA) EUDAT training

Federated Identity Management. Willem Elbers (MPI-TLA) EUDAT training Federated Identity Management Willem Elbers (MPI-TLA) EUDAT training Date: 26 June 2012 Outline FIM and introduction to components Federation and metadata National Identity federations and inter federations

More information

Internet basics 2.2 Staying safe online. Beginner s guide to. Basics

Internet basics 2.2 Staying safe online. Beginner s guide to. Basics Basics Beginner s guide to Internet basics 2.2 Staying safe online Use this document with the glossary A helper should take you through this guide This activity will help you register safely online and

More information

Once you have obtained a username and password you must open one of the compatible web browsers and go to the following address to begin:

Once you have obtained a username and password you must open one of the compatible web browsers and go to the following address to begin: CONTENT MANAGER GUIDELINES Content Manager is a web-based application created by Scala that allows users to have the media they upload be sent out to individual players in many locations. It includes many

More information

How to Get Set Up for the 2014 BE-180 and Request an Extension if Needed

How to Get Set Up for the 2014 BE-180 and Request an Extension if Needed How to Get Set Up for the 2014 BE-180 and Request an Extension if Needed For instructions on how to get set up for the 2014 BE-180 and to request an extension if one is needed, click on one of the links

More information

Issues in federated identity management

Issues in federated identity management Issues in federated identity management Sandy Shaw EDINA IASSIST 24-27 May 2005, Edinburgh 1 Contents Federated identity management overview Open issues for federations 2 Introduction Federated identity

More information

CAS s IDP system and resources in Education Cloud

CAS s IDP system and resources in Education Cloud CAS s IDP system and resources in Education Cloud DAREN ZHA CANS2015, Chengdu Outline CAS s IDP system and Education Cloud introduction Problems of interoperation A interoperation plan CAS s Education

More information

Personal Information. About you. Personal information and your identity.

Personal Information. About you. Personal information and your identity. Personal Information About you. Personal information and your identity. 213301 Keeping you safe and stopping fraud. More and more people are worried about identity theft and fraud. We re working 24/7 to

More information

IGI Portal architecture and interaction with a CA- online

IGI Portal architecture and interaction with a CA- online IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

CARING IN PLACE WEB USER GUIDE

CARING IN PLACE WEB USER GUIDE CARING IN PLACE WEB USER GUIDE Instructions on how to use Caring in Place on the web The purpose of this document is to help you get started with Caring in Place on the web. Caring in Place is also available

More information

Creating a Successful Marketing Strategy

Creating a Successful Marketing Strategy Creating a Successful Marketing Strategy While referrals are great, and will always be part of growing a business, many who have relied on referrals exclusively in the past have more recently needed to

More information

A Standards-based Mobile Application IdM Architecture

A Standards-based Mobile Application IdM Architecture A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted

More information

Thinking about using a hidden camera or other equipment to monitor someone s care?

Thinking about using a hidden camera or other equipment to monitor someone s care? Thinking about using a hidden camera or other equipment to monitor someone s care? FEBRUARY 2015 We are the Care Quality Commission. Our job is to inspect health and social care services such as your local

More information

Cloud Computing. Chapter 5 Identity as a Service (IDaaS)

Cloud Computing. Chapter 5 Identity as a Service (IDaaS) Cloud Computing Chapter 5 Identity as a Service (IDaaS) Learning Objectives Describe challenges related to ID management. Describe and discuss single sign-on (SSO) capabilities. List the advantages of

More information

What Are Certificates?

What Are Certificates? The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form

More information

Adding Federated Identity Management to Openstack

Adding Federated Identity Management to Openstack Adding Federated Identity Management to Openstack David Chadwick d.w.chadwick@kent.ac.uk 5 April 2014 Cloud Computing Security and Identity Workshop, NMOC 1 OpenStack Large open source project to develop

More information

Adopting Agile Testing

Adopting Agile Testing Adopting Agile Testing A Borland Agile Testing White Paper August 2012 Executive Summary More and more companies are adopting Agile methods as a flexible way to introduce new software products. An important

More information

Single Sign-On Portal User Reference (Okta Cloud SSO)

Single Sign-On Portal User Reference (Okta Cloud SSO) Single Sign-On Portal User Reference (Okta Cloud SSO) Contents Okta Single Sign-on Portal... 3 Initial account creation and configuration... 3 First time manual login to the Okta Single Sign-on Portal...

More information

Final Project Report December 9, 2012. Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540

Final Project Report December 9, 2012. Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540 Final Project Report December 9, 2012 Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540 CONTENTS Project Proposal... 4 Project title... 4 Faculty Advisor... 4 Introduction...

More information

seamless simplicity to simple identity management in education.

seamless simplicity to simple identity management in education. seamless simplicity to simple identity management in education. we ve had a lot of feedback but sums it up nicely. the YouID family There are currently two products in the YouID portfolio, both developed

More information

Page 18. Using Software To Make More Money With Surveys. Visit us on the web at: www.takesurveysforcash.com

Page 18. Using Software To Make More Money With Surveys. Visit us on the web at: www.takesurveysforcash.com Page 18 Page 1 Using Software To Make More Money With Surveys by Jason White Page 2 Introduction So you re off and running with making money by taking surveys online, good for you! The problem, as you

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Adding Federated Identity Management to OpenStack

Adding Federated Identity Management to OpenStack Adding Federated Identity Management to OpenStack David Chadwick University of Kent 3 December 2012 University of Kent 1 Some Definitions What is Identity? A whole set of attributes that in combination

More information

HUMAN RESOURCES POLICIES & PROCEDURES

HUMAN RESOURCES POLICIES & PROCEDURES HUMAN RESOURCES POLICIES & PROCEDURES Policy title Application IT systems and social networking policy All employees and students CONTENTS PAGE Introduction and scope 2 General points 2 Authorisation to

More information

50 Tough Interview Questions

50 Tough Interview Questions You and Your Accomplishments 1. Tell me a little about yourself. 50 Tough Interview Questions Because this is often the opening question, be careful that you don t run off at the mouth. Keep your answer

More information

Instructions on how to create a free Gmail account

Instructions on how to create a free Gmail account Instructions on how to create a free Gmail account January 28th 2009 Version 0 CONTENTS 1 Introduction... 3 2 What is Gmail?... 3 3 Step 1: Open the Gmail web site... 3 4 Step 2: Enter all the required

More information

QR-SSO : Towards a QR-Code based Single Sign-On system

QR-SSO : Towards a QR-Code based Single Sign-On system QR-SSO : Towards a QR-Code based Single Sign-On system Syamantak Mukhopadhyay School of Electronics and Computer Science University of Southampton Southampton, UK sm19g10@ecs.soton.ac.uk David Argles School

More information