Two SSO Architectures with a Single Set of Credentials
|
|
|
- Christal Murphy
- 9 years ago
- Views:
Transcription
1 Two SSO Architectures with a Single Set of Credentials Abstract Single sign-on (SSO) is a widely used mechanism that uses a single action of authentication and authority to permit an authorized user to access all computers and systems. There are several SSO architectures. Some use a single set of credentials and some use multiple credentials. Each has advantages and disadvantages. SSO architectures with a single set of credentials are generally either Token-based or Public Key Infrastructure-based. This report explores these two flavors in depth, discusses their similarities and differences, and compares their strengths and weaknesses. Outline 1. What is SSO 1.1 Introduction 1.2 SSO terminologies 1.3 SSO architectures 2. SSO architectures with a single set of credentials 2.1 Token-based SSO system Kerberos authentication protocol Token-based SSO in HTTP environment 2.2 PKI-based SSO system Integrating Public Key cryptography with Kerberos 3. Conclusions 4. References
2 1. What is SSO? 1.1 Introduction Consider how many logons do you need each day to get your works done? If the number of different applications you use is not large, this may not be a big issue, but as the growing use of web-enable applications, the amount of time you spend on typing various passwords to login might be unacceptable. Imagine that you are a accountant that works in a big company, the first thing you usually do when you come to your office each day is to logon to a number of, we say, 10 applications which connect to databases that may locate in different companies. A study conducted by the Network Applications Consortium ( in large enterprises showed that users spend an average of up to 44 hours per year to perform logon tasks to access a set of 4 applications. The same study measured the content of the calls to companies helpdesk: 70 per cent of the calls were password reset requests. [1] The administration cost is also very high, no need to mention that managing multiple credentials for each user are much more difficult than just managing one single credentials. Furthermore, as the number of credentials for each user increase, so does the possibility of losing or forgetting them. Single Sign-on is the technology that aims to solve the above problems, one single logon to the main authentication centre would subsequently enable user to get access to all other resources available. Multiple logons are no longer needed. 1.2 SSO terminologies Below are the most commonly used SSO terminologies. Authentication authorities: authentication authorities are the entities that are trusted by users to perform SSO functions [1].
3 Authentication servers: authentication servers are physical machines that perform SSO functions [1]. Application servers: application servers are physical machines which serve client machines. Domain: a domain is a set of resource dominated by an authentication authority. Credentials: There are various forms for those credentials: it might be, for example, a simple username/password or certificate, but other methods can be implemented. The SSO server performs a validation of the users' credentials using the underlying security infrastructure Server key: server keys are keys shared by authentication servers and application servers. Session key: Session keys are keys shared by client machines and application servers, a client first need to registers at an authentication authority, the authentication centre generate a session key and distribute it to both the client machine and the application server. 1.3 SSO architectures: In Jan De Clercq s Single Sing-on architectures [1], SSO systems are divided into two basic architectures: single SSO architecture and complex SSO architecture. Simple SSO architecture is when there is only one authentication authority available, so there is also just one set of credentials for each user. According to operating system vendors like Novell and Microsoft, this architecture is could be easily implemented in homogeneous LAN and intranet environment. Complex SSO architecture is when there are multiple platforms and multiple credentials managed by multiple authentication authorities. The situation for complex SSO architecture is much more complex and harder to be accomplished. Complex SSO architecture could be further distinguished to two basic schemes: complex SSO dealing with a single set of
4 credentials and complex SSO dealing with many different credentials. There are two ways to accomplish complex SSO system dealing with a single set of credentials: Token-based and Public Key-based. There are also a couple of ways to handle complex SSO system dealing with many different credentials, but that is not the concern of this report. This report aims to discuss and contrast Token-based and PKI-based complex SSO systems. 2. SSO architectures with a single set of credentials 2.1 Token-based SSO system The basic idea of Token-based SSO system is as follow: when a user submit the credentials to the taken-based authentication authority, the authentication authority check its credential database, if the credentials match, the user is then returned with a token. This token is temporarily cached in the user s computer until the user needs to access another application server governed by another authentication authority, this token is delivered to the secondary authentication authority to regain a ticket to the application server, the successful of this process rely on the trust that the other authentication authorities have on the primary authentication authority Kerberos authentication protocol Kerberos is a distributed authentication system that was developed on mid 80 s as part of MIT s project Athena [2]. It is a classical implementation of Token-based authentication protocol. The paper Kerberos: An Authentication Service for Computer Networks [2] has given a simplified version about how Kerberos protocol works. In this paper, the whole process is divided into two parts: Authentication Request and Response, Application Request and Response.
5 Authentication Request and Response: The client sends its request for the service of a particular application server to the authentication server; the request includes the client s identity, the name of the application server, a requested expiration time for the ticket and a random number which will be used to match the response. The authentication server sends a response if this is a valid request. The response includes the session key shared by the authentication server and the application server, the expiration time, the name of application server and a ticket, all of these are encrypted by the secret key shared by the client and authentication server. Application Request and Response: as soon as the client receives the response, it extracts the session key and other information with its secret key, and forwards the ticket and an authenticator to the application server to prove its validity, the authenticator include the current time, a checksum and an optional encryption key, all encrypted with the session key. The application server decrypts the request with the session key it owns, if the process goes smoothly, the application server assume that the client is a valid user and return the data requested by the client. If a mutual authentication is needed, the application server needs to extract the client s time from the authenticator, and then encrypt it with some other information and return it to the client. The simplified version of Kerberos authentication protocol ignores some important parts of the authentication process, the author did give a graph of the complete scheme but the explanation is not detailed enough. The complete scheme and detailed explanation can be found in Ian Downnard s paper Public-key cryptography extensions into Kerberos [3]. If a client has to submit its credentials each time it calls for the service of a new application server, the process would be cumbersome and perhaps more risky, fortunately, this is not the case. In real Kerberos systems, the client initially submits its credentials to the Key Distribution Centre (KDC), KDC consists of two parts:
6 Authentication Server (AS) and Ticket-Granting Server (TGS). AS validate the credentials and return a Ticket Granting Ticket (TGT), TGT then permit the client to request tickets to application servers Token-based SSO in HTTP environment In paper Single Sign-on architectures [1], the author mentioned the token-based SSO could be implemented by using cookies in HTTP environment when introducing Token-based SSO architecture but no details are given. The paper Single Sing-On using Cookies for Web Applications extends this architecture [4]. A cookie is a set of information given to the web browser by the web server and store in the client machine, the server could then retrieve the information and provide customized service for the client. Kerberos system provide basis for constructing secure SSO in network environment, however, it needs client side infrastructure and configuration. In HTTP-enabled environment, cookies could be used to construct SSO system and no extra installation or configuration is necessary. The biggest difference between Kerberos system and Cookies-enabled SSO system is that the former use Remote Procedure Calls to transport authentication tickets, while the latter use cookies to play the role of tokens in Token-based SSO system. 2.2 PKI-based SSO system There are two popular cryptographic methods: symmetric-key cryptography and asymmetric-key cryptography. Symmetric-key cryptography uses the same key (secret key) to encrypt and decrypt information. While for asymmetric-key cryptography, the key used to encrypt (public key) and the key used to decrypt (private key) are
7 different. And the secret key could not be deduced from the public key. Public Key cryptography is usually used to perform two main functions: (1). Encryption/Decryption: a user could make his/her public key public so everybody could send message encrypted with the public key to him/her, but the message could only be decrypted with the corresponding private key kept by the user. (2) Digital signature: a user could send a message encrypted with the private key to a receiver, the receiver could then determine if the message came from the user by decrypting the message with public key and check the originality of the message. In conventional Token-based SSO system, symmetric-key cryptography is used to encrypt the tickets, the authentication server must have application server s secret key stored in the database. In Kerberos system, Key Distribution Centre is responsible for storing registered application server s secret keys. Token-based SSO system works well but it can be improved by adopting asymmetric-key cryptography in two aspects: Firstly, registration is easier, because there are no needs to transfer the secrete key to the authentication server, public key could be securely transported over the network without worrying being exposed. Secondly, since there are no copies of secret keys stored in the authentication centre, attackers could not compromise the system by hacking and retrieving keys from authentication centre. Strictly saying, PKI-based SSO system is still a kind of Token-based SSO system because they differ in cryptographic methods but tokens are still used to permit the client to get access to application servers Integrating Public Key cryptography with Kerberos PKI-based SSO system is mentioned in paper Single Sign-on Architectures [1], the basic structure is presented but little details are available. The paper Public-key cryptography extensions into Kerberos [3] aims to describe the schemes to extend Kerberos system with public key cryptography.
8 Although integrating Public Key with Token-based SSO like Kerberos could enhance the security and scalability of the SSO system, the performance of Public Key cryptography is the bottleneck. Poor performance of Public Key cryptography reflects in two ways: (1). the size of Public Key is much larger than the size of Secret Key, according to data provided by Ian Downnard [3], the Public Keys are usually 10 to 20 times larger than the Secret Keys. (2). the calculation process of encryption or decryption with Public Keys takes much longer than the process with Secret Keys. In this paper, author introduced three efforts made by researchers to extend Kerberos system with Public Key infrastructure: Public Key cryptography for Initial Authentication in Kerberos (PKINIT), Public Key cryptography for Cross Realm Authentication in Kerberos (PKCROSS) and Public Key based Kerberos for Distributed Authentication (PKDA). PKINIT Contrast to transitional Kerberos system, PKINIT use Public Key cryptography to perform the initial authentication, if the authentication process is successful, the remaining transaction will use secret keys that stored in KDC database. In PKINIT system, a client send a request for TGT to the KDC along with the credentials and digital signature, the KDC check the credentials and digital signature to see if the request is valid. If the request is valid, KDC send the TGT encrypted with the client s public key back to the client. The message is encrypted with KDC s private key so the client could check the signature to make sure the message is sent by a valid KDC. This is called mutual authentication. PKCROSS Public Key cryptography for Cross Realm Authentication in Kerberos, as its name suggest, is designed to build cross-realm Public Key SSO system.
9 The Public Key cryptography of the system takes place only between local KDC and remote KDC. The messages exchanged between the two key distributions centers closely follow the PKINIT specification, with the local key distribution center acting as the client. [3] Since PKINIT use Public Key cryptography between the client and the local KDC and PKCROSS use Public Key cryptography between local KDC and remote KDC, the author suggests that the Public Key cryptography can be applied to the whole Kerberos framework by integrating PKINIT with PKCROSS [3]. PKDA PKDA is a created to enhance privacy of the clients and improve scalability and security of Kerberos system. It is a totally different approach compared to PKINIT and PKCROSS. Client-side privacy is increased by simply moving the client identity fields from unencrypted to encrypted portions of the authentication messages. Increased scalability and security is attempted by moving authentication procedures away from centralized key distribution centers to between the individual clients and application servers on a network. [3] KDC is totally made redundant in PKDA, clients do not rely on KDC for initial authentication, and all services are between clients and application center supported by Public Key cryptography. PKDA has been expected to perform better than PKINI and PKCROSS because it avoids the bottleneck of KDC; however, the practice shows that PKDA may not necessarily faster than PKINI or PKCROSS because it needs Public Key cryptography each time a client require service from a application server.
10 3. Conclusions There are two main solutions for SSO systems dealing with a single set of credentials: Token-based SSO and PKI-based SSO, Token-based SSO has inherent drawbacks using Secret Key cryptography for transactions. PKI-based SSO is designed to improve security and scalability of Token-based SSO by extending Public Key cryptography in the process of validating tokens. Kerberos authentication protocol is a classical example of Token-based SSO system, Kerberos system provide secure means of authentication by adopting Secret Key encryption and mutual authentication. Token-based SSO in HTTP environment could also be achieved by using HHTP cookies without the needs for client side instillation and configurations. Researches have been trying to develop mature Kerberos system with Public Key cryptography support. PKINT, PKCROSS and PKDA are results of these efforts. PKINI use Public Key cryptography to perform an initial registration and use Secret Key to perform subsequent services, PKCROSS use Public Key cryptography to perform cross realm transactions. PKDA made a fundamental change to Kerberos standard by removing KDC and perform mutual authentication between clients and applications servers. 4. References [1] J. De Clercq, Single Sign-On Architectures In G. Davida et al. (eds.): InfraSec 2002, LNCS 2437, Pages: 40-58, [2] Neuman B.C. Ts'o T, Kerberos: An Authentication Service for Computer Networks Communications Magazine, IEEE, Volume: 32, Issue: 9, Sept Pages: [3] Downnard I, Public-key cryptography extensions into Kerberos Potentials, IEEE, Volume: 21, Issue: 5, Dec Jan Pages: 30-34
11 [4] Sama V, Single Sign-on using Cookies for Web applications Enabling Technologies: Infrastructure for Collaborative Enterprises, (WET ICE '99) Proceedings. IEEE 8th International Workshops on, June Pages:
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com
Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos
Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website:
Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o. Presented by: Smitha Sundareswaran Chi Tsong Su
Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o Presented by: Smitha Sundareswaran Chi Tsong Su Introduction Kerberos: An authentication protocol based on
Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?).
Kerberos Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530 520 BC. From Italy (?). 1 Kerberos Kerberos is an authentication protocol and a software suite implementing this
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
How To Use Kerberos
KERBEROS 1 Kerberos Authentication Service Developed at MIT under Project Athena in mid 1980s Versions 1-3 were for internal use; versions 4 and 5 are being used externally Version 4 has a larger installed
Web Single Sign-On System. For WRL Company
1 Web Single Sign-On System For WRL Company Si Xiong June 2005 Department of Internetworking Royal Institute of Technology (KTH), IT-University Stockholm, Sweden Master of Science Thesis Supervisor: Johan
TOPIC HIERARCHY. Distributed Environment. Security. Kerberos
KERBEROS TOPIC HIERARCHY Distributed Environment Security Privacy Authentication Authorization Non Repudiation Kerberos ORIGIN MIT developed Kerberos to protect network services. Developed under the Project
Architecture of Enterprise Applications III Single Sign-On
Architecture of Enterprise Applications III Single Sign-On Haopeng Chen REliable, INtelligent and Scalable Systems Group (REINS) Shanghai Jiao Tong University Shanghai, China e-mail: [email protected]
Microsoft.NET Passport, a solution of single sign on
Microsoft.NET Passport, a solution of single sign on Zheng Liu Department of Computer Science University of Auckland [email protected] Abstract: As the World Wide Web grows rapidly, accessing web-based
Single sign-on enabled OpenCms
Single sign-on enabled OpenCms Architecture for Single sign-on implementation into OpenCms Pavel Slavíček, [email protected] Brno, The Czech Republic, 2. 5. 2008 Content Single sign-on introduction
Implementing a Kerberos Single Sign-on Infrastructure
Implementing a Kerberos Single Sign-on Infrastructure Gary Tagg IT Security Consultant, Tagg Consulting Ltd [email protected] Abstract Kerberos provides secure authentication, single sign-on
NIST PKI 06: Integrating PKI and Kerberos (updated April 2007) Jeffrey Altman
NIST PKI 06: Integrating PKI and Kerberos (updated April 2007) Jeffrey Altman The Slow Convergence of PKI and Kerberos At Connectathon 1995 Dan Nessett of Sun Microsystems was quoted saying Kerberos will
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Strong Encryption for Public Key Management through SSL
Strong Encryption for Public Key Management through SSL CH.SUSHMA, D.NAVANEETHA 1,2 Assistant Professor, Information Technology, Bhoj Reddy Engineering College For Women, Hyderabad, India Abstract: Public-key
Single Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
Kerberos authentication made easy on OpenVMS
Kerberos authentication made easy on OpenVMS Author: Srinivasa Rao Yarlagadda [email protected] Co-Author: Rupesh Shantamurty [email protected] OpenVMS Technical Journal V18 Table of contents
Authentication Applications
Authentication Applications CSCI 454/554 Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures Kerberos a symmetric-key
GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK
Antti Pyykkö, Mikko Malinen, Oskari Miettinen GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK TJTSE54 Assignment 29.4.2008 Jyväskylä University Department of Computer Science
Configuring Integrated Windows Authentication for JBoss with SAS 9.2 Web Applications
Configuring Integrated Windows Authentication for JBoss with SAS 9.2 Web Applications Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., Configuring
Cross-Realm Trust Interoperability, MIT Kerberos and AD
Cross-Realm Trust Interoperability, MIT Kerberos and AD Dmitri Pal Sr. Engineering Manager Red Hat Inc. 10/27/2010 1 INTERNAL ONLY PRESENTER NAME What is our focus? Traditional view on Kerberos interoperability
HOBCOM and HOBLink J-Term
HOB GmbH & Co. KG Schwadermühlstr. 3 90556 Cadolzburg Germany Tel: +49 09103 / 715-0 Fax: +49 09103 / 715-271 E-Mail: [email protected] Internet: www.hobsoft.com HOBCOM and HOBLink J-Term Single Sign-On
Single Sign-On for Kerberized Linux and UNIX Applications
Likewise Enterprise Single Sign-On for Kerberized Linux and UNIX Applications AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise facilitates the
Double SSO A Prudent and Lightweight SSO Scheme. Master of Science Thesis in the Programme Secure and Dependable Computer Systems SARI HAJ HUSSEIN
Double SSO A Prudent and Lightweight SSO Scheme Master of Science Thesis in the Programme Secure and Dependable Computer Systems SARI HAJ HUSSEIN Chalmers University of Technology University of Gothenburg
Enterprise SSO Manager (E-SSO-M)
Enterprise SSO Manager (E-SSO-M) Many resources, such as internet applications, internal network applications and Operating Systems, require the end user to log in several times before they are empowered
Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service
Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service Sazzad Masud and Ram Krishnan University of Texas at San Antonio [email protected], [email protected] Abstract Cloud
OPC UA vs OPC Classic
OPC UA vs OPC Classic By Paul Hunkar Security and Communication comparison In the world of automation security has become a major source of discussion and an important part of most systems. The OPC Foundation
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Kerberos. Guilin Wang. School of Computer Science, University of Birmingham [email protected]
Kerberos Guilin Wang School of Computer Science, University of Birmingham [email protected] 1 Entity Authentication and Key Exchange In the last talk, we discussed key exchange and reviewed some concrete
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Single Sign-On Architectures. Jan De Clercq Security Consultant HPCI Technology Leadership Group Hewlett-Packard
Single Sign-On Architectures Jan De Clercq Security Consultant HPCI Technology Leadership Group Hewlett-Packard page 1 Agenda Trusted Security Infrastructures SSO: What and Why? SSO Architectures Extending
WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)
WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,
4.2: Kerberos Kerberos V4 Kerberos V5. Chapter 5: Security Concepts for Networks. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Secure Applications Network Authentication Service: Kerberos 4.2:
Leveraging SAML for Federated Single Sign-on:
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
Kerberos and Single Sign-On with HTTP
Kerberos and Single Sign-On with HTTP Joe Orton Red Hat Introduction The Problem Current Solutions Future Solutions Conclusion Overview Introduction WebDAV: common complaint of poor support for authentication
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
Configuring Integrated Windows Authentication for IBM WebSphere with SAS 9.2 Web Applications
Configuring Integrated Windows Authentication for IBM WebSphere with SAS 9.2 Web Applications Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., Configuring
IWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES
IWA AUTHENTICATION FUNDAMENTALS AND DEPLOYMENT GUIDELINES TECHNICAL BRIEF INTRODUCTION The purpose of this document is to explain how Integrated Windows Authentication (IWA) works with the ProxySG appliance,
etoken Single Sign-On 3.0
etoken Single Sign-On 3.0 Frequently Asked Questions Table of Contents 1. Why aren t passwords good enough?...2 2. What are the benefits of single sign-on (SSO) solutions?...2 3. Why is it important to
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Guide to SASL, GSSAPI & Kerberos v.6.0
SYMLABS VIRTUAL DIRECTORY SERVER Guide to SASL, GSSAPI & Kerberos v.6.0 Copyright 2011 www.symlabs.com Chapter 1 Introduction Symlabs has added support for the GSSAPI 1 authentication mechanism, which
SSO Methods Supported by Winshuttle Applications
Winshuttle and SSO SSO Methods Supported by Winshuttle Applications Single Sign-On (SSO) delivers business value by enabling safe, secure access to resources and exchange of information at all levels of
TIB 2.0 Administration Functions Overview
TIB 2.0 Administration Functions Overview Table of Contents 1. INTRODUCTION 4 1.1. Purpose/Background 4 1.2. Definitions, Acronyms and Abbreviations 4 2. OVERVIEW 5 2.1. Overall Process Map 5 3. ADMINISTRATOR
IceWarp Server - SSO (Single Sign-On)
IceWarp Server - SSO (Single Sign-On) Probably the most difficult task for me is to explain the new SSO feature of IceWarp Server. The reason for this is that I have only little knowledge about it and
Entrust Managed Services PKI
Entrust Managed Services PKI Entrust Managed Services PKI Windows Smart Card Logon Configuration Guide Using Web-based applications Document issue: 1.0 Date of Issue: June 2009 Copyright 2009 Entrust.
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide
IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices
Configuring Integrated Windows Authentication for JBoss with SAS 9.3 Web Applications
Configuring Integrated Windows Authentication for JBoss with SAS 9.3 Web Applications Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., Configuring
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
Kerberos and Active Directory symmetric cryptography in practice COSC412
Kerberos and Active Directory symmetric cryptography in practice COSC412 Learning objectives Understand the function of Kerberos Explain how symmetric cryptography supports the operation of Kerberos Summarise
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
WebLogic Server 7.0 Single Sign-On: An Overview
WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Identity Management and Single Sign-On
Delivering Oracle Success Identity Management and Single Sign-On Al Lopez RMOUG Training Days February 2012 About DBAK Oracle Solution Provider and License Reseller Core Technology and EBS Applications
Pass-the-Hash II: Admin s Revenge. Skip Duckwall & Chris Campbell
Pass-the-Hash II: Admin s Revenge Skip Duckwall & Chris Campbell Do you know who I am? Skip Co-presented PTH talk last year at BH, Derbycon http://passing-the-hash.blogspot.com @passingthehash on twitter
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security
Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored
ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES
CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML
Kerberos. Login via Password. Keys in Kerberos
Kerberos Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Secure Applications Network Authentication Service: Kerberos
SSL VPN vs. IPSec VPN
SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White
Intel Active Management Technology Integration with Microsoft Windows* Active Directory
Intel Active Management Technology Integration with Microsoft Windows* Active Directory Version 3.0.2, January 2007 Information in this document is provided in connection with Intel products. No license,
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
Cybersecurity and Secure Authentication with SAP Single Sign-On
Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
A method to Implement the Kerberos User. Authentication and the secured Internet Service
A method to Implement the Kerberos User Authentication and the secured Internet Service Pak Song-Ho, Pak Myong-Suk,Jang Chung-Hyok Kim Il Sung University, Pyongyang, DPR of Korea Abstract This paper proposes
Single Sign-On: Reviewing the Field
Outline Michael Grundmann Erhard Pointl Johannes Kepler University Linz January 16, 2009 Outline 1 Why Single Sign-On? 2 3 Criteria Categorization 4 Overview shibboleth 5 Outline Why Single Sign-On? Why
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Using Kerberos for Web Authentication. Wesley Craig University of Michigan
Using Kerberos for Web Authentication Wesley Craig University of Michigan Outline Basic Auth WebSSO SASL & HTTP Kerberos & TLS SPNEGO PKI, PKI, PKI For each technology, a brief over view, drawbacks, and
PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN
PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN CONNECTING TO THE CLOUD DAVID CHAPPELL DECEMBER 2009 SPONSORED BY AMAZON AND MICROSOFT CORPORATION CONTENTS The Challenge:
External Authentication with WebCT. What We ll Discuss
External Authentication with WebCT WebCT, Inc http://www.webct.com/ What We ll Discuss Introductions Terminology Authentication in WebCT External Authentication Custom Authentication Authorization in WebCT
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
ENABLING SINGLE SIGN-ON: SPNEGO AND KERBEROS Technical Bulletin For Use with DSView 3 Management Software
ENABLING SINGLE SIGN-ON: SPNEGO AND KERBEROS Technical Bulletin For Use with DSView 3 Management Software Avocent, the Avocent logo, The Power of Being There and DSView are registered trademarks of Avocent
Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management
Security Comparison Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309
Hybrid for SharePoint Server 2013. Search Reference Architecture
Hybrid for SharePoint Server 2013 Search Reference Architecture 2014 Microsoft Corporation. All rights reserved. This document is provided as-is. Information and views expressed in this document, including
Introduction to Computer Security
Introduction to Computer Security Authentication and Access Control Pavel Laskov Wilhelm Schickard Institute for Computer Science Resource access: a big picture 1. Identification Which object O requests
