USING SAML TO LINK THE GLOBUS TOOLKIT TO THE PERMIS AUTHORISATION INFRASTRUCTURE
|
|
|
- Felicity Smith
- 9 years ago
- Views:
Transcription
1 USING SAML TO LINK THE GLOBUS TOOLKIT TO THE PERMIS AUTHORISATION INFRASTRUCTURE Authors David Chadwick 1, Sassa Otenko 1, Von Welch 2 Affiliation 1 ISI, University of Salford, Salford, M5 4WT, England. 2 Argonne National Laboratory, University of Chicago Abstract: Key words: In this article the new trend in authorisation decision making will be described, using the Security Assertions Mark up Language (SAML). We then present an overview of the Globus Toolkit (GT), used in Grid computing environments, and highlight its authorisation requirements. We then introduce the PERMIS authorisation infrastructure and describe how it has been adapted to support SAML so that it can be deployed to make authorisation decisions for GTversion 3.3. SAML, Grid Computing, Authorisation, X.509 attribute certificates, RBAC, policy decision making, PDP, PEP. 1. INTRODUCTION The Security Assertions Markup Language (SAML) [1] has been designed by the Organization for the Advancement of Structured Information Standards (OASIS) to provide a universal mechanism for conveying security-related information between the various parts of an access control system. It is an XML-based language for encoding security request and response messages between the initiator of an access request, the authentication service, the authoriser (termed an attribute authority) and the access control decision function (ADF). Some of these parts of an access control system may be grouped together, in which case they will not need to send SAML messages between themselves, and may use some sort of API to convey the necessary information between each other.
2 2 Authors David Chadwick1, Sassa Otenko1, Von Welch2 The Globus Toolkit (GT) is an implementation of Grid software, which has a number of tools that make development and deployment of Grid Services easier [2]. One of the key features of this toolkit is secure communications. However, Globus Toolkit has limited authorisation capabilities based on simple access control lists. To improve its authorization capabilities a SAML authorisation callout has been added. The important consequence of this is that it will be possible to deploy an authorisation service that the GT will contact to make authorisation decisions about what methods can be executed by a given client. One such authorisation service is PERMIS [3]. Whilst the original PERMIS Java API was intended for local calls only, and didn t have any network interface, a PERMIS Authorisation Service has been developed to provide authorisation decisions for the Globus Toolkit through the SAML callout. 2. OVERVIEW OF EXISTING TECHNOLOGY 2.1 SAML SAML is a language for expressing security-related information. It defines message formats in XML for Queries and Responses. It also defines a request-response protocol in SOAP over Http for carrying the SAML messages. SAML Queries are sent to a decision-making service whilst Responses, in the form of SAML Assertions, are returned. These assertions can then be coupled with a further Query and sent to other decision making services to aid them in their own decisions. In the SAML model there are three decision-making services: the Authentication decision-making service, the Attribute decision-making service and the Authorisation decision-making service (see Figure 1). Each decision-making service uses its associated policy and the user s credentials to evaluate the Query. After the SAML Query has been evaluated, a SAML Response is generated and this may be forwarded to another decision-making service, until it finally reaches the Policy Enforcement Point (PEP) of the application, which will determine the ultimate fate of the user s application request. The PEP is equivalent to the Access control Enforcement Function (AEF) in ISO Authorisation Framework [4]. SAML does not mandate any exact sequence of message flows for access control decision making. However, a typical flow might be as follows. A user s access request is presented to a PEP/AEF, and comprises the user s name, the user s credentials, the target to be accessed and the requested mode of access. The PEP could then sequentially present portions of this request to the three decision-making services. Firstly the user s name and
3 Using SAML to link the GLOBUS toolkit to the PERMIS authorisation infrastructure 3 credentials are presented to the Authentication Authority, which confirms the identity of the user. Next the authenticated name of the user (or the authentication assertion returned by the Authentication Authority) is presented to the Attribute Authority, which confirms the assignment of certain attributes to the user. Finally the attribute assertions, the name of the target and the requested mode of access are presented to the PDP, which makes an access control decision. The PEP then acts on this decision and either forwards the user s request to the target (if the PDP granted the request) or returns an error message to the user (if the PDP denied the request). User s Request & Credentials SAML Query Authentication Authority Policy SAML Response SAML Response Attribute Authority Policy Policy Enforcement Point SAML Response Policy Decision Point (Authorisation Authority) Policy Target Resource Figure 1. SAML The SAML messages can be digitally signed, which makes them tamperproof, i.e. the messages can be sent as plaintext across untrusted networks. Alternatively, the SAML protocol messages could be sent as SOAP over Http over SSL, which can also protect them from eavesdropping. Until quite recently most uses of SAML were limited to authentication and attribute usage e.g. as in Shibboleth [5]. Authorisation decisions were usually made locally either based on the user s identity (in Access Control Lists) or on the attributes/roles of the user (in simple scripts).
4 4 Authors David Chadwick1, Sassa Otenko1, Von Welch2 As virtual communities and Grid computing started to develop, identitybased systems for authorization became increasingly difficult to manage due to the distributed nature of the user communities. To accommodate these communities, new authorisation systems were required that would make the decisions based on the attributes of the initiator rather than their identity. Another prerequisite for SAML authorisation messaging was that there should be a centralised decision-making point for a number of remote services, governed by the same policy. Thus Community Authorisation Server (CAS) [6], Akenti [7], PERMIS and others started to appear. 2.2 The Globus toolkit The Globus Toolkit (GT) is a set of tools for building Grids that includes tools for resource discovery, job submission and data movement. Version 3 of the Globus Toolkit (GT3), includes support for Grid Services based on the Open Grid Service Infrastructure (OGSI) standard, which defines extensions to Web Services for lifetime management and stateful instances (among other things outside the scope of this paper). GT3 provides a Grid Service Container to host Grid Services instances, which provides services such as message marshalling/de-marshalling, authentication and authorization. A virtual organization (VO) is a collection of users and resources, distributed across a number of geographic and administrative domains, which share common policies for access control. Initially access control was solved in GT through the use of simple access control lists called grid-map files, which performed mapping of access rights based on the user s identity. Such simplistic policies were robust, but failed to scale as the VOs grew in size and spanned larger numbers of institutions. To provide more flexible authorisation solutions, it was decided to provide a SAML authorisation callout in GT3 to allow the use of advanced authorization services. The effect of this is that the Grid Service Container would be able to contact the centralised Policy Decision Point to make access control decisions for invocations of services it hosts. In this design the PDP becomes yet another Grid Service, which provides authorization decisions through a standard message format i.e. SAML. Now it is possible to create a CAS, Akenti, or PERMIS port that would make access control decisions for Grid Services, based on queries and decisions in the form of SAML Queries and Responses which are enforced by the Grid Service Container. A detailed description of the operation scenario is given later, with the example related to PERMIS.
5 Using SAML to link the GLOBUS toolkit to the PERMIS authorisation infrastructure PERMIS PERMIS is a policy based authorisation infrastructure, in which a user is granted rights to access a resource based on the authorisation policy for the resource, and the set of attributes (or roles) that the user possesses. A user s attributes are stored in digitally signed X.509 attribute certificates [10], and are allocated by the authorities in charge of the various attributes. Thus a doctor role attribute could be allocated by the General Medical Council, whilst a project manager role attribute could be allocated by the head of a department. A date of birth attribute could be allocated by a national registrar. These attribute certificates are then stored in various LDAP directories. PERMIS was designed with a Java API between the PDP and PEP providing the access control decisions. Given the name of the user, it retrieves the user s attributes/roles and makes decisions based on them. The authorisation policy, written in XML, expresses which users can be assigned what attributes/roles by whom, and what privileges are bound to each of the attributes/roles. The XML policy is then inserted in an X.509 attribute certificate, signed by the manager who wrote it, and stored in an entry in an LDAP server. When an application starts up, its PEP/AEF passes to the PERMIS ADF/PDP the name of the manager, the location of the LDAP directory, and the unique number of the policy to be used (each policy is assigned a globally unique number actually an object identifier [12] so that a manager can create different policies to be used in different contexts). The PERMIS ADF retrieves the policy X.509 AC from the LDAP directory, checks the signature and policy number, and if both are correct, uses this policy for its decision making. 3. THE IMPLEMENTATION 3.1 Extensions to SAML A standard SAML Response contains a complete list of all the allowed actions which were contained in the SAML Query. While this is useful in cases where the response is passed to a third party, in the case where the query was generated by the consumer of the response it can introduce unnecessary overhead. In these cases the consumer of the response must parse the entire list of actions, when it may only be interested in a "yes" or "no" answer regarding the entire list as a whole. For the sake of performance, new SAML Requests and Responses have been proposed they are shorter and more concise versions of the standard SAML Authorization Decision Request and Authorization Decision Statement (passed inside a SAML Query and SAML Response respectively).
6 6 Authors David Chadwick1, Sassa Otenko1, Von Welch2 These new messages allow the query to request, and the decision to contain, a simple yes/no response to all the actions contained in the query. This allows the authorization service to easily encode, and the Grid Service Container to easy parse, the response. The specification of these new SAML messages has been written by the Global Grid Forum s (GGF) Open Grid Service Architecture Authorisation working group (OGSA-AuthZ) [9]. 3.2 Extensions to PERMIS As the demand for an authorisation service appeared in the Globus Toolkit, the PERMIS researchers closely collaborated with the GT team to provide practical input into the design of the SAML messages to be used in GT3. In parallel a standalone PERMIS ADF was developed. Whilst the original PERMIS RBAC ADF had to be contacted via its Java API, the standalone ADF has a networking interface, through which it can receive SAML Queries and send back SAML Responses. In addition to this, the PERMIS ADF can pose as a Grid Service, so it can be used as a centralised PDP of a Grid application. It can also easily be embedded as a Service Authorisation i.e. a PERMIS Authorisation Callout can replace the GT3 standard SAML Authorization Callout, and make local decisions for local Grid Services. The original PERMIS architecture supported only LDAP Distinguished Names as Target identifiers. This allowed PERMIS to group targets into domains for easier expression of the policy. It was noticed during the early development stages of PERMIS that in fact people use various kinds of naming conventions for identifying targets, e.g. IP addresses, DNS names, URIs etc., so the design of the PERMIS API incorporated Principals, as an abstraction for such identifiers. However, the original PERMIS pilot sites did not have any specific requirements about which type of naming to use, and so for consistency purposes target naming was chosen to be the same as subject naming. Since subjects were named using X.500/LDAP distinguished names, then so too were targets. When porting the code to work with the Globus Toolkit, it became necessary to allow other kinds of naming conventions to be used for targets, specifically because in Globus the intended targets are Grid Services, and they already have non-ldap identifiers in the form of Grid Service Handles (GSHs), encoded in the form of a URI. URIs are hierarchical names like LDAP DNs, and this helps to group targets into domains (although of course in any particular Grid application the relevant targets at different sites may have totally unrelated URIs). URIs do not provide any further refinements for targets, unlike LDAP, which provides Object Classes to help to further
7 Using SAML to link the GLOBUS toolkit to the PERMIS authorisation infrastructure 7 distinguish between the different kinds of target e.g. printers or cpu clusters. This is one example of identifying targets by their attributes as well as or instead of their names. Besides changing the ADF interface to support URI target names, the PERMIS policy syntax also had to be extended to support URIs as Target Identifiers 1. This allows the manager to specify target names as URIs. The PERMIS ADF assumes the subjects are authenticated, but it can recognise unauthenticated subjects, and now it will return public access rights to such subject names, i.e. it will grant access to the targets that do not require any roles to perform certain actions. The Java code for constructing subject and target domains is the same, so in principle subjects could also be identified by their URIs. This would allow, for example, particular Grid Services (which are the targets for normal Grid users) to act as subjects and to make requests to other services protected by the PERMIS infrastructure. For example, a Grid service could make a request to an attribute repository protected by the PERMIS ADF, and PERMIS could decide if the particular Grid Service is allowed to retrieve certain user Attribute Certificates (specified as targets), thus enforcing a user s Privacy Policy. The question of how to locate the credentials of a subject identified by a URL in a repository that uses LDAP naming can in fact be solved in at least two ways. The first and easiest way is to use URLs that conform to RFC 2255 [11]. This specifies how LDAP URLs can be used to retrieve information from LDAP repositories. An alternative way is to embed the URL as the latter part of the LDAP Distinguished Name and to configure the LDAP repository with the prefix DN. For file-based repositories, e.g. Web-servers or file-servers, it is possible to construct filenames out of the subject s identifier, e.g. an MD5 hash of the normalised subject identifier (either the LDAP DN or URL) can be used to locate the files containing the necessary credentials 2. The extended SAML Requests designed by the OGSA-Authz group and specified in [9] may contain Attribute Reference elements. In essence these are repository URLs from where the subject s attributes should be retrieved by the Authorisation Service. This is a semi-push or controlled pull model, i.e. the subject doesn t have to push all the credentials to the Authorisation Service as SAML evidence, or rely on the Authorisation Service to pull whichever attributes it wants from where, but instead can provide a reference to the repositories that contain them. The Authorisation 1 In fact, any URI can be used, but a specific URI handler must be registered with the PERMIS RBAC at initialisation time. 2 For example, this is the way some Public Key Certificates are located on some web-servers.
8 8 Authors David Chadwick1, Sassa Otenko1, Von Welch2 Service will then pull the attributes from this referenced repository. Note that where the attributes are stored as digitally signed X.509 ACs, they are tamperproof and so it is still possible to use such references for making secure decisions. To cater for this extension to SAML, a new parameter to the PERMIS getcreds method has been introduced. It provides the PERMIS Authorisation Service with a list of repositories to contact to get the subject s credentials. To configure the PERMIS Authorisation Service at initialisation time, it is necessary to specify the URL of the LDAP repository where the policy is located, the Distinguished Name of the manager issuing the policy, and the Object Identifier of the actual policy to be used. These parameters are specified in the GT3 Service Container deployment descriptor. Unfortunately, there is currently no way to make the deployment descriptor tamperproof. Therefore to ensure that the Grid service is always correctly configured, it is recommended that a human security officer should always be present at the service start-up time, to check that the configuration parameters that the service uses are the expected ones. 3.3 Operation Scenario There are two modes of interaction between GT3 and PERMIS Authorisation. One mode is remote, the other mode is local. In remote mode a PERMIS Authorisation Service is set up to serve a number of Grid Service Containers. In local mode of operation each Grid Service Container has its own PERMIS Authorisation set up as an Authorisation Handler. In local mode there are no SAML messages, and authorisation is done via the PERMIS API, so only a comparison of this mode to the remote mode of operation is given in section 4. The remote mode of operation is described below. When a subject makes a request of a Grid Service, the subject is typically authenticated by the Grid Service Container using SSL and the user's X.509 certificate (see [8] for details). The subject may also invoke operations anonymously, in which case a special identifier (*) is used to indicate an anonymous user. The service container generates a SAML Authorisation Request, which includes an identifier of the subject, an identifier of the service (its Grid Service Handle, a URI), and the name of the operation being invoked. This information is enveloped in a message containing a timestamp and signature along with other information to protect the message from tampering and prevent replay attacks. This message is sent to the trusted Authorisation Service as defined in the service's configuration, e.g. a PERMIS Authorisation Service.
9 Using SAML to link the GLOBUS toolkit to the PERMIS authorisation infrastructure 9 The Authorization Service parses the request, uses the policy to make an authorisation decision about the request, and returns a response containing the decision (again enveloped in a message which includes a signature and replay protection). Only an affirmative decision will cause the service container to allow for the action requested by the user to be executed. 4. DISCUSSION The implementation described above should help to provide Role-Based Access Controls in Virtual Organisations built on Grids. Each of the resource providers will write a PERMIS policy for resource usage, and authorise collaborative institutions to issue roles to their members. The collaborative institutions will issue role assignment X.509 Attribute Certificates to their members, and based on these and the policy, the PERMIS ADF will make the authorisation decisions. The implementation is now complete and pilot testing is due to take place during the next 5 months, so that actual results should be present in time for the CMS2004 conference. It is still questionable how efficient it is to have such an authorisation service called via SAML/SOAP/Http rather than to have a PDP/ADF called locally via a programmable API. The gain that can be achieved using the centralised PDP is that in single sign-on distributed systems such as the Grid, the authorisation tokens (attribute certificates) of the user would have to be retrieved only once, rather than at each resource of the distributed system. In most cases this might give a doubtful gain in performance because SAML messages still have to be generated for each request. A centralised PDP should make policy management easier security managers do not have to change the policy at each PDP. However, the PERMIS infrastructure has already addressed this problem by storing its policy as a digitally signed AC in a central LDAP repository, from where all the distributed systems can retrieve the same policy. A centralised PDP can provide more user privacy. For example, it is easier to conceal the user s identity in a single trusted PDP (and use a pseudonym throughout the rest of the system), rather than spread this knowledge across PDPs at each resource site. A centralised PDP makes implementation of the Principle of Separation of Duties much easier to enforce it is easier to track what roles a user has assumed in the past, so his further requests do not clash (e.g. the Payment Requestor cannot be a Payment Guarantee for the same order, and an
10 10 Authors David Chadwick1, Sassa Otenko1, Von Welch2 Accountant cannot be an Auditor for the same transaction). This is much more difficult to enforce with multiple distributed PDPs. Having said all this, it should be noted that most authorisation decision systems today are local, i.e. no centralised decision-making is done. Decentralising the decision-making process has its benefits, which are usually connected with the speed of decision making, and the up-to-date reflection of the system s state in the PDP (as contextual parameters). The Grid environment encourages institutions to collaborate with each other. The links between these institutions may be established in a fairly spontaneous way, and these institutions may already have their own Privilege Management Infrastructures in place. This means that the participating institutions may have already assigned roles to their members. It is important in this case that the collaborating institutions are able to recognise each other s role assignments and optimally to be able to compare the roles issued by the different participating institutions. Currently the PERMIS policy has to be configured with all the different roles, and permissions assigned to each. In the future we expect to be able to express role mappings, and one of our ongoing projects aims to facilitate dynamic cross-institutional virtual organisations using existing PMIs. 5. REFERENCES [1] OASIS. Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML). 19 April See [2] Globus toolkit, [3] D.W.Chadwick, A. Otenko, E.Ball. Implementing Role Based Access Controls Using X.509 Attribute Certificates, IEEE Internet Computing, March-April 2003, pp [4] ITU-T Rec X.812 (1995) ISO/IEC :1996 Security Frameworks for open systems: Access control framework [5] Shibboleth Project, available at [6] L. Pearlman, V. Welch, I. Foster, C. Kesselman, S. Tuecke. A Community Authorization Service for Group Collaboration. Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, [7] Johnston, W., Mudumbai, S., Thompson, M. Authorization and Attribute Certificates for Widely Distributed Access Control, IEEE 7th Int Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE), Stanford, CA. June, Page(s): (see also [8] Von Welch, Frank Siebenlist, Ian Foster, John Bresnahan, Karl Czajkowski, Jarek Gawor, Carl Kesselman, Sam Meder, Laura Pearlman, and Steven Tuecke. Security for grid services. In Twelfth International Symposium on High Performance Distributed Computing (HPDC-12). IEEE Computer Society Press, [9] Von Welch, Frank Siebenlist, David Chadwick, Sam Meder, Laura Pearlman. Use of SAML for OGSA Authorization, Jan 2004, Available from
11 Using SAML to link the GLOBUS toolkit to the PERMIS authorisation infrastructure 11 [10] ISO /ITU-T Rec. X.509 (2001) The Directory: Public-key and attribute certificate frameworks [11] T. Howes, M. Smith. "The LDAP URL Format", RFC 2255, Dec 1997 [12] ITU-T Recommendation X.680 (1997) ISO/IEC :1998, Information Technology - Abstract Syntax Notation One (ASN.1): Specification of Basic Notation
2 Transport-level and Message-level Security
Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective The Globus Security Team 1 Version 4 updated September 12, 2005 Abstract This document provides an overview of the Grid Security
Grid Security : Authentication and Authorization
Grid Security : Authentication and Authorization IFIP Workshop 2/7/05 Jong Kim Dept. of Computer Sci. and Eng. Pohang Univ. of Sci. and Tech. (POSTECH) Contents Grid Security Grid Security Challenges Grid
Abstract. 1. Introduction. Ohio State University Columbus, OH 43210 {langella,oster,hastings,kurc,saltz}@bmi.osu.edu
Dorian: Grid Service Infrastructure for Identity Management and Federation Stephen Langella 1, Scott Oster 1, Shannon Hastings 1, Frank Siebenlist 2, Tahsin Kurc 1, Joel Saltz 1 1 Department of Biomedical
2. Create (if required) 3. Register. 4.Get policy files for policy enforced by the container or middleware eg: Gridmap file
Policy Management for OGSA Applications as Grid Services (Work in Progress) Lavanya Ramakrishnan MCNC-RDI Research and Development Institute 3021 Cornwallis Road, P.O. Box 13910, Research Triangle Park,
Implement role based access control with attribute certificates
Implement role based access control with attribute certificates Wei Zhou Computer Science Department University of Trier D-54286 Trier, Germany [email protected] Christoph Meinel Computer Science Department
TRUST RELATIONSHIPS AND SINGLE SIGN-ON IN GRID BASED DATA WAREHOUSES
TRUST RELATIONSHIPS AND SINGLE SIGN-ON IN GRID BASED DATA WAREHOUSES Xiaoyu Li a and Maree Pather b a Department of Information Technology, Nelson Mandela Metropolitan University b Department of Applied
Securing Web Services With SAML
Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion
Writing Grid Service Using GT3 Core. Dec, 2003. Abstract
Writing Grid Service Using GT3 Core Dec, 2003 Long Wang [email protected] Department of Electrical & Computer Engineering The University of Texas at Austin James C. Browne [email protected] Department
Digital Signature Web Service Interface
1 2 Digital Signature Web Service Interface 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 1 Introduction This document describes an RPC interface for a centralized
Authorization Strategies for Virtualized Environments in Grid Computing Systems
Authorization Strategies for Virtualized Environments in Grid Computing Systems Xinming Ou Anna Squicciarini Sebastien Goasguen Elisa Bertino Purdue University Abstract The development of adequate security
A CROSS - DOMAIN ROLE MAPPING AND AUTHORIZATION FRAMEWORK FOR RBAC IN GRID SYSTEMS
International Journal of Computer Science and Applications c 2009 Technomathematics Research Foundation Vol.6 No.1, pp. 1-12 A CROSS - DOMAIN ROLE MAPPING AND AUTHORIZATION FRAMEWORK FOR RBAC IN GRID SYSTEMS
Authorization-Authentication Using
School of Computing Science, University of Newcastle upon Tyne Authorization-Authentication Using XACML and SAML Jake Wu and Panos Periorellis Technical Report Series CS-TR-907 May 2005 Copyright c 2004
SINGLE SIGN-ON AND AUTHORIZATION FOR DYNAMIC VIRTUAL ORGANIZATIONS
58 SINGLE SIGN-ON AND AUTHORIZATION FOR DYNAMIC VIRTUAL ORGANIZATIONS R.O. Sinnott 1, O. Ajayi 1, A.J. Stell 1, J. Watt 1, J. Jiang 1, J. Koetsier 2 National e-science Centre 1 University of Glasgow, Glasgow,
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
A Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You [email protected] ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
A Model for Access Control Management in Distributed Networks
A Model for Access Control Management in Distributed Networks Master of Science Thesis Azadeh Bararsani Supervisor/Examiner: Dr. Johan Montelius Royal Institute of Technology (KTH), Stockholm, Sweden,
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
This Working Paper provides an introduction to the web services security standards.
International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand
XML Signatures in an Enterprise Service Bus Environment
XML Signatures in an Enterprise Bus Environment Eckehard Hermann Research & Development XML Integration Uhlandstraße 12 64297 Darmstadt, Germany [email protected] Dieter Kessler Research
Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase
Authentication and Authorisation for Research and Collaboration Federations 101 An Introduction to Federated Identity Management Peter Gietz, Martin Haase AARC NA2 Task 2 - Outreach and Dissemination DAASI
Web Services Trust and XML Security Standards
Web Services Trust and XML Security Standards Date: April 9, 2001 Version: 1.0 Copyright 2001-2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
OpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
Using WS-Federation and WS-Security for Identity Management in Virtual Organisations
Using WS-Federation and WS-Security for Identity Management in Virtual Organisations Demchenko, Yu. , Universiteit van Amsterdam Abstracts The paper provides insight into one of key
THREAT MODELLING FOR ACTIVE DIRECTORY
THREAT MODELLING FOR ACTIVE DIRECTORY David Chadwick ISI, University of Salford, Salford, M5 4WT, England. Abstract: Key words: This paper analyses the security threats that can arise against an Active
Deploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
Adding Federated Identity Management to OpenStack
Adding Federated Identity Management to OpenStack David Chadwick University of Kent 3 December 2012 University of Kent 1 Some Definitions What is Identity? A whole set of attributes that in combination
SAML Federated Identity at OASIS
International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for
OIX IDAP Alpha Project - Technical Findings
OIX IDAP Alpha Project - Technical Findings Warwickshire County Council - using a Federated UK Government ID in trusted Local Authority transactions. By Graham Dunnings and Ian Litton 1 Table of Contents
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
Exploring ADSS Server Signing Services
ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart [email protected]
WebLogic Server 7.0 Single Sign-On: An Overview
WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of
Cloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
A Delegation Framework for Federated Identity Management
A Framework for Federated Identity Management Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono and Satoru Fujita NEC Internet Systems Research Laboratories 1753, Shimonumabe, Nakahara-Ku, Kawasaki, Kanagawa
Managing Users and Identity Stores
CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies
2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using
Concepts and Architecture of the Grid. Summary of Grid 2, Chapter 4
Concepts and Architecture of the Grid Summary of Grid 2, Chapter 4 Concepts of Grid Mantra: Coordinated resource sharing and problem solving in dynamic, multi-institutional virtual organizations Allows
An Online Credential Repository for the Grid: MyProxy
An Online Credential Repository for the Grid: MyProxy Jason Novotny Lawrence Berkeley Laboratory [email protected] Steven Tuecke Mathematics and Computer Science Division Argonne National Laboratory [email protected]
Copyright 2012, Oracle and/or its affiliates. All rights reserved.
1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN 1 Venkadesh.M M.tech, Dr.A.Chandra Sekar M.E., Ph.d MISTE 2 1 ResearchScholar, Bharath University, Chennai 73, India. [email protected] 2 Professor-CSC
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
CHAPTER - 3 WEB APPLICATION AND SECURITY
CHAPTER - 3 WEB APPLICATION AND SECURITY 3.1 Introduction Web application or Wepapp is the general term that is normally used to refer to all distributed web-based applications. According to the more technical
Controlling Web Access with BMC Web Access Manager WHITE PAPER
Controlling Web Access with BMC Web Access Manager WHITE PAPER Table of Contents Executive Summary...2 The BMC Identity and Access Management Approach...3 BMC Enforcement Agent Deployment Flexibility...3
How to Implement Enterprise SAML SSO
How to Implement Enterprise SSO THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY How to Implement Enterprise SSO Introduction Security Assertion Markup Language, or, provides numerous The advantages and
SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013
SOFTWARE ASSET MANAGEMENT Continuous Monitoring September 16, 2013 Tim McBride National Cybersecurity Center of Excellence [email protected] David Waltermire Information Technology Laboratory [email protected]
GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK
Antti Pyykkö, Mikko Malinen, Oskari Miettinen GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK TJTSE54 Assignment 29.4.2008 Jyväskylä University Department of Computer Science
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE SAML 2.0 CONFIGURATION GUIDE Roy Heaton David Pham-Van Version 1.1 Published March 23, 2015 This document describes how to configure OVD to use SAML 2.0 for user
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
OIO Web SSO Profile V2.0.5
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
IAM Application Integration Guide
IAM Application Integration Guide Date 03/02/2015 Version 0.1 DOCUMENT INFORMATIE Document Title IAM Application Integration Guide File Name IAM_Application_Integration_Guide_v0.1_SBO.docx Subject Document
GSI Credential Management with MyProxy
GSI Credential Management with MyProxy GGF8 Production Grid Management RG Workshop June 26, 2003 Jim Basney [email protected] http://myproxy.ncsa.uiuc.edu/ MyProxy Online repository of encrypted GSI
Introduction to SAML. Jason Rouault Section Architect Internet Security Solutions Lab Hewlett-Packard. An XML based Security Assertion Markup Language
Introduction to SAML An XML based Security Assertion Markup Language Jason Rouault Section Architect Internet Security Solutions Lab Hewlett-Packard 1/18/2002 Introduction to SAML Page 1 Credits and Acknowledgements
SAML and OAUTH comparison
SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, [email protected], twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single
OpenScape Voice V8 Application Developers Manual. Programming Guide A31003-H8080-R100-2-7620
OpenScape Voice V8 Application Developers Manual Programming Guide A31003-H8080-R100-2-7620 Our Quality and Environmental Management Systems are implemented according to the requirements of the ISO9001
Web Service Based Data Management for Grid Applications
Web Service Based Data Management for Grid Applications T. Boehm Zuse-Institute Berlin (ZIB), Berlin, Germany Abstract Web Services play an important role in providing an interface between end user applications
IGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
WEB SERVICES SECURITY
WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Globus Toolkit: Authentication and Credential Translation
Globus Toolkit: Authentication and Credential Translation JET Workshop, April 14, 2004 Frank Siebenlist [email protected] http://www.globus.org/ Copyright (c) 2002 University of Chicago and The University
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
Security Assertion Markup Language (SAML) 2.0 Technical Overview
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Security Assertion Markup Language (SAML) 2.0 Technical Overview Working Draft 03, 20 February 2005 Document identifier:
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin [email protected]
Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin [email protected] International Center for Advanced Internet Research Outline Security Mechanisms Access Control Schemes
Single Sign-On Implementation Guide
Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
Electronic Health Network - Case Study Consent2Share Share with Confidence
Electronic Health Network - Case Study Consent2Share Share with Confidence Jan 2015 About Consent2Share Complying with privacy regulations in an electronic environment is a very complex process. The Consent2Share
The IVE also supports using the following additional features with CA certificates:
1 A CA certificate allows you to control access to realms, roles, and resource policies based on certificates or certificate attributes. For example, you may specify that users must present a valid client-side
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
