Lost in Authentication CAS Clients and Best Practices
|
|
|
- Nickolas Richardson
- 10 years ago
- Views:
Transcription
1 Lost in Authentication CAS Clients and Best Practices Parker Neff Software Architect Unicon, Inc. Bill Thompson Software Architect Unicon, Inc. Jasig 2011 Spotlight on Open Source Westin Westminster Denver, Colorado, USA May 23-25, 2011 Copyright Unicon, Inc., Some rights reserved. This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License. To view a copy of this license, visit
2 Introduction 6 days - Software Architect, Unicon, Inc. CasOwa, CasAngelClient, Liferay 5.x/CAS Client & Proxy Ticket Support 2.5 years - Senior Associate Director, Information Technology, Development Office, Princeton University.NET CAS Client 6 years - Associate Director for Architecture & Engineering Enterprise Systems & Services Rutgers University The State University of New Jersey myrutgers (uportal), Jasig CAS 3.x Jasig Board of Directors, uportal Project Liaison (up2/3), CAS Steering Committee 2
3 Introduction Parker Neff 1 ½ Years - Software Architect, Unicon, Inc. uportal, Shibboleth, CAS, Liferay 9 years Technical Director, Enterprise Architecture, Total Systems. 9 years Senior Developer, Nintendo of America 3
4 Agenda 1. CAS Deployment Considerations 2. CAS Clients Survey 3. CAS Integration Stories 4
5 CAS Deployment Considerations 5
6 SSO Session vs Application Session CAS SSO - TGT is bound to browser session scoped cookie Default TGT policy is a 3-hour idle time-out, also have hard timeout, throttle-use,... Applications are responsible for session management once the user is authenticated CAS is not an application session manager 6
7 SSO vs App Session Implications Security concerns about public terminals, kiosks - keys to the kingdom Set TGT TTL to a smaller window Group apps into different SSO domains Reduce SSO domain via renew=true Set TGT TTL automatically based on some request attributes IP address Ask the user Public vs Private Workstation 7
8 SSO vs App Session Expiration Application session is the responsibility of the application Fixed window Sliding window Idle timeout If the app session expires, what is the UX on the next request? What should it be? 8
9 SSO vs App Session Expiration 9
10 Gateway & Landing Pages Gateway check for SSO, otherwise just send them back unauthenticated Portal home pages Web application home pages Resource with both protected and non-protected content Good replacement for old login screens, system status, scheduled downtime, etc. 10
11 Logout Pages What does logout mean in the context of SSO? What is the context of SSO? Portal SSO started and ended with the portal Other apps participated in CAS but could not initiate a SSO session (new patch by Drew Mazurek: CAS-967) Any App How does the user know they have SSO? When does it end? Logging out of any app? Need logout pages to avoid logging back in 11
12 Single Sign Out Non-browser mediated mechanism to help clean up server-side resources of visited applications in the event of a CAS SSO logout. Smells a little like session management Inherently best effort, CAS simply does a back channel http requests to the service URLs associated with the issued Service Tickets Still up to the individual applications to do the right thing 12
13 CAS Server Config Service Manager Ticket Registry Cleaner HA setup Primary authentication handlers Ticket Expiration Policy Remember Me authentication Throttling Logins Much more at: 13
14 CAS Clients Official Legacy Incubating Unofficial CASifying Apps Integration Patterns 14
15 CAS Clients Official Acegi (Spring Security) CAS Client for Java 3.0/3.1 mod_auth_cas (Apache) PhpCAS.NET CAS Client Official Clients Generally being actively developed and maintained. Likely to get support on the cas-user list. 15
16 CAS Clients Unofficial.Net Http module ASP.NET Forms Authentication AuthCAS CAS + Seam Web Applications Unofficial Clients CASP Adds CAS Logic to an ASP.NET App CAS Proxying with ASP.Net Forms Authentication Essentially all of the clients people have let us know about, that may or may not be in active development anymore, and may solve a niche need. You should use these at your own risk. Many are excellent clients, but may no longer be supported any more. Others are purely theoretical examples of of how a client would function. CherryPy CAS Client ColdFusion CAS Client Component ColdFusion client script Google Web Toolkit - GWT CAS Client japs 2.0 CAS Client mod_python auth module Perl Client Prado client Pycas Ruby on Rails CAS Client Seraph as CAS Client Soulwing CAS Client Soulwing Java CAS Client Symfony CAS Client VBScript Virginia Tech CAS Clients WebObjects Client 16
17 CAS Clients Incubating CASBar Toolbar for Firefox 2 Official Clients Incubating Clients are new clients that are under development, and which may become official clients. They're up-and-coming clients that we're paying attention to, have petitioned the Steering Committee to become official clients, and often have active members on cas-user. 17
18 CAS Clients Legacy Yale CAS Client Apache Module PAM PL/SQL Legacy Clients In many cases, no longer actively developed, but still function quite well (i.e. the PAM module). In other cases, they've been superseded by newer clients (i.e. The Jasig CAS Client for Java). You will still find many people on cas-user who are familiar with these modules, but many have migrated to the newer code. 18
19 CAS Clients CASifying Apps Apache OFBiz Joomla 1.5 OpenCms OpenReports SharePoint & ASP.NET Web Sites WebAdvisor Confluence as CAS Client EZPublish Fisheye and Crucible Oracle Calendar web client with mod_cas CASifying Apps Oracle Portal Oracle 11i applications qmail-ldap+webmail Describes some unofficial instructions, many Mediawiki contributed (with by phpcas) users, on how Outlook to CASify Web Access 2 particular applications. PeopleSoft phpbb3 (phpbb v3) phpgroupware Sakai Sun Identity Manager Tomcat Manager Roller weblogger Tomcat uportal Client WordPress Client Zimbra Zope client 19
20 CAS Clients CASified Apps uportal Mantis pnews Sympa TikiWiki Mule Claroline Moodle CASified Apps Project / Vendor maintained CAS integration. Works out-out-of-the-box! Liferay Portal ILIAS Learning Management Chamilo Simply Voting BlueSocket 20
21 CAS Clients Integration Type Language / Platform Level Clients CAS Client for Java 3.x, phpcas,.net CAS Client ASP, ColdFusion, Perl,...,Ruby of Rails, PL/SQL, Zope Container Level Clients mod_auth_cas (Apache 2.x) REMOTE_USER Soulwing CAS Client (Tomcat) IBM WebSphere (Trust Association Interceptor) Application Specific Clients Apache OFBiz, Bonita BPM, Joomla, Oracle 11i Apps, PeopleSoft, SCT Banner, OpenCms,...,MediaWiki, WebSphere, WordPress... 21
22 CAS Clients Integration Patterns Custom Applications Official Clients (Java,.NET, PHP, Apache) Incubating or Unofficial...or create your own. (ASP to Zope) Application Specific Clients Usually 3 rd party, integrate with app specific APIs for security, identity,... Usually built in conjunction with Official Clients Applications with out-of-the-box Support Sweet! Just turn it on! Authentication Shims (the Hard Cases) Trust Mode, ClearPass, Application Session APIs, SSO Bridge 22
23 CAS Clients AuthN Shims Trust Mode App specific configuration to rely on REMOTE_USER or some other Request variable to trust the user was authenticated ClearPass Enable ClearPass extension to get a hold of user credential in the clear...replay them to app login screen Application Session APIs Authenticate first with CAS then call back channel API or web service to initiate application session SSO Bridges Rely on native application support for a specific SSO provider. CASifying Oracle Access Manager. Rely on 3 rd party Identity Provider for authentication and user attributes - casshib 23
24 Case Study: Workforce Retraining Initiative 24
25 WRI Overview Pilot program involving Cisco and the state of Michigan. Provides workforce retraining in the areas of broadband infrastructure and heath IT. Leverages training materials in the Cisco Networking academy. 25
26 What's interesting about this? Single sign on OpenLDAP Multiple sources of identities, CAS and Shibboleth. Uses casshib extension. 26
27 Shibboleth Open source Federated Web single sign on SAML Just-in-time release of attributes Identity Provider Service Provider 27
28 What's is casshib? Acts as a proxy between CAS and shibboleth Application is protected by CAS but delegates the login page to a Shibboleth IDP. Multiple sources of identities, CAS and Shibboleth. Shibboleth passes user attributes back to CAS. Shibboleth Service provider not required. JA-SIG license. 28
29 Federated Authentication 29
30 Federated Authentication CAS Authentication to OpenLDAP 30
31 Federated Authentication Redirect to Shibboleth Identity Provider 31
32 Federated Authentication 32
33 Federated Authentication Enterprise Authentication User Info Passed back To CAS as SAML Attributes 33
34 WRI Authenticated User 34
35 AuthN Shims Outlook Web Access 35
36 AuthN Shims CasOwa //.NET CAS Client does all the CAS protocol work user = context.user as IcasPrincipal; proxyticket = user.getproxyticketfor(clearpassuri); // Leverage ClearPass extension to get the password clearpass = GetTextForElement(response, "cas:credentials"); // Replay Credentials to OWA Login Form request = WebRequest.Create(OwaUrl + OwaAuthPath); // Capture Session cookies Cookies.Add(new HttpCookie(cookie.Name, cookie.value)); // Redirect to Inbox with Session Cookies set context.response.redirect(redirecturl); 36
37 AuthN Shims CasAngelClient 37
38 AuthN Shims CasAngelClient //.NET CAS Client does all the CAS protocol work context.user.identity.isauthenticated CasAuthentication.GetProxyTicketIdFor(ClearPassUrl); // Leverage ClearPass extension to get the password GetTextForElement(clearPassResponse, "cas:credentials"); // Authenticate against Angel and retrieve redirect URL strpost = "APIACTION=AUTHENTICATION_PASS&APIUSER=" + AngelApiUser + "&APIPWD=" + AngelApiPassword + "&USER=" + context.user.identity.name + "&PASSWORD=" + clearpass + "&VALIDATE=" + (AngelApiValidate? "1" : "0"); angelapiresponse = PerformHttpPost(AngelApiUrl, strpost, false); redirecturl = GetTextForElement(angelApiResponse, "success"); FormsAuthentication.SignOut(); context.response.redirect(redirecturl); 38
39 References Adding "Public Workstation" vs. "Private Workstation" Timeouts - Jasig CAS Gateway Feature - CAS Clients - CAS Client for Outlook Web Access - CAS Client for Angel LMS
40 So Long, and Thanks for All the Fish Bill Thompson Software Architect Unicon, Inc. Parker Neff Software Architect Unicon, Inc. 40
ClearPass A CAS Extension Enabling Credential Replay
ClearPass A CAS Extension Enabling Credential Replay Andrew Petro Unicon, Inc. http://www.ja-sig.org/wiki/display/casum/clearpass Copyright Unicon, Inc., 2008-2010. Some rights reserved. This work is licensed
How To Configure The Jasig Casa Single Sign On On A Workstation On Ahtml.Org On A Server On A Microsoft Server On An Ubuntu 7.5.3 (Windows) On A Linux Computer On A Raspberry V
Configuring CAS-based SSO with ActiveVOS on Apache Tomcat Technical Note Version: 1.3 Dated: August 2013 2013 Informatica Corporation ActiveVOS is a trademark of Informatica, Inc. All other company and
Open-source Single Sign-On with CAS (Central Authentication Service)
Open-source Single Sign-On with CAS (Central Authentication Service) Pascal Aubry, Vincent Mathieu & Julien Marchal Copyright 2004 ESUP-Portail consortium Open-source Single Sign-On with CAS Single Sign-On
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
Architecture of Enterprise Applications III Single Sign-On
Architecture of Enterprise Applications III Single Sign-On Haopeng Chen REliable, INtelligent and Scalable Systems Group (REINS) Shanghai Jiao Tong University Shanghai, China e-mail: [email protected]
Implementing CAS. Adam Rybicki. 2010 Jasig Conference, San Diego, CA March 7, 2010
Implementing CAS Adam Rybicki 2010 Jasig Conference, San Diego, CA March 7, 2010 Copyright Unicon, Inc., 2009. This work is the intellectual property of Unicon, Inc. Permission is granted for this material
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
Sakai and uportal Integration Options
Sakai and uportal Integration Options Cris J. Holdorph Unicon, Inc. 2008 JA-SIG Conference April 27 30, 2008 Copyright Unicon, Inc., 2008. This work is the intellectual property of Unicon, Inc. Permission
Pierce County IT Department GIS Division Xuejin Ruan Dan King
Pierce County IT Department GIS Division Xuejin Ruan Dan King Web Application Work Flow Main Topics Authentication Authorization Session Management * Concurrent Session Management * Session Timeout Single
Logout Support on SP and Application
Logout Support on SP and application Logout Support on SP and Application Possibilities and and Limitations SWITCHaai Team [email protected] Single Logout: Is it possible? Single Logout will work only in some
Shibboleth N-Tier Support. Chad La Joie [email protected]
Shibboleth N-Tier Support Chad La Joie [email protected] Agenda Use Case Terminology Shibboleth Solution Future Effort Resources 2 Use Case Current use case comes from University of Chicago University
Middleware integration in the Sympa mailing list software. Olivier Salaün - CRU
Middleware integration in the Sympa mailing list software Olivier Salaün - CRU 1. Sympa, its middleware connectors 2. Sympa web authentication 3. CAS authentication 4. Shibboleth authentication 5. Sympa
From centralized to single sign on
The LemonLDAP::NG project Abstract LemonLDAP::NG is a modular WebSSO (Web Single Sign On) software based on Apache::Session modules. It simplifies the build of a protected area with a few changes in the
Web app AAI Integration How to integrate web applications with AAI in general?
Web app AAI Integration How to integrate web applications with AAI in general? Lukas Hämmerle [email protected] Zurich, 8. February 2009 6 Goal of this presentation 1. List the general requirements
Using Shibboleth for Single Sign- On
Using Shibboleth for Single Sign- On One Logon to Rule them all.. Kirk Yaros Director, Enterprise Services Mott Community College 1 Agenda Overview of Mott Overview of Shibboleth and Mott s Project Review
Retrofi8ng OAuth 2.0 Security into Exis?ng REST Service [CON1765]
Retrofi8ng OAuth 2.0 Security into Exis?ng REST Service [CON1765] Irena Shaigorodsky Java One, 2014 [email protected] @ishaigorodsky hops://github.com/ishaigor/rest- retro- sample 1 Quick Survey
Enterprise Portal Built by and for Higher Education
www.apereo.org/uportal Enterprise Portal Built by and for Higher Education Now Responsive for All Devices along with Native App Experience There is a growing demand for higher education institutions to
High Availability CAS
High Availability CAS Adam Rybicki, Scott Battaglia 2009 Jasig Conference, Dallas, TX March 4, 2009 Copyright Unicon, Inc., 2009. This work is the intellectual property of Unicon, Inc. Permission is granted
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
Authentication and access control in Sympa mailing list server
Authentication and access control in Sympa mailing list server February 2004 Serge Aumont & Olivier Salaün Comité Réseau des Universités http://www.cru.fr Campus de Beaulieu, Rennes France 1 Introduction
SSL Considerations for CAS: Planning, Management, and Troubleshooting. Marvin Addison Middleware Services Virginia Tech October 13, 2010
SSL Considerations for CAS: Planning, Management, and Troubleshooting Marvin Addison Middleware Services Virginia Tech October 13, 2010 Agenda Planning and deployment considerations Discussion of Java
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
WebNow Single Sign-On Solutions
WebNow Single Sign-On Solutions Technical Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2015 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,
Clientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
Proxied Authentication in SSO Setups with Common OSS. Open Identity Summit 2015 Prof. Dr. René Peinl Berlin, 10.11.2015
Proxied Authentication in SSO Setups with Common OSS Open Identity Summit 2015 Prof. Dr. René Peinl Berlin, 10.11.2015 Agenda 1 Use case / context 2 Challenge and ideal solution 3 Analysis of established
About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack
Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack About Me KVM, API, DB, Upgrades, SystemVM, Build system, various subsystems Contributor and Committer
Single Sign-On for the UQ Web
Single Sign-On for the UQ Web David Gwynne Infrastructure Architect, ITIG, EAIT Taxonomy Authentication - Verification that someone is who they claim to be - ie, only the relevant user
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach
Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach Ruchir Choudhry [email protected]; Abstract. J2EE based Web applications have largely spread over our multiple
Oracle9i Application Server: Options for Running Active Server Pages. An Oracle White Paper July 2001
Oracle9i Application Server: Options for Running Active Server Pages An Oracle White Paper July 2001 Oracle9i Application Server: Options for Running Active Server Pages PROBLEM SUMMARY...3 INTRODUCTION...3
esoc SSA DC-I Part 1 - Single Sign-On and Access Management ICD
esoc European Space Operations Centre Robert-Bosch-Strasse 5 64293 Darmstadt Germany Tel: (49)615190-0 Fax: (49)615190485 www.esa.int SSA DC-I Part 1 - Single Sign-On and Access Management ICD Prepared
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies
Integrating Multi-Factor Authentication into Your Campus Identity Management System
Integrating Multi-Factor Authentication into Your Campus Identity Management System Mike Grady, Unicon David Walker, Internet2 (both associated with the Internet2 Scalable Privacy Project) Agenda Multi-Context
Single Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle [email protected]
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle [email protected] Berne, 13. August 2014 Introduction App by University of St. Gallen Universities
Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
CAS-anova: A University Proclaims its Love for Simplified Authentication
CAS-anova: A University Proclaims its Love for Simplified Authentication Ken McCrery Project Leader, Collaborative Technologies Unit JA-SIG 2007 Summer Conference Denver, CO June 25, 2007 Single Sign-on
Administering Jive Mobile Apps
Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native
Office 365 deployment checklists
Chapter 128 Office 365 deployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of issues.
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
Office 365 deploym. ployment checklists. Chapter 27
Chapter 27 Office 365 deploym ployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of
Federating with Web Applications
Federating with Web Applications Janusz Ulawski HEAnet Ltd November 11, 2010 Agenda 1 Providing access to your WebApp 2 Federated Access Software with SAML 2.0 support 3 Federating your WebApp Shibboleth
Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
Getting Started with AD/LDAP SSO
Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories
A detailed walk through a CAS authentication
Welcome! First of all, what is CAS? Web single sign on Uses federated authentication, where all authentication is done by the CAS server, instead of individual application servers The implementation is
Approaches and challenges for a SSO enabled extranet using Jasig CAS. Florian Holzschuher René Peinl 10.09.2013
Approaches and challenges for a SSO enabled extranet using Jasig CAS Florian Holzschuher René Peinl 10.09.2013 iisys - Institut für Informationssysteme Mission: The institute is a competence centre for
Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect
Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner
How To Get A Single Sign On (Sso)
Single Sign-On Vijay Kumar, CISSP Agenda What is Single Sign-On (SSO) Advantages of SSO Types of SSO Examples Case Study Summary What is SSO Single sign-on is a user/session authentication process that
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation Approved for Public Release Distribution Unlimited 13-1871 2013 The MITRE Corporation All Rights Reserved } OpenID Connect and OAuth2 protocol
Oracle Communications WebRTC Session Controller: Basic Admin. Student Guide
Oracle Communications WebRTC Session Controller: Basic Admin Student Guide Edition 1.0 April 2015 Copyright 2015, Oracle and/or its affiliates. All rights reserved. Disclaimer This document contains proprietary
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant
Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE SAML 2.0 CONFIGURATION GUIDE Roy Heaton David Pham-Van Version 1.1 Published March 23, 2015 This document describes how to configure OVD to use SAML 2.0 for user
Open Source Identity Integration with OpenSSO
Open Source Identity Integration with OpenSSO April 19, 2008 Pat Patterson Federation Architect [email protected] blogs.sun.com/superpat Agenda Web Access Management > The Problem > The Solution >
Authentication and access control in Sympa mailing list software
Authentication and access control in Sympa mailing list software May 2004 Serge Aumont & Olivier Salaün Comité Réseau des Universités http://www.cru.fr Campus de Beaulieu, Rennes France 1 Introduction
Table of contents. Jasig CAS support for the Spring Security plugin.
Table of contents Jasig CAS support for the Spring Security plugin. 1 Spring Security ACL Plugin - Reference Documentation Authors: Burt Beckwith Version: 1.0.4 Table of Contents 1 Introduction 1.1 History
User Pass-Through Authentication in IBM Cognos 8 (SSO to data sources)
User Pass-Through Authentication in IBM Cognos 8 (SSO to data sources) Nature of Document: Guideline Product(s): IBM Cognos 8 BI Area of Interest: Security Version: 1.2 2 Copyright and Trademarks Licensed
Web Authentication Application Note
What is Web Authentication? Web Authentication Application Note Web authentication is a Layer 3 security feature that causes the router to not allow IP traffic (except DHCP-related packets) from a particular
OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com
OpenSSO: Simplify Your Single-Sign-On Needs Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com 1 Agenda Enterprise security needs What is OpenSSO? OpenSSO features > > > > SSO and
SCAS: AN IMPROVED SINGLE SIGN-ON MODEL BASE ON CAS
SCAS: AN IMPROVED SINGLE SIGN-ON MODEL BASE ON CAS 1,2 XIANG LIYUN, 1 FANG ZHIYI, 1 SUN HONGYU 1 College of Computer Science and Technology, Jilin University, Changchun, China 2 Department of Computer
Flexible Identity Federation
Flexible Identity Federation Administration guide version 1.0.1 Publication history Date Description Revision 2015.09.24 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Web Access Management and Single Sign-On
Web Access Management and Single Sign-On Ronnie Dale Huggins In the old days of computing, a user would sit down at his or her workstation, login to the desktop, login to their email system, perhaps pull
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
Remote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department [email protected]
Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department [email protected] Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation
JOSSO 2.4. Internet Information Server (IIS) Tutorial
JOSSO 2.4 Internet Information Server (IIS) Tutorial JOSSO 2.4 : Internet Information Server (IIS) Tutorial 1. Introduction... 1 2. Prerequisites... 2 3. Defining Identity Appliance Elements... 3 3.1.
IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide
IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices
CA SiteMinder. Implementation Guide. r12.0 SP2
CA SiteMinder Implementation Guide r12.0 SP2 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes only
HOL9449 Access Management: Secure web, mobile and cloud access
HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle
Novell Access Manager
Novell Access Manager Product Overview Kiran Mova Agenda Introduction Architecture IDP AG SSL VPN Administration Console How it works? Web SSO Federation SSO Protect HTTP Resources Protect non-http Resources
OpenSSO: Cross Domain Single Sign On
OpenSSO: Cross Domain Single Sign On Version 0.1 History of versions Version Date Author(s) Changes 0.1 11/30/2006 Dennis Seah Contents Initial Draft. 1 Introduction 1 2 Single Domain Single Sign-On 2
PingFederate. SSO Integration Overview
PingFederate SSO Integration Overview 2006-2012 Ping Identity Corporation. All rights reserved. PingFederate SSO Integration Overview Version 6.6 January, 2012 Ping Identity Corporation 1001 17th Street,
CENTRAL AUTHENTICATION SERVICE (CAS) SSO FOR EMC DOCUMENTUM REST SERVICES
White Paper FOR EMC DOCUMENTUM REST SERVICES Abstract This white paper provides a detailed review of Central Authentication Service (CAS) SSO integration with EMC Documentum REST Services by exploring
How To Secure An Emr-Link System Architecture
EMR-Link Security Administration Guide Introduction This guide provides an overview of the security measures built into EMR-Link, and how your organization s security policies can be implemented with these
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
How to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
CERN Single Sign On solution
CERN Single Sign On solution Emmanuel Ormancey System Architect, CERN IT/IS CERN, Route de Meyrin, CH-1211 Geneva 23, Switzerland E-mail: [email protected] Abstract. The need for Single Sign On
Identity Management: The authentic & authoritative guide for the modern enterprise
Identity Management: The authentic & authoritative guide for the modern enterprise Ellen Newlands, Product Manager Dmitri Pal, Director, Engineering 06-26-15 Goals of the Presentation Introduce Identity
BlueCoat s Guide to Authentication V1.0
BlueCoat s Guide to Authentication V1.0 Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service names are
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies
Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright
Using Kerberos for Web Authentication. Wesley Craig University of Michigan
Using Kerberos for Web Authentication Wesley Craig University of Michigan Outline Basic Auth WebSSO SASL & HTTP Kerberos & TLS SPNEGO PKI, PKI, PKI For each technology, a brief over view, drawbacks, and
THE NEW DIGITAL EXPERIENCE
[email protected] SECURING THE NEW DIGITAL EXPERIENCE Dr Steffo Weber, Oracle BridgFilling the UX gap for mobile enterprise applications. May,-2014 Latest Entries Protecting IDPs from malformed SAML
Single Sign-On Implementation Guide
Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
Outsource the hosting of Luminis and have it hosted elsewhere
Hardware Background Luminis is the premier portal application in use today by school and organizations that use SunGard HE's Banner system. A significant amount of hardware is required in order to run
Federated AAA middleware and the QUT SSO environment
Federated AAA middleware and the QUT SSO environment Bradley Beddoes Senior Network Programmer AAA eview Project Manager [email protected] Shaun Mangelsdorf Network Programmer [email protected]
Developing an Interoperable Blackboard Proxy Tool
Developing an Interoperable Blackboard Proxy Tool George Kroner Developer Relations Engineer Blackboard Inc. Lance Neumann Sr. Software Architect Blackboard Inc. Agenda Building Blocks Proxy Tools Overview
