Shibboleth Architecture
|
|
|
- Spencer Patrick
- 10 years ago
- Views:
Transcription
1 Shibboleth Architecture Technical Overview Working Draft 02, 8 June 2005 Document identifier: draft-mace-shibboleth-tech-overview-02 Location: Editors: Tom Scavo ([email protected]), NCSA Scott Cantor ([email protected]), The Ohio State University Contributors: Nathan Dors ([email protected]), University of Washington Abstract: This non-normative document gives a technical overview of Shibboleth. This is a working draft and the text may change before completion. Please submit comments to the shibboleth-dev mailing list (see for subscription details). Page 1 of 31
2 Table of Contents 1 Introduction Background Notation Outline Shibboleth Components Identity Provider Authentication Authority Single Sign-On Service Inter-Site Transfer Service Artifact Resolution Service Attribute Authority Service Provider Assertion Consumer Service Attribute Requester WAYF Service SAML Assertions Authentication Assertions Attribute Assertions Multiple Assertions Signed Assertions Shibboleth SSO Profiles Authentication Request Profile Browser/POST Profile Browser/POST Profile with WAYF Service Browser/Artifact Profile Browser/Artifact Profile with WAYF Service Attributes Browser/POST Profile with Attribute Exchange Browser/Artifact Profile with Attribute Exchange Directory Schema Metadata Identity Provider Metadata SSO Service Metadata Attribute Authority Metadata Service Provider Metadata Assertion Consumer Service Metadata References Normative References Non-Normative References...31 Page 2 of 31
3 Introduction The Shibboleth Architecture [ShibProt] extends the SAML 1.1 single sign-on and attribute exchange mechanisms by specifying service-provider-first SSO profiles and enhanced features for user privacy. This document provides a technical overview of Shibboleth and as such is an extension of [SAMLTech]. 1.1 Background The Shibboleth Architecture is built upon the following standards: Hypertext Transfer Protocol (HTTP) Extensible Markup Language (XML) XML Schema XML Signature SOAP 1 Security Assertion Markup Language (SAML) Definitive references for each of these standards are found in section 7 of this Overview. 1.2 Notation Conventional XML namespace prefixes are used throughout the listings in this Overview, whether or not a namespace declaration is present in the listing: The prefix saml: stands for the SAML 1.1 assertion namespace: urn:oasis:names:tc:saml:1.0:assertion The prefix samlp: stands for the SAML 1.1 request-response protocol namespace: urn:oasis:names:tc:saml:1.0:protocol The prefix md: stands for the SAML 2.0 metadata namespace: urn:oasis:names:tc:saml:2.0:metadata The prefix ds: stands for the W3C XML Signature namespace: The prefix xsd: stands for the W3C XML Schema namespace: The prefix xsi: stands for the W3C XML Schema namespace for schema-related markup that appears in XML instances: The following typographical conventions for displayed text are used: HTTP requests appear like this. HTTP responses appear like this. HTML code listings appear like this. JavaScript code listings appear like this. XML code listings appear like this. SAML code listings appear like this. 1 Originally, SOAP was an acronym for "Simple Object Access Protocol", but this turned out to be a misnomer since SOAP has nothing to do with "object access" in the object-oriented programming sense of the phrase. So today we no longer think of "SOAP" as an acronym although the capitalization persists. Page 3 of 31
4 URNs appear like this. URLs appear like this. Likewise the following typographical conventions for in-line text are used: <XMLelement>, <HTMLelement>, XMLattribute, HTMLattribute, LDAPattribute, HTTPparameter, OtherCode. Finally, variable placeholders in code fragments (both displayed and in-line) are italicized (e.g., artifact). 1.3 Outline Immediately following this introduction, in section 2 we describe the components comprising the Shibboleth System. Section 3 is a general introduction to Security Assertion Markup Language (SAML) with special emphasis on those SAML constructs used by Shibboleth. In section 4, the Shibboleth browser profiles are described in detail, while the Shibboleth attribute profiles are outlined in section 5. Also in section 5, we emphasize the importance of directory schema using eduperson as the canonical example of a directory in higher education. An introduction to SAML metadata is given in section 6, and finally in section 7 we provide a list of definitive references for further study. Page 4 of 31
5 Shibboleth Components The functional components of a conforming Shibboleth implementation include an identity provider, a service provider, an optional Where are you from? (WAYF) service, and various interacting subcomponents. 2.1 Identity Provider An identity provider (formerly called an origin) maintains user credentials and attributes. Upon request the identity provider (IdP) will assert authentication statements or attribute statements to relying parties, specifically service providers. IdP subcomponents are depicted in Figure 1 and discussed in the following subsections. Identity Provider Authentication Authority Attribute Authority Authentication Authority Figure 1: Shibboleth Identity Provider The authentication authority issues authentication statements to other components. The authentication authority is integrated with the IdP's authentication service (the details of which are out of scope) Single Sign-On Service SSO Service A single sign-on (SSO) service is the first point of contact at the IdP. The SSO service initiates the authentication process at the IdP and ultimately redirects the client to the intersite transfer service (unless the function of the SSO service and inter-site transfer service are combined, which is encouraged). Note: The SSO service is not defined by SAML 1.1, which specifies only identity-provider-first SSO profiles Inter-Site Transfer Service The inter-site transfer service issues HTTP responses conforming to the Browser/POST and Browser/Artifact profiles. The inter-site transfer service interacts with the authentication authority behind the scenes to produce the required authentication assertion. Note: The concept of an inter-site transfer service has been removed in SAML 2.0, so we assume that the functions of the SSO service and the inter-site transfer service are combined, and therefore ignore the latter in all that follows Artifact Resolution Service Artifact Resolution Service If the Browser/Artifact profile is used, the IdP sends an artifact to the SP instead of the actual assertion. (An artifact is a reference to an authentication assertion.) The SP then sends the Page 5 of 31
6 artifact to the artifact resolution service at the IdP via a back-channel exchange. In return, the IdP sends the required authentication assertion to the SP Attribute Authority The attribute authority processes attribute requests; that is, it issues attribute assertions. The attribute authority authenticates and authorizes any requests it receives. 2.2 Service Provider A service provider (formerly called a target) manages secured resources. User access to resources is based on assertions received by the service provider (SP) from an identity provider. SP subcomponents are shown in Figure 2. Note that the service provider has access control in place that prevents access by clients without a security context. Service Provider Assertion Consumer Service Attribute Requester Access Control Target Resource Assertion Consumer Service Figure 2: Shibboleth Service Provider The assertion consumer service (formerly called a SHIRE) is the service provider endpoint of the SSO exchange. It processes the authentication assertion returned by the SSO service (or artifact resolution service, depending on the profile used), initiates an optional attribute request (see section 5), establishes a security context at the SP, and redirects the client to the desired target resource Attribute Requester An attribute requester (formerly called a SHAR) at the SP and the attribute authority at the IdP may conduct a back-channel attribute exchange once a security context has been established at the SP. That is, the SP and IdP interact directly, bypassing the browser. 2.3 WAYF Service An optional WAYF service is operated independent of the SP and IdP. The WAYF can be used by the SP to determine the user's preferred IdP, with or without user interaction. The WAYF is essentially a proxy for the authentication request passed from the SP to the SSO service at the IdP. Page 6 of 31
7 SAML Assertions This section provides some background material on SAML assertions that sets the stage for the profiles to follow. In Shibboleth, SAML assertions are transferred from identity providers to service providers. Assertions contain statements that service providers can use to make access control decisions. Three types of statements are specified by SAML: 1. Authentication statements 2. Attribute statements 3. Authorization decision statements Authentication statements assert to the service provider that the principal did indeed authenticate with the identity provider at a particular time using a particular method of authentication. The examples in section 3.1, for instance, are assertions containing authentication statements typically used in the Browser/POST and Browser/Artifact profiles (section 4), respectively. Attribute statements provide additional information about a principal so that service providers can make access control decisions. For example, the attribute assertion given in section 3.2 is the result of the attribute exchange described in section 5.1. Authentication statements and attribute statements may be combined in a single assertion. Alternatively, multiple assertions may be issued by the IdP, each containing its own statement. A variation of the Browser/Artifact profile (section 5.2), for instance, relies on a pair of assertions, both obtained as the result of a single message exchange. The example in section 3.3 illustrates the corresponding pair of assertions. In some situations, it may be preferable for the application to delegate an access control decision to another component or service. In this case, the service provider indicates to the service the resource being accessed where after the service asserts an authorization decision statement that dictates whether or not the principal is allowed access to the resource. In Shibboleth, such statements are out of scope, but the interested reader is referred to [GSIsecurity] for a relevant example. Finally, SAML assertions may be digitally signed. An XML element such as that given in section 3.4 is inserted into those assertions where additional message integrity is required. 3.1 Authentication Assertions The following authentication assertion (sometimes called an SSO assertion) contains a <saml:authenticationstatement> element (but no attributes): <saml:assertion xmlns:saml="urn:oasis:names:tc:saml:1.0:assertion" MajorVersion="1" MinorVersion="1" AssertionID="a75adf55-01d7-40cc-929f-dbd8372ebdfc" IssueInstant=" T09:22:02Z" Issuer=" <saml:conditions NotBefore=" T09:17:02Z" NotOnOrAfter=" T09:27:02Z"> <saml:audiencerestrictioncondition> <saml:audience> </saml:audiencerestrictioncondition> </saml:conditions> <saml:authenticationstatement AuthenticationInstant=" T09:22:00Z" Page 7 of 31
8 AuthenticationMethod="urn:oasis:names:tc:SAML:1.0:am:password"> <saml:subject> <saml:nameidentifier Format="urn:mace:shibboleth:1.0:nameIdentifier" NameQualifier=" 3f7b3dcf ecd-92c8-1544f346baf8 </saml:nameidentifier> <saml:subjectconfirmation> <saml:confirmationmethod> urn:oasis:names:tc:saml:1.0:cm:bearer </saml:confirmationmethod> </saml:subjectconfirmation> </saml:subject> </saml:authenticationstatement> </saml:assertion> The value of the <saml:nameidentifier> element in the preceding example is called a Shibboleth handle: an opaque, transient identifier associated with the authenticated user. Further messages regarding this user (such as the one in the next section) explicitly refer to this handle instead of the actual identity of the user. Note that the above assertion (called a bearer assertion) assigns the following value to the <saml:confirmationmethod> element: urn:oasis:names:tc:saml:1.0:cm:bearer Whereas the preceding assertion is used in the Browser/POST profile (section 4.2), the following assertion is used in the Browser/Artifact profile (section 4.3): <saml:assertion xmlns:saml="urn:oasis:names:tc:saml:1.0:assertion" MajorVersion="1" MinorVersion="1" AssertionID="003c6cc1-9ff8-10f9-990f b13a2b" IssueInstant=" T09:22:05Z" Issuer=" <saml:conditions NotBefore=" T09:17:05Z" NotOnOrAfter=" T09:27:05Z"> <saml:audiencerestrictioncondition> <saml:audience> </saml:audiencerestrictioncondition> </saml:conditions> <saml:authenticationstatement AuthenticationInstant=" T09:22:00Z" AuthenticationMethod="urn:oasis:names:tc:SAML:1.0:am:password"> <saml:subject> <saml:nameidentifier Format="urn:oasis:names:tc:SAML:1.1:nameid-format: Address" NameQualifier=" [email protected] </saml:nameidentifier> <saml:subjectconfirmation> <saml:confirmationmethod> urn:oasis:names:tc:saml:1.0:cm:artifact </saml:confirmationmethod> </saml:subjectconfirmation> </saml:subject> </saml:authenticationstatement> </saml:assertion> Page 8 of 31
9 In this case, the value of the <saml:confirmationmethod> element is urn:oasis:names:tc:saml:1.0:cm:artifact which indicates the Browser/Artifact profile was used to retrieve the assertion. Some use cases require more than an opaque identifier, so for the sake of illustration the value of the <saml:nameidentifier> element in the preceding example is an address. Presumably this uniquely identifies the authenticated user to the SP. Note that an authentication assertion may include additional information about the subject, such as attributes. 3.2 Attribute Assertions The following attribute assertion contains a <saml:attributestatement> element only: <saml:assertion xmlns:saml="urn:oasis:names:tc:saml:1.0:assertion" MajorVersion="1" MinorVersion="1" AssertionID="a144e8f3-adad-594a abe933" IssueInstant=" T09:22:05Z" Issuer=" <saml:conditions NotBefore=" T09:17:05Z" NotOnOrAfter=" T09:52:05Z"> <saml:audiencerestrictioncondition> <saml:audience> </saml:audiencerestrictioncondition> </saml:conditions> <saml:attributestatement> <saml:subject> <saml:nameidentifier Format="urn:mace:shibboleth:1.0:nameIdentifier" NameQualifier=" 3f7b3dcf ecd-92c8-1544f346baf8 </saml:nameidentifier> </saml:subject> <saml:attribute AttributeName="urn:mace:dir:attribute-def:eduPersonPrincipalName" AttributeNamespace="urn:mace:shibboleth:1.0:attributeNamespace:uri"> <saml:attributevalue Scope="example.org"> userid </saml:attributevalue> </saml:attribute> </saml:attributestatement> </saml:assertion> Note that the value of the <saml:nameidentifier> element is the same as that in the first example in section 3.1, which implies that the attribute statement is obtained subsequent to and as a consequence of the previous authentication statement. 3.3 Multiple Assertions The following pair of assertions contain <saml:authenticationstatement> and <saml:attributestatement> elements, respectively: <saml:assertion xmlns:saml="urn:oasis:names:tc:saml:1.0:assertion" MajorVersion="1" MinorVersion="1" Page 9 of 31
10 Page 10 of 31 AssertionID="00305ed1-a1bd-10f9-a2d b13a2b" 319 IssueInstant=" T09:22:05Z" 320 Issuer=" 321 <saml:conditions 322 NotBefore=" T09:17:05Z" 323 NotOnOrAfter=" T09:27:05Z"> 324 <saml:audiencerestrictioncondition> 325 <saml:audience> 326 </saml:audiencerestrictioncondition> 327 </saml:conditions> 328 <saml:authenticationstatement 329 AuthenticationMethod="urn:oasis:names:tc:SAML:1.0:am:password" 330 AuthenticationInstant=" T09:22:00Z"> 331 <saml:subject> 332 <saml:nameidentifier 333 Format="urn:mace:shibboleth:1.0:nameIdentifier" 334 NameQualifier=" dd87d-f380-4fd ef2bb71e9 336 </saml:nameidentifier> 337 <saml:subjectconfirmation> 338 <saml:confirmationmethod> 339 urn:oasis:names:tc:saml:1.0:cm:artifact 340 </saml:confirmationmethod> 341 </saml:subjectconfirmation> 342 </saml:subject> 343 </saml:authenticationstatement> 344 </saml:assertion> 345 <saml:assertion 346 xmlns:saml="urn:oasis:names:tc:saml:1.0:assertion" 347 xmlns:xsd=" 348 xmlns:xsi=" 349 MajorVersion="1" MinorVersion="1" 350 AssertionID="008c6181-a288-10f9-b6d b13a2b" 351 IssueInstant=" T09:22:05Z" 352 Issuer=" 353 <saml:conditions 354 NotBefore=" T09:17:05Z" 355 NotOnOrAfter=" T09:52:05Z"> 356 <saml:audiencerestrictioncondition> 357 <saml:audience> 358 </saml:audiencerestrictioncondition> 359 </saml:conditions> 360 <saml:attributestatement> 361 <saml:subject> 362 <saml:nameidentifier 363 Format="urn:mace:shibboleth:1.0:nameIdentifier" 364 NameQualifier=" dd87d-f380-4fd ef2bb71e9 366 </saml:nameidentifier> 367 </saml:subject> 368 <saml:attribute 369 AttributeName="urn:mace:dir:attribute-def:eduPersonScopedAffiliation" 370 AttributeNamespace="urn:mace:shibboleth:1.0:attributeNamespace:uri"> 371 <saml:attributevalue Scope="example.org"> 372 member 373 </saml:attributevalue> 374 <saml:attributevalue Scope="example.org"> 375
11 faculty </saml:attributevalue> </saml:attribute> <saml:attribute AttributeName="urn:mace:dir:attribute-def:eduPersonEntitlement" AttributeNamespace="urn:mace:shibboleth:1.0:attributeNamespace:uri"> <saml:attributevalue xsi:type="xsd:anyuri"> urn:mace:oclc.org: </saml:attributevalue> <saml:attributevalue xsi:type="xsd:anyuri"> </saml:attributevalue> <saml:attributevalue xsi:type="xsd:anyuri"> urn:mace:incommon:entitlement:common:1 </saml:attributevalue> </saml:attribute> </saml:attributestatement> </saml:assertion> 3.4 Signed Assertions Many SAML assertions, especially assertions that pass through a browser, are digitally signed (see section 5 of [SAMLCore]). Here we give an example of a <ds:signature> element (with visual formatting, which invalidates the signature) used to sign the authentication assertion obtained via the Browser/POST profile in section 4.2: <ds:signature xmlns:ds=" <ds:signedinfo> <ds:canonicalizationmethod Algorithm=" <ds:signaturemethod Algorithm=" <ds:reference URI="#c af61-4fce-8b98-e b306"> <ds:transforms> <ds:transform Algorithm=" <ds:transform Algorithm=" <InclusiveNamespaces PrefixList="#default saml samlp ds xsd xsi" xmlns=" </ds:transform> </ds:transforms> <ds:digestmethod Algorithm=" <ds:digestvalue>tcdvsug6grhyhbzhqfwfzgrxipe=</ds:digestvalue> </ds:reference> </ds:signedinfo> <ds:signaturevalue> x/gypbzmfee85pgd3c1axg4vspb9v9jgcjwcrckrtwps6vdvnccy5rhafpywkf+5 EIYcPzx+pX1h43SmwviCqXRjRtMANWbHLhWAptaK1ywS7gFgsD01qjyen3CP+m3D w6vkhaqledl0byyrizb4kkho4ahnybvxbjwqv5puae4= </ds:signaturevalue> <ds:keyinfo> <ds:x509data> <ds:x509certificate> Page 11 of 31
12 MIICyjCCAjOgAwIBAgICAnUwDQYJKoZIhvcNAQEEBQAwgakxCzAJBgNVBAYTAlVT MRIwEAYDVQQIEwlXaXNjb25zaW4xEDAOBgNVBAcTB01hZGlzb24xIDAeBgNVBAoT F1VuaXZlcnNpdHkgb2YgV2lzY29uc2luMSswKQYDVQQLEyJEaXZpc2lvbiBvZiBJ bmzvcm1hdglvbibuzwnobm9sb2d5msuwiwydvqqdexxirvblssbtzxj2zxigq0eg LS0gMjAwMjA3MDFBMB4XDTAyMDcyNjA3Mjc1MVoXDTA2MDkwNDA3Mjc1MVowgYsx CzAJBgNVBAYTAlVTMREwDwYDVQQIEwhNaWNoaWdhbjESMBAGA1UEBxMJQW5uIEFy Ym9yMQ4wDAYDVQQKEwVVQ0FJRDEcMBoGA1UEAxMTc2hpYjEuaW50ZXJuZXQyLmVk dtenmcugcsqgsib3dqejaryycm9vdebzaglims5pbnrlcm5lddiuzwr1migfma0g CSqGSIb3DQEBAQUAA4GNADCBiQKBgQDZSAb2sxvhAXnXVIVTx8vuRay+x50z7GJj IHRYQgIv6IqaGG04eTcyVMhoekE0b45QgvBIaOAPSZBl13R6+KYiE7x4XAWIrCP+ c2mzvexetgv3yz+uslg2y1on+jh4hxwkpfmzbctyxiur6dxf8rvop9w7o27rhrje pmqoifgtwqidaqabox0wgzambgnvhrmbaf8eajaamasga1uddwqeawifodanbgkq hkig9w0baqqfaaobgqbfdqew+oi3jqbqhibzhujn/pizdn7s/z4d5d3pptwdjf2n qgi7lfv6mdkhmtvtqbtjmnk3no7v/dnp6hr7whxvccrwubnmifz6qzav2fu78plx 8I3bsbmRAUg4UP9hH6ABVq4KQKMknxu1xQxLhpR1ylGPdiowMNTrEG8cCx3w/w== </ds:x509certificate> </ds:x509data> </ds:keyinfo> </ds:signature> SAML metadata elements are also signed. The examples in section 6, for instance, implicitly include a <ds:signature> element similar to the one above. Page 12 of 31
13 Shibboleth SSO Profiles Shibboleth specifies two browser-based single sign-on (SSO) profiles: 1. Browser/POST Profile 2. Browser/Artifact Profile These profiles extend the SAML 1.1 profiles of the same name [SAMLBind]. While the SAML 1.1 profiles begin with a request to the IdP, the Shibboleth profiles are serviceprovider-first and therefore more complex. 4.1 Authentication Request Profile To accommodate SP-first profiles, Shibboleth introduces the notion of an authentication request. A Shibboleth authentication request is a URL-encoded message sent to an SSO service endpoint at the IdP. The following parameters are included in the query string: providerid The providerid parameter is the unique identifier (usually a URI) of the SP. The IdP may use the providerid to perform special handling or processing of the authentication request. shire The shire parameter (so named for historical reasons) is the location of the assertion consumer service endpoint at the SP. When using the Browser/POST profile, this URL becomes the value of the <form> element's action attribute. For the Browser/Artifact profile, the value of the shire parameter is a prefix of the redirect URL used by the SSO service. target The target parameter is a state maintenance parameter, possibly the location of the target resource. Regardless of the profile used, the target parameter must be preserved by the IdP and included in the response to the SP. time The (optional) time parameter is the current time in seconds past the epoch. It is used to assist the IdP in detecting stale requests from the client. It is important that the time parameter not be used as any kind of security measure. Here is an example of a Shibboleth authentication request (without URL encoding for clarity): target= shire= providerid= time= Detailed handling of this request is outlined in the subsections below. 4.2 Browser/POST Profile The Shibboleth Browser/POST profile is a combination of two profiles, the Shibboleth Authentication Request profile [ShibProt] and the SAML 1.1 Browser/POST profile [SAMLBind]. The message flow associated with the Shibboleth Browser/POST profile is depicted in Figure 3. As with both Shibboleth SSO profiles, the message flow begins with a request for a secured resource at the SP. Page 13 of 31
14 Identity Provider Authentication Authority (4) 200 (3) GET SSO Service Client (6) 302 (5) POST (8) 200 Assertion Consumer Service (7) GET (2) 302 (1) GET Access Control Target Resource Service Provider Figure 3: Shibboleth Browser/POST Profile (1) The client requests a target resource at the SP: The SP performs a security check on behalf of the target resource. If a valid security context at the SP already exists, skip steps 2 7. (2) The SP redirects the client to the single sign-on (SSO) service at the IdP. Three parameters are appended to the redirect URL (the optional time parameter is omitted in this example). (3) The client requests the SSO service at the IdP: target= shire= providerid= The SSO service processes the authentication request and performs a security check. If the user does not have a valid security context, the IdP identifies the principal (details omitted). Once the principal has been identified, the SSO service obtains an authentication statement from the authentication authority. (4) The SSO service responds with a document containing an HTML form: <form method="post" action=" <input name="target" type="hidden" value=" /> <input name="samlresponse" value="response" type="hidden" /> Page 14 of 31
15 <input type="submit" value="submit" /> </form> The value of the TARGET parameter has been preserved from step 3. The value of the SAMLResponse parameter is the base64 encoding of a digitally signed <samlp:response> element such as the one below: <samlp:response xmlns:samlp="urn:oasis:names:tc:saml:1.0:protocol" MajorVersion="1" MinorVersion="1" IssueInstant=" T09:22:02Z" Recipient=" ResponseID="c af61-4fce-8b98-e b306"> <! - insert ds:signature element here (section 3.4) --> <samlp:status><samlp:statuscode Value="samlp:Success"/></samlp:Status> <!-- insert SAML assertion here (section 3.1) --> </samlp:response> (5) The client issues a POST request to the assertion consumer service at the SP. To automate the submission of the form, the following line of JavaScript (or its equivalent) may appear in the HTML document containing the form in step 4: window.onload = function() { document.forms[0].submit(); } This assumes that the page contains a single HTML <form> element. (6) The assertion consumer service processes the authentication response, creates a security context at the SP and redirects the client to the target resource. (7) The client requests the target resource at the SP (again): (8) Since a security context exists, the SP returns the resource to the client Browser/POST Profile with WAYF Service In general, the SP does not know the user's preferred IdP at step 2 of the Browser/POST profile. The process whereby the SP determines the appropriate IdP is called identity provider discovery (generally, a very difficult problem). Shibboleth specifies an (optional) WAYF service to aid the SP in IdP discovery. A WAYF ("Where are you from?") service is an intermediary between the SP and the IdP. The SP sends its authentication request to the WAYF, which somehow determines the user's preferred IdP (through unspecified means) and then subsequently redirects the client to the desired IdP. In the process, the WAYF preserves the values of all parameters except the time parameter, which is updated. In practice, the first time the client accesses an SP, the WAYF might present the user with a form containing a list of all available IdPs. The user selects an IdP from the list and submits the form, after which the WAYF redirects the client to the selected IdP. At the same time, the client stores a reference to the IdP in a client-side cookie such that subsequent visits to the same SP are redirected straight through to the corresponding IdP by the WAYF. As a hypothetical example, suppose that a WAYF service resides at domain example.org and that the SP redirects the client to this WAYF as follows: target= shire= providerid= In response, the WAYF returns a form to the client with the following elements: Page 15 of 31
16 <form method="get" action=" <input name="target" type="hidden" value=" /> <input name="shire" type="hidden" value=" /> <input name="providerid" type="hidden" value=" />... <input type="submit" value="submit" /> </form> Presumably the form contains additional controls that allow the user to select an IdP, after which the form is submitted to the WAYF. The WAYF processes the form, sets the cookie and redirects the client to the selected IdP. The message flow of the Shibboleth Browser/POST profile with WAYF service is outlined in Figure 4. (The flow of the corresponding Browser/Artifact profile is similar.) In step 4 of that flow, the WAYF returns an HTML form to the user who chooses an IdP from a list. After the form is submitted at step 5, the client is redirected to the SSO service of the chosen IdP where after the flow is identical to the ordinary Browser/POST profile. Identity Provider Authentication Authority (8) 200 (7) GET SSO Service (6) 302 Client (5) GET (4) 200 (3) GET WAYF (10) 302 (9) POST (12) 200 Assertion Consumer Service (11) GET (2) 302 (1) GET Access Control Target Resource 583 Service Provider Page 16 of 31
17 Figure 4: Shibboleth Browser/POST Profile with WAYF Service (1) The client requests a target resource at the SP: The SP performs a security check on behalf of the target resource. If a valid security context at the SP already exists, skip steps (2) The SP redirects the client to the WAYF. Three parameters are appended to the redirect URL (the optional time parameter is omitted in this example). (3) The client requests the WAYF service: target= shire= providerid= The WAYF service processes the authentication request and performs a cookie check. If the user has the required cookie, skip steps 4 and 5. Otherwise an HTML form is returned to the client. (4) The WAYF returns an HTML form to the client. The parameters of the authentication request (shown in the previous step) are encoded as hidden fields in the form as illustrated above. (5) The user selects an IdP from the list and submits the form, which causes the browser to issue a GET request to the WAYF. (Depending on the particular WAYF implementation, multiple HTTP transactions may occur at this step.) (6) The WAYF updates the cookie with the user s preferred IdP and redirects the client to the SSO service. Three parameters are appended to the redirect URL. (7) The client requests the SSO service at the IdP: target= shire= providerid= The SSO service processes the authentication request and performs a security check. If the user does not have a valid security context, the IdP identifies the principal (details omitted). Once the principal has been identified, the SSO service obtains an authentication statement from the authentication authority. (8) The SSO service responds with an HTML form as in step 4 of the ordinary Browser/POST profile. (9) The client issues a POST request to the assertion consumer service at the service provider as in step 5 of the ordinary Browser/POST profile. (10) The assertion consumer service processes the authentication response, creates a security context at the SP and redirects the client to the target resource. (11) The client requests the target resource at the SP (again): (12) Since a security context exists, the SP returns the resource to the client. 4.3 Browser/Artifact Profile The Shibboleth Browser/Artifact profile is a combination of the Shibboleth Authentication Request [ShibProt] profile and the SAML 1.1 Browser/Artifact profile [SAMLBind]. The message flow associated with the Shibboleth Browser/Artifact profile is shown in Figure 5. Page 17 of 31
18 Note the back-channel exchange of the SAML artifact in steps 6 and 7. This is the distinguishing characteristic between the Browser/Artifact and Browser/POST profiles. Identity Provider Authentication Authority Attribute Authority (4) 302 (3) GET SSO Service Artifact Resolution Service Client (8) 302 (5) GET (7) 200 Assertion Consumer Service (6) POST (10) 200 (9) GET (2) 302 (1) GET Access Control Target Resource Service Provider Figure 5: Shibboleth Browser/Artifact Profile (1) The client requests a target resource at the SP: The SP performs a security check on behalf of the target resource. If a valid security context at the SP already exists, skip steps 2 9. (2) The SP redirects the client to the single sign-on (SSO) service at the IdP. Three parameters are appended to the redirect URL (the optional time parameter is omitted in this example). (3) The client requests the SSO service at the IdP: target= shire= providerid= The SSO service processes the authentication request and performs a security check. If the user does not have a valid security context, the IdP identifies the principal (details omitted). Once the principal has been identified, the SSO service obtains an authentication statement from the authentication authority. (4) The SSO service redirects the client to the assertion consumer service at the SP. A TARGET parameter and a SAMLart parameter are appended to the redirect URL prefix given by the shire parameter in step 3. Page 18 of 31
19 (5) The client requests the assertion consumer service at the SP: TARGET= SAMLart=AAEwGDwd3Z7Fr1GPbM82Fk2CZbpNB1dxD%2Bt2Prp%2BTDtqxVA78iMf3F23 where the value of the TARGET parameter is preserved from step 3 and the value of the SAMLart parameter is a SAML artifact of type 0x0001 defined in [SAMLBind]. (6) The assertion consumer service validates the request and dereferences the artifact by sending a SAML Request to the artifact resolution service at the IdP: POST /shibboleth/artifact HTTP/1.1 Host: idp.example.org Content-Type: text/xml Content-Length: nnn SOAPAction: <?xml version="1.1" encoding="iso "?> <SOAP-ENV:Envelope xmlns:soap-env=" <SOAP-ENV:Header/> <SOAP-ENV:Body> <samlp:request xmlns:samlp="urn:oasis:names:tc:saml:1.0:protocol" MajorVersion="1" MinorVersion="1" RequestID="f81d4fae-7dec-11d0-a765-00a0c91e6bf6" IssueInstant=" T09:22:04Z"> <samlp:assertionartifact> AAEwGDwd3Z7Fr1GPbM82Fk2CZbpNB1dxD+t2Prp+TDtqxVA78iMf3F23 </samlp:assertionartifact> </samlp:request> </SOAP-ENV:Body> </SOAP-ENV:Envelope> where the value of the <samlp:assertionartifact> element is the SAML artifact at step 5. (7) The artifact resolution service at the IdP returns a <samlp:response> element (containing an authentication statement) to the assertion consumer service at the SP: HTTP/ OK Content-Type: text/xml Content-Length: nnnn <?xml version="1.1" encoding="iso "?> <SOAP-ENV:Envelope xmlns:soap-env=" <SOAP-ENV:Header/> <SOAP-ENV:Body> <samlp:response xmlns:samlp="urn:oasis:names:tc:saml:1.0:protocol" MajorVersion="1" MinorVersion="1" Recipient=" ResponseID="00099cf1-a355-10f9-9e b13a2b" InResponseTo="f81d4fae-7dec-11d0-a765-00a0c91e6bf6" IssueInstant=" T09:22:05Z"> <samlp:status> <samlp:statuscode Value="samlp:Success"/> </samlp:status> Page 19 of 31
20 <!-- insert SAML assertion here (see section 3.1) --> </samlp:response> </SOAP-ENV:Body> </SOAP-ENV:Envelope> (8) The assertion consumer service processes the authentication response, creates a security context at the SP and redirects the client to the target resource. (9) The client requests the target resource at the SP (again): (10) Since a security context exists, the SP returns the resource to the client Browser/Artifact Profile with WAYF Service Like the Browser/POST profile, an SP that supports the Browser/Artifact profile may also utilize the services of a WAYF. The resulting Browser/Artifact profile with WAYF service is analogous to the Browser/POST case (section 4.2.1). Page 20 of 31
21 Attributes Shibboleth specifies the use of a standard SAML attribute request protocol to facilitate attribute sharing among IdPs and SPs. In this section we augment the SSO profiles of sections 4.2 and 4.3 with an attribute exchange that permits the SP to make an informed access control decision. Such an attribute exchange is optional since the SP may choose to provide a security context based solely on an authentication assertion. In practice, however, the SP may need to know more about the authenticated user before access to a resource may be granted. 5.1 Browser/POST Profile with Attribute Exchange Although attributes may be embedded in the authentication assertion transferred from IdP to SP, Shibboleth specifies an optional back-channel exchange using a SAML protocol binding such as the SOAP 1.1 binding. The attribute exchange is a simple two-step process initiated towards the end of the ordinary Browser/POST profile (see Figure 6). Identity Provider Authentication Authority Attribute Authority (4) 200 (3) GET SSO Service Client (8) 302 (5) POST Assertion Consumer Service (7) 200 Attribute Requester (6) POST (10) 200 (9) GET (2) 302 (1) GET Access Control Target Resource Service Provider Figure 6: Shibboleth Browser/POST Profile with Attribute Exchange The first five steps of the ordinary Browser/POST profile proceed as before. Before access to the resource is granted, however, an attribute exchange is required. (1 5) Same as the ordinary Browser/POST profile. (6) The assertion consumer service parses the POST request, validates the signature on the <samlp:response> element, creates a security context at the SP and passes control to the Page 21 of 31
22 attribute requester to initiate the attribute exchange. The attribute requester POSTs a SAML SOAP message to the attribute authority (AA) at the IdP: POST /shibboleth/aa/soap HTTP/1.1 Host: idp.example.org Content-Type: text/xml Content-Length: nnn SOAPAction: <?xml version="1.1" encoding="iso "?> <SOAP-ENV:Envelope xmlns:soap-env=" <SOAP-ENV:Header/> <SOAP-ENV:Body> <samlp:request xmlns:saml="urn:oasis:names:tc:saml:1.0:assertion" xmlns:samlp="urn:oasis:names:tc:saml:1.0:protocol" MajorVersion="1" MinorVersion="1" IssueInstant=" T09:22:04Z" RequestID="aaf a-fe114412ab72"> <samlp:attributequery Resource=" <saml:subject> <saml:nameidentifier Format="urn:mace:shibboleth:1.0:nameIdentifier" NameQualifier=" 3f7b3dcf ecd-92c8-1544f346baf8 </saml:nameidentifier> </saml:subject> <saml:attributedesignator AttributeName="urn:mace:dir:attribute-def:eduPersonPrincipalName" AttributeNamespace="urn:mace:shibboleth:1.0:attributeNamespace:uri"/> </samlp:attributequery> </samlp:request> </SOAP-ENV:Body> </SOAP-ENV:Envelope> (7) The AA at the IdP processes the request and returns the required attributes to the attribute requester: HTTP/ OK Content-Type: text/xml Content-Length: nnnn <?xml version="1.1" encoding="iso "?> <SOAP-ENV:Envelope xmlns:soap-env=" <SOAP-ENV:Header/> <SOAP-ENV:Body> <samlp:response xmlns:samlp="urn:oasis:names:tc:saml:1.0:protocol" InResponseTo="aaf a-fe114412ab72" IssueInstant=" T09:22:05Z" MajorVersion="1" MinorVersion="1" ResponseID="b07b804c-7c29-ea f3d6f7928ac"> <samlp:status> <samlp:statuscode Value="samlp:Success"/> </samlp:status> <!-- insert SAML assertion from section 3.2 here --> Page 22 of 31
23 </samlp:response> </SOAP-ENV:Body> </SOAP-ENV:Envelope> (8) The assertion consumer service filters the attributes, updates the security context and redirects the client to the target resource. (9) The client requests the target resource at the SP (again): (10) Since a security context exists, the SP returns the resource to the client. 5.2 Browser/Artifact Profile with Attribute Exchange Recall that the Browser/Artifact profile of section 4.3 incorporates its own back-channel exchange to dereference the artifact. To obtain attributes, an additional back-channel exchange might be used (as in section 5.1). Alternatively, attributes could be retrieved at the same time the artifact is dereferenced, which we illustrate in this section. The resulting flow is identical to the previous flow associated with the Browser/Artifact profile (see Figure 5). As observed in section 3, an attribute statement may be combined with an authentication statement in one of two ways: both statements may be wrapped in a single assertion or separate assertions may contain individual statements. The latter approach is illustrated here. Two assertions require two artifacts, which is the primary difference between this example and the example of section 4.3. Steps 4 7 of the latter example are modified for two artifacts as follows: (1 3) Same as the ordinary Browser/Artifact profile. (4) The SSO service redirects the client to the assertion consumer service at the SP. A TARGET parameter and two SAMLart parameters are appended to the redirect URL. (5) The client requests the assertion consumer service at the SP: TARGET= SAMLart=AAEwGDwd3Z7Fr1GPbM82Fk2CZbpNB7YuJ8gk%2BvmCjh9Y4Wsq6H5%2BKU4C& SAMLart=AAEwGDwd3Z7Fr1GPbM82Fk2CZbpNB8tb%2By6YOO40XGfl4QfLKq9xZ8UW where one of the artifacts references an authentication assertion while the other artifact corresponds to an attribute assertion (order does not matter). (6) The assertion consumer service validates the request and dereferences both artifacts by sending a single SAML Request to the artifact resolution service at the IdP: POST /shibboleth/artifact HTTP/1.1 Host: idp.example.org Content-Type: text/xml Content-Length: nnn SOAPAction: <?xml version="1.1" encoding="iso "?> <SOAP-ENV:Envelope xmlns:soap-env=" <SOAP-ENV:Header/> <SOAP-ENV:Body> <samlp:request xmlns:samlp="urn:oasis:names:tc:saml:1.0:protocol" MajorVersion="1" MinorVersion="1" RequestID="f81d4fae-7dec-11d0-a765-00a0c91e6bf6" IssueInstant=" T09:22:04Z"> Page 23 of 31
24 <samlp:assertionartifact> AAEwGDwd3Z7Fr1GPbM82Fk2CZbpNB7YuJ8gk+vmCjh9Y4Wsq6H5+KU4C </samlp:assertionartifact> <samlp:assertionartifact> AAEwGDwd3Z7Fr1GPbM82Fk2CZbpNB8tb+y6YOO40XGfl4QfLKq9xZ8UW </samlp:assertionartifact> </samlp:request> </SOAP-ENV:Body> </SOAP-ENV:Envelope> where the values of the <samlp:assertionartifact> elements are the SAML artifacts at step 5. (7) The artifact resolution service at the IdP returns a <samlp:response> element (containing two assertions) to the assertion consumer service at the SP: HTTP/ OK Content-Type: text/xml Content-Length: nnnn <?xml version="1.1" encoding="iso "?> <SOAP-ENV:Envelope xmlns:soap-env=" <SOAP-ENV:Header/> <SOAP-ENV:Body> <samlp:response xmlns:samlp="urn:oasis:names:tc:saml:1.0:protocol" MajorVersion="1" MinorVersion="1" Recipient=" ResponseID="00099cf1-a355-10f9-9e b13a2b" InResponseTo="f81d4fae-7dec-11d0-a765-00a0c91e6bf6" IssueInstant=" T09:22:05Z"> <samlp:status> <samlp:statuscode Value="samlp:Success"/> </samlp:status> <!-- insert SAML assertions from section 3.3 here --> </samlp:response> </SOAP-ENV:Body> </SOAP-ENV:Envelope> (8 10) Same as the ordinary Browser/Artifact profile. 5.3 Directory Schema Shibboleth, by virtue of SAML, has a well-defined attribute exchange mechanism, but neither specification defines any attributes per se. Instead it is left to individual implementations to define their own attributes. In a cross-domain federated environment, in particular, a standard approach to user attributes is crucial. In the absence of such standards, federation on a large scale will be difficult if not impossible. To address this issue within the higher education community, Internet2 and EDUCAUSE have jointly developed a set of attributes and associated bindings called eduperson [eduperson]. The LDAP binding of eduperson is derived from the standard LDAP object class called inetorgperson [RFC 2798] which itself is based on other standard LDAP classes (see e.g., [RFC 2256]). Of all the attributes defined by this hierarchy of object classes, approximately 40 attributes have been defined by InCommon as common identity attributes [InCommonAttribs]: Page 24 of 31
25 Common Attributes Highly recommended 6 Suggested 10 Optional For example, here are InCommon's six "highly recommended" attributes: Attribute Name Attribute Value givenname Mary sn (surname) Smith cn (common name) Mary Smith edupersonscopedaffiliation [email protected] edupersonprincipalname [email protected] edupersontargetedid The attribute edupersontargetedid does not have a precise value syntax. See the EduPerson Specification [edupersonspec] for more information about edupersontargetedid. Page 25 of 31
26 Metadata Both IdPs and SPs publish information about themselves in special XML files called metadata files. Since metadata precisely identify the provider and the services it offers, metadata files are digitally signed for integrity protection. A SAML metadata specification was first published as part of SAML 2.0 [SAML2Meta]. Since that time, the OASIS Security Services Technical Committee has considered adopting a minimal subset of SAML 2.0 metadata for use with SAML 1.x as specified in [SAMLMeta]. Shibboleth further constrains this profile in [ShibProt]. Only four metadata descriptors are defined for use within Shibboleth: 1. <md:idpssodescriptor> 2. <md:spssodescriptor> 3. <md:authnauthoritydescriptor> 4. <md:attributeauthoritydescriptor> These metadata elements correspond to the SSO service (IdP), the assertion consumer service (SP), the authentication authority (IdP), and the attribute authority (IdP), respectively. We will omit the <md:authnauthoritydescriptor> element in what follows since the authentication authority operates behind the scenes in a typical Shibboleth deployment, in which case it need not publish metadata about itself. Multiple <md:entitydescriptor> elements may be grouped together in a single <md:entitiesdescriptor> element: <md:entitiesdescriptor xmlns:md="urn:oasis:names:tc:saml:2.0:metadata" xmlns:saml="urn:oasis:names:tc:saml:2.0:assertion" xmlns:ds=" xmlns:xsi=" xsi:schemalocation="urn:oasis:names:tc:saml:2.0:metadata..." Name="urn:mace:shibboleth:examples" validuntil=" t00:00:00z"> <!-- insert ds:signature element (section 3.4) --> <!-- insert md:entitydescriptor elements here --> </md:entitiesdescriptor> Note that an <md:entitiesdescriptor> element may be signed (see section 3.4). Alternatively, the individual <md:entitydescriptor> elements may be signed (see the examples in the following subsections). 6.1 Identity Provider Metadata An identity provider publishes data about itself in an <md:entitydescriptor> element: <md:entitydescriptor xmlns:md="urn:oasis:names:tc:saml:2.0:metadata" xmlns:saml="urn:oasis:names:tc:saml:2.0:assertion" xmlns:ds=" entityid=" <!-- insert ds:signature element (section 3.4) --> <!-- insert md:idpssodescriptor element (section 6.1.1) --> <!-- insert md:attributeauthoritydescriptor element (section 6.1.2) --> <md:organization> <md:organizationname xml:lang="en"> Shibboleth Identity Provider Page 26 of 31
27 </md:organizationname> <md:organizationdisplayname xml:lang="en"> Shibboleth Identity Some Location </md:organizationdisplayname> <md:organizationurl xml:lang="en"> </md:organizationurl> </md:organization> <md:contactperson contacttype="technical"> <md:surname>shibboleth IdP Support</md:SurName> <md: address>[email protected]</md: address> </md:contactperson> </md:entitydescriptor> The entityid attribute is the unique providerid of the IdP. Note that the details of the digital signature (in the <ds:signature> element) have been omitted from this example. See section 3.4 for relevant discussion. The IdP manages an SSO service and an attribute authority, each having its own descriptor. These are detailed in the following subsections SSO Service Metadata The SSO service at the IdP is encapsulated in an <md:idpssodescriptor> element: <md:idpssodescriptor protocolsupportenumeration="urn:oasis:names:tc:saml:1.1:protocol urn:mace:shibboleth:1.0"> <md:keydescriptor use="signing"> <ds:keyinfo> <ds:keyname>idp SSO Key</ds:KeyName> </ds:keyinfo> </md:keydescriptor> <md:artifactresolutionservice isdefault="true" index="0" Binding="urn:oasis:names:tc:SAML:1.0:bindings:SOAP-binding" Location=" <md:nameidformat> urn:oasis:names:tc:saml:1.1:nameid-format: address </md:nameidformat> <md:nameidformat> urn:mace:shibboleth:1.0:nameidentifier </md:nameidformat> <md:singlesignonservice Binding="urn:mace:shibboleth:1.0:profiles:AuthnRequest" Location=" </md:idpssodescriptor> The previous metadata element describes the SSO service at the IdP of section 4. Note the following details about this element: Since Shibboleth supports an SSO service (whereas SAML1 does not), protocol support includes the URI urn:mace:shibboleth:1.0 which is a unique identifier specified by [ShibProt]. Key information has been omitted for brevity. The Binding attribute of the <md:artifactresolutionservice> element indicates that the SAML SOAP binding should be used (see [SAMLBind]). Page 27 of 31
28 The Location attribute of the <md:artifactresolutionservice> element is used in step 6 of the Browser/Artifact profile of section 4.3. The index attribute of the <md:artifactresolutionservice> element is ignored. The <md:nameidformat> elements indicate what SAML NameIdentifier formats [SAMLCore] the SSO service supports. One of these is a standard Shibboleth handle indicated by URI urn:mace:shibboleth:1.0:nameidentifier The Binding attribute of the <md:singlesignonservice> element is a unique identifier specified by [ShibProt]. The Location attribute of the <md:singlesignonservice> element is used by SPs and WAYFs to redirect the client to the SSO service at the IdP Attribute Authority Metadata The attribute authority at the IdP is given by an <md:attributeauthoritydescriptor> element: <md:attributeauthoritydescriptor protocolsupportenumeration="urn:oasis:names:tc:saml:1.1:protocol"> <md:keydescriptor use="signing"> <ds:keyinfo> <ds:keyname>idp AA Key</ds:KeyName> </ds:keyinfo> </md:keydescriptor> <md:attributeservice Binding="urn:oasis:names:tc:SAML:1.0:bindings:SOAP-binding" Location=" <saml:attribute Name="urn:mace:dir:attribute-def:eduPersonPrincipalName" NameFormat="urn:mace:shibboleth:1.0:attributeNamespace:uri"/> <saml:attribute Name="urn:mace:dir:attribute-def:eduPersonScopedAffiliation" NameFormat="urn:mace:shibboleth:1.0:attributeNamespace:uri"> <saml:attributevalue>member</saml:attributevalue> <saml:attributevalue>student</saml:attributevalue> <saml:attributevalue>faculty</saml:attributevalue> <saml:attributevalue>employee</saml:attributevalue> <saml:attributevalue>staff</saml:attributevalue> </saml:attribute> <saml:attribute Name="urn:mace:dir:attribute-def:eduPersonEntitlement" NameFormat="urn:mace:shibboleth:1.0:attributeNamespace:uri"/> <md:nameidformat> urn:oasis:names:tc:saml:1.1:nameid-format: address </md:nameidformat> <md:nameidformat> urn:mace:shibboleth:1.0:nameidentifier </md:nameidformat> </md:attributeauthoritydescriptor> This element is not needed for the SSO profiles of section 4, but it is required for the attribute exchanges outlined in sections 5.1 and 5.2. Page 28 of 31
29 Service Provider Metadata A service provider also publishes data about itself in an <md:entitydescriptor> element: <md:entitydescriptor xmlns:md="urn:oasis:names:tc:saml:2.0:metadata" xmlns:saml="urn:oasis:names:tc:saml:2.0:assertion" xmlns:ds=" xmlns:xsd=" xmlns:xsi=" entityid=" <!-- insert ds:signature element (section 3.4) --> <!-- insert md:spssodescriptor element (section 6.2.1) --> <md:organization> <md:organizationname xml:lang="en"> Shibboleth Service Provider </md:organizationname> <md:organizationdisplayname xml:lang="en"> Shibboleth Service Some Location </md:organizationdisplayname> <md:organizationurl xml:lang="en"> </md:organizationurl> </md:organization> <md:contactperson contacttype="technical"> <md:surname>shibboleth SP Support</md:SurName> <md: address>[email protected]</md: address> </md:contactperson> </md:entitydescriptor> The primary component managed by the SP is the assertion consumer service, which is discussed below Assertion Consumer Service Metadata The assertion consumer service is represented by an <md:spssodescriptor> element: <md:spssodescriptor protocolsupportenumeration="urn:oasis:names:tc:saml:1.1:protocol"> <md:keydescriptor use="signing"> <ds:keyinfo> <ds:keyname>sp SSO Key</ds:KeyName> </ds:keyinfo> </md:keydescriptor> <md:nameidformat> urn:oasis:names:tc:saml:1.1:nameid-format: address </md:nameidformat> <md:nameidformat> urn:mace:shibboleth:1.0:nameidentifier </md:nameidformat> <md:assertionconsumerservice isdefault="true" index="0" Binding="urn:oasis:names:tc:SAML:1.0:profiles:browser-post" Location=" <md:assertionconsumerservice index="1" Binding="urn:oasis:names:tc:SAML:1.0:profiles:artifact-01" Location=" <md:attributeconsumingservice isdefault="true" index="0"> <md:servicename xml:lang="en"> Page 29 of 31
30 Service Provider Portal </md:servicename> <md:requestedattribute Name="urn:mace:dir:attribute-def:eduPersonScopedAffiliation" NameFormat="urn:mace:shibboleth:1.0:attributeNamespace:uri"> </md:requestedattribute> <md:requestedattribute Name="urn:mace:dir:attribute-def:eduPersonEntitlement" NameFormat="urn:mace:shibboleth:1.0:attributeNamespace:uri"> <saml:attributevalue xsi:type="xsd:anyuri"> </saml:attributevalue> </md:requestedattribute> </md:attributeconsumingservice> </md:spssodescriptor> Note the following details about the <md:spssodescriptor> metadata element: Key information has been omitted for brevity. The Binding attributes of the <md:assertionconsumerservice> elements are standard URIs specified by [SAMLMeta]. The Location attribute of the first <md:assertionconsumerservice> element (index= 0 ) is used in step 3 of the Browser/POST profile in section 4.2. The Location attribute of the second <md:assertionconsumerservice> element (index= 1 ) is used in step 3 of the Browser/Artifact profile in section 4.3. The <md:attributeconsumingservice> element is used by the IdP to formulate an attribute assertion that is pushed to the SP in step 7 of the Browser/Artifact profile outlined in section 5.2. The index attributes of the <md:assertionconsumerservice> and <md:attributeconsumingservice> elements are ignored. As noted above, the values of the Location attribute are the same as the values of the shire parameter in the corresponding profile. Upon receiving the authentication request, the IdP checks the value of the shire parameter against the locations in SP metadata, which minimizes the possibility of a rogue SP orchestrating a man-in-the-middle attack. Page 30 of 31
31 References 7.1 Normative References [edupersonspec] EduPerson Specification (200312), [RFC 2256] M. Wahl, A Summary of the X.500(96) User Schema for use with LDAPv3, December [RFC 2798] M. Smith, Definition of the inetorgperson LDAP Object Class, April [SAML2Meta] S. Cantor et al., Metadata for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS SSTC, 15 March Document ID saml-metadata-2.0-os [SAMLBind] E. Maler et al., Bindings and Profiles for the OASIS Security Assertion Markup Language (SAML). OASIS, September Document ID oasis-sstc-saml-bindings-profiles [SAMLCore] E. Maler et al., Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML). OASIS, September Document ID oasis-sstc-saml-core [SAMLMeta] G. Whitehead and S. Cantor, SAML 1.x Metadata Profile. OASIS SSTC, February Document ID draft-saml1x-metadata-04 [ShibProt] S. Cantor et al., Shibboleth Architecture: Protocols and Profiles. Internet2-MACE, February Document ID draft-mace-shibboleth-arch-protocols-09 [SOAP] D. Box et al., Simple Object Access Protocol (SOAP) 1.1. W3C Note 08 May Non-Normative References [eduperson] eduperson Object Class. [HTTP] HTTP - Hypertext Transfer Protocol. World Wide Web Consortium (W3C). [InCommonAttribs] InCommon Federation: Common Identity Attributes. [GSIsecurity] K. Bhatia et al., Engineering an End-to-End GSI-based Security Infrastructure. [SAMLTech] J. Hughes et al. Technical Overview of the OASIS Security Assertion Markup Language (SAML) V1.1. OASIS, May Document ID sstc-saml-tech-overview-1.1-cd [XML] XML Core Working Group Public Page. World Wide Web Consortium (W3C). [XMLSchema] XML Schema. World Wide Web Consortium (W3C). [XMLSig] XML Signature WG. World Wide Web Consortium (W3C). Page 31 of 31
Configuring SAML2 for Single Sign-On to Smartsheet (Enterprise Only)
Configuring SAML2 for Single Sign-On to Smartsheet (Enterprise Only) This document is intended for technical professionals who are familiar with SAML and have access to the Identity Provider that will
MONDESIR Eunice WEILL-TESSIER Pierre FEDERATED IDENTITY. ASR 2006/2007 Final Project. Supervisers: Maryline Maknavicius-Laurent, Guy Bernard
MONDESIR Eunice WEILL-TESSIER Pierre FEDERATED IDENTITY ASR 2006/2007 Final Project Supervisers: Maryline Maknavicius-Laurent, Guy Bernard Federated Identity Project topic Superviser: Maryline Maknavicius
SAML Profile for SSO in Danish Public Sector V2.0 Assertion Examples,
> SAML Profile for SSO in Danish Public Sector V2.0 Assertion Examples, Version 1.1 IT- og Telestyrelsen, Center for Serviceorienteret Infrastruktur August 2007 1 Introduction This non-normative document
23.11.2012 Martin Käser. Single Sign-on mit OpenSAML
23.11.2012 Martin Käser Single Sign-on mit OpenSAML SAML Überblick l SAML = Security Assertion Markup Language v1.1 OASIS Standard 2003 v2.0 OASIS Standard 2005 l Rollen: User agent (Principal) Identity
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Summer 15 @salesforcedocs Last updated: July 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
SAML Security Analysis. Huang Zheng Xiong Jiaxi Ren Sijun
SAML Security Analysis Huang Zheng Xiong Jiaxi Ren Sijun outline The intorduction of SAML SAML use case The manner of SAML working Security risks on SAML Security policy on SAML Summary my course report
Web Services Security: SAML Token Profile 1.1
1 2 3 4 5 6 7 8 9 10 11 12 13 Web Services Security: SAML Token Profile 1.1 OASIS Standard, 1 February 2006 Document Identifier: wss-v1.1-spec-os-samltokenprofile OASIS Identifier: {WSS: SOAP Message Security
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
Design and Implementaion of a Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Grid and Web Services Security
Design and Implementaion of a Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Grid and Web Services Security Dongkyoo Shin, Jongil Jeong, and Dongil Shin Department of Computer
Standalone SAML Attribute Authority With Shibboleth
CESNET Technical Report 5/2013 Standalone SAML Attribute Authority With Shibboleth IVAN NOVAKOV Received 10. 12. 2013 Abstract The article defines what a standalone attribute authority is and how it can
Single Sign-On Implementation Guide
Version 27.0: Spring 13 Single Sign-On Implementation Guide Last updated: February 1, 2013 Copyright 2000 2013 salesforce.com, inc. All rights reserved. Salesforce.com is a registered trademark of salesforce.com,
OIOIDWS for Healthcare Token Profile for Authentication Tokens
OIOIDWS for Healthcare Token Profile for Authentication Tokens Common Web Service Profile for Healthcare in the Danish Public Sector, version 2.0 Content Document History...3 Introduction...4 Notation...
Configuring SAML2 for Single Sign-On to Smartsheet (Enterprise Only)
Configuring SAML2 for Single Sign-On to Smartsheet (Enterprise Only) This document is intended for technical professionals who are familiar with SAML and have access to the Identity Provider that will
Kantara egov and SAML2int comparison
Kantara egov and SAML2int comparison 17.8.2010/[email protected] This document compares the egovernment Implementation profile of SAML 2.0, created by the egovernment WG of Kantara Initiative, and the
SAML 2.0 INT SSO Deployment Profile
1 2 3 4 5 6 SAML 2.0 INT 7 8 9 Version: 0.1 Date: 2011-12-2 10 Editor: TBD 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Contributors: The full list of contributors can be referenced here: URL Status: This
IBM WebSphere Application Server
IBM WebSphere Application Server SAML 2.0 web single-sign-on 2012 IBM Corporation This presentation describes support for SAML 2.0 web browser Single Sign On profile included in IBM WebSphere Application
MLSListings Single Sign On Implementation Guide. Compatible with MLSListings Applications
MLSListings Single Sign On Implementation Guide Compatible with MLSListings Applications February 2010 2010 MLSListings Inc. All rights reserved. MLSListings Inc. reserves the right to change details in
Feide Technical Guide. Technical details for integrating a service into Feide
Feide Technical Guide Technical details for integrating a service into Feide May 2015 Document History Version Date Initials Comments 1.0 Nov 2009 TG First issue 1.2 Nov 2009 TG Added SLO description 1.3
National Identity Exchange Federation. Web Browser User-to-System Profile. Version 1.0
National Identity Exchange Federation Web Browser User-to-System Profile Version 1.0 August 18, 2014 Table of Contents TABLE OF CONTENTS 1 1. TARGET AUDIENCE AND PURPOSE 2 2. TERMINOLOGY 2 3. REFERENCES
Web Single Sign-On Authentication using SAML
IJCSI International Journal of Computer Science Issues, Vol. 2, 2009 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 41 Web Single Sign-On Authentication using SAML Kelly D. LEWIS, James E. LEWIS, Ph.D.
2015-11-30. Web Based Single Sign-On and Access Control
0--0 Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking
MACE-Dir SAML Attribute Profiles
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 MACE-Dir SAML Attribute Profiles April 2008 Document identifier: internet2-mace-dir-saml-attributes-200804a Location: http://middleware.internet2.edu/dir Editors:
SAML basics A technical introduction to the Security Assertion Markup Language
SAML basics A technical introduction to the Security Assertion Markup Language WWW2002 Eve Maler, XML Standards Architect XML Technology Center Sun Microsystems, Inc. Agenda The problem space SAML concepts
Single Sign on Using SAML
Single Sign on Using SAML Priyank Rajvanshi, Subhash Chand Gupta Abstract- With the proliferation of SaaS and other web-based applications, identity management is becoming a major concern for businesses.
Web Access Management and Single Sign-On
Web Access Management and Single Sign-On Ronnie Dale Huggins In the old days of computing, a user would sit down at his or her workstation, login to the desktop, login to their email system, perhaps pull
GFIPM Web Browser User-to-System Profile Version 1.2
About the Document Justice organizations are looking for ways to provide secured access to multiple agency information systems with a single logon. The Global Federated Identity and Privilege Management
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
Security Assertion Markup Language (SAML) V2.0 Technical Overview
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 Security Assertion Markup Language (SAML) V2.0 Technical Overview Working Draft 10, 9 October 2006 Document
Bindings for the OASIS Security Assertion Markup Language (SAML) V2.0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 Bindings for the OASIS Security Assertion Markup Language (SAML) V2.0 OASIS Standard,
Security Assertion Markup Language (SAML) 2.0 Technical Overview
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Security Assertion Markup Language (SAML) 2.0 Technical Overview Working Draft 03, 20 February 2005 Document identifier:
Securing Web Services With SAML
Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion
SAML 2.0 protocol deployment profile
SAML 2.0 protocol deployment profile FOR THE FINNISH PUBLIC SECTOR Version Date Changes 1.0 8.12.2010 Implementation by Ubisecure Solutions, Fujitsu Services and CSC IT Center for Science. Approved by
Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0 OASIS Standard,
Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0
1 2 3 4 5 6 7 8 9 10 11 Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0 Version 3.2.2 Editor: Kyle Meadors, Drummond Group Inc. Abstract: This document describes the test steps to
Tusker IT Department Tusker IT Architecture
Tusker IT Department System Overview Documents Tusker IT Department Tusker IT Architecture Single Sign On Overview Page 1 Document Information and Approvals VERSION HISTORY Version # Date Revised By Reason
IAM Application Integration Guide
IAM Application Integration Guide Date 03/02/2015 Version 0.1 DOCUMENT INFORMATIE Document Title IAM Application Integration Guide File Name IAM_Application_Integration_Guide_v0.1_SBO.docx Subject Document
SAML Federated Identity at OASIS
International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for
Setting Up Federated Identity with IBM SmartCloud
White Paper March 2012 Setting Up Federated Identity with IBM SmartCloud 2 Setting Up Federated Identity with IBM SmartCloud Notices Contents International Business Machines Corporation provides this publication
Single Sign-On Implementation Guide
Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,
Shibboleth Authentication. Information Systems & Computing Identity and Access Management May 23, 2014
Shibboleth Authentication Information Systems & Computing Identity and Access Management May 23, 2014 For every question an answer: Why should I care about SAML? What is a Shibboleth? What is a Federation?
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE SAML 2.0 CONFIGURATION GUIDE Roy Heaton David Pham-Van Version 1.1 Published March 23, 2015 This document describes how to configure OVD to use SAML 2.0 for user
SAML V2.0 Asynchronous Single Logout Profile Extension Version 1.0
SAML V2.0 Asynchronous Single Logout Profile Extension Version 1.0 Committee Specification 01 22 November 2012 Specification URIs This version: http://docs.oasis-open.org/security/saml/post2.0/saml-async-slo/v1.0/cs01/saml-async-slo-v1.0-
Revised edition. OIO Web SSO Profile V2.0.9 (also known as OIOSAML 2.0.9) Includes errata and minor clarifications
OIO Web SSO Profile V2.0.9 (also known as OIOSAML 2.0.9) Revised edition Includes errata and minor clarifications Danish Agency for Digitisation September 2012 Contents > 1 Introduction 8 1.1 Referenced
DocuSign Information Guide. Single Sign On Functionality. Overview. Table of Contents
DocuSign Information Guide Single Sign On Functionality Overview The DocuSign Single Sign On functionality allows your system administrators to maintain user information in one location and your users
Federal Identity, Credential, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile
Federal Identity, Credential, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile Version 1.0 September 27, 2010 Document History This is the first
Revised edition. OIO Web SSO Profile V2.0.8 (also known as OIOSAML 2.0.8) Includes errata and minor clarifications
OIO Web SSO Profile V2.0.8 (also known as OIOSAML 2.0.8) Revised edition Includes errata and minor clarifications Danish Agency for Digitisation December 2011 Contents > 1 Introduction 8 1.1 Referenced
Federal Identity, Credentialing, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile
Federal Identity, Credentialing, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile Version 1.0.2 December 16, 2011 Document History Status Release
CAS Protocol 3.0 specification
CAS Protocol 3.0 specification Contents CAS Protocol 3.0 Specification 5 Authors, Version 5 1. Introduction 5 1.1. Conventions & Definitions.................... 5 1.2 Reference Implementation....................
OIO Web SSO Profile V2.0.5
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
000-575. IBM Tivoli Federated Identity Manager V6.2.2 Implementation. Version: Demo. Page <<1/10>>
000-575 IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version: Demo Page 1.What is the default file name of the IBM Tivoli Directory Integrator log? A. tdi.log B. ibmdi.log C. ibmdisrv.log
Разработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet
Разработка программного обеспечения промежуточного слоя TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet Contents - SURFnet Middleware Services department: - eduroam, SURFfederatie,
Lecture Notes for Advanced Web Security 2015
Lecture Notes for Advanced Web Security 2015 Part 6 Web Based Single Sign-On and Access Control Martin Hell 1 Introduction Letting users use information from one website on another website can in many
Get Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : C2150-575 Title : IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version : Demo 1.What is the default file name of the
Extending DigiD to the Private Sector (DigiD-2)
TECHNISCHE UNIVERSITEIT EINDHOVEN Department of Mathematics and Computer Science MASTER S THESIS Extending DigiD to the Private Sector (DigiD-2) By Giorgi Moniava Supervisors: Eric Verheul (RU, PwC) L.A.M.
Federation architectures for mobile applications OAuth 2.0 Drivers OAuth 2.0 Overview Mobile walkthrough
Agenda Federation architectures for mobile applications OAuth 2.0 Drivers OAuth 2.0 Overview Mobile walkthrough Enter OAuth 2.0 Defines authorization & authentication framework for RESTful APIs An open
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Introducing Shibboleth
workshop Introducing Shibboleth MPG-AAI Workshop Clarin Centers Prague 2009 2009-11-06 MPG-AAI MPG-AAI a MPG-wide Authentication & Authorization Infrastructure for access control to web-based resources
SAML Single-Sign-On (SSO)
C O L A B O R A T I V E I N N O V A T I O N M A N A G E M E N T Complete Feature Guide SAML Single-Sign-On (SSO) 1. Features This feature allows administrators to setup Single Sign-on (SSO) integration
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
Microsoft Active Directory Oracle Enterprise Gateway Integration Guide
An Oracle White Paper May 2011 Microsoft Active Directory Oracle Enterprise Gateway Integration Guide 1/33 Disclaimer The following is intended to outline our general product direction. It is intended
SAML and XACML Overview. Prepared by Abbie Barbir, [email protected] Nortel Canada April 25, 2006
SAML and XACML Overview Prepared by Abbie Barbir, [email protected] Nortel Canada April 25, 2006 Acknowledgements Some slides are provided by > Eve Maler, Sun Microsystems > Hal Lockhart, BEA 2 Agenda
SAML Profile for Privacy-enhanced Federated Identity Management
SAML Profile for Privacy-enhanced Federated Identity Management Rainer Hörbe, Identinetics GmbH Abstract This profile for the SAML WebSSO use case specifies an enhancement that allows users to limit their
Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5
Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5 TABLE OF CONTENTS Introduction... 1 Purpose and Target Audience... 1 Commonly Used Terms... 1 Overview of Shibboleth User
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes
IAM, Enterprise Directories and Shibboleth (oh my!)
IAM, Enterprise Directories and Shibboleth (oh my!) Gary Windham Senior Enterprise Systems Architect University Information Technology Services [email protected] What is IAM? Identity and Access
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Specification
[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Specification Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft
SAML 2.0 Interoperability Testing Procedures
1 2 3 4 5 6 7 8 9 10 11 Version 2.0 7 July 2006 Editors: Eric Tiffany, Contributors: Greg Whitehead, Hewlett-Packard Sampo Kellomäki, Symlabs Nick Ragouzis, Enosis Abstract: 12 13 14 15 16 17 18 19 20
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0
International Virtual Observatory Alliance IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 IVOA Proposed Recommendation 20151029 Working group http://www.ivoa.net/twiki/bin/view/ivoa/ivoagridandwebservices
Security Assertion Markup Language (SAML) V2.0 Technical Overview
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 Security Assertion Markup Language (SAML) V2.0 Technical Overview Committee Draft 02 25 March 2008
Getting Started with Single Sign-On
Getting Started with Single Sign-On I. Introduction NobleHour sets out to incentivize civic engagement by enabling users within companies, educational institutions, and organizations to conduct and coordinate
Cyber Authentication Technology Solutions Interface Architecture and Specification Version 2.0: Deployment Profile
Cyber Authentication Technology Solutions Interface Architecture and Specification Version 2.0: Status: Baseline for RFP #3 Final r7.2 Date modified: 25 March, 2011 13:53 File name: CA - V2.0 Final r7.2_en.doc
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN 1 Venkadesh.M M.tech, Dr.A.Chandra Sekar M.E., Ph.d MISTE 2 1 ResearchScholar, Bharath University, Chennai 73, India. [email protected] 2 Professor-CSC
Negotiating Trust in Identity Metasystem
Negotiating Trust in Identity Metasystem Mehmud Abliz Department of Computer Science University of Pittsburgh Pittsburgh, Pennsylvania 15260 [email protected] Abstract Many federated identity management
How To Test For A Signature On A Password On A Webmail Website In Java (For Free)
Master Thesis Automated Penetration Testing for SAML-based SSO Frameworks Author: Benjamin Sanno Supervisor: Prof. Dr. Jörg Schwenk Vladislav Mladenov Christian Mainka A thesis submitted in fulfilment
RSA Solution Brief. Federated Identity Manager RSA. A Technical Overview. RSA Solution Brief
RSA Federated Identity Manager A Technical Overview Federated identity management extends the management of digital identities for authorization and access beyond domain and corporate boundaries to externally
Security Assertion Markup Language (SAML)
CS 595G 02/14/06 Security Assertion Markup Language (SAML) Vika Felmetsger 1 SAML as OASIS Standard OASIS Open Standard SAML V2.0 was approved in March, 2005 Blending of two earlier efforts on portable
Liberty ID-WSF Multi-Device SSO Deployment Guide
: Version: 1.0-02 Liberty ID-WSF Multi-Device SSO Deployment Guide Version: 1.0-02 Editors: Paul Madsen, NTT Contributors: Hiroki Itoh, NTT Kiyohiko Ishikawa, NHK Fujii Arisa, NHK Abstract: This document
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
E-Authentication Federation Adopted Schemes
E-Authentication Federation Adopted Schemes Version 1.0.0 Final May 4, 2007 Document History Status Release Date Comment Audience Template 0.0.0 1/18/06 Outline PMO Draft 0.0.1 1/19/07 Initial draft Internal
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
How Single-Sign-On Improves The Usability Of Protected Services For Geospatial Data
2014 Fifth International Conference on Computing for Geospatial Research and Application How Single-Sign-On Improves The Usability Of Protected Services For Geospatial Data Andreas Matheus University of
Open Source Identity Integration with OpenSSO
Open Source Identity Integration with OpenSSO April 19, 2008 Pat Patterson Federation Architect [email protected] blogs.sun.com/superpat Agenda Web Access Management > The Problem > The Solution >
SAML (Security Assertion Markup Language) Security Model for RESTful Web Services
SAML (Security Assertion Markup Language) Security Model for RESTful Web Services By: Shazia Sadiq 352-FBAS/MSCS/F07 Supervised by: Prof Dr.Muhammad Sher Department of Computer Science and Software Engineering
FEDERATED IDENTITY MANAGEMENT:
FEDERATED IDENTITY MANAGEMENT: An Overview of Concepts and Standards Eve Maler Sun Microsystems, Inc. Last updated 5 January 2006 maler-fed-id 1/5/06 Page 1 Originally presented at XML 2005 in Atlanta,
Simple Cloud Identity Management (SCIM)
Simple Cloud Identity Management (SCIM) Abstract The Simple Cloud Identity Management (SCIM) specification defines a simple, RESTful protocol for identity account management operations. SCIM s model is
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
Best Practices for Libraries and Library Service Providers
Best Practices for Libraries and Library Service Providers These best practices were developed by the InCommon Library Consortium in 2009. The consortium was formed to explore various potential solutions.
SAML and OAUTH comparison
SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, [email protected], twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single
PARTNER INTEGRATION GUIDE. Edition 1.0
PARTNER INTEGRATION GUIDE Edition 1.0 Last Revised December 11, 2014 Overview This document provides standards and guidance for USAA partners when considering integration with USAA. It is an overview of
Integrating CRM On Demand with the E-Business Suite to Supercharge your Sales Team
Integrating CRM On Demand with the E-Business Suite to Supercharge your Sales Team Presented by: Tom Connolly, Jason Lieberman Company: BizTech Session ID: #10351 Overview Introductions Background Web
Identity Assurance Hub Service SAML 2.0 Profile v1.2a
1 2 3 4 Identity Assurance Hub Service SAML 2.0 Profile v1.2a Identity Assurance Programme, 07 August 2015 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Document identifier: IDAP/HubService/Profiles/SAML Editors:
It is I, SAML. Ana Mandić Development Lead @ Five Minutes Ltd
It is I, SAML Ana Mandić Development Lead @ Five Minutes Ltd About Five Minutes We design and develop top notch mobile apps for leading mobile platforms 50 full-time employees Offices in Zagreb, Osijek
CA SiteMinder Federation Security Services r12 SP1 CR3 Security Target
CA SiteMinder Federation Security Services r12 SP1 CR3 Security Target Version 1.0 April 5, 2010 Prepared for: CA 100 Staples Drive Framingham, MA 01702 Prepared by: Booz Allen Hamilton Common Criteria
Practical Security Evaluation of SAML-based Single Sign-On Solutions
Practical Security Evaluation of SAML-based Single Sign-On Solutions Vladislav Mladenov, Andreas Mayer, Marcus Niemietz, Christian Mainka, Florian Feldmann, Julian Krautwald, Jörg Schwenk 1 Single Sign-On
