Access Control in Distributed Systems. Murat Kantarcioglu
|
|
|
- Octavia Harvey
- 10 years ago
- Views:
Transcription
1 UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control in Distributed Systems Murat Kantarcioglu
2 Topics Overview SAML XACML
3 Overview Security for distributed systems has been widely investigated; we can distinguish: Network security Middleware security World wide web security
4 Middleware security Past work: Kerberos CORBA (Common Object Request Broker Architecture) Current work: Federated Digital Identity Management Access Control and Authorization XACML SAML Core Security Standards XML Digital Signature XML Encryption Advanced Security Web services (WS) security
5 Middleware Relevant Standards Bodies W3C XML, SOAP, WSDL, XML Encryption, XML Digital Signature, XKMS OASIS UDDI, SAML, XACML, WS-Security, WS-Policy, WS-Trust, WS-Authorization, WS- SecureConversation, WS-Federation, WS-* WS-* standards developed by MS/IBM and submitted to OASIS for standardization
6 World wide web security The WWW has changed the nature of distributed computing: The separation of program and data is once more abolished. Content providers embed executable content (applets) in documents to create interactive web pages that can process user input Computation is moved to the client. It is thus now the client who needs protection from rogue content providers Mobile code moves from machine to machine, collecting information from different places or looking from spare computer resources. Clients need protection from mobile code; mobile code may need protection from the clients it is running on Users are forced to become system administrators and policy makers
7 World wide web security Relevant work: Security for Java Security for mobile agents Intellectual property protection Watermarking and fingerprinting techniques
8 Background Notions - XML extensible Markup Language W3C Recommendation (third edition) A restricted form of SGML (an ISO standard) Allows delivery of custom data Focuses on what data is, not what data looks like (e.g., HTML) Use a Document Type Definition (DTD) or XML Schema ( to describe new syntax
9 Simple XML Example <?xml version= 1.1?> <note> <date> </date> <to>adam</to> <from>kody</from> <heading>hungry</heading> <body>feed me, dad!</body> </note>
10 Background Notions - XML with DTD <?xml version= 1.1?> <!DOCTYPE note[ <!ELEMENT note (date, to, from, heading, body)> <!ELEMENT date (#PCDATA)> <!ELEMENT to (#PCDATA)> <!ELEMENT from (#PCDATA)> <!ELEMENT heading (#PCDATA)> <!ELEMENT body (#PCDATA)> ]> <note> <date> </date> <to>adam</to> <from>jasmine</from> <heading>bone</heading> <body>kody stole my bone!</body> </note>
11 Schema Example <?xml version="1.0"?> <xs:schema xmlns:xs=" targetnamespace=" xmlns=" elementformdefault="qualified"> <xs:element name="note"> <xs:complextype> <xs:sequence> <xs:element name= date type= xs:date /> <xs:element name="to" type="xs:string"/> <xs:element name="from" type="xs:string"/> <xs:element name="heading" type="xs:string"/> <xs:element name="body" type="xs:string"/> </xs:sequence> </xs:complextype> </xs:element> </xs:schema>
12 Background Notions - DOM Document Object Model Internal representation of an XML document as a tree Allows one to specify an element and all the data inside it as a subtree Also allows one to specify a search pattern over the document (e.g. XPath)
13 Background Notions - SOAP Simple Object Access Protocol SOAP provides the definition of the XML-based information which can be used for exchanging structured and typed information between peers in a decentralized, distributed environment SOAP is a stateless, one-way message paradigm Extensible messaging framework Issues such as security not part of specification, addressed as extensions
14 Background Notions - The Stack SOAP SOAP XML XML HTTP HTTP (Usually but but not not always)
15 Background Notions - SOAP Messages Two main parts to the message Header: Contains message meta-information Body: Contains the main message SOAP Envelope SOAP Header (optional) SOAP Body
16 Background Notions - SOAP Example <env:envelope xmlns:env=" <env:header> <n:alertcontrol xmlns:n=" <n:priority>1</n:priority> <n:expires> t14:00:00-05:00</n:expires> </n:alertcontrol> </env:header> <env:body> <m:alert xmlns:m=" <m:msg>pay the electric bill today!</m:msg> </m:alert> </env:body> </env:envelope>
17 Access Control and Authorization
18 SAML Security Assertion Markup Language The goal of SAML is: to define, enhance, and maintain a standard XML-based framework for creating and exchanging authentication and authorization information. Allows an organization to make assertions about security properties of a subject Authentication Attributes Authorization decisions
19 SAML SAML is different from other security systems due to its approach of expressing assertions about a subject that other applications within a network can trust. The following two concepts are important in SAML Identity Provider (IdP): The system, or administrative domain, that asserts information about a subject. For instance, the Identity Provider asserts that this user has been authenticated and has given associated attributes. For example: This user is John Doe, he has an address of [email protected], and he was authenticated into this system using a password mechanism. In SAML, Identity Providers are also known as SAML authorities and Asserting Parties. - Service Provider (SP): The system, or administrative domain, that relies on information supplied to it by the Identity Provider. It is up to the Service Provider as to whether it trusts the assertions provided to it. SAML defines a number of mechanisms that enable the Service Provider to trust the assertions provided to it. It should be noted that although a Service Provider can trust the provided assertions provided, local access policy defines whether the subject may access local resources. Therefore, although the Service Provider trusts that a given user is John Doe it doesn't mean such user is given carte blanche access to all resources. Service Providers are also known as Relying Parties due to the fact that they rely on information provided by an Identity Provider (Asserting Party).
20 Why is SAML required? Four main drivers: Limitations of browser cookies: most existing single-sign-on (SSO) product use browser cookies to maintain the state so that reauthentication is not needed. However, cookies cannot are not transferred among different DNS; so a different technology is required. SSO interoperability: different SSO solutions are proprietary and not interoperable. Web services: WS security is still being defined. It is likely that access control for WS will use authentication and authorization assertions Federation: the need to simplify identity management across organizational boundaries, allowing users to consolidate many local identities into a single (or at least a reduced set) federated identity
21 Example Scenario of SSO A user has a logon session (that is a security context) on a website (AirlineInc.com) and is accessing resources on that site. At some either explicitly or transparently he is directed over to another web site (in a different DNS domain) CarRentalInc.com The Identity Provider site (AirlineInc.com) asserts to the Service Provider site (CarRentalInc.com) that the user is known to it and provides the user's name and session attributes (e.g. Gold member ). As CarRentalInc.com trusts AirlineInc.com it knows that the user is valid and creates a session for the user based on the user's name and/or the user attributes. This use case illustrates the fact that the user is not required to reauthenticate when directed over to the CarRentalInc.com site
22 SAML assertions The assertion is the main element of SAML. It is a package of information that supplies one or more statements made by a SAML authority. Three different kinds of assertion statement that can be created by a SAML authority: Authentication: The specified subject was authenticated by a particular means at a particular time Attribute: The specified subject is associated with the supplied attributes. Authorization Decision: A request to allow the specified subject to access the specified resource has been granted or denied. The outer structure of an assertion is generic, providing information that is common to all of the statements within it. Within an assertion, a series of inner elements describe the authentication, authorization decision, attribute, or user-defined statements containing the specifics.
23 Sample SAML Assertion <saml:assertion MajorVersion= 2" MinorVersion="0" AssertionID=" " Issuer="Company.com" IssueInstant=" T10:02:00Z"> <saml:conditions NotBefore=" T10:02:00Z" NotAfter=" T10:07:00Z" /> <saml:authnstatement AuthenticationMethod="password" AuthenticationInstant=" T10:02:00Z"> <saml:subject> <saml:nameidentifier SecurityDomain="Comany.com" Name="joeuser" /> </saml:subject> </saml:authenticationstatement> </saml:assertion>
24 Major Components of SAML Assertions Element <Assertion> specifies the basic information that is common to all assertions, including the following elements and attributes: MajorVersion [Required] The major version of SAML used to express this assertion. The identifier for the version of SAML defined in the last specification is 2. MinorVersion [Required] The minor version of SAML used to express this assertion. The identifier for the version of SAML defined in the last specification is 0. ID [Required] The identifier for this assertion. It must be of type xsd:id, and MUST be unique IssueInstant [Required] The time instant of issue of the assertion <Issuer> [Required] The SAML authority that is making the claim(s) in the assertion. The issuer identity SHOULD be unambiguous to the intended relying parties.
25 Major Components of SAML Assertions <ds:signature> [Optional]: an XML signature that authenticate the assertion <Subject> [Optional]: The subject of the statement(s) in the assertion. There is a SAML fragment dealing with the specification of subjects <Conditions> element: conditions that must be taken into account in assessing the validity of and/or using the assertion One or more <Statement> elements: <AuthnStatement> <AuthzDecisionStatement> <AttributeStatement> Note: An assertion with no statements MUST contain a <Subject> element. Such an assertion identifies a principal in a manner which can be referenced or confirmed using SAML methods, but asserts no further information associated with that principal.
26 Schema Fragment for SAML Assertions <element name="assertion" type="saml:assertiontype"/> <complextype name="assertiontype"> <sequence> <element ref="saml:issuer"/> <element ref="ds:signature" minoccurs="0"/> <element ref="saml:subject" minoccurs="0"/> <element ref="saml:conditions" minoccurs="0"/> <element ref="saml:advice" minoccurs="0"/> <choice minoccurs="0" maxoccurs="unbounded"> <element ref="saml:statement"/> <element ref="saml:authnstatement"/> <element ref="saml:authzdecisionstatement"/> <element ref="saml:attributestatement"/> </choice> </sequence> <attribute name="majorversion" type="integer" use="required"/> <attribute name="minorversion" type="integer" use="required"/> <attribute name="id" type="id" use="required"/> <attribute name="issueinstant" type="datetime" use="required"/> </complextype>
27 SAML authentication assertion The <AuthnStatement> element describes a statement by the SAML authority asserting that the statement s subject was authenticated by a particular means at a particular time. It include following elements and attributes: AuthenticationMethod [Required]: A URI reference that specifies the type of authentication that took place. AuthenticationInstant [Required]: Specifies the time at which the authentication took place. <SubjectLocality> [Optional]: Specifies the DNS domain name and IP address for the system entity from which the subject was apparently authenticated. <AuthorityBinding> [Any Number]: Indicates that additional information about the subject of the statement may be available.
28 Authentication Method Identifiers An authentication statement with an AuthenticationMethod attribute describes an authentication act that occurred in the past. The AuthenticationMethod attribute indicates how that authentication was done. Note that the authentication statement does not provide the means to perform that authentication, such as a password, key, or certificate.
29 Authentication Method Identifiers Password: The authentication was performed by means of a password Kerberos: The authentication was performed by means of the Kerberos protocol [RFC 1510], an instantiation of the 1856 Needham-Schroeder symmetric key authentication mechanism [Needham78] Secure Remote Password (SRP): The authentication was performed by means of Secure Remote Password protocol as specified in [RFC 2945] Hardware Token:The authentication was performed using some (unspecified) hardware token SSL/TLS Certificate Based Client Authentication:The authentication was performed using either the SSL or TLS protocol with certificate-based client authentication. TLS is described in [RFC 2246] X.509 Public Key: The authentication was performed by some (unspecified) mechanism on a key authenticated by means of an X.509 PKI [X.500][PKIX]. It may have been one of the mechanisms for which a more specific identifier has been defined below PGP Public Key: The authentication was performed by some (unspecified) mechanism on a key authenticated by means of a PGP web of trust [PGP]. It may have been one of the mechanisms for which a more specific identifier has been defined below SPKI Public Key: The authentication was performed by some (unspecified) mechanism on a key authenticated by means of a SPKI PKI [SPKI]. It may have been one of the mechanisms for which a more specific identifier has been defined below XKMS Public Key: The authentication was performed by some (unspecified) mechanism on a key authenticated by means of a XKMS trust service [XKMS]. It may have been one of the mechanisms for which a more specific identifier has been defined below XML Digital Signature: The authentication was performed by means of an XML digital signature [RFC 3075] Unspecified: The authentication was performed by an unspecified means.
30 SAML attribute assertion The <AttributeStatement> element describes a statement by the SAML authority asserting that the statement s subject is associated with the specified attributes. It is of type AttributeStatementType, which extends SubjectStatementAbstractType with the addition of the following elements <Attribute>: The <Attribute> element specifies an attribute of the subject. <EncryptedAttribute>: this element contains encrypted values; values are encrypted according to the XML Encryption Standard
31 SAML authorization decision assertion The <AuthzDecisionStatement> element describes a statement by the SAML authority asserting that a request for access by the statement s subject to the specified resource has resulted in the specified authorization decision on the basis of some optionally specified evidence. The resource is identified by means of a URI reference. In order for the assertion to be interpreted correctly and securely, the SAML authority and SAML relying party MUST interpret each URI reference in a consistent manner. Failure to achieve a consistent URI reference interpretation can result in different authorization decisions depending on the encoding of the resource URI reference. An assertion containing an <AuthzDecisionStatement> must contain the subject element (in order to bind the authorization to a subject)
32 SAML authorization decision assertion Main sub-elements of <AuthzDecisionStatement> are: Resource [Required]: A URI reference identifying the resource to which access authorization is sought. Decision [Required]: The decision rendered by the SAML authority with respect to the specified resource. The value is one of: Permit, Deny, Indeterminate <Action> [One or more]: The set of actions authorized to be performed on the specified resource. Possible values: Read: The subject may read the resource. Write: The subject may modify the resource. Execute: The subject may execute the resource. Delete: The subject may delete the resource. Control: The subject may specify the access control policy for the resource. Actions can be also negated. <Evidence> [Optional]: A set of assertions that the SAML authority relied on in making the decision.
33 SAML protocols SAML assertions MAY be generated and exchanged using a variety of protocols. The bindings and profiles specification for SAML [SAMLBind] describes specific means of transporting assertions using existing widely deployed protocols. SAML-aware requesters MAY in addition use the SAML request-response protocol defined by the <Request> and <Response> elements. The requester sends a <Request> element to a SAML responder, and the responder generates a <Response> element. An interesting set of protocols is represented by queries. Queries allows a party to require assertions concerning a given entity
34 SAML queries Element <AuthnQuery> The <AuthenticationQuery> element is used to make the query What assertions containing authentication statements are available for this subject? A successful response will be in the form of assertions containing authentication statements. In response to an authentication query, a SAML authority returns assertions with authentication statements
35 SAML queries Element <AttributeQuery> The <AttributeQuery> element is used to make the query Return the requested attributes for this subject. A successful response will be in the form of assertions containing attribute statements.
36 SAML queries Element <AuthzDecisionQuery> The <AuthorizationDecisionQuery> element is used to make the query Should these actions on this resource be allowed for this subject, given this evidence? A successful response will be in the form of assertions containing authorization decision statements.
37 SAML threat model Assumptions: the two or more endpoints of a SAML transaction are uncompromised, but that the attacker has complete control over the communications channel. Additionally, due to the nature of SAML as a multi-party authentication and authorization statement protocol, cases must be considered where one or more of the parties in a legitimate SAML transaction - which operate legitimately within their role for that transaction - attempt to use information gained from a previous transaction maliciously in a subsequent transaction.
38 SAML threat model (Scoping) Assumptions: the local mechanisms that are used to decide whether or not to generate assertions are out of scope. Thus, threats arising from the details of the original login at an authentication authority, for example, are out of scope as well. If an authority issues a false assertion, then the threats arising from the consumption of that assertion by downstream systems are explicitly out of scope. The direct consequence of such a scoping is that the security of a system based on assertions as inputs is only as good as the security of the system used to generate those assertions. When determining what issuers to trust, particularly in cases where the assertions will be used as inputs to authentication or authorization decisions, the risk of security compromises arising from the consumption of false but validly issued assertions is a large one. Trust policies between asserting and relying parties should always be written to include significant consideration of liability and implementations must be provide an audit trail.
39 SAML-Specific Security Considerations SAML Assertions most concerns arise during communications in the request/response protocol, or during the attempt to use SAML by means of one of the bindings. However, an assertion, once issued, is out of the control of the issuer. This fact has a number of ramifications. For example, the issuer has no control over how long the assertion will persist in the systems of the consumer; nor does the issuer have control over the parties with whom the consumer will share the assertion information. These concerns are over and above concerns about a malicious attacker which can see the contents of assertions that pass over the wire unencrypted (or insufficiently encrypted).
40 Security considerations for SAML request-response protocol Denial of Service The SAML protocol is susceptible to a denial of service (DOS) attack. Handling a SAML request is potentially a very expensive operation, including parsing the request message (typically involving construction of a DOM tree), database/assertion store lookup (potentially on an unindexed key), construction of a response message, and potentially one or more digital signature operations. Thus, the effort required by an attacker generating requests is much lower than the effort needed to handle those requests.
41 SAML implementations SQLData Systems, Inc - SQLData SAML Server ( OpenSAML an Open Source SecurityAssertion Markup Language implementation ( Netegrity ( recently announced the availability of a free SAML implementation for Java called JSAML that, according to their press release, will be available in October. (
42 SAML implementations Shibboleth ( single sign-on software with an emphasis on user privacy, built on the SAML 1.1 specification Use Cases: Delegated trust in portal scenarios (e.g. meta-searching)
43 XACML - Topics Goals Approach Examples Summary
44 Goals Define a core XML schema for representing authorization and entitlement policies Target - any object - referenced using XML Fine access control grained control Access control based on subject and object attributes Access control based on the object contents; if the object is not an XML document, the object attributes can be used Consistent with and building upon SAML
45 XACML Key Aspects General-purpose authorization policy model and XML-based specification language XACML is independent of SAML specification Triple-based policy syntax: <Object, Subject, Action> Negative authorization is supported Input/output to the XACML policy processor is clearly defined as XACML context data structure Input data is referred by XACML-specific attribute designator as well as XPath expression Extension points: function, identifier, data type, rule-combining algorithm, policy-combining algorithm, etc. A policy consists of multiple rules A set of policies is combined by a higher level policy (PolicySet element)
46 XACML Protocol Policy Enforcement Point (PEP) XACML Request/ Response Policy Decision Point (PDP) Policy Information Point (PIP) Policy Access Point (PAP)
47 XACML Protocol When a client makes a resource request upon a server, the PEP is charged with AC In order to enforce AC policies, the PEP will formalize the attributes describing the requester at the PIP and delegate the authorization decision to the PDP Applicable policies are located in a policy store, managed by the PAP, and evaluated at the PDP, which then returns the authorization decision Using this information, the PEP can deliver the appropriate response to the client
48 XACML Protocol 1. The Policy Administration Point (PAP) creates security policies and stores these policies in the appropriate repository. 2. The Policy Enforcement Point (PEP) performs access control by making decision requests and enforcing authorization decisions. 3. The Policy Information Point (PIP) serves as the source of attribute values, or the data required for policy evaluation. 4. The Policy Decision Point (PDP) evaluates the applicable policy and renders an authorization decision. Note: The PEP and PDP might both be contained within the same application, or might be distributed across different servers
49 XACML Protocol XACML Request Subject Object Action XACML Response Permit Permit with Obligations Deny NotApplicable (the PDP cannot locate a policy whose target matches the required resource) Indeterminate (an error occurred or some required value was missing)
50 Data Flow Model access requester 2. access request PEP 11. obligations obligations service 3. request 10. response PDP 8. request context 9. response context context handler 7. resource resource 4. attribute 6. attribute query 1. policy PIP 5c. resource attributes 5b. envrionment attributes 5a. subject attributes PAP subjects environment
51 Data Flow Model 1. PAPs write policies and policy sets and make them available to the PDP. These policies or policy sets represent the complete policy for a specified target 2. The access requester sends a request for access to the PEP 3. The PEP sends the request for access to the context handler in its native request format, optionally including attributes of the subjects, resource, action and environment 4. The context handler constructs an XACML request context and send it to the PDP 5. The PDP requests any additional subject, resource, action, and environment attributes from the context handler 6. The context handler requests the attributes from a PIP 7. The PIP obtains the requested attributes 8. The PIP returns the requested attributes to the context handler 9. Optionally, the context handler includes the resource in the context
52 Data Flow Model 10. The context handler sends the requested attributes and (optionally) the resource to the PDP. The PDP evaluates the policy 11. The PDP returns the response context (including the authorization decision) to the context handler 12. The context handler translates the response context to the native response format of the PEP. The context handler returns the response to the PEP 13. The PEP fulfills the obligations 14. (Not shown) If access is permitted, then the PEP permits access to the resource; otherwise, it denies access
53 XACML Schemas Request Schema Request Subject Resource Action Policy Schema PolicySet (Combining Alg) Policy* (Combining Alg) Rule* (Effect) Target Subject* Resource* Action* Environment Effect Condition Obligation* Response Schema Response Decision Obligation*
54 XACML Schemas Request Schema Request Subject Resource Action Policy Schema PolicySet (Combining Alg) Policy* (Combining Alg) Rule* (Effect) Subject* Resource* Action Condition* Obligation* Response Schema Response Decision Obligation*
55 Policies and PolicySet The key top-level element is the <PolicySet> which aggregates other <PolicySet> elements or <Policy> elements The <Policy> element is composed principally of <Target>, <RuleSet> and <Obligation> elements and is evaluated at the PDP to yield and access decision. Since multiple policies may be found applicable to an access decision, (and since a single policy can contain multiple Rules) Combining Algorithms are used to reconcile multiple outcomes into a single decision The <Target> element is used to associate a requested resource with an applicable Policy. It contains conditions that the requesting Subject, Resource, or Action must meet for a Policy Set, Policy, or Rule to be applicable to the resource. The Target includes a build-in scheme for efficient indexing/lookup of Policies. Rules provide the conditions which test the relevant attributes within a Policy. Any number of Rule elements may be used each of which generates a true or false outcome. Combining these outcomes yields a single decision for the Policy, which may be "Permit", "Deny", "Indeterminate", or a "NotApplicable" decision.
56 Policies and Policy Sets Policy Smallest element PDP can evaluate Contains: Description, Defaults, Target, Rules, Obligations, Rule Combining Algorithm Policy Set Allows Policies and Policy Sets to be combined Use not required Contains: Description, Defaults, Target, Policies, Policy Sets, Policy References, Policy Set References, Obligations, Policy Combining Algorithm Combining Algorithms: Deny-overrides, Permit-overrides, Firstapplicable, Only-one-applicable
57 Overview of the Policy Element <Policy> <Target> <Resources> <Subjects> <Actions> <RuleSet rulecombiningalgid = DenyOverrides > <Rule ruleid= R1 > <Rule ruleid= R2 > <Obligations> <RuleSet> </Policy> <Rule RuleId= R1 Effect= Permit > <Target> <Resources> <Subjects> <Actions> <Condition> </Rule> <Rule RuleId= R2 Effect= Deny > <Target> <Resources> <Subjects> <Actions> <Condition> </Rule>
58 Combining Algorithms Policy & Rule Combining algorithms Permit Overrides: If a single rule permits a request, irrespective of the other rules, the result of the PDP is Permit Deny Overrides: If a single rule denies a request, irrespective of the other rules, the result of the PDP is deny. First Applicable: The first applicable rule that satisfies the request is the result of the PDP Only-one-applicable: If there are two rules with different effects for the same request, the result is indeterminate
59 Rules Smallest unit of administration, cannot be evaluated alone Elements Description documentation Target select applicable rules Condition boolean decision function Effect either Permit or Deny Results If condition is true, return Effect value If not, return NotApplicable If error or missing data return Indeterminate Plus status code
60 Target Designed to efficiently find the policies that apply to a request Makes it feasible to have very complex Conditions Attributes of Subjects, Resources and Actions Matches against value, using match function Regular expression RFC822 ( ) name X.500 name User defined Attributes specified by Id or XPath expression Normally use Subject or Resource, not both
61 Rule Element The main components of the <rule> element are: a <target> the <target> element consists of a set of <resource> elements a set of <action> elements an environment the <target> element may be absent from a <rule>. In this case the <target> of the rule is the same as that of the parent <policy> element an <effect> Two values are allowed: Permit and Deny a <condition>
62 Policy Element The main components of a <policy> element are: a <target> element the <target> element consists of a set of <resource> elements a set of <action> elements an environment the <target> element may be declared explicitly or may be calculated; two possible approaches: Make the union of all the target elements in the inner rules Make the intersection of all the target elements in the inner rules a rule-combining algorithm-identifier a set of <rule> elements obligations
63 PolicySet Element The main components of a <policyset> element are: a <target> a policy-combining algorithm-identifier a set of <policy> elements obligations
64 A Policy Example The Policy applies to requests for the server called SampleServer The Policy has a Rule with a Target that requires an action of "login" and a Condition that applies only if the Subject is trying to log in between 9am and 5pm. Note that this example can be extended to include other Rules for different actions. If the first Rule does not apply, then a default Rule is used that always returns Deny (Rules are evaluated in order).
65 A Policy Example <Policy PolicyId="SamplePolicy" RuleCombiningAlgId="urn:oasis:names:tc:xacml:1.0:rule-combiningalgorithm:permit-overrides"> <!-- This Policy only applies to requests on the SampleServer --> <Target> <Subjects> <AnySubject/> </Subjects> <Resources> <ResourceMatch MatchId="urn:oasis:names:tc:xacml:1.0:function:stringequal"> <AttributeValue DataType=" </AttributeValue> <ResourceAttributeDesignator DataType=" AttributeId="urn:oasis:names:tc:xacml:1.0:resource:resource-id"/> </ResourceMatch> </Resources> <Actions> <AnyAction/> </Actions> </Target>
66 A Policy Example <!-- Rule to see if we should allow the Subject to login --> <Rule RuleId="LoginRule" Effect="Permit"> <!-- Only use this Rule if the action is login --> <Target> <Subjects> <AnySubject/> </Subjects> <Resources> <AnyResource/> </Resources> <Actions> <ActionMatch MatchId="urn:oasis:names:tc:xacml:1.0:function:stringequal"> <AttributeValue DataType=" alue> <ActionAttributeDesignator DataType= AttributeId="ServerAction"/> </ActionMatch> </Actions> </Target>
67 A Policy Example <!-- Only allow logins from 9am to 5pm --> <Condition FunctionId="urn:oasis:names:tc:xacml:1.0:function:and"> <Apply FunctionId="urn:oasis:names:tc:xacml:1.0:function:time-greater-than-orequal" <Apply FunctionId="urn:oasis:names:tc:xacml:1.0:function:time-one-and-only"> <EnvironmentAttributeSelector DataType=" AttributeId="urn:oasis:names:tc:xacml:1.0:environment:current-time"/> </Apply> <AttributeValue DataType=" e> </Apply> <Apply FunctionId="urn:oasis:names:tc:xacml:1.0:function:time-less-than-or-equal" <Apply FunctionId="urn:oasis:names:tc:xacml:1.0:function:time-one-and-only"> <EnvironmentAttributeSelector DataType=" AttributeId="urn:oasis:names:tc:xacml:1.0:environment:current-time"/> </Apply> <AttributeValue DataType=" e> </Apply> </Condition> </Rule> </Policy>
68 Condition Boolean function to decide if Effect applies Inputs come from Request Context Values can be primitive, complex or bags Can be specified by id or XPath expression Fourteen primitive types Rich array of typed functions defined Functions for dealing with bags Order of evaluation unspecified Allowed to quit when result is known Side effects not permitted
69 Functions Equality predicates Arithmetic functions String conversion functions Numeric type conversion functions Logical functions Arithmetic comparison functions Date and time arithmetic functions Non-numeric comparison functions Bag functions Set functions Higher-order bag functions Special match functions XPath-based functions Extension functions and primitive types
70 Request and Response Context Request Context Attributes of: Subjects requester, intermediary, recipient, etc. Resource name, can be hierarchical Resource Content specific to resource type, e.g. XML document Action e.g. Read Environment other, e.g. time of request Response Context Resource ID Decision Status (error values) Obligations
71 XACML History First Meeting 21 May 2001 Requirements from: Healthcare, DRM, Registry, Financial, Online Web, XML Docs, Fed Gov, Workflow, Java, Policy Analysis, WebDAV XACML OASIS Standard 6 February 2003 XACML 1.1 Committee Specification 7 August 2003 XACML 2.0 In progress complete summer 2004
SAML and XACML Overview. Prepared by Abbie Barbir, [email protected] Nortel Canada April 25, 2006
SAML and XACML Overview Prepared by Abbie Barbir, [email protected] Nortel Canada April 25, 2006 Acknowledgements Some slides are provided by > Eve Maler, Sun Microsystems > Hal Lockhart, BEA 2 Agenda
This Working Paper provides an introduction to the web services security standards.
International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand
Using XACML and SAML for Authorisation messaging and assertions: XACML and SAML standards overview and usage examples
Using XACML and SAML for Authorisation messaging and assertions: XACML and SAML standards overview and usage examples Draft version 0.2. - March 28, 2005 Yuri Demchenko Abstracts
SAML basics A technical introduction to the Security Assertion Markup Language
SAML basics A technical introduction to the Security Assertion Markup Language WWW2002 Eve Maler, XML Standards Architect XML Technology Center Sun Microsystems, Inc. Agenda The problem space SAML concepts
Design and Implementaion of a Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Grid and Web Services Security
Design and Implementaion of a Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Grid and Web Services Security Dongkyoo Shin, Jongil Jeong, and Dongil Shin Department of Computer
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
Security Assertion Markup Language (SAML) 2.0 Technical Overview
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Security Assertion Markup Language (SAML) 2.0 Technical Overview Working Draft 03, 20 February 2005 Document identifier:
Single Sign-On Implementation Guide
Single Sign-On Implementation Guide Salesforce, Summer 15 @salesforcedocs Last updated: July 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of
Single Sign-On Implementation Guide
Version 27.0: Spring 13 Single Sign-On Implementation Guide Last updated: February 1, 2013 Copyright 2000 2013 salesforce.com, inc. All rights reserved. Salesforce.com is a registered trademark of salesforce.com,
SAML Security Analysis. Huang Zheng Xiong Jiaxi Ren Sijun
SAML Security Analysis Huang Zheng Xiong Jiaxi Ren Sijun outline The intorduction of SAML SAML use case The manner of SAML working Security risks on SAML Security policy on SAML Summary my course report
Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V1.1
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V1.1 OASIS Standard,
Security Assertion Markup Language (SAML)
CS 595G 02/14/06 Security Assertion Markup Language (SAML) Vika Felmetsger 1 SAML as OASIS Standard OASIS Open Standard SAML V2.0 was approved in March, 2005 Blending of two earlier efforts on portable
MONDESIR Eunice WEILL-TESSIER Pierre FEDERATED IDENTITY. ASR 2006/2007 Final Project. Supervisers: Maryline Maknavicius-Laurent, Guy Bernard
MONDESIR Eunice WEILL-TESSIER Pierre FEDERATED IDENTITY ASR 2006/2007 Final Project Supervisers: Maryline Maknavicius-Laurent, Guy Bernard Federated Identity Project topic Superviser: Maryline Maknavicius
IBM WebSphere Application Server
IBM WebSphere Application Server SAML 2.0 web single-sign-on 2012 IBM Corporation This presentation describes support for SAML 2.0 web browser Single Sign On profile included in IBM WebSphere Application
Federated Identity Management Solutions
Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single
Setting Up Federated Identity with IBM SmartCloud
White Paper March 2012 Setting Up Federated Identity with IBM SmartCloud 2 Setting Up Federated Identity with IBM SmartCloud Notices Contents International Business Machines Corporation provides this publication
Single Sign-On Implementation Guide
Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,
Biometric Single Sign-on using SAML Architecture & Design Strategies
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems [email protected] 1 Setting Expectations What you can take away! Understand
Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy [email protected] CTO, Forum Systems
Core Feature Comparison between XML / SOA Gateways and Web Application Firewalls Jason Macy [email protected] CTO, Forum Systems XML Gateway vs Competitive XML Gateways or Complementary? and s are Complementary
A Model for Access Control Management in Distributed Networks
A Model for Access Control Management in Distributed Networks Master of Science Thesis Azadeh Bararsani Supervisor/Examiner: Dr. Johan Montelius Royal Institute of Technology (KTH), Stockholm, Sweden,
WEB SERVICES SECURITY
WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
NIST s Guide to Secure Web Services
NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:
Extending DigiD to the Private Sector (DigiD-2)
TECHNISCHE UNIVERSITEIT EINDHOVEN Department of Mathematics and Computer Science MASTER S THESIS Extending DigiD to the Private Sector (DigiD-2) By Giorgi Moniava Supervisors: Eric Verheul (RU, PwC) L.A.M.
OIO Web SSO Profile V2.0.5
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Authentication and Authorization Systems in Cloud Environments
Authentication and Authorization Systems in Cloud Environments DAVIT HAKOBYAN Master of Science Thesis Stockholm, Sweden 2012 TRITA-ICT-EX-2012:203 Abstract The emergence of cloud computing paradigm offers
Network Security. Chapter 10. Application Layer Security: Web Services. Part I: Introduction to Web Services
Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universität München, Germany Part I: Introduction to Web Services Network Security Chapter 10 Application Layer Security:
SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness
Interoperability Summit 2002 SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness Gavenraj Sodhi Senior Technology Analyst Provisioning
Digital Signature Web Service Interface
1 2 Digital Signature Web Service Interface 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 1 Introduction This document describes an RPC interface for a centralized
OIO SAML Profile for Identity Tokens
> OIO SAML Profile for Identity Tokens Version 1.0 IT- & Telestyrelsen October 2009 Content > Document History 3 Introduction 4 Related profiles 4 Profile Requirements 6 Requirements 6
Improving performance for security enabled web services. - Dr. Colm Ó héigeartaigh
Improving performance for security enabled web services - Dr. Colm Ó héigeartaigh Agenda Introduction to Apache CXF WS-Security in CXF 3.0.0 Securing Attachments in CXF 3.0.0 RS-Security in CXF 3.0.0 Some
SAML Federated Identity at OASIS
International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for
IAM Application Integration Guide
IAM Application Integration Guide Date 03/02/2015 Version 0.1 DOCUMENT INFORMATIE Document Title IAM Application Integration Guide File Name IAM_Application_Integration_Guide_v0.1_SBO.docx Subject Document
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Copyright 2012, Oracle and/or its affiliates. All rights reserved.
1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
Open Source Identity Integration with OpenSSO
Open Source Identity Integration with OpenSSO April 19, 2008 Pat Patterson Federation Architect [email protected] blogs.sun.com/superpat Agenda Web Access Management > The Problem > The Solution >
National Identity Exchange Federation. Web Browser User-to-System Profile. Version 1.0
National Identity Exchange Federation Web Browser User-to-System Profile Version 1.0 August 18, 2014 Table of Contents TABLE OF CONTENTS 1 1. TARGET AUDIENCE AND PURPOSE 2 2. TERMINOLOGY 2 3. REFERENCES
Distributed Identity Management Model for Digital Ecosystems
International Conference on Emerging Security Information, Systems and Technologies Distributed Identity Management Model for Digital Ecosystems Hristo Koshutanski Computer Science Department University
Revised edition. OIO Web SSO Profile V2.0.9 (also known as OIOSAML 2.0.9) Includes errata and minor clarifications
OIO Web SSO Profile V2.0.9 (also known as OIOSAML 2.0.9) Revised edition Includes errata and minor clarifications Danish Agency for Digitisation September 2012 Contents > 1 Introduction 8 1.1 Referenced
2015-11-30. Web Based Single Sign-On and Access Control
0--0 Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)
Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)
Web Services Trust and XML Security Standards
Web Services Trust and XML Security Standards Date: April 9, 2001 Version: 1.0 Copyright 2001-2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States
Web Services Security: What s Required To Secure A Service-Oriented Architecture. An Oracle White Paper January 2008
Web Services Security: What s Required To Secure A Service-Oriented Architecture An Oracle White Paper January 2008 Web Services Security: What s Required To Secure A Service-Oriented Architecture. INTRODUCTION
Modernize your NonStop COBOL Applications with XML Thunder September 29, 2009 Mike Bonham, TIC Software John Russell, Canam Software
Modernize your NonStop COBOL Applications with XML Thunder September 29, 2009 Mike Bonham, TIC Software John Russell, Canam Software Agenda XML Overview XML Thunder overview Case Studies Q & A XML Standard
Biometric Single Sign-on using SAML
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP [email protected] 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On
XACML. extensible Access Control Markup Language
XACML extensible Access Control Markup Language Author Coordinator Doutor Diogo Gomes Collaborator Engenheiro Ricardo Azevedo Universidade de Aveiro Instituto de Telecomunicações Portugal Telecom Inovação
XIII. Service Oriented Computing. Laurea Triennale in Informatica Corso di Ingegneria del Software I A.A. 2006/2007 Andrea Polini
XIII. Service Oriented Computing Laurea Triennale in Informatica Corso di Outline Enterprise Application Integration (EAI) and B2B applications Service Oriented Architecture Web Services WS technologies
Lecture Notes for Advanced Web Security 2015
Lecture Notes for Advanced Web Security 2015 Part 6 Web Based Single Sign-On and Access Control Martin Hell 1 Introduction Letting users use information from one website on another website can in many
Revised edition. OIO Web SSO Profile V2.0.8 (also known as OIOSAML 2.0.8) Includes errata and minor clarifications
OIO Web SSO Profile V2.0.8 (also known as OIOSAML 2.0.8) Revised edition Includes errata and minor clarifications Danish Agency for Digitisation December 2011 Contents > 1 Introduction 8 1.1 Referenced
Identity Assurance Hub Service SAML 2.0 Profile v1.2a
1 2 3 4 Identity Assurance Hub Service SAML 2.0 Profile v1.2a Identity Assurance Programme, 07 August 2015 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Document identifier: IDAP/HubService/Profiles/SAML Editors:
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN
STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN 1 Venkadesh.M M.tech, Dr.A.Chandra Sekar M.E., Ph.d MISTE 2 1 ResearchScholar, Bharath University, Chennai 73, India. [email protected] 2 Professor-CSC
Securely Managing and Exposing Web Services & Applications
Securely Managing and Exposing Web Services & Applications Philip M Walston VP Product Management Layer 7 Technologies Layer 7 SecureSpan Products Suite of security and networking products to address the
Federated Identity in the Enterprise
www.css-security.com 425.216.0720 WHITE PAPER The proliferation of user accounts can lead to a lowering of the enterprise security posture as users record their account information in order to remember
Introduction to SAML. Jason Rouault Section Architect Internet Security Solutions Lab Hewlett-Packard. An XML based Security Assertion Markup Language
Introduction to SAML An XML based Security Assertion Markup Language Jason Rouault Section Architect Internet Security Solutions Lab Hewlett-Packard 1/18/2002 Introduction to SAML Page 1 Credits and Acknowledgements
Appendix 1 Technical Requirements
1 av 13 Appendix 1 Technical Requirements Version 2.4.7 Technical requirements for membership in the Skolfederation The Skolfederation has, like many other federation initiatives, the goal to use the following
Security Assertion Markup Language (SAML) V2.0 Technical Overview
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 Security Assertion Markup Language (SAML) V2.0 Technical Overview Working Draft 10, 9 October 2006 Document
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
igovt logon service Context Mapping Service (icms) Messaging Specification Release 9.6
igovt logon service Context Mapping Service (icms) Messaging Specification Release 9.6 Subject Client Author Context Mapping Service Messaging Specification for the igovt logon service The Department of
Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
Introducing Shibboleth
workshop Introducing Shibboleth MPG-AAI Workshop Clarin Centers Prague 2009 2009-11-06 MPG-AAI MPG-AAI a MPG-wide Authentication & Authorization Infrastructure for access control to web-based resources
On XACML, role-based access control, and health grids
On XACML, role-based access control, and health grids 01 On XACML, role-based access control, and health grids D. Power, M. Slaymaker, E. Politou and A. Simpson On XACML, role-based access control, and
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver SAP Product Management, SAP NetWeaver Identity Management
Run-time Service Oriented Architecture (SOA) V 0.1
Run-time Service Oriented Architecture (SOA) V 0.1 July 2005 Table of Contents 1.0 INTRODUCTION... 1 2.0 PRINCIPLES... 1 3.0 FERA REFERENCE ARCHITECTURE... 2 4.0 SOA RUN-TIME ARCHITECTURE...4 4.1 FEDERATES...
CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282
Web Service Security Anthony Papageorgiou IBM Development March 13, 2012 Session: 10282 Agenda Web Service Support Overview Security Basics and Terminology Pipeline Security Overview Identity Encryption
How To Test For A Signature On A Password On A Webmail Website In Java (For Free)
Master Thesis Automated Penetration Testing for SAML-based SSO Frameworks Author: Benjamin Sanno Supervisor: Prof. Dr. Jörg Schwenk Vladislav Mladenov Christian Mainka A thesis submitted in fulfilment
Secure Identity in Cloud Computing
Secure Identity in Cloud Computing Michelle Carter The Aerospace Corporation March 20, 2013 The Aerospace Corporation 2013 All trademarks, service marks, and trade names are the property of their respective
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
Web Single Sign-On Authentication using SAML
IJCSI International Journal of Computer Science Issues, Vol. 2, 2009 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 41 Web Single Sign-On Authentication using SAML Kelly D. LEWIS, James E. LEWIS, Ph.D.
FEDERATED IDENTITY MANAGEMENT:
FEDERATED IDENTITY MANAGEMENT: An Overview of Concepts and Standards Eve Maler Sun Microsystems, Inc. Last updated 5 January 2006 maler-fed-id 1/5/06 Page 1 Originally presented at XML 2005 in Atlanta,
Web Services and Service Oriented Architectures. Thomas Soddemann, RZG
Web Services and Service Oriented Architectures, RZG Delaman Workshop 2004 Overview The Garching Supercomputing Center - RZG Diving into the world of Web Services Service Oriented Architectures And beyond
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Deploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
WebLogic Server 7.0 Single Sign-On: An Overview
WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]
Web Access Management and Single Sign-On
Web Access Management and Single Sign-On Ronnie Dale Huggins In the old days of computing, a user would sit down at his or her workstation, login to the desktop, login to their email system, perhaps pull
Single Sign on Using SAML
Single Sign on Using SAML Priyank Rajvanshi, Subhash Chand Gupta Abstract- With the proliferation of SaaS and other web-based applications, identity management is becoming a major concern for businesses.
Chapter 12 GRID SECURITY ARCHITECTURE: Requirements,fundamentals, standards, and models
Author manuscript, published in Security in Distributed, Grid, Mobile, and Pervasive Computing, Auerbach Publications, pp. 255-288, April, 2007 https://www.nics.uma.es Security in Distributed, Grid, and
Secure Credential Federation for Hybrid Cloud Environment with SAML Enabled Multifactor Authentication using Biometrics
Secure Credential Federation for Hybrid Cloud Environment with SAML Enabled Multifactor Authentication using Biometrics B.Prasanalakshmi Assistant Professor Department of CSE Thirumalai Engineering College
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE
INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE Legal Marks No portion of this document may be reproduced or copied in any form, or by
Authorization-Authentication Using
School of Computing Science, University of Newcastle upon Tyne Authorization-Authentication Using XACML and SAML Jake Wu and Panos Periorellis Technical Report Series CS-TR-907 May 2005 Copyright c 2004
Service Virtualization: Managing Change in a Service-Oriented Architecture
Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual
Implementing Single Sign On in Java Technologybased
Implementing Single Sign On in Java Technologybased Web Services Rima Patel Sriganesh Technology Evangelist Sun Microsystems, Inc. Why Am I Here? Well Because I Hate to sign-on tens of times for using
MLSListings Single Sign On Implementation Guide. Compatible with MLSListings Applications
MLSListings Single Sign On Implementation Guide Compatible with MLSListings Applications February 2010 2010 MLSListings Inc. All rights reserved. MLSListings Inc. reserves the right to change details in
