Addressing threats to real-world identity management systems
|
|
|
- Ralf Blankenship
- 10 years ago
- Views:
Transcription
1 Addressing threats to real-world identity management systems Wanpeng Li and Chris J Mitchell Information Security Group Royal Holloway, University of London
2 Agenda Single sign-on and identity management OAuth 2.0 OpenID Connect Uni-IdM: a new approach Concluding remarks 2
3 Single sign on (SSO) An Internet single sign on (SSO) system allows a user to log in to multiple web sites with just one authentication. Increasingly widely used, e.g. in form of Facebook Connect (OAuth 2.0); Google SSO service (formerly built using OpenID and now employing OpenID Connect). 3
4 Identity management An SSO system is just a special case of an identity management system. In general, in an Internet-based identity management system, one or more third parties manage aspects of a user s identity on behalf of a user, e.g. they store user attributes; authenticate users on behalf of other parties. 4
5 Identity management terminology Identity Provider (IdP) authenticates user and vouches for User identity to Relying Parties (RPs), which rely on IdP and provide online services to Users, who employ User Agents (UAs) (typically web browsers), to interact with RPs. 5
6 Agenda Single sign-on and identity management OAuth 2.0 OpenID Connect Uni-IdM: a new approach Concluding remarks 6
7 OAuth 2.0 OAuth 2.0, published in 2012 (RFC 6819), is being widely used as the basis of Englishlanguage SSO services, e.g. for Facebook Connect. It is also being very widely used for SSO by a range of popular IdPs operating in other languages, notably in China. Serious practical issues with use of OAuth 2.0 by Facebook and others have been identified. 7
8 OAuth design goals Original goal of OAuth (1.0 & 2.0) not SSO. OAuth allows a Client application to access information (belonging to a Resource Owner) held by a Resource Server, without knowing the Resource Owner s credentials. Also requires an Authorization Server, which, after authenticating the Resource Owner, issues an access token to the Client, which sends it to the Resource Server to get access. 8
9 Use for SSO When used to support SSO: IdP = Resource Server (stores user attributes) + Authorization Server (authenticates user); RP = Client; User = Resource Owner (owns user attributes); UA = web browser. Access token used to provide SSO service (not really what it was intended for). OAuth supports four separate protocols (flows) which allow a Client to get an access token. 9
10 Wide use In the relatively short time since OAuth 2.0 specifications published, it has become widely used as basis for SSO (e.g. by Facebook). Particularly big uptake in China: some Chinese language RPs support as many as eight (OAuth-based) IdPs; at least ten major websites offer OAuth 2.0-based IdP services. 10
11 Known issues OAuth 2.0 has been critically examined by a number of authors. Frostig & Slack (2011) found a Cross-Site Request Forgery (XSRF) attack in the Implicit Grant flow of OAuth 2.0. Wang, Chen & Wang (2012) found a logic flaw in a range of SSO implementations. Sun & Beznosov (2012) found flaws in OAuth 2.0 implementations. Li & Mitchell (2014) found range of flaws in federation process for widely used Chinese language implementations. 11
12 Agenda Single sign-on and identity management OAuth 2.0 OpenID Connect Uni-IdM: a new approach Concluding remarks 12
13 Building on OAuth 2.0 OpenID Connect 1.0 is built as an identity layer on top of OAuth 2.0. Adds extra functionality aimed specifically at SSO, and hence should help to address OAuth probems. Adds a new type of token to OAuth 2.0, namely the id token [a JSON web token]. The id token contains claims about authentication of end user generated by entity known as OpenID Provider (OP) [=IdP]. It is digitally signed by the OP. 13
14 Four ways to retrieve an id token OAuth (and hence OpenID Connect) supports four ways for a Client (the RP) to retrieve a token from the Authorization Server (IdP): hybrid flow [token sent via the UA, using an RPprovided JavaScript client running on UA]; client-side flow [very similar to hybrid flow]; authorization code flow [token sent directly from authorization server (IdP) to client (RP)]; pure server-side flow [not supported by Google]. 14
15 A large study We looked at the GTMetrix top 1000 websites providing an English language service. Of these, 103 support Google s SSO service based on OpenID Connect. We examined all 103 in detail. As in OAuth study, we use Fiddler to capture browser-relayed messages, and developed a Python program to analyse these messages. No third party accounts were hacked. 15
16 Retrieving the id token As mentioned, OpenID Connect supports four ways for a Client (the RP) to retrieve a token from the Authorization Server (IdP). Of the 103 websites we examined: 69 use the authorization code flow; 33 use the hybrid flow; just one uses the client-side flow. 16
17 Hybrid server-side flow Identified a wide range of serious vulnerabilities in many of the 33 RP sites implementing this approach. Issues identified include: using Google ID for authentication (3 out of 33); using an unverified access token instead of the id token (13 out of 33); sending an access token across a cleartext link (4 out of 33); session-swapping vulnerability (24 of 33). 17
18 Authorization Code flow The authorization code flow (used by 69 of 103 RPs) is inherently more secure than the hybrid flow. The tokens never pass through the UA, and hence are not at risk from malware running on the user machine. However, we still identified a range of security issues. 18
19 Authorization code flow issues Issues identified include: sending an access token over an non-ssl protected link (4 out of 69); stealing an access token using a common XSS vulnerability (possible for all 69); sending user information unprotected across a link (11 out of 69); session-swapping vulnerability (24 of 69); CSRF-based forced login (24 of 69). 19
20 Agenda Single sign-on and identity management OAuth 2.0 OpenID Connect Uni-IdM: a new approach Concluding remarks 20
21 The phishing threat Many identity management systems are susceptible to phishing attacks, in which a malicious (or fake) RP redirects a user browser to a fake IdP. The user then reveals to the fake IdP secrets that are shared with a genuine IdP. This arises because, in the absence of a systemaware client agent, schemes rely on browser redirects. 21
22 Lack of consistency One huge problem faced by any user is that the user experience of every identity management system is different. We all know that users fail to make good security decisions, even when confronted with relatively simple decisions. The lack of consistency is likely to make the situation much worse, with users simply not understanding the complex privacy- and security-relevant decisions they are being asked to make. 22
23 Privacy When using third party IdPs which provide assertions about user attributes, there is a danger that a user will damage their privacy by revealing attributes unintentionally to an SP. This is a threat when using systems like OAuth (e.g. as instantiated by Facebook Connect). In general, getting privacy settings right is highly nontrivial. 23
24 Another new infrastructure? It is tempting to try to devise another new scheme which has the practical advantages of OAuth and OpenID Connect, but yet provides robust protection against phishing and privacy loss. However, it seems that a new solution is: unlikely to succeed when others (some with a great deal of inertia and incorporating very nice features) have failed; likely to create yet another different user experience, increasing the likelihood of serious mistakes. Thus maybe this is not the right approach. 24
25 A new approach? We now introduce a new approach to the problem. It does not involve proposing any new protocols or infrastructures. The goal is to try to make it easier to use existing systems, and also to make their use more secure (less prone to phishing) and privacy-enhancing (consistent interface and explicit consent). 25
26 Client-based solution The scheme we propose involves a client-based user agent. This is a single tool which supports a wide range of ID management systems yet provides a single interface to the user. The consistent user interface should maximise user understanding of what is happening (and reduce risk of errors). It also avoids the need for passive browser redirects, hence mitigating phishing attacks. 26
27 Motivation for scheme One motivation for the scheme comes from considering CardSpace (and its open source twin, Higgins). CardSpace acts as client-based agent, and provides a consistent card-based user interface. That is, sets of user credentials (relationships with IdPs) are represented to users as cards. CardSpace also defines a set of protocols for interactions between IdPs, Clients (user machines) and SPs. 27
28 Uni-IdM and OpenID Connect In OpenID Connect, the browser is redirected by a RP to an IdP (and vice versa). OpenID Connect works with unmodified browsers. A major disadvantage is that a malicious RP can redirect the browser to a fake IdP (e.g. to fraudulently obtain user credentials). 28
29 Role of Uni-IdM The Uni-IdM browser plugin essentially converts a redirect system into an active-client system. Redirects are no longer under the control of the RP (and IdP). The Uni-IdM client also manages authentication of the user to the IdP. The operation of Uni-IdM is completely transparent to the IdP and RP. 29
30 General features Regardless of the ID system protocols supported by the RP and IdP, Uni-IdM is transparent to both parties. That is, no parties (except the user who installs and uses the software) need to be aware of its presence. As long as the RP and IdP share at least one identity system, then Uni-IdM operation is possible. 30
31 Agenda Single sign-on and identity management OAuth 2.0 OpenID Connect Uni-IdM: a new approach Concluding remarks 31
32 Uni-IdM works! A preliminary prototype of Uni-IdM has recently been built by my co-author (Wanpeng Li), and is still under development. 32
33 Related work Copies of published papers on Uni-IdM and analyses of the practical security of real-world identity management schemes can be found on Chris Mitchell s home page: 33
34 Questions? For further information please contact: Wanpeng Li Chris Mitchell and Address: Information Security Group Royal Holloway University of London Egham TW20 0EX UK 34
Information Security Group Active-client based identity management
Active-client based identity management Chris Mitchell Royal Holloway, University of London www.chrismitchell.net 1 Acknowledgements This is joint work with Haitham Al-Sinani, also of Royal Holloway. 2
Lecture Notes for Advanced Web Security 2015
Lecture Notes for Advanced Web Security 2015 Part 6 Web Based Single Sign-On and Access Control Martin Hell 1 Introduction Letting users use information from one website on another website can in many
Security issues in OAuth 2.0 SSO implementations
Security issues in OAuth 2.0 SSO implementations Wanpeng Li and Chris J Mitchell Information Security Group, Royal Holloway, University of London [email protected], [email protected]
Research on the Security of OAuth-Based Single Sign-On Service
Research on the Security of OAuth-Based Single Sign-On Service R. Zhu 1,2, J. Xiang 1,2, and D. Zha 3 1 Data Assurance and Communication Security Research Center, CAS, Beijing, China 2 State Key Laboratory
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
How To Manage Your Web 2.0 Account On A Single Sign On On A Pc Or Mac Or Ipad (For A Free) On A Password Protected Computer (For Free) (For An Ipad) (Free) (Unhack)
Single Sign-On for the Internet: A Security Story [email protected] [email protected] BlackHat USA, Las Vegas 2007 How do you manage your 169 Web 2.0 accounts today? Does your SSO consist of A login
OpenID and identity management in consumer services on the Internet
OpenID and identity management in consumer services on the Internet Kari Helenius Helsinki University of Technology [email protected] Abstract With new services emerging on the Internet daily, users need
Logout in Single Sign-on Systems
Logout in Single Sign-on Systems Sanna Suoranta, Asko Tontti, Joonas Ruuskanen, Tuomas Aura IFIP IDMAN, London, UK, 8-9.4.2013 Logout in Single Sign-on Systems Motivation Single sign-on (SSO) systems SSO
Security and Privacy Concern for Single Sign-on Protocols
COMP116 Computer Security 2015 Final Project Security and Privacy Concern for Single Sign-on Protocols Name: Fangyuan Xu Login: fxu01 Mentor: Ming Chow Due Date: 12/15/2015 1 Abstract Nowadays, Single
The Devil is Phishing: Rethinking Web Single Sign On Systems Security. Chuan Yue USENIX Workshop on Large Scale Exploits
The Devil is Phishing: Rethinking Web Single Sign On Systems Security Chuan Yue USENIX Workshop on Large Scale Exploits and Emergent Threats (LEET 2013) Web Single Sign On (SSO) systems Sign in multiple
JVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
Single Sign-On for the Internet: A Security Story. Eugene Tsyrklevich [email protected] Vlad Tsyrklevich [email protected]
Single Sign-On for the Internet: A Security Story Eugene Tsyrklevich [email protected] Vlad Tsyrklevich [email protected] BlackHat USA, Las Vegas 2007 Introduction With the explosion of Web 2.0 technology,
A Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation Approved for Public Release Distribution Unlimited 13-1871 2013 The MITRE Corporation All Rights Reserved } OpenID Connect and OAuth2 protocol
An Identity Management Survey. on Cloud Computing
Int. Journal of Computing and Optimization, Vol. 1, 2014, no. 2, 63-71 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijco.2014.458 An Identity Management Survey on Cloud Computing Ardi BENUSI
Automatic Analysis of Browser-based Security Protocols
Automatic Analysis of Browser-based Security Protocols Avinash Sudhodanan Alessandro Armando (FBK, coordinator) Roberto Carbone (FBK, tutor) Luca Compagna (SAP, tutor) FP7-PEOPLE-2012-ITN Outline Context
Mobile Security. Policies, Standards, Frameworks, Guidelines
Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf
An Anti-Phishing mechanism for Single Sign-On based on QR-Code
An Anti-Phishing mechanism for Single Sign-On based on QR-Code Syamantak Mukhopadhyay School of Electronics and Computer Science University of Southampton Southampton, UK [email protected] David
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
Identity Federation Broker for Service Cloud
2010 International Conference on Sciences Identity Federation Broker for Cloud He Yuan Huang 1, Bin Wang 1, Xiao Xi Liu 1, Jing Min Xu 1 1 IBM Research China {huanghey, wangbcrl, liuxx, xujingm}@cn.ibm.com
The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs
The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs Executive Overview A key technical underpinning of the Cloud is the Application Programming Interface (API). APIs provide consistent
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com
Malicious Websites uncover vulnerabilities (browser, plugins, webapp, server), initiate attack steal sensitive information, install malware, compromise victim s machine Malicious Websites uncover vulnerabilities
Login with Amazon. Developer Guide for Websites
Login with Amazon Developer Guide for Websites Copyright 2014 Amazon Services, LLC or its affiliates. All rights reserved. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates.
Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft
Finding and Preventing Cross- Site Request Forgery Tom Gallagher Security Test Lead, Microsoft Agenda Quick reminder of how HTML forms work How cross-site request forgery (CSRF) attack works Obstacles
OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900
OAuth 2.0 Developers Guide Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 Table of Contents Contents TABLE OF CONTENTS... 2 ABOUT THIS DOCUMENT... 3 GETTING STARTED... 4
QR-SSO : Towards a QR-Code based Single Sign-On system
QR-SSO : Towards a QR-Code based Single Sign-On system Syamantak Mukhopadhyay School of Electronics and Computer Science University of Southampton Southampton, UK [email protected] David Argles School
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
WebCallerID: Leveraging cellular networks for Web authentication
Journal of Computer Security 19 (2011) 869 893 869 DOI 10.3233/JCS-2011-0424 IOS Press WebCallerID: Leveraging cellular networks for Web authentication Francis Hsu a, Hao Chen a, and Sridhar Machiraju
SECURITY ADVISORY. December 2008 Barracuda Load Balancer admin login Cross-site Scripting
SECURITY ADVISORY December 2008 Barracuda Load Balancer admin login Cross-site Scripting Discovered in December 2008 by FortConsult s Security Research Team/Jan Skovgren WARNING NOT FOR DISCLOSURE BEFORE
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015
Improving Web Application Security by Eliminating CWEs Weijie Chen, China INFSY 6891 Software Assurance Professor Dr. Maurice Dawson 15 December 2015 1 P a g e ABSTRACT This study examined improving web
Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM
Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM Agenda Introduction to Application Hacking Demonstration of Attack Tool Common Web Application Attacks Live Bank Hacking Demonstration
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
SAML and OAUTH comparison
SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, [email protected], twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single
Simple But Not Secure: An Empirical Security Analysis of OAuth 2.0-Based Single Sign-On Systems
Simple But Not Secure: An Empirical Security Analysis of OAuth 2.0-Based Single Sign-On Systems San-Tsai Sun University of British Columbia Vancouver, Canada [email protected] ABSTRACT Social login is
How to create a SP and a IDP which are visible across tenant space via Config files in IS
How to create a SP and a IDP which are visible across tenant space via Config files in IS This Documentation is explaining the way to create a SP and IDP which works are visible to all the tenant domains.
RTCWEB Generic Identity Service
RTCWEB Generic Identity Service IETF 83 Eric Rescorla [email protected] IETF 83 RTCWeb Generic Identity Provision 1 What are we trying to accomplish? Allow Alice and Bob to have a secure call Authenticated
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
TrustedX: eidas Platform
TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,
2015-11-30. Web Based Single Sign-On and Access Control
0--0 Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
OAuth Web Authorization Protocol Barry Leiba
www.computer.org/internet computing OAuth Web Authorization Protocol Barry Leiba Vol. 16, No. 1 January/February, 2012 This material is presented to ensure timely dissemination of scholarly and technical
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com
Hack Proof Your Webapps
Hack Proof Your Webapps About ERM About the speaker Web Application Security Expert Enterprise Risk Management, Inc. Background Web Development and System Administration Florida International University
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
OpenID Single Sign On and OAuth Data Access for Google Apps. Ryan Boyd @ryguyrg Dave Primmer May 2010
OpenID Single Sign On and OAuth Data Access for Google Apps Ryan Boyd @ryguyrg Dave Primmer May 2010 Why? View live notes and questions about this session on Google Wave: http://bit.ly/magicwave Agenda
ACR Connect Authentication Service Developers Guide
ACR Connect Authentication Service Developers Guide Revision History Date Revised by Version Description 29/01/2015 Sergei Rusinov 1.0 Authentication using NRDR account Background The document describes
Copyright Pivotal Software Inc, 2013-2015 1 of 10
Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Cloud Computing. Chapter 5 Identity as a Service (IDaaS)
Cloud Computing Chapter 5 Identity as a Service (IDaaS) Learning Objectives Describe challenges related to ID management. Describe and discuss single sign-on (SSO) capabilities. List the advantages of
OpenLogin: PTA, SAML, and OAuth/OpenID
OpenLogin: PTA, SAML, and OAuth/OpenID Ernie Turner Chris Fellows RightNow Technologies, Inc. Why should you care about these features? Why should you care about these features? Because users hate creating
Final Project Report December 9, 2012. Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540
Final Project Report December 9, 2012 Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540 CONTENTS Project Proposal... 4 Project title... 4 Faculty Advisor... 4 Introduction...
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Privacy in Cloud Computing Through Identity Management
Privacy in Cloud Computing Through Identity Management Bharat Bhargava 1, Noopur Singh 2, Asher Sinclair 3 1 Computer Science, Purdue University 2 Electrical and Computer Engineering, Purdue University
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Identity Management with Spring Security. Dave Syer, VMware, SpringOne 2011
Identity Management with Spring Security Dave Syer, VMware, SpringOne 2011 Overview What is Identity Management? Is it anything to do with Security? Some existing and emerging standards Relevant features
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
SECURITY THREAT IDENTIFICATION AND TESTING FOR SECURITY PROTOCOLS
Sophia Antipolis, French Riviera 20-22 October 2015 SECURITY THREAT IDENTIFICATION AND TESTING FOR SECURITY PROTOCOLS Presented by Luca Compagna (SAP SE) (joint work with Roberto Carbone, Annibale Panichella,
Implementing two-factor authentication: Google s experiences. Cem Paya ([email protected]) Information Security Team Google Inc.
Implementing two-factor authentication: Google s experiences Cem Paya ([email protected]) Information Security Team Google Inc. Google services and personalization Identity management at Google 1. Internal
Negotiating Trust in Identity Metasystem
Negotiating Trust in Identity Metasystem Mehmud Abliz Department of Computer Science University of Pittsburgh Pittsburgh, Pennsylvania 15260 [email protected] Abstract Many federated identity management
Secure Single Sign-On
CCV & Radboud University Nijmegen Master thesis project Secure Single Sign-On A comparison of protocols Author: Nick Heijmink [email protected] S4250559 Supervisor: E. Poll [email protected] Supervisor
This way, Bluewin will be able to offer single sign-on for service providers within the circle.
Clareity Security and The National Association of Realtors Develop a SAML Toolkit for the Real Estate Industry Ask any REALTOR about the systems they use and the passwords they deploy. The word mess will
Analysis and Implementation of a SSO Solution for Several Web Portal
Aalto University Bachelor s Thesis Analysis and Implementation of a SSO Solution for Several Web Portal Author: Xavi Magrinyà Supervisor: Professor Petri Vuorimaa A Thesis submitted in fulfilment of the
An Oracle White Paper Dec 2013. Oracle Access Management OAuth Service
An Oracle White Paper Dec 2013 Oracle Access Management OAuth Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework [email protected] keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
Identity. Provide. ...to Office 365 & Beyond
Provide Identity...to Office 365 & Beyond Sponsored by shops around the world are increasingly turning to Office 365 Microsoft s cloud-based offering for email, instant messaging, and collaboration. A
OAuth 2.0. Weina Ma [email protected]
OAuth 2.0 Weina Ma [email protected] Agenda OAuth overview Simple example OAuth protocol workflow Server-side web application flow Client-side web application flow What s the problem As the web grows, more
PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0
Windows Live Cloud Identity Connector Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Windows Live Cloud Identity Connector User Guide Version 1.0 April, 2011 Ping Identity
Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department [email protected]
Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department [email protected] Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
... Chair of Mobile Business & Multilateral Security. Privacy vs. Data: Business Models in the digital, mobile Economy
Privacy vs. Data: Business Models in the digital, mobile Economy Lecture 11 (Mobile) Identity Management SS 2015 Dr. Andreas Albers Chair of Mobile Business & Multilateral Security The Identity Concept
OpenID connect @ Deutsche telekom. Dr. Torsten Lodderstedt, Deutsche Telekom AG
OpenID connect @ Deutsche telekom Dr. Torsten Lodderstedt, Deutsche Telekom AG service ecosystem and Telekom Login Dr. Torsten Lodderstedt / OpenID Workshop @ IIW #18 2014-05-05 2 Open Standards: Our History
Google Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos
Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website:
The Password Problem Will Only Get Worse
The Password Problem Will Only Get Worse New technology for proving who we are Isaac Potoczny-Jones Galois & SEQRD [email protected] @SyntaxPolice Goals & Talk outline Update the group on authentication
