Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources



Similar documents
Single Sign On at Colorado State. Ron Splittgerber

Shibboleth Authentication. Information Systems & Computing Identity and Access Management May 23, 2014

Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications

Getting Started with Single Sign-On

Best Practices for Libraries and Library Service Providers

Getting Started with Single Sign-On

Identity Management. Manager, Identity Management. Academic Technology Services. Michigan State University Board of Trustees

IAM, Enterprise Directories and Shibboleth (oh my!)

Web app AAI Integration How to integrate web applications with AAI in general?

Web based single sign on. Caleb Racey Web development officer Webteam, customer services, ISS

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

Authentication Methods

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Perceptive Experience Single Sign-On Solutions

S P I E Information Environments Shibboleth and Its Integration into Security Architectures. EDUCAUSE & Internet 2 Security Professionals Conference

PingFederate. Identity Menu Builder. User Guide. Version 1.0

Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin martinde@northwestern.edu

Shibboleth Identity Provider (IdP) Sebastian Rieger

A Shibboleth View of Federated Identity. Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR

Using Shibboleth for Single Sign- On

Shibboleth User Verification Customer Implementation Guide Version 3.5

Toward campus portal with shibboleth middleware

The Case For InCommon Not Just for the Big Guys

Google Apps Deployment Guide

Authentication Integration

USING ESPRESSO [ESTABLISHING SUGGESTED PRACTICES REGARDING SINGLE SIGN ON] TO STREAMLINE ACCESS

Sakai and uportal Integration Options

E-LibUkr portal: Case study of Shibboleth and EZProxy in Ukraine.

Improving Security and Productivity through Federation and Single Sign-on

Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow

Moodle and Office 365 Step-by-Step Guide: Federation using Active Directory Federation Services

P U R D U E U N I V E R S I T Y

Agenda. How to configure

SAML Security Option White Paper

Canadian Access Federation: Trust Assertion Document (TAD)

The Top 5 Federated Single Sign-On Scenarios

Flexible Identity Federation

SAML-Based SSO Solution

Setting Up Resources in VMware Identity Manager

Authentication and Single Sign On

Configuring. Moodle. Chapter 82

Outsource the hosting of Luminis and have it hosted elsewhere

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University

Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015

SAML single sign-on configuration overview

Single Sign On. SSO & ID Management for Web and Mobile Applications

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Copyright: WhosOnLocation Limited

Connected Data. Connected Data requirements for SSO

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department

Get Cloud Ready: Secure Access to Google Apps and Other SaaS Applications

Increase the Security of Your Box Account With Single Sign-On

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

Configuring EPM System for SAML2-based Federation Services SSO

IDENTITY MANAGEMENT ROLLOUT: IN A HURRY. Jason Blackader, UNIX Systems Administrator

McAfee Cloud Identity Manager

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

Integrating Web Applications with Shibboleth

Shibboleth and Library Resources

Configuring Parature Self-Service Portal

F5 BIG-IP: Configuring v11 Access Policy Manager APM

WebNow Single Sign-On Solutions

Three Case Studies in Access Management

Canadian Access Federation: Trust Assertion Document (TAD)

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS

Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal

The increasing popularity of mobile devices is rapidly changing how and where we

Integrating Multi-Factor Authentication into Your Campus Identity Management System

Qualtrics Single Sign-On Specification

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce

Sharepoint server SSO

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server

From centralized to single sign on

An Oracle White Paper October Frequently Asked Questions for Oracle Forms 11g

HP Software as a Service

Transcription:

Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources Paul Riddle University of Maryland Baltimore County EDUCAUSE Mid-Atlantic Regional Conference January 16, 2008

Copyright Paul Riddle, 2008. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author.

Introduction Campuses are managing an increasing array of in-house and third-party self-service tools Lots of services, lots of authentication schemes Goal is to provide end users with a seamless web browsing experience To address this, many campuses have implemented single sign-on (SSO) systems It is often difficult to extend SSO systems to manage access to providers external to the campus

How are providers addressing SSO? Some support popular systems like CAS and Pubcookie Some have established ad-hoc schemes that schools can follow to set up SSO (ex. National Student Clearinghouse) Others do nothing, leaving SSO integration up to the customer (ex. PeopleSoft) More and more are supporting Shibboleth and other related technologies

Common problems Can't expect providers to support every single sign-on system out there Integrating ad-hoc SSO schemes is often cumbersome and insecure Providers still need to maintain user accounts This often means storing users' personal data on the provider's remote site. This is a big privacy concern. Ideally we'd like to send user information to providers on an as-needed basis only

Shibboleth Addresses These Issues Extends single sign-on to include services external to the University Takes providers out of the authentication business Protects individuals' privacy Based on open standards Straightforward for Universities and providers to adopt

What is Shibboleth? shibboleth (n) - 1. a peculiarity of pronunciation, behavior, mode of dress, etc., that distinguishes a particular class or set of persons 2. a common saying or belief with little current meaning or truth -dictionary.com

What is Shibboleth? A secure framework for exchanging user attributes between institutions Provides single sign-on service that works with a campus' existing authentication system Allows campuses to build and manage locally, access globally Sends user attributes to providers at the time the user accesses the service

Technical Info Based on SAML v1.1 specification (forthcoming version 2.0 will implement SAML 2.0) Interoperates with other SAML-based providers Uses SSL certificates to securely transmit authorization data to remote providers Works with any authentication service that can provide the HTTP REMOTE_USER environment variable.

Some Providers who Support Shibboleth WebCT Symplicity Student Career Services WebAssign NSF FastLane grant administration system Elsevier ScienceDirect online scientific journals TurnItIn Napster Google Apps (coming soon with Shib 2.0)

How Shibboleth Works

Two Major Components Identity Provider (IdP) Runs at the end user's site Verifies the identity of the user (usually via SSO) Asserts user's relevant attributes to the remote site Service Provider (SP) Runs at the remote site Verifies that the remote user is allowed to access the remote service

High Level Work Flow 1. User browses to a Shib-authenticated web site 2. Remote site contacts the IdP at the user's site 3. User authenticates via site's SSO (if necessary) 4. IdP passes a handle back to the remote site 5. Remote site sends an attribute request back to the IdP 6. IdP queries and returns user attributes that the remote site is entitled to know

Things to Note It's not necessary to release the user's actual identity Users can control what information is released about them Remote service providers no longer need to maintain user accounts or track identities

The Old Way User Provider's Service Campus SSO Service Provider's Authentication System Provider's User Accounts Name ID DOB etc.. Name ID DOB etc.. Batch Data feed from University Name ID DOB etc.. Name ID DOB etc.. Campus Remote Provider

The Shibboleth Way User Campus SSO Service Shibboleth SP Campus User Directory Name ID DOB etc.. Name ID DOB etc.. Shibboleth IdP Name ID DOB etc.. Name ID DOB etc.. Provider's Service Campus Remote Provider

Federations

About Federations.. Shibboleth is a nice starting point, but it doesn't enforce any specific attribute policies A federation brings like-minded organizations together and defines a standard vocabulary of attributes This eliminates the need to come up with one off solutions for each service provider In many cases, things will just work

InCommon InCommon is a popular federation for higher education institutions in the U.S. Many providers who support Shibboleth in higher ed have joined InCommon InCommon's attributes are based on the popular eduperson specification InCommon also provides an SSL Certificate- Signing Authority

Some InCommon Attributes edupersonscopedaffiliation edupersonprincipalname edupersonentitlement edupersontargetedid sn givenname displayname mail

Case Study: Shibboleth at UMBC

About UMBC Roughly 15,000 users Home-grown single sign-on service (WebAuth) (Mostly) eduperson-compliant user directory based on OpenLDAP Many in-house and third-party applications ported to use our SSO (myumbc portal, PeopleSoft Finance and HR, Blackboard, etc) Several outsourced services (National Student Clearinghouse, Campus Card Services, etc)

Shibboleth at UMBC We want to Shibbolize as many of our inhouse applications as possible, to de-couple them from the SSO system. Third-party applications are another story. Ideally, we'd like all of our vendors to support Shibboleth out of the box. Some are beginning to do this, but for the others, we'll still need custom solutions. The more customers ask, the more likely vendors will be to offer support.

UMBC and Symplicity Symplicity Corporation provides services to students seeking employment, internships etc. We chose Symplicity over several competing products partly because of their support for open standards like Shibboleth/SAML All services run on Symplicity's own, off-site web servers We use Shibboleth and InCommon to facilitate single sign-on into Symplicity for our users. It has been a big success.

What's next? Shibbolize services such as PeopleSoft and Blackboard Single sign-on for Alumni portal Explore the idea of creating a federation of schools within the University System of Maryland This opens up some very interesting possibilities, such as cross-campus course registration, library services, etc.

Next Steps

Shibboleth Infrastructure Requirements An authentication or single sign-on (SSO) service capable of providing HTTP REMOTE_USER A user directory (LDAP or other) that ideally complies with eduperson specification Apache (preferably 2.x) and Tomcat Java 1.5 or better

Getting Started Download and deploy the Shibboleth IdP Integrate the IdP with your existing SSO and Directory services If you want to Shibbolize locally-managed services, deploy the Shibboleth SP Join a federation such as InCommon Encourage vendors to adopt Shibboleth and support those who do.

References http://shibboleth.internet2.edu http://www.incommonfederation.org http://www.oasis-open.org http://www.opensaml.org http://www.educause.edu/eduperson http://www.symplicity.com

Contact Information Paul Riddle paulr@umbc.edu