Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin martinde@northwestern.edu



Similar documents
Single Sign-On: Reviewing the Field

Authentication Methods

CS 356 Lecture 28 Internet Authentication. Spring 2013

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On

Evaluation of different Open Source Identity management Systems

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

Federated Identity Management Solutions

TF-AACE. Deliverable B.2. Deliverable B2 - The Authentication Component =============================================

Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications

WebLogic Server 7.0 Single Sign-On: An Overview

Enhancing Web Application Security

SAML-Based SSO Solution

Title: A Client Middleware for Token-Based Unified Single Sign On to edugain

Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia Pedro Borges

Architecture Guidelines Application Security

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

A brief on Two-Factor Authentication

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN

Distributed Identity Management Model for Digital Ecosystems

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Leveraging SAML for Federated Single Sign-on:

INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE

Securing Web Services With SAML

Biometric Single Sign-on using SAML

An Anti-Phishing mechanism for Single Sign-On based on QR-Code

Biometric Single Sign-on using SAML Architecture & Design Strategies

OpenHRE Security Architecture. (DRAFT v0.5)

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

Implementing Identity Provider on Mobile Phone

Patron Verification and Security The Web OPAC and Beyond. Richard Goerwitz Carleton College

2 Transport-level and Message-level Security

Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone

Controlling Web Access with BMC Web Access Manager WHITE PAPER

CA Performance Center

IGI Portal architecture and interaction with a CA- online

Globus Toolkit: Authentication and Credential Translation

IDENTITY MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

The Top 5 Federated Single Sign-On Scenarios

White Paper. Authentication and Access Control - The Cornerstone of Information Security. Vinay Purohit September Trianz 2008 White Paper Page 1

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

External Authentication with WebCT. What We ll Discuss

Canadian Access Federation: Trust Assertion Document (TAD)

Standards and Guidelines for. Information Technology. Infrastructure, Architecture, and Ongoing Operations

Scenario: IPsec Remote-Access VPN Configuration

How to Implement Enterprise SAML SSO

Perceptive Experience Single Sign-On Solutions

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS

SAML Security Option White Paper

Flexible Identity Federation

API-Security Gateway Dirk Krafzig

Angel Dichev RIG, SAP Labs

Abstract. 1. Introduction. Ohio State University Columbus, OH

Authentication Integration

Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect

Improving Online Security with Strong, Personalized User Authentication

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

OIO SAML Profile for Identity Tokens

Web based single sign on. Caleb Racey Web development officer Webteam, customer services, ISS

The increasing popularity of mobile devices is rapidly changing how and where we

SAML-Based SSO Solution

An SAML Based SSO Architecture for Secure Data Exchange between User and OSS

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

Cybersecurity and Secure Authentication with SAP Single Sign-On

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

Security. TestOut Modules

Entrust IdentityGuard Comprehensive

Building Secure Applications. James Tedrick

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

Application of the PAPI authn and authz system to the TJ-II Remote Participation environment. Madrid, 21 March 2003

ShareFile Security Overview

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Single Sign On. SSO & ID Management for Web and Mobile Applications

Shibboleth On-line Authentication System

SAP Single Sign-On 2.0 Overview Presentation

TRUST RELATIONSHIPS AND SINGLE SIGN-ON IN GRID BASED DATA WAREHOUSES

GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Centralized Oracle Database Authentication and Authorization in a Directory

Transcription:

Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin martinde@northwestern.edu International Center for Advanced Internet Research

Outline Security Mechanisms Access Control Schemes Shibboleth Underlying Technologies Conclusion David E. Martin NetSecure09 March 12, 2009 2

Common Security Mechanisms Username/Password Static Password One Time Password Dynamically Generated Password (SecureID Fob) Digital Certificate Kerberos Ticket Biometric Data David E. Martin NetSecure09 March 12, 2009 3

Username/Password Advantages Everyone is familiar with it Generally easy to remember Disadvantages People Generally Chose Common Username and a Bad Password Difficult to Securely Issue/Reset a Password Others Can Read a Username/Password Sent Over a Network David E. Martin NetSecure09 March 12, 2009 4

Username/Password Variations One Time Password User Gets a List of Passwords Each Can Be Used Once Example: German Banks Issues 6-Digit TAN To Customers to Authorize On-Line Transactions Dynamically Generated Password A Program or Device Uses an Algorithm to Generate a Password the Server Expects Example: Wells Fargo Sends out SecureID Fobs Biometric Data Fingerprint or Retinal Image is Sent as Password Mostly Used to Secure Local Data Example: Lenovo Client Security Solutions Uses Fingerprint Reader to Access Local Password Store David E. Martin NetSecure09 March 12, 2009 5

Issues Enforcing Good Passwords Nobody Likes Your Password must be at least six characters with a mixture of letters and numbers. It must be changed every 90 days and you cannot reuse passwords. Issuing One-Time Passwords List Must Be Transmitted Securely And Stored Securely Hardware SecureID Fobs Get Lost, Fingerprint Readers Break David E. Martin NetSecure09 March 12, 2009 6

Digital Certificates Private/Public Keys Each User and Server Has A Public and Private Key A Message Encrypted with the Private Key Can Only Be Read with the Public Key A Message Encrypted with the Public Key Can Only Be Read with the Private Key X.509 ITU-T Standard for a Public Key Infrastructure Public Key Certificates, Certificate Revocation Lists, Attribute Certificates, and a Certification Path Validation Algorithm David E. Martin NetSecure09 March 12, 2009 7

Public/Private Key Scenarios Verify Identity X Gets An Encrypted Message from Y X Decrypt it With the Y s Public Key If This Decryption Works, The Message is From Y Send Message Securely X Encrypts the Message with Y s Public Key and Sends the Message to Y Y Receives the Message and Decrypts It with His Private Key The Message Can Only Be Read by Y David E. Martin NetSecure09 March 12, 2009 8

SSL Negotiation From https://www.securetrust.com/resources/how-ssl-works David E. Martin NetSecure09 March 12, 2009 9

Digital Certificate Problems Users Hate Them Can t Remember Them Can t Understand Them Can t Move Them Around A Certificate Doesn t Verify Identity You Have a Secure Link, But Who Is On the Other End? David E. Martin NetSecure09 March 12, 2009 10

Required New Yorker Cartoon David E. Martin NetSecure09 March 12, 2009 11

Identity Solutions Manual Sending of Public Key Public Directory LDAP, Web Pages Web of Trust Key Ring Private Key Infrastructure David E. Martin NetSecure09 March 12, 2009 12

PKI Architecture David E. Martin NetSecure09 March 12, 2009 13

PKI Implementations PKI Deployed In Limited Areas Verification of WWW Server Identity Heavily Used in Internet Explorer and Firefox Closed User Groups Like Universities or Government Despite Expectations A Worldwide PKI Has Not Formed PKI Is Used for Users to Authenticate a Server And To Establish Secure Connection Between Server and User But Plain Old Username/Password is Used by the Server to Authenticate User David E. Martin NetSecure09 March 12, 2009 14

Controlling Access to Resources Identity Based on IP Address The Site Supplies a Range of IP Addresses to the Resource Provider The Resource Provider s Server Looks at the Source IP of the Request Requests from Addresses in the Range Identified Are Granted Access to the Resources Purchased by the Site Proxy Servers or VPNs Allow Off-Site Access Privacy is Maintained, But No Ability to Control Specific Users or Groups Identity Based on Registration A User Registers with a Resource Supplier, Who Verifies It with the Site The User is Given a Unique Username/Password to Gain Access to the Resource Privacy is Lost, But Access Can Be Tailored to Each User or Group Attributes Rather Than Identity The User Requests Access to a Resource The Resource Provider Queries the Site About the User and Attributes are Exchanged Until the Resource Provider Has Enough Information Privacy is Maintained, And Access Can Be Controlled at the User Level David E. Martin NetSecure09 March 12, 2009 15

What is Shibboleth? An Architecture and Protocol An Attribute-Based System A Set of Profiles Based on the OASIS SAML Standard A Project of the Internet2 Middleware Initiative Defining a Policy Framework and the Shibboleth Architecture Developing an Open Source Implementation Supporting the Deployment of Shibboleth in Higher Ed An Implementation of the Shibboleth Architecture Software Developed by the I2/MACE Shibboleth Project There are Other Independent Implementations David E. Martin NetSecure09 March 12, 2009 16

Where Does Shibboleth Come From? Shibboleth is a Hebrew Word That Means an Ear of Corn, Stream or Flood The Word Comes from the Old Testament (Judges 12:1-6) The Ephraimites Were Returning Home After Being Defeated Trying to Invade Gilead. The Fords Across the River Jordan Were Blocked By Gildeadites Who Made Those Who Wanted to Pass Say Shibboleth. The Ephraimites Pronounced the sh as si and Thus Were Identified and Killed. In Modern Usage, A Shibboleth is a Word or Sound Used to Detect Outsiders David E. Martin NetSecure09 March 12, 2009 17

Shibboleth Goals Provide Security While Not Degrading Privacy Attribute-based Access Control Have the Enterprise Broker Most Services in Inter-Realm Interactions Authentication, Authorization, Resource Discovery, etc. Foster Inter-Realm Trust Fabrics Leverage campus expertise and build rough consensus Influence the Marketplace; Develop Where Necessary Support for Heterogeneity and Open Standards Multiple Implementation of Shibboleth OASIS SAML David E. Martin NetSecure09 March 12, 2009 18

Shibboleth Architecture 1. The User Accesses A Protected Resource 2. The Resource Redirects The User To The Where Are You From? (WAYF) Service, So That He Can Select His Home Organization 3. The User Is Then Directed To His Home Organization, Which Sends Him To The Authentication System For His Organization 4. The User Authenticates Himself, By Whatever Means His Organization Deems Appropriate 5. After Successful Authentication, A One-time Handle Or Session Identifier Is Generated For This User Session, And The User Is Returned To The Resource 6. The Resource Uses The Handle To Request Attribute Information From The Identity Provider For This User 7. The Organization Allows Or Denies The Attribute Information To Be Made Available To This Resource Using The Attribute Release Policy. 8. Based On The Attribute Information Made Available, The Resource Then Allows Or Denies The User Access To The Resource David E. Martin NetSecure09 March 12, 2009 19

Shibboleth Architecture David E. Martin NetSecure09 March 12, 2009 20

Shibboleth Demo Here https://aai-demo.switch.ch/secure/ David E. Martin NetSecure09 March 12, 2009 21

Trust and Attribute Exchange In Order for This to Work The Service Provider and Identity Provider Must Trust Each Other Shibboleth Projects Spends Much Time on Such Federation There Must Also be a Common Way of Requesting and Supplying Attributes Shibboleth Drove Efforts to Develop SAML Finally, the Attributes Must be Understood by Both Parties Shibboleth Led eduperson Effort David E. Martin NetSecure09 March 12, 2009 22

SAML Security Assertion Markup Language (SAML) An XML-Based Standard for Exchanging Authentication and Authorization Data Between Security Domains Between an Identity Provider (a Producer of Assertions) and a Service Provider (a Consumer of Assertions) SAML is a product of the OASIS Security Services Technical Committee SAML 2.0 Issued in March 2005 David E. Martin NetSecure09 March 12, 2009 23

eduperson SAML Defines How to Pass Attributes, But Not What The Attributes Are Most Shibboleth Service Providers Require eduperson Attributes to be Passed From the Identity Provider eduperson Defines a Common Set of Attributes and Definitions displayname, givenname, Initials, telephonenumber, postaladdress, preferredlanguare, eduperson Extends inetorgperson with Attributes Supporting inter-realm Access David E. Martin NetSecure09 March 12, 2009 24

Conclusion Shibboleth Provides Strong Authentication While Maintaining Privacy Shibboleth Drives Associated Technologies SAML, eduperson, Federation Shibboleth is Being Expanded Beyond Web Access GridShib Integrates Shibboleth Into Globus Toolkit Shibboleth is A Model for Commercial Efforts CardSpace, Liberty Alliance, etc. Thanks to Ken Klingenstein and Team David E. Martin NetSecure09 March 12, 2009 25