Federated Identity Opportunities & Risks



Similar documents
Single Sign On. SSO & ID Management for Web and Mobile Applications

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.

Federated Identity and Single Sign-On using CA API Gateway

An Oracle White Paper Dec Oracle Access Management Security Token Service

Web Access Management and Single Sign-On

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Privacy in Cloud Computing Through Identity Management

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.

CLAIMS-BASED IDENTITY FOR WINDOWS

USING FEDERATED AUTHENTICATION WITH M-FILES

Securely Managing and Exposing Web Services & Applications

Flexible Identity Federation

OpenID Single Sign On and OAuth Data Access for Google Apps. Ryan Dave Primmer May 2010

NIST s Guide to Secure Web Services

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation

A trusted identity management system is not only essential for ensuring your customers safety and confidence.

Final Project Report December 9, Cloud-based Authentication with Native Client Server Applications. Nils Dussart

Interoperate in Cloud with Federation

The Role of Identity Enabled Web Services in Cloud Computing

Federated Identity in the Enterprise

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

Federated Identity Management Solutions

Federated Identity for Cloud Computing and Cross-organization Collaboration

Gateway Apps - Security Summary SECURITY SUMMARY

Identity. Provide. ...to Office 365 & Beyond

SAML Security Analysis. Huang Zheng Xiong Jiaxi Ren Sijun

UNIVERSITY OF COLORADO Procurement Service Center INTENT TO SOLE SOURCE PROCUREMENT CU-JL SS. Single Sign-On (SSO) Solution

Get Success in Passing Your Certification Exam at first attempt!

Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver

How To Manage Identity On A Cloud (Cloud) With A User Id And A Password (Saas)

Identity Federation Broker for Service Cloud

Open Source Identity Integration with OpenSSO

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Lecture Notes for Advanced Web Security 2015

The Top 5 Federated Single Sign-On Scenarios

IBM Tivoli Federated Identity Manager

OIOIDWS for Healthcare Token Profile for Authentication Tokens

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

Biometric Single Sign-on using SAML Architecture & Design Strategies

IBM WebSphere Application Server

igovt logon service Context Mapping Service (icms) Messaging Specification Release 9.6

SAML AS AN SSO STANDARD FOR CUSTOMER IDENTITY MANAGEMENT. How to Create a Frictionless, Secure Customer Identity Management Strategy

IBM Tivoli Federated Identity Manager V6.2.2 Implementation. Version: Demo. Page <<1/10>>

Copyright: WhosOnLocation Limited

OPENIAM ACCESS MANAGER. Web Access Management made Easy

Mobile Security. Policies, Standards, Frameworks, Guidelines

CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282

Federated Identity and Trust Management

Securing WebFOCUS A Primer. Bob Hoffman Information Builders

Identity Server Guide Access Manager 4.0

Access Management Analysis of some available solutions

CS 356 Lecture 28 Internet Authentication. Spring 2013

SECUREAUTH IDP AND OFFICE 365

Cloud Computing. Chapter 5 Identity as a Service (IDaaS)

Single Sign-On Implementation Guide

Web Services Security: What s Required To Secure A Service-Oriented Architecture. An Oracle White Paper January 2008

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE

Single Sign-On Implementation Guide

A pattern for the WS-Trust standard for web services

Web Based Single Sign-On and Access Control

SAML and OAUTH comparison

SAML and OAUTH Technologies WebSphere Application Server

Single Sign-On Implementation Guide

Enable Your Applications for CAC and PIV Smart Cards

WELCOME TO Open Source Enterprise Architecture

The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs

Software Requirement Specification Web Services Security

The Challenges of Web single sign-on

OpenID Deutsche telekom. Dr. Torsten Lodderstedt, Deutsche Telekom AG

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia Pedro Borges

A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems

Safewhere*Identify 3.4. Release Notes

Spring Security 3. rpafktl Pen source. intruders with this easy to follow practical guide. Secure your web applications against malicious

Recon and Mapping Tools and Exploitation Tools in SamuraiWTF Report section Nick Robbins

Setting Up Federated Identity with IBM SmartCloud

Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems

September 9 11, 2013 Anaheim, California 507 Demystifying Authentication and SSO Options in Business Intelligence

YubiKey Authentication Module Design Guideline

managing SSO with shared credentials

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

OIO SAML Profile for Identity Tokens

Glinda Cummings World Wide Tivoli Security Product Manager

Extending DigiD to the Private Sector (DigiD-2)

Security Assertion Markup Language (SAML)

Perceptive Experience Single Sign-On Solutions

OAuth: Where are we going?

Transcription:

Federated Identity Opportunities & Risks

Dominick Baier Former ERNW employee Security consultant at thinktecture application security in distributed systems identity management mostly Windows &.NET http://www.leastprivilege.com dominick.baier@thinktecture.com 2

Objectives What is federated identity? Why would I care? Anatomy of federated identity Enterprise & consumer usage Security considerations 3

What is identity? Too many definitions what you say about your self what others say about yourself Technically speaking proving you are a valid directory entry Bob Application User Store 4

What is federated identity? Again many definitions being able to use your identity in more than one security domain often in single-sign-on style Bob 5

Where is it used? Enterprise space connect customers and partners to internal applications connect employees to external applications internal federation between branches/domains Consumer space re-use accounts between various internet applications more for leisure type of apps less e-commerce ISV space somewhere in-between depends on to whom they want to sell their software to 6

Federated authentication Toughest problem to solve authentication across security boundaries without replicating accounts Various requirements providing a stable (scoped) user identifier provide additional information for authorization & personalization Bunch of protocols out there WS-Federation, WS-Trust, SAML (Enterprise) OpenID, OAuth/WRAP (Consumer) 7

Federated authentication Security Token Service 1 Token Trust 2 Bob Application 8

Enterprise space SAML 2.0 Protocols (SUN, RSA, IBM) SAML 2.0 token type various profiles (web apps & services) WS-* and friends (Microsoft, IBM, VeriSign) WS-Federation Passive Profile (web applications) WS-Trust, WS-Security (web services) token agnostic, but typically SAML 1.1/2.0 Both rely on a batch of sub-specifications HTTP, XML Encryption, XML Signatures etc 9

SAML Assertion <saml:assertion xmlns:saml="urn:oasis:names:tc:saml:1.0:assertion"> <saml:attributestatement> <saml:attribute AttributeName="userid" AttributeNamespace="http://..."> <saml:attributevalue>42</saml:attributevalue> </saml:attribute> <saml:attribute AttributeName="name" AttributeNamespace="http://... "> <saml:attributevalue>dominick</saml:attributevalue> </saml:attribute> <saml:attribute AttributeName="department" AttributeNamespace="http://... "> <saml:attributevalue>research</saml:attributevalue> </saml:attribute> </saml:attributestatement> <Signature xmlns="http://www.w3.org/2000/09/xmldsig#" /> </saml:assertion> 10

Passive token request (WS-Federation) Identity Provider login?wa=wsignin1.0&wtrealm=address_of_rp GET /login <form method="post" action="http://server/app/"> <input name="wresult" value="<saml:assertion " /> <script > window.settimeout('document.forms[0].submit()', 0); </script> </form> GET /app POST /app Client Relying Party 11

SAML Bearer tokens Token provided as-is Optionally encrypted Owner of token can authenticate either legitimate or eavesdropping etc.. Replay attack/transport protection important 12

Active token request (WS-Trust) Identity Provider RST/ RSTR <RequestSecurityToken> <RequestType>Issue</RequestType> <TokenType>SAML#1.1</TokenType> <RequestSecurityTokenResponse> <AppliesTo> <saml:assertion> <EndpointReference> <Address>address_of_rp</Address> </saml:assertion> <Identity>cert_of_rp</Identity> <RequestSecurityTokenResponse> </EndpointReference> </AppliesTo> <RequestSecurityToken> SOAP w/ security header Client Relying Party 13

SAML Proof-of-Possession tokens Similar to Kerberos service tickets Tokens must be encrypted (Symmetric) key material both embedded in token and in response message key used to sign message to relying party thus proving to be the original requester <RequestSecurityTokenResponse> <entropy>abc</entropy> <saml:assertion> <entropy>abc</entropy> </saml:assertion> <RequestSecurityTokenResponse> 14

Common scenario Identity Provider Federation Gateway trust 1 2 3 trust 4 15

Home realm discovery Common issue in web applications how does the application know where the user is coming from? Several ways to approach this problem Resource-STS provides UI home realm encoded in URL https://www.app.com/partner1 16

Products (excerpt) Security Token Services / Identity Provider Microsoft Active Directory Federation Services 2.0 IBM Tivoli Federation Manager Sun OpenSSO CA SiteMinder Novell Access Manager Relying Party / Service Provider toolkits Microsoft Windows Identity Foundation (.NET) Bandit (Java) simplesaml (PHP) 17

Consumer space OpenID easy to implement authentication protocol large backing in community plurality of providers/applications by design limited security features in standard profile based on HTTP OAuth/WRAP mechanism to access protected resources/apis piggybacks on various authentication mechanisms enables simple delegation scenarios 18

OpenID Most popular 3rd party authentication mechanism in the consumer space Google Facebook Yahoo Twitter Flickr MySpace AOL Verisign MyOpenID Approx. one billion user accounts / 50K enabled web sites 19

OpenID 2.0 authentication (in its simplest form) OpenID Provider login?openid.claimed_id=leastprivilege.myopenid.com& openid.assoc_handle={hmac-sha256}{ } openid.sreg.optional=email,fullname openid.return_to=https:// GET /login - find login page - Diffie Hellman key exchange Client /?openid.claimed_id= openid.assoc_handle= openid.response_nonce= openid.sreg.email=dbaier@gmail.com Web App 20

Simple delegation Grant access to protected resource on behalf of Logon Service Protected Resource 3rd Party Application use token - authenticate - acquire delegation token - scoped to certain resources - time bombed pass token on 21

Toolkits (excerpt) Plugins for various blog/cms engines Drupal, Wordpress, phpbb DotNetOpenAuth (.NET) JOpenID (Java) PHP OpenID Ruby OpenID OpenID4Perl Google AppEngine OpenID (Python) 22

Problems with federated identity 23

Issue - who s identity is it & who controls it? Not much of a problem in enterprise space user s identity is owned by the employer anyway typically very tight trust relationships minimum disclosure policy typically already in the company s interest Different story in consumer space federation relationships typically unclear to user too much has happened already users often prefer manual solutions (and isolation) all based on trust and often there s not much of that 24

Technical issues Protocols are complex shouldn t try implement yourself go with a proven library/product The federated identity is an attractive target gives access to many resources with a single credential phishing CSRF In most cases, the browser is the driver of the protocol all known (and unknown) attacks against browsers (or their operators) think SslStrip (additional encryption of token recommended) web services typically don t have this issue due to stricter security handling 25

Summary Federated identity has benefits reduction of (potentially poor) credentials streamlining of login experience removal of authentication code in applications isolation of complex security related code remove friction in B2B scenarios enabler for the cloud Federated identity has implications amplification of existing attacks user credentials gain power users need to be aware of that poor application design may open up even more critical vulnerabilities even when technically sound users may reject it 26