USING ESPRESSO [ESTABLISHING SUGGESTED PRACTICES REGARDING SINGLE SIGN ON] TO STREAMLINE ACCESS



Similar documents
Best Practices for Libraries and Library Service Providers

Shibboleth and Library Resources

Using Shibboleth for Single Sign- On

Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications

Identity Management. Manager, Identity Management. Academic Technology Services. Michigan State University Board of Trustees

Shibboleth N-Tier Support. Chad La Joie

Guide to Getting Started with the CommIT Pilot

Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources

A Shibboleth View of Federated Identity. Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR

Authentication Methods

Single Sign-On: Reviewing the Field

E-LibUkr portal: Case study of Shibboleth and EZProxy in Ukraine.

Software Design Document SAMLv2 IDP Proxying

Logout Support on SP and Application

Service Provider Interface Study

HP Software as a Service

Middleware integration in the Sympa mailing list software. Olivier Salaün - CRU

Copyright: WhosOnLocation Limited

Integrating Multi-Factor Authentication into Your Campus Identity Management System

Introducing Shibboleth

Authentication Integration

Shibboleth User Verification Customer Implementation Guide Version 3.5

Shibboleth Identity Provider (IdP) Sebastian Rieger

Perceptive Experience Single Sign-On Solutions

S P I E Information Environments Shibboleth and Its Integration into Security Architectures. EDUCAUSE & Internet 2 Security Professionals Conference

Federated Identity Management Solutions

Logout in Single Sign-on Systems

IGI Portal architecture and interaction with a CA- online

Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

Agenda. How to configure

About Me. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack

Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University

Flexible Identity Federation

Single Sign On at Colorado State. Ron Splittgerber

Egnyte Single Sign-On (SSO) Installation for OneLogin

To set up Egnyte so employees can log in using SSO, follow the steps below to configure VMware Horizon and Egnyte to work with each other.

Single Sign-On for the UQ Web

PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0

Federated Identity Management. Willem Elbers (MPI-TLA) EUDAT training

Getting Started with Single Sign-On

The Primer: Nuts and Bolts of Federated Identity Management

Evaluation of different Open Source Identity management Systems

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.

UC Libraries Shibboleth Task Force: Improving Online Access Management through Shibboleth

Please return this document to when complete.

Toward campus portal with shibboleth middleware

OpenSSO: Cross Domain Single Sign On

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Dell One Identity Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

Shibboleth Authentication. Information Systems & Computing Identity and Access Management May 23, 2014

Using a Combination Proxy Server / PURL Server for Off-Campus Access to Restricted Databases: A Solution for the University of Iowa

SAML Authentication within Secret Server

Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin martinde@northwestern.edu

Configuring EPM System for SAML2-based Federation Services SSO

Single Sign On. SSO & ID Management for Web and Mobile Applications

HP Software as a Service. Federated SSO Guide

The Primer: Nuts and Bolts of Federated Identity Management

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

Identity opens the participation age. Dr. Rainer Eschrich. Program Manager Identity Management Sun Microsystems GmbH

The Top 5 Federated Single Sign-On Scenarios

The saga of WebFTS and Federated Identity

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

NCSU SSO. Case Study

Using Kerberos for Web Authentication. Wesley Craig University of Michigan

Enabling SAML for Dynamic Identity Federation Management

Deploying RSA ClearTrust with the FirePass controller

WebNow Single Sign-On Solutions

Getting Started with Single Sign-On

Using SAML for Single Sign-On in the SOA Software Platform

Three Case Studies in Access Management

Разработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, November 2009 Joost van Dijk - SURFnet

AA enabling a closed source legacy application

Transcription:

USING ESPRESSO [ESTABLISHING SUGGESTED PRACTICES REGARDING SINGLE SIGN ON] TO STREAMLINE ACCESS Andy Ingham (UNC-Chapel Hill) NASIG Annual Conference, June 4, 2011

What I hope to cover Problem statement Goals Challenges Assumptions A detour Sample use cases ESPRESSO deliverables ESPRESSO recommendations The future Questions?

Problem statement What changes can be implemented to effectively and efficiently get ALL (but ONLY!) the right users to licensed external resources (even from the open web ), utilizing single sign-on (SSO) technologies? Currently, libraries and their users are forced to work in a mixed auth environment, that is still predominantly IP-based and requires proxying Likewise, Service Providers ( SPs, such as resource vendors and publishers) must support multiple authentication mechanisms

Goals Create Recommended Practices that will improve the user experience by providing consistency, simplicity, familiarity, improved usability, and will provide a path toward phasing out IP-centered authentication in favor of an SSO experience across a set of distributed service providers. Recommend an environment that is feasible for both libraries and vendors to implement and that provides security, privacy, manageability, and flexibility.

Challenges Can a vendor correctly associate a user with a current license? (sometimes called the Discovery problem ) Can various entry PATHs all be accommodated gracefully? (from library website, open web, etc) Can various entry LEVELs all be accommodated gracefully? (top-level vendor page, deep link, etc) Is use of resources accommodated properly regardless of the user s physical location?

Assumptions Institutional licenses are in scope, licenses for individuals are NOT. Institutions will have an identity management infrastructure in place (and generally leverage a federation, e.g., InCommon). Content suppliers will have standards-compliant service providers (SPs). Shibboleth is the current best-of-breed for providing an SSO environment. EZproxy (due to high market saturation) is prominent in this presentation.

A detour to cover some background

Architectural shift Primary structural element Secondary structural element Proxy LOCATION (IP address) User attributes (via proxy server authn / authz) SAML (Shibboleth) User attributes (via IdP) LOCATION (in order to accommodate ANONYMOUS walkins )

Proxy versus SAML (Shibboleth) Benefit Proxy SAML Provides SSO for LIBRARY resources X X Provides SSO (also) for other campus resources Eliminates IP range management for LIBRARY Eliminates IP range management for VENDOR(S) (including need for library to keep list synced across all vendors) Allows possibility for PERSONALIZATION streamlining across multiple vendors X Only if force authn even ON- CAMPUS X X

Current situation (EZproxy) Let s refer to the ESPReSSO document itself!!

Current situation (Shibboleth)

SP IdP Identity discovery service (AKA WAYF ) Make authorization decision Authentication service [ If successful ] Attribute (eduperson) Value Entitlement common-lib-terms ScopedAffiliation staff@unc.edu?? SUCCESS!

SP WAYF Make authorization decision SUCCESS?! IdP Authentication service Discovery Problem WITHOUT WAYFless URLs, a [ user If successful must: ] 1. Find the login area of the vendor site 2. Attribute Select the (eduperson) correct federation Value 3. Select the correct institution Entitlement common-lib-terms WITH ScopedAffiliation WAYFless URLs, a user staff@unc.edu bypasses all three? steps above. While this? DOES require that the user follow a library managed link, that is CURRENTLY the case for use with EZproxy

SP EZproxyprefixed link Make authorization decision IdP WAYF Authentication service [ If successful ] By taking advantage of EZproxy s ability, through custom configuration, to make Attribute (eduperson) Value library-managed links WAYFless, the Entitlement institution is able to gracefully common-lib-terms handle remote ScopedAffiliation access to resources, avoid staff@unc.edu the discovery problem,? and do so using the? SAME EZproxyprefixed links it currently has! SUCCESS?!

End of detour and back to the NISO Recommended Practice document.

Sample use cases

ESPRESSO deliverables Develop a standard vocabulary of technical, business and policy-related terms used by Web SSO and Federated Authentication products Describe use cases that indicate the ways in which a browser would arrive at a Service Provider, traverse a Discovery process, and arrive at the appropriate login mechanism. (E.g., from library home page; via federated searches; from the open web ; to deep links, often via link resolvers / OpenURL) Develop a set of best practice recommendations for the relationships between customers, licensing bodies, federations, and service providers.

ESPRESSO deliverables Propose standardized user interface elements Identify a preferred location for login links Recommend to Service Providers a standard approach for guiding the user to the desired authentication method n Propose standardized GUI flows n Provide tips for easy identification of home site n Suggest guidelines for lists of federations and IdPs n Recommend judicious use of branding Develop standardized approaches for handling automatic login when the URL presented at the SP identifies the user s preferred authentication method and/or authentication provider.

ESPRESSO deliverables Identify approaches that allow Federated Search technologies and portals to leverage existing Web SSO authentication sessions of a user when contacting backend Service Provider sites. Work with those package mechanisms that currently support delegated authentication. Ensure that Service Providers have access to the documentation they need to support this feature.

ESPRESSO deliverables Provide plans for the promotion and adoption of these Recommended Practices to make the access improvements a reality 1. Marketing plan 2. Business case/justification will be developed as part of the marketing plan.

ESPRESSO recommendations SPs continue to support multiple authentication options during this time of transition. SPs and libraries move quickly to reduce reliance on IP-based access control. SPs and libraries move quickly to deprecate userids/passwords validated AT the service provider site. SPs and libraries move quickly to implement and use standards-based federated authentication.

ESPRESSO recommendations SPs should adopt standard placement/wording of the login link on all pages. SPs should utilize as many time-saving mechanisms as possible (and as economically as possible) for guiding the user to the appropriate authentication method (this is the Identity Discovery Page ). SP and IdP web designers should utilize branding at appropriate places in the browser flow.

The future Seek feedback on the NISO Recommended Practice document at http://www.niso.org/workrooms/sso/ Leverage a NISO standing committee? Provide some mechanism for outreach, support, and engagement with both service providers and institutions Update the guidelines and related resources Disseminate implementation guides? Provide webinars?

Questions for me? SSO website: www.niso.org/workrooms/sso SSO Interest Group list: www.niso.org/lists/ssoinfo SSO Charge: www.niso.org/workrooms/sso/charge See also InC-Library information https://spaces.internet2.edu/display/inclibrary/inc-library https://spaces.internet2.edu/display/inclibrary/best +Practices Andy Ingham [andy_ingham@unc.edu]