SAML Security Analysis. Huang Zheng Xiong Jiaxi Ren Sijun



Similar documents
MONDESIR Eunice WEILL-TESSIER Pierre FEDERATED IDENTITY. ASR 2006/2007 Final Project. Supervisers: Maryline Maknavicius-Laurent, Guy Bernard

Martin Käser. Single Sign-on mit OpenSAML

IBM WebSphere Application Server

Shibboleth Architecture

Security Assertion Markup Language (SAML) 2.0 Technical Overview

Web Access Management and Single Sign-On

STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN

Standalone SAML Attribute Authority With Shibboleth

Web Single Sign-On Authentication using SAML

OpenSSO: Cross Domain Single Sign On

Get Success in Passing Your Certification Exam at first attempt!

An SAML Based SSO Architecture for Secure Data Exchange between User and OSS

Web Based Single Sign-On and Access Control

Single Sign on Using SAML

Design and Implementaion of a Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Grid and Web Services Security

MLSListings Single Sign On Implementation Guide. Compatible with MLSListings Applications

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

SAML-Based SSO Solution

IBM Tivoli Federated Identity Manager V6.2.2 Implementation. Version: Demo. Page <<1/10>>

SAML basics A technical introduction to the Security Assertion Markup Language

Biometric Single Sign-on using SAML Architecture & Design Strategies

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide

National Identity Exchange Federation. Web Browser User-to-System Profile. Version 1.0

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

IAM Application Integration Guide

Liberty Alliance. CSRF Review. .NET Passport Review. Kerberos Review. CPSC 328 Spring 2009

Secure Semantic Web Service Using SAML

Implementing Single Sign On in Java Technologybased

Siebel CRM On Demand Single Sign-On. An Oracle White Paper December 2006

Title: A Client Middleware for Token-Based Unified Single Sign On to edugain

OIOSAML Rich Client to Browser Scenario Version 1.0

Agenda. How to configure

Introduction to SAML. Jason Rouault Section Architect Internet Security Solutions Lab Hewlett-Packard. An XML based Security Assertion Markup Language

Federated Identity Management Solutions

Copyright: WhosOnLocation Limited

SAML-Based SSO Solution

Security Assertion Markup Language (SAML)

Implementation Guide SAP NetWeaver Identity Management Identity Provider

Setting Up Federated Identity with IBM SmartCloud

SAML Security Assertion Markup Language

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia Pedro Borges

Web Services Security: SAML Token Profile 1.1

SAML Federated Identity at OASIS

Configuring SAML2 for Single Sign-On to Smartsheet (Enterprise Only)

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE

Negotiating Trust in Identity Metasystem

Securing Web Services With SAML

Tusker IT Department Tusker IT Architecture

Security Assertion Markup Language (SAML) V2.0 Technical Overview

The increasing popularity of mobile devices is rapidly changing how and where we

Feide Technical Guide. Technical details for integrating a service into Feide

Research and Implementation of Single Sign-On Mechanism for ASP Pattern *

Introducing Shibboleth

Open Source Identity Integration with OpenSSO

Introduction to SAML

Разработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, November 2009 Joost van Dijk - SURFnet

OpenHRE Security Architecture. (DRAFT v0.5)

Mobile Security. Policies, Standards, Frameworks, Guidelines

SAML Security Option White Paper

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

Lecture Notes for Advanced Web Security 2015

Biometric Single Sign-on using SAML

RSA Secured Implementation Guide for VPN Products

Gateway Apps - Security Summary SECURITY SUMMARY

Evaluation of different Open Source Identity management Systems

Authentication and Single Sign On

TIB 2.0 Administration Functions Overview

Microsoft Active Directory Oracle Enterprise Gateway Integration Guide

JVA-122. Secure Java Web Development

Perceptive Experience Single Sign-On Solutions

Flexible Identity Federation

Symplified I: Windows User Identity. Matthew McNew and Lex Hubbard

SAML and OAUTH comparison

Authentication Context Classes for Levels of Assurance for the Swedish eid Framework

SAML (Security Assertion Markup Language) Security Model for RESTful Web Services

SAML v1.1 for.net Developer Guide

Revised edition. OIO Web SSO Profile V2.0.9 (also known as OIOSAML 2.0.9) Includes errata and minor clarifications

Revised edition. OIO Web SSO Profile V2.0.8 (also known as OIOSAML 2.0.8) Includes errata and minor clarifications

How To Use Saml 2.0 Single Sign On With Qualysguard

Designing a CA Single Sign-On Architecture for Enhanced Security

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Keeping access control while moving to the cloud. Presented by Zdenek Nejedly Computing & Communications Services University of Guelph

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x

Extending DigiD to the Private Sector (DigiD-2)

DocuSign Information Guide. Single Sign On Functionality. Overview. Table of Contents

SAML:The Cross-Domain SSO Use Case

Server based signature service. Overview

WebLogic Server 7.0 Single Sign-On: An Overview

Federated Identity Management

Using SAML for Single Sign-On in the SOA Software Platform

FEDERATED IDENTITY MANAGEMENT:

Transcription:

SAML Security Analysis Huang Zheng Xiong Jiaxi Ren Sijun

outline The intorduction of SAML SAML use case The manner of SAML working Security risks on SAML Security policy on SAML Summary my course report 2

The intorduction of SAML:Definition Security Assertion Markup Language (SAML) is an XML standard for exchanging authentication and authorization data between entities SAML is a product of the OASIS Security Services Technical Committee: http://www.oasis-open.org/committees/security/ 3

The intorduction of SAML:Versions SAML 1.0 was adopted as an OASIS standard in Nov 2002 SAML 1.1 was ratified as an OASIS standard in Sep 2003 SAML 2.0 became an OASIS standard in Mar 2005 4

The intorduction of SAML:Standards SAML is built upon the following technology standards: Extensible Markup Language (XML) XML Schema XML Signature XML Encryption (SAML 2.0 only) Hypertext Transfer Protocol (HTTP) SOAP 5

The intorduction of SAML:Components Assertions: Authentication, Attribute and Authorization information Protocol: Request and Response elements for packaging assertions Bindings: How SAML Protocols map onto standard messaging or communication protocols Profiles: How SAML protocols, bindings and assertions combine to support a defined use case Profiles Bindings Protocol Assertions 6

The intorduction of SAML:Why SAML? Permissions management data is currently handled in mostly proprietary ways, among tightly coupled modules in a single security domain. Web is loosely coupled, consisting of many security domains. A standard is needed to govern the transfer of assertions between domains. 7

SAML Use Case: SSO 1. authenticate site1 (security domain 1) asserting party user 2. access resource user is authenticated at site1; then accesses a resource at site2 site2 (security domain 2) 8 relying party

SAML Use Case: authorization relying party 1. access resource policy enforcement point user 2. check permission same security domain authorization decision not made at site of resource policy decision point asserting party 9

SAML Use Case: Why SAML? Cookies don t do it Cookie (signed with server s private key) can be used for reauthentication at a particular server, but is of no use at a different server Cross domain authentication currently requires proprietary SSO software SAML intended as a Web standard that will supercede proprietary software 10

The manner of SAML working Browser/Artifact Browser, authenticated at site1 (asserting party) requests access to a resource at site2 (relying party). site1 creates a protocol message containing an authentication statement and a reference to that message called an artifact site2 pulls the protocol message from site1 using the artifact 11

Artifact A string consisting of Identity of source site (asserting party) Reference to a protocol message at source site Use: relying party wants to retrieve assertions in a protocol message at the asserting party; supplies an artifact that identifies the message 12

Artifact Pull Model site2 SAML protocol relying party, R resource, X (5) SAMLreq(artif) SAMLresp(M) (4) asserting party, P message, M 1. U creates authenticated browser, U session with P 2. U requests access to X (through P). 3. P creates protocol msg, M, containing assertion about U, and an artifact referring to M 4. Access, containing artifact, is redirected from P to R through browser 5. R pulls M (identified by artifact) from P (2) (1) artif is an artifact referencing M (3) site1 13

Browser/Post Model relying party resource, X asserting party assertion, A (3) site2 (4) (2) (1) site1 browser, U 1. U creates authenticated session 2. U accesses remote resource X through asserting party. 3. A asserts fact about U 4. Access, containing signed assertion, is redirected (pushed) through browser to relying party (signature required since assertion is routed through browser) 14

Risks on SAML Risk Spreading there are security risks the spread of the problem, namely, if an attacker to steal the legitimate user authentication certificate, can pretend to be legitimate users access to all resources 15

Risks on SAML Replay Attack A typical SAML 1.1 assertion: <saml:assertion xmlns:saml="urn:oasis:names:tc:saml:1.0:assertion " MajorVersion="1" MinorVersion="1" AssertionID="a75adf55-01d7-40cc-929fdbd8372ebdfc" IssueInstant="2013-12-05T09:22:02Z" Issuer="https://idp.example.org/saml"> <saml:conditions NotBefore="2013-4-05T09:17:02Z" NotOnOrAfter="2013-5-05T09:27:02Z"/> <!-- insert statement here --> </saml:assertion> 16

Risks on SAML man-in-the-middle attack 17

Risks on SAML denial of service attack 18

Security Policy on SAML Spread Risk Security Policy For through the legitimate user login authentication, for user generated by IDP status notes, in the authentication ticket, delimits the scope of users to access the service address list and time limit 19

Security Policy on SAML Replay attacks on security policy Solution one: Reasonable set up effectively the validity of the assertion is particularly important, but it cannot completely solve the replay attack Solution two: SAML is follow the XML standard. As a result, can in the session layer is encrypted so that the attacker completely don't have access to any content that is transferred 20

Security Policy on SAML Man-in-the-middle attack security policy 21

Security Policy on SAML Denial of service attack security policy 1 The session layer user authentication 2 The request message signature 3 Limit users can send requested information 22

Summary My Report Detailed introduces the related knowledge of SAML This course report explores the analysis of the SAML SSO exist some safety risks and proposed the corresponding security strategy, to build security based on SAML SSO system has important reference significance and value 23

THANK YOU 24