Single Sign-on Integration With PKI



Similar documents
Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies

Using SAML for Single Sign-On in the SOA Software Platform

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Technical Certificates Overview

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008

CA Nimsoft Service Desk

Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y

CA Spectrum and CA Embedded Entitlements Manager

Integrating OID/SSO with E- Business Suite and Third-Party SSO Solutions. Presented by Paul Jackson (Norman Leach)

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

An Oracle White Paper September Directory Services Integration with Database Enterprise User Security

DIGIPASS as a Service. Google Apps Integration

How To Secure An Rsa Authentication Agent

Copyright

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

SAML Security Option White Paper

SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Public Key Infrastructure. A Brief Overview by Tim Sigmon

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

Microsoft Dynamics GP. Electronic Signatures

Single Sign-on (SSO) technologies for the Domino Web Server

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace

CA Performance Center

Synology SSO Server. Development Guide

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Google Apps Deployment Guide

Oracle Business Intelligence Enterprise Edition LDAP-Security Administration. White Paper by Shivaji Sekaramantri November 2008

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

OracleAS 10g: Enterprise Identity Management

OpenLDAP Oracle Enterprise Gateway Integration Guide

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

Dell One Identity Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

Version 9. Active Directory Integration in Progeny 9

Oracle E-Business Suite (R12) Integration with OID/OAM 11g

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Configuring IBM Cognos Controller 8 to use Single Sign- On

Securing SAS Web Applications with SiteMinder

The Digital Certificate Journey from RACF to PKI Services Part 2 Session J10 May 11th 2005

Integration Guide. SafeNet Authentication Service. Oracle Secure Desktop Using SAS RADIUS OTP Authentication

An Oracle White Paper Dec Oracle Access Management Security Token Service

New Security Features

QLIKVIEW MOBILE SECURITY

Security Digital Certificate Manager

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

Security Digital Certificate Manager

Setup Guide Access Manager 3.2 SP3

TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience

Agenda. How to configure

BlackShield ID Agent for Remote Web Workplace

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Using etoken for Securing s Using Outlook and Outlook Express

Oracle Access Manager. An Oracle White Paper

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE

Oracle Enterprise Single Sign-on Provisioning Gateway. Administrator Guide Release E

HP Software as a Service. Federated SSO Guide

SAML-Based SSO Solution

Copyright: WhosOnLocation Limited

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365

Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016

CA SiteMinder SSO Agents for ERP Systems

Omniquad Exchange Archiving

An Oracle White Paper October Frequently Asked Questions for Oracle Forms 11g

Certificate Management

Introduction to the EIS Guide

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Server Installation Guide ZENworks Patch Management 6.4 SP2

Microsoft Dynamics GP. Engineering Data Management Integration Administrator s Guide

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

Centrify Mobile Authentication Services for Samsung KNOX

Perceptive Experience Single Sign-On Solutions

About Contract Management

Installation Guide. SafeNet Authentication Service

Archiving User Guide Outlook Plugin. Manual version 3.1

Centrify Mobile Authentication Services

HP ProtectTools Embedded Security Guide

RSA Security Analytics Netflow Collection Configuration Guide

CA Unified Infrastructure Management Server

RSA Security Analytics Netflow Collection Configuration Guide

CERTIFICATE-BASED SINGLE SIGN-ON FOR EMC MY DOCUMENTUM FOR MICROSOFT OUTLOOK USING CA SITEMINDER

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Security Guide. BES12 Cloud

Siteminder Integration Guide

An Introduction to Entrust PKI. Last updated: September 14, 2004

CRM to Exchange Synchronization

Integrating Biometrics into the Database and Application Server Infrastructure. Shirley Ann Stern Principal Product Manager Oracle Corporation

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide

Siebel CRM On Demand Single Sign-On. An Oracle White Paper December 2006

Front-Office Server 2.7

Dell One Identity Cloud Access Manager How to Configure vworkspace Integration

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

EVault Endpoint Protection 7.0 Single Sign-On Configuration

PrinterOn Print Management Overview

How To Use Netiq Access Manager (Netiq) On A Pc Or Mac Or Macbook Or Macode (For Pc Or Ipad) On Your Computer Or Ipa (For Mac) On An Ip

Novell Access Manager

OVERVIEW. DIGIPASS Authentication for Office 365

Transcription:

Session 100 Single Sign-on Integration With PKI Dan Norris norris@celeritas.com Senior Consultant Celeritas Technologies, LLC

Copyright 2004 Celeritas Technologies, L.L.C. This work was created by Celeritas Technologies, L.L.C. ( Creator ). This work and all rights therein and thereto, including copyright rights and/or patent rights, are owned by Creator and/or another entity (collectively, Owner ). This shall serve as notice of such ownership as of the date of this and associated files or subject matter, if any, as depicted above and/or as depicted with an electronic file date stamp and/or any versions thereof and their associated dates, if any. This work may not be reproduced for any purpose, distributed, modified, reverse-engineered, stored in a retrieval system, transmitted, used, made, offered for sale, or sold, in whole or part, in any form or by any means, electronic, mechanical, audio, photocopying, recording, or otherwise, without the prior written permission of Owner. This work may not be exported unless in compliance with the applicable technology export laws. While this information is presented in good faith and believed to be accurate, Creator does not guarantee satisfactory or any results from reliance upon such information. Creator reserves the right, without notice, to alter or improve the designs, specifications, creations, or works of the subject matter herein. Nothing herein is to be construed as a warranty or guarantee, express or implied, against infringement, or regarding performance, merchantability, fitness, or any other matter with respect to products, processes, or any other subject matter herein, and such warranties and guaranties are expressly disclaimed. Nothing herein is to be construed as a recommendation to use any product or process in conflict with any third party rights in any intellectual property. All products, languages, or trademarked names that are mentioned in this work are acknowledged to be the proprietary property of the respective owner.

IOUG RAC SIG Events Today, 12 noon, Room 709: Expert presentation Workload Distribution in a RAC Environment Tomorrow (Tuesday), 12 noon, Room 709: RAC SIG Roundtable Stump Your Peers Lunch provided both days at Room 709

Agenda What PKI is and is not 9iAS SSO overview 9iAS SSO with digital certificates 9iAS SSO third-party integration point Web-based PKI sign-on Steps to integrate 9iAS SSO with web-based PKI sign-on Q & A

What PKI Is (and Is Not) Private Key Mathematically Linked Key Pair Public Key Two mathematically-related, yet separate keys (based on large prime numbers) private key: secret, not shared, stored encrypted public key: shared, published in a public location Two main applications: Digital Signatures Symmetric Key Transport

Digital Signatures HASH: lsfg30y3jlac Signature: a;slfjd30984 verified = HASH: lsfg30y3jlac Private Key Public Key HASH: lsfg30y3jlac Encrypt a hash of the message (encrypting whole message is more costly, but possible) Client receives message, hashes it, decrypts the sender s hash (using sender s public key or their own private key) and verifies

Symmetric Key Transport Bob creates SECRET: sb80u35y% Alice s Public Key Encrypted SECRET: alfdb4sdfb423@#%22!# Alice s Private Key Alice now has same SECRET: sb80u35y% Symmetric Encryption using SECRET Bob Alice Create a secret key, encrypt it for a specific recipient using the recipient's public key Only that recipient can decrypt the message (containing a shared secret) using their private key

What PKI Is: Authentication: who you are Positive identification of other identities Asynchronous in nature Is not: Authorization: what you can do (now that we know you) Fast for encryption of large data payloads

PKI Components Certification Authority (CA) Registration Authority (RA) Online repository (usually LDAP or X.500) End entities (users, computers, applications) Certificate Revocation List (CRL) Public Key Certificate (X.509v3)

Agenda What PKI is and is not 9iAS SSO overview 9iAS SSO with digital certificates 9iAS SSO third-party integration point Web-based PKI sign-on Steps to integrate 9iAS SSO with web-based PKI sign-on Q & A

9iAS SSO Partner Applications 9iAS SSO Architecture 9iAS Infrastructure Step 2 Delegation iasdb Client Steps 1, 3

9iAS SSO Architecture HTTP Server mod_plsql mod_oc4j OC4J oiddas Oracle Wallet oidldapd orasso iasdb ods

9iAS SSO Login Flow (normal) 1. User attempts to access 9iAS SSO partner application (i.e. Portal) 2. Partner app redirects user to SSO server for authentication

9iAS SSO Login Flow (normal) 3. User submits their username/password via standard login form. 4. SSO Server locates DN for user in OID and attempts to bind to LDAP directory as that DN using the password given 5. If LDAP bind successful, SSO cookies are set for partner application and user is redirected back to partner application.

Agenda What PKI is and is not 9iAS SSO overview 9iAS SSO with digital certificates 9iAS SSO third-party integration point Web-based PKI sign-on Steps to integrate 9iAS SSO with web-based PKI sign-on Q & A

9iAS SSO with digital certificates Client 9iAS Infrastructure OID Mapping module: wwsso_map_dn.map_name X.509 cert with DN: cn=john Doe, o=celeritas, c=us dn: cn=jdoe,dc=celeritas,dc=com usercertificate:: sadasgu49ua Validation

9iAS SSO Login Flow (w/ certs) 1. User attempts to access 9iAS SSO partner application (i.e. Portal) 2. Partner app redirects user to SSO server for authentication 3. Browser sends client s X.509 certificate to server.

9iAS SSO Login Flow (w/ certs) 4. SSO Server runs DN mapping procedure to map DN from certificate to DN in LDAP 5. Comparison of X.509 certificate with usercertificate attribute of LDAP entry determines whether authentication is successful or not

Agenda What PKI is and is not 9iAS SSO overview 9iAS SSO with digital certificates 9iAS SSO third-party integration point Web-based PKI sign-on Steps to integrate 9iAS SSO with web-based PKI sign-on Q & A

9iAS SSO Third-Party Integration 9iAS Infrastructure Delegation iasdb Third-party Sign-on Delegation Client 9iAS SSO Partner Applications

9iAS SSO Integration Point 9iAS 9.0.2 Single Sign-on Administrator s Guide, Chapter 5, details the WWSSO_AUTH_EXTERNAL package interface. authenticate_user function is executed before the default 9iAS SSO login dialog is displayed If authenticate_user returns a valid SSO username, the SSO server trusts this to be the username and the 9iAS SSO cookies are set accordingly.

9iAS SSO Login Flow w/ 3 rd Party 1. User attempts to access 9iAS SSO partner application (i.e. Portal) 2. Partner app redirects user to SSO server for authentication 3. In order to access the mod_plsql SSO DAD, the user must first authenticate with the third-party application

9iAS SSO Login Flow w/ 3 rd Party 4. Once the third-party application authenticates the user, the original request is submitted to the HTTP server, and wwsso_auth_external.authenticate_user is executed. 5. authenticate_user reads an HTTP header set by the third-party module to match third-party user to SSO username (may require lookups)

9iAS SSO Login Flow w/ 3 rd Party 6. Once SSO username is determined, p_user OUT parameter is set and authenticate_user procedure exits 7. SSO server identifies user by setting 9iAS SSO cookie for partner application and redirects user back to originally-requested partner application

Agenda What PKI is and is not 9iAS SSO overview 9iAS SSO with digital certificates 9iAS SSO third-party integration point Web-based PKI sign-on Steps to integrate 9iAS SSO with web-based PKI sign-on Q & A

Web-based PKI Sign-on Client 9iAS Infrastructure with 3 rd Party Sign-on application deployed (if thin client) Secure Credential Repository (roaming server) Check for revocation Client may provide key CRL Repository

Agenda What PKI is and is not 9iAS SSO overview 9iAS SSO with digital certificates 9iAS SSO third-party integration point Web-based PKI sign-on Steps to integrate 9iAS SSO with web-based PKI sign-on Q & A

Integration Steps for SSO w/pki 1. Deploy 3 rd -Party Sign-on with 9iAS Infrastructure 2. Test 3 rd -Party Sign-on independently (no SSO integration yet) 3. Configure 9iAS Infrastructure HTTP server to for 3 rd -party integration

Integration Steps for SSO w/pki 4. Create and install WWSSO_AUTH_EXTERNAL package body 5. Protect the orasso mod_plsql DAD with 3 rd -party protection 6. Test/Debug

Actual Implementation Sign-on Flow 1. User accesses partner application and is redirected to 9iAS SSO in 9iAS Infrastructure (/pls/orasso?...) 2. HTTP server in 9iAS Infrastructure is configured with 3 rd -party module to protect /pls/orasso with 3 rd -party sign-on 3. 3 rd -party sign-on module takes over and presents sign-on dialog, authenticates user

Actual Implementation Sign-on Flow 4. User is allowed to access /pls/orasso?... (original request) and authenticate_user function is run to read HTTP_ENTRUST_CLIENT header to determine user s DN 5. DN is used to look up user in OID. If exists, set username to RDN of entry found and return. Else, look up user information in Entrust directory and create new OID entry, then return SSO username

Actual Implementation Sign-on Flow 6. SSO receives authoritative username from authenticate_user function and sets appropriate SSO cookies 7. User is redirected back to partner application with proper 9iAS SSO cookies in place to identify them

Troubleshooting Tips NOTE 198732.1 (debug_print & wwsso_log$) Use UTL_FILE in your custom code (wwsso_auth_external) for debugging and audit trail DBMS_LDAP does not seem to work with all LDAP directories LogLevel debug in httpd.conf exposes tons of information

IOUG RAC SIG Events Today, 12 noon, Room 709: Expert presentation Workload Distribution in a RAC Environment Tomorrow (Tuesday), 12 noon, Room 709: RAC SIG Roundtable Stump Your Peers Lunch provided both days at Room 709

Survey me please! Dan Norris Session 100: Single Sign-on Integration with PKI Monday, April 19 th, 10am Questions later? Send me an email at norris@celeritas.com.