SAML V2.0 Asynchronous Single Logout Profile Extension Version 1.0



Similar documents
SAML 2.0 INT SSO Deployment Profile

XACML Profile for Role Based Access Control (RBAC)

Word Specification Sample

Customer Information Quality Specifications Version 3.0 Name (xnl), Address (xal), Name and Address (xnal) and Party (xpil)

[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol

Identity in the Cloud Use Cases Version 1.0

Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0

MACE-Dir SAML Attribute Profiles

Security Assertion Markup Language (SAML) V2.0 Technical Overview

Chris Smith, Platform Computing Marvin Theimer, Microsoft Glenn Wasson, UVA July 14, 2006 Updated: October 2, 2006

Liberty ID-WSF Multi-Device SSO Deployment Guide

Bindings for the Service Provisioning Markup Language (SPML) Version 1.0

[MS-SAMLPR]: Security Assertion Markup Language (SAML) Proxy Request Signing Protocol Specification

Universal Business Process Part 2: ebcppa

Kantara egov and SAML2int comparison

Feide Integration Guide. Technical Requisites

[MS-ASMS]: Exchange ActiveSync: Short Message Service (SMS) Protocol

eb Service Oriented Architecture Catalog of Patterns

How To Write A Wsdl Standard For Csta (Ecma) And Cst A) (Ecmma)

Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0

[MS-DVRD]: Device Registration Discovery Protocol. Intellectual Property Rights Notice for Open Specifications Documentation

CA Nimsoft Service Desk

Standard Registry Development and Publication Process

Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0

XML Document Management Architecture

HTTP State Management

Web Services Security SOAP Messages with Attachments (SwA) Profile 1.1

Common definitions and specifications for OMA REST interfaces

Web Services Security: SAML Token Profile 1.1

SAML 2.0 Interoperability Testing Procedures

Digital Signature Web Service Interface

Shibboleth Architecture

Web Services Manageability Concepts (WS-Manageability)

Network Working Group

Bindings for the OASIS Security Assertion Markup Language (SAML) V2.0

Unstructured Information Management Architecture (UIMA) Version 1.0

Certificate profile for certificates issued by Central Signing services

Reference Architecture for Service Oriented Architecture Version 1.0

Cloud Infrastructure Management Interface - Common Information Model (CIMI-CIM)

[MS-ACCDT]: Access Template File Format. Intellectual Property Rights Notice for Open Specifications Documentation

SAML 2.0 protocol deployment profile

Network Working Group. Category: Standards Track October 2006

Cyber Authentication Technology Solutions Interface Architecture and Specification Version 2.0: Deployment Profile

SAML and OAUTH comparison

Federation Operator Practice (FOP): Metadata Registration Practice Statement

Authentication Context Classes for Levels of Assurance for the Swedish eid Framework

Open Cloud Computing Interface - Monitoring Extension

SD Specifications Part 1 NFC (Near Field Communication) Interface Simplified Addendum

SAML Federated Identity at OASIS

The Global Justice Reference Architecture (JRA) Web Services Service Interaction Profile

Single Logout. TF-EMC Vienna 17 th February Kristóf Bajnok NIIF Institute

[MS-BDSRR]: Business Document Scanning: Scan Repository Capabilities and Status Retrieval Protocol

Presence SIMPLE Architecture

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

Outage Notification. "Acknowledgment: This material is based upon work supported by the Department of Energy under Award Number DE-OE

Open Source Software used in the product

Non-Proprietary User Agreement No. NPUSR00xxxx SAMPLE BETWEEN

IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0

Implementation Guide SAP NetWeaver Identity Management Identity Provider

OPEN DATA CENTER ALLIANCE SM USAGE MODEL: E-DISCOVERY AND FORENSICS

docs.rackspace.com/api

Content Management Interoperability Services (CMIS) Version 1.1

[MS-CCEIP]: Corporate Customer Experience Improvement Program Client-to-Server Protocol

Adobe XML Architecture

DocuSign Single Sign On Implementation Guide Published: March 17, 2016

DualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.

WI-FI ALLIANCE INTELLECTUAL PROPERTY RIGHTS POLICY

SAML Security Option White Paper

ENHANCED HOST CONTROLLER INTERFACE SPECIFICATION FOR UNIVERSAL SERIAL BUS (USB) ADOPTERS AGREEMENT

IBM WebSphere Application Server

Oracle Endeca Information Discovery Integrator

Get Success in Passing Your Certification Exam at first attempt!

Novell LDAP Proxy Server

Service Provisioning Markup Language (SPML) Version 1.0

Transcription:

SAML V2.0 Asynchronous Single Logout Profile Extension Version 1.0 Committee Specification 01 22 November 2012 Specification URIs This version: http://docs.oasis-open.org/security/saml/post2.0/saml-async-slo/v1.0/cs01/saml-async-slo-v1.0- cs01.odt (Authoritative) http://docs.oasis-open.org/security/saml/post2.0/saml-async-slo/v1.0/cs01/saml-async-slo-v1.0- cs01.html http://docs.oasis-open.org/security/saml/post2.0/saml-async-slo/v1.0/cs01/saml-async-slo-v1.0- cs01.pdf Previous version: N/A Latest version: http://docs.oasis-open.org/security/saml/post2.0/saml-async-slo/v1.0/saml-async-slo-v1.0.odt (Authoritative) http://docs.oasis-open.org/security/saml/post2.0/saml-async-slo/v1.0/saml-async-slo-v1.0.html http://docs.oasis-open.org/security/saml/post2.0/saml-async-slo/v1.0/saml-async-slo-v1.0.pdf Technical Committee: OASIS Security Services (SAML) TC Chairs: Thomas Hardjono (hardjono@mit.edu), M.I.T. Nate Klingenstein (ndk@internet2.edu), Internet2 Editors: Chad La Joie (lajoie@itumi.biz), Internet2 Scott Cantor (cantor.2@osu.edu), Internet2 Additional artifacts: This prose specification is one component of a Work Product which also includes: XML schema: http://docs.oasis-open.org/security/saml/post2.0/saml-async-slo/v1.0/cs01/xsd/ Related work: This specification is related to: Security Assertion Markup Language (SAML) v2.0. OASIS Standard. http://docs.oasis-open.org/security/saml/v2.0/saml-2.0-os.zip Declared XML namespace: urn:oasis:names:tc:saml:2.0:protocol:ext:async-slo Abstract: This document defines an extension to the SAML 2.0 Single Logout Protocol that allows the initiator to indicate that it does not expect to receive a response from the session authority. This improves user interface interoperability in deployments that want the identity provider to control the user experience during logout. Standards Track Work Product Copyright OASIS Open 2012. All Rights Reserved. Page 1 of 10

Status: This document was last revised or approved by the OASIS Security Services (SAML) TC on the above date. The level of approval is also listed above. Technical Committee members should send comments on this Work Product to the Technical Committee s email list. Others should send comments to the Technical Committee by using the "Send A Comment" button on the Technical Committee s web page at http://www.oasisopen.org/committees/security/. For information on whether any patents have been disclosed that may be essential to implementing this Work Product, and any offers of patent licensing terms, please refer to the Intellectual Property Rights section of the Technical Committee web page (http://www.oasisopen.org/committees/security/ipr.php). Citation format: When referencing this Work Product the following citation format should be used: [SAML-Async-SLO] SAML V2.0 Asynchronous Single Logout Profile Extension Version 1.0. 22 November 2012. OASIS Committee Specification 01. http://docs.oasis-open.org/security/saml/post2.0/saml-asyncslo/v1.0/cs01/saml-async-slo-v1.0-cs01.html. Standards Track Work Product Copyright OASIS Open 2012. All Rights Reserved. Page 2 of 10

Notices Copyright OASIS Open 2012. All Rights Reserved. All capitalized terms in the following text have the meanings assigned to them in the OASIS Intellectual Property Rights Policy (the "OASIS IPR Policy"). The full Policy may be found at the OASIS website. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published, and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this section are included on all such copies and derivative works. However, this document itself may not be modified in any way, including by removing the copyright notice or references to OASIS, except as needed for the purpose of developing any document or deliverable produced by an OASIS Technical Committee (in which case the rules applicable to copyrights, as set forth in the OASIS IPR Policy, must be followed) or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by OASIS or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and OASIS DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY OWNERSHIP RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. OASIS requests that any OASIS Party or any other party that believes it has patent claims that would necessarily be infringed by implementations of this OASIS Committee Specification or OASIS Standard, to notify OASIS TC Administrator and provide an indication of its willingness to grant patent licenses to such patent claims in a manner consistent with the IPR Mode of the OASIS Technical Committee that produced this specification. OASIS invites any party to contact the OASIS TC Administrator if it is aware of a claim of ownership of any patent claims that would necessarily be infringed by implementations of this specification by a patent holder that is not willing to provide a license to such patent claims in a manner consistent with the IPR Mode of the OASIS Technical Committee that produced this specification. OASIS may include such claims on its website, but disclaims any obligation to do so. OASIS takes no position regarding the validity or scope of any intellectual property or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; neither does it represent that it has made any effort to identify any such rights. Information on OASIS' procedures with respect to rights in any document or deliverable produced by an OASIS Technical Committee can be found on the OASIS website. Copies of claims of rights made available for publication and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this OASIS Committee Specification or OASIS Standard, can be obtained from the OASIS TC Administrator. OASIS makes no representation that any information or list of intellectual property rights will at any time be complete, or that any claims in such list are, in fact, Essential Claims. The name "OASIS" is a trademark of OASIS, the owner and developer of this specification, and should be used only to refer to the organization and its official outputs. OASIS welcomes reference to, and implementation and use of, specifications, while reserving the right to enforce its marks against misleading uses. Please see http://www.oasis-open.org/policies-guidelines/trademark for above guidance. Standards Track Work Product Copyright OASIS Open 2012. All Rights Reserved. Page 3 of 10

Table of Contents 1 Introduction... 5 1.1 Terminology... 5 1.2 Normative References... 5 2 Single Logout Protocol Extension for Asynchronous Requests...7 2.1 Element <aslo:asynchronous>...7 2.2 Asynchronous Logout Request Processing...7 2.3 Metadata Considerations...7 3 Conformance... 8 Appendix A Acknowledgments... 9 Appendix B Revision History... 10 Standards Track Work Product Copyright OASIS Open 2012. All Rights Reserved. Page 4 of 10

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 1 Introduction This document defines an extension to the Single Logout Protocol that allows the initiator to indicate that it does not expect to receive a response from the session authority. The SAML 2 Single Logout Protocol, defined in section 3.7 of [SAMLCore], provides for request delivery over front- and back-channel mechanisms. When logout is begun with an SP-initiated front-channel request, either the session authority or service provider may present a user interface to the user but neither entity knows, or can indicate, that it will perform this task. If both present such a UI, this would likely lead to user confusion. This extension allows the SP to signal to the session authority that the session authority is expected to present the UI. In addition, an entity may wish to directly initiate a logout (e.g., an administrator destroying a user's session). If such behavior is triggered by the delivery of a SAML 2 logout request (instead of via a proprietary mechanism), this extension informs the sessions authority that a response is not necessary. 1.1 Terminology The key words MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL in this document are to be interpreted as described in [RFC 2119]. Conventional XML namespace prefixes are used throughout the listings in this specification to stand for their respective namespaces as follows, whether or not a namespace declaration is present in the example: Prefix XML Namespace Comments samlp: urn:oasis:names:tc:saml:2.0:protocol This is the SAML V2.0 protocol namespace defined in the SAML V2.0 core specification [SAMLCore] aslo: urn:oasis:names:tc:saml:2.0:protocol:ext:async-slo The namespace defined by this document. xsd: http://www.w3.org/2001/xmlschema This namespace is defined in the W3C XML Schema specification [Schema1]. In schema listings, this is the default namespace and no prefix is shown. xsi: http://www.w3.org/2001/xmlschema-instance This is the XML Schema namespace for schemarelated markup that appears in XML instances [Schema1]. This specification uses the following typographical conventions in text: <ns:element>, Attribute, Datatype, OtherCode. This specification uses the following typographical conventions in XML listings: Listings of XML schemas appear like this. Listings of XML examples appear like this. These listings are non-normative. 1.2 Normative References [RFC 2119] S. Bradner. Key words for use in RFCs to Indicate Requirement Levels. IETF RFC 2119, March 1997. http://www.ietf.org/rfc/rfc2119.txt [SAMLCore] [SAML2Errata] OASIS Approved Standard, Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0, March 2005. http://docs.oasisopen.org/security/saml/v2.0/saml-2.0-os.zip OASIS Approved Errata, SAML V2.0 Errata, May 2012. http://docs.oasisopen.org/security/saml/v2.0/errata05/os/saml-v2.0-errata05-os.pdf Standards Track Work Product Copyright OASIS Open 2012. All Rights Reserved. Page 5 of 10

[SAMLMeta] OASIS Approved Standard, Metadata for the OASIS Security Assertion Markup Language (SAML) V2.0, March 2005. http://docs.oasisopen.org/security/saml/v2.0/saml-2.0-os.zip [Schema1] H. S. Thompson et al. XML Schema Part 1: Structures. World Wide Web Consortium Recommendation, May 2001. See http://www.w3.org/tr/2001/rec- xmlschema- 1-20010502/ Standards Track Work Product Copyright OASIS Open 2012. All Rights Reserved. Page 6 of 10

30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 2 Single Logout Protocol Extension for Asynchronous Requests 2.1 Element <aslo:asynchronous> The <aslo:asynchronous> element indicates that the containing <samlp:logoutrequest> is an asynchronous request and should be processed as described in the following section. The <aslo:asynchronous> element MUST appear within the <samlp:extensions> element of a <samlp:logoutrequest> element. The use of the <aslo:asynchronous> element outside of that context is not defined by this specification. <element name="asynchronous" type="aslo:asynchronoustype" /> <complextype name="asynchronoustype" /> 2.2 Asynchronous Logout Request Processing When a session authority receives a <samlp:logoutrequest> containing the asynchronous request extension, the session authority SHALL process the request as described in section 3.7.3.2 of [SAMLCore] except that the session authority MUST NOT send a <samlp:logoutresponse> to the request initiator. Note, because no <samlp:logoutresponse> is sent back to the request initiator, the session authority MUST provide all relevant feedback. For example, in the case of front-channel bindings, the session authority would display a web page indicating the success or failure of the logout process. 2.3 Metadata Considerations SAML metadata MAY be used to indicate support for this protocol extension at particular protocol endpoints, using the extension capabilities of the metadata schema. Support for this extension is expressed in SAML V2.0 metadata [SAMLMeta] by adding a boolean-typed XML attribute to an element derived from the md:endpointtype complex type, indicating that SAML request messages sent to that endpoint MAY include this extension. The following schema fragment defines the aslo:supportsasynchronous attribute: <attribute name="supportsasynchronous" type="boolean"/> Standards Track Work Product Copyright OASIS Open 2012. All Rights Reserved. Page 7 of 10

56 57 58 59 60 61 3 Conformance A logout request initiator conforms to this specification if it supports the inclusion of the <aslo:asynchronous> element as defined in section 2.1 of this specification. A session authority conforms to this specification if it can processes a logout request as defined primarily by [SAMLCore], as supplemented by section 2.2 of this specification. Standards Track Work Product Copyright OASIS Open 2012. All Rights Reserved. Page 8 of 10

62 63 64 65 66 67 68 69 70 71 72 73 Appendix A Acknowledgments The editors would like to acknowledge the contributions of the OASIS Security Services Technical Committee, whose voting members at the time of publication were: Scott Cantor, Internet2 Chad LaJoie, Internet2, Nate Klingenstein, Internet2, Thomas Hardjono, M.I.T. Frederick Hirsch, Nokia Corporation Hal Lockhart, Oracle Anil Saldhana, Red Hat Duane DeCouteau, Veteran's Health Administration Standards Track Work Product Copyright OASIS Open 2012. All Rights Reserved. Page 9 of 10

74 75 76 Appendix B Revision History Revision Date Editor Changes Made WD01 July 6, 2012 Chad La Joie Initial version WD02 Sep 4, 2012 Scott Cantor Added metadata portion, and a bit of cleanup. Standards Track Work Product Copyright OASIS Open 2012. All Rights Reserved. Page 10 of 10