Identity Management. (Re)discovering authorization APIs and LDAP model binding. Clément OUDOT



Similar documents
From centralized to single sign on

Federated Identity Management Solutions

BOF2337 Open Source Identity and Access Management Expert Panel, Part II. 23 September :30p Hilton - Golden Gate 6/7/8 San Francisco CA

Authentication Integration

Enabling SAML for Dynamic Identity Federation Management

SAML-Based SSO Solution

Identity opens the participation age. Dr. Rainer Eschrich. Program Manager Identity Management Sun Microsystems GmbH

Authentication Methods

LDAPCON Sébastien Bahloul

RSA Solution Brief. Federated Identity Manager RSA. A Technical Overview. RSA Solution Brief

LinShare offer. Presentation. February Secure file sharing. LinShare 1.5

The Primer: Nuts and Bolts of Federated Identity Management

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

Open Source Identity Management

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

Upgrading User-ID. Tech Note PAN-OS , Palo Alto Networks, Inc.

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014

Federated Identity for Cloud Computing and Cross-organization Collaboration

Using LDAP Authentication in a PowerCenter Domain

Setting up LDAP settings for LiveCycle Workflow Business Activity Monitor

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Single Sign-On: Reviewing the Field

LDAP Directory Integration with Cisco Unity Connection

The Primer: Nuts and Bolts of Federated Identity Management

Spring Security 3. rpafktl Pen source. intruders with this easy to follow practical guide. Secure your web applications against malicious

API-Security Gateway Dirk Krafzig

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.

Configuring and Using the TMM with LDAP / Active Directory

SAML-Based SSO Solution

LinuxCon North America

Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015

Research and Implementation of Single Sign-On Mechanism for ASP Pattern *

Securing WebFOCUS A Primer. Bob Hoffman Information Builders

Getting Started with Clearlogin A Guide for Administrators V1.01

About Me. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack

Single Sign On. SSO & ID Management for Web and Mobile Applications

Distributed Identity Management Model for Digital Ecosystems

Enabling Applications to Use Your Identity Management System

LDaemon. This document is provided as a step by step procedure for setting up LDaemon and common LDaemon clients.

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide

Mobile Devices: Server and Management Lesson 06 Device Management

Federated Identity and Single Sign-On using CA API Gateway

Configuring User Identification via Active Directory

Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence. Greg Wcislo

PGP Desktop LDAP Enterprise Enrollment

Apache Authentication, Authorization, and Access Control Concepts Version 2.2

Configuring Sponsor Authentication

Authentication and Single Sign On

CA Performance Center

September 9 11, 2013 Anaheim, California 507 Demystifying Authentication and SSO Options in Business Intelligence

Designing a Windows Server 2008 Applications Infrastructure

SSM6437 DESIGNING A WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE

Authentication and access control in Sympa mailing list server

X.500 and LDAP Page 1 of 8

How To Get A Single Sign On (Sso)

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Final Project Report December 9, Cloud-based Authentication with Native Client Server Applications. Nils Dussart

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

WebLogic Server 7.0 Single Sign-On: An Overview

Importing data from Linux LDAP server to HA3969U

Using Kerberos for Web Authentication. Wesley Craig University of Michigan

Liberty Alliance. CSRF Review. .NET Passport Review. Kerberos Review. CPSC 328 Spring 2009

From the Intranet to Mobile. By Divya Mehra and Stian Thorgersen

The Top 5 Federated Single Sign-On Scenarios

Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect

Okta/Dropbox Active Directory Integration Guide

Chapter 3 Authenticating Users

OpenLDAP Oracle Enterprise Gateway Integration Guide

Directory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107

Interoperable Provisioning in a Distributed World

The Role of Federation in Identity Management

OPENIAM ACCESS MANAGER. Web Access Management made Easy

Skyward LDAP Launch Kit Table of Contents

Securing Web Services With SAML

Extend and Enhance AD FS

VMware Identity Manager Integration with Active Directory Federation Services 2.0

CA SiteMinder. Directory Configuration - OpenLDAP. r6.0 SP6

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.

Connecting Users with Identity as a Service

Microsoft Active Directory Authentication with SonicOS 3.0 Enhanced and SonicOS SC 1.0 (CSM 2100CF)

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

Transcription:

Identity Management (Re)discovering authorization APIs and LDAP model binding Clément OUDOT OpenWorldForum - 01/12/2008

Speaker Clément OUDOT Work for LINAGORA Group since 2003 Take part in important LDAP projects (eg: Ministry of Finance LDAP migration) FederID Project leader Involved in many IAM free softwares : - LemonLDAP::NG - InterLDAP - LSC project - charge - OpenLDAP Technical expert for LinID, the LINAGORA IAM and Federation suite Page 2

LINAGORA Group With more than 160 employees, agencies in Paris, Bruxelles, San Francisco, Lyon, Marseille and Toulouse, LINAGORA Group is a French leader in free software and wishes to become one of the most important European company in this part of the IT market. Group LINAGORA defines itself as Service Oriented Editor (an SOE). Its goals : - to develop Free Software with its R&D team ; - to become a trusted bridge between Open Source communities or editors and customers/users ; - to sell them an Open Source Software Assurance ; - and finally, to be an Open Source expert. Page 3

IAM: a question of Identity A digital entity is a set of attributes describing an entity A subset named credentials are used for authentication An entity (a user) can own many identities Each identity has roles and rights within an application (service provider) Page 4

IAM: a question of Identity Services provider manage the identities : - For a service provider : 1 user = 1 identity - For an user : 1 service = 1 identity Page 5

IAM: a question of Identity We need Identity Management! - Referential of identities (LDAP Directory) - Provisioning services - Access control on data (LDAP ACLs) - Access control on applications (SSO rules) We need Identity Federation! - Keep different identities for private life purpose - Federate accounts to benefits from other services Page 6

Why use LDAP? LDAP directories: - Hierachical view - Object data model - Integrated security functions (bind, SASL, TLS) - STANDARD (LDAPv3 in 1998) - Speed, scalability, duplication,... A big offer in Open Source: - OpenLDAP - ApacheDS - OpenDS (SUN) - Fedora Directory Server - Madriva Directory Server Page 7

Federation standards Parallel standards: - Liberty Alliance : ID-FF, ID-WSF, ID-SIS - Shibboleth (Internet2) - WS-* (Microsoft) - SAML (OASIS) - OpenID (the newcomer) Standards convergence: - Shibboleth and Liberty Alliance will share a common standard: SAML 2.0 Page 8

Authorization? Authorization come after authentication Authorization covers : - Access to data - Access to applications But applications have access to data... Page 9

Access to data Scope : - Publish information for employees (white pages/yellow pages) - Edit information (self-service/administration) - Authentication Problem: how describe relations between actors, targets and operations? Each directory product provides its own way of writing Access Control Lists (ACLs) InterLDAP suggest one solution : LDAP Query Language (LQL) Page 10

LDAP Query Language For reading only Doing searches on results of a primary search LQL request can be stored as an LDAP attribute value LQL example : attribute(attribute(sup(search(ou=structs,$namingcontext, $targetrdn),1),manager),cn) Page 11

LDAP Query Language LQL functions: - search/list/read (DN, FILTER) - sup (DN, N): raise the tree from DN for N levels - fsup (BASE, FILTER): return the first parent of BASE selected by FILTER - and/or: union/intersection - group (DNGROUP, DNMEMBER): check if DNMEMBER belongs to DNGROUP - concat: strings concatenation Page 12

LDAP Query Language And some variables: - $namingcontext: suffix of the tree. - $targetdn: DN targeted by the operation. - $targetrdn: RDN targeted by the operation. - $authordn: DN of the author of the operation (as it is bound on the directory). - $authorrdn: RDN of the author of the operation. Page 13

LDAP Query Language LQL used to configure InterLDAP-WUI authorization framework (XML) Example : <property name="name" value="interldapdemousager_r_self"/> <property name="module" value=""/> <property name="relation"><value><![cdata[ list("${ldap.interldapdemo.usagers.ou}", "(&(mail=$principalrdn) (mail=$targetrdn))" ); ]]></value></property> <property name="targetdn" value="${ldap.interldapdemo.usagers.ou}"/> <property name="rights" value="r"/> <property name="attributes"> <list> <value>mail</value> <value>cn</value> </list> </property> Page 14

LinID Content Manager Page 15

Main components Page 16

Screen shot of LinID Content Manager Page 17

Some interesting LDAP controls Proxy-Authz control: - Before this control, need to maintain a connection on the directory per user - Now, we can use pool of connection with rootdn binds + Proxy-Authz No-op control: - Goal: know if a user can write before writing! - Need to test the alternative 'Get effective rights' Page 18

Access to application Legacy applications: authorize by creating/deleting accounts Open Web Applications: authorize by delegating authentication and authorization to a dedicated service : - WebSSO server - Federation Identity Provider LinID Access Manager (LemonLDAP::NG) offers a full WebSSO service, linked to LDAP directory to manage authentication and authorization : - LDAP native authentication - LDAP filters or LDAP groups to manage authorizations - LDAP Password Policy LemonLDAP::NG can delegate its own authentication to Kerberos, SSL, Liberty Alliance... Page 19

How WebSSO works Page 20

LinID Access Manager Page 21

Screen shot a WebSSO Manager Page 22

Federation standards Parallel standards: - Liberty Alliance : ID-FF, ID-WSF, ID-SIS - Shibboleth (Internet2) - WS-* (Microsoft) - SAML (OASIS) - OpenID (the newcomer) Standards convergence: - Shibboleth and Liberty Alliance will share a common standard: SAML 2.0 Page 23

Liberty Alliance Grounded in 2001 by SUN and 13 others partners More than 150 members Goals: - Open Federation Standard - Respect of private life in numeric space 3 frameworks: - ID-FF (Federation Framework) [now SAML 2.0]: SSO, SLO,... - ID-WSF (Web Services Framework): attributes sharing,... - ID-SIS (Service Interface Specifications): services interactions,... Page 24

A simple Liberty Alliance Circle of Trust (CoT) Service Provider Identity Provider User interaction Web service Page 25 Attributes Provider Service Provider

Identity federation workflow Page 26

More than one circle of trust User interaction Web service Page 27

LinID Federation Manager Page 28

Sample architecture (FederID project) Content Management [WUI] Identity Provider Authentic LDAP Directory Attribute Provider [LAAP] Circle of Trust SSO & Authorizations Standard Web application Page 29 Standard Web application Service Provider

Thanks for your attention