Authentication and Single Sign On



Similar documents
Authentication Methods

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

SAML-Based SSO Solution

Setup Guide Access Manager 3.2 SP3

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

About Me. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack

Configuring EPM System for SAML2-based Federation Services SSO

Authentication Integration

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

Flexible Identity Federation

STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN

CA Performance Center

Perceptive Experience Single Sign-On Solutions

TIBCO Spotfire Platform IT Brief

HP Software as a Service. Federated SSO Guide

T his feature is add-on service available to Enterprise accounts.

Agenda. How to configure

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML

SAML Security Option White Paper

Setup Guide Access Manager Appliance 3.2 SP3

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring User Identification via Active Directory

Copyright: WhosOnLocation Limited

How To Use Netiq Access Manager (Netiq) On A Pc Or Mac Or Macbook Or Macode (For Pc Or Ipad) On Your Computer Or Ipa (For Mac) On An Ip

SAML-Based SSO Solution

CA Nimsoft Service Desk

Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS)

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

Administrator Guide. v 11

INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE

Using LDAP Authentication in a PowerCenter Domain

Central Administration QuickStart Guide

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

Business Internet service from Bell User Guide

Identity Server Guide Access Manager 4.0

ShibboLEAP Project. Final Report: School of Oriental and African Studies (SOAS) Colin Rennie

Microsoft Office 365 Using SAML Integration Guide

Workday Mobile Security FAQ

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

Getting Started with AD/LDAP SSO

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

OneLogin Integration User Guide

Talk Internet User Guides Controlgate Administrative User Guide

SSL VPN Technology White Paper

Connected Data. Connected Data requirements for SSO

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia Pedro Borges

Configuring. Moodle. Chapter 82

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x

Use Enterprise SSO as the Credential Server for Protected Sites

Using SAML for Single Sign-On in the SOA Software Platform

Configure Single Sign on Between Domino and WPS

How To Use Saml 2.0 Single Sign On With Qualysguard

SAP NetWeaver AS Java

NETASQ SSO Agent Installation and deployment

Egnyte Single Sign-On (SSO) Installation for OneLogin

FileCloud Security FAQ

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE

How to Pop to Outlook

Contents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings...

PARTNER INTEGRATION GUIDE. Edition 1.0

Single Sign-on (SSO) technologies for the Domino Web Server

Federated Identity Management Solutions

ADFS Integration Guidelines

Evaluation of different Open Source Identity management Systems

Active Directory Synchronization Agent for CRYPTO-MAS1.7

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

Configuring Parature Self-Service Portal

Single Sign On. SSO & ID Management for Web and Mobile Applications

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

Embedded Web Server Security

External Authentication with CiscoSecure ACS. Authenticating Users Using. SecurAccess Server. by SecurEnvoy

F5 BIG-IP: Configuring v11 Access Policy Manager APM

Setting Up Resources in VMware Identity Manager

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

NSi Mobile Installation Guide. Version 6.2

Microsoft Outlook Web Access 2013 Authenticating Users Using SecurAccess Server by SecurEnvoy

Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta

SchoolBooking SSO Integration Guide

Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence. Greg Wcislo

IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0

StreamServe Persuasion SP5 StreamStudio

Configuring IBM Cognos Controller 8 to use Single Sign- On

Secure Messaging Server Console... 2

External Authentication with Checkpoint R75.40 Authenticating Users Using SecurAccess Server by SecurEnvoy

IRMACS Setup. Your IRMACS is available internally by the IMAP protocol. The server settings used are:

Using Avaya Aura Messaging

User Guide. Version R91. English

WebNow Single Sign-On Solutions

MIS Export via the FEM transfer software

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.

Hosted Microsoft Exchange Client Setup & Guide Book

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

CA Unified Infrastructure Management Server

Absorb Single Sign-On (SSO) V3.0

Transcription:

Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication 3.2 Cached LDAP authentication 4. methods 4.1 with Fronter as authority (Fronter SSO) 4.1.1 WSDL 4.1.2 Methods 4.1.3 Key 4.1.4 Summary 4.1.5 Example of implementation 4.2 with external authority 4.2.1 Scenario 4.2.2 WSDL 4.2.3 Methods 4.2.4 Key 4.2.5 Summary 5. Authentication with an external IMAP server 6. Shibboleth2 (SAML) SSO Version control

1. Introduction This document is an overview of the authentication and routines available in the Fronter Software. The document is intended as guidance for Fronter s partners, clients and resellers. The scope of this document is exclusively authentication and SSO. Please refer to UAS and Interoperability documents for further details on identity management and user provisioning. 2. Fronter Authentication Authentication is based on 1) something you know, 2) something you have in your possession or 3) something you are. As most web based applications, Fronter currently supports the first of these three methods. This means that you know your password in order to login to Fronter. The password is either stored in the Fronter database or in a remote service. It is an advantage to have the password stored in a remote management system, since this will more easily enable a single-sign-on between more systems. 2.1 Passwords in Fronter If the users are created manually in Fronter, or imported users get their usernames and/or passwords provisioned by Fronter, the passwords are stored in the database and are encrypted with MD5. It is also possible to import encrypted password from other systems. When the user logs on, password and username are always sent from the browser with SSL encryption. In Fronter, all administrator users must have a complex password. The rules for a valid password are: The password must be at least 8 characters

Must contain letters from 3 of the 4 families: Small letters, Capital letters, numbers and special characters Cannot contain the Scandinavian letters äöåæø If the password only contains one capital letter, it cannot be the first letter If the password only contains one number, it cannot be last letter. It is possible to force these rules on all users to ensure security. This is achieved through setting 932 Password regime, set to Advanced in the installation s global settings. 2.2 Secure Sockets Layer SSL is a protocol used for encrypted data transfer. The protocol is situated between TCP/IP and application level protocols such as HTTP, LDAP or IMAP. The purpose of encrypted communication is to authenticate the server and/or the client, and is used to ensure that the data transmitted is kept confidential. In addition it ensures that the data is not altered during transmission, which may be the case of non-encrypted transfers. SSL communication over HTTP is normally done through port no 443. Thus, firewalls and other security instalments must allow data transfers to and from Fronter on this port. 2.3 Fronter remote authentication Fronter has the ability to authenticate users through an external resource. The supported methods of remote authentication are 1. Remote same sign-on authentication with external LDAP(S) servers (openldap, Active Directory, E-Directory etc.) 2. Single sign on based on Web Services 3. Remote authentication with an external IMAP server 4. SSO with Shibboleth federations

3. External authentication through remote LDAP 3.1 Regular LDAP authentication To enable LDAP authentication for users created or imported in Fronter, two steps must be completed: 1. Configure Fronter to communicate with your LDAP-server(s) 2. Change user accounts so the usernames match in both systems, and passwords connect to the LDAP authentication module To complete the first step, a test form is available at https:///[installationname]/testdata/ldaptest.phtml The results of a successful test will then need to be sent to Fronter for adding onto the installation s configuration. Please refer to the additional LDAP whitepaper, and the Fronter support site, for additional guidance and troubleshooting advice. To complete the second step, all users must be imported with the same username as in the external source. Additionally, the password has to be set to a code ldapx: where X denotes the LDAP server number in case there are several servers configured. For example, ldap1: would be used for all users that should be authenticated by LDAP server number 1. If authentication should happen with more than one system, use ldap2:, ldap3 : etc. With this authentication method, the user s password is always validated against the remote LDAP service, and not stored in Fronter at all. 3.2 Cached LDAP authentication The LDAP password can also be cached in the Fronter database. Then, the password is validated against the remote LDAP service only when it does not match, or if the user has not logged in previously. This will provide a fail-over in the sense that any unavailability in the remote LDAP service will not prevent the majority of users from logging in. The setup is similar to the regular LDAP one, but the password code is ldapmd5:.

4. methods Fronter supports two SSO mechanisms for integrating with external applications. First where Fronter is the main service and second where external applications is the main service that the user logs into first. Both SSO mechanisms are built with Web-Service and SOAP technology. 4.1 with Fronter as authority (Fronter SSO) 4.1.1 WSDL The WebService and it's methods are described in a WSDL (Web Service Description Language) file located at http:///[installation]/libs/ssoservice.wsdl.php 4.1.2 Methods The identification service provides a method called "identify" that takes one argument "key". The identification service returns an identifier consisting of a name and a value. The identifier can be one of these: "username" or "id". If the identifier is username the value returned will be the username of the user holding the supplied key. The selection of username or id to be used as identifier must be set by Fronter in the config file of the Fronter installation in question. 4.1.3 Key The key is supplied to the external application in a URL (see example below). This key is then used in the call to the "identify" method of the identification service. The returned values will then identify the user logging in. The key is destroyed after the reply is sent to maintain high security. The key is randomly generated and therefore will be extremely hard to guess. 4.1.4 Summary After the user is authenticated in Fronter, we contact the external application through an URL containing a keyword #FRONTERSSOKEY#. The keyword will upon launch be substituted with a randomly generated unique key. This key is linked to the user authenticated in Fronter. The external application then contacts Fronter through a

Web Service with this key as an argument. Fronter will then compare this key against the authenticated user and reply with the username of the user. The external application will now know that the user is authenticated in Fronter and can safely log him into the system. The key will then be destroyed for maintaining high security. 4.1.5 Example of implementation The SSO links in Fronter resource folders are created so that a remote site has the possibility to check if the user is logged into Fronter. The usage is commonly as follows: 1. A link of the form http://yourservice.com?ssokey=#fronterssokey# is put available as a link in a Fronter room. Note this has to be with the New link functionality in a resource folder. 2. When a user clicks on that link the #FRONTERSSOKEY# parameter is replaced with a generated id stored in the Fronter db. Use an additional parameter if the customer Fronter URL or any other data is also needed. 3. With that id the 3rd party can query Fronter to get a username (or userid). 4. The result can be used to grant or customise access to the remote service. The code snippet below illustrates how steps 3 to 4 can be implemented. $url_in = $_SERVER['QUERY_STRING']; parse_str($url_in, $data); // ssokey is the SSO parameter in the URL the user has clicked in Fronter $key = $data[ssokey]; // Replace [installation] with your proper installation URL $sc = new SoapClient(" http:/// [installation]/libs/ssoservice.wsdl.php"); $result = $sc >identify($key); $user = $result >value; // You can now use $user to grant access etc.

4.2 with external authority 4.2.1 Scenario Customers already having a system to be used as the master service for authentication must provide the specified identification service for Fronter. Fronter must be allowed to contact this identification service over the Internet from the domain. The customer s system can be any system as long as it provides the identification service. In general the procedure is as follows 1. User logs in to the external resource/application 2. External resource generates a key for this login and saves it 3. External resource calls Fronter with this key 4. This key is used by Fronter to the identification service 5. The identification service looks up the key and finds out who the key belongs to 6. The returned values will then identify who is logging in and Fronter can grant access A required first step to single sign-on with Fronter is to run a compatibility script. This is done at http:///[installationname]/testdata/webservice_test.phtml The customer must pass this test to make sure schemas are compatible with Fronter SSO. 4.2.2 WSDL For Fronter to be able to use the identification service an XML file describing the service must be provided. An example of a file that describes such a service is located at http:///[installationname]/libs/ssoservice.wsdl.php The definition of the service endpoint in this file must be changed to reflect where the actual service is.

4.2.3 Methods The identification service must provide a method called "identify" that takes one argument "key". The identification service returns an identifier consisting of a name and a value. The identifier can be one of these: "username" or "id". If the identifier is username the value returned will be the username of the user holding the supplied key. The selection of username or id to be used as identifier must be set by Fronter in the config file of the Fronter installation in question, together with the remote WSDL endpoint URL. 4.2.4 Key The key must be supplied to Fronter in a link (e.g. index.phtml?identification_key=key). This key is then used in the call to the "identify" method of the identification service. The returned values will then identify the user logging in. It is important that the key only can be used once to maintain high security. The token name (e.g. identification_key ) is a parameter also set in the Fronter installation s config file. The key can be anything, but it is advised to use something that is not readable, like an MD5 string. 4.2.5 Summary The users login to the external resource/application. When logging in, the external resource generates a key specific to that login and saves it. The external resource then calls the link to Fronter with the key. The key is used by Fronter in the call to the identification service. The identification service looks up the key and finds out who the key belongs to. The returned values will then identify who is logging in and Fronter can grant access. The relevant parameters that Fronter needs for configuration are the following: Whether the identifier will be username or id What the WSDL endpoint URL is What token name should be used for key (e.g. identification_key )

5. Authentication with an external IMAP server Each user can have a special email account that is used for external authentication. When a user logs into Fronter, the password is checked against the encrypted password stored in the Fronter database. If there is no match, a new check is made against the IMAP server. If this is accepted, the password is now stored encrypted in the Fronter database. The next time the user logs in with the same password, Fronter does not need to contact the IMAP server. This can be useful since many organisations have IMAP servers in place already, and often have site wide passwords that apply to users' email accounts as well. To enable IMAP authentication, the users password has to be set to a code imapmd5:, and the remote IMAP authentication server has to be added on the installation s configuration. 6. Shibboleth2 (SAML) SSO Fronter supports the Shibboleth2 implementation of SAML. Whereas the solutions described above are suitable for integrating a single application or LDAP authentication service to your Fronter installation, SAML based solutions are usually federations between multiple organisations. Fronter can act both as a Shibboleth Service Provider and an Identity Provider. To setup this kind of solution, you will need to have either a working SP or IdP, and provide Fronter with required metadata. Please contact your local Fronter office for further details, and the availability in your region.

Version control Version Date Description Responsible 0.1 31.05.2005 First version Bård Hall 0.2 11.08.2005 Added info about webservices Bård Hall 0.3 25.08.2005 Changed link for WSDL test Bård Hall 0.4 17.06.2009 Changed link for WSDL test Aleksander Pettersen 1.0 25.03.2012 Rebranded, reviewed and updated contents Tapio Janasik 1.1 29.03.2012 Added sections on cached LDAP and Shibboleth Tapio Janasik 1.2 24.08.2012 Added a code snippet and a few clarifications Tapio Janasik 1.3 05.05.2015 Rebranded Sarah Voit