An Infocard-based proposal for unified SSO to eduroam



Similar documents
Title: A Client Middleware for Token-Based Unified Single Sign On to edugain

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On

DAMe Deploying Authorization Mechanisms for Federated Services in the eduroam Architecture

Licia Florio Project Development Officer Identity Federations in Europe

Manual Configuration Instructions

Integration Overview. Web Services and Single Sign On

Single Sign On. SSO & ID Management for Web and Mobile Applications

Eduroam wireless network Windows Vista

Information Security Group Active-client based identity management

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

SYSPRO App Store: Registration Guide

How to create a SP and a IDP which are visible across tenant space via Config files in IS

Flexible Identity Federation

Разработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, November 2009 Joost van Dijk - SURFnet

Belnet Networking Conference 2013

Mac OS X Secure Wireless Setup Guide

Negotiating Trust in Identity Metasystem

The increasing popularity of mobile devices is rapidly changing how and where we

Secure Your Enterprise with Usher Mobile Identity

Wireless Network Configuration Guide

Entrust IdentityGuard Comprehensive

The saga of WebFTS and Federated Identity

Network Services One Washington Square, San Jose, CA

INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department

Mobile Security. Policies, Standards, Frameworks, Guidelines

Security Assertion Markup Language (SAML) Site Manager Setup

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

OneLogin Integration User Guide

Eduroam wireless network Apple Mac OSX 10.4

Single Sign-On for the UQ Web

Agenda. How to configure

An Efficient Windows Cardspace identity Management Technique in Cloud Computing

From centralized to single sign on

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.

IdentiFi and Eduroam Roaming Wireless Service Integration CONFIGURATION GUIDE

eduroam wireless setup guide for Windows 7, XP and Vista

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE

Cisco ASA Authentication QUICKStart Guide

Lecture 3. WPA and i

Edith Cowan University Information Technology Services Centre

Configuring a Windows 2003 Server for IAS

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

Eduroam wireless network Apple Mac OSX 10.5

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle

Web Based Single Sign-On and Access Control

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Here is a quick diagram of the ULV SSO/Sync Application. Number 3 is what we deal with in this document.

Connecting to eduroam using Windows 8

SWIFT: Advanced identity management

Setup Citrix Access Gateway Enterprise Edition (NetScaler) for use of multiple authentication methods.

McAfee Cloud Single Sign On

VUBnet, The network of the Vrije Universiteit Brussel. VUBnext Wireless configuration

Step-by-step Guide for Configuring Cisco ACS server as the Radius with an External Windows Database

Copyright Pivotal Software Inc, of 10

IBM Tivoli Federated Identity Manager V6.2.2 Implementation. Version: Demo. Page <<1/10>>

DualShield Authentication Platform

ICT DEPARTMENT. Windows 7. Wireless Authentication Procedures for Windows 7 & 8 Users For Linux and windows XP users visit ICT office

Safewhere*Identify 3.4. Release Notes

Remote Access End User Reference Guide for SHC Portal Access

Identity Management in Telcos. Jörg Heuer, Deutsche Telekom AG, Laboratories. Munich, April 2008

On-boarding and Provisioning with Cisco Identity Services Engine

IBM WebSphere Application Server

Joint Research Activity 5 Task Force Mobility

Get Success in Passing Your Certification Exam at first attempt!

Setting up Windows XP for WPA Wireless Access (ISU-OIT-WPA)

Abstract. Avaya Solution & Interoperability Test Lab

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia Pedro Borges

Registering the Digital Signature Certificate for Bank Officials

Eduroam wireless network - Windows 7

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

Configuring Eduroam in Windows Vista

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Single Sign-on Frequently Asked Questions

eduroam(radius based Federation)

OpenLogin: PTA, SAML, and OAuth/OpenID

365 Services. 1.1 Configuring Access Manager Prerequisite Adding the Office 365 Metadata. docsys (en) 2 August 2012

GPC JagTalk Secure Wireless Network. Connection Instructions

Business Banking Customer Login Experience for Enhanced Login Security

WIRELESS SETUP GUIDES FOR WINDOWS 8

NetMotion Mobility XE

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN

PassKey Manager. Schoolwires Centricity

Business Online Banking Quick Users Guide

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

ADFS Integration Guidelines

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

Transcription:

An Infocard-based proposal for unified SSO to eduroam Enrique de la Hoz, Antonio García, Diego López, Samuel Muñoz University of Alcala (Spain), RedIRIS (Spain) TNC2009, Málaga (Spain), June 9 th 2009

Eduroam and SSO Eduroam provides us with wireless connectivity in educational institutions all along Europe and APAN area Just needing your home institution credentials, open your laptop and you are online One question has been posed by previous work (DAMe project): What if we (re)use those credentials to provide other services than wireless access The goal would be to achieve real SSO: just open you laptop and enjoy any service (any of the service you are allowed to employ, of course) Bring together two (con)federations efforts: Eduroam Edugain Add other logos here if needed

Why? What? Where? Once user gets into eduroam, we have that user authenticated As long as she remains in eduroam, we know who she is. First Idea: We could employ that info to avoid further user logins Problem: Eduroam is L2/L3, most of the services we want to work are in upper layers Let s provide the user with some credentials on sucessful eduroam access Second idea: Let Information Cards be that credential

Information Cards Artifact with an unique identifier from an identity provider that users can employ to visualize their digital relationship with the identity provider in user interfaces and request security tokens with claims from the identity provider. An Information Card is a XML document that can be used as an artifact to get security tokens containing the value of the requested claims Token agnostic: OpenID SAML1.1 Claims-based application Build upon WS-* protocols

Information Cards meet eduroam Well, that seems cool, but What does this have to do with eduroam? Proposal: Join both worlds Associate an Information Card with an eduroam session Use case: User opens his laptop Connects to eduroam On sucessful eduroam connection, she receives an Information Card (from now on, eduroam Information Card ) User can browse services and access them employing eduroam Information Card As soon as she leaves eduroam, the Information Card is no longer valid

Eduroam That sounds great, just login to eduroam and you are done! Some caveats: Infocard is not a real SSO technology, each time you want to use the Information Card, you need to authenticate against the STS To get rid of passwords, we could use etiher X.509 certificates or a selfissued Information Card We decided to use self-issued information cards This way, there is no need for any password further than the one used to access eduroam

Proposal We need to add additional info to RADIUS dialogue: We decided to use PEAP (PEAPv0/EAP-MSCHAPv2): User needs to send the cardid of the self-issued card, she wants to employ to back the eduroam Infocard RADIUS response must include the eduroam Information Card Newly defined EAP-TLV: (the SMH TLV) Request: it will contain selfissued card id On sucessful login, it will contain a one-time time-limited URL where the eduroam Information Card can be downloaded

Proposal (II) SMH EAP-TLV: SMH : Samuel Muñoz Hidalgo (developer) Request: it will contain selfissued card id On sucessful login, it will contain a one-time time-limited URL to download the Information Card

Proposal (III) Radius Server SimpleSAMLphp User Infocard User Success Authenticated with Generation AuthenticationInfoCard Infocard Retrieval Access to federated services

Prototype There s Magic everywhere! Some supplicant-identity selector integration is required Supplicant must be able to retrieve information about which selfissued card, the user wants to employ Identity selector must import the card after successful login FreeRADIUS is employed as RADIUS server: A perl module is in charge of most of the work Minor modifications to existing freeradius Code Module for simplesamlphp: STS functionality Card generation RADIUS server dialogue

Demo http://it.aut.uah.es/enrique/research/demo.html

Protocol Flow Step 1: User decides to join eduroam Supplicant-selector integration User chooses a self-issued card Not only user credentials are sent, but also the additional infocard information is sent as an EAP-TLV. Step 2: RADIUS Server verifies user credentials (user/password) as usual Step 3: Once user credential get verified, RADIUS server contacts STS to get an eduroam infocard TLS connection Inside the TLS connection, an Infocard request containing the self-issued card ID, user name and a timestamp is sent ciphered using AES based on a pre-shared key STS sends back an one-time URL

Protocol Flow Step 4: RADIUS Server sends to the client an EAP-TLV containing the onetime URL with the success PEAP message. Step 5: Supplicant recieves the message, and downloads the eduroam Infocard. Eduroam Infocard gets imported into the selector. Step 6: User accesses a service employing the eduroam Infocard As soon as user leaves eduroam, the STS will no longer be issuing tokens.

Acknowledgments Samuel Muñoz Hidalgo The work has been supported by the Spanish Ministry of Education and Science grant TIN2008-06739-C04-04 and RedIRIS

Future work Open1x Moving to Radiator Handling accounting Info