Viktigaste uppgift: Web Browser SSO



Similar documents
Federating with Web Applications

Shibboleth SP Simple Installation Guide For LINUX

Shibboleth 2: A Guide for Deployers. Scott Cantor cantor.2@osu.edu Internet2 / The Ohio State University

DARIAH / DASISH AAI Workshop

Introducing Shibboleth

Configuring. Moodle. Chapter 82

Shibboleth Service Provider. Bart Ophelders - Philip Brusten shib@kuleuven.be

Federated Identity Management. Willem Elbers (MPI-TLA) EUDAT training

Shibboleth SP Hands-on. Shilen Patel - shilen@duke.edu Rob Carter - rob@duke.edu Gonzalo Guzman - gonz@mcnc.org

Moodle and Office 365 Step-by-Step Guide: Federation using Active Directory Federation Services

CentraSite SSO with Trusted Reverse Proxy

SAML single sign-on configuration overview

OIOSAML 2.0 Toolkits Test results May 2009

Readme10_054.doc page 1 of 7

Scrum Kandidatprojekt datateknik - TDDD83

SAML Authentication within Secret Server

Shibboleth Configuration in Tübingen

Achieve Single Sign-on (SSO) for Microsoft ADFS

Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML

mod_auth_pubtkt a pragmatic Web Single Sign-On solution by Manuel Kasper, Monzoon Networks AG mkasper@monzoon.net

Lets get a federated identity. Intro to Federated Identity. Feide OpenIdP. Enter your address. Do you have access to your ?

Computer Services Documentation

Securing Splunk with Single Sign On & SAML

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

Shibboleth Identity Provider (IdP) Sebastian Rieger

U S E R D O C U M E N TA T I O N ( A L E P H I N O

Microsoft SQL Server 2012: Designing Buisness Intelligence Solutions

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x

SWAMID Identity Assurance Level 1 Profile

Running Multiple Shibboleth IdP Instances on a Single Host

Feide Integration Guide. Technical Requisites

Разработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, November 2009 Joost van Dijk - SURFnet

Administering mod_jk. To Enable mod_jk

Marknadsföring som en del av intäktsprocessen.

Tanden Care Provider Interfaces PreAssessmentSTB v3

Design Suggestions for Danske Bank SE

Shibboleth SP Simple Installation Guide For Windows and IIS

What Is the Productivity Gain in Machine Translation of Subtitles?

AD FS 2.0 Step-by-Step Guide: Federation with Shibboleth 2 and the InCommon Federation

Perceptive Experience Single Sign-On Solutions

AGENDA WINDOWS PRESENTATION FOUNDATION LEKTION 4. Statusbar Hyperlänkar WebBrowser TabControl Ribbon ListBox Data Template Resource Dictionary Style

Install a Shibboleth v3 IdP on Ubuntu Linux (version LTS)

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Drupal

SAML v2.0 for.net Developer Guide

SAS Data Integration SAS Business Intelligence

Feide Technical Guide. Technical details for integrating a service into Feide

InTime API - Exempel kod

Egnyte Single Sign-On (SSO) Installation for OneLogin

SAML-Based SSO Solution

WINDOWS PRESENTATION FOUNDATION LEKTION 3

IAM, Enterprise Directories and Shibboleth (oh my!)

IAM Application Integration Guide

IBM WebSphere Application Server

Ange om en aktivitet har medfört att en tjänsteresa har utförts med flyg under 2013, och i sådana fall antal gånger.

How to setup HTTP & HTTPS Load balancer for Mediator

Using Shibboleth for Single Sign- On

Spring Security SAML module

Authentication Methods

McAfee Cloud Identity Manager

Development allowance and activity grant [Aktivitetsstöd och utvecklingsersättning]

Keycloak SAML Client Adapter Reference Guide

AA enabling a closed source legacy application

Deployment Guide Oracle Siebel CRM

Jag valde att använda Net-EPP_client.php från centralnic för att komma igång.

Using simplesamlphp as an identity provider

AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle

Category work in courtroom talk about domestic violence: Gender as an interactional accomplishment in child custody disputes

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

PRTK. Password Recovery ToolKit EFS (Encrypting File System)

How to: log on to ProjectWise

SSO Plugin. Case study: Integrating with Ping Federate. J System Solutions. Version 4.0

How To Use Saml 2.0 Single Sign On With Qualysguard

Howto: Create a virtual platform Shibboleth

Kantara egov and SAML2int comparison

PicketLink Federation User Guide 1.0.0

Microsoft + SOA = Sant? Joakim Linghall Principal System Engineer SOA and Business Process joakiml@microsoft.com

DEPLOYMENT GUIDE. SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server

Martin Holmgren Vice President Fleet Management Cramo Group

Tanden Care Provider Interfaces Submit Claim v3

How To Get Healthy With A Game Called Angel Hour

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia Pedro Borges

Seminarium om tystare busstrafik

Strategisk planering, Aktiv demokrati, 6-8 jan 2012

How-to-Guide: Apache as Reverse Proxy for Fiori Applications

Single Sign-On: Integrating AWS, OpenLDAP, and Shibboleth

IBM TRIRIGA Application Platform Version 3 Release 4.1. Single Sign-On Setup User Guide

Introduktion till SAS 9 Plattformen Helikopterkursen

Integration of Office 365 with existing faculty SSO

INTEGRATE SALESFORCE.COM SINGLE SIGN-ON WITH THIRD-PARTY SINGLE SIGN-ON USING SENTRY A GUIDE TO SUCCESSFUL USE CASE

Transcription:

Federation SAML Shibboleth programvara Jboss Java-system Namn: Uid: Organisation: inetorgperson Shibboleth programvara Unikt namn:... Roll: Funktioner som kan anropas:... Så här når du funktionerna:... Du kan lita på mig! Certikfikat:... Unikt namn:... Roll: Funktioner som kan anropas:... Så här når du funktionerna:... Du kan lita på mig! Certikfikat:... Browser SAML SAML Shibboleth programvara Unikt namn:... Roll: Funktioner som kan anropas:... Så här når du funktionerna:... Du kan lita på mig! Certikfikat:... SAML SAML Unikt namn:... Roll: Funktioner som kan anropas:... Så här når du funktionerna:... Du kan lita på mig! Certikfikat:... Shibboleth programvara Apache backend SimpleSAML -programvara PHP-program Unikt namn:... Roll: Funktioner som kan anropas:... Så här når du funktionerna:... Du kan lita på mig! Certikfikat:... Viktigaste uppgift: Web Browser SSO

Shibboleth programvara Unikt namn: https://idp.lu.se/idp/shibboleth Roll: Funktioner som kan anropas/så här når du dem: SingleSignOnService Binding: HTTP-Redirect Endpoint: https://idp.lu.se/idp/profile/saml2/redirect/sso AttributeService Binding: SOAP Endpoint: https://idp.lu.se/idp/profile/saml2/soap/attributequery ArtifactResolutionService Binding: SOAP Endpoint: https://idp.lu.se/idp/profile/saml2/soap/artifactresolution Du kan lita på mig: X509Certificate AwIBAgIEU2tfcTANBgkqhkiG9w0BAQsFADAdMRswGQYDVQQDDBJl? Shibboleth programvara inetorgperson Browser Unikt namn: https://mittsystem.lu.se/shibboleth Roll: Funktioner som kan anropas/så här når du dem: SingleLogoutService Binding: SOAP Endpoint: https://mittsystem.lu.se/shibboleth.sso/slo/soap AssertionConsumerService Binding: HTTP-POST Endpoint: https://mittsystem.lu.se/shibboleth.sso/saml2/post ArtifactResolutionService Binding: SOAP Endpoint: https://mittsystem.lu.se/shibboleth.sso/artifact/soap Du kan lita på mig: X509Certificate kxmjm0wjbumqswcqydvqqgewjtrteambgga1uecgwrthvu Hur får de reda på varandra? Hur går kommunikationen mellan dem till? Hur skapa säker överföring av data?

Attribut-förmedling (Tomcat 6) attribute-resolver.xml <AttributeDefinition/> <DataConnector/> attribute-filter.xml <AttributeFilterPolicy/> <AttributeRule/> SQL LDAP SAMLmeddelande (Apache 2.4) attribute-map.xml <Attribute/> attribute-policy.xml <AttributeFilterPolicy/> <AttributeRule/> Jboss backend AJP-request Attribut-lista VIA ENVIRONMENT Java-applikation JSF-dokument #{request.getattribute('testattr') Attribut-källor Statiska attribut Web-browser Redirect för inloggning Inloggning med uid/pwd AccessControl via attributregler AccessControl via attributregler

Attribut-förmedling i PHP a Web-browser Inloggning med uid/pwd Redirect för inloggning SAMLmeddelande Attribut-lista VIA HTTP-headers HTTP-request Attribut-källor (Tomcat 6) AccessControl via attributregler (Apache 2.4) AccessControl via attributregler Apache 2.2 backend LDAP attribute-resolver.xml attribute-map.xml SQL <AttributeDefinition/> <DataConnector/> <Attribute/> Statiska attribut PHP-applikation attribute-filter.xml <AttributeFilterPolicy/> <AttributeRule/> attribute-policy.xml <AttributeFilterPolicy/> <AttributeRule/> PHP-fil $_SERVER["HTTP_TESTATTR"];

Attribut-förmedling i PHP b Web-browser Inloggning med uid/pwd Redirect för inloggning Attribut-källor (Tomcat 6) AccessControl via attributregler SAMLmeddelande Applikationsserver Apache 2.4 SimpleSamlPHP LDAP attribute-resolver.xml PHP-applikation SQL Statiska attribut <AttributeDefinition/> <DataConnector/> Simplesamlphp-config filer $as = new SimpleSAML_Auth_Simple('default-sp'); $as->requireauth(); $attributes = $as->getattributes(); echo $attributes[ testattr ]; attribute-filter.xml <AttributeFilterPolicy/> <AttributeRule/>

Saml2int Web Browser SSO Deployment profile XML-encryption används inetorgperson Browser HTTP eller HTTPS SingleSignOnService Endpoint HTTPS <AuthnRequest> via HTTP-REDIRECT binding till :n <Response> Subject, Attribut <AuthnRequest> <Response> via HTTP-POST binding till :n HTTP eller HTTPS <Response> Subject, Attribut Respons från applikationen: webbsida och SSO-sessionsdata Request till applikationen om en webbsida <AuthnRequest> via HTTP-REDIRECT binding till :n <Response> via HTTP-POST binding till :n <AuthnRequest> AssertionConsumerService Endpoint HTTPS-förbindelse Request till om metadata XML-dokument med Metadata i klartext System entity Roll: HTTPS-förbindelse Request till om metadata System Entity Roll: XML-dokument med Metadata i klartext Det här är jag, det här är min roll, det här är mina funktioner, så här når du dem, du kan lita på mig Publicerad via Well Known location -metoden

SWAMID-federationen Krypterad förbindelse SAMLmeddelande / metadata? inetorgperson Skapa en jks-keystore med lösenord (self-signed) Subject: cn=www.minsajt.lu Issuer: samma som ovan Key: RSA 2048 bits Signature: SHA-256 with RSA Browser Krypterad förbindelse Extensions Subject Alternative Name: DNS Name: www.minsajt.lu URI: http://www.minsajt.lu/url/till/systemet URI: https://www.minsajt.lu/url/till/systemet Subject Key Identifier: Key Identifier: 0x... Krypterad förbindelse SAML-meddelande med krypterad data SAML-meddelande med klartext-data Generera ett CSR Importera erhållen signering Exportera privat nyckel med lösenord (.key) och publik nyckel/certifikat (.crt) (Tomcat 6) Krypterad förbindelse (Apache 2.4) SAML-meddelande eller metadata i klartext

80 8009 443 Jboss 7 11443 22443 EntityID: https://egaws4757.uw.lu.se/shibboleth C:\opt\shibboleth-sp C:/Program Files (x86)/internet2/shib2idp/credentials/idp.jks Metadata: https://egaws4757.uw.lu.se/shibboleth.sso/ Metadata C:\Apache24 EntityID: https://egaws4757.uw.lu.se:22443/idp/shibboleth C:/Program Files (x86)/internet2/shib2idp/credentials/idp.jks C:/Program Files (x86)/internet2/shib2idp/credentials/idp.key C:/Program Files (x86)/internet2/shib2idp/credentials/idp.crt Skapas med: install.bat renew-cert Metadata: https://egaws4757.uw.lu.se:22443/idp/shibboleth Tomcat cacerts: C:\Program Files\Java\jre7\lib\security\cacerts SAML - principal (användare) - Identity Provider - Service Provider

attribute-resolver.xml <resolver:attributedefinition xsi:type="ad:simple" id="testattr" sourceattributeid="testattr"> <resolver:dependency ref="testconnectorid"/> <resolver:attributeencoder xsi:type="enc:saml2string" name="test:testattr" friendlyname="testattr"/> </resolver:attributedefinition> <resolver:dataconnector id="testconnectorid" xsi:type="static" xmlns="urn:mace:shibboleth:2.0:resolver:dc"> <Attribute id="testattr"> <Value>hej</Value> </Attribute> </resolver:dataconnector> attribute-map.xml <Attribute name="test:testattr" id="testattr"> <AttributeDecoder xsi:type="stringattributedecoder" casesensitive="false"/> </Attribute> attribute-policy.xml <afp:attributerule attributeid="testattr"> <afp:permitvaluerule xsi:type="any"/> </afp:attributerule> attribute-filter.xml <afp:attributerule attributeid="testattr"> <afp:permitvaluerule xsi:type="basic:any"/> </afp:attributerule> shibboleth2.xml <ApplicationDefaults id="default" policyid="default" entityid="https://egaws4757.uw.lu.se/shibboleth" REMOTE_USER="eppn persistent-id targeted-id" attributeprefix="ajp_"> httpd.conf ProxyIOBufferSize 65536 <VirtualHost *:443>... ProxyPass /stip ajp://localhost:8009/stip </VirtualHost> standalone.xml <connector name="ajp" protocol="ajp/1.3" scheme="http" socket-binding="ajp" secure="true"/> <socket-binding name="ajp" port="8009"/>

attribute-resolver.xml <resolver:attributedefinition xsi:type="ad:simple" id="testattr" sourceattributeid="testattr"> <resolver:dependency ref="testconnectorid"/> <resolver:attributeencoder xsi:type="enc:saml2string" name="test:testattr" friendlyname="testattr"/> </resolver:attributedefinition> <resolver:dataconnector id="testconnectorid" xsi:type="static" xmlns="urn:mace:shibboleth:2.0:resolver:dc"> <Attribute id="testattr"> <Value>hej</Value> </Attribute> </resolver:dataconnector> attribute-map.xml <Attribute name="test:testattr" id="testattr"> <AttributeDecoder xsi:type="stringattributedecoder" casesensitive="false"/> </Attribute> attribute-policy.xml <afp:attributerule attributeid="testattr"> <afp:permitvaluerule xsi:type="any"/> </afp:attributerule> attribute-filter.xml <afp:attributerule attributeid="testattr"> <afp:permitvaluerule xsi:type="basic:any"/> </afp:attributerule> shibboleth2.xml <ApplicationDefaults id="default" policyid="default" entityid="https://egaws4757.uw.lu.se/shibboleth" REMOTE_USER="eppn persistent-id targeted-id" attributeprefix="ajp_"> httpd.conf (frontend) ProxyIOBufferSize 65536 <VirtualHost *:443>... ProxyPass /php http://egaws4757.uw.lu.se:8099 ProxyPassReverse /php http://egaws4757.uw.lu.se:8099 <Location /php> AuthType shibboleth ShibRequestSetting requiresession 1 require shib-session Require valid-user ShibUseHeaders On </Location> </VirtualHost>

attribute-resolver.xml <resolver:attributedefinition xsi:type="ad:simple" id="testattr" sourceattributeid="testattr"> <resolver:dependency ref="testconnectorid"/> <resolver:attributeencoder xsi:type="enc:saml2string" name="test:testattr" friendlyname="testattr"/> </resolver:attributedefinition> <resolver:dataconnector id="testconnectorid" xsi:type="static" xmlns="urn:mace:shibboleth:2.0:resolver:dc"> <Attribute id="testattr"> <Value>hej</Value> </Attribute> </resolver:dataconnector> attribute-map.xml <Attribute name="test:testattr" id="testattr"> <AttributeDecoder xsi:type="stringattributedecoder" casesensitive="false"/> </Attribute> attribute-policy.xml <afp:attributerule attributeid="testattr"> <afp:permitvaluerule xsi:type="any"/> </afp:attributerule> attribute-filter.xml <afp:attributerule attributeid="testattr"> <afp:permitvaluerule xsi:type="basic:any"/> </afp:attributerule> shibboleth2.xml <ApplicationDefaults id="default" policyid="default" entityid="https://egaws4757.uw.lu.se/shibboleth" REMOTE_USER="eppn persistent-id targeted-id" attributeprefix="ajp_"> httpd.conf (frontend) ProxyIOBufferSize 65536 <VirtualHost *:443>... ProxyPass /php http://egaws4757.uw.lu.se:8099 ProxyPassReverse /php http://egaws4757.uw.lu.se:8099 <Location /php> AuthType shibboleth ShibRequestSetting requiresession 1 require shib-session Require valid-user ShibUseHeaders On </Location> </VirtualHost>

Utbyte av metadata: 1. SOAP över HTTPS 2. Trust ska kunna etableras mellan relying parties enbart baserat på metadata Vad berättar metadata: Metadata identifierar och beskriver en eller flera system entities ( eller :er i vårt fall) och vad de har för roller, för faciliteter/funktioner och hur man når dem, samt etablerar trust mellan avsändaren och mottagaren av metadata. Innehåller 1. Unika identifierare/namn (entityid) för dessa system entities 2. Binding support och endpoints (URL:ar) för dessa bindings (dvs funktioner och hur man når dem) 3. Certifikat och nycklar (trust) Roller SSO Identity Provider SSO Service Provider Authentication Authority Attribute Authority Policy Decision Point Affiliation Hur hittar man metadata om en system entity? Well known location -metoden: En system entity har en unik identifierare (dvs ett valfritt unikt namn). Denna unika identifierare kan vara en url, och via denna url hittas metadata.