Common Secure Interoperability Version 2 CSI v2



Similar documents
Towards a Secure and User Friendly Authentication Method for Public Wireless Networks Carolin Latze University of Fribourg Switzerland

WebLogic Server 7.0 Single Sign-On: An Overview

Prepared By: P Lichen. P Xulu

Dynamically Authorized Role-Based Access Control for Secure Distributed Computation

DocuSign Single Sign On Implementation Guide Published: March 17, 2016

Single Sign On In A CORBA-Based

Centralized Oracle Database Authentication and Authorization in a Directory

Using LDAP Authentication in a PowerCenter Domain

PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN

Salesforce1 Mobile Security Guide

2 Transport-level and Message-level Security

Setup Guide Access Manager 3.2 SP3

Axway API Gateway. Version 7.4.1

Building Secure Applications. James Tedrick

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Biometrics, Tokens, & Public Key Certificates

CMDBuild Authentication (file auth.conf)

vcommander will use SSL and session-based authentication to secure REST web services.

(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING

Title: A Client Middleware for Token-Based Unified Single Sign On to edugain

Configuration Guide BES12. Version 12.3

OpenHRE Security Architecture. (DRAFT v0.5)

Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 ( )

Grid Security : Authentication and Authorization

Glossary of Key Terms

Trust negotiation protocol support for secure mobile network service deployment

Single Sign-on. Overview. Using SSO with the Cisco WebEx and Cisco WebEx Meeting. Overview, page 1

CLAIMS-BASED IDENTITY FOR WINDOWS

An Oracle White Paper Dec Oracle Access Management Security Token Service

Configuring IBM Cognos Controller 8 to use Single Sign- On

PowerShell Configuration Guide

ShareFile Security Overview

The increasing popularity of mobile devices is rapidly changing how and where we

User Pass-Through Authentication in IBM Cognos 8 (SSO to data sources)

<Insert Picture Here> Oracle Security Developer Tools (OSDT) August 2008

Introduction to SAML

Using SAP Logon Tickets for Single Sign on to Microsoft based web applications

OpenLDAP Oracle Enterprise Gateway Integration Guide

Securing JAX-RS RESTful services. Miroslav Fuksa (software developer) Michal Gajdoš (software developer)

Biometric Single Sign-on using SAML Architecture & Design Strategies

Federation Proxy for Cross Domain Identity Federation

How To Use Saml 2.0 Single Sign On With Qualysguard

RSA Secured Implementation Guide for VPN Products

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide

IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0

How To Secure Your Data Center From Hackers

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

LDAP User Service Guide 30 June 2006

Key Management Interoperability Protocol (KMIP)

Configuration Guide BES12. Version 12.2

Implement Role-Based Access Control with Attribute Certificates

Copyright

White Paper March 1, Integrating AR System with Single Sign-On (SSO) authentication systems

How To Protect Your Computer From Being Hacked On A J2Ee Application (J2Ee) On A Pc Or Macbook Or Macintosh (Jvee) On An Ipo (J 2Ee) (Jpe) On Pc Or

Setup Guide Access Manager Appliance 3.2 SP3

Globus Toolkit: Authentication and Credential Translation

Secure Identity in Cloud Computing

CA Performance Center

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V

Xerox DocuShare Security Features. Security White Paper

ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.

Agenda. How to configure

POP3 Connector for Exchange - Configuration

HP Device Manager 4.7

Embedded Web Server Security

Single Sign-on (SSO) technologies for the Domino Web Server

Visa/MasterCard Secure Electronic Transactions (SET) Scope of SET Protocols

Information. Questions will be answered at the end. Please submit questions to Erick Mendoza using the chat function.

What Your Mother Didn't Tell You About PEM, DER, PKCS. Eric Norman University of Wisconsin-Madison

Introduction CORBA Distributed COM. Sections 9.1 & 9.2. Corba & DCOM. John P. Daigle. Department of Computer Science Georgia State University

Infrastructure that supports (distributed) componentbased application development

Microsoft Active Directory Oracle Enterprise Gateway Integration Guide

Biometric Single Sign-on using SAML

Microsoft Active Directory and Windows Security Integration with Oracle Database

enterprise^ IBM WebSphere Application Server v7.0 Security "publishing Secure your WebSphere applications with Java EE and JAAS security standards

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

CORBA Component Model(CCM)

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience

CHAPTER - 3 WEB APPLICATION AND SECURITY

Requesting Access to IBM Director Agent on Windows Planning / Implementation

Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence. Greg Wcislo

Internet Mail Client Control Library SSL Supplement

Configuring Notification for Business Glossary

BlackShield ID Agent for Remote Web Workplace

Cloud-based Identity and Access Control for Diagnostic Imaging Systems

Chapter 4. Architecture. Table of Contents. J2EE Technology Application Servers. Application Models

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

Transcription:

Common Secure Interoperability Version 2 CSI v2 A User s View by Don Flinn

The Specification Team Compaq Concept Five Gemstone Hewlett Packard IBM Inprise IONA/OOC Oracle Persistence Promia SUN Syracuse/Adiron

CSI v2: What, Why, How What Secure Interoperable Wire Protocol Why Support authentication, delegation & privileges Define a CSI Architecture Support SSL & Interoperate with EJB How Tightly Define Wire Protocol, Messages, IDL Support Interoperability using SSL and optionally SECIOP

CSIv2 Status CSI v2 has been passed by vote of the OMG Architecture Board CSI v2 has been accepted/referenced by EJB version 2.0 CSI v2 is undergoing the FTF process of the OMG Editorial Correct Errors in Found in Implementation

What CSIv2 Can Do For You Secure Interoperability CORBA to CORBA EJB / CORBA Extended Attributes for Authorization Standard Credential (PAC) Delegation Both Simplified and Extended Federation Lay the Groundwork

CSIv2 Flexibility Different Transport Layer Protocols SSL Required X.509 Certificates Supported by GSSUP username/password SECIOP Kerberos, SPKM, CSI-ECMA Stateful or Stateless Degrees of Authorization UserName to PACs Multiple Forms of Delegation

Secure Attribute Service (SAS) Protocol Security Attribute Layer Supplemental Client Authn Layer Identity Assertion Pushed Privilege Attr. Proxy Endorsement Client Authentication SAS Service Context Protocol Transport Layer Message Protection Target-to-Client Authn Client Authentication SSL/TLS or SECIOP

SAS Messages EstablishContext Sent by Client to Establish Context CompleteEstablishContext Sent by Target to Acknowlege MessageInContext Sent by Client in Stateful Session ContextError Sent by Target if Error in Establish Context

Simple Example Client Securely Interoperate w/ Target Pass Security Data Use the Service Context in Request/Reply Header & Optionally Transport Layer Type of Data Authentication Transport Layer (SSL Certificate) Authentication Layer (GSSUP) Authorization Name Privilege Attribute Certificate (PAC)

UserName/Password GSSUP // GSSUP::InitialContextToken struct InitialContextToken { Security::UTF8String username; Security::UTF8String password; CSI::GSS_NT_ExportedName target_name; }; target_name contains the name of the authentication domain in which the client is authenticating.

Privilege Attribute Certificate (PAC) AttributeCertificate ::= SEQUENCE { acinfo AttributeCertificateInfo, signaturealgorithm AlgorithmIdentifier, signaturevalue BIT STRING } AttributeCertificateInfo ::= SEQUENCE { version AttCertVersion DEFAULT v1, holder Holder, issuer AttCertIssuer, signature AlgorithmIdentifier, serialnumber CertificateSerialNumber, attrcertvalidityperiod AttCertValidityPeriod, attributes SEQUENCE OF Attribute, issueruniqueid UniqueIdentifier OPTIONAL, extensions Extensions OPTIONAL }

Simple Interoperability CSIv2 Credentials Tokens Security Attribute Layer (Empty) Client (Initiator) P1 Authentication Layer P1 authentication token (or) Transport Layer P1 Transport identity (certificate) Target

Push Privilege Attributes CSIv2 Credentials Tokens Client (Initiator) P1 Security Attribute Layer P1 (PAC) Authorization token Authentication Layer P1 authentication token (or) Transport Layer P1 Transport identity (certificate) Target

Delegation Delegation Data Identity Token or PAC Types of Delegation Authorization token-based delegation Forward trust evaluation Identity assertion-based delegation Backward trust evaluation Presumed trust

Identity Token Carries the Spoken For or Asserted Identity Identity Token Types Absent Anonymous Principal Name Distinguished Name X.509 Certificate Name

Delegation - Backward Trust CSIv2 Credentials Tokens Security Attribute Layer P1 Identity tokens Client (Initiator) P1 Intermediate P2 Authentication Layer P2 Client authentication token Target (Rules) (or) Transport Layer P2 Transport identity (certificate)

Delegation - Forward Trust CSIv2 Credentials Tokens Client (Initiator) P1 Intermediate P2 Security Attribute Layer P1 PAC (Any) / P1 identity tokens Authentication Layer P2 authentication token (or) Target Transport Layer P2 Transport identity (certificate)

Delegation - Restricted CSIv2 Credentials Tokens Security Attribute Layer P1 PAC (Restrictions)/ P1 identity tokens Client (Initiator) P1 Intermediate P2 Authentication Layer P1 Authentication token Target Transport Layer P1 Transport identity (certificate)

Delegation con t Examples of CSIv2 Credentials Passed from Intermediate to Target Security Layers 1 No delegation Security Attribute Layer Authorization/ identity tokens Authentication Identity Client authentication token or transport identity Target Validation Checks 2 No delegation, push privilege attributes 3 Identity assertionbased delegation, backward trust evaluation 4 Authorization token-based delegation, forward trust evaluation -- P2 PAC P1 identity token P1 PAC, "Any" proxy attribute; P1 identity token 5 Authorization token based delegation (restricted), forward trust evaluation P1 PAC, P2 identity proxy attribute; P1 identity token P2 identity P2 identity P2 identity P2 identity P2 identity -- P2 PAC belongs to P2 identity P2 permitted to speak for P1 identity based on rules of the target; presumed trust if target has no rules P1 PAC belongs to P1 identity; "Any" proxy attribute permits any intermediate to use P1 PAC (unrestricted delegation) P1 PAC belongs to P1 identity; P2 identity proxy attribute permits P2 to use P1 PAC (restricted delegation)

Level 0 Conformance SSL/TLS & GSSUP Stateless SAS - Identity Assertion Level 1 Authorization Token (Push) Level 2 PAC with Delegation Stateful Conformance