Shibboleth On-line Authentication System



Similar documents
Authentication Methods

Web based single sign on. Caleb Racey Web development officer Webteam, customer services, ISS

Configuring User Identification via Active Directory

Windows XP Exchange Client Installation Instructions

Web Meetings through VPN. Note: Conductor means person leading the meeting. Table of Contents. Instant Web Meetings with VPN (Conductor)...

Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin martinde@northwestern.edu

External Authentication with WebCT. What We ll Discuss

Agenda. Federation using ADFS and Extensibility options. Office 365 Identity overview. Federation and Synchronization

Wireless Network Configuration Guide

InfoRouter LDAP Authentication Web Service documentation for inforouter Versions 7.5.x & 8.x

Web Applications Access Control Single Sign On

CREDENTIAL MANAGER IN WINDOWS 7

Connecting to Delta College Exchange services off-campus

Livezilla How to Install on Shared Hosting By: Jon Manning

Chapter Thirteen (b): Using Active Directory Integration

Massey University Wireless Network Client Configuration Mac OS X

Remote Desktop Solution, (RDS), replacing CITRIX Home Access

Please return this document to when complete.

How to Configure Active Directory based User Authentication

Authentication and Single Sign On

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

Getting Started with AD/LDAP SSO

Secure Global Desktop (SGD)

How to Configure Outlook Client for Exchange

Cloud Identity Management Tool Quick Start Guide

External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy

Professional Mailbox Software Setup Guide

Web Application Report

NeoMail Guide. Neotel (Pty) Ltd

Middleware integration in the Sympa mailing list software. Olivier Salaün - CRU

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

5. For Display name, Your Full Name or the name you want to appear in the from box when writing or responding to click Next

Connecting to the University Wireless Network

Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS)

Single Sign-On: Reviewing the Field

Authentication Integration

Using Internet or Windows Explorer to Upload Your Site

How to use Certificate in Outlook Express

Managing User Accounts

Instructions: Configuring Outlook 2003 with Exchange 2010 on the FIUMail

Active Directory Integration

FireBLAST Marketing Solution v2

Stoneware Inc. Hyland Software OnBase. Stoneware, Inc.

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

Installing TestNav Mac with Apple Remote Desktop

Adobe Connect LMS Integration for Blackboard Learn 9

Configuring Microsoft Active Directory for Integration with NextPage NXT 3 Access Control

Configuring Thunderbird with UEA Exchange 2007:

IP Phone Service Administration and Subscription

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

OpenLDAP Oracle Enterprise Gateway Integration Guide

Case Study - Configuration between NXC2500 and LDAP Server

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.

Integrating Web Applications with Shibboleth

SPC Connect Configuration Manual V1.0

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.

Client configuration and migration Guide Setting up Thunderbird 3.1

Computer Networking LAB 2 HTTP

Using etoken for Securing s Using Outlook and Outlook Express

Remote Terminal Service (RTS) User Guide (Version 2.1)

Use Enterprise SSO as the Credential Server for Protected Sites

Follow these easy instructions to list your business on the BEC Australia National Business Directory.

Exchange Outlook Profile/POP/IMAP/SMTP Setup Guide

Microsoft Active Directory Oracle Enterprise Gateway Integration Guide

About Me. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack

PAHO Self-Service Password Management Quick Reference Guide December 2014

Application Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN June 2009

Transferring Files to the CU2 Global Secure FTP Site. Login & Access Application Preparation Guide.

Active Directory Requirements and Setup

Integrating EJBCA and OpenSSO

User Management and Sharing in sciebo, the Academic Cloud Storage Service in NRW Holger Angenent. University of Münster

How to connect to the diamonds wireless network with Vista.

Integrating Webalo with LDAP or Active Directory

This document is to explain how to setup Outlook to use our Cloud Based Exchange service.

netld External Authentication Setup Guide

UNIL Administration. > Many databases and applications:

Summary. How-To: Active Directory Integration. April, 2006

Managing User Accounts

Microsoft Outlook Web Access 2013 Authenticating Users Using SecurAccess Server by SecurEnvoy

PORTLANDDIOCESE.ORG - How to Connect Table of Contents

Remote Working Service Remote Access - VDI User Instructions

Installation Guide v3.0

Enroll a Windows Phone 8 Device

Data Collection Agent for Active Directory

Installation Guide. (You can get these files from

External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

Contents. 1. Infrastructure

Access to Webmail services via a Non Trust Computer

SchoolBooking SSO Integration Guide

HGC SUPERHUB HOSTED EXCHANGE

Transcription:

Shibboleth On-line Authentication System Jon Browne Senior Consultant Drew Heald BSc (Hons), MPhil, MCP Systems Developer IBIS Business Consultants Ltd

Accessing a Web Resource Request Client W W W Server Response Client user accesses a free resource Client user is authenticated via a username and password to access a protected resource Client user is responsible for setting up that account

Web Resources for Education Educational establishments subscribe to resources on behalf of many users Parts of a given resource may only be accessible by some of the users in a given educational establishment The resources to which a given user has access change periodically

Authentication School Resource Students Directory/Database Student data Authentication Authorisation Directory/Database Student data Available to all Available to year 3 and above Available to year 6 and above

Authentication Common Issues Exposure of personal information High administrative burden Lack of traceability Password leakage Many passwords problem Resource accessibility is restricted Complicated to use

Shibboleth Aims to: Ensure no personal information is exposed unless necessary Minimise the number of passwords a user needs to remember Minimise the administrative burden Enable user traceability Be transparent to the user Enable access from any location

Shibboleth User Authentication Request LEA/RBC (Origin) Handle Service Resource (Target) SHIRE User Authentication User Attributes (LDAP/SQL) WAYF Bash Street St Trinians Hogwarts LGfL Oxford Resource(s) Attribute Authority SHAR

Shibboleth User Authentication 1.Request URL LEA/RBC (Origin) Resource (Target) Handle Service 5. Request URL + Handle + AA URL SHIRE 4. Username + password User Authentication User Attributes (LDAP/SQL) 9. User Attributes Attribute Authority 8. Handle returns User ID 3. Request URL + SHIRE URL WAYF Bash Street St Trinians Hogwarts LGfL Oxford 7. Request URL + Handle 10. Request URL + User Attributes 2. Request URL + SHIRE URL 6. Request URL + Handle + AA URL Resource(s) 11. User Attributes SHAR

Shibboleth User Authentication 1.Subsequent Request URL (Same Domain) LEA/RBC (Origin) Resource (Target) Handle Service User Authentication User Attributes (LDAP/SQL) WAYF Bash Street St Trinians Hogwarts LGfL Oxford SHIRE SHIRE has Cached Session & Handle = OK Resource(s) Attribute Authority SHAR SHAR has Cached Attributes = OK

Shibboleth User Authentication 1.Subsequent Request URL (Different Domain) LEA/RBC (Origin) Handle Service Resource (Target) SHIRE User Authentication User Attributes (LDAP/SQL) Handle returns User ID WAYF Bash Street St Trinians Hogwarts LGfL Oxford SHIRE has Cached Session & Handle = OK Resource(s) Attribute Authority Request New Domain Attributes Return New Domain Attributes SHAR SHAR has no Cached Attributes for the new Domain so ask AA

Shibboleth User Authentication LEA/RBC (Origin) Resource (Target) Handle Service SHIRE P o r t a l User Authentication User Attributes (LDAP/SQL) Resource(s) Attribute Authority SHAR

Shibboleth User Authentication Pros Low administrative burden Exposure of personal information under user s control Same identity for all resources User traceability Resources can be accessed from any location Cons (Possible) multi-stage authentication

Shibboleth Demonstration 1 7 Shibboleth Target Windows 2003 Server IIS 6.0 Browser 2 6 3 4 5 WAYF Service Windows 2003 Server IIS 6.0 Shibboleth Origin Windows XP Pro Apache Server 2.0.49 LDAP Directory (Active Directory) Windows 2003 Server

Shibboleth Demonstration Browser 1 7 Shibboleth Target Windows 2003 Server IIS 6.0 WAYF Service 2 6 3 4 5 Shibboleth Origin Windows 2003 Server Apache Server 2.0.49 LDAP Directory (Active Directory)

Shibboleth http://shibboleth.internet2.edu Then said they unto him, Say now Shibboleth: and he said Sibboleth: for he could not frame to pronounce it right. Then they took him, and slew him at the passages of Jordan: and there fell at that time of the Ephraimites forty and two thousand. Judges 12:6