The saga of WebFTS and Federated Identity

Similar documents
Perceptive Experience Single Sign-On Solutions

Agenda. How to configure

CERN Single Sign On solution

About Me. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack

CERN Single Sign On. Emmanuel Ormancey CERN IT/IS. CERN IT Department CH-1211 Genève 23 Switzerland

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia Pedro Borges

Title: A Client Middleware for Token-Based Unified Single Sign On to edugain

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.

Flexible Identity Federation

Federated Identity Management Solutions

How To Manage Identity On A Cloud (Cloud) With A User Id And A Password (Saas)

Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver

WebNow Single Sign-On Solutions

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x

IBM Tivoli Federated Identity Manager V6.2.2 Implementation. Version: Demo. Page <<1/10>>

SAML Security Option White Paper

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

Securing Cloud Applications Using Windows Azure Access Control

Single Sign-On: Reviewing the Field

Agenda. Federation using ADFS and Extensibility options. Office 365 Identity overview. Federation and Synchronization

Get Success in Passing Your Certification Exam at first attempt!

SAML-Based SSO Solution

OIOSAML Rich Client to Browser Scenario Version 1.0

Building Secure Applications. James Tedrick

Toward campus portal with shibboleth middleware

SAML SSO Configuration

Web Access Management and Single Sign-On

How To Use Saml 2.0 Single Sign On With Qualysguard

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

DocuSign Information Guide. Single Sign On Functionality. Overview. Table of Contents

Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015

HP Software as a Service

PingFederate. SSO Integration Overview

CA Nimsoft Service Desk

Novell Access Manager

Разработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, November 2009 Joost van Dijk - SURFnet

Getting Started with AD/LDAP SSO

Single Sign On. SSO & ID Management for Web and Mobile Applications

Cloud federation. Prelude to Hybrid Clouds. CHEP 2015 Okinawa, Japan. Marek Denis CERN Geneva, Switzerland

Keeping access control while moving to the cloud. Presented by Zdenek Nejedly Computing & Communications Services University of Guelph

Middleware integration in the Sympa mailing list software. Olivier Salaün - CRU

Egnyte Single Sign-On (SSO) Installation for OneLogin

Shibboleth Identity Provider (IdP) Sebastian Rieger

Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML

Copyright: WhosOnLocation Limited

Implementation Guide SAP NetWeaver Identity Management Identity Provider

Extending DigiD to the Private Sector (DigiD-2)

Authentication Methods

Using Shibboleth for Single Sign- On

Federated Identity and Single Sign-On using CA API Gateway

Security As A Service Leveraged by Apache Projects. Oliver Wulff, Talend

U S E R D O C U M E N TA T I O N ( A L E P H I N O

The increasing popularity of mobile devices is rapidly changing how and where we

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

Shibboleth N-Tier Support. Chad La Joie

CONFIGURATION GUIDE WITH MICROSOFT ACTIVE DIRECTORY FEDERATION SERVER

Single Sign On for UNICORE command line clients

A Federated Authorization and Authentication Infrastructure for Unified Single Sign On

OpenSSO: Cross Domain Single Sign On

Security Assertion Markup Language (SAML) Site Manager Setup

Identity Server Guide Access Manager 4.0

Research and Implementation of Single Sign-On Mechanism for ASP Pattern *

Table of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3

Moodle and Office 365 Step-by-Step Guide: Federation using Active Directory Federation Services

Identity and Access Management for Federated Resource Sharing: Shibboleth Stories

STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

Weblogic as a Service Provider for CERN Web Applications: APEX & Java EE

Deploying RSA ClearTrust with the FirePass controller

Lecture Notes for Advanced Web Security 2015

Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect

IGI Portal architecture and interaction with a CA- online

Single Sign On (SSO) Implementation Manual. For Connect 5 & MyConnect Sites

USING FEDERATED AUTHENTICATION WITH M-FILES

IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS

AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle

GENERAL OVERVIEW OF VARIOUS SSO SYSTEMS: ACTIVE DIRECTORY, GOOGLE & FACEBOOK

Kerberos and Single Sign On with HTTP

Fairsail. Implementer. Single Sign-On with Fairsail and Microsoft Active Directory Federation Services 2.0. Version 1.92 FS-SSO-XXX-IG R001.

An introduction of several development activities related to Shibboleth and Web browser-based simple PKI

Connected Data. Connected Data requirements for SSO

Add Microsoft Azure as the Federated Authenticator in WSO2 Identity Server

Use Enterprise SSO as the Credential Server for Protected Sites

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

Improving Security and Productivity through Federation and Single Sign-on

Design and Implementation of Web Forward Proxy with

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

This Working Paper provides an introduction to the web services security standards.

Single Sign-On for the UQ Web

Microsoft Office 365 Using SAML Integration Guide

SAML v1.1 for.net Developer Guide

Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications

tibbr Now, the Information Finds You.

Transcription:

The saga of WebFTS and Federated Identity Andrey Kiryanov IT/SDC 15/12/2014

The Reason: 2

What is a Federated Identity? It is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems (from Wikipedia). In our case it works like extended SSO where you can login on other sites (like INFN) with credentials from your home site (like CERN). You only have to register once in your home organization (Identity Provider IdF IP) and all other sites (Service Providers IdF SPs) will recognize you. 3

How is it implemented? Magic + tons of XML CERN SSO service is based on Microsoft s ADFS (Active Directory Federation Services) In order to benefit from SSO your web server (Apache) needs a special plug-in: Shibboleth supported by CERN, widespread solution, supports all possible standards, a real pain in the ahead to configure. Mellon pure SAML2 SP. Distribution from EPEL does not work with ADFS, but the one from Git does. Easy to configure, will be supported (may be even recommended) by CERN in the near future. 4

What happens when you log-in to SSO? Web browser HTTP session Apache Auth. SAML Auth request (redirect) SSO SSO plug-in SAML Assertion SAML = Security Assertion Markup Language SAML Assertion is essentially a signed list of attributes (name, email, etc.) 5

STS the new guy Security Token Service (STS) consumes SAML2 assertions and produces X.509 credentials in return. STS is an implementation of WS-Trust OASIS standard and it speaks SOAP. This functionality is based on so-called IOTA CA (Identifier- Only Trust Assurance Certification Authority) that issues short-living (days) X.509 certificates. At CERN we can get such certificates from CERN CA (which is NOT CERN Grid CA ) the same that signs EduRoam certificates. 6

What s in all this for WebFTS? STS X.509 certificate Pub. Cert. key Priv. key FTS3 SAML2 Assertion Web browser (JavaScript context) REST API IOTA CA Apache Auth. SAML2 SSO plug-in Auth request (redirect) SAML2 Assertion SSO 7

Changes made On FTS3 REST API side we had to implement a new authorization scheme. It uses standard HTTP Authorization header with user certificate and timestamp signed by a private key. Otherwise there s no way to use public and private keys from JavaScript context with AJAX. On WebFTS side we provided JavaScript functions that cover interaction with STS and handling of SAML2 assertions. STS is not CORS-aware (so far). In order to access it with AJAX we had to use Apache reverse-proxy functionality to map STS into WebFTS namespace. In fact, we can do that for REST API as well 8

Next steps Above all we have to convince sites to trust IOTA-profile CAs. The way STS issues certificates has to change. Basically STS has more than one mode of operation: It can generate a key pair, sign it with a CA, and send both certificate and private key back to us. This is what is used right now, but this is wrong because private key is transmitted over the network. It can generate a proxy certificate (with or without VOMS extensions) based on a public key provided from our side. This is more secure because we generate a key pair by ourselves and private key stays on our side, but this will require changes in the delegation code on WebFTS side. VOMS integration is not yet finished (not even started AFAIK) on STS side. We have to wait until it s available for testing. We have to think of the way we associate different identities of the same user (e.g. normal X.509 certificate and IdF). 9

What we have achieved so far? IdF-enabled WebFTS is a working prototype available at https://webfts-dev.cern.ch/ This is an important step towards X.509-free access to Grid resources. The same technology may be used for other types of services, e.g. job submission. We have a deep understanding of the fact that IdF is still a work in progress, so do not expect stable and polished solutions in the nearest future. 10

Thank you! (demo time) 11