Enhancing Web Application Security



Similar documents
Flexible Identity Federation

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

Implementing Identity Provider on Mobile Phone

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

Leveraging SAML for Federated Single Sign-on:

Adding Stronger Authentication to your Portal and Cloud Apps

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

Introduction to SAML

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

Agenda. How to configure

Vidder PrecisionAccess

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

SAP Cloud Identity Service Document Version: SAP Cloud Identity Service

Authentication Scenarios India. Ramachandran

SAML-Based SSO Solution

Scalable Authentication

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Simplifying Security with Datakey Axis Single Sign-On. White Paper

Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone

API-Security Gateway Dirk Krafzig

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

The Top 5 Federated Single Sign-On Scenarios

How To Use Salesforce Identity Features

Server based signature service. Overview

TIB 2.0 Administration Functions Overview

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Safewhere*Identify 3.4. Release Notes

Security Upgrade FAQs

IBM Security Access Manager for Enterprise Single Sign-On Version User Guide IBM SC

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Multi-Factor Authentication Core User Policy and Procedures

User Guide Remote PIV to VDI Using a PIV Card

Apache Server Implementation Guide

Secure Web Access Solution

Salesforce1 Mobile Security Guide

Linux Web Based VPN Connectivity Details and Instructions

SAML-Based SSO Solution

Swivel Secure and the Cloud

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM facebook/allidm

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP

Apache Milagro (incubating) An Introduction ApacheCon North America

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

OpenSSO: Cross Domain Single Sign On

How To Use Saml 2.0 Single Sign On With Qualysguard

IDENTITY MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Egnyte Single Sign-On (SSO) Installation for OneLogin

SECUREAUTH IDP AND OFFICE 365

SAP Single Sign-On 2.0 Overview Presentation

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce

SAML and OAUTH comparison

Research Article. Research of network payment system based on multi-factor authentication

SAML Authentication Quick Start Guide

Entrust IdentityGuard

Identity Implementation Guide

Single Sign-on Frequently Asked Questions

Getting Started with AD/LDAP SSO

UAF Architectural Overview

WHITE PAPER Usher Mobile Identity Platform

NCSU SSO. Case Study

Multi Factor Authentication API

A brief on Two-Factor Authentication

Identity. Provide. ...to Office 365 & Beyond

The increasing popularity of mobile devices is rapidly changing how and where we

EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET

The Cloud, Mobile and BYOD Security Opportunity with SurePassID

White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication

Dashlane Security Whitepaper

Improving Online Security with Strong, Personalized User Authentication

OVERVIEW. DIGIPASS Authentication for Office 365

How CA Arcot Solutions Protect Against Internet Threats

Using SAML for Single Sign-On in the SOA Software Platform

DIGIPASS as a Service. Google Apps Integration

Authentication Methods

Multifactor authentication systems Jiří Sobotka, Radek Doležel

Mobile Security. Policies, Standards, Frameworks, Guidelines

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server

Single Sign On. SSO & ID Management for Web and Mobile Applications

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Biometric SSO Authentication Using Java Enterprise System

Remote Access Securing Your Employees Out of the Office

Introducing etoken. What is etoken?

White Paper. Authentication and Access Control - The Cornerstone of Information Security. Vinay Purohit September Trianz 2008 White Paper Page 1

The Belgian e-id: hacker vs developer

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

Designing federated identity management architectures for addressing the recent attacks against online financial transactions.

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

How to Implement Enterprise SAML SSO

First Advisors Login Guide

IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

nexus Hybrid Access Gateway

Transcription:

Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA

Overview Introduction Current Statet Smart Cards Two-Factor Authentication Techniques Implementation and deployment Conclusion 2

Introduction Web applications are part of our daily lives Work, communication; social; Banking; shopping; entrainment Security breaches & online identity thefts are on the rise Client side, server side Security is critical for high value transactions Account login Transaction authorization Document signing User authentication is the door keeper Economics of security 3

Introduction Current Statet Smart Cards Two-Factor Authentication Techniques Implementation and deployment Conclusion 4

Current State Most websites use single factor authentication - Password Passwords are universally accepted as weak What does it take to break a password? * * http://www.lockdown.co.uk 5

Current State (Cont.) Examples One major breach lead to release of 32 million passwords * Nearly 50% of users used names, slang words, dictionary words or trivial password * OWASP Top 10 Web Application Security Risks A3: Broken Authentication and Session Management Threat agents: attackers, users, insiders Impact: Severe Impact of security breaches Financial loss and pain to institutions and customers Loss of key assets, reputation damage, loss of compliance * http://www.imperva.com/docs/wp_consumer_password_worst_practices.pdf /d /WP P d W t P ti df 6

Current State: Single Sign-On Usability of username/password Easy to use Too many passwords to remember Reuse passwords or use simple passwords Single Sign-On Remember one password instead of dozens Convenient for users Easier to secure one system than to do for many Authentication is the key The system depends on the strength of the authentication Most still use username and password 7

Single Sign-On Even greater need to strength SSO authentication Break one, break all * http://themarketingguy.files.wordpress.com 8

Multi-Factor Authentication What you know password, passphrase, mother's maiden name What you have Smart card, OTP token What you are or what you do - biometrics Iris, finger print, face, voice, typing dynamics Authentications using more than one factors are called strong authentications How to add what you have factor to provide strong authentication to web applications? 9

Introduction Current Statet Smart Cards Two-Factor Authentication Techniques Implementation and deployment Conclusion 10

Smart Cards What is a smart card? A small plastic card with an embedded microprocessor secure memories; ROM, Flash, RAM Hardware cryptographic engine Secure, portable, and tamper-resistant resistant computer Multiple form factors 11

Smart Cards (Cont.) Applications Access control (physical, logical e.g. Windows logon) Identity (citizen cards, passports, ID cards) Subscriber identification modules (SIM) Banking Etc. Smart-card-based USB tokens Embedded smart card Flash memory Using smart cards for web applications is a natural extension 12

Challenges of Using Smart Cards in Web Applications Communications Smart card communication standard PC/SC supported by all major operating systems Middleware Web browser connection Usability User interface not coupled to web application Web application does not have control over the user interaction Terminology not understood by non-technical folks Different architectures for browsers / platforms Custom middleware implementations Not available for all platforms Software upgrade issues End user installation issues 13

Introduction Current Statet Smart Cards Two-Factor Authentication Techniques Implementation and deployment Conclusion 14

Smart Cards for Web Applications Two-Factor Strong Authentications What you know: PIN to the smart card What you have: smart card or smart-card-based token Authentication methods TLS mutual authentication One Time Password authentication PKI Certificate-based authentication Single Sign-On SAML OpenID 15

TLS Mutual Authentication Smart card holds a X.509 certificate and the corresponding {public key, private key} The user registers the security token (smart card) with the web browser HTTPS connection from a web browser to a web server with TLS mutual authentication Require Middleware CAPI Cryptographic API Windows OS CDSA Common Data Security Architecture Mac OS X PKCS#11 API for cryptographic tokens Firefox, OpenSSL 16

TLS Mutual Authentication (Cont.) Browser, through middleware, asks user to select the smart card that has client certificate Client Server Server requests client certificate Browser then asks smart card to sign the TLS handshake messages TLS mutual connection is secure, and hard to fake 1. ClientHello 2. ServerHello 3. Certificate 4. CertificateRequest 5. ServerHelloDone 6. Certificate 7. ClientKeyExchange 8. CertifiacteVerify 9. ChangeCipherSpec 11. ChangeCipherSpec 17 10. ClientFinish 12. SeverFinish Handshake complete Application Data Application Data

One-Time Password Authentication What is One-time password (OTP)? As the name suggests, it is a password that is used only once Used in addition to username (and password) for authentication Time-based or Event-baesd: The OTP device and the OTP server synchronize through time or event based algorithm Usage User pushes a button on the device The device generate an OTP User enters the OTP value to the web page Security? Less secure than TLS mutual authentication Security improved if user forced to enter a PIN to use the OTP token Usability? Simple to use; no setup on the client side 18

PKI Certificate-based Authentication Smart card holds a X.509 certificate and the corresponding {public key, private key} The server sends a random challenge The smart card digitally signs the challenge using the private key stored inside the card The smart card sends the signature (response) and its certificate to the server 19

PKI Authentication Example (Cont.) End User Smart Card Browser Client Auth Server 1. User clicks login. HTTPS 2. Prompt User to insert her smart card. 3. User inserts the card. 4. Request User to enter PIN. 5. User enters PIN. 6. PIN verified. 7. Get challenge from the server. 8. Challenge 9. Send Challenge to SC. 10. Signature and certificate sent to server through browser. 11. Verify 12. Success or failure. 20

PKI Authentication - SConnect POERATING SYST EMS SConnect is a web-browser-based approach Web browser extensions IE, Firefox, Safari, Chrome, Opera Windows, Linux, and Mac OS X Javascript API BROWS ERS Based on PC/SC no middleware Build-in security features Force HTTPS Server verification Connection key linking to server s SSL certificate User consent for smart card access DOWNLOAD For the first time use, the user is prompted to download a web browser plug-in 15 21

Single Sign On / Federation Two aspects Login once and access multiple service providers Use one login credential to login to multiple service provider Benefit Convenient to users use as few credentials as possible Service providers delegate authentication to identity provider Authentication is the key (de facto) Standards SAML OASIS standard OpenID Open standard 22

Actors in Single-Sign On User Entity that can acquire a federated identity Capable of making decisions User, Group of individuals, a corporation, a legal entity etc Identity Provider Creates, manages and maintains the identity information of Principal Provides user authentication to other service providers within a circle of trust Service Provider An entity that provides services to the user 23

Single Sign-On (Cont.) Identity Provider 2 4 Service Provider 3 1 User 16/10/2010 24

Standard Bodies Kantara Initiative (formerly Liberty Alliance) OASIS (Organization for the Advancement of Structured Information Standards) SAML WS-* OpenID 25

Security Assertion Markup Language Current Version is SAML 2.0 OASIS Standard Consolidate earlier work done in Liberty Alliance Assertions, Protocols, and Bindings Generated assertion would contain user s x509 certificate and configured attributes Getting adoption in the Government space Flexible and Extensible framework SAML 2.0: Browser Single Sign-On profile Redirect Binding 26

SAML SSO Browser IdP Auth service Service Provider 1 Service Provider 2 1. Login to the service provider 1. 2. Send SAML Authentication Request as per Browser SSO profile 4. Authentication. 6. Login is successful. 3. Check if the request is coming from a trusted party 5. Signed SAML Response with Assertion. (logged in the database) 7. Request service at the service provider 2. 8. Send SAML Authentication Request 9. Check if the request is from a trusted party, if user has authenticated. 11. Here is the service. 10. Yes. Send signed SAML response with assertion and log in database. 16/10/2010 27

OpenID Developed by OpenID Foundation Open, decentralized d framework for user-centric ti digital it identity management. Current version: OpenID Authentication 2.0 Actors OpenID Provider OpenID User OpenID Service Provider User chooses which OpenID provider to use when login to a service provider that supports OpenID. Mostly used for low-value l transaction ti websites. US Government Services Administration s pilot adoption of OpenID for Open Government 28

Introduction Current Statet Smart Cards Two-Factor Authentication Techniques Implementation and deployment Conclusion 29

Implementation and Deployment 1 2 3 2F authentication as a component in the existing authentication server (library, plug-in) 2F authentication as a backend server for the existing authentication server Delegate the authentication to the identity provider 30

Component The two-factor authentication can be a component of a website s s existing authentication server. Authentication Server 2F Authentication 31

Backend Server The two-factor authentication can be a backend server of a website s s existing authentication server. Example: Existing server handles username/password, OTP server handles OTP. Authentication Server OTP Server 32

Delegate to Identity Provider Service providers redirect the user to the identity provider for authentication (SAML, OpenID, Facebook Connect) Identity Provider Service Provider 33

Conclusions Internet Security Single-factor, knowledge based authentication is weak Really eliminate password, not just push it downstream Adoption occurs only when increased security makes economic sense Smart Cards Traditional roles are necessary, but not always sufficient for future expansion into the increasingly digital world Provide enhanced security while working within the constraints of established enterprise and government frameworks Consumer space More challenging: a wider spectrum of operating environments Users do not always like to carry additional tokens Need to make devices multi-functional, or leverage existing device deployment The real challenge Love is simple, trust is hard 34