S P I E Information Environments Shibboleth and Its Integration into Security Architectures. EDUCAUSE & Internet 2 Security Professionals Conference

Similar documents
Integration of Shibboleth and (Web) Applications

Shibboleth N-Tier Support. Chad La Joie

Authentication Methods

Middleware integration in the Sympa mailing list software. Olivier Salaün - CRU

Remote Authentication and Single Sign-on Support in Tk20

Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources

Connecting Web and Kerberos Single Sign On

Shibboleth Identity Provider (IdP) Sebastian Rieger

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

About Me. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack

Adding Federated Identity Management to OpenStack

Centralized Oracle Database Authentication and Authorization in a Directory

SSO Plugin. Release notes. J System Solutions. Version 3.6

External and Federated Identities on the Web

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

CA Performance Center

A detailed walk through a CAS authentication

AA enabling a closed source legacy application

Using Shibboleth for Single Sign- On

THE NEW DIGITAL EXPERIENCE

Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence. Greg Wcislo

Cloud federation. Prelude to Hybrid Clouds. CHEP 2015 Okinawa, Japan. Marek Denis CERN Geneva, Switzerland

DAMe Deploying Authorization Mechanisms for Federated Services in the eduroam Architecture

Cross-domain Identity Management System for Cloud Environment

Secure the Web: OpenSSO

Multi-Factor Authentication, Assurance, and the Multi-Context Broker

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

September 9 11, 2013 Anaheim, California 507 Demystifying Authentication and SSO Options in Business Intelligence

Agenda. How to configure

Securing SAS Web Applications with SiteMinder

USING ESPRESSO [ESTABLISHING SUGGESTED PRACTICES REGARDING SINGLE SIGN ON] TO STREAMLINE ACCESS

Application of the PAPI authn and authz system to the TJ-II Remote Participation environment. Madrid, 21 March 2003

Perceptive Experience Single Sign-On Solutions

/ Preparing to Manage a VMware Environment Page 1

Open-Xchange Hosted Edition Directory Integration

WEBSPHERE APPLICATION SERVER ADMIN V8.5 (on Linux and Windows) WITH REAL-TIME CONCEPTS & REAL-TIME PROJECT

Identity and Access Management for Federated Resource Sharing: Shibboleth Stories

Chapter 3 Authenticating Users

TIBCO Spotfire Platform IT Brief

Contents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings...

Load Testing with JMeter

IGI Portal architecture and interaction with a CA- online

Single Sign-on (SSO) technologies for the Domino Web Server

Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010

CLUSTERING CAS for High Availability. Eric Pierce, University of South Florida

Okta Identity Management for Portals Built on Salesforce.com. An Architecture Review. Okta Inc. 301 Brannan Street San Francisco, CA 94107

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

Q&A Session for Understanding Atrium SSO Date: Thursday, February 14, 2013, 8:00am Pacific

owncloud Architecture Overview

Authentication and Single Sign On

Customize Mobile Apps with MicroStrategy SDK: Custom Security, Plugins, and Extensions

Web based single sign on. Caleb Racey Web development officer Webteam, customer services, ISS

ITG Software Engineering

Web app AAI Integration How to integrate web applications with AAI in general?

PUBLIC Secure Login for SAP Single Sign-On Implementation Guide

Installation Guide. Tech Excel January 2009

Security As A Service Leveraged by Apache Projects. Oliver Wulff, Talend

SAML Security Option White Paper

Copyright: WhosOnLocation Limited

IONA Security Platform

The GLASS Project: Supporting Secure Shibboleth-based Single Sign-On to Campus Resources

PingFederate. SSO Integration Overview

Single Sign-On for the UQ Web

Single Sign On. SSO & ID Management for Web and Mobile Applications

THE NEW DIGITAL EXPERIENCE

SAML-Based SSO Solution

From centralized to single sign on

PRODUCT BRIEF OpenAM. Delivering secure access for customers, applications, devices and things

TEST AUTOMATION FRAMEWORK

External Authentication with WebCT. What We ll Discuss

Configuring EPM System for SAML2-based Federation Services SSO

Authentication and access control in Sympa mailing list server

Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase

Integration with Active Directory. Jeremy Allison Samba Team

ArcGIS Viewer for Silverlight An Introduction

Authentication Integration

NETASQ ACTIVE DIRECTORY INTEGRATION

In this topic we will cover the security functionality provided with SAP Business One.

Apache Sentry. Prasad Mujumdar

Microsoft Azure for IT Professionals 55065A; 3 days

Developing an Interoperable Blackboard Proxy Tool

Using LDAP Authentication in a PowerCenter Domain

Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names

MySQL Security: Best Practices

Federated Identity Management. Willem Elbers (MPI-TLA) EUDAT training

Federated AAA middleware and the QUT SSO environment

PingFederate. Identity Menu Builder. User Guide. Version 1.0

Using EMC Documentum with Adobe LiveCycle ES

DEPLOYMENT ROADMAP March 2015

Eliminating Authentication Pop- Ups in SAP Landscapes

SofaWare Management Architecture Basics

Transcription:

Shibboleth and Its Integration into Security Architectures Christian Fernau, Francisco Pinto University of Oxford EDUCAUSE & Internet 2 Security Professionals Conference Denver, CO 10-12 April 2006 16:47:29 1

That's the University Slide 16:47:30 2

Overview Introducing the SPIE Project Integrating Shibboleth into Applications Demos of Applications using JAAS Integrating ARPs into Applications Demo of SP-side ARP Using Privilege Management with Shibboleth Demo using PERMIS 16:47:32 3

Introducing the SPIE Project Overall Aim...investigate seamless authentication and authorisation access across information environments Oxford: Institutional Context Access to Local and Remote Protected Resources Integration with Local Infrastructure Integration with Institutional Applications 16:47:33 4

Approaches of Integrating Shibboleth 1.3c (Java & C-SP) Using a Filter (mod_shib, shib-filter) Using Attribute Assertions in the Application the Application's Security Framework the Application Server (container-level) any combination of the above 16:47:35 5

Filter approach (string matching URLs) A user Request http://uni.ac.uk/staffonly/ And/or a Username/Attribute edupersonscopedaffiliation staff@test.edu etc. Is matched with a String require affiliation staff@test.edu staff@other.edu... Or a Regular Expression require affiliation ~ ^staff@.+\.edu$ string match 16:47:36 6

Filter approach (using URLs) Internet user entitlement: library http://uni.ac.uk/staffonly/ http://uni.ac.uk/library/ http://uni.ac.uk/finance/ 16:47:37 http://uni.ac.uk/exampapers/ 7

Filter approach (using URLs) if (entitlement:library) allow /library* Internet user entitlement: library http://uni.ac.uk/staffonly/ string match http://uni.ac.uk/library/ http://uni.ac.uk/finance/ 16:47:39 http://uni.ac.uk/exampapers/ 8

Filter approach (using URLs) if (entitlement:library) allow /library* Internet user entitlement: library http://uni.ac.uk/staffonly/ string match http://uni.ac.uk/library/ http://uni.ac.uk/library/../exams/ 16:47:40 http://uni.ac.uk/finance/ http://uni.ac.uk/exams/ bypass filter 9

Filter Approach (Greyhound Racing) User Tom maxiumbet: 500 etc. if (maxiumbet:500) allow /placebet?amount=500 if (maxiumbet:500) allow /placebet?amount=499 if (maxiumbet:500) allow /placebet?amount=498 if (maxiumbet:500) allow /placebet?amount=497 etc. 16:47:42 10

Filter Approach Good for protecting Static Data or for messy webapps you don't want to touch But Easy to make mistakes in matching rules Not appropriate for protecting dynamic content Difficult to integrate with Privilege Management 16:47:44 11

Using Attributes in the Application User's name (and attributes) checked against application's security configuration configuration has to be done (machines * applications) times difficult to maintain and change 16:47:45 12

Using attributes in the application Attribute assertions Identity Management Application 16:47:46 13

Example for Application-based Security Login using University card barcode 16:47:48 14

Example for application-based Gives access to restricted facilities Using SQL db for authz security SQL 16:47:49 15

Using Attributes in the Application's Security Framework Application Identity Management Framework's API Security Framework shib krb5 ldap... 16:47:51 16

Using attributes in the application's security framework 16:47:53 17

Using Attributes in the Application's Security Framework 16:47:55 18

Using Attributes in the Application Server Apps can use container's API App 2 Application App n Container's API Identity Management Container's Security Framework shib krb5 ldap... Application Server / Container 16:47:57 19

Using Attributes in the Application Server (example Servlet-API) 16:47:59 20

Using Attributes in the Application Server (example Servlet-API) 16:48:01 21

Summary of Application Integration System Management Tools / smaller Apps directly use attributes in code authz rules hardcoded, changes difficult security and applications concerns difficult to separate Larger apps (portals, weblearn,...) typically make use of a security framework often can be shibbolized with no or very minor 16:48:03 changes 22

Our approach to integrate Java Applications with Shibboleth Create a reusable security module that can be used with existing applications Store Attribute Release Policy together with user attributes in a LDAP directory Allow users to change their ARPs (currently simplistic jsp-based GUI) Allow applications to request changes to the ARP and attributes 16:48:04 23

Shibboleth Java integration with SpieJaas In Java, the security modules typically rely on JAAS JAAS is a Java standard for pluggable security modules 16:48:05 Identity Management App 2 Application App n Container's API Container's Security Framework Application shib krb5 Server ldap / Container... Legend Security Module (JAAS) 24

Shibboleth Java integration with 1-6) Normal Shibboleth protocol run 7) User's attributes sent to SpieJaas module 8) Normal login request sent to application 9) User is logged in using Shibboleth SpieJaas 16:48:07 25

SP-side ARP editor 16:48:08 26

WARP(e) Webservice ARP (e)ditor 16:48:10 27

WARP(e) Webservice ARP (e)ditor Very simple WebService API Uses Shib-resolver for read access All (future) attribute plug-ins can be used Uses JNDI for write access LdapArpRepository plug-in creates ARP on the IdP 16:48:12 28

N-Tier authn with Shibboleth 1.3 Shibbolize an AuthN System, not the Application login Shib create ticket CAS App 1 currently working to do the same with WebAuth (Kerberos) App 1 App 1 16:48:13 29

Open Problems How can the application talk-back to the security services (e.g. request higher assurance level) 16:48:15 30