LTI, SAML, and Federated ID - Oh My!



Similar documents
Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication

Transmittal 198 Date: DECEMBER 9, SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors

How to create a default user profile in Windows 7

Over-encryption: Management of Access Control Evolution on Outsourced Data

Alarm transmission through Radio and GSM networks

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (

How to SYSPREP a Windows 7 Pro corporate PC setup so you can image it for use on future PCs

Ashfield Girls High School. Critical Incident Policy

To set up Egnyte so employees can log in using SSO, follow the steps below to configure VMware Horizon and Egnyte to work with each other.

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS

California s Duals Demonstration: A Transparent. Process. Margaret Tatar Chief, Medi-Cal Managed Care Division. CA Coo 8/21/12

Egnyte Single Sign-On (SSO) Installation for OneLogin

Firstmark Credit Union Commercial Loan Department

How to recover your Exchange 2003/2007 mailboxes and s if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database

Perceptive Experience Single Sign-On Solutions

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION

ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM

Gravitational Mechanics of the Mars-Phobos System: Comparing Methods of Orbital Dynamics Modeling for Exploratory Mission Planning

Database Management Systems

Channel selection in e-commerce age: A strategic analysis of co-op advertising models

Valuation of Floating Rate Bonds 1

Model-Driven Engineering of Adaptation Engines for Self-Adaptive Software: Executable Runtime Megamodels

Research on Risk Assessment of the Transformer Based on Life Cycle Cost

Cloud Service Reliability: Modeling and Analysis

T his feature is add-on service available to Enterprise accounts.

Fixed Income Attribution: Introduction

BIOS American Megatrends Inc (AMI) v02.61 BIOS setup guide and manual for AM2/AM2+/AM3 motherboards

DOCTORATE DEGREE PROGRAMS

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it

TIB 2.0 Administration Functions Overview

NEW LONDON STATE PIER PROPERTY CHARACTERISTICS

Agenda. How to configure

Gauss Law. Physics 231 Lecture 2-1

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing

SAML-Based SSO Solution

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor

Ignorance is not bliss when it comes to knowing credit score

Converting knowledge Into Practice

Egnyte Single Sign-On (SSO) Installation for Okta

Module Availability at Regent s School of Drama, Film and Media Autumn 2016 and Spring 2017 *subject to change*

Definitions. Optimization of online direct marketing efforts. Test 1: Two campaigns. Raw Results. Xavier Drèze André Bonfrer. Lucid.

Supplementary Material for EpiDiff

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems

Episode 401: Newton s law of universal gravitation

College of Engineering Bachelor of Computer Science

Left- and Right-Brain Preferences Profile

FXA Candidates should be able to : Describe how a mass creates a gravitational field in the space around it.

Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation

Public Health and Transportation Coalition (PHiT) Vision, Mission, Goals, Objectives, and Work Plan August 2, 2012

An Efficient Group Key Agreement Protocol for Ad hoc Networks

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION

GESTÃO FINANCEIRA II PROBLEM SET 1 - SOLUTIONS

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents

Review Graph based Online Store Review Spammer Detection

Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow

Software Engineering and Development

Hitachi Virtual Storage Platform

Carter-Penrose diagrams and black holes

The Role of Gravity in Orbital Motion

Self-Adaptive and Resource-Efficient SLA Enactment for Cloud Computing Infrastructures

METHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION

ICD-10. Implementation

An Approach to Optimized Resource Allocation for Cloud Simulation Platform

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH

A Comparative Analysis of Data Center Network Architectures

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure

Chapter 2 Valiant Load-Balancing: Building Networks That Can Support All Traffic Matrices

Distributed Computing and Big Data: Hadoop and MapReduce

Connected Data. Connected Data requirements for SSO

UNIT CIRCLE TRIGONOMETRY

SP-initiated SSO for Smartsheet is automatically enabled when the SAML feature is activated.

How Much Should a Firm Borrow. Effect of tax shields. Capital Structure Theory. Capital Structure & Corporate Taxes

Configuring EPM System for SAML2-based Federation Services SSO

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes

Promised Lead-Time Contracts Under Asymmetric Information

VISCOSITY OF BIO-DIESEL FUELS

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

Transcription:

LTI, SAML, and Fedeated ID - Oh My! Chales Seveance, Ph.D. Stephen P Vickes IMS Global Leaning Consotium http://www.imsglobal.og/

Poblem Statement We need a way to align IMS Leaning Tools Inteopeability and SAML (o othe webbased SSO authentication system).

Use Case When an LMS is potected using an SSO and launches an extenal tool using LTI, we wish to communicate the SSO identity to the extenal tool; this enables: the extenal tool to connect the use_id value fom LTI with an SSO identity; the use to connect diectly to the extenal tool and log in using the SSO fo thei LMS.

Example Scenaio We have thee LMS's at thee schools, one potected using SAML, one potected using CAS, and one that has no SSO. They all connect to an extenal tool that suppots LTI, CAS and SAML, and has elationships with the appopiate SAML IDP and CAS Seve.

Scenaio Diagam lms.saml.edu lms.nada.edu lms.cas.edu mod_cas idp.saml.edu Seve idp.cas.edu Seve /launch tool.hypelti.com mod_cas

Essential Design Concept The LTI Launch is completely nomal poviding the standad within-lms data like use_id, ole, context_id, etc. If the LMS is potected using an SSO and the cuent use is logged in though the SSO, we add the type of SSO (SAML, CAS, etc) and the Identity Povide fo the SSO. The LTI launch does not include the SSO identity as thee is no way to do this eliably.

Design Fo Extenal Tool: 1 The extenal tool has an unpotected LTI launch URL to eceive LTI equests (/launch) The extenal tool has SSO-potected URLs fo all the Identity Povides and SSO types it has a elationship with (/cas_edu, /saml_edu)

Design fo Extenal Tool: 2 If the LTI launch URL eceives paametes including an SSO type and Identity Povide that it is capable of handling, it sets up the LTI data (use, couse, ole, etc.) in the session and fowads to the appopiate SSO-potected URL on its own seve. Since the use is aleady signed in via the SSO, they simply fall though with REMOTE_USER popely set.

Design fo Extenal Tool: 3 Unde the SSO-potected URL, the code knows the LTI use s couse and ole, as well as the Identity Povide and entepise identity. The tool can link all of these togethe within its data stuctues.

Design fo Extenal Tool: 4 Fom that point fowad, the tool can identify the use eithe: via an LTI launch though use_id; o though a diect login to an SSO-potected URL that povides REMOTE_USER

Log into LMS via SSO: 1 1 B o w s e 2 3 idp.saml.edu IDP /launch lms.saml.edu (1) Use accesses LMS (2) Rediected to IDP (3) IDP displays login page tool.hypelti.com

Log into LMS via SSO: 2 B o w s e saml_cookie 2 1 3 idp.saml.edu IDP /launch lms.saml.edu (1) Use submits login to IDP (2) IDP sets cookie and ediects to LMS (3) LMS displays page tool.hypelti.com

Launch extenal tool fom LMS: 1 B o w s e saml_cookie 1 2 use_id=12 sso_type=saml sso_idp=idp.saml.edu 3 idp.saml.edu IDP /launch lms.saml.edu (1) Use selects LTI tool (2) LMS sends signed LTI data fom to bowse (3) Bowse auto-submits data to LTI launch URL tool.hypelti.com

Launch extenal tool fom LMS: 2 B o w s e saml_cookie (1) Tool stoes the LTI launch data in a use session (2) Tool ediects to the URL (3) Bowse adds SAML cookie (4) Request passes though to tool, setting SAML identity 3 2 idp.saml.edu IDP /launch lms.saml.edu use_id=12 sso_type=saml sso_idp=idp.saml.edu 1 tool.hypelti.com emote_use=ause 4

Log into Extenal Tool via SSO: 1 lms.saml.edu B o w s e 1 3 2 idp.saml.edu IDP /launch (1) Use accesses tool diectly at SSOpotected URL (2) Rediected to IDP (3) IDP displays login page tool.hypelti.com

Log into Extenal Tool via SSO: 2 lms.saml.edu B o w s e 1 2 idp.saml.edu IDP /launch (1) Use submits login to IDP (2) IDP sets cookie and ediects to tool (3) Tool looks up use data based on SAML ID use_id=12 sso_type=saml sso_idp=idp.saml.edu tool.hypelti.com 3 emote_use=ause saml_cookie

Futhe Comments The model extends to multiple types of SSO povides and multiple identity povides pe SSO. It caefully avoids the LMS fowading the SSO identity, but instead povides a mechanism fo the tool to "add" the SSO identity to a session though a ediect. Tool povides may obtain additional attibutes about a use fom the IDP (e.g. telephone numbe).

Questions / Comments This is a daft poposal comments welcome