SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security



Similar documents
SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols

INTERNATIONAL TELECOMMUNICATION UNION

ITU-T. G Amendment 5 (04/2010)

ITU-T E.118. The international telecommunication charge card

INTERNATIONAL TELECOMMUNICATION UNION

ITU-T Y General overview of NGN

SERIES M: TELECOMMUNICATION MANAGEMENT, INCLUDING TMN AND NETWORK MAINTENANCE Integrated services digital networks

INTERNATIONAL TELECOMMUNICATION UNION SERIES L: CONSTRUCTION, INSTALLATION AND PROTECTION OF CABLES AND OTHER ELEMENTS OF OUTSIDE PLANT

INTERNATIONAL TELECOMMUNICATION UNION

ITU-T E.123. Notation for national and international telephone numbers, addresses and Web addresses

INTERNATIONAL TELECOMMUNICATION UNION

ITU-T Q.812. Amendment 3 (02/00) Protocol profile for electronic communications interactive agent Amendment 3:

INTERNATIONAL TELECOMMUNICATION UNION

By Authority Of THE UNITED STATES OF AMERICA Legally Binding Document

ITU-T G.800. Amendment 2 (09/2010) Unified functional architecture of transport networks Amendment 2

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Cyberspace security Identity management

SERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKS Transmission media and optical systems characteristics Optical fibre cables

EHR OAuth 2.0 Security

SAML and OAUTH comparison

INTERNATIONAL TELECOMMUNICATION UNION. WORLD TELECOMMUNICATION STANDARDIZATION ASSEMBLY Dubai, November 2012

INTERNATIONAL TELECOMMUNICATION UNION

This document is a preview generated by EVS

SERIES T: TERMINALS FOR TELEMATIC SERVICES Still-image compression JPEG-1 extensions

INTERNATIONAL TELECOMMUNICATION UNION

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

IBM WebSphere Application Server

) SERIES V: DATA COMMUNICATION OVER THE TELEPHONE NETWORK Interfaces and voiceband modems. ITU-T Recommendation V.25

Dell One Identity Cloud Access Manager How to Develop OpenID Connect Apps

INTERNATIONAL TELECOMMUNICATION UNION

OAuth 2.0 Developers Guide. Ping Identity, Inc th Street, Suite 100, Denver, CO

INTERNATIONAL TELECOMMUNICATION UNION. SERIES V: DATA COMMUNICATION OVER THE TELEPHONE NETWORK Interfaces and voiceband modems

ACR Connect Authentication Service Developers Guide

ITU-T X Identity and access management taxonomy

OAuth 2.0. Weina Ma

ETSI TS V3.1.1 ( ) Technical Specification

Building Secure Applications. James Tedrick

Chapter 2 PSTN and VoIP Services Context

ETSI TS V2.0.0 ( ) Technical Specification

Axway API Gateway. Version 7.4.1

IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0

SERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKS Transmission media and optical systems characteristics Optical fibre cables

Copyright Pivotal Software Inc, of 10

-SETTING ORGANIZATIONS

OAuth 2.0: Theory and Practice. Daniel Correia Pedro Félix

)454 6 %,%#42)#!, #(!2!#4%2)34)#3 &/2 5."!,!.#%$ $/5",%#522%.4 ).4%2#(!.'% #)2#5)43 $!4! #/--5.)#!4)/. /6%2 4(% 4%,%0(/.%.%47/2+ )454 Recommendation 6

OAuth Guide Release 6.0

Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 ( )

ENUM: an Enabler for VoIP and Next Generation Services

A Standards-based Mobile Application IdM Architecture

The identity management (IdM) ecosystem: minding the gaps

)454, &IRE DETECTION AND ALARM SYSTEMS DETECTOR AND SOUNDER DEVICES

Standards for VoIP in the Enterprise

Quality of Service and Quality of Experience in Fixed-Line and Mobile Multimedia Services

INTERNATIONAL TELECOMMUNICATION UNION

3GPP TS V8.1.0 ( )

Introduction to SAML

OAuth 2.0 Workshop. On how native (mobile) devices can use OAuth protected resources

DocuSign Single Sign On Implementation Guide Published: March 17, 2016

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

)454 6 %LECTRICAL CHARACTERISTICS FOR BALANCED DOUBLECURRENT INTERCHANGE CIRCUITS OPERATING AT DATA SIGNALLING RATES UP TO -BITS

AUSTRALIAN COMMUNICATIONS AUTHORITY CALL FOR EXPRESSIONS OF INTEREST FOR A TIER 1 REGISTRY OPERATOR FOR THE AUSTRALIAN TRIAL OF ENUM

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

HISO Videoconferencing Interoperability Standard

Onegini Token server / Web API Platform

)454 % 4HE INTERNATIONAL TELECOMMUNICATION CHARGE CARD

Web Based Single Sign-On and Access Control

OpenID Connect 1.0 for Enterprise

OPENIAM ACCESS MANAGER. Web Access Management made Easy

Next Generation 112 Explained

EUROPEAN ETS TELECOMMUNICATION May 1995 STANDARD

Feide Integration Guide. Technical Requisites

OAuth: Where are we going?

ND1001:1999/06 PNO-ISC/SPEC/001

ETSI TR V1.1.2 ( )

Telecommunication Origin Identification. Jie Zhang Vice chair, ITU-T SG2

ITU-T G.652. Characteristics of a single-mode optical fibre cable

OAuth2 and UMA for ACE draft-maler-ace-oauth-uma-00.txt. Eve Maler, Erik Wahlström, Samuel Erdtman, Hannes Tschofenig

UNI. UNIfied identity management. Krzysztof Benedyczak ICM, Warsaw University

RESOLUTION 102 (REV. BUSAN, 2014)

Securing VoIP Networks using graded Protection Levels

TSIN02 - Internetworking

OIOSAML Rich Client to Browser Scenario Version 1.0

This specification this document to get an official version of this User Network Interface Specification

Master Kurs Rechnernetze Computer Networks IN2097

INTERNATIONAL TELECOMMUNICATION UNION

COMMISSION OF THE EUROPEAN COMMUNITIES

ETSI TS V1.1.1 ( ) Technical Specification

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

Transcription:

International Telecommunication Union ITU-T Y.2723 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/2013) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security Support for OAuth in next generation networks Recommendation ITU-T Y.2723

ITU-T Y-SERIES RECOMMENDATIONS GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT- GENERATION NETWORKS GLOBAL INFORMATION INFRASTRUCTURE General Services, applications and middleware Network aspects Interfaces and protocols Numbering, addressing and naming Operation, administration and maintenance Security Performances INTERNET PROTOCOL ASPECTS General Services and applications Architecture, access, network capabilities and resource management Transport Interworking Quality of service and network performance Signalling Operation, administration and maintenance Charging IPTV over NGN NEXT GENERATION NETWORKS Frameworks and functional architecture models Quality of Service and performance Service aspects: Service capabilities and service architecture Service aspects: Interoperability of services and networks in NGN Enhancements to NGN Network management Network control architectures and protocols Packet-based Networks Security Generalized mobility Carrier grade open environment FUTURE NETWORKS CLOUD COMPUTING Y.100 Y.199 Y.200 Y.299 Y.300 Y.399 Y.400 Y.499 Y.500 Y.599 Y.600 Y.699 Y.700 Y.799 Y.800 Y.899 Y.1000 Y.1099 Y.1100 Y.1199 Y.1200 Y.1299 Y.1300 Y.1399 Y.1400 Y.1499 Y.1500 Y.1599 Y.1600 Y.1699 Y.1700 Y.1799 Y.1800 Y.1899 Y.1900 Y.1999 Y.2000 Y.2099 Y.2100 Y.2199 Y.2200 Y.2249 Y.2250 Y.2299 Y.2300 Y.2399 Y.2400 Y.2499 Y.2500 Y.2599 Y.2600 Y.2699 Y.2700 Y.2799 Y.2800 Y.2899 Y.2900 Y.2999 Y.3000 Y.3499 Y.3500 Y.3999 For further details, please refer to the list of ITU-T Recommendations.

Recommendation ITU-T Y.2723 Support for OAuth in next generation networks Summary Recommendation ITU-T Y.2723 specifies the mechanisms and procedures for employing "The OAuth 2.0 Authorization Framework (OAuth)", defined by the Internet Engineering Task Force, for the scenarios where the role of the OAuth authorization server is performed by a next generation network (NGN) provider. The companion document, Recommendation ITU-T Y.2724, "Framework for supporting OAuth and OpenID in next generation networks", provides the context, architectural considerations and highlevel framework for employing OAuth in NGNs. This Recommendation specifies the requirements pertinent to the restriction of OAuth option selections, as well as additional requirements that make the use of OAuth consistent with NGN security and identity management requirements. History Edition Recommendation Approval Study Group 1.0 ITU-T Y.2723 2013-11-15 13 Rec. ITU-T Y.2723 (11/2013) i

FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-T's purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression "Administration" is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words "shall" or some other obligatory language such as "must" and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http://www.itu.int/itu-t/ipr/. ITU 2013 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. ii Rec. ITU-T Y.2723 (11/2013)

Table of Contents Page 1 Scope... 1 2 References... 1 3 Definitions... 1 3.1 Terms defined elsewhere... 1 3.2 Terms defined in this Recommendation... 2 4 Abbreviations and acronyms... 2 5 Conventions... 2 6 Support for OAuth in NGN... 2 6.1 Selection of OAuth client types based on NGN security requirements... 2 6.2 Selection of the authorization grant types... 3 6.3 Recommendations on the OAuth options for NGN-supported clients... 3 6.4 Authentication of a resource owner... 4 6.5 Security considerations... 5 Bibliography... 6 Rec. ITU-T Y.2723 (11/2013) iii

Introduction Recommendation ITU-T Y.2723 provides a framework for the support and use of OAuth and OpenID in next generation networks (NGNs). This Recommendation builds upon Recommendation ITU-T Y.2724 to define specific methods for supporting OAuth. NOTE This Recommendation does not make any changes or modifications to the OAuth protocol. It focuses only on the support and use of OAuth by NGNs. iv Rec. ITU-T Y.2723 (11/2013)

Recommendation ITU-T Y.2723 Support for OAuth in next generation networks 1 Scope This Recommendation describes the mechanisms and procedures for the support of OAuth 2.0 authorization protocol (OAuth) in next generation networks (NGNs). The mechanisms and procedures described in this Recommendation can be used to support application services in a multi-service, multi-provider environment. This Recommendation assumes that the OAuth authorization service is provided by the NGN. 2 References The following ITU-T Recommendations and other references contain provisions which, through reference in this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All Recommendations and other references are subject to revision; users of this Recommendation are therefore encouraged to investigate the possibility of applying the most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. The reference to a document within this Recommendation does not give it, as a stand-alone document, the status of a Recommendation. [ITU-T X.1254] Recommendation ITU-T X.1254 (2012), Entity authentication assurance framework. [ITU-T Y.2701] Recommendation ITU-T Y.2701 (2007), Security requirements for NGN release 1. [ITU-T Y.2702] Recommendation ITU-T Y.2702 (2008), Authentication and authorization requirements for NGN release 1. [ITU-T Y.2720] Recommendation ITU-T Y.2720 (2009), NGN identity management framework. [ITU-T Y.2721] Recommendation ITU-T Y.2721 (2010), NGN identity management requirements and use cases. [ITU-T Y.2724] Recommendation ITU-T Y.2724 (2013), Framework for supporting OAuth and OpenID in next generation networks. [IETF RFC 6749] IETF RFC 6749 (2012), The OAuth 2.0 Authorization Framework. <http://datatracker.ietf.org/doc/rfc6749/> 3 Definitions 3.1 Terms defined elsewhere This Recommendation uses the following terms defined elsewhere: 3.1.1 access token [IETF RFC 6749]: Access tokens are credentials used to access protected resources. An access token is a string representing an authorization issued to the client. The string is usually opaque to the client. Tokens represent specific scopes and durations of access, granted by the resource owner, and enforced by the resource server and authorization server. 3.1.2 (entity) authentication [b-itu-t X.1252]: A process used to achieve sufficient confidence in the binding between the entity and the presented identity. 3.1.3 authorization [b-itu-t X.800]: The granting of rights, which includes the granting of access based on access rights. Rec. ITU-T Y.2723 (11/2013) 1

3.1.4 authorization grant [IETF RFC 6749]: An authorization grant is a credential representing the resource owner's authorization (to access its protected resources) used by the client to obtain an access token. 3.1.5 authorization server [IETF RFC 6749]: The server issuing access tokens to the client after successfully authenticating the resource owner and obtaining authorization. 3.1.6 client [IETF RFC 6749]: An application making protected resource requests on behalf of the resource owner and with its authorization. The term "client" does not imply any particular implementation characteristics (e.g., whether the application executes on a server, a desktop or other devices). 3.1.7 confidential clients [IETF RFC 6749]: These are clients capable of maintaining the confidentiality of their credentials (e.g., client implemented on a secure server with restricted access to the client credentials), or capable of secure client authentication using other means. 3.1.8 public clients [IETF RFC 6749]: These are clients incapable of maintaining the confidentiality of their credentials (e.g., clients executing on the device used by the resource owner, such as an installed native application or a web browser-based application), and incapable of secure client authentication via any other means. 3.1.9 resource owner [IETF RFC 6749]: An entity capable of granting access to a protected resource. When the resource owner is a person, they are referred to as an end-user. 3.1.10 resource server [IETF RFC 6749]: The server hosting the protected resources, capable of accepting and responding to protected resource requests using access tokens. 3.2 Terms defined in this Recommendation None. 4 Abbreviations and acronyms This Recommendation uses the following abbreviations and acronyms: IdM Identity Management NGN Next Generation Network OAuth OAuth 2.0 Authorization Protocol SAML Security Assertion Markup Language URI Uniform Resource Identifier 5 Conventions None. 6 Support for OAuth in NGN This clause describes the main aspects of supporting OAuth in NGN. 6.1 Selection of OAuth client types based on NGN security requirements [IETF RFC 6749] defines two OAuth client types: confidential and public clients. Public clients do not meet the authentication requirements for NGN third party application providers [ITU-T Y.2702], because public clients cannot be authenticated by the NGN provider [ITU-T Y.2724]. This Recommendation recommends that the NGN supports only confidential clients. The clients must meet the following requirements: 2 Rec. ITU-T Y.2723 (11/2013)

1. The NGN OAuth client must be able to be authenticated at specific assurance levels [ITU-T Y.2702], [ITU-T X.1254]. 2. The NGN OAuth client must be registered with the authorization server as specified in section 2 of [IETF RFC 6749]. OAuth 2.0 [IETF RFC 6749] defines the following client profiles: web application, user-agent-based application, and native application. The web application is a profile of a private client, while the last two are profiles of the public clients. This Recommendation describes NGN support only for the client of the web application profile. 6.2 Selection of the authorization grant types [IETF RFC 6749] defines the following types of authorization grants: authorization code, implicit, resource owner password credentials, and client credentials. Additionally, IETF are currently working on defining an extension, which specifies the SAML 2.0 assertion grant type for OAuth 2.0. [IETF RFC 6749] explains that "when issuing an access token during the implicit grant flow, the authorization server does not authenticate the client. In some cases, the client identity can be verified via the redirection URI used to deliver the access token to the client. The access token may be exposed to the resource owner or other applications with access to the resource owner's user-agent". Thus, the OAuth flows that use the implicit grant type do not result in authentication that meets the requirements for authentication of the NGN third party application provider [ITU-T Y.2702]. This Recommendation focuses on describing NGN support of the confidential client of the web application profile with the use of the following authorization grants: authorization code resource owner password credentials client credentials SAML 2.0 assertion. 6.3 Recommendations on the OAuth options for NGN-supported clients [IETF RFC 6749] flows are optimized for several client profiles of the two types of clients. The RFC specifies the options for selecting the authorization grant types, parameters and security requirements. This clause provides recommendations for supporting confidential clients of the web application profile. This clause also focuses on those requirements and optional parameters whose selection is essential for OAuth support in NGNs. 6.3.1 Client registration Section 2.2 of [IETF RFC 6749] recommends the registration of the clients' redirection URIs with an authorization server, because the clients with the registered URIs enable higher security. This Recommendation requires that NGN-supported clients register their redirection URIs with the authorization server. 6.3.2 Confidentiality of the messages to the client redirection endpoint Section 3.1.2.1 of [IETF RFC 6749], makes the following recommendation: "the redirection endpoint SHOULD require the use of TLS as described in section 1.6 when the requested response type is "code" or "token", or when the redirection request will result in the transmission of sensitive credentials over an open network". This Recommendation requires that TLS be used for the transmission of any sensitive information. Rec. ITU-T Y.2723 (11/2013) 3

6.3.3 Client authentication The clients defined by the web application profile are confidential clients. Therefore, the client's authentication to an authorization server is required. 6.3.4 Authorization procedures This Recommendation covers confidential clients of the web application profile that use the authorization procedures of the following authorization grant types: authorization code resource owner password credential client credentials SAML extension. 6.3.4.1 Authorization code The authorization procedure for confidential clients with the use of the authorization code is specified in section 4.1 of [IETF RFC 6749]. This Recommendation requires the inclusion of the redirect_uri parameter in authorization requests. The following requirements apply to the authorization server's interaction with the clients of the web application profile using an authorization code. The authorization server MUST: authenticate the client that issued the authorization request; ensure that the value of the redirect_uri parameter in the client's authorization request matches the registered value for the client; issue the authorization code only to authenticated and authorized clients; before issuing an access token, ensure that the authorization code is valid. 6.3.4.2 Resource owner password credentials The authorization procedure that uses this grant type is optimized for the clients that have established trust with the resource owner. A client uses the resource owner's password credentials to get an access token from the authorization server. The procedure specified in section 4.3 of [IETF RFC 6749] satisfies the NGN security requirements. NOTE [IETF RFC 6749] permits the use of this procedure by public clients. This Recommendation considers only confidential clients, which are required to authenticate to the authorization server. In accordance with [IETF RFC 6749] the authorization server, when interacting with a client that uses the grant type resource owner password credentials, MUST: authenticate the client; validate the resource owner password credentials presented by the client; issue an access token if the client has authenticated to the authorization server and presented the valid resource owner credentials. 6.4 Authentication of a resource owner The OAuth specification [IETF RFC 6749] does not specify resource owner's (e.g., end-user) authentication by the authorization server. In the NGN environment, a mechanism for authentication of a resource owner must meet the requirements of [ITU-T Y.2702]. 4 Rec. ITU-T Y.2723 (11/2013)

6.5 Security considerations The section "Security Considerations" for the specification of OAuth 2.0 [IETF RFC 6749] provides security guidelines for all OAuth 2.0 client profiles web application, user-agent-based application and native application. This Recommendation recommends the support of web application clients in NGN. Consequently, only the security considerations of [IETF RFC 6749] that are related to the web application clients apply here. In addition, [b-ietf RFC 6819] provides a comprehensive OAuth security model and background for the protocol design. The material of [b-ietf RFC 6819] that is relevant to the web application clients should be considered for the implementations that support OAuth in NGN. The solutions should also comply with the NGN and IdM security requirements specified in [ITU-T Y.2701], [ITU-T Y.2720], [ITU-T Y.2721]. Rec. ITU-T Y.2723 (11/2013) 5

Bibliography [b-itu-t X.800] [b-itu-t X.1252] [b-ietf RFC 6819] Recommendation ITU-T X.800 (1991), Security architecture for Open Systems Interconnection for CCITT applications. Recommendation ITU-T X.1252 (2010), Baseline identity management terms and definitions. IETF RFC 6819, OAuth 2.0 Threat Model and Security Considerations. http://datatracker.ietf.org/doc/rfc6819/ 6 Rec. ITU-T Y.2723 (11/2013)

SERIES OF ITU-T RECOMMENDATIONS Series A Series D Series E Series F Series G Series H Series I Series J Series K Series L Series M Series N Series O Series P Series Q Series R Series S Series T Series U Series V Series X Series Y Series Z Organization of the work of ITU-T General tariff principles Overall network operation, telephone service, service operation and human factors Non-telephone telecommunication services Transmission systems and media, digital systems and networks Audiovisual and multimedia systems Integrated services digital network Cable networks and transmission of television, sound programme and other multimedia signals Protection against interference Construction, installation and protection of cables and other elements of outside plant Telecommunication management, including TMN and network maintenance Maintenance: international sound programme and television transmission circuits Specifications of measuring equipment Terminals and subjective and objective assessment methods Switching and signalling Telegraph transmission Telegraph services terminal equipment Terminals for telematic services Telegraph switching Data communication over the telephone network Data networks, open system communications and security Global information infrastructure, Internet protocol aspects and next-generation networks Languages and general software aspects for telecommunication systems Printed in Switzerland Geneva, 2013