Integrating Web Applications with Shibboleth



Similar documents
Web based single sign on. Caleb Racey Web development officer Webteam, customer services, ISS

Single Sign On at Colorado State. Ron Splittgerber

Steve Chan

Authentication Methods

Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications

Shibboleth Identity Provider (IdP) Sebastian Rieger

Perceptive Experience Single Sign-On Solutions

Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources

IAM, Enterprise Directories and Shibboleth (oh my!)

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

Best Practices for Libraries and Library Service Providers

Shibboleth On-line Authentication System

Federated Identity Management Checklist

Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect

Shibboleth User Verification Customer Implementation Guide Version 3.5

Integration of Shibboleth and (Web) Applications

Using Shibboleth for Single Sign- On

Integrating Multi-Factor Authentication into Your Campus Identity Management System

Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase

Shibboleth Authentication. Information Systems & Computing Identity and Access Management May 23, 2014

AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin martinde@northwestern.edu

Getting Started with Single Sign-On

Biometric Single Sign-on using SAML

SD Departmental Meeting November 28 th, Ale de Vries Product Manager ScienceDirect Elsevier

Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015

TIB 2.0 Administration Functions Overview

Agenda. How to configure

Getting Started with Single Sign-On

WebNow Single Sign-On Solutions

Federating with Web Applications

ShibboLEAP Project. Final Report: School of Oriental and African Studies (SOAS) Colin Rennie

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

Get Cloud Ready: Secure Access to Google Apps and Other SaaS Applications

AA enabling a closed source legacy application

External and Federated Identities on the Web

Authentication and Single Sign On

S P I E Information Environments Shibboleth and Its Integration into Security Architectures. EDUCAUSE & Internet 2 Security Professionals Conference

About Me. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack

Connecting Web and Kerberos Single Sign On

SAML Security Option White Paper

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

SAML-Based SSO Solution

Biometric Single Sign-on using SAML Architecture & Design Strategies

SAML-Based SSO Solution

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

An introduction of several development activities related to Shibboleth and Web browser-based simple PKI

Single Sign-On for the UQ Web

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

UW System Identity & Access Management (IAM) Recommended Strategic Roadmap

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

Federated Identity Management

Shibboleth N-Tier Support. Chad La Joie

Shibboleth Configuration from 100,000 Feet, in 15 Minutes or Less! Steve Thorpe Systems Programmer / Analyst MCNC

Single Sign On. SSO & ID Management for Web and Mobile Applications

Canadian Access Federation: Trust Assertion Document (TAD)

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia Pedro Borges

Shibboleth SP Simple Installation Guide For LINUX

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

Lets get a federated identity. Intro to Federated Identity. Feide OpenIdP. Enter your address. Do you have access to your ?

DocuSign Single Sign On Implementation Guide Published: March 17, 2016

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

Federation and Cloud Services

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS

Secure the Web: OpenSSO

Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper

Canadian Access Federation: Trust Assertion Document (TAD)

U S E R D O C U M E N TA T I O N ( A L E P H I N O

Canadian Access Federation: Trust Assertion Document (TAD)

Toward campus portal with shibboleth middleware

SAML Authentication within Secret Server

Canadian Access Federation: Trust Assertion Document (TAD)

Federated Identity & Access Mgmt for Higher Education

Three Case Studies in Access Management

OIX IDAP Alpha Project - Technical Findings

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

How Single-Sign-On Improves The Usability Of Protected Services For Geospatial Data

Identity Management: The authentic & authoritative guide for the modern enterprise

InCommon Basics and Participating in InCommon

MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation

USING ESPRESSO [ESTABLISHING SUGGESTED PRACTICES REGARDING SINGLE SIGN ON] TO STREAMLINE ACCESS

Prepared by Enea S.Teresa (Italy) Version October 24

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.

Middleware Activities Update

Web Services Security with SOAP Security Proxies

InCommon Affiliates Webinar Three Case Studies with Unicon September 18, 2013

Multi Factor Authentication API

Alfresco Share SAML. 2. Assert user is an IDP user (solution for the Security concern mentioned in v1.0)

Configuring EPM System for SAML2-based Federation Services SSO

TRUST AND IDENTITY EXCHANGE TALK

Using SAML for Single Sign-On in the SOA Software Platform

An overview of configuring WebEx for single sign-on. To configure the WebEx application for single-sign on from the cloud service (an overview)

Building Secure Applications. James Tedrick

Flexible Identity Federation

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x

JOSSO 2.4. Internet Information Server (IIS) Tutorial

Transcription:

Integrating Web Applications with Shibboleth Application Authentication Done Right July 11, 2016 Eric Goodman, UCOP IAM Architect Jeffrey Crawford, UCSC Application Admin

What is Shibboleth? Shibboleth An open-source, higher-ed funded application Implements SAML protocol to support federated authentication Authenticates users of web apps by leveraging existing user accounts So what is SAML? Security Assertion Markup Language Protocol (standard), NOT an application Communicates Authentication information Describes who(ish), how and when the user logged in XML-based Secure Uses asymmetric key cryptography for message signing/encryption SAML is the UC Standard for cross-campus authentication 2

UC Standards? UC IT Architecture Committee (ITAC) Working sub-committee to the UC IT Leadership Council (ITLC) Mission: establish the enterprise architecture and technology infrastructure necessary to promote and support interoperability and sharing of IT solutions among and between campuses Foundation for Collaboration on Technology Enabled UC Solutions, Pillar II Develops principles, standards and practices of Enterprise Architecture across UC Facilitates knowledge sharing and collaboration across campuses. Supports implementations of UC-wide initiatives through consultation and maintenance of EA Body of Knowledge 3

More on ITAC, Standards, Etc. Enterprise Architecture Body of Knowledge (EA BoK) Repository of IT principles, standards, guidelines and other EA Artifacts (EAAs) Reviewed by campus communities and adopted by CIOs SAML for app authentication (EAA-006) is one of the standards Formally adopted at more than half of campuses De-facto standard via UCTrust (i.e., all campuses support this) UCTrust Subcommittee of ITAC Mission: provide input on design and implementation of identity management solutions for the UC system and to foster collaboration on IAM solutions among the campuses Members provide direct support of SSO (Shibboleth) integration 4

Federated Authentication and UC Enterprise Architecture Standards You are here 5

More info ITAC UCCSC Presentation and overview 3:00 Monday, Porter D246 Website https://spaces.ais.ucla.edu/display/ucitag/ UCTrust Website https://spaces.ais.ucla.edu/display/uctrustwg/ 6

What is Shibboleth? Shibboleth An open-source, higher-ed funded application Implements SAML protocols to support federated authentication So what is SAML? Security Assertion Markup Language Protocol (standard), NOT an application Communicates Authentication information Describes who(ish), how and when the user logged in XML-based Secure Uses asymmetric key cryptography for message signing/encryption SAML is the UC Standard for cross-campus authentication 7

Why Shibboleth? and it was so, that when those Ephraimites which were escaped said, Let me go over; that the men of Gilead said unto him, Art thou an Ephraimite? If he said, Nay; Then said they unto him, Say now Shibboleth: and he said Sibboleth: for he could not frame to pronounce it right. Then they took him, and slew him at the passages of Jordan: and there fell at that time of the Ephraimites forty and two thousand Judges 12:5 6, King James Bible 8

Comparison of Authn Approaches Local authentication Pass-thru (proxy) authentication Authentication as a service 9

Local Authentication Use application-specific passwords 10

Local Authentication 11

Local Authentication - Scaling Passwords Everywhere! 12

Local Authentication Pros Flexibility Different usernames and passwords for each site Simple to set up Cons Usability Different usernames and passwords for each site Doesn t integrate with anything else Password changes are per-application App must support password reset/i forgot my password Security Strong risk that users will reuse passwords Passwords are confidential data and require extra security! 13

Pass-thru (proxy) Authentication Externalizes authentication Application impersonates user Verifier can be LDAP, AD, Kerberos, etc. 14

Pass-thru Authentication 15

Pass-thru Authentication - Scaling Passwords transmitted everywhere! 16

Pass-thru Authentication Pros Same username password at each site Single database for account/password changes Cons Each app directly handles/transmits passwords Trains users to enter UC password on any site User has no way to validate website Application is the user AuthN service can t distinguish you and application 17

Federated Authentication Authentication as a service Uses the SAML protocol 18

Federated Authentication - Scaling 19

Federated Authentication Pros A single, trusted application handles the passwords Users always enter UC passwords on same website Application sees approved user info, does not act as user Authentication process handled centrally Can leverage central services; multi-factor authentication, expired accounts Single Sign On Supports logins from multiple campuses without requiring new accounts Easy to Export E.g., safe to install and run in cloud environments (like AWS) Cons Largely Web-Only Complexity of initial install Onboarding process at UC is currently clunky Vendor adoption 20

Federated Authentication: SAML and Shibboleth How it Works 21

Shibboleth components Identity Provider (IdP) Run by the campus (organization) Performs authentication (login) Provides verifiable attributes describing user Service Provider (SP) Run at the application level ( protected resource ) Communicates with and validates info from IdP 22

Things to get used to with SAML IdP and SP don t directly communicate AuthN info is shared via SAML messages SAML messages are carried by user s browser Encryption and signing are important! IdP does not control application session Tells SP about the user being authenticated After login/authentication is complete, IdP is done SP session is managed locally Means that Logout is a whole different animal SP does not control login process Asks IdP to do authentication AuthN UI/flow is managed by the IdP The IdP provides the user data (including username) SP must use/map the IdP s data for local profiles 23

Demo login (if time) 24

SAML Technical Notes Shibboleth SP software runs as a separate daemon/service SP software maintains its own session Application/web server can leverage session, but map to its own env SP software translates SAML into http headers or web variables Application reads SAML attributes to identify user $_SERVER[ attribute_name ]; request.getheader("attribute_name"); App can register users on the fly using this info I.e., Create profile dynamically using IdP-provided information Other notes Apps built from scratch are easy to integrate with Shibboleth Third party apps can be more difficult depending on architecture Applications that read REMOTE_USER generally integrate well j2ee applications based on tomcat? use AJP if possible 25

SAML Attributes eduperson (InCommon/Internet2) Attributes edupersonaffiliation edupersonentitlement edupersonnickname edupersonorgdn edupersonorgunitdn edupersonprimaryaffiliation edupersonprimaryorgunitdn edupersonprincipalname edupersonscopedaffiliation edupersontargetedid UCTrust Attributes UCNetID UCTrustAssurance UCCampusEmployeeID UCTrustShortCampusID (deprecated) UCPathEmplid UCCampusStudentId UCEmployeeStatus??? UCStudentGradeLevel??? Local Attributes (campus specific) CruzID (UCSC) FacultySystemID (hypothetical) 26

Using SAML in an App Install Shibboleth SP software (shibd) Official RPMs/Installers RHEL, CentOS, SUSE, Windows Unofficial (Li/U)nux systems, MacOS (MacPorts), Java Servlets Configure web server Apache Load module (mod_shib) Protect content using normal Location directives IIS Enable ISAPI filter (isapi_shib.dll) Protect in shibboleth2.xml using shibboleth config syntax 27

Using SAML in an App Configure Shibboleth Software shibboleth2.xml Controls shibboleth options (config, basic settings) Protection directives for IIS must go here Uses a Shib-specific syntax attribute-map.xml Maps SAML attributes to variables/headers Protection directives (Apache only) Via standard <Location /> style configs 28

Configuring Shibboleth Set entityid in ApplicationDefaults <ApplicationDefaults entityid="https://idm-test-sp.ucsc.edu/shibboleth" REMOTE_USER="eppn persistent-id targeted-id"> For https, change this in Sessions section <Sessions lifetime="28800" timeout="3600" relaystate="ss:mem" checkaddress="false" handlerssl="true" cookieprops="https"> 29

Configuring Shibboleth (cont) Load Metadata (the config. info for campus IdPs) <MetadataProvider type="xml" uri="http://md.incommon.org/incommon/incommon-metadata.xml" backingfilepath="incommon-metadata.xml reloadinterval="7200"> </MetadataProvider> Identify login service? <SSO discoveryprotocol="samlds" discoveryurl="https://wayf.incommonfederation.org/ds/wayf"> SAML2 SAML1 </SSO> 30

Using SAML in an App Test with local campus IdP May require loading local campus IdP configuration May require configuration of campus IdP (by local IdM team) Process varies, work with your campus contact: https://spaces.ais.ucla.edu/display/uctrustwg/uctrust+campus+contacts Register application with InCommon InCommon provides a registry of verified SP/IdP config info Called Metadata Shibboleth automatically loads/updates configs from InCommon Work with campus contact to list your app in InCommon Work with campus contact to integrate with other campuses Request appropriate attributes 31

Vendors and SAML SAML support is frequently minimal Vendors don t always use Shibboleth (the app) Vendors may require manual configuration of IdP info Rather than Shib s auto config via InCommon metadata Some vendors are limited to one campus (IdP) SAML Proxy service may help Available via UCOP for UC applications SSO does not always mean SAML Can mean we integrate with AD (or LDAP) I.e., Pass-thru or proxy authentication Not what we use at UC for systemwide apps Include SAML support in initial plans and RFPs 32

Question & Answer 33

For further questions Eric Goodman, UCOP IAM Architect eric.goodman@ucop.edu 510-587-6308 Jeffrey Crawford, UCSC App Admin jeffreyc@ucsc.edu Campus IAM contacts https://spaces.ais.ucla.edu/display/uctrustwg/uctrust+campus+contacts 34