Federated Identity Providers



Similar documents
External and Federated Identities on the Web

Agenda. How to configure

SAML-Based SSO Solution

Identity Management with Spring Security. Dave Syer, VMware, SpringOne 2011

MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation

SAML and OAUTH comparison

Authentication Methods

AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

Shibboleth N-Tier Support. Chad La Joie

Flexible Identity Federation

Copyright Pivotal Software Inc, of 10

Security As A Service Leveraged by Apache Projects. Oliver Wulff, Talend

Lecture Notes for Advanced Web Security 2015

Identity Management: The authentic & authoritative guide for the modern enterprise

IBM WebSphere Application Server

SAML Security Option White Paper

TIBCO Spotfire Platform IT Brief

The saga of WebFTS and Federated Identity

OAuth 2.0 Developers Guide. Ping Identity, Inc th Street, Suite 100, Denver, CO

Single Sign-On for the UQ Web

SAML-Based SSO Solution

USING FEDERATED AUTHENTICATION WITH M-FILES

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia Pedro Borges

About Me. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack

IBM Tivoli Federated Identity Manager V6.2.2 Implementation. Version: Demo. Page <<1/10>>

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

Get Success in Passing Your Certification Exam at first attempt!

TIB 2.0 Administration Functions Overview

Onegini Token server / Web API Platform

From the Intranet to Mobile. By Divya Mehra and Stian Thorgersen

OpenLogin: PTA, SAML, and OAuth/OpenID

Copyright: WhosOnLocation Limited

PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0

Identity Implementation Guide

IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0

HOL9449 Access Management: Secure web, mobile and cloud access

UNI. UNIfied identity management. Krzysztof Benedyczak ICM, Warsaw University

PKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc

Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems

Introduction to SAML

Dell One Identity Cloud Access Manager How to Develop OpenID Connect Apps

Enhancing Web Application Security

Authentication and Single Sign On

CA Nimsoft Service Desk

OpenID Single Sign On and OAuth Data Access for Google Apps. Ryan Dave Primmer May 2010

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

Axway API Gateway. Version 7.4.1

OpenID Connect 1.0 for Enterprise

Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect

Q&A Session for Understanding Atrium SSO Date: Thursday, February 14, 2013, 8:00am Pacific

Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 ( )

Single Sign-On Implementation Guide

Novell Access Manager

Single Sign-On Implementation Guide

PARTNER INTEGRATION GUIDE. Edition 1.0

How Single-Sign-On Improves The Usability Of Protected Services For Geospatial Data

Perceptive Experience Single Sign-On Solutions

Single Sign-On Implementation Guide

Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase

Using SAML for Single Sign-On in the SOA Software Platform

IBM WebSphere Application Server

Enabling SAML for Dynamic Identity Federation Management

Server based signature service. Overview

Mobile Security. Policies, Standards, Frameworks, Guidelines

SAML Federated Identity at OASIS

Apache Milagro (incubating) An Introduction ApacheCon North America

How to create a SP and a IDP which are visible across tenant space via Config files in IS

DEPLOYMENT GUIDE. SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity

SSO Plugin. Release notes. J System Solutions. Version 3.6

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

OAuth 2.0. Weina Ma

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta

FreeIPA Cross Forest Trusts

How to Extend Identity Security to Your APIs

Shibboleth Identity Provider (IdP) Sebastian Rieger

LinuxCon North America

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department

Securing ArcGIS Server Services: First Steps

SAML Single-Sign-On (SSO)

Improving Security and Productivity through Federation and Single Sign-on

Final Project Report December 9, Cloud-based Authentication with Native Client Server Applications. Nils Dussart

SAML AS AN SSO STANDARD FOR CUSTOMER IDENTITY MANAGEMENT. How to Create a Frictionless, Secure Customer Identity Management Strategy

External Identity and Authentication Providers For Apache HTTP Server

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

Web Based Single Sign-On and Access Control

OpenID Deutsche telekom. Dr. Torsten Lodderstedt, Deutsche Telekom AG

Administering Jive Mobile Apps

Fairsail. Implementer. Single Sign-On with Fairsail and Microsoft Active Directory Federation Services 2.0. Version 1.92 FS-SSO-XXX-IG R001.

HP Software as a Service. Federated SSO Guide

Implementation Guide SAP NetWeaver Identity Management Identity Provider

Setup Guide Access Manager 3.2 SP3

Transcription:

Federated Identity Providers and the Ipsilon project Simo Sorce Sr. Princ. Sw. Engineer, Red Hat 2015/02/06

What is Federation? In a nutshell: Dealing with users that you do not control on your own. To do that you need to trust a third party 2

Trusting a third party An organization wants to offer services to another which owns the users identities. User's org controls what is disclosed about the user User does not need to know additional credentials Third party does not need full view of the users store redcat.omg user 3? foogle.omg

Trusting a third-third party Federation is also used when another party need access to data on the user's behalf. Also know as delegation. The third party only get access to specific user data The user/org. is in control of the permissions granted mydata.omg user redcat.omg 4 slurpin.omg? user's data

Not Federation Surrendering credentials is not federation. User's org. has no control, breach of privacy. User has no control on what the 3rd party will actually do with the credentials. 3rd party has liabilities it shouldn't want. No Single-sign-on. foogle.omg user 5 user@foogle.omg + password slurpin.omg user@foogle.omg + password user's contacts

Federation protocols Most federation protocols are web/http oriented Some authentication flows depend on a user sitting in front of a browser Non-interactive modes are available in some cases Delegation modes are non interactive (but may depend on interactive modes for setting up the delegation) To name a few: 6 SAML, OpenId, OpenId Connect, Persona,...

How does it work? 7

Glossary Identity Provider Server that authenticate users Or provides enough data to verify an authentication assertion Service Provider / Relaying Party Server that needs authentication by a third party Identity Provider The system the user is trying to access (directly or indirectly like in the delegation case) 8

SAML Key aspects: Requires agreement between parties The Identity Provider can choose what data to send third parties receive assertions with attributes Data can be encrypted Single-sign-on friendly 9 exchange of metadata and public keys Support also single-logout and administrative logout Enterprise oriented Based on XML and SOAP on top of HTTP Spec by OASIS

SAML Example auth flow: jomo.omg No direct communication between SP and IdP is necessary at login time, thanks to previous metadata exchange. 303 The SP redirects the user to the IdP to obtain an assertion that the user is valid and authenticated. The assertion contains attributes that identify the user. 10 [auth] User @ redcat (browser) redcat.omg 303 The Identity Provider (IdP) receives the SP's request and may asks the user for proof of identification (if needed). If all checks pass the IdP redirects the user back to the SP to hand it an assertion.

OpenID Connect Key aspects: Supports user-driven consent Users can be allowed to decide whether to allow or deny authentication requests and what data to send Completely different from OpenID 1.0/2.0 Consumer Oriented 11 Users may be allowed to tell the IdP to trust arbitrary third-parties (Idp does not need to trust the RP) Based on REST, JSON and Oauth 2.0

OpenID Connect Example auth flow: Token needs to be validated online by Idp jomo.omg 303 [auth] The RP redirects the user to the IdP to obtain an authentication token. User @ redcat (browser) 12 redcat.omg validation 303 The Identity Provider (IdP) receives the request and may asks the user for proof of identification (if needed). If all checks pass the IdP redirects the user back to the SP to hand it a token.

Persona Key aspects: Privacy oriented Requires a browser plugin or some complex javascript Based on email address for identity requires a public website to host the Idp public certificate Uses crypto to generate custom user certificates Uses custom public/private key protocol 13 The Idp doesn't get to know each and every user's move The protocol is called BrowserID

Persona Example auth flow: Only fetches public certificate jomo.omg The RP obtains a signed assertion and the user's certificate and uses the IdP public cert. to establish authenticity. 14 validation [signs token] User @ redcat (browser) redcat.omg The Identity Provider (IdP) is queried only to authenticate and obtain a user certificate valid for a short period.

The Ipsilon project 15

Ipsilon A pluggable Identity Provider Supports multiple authentication methods Supports multiple Federation protocols Provides tools for easy installation, configuration and management Not an Identity Management server 16

Ipsilon The server is built in python Best run in mod_wsgi Standalone mode via cherrypy Plugins are drop-in Clients available for apache Native C modules 17 mod_auth_mellon (for SAML)

Merged with FedOAuth FedOauth Current Fedora authentication system Implemented OpenID Written in python too Merged into Ipsilon 18 Merge complete in December 2014 Rolling the merged Ipsilon project in Fedora Infrastructure right now

Ipsilon authentication Supports authentication via 19 any apache module direct LDAP binds Kerberos Chaining to other IdP IPA / AD / etc... Supports fetching info via LDAP Nsswitch Other IdP

Ipsilon protocol support Federation protocols: SAML Uses lasso/xmlsec1 libraries Main focus when project was started ECP profile in the making OpenID Ported over from FedOauth For Fedora Infrastructure support Persona 20 Ported over from FedOauth OpenID Connect (next)

Demo 21

Ipsilon roadmap Integration with FreeIPA should be seamless Automatic configuration during setup REST API For all admin operations For SAML SP registration Protocols: 22 Improve SAML support OpenID Connect More auth/info plugins kx509?

Questions? Project points of contact: http://fedoraproject.org/ipsilon #ipsilon on Freenode Feedback about this talk: http://devconf.cz/f/24 23