AAI for mandatory authentication and proxy usage to allow internet access on public workstations of ETH-Bibliothek



Similar documents
Logout Support on SP and Application

Borderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

Securing Networks with PIX and ASA

How to set up Outlook Anywhere on your home system

Federated Identity Management

Federated Identity Management

Linux Squid Proxy Server

Configuring SSL VPN on the Cisco ISA500 Security Appliance

ProxySG TechBrief Enabling Transparent Authentication

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia Pedro Borges

Single Sign-On: Reviewing the Field

WWPass External Authentication Solution for IBM Security Access Manager 8.0

Controller Management

Design and Implementation of an IP based authentication mechanism for Open Source Proxy Servers in Interception Mode

A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith

Network Security 1. Module 4 Trust and Identity Technology. Ola Lundh ola.lundh@edu.falkenberg.se

Useful Tips for Reducing the Risk of Unauthorized Access for Network Cameras Important

Shibboleth User Verification Customer Implementation Guide Version 3.5

ivms-4500 (Android Tablet) Mobile Client Software User Manual (V3.0)

D-Link DAP-1360 Repeater Mode Configuration

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Network Security 1 Module 4 Trust and Identity Technology

TELE 301 Network Management. Lecture 17: File Transfer & Web Caching

Configuring Single Sign-on for WebVPN

About Me. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack

Load testing with. WAPT Cloud. Quick Start Guide

Brocade Certified Layer 4-7 Professional Version: Demo. Page <<1/8>>

Firewalls. Chapter 3

User and Machine Authentication and Authorization Infrastructure for Distributed Wireless Sensor Network Testbeds

Configuring SNMP Cisco and/or its affiliates. All rights reserved. 1

How To Secure An Emr-Link System Architecture

Installing GFI Network Server Monitor

Securing your Linksys Wireless Router BEFW11S4 Abstract

Integration Guide. Duo Security Authentication

Get Success in Passing Your Certification Exam at first attempt!

Managing Qualys Scanners

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

Evaluation Guide. iprism Web Security V7.000

PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example

How To Use Windows Live Family Safety On Windows 7 (32 Bit) And Windows Live Safety (64 Bit) On A Pc Or Mac Or Ipad (32)

Network Security Policy

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip

Class Test 2 - e-security (CSN11102/11117) Semester 2, Session

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Wireless Installation Checklist for Novell GroupWise Environments

Dramatically simplifying voice and data networking HOW-TO GUIDE. Bundle Quick Start Guide

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper

VPNC Interoperability Profile

Secure Web Appliance. Reverse Proxy

Microsoft SQL Server Express 2005 Install Guide

Session Management in Web Applications

Sentral servers provide a wide range of services to school networks.

Where every interaction matters.

Connecting to the University Wireless Network

Transition Networks White Paper. Network Security. Why Authentication Matters YOUR NETWORK. OUR CONNECTION.

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

How to add a SIP server How to register a handset

PineApp Surf-SeCure Quick

Windows XP Exchange Client Installation Instructions

Deploying Silver Peak VXOA Physical And Virtual Appliances with Dell EqualLogic Isolated iscsi SANs including Dell 3-2-1

AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle

WatchDox SharePoint Beta Guide. Application Version 1.0.0

USM IT Security Council Guide for Security Event Logging. Version 1.1

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Livezilla How to Install on Shared Hosting By: Jon Manning

Virtual Appliance for VMware Server. Getting Started Guide. Revision Warning and Disclaimer

Kerberos: An Authentication Service for Computer Networks by Clifford Neuman and Theodore Ts o. Presented by: Smitha Sundareswaran Chi Tsong Su

FLX UC1000/1500 Registering with Siemens HiPath 4000 & OpenScape Voice Server

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example

ProCurve Networking. Hardening ProCurve Switches. Technical White Paper

Service & Support. How do you create a communication of RDP with an Industrial Thin Client SIMATIC ITC? Thin Client.

Sharing files on Windows XP with Mac OS X clients

SuperLumin Nemesis. Administration Guide. February 2011

Building Secure Applications. James Tedrick

SB 1386 / AB 1298 California State Senate Bill 1386 / Assembly Bill 1298

AAI Info-Day The SWITCHaai Team, 2005 SWITCH

Setting up Scan to

Active Directory Management. Agent Deployment Guide

Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications

How to connect to the Middle Country Public Library Wireless Network (mcpl-ap) using Windows XP

Securepoint Network Access Controller (NAC)

IT HEALTHCHECK TOP TIPS WHITEPAPER

How To - Implement Single Sign On Authentication with Active Directory

An Insight into Cookie Security

Test Case 3 Active Directory Integration

Transcription:

AAI for mandatory authentication and proxy usage to allow internet access on public workstations of ETH-Bibliothek Wolfgang Lierz, ETH-Bibliothek, IT Services Cristian Tuduce, ETH Zürich, ID-Basisdienste 1

Outline The ETH proxy infrastructure Cristian The ETH-Bibliothek solution Wolfgang 2

The web-proxy From appliance to Squid: Appliance end-of-life Many appliances use variations of Squid Authenticating: Users connecting from outside ETH Selected IP ranges from inside ETH 3

Squid authentication problems RADIUS with basic authentication Clear-text channel between client and proxy Skinny authentication-helper interface Sniffing trivial Password guessing attacks Solution: Squid with Shibboleth authentication! 4

Why Shibboleth No passwords floating around insecure Password guessing cumbersome [put favorite reason here] Interesting problem! 5

The challenge: different worlds Cookie-based Data pipe No web server to receive cookies 6

The proxy principle 7

Before authentication # 307: go authenticate (then #)! 8

The authentication process 307: now go to URL #! 9

After authentication OK 10

The building block Squid w/ Shibboleth authentication 11

AAI-enabling public workstations of ETH-Bibliothek: requirements authentication itself is the service! AAI for customers outside SWITCHaai scope (time-limited) internet access via AAI-enabled proxy modifications on proxy.ethz.ch 12

Authentication itself as service 13

AAI for Swiss university members 14

AAI for other library customers 15

Modifications on SWITCH embedded WAYF wayf_force_remember_for_session = true; wayf_show_remember_checkbox = true; wayf_hide_categories = new Array("library","vho","upcoming"); wayf_hide_categories = new Array("all"); wayf_unhide_idps = new Array("https://aailogon.vho-switchaai.ch/idp/shibboleth"); wayf_return_url = "https://publikum.library.ethz.ch/login/aai/pinlogin.php"; 16

AAI-enabled service: login+redirect https://publikum.library.ethz.ch/login/aai/pinlogin.php $hosts = $d->login_user(); if($hosts) { header('location: http://publikum.library.ethz.ch/login/error.html?duplicate'); } else { if($d->get_remaining_time()) header('location: http://www.library.ethz.ch/'); else header('location: http://publikum.library.ethz.ch/login/error.html?exceeded');} 17

SWITCH VHO admin tool 18

PINlogin database viewer 19

// http://publikum.library.ethz.ch/proxy/publikum.pac function FindProxyForURL(url, host) { if (shexpmatch(url, "http*://publikum.library.ethz.ch/*") shexpmatch(url, "https://tools.vho-switchaai.ch/*") shexpmatch(url, "https://wayf.switch.ch/*")) {return "DIRECT";} if (shexpmatch(url, "https://aai-logon.*.ch/*") shexpmatch(url, "https://aai-login.*.ch/*") shexpmatch(url, "https://aai-idp.*.ch/*") shexpmatch(url, "https://aai.*.ch/*") shexpmatch(url, "https://idp.*.ch/*") shexpmatch(url, "https://login2.*.ch/*")) {return "DIRECT";} if (shexpmatch(url, "http*://proxy.ethz.ch/*")) {return "DIRECT";} return "PROXY proxy.ethz.ch:3128"; } 20

Modifications on proxy.ethz.ch forcing proxy usage in public workstation subnets of ETH-Bibliothek allowing proxy usage from whole SWITCHaai community 21

Forcing proxy usage in library's public workstation subnets: acl library-public-hg src 129.132.73.0/25 acl library-public-rz src 129.132.41.16/28 acl library-public-hix src 129.132.49.192/28 acl library-public-hpx src 129.132.49.208/28 acl library-public-nw src 129.132.49.224/28 acl library-public-cx src 129.132.166.32/27 url_rewrite_access allow library-public-hg url_rewrite_access allow library-public-rz url_rewrite_access allow library-public-hix url_rewrite_access allow library-public-hpx url_rewrite_access allow library-public-nw url_rewrite_access allow library-public-cx 22

Allowing proxy usage from whole SWITCHaai community sub decide_proxy_access() { my $ACCEPT_PROXY_ACCESS = 0; if ($ENV{'REMOTE_ADDR'} eq "129.132.202.35") { $ACCEPT_PROXY_ACCESS = 3; return $ACCEPT_PROXY_ACCESS; } my $ip_match = match_ip($env{'remote_addr'}, "129.132.73.0/25", "129.132.41.16/28", "129.132.49.192/28", "129.132.49.208/28", "129.132.49.224/28", "129.132.166.32/27", "129.132.238.45"); if ($ENV{'HTTP_SHIB_SWISSEP_HOMEORGANIZATION'} eq "ethz.ch") { $ACCEPT_PROXY_ACCESS = 1; return $ACCEPT_PROXY_ACCESS; } else { if ($ip_match) { if ($ENV{'HTTP_SHIB_SWISSEP_HOMEORGANIZATIONTYPE'} =~ /^(university uas hospital others vho)$/) { $ACCEPT_PROXY_ACCESS = 1; return $ACCEPT_PROXY_ACCESS; 23

Hiding AAI dialogues of proxy only implicit because authentication is already done before no severe complaints from users getting confused when trying to overcome limitation 24

Conclusion Robust solution running since 2011-02-07 Only few modifications of central proxy server needed Only very small modification of WAYF needed Can be easily extended/migrated as soon other AAI Identity Providers for private library customers are available 25

Questions? Live demo? 26