From the Intranet to Mobile. By Divya Mehra and Stian Thorgersen



Similar documents
Copyright Pivotal Software Inc, of 10

JVA-122. Secure Java Web Development

FileCloud Security FAQ

The increasing popularity of mobile devices is rapidly changing how and where we

Integrating Moodle with an external tool

MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation

Multi Factor Authentication API

Single Sign-on (SSO) technologies for the Domino Web Server

Single Sign On. SSO & ID Management for Web and Mobile Applications

Approaches and challenges for a SSO enabled extranet using Jasig CAS. Florian Holzschuher René Peinl

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

NCSU SSO. Case Study

Configuring EPM System for SAML2-based Federation Services SSO

Building Secure Applications. James Tedrick

Configuring user provisioning for Amazon Web Services (Amazon Specific)

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Securing WebFOCUS A Primer. Bob Hoffman Information Builders

Agenda. How to configure

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Copyright: WhosOnLocation Limited

Dell One Identity Cloud Access Manager How to Develop OpenID Connect Apps

Secure the Web: OpenSSO

Integrating Single Sign-on Across the Cloud By David Strom

Deploying RSA ClearTrust with the FirePass controller

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014

Flexible Identity Federation

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

SSO Plugin. Release notes. J System Solutions. Version 3.6

ADMINISTERING ADOBE LIVECYCLE MOSAIC 9.5

Authentication Methods

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

qliqdirect Active Directory Guide

Introduction to SAML

Crawl Proxy Installation and Configuration Guide

Lecture Notes for Advanced Web Security 2015

TIB 2.0 Administration Functions Overview

Integrating WebPCM Applications into Single Sign On (SSO) Tom Schaefer Better Software Solutions, Inc. UN 4023 V

Getting Started with Clearlogin A Guide for Administrators V1.01

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

W H IT E P A P E R. Salesforce CRM Security Audit Guide

INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE

Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS)

Mobile Security Jump Start. Wayne Henshaw & Mike Jacobs Progress OpenEdge October 8, 2013

The Top 5 Federated Single Sign-On Scenarios

Web Based Single Sign-On and Access Control

Flexible Identity Federation

Improve your mobile application security with IBM Worklight

OPENIAM ACCESS MANAGER. Web Access Management made Easy

Administering Jive Mobile Apps

TIBCO Spotfire Platform IT Brief

Gateway Apps - Security Summary SECURITY SUMMARY

SAML SSO Configuration

Unlocking the Secrets of Alfresco Authentication. Mehdi BELMEKKI,! Consultancy Team! Alfresco!

Centralized Oracle Database Authentication and Authorization in a Directory

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Siteminder Integration Guide

Automatic Recognition, Processing and Attacking of Single Sign-On Protocols with Burp Suite

Virtualization and Cloud Computing

Access Management Analysis of some available solutions

F5 BIG-IP: Configuring v11 Access Policy Manager APM

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

API-Security Gateway Dirk Krafzig

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department

Identity Management with Spring Security. Dave Syer, VMware, SpringOne 2011

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

Using SAP Logon Tickets for Single Sign on to Microsoft based web applications

Security Testing For RESTful Applications

Administering Jive for Outlook

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

WHITE PAPER Usher Mobile Identity Platform

Configuration Guide - OneDesk to SalesForce Connector

Active Directory Requirements and Setup

Table of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

Application Security Made in Switzerland

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

CA Nimsoft Service Desk

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

OpenLogin: PTA, SAML, and OAuth/OpenID

From centralized to single sign on

Deploying the BIG-IP LTM and APM with Citrix XenApp or XenDesktop

Securing your Apache Tomcat installation. Tim Funk November 2009

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

Google Identity Services for work

WebNow Single Sign-On Solutions

Configuration Guide BES12. Version 12.3

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Sharepoint server SSO

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

nexus Hybrid Access Gateway

Securing ArcGIS Server Services: First Steps

Service Manager and the Heartbleed Vulnerability (CVE )

Integration Overview. Web Services and Single Sign On

Progress OpenEdge REST

Transcription:

ENTERPRISE SECURITY WITH KEYCLOAK From the Intranet to Mobile By Divya Mehra and Stian Thorgersen

PROJECT TIMELINE

AGENDA

THE OLD WAY Securing monolithic web app relatively easy Username and password form Credentials verified against table in DB HTTP Session stores security context

IT'S NOT JUST A FORM AND A TABLE ANYMORE Enterprise software has changed No longer one or two apps inside firewall Now we have many separate systems Exposed to mobile users and partners

THE NEW WAY? Multiple apps Multiple variants of each app Multiple services Multiple user dbs Multiple logins Outside firewall

AUTHENTICATION Passwords not sufficient Users create bad passwords (123456 and password) Passwords policies help, but no guarantee Users reuse passwords Passwords can be lost Secure storage is required Need two-factor authentication

APP TYPES Have to deal with many app, variants & programming languages Client-side and server-side web Mobile (native and hybrid) APIs/Services...

MOBILE Users don't want to login frequently Don't store username and password on phone What if device is lost? Sessions and cookies aren't ideal Requires public services

SINGLE SIGN-ON Not as trivial as it may seem Single Sign-Out can be even harder Need Remote Sign-Out

MANAGE Apps Services Users Devices Permissions Sessions and logs and.. Ideally manage everything from one console

SELF SERVICE Users can manage their own accounts Recover password Update profile Enable two-factor authentication Manage sessions Account history and.. Ideally manage everything from one console

INTEGRATION Third party apps Existing Infrastructure New Infrastructure after acquisition External users Social networks

VULNERABILITIES Broken Authentication and Session Management is #2 on Open Web Application Security Project (OWASP) Top Ten list Recommendation is to not implement your own!

PROTOCOLS OpenID Connect SAML 2.0

OPENID CONNECT Built on OAuth 2.0 RESTful JSON Easy to use Less mature - final spec released last year

SAML 2.0 XML Harder to use and understand Mature - 1.0 was adopted as an OASIS standard in 2002

TOKENS Decouples authentication Cross-domain Stateless Only sent when needed Standards based

AUTHENTICATION Authenticate with Keycloak Login forms provided by Keycloak Two-factor authentication Requires SSL Passwords are salted and hashed with PBKDF2 Iterations configurable

<button onclick="keycloak.login()">login</button>

Welcome App

Login to Keycloak realm

Logged-in to Welcome App

APP INTEGRATION Keycloak Client Adapters Keycloak Proxy OpenID Connect Resource Provider library SAML Service Provider library

CLIENT ADAPTERS JBoss EAP & WildFly JBoss Fuse JBoss BRMS JavaScript NodeJS Mobile (Apache Cordova and Native) Spring Tomcat, Jetty More coming (contributions welcome!)

EXAMPLE Simple example to demonstrate features Two HTML5 applications RESTful services deployed to WildFly

ADMIN CONSOLE Configure and manage everything from one console Including settings, applications, services, users, permissions and sessions

Admin Console - Realm settings

Admin Console - Clients

Admin Console - Client settings

Admin Console - User settings

Admin Console - User role mappings

ACCOUNT MANAGEMENT A console for users to manage their own account

Account Management - Profile

Account Management - Password

Account Management - Applications

Account Management - Account history

SINGLE SIGN-ON Web SSO Enterprise/Desktop SSO Bridge (Kerberos) Single Sign-Out Remote Sign-Out

THEMES Brand login pages and account management to integrate with your corporate brand HTML templates for more than just styling

Login - Default theme

Admin Console - Configure theme

Login - Summit theme

LOGIN FLOWS Required actions Recover password Two factor authentication Registration

Admin Console - Login settings

Login - Extra features enabled

Login - Configure two factor authentication

Login - Update profile

PASSWORD POLICIES Set required complexity for passwords Prevent reuse of old passwords Require regular updating of passwords Set hashing intervals

Admin Console - Password policies

Login - invalid password update

USER FEDERATION Sync users with external directories Read-only or read-write

Admin Console - Add LDAP user federation

Admin Console - User federation

IDENTITY BROKERING Allow external users to sign-on Supports sign-on with social networks

Admin Console - Add SAML Identity Provider

Admin Console - Identity Providers

Login - Identity Brokering

MAPPERS Customize tokens Map claims and attributes from external tokens Map attributes and groups from LDAP

Admin Console - Token mappers

Admin Console - Identity Provider mappers

Admin Console - LDAP mappers

VULNERABILITIES Standard Protocols Built-in Brute Force protection Integrate with Intrusion Detection Protected against known attacks Patches