SAML basics A technical introduction to the Security Assertion Markup Language



Similar documents
Introduction to SAML. Jason Rouault Section Architect Internet Security Solutions Lab Hewlett-Packard. An XML based Security Assertion Markup Language

Implementing Single Sign On in Java Technologybased

SAML Security Assertion Markup Language

Design and Implementaion of a Single Sign-On Library Supporting SAML (Security Assertion Markup Language) for Grid and Web Services Security

Security Assertion Markup Language (SAML)

MONDESIR Eunice WEILL-TESSIER Pierre FEDERATED IDENTITY. ASR 2006/2007 Final Project. Supervisers: Maryline Maknavicius-Laurent, Guy Bernard

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide

Web Access Management and Single Sign-On

Security Assertion Markup Language (SAML) 2.0 Technical Overview

STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN

Setting Up Federated Identity with IBM SmartCloud

SAML Security Analysis. Huang Zheng Xiong Jiaxi Ren Sijun

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide

Authorization-Authentication Using

Shibboleth Architecture

Security Assertion Markup Language (SAML) V2.0 Technical Overview

Biometric Single Sign-on using SAML Architecture & Design Strategies

National Identity Exchange Federation. Web Browser User-to-System Profile. Version 1.0

SAML:The Cross-Domain SSO Use Case

Oasis Security Services Use Cases And Requirements

Web Single Sign-On Authentication using SAML

Open Source Identity Integration with OpenSSO

Martin Käser. Single Sign-on mit OpenSAML

Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V1.1

Standalone SAML Attribute Authority With Shibboleth

SAML and XACML Overview. Prepared by Abbie Barbir, Nortel Canada April 25, 2006

FEDERATED IDENTITY MANAGEMENT:

Web Based Single Sign-On and Access Control

RSA Secured Implementation Guide for VPN Products

Access Control in Distributed Systems. Murat Kantarcioglu

Single Sign on Using SAML

This Working Paper provides an introduction to the web services security standards.

Securing Web Services With SAML

SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness

SAML 2.0 INT SSO Deployment Profile

Biometric Single Sign-on using SAML

Web Services Trust and XML Security Standards

Configuring SAML2 for Single Sign-On to Smartsheet (Enterprise Only)

Federated Identity Management Solutions

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

Run-time Service Oriented Architecture (SOA) V 0.1

Web Services Security: SAML Token Profile 1.1

Single Sign-on Systems SS5

Interoperable Provisioning in a Distributed World

Trusting XBRL: Using the Liberty Web Services Framework to Secure and Authenticate XBRL Documents

Siebel CRM On Demand Single Sign-On. An Oracle White Paper December 2006

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.

MLSListings Single Sign On Implementation Guide. Compatible with MLSListings Applications

Kantara egov and SAML2int comparison

Digital Signature Web Service Interface

SAML: The Secret to Centralized Identity Management

SAML and OAUTH comparison

Federated Identity in the Enterprise

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

OIO SAML Profile for Identity Tokens

SAML Federated Identity at OASIS

An SAML Based SSO Architecture for Secure Data Exchange between User and OSS

OIO Web SSO Profile V2.0.5

Security Assertion Markup Language (SAML) V2.0 Technical Overview

Liberty Alliance Project Setting the Standard for Federated Network Identity

Research and Implementation of Single Sign-On Mechanism for ASP Pattern *

SAML Security Option White Paper

SAML (Security Assertion Markup Language) Security Model for RESTful Web Services

Federated Identity and Single Sign-On using CA API Gateway

Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver

SAML-Based SSO Solution

Federal Identity, Credential, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile

INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE

Tusker IT Department Tusker IT Architecture

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

Feide Technical Guide. Technical details for integrating a service into Feide

OSOR.eu eid/pki/esignature Community Workshop in Brussels, 13. November 2008 IT Architect Søren Peter Nielsen - spn@itst.dk

Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0

IAM Application Integration Guide

GFIPM & NIEF Single Sign-on Supporting all Levels of Government

Federal Identity, Credentialing, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile

E-Authentication Federation Adopted Schemes

IBM WebSphere Application Server

PARTNER INTEGRATION GUIDE. Edition 1.0

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

Microsoft Office 365 Using SAML Integration Guide

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102

IAM, Enterprise Directories and Shibboleth (oh my!)

Get Success in Passing Your Certification Exam at first attempt!

RSA Solution Brief. Federated Identity Manager RSA. A Technical Overview. RSA Solution Brief

Revised edition. OIO Web SSO Profile V2.0.9 (also known as OIOSAML 2.0.9) Includes errata and minor clarifications

Implementation Guide SAP NetWeaver Identity Management Identity Provider

Introduction to SAML

Extending DigiD to the Private Sector (DigiD-2)

Transcription:

SAML basics A technical introduction to the Security Assertion Markup Language WWW2002 Eve Maler, XML Standards Architect XML Technology Center Sun Microsystems, Inc.

Agenda The problem space SAML concepts Walking through scenarios Status of SAML and helpful resources Your questions 2

Agenda The problem space Why invent SAML at all? What are the use cases that drive SAML s design? SAML concepts Walking through scenarios Status of SAML and helpful resources 3

Is there even a problem to solve? Standards are emerging for many facets of collaborative e-commerce Business transactions (e.g., ebxml) Software interactions (e.g., SOAP) And some sophisticated access management solutions do exist For example, dozens of companies provide single sign-on (SSO) solutions But 4

Where do the problems lie? but communicating the security properties of these interactions isn t well standardized And the solutions don t interoperate at all And thus there s lower deployment of interesting access management solutions, especially on the web Like single sign-on (SSO) Web-based commerce shows the need for federation and standardization For cost-effectiveness For interoperability among solutions For a more cohesive user experience 5

Use cases for sharing security information SAML developed three use cases to drive its requirements and design: 1. Single sign-on (SSO) 2. Distributed transaction 3. Authorization service Each use case has one or more scenarios that provide a more detailed roadmap of interaction 6

#1: Single sign-on (SSO) Logged-in users of analyst research site SmithCo are allowed access to research produced by sister site JonesCo, where the two sites might be in a federation 7

#1: Single sign-on (SSO) Logged-in users of analyst research site SmithCo are allowed access to research produced by sister site JonesCo, where the two sites might be in a federation Authenticate Source Web Site Web User 7

#1: Single sign-on (SSO) Logged-in users of analyst research site SmithCo are allowed access to research produced by sister site JonesCo, where the two sites might be in a federation Authenticate Source Web Site Web User Use Secured Resource Destination Web Site 7

#2: Distributed transaction Employees at SmithCo are allowed to order office supplies from OfficeBarn if they are authorized to spend enough 8

#2: Distributed transaction Employees at SmithCo are allowed to order office supplies from OfficeBarn if they are authorized to spend enough Authenticate, Qualify Authority Known to Both Buyer 8

#2: Distributed transaction Employees at SmithCo are allowed to order office supplies from OfficeBarn if they are authorized to spend enough Authenticate, Qualify Authority Known to Both Buyer Transact Business Seller 8

#3: Authorization service Employees at SmithCo order office supplies directly from OfficeBarn, which performs its own authorization 9

#3: Authorization service Employees at SmithCo order office supplies directly from OfficeBarn, which performs its own authorization Access Resource User Policy Enforcement Point 9

#3: Authorization service Employees at SmithCo order office supplies directly from OfficeBarn, which performs its own authorization Policy Decision Point Check Permission Access Resource User Policy Enforcement Point 9

What s needed to accomplish all this A standard XML message format It s just data traveling on any wire No particular API mandated Lots of XML tools available A standard message exchange protocol Clarity in orchestrating how you ask for and get the information you need Rules for how the messages ride on transport protocols and in application contexts For better interoperability 10

Agenda The problem space SAML concepts SAML in a nutshell SAML assertions and their producers and consumers Message exchange protocol Bindings and profiles Walking through scenarios Status of SAML and helpful resources 11

SAML on one slide It s an XML-based framework for exchanging security information XML-encoded security assertions XML-encoded request/response protocol Rules on using assertions with standard transport and messaging frameworks It s an emerging OASIS standard Vendors and users are involved Codifies current system outputs rather than inventing new technology 12

SAML compared to existing security frameworks S/MIME messages Flexibility SAML PKIX, X.509, et al. Specificity 13

XML-related security XML Signature standards work SAML builds this in for digitally signing assertions XML Encryption Important for flexibly managing security and privacy risks, e.g., encrypting just the credit card number XKMS SAML traffic might be secured by XKMS-based PKI, by other PKI, or by other means entirely XACML XML-based (and SAML-influenced) access control/ policy language 14

More XML-related security DSML standards work Directory services provided in XML form Liberty Alliance Identity solution for SSO of consumers and businesses Internet2 Higher-education effort to develop advanced network applications and technologies 15

Industry traction for SAML? For starters Entegrity AssureAccess Entrust GetAccess portal Netegrity AffiliateMinder Oblix NetPoint RSA Security Cleartrust Sun ONE Identity Server Systinet WASP Secure Identity JSR 155 in the Java Community Process Portions of Internet2 16

Agenda The problem space SAML concepts SAML in a nutshell SAML assertions and their producers and consumers Message exchange protocol Bindings and profiles Walking through scenarios Status of SAML and helpful resources 17

SAML assertions An assertion is a declaration of fact, according to someone SAML assertions are compounds of one or more of three kinds of statement about a subject (human or program): Authentication Attribute Authorization decision They can be digitally signed You can extend SAML to make your own kinds of assertions and statements 18

Model for producing and consuming assertions 19

Model for producing and consuming assertions SAML Authentication Assertion Attribute Assertion Authorization Decision Assertion 19

Model for producing and consuming assertions Authentication Authority Attribute Authority Policy Decision Point SAML Authentication Assertion Attribute Assertion Authorization Decision Assertion Policy Enforcement Point 19

Model for producing and consuming assertions Policy Policy Policy Authentication Authority Attribute Authority Policy Decision Point SAML Authentication Assertion Attribute Assertion Authorization Decision Assertion Policy Enforcement Point 19

Model for producing and consuming assertions Policy Policy Policy Credentials Collector Authentication Authority Attribute Authority Policy Decision Point SAML Authentication Assertion Attribute Assertion Authorization Decision Assertion System Entity Application Request Policy Enforcement Point 19

The real world is more complex In practice, multiple kinds of authorities may reside in a single software system SAML allows, but doesn t require, total federation of these jobs Also, the arrows may not reflect information flow in real life The order of assertion types is insignificant Information can be pulled or pushed Not all assertions are always produced Not all potential consumers (clients) are shown 20

A possible deployment architecture Repository (XACML) User Agent HTTP (+ SAML artifacts) Web Server (PEP) SAML (+) LDAP or SAML or DSML AuthN/AuthZ Server (PDP, AA, AA) One DNS domain HTTP (+ SAML artifacts) Another DNS domain SAML Web-Based System 21

Statements in an assertion share some information Assertion IssuerID IssueInstant AssertionID <Conditions> <Advice> Authentication Statement Attribute Statement Authorization Statement... <Subject> <Subject> <Subject> 22

Example common information for an assertion <saml:assertion MajorVersion= 1 MinorVersion= 0 AssertionID= 128.9.167.32.12345678 Issuer= Smith Corporation IssueInstant= 2001-12-03T10:02:00Z > <saml:conditions NotBefore= 2001-12-03T10:00:00Z NotOnOrAfter= 2001-12-03T10:05:00Z > <saml:audiencerestrictioncondition> <saml:audience> URI </saml:audience> </saml:audiencerestrictioncondition> </saml:conditions> <saml:advice> a variety of elements can go here </saml:advice> statements go here </saml:assertion> 23

Authentication statement An issuing authority asserts that subject S was authenticated by means M at time T Targeted towards SSO uses Caution: Actually checking or revoking of credentials is not in scope for SAML! It merely lets you link back to acts of authentication that took place previously 24

Example assertion with authentication statement <saml:assertion > <saml:authenticationstatement AuthenticationMethod= URI AuthenticationInstant= 2001-12-03T10:02:00Z > <saml:subject> <saml:nameidentifier Format= #emailaddress >joeuser@smithco.com <saml:subjectconfirmation> <saml:confirmationmethod> URI </saml:confirmationmethod> </saml:subjectconfirmation> </saml:subject> </saml:authenticationstatement> </saml:assertion> 25

Attribute statement An issuing authority asserts that subject S is associated with attributes A, B, with values a, b, c Useful for distributed transactions and authorization services Typically this would be gotten from an LDAP repository john.doe in example.com is associated with attribute Department with value Human Resources 26

Example assertion with attribute statement <saml:assertion > <saml:attributestatement> <saml:subject> </saml:subject> <saml:attribute AttributeName= PaidStatus AttributeNamespace= http://smithco.com > <saml:attributevalue> PaidUp </saml:attributevalue> </saml:attribute> <saml:attribute AttributeName= CreditLimit AttributeNamespace= http://smithco.com > <saml:attributevalue xsi:type= my:type > <my:amount currency= USD >500.00 </my:amount> </saml:attributevalue> </saml:attribute> </saml:attributestatement> </saml:assertion> 27

Authorization decision statement An issuing authority decides whether to grant the request by subject S for access type A to resource R given evidence E Useful for distributed transactions and authorization services The subject could be a human or a program The resource could be a web page or a web service, for example 28

Example assertion with authorization decision statement <saml:assertion > <saml:authorizationstatement Decision= Permit Resource= http://jonesco.com/rpt_12345.htm > <saml:subject> </saml:subject> <saml:action Namespace= urn:oasis:names:tc:saml:1.0:action:rwedc >Read </saml:action> </saml:authorizationstatement> </saml:assertion> 29

Extension points in the SAML assertion schema Assertion Statement SubjectStatement AuthenticationStatement AttributeStatement AuthorizationDecisionStatement (There are no final types or blocked elements) Extension may come at the price of interoperability 30

Agenda The problem space SAML concepts SAML in a nutshell SAML assertions and their producers and consumers Message exchange protocol Bindings and profiles Walking through scenarios Status of SAML and helpful resources 31

SAML protocol for getting assertions Asserting Party (Trusted Issuing Authority) SAML Request SAML Query SAML Response SAML Assertions Relying Party 32

Assertions are normally provided in a SAML response Existing tightly coupled environments may need to use their own protocol They can use assertions without the rest of the structure The full benefit of SAML will be realized where parties with no direct knowledge of each other can interact Via a third-party introduction 33

Requests can take several forms You can query for specific kinds of assertion/statement Authentication query Attribute query Authorization decision query You can ask for an assertion with a particular ID By providing an ID reference By providing a SAML artifact 34

Authentication query Please provide the authentication information for this subject, if you have any It is assumed that the requester and responder have a trust relationship They are talking about the same subject The response with the assertion is a letter of introduction for the subject 35

Example request with authentication query <samlp:request MajorVersion= 1 MinorVersion= 0 RequestID= 128.14.234.20.12345678 IssueInstant= 2001-12-03T10:02:00Z > <samlp:respondwith>saml:authenticationstatement <ds:signature> </ds:signature> <samlp:authenticationquery> <saml:subject> </saml:subject> </samlp:authenticationquery> </samlp:request> 36

Attribute query Please provide information on the listed attributes for this subject If you don t list any attributes, you re asking for all available ones If the requester is denied access to some of the attributes, only the allowed attributes would be returned This situation is indicated in the status code of the response 37

Example request with attribute query <samlp:request > <samlp:attributequery> <saml:subject> </saml:subject> <saml:attributedesignator AttributeName= PaidStatus AttributeNamespace= http://smithco.com /> </samlp:attributequery> </samlp:request> 38

Authorization decision query Is this subject allowed to access the specified resource in the specified manner, given this evidence? This is a yes-or-no question The answer is not allowed to be no, but they re allowed to access these other resources Or yes, and they re also allowed to perform these other actions 39

Example authorization decision query <samlp:request > <samlp:authorizationquery Resource= http://jonesco.com/rpt_12345.htm > <saml:subject> <saml:nameidentifier SecurityDomain= smithco.com Name= joeuser /> </saml:subject> <saml:action Namespace= urn:oasis:names:tc:saml:1.0:action:rwedc >Read </saml:action> <saml:evidence> <saml:assertion> </saml:assertion> </saml:evidence> </samlp:authorizationquery> </samlp:request> 40

Responses just contain a set of assertions One or more assertions can be returned with status information If something went wrong, no assertions are returned, just status Status information can have a complex structure Responses are expected to be signed 41

Example response <samlp:response MajorVersion= 1 MinorVersion= 0 ResponseID= 128.14.234.20.90123456 InResponseTo= 128.14.234.20.12345678 IssueInstant= 2001-12-03T10:02:00Z Recipient= URI > <samlp:status> </samlp:status> <saml:assertion MajorVersion= 1 MinorVersion= 0 AssertionID= 128.9.167.32.12345678 Issuer= Smith Corporation"> <saml:conditions NotBefore= 2001-12-03T10:00:00Z NotAfter= 2001-12-03T10:05:00Z /> <saml:authenticationstatement > </saml:authenticationstatement> </saml:assertion> </samlp:response> 42

Agenda The problem space SAML concepts SAML in a nutshell SAML assertions Producers and consumers of assertions Message exchange protocol Bindings and profiles Walking through scenarios Status of SAML and helpful resources 43

Bindings and profiles connect SAML with the wire This is where SAML itself gets made secure A binding is a way to transport SAML requests and responses SOAP-over-HTTP binding is a baseline Other bindings will follow, e.g., raw HTTP A profile is a pattern for how to make assertions about other information Two browser profiles for SSO: artifact and POST SOAP profile for securing SOAP payloads 44

The SOAP-over-HTTP binding SOAP Message SOAP Header SOAP Body SAML Request or Response 45

By contrast, the SOAP profile SOAP Message SOAP Header SAML Assertion about SOAP Body SOAP Body... 46

Web browser profiles These profiles assume: A standard commercial browser and HTTP(S) User has authenticated to a local source site Assertion s subject refers implicitly to the user When a user tries to access a target site: A tiny authentication assertion reference travels with the request so the real assertion can be dereferenced Or the real assertion gets POSTed 47

Future bindings and profiles The SAML committee will accept and register proposed new bindings and profiles Eventually we may standardize these Open publishing of these will at least help interoperability in the meantime 48

Agenda The problem space SAML concepts Walking through scenarios SSO pull using the browser/artifact profile Back office transaction using the SOAP binding and the SOAP profile Status of SAML and helpful resources 49

SSO pull scenario Web User Authentication Authority + Attribute Authority Source Web Site Policy Decision Point + Policy Enforcement Point Destination Web Site 50

SSO pull scenario Web User Authentication Authority + Attribute Authority Source Web Site Policy Decision Point + Policy Enforcement Point Destination Web Site Authenticate (out of band) 50

SSO pull scenario Web User Authentication Authority + Attribute Authority Source Web Site Policy Decision Point + Policy Enforcement Point Destination Web Site Authenticate (out of band) Access inter-site transfer URL 50

SSO pull scenario Web User Authentication Authority + Attribute Authority Source Web Site Policy Decision Point + Policy Enforcement Point Destination Web Site Authenticate (out of band) Access inter-site transfer URL Redirect with artifact 50

SSO pull scenario Web User Authentication Authority + Attribute Authority Source Web Site Policy Decision Point + Policy Enforcement Point Destination Web Site Authenticate (out of band) Access inter-site transfer URL Redirect with artifact Get assertion consumer URL 50

SSO pull scenario Web User Authentication Authority + Attribute Authority Source Web Site Policy Decision Point + Policy Enforcement Point Destination Web Site Authenticate (out of band) Access inter-site transfer URL Redirect with artifact Get assertion consumer URL Request referenced assertion 50

SSO pull scenario Web User Authentication Authority + Attribute Authority Source Web Site Policy Decision Point + Policy Enforcement Point Destination Web Site Authenticate (out of band) Access inter-site transfer URL Redirect with artifact Get assertion consumer URL Request referenced assertion Supply referenced assertion 50

SSO pull scenario Web User Authentication Authority + Attribute Authority Source Web Site Policy Decision Point + Policy Enforcement Point Destination Web Site Authenticate (out of band) Access inter-site transfer URL Redirect with artifact Get assertion consumer URL Request referenced assertion Supply referenced assertion Provide or refuse destination resource (out of band) 50

More on the SSO pull scenario Access inter-site transfer URL step: User is at: http://smithco.com Clicks on a link that looks like it will take her to http://jonesco.com It really takes her to inter-site transfer URL: https://smithco.com/intersite?dest=jonesco.com Redirect with artifact step: Reference to user s authentication assertion is generated as a SAML artifact (8-byte base64 string) User is redirected to assertion consumer URL, with artifact and target attached: https://jonesco.com?samlart=<artifact> 51

Agenda The problem space SAML concepts Walking through scenarios SSO pull using the web browser profile Distributed transaction using the SOAP binding and the SOAP profile Status of SAML and helpful resources 52

Distributed transaction scenario Buyer Authentication Authority + Attribute Authority Trusted Issuer Policy Decision Point + Policy Enforcement Point Seller 53

Distributed transaction scenario Buyer Authentication Authority + Attribute Authority Trusted Issuer Policy Decision Point + Policy Enforcement Point Seller Authenticate (out of band) 53

Distributed transaction scenario Buyer Authentication Authority + Attribute Authority Trusted Issuer Policy Decision Point + Policy Enforcement Point Seller Authenticate (out of band) Request authentication and attribute assertions 53

Distributed transaction scenario Buyer Authentication Authority + Attribute Authority Trusted Issuer Policy Decision Point + Policy Enforcement Point Seller Authenticate (out of band) Request authentication and attribute assertions Receive authentication and attribute assertions 53

Distributed transaction scenario Buyer Authentication Authority + Attribute Authority Trusted Issuer Policy Decision Point + Policy Enforcement Point Seller Authenticate (out of band) Request authentication and attribute assertions Receive authentication and attribute assertions Attach assertions to P.O. 53

Distributed transaction scenario Buyer Authentication Authority + Attribute Authority Trusted Issuer Policy Decision Point + Policy Enforcement Point Seller Authenticate (out of band) Request authentication and attribute assertions Receive authentication and attribute assertions Attach assertions to P.O. Send P.O. 53

Distributed transaction scenario Buyer Authentication Authority + Attribute Authority Trusted Issuer Policy Decision Point + Policy Enforcement Point Seller Authenticate (out of band) Request authentication and attribute assertions Receive authentication and attribute assertions Attach assertions to P.O. Send P.O. Process assertions and P.O. 53

Distributed transaction scenario Buyer Authentication Authority + Attribute Authority Trusted Issuer Policy Decision Point + Policy Enforcement Point Seller Authenticate (out of band) Request authentication and attribute assertions Receive authentication and attribute assertions Attach assertions to P.O. Send P.O. Send P.O. response (out of band) Process assertions and P.O. 53

More on the distributed transaction scenario An example of attaching SAML assertions to other traffic Asymmetrical relationship is assumed Seller is already known to buyer, but buyer is not known to seller, a common situation E.g., server-side certificates might be used to authenticate seller If it were symmetrical, additional SAML steps would happen on the right side too This would likely be a different scenario 54

Agenda The problem space SAML concepts Walking through scenarios Status of SAML and helpful resources 55

SAML status A suite of five Committee Specs was published 19 April 2002 after 1¼ years of work Core (with assertion and protocol schemas) Bindings and profiles Conformance Glossary Security considerations The SOAP profile is on a later track We will be looking at WS-security and similar inputs Burton Catalyst conference will host SAML Interop 2002 in July with 13 vendors taking part SAML vote will be held June-October to achieve 56

SAML resources OASIS SAML Technical Committee TC site: www.oasis-open.org/committees/security/ Archives: lists.oasis-open.org/archives/security-services/ SAML developers mailing list Archives: lists.oasis-open.org/archives/saml-dev/ Subscribe: lists.oasis-open.org/ob/adm.pl XML Cover Pages SAML page xml.coverpages.org/saml.html Netegrity SAML information and JSAML toolkit www.netegrity.com/products/ 57

Some resources for related efforts IETF/W3C XML Signature www.w3.org/signature/ W3C XML Encryption www.w3.org/encryption/2001/ XKMS and its relatives (now at W3C) www.w3.org/tr/xkms/ OASIS XACML www.oasis-open.org/committees/xacml/ OASIS Provisioning www.oasis-open.org/committees/provision/ Liberty Alliance www.projectliberty.org Internet2 www.internet2.edu/ 58

Agenda The problem space SAML concepts Walking through scenarios Status of SAML and helpful resources Questions? 59

Thank you Eve Maler eve.maler@sun.com