Workshop on Security for Web Services. Amsterdam, April 2010 Applying SAML to Identity Data Exchange.

Slides:



Advertisements
Similar presentations
Federated Identity for Grid Architects Tom Scavo NCSA
Advertisements

Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
Step Up Authentication in SAML (and XACML) Hal Lockhart February 6, 2014.
OOI-CI–Ragouzis– Ocean Observatories Initiative Cyberinfrastructure Component CI Design Workshop October 2007.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Web Services and the Semantic Web: Open Discussion Session Diana Geangalau Ryan Layfield.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Connect. Communicate. Collaborate The eduGAIN Way Diego R. Lopez - RedIRIS.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
Applied Cryptography Week 13 SAML Applied Cryptography SAML and XACML Mike McCarthy Week 13.
Copyright B. Wilkinson, This material is the property of Professor Barry Wilkinson (UNC-Charlotte) and is for the sole and exclusive use of the students.
Web Service Security CSCI5931 Web Security Instructor: Dr. T. Andrew Yang Student: Jue Wang.
A Use Case for SAML Extensibility Ashish Patel, France Telecom Paul Madsen, NTT.
SAML-based Delegation in Shibboleth Scott Cantor Internet2/The Ohio State University.
Connect. Communicate. Collaborate Federation peering à la European The eduGAIN way Diego R. Lopez - RedIRIS.
Shibboleth-intro-dec051 Shibboleth A Technical Overview Tom Scavo NCSA.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
SWITCHaai Team Introduction to Shibboleth.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Saml-intro-dec051 Security Assertion Markup Language A Brief Introduction to SAML Tom Scavo NCSA.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Connect. Communicate. Collaborate First steps in federation peering: eduGAIN and eduroam Diego R. Lopez - RedIRIS.
SAML Right Here, Right Now Hal Lockhart September 25, 2012.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
SAML CCOW Work Item HL7 Working Group Meeting San Antonio - January 2008 Presented by: David Staggs, JD CISSP VHA Office of Information Standards.
SAML 2.1 Building on Success. Outline n Summary of SAML 2.0 n Work done since 2.0 n Objectives of SAML 2.1 n Proposed Task List n Undecided Issues n Invitation.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
SAML 2.0: Federation Models, Use-Cases and Standards Roadmap
Saml-v1_x-tech-overview-dec051 Security Assertion Markup Language SAML 1.x Technical Overview Tom Scavo NCSA.
An XML based Security Assertion Markup Language
Connect. Communicate. Collaborate Place organisation and project logos in this area Usage of SAML in eduGAIN Stefan Winter, RESTENA Foundation TERENA Networking.
Connect. Communicate. Collaborate Federation Interoperability Made Possible By Design: eduGAIN Diego R. Lopez (RedIRIS)
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
SAML: An XML Framework for Exchanging Authentication and Authorization Information + SPML, XCBF Prateek Mishra August 2002.
WS-Trust “From each,according to his ability;to each, according to his need. “ Karl marx Ahmet Emre Naza Selçuk Durna
W3C Web Services Architecture Security Discussion Kick-Off Abbie Barbir, Ph.D. Nortel Networks.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
Shibboleth: An Introduction
Access Control and Markup Languages Pages 183 – 187 in the CISSP 1.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security Token Service Valéry Tschopp - SWITCH.
Connect. Communicate. Collaborate The authN and authR infrastructure of perfSONAR MDM Ann Arbor, MI, September 2008.
Connect. Communicate. Collaborate The MetaData Service Distributing trust in AAI confederations Manuela Stanica, DFN.
Connect. Communicate. Collaborate Universität Stuttgart A Client Middleware for Token- Based Unified Single Sign On to eduGAIN Sascha Neinert, University.
Diego R. Lopez, RedIRIS JRES2005, Marseille On eduGAIN and the Coming GÉANT Middleware Infrastructure.
Diego R. Lopez, RedIRIS TF-EMC2, Umea SIR, FedSSH and more to come…
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Security Assertion Markup Language (SAML) Interoperability Demonstration.
REFEDS. Rome, October 2009 Attribute space: LoAs, aggregation and reputation.
EMI is partially funded by the European Commission under Grant Agreement RI Federated Grid Access Using EMI STS Henri Mikkonen Helsinki Institute.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
OGSA Attributes: Requirements, Definitions, and SAML Profile Abstract This document specifies elements and vocabulary for expressing attribute assertions.
SAML 2.0 and Related Work in XACML and WS-Security Hal Lockhart BEA Systems.
Connect. Communicate. Collaborate Applying eduGAIN to network operations The perfSONAR case Diego R. Lopez (RedIRIS) Maurizio Molina (DANTE)
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
Security Assertion Markup Language, v2.0 Chad La Joie Georgetown University / Internet2.
Access Policy - Federation March 23, 2016
Federation made simple
Federation Systems, ADFS, & Shibboleth 2.0
Identity Federations - Overview
Federation peering à la European The eduGAIN way
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Federation peering à la European The eduGAIN way
It Is All about Identity (Whatever the Sphere)
Community AAI with Check-In
Presentation transcript:

Workshop on Security for Web Services. Amsterdam, April 2010 Applying SAML to Identity Data Exchange

Workshop on Security for Web Services. Amsterdam, April 2010 Setting the Landscape

Workshop on Security for Web Services. Amsterdam, April 2010 The Components An infrastructure supporting the trust fabric  Typically based on public keys  A set of protocols for data exchange  SAML is the lingua franca A common schema for syntax and semantics  eduPerson  SCHAC An agreement among participants Bi- or multi-lateral Through a unilateral declaration (affiliation)

Workshop on Security for Web Services. Amsterdam, April 2010 Identity Data Flow

Workshop on Security for Web Services. Amsterdam, April 2010 Map of Languages

Workshop on Security for Web Services. Amsterdam, April 2010 FØD. (USA) (AU) Circles All Around the Map Different technologies, even with identical technology the AAI systems may have different policy and purpose The “inter- federation soup”

Workshop on Security for Web Services. Amsterdam, April 2010 $ X.509 RADIUS Kerberos PAPI Shibboleth (SAML 1.1 plus extensions) SAML 2 WS-Sec OpenID WS-fed OAuth Map of Protocols

Workshop on Security for Web Services. Amsterdam, April 2010 Defining SAML Security Assertion Markup Language (SAML) is an XML standard for exchanging authentication and authorization data between entities Product of the OASIS Security Services TC: Built upon the following standards:  XML  XML Schema  XML Signature  XML Encryption  HTTP  SOAP

Workshop on Security for Web Services. Amsterdam, April 2010 What SAML Is Made of Assertions (XML data units)  Authentication, Attribute and Authorization information Protocols (XML + processing rules)  Request and Response elements packaging assertions Bindings (HTTP, SOAP,…)  How SAML Protocols map onto standard messaging or communication protocols Profiles (Protocols + Bindings)  Define semantics for use cases Assertions and protocols together constitute SAML core  Syntactically defined by XML schema Profiles Bindings Protocol Assertions

Workshop on Security for Web Services. Amsterdam, April 2010 SAML Assertions An assertion contains a packet of security information: … How to interpret the assertion: “Assertion A was issued at time t by issuer R subject to conditions C” Assertions are the atomic unit of SAML  And constitute the element referred as a SAML token elsewhere

Workshop on Security for Web Services. Amsterdam, April 2010 Assertion Example A typical SAML assertion: The value of the Issuer element is the unique identifier of the SAML authority

Workshop on Security for Web Services. Amsterdam, April 2010 Subject Defines the principal that is the subject of all of the statements in the assertion The principal’s identifier  Several identifier formats supported  Different properties: uniqueness, persistency, opacity… One or more subject confirmations  Information that allows the subject to be confirmed  Method plus data associated to that method

Workshop on Security for Web Services. Amsterdam, April 2010 SAML Statements SAML assertions contain statements Authentication statements  Subject S authenticated at time t using authentication method m Attribute statements  Subject S is associated with attributes A,B,C having values “a”,”b”,”c” Authorization decision statements (deprecated)

Workshop on Security for Web Services. Amsterdam, April 2010 Peeling the Attribute Onion Relying parties use attributes to make access control decisions Standard attribute schemas with well understood values  Basic schemas  eduPerson  SCHAC  Community schemas  Local schemas Basic schemas (person, inetOrgPerson, organizationalPerson)‏ eduPerson schac iris-* Local schemas

Workshop on Security for Web Services. Amsterdam, April 2010 SAML Protocol Exchanges via a simple request/response protocol A Request initiates an exchange A Response often contains one or more assertions SAML Core (Assertions and Protocol) defines the structure of requests and responses Request AttributeQuery Response Assertion AttributeStatement

Workshop on Security for Web Services. Amsterdam, April 2010 The Trust Issue SAML supports a variety of security mechanisms  Transport-level security (SSL 3.0/TLS 1.0)  Message-level security (XMLSig/XMLEnc) Trust is established through the metadata IdPSP fccn.pt SCS CA rediris. es IRISGrid CA Can I trust this SP and send data about my users to it? Can I trust this IdP and accept the data it sends? SAML AttributeRequest SAML AttributeResponse Metadata

Workshop on Security for Web Services. Amsterdam, April 2010 SAML Metadata XML document, with a container element ( EntitiesDescriptor ) Individual elements for each known entity ( EntityDescriptor )  Endpoint references for different roles  Supported protocols and options  Keys using for encrypting and signing  Administrative and reference data Both the container and the individual elements can be signed and provide trust links  Plus hints on data liveliness Extension points for supporting additional services

Workshop on Security for Web Services. Amsterdam, April 2010 Next Steps: Dynamic Metadata Dynamically manage metadata for an entity or group of entities Publish-and-subscribe interfaces  Metadata aggregators  GÉANT MDS Well-know metadata locations  Maintained by the entity itself  Signed by a Trusted Third Party Much more flexible revocation schemas

Workshop on Security for Web Services. Amsterdam, April 2010 Next Steps: VO Support Entities providing additional attributes about users  Not available at their institutional IdP  Mostly because of management reasons The base for VO operation Several implementations currently available  VOMS (originally X.509-based, now with SAML gateway)  SWITCH VO management system (Shibboleth-based, SAML over Java)  RedIRIS AA (SAML over PHP)  FEIDE VO PoC (SAML on OAuth over PHP)  GÉANT about to deploy one

Workshop on Security for Web Services. Amsterdam, April 2010 Use Cases: WebSSO Identity data is exchanged through the user’s browser  SAML is used in steps 4, 5, 6 and 7 An additional element allowing the SP to decide the appropriate IdP (Discovery Service) not shown  Key to usability and security  Makes additional use of metadata Identity Provider Service Provider CLIENTCLIENT Authentication Authority Attribute Authority SSO Service Assertion Consumer Service Resource Attribute Requester 7 6

Workshop on Security for Web Services. Amsterdam, April 2010 Use Cases: WebSSO + SSH Connecting WebSSO and access to other applications Attributes are used to dynamically establish SSH public keys In use for teaching environments in combination with an invitation system

Workshop on Security for Web Services. Amsterdam, April 2010 Use Cases: DAMe

Workshop on Security for Web Services. Amsterdam, April 2010 Use Cases: WS (ECP)

Workshop on Security for Web Services. Amsterdam, April 2010 Use Cases: WS (star) Subject NameIdentifier

Workshop on Security for Web Services. Amsterdam, April 2010 Subject NameIdentifier Use Cases: WS (star)

Workshop on Security for Web Services. Amsterdam, April 2010 Subject NameIdentifier Use Cases: WS (chain)

Workshop on Security for Web Services. Amsterdam, April 2010 Subject NameIdentifier Use Cases: WS (chain)

Workshop on Security for Web Services. Amsterdam, April 2010 Subject NameIdentifier Use Cases: WS (chain)

Workshop on Security for Web Services. Amsterdam, April 2010 A Few Other Use Cases InfoCard  Enhancing usability OpenID  Simplify IdP discovery  Attribute query bootstrapping OAuth  Initial enrollment  RESTful WS (with OAuth WRAP) X.509  Derived personal certificates  PKI-based attribute authorities

Workshop on Security for Web Services. Amsterdam, April 2010 It’s About the Identity Identity transfer protocols are just vehicles for data transfer  Must not determine the nature of an individual identity Digital identities are more valuable as they are more widely assertable And SAML is a perfect mean as lingua franca  Protocols  Data formats  Metadata  All of them or some of them