Mechanisms for Distributed Global Authentication David R Newman.

Slides:



Advertisements
Similar presentations
Suchin Rengan Principal Technical Architect Salesforce.com
Advertisements

Options for integrating the JANET Roaming Service (JRS) and Shibboleth Tim Chown University of Southampton (UK) JISC Access Management.
OhioNET EZProxy Service
REFEDS. Rome, October 2009 The OpenID Case Why It’s Not a Bad Idea to Play with The Big Guys.
WSO2 Identity Server Road Map
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
1 Issues in federated identity management Sandy Shaw EDINA IASSIST May 2005, Edinburgh.
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Integrating with UCSF’s Shibboleth system
I2Q & WMnet Pilot Presented by Jason Rousell – i2Q Jay Neale - i2Q.
Michal Procházka, Jan Oppolzer CESNET.
Federated Identity Management for HEP David Kelsey WLCG GDB 9 May 2012.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
Chad La Joie Shibboleth’s Future.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
Shibboleth 2.0 IdP Training: Authentication January, 2009.
ShibGrid: Shibboleth access to the UK National Grid Service University of Oxford and STFC.
Openid Connect
Authentication. 2 © 2010 SWITCH Terms: Authentication Mechanism A concrete mechanism used to authenticate a user. Shibboleth 2 currently supports REMOTE_USER,
An Overview of Single Sign-On, Federation, Its Benefits, and Basic Procedures for Integrating Applications.
Shibboleth: An Introduction
May 7, 2013 CEOS WGISS-35 Meeting 1 GEOSS Authentication and Single Sign-On Steven F. Browdy OMS Tech, Inc. IEEE.
MAT U M A T U Middleware Assisted Take-Up Service For JISC Funded Early Adopters.
Implementing Kuali Identity Management at your Institution Jasig Spring 2010 Wednesday, March 10, am.
GridShib and PERMIS Integration: Adding Policy driven Role-Based Access Control to Attribute-Based Authorisation in Grids Globus Toolkit is an open source.
Authentication and Authorisation for Research and Collaboration Peter Solagna Milano, AARC General meeting Report and plans Attribute.
Authentication and Authorisation for Research and Collaboration Michał Jankowski, Maciej Brzeźniak AARC General Meeting, Milan.
SAML to LDAP bridging developments Marcus Hardt Marcus kit.eduSteinbuch Centre for Computing (SCC) Motivation Allow linux logins,
Shibboleth & Grid Integration STFC and University of Oxford (and University of Manchester)
Federated Identity Management for HEP David Kelsey HEPiX, IHEP Beijing 18 Oct 2012.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
IETF 78 Maastricht 27 July 2010 Josh Howlett, JANET(UK)
Connect communicate collaborate Trust & Identity EC meets GÉANT 19 June 2014 Brussels Valter Nordh, NORDUnet Federation as a Service Task Leader Trust.
Installing and Configuring Moodle. Download Download latest Windows Install package from Moodle.orgMoodle.org.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
Federated Access to Storage EGI CF 2012 Luke Howard, Daniel Kouril, Michal Prochazka.
IT Services Shibboleth Single Sign-On overview. Overview What/where/why? The UK-Federation/Registration Terminology Configuration Protecting Content Benefits.
Administering the SOWN Network David R Newman & Chris Malton.
Access Policy - Federation March 23, 2016
Building Distributed Networks using VPNs David R Newman.
Secure Single Sign-On Across Security Domains
eduroam Managed IdP - Roadmap
Single Sign-On Led by Terrice McClain, Jen Paulin, & Leighton Wingerd
Authentication Interact Cloud.
Introduction to Windows Azure AppFabric
Federation made simple
Prime Service Catalog 12.0 Integration Best Practices – LDAP and SAML Settings.
Extending Authentication to Members of Social Networks
University of Stuttgart University of Murcia
Jean-François Perrin (ILL) - Umbrella Annual Meeting 2015
Radius, LDAP, Radius used in Authenticating Users
Building Distributed Networks using VPNs David R Newman.
Introduction to Networking
Addressing the Beast: Single Sign-On II
OpenID Connect Working Group
Identity Federations - Installation and operation
Network Services.
PSC Group, LLc Office 365/SharePoint Online Migration traps and tricks
GALILEO Approach and implementation
ACS Functionality.
M7: New Features for Office 365 Identity Management
Authentication and Authorization Federation
Federations: Introduction Justin Knight, Jisc
Community AAI with Check-In
Shibboleth 2.0 IdP Training: Introduction
Setting up eduroam for an IdP means …
Presentation transcript:

Mechanisms for Distributed Global Authentication David R Newman

The Problem But And / Or Users need to authenticate to use a service The service provider does not want to manage user credentials And / Or The user already has credentials they want to use

The Solutions

Versions of OpenID Mechanisms for OpenID and OpenID Connect somewhat similar. OpenID Does not require any configuration for the service provider on the identity provider. Service provider decides which identity providers to trust. Most identity providers have either been discontinued (e.g. MyOpenID) or deprecated in preference to OpenID Connect (e.g. Google) OpenID Connect Uses OAuth 2.0 to register service as an application on the identity provider.

OpenID

OpenID Providers

OpenID Connect

Shibboleth Commonly used by higher education institutions. Requires greater co-operation between service provider and identity provider stakeholders to setup. Provides a shim on top of existing user and authentication services. Explicitly designed to support third party discovery services. Access to user attributes controlled by the identity provider rather than the user

Setting up a Shibboleth Service Provider 1. Download IdP metadata including certificate Shibboleth Service Provider (SP) Shibboleth Identity Provider (IdP) 4. Get IdP to download SP metadata including certificate 2. Edit SP configuration to reference IdP metadata 5. Edit IdP configuration to reference SP metadata 3. Generate key and certificate for SP and reference in configuration

Shibboleth Authentication User 4. User requests IdP login service 3. SP tell user to authenticate on the IdP 1. User requests restricted resource 9. Service returns resource or forbidden 6. User provides login credentials 5. IdP provides login page 2. Service detects login required Shibboleth Service Provider (SP) Service Shibboleth Identity Provider (IdP) 8. SP tells Service whether user can access resource 7. IdP provides authentication results and user attributes to SP (via User)

Sharing User Attributes with Shibboleth Shibboleth Service Provider (SP) Shibboleth Identity Provider (IdP) 2. IdP checks which attributes SP can be given 3. SP maps the attributes of interest and passes them onto the service 1. LDAP attributes mapped to SAML Service LDAP Server

Shibboleth with Discovery

Eduroam International Wi-Fi roaming service Predominantly available at higher education institutions Users can login using their institutional username and password Easily configurable on Windows, Linux, MacOS, Android and iOS Uses RADIUS to enable 802.1x authentication

How RADIUS Works

RADIUS Peering Allows authentications beyond your domain. Peer directly with another RADIUS server using a “shared secret” This RADIUS server can then peer with others Rules in RADIUS configuration determine whether to attempt local authentication or to which server to relay.

How Eduroam Works

SOWN’s RADIUS Peering ECS SOWN Soton Jisc (Janet) GEANT DFN Münster

SOWN’s RadMatrix

Further Reading OpenID Shibboleth Eduroam/RADIUS http://openid.net/connect/ http://openid.net/developers/specs/ https://developers.google.com/identity/protocols/OpenIDConnect Shibboleth https://wiki.shibboleth.net/confluence/display/SHIB2/Software+Concepts https://wiki.shibboleth.net/confluence/display/SHIB2/NativeSPLinuxRPMIns tall https://wiki.shibboleth.net/confluence/display/IDP30/Home Eduroam/RADIUS https://www.eduroam.us/node/10 http://www.sown.org.uk/radmatrix https://monitor.eduroam.org/mon_direct.php https://www.eduroam.org/downloads/docs/eduroam_Compliance_Stateme nt_v1_0.pdf

Administering the SOWN Network – David Newman and Chris Malton Next SOWN Talk Administering the SOWN Network – David Newman and Chris Malton Probably 2nd March

Questions?