Securing Your Applications and Web Services with the Geneva Framework Jim Lavin.

Slides:



Advertisements
Similar presentations
automated single login access to Novell storage resources
Advertisements

Secure Single Sign-On Across Security Domains
Active Directory Federation Services How does it really work?
Hello i am so and so, title/role and a little background on myself (i.e. former microsoft employee or anything interesting) set context for what going.
Tuesday, June 10, 2003 Web Services Brief Overview & Security Assertion Coordinator Pattern by Mohammad Abushadi & Riaz Ahmed for Security Group CSE -
 Jan Alexander Program Manager Microsoft Corporation BB43.
 Rich Randall Development Lead Microsoft Corporation BB44.
2 Connecting Active Directory To Cloud Services Jorgen Thelin Senior Program Manager Microsoft Corporation Session Code: IDA306.
Forms Authentication, Users, Roles, Membership Ventsislav Popov Crossroad Ltd.
Eunice Mondésir Pierre Weill-Tessier 1 Federated Identity with Ping Federate Project Supervisor: M. Maknavicius-Laurent ASR Coordinator: G. Bernard ASR.
SIM403. Claims Provider Trust Relying Party x Relying Party Trust Claims Provider Trust Your ADFS STS Partner ADFS STS & IP Relying Party Trust Partner.
SAML 2.0 og ”Geneva” OIOSAML Workshop 31. marts 2009 Århus René Løhde, Microsoft
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
 Lynn Ayres Program Manager Identity Services  Tore Sundelin Program Manager Identity Services BB29.
Problem Statement AD DB App1 DB App2 AD App4 App6 AD App5 Intranet Extranet Cloud AD App3 DB SSO Separate Sign-in Separate Sign-in Separate Sign-in.
 Kim Cameron Distinguished Engineer Microsoft Corporation BB11.
Introduction To Windows NT ® Server And Internet Information Server.
Every effort has been made to make this seminar as complete and as accurate as possible but no warranty or fitness is implied. The presenter, authors,
SIM205. (On-Premises) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service)
Understanding Active Directory
SIM402. Kerberos, NTLM, Basic, Digest, Forms?
Matt Steele Senior Program Manager Microsoft Corporation SESSION CODE: SIA326.
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © cs-tutorial.com. Introduction to Web Development In 1990 and 1991,Tim Berners-Lee created the World Wide Web at the European Laboratory for.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Enterprise Identity Steve Plank – Microsoft Ivor Bright – Charteris Dave Nesbitt – Oxford Computer Group.
Sustainable SharePoint 2010 Customizations By Bill Keys.
Windows Azure Dave Glover Developer Evangelist Microsoft Australia Tel:
第十四章 J2EE 入门 Introduction What is J2EE ?
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 5: Active Directory Logical Design.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
SharePoint Security Fundamentals Introduction to Claims-based Security Configuring Claims-based Security Development Opportunities.
A Deep Dive into Best Practices with the Windows Communication Foundation John Justice COM415 Program Manager Microsoft Corporation.
Developing Web Services Using ASP.NET and WSE That Interoperate with the Windows Communications Foundation ("Indigo") Mark Fussell COM432 Lead Program.
An Overview of Single Sign-On, Federation, Its Benefits, and Basic Procedures for Integrating Applications.
Using Enterprise Logins in Portal for ArcGIS via SAML Greg Ponto & Tom Shippee.
Keith Brown Cofounder pluralsight.com SIA312 Outline What is identity? Challenges Federated identity How it works from a 10,000 foot view Terminology.
Windows CardSpace Martin Parry Developer Evangelist Microsoft
 Stuart Kwan Group Program Manager Microsoft Corporation  Caleb Baker Senior SDET Microsoft Corporation BB42.
Windows Role-Based Access Control Longhorn Update
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
Access Management 2.0: UMA for the #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 1.
Web Services Security Patterns Alex Mackman CM Group Ltd
Linus Joyeux Valerie Alonso Managing consultantLead consultant blue-infinity (Switzerland) Active Directory Federation Services v2.
Andrew J. Hewatt, Gayatri Swamynathan and Michael T. Wen Department of Computer Science, UC-Santa Barbara A Case Study of the WS-Security Framework.
Introduction to.NET FX 3.0 (+ sneak preview of.NET FX 3.5) Martin Parry Developer & Platform Group Microsoft Ltd
1 Introduction to Web Application Review. 2 Five Layers Architecture HTML, CSS, Java Script ASP.net User ’ s.dll, Nunit, Web Services ADO.net SQL Server,
BE-com.eu Brussel, 26 april 2016 EXCHANGE 2010 HYBRID (IN THE EXCHANGE 2016 WORLD)
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
Modern Development Technologies in SharePoint SHAREPOINT SATURDAY OMAHA APRIL, 2016.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Secure Single Sign-On Across Security Domains
Stop Those Prying Eyes Getting to Your Data
Federation made simple
Data and Applications Security Developments and Directions
SaaS Application Deep Dive
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
The New Virtual Organization Membership Service (VOMS)
Windows Identity Foundation Overview
Security & .NET 12/1/2018.
Windows Identity Foundation Overview
Identity and Access Management: Windows Identity Foundation Overview
Matthew Levy Azure AD B2B vs B2C Matthew Levy
Developing for Windows Azure
Implementing Security in ASP.NET Core: Claims, Patterns, and Policies
Martin Parry Developer Evangelist Microsoft
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

Securing Your Applications and Web Services with the Geneva Framework Jim Lavin

About Me Technical Lead with the Transportation Industry Consulting Services Group of EDS, an HP Company Programming since 1978 – Assembly Language on a HeathKit H8 computer Worked mostly on Mid-Range, Desktop and Hand-Held Systems Polyglot Programmer – Assembly, Basic, C, C++, Pascal, Fortran, C#, XML, XSLT, XAML, HTML, CSS, JavaScript and Java Allergic to Big Metal, PL/1, Cobol and IMS

Agenda Challenges in a Connected World Claims-Based Identity Concepts Building a simple Passive Security Token Service Securing your ASP.NET Web Application Building a simple Active Security Token Service Securing your WCF Web Services Using Delegation to access secured Web Services

Challenges In Identity Identity is essential, but not straightforward –Lots of technologies and standards –Complex decision tree, technology to scenario Cloud computing adds new requirements –Federated single sign on is a must –Usually cant read enterprise directory Need a new approach –Simplify programming model –Cloud/on-premises agnostic

Challenge: Getting Information About the User Many authentication systems only convey an identifier, not user attributes Applications must do lookups in directories, databases for information about user –Location of info not obvious – every organizations information system is slightly different –Not straightforward how to look up information about a user from another organization –Applications residing in cloud may not be able to read enterprise directory

Challenge: Federation Federation is essential for business to business applications, and when using cloud services –Organizations dont want to manage separate user accounts at every cloud service or partner –Want end users to have single sign on experience

Challenge: Identity Delegation Front end application wants to call back end service, Acting As logged in user Todays approaches –Gather users credentials at front end – gives front end app too much power –Give front end full privileged to back end, Trusted subsystem – takes control out of hands of back end app –Kerberos constrained delegation – only works with Kerberos

Claims-Based Access Model Claim –Statement by one party about other party –May be an identifier, a characteristic Security token –Signed document containing claims –Produced by Security Token Service (STS) Identity Metasystem –Protocols and architecture for exchange claims Claims-aware application –Claims delivered when user accesses app

Application Server Claims-Based Access Model Security Token Service End User 3. Read policy 5. Send claims 1.Establish relationship using metadata 2. Read policy trust 4. Get claims

Role Of Security Token Services Key to flexibility in model: Externalize authentication to an STS STS takes care of –How to authenticate user –Where to source claim values about user –Emitting specific types, formats and values of claims to satisfy a specific application Active and Passive STS –Passive STS used by clients that do not have capability to interact with the STS directly; HTML, ASP.NET –Active STS used mainly by smart clients; WinForm, WPF, WCF, etc. Allows application logic to be driven by claims

Building a Passive STS Steps –Create an implementation class derived from SecurityTokenService –Create an implementation class derived from SecurityTokenServiceConfiguration –Add a FederatedPassiveTokenService server object to the default.aspx –Configure authentication method

BUILDING A PASSIVE STS Demo

Securing an ASP.NET Application Steps –Add Assemblies and HTTP Modules to web.config –Switch to anonymous authentication –Create metadata to establish trust –Turn on Passive Redirection –User redirected, authenticated, returns claims Benefit –No code change: works with.Net role-based security –Flexibility: STS admin decides how to authenticate user and retrieve role data

Getting Information About User Steps –Write code to read claims using IClaimsPrincipal, IClaimsIdentity Benefits –Easy to get user information –No directory lookup necessary in application –STS admin decides where to get information about user

SECURING AN ASP.NET APPLICATION Demo

Securing an WCF Service Steps –Add Assemblies to project –Implement a class derived form ServiceHostFactory –Implement a class derived from IssuerNameRegistry –Implement a class derived from IdentityModelServiceAuthorizationManager –Create metadata to establish trust –Modify the.SVC to use the ServiceHostFactory –Modify the binding to use WS-Federation Benefit –Little code change, mostly hosting plumbing –Allows you to access Claims information via Thread.CurrentPrincipal

SECURING A WCF SERVICE Demo

Calling a WCF Service using Identity Delegation

Steps –Configure delegation policy on STS –Write WCF code to call back end service using ActAs client credential Benefits –Familiar WCF programming model –Fine grained control over delegation policy –Back end gets claims it needs –Back end can audit user access accurately –App can turn claims back into mapped NT user for access to Kerberos-protected resources

CALLING A WCF SERVICE USING IDENTITY DELEGATION Demo

"Geneva" Schedule Beta 1 October 2008 Beta 1 October 2008 Beta 2 1st Half 2009 Beta 2 1st Half 2009 RTM 2nd Half 2009 RTM 2nd Half 2009

Review Challenges in a Connected World Claims-Based Identity Concepts Building a simple Passive Security Token Service Securing your ASP.NET Web Application Building a simple Active Security Token Service Securing your WCF Web Services Using Delegation to access secured Web Services

PDC Presentations About Identity PDC Tag: Identity Software –(BB42) Identity: "Geneva" Server and Framework Overview –(BB43) Identity: "Geneva" Deep Dive –(BB44) Identity: Windows CardSpace "Geneva" Under the Hood Services –(BB22) Identity: Live Identity Services Drilldown –(BB29) Identity: Connecting Active Directory to Microsoft Services –(BB28).NET Services: Access Control Service Drilldown –(BB55).NET Services: Access Control In the Cloud Services

Contact Info Blog: Twitter: