State Services Commission New Zealand Government Crown Copyright 2007 www.ssc.govt.nz “Standards are only the beginning.. …of the beginning.. … of interoperability”

Slides:



Advertisements
Similar presentations
From Identity and Authentication ‘point solutions’ to SOA and ESB – ‘NZ Gov’ IdM Architectural Thinking: Five Years On.
Advertisements

© State Services Commission, 2006 Authentication to access government services What might the future hold? Laurence Millar Deputy Commissioner Information.
A brief look at the WS-* framework Josh Howlett, JANET(UK) TF-EMC2 Prague, September 2007.
NZ igovt/RealMe proposed consent service: overview Kantara eGov Working Group April 8 th 2013 CROWN COPYRIGHT © This work is licensed under the Creative.
Step Up Authentication in SAML (and XACML) Hal Lockhart February 6, 2014.
OOI-CI–Ragouzis– Ocean Observatories Initiative Cyberinfrastructure Component CI Design Workshop October 2007.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Integration Considerations Greg Thompson April 20 th, 2006 Copyright © 2006, Credentica Inc. All Rights Reserved.
Saml-v2_0-intro-dec051 Security Assertion Markup Language An Introduction to SAML 2.0 Tom Scavo NCSA.
1 Security Assertion Markup Language (SAML). 2 SAML Goals Create trusted security statements –Example: Bill’s address is and he was authenticated.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
WS-Security TC Christopher Kaler Kelvin Lawrence.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
© 2009 The MITRE Corporation. All rights Reserved. April 28, 2009 MITRE Public Release Statement Case Number Norman F. Brickman, Roger.
Carl A. Foster.  What is SAML?  Security Assertion and Markup Language is an XML-based standard for exchanging authentication and authorization between.
Applied Cryptography Week 13 SAML Applied Cryptography SAML and XACML Mike McCarthy Week 13.
GFIPM Web Services Concept and Normative Standards GFIPM Delivery Team Meeting November 2011.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
SAML-based Delegation in Shibboleth Scott Cantor Internet2/The Ohio State University.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Stronger Authentication in a Federated World Bill Young Government Technology Services NZ State Services Commission.
Copyright 2006 Archistry Limited. All Rights Reserved. SOA Federated Identity Management How much do you really need? Andrew S. Townley Founder and Managing.
Catalyst 2002 SAML InterOp July 15, 2002 Prateek Mishra San Francisco Netegrity.
SWITCHaai Team Introduction to Shibboleth.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Saml-intro-dec051 Security Assertion Markup Language A Brief Introduction to SAML Tom Scavo NCSA.
Deploying Trust Policies on the Semantic Web Brian Matthews and Theo Dimitrakos.
SAML Right Here, Right Now Hal Lockhart September 25, 2012.
Cyber Authentication Renewal Project Executive Overview June – minute Brief.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
Copyright © 2004 by The Web Services Interoperability Organization (WS-I). All Rights Reserved 1 Interoperability: Ensuring the Success of Web Services.
OASIS Week of ebXML Standards Webinars June 4 – June 7, 2007.
Promoting Web Services Interoperability Across Platforms, Applications and Programming Languages Basic Profile 1.0 August 12, 2003 Copyright © 2003 by.
Helsinki Institute of Physics (HIP) Liberty Alliance Overview of the Liberty Alliance Architecture Helsinki Institute of Physics (HIP), May 9 th.
Kevin Novak, Chair W3C Electronic Government Interest Group April 17, 2009.
Karyn Higa-Smith, DHS S&T Program Manager, Identity & Privacy Anil John, JHU/APL Technical Lead, DHS S&T IdM Testbed September 29, 2009 OASIS Identity.
SAML 2.1 Building on Success. Outline n Summary of SAML 2.0 n Work done since 2.0 n Objectives of SAML 2.1 n Proposed Task List n Undecided Issues n Invitation.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
Catalyst 2002 SAML InterOp July 15, 2002 San Francisco.
SAML 2.0: Federation Models, Use-Cases and Standards Roadmap
Introduction to Implementing XML web services authentication John Messing Law-on-Line, Inc. Prepared for Maricopa County ICJIS May 17, 2006.
Saml-v1_x-tech-overview-dec051 Security Assertion Markup Language SAML 1.x Technical Overview Tom Scavo NCSA.
An XML based Security Assertion Markup Language
Connect. Communicate. Collaborate Place organisation and project logos in this area Usage of SAML in eduGAIN Stefan Winter, RESTENA Foundation TERENA Networking.
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
SAML: An XML Framework for Exchanging Authentication and Authorization Information + SPML, XCBF Prateek Mishra August 2002.
Shibboleth: An Introduction
Access Control and Markup Languages Pages 183 – 187 in the CISSP 1.
Technical Break-out group What are the biggest issues form past projects – need for education about standards and technologies to get everyone on the same.
The UK Access Management Federation John Chapman Project Adviser – Becta.
SAML for SIP Hannes Tschofenig, Jon Peterson, James Polk, Douglas Sicker, Marcus Tegnander.
Using WS-I to Build Secure Applications Anthony Nadalin Web Services Interoperability Organization (WS-I) Copyright 2008, WS-I, Inc. All rights reserved.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Discussion - HITSC / HITPC Joint Meeting Transport & Security Standards Workgroup October 22, 2014.
Security Assertion Markup Language (SAML) Interoperability Demonstration.
EGovernment Commonalities within Europe and beyond Colin Wallis & Fulup Ar Foll European Identity Conference 2011.
Fidelity Feedback on SAML 1.X and ID-FF 1.X Patrick Harding Enterprise Architecture Fidelity Investments.
Creating a European entity Management Architecture for eGovernment Id GUIDE Keiron Salt
International Planetary Data Alliance Registry Project Update September 16, 2011.
Security Assertion Markup Language, v2.0 Chad La Joie Georgetown University / Internet2.
Access Policy - Federation March 23, 2016
SAML New Features and Standardization Status
HMA Identity Management Status
Identity Federations - Overview
Identity management Aalto University, autumn 2013.
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Presentation transcript:

State Services Commission New Zealand Government Crown Copyright “Standards are only the beginning.. …of the beginning.. … of interoperability” anon

State Services Commission New Zealand Government Crown Copyright NZ SAMS: An OASIS SAML v2.0 Case Study Colin Wallis State Services Commission New Zealand Government

State Services Commission New Zealand Government Crown Copyright Context: Aotearoa

State Services Commission New Zealand Government Crown Copyright Context: Specific Authentication-related Policy Strong emphasis on compliance with Privacy legislation No national identifier, no ID card, no exchange of biometrics No national security or illegal immigration drivers Inter-agency data matching prohibited except by (small number of) specific exceptions Citizen must control of use / release of data Opt-in: Citizens not compelled to use the services Opt-in: Government agencies not compelled to offer or use central or shared services Low risk, low budget approach

State Services Commission New Zealand Government Crown Copyright Agenda What we’ve done Why write NZ SAMS? How was it done? What did we learn? Where to from here?

State Services Commission New Zealand Government Crown Copyright What we’ve done Constrained OASIS SAML v2.0 down to a smaller sub-set Includes conformance, metadata, bindings (HTTP Redirect, POST and Artifact) and Profiles (SSO, IdP Proxy and NameIdMapping) Published as “NZ SAMS” draft 0.9 for limited review and distributed to interested parties –OASIS SSTC –Liberty Alliance –Other similar govt programmes (US, Denmark, Ireland, Canada, etc.) –Product Vendors, Systems Integrators NZ SAMS part of a broader NZ Government “Authentication Standards” suite Authentication Standards part of a broader NZ Government e-GIF NZ Government e-GIF gradually becoming part of an NZ Government Enterprise Architecture Given agencies the desire and confidence to plan to implement NZ SAMS

State Services Commission New Zealand Government Crown Copyright

State Services Commission New Zealand Government Crown Copyright Agenda What we’ve done Why write NZ SAMS? How was it done? What did we learn? Where to from here?

State Services Commission New Zealand Government Crown Copyright Why write NZ SAMS? 1/4 All the usual altruistic reasons –Interoperability –Make integration easier in future –Cost savings –Uniform user experience –etc.. …but really…

State Services Commission New Zealand Government Crown Copyright Why write NZ SAMS? 2/4 Encouraging Certain Behaviours –Solution architecture –Product selection –Integration choices Goal: More agencies take up All-of Government Services –Reducing future barriers to uptake by influencing choices made today

State Services Commission New Zealand Government Crown Copyright Why write NZ SAMS? 3/4 Agency education –learning a “best practice” approach Vendor preparation –Every government procurement requires compliance with NZ e-GIF standards Product selection –Government agencies will purchase NZ SAMS/SAML compliant products

State Services Commission New Zealand Government Crown Copyright Why write NZ SAMS? 4/4 Alternative options (all discarded) –Do nothing - let vendors sort it out at implementation time –Write our own proprietary NZ Security Assertion Standard –Get someone else to constrain OASIS SAML 2.0 and enforce it from above –Write non enforceable guidelines

State Services Commission New Zealand Government Crown Copyright Agenda What we’ve done Why write NZ SAMS? How was it done? What did we learn? Where to from here?

State Services Commission New Zealand Government Crown Copyright How Was it Done? Involve all the stakeholders 1/5 Government agency use cases are the foundation Participation and buy-in from all actors in identity management - users, government service agencies, vendors, standards organisations – everyone owns part of the outcome Support the privacy-respecting and user control/data release principles of NZ’s privacy legislation Get stakeholders focussed on the user experience, not focussed on each other

State Services Commission New Zealand Government Crown Copyright How was it done? Balancing risk vs. Reward 2/5 October 2004: “Security Assertion Messaging” - one of 5 standards to be published by June 2006 (Cabinet Paper) January 2005: Early planning assumed SAML 1x (1 st increments of the Government Logon Service use SAML 1x) March 2005: SAML V2.0 published, rapidly gains support May 2005: Decision time - SAML 1x or SAML V2? June 2005: SAML V2.0 Help! No deployment experience of SAML V2.0 Help! SME’s needed!

State Services Commission New Zealand Government Crown Copyright How was it done? The “KISS” Principle 3/5 Start with SAML V2.0 conformance specification and metadata to target “Liberty Interoperable” vendors Distil down Government agency use cases to a limited set of SAML v2.0 profiles, bindings, protocols Key Profile: SAML v2.0 Web Browser SSO profile Key Binding Bindings: HTTP Redirect, HTTP POST and HTTP Artifact, SOAP-over-HTTP Key Protocol: SAML v2.0 Authentication Request Supporting Profile: the SAML v2.0 Name Identifier Mapping Supporting Protocol: SAML v2.0 Assertion Query and Request

State Services Commission New Zealand Government Crown Copyright How was it done? Encourage early implementers 4/5 Education sector’s ESSA programme All of government Government Logon Service (GLS) All of government Identity Verification Service (IVS) Inland Revenue online transaction services SSC - Collaboration application Other agencies, including local govt bodies

State Services Commission New Zealand Government Crown Copyright How was it done? Experts write and teach Stakeholders listen and learn! 5/5 Working Group dynamics – agency reps submit use cases, Subject Matter Experts distill and question on conference line Subject Matter Expert #1: OASIS TC member US based to map use cases to SAML profiles Subject Matter Expert #2: Independent US based consultant to peer review Subject Matter Expert 1’s drafts “Soft” release draft as input to OASIS and Liberty Alliance for comment

State Services Commission New Zealand Government Crown Copyright Agenda What we’ve done Why write NZ SAMS? How was it done? What did we learn? Where to from here?

State Services Commission New Zealand Government Crown Copyright What did we learn? Lessons & considerations 1/2 “Interoperable” standards always improving – Version 1.0 syndrome An open standard developed to improve interoperability is almost certain not to interoperate! Implementation experience and vendor software support lags behind standards Consider the IPR implications of the deliverable Consider the maintenance and extension cost of the deliverables Control scope creep Expert advice essential Join and participate in standards creation and implementation bodies – it’s a long term symbiotic relationship

State Services Commission New Zealand Government Crown Copyright What did we learn? What would we have done differently? 2/2 A longer orientation period on SAML for the working group – not just passive reading of material but “live” presentations from Subject Matter Experts More consideration of timing – not that we had much choice! Stronger links with the local vendor community during development Raise the profile of the work during development through effective PR and communication strategies Brought in our Subject Matter Experts “face to face” every 4-6 months

State Services Commission New Zealand Government Crown Copyright Agenda What we’ve done Why write NZ SAMS? How was it done? What did we learn? Where to from here?

State Services Commission New Zealand Government Crown Copyright Where to from here? Seek feedback, modify and release as V1.0 Implement NZ SAMS in prototype development of IVS and other implementations Monitor new developments and extensions: e.g. Simple Sign from OASIS SSTC, SAML token Profile in WS BSP from WS-I Monitor “Liberty Interoperable” vendor list Look to Web Services specifications to supplement browser use cases: e.g. Liberty ID-WSF 2.0 Ramp up engagement with standards organisations, other jurisdictions, vendors and the private sector Work towards upgrading NZ SAMS compliance rating in the NZ e-GIF – from “Under Development” to “Recommended”

State Services Commission New Zealand Government Crown Copyright Colin Wallis

State Services Commission New Zealand Government Crown Copyright Appendix NZ SAMS graphics and content examples

State Services Commission New Zealand Government Crown Copyright NZ SAMS: Generic Usage pattern – SP initiated web browser SSO

State Services Commission New Zealand Government Crown Copyright Messa ge BindingMessage ContentSAML Message (or message parts) Security Transport Channel Security 1HTTPService user makes requests for content not requiring authentication and the SP supplies non- sensitive content until sensitive content requested. Possibly cookie placed by the SP. –– 2HTTP–SSL/TLS 3HTTP RedirectSAML Message: The SP uses the SAML protocol. XML Signature MAY be used (if authentication of the SP is required by the IdP or if additional optional fields included) XML Encryption MAY be used (e.g. if the element used). SSL/TLS 4HTTPIdP presents logon page to service user’s browser.–SSL/TLS 5HTTPService user logs on to IdP using their authentication key(s). –SSL/TLS 6HTTP Artifact (carried in an HTTP Redirect) SAML Message: HTTP parameter carrying the dereference information (i.e. the SAML artifact) for the SAML protocol message below. No XML Signature No XML Encryption SSL/TLS 7SOAP/HTTP Artifact (Artifact from Artifact Resolution profile) SAML Message: SAML element. XML Signature or an alternative such as the GSN, secure VPN, or leased line) MUST be used. No XML Encryption Mutual SSLv3/ TLSv1 or GSN, secure VPN, leased line 8SOAP/HTTP Artifact (Artifact from Artifact Resolution profile) SAML Message: SAML element with the protocol message associated with the artifact; a SAML message in this case. The message contains the assertion. XML Signature No XML Encryption Mutual SSLv3/ TLSv1 or GSN, secure VPN, leased line

State Services Commission New Zealand Government Crown Copyright NZ SAMS: SP initiated web browser SSO variation – sector acts as IdP proxy for the user to manage identity attributes and authorisation in a single logon

State Services Commission New Zealand Government Crown Copyright NZ SAMS: Usage Pattern: authenticate at the GLS and fetch IVS attributes in a single logon: SP initiated with the Name ID Mapping profile

State Services Commission New Zealand Government Crown Copyright Table 6 – NZ SAMS constraints on OASIS SAML v2.0 conformance requirements SectionLineWhat is excluded or altered from the SAML v2.0 Conformance Requirements Specification 3.2 Table The following features are REQUIRED:  Web SSO,, HTTP Redirect Web SSO,, HTTP POST Web SSO,, HTTP Artifact Artifact Resolution, SOAP Single Logout, (IDP & SP-initiated), HTTP redirect Single Logout, (IDP & SP-initiated), SOAP. The following features are NOT RECOMMENDED:  Enhanced Client/Proxy SSO  PAOS  Name Identifier Management, (HTTP redirect and SOAP, both IDP and SP-initiated)*  Identity Provider Discovery (cookie). (Name Identifier Management is not in the initial release of this Standard because deleting or changing service users’ federated identifiers from the system, adding and deleting user federated identifiers/logon tags from a SAML entity (for example the GLS) will not be in control of the service user, will not be done with SAML, but will be done by some yet to be agreed out of band process probably based on current agency implementations.)