CUWebAuth Technical Presentation Pete Bosanko Identity Management Team.

Slides:



Advertisements
Similar presentations
HINARI – Accessing Articles: Problems and Solutions.
Advertisements

Enabling Secure Internet Access with ISA Server
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Forms Authentication, Users, Roles, Membership Ventsislav Popov Crossroad Ltd.
Michelle J. Gosselin, Jennifer Schommer Guanzhong Wang.
FIspace Security Components FIspace Security Components NetFutures 2015 FIspace project Javier Romero Negrín Javier Hitado Simarro ATOS Serdar Arslan KoçSistem.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
GGF15 Workshop MyProxy Integration with PubCookie Marty Humphrey*, Jim Jokl*, and Jim Basney** *Department of Computer Science, University of Virginia,
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Authenticating Users in an ASP.NET Application. Web Site Administration Tool From VS 2008, click Website/ ASP.Net Configuration to open Web Site Administration.
Confidential Date Project ONE CLICK : 12/26/2006 Oracle Single Sign-On Sridhar Gangapuram Manager, Oracle Applications (Phoenix) Roger Raj Sr. Technical.
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
UPortal and the Yale Central Authentication Service Drew Mazurek ITS Technology & Planning Yale University JA-SIG Summer Conference ‘04 Denver, CO June.
An Authorization Service using.NET Passport ™ as underlying Authentication Scheme Bar-Hen Ron Hochberger Daniel Winter 2002 Technion – Israel Institute.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Follow these instructions to pay your dues. Get into your web browser Like Internet Explorer Now you need type in this address in the Address bar. Example.
PubMed Search Options (Basic Course: Module 6). Table of Contents  History  Advanced Search  Accessing full text articles from HINARI/PubMed  Failure.
Esri UC2013. Technical Workshop. Technical Workshop 2013 Esri International User Conference July 8–12, 2013 | San Diego, California Building Secure Applications.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Web Application Vulnerabilities Checklist. EC-Council Parameter Checklist  URL request  URL encoding  Query string  Header  Cookie  Form field 
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
Authentication June 24/2003. Overview Terminology Local Passwords Early Password Services Kerberos Basics Tickets Ticket Acquisition Kerberos Authentication.
1 ASP.NET SECURITY Presenter: Van Nguyen. 2 Introduction Security is an integral part of any Web-based application. Understanding ASP.NET security will.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Session 11: Security with ASP.NET
Forms Authentication, Users, Roles, Membership Svetlin Nakov Telerik Corporation
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Chapter 9 Web Applications. Web Applications are public and available to the entire world. Easy access to the application means also easy access for malicious.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
USCGrid A (Very Quick) Introduction To PubCookie
TNC2004 Rhodes 1 Authentication and access control in Sympa mailing list manager Serge Aumont & Olivier Salaün May 2004.
Philadelphia Area SharePoint User Group Building Customer/Partner Extranets Designing a Secure Extranet with Sharepoint 2007 Russ Basiura RJB Technical.
PubMed/History, Advanced Search and Review (module 4.3)
Portal User Group Meeting December 13, Agenda Introduction (Angela Taetz) Help Desk and Impact System (Craig Mollison) New Features (Craig Mollison)
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
Activating Clarity  Activating Clarity  Activation  Online Activation  Fax Activation  Review and Verify Activation and License Terms  Updating.
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
An Overview of Single Sign-On, Federation, Its Benefits, and Basic Procedures for Integrating Applications.
Module 11: Securing a Microsoft ASP.NET Web Application.
Integrating and Troubleshooting Citrix Access Gateway.
This document contains unpublished confidential and proprietary information of American Express. No disclosure or use of any portion of these materials.
UMBC’s WebAuth Robert Banz – UMBC
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
DataFlow Diagram – Level 0
Your friend, Bluestem. What is Bluestem? “Bluestem is a software system which enables one or more high-security SSL HTTP servers in a domain (entrusted.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Web2.0 Secure Development Practice Bruce Xia
(ITI310) By Eng. BASSEM ALSAID SESSIONS 10: Internet Information Services (IIS)
CIT’s Web Single Sign-on Service SRM Report CUWebAuth Investigation Identity Management Team OIT/CIT Security April 16, 2007.
Securing Web Applications Lesson 4B / Slide 1 of 34 J2EE Web Components Pre-assessment Questions 1. Identify the correct return type returned by the doStartTag()
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
ASP.NET 2.0 Security Alex Mackman CM Group Ltd
Web Server Administration Chapter 6 Configuring a Web Server.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Office of Information Technology GT Identity and Access Management JA-SIG CAS project (introducing login.gatech.edu) April 29th,
Authentication & Authorisation Is the user allowed to access the site?
Access Problems and Solutions for Full-text Articles or E-books
Apache web server Quick overview.
Enabling Secure Internet Access with TMG
CAS and Web Single Sign-on at UConn
Security mechanisms and vulnerabilities in .NET
CompTIA Server+ Certification (Exam SK0-004)
Access Problems and Solutions for Full-text Articles or E-books
Configuring Internet-related services
MyProxy Integration with PubCookie
ASP.NET Module Subtitle.
Central Authentication Service
CUWebAuth and CUWebLogin 2.0
Presentation transcript:

CUWebAuth Technical Presentation Pete Bosanko Identity Management Team

Introduction Apache and IIS Web servers Authentication using Cornell NetID Authorization

Introduction (cont.) Website Authentication SideCar WebAuth (CUWebLogin) Proxy (uportal) Website Authorization Permit Server NetID Valid User

Introduction (cont.) Apache solaris, aix, linux, mac/os, freebsd, windows, yellowdog Apache module Integrated configuration and logging IIS Windows 2000 & 2003 ISAPI Filter Integrated configuration

Getting Started Download CUWebAuth Read release notes & documentation Request a srvtab and register your server Install CUWebAuth Basic CUWebAuth configuration Configure restricted pages

CUWebAuth System

CUWebAuth Access Stages Authentication Verify site cookie Try SideCar Possibly redirect to cuweblogin.cit.cornell.edu Authorization Check valid NetID Possibly send message to Permit server to verify Allow or deny access to restricted resource

CUWebLogin User goes to protected URL CUWebAuth redirects to cuweblogin.cit.cornell.edu User logs in cuweblogin session cookie issued (cornell.edu, one time use) cuweblogin redirects to original URL CUWebAuth verifies cuweblogin cookie, destroys cookie CUWebAuth session cookie issued Web page access granted

How CUWebLogin works Web Server - CUWebAuth CUWebLogin - Server

CUWebLogin Processes

CUWebAuth After Login User goes to protected URL CUWebAuth decrypts and verifies CUWebAuth cookie Web page access granted

Single Sign-On curelogin cookie (cuweblogin.cit.cornell.edu) User logs in once, keeps browser open Can move between sites without repeating log in

Single Sign-On

POST Data CUWebAuth uses hidden fields Click to Proceed page POST data carried via hidden cuweblogin.cit.cornell.edu Works best with SSL IIS Performance

CUWebAuth Major Issues SideCar vulnerabilities Helpdesk handles WebSite issues Closing browser = logout Stale ticket cache Multiple address registrations for clusters URL truncation issue Need self-service for srvtab and CUWebAuth registration

CUWebAuth Vulnerabilities Site Cookie Replay (non-SSL) Use of require valid-user SideCar issues Keeping up-to-date on CUWA releases srvtab file needs to have access restricted IIS – keep up on latest patches Website security best practices

Roadmap Moving toward open-source (ongoing) Interim Release 1.3.x?......Spring ‘06 Support for Apache 2.2 Bug Fixes Kerberos 5 Release Summer ’06 K5 Only Addresses major issues Grouper/Signet…………….Spring ‘07

Help Web: Get a srvtab Download CUWebAuth Lookup CUSSP error codes Manage Permits Get help Report a bug Feature requests

CUWebAuth Questions / Comments