Single sign-on Mike Ladd Nazia Raoof Bret Walker Kumar Mukherjee Rajesh Radhakrishnan.

Slides:



Advertisements
Similar presentations
Secure Single Sign-On Across Security Domains
Advertisements

Click to edit Master title style HEALTH INFORMATION 1 Identity & Access Management Presenter: Mike Davis (760) January 09, 2007.
Govern the Flow of Data: Moving from Chaos to Control
Agenda 2 factor authentication Smart cards Virtual smart cards FIM CM
Office 365 Identity June 2013 Microsoft Office365 4/2/2017
Agenda AD to Windows Azure AD Sync Options Federation Architecture
Secure Sockets Layer eXtended (SSLX) Next Generation Internet Security Overview Presentation April 2011.
Privileged Identity Management Enterprise Password Vault
SINGLE SIGN-ON. Definition - SSO Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order.
Technical Issues with Establishing Levels of Assurance Zephyr McLaughlin Lead, Security Middleware Computing & Communications University of Washington.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Security Controls – What Works
Core Web Service Security Patterns
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Understanding Active Directory
May 22, 2002 Joint Operations Group Discussion Overview Describe the UC Davis Security Architecture Describe Authentication Efforts at UC Davis Current.
Using Digital Credentials On The World-Wide Web M. Winslett.
Chapter 12 Strategies for Managing the Technology Infrastructure.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Integration of Applications MIS3502: Application Integration and Evaluation Paul Weinberg Adapted from material by Arnold Kurtz, David.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
SOA – Development Organization Yogish Pai. 2 IT organization are structured to meet the business needs LOB-IT Aligned to a particular business unit for.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Identity Management in Education. Welcome Scott Johnson, NetProf, Inc. Creator of OmnID Identity Management for Education
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Security in Virtual Laboratory System Jan Meizner Supervisor: dr inż. Marian Bubak Consultancy: dr inż. Maciej Malawski Master of Science Thesis.
Philadelphia Area SharePoint User Group Building Customer/Partner Extranets Designing a Secure Extranet with Sharepoint 2007 Russ Basiura RJB Technical.
Case Study: DirXML Implementation at Waste Management Rick Wagner Systems Engineer Novell, Inc.
Developing Applications for SSO Justen Stepka Authentisoft, LLC
ArcGIS Server and Portal for ArcGIS An Introduction to Security
Using AS 10g with EBS What are the Benefits of Integrating AS 10g with Oracle Applications?
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
Computer Emergency Notification System (CENS)
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
PS Security By Deviprasad. Agenda Components of PS Security Security Model User Profiles Roles Permission List. Dynamic Roles Static Roles Building Roles/Rules.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
An XML based Security Assertion Markup Language
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Shibboleth: An Introduction
9 Systems Analysis and Design in a Changing World, Fourth Edition.
All Rights Reserved 2014 © CMG Consulting LLC Federated Identity Management and Access Andres Carvallo Dwight Moore CMG Consulting, LLC October
Web Services Security Patterns Alex Mackman CM Group Ltd
E-Authentication & Authorization Presentation to the EA2 Task Force March 6, 2007.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
Securing Web Applications Lesson 4B / Slide 1 of 34 J2EE Web Components Pre-assessment Questions 1. Identify the correct return type returned by the doStartTag()
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
ADFS - Does it Still have a Place? Fitting into the EMS puzzle Frank C. Drewes III 2016 Redmond Summit | Identity.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Secure Single Sign-On Across Security Domains
Single sign-on Mike Ladd Nazia Raoof Bret Walker
Stop Those Prying Eyes Getting to Your Data
Data and Applications Security Developments and Directions
SaaS Application Deep Dive
Enterprise Single Sign-On
Office 365 Identity Management
Management Application for all segments
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Single sign-on Mike Ladd Nazia Raoof Bret Walker Kumar Mukherjee Rajesh Radhakrishnan

Agenda Overview Process Technology Challenges Business and Legal Corporations and Industry

Overview Nazia

Overview Single sign-on for user Maintain one profile with user credentials Access multiple applications and/or third party sites Case Study  Corporation has 15,000 retail stores  Looses more than $1,000,000/year  High labor costs multiple authentication, unnecessary user clicks, forgotten passwords, multiple profiles  Limited time and resources to develop IT solutions

Benefits Better integration with third party websites Eliminates multiple authentication Reduces unnecessary user clicks Reduces initial setup of profiles Reduces time spent on forgotten passwords Reduces volume of help desk calls

Components evaluated Security Portability Usability Cost Manageability

Process Intranet portal Middleware External (Third Party) websites Internal web application Firewall

Availability Integrity ConfidentialityAuthentication User logs into the intranet portal Process Flow Clicks on a third-party site/application CGI script gathers User information Hashes and encrypts with private key Visible to user Not visible to the user Third-party site validates IP add and hash, and decrypts with public key Logs the user in with appropriate credentials Displays user information and grants access to application

Technology Mike

TechnologyProsCons LDAP Widely used Might not be supported by app Complex coordination Kerberos Widely used Complex May not be open to outside world Custom solution Fits needs exactly Single use Potentially more complex / insecure Windows Live ID Web-based Users may already have account Not widely supported Managed by third party

Hash Fixed-length digital representation of a message (message digest) Input -> fixed-size string (the hash value) “digital fingerprint”

SHA Collection of five cryptographic hash functions SHA-1: used in security protocols such as TLS, SSL, PGP, SSH  Recently compromised  Output = 160 bits  Block = 512 bits  80 rounds

Possible Improvements Upgrade to SHA2 Integration w/ LDAP / AD Implement Shibboleth  Open-source implementation of Federated Identity  User information stored across multiple distinct identity management systems

Challenges Rajesh

Challenges Build or Buy decisions Integration issues Still in infancy & little or no standards Avoiding high availability and Enterprise wide issues Service offerings vs. appropriate users Licensing issues Write your own SSO server?  Myriads of interfaces to write Buy?  Limited options  Proprietary implementations Legacy applications, Solutions, Content Management solutions, Mainframe/Unix/Windows, owned solutions Availability of connectors JSSO/SAML emerging but in infancy Open to whole world scenario if not carefully planned

Glossary SAMLSecurity Assertion Markup Language JSSOJava Single Sign On IDMIdentity Management Solution IAMIdentity Access Management

Build Components

Build High Level Development Tasks Develop SSO Server - Modules to maintain repository & policy files - Loopback AUTH routines Develop AUTH EXIT routine for partner apps to check if user is logged on to SSO Server Develop AUTH EXIT routine for external apps to request user ID/Password from SSO Server

Build Challenges From Internal Applications Challenge 1 - Myriads of internal applications with application centric security modules Challenge 2 – Developer’s resistance to give up applications centric security module (legacy) From third-party software Challenge 3 - No control over third-party applications - No support from vendors for something that you build - Upgrade & maintenance

Build Handling challenges Challenge 1 Internally developed applications all use a common EXIT routine that is centrally developed by a common component team in your organization Challenge 2 Architecture standards discouraging application centric authentication Challenge 3 Build based SSO on standards SAML & JSSO Include a step in every vendor evaluation process to validate support for SSO standards and interoperability with your own SSO solution

Buy? Options Total IDM or IAM solution? SSO only? Gartner Magic Quadrant

Buy? Challenges Proprietary/Vendor lock in Support for third-party applications Legacy support (mainframe) Internal application resistance & support issues Integration issues Cost -Cost of hardware, software, & maintenance - Cost of integration - Cost of development (existing internal application unwiring application centric logic)

Buy? Handling Challenges Proprietary/Vendor lock in – Support for standards Support for third-party applications – Request for Proposals Legacy support (mainframe) – Request for Proposals Internal application resistance & support issues – Architecture Standard Definition & Management support Integration issues – Request for proposals Cost -Cost of hardware, software, & maintenance – RFP to Multiple vendor - Cost of integration - Cost of development (unwiring application centric logic from existing internal application)

High Availability - Setup

High Availability - Issues Issue-> Data Synch issues Solution->Check Sync programs

IDM – Logical diagram

Cost Benefits 1Password related helpdesk costHigh 2Workstation supportMedium 3Management cost of unacceptable number of user ID/passwords Medium 4Application centric security hardware/software/development cost High 5Productivity increaseHigh

Business and Legal Consequences Bret

Identity Provider Businesses must decide who is the “identity provider” Being the identity provider means more responsibility.  Legal responsibilities  Business agreements Source for all business legal slides:

Agreements with partners Service Levels  Businesses must work out consequences for SLAs Support  Must dictate who provides support  Decide when support is available  Decide whether support is provided by third party

Agreements with Partners (con’t) Fees  Businesses must work out payment info for contracts  Agreements on fees for upgrade, maintenance and upkeep Auditing  Businesses must agree on auditing methodologies  Agreements on who audits

Regulations Partnerships might bring about more regulation  Are you doing business with a university (FERPA), health care provider (HIPAA) or publicly-traded company (SOX)?

Liability – questions to consider Have you committed to service levels? Have you implied or committed to a level of security? What happens after authentication? Are you liable for poor programming on your partner’s end? How do you deal with confidential information? Are you providing “reasonable” protection?

Insurance You and your partner should insure SSO- related systems Insurance should cover all workers working with SSO (workers compensation, injury, etc.) as well as users and businesses (information disclosure)

Policies and Procedures You must define policies and procedures for:  How authorizations will be communicated  How and where credentials are stored  How backup and redundancy solutions are implemented  Which technical standards will be used You must define how these can be updated as partnership matures

Corporations and Industry Kumar

Corporate and Industry Context SSO is a solution that is feasible in all industries across the board:  Agriculture  Automotive & Transportation  Construction  Education  Financial Services  Government  Healthcare  Real Estate

Corporate and Industry Context SSO can be implemented in any particular industry or corporation:  SSO can be implemented and aligned with the business strategy  SSO can meet business needs  Costs associated with implementing SSO are justifiable

Thank you! © Copyright 2008 MSIT RoadRunners Co. All rights reserved.