Shibboleth 2.0 : An Overview for Developers Scott Cantor The Ohio State University / Internet2 Scott Cantor The Ohio.

Slides:



Advertisements
Similar presentations
Secure Single Sign-On Across Security Domains
Advertisements

Shibboleth 2.0 and Beyond Chad La Joie Georgetown University Internet2.
Dispatcher Conditional Expression Static Request Filter Attribute Filter Portal , DNS Hello User Sample (Gateway)
Implementing and Administering AD FS
Will Darby April  What is Federated Security  Security Assertion Markup Language (SAML) Overview  Example Implementations  Alternative.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
WebFTS as a first WLCG/HEP FIM pilot
SIM205. (On-Premises) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service)
Administrative Information Systems Shibboleth: The Next Generation ISIS Technical Information Session for Developers Datta Mahabalagiri March
SAML-based Delegation in Shibboleth Scott Cantor Internet2/The Ohio State University.
Shibboleth: New Functionality in Version 1 Steve Carmody July 9, 2003 Steve Carmody July 9, 2003.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Shibboleth-intro-dec051 Shibboleth A Technical Overview Tom Scavo NCSA.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
SWITCHaai Team Introduction to Shibboleth.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
EuroPKI 2008 Manuel Sánchez Óscar Cánovas Gabriel López Antonio F. Gómez Skarmeta University of Murcia Levels of Assurance and Reauthentication in Federated.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Saml-intro-dec051 Security Assertion Markup Language A Brief Introduction to SAML Tom Scavo NCSA.
External Identity and Authorization in GENI. Topics Federated identity and virtual organizations ABAC Creating and transporting attributes.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Enterprise Identity Steve Plank – Microsoft Ivor Bright – Charteris Dave Nesbitt – Oxford Computer Group.
Integrating with UCSF’s Shibboleth system
TNC2004 Rhodes 1 Authentication and access control in Sympa mailing list manager Serge Aumont & Olivier Salaün May 2004.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
ArcGIS Server and Portal for ArcGIS An Introduction to Security
AAI-enabled VO Platform “VO without Tears” Christoph Witzig EGI TF, Amsterdam, Sept 15, 2010.
SharePoint Security Fundamentals Introduction to Claims-based Security Configuring Claims-based Security Development Opportunities.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
SAML 2.0: Federation Models, Use-Cases and Standards Roadmap
CAS Lightning Talk Jasig-Sakai 2012 Tuesday June 12th 2012 Atlanta, GA Andrew Petro - Unicon, Inc.
Shibboleth at the U of M Christopher A. Bongaarts code-people June 2, 2011.
17 March 2008 © 2008 The University of Edinburgh, European Microsoft Innovation Center and University of Southampton IT Innovation Centre 1 NextGRID Security.
An XML based Security Assertion Markup Language
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
Navigating the Standards Landscape Andrew Owen SEARCH.
Tutorial: Building Science Gateways TeraGrid 08 Tom Scavo, Jim Basney, Terry Fleury, Von Welch National Center for Supercomputing.
Portal-based Access to Advanced Security Infrastructures John Watt UK e-Science All Hands Meeting September 11 th 2008.
Shibboleth: An Introduction
Using Enterprise Logins in Portal for ArcGIS via SAML Greg Ponto & Tom Shippee.
Internet2 Middleware Initiative Shibboleth Ren é e Shuey Systems Engineer I Academic Services & Emerging Technologies The Pennsylvania State University.
Shibboleth: Installation and Deployment Scott Cantor July 29, 2002 Scott Cantor July 29, 2002.
SAML 2.0 An InCommon Perspective Scott Cantor The Ohio State University / Internet2
Shibboleth at the U of M Christopher A. Bongaarts net-people March 10, 2011.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
PAPI: Simple and Ubiquitous Access to Internet Information Services JISC/CNI Conference - Edinburgh, 27 June 2002.
1 Earth System Grid Center for Enabling Technologies ESG-CET Security January 7, 2016 Frank Siebenlist Rachana Ananthakrishnan Neill Miller ESG-CET All-Hands.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
June 9, 2009 SURFfederatie: implementing a multi- protocol federation Hans Zandbelt & Joost van Dijk, SURFnet.
Linus Joyeux Valerie Alonso Managing consultantLead consultant blue-infinity (Switzerland) Active Directory Federation Services v2.
Shibboleth Working Group, Fall 2010 Scott Cantor, OSU Chad LaJoie, Itumi, LLC.
Shibboleth 1.2 Technical Overview “So you thought 1.1 was complicated…” Scott Cantor The Ohio State University and Internet2 Scott Cantor.
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
Shibboleth Identity Provider Version 3
Access Policy - Federation March 23, 2016
Single Sign-On Led by Terrice McClain, Jen Paulin, & Leighton Wingerd
Federation made simple
Federation Systems, ADFS, & Shibboleth 2.0
HMA Identity Management Status
Identity Federations - Overview
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Scott Cantor April 10, 2003 Shibboleth and PKI Scott Cantor April 10, 2003.
Shibboleth 2.0 IdP Training: Introduction
Presentation transcript:

Shibboleth 2.0 : An Overview for Developers Scott Cantor The Ohio State University / Internet2 Scott Cantor The Ohio State University / Internet2

2 Resources Web Site Documentation Wiki Self-Service Testing Facility SAML Specifications

3 Definitions Shibboleth Project An umbrella of activities around federated authentication and access management managed by Internet2 and its international partners, still mostly an ad hoc group Shibboleth Specifications Historical extensions to SAML 1.1, now superseded by SAML 2.0 Strong commitment to standardization of any technical invention done on behalf of the project Shibboleth System Internet2-developed open-source implementation of various federation standards, specifications, and value-added components Competitive with but also interoperating with many commercial and open source implementations

4 Key Concepts Federated Identity Attribute-Based Single Sign-On Management of Release of User Data Standards Based Variety of Policy and Management Models Flexible Integration

5 History Shibboleth 1.x spanned 4 major releases and several minor ones over a span of about 4 years. Near-constant changes in terminology, configuration. Following original standards track while contributing to the next generation of standards. Essentially zero changes to actual applications across the entire release history.

General Description of SAML 2.0 SSO Service provider sends XML message to a trusted identity provider through browser. Identity provider verifies identity of user and returns an XML message with an error or a signed SAML assertion to application through browser. Assertion is optionally encrypted with a key controlled by service provider. Security of system derived from keys exchanged among parties or indirectly via a PKI. Lots of options and features, either further profiling or very comprehensive implementations. 6

SAML 2.0 SSO Feature Set Federated, multi-domain use Carries attributes as well as identity features: control over login methods (AuthnContext) bypassing SSO (ForceAuthn) requiring SSO (IsPassive) control over identifier type (NameIDPolicy) future control of forwardable assertions Single Logout protocol, front and back-channel Variety of deployment and trust models 7

Shibboleth 2.0 Value Add Uniform multi-protocol features Advanced metadata exchange/processing Internal / external authentication handlers Zero-programming model for application integration Advanced attribute features: Integration with back-end stores Extensible filtering at both ends SP resolution architecture Clustering 8

Shibboleth Application Model SP software integrated with web server (Apache, IIS, Sun/iPlanet, FastCGI), not applications Middleware consumes SAML assertions and filters/processes the claims while providing session mgmt (SAML token in, cookie out) Applications generally written in terms of processed attributes, but can access raw tokens

Shibboleth Application Model Interface between applications and SP is designed to foster independence: environment variables when possible request headers otherwise Applications with existing security or session models can use a trivial “stub” application to translate incoming attributes (store them in a database by session key, encrypt into cookie, map to local account or group, etc.)

Typical Deployment 1.Install SP software into web server. Includes a keypair generator 2.Publish SAML metadata about service configuration. SP can now generate mostly accurate metadata Self-hosted or submitted to a federation operator for vetting and signing 3.Utilize access control functionality (e.g. Apache htaccess) based on attributes, if rules can be expressed externally to application. 4.Write application, consuming attributes when and where required as appropriate for the programming environment. getenv(“HTTP_DISPLAYNAME”) servletRequest.getAttribute(“displayName”) Request(“HTTP_DISPLAYNAME”) CGI.HTTP_DISPLAYNAME …

Application / SP Integration As much as possible done through configuration at deployment time: settings applied by host, path, query string, regular expressions Advanced features like runtime control over login process available via redirection into SP handlers with parameters to supply or override settings. Communication back to application also via redirects (e.g. notification of logout). 12

Without programming… all protocol and XML processing authorization based on attributes, SAML authentication context, time since login session management with IP address enforcement mapping of attributes to one or more headers, anything to REMOTE_USER 13

Examples Require authentication and.edu faculty affiliation:.htaccess AuthType shibboleth ShibRequireSession On require affiliation ~ XML 14

Examples Request a passive login (e.g. initial access to a portal): response.sendRedirect( “/Shibboleth.sso/Login?isPassive=1”); Request a login via client certificate from Ohio State: response.sendRedirect( “/Shibboleth.sso/Login” + “?entityID=“ + “urn:mace:incommon:osu.edu” + “&authnContextClassRef=“ + “urn:oasis:names:tc:SAML:2.0:ac:classes:TLSClient”); 15

Current Status 2.0 out, 2.1 imminent bug fixes, additional clustering option using memcached SP has more or less complete SAML 2.0 support IdP TODO list includes single logout and NameID management protocols 16

Roadmap Items Information Cards Real-time user consent User provisioning, “introduction” problem Java SP REST, WS-Trust, and SAML-based token requests N-Tier solutions building on the previous item, perhaps OAuth, Keberos ticket delegation Integration/glue for popular app frameworks IdP package with embedded container … 17