Shibboleth: New Functionality in Version 1 Steve Carmody July 9, 2003 Steve Carmody July 9, 2003.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
Lesson 17: Configuring Security Policies
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
The EC PERMIS Project David Chadwick
1 Frameworks. 2 Framework Set of cooperating classes/interfaces –Structure essential mechanisms of a problem domain –Programmer can extend framework classes,
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Guide To UNIX Using Linux Third Edition
1 July 2005© 2005 University of Kent1 Seamless Integration of PERMIS and Shibboleth – Development of a Flexible PERMIS Authorisation Module for Shibboleth.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
June 30, 2004CAMP Shibboleth Implementation Workshop Shibboleth Mockup - ARP GUI Management by Steven Carmody Brown University proxy Walter Hoehn.
Administrative Information Systems Shibboleth: The Next Generation ISIS Technical Information Session for Developers Datta Mahabalagiri March
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
TAM STE Series 2008 © 2008 IBM Corporation WebSEAL SSO, Session 108/2008 TAM STE Series WebSEAL SSO, Session 1 Presented by: Andrew Quap.
Shibboleth-intro-dec051 Shibboleth A Technical Overview Tom Scavo NCSA.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Architecture Of ASP.NET. What is ASP?  Server-side scripting technology.  Files containing HTML and scripting code.  Access via HTTP requests.  Scripting.
SWITCHaai Team Introduction to Shibboleth.
Mairéad Martin The University of Tennessee September 13, 2015 Federated Digital Rights Management.
Attribute Resolution. 2 © 2010 SWITCH Terms: Attribute A piece of information about a user. Each attribute has a unique ID and has zero of more values.
Shibboleth Possible Features – Version 2 Steve Carmody July 9, 2003 Steve Carmody July 9, 2003.
External Identity and Authorization in GENI. Topics Federated identity and virtual organizations ABAC Creating and transporting attributes.
Shibboleth IdP Training: Productionalization January, 2009.
RECALL THE MAIN COMPONENTS OF KIM Functional User Interfaces We just looked at these Reference Implementation We will talk about these later Service Interface.
I2Q & WMnet Pilot Presented by Jason Rousell – i2Q Jay Neale - i2Q.
Shib-Grid Integrated Authorization (Shintau) George Inman (University of Kent) TF-EMC2 Meeting Prague, 5 th September 2007.
Shibboleth: Installation and Deployment Scott Cantor July 29, 2002 Scott Cantor July 29, 2002.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
David L. Wasley Office of the President University of California Shibboleth Safe delivery of reliable authorization data David L. Wasley University of.
CAS Lightning Talk Jasig-Sakai 2012 Tuesday June 12th 2012 Atlanta, GA Andrew Petro - Unicon, Inc.
Federated Identity and Shibboleth Concepts Rick Summerhill Chief Technology Officer Internet2 GEC3 October 29, 2008 Slides by Nate Klingenstein
Shibboleth: An Introduction
Internet2 Middleware Initiative Shibboleth Ren é e Shuey Systems Engineer I Academic Services & Emerging Technologies The Pennsylvania State University.
System.Security.Policy namespace Chinmay Lokesh.NET Security CS 795 Summer 2010.
Shibboleth: Installation and Deployment Scott Cantor July 29, 2002 Scott Cantor July 29, 2002.
Technical Topics for Deployed Campuses: Web SSO Will Norris University of Southern California.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
1 Web Servers (Chapter 21 – Pages( ) Outline 21.1 Introduction 21.2 HTTP Request Types 21.3 System Architecture.
GUDURU PRAVEEN REDDY.NET IMPERSONATION. Contents Introduction Impersonation Enabled Impersonation Disabled Impersonation Class Libraries Impersonation.
David Lawrence 7/8/091Intro. to PHP -- David Lawrence.
PAPI: Simple and Ubiquitous Access to Internet Information Services JISC/CNI Conference - Edinburgh, 27 June 2002.
Implementing and Using the SIRWEB Interface Setup of the CGI script and web procfile Connecting to your database using HTML Retrieving data using the CGI.
Mairéad Martin The University of Tennessee December 16, 2015 Federated Digital Rights Management.
1 Registry Services Overview J. Steven Hughes (Deputy Chair) Principal Computer Scientist NASA/JPL 17 December 2015.
Creating and Managing Digital Certificates Chapter Eleven.
Shibboleth Trust Model Shibboleth/SAML Communities (aka Federated Administrations) Club Shib Club Shib Application process Policy decision points at the.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Adding Distributed Trust Management to Shibboleth Srinivasan Iyer Sai Chaitanya.
Java Programming: Advanced Topics 1 Building Web Applications Chapter 13.
NMI-EDIT and Rice University Federated Identity Management: Managing Access to Resources in Texas Barry Ribbeck Director System Architecture and Infrastructure.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Shibboleth 1.2 Technical Overview “So you thought 1.1 was complicated…” Scott Cantor The Ohio State University and Internet2 Scott Cantor.
The Technology of Privacy Walter Hoehn
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Alain Bethuyne Web Security Architect BNPParibas Fortis
z/Ware 2.0 Technical Overview
e-Infrastructure Workshop 28th March 2006, University of Leeds
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Adding Distributed Trust Management to Shibboleth
Scott Cantor April 10, 2003 Shibboleth and PKI Scott Cantor April 10, 2003.
What’s changed in the Shibboleth 1.2 Origin
Overview and Development Plans
Federated Digital Rights Management
Shibboleth Deployment Overview
Versioning and Variant Authoring Requirements
Presentation transcript:

Shibboleth: New Functionality in Version 1 Steve Carmody July 9, 2003 Steve Carmody July 9, 2003

2 Outline Federation Support New Origin Functionality New Target Functionality Miscellaneous InQueue – the first Federation

3 Quick Review of Shib Entities and Flow OriginTarget

4 Quick Review of Shib Entities and Flow OriginTarget

5 Federation Support Federation and trust support has been substantially extended. Federation structures are now defined. The set of metadata collected and managed by each Federation is more fully defined. The configuration values assigned by a Federation are now identified. Better support for flexible and bilateral trust agreements. A key specific to an origin site can be used to validate its signature.

6 Federation Support There is some support for targets to be members of multiple federations When a browser user arrives, a target will determine which federation their origin belongs to, and then use the trust fabric associated with that Federation. this support will continue to evolve. This version contains a significantly more mature security implementation, and should meet the security requirements of typical sites.

7 New Origin Functionality The Attribute Authority has a powerful new attribute resolver. Simple scenarios (using a string attribute stored in ldap) can be accomplished by merely editing a configuration file. (Potentially) supports a variety of physical Attribute Repositories Java classes may still be written for more complex evaluations (eg retrieving information from multiple disparate repositories, and computing the SAML attribute using business rules). This should greatly simplify the process of configuring the AA to support additional general attributes.

8 Attribute Authority Processing 1.ARP Resolution – determine which attributes to release; for each request, develop an effective ARP (X.arp.xml) 2.Attribute Discovery – obtain attribute values (resolver.xml) 3.Filter values using effective ARP

9 ARP Terms ARP An Attribute Release Policy. Site ARP A policy that is applied to all principals for which a particular Attribute Authority responds. User ARP A policy that is applied only to an individual. This sort of policy is generally created and maintained by the individual to which it is applicable. ARP Rule An atomic statement of policy that pertains to a single target definition. Each rule may contain multiple specifications for which attribute values should or should not be released. Effective ARP The complete set of rules that is applicable to a principal for a particular target. These rules may be retrieved from user, group, site, and other types of ARPs. Default Rule A statement of policy that is guaranteed to be included in Effective ARPs that are derived from an ARP including such a statement.

10 ARP Processing Identify all ARPs that should be applied to a particular user. Including site, user, and other ARPs Create an Effective ARP. For every rule in the previously identified ARPs, perform the matching functions specified in the rule's target definition, to determine which evaluate to TRUE. Any Default Rules encountered are automatically included in the Effective ARP without performing any matching functions. Determine which attribute/value pairs will be released. For each attribute, compile a temporary list that includes all values with a release qualifier of "permit". Subtract from this list all values with a release qualifier of "deny". This list represents the allowable release values for the attribute and is used as a mask for the values which are returned from the Attribute Resolver. If a statement specifies that all values should be permitted, then specific deny qualifiers for specific values should still be enforced. If a statement specifies that all values should be denied, then permit qualifiers for specific values will be ignored.

11 Example ARP - Simplest possible ARP. - -

12 Resolver -- Attribute Discovery The resolver is uses attribute definitions and data connectors. The data connectors pull data, in the form of attributes, from external data sources. The attribute definitions then process this data into a from suitable for use by Shibboleth. This procedure can be as simple as taking an unmodified string value from a data connector and tagging it with a name or can include arbitrarily complex business rules.

13 Example Simple Resolver Element

14 Example Ldap Resolver Element > -

15 New Target Side Functionality Significantly more flexibility in configuring targets to ensure robustness. Failover and redundant configurations are now supported. Attribute acceptance policies have been greatly enhanced, and now support filtering of attribute values by sites. The SHAR can be configured to request specific attributes from the Origin.

16 Target Side Robustness The SHAR may now optionally store its session and attribute cache in a back-end database in addition to the previously available in-memory option. This would allow a site to run an apache server farm, with multiple SHARs, supporting the same set of sessions. Federation supplied files (sites.xml and trust.xml) are now refreshed in a much more robust manner.

17 Simple Target Configuration Browser User Shibboleth Target (apache or IIS) Shibboleth SHAR

18 Load Balanced Environment Browser User Load Balancer Shib Target (apache or IIS) Shib Target (apache or IIS) Shib Target (apache or IIS) Shib SHAR

19 Load Balanced Environment Browser User Load Balancer Shib Target (apache or IIS) Shib Target (apache or IIS) Shib Target (apache or IIS) Shib SHAR Shib SHAR Shib SHAR Session DB

20 Attribute Acceptance Policies An essential part of the Shibboleth trust fabric Ensure that sites only assert attributes for domains for which they are considered authoritative by the target. Typically, this means that Brown University will be trusted to assert attributes only scoped to brown.edu. Unless there are very specific circumstances requiring this restriction be removed, it is strongly encouraged that such policies be in place.

21 Requesting Specific Attributes Currently, per vhost (hostname) basis Defined in shibboleth.ini requestAttributes =...

22 Miscellaneous Origin sites can configure a value to describe the type of authentication mechanism used at the origin site (e.g. password, Kerberos, PKI, etc.). This value is made available on the target side as Shib-Authentication-Method. Various improvements to error handling. Origin sites are now able to supply an "error URL" and contact information to a federation. When a target encounters an error, it can include this information in the error page. Local time string values are now used in log files. Internationalization support has been extended.

23 Setting Origin Authentication Method Set via directive in origin.properties Static – currently, no provision for determining dynamically (yea, we know this needs to get better) edu.internet2.middleware.shibboleth.hs.Han dleServlet.authMethod = urn:oasis:names:tc:SAML:1.0:am:password

24 Target Error Handling Using templating 3 different possible templates Variable substitution Values come from runtime (error message text) and from origin site metadata New Value – url for origin site error page

25 (Possible) Uses for Origin Side Error Page Describe local problem resolution process Aid the process of submitting a trouble ticket Begin to automate problem resolution process Analyze error code – for common non-user problems, submit trouble ticket

26 InQueue – the first Federation bin/viewcvs.cgi/*checkout*/shibboleth/c/ doc/InQueue.html?rev=HEAD&content- type=text/html

27 InQueue – What is Defined? What does InQueue provide? Policies Participation Data Security Security Management Attributes –eduPerson –Some “standard” entitlement values Joining InQueue Configuration for using InQueue

28 Questions?