Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.

Slides:



Advertisements
Similar presentations
Suchin Rengan Principal Technical Architect Salesforce.com
Advertisements

Secure Single Sign-On Across Security Domains
NRL Security Architecture: A Web Services-Based Solution
Tuesday, June 10, 2003 Web Services Brief Overview & Security Assertion Coordinator Pattern by Mohammad Abushadi & Riaz Ahmed for Security Group CSE -
Office 365 Identity June 2013 Microsoft Office365 4/2/2017
Eunice Mondésir Pierre Weill-Tessier 1 Federated Identity with Ping Federate Project Supervisor: M. Maknavicius-Laurent ASR Coordinator: G. Bernard ASR.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Carl A. Foster.  What is SAML?  Security Assertion and Markup Language is an XML-based standard for exchanging authentication and authorization between.
Applied Cryptography Week 13 SAML Applied Cryptography SAML and XACML Mike McCarthy Week 13.
Copyright B. Wilkinson, This material is the property of Professor Barry Wilkinson (UNC-Charlotte) and is for the sole and exclusive use of the students.
Integration of Applications MIS3502: Application Integration and Evaluation Paul Weinberg Adapted from material by Arnold Kurtz, David.
WebFTS as a first WLCG/HEP FIM pilot
Identity and Access Management
A Use Case for SAML Extensibility Ashish Patel, France Telecom Paul Madsen, NTT.
Web Service Standards, Security & Management Chris Peiris
Catalyst 2002 SAML InterOp July 15, 2002 Prateek Mishra San Francisco Netegrity.
SWITCHaai Team Introduction to Shibboleth.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Saml-intro-dec051 Security Assertion Markup Language A Brief Introduction to SAML Tom Scavo NCSA.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Security in Virtual Laboratory System Jan Meizner Supervisor: dr inż. Marian Bubak Consultancy: dr inż. Maciej Malawski Master of Science Thesis.
Enterprise Identity Steve Plank – Microsoft Ivor Bright – Charteris Dave Nesbitt – Oxford Computer Group.
SAML Right Here, Right Now Hal Lockhart September 25, 2012.
Security and Information Assurance UC San Diego CSE 294 Winter Quarter 2008 Barry Demchak.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
ArcGIS Server and Portal for ArcGIS An Introduction to Security
Using AS 10g with EBS What are the Benefits of Integrating AS 10g with Oracle Applications?
Belnet Federation Belnet – Loriau Nicolas Brussels – 12 th of June 2014.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
Catalyst 2002 SAML InterOp July 15, 2002 San Francisco.
SAML 2.0: Federation Models, Use-Cases and Standards Roadmap
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
An XML based Security Assertion Markup Language
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
Navigating the Standards Landscape Andrew Owen SEARCH.
Shibboleth: An Introduction
Current list of common attributes of the EDIT federation Single Sign-On for the EDIT platform Lutz Suhrbier¹, Andreas Kohlbecker², Andreas Müller² 1 Freie.
Using Enterprise Logins in Portal for ArcGIS via SAML Greg Ponto & Tom Shippee.
Shibboleth What is it and what is it good for? Chad La Joie, Georgetown University.
A radiologist analyzes an X-ray image, and writes his observations on papers  Image Tagging improves the quality, consistency.  Usefulness of the data.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
All Rights Reserved 2014 © CMG Consulting LLC Federated Identity Management and Access Andres Carvallo Dwight Moore CMG Consulting, LLC October
Security Assertion Markup Language (SAML) Interoperability Demonstration.
Fidelity Feedback on SAML 1.X and ID-FF 1.X Patrick Harding Enterprise Architecture Fidelity Investments.
National Geospatial Enterprise Architecture N S D I National Spatial Data Infrastructure An Architectural Process Overview Presented by Eliot Christian.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
Copyright 2007, Information Builders. Slide 1 iWay Web Services and WebFOCUS Consumption Michael Florkowski Information Builders.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
F5 APM & Security Assertion Markup Language ‘sam-el’
Security Assertion Markup Language, v2.0 Chad La Joie Georgetown University / Internet2.
Access Policy - Federation March 23, 2016
Secure Single Sign-On Across Security Domains
Analyn Policarpio Andrew Jazon Gupaal
Federation made simple
Federation Systems, ADFS, & Shibboleth 2.0
HMA Identity Management Status
Data and Applications Security Developments and Directions
Prime Service Catalog 12.0 SAML 2.0 Single Sign-On Support
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Community AAI with Check-In
Presentation transcript:

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation OWASP Security Access Mark-up Language (SAML) & Single Sign-on Implementation Karen Fritsche & Sarah Heinen IT Web & Brokerage Support American Century Investments / /30/08

OWASP 2 Agenda  What is SAML?  Benefits of SAML standard  SAML Terminology  Single Sign-On (SSO) Overview  American Century Investment’s SAML Solution  PingFederate Architecture  PingFederate Configuration Options  Brokerage Web SSO Application

OWASP 3 What is SAML?  SAML - Security Access Mark-up Language  XML standard created by the OASIS (Organization for the Advancement of Structured Information Standards) Security Services Technical Committee.  Specifically for the secure exchange of identity information between online partners. This information includes user authentication, entitlement, and attribute information.  Used for Web Single Sign-On – where a user authenticates on one web site and then, without additional authentication, is allowed access to personalized or customized resources at another site. This is done via a SAML assertion.  Current version is SAML 2.0 – which is backward compatible with versions 1.0, 1.1 and portions of WS-Federation.

OWASP 4 Benefits of SAML standard  Platform neutral – SAML abstracts security framework away from platform architectures and particular vendors.  Loose coupling – SAML does not require user information to be maintained enterprise-wide.  Improved on-line experience for end users – SAML enables single sign-on (SSO) by allowing users to authenticate at an identity provider (IdP) and then access service providers (SP) without additional authentication. Single log-out (SLO) enables the user to log out of one web site, triggering the log out of all other web sites within that partnership.  Reduces development cost – “reuse” authentication implementation, especially for the Service Provider.  Promotes privacy – authentication credentials maintained at the Identity Provider only.  Risk transfer to Identity Provider – puts ownership of authentication in the right place.  Secure Web Services - can be used within SOAP messages to convey security and identity information.

OWASP 5 SAML Terminology  Assertion – XML document sent between an Identity Provider (IdP) and a Service Provider (SP) containing identifying information.  Bindings – Transport protocols used to transfer the SAML message. These include HTTP POST, HTTP Artifact, HTTP Redirect, and SOAP.  Profile – Specification for message flows combining assertions and bindings to support use cases.  Metadata – The XML schema that defines the configuration (profile, connection endpoints, security certificate information, etc.) between federation partners.

OWASP 6 Single Sign-On Overview  Can be initiated by IdP or SP.  The number of SSO profile variations is determined by the combination of binding options and initiation point.  Review 3 common scenarios:  IdP-Initiated SSO: POST  IdP-Initiated SSO: Artifact  SP-Initiated SSO: POST/POST

OWASP 7 IdP-Initiated SSO: POST

OWASP 8 IdP-Initiated SSO: Artifact

OWASP 9 SP-initiated SSO: POST/POST

OWASP 10 American Century Investment’s SAML solution  Purchased PingIdentity’s PingFederate software because….  Provided SAML 2.0 implementation (required by Brokerage Vendor)  Saved IT development time / effort  Allowed for isolated SAML assertion generation  24x7 production support available  Adaptable for enterprise use

OWASP 11 PingFederate Architecture  Stand-alone, centralized infrastructure.  Runs on JBoss.  Configurable for Windows or Linux platforms.  JDBC and LDAP compatible.  Supports SAML 2.0 standard; backwards compatible for SAML 1.x and WS-Federation.  Multiple applications are able to use the same PingFederate implementation for different connections / profiles.  Integration is available for Java,.Net, IBM WebSphere, Oracle Access Manager, Salesforce.com, and others.

OWASP 12 PingFederate Configuration Options  Adapters Transfers attributes between an application and the PingFederate server using a proprietary, secure token format (PFTOKEN). An adapter supports the creation of an Extended Adapter Contract which allows additional attributes to be passed in the SAML assertion. Adapters also have the ability to query additional attributes from a local data store, or create a persistent name identifier which uniquely identifies the user passed to your SP partners.  Connections Summary information for your partner connection. This includes your role (IdP vs. SP), protocol (SAML2), SAML profile, attribute contract, map adapter to connection, security (certificates, encryption policy).

OWASP 13 Brokerage Web SSO Application  ACI is the IdP; Brokerage Vendor is the SP  Used the IdP Initiated SSO: POST profile  Used Java Integration Kit to interface with PingFederate Adapter  Security Certificate imported / managed by PingFederate  UserID in SAML assertion mapped to the Brokerage Vendor authentication ID  Removed access code / password requirement  Extended Adapter Contract with additional attributes (landing page, return/logout URLs, etc.)  SAML assertion is Base 64 encoded by PingFederate  No attribute query was needed (no LDAP or JDBC)  No session management (vendor does not support Single Log Out)

OWASP 14 Contact Information Karen Fritsche & Sarah Heinen American Century Investments American Century Investments has been providing investment management services to institutions and individual investors since With offices in New York, Mountain View, Calif. and Kansas City, the company manages approximately $95 billion in assets through mutual funds, subadvisory accounts, institutional separate accounts and commingled trusts. Learn more at americancentury.com.americancentury.com