Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.

Slides:



Advertisements
Similar presentations
A brief look at the WS-* framework Josh Howlett, JANET(UK) TF-EMC2 Prague, September 2007.
Advertisements

Step Up Authentication in SAML (and XACML) Hal Lockhart February 6, 2014.
XML Security Standards — Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Integration Considerations Greg Thompson April 20 th, 2006 Copyright © 2006, Credentica Inc. All Rights Reserved.
CTO Office Reliability & Security Distinctions and Interactions Hal Lockhart BEA Systems.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
WS-Security TC Christopher Kaler Kelvin Lawrence.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
Core Web Service Security Patterns
Applied Cryptography Week 13 SAML Applied Cryptography SAML and XACML Mike McCarthy Week 13.
Securing Web Services Using Semantic Web Technologies Brian Shields PhD Candidate, Department of Information Technology, National University of Ireland,
Web Service Security CSCI5931 Web Security Instructor: Dr. T. Andrew Yang Student: Jue Wang.
Secure Web Services Akylbek Zhumabayev Rochester Institute of Technologies.
Web services security I
Prashanth Kumar Muthoju
GFIPM Web Services Concept and Normative Standards GFIPM Delivery Team Meeting November 2011.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Security COMP6017 Topics on Web Services Dr Nicholas Gibbins –
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Service Standards, Security & Management Chris Peiris
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
Saml-intro-dec051 Security Assertion Markup Language A Brief Introduction to SAML Tom Scavo NCSA.
Authorization Infrastructure, a Standards View Hal Lockhart OASIS.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Cross-Enterprise User Assertion IHE Educational Workshop 2007 Cross-Enterprise User Assertion IHE Educational Workshop 2007 John F. Moehrke GE Healthcare.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
DSKPP And PSKC: IETF Standard Protocol And Payload For Symmetric Key Provisioning Philip Hoyer Senior Architect – CTO Office.
DSKPP And PSKC: IETF Standard Protocol And Payload For Symmetric Key Provisioning Philip Hoyer Senior Architect – CTO Office.
17 March 2008 © 2008 The University of Edinburgh, European Microsoft Innovation Center and University of Southampton IT Innovation Centre 1 NextGRID Security.
Introduction to Implementing XML web services authentication John Messing Law-on-Line, Inc. Prepared for Maricopa County ICJIS May 17, 2006.
An XML based Security Assertion Markup Language
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
SAML: An XML Framework for Exchanging Authentication and Authorization Information + SPML, XCBF Prateek Mishra August 2002.
January 19, 2005 Andrew Nash Chief Technology Officer, Reactivity xmlCoP Interoperable Trust Networks.
Secure Systems Research Group - FAU Patterns for Web Services Security Standards Presented by Keiko Hashizume.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
W3C Web Services Architecture Security Discussion Kick-Off Abbie Barbir, Ph.D. Nortel Networks.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security Token Service Valéry Tschopp - SWITCH.
Prabath Siriwardena – Software Architect, WSO2. Patterns Standards Implementations Plan for the session.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
Security Token Service (STS) Design & Development Plans Henri Mikkonen / HIP 3 rd EMI All-Hands Meeting , Padova, Italy.
Mr. Abdelkrim Boujraf, Unisys Mr. Andreas Schaad, SAP Research Mr. Mohammad Ashiqur Rahaman, SAP Research funded by EU Integrated Project R4eGov R4eGov.
Gridshell Security Master Project Akylbek Zhumabayev Rochester Institute of Technology.
Web Services Security Patterns Alex Mackman CM Group Ltd
Task Force CoRD Meeting / XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA.
BEA position on W3C ‘Web Services’ Standards Jags Ramnarayan 11th April 2001.
Andrew J. Hewatt, Gayatri Swamynathan and Michael T. Wen Department of Computer Science, UC-Santa Barbara A Case Study of the WS-Security Framework.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
Web Services Security INFOSYS 290, Section 3 Web Services: Concepts, Design and Implementation Adam Blum
Secure Web Services Akylbek Zhumabayev Rochester Institute of Technologies.
Web Services Security Mike Shaw Architectural Engineer.
1 WS-Security Yosi Taguri Microsoft Israel
Security in OPC Unified Architecture (UA) Dick Oyen IndustrialSysDev, Inc.
August 3, 2004WSRP Technical Committee WSRP v2 leveraging WS-Security 1. Motivation 2. WS-Securtiy Roadmap and Status 3. WSRP Use Cases 4. Strawman/Issues.
Eclipse Foundation, Inc. Eclipse Open Healthcare Framework v1.0 Interoperability Terminology HL7 v2 / v3 DICOM Archetypes Health Records Capture Storage.
SAML New Features and Standardization Status
HMA Identity Management Status
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Presentation transcript:

Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems

Topics n Web Services Security Introduction n Preliminary work at W3C n WS-Security n SAML n WS-Trust n WS-SecureConversation n WS-SecurityPolicy n WS-Federation n Interdependencies

Information Security Definition Technologies and procedures intended to implement organizational policy in spite of human efforts to the contrary. n Suggested by Authorization n Applies to all security services n Protection against accidents is incidental n Suggests four areas of attention

Information Security Areas n Policy determination l Expression: code, permissions, ACLs, Language l Evaluation: semantics, architecture, performance n Policy enforcement l Maintain integrity of Trusted Computing Base (TCB) l Enforce variable policy

Security Services n Authentication – confirm asserted identity n Authorization – permit or deny a request n Integrity – prevent undetected modification of data n Confidentiality – prevent unauthorized reading of data n Audit – preserve evidence for accountability n Administration – control configuration n Others …

Web Services Security n Standards for Interoperability l Between systems, not internal behavior l Authentication, Integrity, Confidentiality, Key Exchange n Consistent with XML, SOAP, WSDL, WS-Policy n Authentication methods already exist n Need to support multiple infrastructure types l Passwords, X.509, Kerberos, SAML, etc. n Most of WSS is not about stronger security n Better scaling, easier deployment

W3C Security Recommendations n Widespread use of XML – need for integrity & confidentiality n XML Digital Signature WG (1999 to 2002) l Defines rules to sign XML and record parameters and signature value l Support all technologies in common use l Key problem: Immaterial changes to XML documents l Solution: Canonicalization n XML Encryption WG (2001 and 2002) l Defines rules to encrypt XML and record parameters l Support all technologies in common use l Key problem: Encrypted data not Schema-valid l Solution: None n Follow-on work currently at W3C

WS-Security Overview n Basic SOAP Message Protection n Signatures, Encryption, Timestamps n Multiple token types l Username, X.509, Kerberos, SAML, REL n Token References

Security Tokens n Abstraction of the common elements of information objects which represent identities l Claims, Key, Issuer, Validity etc. n In some cases, Tokens can be utilized w/o knowledge of specific Token format n Doesn’t work in all cases l Passwords are not the same as keys n Generally WSS uses Tokens to indicate keys n Claims are passed along for Authorization

WS-Security General Approach n Security element in SOAP header n Can contain Tokens, Token References, Timestamp, Signatures, Encryptions n Physical order of elements determines processing order of signatures and encryptions n Signed and encrypted data can appear anywhere in envelope n A toolkit, not a protocol

SAML in Web Services Security n SAML provides a very flexible, XML token n Use of browser profiles not required n SAML Assertions may or may not contain l Keys l Real world names or pseudonyms l Attributes n Viewed as easy and cheap to generate

WS-Trust n Defines generic Security Token Service (STS) n Issue, renew, cancel, validate Tokens n Support for many different configurations and trust relationships n Only defines generic elements n Other specifications intended to extend and specify the details, l WS-SecureConversation, WS-Federation

WS-Secure Conversation n Builds on WS-Security and WS-Trust n Allows establishment of secure session n More efficient and secure than using long term secrets directly n Like SSL/TLS except at SOAP layer n Useful in conjunction with reliable messaging n Adds two new Token types l Security Context Token (holds session info, including keys) l Derived Key Token (enables key derivation) n Two party and three party flows n Also a toolkit, but less so

Key Agreement Scenarios Unilateral Mutual Third Party

WS-Security Policy n Allows Web Service to express Security Policies l What needs to be protected l What tokens to use l Algorithms, reference types, etc. n Builds on WS-Policy l Uses nested policy to provide scope n Defines various groups of policy assertions l Correspond to features of WSS, Secure Conversation, Trust, etc. n Expressed in WSDL per WS-PolicyAttachment n Constrains content and layout of security header n Defines a number of Assertion types

WS-SecurityPolicy Assertion Types n Protection assertions l What parts of msgs need to be protected – Confidentiality, Integrity n Token assertions l Types of tokens, in band or out of band n Binding assertions l Transport, Symmetric, Asymmetric Bindings l Can apply to response as well as request n Supporting Token assertions l Additional signatures, e.g. Endorsements n Protocol assertions l Other properties, e.g. Algorithms, Timestamps, Reference types

WS-Federation n Builds on WS-Trust n Web SSO alternative to SAML profiles n Uses WS-Trust to issue tokens, including SAML l More generic, less access to SAML-specific features n Federation Metadata n Reference Tokens n Authorization Tokens n Extends WS-SecurityPolicy

Related Standards n Web Single Signon and Signoff l SAML Web Browser Profiles l WS-Federation (passive requestors) n Authorization Policy – XACML n Digital Signature Services (DSS) l Create & verify signatures, signed timestamps

Key OASIS Technical Committees n Security Services (2001-present) l SAML n WS-Security ( ) l Core spec + Token Profiles l Now Closed n WS-SX (2006-present) l WS-Trust, WS-SecureConversation, WS-SecurityPolicy n WS-Federation (2007) n XACML (2001-present) n DSS (closed) DS-SX (2007) l Digital Signature Services

Security Standards Interdependencies XML EncryptionXML Digital Signature DSS XACML SAML WSS WS-Trust WS-SecureConversation WS-SecurityPolicy WS-Federation

Questions?