Shibboleth: Technical Architecture Marlena Erdos and Scott Cantor Revised Oct 2, 2001 Marlena Erdos and Scott Cantor Revised Oct 2, 2001.

Slides:



Advertisements
Similar presentations
0 McLean, VA August 8, 2006 SOA, Semantics and Security.
Advertisements

Internet2 Shibboleth Project TERENA Networking Conference 2002, Limerick, Ireland RL “Bob” Morgan, Washington Steven Carmody, Brown Scott Cantor, Ohio.
Enabling Secure Internet Access with ISA Server
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
(4.4) Internet Protocols Layered approach to Internet Software 1.
Shibboleth: How It Relates to SAML Marlena Erdos Aug 27, 2001.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Attributes, Anonymity, and Access: Shibboleth and Globus Integration to Facilitate Grid Collaboration 4th Annual PKI R&D Workshop Tom Barton, Kate Keahey,
The EC PERMIS Project David Chadwick
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
1 July 2005© 2005 University of Kent1 Seamless Integration of PERMIS and Shibboleth – Development of a Flexible PERMIS Authorisation Module for Shibboleth.
Esri UC2013. Technical Workshop. Technical Workshop 2013 Esri International User Conference July 8–12, 2013 | San Diego, California Building Secure Applications.
Shibboleth Update a.k.a. “shibble-ware”
Administrative Information Systems Shibboleth: The Next Generation ISIS Technical Information Session for Developers Datta Mahabalagiri March
Shibboleth 2.0 : An Overview for Developers Scott Cantor The Ohio State University / Internet2 Scott Cantor The Ohio.
Shibboleth: New Functionality in Version 1 Steve Carmody July 9, 2003 Steve Carmody July 9, 2003.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
SWITCHaai Team Introduction to Shibboleth.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 Shibboleth Pilot Local Authentication.
Mairéad Martin The University of Tennessee September 13, 2015 Federated Digital Rights Management.
Shibboleth Possible Features – Version 2 Steve Carmody July 9, 2003 Steve Carmody July 9, 2003.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
TNC2004 Rhodes 1 Authentication and access control in Sympa mailing list manager Serge Aumont & Olivier Salaün May 2004.
Shib-Grid Integrated Authorization (Shintau) George Inman (University of Kent) TF-EMC2 Meeting Prague, 5 th September 2007.
Shibboleth: Installation and Deployment Scott Cantor July 29, 2002 Scott Cantor July 29, 2002.
SAML CCOW Work Item HL7 Working Group Meeting San Antonio - January 2008 Presented by: David Staggs, JD CISSP VHA Office of Information Standards.
Shibboleth Update Michael Gettes Principal Technologist Georgetown University Ken Klingenstein Director Interne2 Middleware Initiative.
David L. Wasley Office of the President University of California Shibboleth Safe delivery of reliable authorization data David L. Wasley University of.
SE-2840 Dr. Mark L. Hornick1 Web Application Security.
Shibboleth Update RL “Bob” Morgan, Washington Steven Carmody, Brown Scott Cantor, Ohio State Marlena Erdos, IBM/Tivoli Michael Gettes, Georgetown Keith.
Internet2 CAMP Shibboleth Scott Cantor (Hey, that’s my EPPN too.) Tom Dopirak Scott Cantor (Hey, that’s my.
Shibboleth Update Advanced CAMP 7/31/02 RL “Bob” Morgan, Washington Steven Carmody, Brown Scott Cantor, Ohio State Marlena Erdos, IBM/Tivoli Michael Gettes,
Shibboleth Authenticate Locally, Act Globally A Penn State Case Study Renee’ Shuey May 4, 2004 ITS – Emerging Technologies.
Shibboleth for Local Attribute Delivery 21 June 2007.
Shibboleth: An Introduction
Internet2 Middleware Initiative Shibboleth Ren é e Shuey Systems Engineer I Academic Services & Emerging Technologies The Pennsylvania State University.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Shibboleth: Installation and Deployment Scott Cantor July 29, 2002 Scott Cantor July 29, 2002.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
State of e-Authentication in Higher Education August 20, 2004.
Shibboleth A word which was made the criterion by which to distinguish the Ephraimites from the Gileadites. The Ephraimites, not being able to pronounce.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
PAPI: Simple and Ubiquitous Access to Internet Information Services JISC/CNI Conference - Edinburgh, 27 June 2002.
Mairéad Martin The University of Tennessee December 16, 2015 Federated Digital Rights Management.
Shibboleth Trust Model Shibboleth/SAML Communities (aka Federated Administrations) Club Shib Club Shib Application process Policy decision points at the.
E-Authentication & Authorization Presentation to the EA2 Task Force March 6, 2007.
M2M Service Layer – DM Server Security Group Name: OMA-BBF-oneM2M Adhoc Source: Timothy Carey, Meeting Date:
Shibboleth Authenticate Locally, Act Globally A Penn State Case Study.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Shibboleth 1.2 Technical Overview “So you thought 1.1 was complicated…” Scott Cantor The Ohio State University and Internet2 Scott Cantor.
Access Policy - Federation March 23, 2016
Mechanisms of Interfederation
Cryptography and Network Security
Prime Service Catalog 12.0 SAML 2.0 Single Sign-On Support
Scott Cantor April 10, 2003 Shibboleth and PKI Scott Cantor April 10, 2003.
What’s changed in the Shibboleth 1.2 Origin
Michael R Gettes, Duke University On behalf of the shib project team
Overview and Development Plans
Federated Digital Rights Management
Shibboleth Deployment Overview
Shibboleth Service Providers: Technical Requirements and Considerations or How I Spent My Winter/Spring/Summer Vacation Scott Cantor Copyright.
Presentation transcript:

Shibboleth: Technical Architecture Marlena Erdos and Scott Cantor Revised Oct 2, 2001 Marlena Erdos and Scott Cantor Revised Oct 2, 2001

2 Outline The View from Above Detailed Component Descriptions “Club Shibboleth” and Initial Implementation

3 Establishing a User Context

4 Getting Attributes and Determining Access

5 Outline The View from Above Detailed Component Descriptions “Club Shibboleth” and Initial Implementation

6 Detailed Component Descriptions Attribute Authority Handle Server SHIRE SHAR WAYF

7 Attribute Authority Responds to Attribute Query Messages (AQM) from SHAR Allows for specification and management of ARPs Not a directory, but works with institutional directories and databases to aggregate and export attributes in a controlled fashion

8 Attribute Authority Responding to AQMs Upon receipt of an AQM, the AA… …checks to see if it understands the handle i.e. can map between the handle and a user …authenticates the AQM …locates all ARPs that apply based on user, SHAR, and target URL user ARPs Institutional ARPs

9 Attribute Authority Responding to AQMs Once the AA has found the right ARP… Check that the attributes and/or values specified in the ARP are valid for the user attributes in ARP may be out of sync with reality (e.g. faculty member becomes a staff member) Create the response message (AQM) adheres to SAML format (more or less)

10 Attribute Authority Management of ARPs The AA must provide ARP management tools/interfaces. user APRs perhaps via “MyAA” web interface institutional ARPs administrative default policies and default attributes –default ARP when none apply interfaces themselves are secured, of course

11 Attibute Authority Security Considerations Attributes sent will be used in authorization decisions attributes are nearly as sensitive to the target as name/password would be Auditing Candidates modifications to "meta-policies" (e.g. policies about ARP precedence) modifications to ARPs modifications to the list of AA administrators modifications to attribute data

12 Detailed Component Descriptions Attribute Authority Handle Server SHIRE SHAR WAYF

13 Handle Server Works with AA and local Web ISO system to associate a query handle with an authenticated browser user and generate a signed assertion Performs its work in response to an Attribute Query Handle Request (currently an unauthenticated HTTP GET) AQHR contains SHIRE URL for acceptance of response via HTTP POST URL of desired resource/service at destination

14 Handle Server Upon receiving a handle request, the HS must… …figure out who the user is can interact with the user and the origin site’s Web ISO system …create a handle that identifies the user to the AA (but to no one else) …log useful information?

15 Handle Server The response to the destination site is a signed SAML authentication assertion passed via HTTP POST, exact format and packaging TBD. The opaque user handle is the “Subject” of the assertion. We must also include: Validity period of response (very short) Validity period of handle (advisory) URL of the SHIRE intended as recipient of assertion IP address of browser process AA location/binding information

16 Detailed Component Descriptions Attribute Authority Handle Server SHIRE SHAR WAYF

17 SHIRE Indexical Reference Establisher Destination site component responsible for context/session establishment Session establishment will commonly rely on traditional techniques (i.e. cookies). The SHIRE accepts an assertion from a HS and associates the incoming handle with the session it creates.

18 SHIRE Handle Acceptance Assertions containing handles are passed to SHIRE via an HTTP POST. Checks are performed to prevent impersonation attacks. Malicious user countermeasures include assertion validity time and client IP address (optional). Malicious SHIRE countermeasure consists of the intended SHIRE’s URL (i.e. a SHIRE insures that it is the intended recipient). SHIRE passes on “configured” info to SHAR Organization name

19 Detailed Component Descriptions Attribute Authority Handle Server SHIRE SHAR WAYF

20 SHAR Attribute Requester A SHAR makes attribute requests using the handle given it by the SHIRE. Upon receiving a response (AQR), the SHAR… …authenticates the response …extracts the attributes …checks attribute acceptance e.g. can an AA at MIT issue attributes for Harvard?

21 SHAR Using Attributes Resource Managers must make access control decisions. Legacy RMs typically: expect particular attribute syntax assume particular attribute semantics Shibboleth attributes are in XML Syntax and semantics are likely mismatched Proxy RM can provide translation “glue”

22 Choices Abound

23 SHAR Caching and App Domains A SHAR must cache attributes, but care must be taken. A user may want to release different attributes for different resources behind the same SHAR. When accessing a different application domain, the cache should “miss” with a new AQM sent. This is a potential problem area for Shibboleth.

24 Detailed Component Descriptions Attribute Authority Handle Server SHIRE SHAR WAYF

25 WAYF Where are You From? The WAYF is the transition point from destination to origin site HS when users contact a destination first. With no session in place, the SHIRE knows nothing about the user, so must either ask directly (SHIRE==WAYF) or redirect the user to a location that will ask on its behalf (SHIRE!=WAYF).

26 WAYF Users can respond to the WAYF by indicating in “colloquial” fashion which institution can authenticate them. The WAYF will determine the URL of the appropriate HS based on the user’s input. A variety of nasty semantic attacks lurk!

27 Outline The View from Above Detailed Component Descriptions “Club Shibboleth” and Initial Implementation

28 Architecture vs. Implementation The Shibboleth architecture specifies what messages must be authenticated, integrity protected and/or encrypted. An implementation determines how the requirements are met and what trust policies are applied. The implementation’s flexibility at run-time determines the degree of interoperability.

29 “Club Shibboleth” The Club defines one set of rules and policies that describe how messages will be protected, how trust will flow, and what the information means. Any collection of collaborating sites must make these decisions (implicitly or otherwise) with any security technology. The Club is not the only way to do Shib!

30 “Club Shibboleth” Key Concepts PKI technology will be used to protect message exchanges for the initial implementation. The SHAR, HS, and AA have public DNS-style names that can be embedded in the Subject field of X.509 certificates. A set of CAs will be designated as trusted by the Club to reduce certificate preconfiguration. Expected names are validated against certificate Subjects to perform authentication of messages.

31 “Club Shibboleth” Trust Flows from the HS Each SHIRE is configured with a list of “valid” HS names and the organization names they speak for. An incoming assertion from a HS includes the signing certificate and is validated against the list of trusted HS names. The HS provides the name and location of one or more AAs the SHAR can use.

32 “Club Shibboleth” Transitive Trust Recall the SHIRE gives the SHAR a handle, the name of one or more AAs to query, and the origin site’s name. A SHAR trusts an AA named “aa.foo.edu” because a SHIRE tells it to do so; a SHIRE does this because it trusts the HS it got the name from. Thus, trust is transitive: SHAR trusts SHIRE trusts HS trusts AA, ergo SHAR trusts AA

33 “Club Shibboleth” Does the AA trust the SHAR? Can anybody with a trusted certificate request attributes? YES An AA trusts any SHAR only in that it trusts the target URL inside the request and that attributes won’t be misused. The default ARP for an arbitrary SHAR should be very tight (no leakage means no cost for misuse).

34 “Club Shibboleth” Signing and Verification All signed messages are accompanied by a certificate. The certificate’s Subject matches the name of the entity doing the signing. In all but one case, certificate validation relies on evaluating that certificate’s signer against a set of trusted signers. (The exception is the HS->SHIRE flow.)

35 Initial Implementation To get code written and pilots deployed, various simplifying assumptions have been made or are being discussed: WAYF integrated with SHIRE SAML alignment a best-fit effort SHAR/AA communicate via TLS/SSL without extra signing

36 Initial Implementation Where’s the WAYF? Implementing the WAYF well requires some effort, so a decision was made to require each SHIRE to implement this functionality. Each SHIRE will know a set of origin site names and the associated HS URL for all pilot participants. When first access is trapped, the user will indicate their origin site to the SHIRE and then be sent to the HS they choose.

37 Initial Implementation SAML SAML drafts are not expected to meet 100% of Shibboleth’s needs in the short run. Message formats and exchanges will be tightly encapsulated to allow easy revision for greater compliance (this is good design anyway).

38 Initial Implementation To Sign or Not to Sign… XML Signature implementations are rare. SHAR requests to the AA MUST be authenticated, and MAY be encrypted. AA responses to the SHAR MUST be authenticated and MUST be encrypted. An HTTPS connection with certificates at both ends meets both requirements without the explicit use of signed XML. Assertions from HS MUST still be signed.

39 THE END Acknowledgements: Design Team: David Wasley U of C; RL Bob Morgan U of Washington; Keith Hazelton U of Wisconsin (Madison);Marlena Erdos IBM/Tivoli; Steven Carmody Brown; Scott Cantor Ohio State Important Contributions from: Ken Klingenstein (I2); Michael Gettes Georgeton, Scott Fullerton (Madison)