Security Token Service (STS) Design & Development Plans Henri Mikkonen / HIP 3 rd EMI All-Hands Meeting 17.-19.10.2011, Padova, Italy.

Slides:



Advertisements
Similar presentations
Lousy Introduction into SWITCHaai
Advertisements

MyProxy Jim Basney Senior Research Scientist NCSA
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
EMI Development Plans for Identity Management Henri Mikkonen / HIP Moonshot, Grid and HPC Workshop London, UK.
Integration Considerations Greg Thompson April 20 th, 2006 Copyright © 2006, Credentica Inc. All Rights Reserved.
Lecture 23 Internet Authentication Applications
WSO2 Identity Server Road Map
Access Control Patterns & Practices with WSO2 Middleware Prabath Siriwardena.
Kerberos and PKI Cooperation Daniel Kouřil, Luděk Matyska, Michal Procházka Masaryk University AFS & Kerberos Best Practices Workshop 2006.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Core Web Service Security Patterns
© 2009 The MITRE Corporation. All rights Reserved. April 28, 2009 MITRE Public Release Statement Case Number Norman F. Brickman, Roger.
Peoplesoft: Building and Consuming Web Services
WebFTS as a first WLCG/HEP FIM pilot
Web services security I
Distributed Web Security for Science Gateways Jim Basney In collaboration with: Rion Dooley Jeff Gaynor
Ganesh Kirti Roger Sullivan Oracle Corporation “This presentation is for informational purposes only and may not be incorporated into a contract or agreement.”
Saml-intro-dec051 Security Assertion Markup Language A Brief Introduction to SAML Tom Scavo NCSA.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
Presented at: Demonstrations and Prototypes TIM 7 Presented by: Dominic Timoteo / Shoeb Jafri SWIM Implementation Team May 04, 2011 Federal Aviation Administration.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
EMI AAI Strategy & Plans John White / Helsinki Institute of Physics Federated Identity Systems for Scientific Collaborations Workshop , CERN,
Chapter 21 Distributed System Security Copyright © 2008.
SAML 2.1 Building on Success. Outline n Summary of SAML 2.0 n Work done since 2.0 n Objectives of SAML 2.1 n Proposed Task List n Undecided Issues n Invitation.
WS-Trust Joseph Calandrino Vincent Noël Department of Computer Science University of Virginia February 9, 2004.
ShibGrid: Shibboleth access to the UK National Grid Service University of Oxford and STFC.
17 March 2008 © 2008 The University of Edinburgh, European Microsoft Innovation Center and University of Southampton IT Innovation Centre 1 NextGRID Security.
Harshavardhan Achrekar - Grad Student Umass Lowell presents 1 Scenarios Authentication Patterns Direct Authentication v/s Brokered Authentication Kerberos.
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
V.1 Security Services. V.2 Security aspects of RPC Mechanisms: –Private-Key-Method (symmetric) „Data Encryption Standard“ (DES) Use of a „Key Distribution.
WS-Trust “From each,according to his ability;to each, according to his need. “ Karl marx Ahmet Emre Naza Selçuk Durna
Secure Systems Research Group - FAU Patterns for Web Services Security Standards Presented by Keiko Hashizume.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
Shibboleth: An Introduction
EMI is partially funded by the European Commission under Grant Agreement RI Argus Policies Tutorial Valery Tschopp - SWITCH EGI TF Prague.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security Token Service Valéry Tschopp - SWITCH.
SWEB SWEB Security and Privacy Technologies – Implementation Aspects Venue:SWEB Day in APV, Novi Sad Author(s):Dr. Milan Marković Organisations:MISANU.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
EMI INFSO-RI Argus Policies in Action Valery Tschopp (SWITCH) on behalf of the Argus PT.
Web Services Security Patterns Alex Mackman CM Group Ltd
EMI INFSO-RI Argus The EMI Authorization Service Valery Tschopp (SWITCH) Argus Product Team.
Andrew J. Hewatt, Gayatri Swamynathan and Michael T. Wen Department of Computer Science, UC-Santa Barbara A Case Study of the WS-Security Framework.
EMI is partially funded by the European Commission under Grant Agreement RI Federated Grid Access Using EMI STS Henri Mikkonen Helsinki Institute.
EMI is partially funded by the European Commission under Grant Agreement RI Common Authentication Library Daniel Kouril, for the CaNL PT EGI TF.
EMI is partially funded by the European Commission under Grant Agreement RI Security Token Service (STS) Transforming the Existing User Credentials.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks OpenSAML extension library and API to support.
EMI is partially funded by the European Commission under Grant Agreement RI Security Token Service (STS) Simplified Credential Management Henri.
EMI is partially funded by the European Commission under Grant Agreement RI Common Authentication Library Daniel Kouril, for the CaNL PT EGI CF.
EMI is partially funded by the European Commission under Grant Agreement RI caNl++ caNl++ team University Of Oslo 5th EMI AHM, Budapest.
EMI is partially funded by the European Commission under Grant Agreement RI Argus Policies Tutorial Valery Tschopp (SWITCH) – Argus Product Team.
In Vivo Imaging Middleware — Phase 6 Ashish Sharma, Tony Pan, Y. Nadir Saghar.
© ETNIC l l Anne Noseda l WSGenCon 2.0 Presentation 1 WSGenCon /02/2010 E2SA – Equipe Support Standard Architecture.
Security Area Christoph Witzig (SWITCH) on behalf of John White (HIP)
ESRIN, 15 July 2009 Slide 1 Web Service Security support in the SSE Toolbox HMA-T Phase 2 FP 14 December 2009 S. Gianfranceschi, Intecs.
Argus EMI Authorization Integration
HMA Identity Management Status
Training for developers of X-Road interfaces
HMA Identity Management Status
Identity Federations - Overview
Security Token Service (STS) Status Update
Presentation transcript:

Security Token Service (STS) Design & Development Plans Henri Mikkonen / HIP 3 rd EMI All-Hands Meeting , Padova, Italy

EMI INFSO-RI Content Short Recap Overall Architecture for STS WS-Trust Profile Handler Design Token Authority Design Client Toolkit Schedule 17/10/2011 STS Design & Development Plans 2

EMI INFSO-RI Recap: Security tokens? STS? Security token is a collection of statements/claims about a user or resource, attached into a message – X.509, SAML assertion, Kerberos ticket, Username/Pwd – Defined in the WS-Security specification & profiles STS is a service used to issue, renew, validate and cancel security tokens – “Transforms security tokens from one format into another format” – Defined in the WS-Trust specification 17/10/2011 STS Design & Development Plans 3

EMI INFSO-RI Issue Operation Sequence 1.Decode the request: decode, decrypt, etc 2.Validate the request: signatures, SSL/TLS, replay, timestamps, policy conformancy.. 3.Validate the claims: extract & validate 4.Resolve attributes: resolution & filtering 5.Issuance of the security tokens: use the collected data & possibly use external sources 6.Create the response: generate the RSTR, possibly encrypted & signed 17/10/2011 STS Design & Development Plans 4

EMI INFSO-RI Overall Architecture (1/2) 17/10/2011 STS Design & Development Plans 5 Components in green boxes are provided by Shib3, yellows to be implemented

EMI INFSO-RI Overall Architecture (2/2) SOAP Client: Any client holding a security token and capable of producing RST messages and understanding RSTR messages WS-Trust Profile Handler: Orchestrates the profile sequence between the components Token Authority: Issues the requested security tokens by using appropriate token generators Token Generator: Issues a requested security token, possibly exploiting external sources 17/10/2011 STS Design & Development Plans 6

EMI INFSO-RI WS-Trust Profile Handler Shib3 Request Dispatcher sends the appropriate requests to the profile handler Profile consists of a sequence of states in a flow Implementation uses Spring WebFlow – Set of actions containing the logic of the flow All the actions exploits (possibly updates) profile request context, the current “state” of the profile 17/10/2011 STS Design & Development Plans 7

EMI INFSO-RI Token Authority Overview 17/10/2011 STS Design & Development Plans 8 Components in green boxes are provided by Shib3, yellows to be implemented

EMI INFSO-RI Token Generators 17/10/2011 STS Design & Development Plans 9 Three supported security token formats – X.509, X.509 proxy, SAML assertion – Plugin-mechanism for supporting additional formats X.509 generator already implemented, CMP protocol currently supported for online CA connection – Support for MyProxy and others possible SAML assertion will be constructed using existing Shib3 WebFlow actions

EMI INFSO-RI Client Toolkit Client Toolkit is a Java-library, helping in: – Generating the security tokens From file system: X.509 certificate, proxy From an IDP: SAML assertion (ECP profile) From a KDC: Kerberos ticket – Generating the request messages – Communicating the messages with STS – Extracting the response messages Storage of the security tokens Toolkit can be utilized in client UI or in the integration with services (e.g. portals) 17/10/2011 STS Design & Development Plans 10

EMI INFSO-RI Schedule Shib3 is in development phase, full functionality expected during the autumn – The most important APIs are already stable – First release expected 2012Q1 Current allocations for the development – Henri Mikkonen / HIP, 60% – Valery Tschopp / SWITCH, 30% First version of STS scheduled to 2012Q2 17/10/2011 STS Design & Development Plans 11

EMI is partially funded by the European Commission under Grant Agreement RI Thank you! 17/10/ STS Design & Development Plans