January 9, 2002 Security Assertion Markup Language (SAML) RL "Bob" Morgan, University of Washington.

Slides:



Advertisements
Similar presentations
Step Up Authentication in SAML (and XACML) Hal Lockhart February 6, 2014.
Advertisements

OOI-CI–Ragouzis– Ocean Observatories Initiative Cyberinfrastructure Component CI Design Workshop October 2007.
Donkey Project Introduction and ideas around February 21, 2003 Yuri Demchenko.
Saml-v2_0-intro-dec051 Security Assertion Markup Language An Introduction to SAML 2.0 Tom Scavo NCSA.
Shibboleth: How It Relates to SAML Marlena Erdos Aug 27, 2001.
1 Security Assertion Markup Language (SAML). 2 SAML Goals Create trusted security statements –Example: Bill’s address is and he was authenticated.
TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
Web Services and the Semantic Web: Open Discussion Session Diana Geangalau Ryan Layfield.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
SAML basics A technical introduction to the Security Assertion Markup Language Eve Maler XML Standards Architect XML Technology Center Sun Microsystems,
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
Web Services Security Multimedia Information Engineering Lab. Yoon-Sik Yoo.
Applied Cryptography Week 13 SAML Applied Cryptography SAML and XACML Mike McCarthy Week 13.
Copyright B. Wilkinson, This material is the property of Professor Barry Wilkinson (UNC-Charlotte) and is for the sole and exclusive use of the students.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
Shibboleth: New Functionality in Version 1 Steve Carmody July 9, 2003 Steve Carmody July 9, 2003.
Shibboleth-intro-dec051 Shibboleth A Technical Overview Tom Scavo NCSA.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
SAML Conformance Sub-Group Report Face-to-face meeting August 29, 2001 Bob Griffin.
Web Service Standards, Security & Management Chris Peiris
Authorization Scenarios with Signet RL “Bob” Morgan University of Washington Internet2 Member Meeting, September 2004.
Catalyst 2002 SAML InterOp July 15, 2002 Prateek Mishra San Francisco Netegrity.
OASIS Provisioning Services Technical Committee An Introduction to version 2 of the Service Provisioning Markup Language.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Saml-intro-dec051 Security Assertion Markup Language A Brief Introduction to SAML Tom Scavo NCSA.
DICOM Security Lawrence Tarbox, Ph.D. Chair, WG 14 Mallinckrodt Institute of Radiology Washington University in St. Louis School of Medicine.
TNC2004 Rhodes 1 Authentication and access control in Sympa mailing list manager Serge Aumont & Olivier Salaün May 2004.
SAML Right Here, Right Now Hal Lockhart September 25, 2012.
October 2, 2001 SAML RL "Bob" Morgan, University of Washington.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
OASIS XACML TC and Rights Language TC Hal Lockhart
SAML CCOW Work Item HL7 Working Group Meeting San Antonio - January 2008 Presented by: David Staggs, JD CISSP VHA Office of Information Standards.
Catalyst 2002 SAML InterOp July 15, 2002 San Francisco.
SAML 2.0: Federation Models, Use-Cases and Standards Roadmap
Saml-v1_x-tech-overview-dec051 Security Assertion Markup Language SAML 1.x Technical Overview Tom Scavo NCSA.
An XML based Security Assertion Markup Language
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
SAML: An XML Framework for Exchanging Authentication and Authorization Information + SPML, XCBF Prateek Mishra August 2002.
SAML in Authorization Policies draft-guenther-geopriv-saml-policy-00.
Secure Systems Research Group - FAU Patterns for Web Services Security Standards Presented by Keiko Hashizume.
W3C Web Services Architecture Security Discussion Kick-Off Abbie Barbir, Ph.D. Nortel Networks.
Shibboleth: An Introduction
Semantic Web Technologies Research Topics and Projects discussion Brief Readings Discussion Research Presentations.
Access Control and Markup Languages Pages 183 – 187 in the CISSP 1.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security Token Service Valéry Tschopp - SWITCH.
January 9, 2002 Internet2 WebISO Project RL "Bob" Morgan, University of Washington.
SAML FTF #4 Workitems Bob Blakley. SAML “SenderVouches” SubjectConfirmation Method: A Proposed Alternative to Bindings 0.5 Proposals.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
PKI: News from the Front and views from the Back Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of.
Module: Software Engineering of Web Applications Chapter 2: Technologies 1.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Shibboleth: Overview and Status The Shibboleth Architecture Team.
Security Assertion Markup Language (SAML) Interoperability Demonstration.
Interfederation RL “Bob” Morgan University of Washington and Internet2 Internet2 Member Meeting Chicago, Illinois December 2006.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
OASIS e Xtensible Access Control Markup Language (XACML) Hal Lockhart
SAML basics A technical introduction to the Security Assertion Markup Language Eve Maler XML Standards Architect XML Technology Center Sun Microsystems,
Workshop on Security for Web Services. Amsterdam, April 2010 Applying SAML to Identity Data Exchange.
August 3, 2004WSRP Technical Committee WSRP v2 leveraging WS-Security 1. Motivation 2. WS-Securtiy Roadmap and Status 3. WSRP Use Cases 4. Strawman/Issues.
August 3, 2004WSRP Technical Committee WSRP v2 leveraging WS-Security Discussion 1. WS-* Standards 2. WS-Securtiy Interop&Implementations 3. Customer demands.
Security Assertion Markup Language, v2.0 Chad La Joie Georgetown University / Internet2.
Access Policy - Federation March 23, 2016
Federation made simple
OGSA-WG Basic Profile Session #1 Security
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Tim Bornholtz Director of Technology Services
Presentation transcript:

January 9, 2002 Security Assertion Markup Language (SAML) RL "Bob" Morgan, University of Washington

Topics How it came to be SAML scope SAML architecture Status Issues

SAML in one slide Security Assertion Markup Language •specification from OASIS Security Services TC •supports interop among "web access management" products and deployments •supports "async" and B2B processes too •defines Assertions in XML for carrying Authentication, Attribute, Authz Decision statements •defines simple XML request/response protocol that runs over SOAP (or HTTP or other) •could be security format for other XML protocols

How it came to be "Web access management" products •web sign-on services, plus authz management •many vendors in market, in deployments, customers want interop among them •other opportunities for XML-based stuff (eg ebXML-defined business processes) Y2000: vendors struggle, decide to cooperate •Jan 2001 establish committee in OASIS, a membership org promoting XML-based standards

Who are the players Netegrity, Securant (now RSA) contributed initial specs (S2ML, AuthXML) Other major vendors/contributors: •Baltimore, Entrust, Entegrity, HP, IBM/Tivoli, Oblix, Sun, VeriSign, Jamcracker, others (and Internet2!) Areas of expertise of participants: •"distributed systems security" (i.e., DCE) •PKI •XML (SOAP, schema definition, web services)

What the major products do Web single sign-on •multiple backend mechanisms, etc. •redirect model vs proxy model Authorization management for web apps •"policy store" with rules, expressions, attributes •access protocol from webserver to policy engine – can user foo see page X? Session management •single sign-off, single time-out

SAML scope/structure XML-format Assertions as fundamental tech •used for core authn/authz purposes •exchange of security info between systems/domains •also extensible for other XML-based assertions –e.g. OASIS XACML (ACLs in XML, sort of) TC Protocol as simple means to get Assertions •runs over existing "transports" eg SOAP Profiles specify use in application scenarios •e.g., web browser sign-on scenario

SAML Domain Model

SAML Assertions Authentication •statement that Subject authenticated at time T •authentication exchange itself is not in SAML scope Attribute •statement that Subject has stated attributes –presumably but not necessarily "authorization" attrs Authorization Decision •statement that resource request is granted/denied

Assertion basics Each Assertion has: •Assertion ID (just a string) •Subject –optional SubjectConfirmation, e.g. public key –NameIdentifier = Name + SecurityDomain •IssueInstant •Issuer (just a string) •Conditions: critical (i.e., "must process") elements •Advice: other non-critical items •Signing (via XMLDSIG) optional

Request/response protocol Simplest possible protocol for requesting/supplying any kind of assertion •not intended to rival SQL, LDAP, etc Authentication, Attribute Assertions are requested for a particular Subject Authz Decision Assertion request is: •is action Y on resource Z by subject S permitted? This protocol is not the only way to get Assns

Bindings Specify transport of protocol messages in carrier protocols •SOAP is mandatory-to-implement •HTTP, BEEP are possible •S/MIME also mentioned early, but not specified •protection via SSL in binding may avoid use of signature on assertion/message

Browser profile Supports the standard web sign-on case •user initial authentication not in scope, session management also left for later Size limits of URLs, cookies a problem •"Artifact" refers to an assertion, is small enough to travel in URL/cookie •used by receiver to request full (authn) assertion Or: use HTTP POST to send full assertion Both methods will be specified

Other SAML spec docs Conformance •specify mandatory-to-implement functions •requirements for particular app scenarios Security/Privacy considerations •describes threats and mechanisms, implementation concerns •Shibboleth privacy concerns will go here

SAML Status First meeting Jan 9, 2001 "Core" document mostly done (rev 22 now) •includes assertion and protocol schema Profile/bindings more or less done (rev 8) Conformance, sec/priv docs getting closer Initiating public review this week, hoping for "last call" Feb 1 Netegrity released open toolkit in October

Issues and observations A lot is still left to designers/deployers •Is Subject NameIdentifier a DN, a Kerb name? –It's a string! Whatever! –same with Issuer! •out-of-box interop is unlikely XML Schema-writing is still a young art •differences of opinion on best practice •unknown value of some constructs, as still not supported in parsers or common in practice Remarkable collaboration among worldviews

What about Microsoft? MS didn't participate in early work, but received some "encouragement" later Has contributed Kerberos design ideas •subcommittee to pursue this more hasn't happened Latest.NET/Passport story addresses "federated" functions, based on Kerberos No commitment to SAML apparent Will MS open authorization data format?

More speculation SAML vs. X.509? •X.509 certs underlie authentication, SSL, DSIG •Authn Assns are somewhat like PK certs •Attr Assns are very much like X.509 Attr certs •still disjunction between ASN.1 and XML (really, ASN.1 "schema" vs XML Schema) SAML vs Kerberos? •Authn Assn like session ticket •Kerberos fine as binding/transport, once specified •Kerberos per se has no authz data format

Conclusion SAML meets important interop requirements Right players are involved Spec is moving along, software happening Will be important technology Won't solve problems out of the box Shibboleth is based on SAML