Is Federation Putting you at Risk? Presenter: Dan Dagnall – Chief Operating Officer, Fischer International Identity, LLC.

Slides:



Advertisements
Similar presentations
Open Grid Forum 19 January 31, 2007 Chapel Hill, NC Stephen Langella Ohio State University Grid Authentication and Authorization with.
Advertisements

Eunice Mondésir Pierre Weill-Tessier 1 Federated Identity with Ping Federate Project Supervisor: M. Maknavicius-Laurent ASR Coordinator: G. Bernard ASR.
Implementing and Administering AD FS
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
1 Issues in federated identity management Sandy Shaw EDINA IASSIST May 2005, Edinburgh.
Information Security Policies and Standards
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Shibboleth: New Functionality in Version 1 Steve Carmody July 9, 2003 Steve Carmody July 9, 2003.
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Module 1 Introduction to Managing Microsoft® Windows Server® 2008 Environment.
Copyright 2007, Information Builders. Slide 1 WebFOCUS Authentication Mark Nesson, Vashti Ragoonath Information Builders Summit 2008 User Conference June.
Global Federated Identity & Privilege Management GFIPM John Ruegg, Director LA County ISAB United States Department of Justice.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
External Identity and Authorization in GENI. Topics Federated identity and virtual organizations ABAC Creating and transporting attributes.
Week #7 Objectives: Secure Windows 7 Desktop
Integrating with UCSF’s Shibboleth system
I2Q & WMnet Pilot Presented by Jason Rousell – i2Q Jay Neale - i2Q.
Module 9 Configuring Messaging Policy and Compliance.
Module 11: Remote Access Fundamentals
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
Identity on Force.com & Benefits of SSO Nick Simha.
Belnet Federation Belnet – Loriau Nicolas Brussels – 12 th of June 2014.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
1 Maryland ColdFusion User Group Session Management December 2001 Michael Schuler
The I-Trust Federation: Federating the University of Illinois Keith Wessel Identity Management Service Manager University of Illinois at Urbana-Champaign.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
Shibboleth 2.0 IdP Training: Authentication January, 2009.
Authentication. 2 © 2010 SWITCH Terms: Authentication Mechanism A concrete mechanism used to authenticate a user. Shibboleth 2 currently supports REMOTE_USER,
Portal-based Access to Advanced Security Infrastructures John Watt UK e-Science All Hands Meeting September 11 th 2008.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
Federated Identity and Shibboleth Concepts Rick Summerhill Chief Technology Officer Internet2 GEC3 October 29, 2008 Slides by Nate Klingenstein
Using Enterprise Logins in Portal for ArcGIS via SAML Greg Ponto & Tom Shippee.
Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. PUBLIC PUBLIC CO900G L03 - Design, Implement, and Manage FactoryTalk Security.
Technical Topics for Deployed Campuses: Web SSO Will Norris University of Southern California.
Securing Sensitive Information Data Security Dashboards often contain the most important data in the company Securing that information makes business.
Shibboleth What is it and what is it good for? Chad La Joie, Georgetown University.
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
Office 365 Directory Synchronization Update: Deploying Password Sync.
GridShib and PERMIS Integration: Adding Policy driven Role-Based Access Control to Attribute-Based Authorisation in Grids Globus Toolkit is an open source.
The State of Identity Management on Your Campus Session Moderators Jacob Farmer, Indiana University Theresa Semmens, North Dakota State University November.
Access resources in a federation partner organization.
Module 10: Implementing Administrative Templates and Audit Policy.
Module 7: Designing Security for Accounts and Services.
Identities and Azure AD Premium
Introduction to Shibboleth Attribute Delivery for Campuses New to Shibboleth Paul Caskey The University of Texas System.
CERN IT Department CH-1211 Genève 23 Switzerland t Single Sign On, Identity and Access management at CERN Alex Lossent Emmanuel Ormancey,
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
F5 APM & Security Assertion Markup Language ‘sam-el’
Leveraging Campus Authentication to Access the TeraGrid Scott Lathrop, Argonne National Lab Tom Barton, U Chicago.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Using Your Own Authentication System with ArcGIS Online
Project Management: Messages
Single Sign-On Led by Terrice McClain, Jen Paulin, & Leighton Wingerd
Prime Service Catalog 12.0 Integration Best Practices – LDAP and SAML Settings.
Prime Service Catalog 12.0 SAML 2.0 Single Sign-On Support
Identity Federations - Installation and operation
1/3/2019 1:47 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
Presenter #1 • Presenter #2 • Presenter #3 Presenter #4 • Presenter #5
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Access Control What’s New?
Microsoft Data Insights Summit
Fast-Track UiPath Developer Module 10: Sensitive Data Handling
Presentation transcript:

Is Federation Putting you at Risk? Presenter: Dan Dagnall – Chief Operating Officer, Fischer International Identity, LLC

Overview

Session Overview What is Federation? How does Federation work? IdP SP Evaluate your risk Best practices to increase security

Discussion Question  Where are the potential risks within your shibboleth federation?  Is your federation putting you at risk?  Or the better question…

What is Federation?  A trust model, whereas access to Service Providers (“SPs”) is controlled by authenticating users with local (organizational) credentials to the Identity Provider. (the ”IdP”)  SPs are configured to “trust” inbound assertions from the IdP and if the IdP says let user XYZ into your application, the SP obliges as long as….

Properly formed assertion…  The inbound attribute payload provided by the IdP meets the SP’s metadata requirements.  SP defines the assertion parameters to ensure proper identification of the inbound user occurs  But who or what is defining and ensuring the information used is correct?

What Shibboleth looks like to many..

What happens inside the Identity Provider?

Seems painless right? But… In a default shibboleth deployment, the credentials within the login.config file are stored in clear text at rest within the IdP configuration. Shellshock or malicious admins can easily compromise your federation or your attribute store if you deploy default shibboleth.

Is there a way to fix this? Replace the JAAS module with one that allows for encryption of credentials at rest. This is the way to address this issue. Research potential vendors that have replaced the JAAS module already Fischer recognized this and ripped out the default JAAS module. Our default deployment replaces the stored credentials with variables, and the actual values are resolved during the secure retrieval of attributes.

What about other risks…  As an administrator, with direct access to the attribute store, I can very easily manipulate a user’s identity to mask the identity of the real user accessing the SP.  Especially if an open source ldap store is used, given it’s loose enforcement of unique values.

Is there a way to fix this one? Lock down your attribute store(s) with event detection mechanisms such as triggers, or delta processes that execute on a regular basis. You should be monitoring any attribute/value pair that equates to access to some SP. You need to do this constantly, and remediate any modification immediately. Define a few privileged accounts, and allow admins to check those accounts out, as opposed to the user maintaining admin rights with their campus ID. Enable add-ons such as uApprove that provides the user with visabilty to the attributes being passed to the SP.

Is there a way to fix this one? (cont’d) Introduce automated provisioning and synchronization processes from attribute’s source of truth, to the user’s actual identity attribute store. Automation at this layer will enable your organization to perform the proper uniqueness checks against all values in the directory that manually manipulating end user objects does not provide.

Best Practices to thwart potential risk  Use your identity management system.  Introduce automation for your sensitive data processes.  Introduce policy-driven access controls. It’s works the same every time. Eliminates manual manipulation of attributes associated with identifying the user external to your campus.  Do not make identity mgt and federation administration mutually exclusive

Help Us Improve and Grow Thank you for participating in today’s session. We’re very interested in your feedback. Please take a minute to fill out the session evaluation found within the conference mobile app, or the online agenda.