Download presentation
Presentation is loading. Please wait.
Published byAugustine Barnett Modified over 8 years ago
1
Clément OUDOT
2
2 Table of contents ● LINAGORA Group ● A question of Identity ● Liberty Alliance ● The FederID architecture ● Advanced use of LDAP ● Conclusion
3
3 LINAGORA Group ● LINAGORA Group, this is: – 100 persons – Implantations in Paris, Lyon and Toulouse – Results: 9 billions euros for 2007 – Training, Support, Integration, Consulting – Only Free Software !
4
4 OSSA ● Open Source Software Assurance : – Bring our customers support on more than 250 Free Softwares – Patches delivered within 8 hours – Patches always submitted to the communities – Bugs report on critical architectures, not tested by the community developers
5
5 Table of contents ● LINAGORA Group ● A question of Identity ● Liberty Alliance ● The FederID architecture ● Advanced use of LDAP ● Conclusion
6
6 A question of Identity ● A digital entity is a set of attributes describing an entity ● A subset named credentials are used for authentication ● An entity (a user) can own many identities ● Each identity has roles and rights within an application (service provider)
7
7 A question of Identity ● Services provider manage the identities : – For a service provider : 1 user = 1 identity – For an user : 1 service = 1 identity
8
8 A question of Identity ● We need Identity Management ! – Referential of identities (LDAP Directory) – Provisioning services – Access control on data (LDAP ACLs) – Access control on applications (SSO rules) ● We need Identity Federation ! – Keep different identities for private life purpose – Federate accounts to benefits from other services
9
9 Table of contents ● LINAGORA Group ● A question of Identity ● Liberty Alliance ● The FederID architecture ● Advanced use of LDAP ● Conclusion
10
10 Liberty Alliance ● Grounded in 2001 by SUN and 13 others partners ● More than 1500 members ● Goals : – Open Federation Standard – Respect of private life in numeric space
11
11 Liberty Alliance Des k Sponsor s
12
12 Liberty Alliance ● Three standards frameworks : – ID-FF (Federation Framework) : ● SSO, SLO ● Federation mechanisms – ID-WSF (Web Services Framework) : ● Attribute sharing ● Interaction service – ID-SIS (Service Interface Specifications) : ● Interface between services
13
13 Liberty Alliance Service Provider Identity Provider Service Provider Attributes Provider
14
14 Liberty Alliance
15
15 Table of contents ● LINAGORA Group ● A question of Identity ● Liberty Alliance ● The FederID architecture ● Advanced use of LDAP ● Conclusion
16
16 The FederID architecture ● LASSO API: Library of the Liberty Alliance specifications, C ● InterLDAP: LDAP tool suite for content management, J2EE (Spring-LDAP, Tapestry 5) ● LemonLDAP::NG: Web SSO tool with authorization management, Perl ● Authentic: Liberty Alliance identity provider, Python
17
17 The FederID architecture LDAP Director y Circl e ofTrust Authenti c Identity Provider Content Management [WUI] Attribut e Provider [LAAP] SSO & Authorization s Service Provider Standard Web application Standard Web application
18
18 The FederID architecture ● Authentic : – Liberty Alliance identity provider – Authentication of users against an LDAP server, a database or simple flat text files – Forcing LDAP authentication within FederID – Capable of forwarding LDAP attributes into SAML responses
19
19 The FederID architecture ● LemonLDAP::NG: – WebSSO product based on Apache Perl Handler technology. – Offering three modules : ● Handler: protect the application ● Portal: where the user is redirected when not authenticated ● Manager: graphical interface enabling the configuration of LemonLDAP::NG.
20
20 The FederID architecture Protected Area Agent (Handler) WebSSO Portal SessionsLDAP Identity Provider user password Assertion Consumer 1 2 3 4 5 6 7 8 9 1010 1 1212 1313 1414 1515
21
21 The FederID architecture ● InterLDAP-LAAP: – Liberty Alliance Attribute Provider – IF-FF and ID-WSF frameworks – Mapping of the representation of a person between LDAP and Liberty Alliance – Share LDAP attributes trough normalized Web Services
22
22 The FederID architecture Users LAA P LDAP Directory Service Provider Identity Provider
23
23 The FederID architecture ● InterLDAP-WUI: – Content Management System for an LDAP directory – Enriched schema designing the interface “on the fly” – Authorization back-end – Delegation is enabled by setting trees and groups properties for each part of the Directory Information Tree
24
24 Table of contents ● LINAGORA Group ● A question of Identity ● Liberty Alliance ● The FederID architecture ● Advanced use of LDAP ● Conclusion
25
25 Advanced use of LDAP ● SSO stack: – Authentication against LDAP (or LA IdP) – Authorizations against LDAP Filter : ● First select the attributes needed for the filter ● Define logical groups : business => '(departmentUID=MyBusinessEntity)' ● Protect your area : ^/site/.*$=> $groups =~ /bbusinessb/ ^/(js|css)=> accept default => deny =>No need to manage groups into Directory !
26
26 Advanced use of LDAP ● Standard LDAP Schema: mono/multi- valuated, syntax, matching rules,... ● Enriched schema: – Labels/descriptions – List of values/Default value – Visible/filterable/modifiable – Double capture
27
27 Advanced use of LDAP ● The power of SQL for LDAP: – LDAP Query Language – For reading only – Doing searches on results of a primary search – LQL request stored as an LDAP attribute value
28
28 Advanced use of LDAP ● LQL functions: – search/list/read (DN, FILTER) – sup (DN, N): raise the tree from “DN” for “N” levels – fsup (BASE, FILTER): return the first parent of ”BASE” selected by “FILTER” – and/or: union/intersection – group (DNGROUP, DNMEMBER): check if “DNMEMBER” belongs to “DNGROUP” – concat: strings concatenation
29
29 Advanced use of LDAP ● And some variables: – $namingContext: suffix of the tree. – $targetDN: DN targeted by the operation. – $targetRDN: RDN targeted by the operation. – $authorDN: DN of the author of the operation (as it is bound on the directory). – $authorRDN: RDN of the author of the operation.
30
30 Advanced use of LDAP ● LQL example : attribute(attribute(sup(search(ou=structs,$ namingContext,$targetRDN),1),manager),cn)
31
31 Advanced use of LDAP ● Proxy-Authz control: – Before this control, need to maintain a connection on the directory per user – Now, we can use pool of connection with rootdn binds + Proxy-Authz ● No-op: – Goal: know if a user can write before writing! – Need to test the alternative 'Get effective rights'
32
32 Table of contents ● LINAGORA Group ● A question of Identity ● Liberty Alliance ● The FederID architecture ● Advanced use of LDAP ● Conclusion
33
33 Conclusion Join us! http://www.federid.org federid-dev@federid.org http://www.interldap.org interldap-dev@objectweb.org
34
Thank you – Danke sehr http://www.federid.org http://www.interldap.org
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.