Presentation is loading. Please wait.

Presentation is loading. Please wait.

Clément OUDOT. 2 Table of contents ● LINAGORA Group ● A question of Identity ● Liberty Alliance ● The FederID architecture ● Advanced use of LDAP ● Conclusion.

Similar presentations


Presentation on theme: "Clément OUDOT. 2 Table of contents ● LINAGORA Group ● A question of Identity ● Liberty Alliance ● The FederID architecture ● Advanced use of LDAP ● Conclusion."— Presentation transcript:

1 Clément OUDOT

2 2 Table of contents ● LINAGORA Group ● A question of Identity ● Liberty Alliance ● The FederID architecture ● Advanced use of LDAP ● Conclusion

3 3 LINAGORA Group ● LINAGORA Group, this is: – 100 persons – Implantations in Paris, Lyon and Toulouse – Results: 9 billions euros for 2007 – Training, Support, Integration, Consulting – Only Free Software !

4 4 OSSA ● Open Source Software Assurance : – Bring our customers support on more than 250 Free Softwares – Patches delivered within 8 hours – Patches always submitted to the communities – Bugs report on critical architectures, not tested by the community developers

5 5 Table of contents ● LINAGORA Group ● A question of Identity ● Liberty Alliance ● The FederID architecture ● Advanced use of LDAP ● Conclusion

6 6 A question of Identity ● A digital entity is a set of attributes describing an entity ● A subset named credentials are used for authentication ● An entity (a user) can own many identities ● Each identity has roles and rights within an application (service provider)

7 7 A question of Identity ● Services provider manage the identities : – For a service provider : 1 user = 1 identity – For an user : 1 service = 1 identity

8 8 A question of Identity ● We need Identity Management ! – Referential of identities (LDAP Directory) – Provisioning services – Access control on data (LDAP ACLs) – Access control on applications (SSO rules) ● We need Identity Federation ! – Keep different identities for private life purpose – Federate accounts to benefits from other services

9 9 Table of contents ● LINAGORA Group ● A question of Identity ● Liberty Alliance ● The FederID architecture ● Advanced use of LDAP ● Conclusion

10 10 Liberty Alliance ● Grounded in 2001 by SUN and 13 others partners ● More than 1500 members ● Goals : – Open Federation Standard – Respect of private life in numeric space

11 11 Liberty Alliance Des k Sponsor s

12 12 Liberty Alliance ● Three standards frameworks : – ID-FF (Federation Framework) : ● SSO, SLO ● Federation mechanisms – ID-WSF (Web Services Framework) : ● Attribute sharing ● Interaction service – ID-SIS (Service Interface Specifications) : ● Interface between services

13 13 Liberty Alliance Service Provider Identity Provider Service Provider Attributes Provider

14 14 Liberty Alliance

15 15 Table of contents ● LINAGORA Group ● A question of Identity ● Liberty Alliance ● The FederID architecture ● Advanced use of LDAP ● Conclusion

16 16 The FederID architecture ● LASSO API: Library of the Liberty Alliance specifications, C ● InterLDAP: LDAP tool suite for content management, J2EE (Spring-LDAP, Tapestry 5) ● LemonLDAP::NG: Web SSO tool with authorization management, Perl ● Authentic: Liberty Alliance identity provider, Python

17 17 The FederID architecture LDAP Director y Circl e ofTrust Authenti c Identity Provider Content Management [WUI] Attribut e Provider [LAAP] SSO & Authorization s Service Provider Standard Web application Standard Web application

18 18 The FederID architecture ● Authentic : – Liberty Alliance identity provider – Authentication of users against an LDAP server, a database or simple flat text files – Forcing LDAP authentication within FederID – Capable of forwarding LDAP attributes into SAML responses

19 19 The FederID architecture ● LemonLDAP::NG: – WebSSO product based on Apache Perl Handler technology. – Offering three modules : ● Handler: protect the application ● Portal: where the user is redirected when not authenticated ● Manager: graphical interface enabling the configuration of LemonLDAP::NG.

20 20 The FederID architecture Protected Area Agent (Handler) WebSSO Portal SessionsLDAP Identity Provider user password Assertion Consumer 1 2 3 4 5 6 7 8 9 1010 1 1212 1313 1414 1515

21 21 The FederID architecture ● InterLDAP-LAAP: – Liberty Alliance Attribute Provider – IF-FF and ID-WSF frameworks – Mapping of the representation of a person between LDAP and Liberty Alliance – Share LDAP attributes trough normalized Web Services

22 22 The FederID architecture Users LAA P LDAP Directory Service Provider Identity Provider

23 23 The FederID architecture ● InterLDAP-WUI: – Content Management System for an LDAP directory – Enriched schema designing the interface “on the fly” – Authorization back-end – Delegation is enabled by setting trees and groups properties for each part of the Directory Information Tree

24 24 Table of contents ● LINAGORA Group ● A question of Identity ● Liberty Alliance ● The FederID architecture ● Advanced use of LDAP ● Conclusion

25 25 Advanced use of LDAP ● SSO stack: – Authentication against LDAP (or LA IdP) – Authorizations against LDAP Filter : ● First select the attributes needed for the filter ● Define logical groups : business => '(departmentUID=MyBusinessEntity)' ● Protect your area : ^/site/.*$=> $groups =~ /bbusinessb/ ^/(js|css)=> accept default => deny =>No need to manage groups into Directory !

26 26 Advanced use of LDAP ● Standard LDAP Schema: mono/multi- valuated, syntax, matching rules,... ● Enriched schema: – Labels/descriptions – List of values/Default value – Visible/filterable/modifiable – Double capture

27 27 Advanced use of LDAP ● The power of SQL for LDAP: – LDAP Query Language – For reading only – Doing searches on results of a primary search – LQL request stored as an LDAP attribute value

28 28 Advanced use of LDAP ● LQL functions: – search/list/read (DN, FILTER) – sup (DN, N): raise the tree from “DN” for “N” levels – fsup (BASE, FILTER): return the first parent of ”BASE” selected by “FILTER” – and/or: union/intersection – group (DNGROUP, DNMEMBER): check if “DNMEMBER” belongs to “DNGROUP” – concat: strings concatenation

29 29 Advanced use of LDAP ● And some variables: – $namingContext: suffix of the tree. – $targetDN: DN targeted by the operation. – $targetRDN: RDN targeted by the operation. – $authorDN: DN of the author of the operation (as it is bound on the directory). – $authorRDN: RDN of the author of the operation.

30 30 Advanced use of LDAP ● LQL example : attribute(attribute(sup(search(ou=structs,$ namingContext,$targetRDN),1),manager),cn)

31 31 Advanced use of LDAP ● Proxy-Authz control: – Before this control, need to maintain a connection on the directory per user – Now, we can use pool of connection with rootdn binds + Proxy-Authz ● No-op: – Goal: know if a user can write before writing! – Need to test the alternative 'Get effective rights'

32 32 Table of contents ● LINAGORA Group ● A question of Identity ● Liberty Alliance ● The FederID architecture ● Advanced use of LDAP ● Conclusion

33 33 Conclusion Join us! http://www.federid.org federid-dev@federid.org http://www.interldap.org interldap-dev@objectweb.org

34 Thank you – Danke sehr http://www.federid.org http://www.interldap.org


Download ppt "Clément OUDOT. 2 Table of contents ● LINAGORA Group ● A question of Identity ● Liberty Alliance ● The FederID architecture ● Advanced use of LDAP ● Conclusion."

Similar presentations


Ads by Google