Download presentation
Presentation is loading. Please wait.
Published byLaurence Greene Modified over 9 years ago
1
1 Authentication and Authorization in Web Systems Zhenhua Guo Jun-30-2009
2
2 Outline Background Terminology Cryptography REST, Web 2.0, Social Network Authentication Authorization Conclusion
3
3 Terminology Authentication Authorization Confidentiality Integrity Non-repudiation Single Sign-On Delegation
4
4 Cryptography Shared-key cryptography DES, 3DES, AES Public-key cryptography RSA, DSA Digital Certificate Bind an entity’s identity with a public key Certificate Authority Public Key Infrastructure clear textencrypted textclear text encryptdecrypt
5
5 REST - REpresentational State Transfer Each resource is identified by a unique ID. Stateless communication Link resources together Resources have multiple representations Based on HTTP /accounts GET – list all accounts PUT – unused POST – add account DELETE - unused /accounts/id GET – get account details PUT – update account details POST - unused DELETE – delete account GETRead POSTCreate PUTUpdate DELETEDelete
6
6 Web 2.0 Read-write collaborative web Participatory nature Cooperate, not control … Cooperate, Participate, Collaborate Social Network
7
7 Science collaboration OpenSocial APIs for web-based social network apps MySpace, Orkut, Ning…
8
8 Security Challenges in WWW Loosely coupled components Separation of security policies and security mechanisms. No single, isolated trusted base Domain-specific policies …
9
9 Outline Background Authentication Identity Federation HTTP Auth, SSL Central Authentication Service OpenID Authorization Conclusion
10
10 HTTP Basic Auth Allow browser to provide credential when making a request. Authorization: Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ== Drawback: Clear text HTTP Digest Access Auth Username: Aladdin Password: open sesame Aladdin:open sesame WWW-Authenticate: Basic realm="Secure Area“ Base64
11
11 SSL/TLS End-to-End message protection protocol Features Use both shared-key cryptography and public-key cryptography. Authentication Key exchange Confidentiality Integrity Non-repudiation Prevention of replay attack
12
12 Identity Federation Data across multiple identity management systems can be joined.
13
13 Central Authentication Service https://cas.iu.edu/cas/login?cassvc=ANY& casurl=https://onestart.iu.edu/my2-prd/Login.do?__p_dispatch__=login https://onestart.iu.edu/my2-prd/Login.do?__p_dispatch__=login& casticket=ST-26434-krE7MK7qkv1CcXrfBPLT-wsa453.uits.indiana.edu
14
14 CAS Use HTTPS to guarantee confidentiality and integrity. Advantages Simplicity Single Sign-On (ticket-granting cookie) Drawbacks Single point of failure ID federation
15
15 OpenID discovery Association relying party
16
16 OpenID How to discover Identity Providers? The Relying Party uses the Identifier to look up the necessary information for initiating requests Solution XRI Yadis HTTP-Based discovery How to share user attributes beyond authentication? Solution Simple Registration Extension Attribute Exchange
17
17 OpenID – Drawbacks If username and password of a user are stolen or phished, then all of the registered sites then become targets. Quality of OpenID providers varies.
18
18 Kerberos vs. CAS vs. OpenID CASKerberosOpenID LayerHTTPTCP/UDPHTTP Confidentiality + Integrity SSLBuilt in Cross-DomainVery hardHardEasy Single Point of FailureYes No Single Sign-OnYes Replay attackYes ID FederationNo Yes
19
19 Outline Background Authentication Authorization Access Control Grid Security Infrastructure Shibboleth OAuth Conclusion
20
20 Access Control Access Control List A list of permissions are attached to an object. Role-Based Access Control permissions → roles roles → users Access Control Matrix characterizes the rights of each subject with respect to every object in the system …
21
21 Architecture (local site) VS: validation service PEP: policy enforcement point PDP: policy decision point AR: attribute repository
22
22 Architecture - Push mode (in distributed systems) VS: validation service PEP: policy enforcement point PDP: policy decision point AR: attribute repository AA: attribute authority
23
23 Architecture - Pull mode (in distributed systems) VS: validation service PEP: policy enforcement point PDP: policy decision point AR: attribute repository AA: attribute authority
24
24 GSI (Grid Security Infrastructure)
25
25 GSI Based on X.509 PKI Every entity involved in the Grid has an X.509 certificate Each site trusts the CAs it wants Each Grid transaction is mutually authenticated Authorization is enforced using local policies. Global ID (certificate DN) is mapped to local ID
26
26 GSI Features Proxy Certificate (rfc3820) and Delegation A temporary credential is generated for the user proxy Delegation is indicated by user signing the temporary certificate with a secret. Single Sign-On Identity Mapping and Authorization Global identity is mapped to a local identity before local identity is used to enforce policies "/C=US/O=Globus/O=ANL/OU=MCS/CN=Ben Clifford” benc "/C=US/O=Globus/O=ANL/OU=MCS/CN=MikeWilde” wilde
27
27 GSI - Drawbacks Granularity of delegation All or none Infrastructure cost
28
28 Shibboleth - Flow Assertions Attribute Query
29
29 Shibboleth - Example InCommon “more than 3 million end-users” Authentication the user is an IU student
30
30 OAuth - Features A third party app can access user’s data stored at service provider without requiring username and password. Delegated authorization protocol Explicit user consent is mandatory. Light-weight
31
31 OAuth - Flow Third-party application
32
32 Google Calendar Would you like the third party app to access your Google Calender data??? Your google calendar data is: Third-party application
33
33 OAuth - Drawbacks Delegation granularity Error handling Token expiration and revocation
34
34 GSI vs. CAS * vs. Shibboleth vs. OAuth GSICAS * ShibbolethOAuth DelegationYes Yes (read only) Yes (needs user intervention) Delegation Granularity ImpersonationFine-grainedDepends on SP Implementation Specific TechProxy CertCapabilitySAMLHTTP Infrastructure Cost High Low WANNo Yes ModeN/APushBothN/A CAS: Community Authorization Service
35
35 Research Opportunities Authorization granularity Trust management
36
36 Questions ?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.