Download presentation
Presentation is loading. Please wait.
Published byLeon Quinn Modified over 9 years ago
1
Federated Identity in Practice Mike Beach The Boeing Company
2
Michael Beach, The Boeing Company- 2 - Federated Identity Federated Identity allows customers, partners and end-users to use Web services without having to constantly authenticate or identify themselves to the services within their federation. This applies both within the corporation and across the Internet.
3
Michael Beach, The Boeing Company- 3 - The Boeing Environment Three user communities 150,000 employees, contractors 80,000 partners, suppliers, customers 1,000,000+ ex-employees, beneficiaries Three enterprise directories Comprehensive Sun ONE directory (all people of interest) Microsoft Active Directory (most employees) RACF (most employees – but not same employees as MS AD) Many Boeing web servers Apache, IPlanet, IIS, ColdFusion, Shadow, Oracle Over 350 web server platform/version variations Multiple versions of both Netscape and IE browsers
4
Michael Beach, The Boeing Company- 4 - WSSO Objectives Simple, consistent user experience Improved security through centralized access management Reduction in user accounts and passwords, thus reductions in account administration costs Applications isolated from authentication mechanisms and authentication technology insertions Applications agnostic to origin of user’s access (internal or external) Single sign on across Boeing business domain, including partners, suppliers, customers…
5
Michael Beach, The Boeing Company- 5 - WSSO Key Solution Differentiators Web Single Sign-on (WSSO) across Boeing and external web sites Common infrastructure supporting internal and external access, for internal and external users No control over desktop configuration and no ability to deploy components to the desktop Leverage existing Boeing infrastructure
6
Michael Beach, The Boeing Company- 6 - The Deployment Oblix Netpoint infrastructure with 12 Access Servers deployed across 3 geographic regions (plus sand box, development, test, and integration environments – about 50 machines total) Primarily authentication today, limited authorization No Identity Management or delegated administration Custom integration with 5 authentication mechanisms MS Active Directory RACF X.509 personal certificates Proximity badge Customer/supplier reverse web proxy user ID and password
7
Michael Beach, The Boeing Company- 7 - Identity And Policy Stores Customers, Suppliers Access Server Customer Authenticator Service WebGate Web Server Content 3 rd Party Web Server Content WebGate Login Hub Web Browser Logon W2K RACF Certificate PIN Authentication Remote Access Service Boeing Reverse Proxy SAML Services WSSO Proxy Services Login Hub Logon PIN Web Browser Boeing Plugin Major WSSO Components Corporate Sun ONE Directory AD RACF X.509 Groups Oblix Policy All People DMZ
8
Michael Beach, The Boeing Company- 8 - Identity And Policy Stores Access Server Customer Authenticator Service Boeing Reverse Proxy WSSO Proxy Services SAML Services Remote Access Service WebGate Web Server Content 3 rd Party Web Server Content WebGate Login Hub Web Browser Logon W2K RACF Certificate Login Hub Logon PIN Web Browser Boeing Plugin WSSO Authentication Sources Corporate Sun ONE Directory AD RACF X.509 W2K RACF X.509 Personal Certificates Customers, Suppliers DMZ External PIN Groups All People Oblix Policy PIN Authentication
9
Michael Beach, The Boeing Company- 9 - Access Server Customer Authenticator Service Boeing Reverse Proxy WSSO Proxy Services SAML Services Remote Access Service WebGate Web Server Content 3 rd Party Web Server Content WebGate Login Hub Web Browser Logon W2K RACF Certificate Login Hub Logon PIN Boeing Plugin WSSO Authorization Sources DMZ PIN Authentication Identity And Policy Stores Customers, Suppliers Corporate Sun ONE Directory AD RACF X.509 Groups Oblix Policy All People LDAP Group Authorization LDAP People Branch Customer/Supplier Authorization
10
Michael Beach, The Boeing Company- 10 - Access Server Customer Authenticator Service WebGate Web Server Content 3 rd Party Web Server Content WebGate Login Hub Web Browser Logon W2K RACF Certificate Login Hub Logon PIN Boeing Reverse Proxy WSSO Proxy Services SAML Services Remote Access Service Login Hub Logon PIN Boeing Plugin WSSO Perimeter Access Components DMZ PIN Authentication Identity And Policy Stores AD RACF X.509 Customers, Suppliers Groups All People Oblix Policy Corporate Sun ONE Directory Typical customers, suppliers Employees (VPN, Dial) Federated customers, suppliers External employees, retirees
11
Michael Beach, The Boeing Company- 11 - Access Server Boeing Plugin Customer Authenticator Service Boeing Reverse Proxy WSSO Proxy Services SAML Services Remote Access Service Web Server Content WebGate Login Hub Web Browser Logon W2K MyInfo Certificate Login Hub Logon PIN 3rd Party Web Server Content WebGate Web Server Content WSSO-protected Components DMZ PIN Authentication Identity And Policy Stores AD RACF X.509 Customers, Suppliers Groups All People Oblix Policy Corporate Sun ONE Directory Internal Boeing External third party suppliers
12
Michael Beach, The Boeing Company- 12 - Web Browser Access Server Boeing Plugin Customer Authenticator Service Boeing Reverse Proxy WSSO Proxy Services SAML Services Remote Access Service WebGate Web Server Content 3 rd Party Web Server Content WebGate Login Hub Logon W2K MyInfo Certificate Login Hub Logon PIN Web Browser WSSO Users DMZ PIN Authentication Identity And Policy Stores AD RACF X.509 Customers, Suppliers Groups All People Oblix Policy Corporate Sun ONE Directory External employees, retirees, customers, suppliers Internal employees
13
Michael Beach, The Boeing Company- 13 - Started RFP3/2001 Vendor selection8/2001 Production12/2001 100,000 logins per day 100,000 logins per day2/2003 100+ applications in production4/2003 3rd party web site integration5/2003 External user integration5/2003 SAML production6/2003 Role-based access controlQ3/2003 Complete deployment (1000+ applications)End 2004-2005 Milestones We Are Here
14
Michael Beach, The Boeing Company- 14 - SAML Participants The Boeing Company A leading manufacturer of commercial airplanes, space technology, defense aircraft and systems, and communication systems. Southwest Airlines A major domestic airline that provides primarily shorthaul, high-frequency, point-to-point, low-fare service. Southwest operates over 350 Boeing 737 aircraft in 58 cities. Oblix Inc. A leading developer of identity-based security solutions for e-Business networks. The company's flagship product, Oblix NetPoint, is an enterprise identity management and Web access solution that provides an identity infrastructure for dynamic e-Business environments.
15
Michael Beach, The Boeing Company- 15 - SAML Deployment Objectives Significantly increase the user base of MyBoeingFleet, the secure web portal that provides Boeing customers access to all of the information required to operate and maintain their fleets Embed MyBoeingFleet more deeply in Airline’s business process. Facilitate the deployment of MyBoeingFleet content directly to the customer maintenance hanger User will authenticate to their local intranet, click on a link to MyBoeingFleet, and seamlessly access the data and services without a secondary Boeing authentication request Role-based access control targeted for next year
16
Michael Beach, The Boeing Company- 16 - The SAML Flow DOMAIN A: swacorp.com DOMAIN B: Boeing.com 2. 1 SAML Server Reverse Proxy DMZ Target Resource: MyBoeingFleet.com Access Server INTERNAL 4 2. 5 2. 4 2.2 3 SAML Services SWA User 2.0 SWA Portal 1 2. 1 2.3
17
Michael Beach, The Boeing Company- 17 - Web Access Management General Challenges Managing Executive expectation User experience Hundreds of applications with even more policies Complexity and reliability Browsers, web servers, networks, directories, libraries, versions, custom code Session management Existing applications typically have imbedded session management Anomalies arise from inconsistent session state Global “logout” is problematic (hurray for SAML 2.0!) Security Vulnerability assessment and risk mitigation where possible is appropriate
18
Michael Beach, The Boeing Company- 18 - SAML Deployment Considerations Assertions may need to be constrained to a domain Boeing defined the authentication mechanism to include both user identity and SAML issuer ID Support for direct bookmarks For each web session, prior to a SAML transfer, bookmarks and URL references may not work Oblix-provided solution creates a persistent “SAML Provider” cookie and implements redirection through SAML services for unauthenticated users Not a part of SAML standard. SAML only provides the “introduction” Boeing content resides inside the Boeing security perimeter. Had to integrate ObssoCookie intelligence into perimeter before users could actually get to content. Security considerations of interactions across the Internet AFTER the SAML exchange were significant
19
Michael Beach, The Boeing Company- 19 - Recommendations Focus on communication and marketing Manage expectations Educate users Thoroughly understand and plan user experience (within product capabilities) Consider limiting scope Integration of legacy technologies can be costly Each component integrated adds to complexity and impacts overall reliability Consider adjusting infrastructure to support IAM Integration to existing infrastructure required significant custom code Use of a virtual directory could simplify deployment, but probably with an impact to performance
20
Michael Beach, The Boeing Company- 20 - Standards Wish List Support for direct bookmarks Bookmarks and URL references (“deep links”) should work, even prior to the initial SAML transfer. Global logout Provide the user with an intuitive logout facility that would ensure complete termination of all application sessions and authentication credentials. Domains of federated security Users have need for multiple, disconnected federated security domains. For example, separation of business and personal. (Selective logout?) Security strength of public Internet technologies Industry needs to deliver technology that prevents cookie vulnerabilities (hijack and replay). Support for individual application session timeout settings Several of our application environments consider a session timeout setting (idle time) mandatory. Authentication State Visibility It is important for the user to always be aware of their authentication state. Are they authenticated, and to what?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.