Presentation is loading. Please wait.

Presentation is loading. Please wait.

Will Darby 91.514 5 April 2010.  What is Federated Security  Example Implementations  Security Assertion Markup Language (SAML) Overview  Alternative.

Similar presentations


Presentation on theme: "Will Darby 91.514 5 April 2010.  What is Federated Security  Example Implementations  Security Assertion Markup Language (SAML) Overview  Alternative."— Presentation transcript:

1 Will Darby 91.514 5 April 2010

2  What is Federated Security  Example Implementations  Security Assertion Markup Language (SAML) Overview  Alternative Solutions for the Internet

3

4

5

6

7

8

9

10

11  Web service diagram

12

13  Authorize users across all grids nodes  Minimal changes to existing security  Registry to map credentials to authority  Assertions passed among servers  Image from paper

14

15

16

17

18

19  XML Signature  XML Encryption  WS-Security  WS-Trust

20

21

22

23

24  R.L. Morgan, S. Cantor, S. Carmody, W. Hoehn and K. Klingenstein. “Federated Security: The Shibboleth Approach.” EDUCAUSE Quarterly, Volume 27, Number 4, 2004. Pages 12-17. Available at: http://net.educause.edu/ir/library/pdf/EQM0442.pdf.  K.D. Lewis and J.E. Lewis. “Web Single Sign-On Authentication using SAML.” International Journal of Computer Science Issues. Volume 2, 2009. Pages 41-48. Available at: http://www.ijcsi.org/papers/2-41-48.pdf.http://www.ijcsi.org/papers/2-41-48.pdf  “Security Assertion Markup Language (SAML) V2.0 Technical Overview.” OASIS Security Services Technical Committee. March, 2008. Available at: http://www.oasis- open.org/committees/download.php/27819/sstc-saml-tech- overview-2.0-cd-02.pdf.http://www.oasis- open.org/committees/download.php/27819/sstc-saml-tech- overview-2.0-cd-02.pdf

25  H. Gomi, M.Hatakeyama, S.Hosono and S. Fujita. “A Delegation Framework for Federated Identity Management.” Proceedings of the 2005 workshop on Digital identity management. Pages 94-103.  F. Pinto and C. Fernau. “An Approach for Shibboleth and Grid Integration.” Proceedings of the UK e-Science All Hands Conference, 2005. Available at: http://www.allhands.org.uk/2005/proceedings/papers/531. pdf. http://www.allhands.org.uk/2005/proceedings/papers/531. pdf  D. Recordon and D. Reed. “OpenID 2.0: A Platform for User- Centric Identity Management.” Proceedings of the second ACM workshop on Digital Identity Management, 2006. Pages 11-16.  E. Hammer-Lahav. “The OAuth 1.0 Protocol.” IETF Internet Draft. February, 2010. Available at: http://tools.ietf.org/html/draft-hammer-oauth-10. http://tools.ietf.org/html/draft-hammer-oauth-10

26


Download ppt "Will Darby 91.514 5 April 2010.  What is Federated Security  Example Implementations  Security Assertion Markup Language (SAML) Overview  Alternative."

Similar presentations


Ads by Google