Presentation is loading. Please wait.

Presentation is loading. Please wait.

Fidelity Feedback on SAML 1.X and ID-FF 1.X Patrick Harding Enterprise Architecture Fidelity Investments.

Similar presentations


Presentation on theme: "Fidelity Feedback on SAML 1.X and ID-FF 1.X Patrick Harding Enterprise Architecture Fidelity Investments."— Presentation transcript:

1 Fidelity Feedback on SAML 1.X and ID-FF 1.X Patrick Harding Enterprise Architecture Fidelity Investments

2 Fidelity Proprietary Information 2 Fidelity and Web Services Enterprise commitment to XML in 1999 –Migrated 90% of inter-BU communication to XML/HTTP Endorse standards bodies –OASIS Member –WS-I Member –Liberty Management Board –W3C Member –HR-XML Consortium Externalized first web services to business partners in 2001

3 Fidelity Proprietary Information 3 Fidelity Use Cases These are the simple ones 1.Employee SSO across internal applications 2.Employee SSO access to external services 3.Customer SSO access to Fidelity

4 Fidelity Proprietary Information 4 Use Case 1: Employee SSO across Internal Applications Employee Intra-enterprise SSO –Current solution leverages proprietary cookie –Issues integrating COTS applications Use SAML V1.X –SSO Browser POST Profile –No requirement for federation –Starting proof-of-concept Issues –No logout in SAML –No profiles for Web Service clients –No profile for WSRP

5 Fidelity Proprietary Information 5 Use Case 2: Employee Access to External Services Employee Inter-enterprise SSO –Initiated from Fidelity employee portal –Current solutions are proprietary or involve separate UserID and Password –Also involves batch transfer of employee data Use SAML V1.X and Liberty ID-FF V1.X where appropriate. –Fidelity is the Source/Identity Provider –SSO Browser Artifact Profile –May require federation (account linking) –May require single logout –Also expose attribute service to allow service provider to retrieve employee data Issues –External Service Provider support for Liberty/SAML –Forced to use opaque id’s with Liberty

6 Fidelity Proprietary Information 6 Use Case 3: Customer SSO Access to Fidelity Customer Inter-enterprise SSO –Fidelity clients are requesting SSO access to Fidelity from their employee portal –Fidelity has at least two proprietary solutions in place –Fidelity accepts batch feeds of client’s employee data Use Liberty ID-FF V1.X –Fidelity is the Service Provider –SSO Browser Artifact Profile –Opt-in/Opt-out Dynamic Federation and Bulk Federation –Single Logout is required Issues –External client support for Liberty –Extensibility confusion (saml:Advice, etc) –Optional requirement for AuthNRequest –No standardized credential collection for web service clients

7 Fidelity Proprietary Information 7 Technical Issues Summary Fidelity needs a single standard for SSO and Identity Federation Client support for Liberty/SAML –Needs to be simpler –Every enterprise will be an IdP for its employees SAML 1.X lacks certain features that ID-FF 1.X provides –e.g. Log-out, Federation, De-federation ID-FF 1.X lacks certain features that SAML 1.X provides –e.g. One-way SSO flow SAML extensibility confusion No standardized XML language for credential collection Versioning is not well defined


Download ppt "Fidelity Feedback on SAML 1.X and ID-FF 1.X Patrick Harding Enterprise Architecture Fidelity Investments."

Similar presentations


Ads by Google