What’s changed in the Shibboleth 1.2 Origin

Slides:



Advertisements
Similar presentations
Whether you like it or not! Importance increases significantly with SharePoint 2013 Pretty much every investment area relies on Profiles for core.
Advertisements

System Center Configuration Manager Push Software By, Teresa Behm.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
Edward Tsai – CS 239 – Spring 2003 Strong Security for Active Networks CS 239 – Network Security Edward Tsai Tuesday, May 13, 2003.
1 - Oracle Server Architecture Overview
1 July 2005© 2005 University of Kent1 Seamless Integration of PERMIS and Shibboleth – Development of a Flexible PERMIS Authorisation Module for Shibboleth.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
CVSQL 2 The Design. System Overview System Components CVSQL Server –Three network interfaces –Modular data source provider framework –Decoupled SQL parsing.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Object Oriented Databases by Adam Stevenson. Object Databases Became commercially popular in mid 1990’s Became commercially popular in mid 1990’s You.
Shibboleth: New Functionality in Version 1 Steve Carmody July 9, 2003 Steve Carmody July 9, 2003.
Module 1: Installing Active Directory Domain Services
Shibboleth 2.0 IdP Training: Basics and Installation January, 2009.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Advance Computer Programming Java Database Connectivity (JDBC) – In order to connect a Java application to a database, you need to use a JDBC driver. –
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
SWITCHaai Team Introduction to Shibboleth.
Shibboleth: Installation and Deployment Scott Cantor July 29, 2002 Scott Cantor July 29, 2002.
1 Schema Registries Steven Hughes, Lou Reich, Dan Crichton NASA 21 October 2015.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Shibboleth: An Introduction
Lesson Overview 3.1 Components of the DBMS 3.1 Components of the DBMS 3.2 Components of The Database Application 3.2 Components of The Database Application.
JISC Middleware Security Workshop 20/10/05© 2005 University of Kent.1 The PERMIS Authorisation Infrastructure David Chadwick
Internet2 Middleware Initiative Shibboleth Ren é e Shuey Systems Engineer I Academic Services & Emerging Technologies The Pennsylvania State University.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Shibboleth: Installation and Deployment Scott Cantor July 29, 2002 Scott Cantor July 29, 2002.
Windows Role-Based Access Control Longhorn Update
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
February, TRANSCEND SHIRO-CAS INTEGRATION ANALYSIS.
WEB SERVER SOFTWARE FEATURE SETS
DSpace System Architecture 11 July 2002 DSpace System Architecture.
ATLAS Database Access Library Local Area LCG3D Meeting Fermilab, Batavia, USA October 21, 2004 Alexandre Vaniachine (ANL)
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
Shibboleth 1.2 Technical Overview “So you thought 1.1 was complicated…” Scott Cantor The Ohio State University and Internet2 Scott Cantor.
Expense Tracking System Developed by: Ardhita Maharindra Muskan Regmi Nir Gurung Sudeep Karki Tikaprem Gurung Date: December 05 th, 2008.
Google Code Libraries Dima Ionut Daniel. Contents What is Google Code? LDAPBeans Object-ldap-mapping Ldap-ODM Bug4j jOOR Rapa jongo Conclusion Bibliography.
Introduction to Core Database Concepts Getting started with Databases and Structure Query Language (SQL)
1 Copyright © 2008, Oracle. All rights reserved. Repository Basics.
Enterprise Library 3.0 Memi Lavi Solution Architect Microsoft Consulting Services Guy Burstein Senior Consultant Advantech – Microsoft Division.
INFSO-RI Enabling Grids for E-sciencE GUMS vs. LCMAPS Oscar Koeroo.
UNICORE and Argus integration Krzysztof Benedyczak ICM / UNICORE Security PT.
Dynamic Accounts: Identity Management for Site Operations Kate Keahey R. Ananthakrishnan, T. Freeman, R. Madduri, F. Siebenlist.
Introduction The concept of a web framework originates from the basic idea that every web application obtains its foundations from a similar set of guidelines.
J2EE Platform Overview (Application Architecture)
Welcome POS Synchronize Concept 08 Sept 2015.
DEPTT. OF COMP. SC & APPLICATIONS
Overview of Active Directory Domain Services
What are they? The Package Repository Client is a set of Tcl scripts that are capable of locating, downloading, and installing packages for both Tcl and.
Netscape Application Server
Federation Systems, ADFS, & Shibboleth 2.0
Shared Services with Spotfire
Data Virtualization Tutorial: Introduction to SQL Script
Web Technologies IT230 Dr Mohamed Habib.
Module Overview Installing and Configuring a Network Policy Server
CARA 3.10 Major New Features
Configuring and Troubleshooting Routing and Remote Access
Server Concepts Dr. Charles W. Kann.
Distribution and components
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Sébastien BAHLOUL LINAGORA 5 April 2006 – ObjectWeb Meeting - Grenoble
Unit 6-Chapter 2 Struts.
Complete 1z0-161 Exam Dumps - Pass In 24 Hours - Dumps4download.us
DHCP, DNS, Client Connection, Assignment 1 1.3
Chapter 2: The Linux System Part 1
Overview and Development Plans
CS 350 – Software Design Principles and Strategies – Chapter 14
敦群數位科技有限公司(vanGene Digital Inc.) 游家德(Jade Yu.)
Hyperledger Fabric 소개 및 튜토리얼
Presentation transcript:

What’s changed in the Shibboleth 1.2 Origin Walter Hoehn (wassa@memphis.edu)

Core Multi-federation support Rationalized application architecture Metadata-based request validation Support for multiple SAML Subject formats Compatibility with 1.1 targets With the release of Shibboleth 1.2, there have been several changes to the basic way in which the origin processes requests. First, almost all of the origin’s configuration parameters can be overridden depending on which service provider is being answered. Most importantly, the origin can vary the identifiers and credentials used when servicing SAML requests. This functionality can be used to join multiple federations or to create bilateral relationships with specific providers. The application architecture has been rationalized ------------------------------------------- In versions of Shibboleth previous to 1.2, the unit of policy was the “application domain”. The application domain concept was presented in the Shibboleth architecture document, but was never fully developed in the software. An application domain was comprised of a SHAR name and a request path, knowledge of which must be shared between the origin and target. In 1.2 this system is replaced and the unit of policy is the service provider, which has a single identifier that is transmitted via federation metadata. Not only does this simplify things, but it ties policy to a logical identifier instead of to an SSL credential. What this means in a practical sense is that folks don’t have to modify their Attribute Release Policies when they change server certificates or when they add multiple redundant servers with different certificates. Request Validation ---------------- The origin now validates the sanity of several aspects of the shibboleth transaction. Specifically, it checks the federation metadata and verifies that all credentials and SAML endpoints are valid for the requesting service provider. There is support for multiple SAML Subject formats ------------------------------------ This functionality enables the Attribute Authority to answer attribute queries using identifiers other than the shibboleth handle. For instance, DNs from a certificate or campus NetIDs. This paves the way for a few new shibboleth use cases, namely authorization in grid environments, and use within campus intranets. This should also allow for increased interoperability with other SAML-based products. Legacy Compatibility ------------------ Some of the changes I’ve already described are not compatible with Shibboleth 1.1, so a legacy interoperability mode was added so that the origin can answer requests from 1.1 targets.

Logging Configuration wizard Retained full power of log4j Separate transaction log for security auditing A couple of changes were made to the origin’s logging capabilities. The origin has, since early on, used a powerful logging library named log4j, which is part of the apache jakarta project. Previous versions of the software have required that administrators tweak the logging configuration manually. While this allowed a great deal of flexibility in how the logs were output, configuring log4j is a bit of a daunting task. So, the origin configuration file now includes some simple configuration parameters that can be used to turn log4j’s dials in the ways that are most commonly needed. Those who need more customized logging can still configure log4j manually. Also, a new separate log has been added to support accounting in production deployments. This log contains only information regarding security assertions that are issued by the origin.

Attribute Resolver SQL Data Connector Uses JDBC Supports DB connection pooling Supports using prepared statements Command line testing program (resolvertest) is now able to process & enforce ARPs Data Connector fail-over support The attribute resolver has been made a bit more functional. A connector plugin has been added that allows the resolver to pull data from relational databases. The connector uses JDBC, which should allow for connecting to just about any popular database. It supports some advanced features like connection pooling and prepared statements. The resolvertest command line program has been made a bit more useful. It can now be configured to enforce attribute release policies, giving administrators more information about what data will be sent over the wire for a given user & target. Also, the resolver can be configured to query alternate data connectors when the primary data connectors fail to respond. This allows it to seamlessly fail-over to redundant directories or databases.

Performance XML Security updates Handle Service request throttle Apache JuiCE (still alpha) A few items with respect to performance. The most important is that we are now including a new version of the Apache XML Security library. This version significantly improves the speed of signing operations, which in turn boosts the overall speed of the origin. A configurable request throttle has been added to the Handle Service. This prevents the server from becoming saturated with signing requests. While it isn’t really a part of the 1.2 release, we have written a Java JCE implementation that bridges to OpenSSL for native crypto operations. This code has been donated to the Apache Software Foundation and can significantly increase the speed and throughput of the Handle Service.

Signing Credential resolver Supports signing of all SAML Assertions & Responses Up until this release, the origin’s signing credentials could only be loaded from Java keystores. This turned out to be a stumbling block for many administrators, so we have created a generic interface for loading credentials. Implementations are provided for this interface that load from java keystores as well as from all of the formats usually used with mod_ssl. Also, both the Handle Service and Attribute Authority are now flexible in which portions of the SAML messages they digitally sign. This should increase interoperability with other SAML-based products.

Attribute Release Policies Attribute value specifications can contain match functions And, lastly, the Attribute Release Policy language has been extended a bit. Match functions can be used when deciding whether or not specific attribute values should be released. This allows filtering of values based on, for instance, regular expressions.

What’s changed in the Shibboleth 1.2 Origin Walter Hoehn (wassa@memphis.edu)