Web Single Sign-On: Federated Identity

Slides:



Advertisements
Similar presentations
Click to edit Master title style HEALTH INFORMATION 1 Identity & Access Management Presenter: Mike Davis (760) January 09, 2007.
Advertisements

Identity Network Ideals – Heterogeneity & Co-existence
Page 1 Copyright © 2010 Data Access Technologies, Inc. Model Driven Solutions May 2009 Cory Casanave Architecture of Services SOA for E-Government Conference.
Interactive Financial eXchange XML Usage in Financial Services Mark Tiggas President, Interactive Financial eXchange Open Applications.
Tuesday, June 10, 2003 Web Services Brief Overview & Security Assertion Coordinator Pattern by Mohammad Abushadi & Riaz Ahmed for Security Group CSE -
A brief look at the WS-* framework Josh Howlett, JANET(UK) TF-EMC2 Prague, September 2007.
Step Up Authentication in SAML (and XACML) Hal Lockhart February 6, 2014.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Lecture 23 Internet Authentication Applications
1 Security Assertion Markup Language (SAML). 2 SAML Goals Create trusted security statements –Example: Bill’s address is and he was authenticated.
Implementing an Enterprise Security System for Internet Authentication and Authorization Ken Patterson, CISSP Information Security Officer Harvard Pilgrim.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
SOA with Progress Philipp Walther Consultant. © 2007 Progress Software Corporation2 Agenda  SOA  Enterprise Service Bus (ESB)  The Progress SOA Portfolio.
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
Carl A. Foster.  What is SAML?  Security Assertion and Markup Language is an XML-based standard for exchanging authentication and authorization between.
B2B e-commerce standards for document exchange In350: week 13: Nov. 19,2001 Judith A. Molka-Danielsen.
A summary of ebXML (the new World Standard for e-Business) Dave Welsh Collaborative Domain Corporation.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Catalyst 2002 SAML InterOp July 15, 2002 Prateek Mishra San Francisco Netegrity.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Saml-intro-dec051 Security Assertion Markup Language A Brief Introduction to SAML Tom Scavo NCSA.
Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
What is Service Oriented Architecture ? CS409 Application Services Even Semester 2007.
第十四章 J2EE 入门 Introduction What is J2EE ?
Designing System for Internet Commerce 6. Functional Architecture Jinwon Lee.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
SAML CCOW Work Item HL7 Working Group Meeting San Antonio - January 2008 Presented by: David Staggs, JD CISSP VHA Office of Information Standards.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
Business-to-Business Authors: Authors: Mladenka Jakovljevic, Prof. Dr. Veljko Milutinovic,
Comparing ebXML messaging (ebMS) AS2 for EDI, EDI VAN and Web Service messaging Developed by OASIS ebXML TC members March 13, 2007
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
Catalyst 2002 SAML InterOp July 15, 2002 San Francisco.
SAML 2.0: Federation Models, Use-Cases and Standards Roadmap
Saml-v1_x-tech-overview-dec051 Security Assertion Markup Language SAML 1.x Technical Overview Tom Scavo NCSA.
An XML based Security Assertion Markup Language
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Shibboleth: An Introduction
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
All Rights Reserved 2014 © CMG Consulting LLC Federated Identity Management and Access Andres Carvallo Dwight Moore CMG Consulting, LLC October
Intranets, Extranet, Internet and Portals Prof. Sujata Rao Lesson 15.
E-Authentication & Authorization Presentation to the EA2 Task Force March 6, 2007.
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
Web Services Experience Language Dan Gisolfi jStart Emerging Technologies, IBM SWG IBM WSXL Team OASIS WSCM Technical.
Secure Mobile Development with NetIQ Access Manager
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Access Policy - Federation March 23, 2016
Secure Single Sign-On Across Security Domains
Stop Those Prying Eyes Getting to Your Data
Federation made simple
Data and Applications Security Developments and Directions
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Web Services Security Challenges
The best approaches to facilitate the processing of business transactions and interactions with systems that pre-date the Web, and address the need to.
Introduction to SOA Part II: SOA in the enterprise
Presentation transcript:

Web Single Sign-On: Federated Identity Dan Houser, MBA, CISSP, CCP Security Architect Nationwide Houserd1@nationwide.com

Nationwide Fortune 500 company A leading US financial company & insurer Life Insurance Automobile Insurance Property & Casualty Insurance Liability Insurance Annuities Retirement Products Investment Services Mortgages

Objectives How a Fortune 500 company implemented SAML for cross-company authentication (CCA) Under the covers: how artifact and signed SAML authentication works between business partners Building an extensible, enterprise architecture implementation with alpha and beta tools Lessons learned, challenges, and surprises when extending authentication and authorization to 3rd parties Identity, cryptography, and assertions, oh my! Web services authentication and authorization challenges

Web services Phenomenal Business acceleration since 1990 Transformation of business: From business at the club to EDI brokering From book binding to e-books to books on demand Supply chain management Rapid changes in business and trust models Outsourcing, resourcing, insourcing Hosting, co-location, managed services, ASPs Intense, cyclical Acquisition & Divestiture activity Global markets & economies

Web services (2) Generations of the Internet 1st Gen: Isolation Research 2nd Gen: Information Storefront 3rd Gen: Transaction eCommerce 4th Gen: Integration Web Services

Quick Web services primer Uses open, lightweight protocols: Provides a direct connection to business logic and core objects through Internet protocols Instead of COM, DCOM and RPC, now invoke a Web service over HTTP HTTP XML SOAP WSDL UDDI

Federated identity What is federated identity? The agreements, standards and technologies that make identity and entitlements portable across autonomous domains.§ Cross-company authentication (CCA) Authentication & authorization between organizations and companies. Essentially, same thing under the covers § Source: RSA Security, http://www.rsasecurity.com/go/google/fed_id/redirect.html

Federated identity Use case 1: Travel model Internet / Internet / B intranet intranet 3rd-party Business Logic End user HTTP Web Page HTTP XML SOAP Web Services B2B, B2C, B2E Provider A conducts business with B on behalf of end user Traditional back-office functions, but in real time Reference model: Travelocity®

Federated identity Use case 2: Portal model B provides service or collaborative content for A Transparent to the end user. Reference model: MapQuest® in Yahoo!® portal HTTP B Internet / intranet Web Page End user HTTP XML SOAP B2B, B2C, B2E Internet / intranet B Business Logic 3rd-party Web Services Provider

Federated identity Use case 3: Single sign-on model A redirects user to B B trusts A’s authentication “Single sign-on” (a.k.a. Cross-company authentication, federated identity.) Reference model: Private label banking HTTP XML SOAP SAML HTTP XML SOAP SAML HTTP XML SOAP SAML

Web services implications Extensible access portals for legacy business logic and processes Ability to react to the market very quickly Changes to core business applications are immediately available to trading partners, vendors, customers and regulators Business velocity without roadblocks of building extensive GUI presentation layers

Web services introduces Cross-company authentication For selected interfaces: Other business partners trust your authentications, and… Your organization trusts the authentications provided by others.

SAML provides framework for cross-company authentication SAML: Security Assertions Markup Language Lightweight protocol to exchange security assertions & artifacts Can be signed for self-validating assertion Permits partners to exchange assertions about authentication and authorization of users

SAML SAML has 4 major components: Assertions Authentication assertions Attribute assertions Authorization decision assertions Request / response protocol – SOAP over HTTP Bindings – how SAML requests maps to transport protocols (such as SOAP) Profiles – how SAML assertions are embedded or transported between parties

SAML (2) POST /SamlService HTTP/1.1 Host: www.example.com Content-Type: text/xml Content-Length: nnn SOAPAction: http://www.oasis-open.org/committees/security <SOAP-ENV:Envelope xmlns:SOAP-ENV=”http://schemas.xmlsoap.org/soap/envelope/”> <SOAP-ENV:Body> <samlp:Request xmlns:samlp:=”…” xmlns:saml=”…” xmlns:ds=”…”> <ds:Signature> … </ds:Signature> <samlp:AuthenticationQuery> … </samlp:AuthenticationQuery> </samlp:Request> </SOAP-ENV:Body> </SOAP-ENV:Envelope> Source: OASIS - http://www.oasis-open.org/committees/security/docs/cs-sstc-bindings-00.doc

SAML provides transaction trust Protocols providing trust Enterprise Line of business No existing protocol Business function Session SSL / TLS / IPsec / Kerberos Session SAML / WS-Security XML-DSig / Passport Messages / Transactions

Nationwide & CCA timeline 2000-2001 Implemented several federated identity solutions Used proprietary artifacts & communication session solutions Worked well, but…. Unique “one-off” solutions Lacked standards for standard implementation, extensive re-work

Nationwide & CCA timeline (2) 2002 Resolved to adopt a standards-based federated identity solution Investigated several federated identity standards SAML selected as best SSO authentication solution at the time Joined Liberty Alliance as Associate Member

Nationwide & CCA Timeline (3) 2002 Determined three viable directions: Web Access Mgmt (WAM) middleware Adding SAML parsing to existing application(s) Building own assertion generator & parser Investigated the market for vendor best suited to deliver SAML-based solution Established contract with WAM vendor Built first SAML implementation for SSO

Nationwide: First SAML cross-company SSO Launched January, 2003 First commercial use of SAML for SSO Three business partners Nationwide provides portal, authentication & authorization for both other partners Internet / intranet Nationwide End user B2B, B2C, B2E 1 Link redirect 2 4 redirect 3 AuthN AuthZ Financial Aggregator Financial Services Company

Nationwide: First SAML cross-company SSO Launched January, 2003 First commercial use of SAML for SSO Three business partners Nationwide provides portal, authentication & authorization for both other partners. Nationwide 3 4 redirect Internet / 1 intranet 6 redirect Link 2 5 End user AuthN AuthZ B2B, B2C, B2E Financial Aggregator Financial Services Company

Challenges Complexity Business issues Federation Weakest link Business trust models

Complexity Corporate 3-tier Web architectures are already complex Federated SSO adds significant complexity in coupling: Existing infrastructure Web Access Mgmt (WAM) middleware Web services interfaces New infrastructure Cross-company functionality

Complexity (2) Complexity requires technical sophistication on both sides of the relationship Developers need to understand: SAML Web services WAM Encryption Architects need to understand: Identity Management Authentication/authorization models

Complexity (3) Complexity extends to privacy and identity issues Privacy policy aggregation, demarcation Need to involve CPO, General Counsel Identity management issues Legal contract & business agreement: Roles & responsibilities Vendor management Procedures for validating trust

Business issues The technology is moderately complex. Trust & policies are harder. Closer to a wedding than a business relationship Nationwide’s solution: Certification & accreditation process Reference Architecture Strong 3-tier infrastructure architecture Forward-looking standards for trust governance

Federation Interoperability of identity frameworks Tough to do between existing corporate legacy applications Even tougher between disparate organizations Deep dive on assumptions, standards, vetting Must scale and scope to business context

Weakest link Security posture differences must be determined & governed. Alignment of reference architecture Policy & standards matrix comparison Establishment of CCA standards SLA & performance weakest link If your SLA is 7x24, and your partner’s SLA is 5x10, how will you provide 7x24?

SAML provides transaction trust Protocols providing trust Enterprise Line of business No existing protocol Business function Session SSL / TLS / IPsec / Kerberos Session SAML / WS-Security XML-DSig / Passport Messages / Transactions

Web services introduces cross-company authentication For selected interfaces: Other business partners trust your authentications, and… Your organization trusts the authentications provided by others.

What now? The Interconnectedness of all things…

Business trust models Recognized needs: Result: CCA standards Ongoing contractual compliance Continual determination of trustworthiness Legal implications of trust model Result: CCA standards Development of XotaSM protocol XotaSM is a service mark of Nationwide Mutual Insurance Company. Patent Pending.

XotaSM Combination of protocol & methodology Permits determination of trustworthiness in real time between business partners Trust governance at the transaction level Continuous assessment of contractual and regulatory compliance Nationwide is establishing a consortium XotaSM is a service mark of Nationwide Mutual Insurance Company. Patent Pending.

Surprises Troubleshooting with ½ the data Missing standards & solutions Interoperability Human factors

Troubleshooting SAML consists of HALF transactions: Asserting party  Relying party Troubleshooting with only half the data! Complexity and cross-disciplinary issues Coordinated helpdesk an issue Log sharing, aggregation Time synchronization an issue

Missing standards & solutions SAML has some gaps No SAML session management No support for timeout, logoff “rollup” Had to develop own session management and session timeout protocol Middleware gaps No signed SAML support in middleware Lack of 3-tier architecture support

Session management issues Cookie forces session timeout – user must re-authenticate User is redirected back to Nationwide gets SAML assertion Goes through SAML authentication process again Nationwide 3 4 redirect Internet / 1 intranet 6 redirect Link 2 5 End user AuthN AuthZ B2B, B2C, B2E Financial Aggregator Financial Services Company

Interoperability Authentication & authorization required for both the business partners and users SAML provides user authentication No protocol support for partner connection authentication, authorization Each partner connection model unique Bleeding-edge implementation preceded Web services protocol standards

Human factors Communications Issues Users unaware of SSO implementation: Sensitive to performance lag Multiple resubmits Question lack of sign-on – “Is security broken?” Deep bookmarking Users will bookmark relying party sites Persistent cookie that identifies user as CCA user?

Lessons learned Have a good partner relationship with WAM vendor(s) Business issues as significant as technology issues Lightweight implementation toolkit required for smaller partners Trust modeling important consideration

Benefits achieved Federated identity provides flexible, adaptable solutions for SSO Ability to use infrastructure for affiliates, other contexts If you build it, they will come Federated identity works reliably Use of standards, such as SAML, pays off in 2nd, 3rd implementations

Q&A Questions?

OASIS http://xml.coverpages.org/saml.html Further information Best resources: OASIS http://xml.coverpages.org/saml.html Liberty Alliance http://projectliberty.org Contact information: Dan Houser, MBA, CISSP, CCP Security Architect Nationwide (614) 249-6639 houserd1@nationwide.com

Thank you. Questions, comments? Mr. Houser will not be available to answer questions at the Ask-the-Experts booth in the Exhibit Hall. Please send question to jglossner@techtarget.com.