Central Authentication Service (CAS). What is CAS? JA-SIG Central Authentication Service is an enterprise level, open-source, single sign on solution.

Slides:



Advertisements
Similar presentations
Open-source Single Sign-On with CAS (Central Authentication Service)
Advertisements

Open-source Single Sign-On with CAS (Central Authentication Service) Pascal Aubry, Vincent Mathieu & Julien Marchal Copyright © 2004 – ESUP-Portail consortium.
Enabling Secure Internet Access with ISA Server
Central Authentication Service Roadmap JA-SIG Winter 2004.
Security Protocols Sathish Vadhiyar Sources / Credits: Kerberos web pages and documents contained / pointed.
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
CAS-NG A small enhancement to CAS 3 to provide new services.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
UAG Authentication and Authorization- part1
Forms Authentication, Users, Roles, Membership Ventsislav Popov Crossroad Ltd.
MyProxy: A Multi-Purpose Grid Authentication Service
Grid Security. Typical Grid Scenario Users Resources.
Online Security Tuesday April 8, 2003 Maxence Crossley.
UPortal and the Yale Central Authentication Service Drew Mazurek ITS Technology & Planning Yale University JA-SIG Summer Conference ‘04 Denver, CO June.
UPortal Security and CAS Susan Bramhall ITS Technology & Planning Yale University.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
SE-2840 Dr. Mark L. Hornick1 Java Servlet-based web apps Servlet Architecture.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP does not maintain state. State Information can be passed using: HTTP Headers.
Making Apache Hadoop Secure Devaraj Das Yahoo’s Hadoop Team.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 4 Web technologies: HTTP, CGI, PHP,Java applets)
Open Source Server Side Scripting ECA 236 Open Source Server Side Scripting Cookies & Sessions.
The Central Authentication Service (CAS) Shawn Bayern Research programmer, Yale University Author, JSTL in Action, Web Development with JavaServer Pages.
System Architecture.  Windows Phone 7  Mobile Phone Application  User – End Perspective  Google App Engine  Administration Console  Handles authentication,
Penetration Testing James Walden Northern Kentucky University.
WaveMaker Visual AJAX Studio 4.0 Training Authentication.
11/16/2012ISC329 Isabelle Bichindaritz1 Web Database Application Development.
Chapter 17 - Deploying Java Applications on the Web1 Chapter 17 Deploying Java Applications on the Web.
Server-Side Scripting with Java Server Page, JSP ISYS 350.
Standalone Java Application vs. Java Web Application
Kerberos: An Authentication Service for Open Network Systems Jennifer G. Steiner Clifford Neuman Jeffrey I. Schiller.
FIspace SPT Seyhun Futaci. Technology behind FIspace Authentication and Authorization IDM service of Fispace provides SSO solution for web apps, mobile.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
Oracle Application Express Security. © 2009 Oracle Corporation Authentication Out-of-the-Box Pre-Configured Schemes LDAP Directory credentials Oracle.
Project Server 2003: DC340: Security (Part 1 of 2): How to securely deploy Project Server in an enterprise environment Pradeep GanapathyRaj (PM), Karthik.
12/3/2012ISC329 Isabelle Bichindaritz1 PHP and MySQL Advanced Features.
 This guide will cover the process of connecting to VPN Server with the Desktop Client.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
An Overview of Single Sign-On, Federation, Its Benefits, and Basic Procedures for Integrating Applications.
Module 11: Securing a Microsoft ASP.NET Web Application.
SQL INJECTIONS Presented By: Eloy Viteri. What is SQL Injection An SQL injection attack is executed when a web page allows users to enter text into a.
Copyright © 2002 ProsoftTraining. All rights reserved. JavaServer Pages.
Web Database Programming Week 7 Session Management & Authentication.
Cookies and Sessions IDIA 618 Fall 2014 Bridget M. Blodgett.
Web Technologies Interactive Responsiveness Function Hypertext Web E-Publishing Simple Response Web Fill-in Forms Object Web « Full-Blown » Client/Server.
UMBC’s WebAuth Robert Banz – UMBC
PHP Secure Communications Web Technologies Computing Science Thompson Rivers University.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
1 State and Session Management HTTP is a stateless protocol – it has no memory of prior connections and cannot distinguish one request from another. The.
15 Copyright © 2004, Oracle. All rights reserved. Adding JAAS Security to the Client.
Securing Web Applications Lesson 4B / Slide 1 of 34 J2EE Web Components Pre-assessment Questions 1. Identify the correct return type returned by the doStartTag()
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
Introducing the Central Authentication Service (CAS) Shawn Bayern Research programmer, ITS Technology & Planning Author, Web Development with JavaServer.
ASP.NET 2.0 Security Alex Mackman CM Group Ltd
CAS Proxying and Web Services The somewhat “easy way” Presented By: Joseph Mitola Programmer/Analyst Office Of The Registrar.
Session 29 Design of a Web Application Written by Thomas A. Pender Published by Wiley Publishing, Inc. November 2, 2011 Presented by Hyewon Kim.
Dr. Nermi hamza.  A user may gain access to a particular workstation and pretend to be another user operating from that workstation.  A user may eavesdrop.
Presented by Deepak Varghese Reg No: Introduction Application S/W for server load balancing Many client requests make server congestion Distribute.
CS 562 Advanced Java and Internet Application Computer Warehouse Web Application By Team Alpha :-  Puja Mehta (102163)  Mona Nagpure (102147)
Srinivas Balivada USC CSCE548 07/22/2016.  Cookies are generally set server-side using the ‘Set-Cookie’ HTTP header and sent to the client  In PHP to.
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Single Sign-On Led by Terrice McClain, Jen Paulin, & Leighton Wingerd
Web Systems Development (CSC-215)
uPortal Security and CAS
Objectives In this lesson you will learn about: Need for servlets
Central Authentication Service
Back end Development CS Programming Languages for Web Applications
Back end Development CS Programming Languages for Web Applications
Presentation transcript:

Central Authentication Service (CAS)

What is CAS? JA-SIG Central Authentication Service is an enterprise level, open-source, single sign on solution with a Java server component and various client libraries written in a multitude of languages including PHP, PL/SQL, Java, and more. CAS is a http based protocol that requires each of its components to be accessed through different URIs.

What is Single Sign On? Single sign on is a session/user authentication process that allows a user to provide his or her credentials once in order to access multiple applications. The single sign on authenticates the user to access all the applications he or she has been authorized to access.

List of URIs to access CAS. /login Parameters: service, renew, gateway, warn /logout Parameters: url /validate Parameters: service, ticket, renew /serviceValidate Parameters: service, ticket, pgtUrl, renew /proxy Parameters: pgt, targetService /proxyValidate Parameters: service, ticket, pgtUrl, renew

Tickets generated by CAS Ticket-granting Ticket Service Ticket Proxy Ticket Proxy-granting Ticket Proxy-granting Ticket IOU Login Ticket

Ticket-granting Ticket Ticket granting ticket will be generated when the /login url is passed to CAS server and the credentials provided are successfully authenticated. A TGT is the main access into the CAS service layer. TGT is an opaque string that contains secure random data and must begin with TGT-. TGT will be added to an HTTP cookie upon the establishment of single sign-on and will be checked further when different applications are accessed

Service Ticket The service ticket (ST) will be generated when the CAS url contains service parameter and the credentials passed are successfully authenticated. Service ticket is an opaque string that is used by client as a credential to obtain access to a service. Service ticket must begin with ST-

Proxy Ticket In CAS, proxy is a service that wants to access other services on behalf of a particular user. Proxy tickets (PT) are generated from CAS upon a services presentation of a valid Proxy granting Ticket (PGT), and a service identifier for the back-end service to which it is connecting. PT are only valid for the service identifier specified to /proxy url when they were generated. Proxy tickets should begin with the characters, PT-.

Proxy-granting Ticket Proxy-granting tickets are obtained from CAS upon validation of a service ticket or a proxy ticket. If a service wishes to proxy a client's authentication to a back-end service, it must acquire a proxy-granting ticket. Acquisition of this ticket is handled through a proxy callback URL. This URL will uniquely and securely identify the back-end service that is proxying the client's authentication. The back-end service can then decide whether or not to accept the credentials based on the back-end service's identifying callback URL.

Proxy-granting Ticket IOU A proxy-granting ticket IOU is an opaque string that is placed in the response provided by /serviceValidate or /proxyValidate used to correlate a service ticket or proxy ticket validation with a particular proxy-granting ticket. Proxy-granting ticket IOUs SHOULD begin with the characters, "PGTIOU-".

Login Ticket A login ticket is a string that is generated by /login as a credential requestor and passed to /login as a credential acceptor for username/password authentication. Its purpose is to prevent the replaying of credentials due to bugs in web browsers. Login tickets SHOULD begin with the characters, "LT-".

CAS Architecture

URIs to access admin features /services/manage.html /services/add.html /services/edit.html /services/logout.html /services/deleteRegisteredService.html

Conventions used in next slides. TGT – Ticket Granting Ticket ST – Service ticket PGT – Proxy granting ticket PGTIOU – Proxy granting ticket IOU (I Owe U) Action boxes colored in red – The action mentioned in these boxes will happen at CAS client and has to be coded by developer in the filter/servlet/jsp. Action box colored in sea blue – this action is explained in detail in another slide. Rectangular box with URI mentioned before InitialState – The URI that need to be called for the actions in the activity diagram to happen