Shibboleth Update RL “Bob” Morgan, Washington Steven Carmody, Brown Scott Cantor, Ohio State Marlena Erdos, IBM/Tivoli Michael Gettes, Georgetown Keith.

Slides:



Advertisements
Similar presentations
Internet2 Shibboleth Project TERENA Networking Conference 2002, Limerick, Ireland RL “Bob” Morgan, Washington Steven Carmody, Brown Scott Cantor, Ohio.
Advertisements

Inter-Institutional Registration UNC Cause December 4, 2007.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Welcome to CAMP Shibboleth Ken Klingenstein, Director, Internet2 Middleware Initiative.
Shibboleth: How It Relates to SAML Marlena Erdos Aug 27, 2001.
ICDL 2004, New Delhi1 Access Management for Digital Libraries in a well-connected World John Paschoud SECURe Project London School of Economics Library.
Attributes, Anonymity, and Access: Shibboleth and Globus Integration to Facilitate Grid Collaboration 4th Annual PKI R&D Workshop Tom Barton, Kate Keahey,
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
Shibboleth Update a.k.a. “shibble-ware”
InCommon Policy Conference April Uses  In order to encourage and facilitate legal music programs, a number of universities have contracted with.
Administrative Information Systems Shibboleth: The Next Generation ISIS Technical Information Session for Developers Datta Mahabalagiri March
Shibboleth 2.0 : An Overview for Developers Scott Cantor The Ohio State University / Internet2 Scott Cantor The Ohio.
Shibboleth: New Functionality in Version 1 Steve Carmody July 9, 2003 Steve Carmody July 9, 2003.
Project Shibboleth Update, Demonstration and Discussion Michael R Gettes Duke University (on behalf of the entire shib team!!!) June.
SWITCHaai Team Federated Identity Management.
Shibboleth-intro-dec051 Shibboleth A Technical Overview Tom Scavo NCSA.
3 September 2015 Federated R US. Agenda  Background on Internet2 Middleware and NSF Middleware Initiative  The body of work  Directories  Shibboleth.
Shib in the present and the future Ken Klingenstein Director, Internet2 Middleware and Security.
3 Nov 2003 A. Vandenberg © Second NMI Integration Testbed Workshop on Experiences in Middleware Deployment, Anaheim, CA 1 Shibboleth Pilot Local Authentication.
Mairéad Martin The University of Tennessee September 13, 2015 Federated Digital Rights Management.
TNC2004 Rhodes 1 Authentication and access control in Sympa mailing list manager Serge Aumont & Olivier Salaün May 2004.
Shibboleth: Installation and Deployment Scott Cantor July 29, 2002 Scott Cantor July 29, 2002.
Shibboleth Update Michael Gettes Principal Technologist Georgetown University Ken Klingenstein Director Interne2 Middleware Initiative.
David L. Wasley Office of the President University of California Shibboleth Safe delivery of reliable authorization data David L. Wasley University of.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
Shibboleth A Federated Approach to Authentication and Authorization Fed/Ed PKI Meeting June 16, 2004.
Internet2 CAMP Shibboleth Scott Cantor (Hey, that’s my EPPN too.) Tom Dopirak Scott Cantor (Hey, that’s my.
Social Identity Working Group Steve Carmody. Agenda Intro to Using Social Accounts Status and Recent News –Current UT Pilot –Current InCommon Pilot with.
Shibboleth Update Advanced CAMP 7/31/02 RL “Bob” Morgan, Washington Steven Carmody, Brown Scott Cantor, Ohio State Marlena Erdos, IBM/Tivoli Michael Gettes,
Shibboleth A word which was made the criterion by which to distinguish the Ephraimites from the Gileadites. The Ephraimites, not being able to pronounce.
Shibboleth Authenticate Locally, Act Globally A Penn State Case Study Renee’ Shuey May 4, 2004 ITS – Emerging Technologies.
Shibboleth: An Introduction
MAT U M A T U Middleware Assisted Take-Up Service For JISC Funded Early Adopters.
Internet2 Middleware Initiative Shibboleth Ren é e Shuey Systems Engineer I Academic Services & Emerging Technologies The Pennsylvania State University.
US of A and A Activities Ken Klingenstein, Director Internet2 Middleware Initiative.
Shibboleth: Status and Pilots. The Golden Age of Plywood.
Project Shibboleth Update, Demonstration and Discussion Michael Gettes May 20, 2003 TERENA Conference, Zagreb, Croatia Michael Gettes.
The Golden Age of Plywood Ken Klingenstein Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder.
Shibboleth: Installation and Deployment Scott Cantor July 29, 2002 Scott Cantor July 29, 2002.
Shibboleth: Technical Architecture Marlena Erdos and Scott Cantor Revised Oct 2, 2001 Marlena Erdos and Scott Cantor Revised Oct 2, 2001.
1 Protection and Security: Shibboleth. 2 Outline What is the problem Shibboleth is trying to solve? What are the key concepts? How does the Shibboleth.
Shibboleth A word which was made the criterion by which to distinguish the Ephraimites from the Gileadites. The Ephraimites, not being able to pronounce.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
February 1, 2002 Internet2 Middleware Initiative and MACE RL "Bob" Morgan, University of Washington.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Shibboleth Middleware Project Tivoli - Update Mark Simpson - IBM/Tivoli October 4, 2001 Internet 2 Fall Member’s Meeting.
Shibboleth Trust Model Shibboleth/SAML Communities (aka Federated Administrations) Club Shib Club Shib Application process Policy decision points at the.
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
Middleware CAMP Feb Welcome Welcome to the Camp, I guess you all know why we're here. Tommy, by Pete Townsend, The Who We're not gonna take it Never.
Shibboleth: Overview and Status The Shibboleth Architecture Team.
JISC Shibboleth Briefing, 12-Mar Everything I always wanted to know about Shibboleth John Paschoud SECURe Project, LSE Library …but was afraid to.
Shibboleth Update January, 2001 Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of Colorado at Boulder.
InCommon® for Collaboration Institute for Computer Policy and Law May 2005 Renee Shuey Penn State Andrea Beesing Cornell David Wasley Internet 2.
October 2, 2001 Middleware: Pieces and Processes RL "Bob" Morgan, University of Washington.
Shibboleth Authenticate Locally, Act Globally A Penn State Case Study.
2-Oct-0101 October 2001 Directories as Middleware Keith Hazelton, Senior IT Architect University of Wisconsin-Madison Keith Hazelton, Senior IT Architect.
Shibboleth at USMAI David Kennedy Spring 2006 Internet2 Member Meeting, April 24-26, 2006 – Arlington, VA.
Welcome to CAMP Directory Workshop Ken Klingenstein, Internet2 and University of Colorado-Boulder.
Shibboleth 1.2 Technical Overview “So you thought 1.1 was complicated…” Scott Cantor The Ohio State University and Internet2 Scott Cantor.
01 October 2001 “...By Any Other Name…”. Consequences and Truths (Ken) The Pieces and the Processes (Bob) Directories (Keith) Shibboleth and SAML (Scott)
Access Policy - Federation March 23, 2016
Vidmid Session Overview
Shibboleth Project at GSU
Current Activities in Middleware
Shibboleth Update a.k.a. “shibble-ware”
Michael R Gettes, Duke University On behalf of the shib project team
Federated Digital Rights Management
Shibboleth Deployment Overview
Shibboleth: Status and Pilots
Presentation transcript:

Shibboleth Update RL “Bob” Morgan, Washington Steven Carmody, Brown Scott Cantor, Ohio State Marlena Erdos, IBM/Tivoli Michael Gettes, Georgetown Keith Hazelton, Wisconsin David Wasley, UCOP Ken Klingenstein, Director Internet2 Middleware Initiative

Outline Background What is Shibboleth? Shibboleth Communities of Interest Shibboleth and PKI Shibboleth and SAML and WebSSO Using Shibboleth Shibboleth milestones Roll-out plan and next steps Getting ready

MACE (Middleware Architecture Committee for Education) Purpose - to provide advice, create experiments, foster standards, etc. on key technical issues for core middleware within higher education Membership - Bob Morgan (UW) Chair, Scott Cantor (Ohio State), Steven Carmody (Brown), Michael Gettes (Georgetown), Keith Hazelton (Wisconsin), Paul Hill (MIT), Jim Jokl (Virginia), Mark Poepping (CMU), Bruce Vincent (Stanford), David Wasley (California), Von Welch (Grid) European members - Brian Gilmore (Edinburgh), Ton Verschuren (Netherlands) Creates working groups in major areas, including directories, interrealm access control, PKI, medical issues, etc. Works via conference calls, s, occasional serendipitous in- person meetings...

Shibboleth A word which was made the criterion by which to distinguish the Ephraimites from the Gileadites. The Ephraimites, not being able to pronounce sh, called the word sibboleth. See --Judges xii. Hence, the criterion, test, or watchword of a party; a party cry or pet phrase. - Webster's Revised Unabridged Dictionary (1913):Webster's Revised Unabridged Dictionary (1913)

Shibboleth - What is it? An initiative to develop an architecture, policy framework, and practical technologies to support inter-institutional sharing of resources Will provide for the secure exchange of interoperable attributes which can be used in access control decisions Controlled dissemination of attribute information, based on administrative defaults and user preferences Shifts the model from passive privacy towards active privacy Based on a federated administration trust framework Vendor participation - IBM/Tivoli Standards Alignment - OASIS/SAML Open solution(protocols and messages documented rfc-style, open source implementation available)

Shibboleth - Why is it Needed? Growing interest in collaboration and resource sharing among institutions Provides ability to make access control decisions in a cross domain environment Current approaches to problem (IP address filtering, identity matching, use of shared ids) have serious problems Shibboleth will involve more than the architecture/implementation developed by the SAML participants (eg community-of-interest, privacy)

Founding assumptions Leverage vendor and standards activity wherever possible (OASIS/SAML ), but recognize distinctive business needs. Federated Administration (Initially) disturb as little of the existing campus infrastructure as possible Work with common, minimal authorization systems (eg htaccess) Encourage good campus behaviors Learn through doing There is very little experience with systems that allow users to manage the release of attribute information Create a marketplace and reference implementations

Stage 1 - Addressing Three Scenario’s Member of campus community accessing licensed resource Anonymity required Member of a course accessing remotely controlled resource Anonymity required Member of a workgroup accessing controlled resources Controlled by unique identifiers (e.g. name) Taken individually, each of these situations can be solved in a variety of straightforward ways. Taken together, they present the challenge of meeting the user's reasonable expectations for protection of their personal privacy.

Architectural Model Browser User’s Origin Site Responsible for Authentication Origin Site Entity Willing to Create and Sign Assertions Set of assertions about the user (Attribute/value pairs) User has control over disclosure Identity optional “active member of community”, “Associated with Course XYZ” Target responsible for Authorization Rules engine Matches contents of assertions against ruleset associated with target object Cross Domain Trust Implemented in communities Previously created between origin and target Perhaps there is a contract (information providers..)

Authorization Attributes Affiliation EPPN Entitlement OrganizationalUnit EnrolledCourse “active member of the community” Urn:mace:infovendor:contract1234 Economics Department Physics 201 Typical Assertions in the Higher Ed Community

Implications of Shibboleth Design Choices Support all 3 scenarios (not just the library problem) -> need a mechanism to manage attribute release Focus on Privacy Protection Both sites and users need to manage attribute release Assume Origin Site Authenticates User Origin Site needs enterprise level authentication mechanism Should have Web Single Signon system Target Site Authorizes User Need Trust Framework Need agreement on syntax and semantics of attributes (eduPerson, custom agreements between pairs of sites)

Federated Administration Origin Site Must have joined the appropriate communities May have created “reasonable” default attribute release policies Responsible for Identifying and registering users Responsible for Authenticating users Browser User May have created specific attribute release policies Target Resource Manager Manage policies governing access to the resource

Simple point-to-point model client Enterprise LDAP directory Attribute authority Authentication Service target Attribute requestor Policv decision point Policy enforcement point Policy enforcement point Policy enforcement points Video directory Service discovery service Protocols Grid directory Video directory Enterprise LDAP directory

Target Web Server Origin Site Target Site Browser Authentication Phase First Access - Unauthenticated Authorization Phase Pass content if user is allowed Shibboleth Architecture Concepts - High Level

Second Access - Authenticated Target Web Server Origin Site Target Site Browser First Access - Unauthenticated Web Login Server Redirect User to Local Web Login Ask to Obtain Entitlements Pass entitlements for authz decision Pass content if user is allowed Authentication Attribute Server Entitlements Auth OK Req Ent Ent Prompt Authentication Phase Authorization Phase Success! Shibboleth Architecture Concepts (detail)

Shibboleth Flows Draft

Detailed Component Descriptions Attribute Authority Handle Server SHIRE SHAR WAYF

Establishing a User Context

Getting Attributes and Determining Access

SHIRE Indexical Reference Establisher Destination site component responsible for context/session establishment When there is no active session, redirects browser user to the WAYF

WAYF Where are You From? The WAYF is the transition point from destination to origin site HS when users contact a destination first. Users can respond to the WAYF by indicating in “colloquial” fashion which institution can authenticate them. The WAYF will determine the URL of the appropriate HS based on the user’s input. A variety of nasty semantic attacks lurk!

Handle Server Works with AA and local Web ISO system to associate a query handle with an authenticated browser user and generate a signed assertion Performs its work in response to an Attribute Query Handle Request (currently an unauthenticated HTTP GET) AQHR contains SHIRE URL for acceptance of response via HTTP POST URL of desired resource/service at destination

SHIRE Indexical Reference Establisher Destination site component responsible for context/session establishment Session establishment will commonly rely on traditional techniques (i.e. cookies). The SHIRE accepts an assertion from a HS and associates the incoming handle with the session it creates.

SHAR Attribute Requester A SHAR makes attribute requests using the handle given it by the SHIRE. Upon receiving a response (AQR), the SHAR… …authenticates the response …extracts the attributes …checks attribute acceptance e.g. can an AA at MIT issue attributes for Harvard?

Attribute Authority Responds to Attribute Query Messages (AQM) from SHAR Allows for specification and management of ARPs Not a directory, but works with institutional directories and databases to aggregate and export attributes in a controlled fashion

IBM Interest Provides “Federated” administrative model (as apposed to centralized or delegated) Leaves administration of user and authenticating user to requester’s site Leverages existing authentication/directory infrastructure Privacy of requester preserved Leverages SAML standard and will be one of its first “proof points” Applies to B2B environments beyond current scope and definition

IBM and Tivoli’s commitment IBM/Tivoli has been contributing to the architecture and design for over a year IBM/Tivoli is committed to contributing to an open source implementation Prototype underway IBM/Tivoli is committed to continuing to drive ubiquitous Security standards Shibb is based on existing standards where they exist SAML, etc...

Shibboleth (and SAML) Communities of Interest (COI) (Ken Klingenstein)

D. Wasley’s PKI Puzzle

Shibboleth and PKI Complimentary infrastructures wrt technology and policy Technically, Shibboleth leverages existing campus authentication processes (and can use end-entity certificates for this process) Shibboleth uses PKI to implement a multi-domain trust model Shibboleth’s primary use is for authorization and privacy PKI’s primary use is establishing identity across domains PKI can use Shibboleth to achieve privacy and authorization Policy, Shibboleth establishes a collaborative trust model (flexible, quick, privacy- enabled, etc.) PKI establishes a legal trust model (binding, hierarchical, formal, etc.)

Shibboleth and SAML and WebISO (R.L. “Bob” Morgan)

What Will it be Like to Use Shibboleth? Sample Browser Screens are available at: Actual user interface being designed by five higher ed Schools of Information

Use - Go Directly To Target

Use - Specify Origin Site

Use - Local Authentication

Use - Target Page Displayed!

Use - Local Navigation Site

Use - “in the background”

Use - Target Page Displayed!

Milestones Project formation - February 2000 Stone Soup Process - began late summer 2000 with Tivoli commitment (Marlena Erdos), project leadership fall (Steven Carmody), bi- weekly calls and scenario, requirements and architecture development Linkages to SAML established December 2000 (consistent architecture and distinguished territory) Architecture and protocol completion - Aug, 2001 Design - Oct 2001 Coding begins - Nov 2001

Roll-out plan Basic coding stage through February 2002 Alpha pilots Feb and March 2002 Code rewrites March April Beta pilots - April May General release - June, 2002 Release issues: open-source license approach distribution - Apache and other components CVS, Bugtraq, and source/enhancement management

Coding stage Three coding teams: CMU - origin IBM/Tivoli - target OSU - libraries Approach is to integrate hard-wired components and then progressively replace hard-wiring with code Dec, Jan, Feb - finish coding, testing End of february - packaging End of Feb - March - deploy code to early pilot sites

Profile of Pilot Sites Member of campus community accessing licensed resource University hosting licensed DBs accessed from other universities Talking to several commercial vendors (they need “their customers” asking for this functionality…) Member of a course accessing remotely controlled resource Web based testing Clearinghouse for curriculum packages Web based tools used in courses Member of a workgroup accessing controlled resources Multi-institution project teams

Some of the pilots Webassign Penn State Univ of Delaware - Problem Based Learning Clearinghouse EDINA (UK) London School of Economics

Getting Ready As a Target think through web services architecture examine contracts with origins for attribute requirements, business rules and marketing options As an Origin implement enterprise authentication infrastructure implement eduPerson in enterprise directory work with vendors to educate and take advantage ??

Identity Services on One Slide Campus authentication Enterprise directory Web services and servers WebISO Learning Management Systems Personal Portals Objectclass standards (e.g.eduperson, gridperson) Content Portals Shibboleth exchange of attributes Future PKI DODHE et al Future PKI Interrealm Security Domain Grids et al

Middleware Inputs & Outputs Grids JA-SIG & uPortalOKIInter-realmcalendaring Shibboleth, eduPerson, Affiliated Directories, etc. EnterpriseDirectoryEnterpriseAuthenticationLegacySystemsCampus web SSO futures EnterpriseauthZ LicensedResourcesEmbedded App Security Shibboleth, eduPerson, and everything else