An XML based Security Assertion Markup Language

Slides:



Advertisements
Similar presentations
SAML CCOW Work Item: Task 2
Advertisements

XML Standards Architect
A brief look at the WS-* framework Josh Howlett, JANET(UK) TF-EMC2 Prague, September 2007.
Step Up Authentication in SAML (and XACML) Hal Lockhart February 6, 2014.
Integration Considerations Greg Thompson April 20 th, 2006 Copyright © 2006, Credentica Inc. All Rights Reserved.
Saml-v2_0-intro-dec051 Security Assertion Markup Language An Introduction to SAML 2.0 Tom Scavo NCSA.
1 Security Assertion Markup Language (SAML). 2 SAML Goals Create trusted security statements –Example: Bill’s address is and he was authenticated.
Will Darby April  What is Federated Security  Security Assertion Markup Language (SAML) Overview  Example Implementations  Alternative.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Authz work in GGF David Chadwick
Web Services and the Semantic Web: Open Discussion Session Diana Geangalau Ryan Layfield.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
SAML basics A technical introduction to the Security Assertion Markup Language Eve Maler XML Standards Architect XML Technology Center Sun Microsystems,
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
Carl A. Foster.  What is SAML?  Security Assertion and Markup Language is an XML-based standard for exchanging authentication and authorization between.
Applied Cryptography Week 13 SAML Applied Cryptography SAML and XACML Mike McCarthy Week 13.
Copyright B. Wilkinson, This material is the property of Professor Barry Wilkinson (UNC-Charlotte) and is for the sole and exclusive use of the students.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
A Use Case for SAML Extensibility Ashish Patel, France Telecom Paul Madsen, NTT.
IDENTITY MANAGEMENT Hoang Huu Hanh (PhD), OST – Hue University hanh-at-hueuni.edu.vn.
Shibboleth-intro-dec051 Shibboleth A Technical Overview Tom Scavo NCSA.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
SAML Conformance Sub-Group Report Face-to-face meeting August 29, 2001 Bob Griffin.
Web Service Standards, Security & Management Chris Peiris
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
Catalyst 2002 SAML InterOp July 15, 2002 Prateek Mishra San Francisco Netegrity.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Saml-intro-dec051 Security Assertion Markup Language A Brief Introduction to SAML Tom Scavo NCSA.
Cross-Enterprise User Assertion IHE Educational Workshop 2007 Cross-Enterprise User Assertion IHE Educational Workshop 2007 John F. Moehrke GE Healthcare.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
October 2, 2001 SAML RL "Bob" Morgan, University of Washington.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
SAML CCOW Work Item HL7 Working Group Meeting San Antonio - January 2008 Presented by: David Staggs, JD CISSP VHA Office of Information Standards.
Catalyst 2002 SAML InterOp July 15, 2002 San Francisco.
Web Services Standards. Introduction A web service is a type of component that is available on the web and can be incorporated in applications or used.
17 March 2008 © 2008 The University of Edinburgh, European Microsoft Innovation Center and University of Southampton IT Innovation Centre 1 NextGRID Security.
Saml-v1_x-tech-overview-dec051 Security Assertion Markup Language SAML 1.x Technical Overview Tom Scavo NCSA.
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
SAML in Authorization Policies draft-guenther-geopriv-saml-policy-01.
SAML: An XML Framework for Exchanging Authentication and Authorization Information + SPML, XCBF Prateek Mishra August 2002.
WS-Trust “From each,according to his ability;to each, according to his need. “ Karl marx Ahmet Emre Naza Selçuk Durna
SAML in Authorization Policies draft-guenther-geopriv-saml-policy-00.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
W3C Web Services Architecture Security Discussion Kick-Off Abbie Barbir, Ph.D. Nortel Networks.
Workshop Presentation [1] Investigating Liberty Alliance and Shibboleth Integration Nishen Naidoo, Supervisor: Dr. Steve Cassidy.
Shibboleth: An Introduction
Semantic Web Technologies Research Topics and Projects discussion Brief Readings Discussion Research Presentations.
Access Control and Markup Languages Pages 183 – 187 in the CISSP 1.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
January 9, 2002 Security Assertion Markup Language (SAML) RL "Bob" Morgan, University of Washington.
Security Assertion Markup Language (SAML) Interoperability Demonstration.
Introduction To Data Standards eRA SBIR Public Briefing March 4, 2002
Linus Joyeux Valerie Alonso Managing consultantLead consultant blue-infinity (Switzerland) Active Directory Federation Services v2.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
SAML basics A technical introduction to the Security Assertion Markup Language Eve Maler XML Standards Architect XML Technology Center Sun Microsystems,
Workshop on Security for Web Services. Amsterdam, April 2010 Applying SAML to Identity Data Exchange.
August 3, 2004WSRP Technical Committee WSRP v2 leveraging WS-Security 1. Motivation 2. WS-Securtiy Roadmap and Status 3. WSRP Use Cases 4. Strawman/Issues.
Security Assertion Markup Language, v2.0 Chad La Joie Georgetown University / Internet2.
Fondation RESTENA euroCAMP 04 April 2006
Access Policy - Federation March 23, 2016
Federation made simple
HMA Identity Management Status
Prime Service Catalog 12.0 SAML 2.0 Single Sign-On Support
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Tim Bornholtz Director of Technology Services
InfiNET Solutions 5/21/
Presentation transcript:

An XML based Security Assertion Markup Language SAML An XML based Security Assertion Markup Language

Introduction XML standard for exchanging authentication and authorization data between security domains, i.e. identity provider and service provider. Solve the single sign-on (SSO) problem at intranet level using cookies. SAML assumes principal (user) is enrolled at least with one identity provider.

Why is SAML required ? Limitations of Browser cookies Cross-Domain SSO (CDSSO) problem SSO Interoperability SSO and CDSSO are completely proprietary Web Services Authentication/integrity services on an end-to-end basis Federation identity management across organizational boundaries to a single (or at least a reduced set) Federated Identity

SAML Use Cases There are 3 use cases in SAML: - Single sign-on (SSO) - Authorization service - Back office transaction Each use case have one or more scenarios that provide a more detailed roadmap of interaction

SSO Use Case Adaptation

Authorization Service Use Case Adaptation

Back Office Transaction Use Case Adaptation

SAML Overview Specification for exchanging authentication and authorization information using XML-based security - XML schema and definition for security assertions - XML schema and definition for a request/response protocol - Rules on using assertions with standard transport and messaging frameworks. Bindings and Profiles Emerging OASIS standard involving Vendors and Users Codifies current system outputs rather than inventing new technology

SAML Assertions Declaration of facts (statements) about a subject Contains multiple assertion statements Can be digitally signed 3 kinds of assertion statements related to security: 1. Authentication 2. Attribute 3. Authorization Decision

Common Information in all Assertions Issuer and issuance timestamp Assertion ID Subject Name and security domain Optional subject confirmation like public key Conditions under which assertion is valid Special conditions like – assertion validity period, audience restriction and target restriction SAML clients must reject assertions containing unsupported conditions.

Authentication Assertion The Issuing authority asserts that subject S, was authenticated by means M, at time T.

Attribute Assertion The Issuing authority asserts that subject S, is associated with attributes A, B,…, with values a, b, c.

Authorization Decision Assertion The Issuing authority decides whether to grant the request by subject S, for access type A, to resource R

Assertions - continued Assertions without the rest of the structure may be provided for existing tightly coupled environments who may need their own protocol. SAML is fully beneficial when parties with no direct knowledge of each other can interact via a third-party introduction

SAML Protocol simple request-response protocol <samlp:Request xmlns:samlp="urn:oasis:names:tc:SAML:1.0:protocol" MajorVersion="1" MinorVersion="1“ RequestID="..." IssueInstant="..."> <!-- insert other SAML elements here --> </samlp:Request> <samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:1.0:protocol" MajorVersion="1" MinorVersion="1“ ResponseID="...“ InResponseTo="..." IssueInstant="..."> <!-- insert other SAML elements here, including assertions --> </samlp:Response>

Authentication Assertion Request What are the authentication assertions which are available for this subject Successful responses are in the form of assertions containing an authentication statement It is assumed that the requester and responder have a trust relationship and are talking about the same subject

Authentication Assertion Request - example

Attribute Assertion Request The requested attribute is returned for this subject Response is in the form of an assertion containing attribute statement Requester can be denied access to some of the attributes and allowed access to a partial list of attributes

Attribute Assertion Request example

Authorization Decision Assertion Request Given the evidence is this subject allowed access to the specified resource in the specified manner with the given evidence? Response is in the form of an assertion containing an authorization decision statement

Authorization Decision Assertion Request example

Example Response

Protocol Binding and Profile Binding – mapping of SAML request/response message exchanges into standard communication protocols. SOAP-over-HTTP binding is the baseline Profile – describes how SAML assertions are embedded into and extracted from a framework or protocol. Web browser profile for SSO SOAP profile for securing SOAP payloads

SOAP-over-HTTP Binding SOAP is used as SAML request/response protocol transport mechanism

SOAP Profile SAML is used to provide assertions about a resource in the SOAP Body of the same document

Web Brower Profiles Assumptions Standard commercial browser and HTTP(S) User authenticated to local source site Assertion’s subject refers to the user What happens when user tries to access target site Tiny authentication assertion reference travels with request so real assertion can be de-referenced POST of real assertion can occur

SSO Pull Scenario Using Web Browser

SSO Pull Scenario Using Web Browser - explained Step 1 : Access inter-site transfer URL: User authenticated with http://Company.com Clicks on a link that looks like it will take the user to http://Travel.com/reserve_hotel.cgi It really takes the user to inter-site transfer URL: https://Company.com/intersite?Target=Travel.com/reserve_hotel.cgi Step 2 : Redirect with artifact: Reference to user’s authentication assertion generated as SAML “artifact” (8-byte base64 string) User redirected to assertion consumer URL, with artifact and target attached: https://Travel.com?Target=Travel.com/reserve_hotel.cgi&SAMLart=<artifact>

Back Office Transaction Scenario

References http://www.computerworld.com/developmenttopics/development/webdev/story/0,10801,73712,00.html http://www.simc-inc.org/archive0002/February02/devwed1015_rouault.pdf http://en.wikipedia.org/wiki/SAML http://xml.coverpages.org/saml.html http://xml.coverpages.org/SAML-TechOverviewV20-Draft7874.pdf