Comments on SAML Attribute Mgmt Protocol Contribution to OASIS Security Services TC Phil Hunt & Prateek Mishra

Slides:



Advertisements
Similar presentations
SAML CCOW Work Item: Task 2
Advertisements

OASIS OData Technical Committee. AGENDA Introduction OASIS OData Technical Committee OData Overview Work of the Technical Committee Q&A.
1© Nokia Siemens Networks SAML Name Identifier Request-Response Protocol Contribution to OASIS Security Services TC Christian Günther, Thinh Nguyenphu.
Eunice Mondésir Pierre Weill-Tessier 1 Federated Identity with Ping Federate Project Supervisor: M. Maknavicius-Laurent ASR Coordinator: G. Bernard ASR.
Saml-v2_0-intro-dec051 Security Assertion Markup Language An Introduction to SAML 2.0 Tom Scavo NCSA.
SOA and Web Services. SOA Architecture Explaination Transport protocols - communicate between a service and a requester. Messaging layer - enables the.
Access Control Patterns & Practices with WSO2 Middleware Prabath Siriwardena.
Authz work in GGF David Chadwick
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
16/3/2015 META ACCESS MANAGEMENT SYSTEM Implementing Authorised Access Dr. Erik Vullings MAMS Programme Manager
Applied Cryptography Week 13 SAML Applied Cryptography SAML and XACML Mike McCarthy Week 13.
Copyright B. Wilkinson, This material is the property of Professor Barry Wilkinson (UNC-Charlotte) and is for the sole and exclusive use of the students.
A Use Case for SAML Extensibility Ashish Patel, France Telecom Paul Madsen, NTT.
XACML 2.0 in the Enterprise: Use- Cases and Deployment Challenges Prateek Mishra, Frank Villavicencio, Rich Levinson Oracle Identity Management Group 02/07/2006.
Requirements for DSML 2.0. Summary RFC 2251 fidelity Represent existing directory protocols with new transport syntax Backwards compatibility with DSML.
Shibboleth-intro-dec051 Shibboleth A Technical Overview Tom Scavo NCSA.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
OneM2M-ARC Service_examples_and_evolution Service examples and evolution Group Name: WG2 Source: Philip Jacobs, Cisco Systems,
Copyright 2006 Archistry Limited. All Rights Reserved. SOA Federated Identity Management How much do you really need? Andrew S. Townley Founder and Managing.
Catalyst 2002 SAML InterOp July 15, 2002 Prateek Mishra San Francisco Netegrity.
SWITCHaai Team Introduction to Shibboleth.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Saml-intro-dec051 Security Assertion Markup Language A Brief Introduction to SAML Tom Scavo NCSA.
OASIS ebXML Registry Standard Open Forum 2003 on Metadata Registries 10:30 – 11:15 January 20, 2003 Kathryn Breininger The Boeing Company Chair, OASIS.
SAML Right Here, Right Now Hal Lockhart September 25, 2012.
1 Welcome: To the second learning sequence “ Data Base (DB) and Data Base Management System (DBMS) “ Recap : In the previous learning sequence, we discussed.
Identity Governance Framework (“IGF”) Overview and Status Phil Hunt and Prateek Mishra.
AAI-enabled VO Platform “VO without Tears” Christoph Witzig EGI TF, Amsterdam, Sept 15, 2010.
SAML CCOW Work Item HL7 Working Group Meeting San Antonio - January 2008 Presented by: David Staggs, JD CISSP VHA Office of Information Standards.
XML – An Introduction Structured Data Mark-up James McCartney CSCE 590, Cluster and Grid Computing.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
SAML 2.0: Federation Models, Use-Cases and Standards Roadmap
Saml-v1_x-tech-overview-dec051 Security Assertion Markup Language SAML 1.x Technical Overview Tom Scavo NCSA.
An XML based Security Assertion Markup Language
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
SAML: An XML Framework for Exchanging Authentication and Authorization Information + SPML, XCBF Prateek Mishra August 2002.
SAML in Authorization Policies draft-guenther-geopriv-saml-policy-00.
W3C Web Services Architecture Security Discussion Kick-Off Abbie Barbir, Ph.D. Nortel Networks.
Shibboleth: An Introduction
Using Enterprise Logins in Portal for ArcGIS via SAML Greg Ponto & Tom Shippee.
Data Manipulation Jonathan Rosenberg dynamicsoft.
Shibboleth What is it and what is it good for? Chad La Joie, Georgetown University.
A radiologist analyzes an X-ray image, and writes his observations on papers  Image Tagging improves the quality, consistency.  Usefulness of the data.
Fonkey Project Update: Target Applications TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
Attribute Aggregation in Federated Identity Management David Chadwick, George Inman, Stijn Lievens University of Kent.
Review of Liberty Alliance 1.1 Web Browser Profiles Prateek Mishra Netegrity.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Attribute Release and Scalable Consent \. Part of the original vision for federated identity and necessary for it to succeed Federated identity is less.
June 9, 2009 SURFfederatie: implementing a multi- protocol federation Hans Zandbelt & Joost van Dijk, SURFnet.
Fidelity Feedback on SAML 1.X and ID-FF 1.X Patrick Harding Enterprise Architecture Fidelity Investments.
1 WS-Policy. 2 What’s the Problem? To use a web service a client needs more information than is provided in WSDL file. Examples: –Does service support.
Creating a European entity Management Architecture for eGovernment Id GUIDE Keiron Salt
OASIS ebXML Registry Standard Open Forum 2003 on Metadata Registries 10:30 – 11:15 January 20, 2003 Kathryn Breininger The Boeing Company Chair, OASIS.
Page 1 IETF DRINKS Working Group Data Model and Protocol Requirements for DRINKS IETF 72 - Thursday July Tom Creighton -
Introduction to Core Database Concepts Getting started with Databases and Structure Query Language (SQL)
1 LM 6 Database Applications Dr. Lei Li. Learning Objectives Explain three components of a client-server system Describe differences between a 2-tiered.
F5 APM & Security Assertion Markup Language ‘sam-el’
Connected Identity & the role of the Identity Bus Prabath Siriwardena Director of Security Architecture WSO2.
International Planetary Data Alliance Registry Project Update September 16, 2011.
IPDA Registry Definitions Project Dan Crichton Pedro Osuna Alain Sarkissian.
Access Policy - Federation March 23, 2016
Using Your Own Authentication System with ArcGIS Online
SAML New Features and Standardization Status
A Use Case for SAML Extensibility
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Data Model.
WebDAV Design Overview
Presentation transcript:

Comments on SAML Attribute Mgmt Protocol Contribution to OASIS Security Services TC Phil Hunt & Prateek Mishra ©2009 Oracle

Agenda Comments/Enhancements to NSN ManageAttributeRequest Privacy Enhanced SAML (C) 2009 Oracle Corporation

Summary Full Modify Capability Must be able to modify attributes with multi-value support E.g. add/drop subject to a group/role (without enumerating all members) Add Subject and Delete Subject Re-direct Response Provider can re-direct management to other IDP Start with non-discovery, single-step, solution Move SAML from SSO to single-attribute provider Enterprise IDM features Multi-provider, Discovery and Routing builds in future revision (e.g. a la ID-WSF) (C) 2009 Oracle Corporation

Use Cases Builds on NSN Use Cases but adds - Attribute Value Manipulation Ability to add/remove a subject to a target group Avoids set/get privacy/performance issue Reporting The ability to return one or more subjects based on a filter Phone book query Optional filter terms, max results specs Credential recovery? Does that IDP know my address? (C) 2009 Oracle Corporation

Why As SAML? Better to stay within a single protocol when interacting with an authority ID-WSF Discovery/WSDL model is workable, but involves major application and market change (bootstrap issue) Want to create a stepping stone in between Multi-protocol increase client app complexity Reduce barriers to use of SAML Attributes Middle-ground & Migration Pure federation suggests apps never store data Old world - RDBMS – apps own and manage data in silo Middle-ground – apps maintain data cooperatively by policy (C) 2009 Oracle Corporation

ManageSubject Request (C) 2009 Oracle Corporation

Notes Delete Handled by ManageNameIDRequest - Terminate New Response Allow IDP to issue referral/redirect response for ManageSubjectRequest & ManageNameIDRequest Allows minimal auto-routing to update providers (C) 2009 Oracle Corporation

AddSubject Subject identifier may be missing (IDP generates) Response must contain generated subject identifer (C) 2009 Oracle Corporation

ModifySubject (C) 2009 Oracle Corporation

Modify Responses Build on NSN proposal as required Can referrals be issued for specific attributes? (C) 2009 Oracle Corporation

Privacy Enhanced SAML Addition of metadata to SAML protocols to enable exchange of privacy constraints Use element to add IGF Privacy Extension to any SAML request / response (C) 2009 Oracle Corporation

IGF Privacy Extension (C) 2009 Oracle Corporation

IGF Basics CARML – Client Attribute Requirements Markup Language An XML document describing transactions, schema, and governing privacy constraints of an application Privacy Constraints WS-Policy based Information policy / Not protocol policy Describe one of more privacy related constraints on the use/propagation/storage of personal information Can be static or dynamically asserted (C) 2009 Oracle Corporation

IgfPrivacy Element Describes the location of a static CARML document containing transaction declarations, schema, and privacy constraints CARML document not usually transferred with every operation. These are long-lived application specific static declarations. DynPolicyStatements allow dynamic privacy constraints to be associated with particular attributes in a transactions E.g. subject specific constraint (due to consent limitation) (C) 2009 Oracle Corporation