Will Darby 91.514 5 April 2010. What is Federated Security Example Implementations Security...

26
Federated Security and the Security Assertion Markup Language Will Darby 91.514 5 April 2010
  • date post

    19-Dec-2015
  • Category

    Documents

  • view

    220
  • download

    2

Transcript of Will Darby 91.514 5 April 2010. What is Federated Security Example Implementations Security...

  • Slide 1
  • Will Darby 91.514 5 April 2010
  • Slide 2
  • What is Federated Security Example Implementations Security Assertion Markup Language (SAML) Overview Alternative Solutions for the Internet
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Web service diagram
  • Slide 12
  • Slide 13
  • Authorize users across all grids nodes Minimal changes to existing security Registry to map credentials to authority Assertions passed among servers Image from paper
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • XML Signature XML Encryption WS-Security WS-Trust
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • R.L. Morgan, S. Cantor, S. Carmody, W. Hoehn and K. Klingenstein. Federated Security: The Shibboleth Approach. EDUCAUSE Quarterly, Volume 27, Number 4, 2004. Pages 12-17. Available at: http://net.educause.edu/ir/library/pdf/EQM0442.pdf. K.D. Lewis and J.E. Lewis. Web Single Sign-On Authentication using SAML. International Journal of Computer Science Issues. Volume 2, 2009. Pages 41-48. Available at: http://www.ijcsi.org/papers/2-41-48.pdf.http://www.ijcsi.org/papers/2-41-48.pdf Security Assertion Markup Language (SAML) V2.0 Technical Overview. OASIS Security Services Technical Committee. March, 2008. Available at: http://www.oasis- open.org/committees/download.php/27819/sstc-saml-tech- overview-2.0-cd-02.pdf.http://www.oasis- open.org/committees/download.php/27819/sstc-saml-tech- overview-2.0-cd-02.pdf
  • Slide 25
  • H. Gomi, M.Hatakeyama, S.Hosono and S. Fujita. A Delegation Framework for Federated Identity Management. Proceedings of the 2005 workshop on Digital identity management. Pages 94-103. F. Pinto and C. Fernau. An Approach for Shibboleth and Grid Integration. Proceedings of the UK e-Science All Hands Conference, 2005. Available at: http://www.allhands.org.uk/2005/proceedings/papers/531. pdf. http://www.allhands.org.uk/2005/proceedings/papers/531. pdf D. Recordon and D. Reed. OpenID 2.0: A Platform for User- Centric Identity Management. Proceedings of the second ACM workshop on Digital Identity Management, 2006. Pages 11-16. E. Hammer-Lahav. The OAuth 1.0 Protocol. IETF Internet Draft. February, 2010. Available at: http://tools.ietf.org/html/draft-hammer-oauth-10. http://tools.ietf.org/html/draft-hammer-oauth-10
  • Slide 26