13
Single Sign-On -Mayuresh Pardeshi M.Tech CSE - I

Single Sign-On

  • Upload
    kyoko

  • View
    28

  • Download
    0

Embed Size (px)

DESCRIPTION

Single Sign-On. - Mayuresh Pardeshi M.Tech CSE - I. Contents:. Introduction Working Structure Features Applications. Why do we need SSO ?. Current Situation: Network users interact with multiple service providers. SSO:. - PowerPoint PPT Presentation

Citation preview

Page 1: Single Sign-On

Single Sign-On

-Mayuresh Pardeshi

M.Tech CSE - I

Page 2: Single Sign-On

Contents: Introduction Working Structure Features Applications

Page 3: Single Sign-On

3

Why do we need SSO ?

Current Situation:Network users interact with multiple service providers.

Page 4: Single Sign-On

SSO: A mechanism that allows users to

authenticate themselves only once, and then log into multiple service providers, without necessarily having to re-authenticate.

Authentication Service Provider (ASP). Service providers are aware of the ASP:

establish explicit trust relations, policies, contracts and supporting security infrastructure (e.g. PKI).

ASP is either a trusted third party or part of the user system (requires tamper-resistant hardware, e.g. smartcard, TPM).

Page 5: Single Sign-On

5

General SSO Protocol

Typical Information Flow

} Repeated as

necessary

Page 6: Single Sign-On

Types of SSO: Password Synchronization

SecurePassSAM, Pass Synch

Legacy SSO Novell’s Secure Login & Microsoft Windows Server

Web Access Management (WAM)RSA

Cross Domain SSO OpenSSO, CAS

Federated SSOFacebook Connect, Google

Page 7: Single Sign-On

Novell SecureLogin

Page 8: Single Sign-On

Oblix (Oracle)

Page 9: Single Sign-On

SAML:

1.The service provider received the client request, and it sent the request to Identity provider to do the client authentication.

2.Identity provider authenticate the client, create the assertion , and pass it back to the service provider. SAML assertions can be add a SOAP Header blocks, and pass by the HTTP protocol

Page 10: Single Sign-On

Request from the Service provider

Here, a sample SAML-compliant request is sent from a service provider requesting password authentication by the identity provider. <samlp: Request ...> <samlp: AttributeQuery> <saml: Subject> <saml: NameIdentifier SecurityDomain="sun. com" Name="rimap"/>

</ saml: Subject> <saml: AttributeDesignator AttributeName="Employee_ ID" AttributeNamespace="sun. com">

</ saml: AttributeDesignator> </ samlp: AttributeQuery> </ samlp: Request>

Page 11: Single Sign-On

Response from the Identity provider In response, the issuing authority asserts that the subject (S) was

authenticated by means (M) at time (T). <samlp: Response MajorVersion="1" MinorVersion="0"

RequestID="128.14.234.20.90123456" InResponseTo="123.45.678.90.12345678" StatusCode="/features/2002/05/Success">

<saml: Assertion MajorVersion="1" MinorVersion="0" AssertionID="123.45.678.90.12345678" Issuer="Sun Microsystems, Inc." IssueInstant="2002- 01- 14T10: 00: 23Z">

<saml: Conditions NotBefore="2002- 01- 14T10: 00: 30Z" NotAfter="2002- 01- 14T10: 15: 00Z" />

<saml: AuthenticationStatement AuthenticationMethod="Password" AuthenticationInstant="2001- 01- 14T10: 00: 20Z">

<saml: Subject>

<saml: NameIdentifier SecurityDomain="sun. com" Name="rimap" />

</ saml: Subject>

</ saml: AuthenticationStatement>

</ saml: Assertion>

</ samlp: Response>

Page 12: Single Sign-On

Advantages Reduced operational cost Reduced time to access data Improved user experience, no password

lists to carry Advanced security to systems

Strong authentication One Time Password devices Smartcards

Ease burden on developers Centralized management of users, roles Fine grained auditing Effective compliance (SOX, HIPPA)

Page 13: Single Sign-On

References:1) “OWASP, SanAntonio SingleSignOn” 2006-08, Vijay Kumar, CISSP.

2) “Using EMV cards for Single Sign-On” 1st European PKI Workshop Andreas Pashalidis and Chris J. Mitchell

3) www.cafesoft.com/support/security/glossary.html

4) www.ibm.com/software/webservers/portal/library/v12/InfoCenter/wps/glossary.htm

5) www.suliscommunication.com/language/ecommerce/ebus3.htm

6) http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci340859,00.html

7) http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci340859,00.html

8) Microsoft .Net Passport Review Guide

9) Telling Humans and Computers Apart Automatically

10) XADM: How Secure Sockets Layer Works Microsoft.com