SlideShare a Scribd company logo
OpenID & SAML,
OpenID & SAML
OpenID & SAML, SAML
    OpenID &
   Identity Federation, SuisseID
Identity Federation, SuisseID
Strong Authentication ServiceZukunft
   StrongSign-On Konzepte mit
    Single Authentication Service
Single-Sign-on Concepts with Future
                                                  &
     Geneva Application Security Forum 2010
     March 4th 2010
 Robert Ott, Master of Science (Honors), CFO
     Robert Ott
 Fredi Weideli, Master of Computer Science, CTO
 clavidOpenID Representative Switzerland
     - ag, Zug
 5180 CFO, Clavid AG, Switzerland
     -
Agenda

• SECTION 1   OpenID - What is it? How does it work? Integration?

• SECTION 2   SAML - What is it? How does it work?

• SECTION 3   Identity Federation

• SECTION 4   A Word on SuisseID

• SECTION 5   Strong Authentication as a Service

• SECTION 6   Further Links / Conclusion / Q&A




                     Geneva Application Security Forum 2010, March 4th 2010
                                            Page 2
SECTION 1




            SECTION 1
            OpenID
            > What is it?
            > How does it work?
            > How to integrate?



                 Geneva Application Security Forum 2010, March 4th 2010
                                        Page 3
OpenID - What is it?




>   Internet SingleSignOn                           >     Free Choice of Identity Provider
>   Relatively Simple Protocol                      >     No License Fee
>   User-Centric Identity Management                >     Independent of Identification Methods
>   Internet Scalable                               >     Non-Profit Organization



                            Geneva Application Security Forum 2010, March 4th 2010
                                                   Page 4
OpenID - How does it work?


    User Hans Muster
    (Domain: www.iid.ch)



                                          AUTHENTICATION
                                                                                          Identity Provider
                                                                                          e.g. clavid.ch
    hans.muster.iid.ch

                                                                         Identity URL
         OpenID=hans.muster.iid.ch                                       e.g. hans.muster.iid.ch




                                                        Enabled Service




                                     Geneva Application Security Forum 2010, March 4th 2010
                                                            Page 5
OpenID - How does it work?



       User Hans Muster

                                                 3

                                                4, 4a                                  Identity Provider
                                                                                       e.g. clavid.com
    hans.muster.clavid.com         5                           6

                             1                                        2 Identity URL
    Caption                                                              https://hans.muster.clavid.com
    1. User enters OpenID
    2. Discovery
    3. Authentication
    4. Approval
    4a. Change Attributes
    5. Send Attributes
    6. Validation                                       Enabled Service




                             Geneva Application Security Forum 2010, March 4th 2010
                                                    Page 6
OpenID - How does it work?

Step 1:   A user decides to use a personalized Internet Service supporting OpenID (e.g. local.ch). The user clicks on
          „Login using OpenID“ and enters its OpenID (e.g. hans.muster.iid.ch).
Step 2:   The requested Internet Service converts the OpenID into an URL (http://hans.muster.iid.ch) and requests
          this URL in order to receive the Identity Provider of the user.
Step 2a: In this example, the user has delegated its OpenID to the Identity Provider clavid.ch.
Step 3:   The Identity Provider provides possible authentication methods for that specific user (in this case
          “Password”). Having successfully authenticated, the next step (approval) is initiated.
Step 4:   The user decides on the values of the requested attributes to be provided to the Internet Service. The
          Identity Provider usually provides user specific Personas (attribute templates) to assist the user in this
          approval process.
Step 4a: At this point, the user may decide to change attribute values and store them on the Identity Provider for
         future approvals for that specific service. Thus, a user can automate future approvals for specific Internet
         Services.
Step 5, 6: The attribute values are then signed and communicated from the Identity Provider to the Internet
           Service. The Internet Service validates the signature of the provided attributes and finally accepts the user
           to be authenticated.




                                      Geneva Application Security Forum 2010, March 4th 2010
                                                             Page 7
OpenID - How does it work?




                 Geneva Application Security Forum 2010, March 4th 2010
                                        Page 8
OpenID - How does it work?




                 Geneva Application Security Forum 2010, March 4th 2010
                                        Page 9
OpenID - User Centric Identity Management

                           TOMORROW
                           ? FUTURE ?
                              TODAY
                                   OpenID Provider                                 Username
               Username                                                            Password
               Password




    Username                                                                                  Username
    Password                                                                                  Password




                          Geneva Application Security Forum 2010, March 4th 2010
                                                 Page 10
OpenID - How to Integrate?

Assumptions concerning your current Site
•   Users sign in with their username and password
•   There is a form, where new users have to register
•   Each user is identified by a unique ID in your database
•   A settings page let users manage their account info

Recipe
•    Extend the database to map the OpenIDs to the user IDs
•    Extend the registration page with an OpenID input field
•    Extend the sign in page with an OpenID input field
•    Extend the settings page to attach and detach openIDs



                       Geneva Application Security Forum 2010, March 4th 2010
                                              Page 11
OpenID - How to Integrate?

Ingredients

•    A OpenID Consumer Library



•    The Standard OpenID Logos



•    An OpenID Provider to test your site with




                      Geneva Application Security Forum 2010, March 4th 2010
                                             Page 12
OpenID - How to Integrate?

OpenID Libraries
Language      Library
C#            DotNetOpenId, ExtremeSwank
C++           Libopkele
Java          NetMesh InfoGrid LID, OpenID4Java, joid

Perl          Net::OpenID, OpenID4Perl

Python        JanRain

Ruby          JanRain, Heraldry

PHP           Jan Rain, Zend Framework OpenID Component, Saeven.net's JanRain
              Service Utility Class, Taral, Simple Class, sfOpenIDPlugin, CakePHP,
              EasyOpenID, OpenID For PHP, AuthOpenID Snippet
Coldfusion    CFKit OpenID, CFOpenID, OpenID CFC

Apache 2      mod_auth_openid



                          Geneva Application Security Forum 2010, March 4th 2010
                                                 Page 13
SECTION 2




            SECTION 2
            SAML
            >What is it?
            >How does it work?




                 Geneva Application Security Forum 2010, March 4th 2010
                                        Page 14
SAML – What is it?

SAML (Security Assertion Markup Language):
>   Defined by the Oasis Group
>   Well and Academically Designed Specification
>   Uses XML Syntax
>   Used for Authentication & Authorization

> SAML Assertions
    > Statements: Authentication, Attribute, Authorization

> SAML Protocols
    > Queries: Authentication, Artifact, Name Identifier Mapping, etc.

> SAML Bindings
    > SOAP, Reverse-SOAP, HTTP-Get, HTTP-Post, HTTP-Artifact

> SAML Profiles
    > Web Browser SingleSignOn Profile, Identity Provider Discovery Profile, Assertion
      Query / Request Profile, Attribute Profile


                                    Geneva Application Security Forum 2010, March 4th 2010
                                                           Page 15
SAML – How does it work?


     User Hans Muster


                                 AUTHENTICATION
                           Redirect with                                         Identity Provider
                           <Response>
                             Redirect with                                       e.g. clavid.ch
                        (signed Assertion)
                            <AuthnRequest>
                         Access
                        Resource




                                               Enabled Service

                                                          e.g. Google Apps
                                                          for Business




                        Geneva Application Security Forum 2010, March 4th 2010
                                               Page 16
SAML – How does it work?


     User Hans Muster

                                                3
                                                2
                                                4                                      Identity Provider
                                                                                       e.g. clavid.ch

                              4
                          2
                      1
                  6




                                                     Enabled Service

                                                                e.g. Google Apps
                                                                for Business




                              Geneva Application Security Forum 2010, March 4th 2010
                                                     Page 17
SAML – How does it work?

Step 1:   A user decides to use a personalized Internet Service connected to a SAML based Identity
          provider (e.g. Google Business Application Calendar).
Step 2:   The Internet Service recognizes that the user is not logged in yet. A SAML <AuthnRequest>
          is created and sent via redirect to the Identity Provider.
Step 3:   The Identity Provider provides possible authentication methods for that specific user (in this
          case “YubiKey” OTP). Having successfully authenticated, the next step is initiated.
Step 4:   The Identity Provider creates a SAML <Response> containing the user’s identifier for the
          specific target application. Then it signs the SAML <Response> and sends it via a Post-
          Redirect to the Internet Services (e.g. Google Calendar)
Step 5:   The Internet Service (e.g. Google Apps) verifies the signature of the SAML <Response>
          and now knows the user’s identifier provided by the Identity Provider.
Step 6:   The Internet Service can now be used by the user.




                                 Geneva Application Security Forum 2010, March 4th 2010
                                                        Page 18
SAML – How does it work?
1) Call Application URL

                                                     3) Application Usage
         2) Login




                          Geneva Application Security Forum 2010, March 4th 2010
                                                 Page 19
SECTION 3




            SECTION 3
            Identity Federation




                Geneva Application Security Forum 2010, March 4th 2010
                                       Page 20
B2B Identity Federation - The Protocol Problem
   Company A
    Intranet                                                                Internet Service A
                                                                                   Travel
                                   Proprietary Token                            Ticket Shop

               https                                                                Internet Service B
                                                      OpenID
                                                                                        Document
                                                                                       Management

                                                               SAML 1.0                   Internet Service C
                                                                                                 Personal
                                                                                                 Recruting

                                                             SAML 2.0                  SaaS Applications




                       Geneva Application Security Forum 2010, March 4th 2010
                                              Page 21
B2B Identity Federation - The Protocol Mess
     Company A
       Intranet                                                                               Internet Service A
                              Proprietary Token
                                     OpenID                                                           Travel
                                                                                                   Ticket Shop
                                     SAML 1.0
                     https                                                                             Internet Service B
                                  SAML 2.0
Company B                                                                                                  Document
                                                                                                          Management
 Intranet           Proprietary Token
                                OpenID                                                                       Internet Service C
                               SAML 1.0
                                                                                                                   Personal
            https




                         SAML 2.0                                                                                  Recruting
      Company C
                              Proprietary Token                                                           SaaS Applications
        Intranet
                                     OpenID
                                     SAML 1.0
                      https




                                  SAML 2.0


                                          Geneva Application Security Forum 2010, March 4th 2010
                                                                 Page 22
B2B Identity Federation - The Protocol Solution
     Company A
       Intranet                                                                                                                                                                             Internet Service A
                                                                                                                                                                                                  Travel
                                                                                                                                                                                               Ticket Shop

                      https                                                                                                                                                                           Internet Service B
                                             Internet Identity
                                                 Provider                                                                                                                         Proprietary Token
Company B           Proprietary Token                                                                                                                                                                    Document
                                             Identity Mapping                                                                                                                                           Management
 Intranet
                                                                                                                                                                                          OpenID




                                                                                                             One Time Passw. (OTP)


                                                                                                                                                          Internet SSO
                                                                                                                                                                                                           Internet Service C




                                                                                      Biometric (AXSioncs)


                                                                                                                                     Mobile Phone (SMS)
                                             eID (Identity Card)
                               OpenID                                                                                                                                                     SAML 1.0               Personal
            https




                                                                   SSL Certificates
                                                                                                                                                                                                                 Recruting




                                                                                                                                                                         Internet SSO
      Company C
                                 SAML 2.0                                                                                                                                               SAML 2.0        SaaS Applications



                                                                                                                                                           https
        Intranet
                       https




                                        Geneva Application Security Forum 2010, March 4th 2010
                                                               Page 23
B2B Identity Federation - The Protocol Solution

   Company A                                                                                                                                                                                   Company B
     Intranet                                                                                                                                                                                   Intranet


                https




                                                                                                                                                                                       https
                                                Internet Identity
                                                    Provider
            Proprietary Token                                                                                                                                               SAML 1.0                      Company C
                                               Identity Federation                                                                                                                                         Intranet




                                                                                                                One Time Passw. (OTP)
                                Internet SSO




                                                                                                                                                             Internet SSO
                                                                                         Biometric (AXSioncs)


                                                                                                                                        Mobile Phone (SMS)
                                                eID (Identity Card)
                                                                                                                                                                             SAML 2.0




                                                                                                                                                                                                  https
                                                                      SSL Certificates
                                 https




                                                                                                                                                              https




                            Geneva Application Security Forum 2010, March 4th 2010
                                                   Page 24
SECTION 4




            SECTION 4
            A Word on SuisseID




               Geneva Application Security Forum 2010, March 4th 2010
                                      Page 25
A Word On SuisseID

•   SuisseID is currently in Early Draft Specification Phase
•   SuisseID should be available for public in spring 2010
•   SuisseID cost will be refunded by the Government in 2010
•   SuisseID will most probably be:
    – A signature certificate
    – An authentication certificate
    – All certificates conform to ZertES
    – Certificates contain a unique SuisseID number
    – An Identity Provider Services for attribute exchange

•   Eligible SuisseID certificate service providers will be:
    – Swiss Post (SwissSign), Swisscom, QuiVadis, Swiss Government



                               Geneva Application Security Forum 2010, March 4th 2010
                                                      Page 26
A Word On SuisseID




                Geneva Application Security Forum 2010, March 4th 2010
                                       Page 27
SECTION 5




            SECTION 5
            Strong Authentication as a Service




                Geneva Application Security Forum 2010, March 4th 2010
                                       Page 28
OpenID - International Identity Providers




                                                                           Username/Password
                                                                           Certificates


                                                                           Biometric


                                                                           OTP



                  Geneva Application Security Forum 2010, March 4th 2010
                                         Page 29
Clavid Portal for Strong Authentication




                  Geneva Application Security Forum 2010, March 4th 2010
                                         Page 30
Clavid Portal - AXSionics




                   Geneva Application Security Forum 2010, March 4th 2010
                                          Page 31
Clavid Portal - Yubikey




                   Geneva Application Security Forum 2010, March 4th 2010
                                          Page 32
Clavid Portal - Certificates




                    Geneva Application Security Forum 2010, March 4th 2010
                                           Page 33
Clavid Portal - One Time Password




                                                                      OTP Methods:
                                                                      •    OATH HOTP (RFC4226)
                                                                      •    Challenge/Response (RFC2289)
                                                                      •    Mobile OTP (OpenSource Project)
                                                                      •    SMS
                                                                      •    ... others ...




                  Geneva Application Security Forum 2010, March 4th 2010
                                         Page 34
Clavid Portal - Personas




                   Geneva Application Security Forum 2010, March 4th 2010
                                          Page 35
Clavid Portal - Login Settings




                   Geneva Application Security Forum 2010, March 4th 2010
                                          Page 36
Clavid Login Dialog




                  Geneva Application Security Forum 2010, March 4th 2010
                                         Page 37
SECTION 6




            SECTION 6
            Conclusion
            >Further References
            >Questions & Answers
            >Contact Information



                 Geneva Application Security Forum 2010, March 4th 2010
                                        Page 38
Further Links: on OpenID

OpenID Identity Providers can be found at:

                              >     http://en.wikipedia.org/wiki/OpenID



                              >     http://en.wikipedia.org/wiki/List_of_OpenID_providers



                              >     http://www.openiddirectory.com/openid-providers-c-1.html



                              >     http://www.clavid.com/ (Strong Authentication in Europe)




                     Geneva Application Security Forum 2010, March 4th 2010
                                            Page 39
Conclusion

> OpenID: An open, well documented specification allowing Internet Single
  Sign-On (SSO) for individual “Public Services” (B2C)

> SAML: Trust based Internet and Intranet Single Sign-On for Business
  Services (B2B)

> Professional Identity Providers already in place

> User Centric Identity Management already integrated

> Join OpenID Switzerland in order to increase the OpenID momentum

> Enable your Internet Services to support OpenID or SAML !!!



                          Geneva Application Security Forum 2010, March 4th 2010
                                                 Page 40
Demo

> SAML-Login to Google Business Apps using
  AXSionics Fingerprint


> SAML-Login to Salesforce.com using YubiKey OTP


> OpenID login to local.ch using Swiss PostZertifikat


> Online Identity Administration (Clavid Portal)




                          Geneva Application Security Forum 2010, March 4th 2010
                                                 Page 41
Questions & Answers




                Geneva Application Security Forum 2010, March 4th 2010
                                       Page 42
Contact Information




                 Geneva Application Security Forum 2010, March 4th 2010
                                        Page 43

More Related Content

PPT
An Introduction to OpenID
Max Manders
 
PDF
OpenID Connect 101 @ OpenID TechNight vol.11
Nov Matake
 
PPT
Dependency injection
Chester Hartin
 
PDF
OpenID Connect 4 SSI (at EIC 2021)
Torsten Lodderstedt
 
PPTX
Getting Started With WebAuthn
FIDO Alliance
 
PDF
Erp
Andrew Baird
 
PPTX
JUCUM Urbano PR - marzo - julio 2015 / Urban YWAM PR - march - july 2015
Yeidy Fonseca
 
PDF
Integracion Sistemas 9000 166002
Victor Gomez Romero
 
An Introduction to OpenID
Max Manders
 
OpenID Connect 101 @ OpenID TechNight vol.11
Nov Matake
 
Dependency injection
Chester Hartin
 
OpenID Connect 4 SSI (at EIC 2021)
Torsten Lodderstedt
 
Getting Started With WebAuthn
FIDO Alliance
 
JUCUM Urbano PR - marzo - julio 2015 / Urban YWAM PR - march - july 2015
Yeidy Fonseca
 
Integracion Sistemas 9000 166002
Victor Gomez Romero
 

Viewers also liked (19)

PDF
Instalación de una plataforma educativa en redes sociales Ning (docentes)
talleres_ning
 
PDF
Gary EFSI Reg Perm
Karen Crampton
 
PDF
Olivos 50º aniversario
CentroCulturaleItaliano
 
PDF
Magno Wooden Radio Persentation
Yusuf Habibi
 
PPTX
Recursos de la red
lupe245
 
DOC
CV_Nov 2014
John Letchford
 
PDF
Reflexiones en torno a la imagen problemática de un hombre negro en una insti...
Álex Hincapié
 
PDF
Istanbul power point endversion
Manuela Pregesbauer
 
PDF
job and career at IAA Nutzfahrzeuge preview
spring Messe Management GmbH
 
PDF
Workshop zu interkultureller Kommunikation / Workshop on intercultural commun...
Swiss Academy for Development
 
PPTX
Ecocert Productos Órganicos
Vanessa G. Barragán
 
PPTX
La Metrología 11-1
Johan Ardila
 
PDF
Webinar: Successfully manage processes
Vigience_QuiXilver
 
PDF
Webjam Top Tipsheet
WebjamMark2
 
PDF
Blacksmith Institute
ESTHHUB
 
PDF
Tríptico Acción49
Paloma Lemonche
 
DOCX
Plan de clase
lizm234
 
Instalación de una plataforma educativa en redes sociales Ning (docentes)
talleres_ning
 
Gary EFSI Reg Perm
Karen Crampton
 
Olivos 50º aniversario
CentroCulturaleItaliano
 
Magno Wooden Radio Persentation
Yusuf Habibi
 
Recursos de la red
lupe245
 
CV_Nov 2014
John Letchford
 
Reflexiones en torno a la imagen problemática de un hombre negro en una insti...
Álex Hincapié
 
Istanbul power point endversion
Manuela Pregesbauer
 
job and career at IAA Nutzfahrzeuge preview
spring Messe Management GmbH
 
Workshop zu interkultureller Kommunikation / Workshop on intercultural commun...
Swiss Academy for Development
 
Ecocert Productos Órganicos
Vanessa G. Barragán
 
La Metrología 11-1
Johan Ardila
 
Webinar: Successfully manage processes
Vigience_QuiXilver
 
Webjam Top Tipsheet
WebjamMark2
 
Blacksmith Institute
ESTHHUB
 
Tríptico Acción49
Paloma Lemonche
 
Plan de clase
lizm234
 
Ad

Similar to 2010 - Fédération des identités et OpenID (20)

PDF
Review on OpenID Authentication Framework
ijsrd.com
 
PDF
OpenID Tutorials
Nao Haida
 
PDF
OpenID and OAuth
Andrea Chiodoni
 
PPT
Implementing OpenID for Your Social Networking Site
David Keener
 
PDF
Openid+Opensocial
Sebastiano Merlino (eTr)
 
PPT
Securing your digital identity with drupal
mysty
 
PPT
OpenID Progress EEMA Conference
evidos
 
PDF
Mozilla BrowserID/Persona (2012 MDN Hack Day LDN)
teoli2003
 
PDF
OpenID and decentralised social networks
Simon Willison
 
PDF
Practical Federated Identity
WSO2
 
PPT
Open ID
diwanshu.joshi
 
PPTX
Implementing MITREid - CIS 2014 Presentation
Justin Richer
 
PPTX
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance
 
PPTX
Lecture 20101124
Anderson Liang
 
PDF
OpenID Connect "101" Introduction -- October 23, 2018
OpenIDFoundation
 
PPT
Authentication and strong authentication for Web Application
Sylvain Maret
 
PPT
Identity Federation on JBossAS
Roger CARHUATOCTO
 
PDF
FIDO UAF 1.0 Specs: Overview and Insights
FIDO Alliance
 
PDF
Authenticator and provisioning connector in wso2 is
H Mohammed Rajjaz
 
PDF
Authenticator and provisioning connector in wso2 Identity Server
Rajendram Kathees
 
Review on OpenID Authentication Framework
ijsrd.com
 
OpenID Tutorials
Nao Haida
 
OpenID and OAuth
Andrea Chiodoni
 
Implementing OpenID for Your Social Networking Site
David Keener
 
Openid+Opensocial
Sebastiano Merlino (eTr)
 
Securing your digital identity with drupal
mysty
 
OpenID Progress EEMA Conference
evidos
 
Mozilla BrowserID/Persona (2012 MDN Hack Day LDN)
teoli2003
 
OpenID and decentralised social networks
Simon Willison
 
Practical Federated Identity
WSO2
 
Implementing MITREid - CIS 2014 Presentation
Justin Richer
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance
 
Lecture 20101124
Anderson Liang
 
OpenID Connect "101" Introduction -- October 23, 2018
OpenIDFoundation
 
Authentication and strong authentication for Web Application
Sylvain Maret
 
Identity Federation on JBossAS
Roger CARHUATOCTO
 
FIDO UAF 1.0 Specs: Overview and Insights
FIDO Alliance
 
Authenticator and provisioning connector in wso2 is
H Mohammed Rajjaz
 
Authenticator and provisioning connector in wso2 Identity Server
Rajendram Kathees
 
Ad

More from Cyber Security Alliance (20)

PDF
Bug Bounty @ Swisscom
Cyber Security Alliance
 
PDF
Robots are among us, but who takes responsibility?
Cyber Security Alliance
 
PDF
iOS malware: what's the risk and how to reduce it
Cyber Security Alliance
 
PDF
Why huntung IoC fails at protecting against targeted attacks
Cyber Security Alliance
 
PDF
Corporations - the new victims of targeted ransomware
Cyber Security Alliance
 
PDF
Blockchain for Beginners
Cyber Security Alliance
 
PDF
Le pentest pour les nuls #cybsec16
Cyber Security Alliance
 
PDF
Introducing Man in the Contacts attack to trick encrypted messaging apps
Cyber Security Alliance
 
PDF
Understanding the fundamentals of attacks
Cyber Security Alliance
 
PDF
Rump : iOS patch diffing
Cyber Security Alliance
 
PDF
An easy way into your sap systems v3.0
Cyber Security Alliance
 
PDF
Reverse engineering Swisscom's Centro Grande Modem
Cyber Security Alliance
 
PDF
Easy public-private-keys-strong-authentication-using-u2 f
Cyber Security Alliance
 
PDF
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Cyber Security Alliance
 
PDF
Offline bruteforce attack on wi fi protected setup
Cyber Security Alliance
 
PDF
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
Cyber Security Alliance
 
PPTX
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Cyber Security Alliance
 
PDF
Killing any security product … using a Mimikatz undocumented feature
Cyber Security Alliance
 
PDF
Rump attaque usb_caralinda_fabrice
Cyber Security Alliance
 
PDF
Operation emmental appsec
Cyber Security Alliance
 
Bug Bounty @ Swisscom
Cyber Security Alliance
 
Robots are among us, but who takes responsibility?
Cyber Security Alliance
 
iOS malware: what's the risk and how to reduce it
Cyber Security Alliance
 
Why huntung IoC fails at protecting against targeted attacks
Cyber Security Alliance
 
Corporations - the new victims of targeted ransomware
Cyber Security Alliance
 
Blockchain for Beginners
Cyber Security Alliance
 
Le pentest pour les nuls #cybsec16
Cyber Security Alliance
 
Introducing Man in the Contacts attack to trick encrypted messaging apps
Cyber Security Alliance
 
Understanding the fundamentals of attacks
Cyber Security Alliance
 
Rump : iOS patch diffing
Cyber Security Alliance
 
An easy way into your sap systems v3.0
Cyber Security Alliance
 
Reverse engineering Swisscom's Centro Grande Modem
Cyber Security Alliance
 
Easy public-private-keys-strong-authentication-using-u2 f
Cyber Security Alliance
 
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Cyber Security Alliance
 
Offline bruteforce attack on wi fi protected setup
Cyber Security Alliance
 
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
Cyber Security Alliance
 
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Cyber Security Alliance
 
Killing any security product … using a Mimikatz undocumented feature
Cyber Security Alliance
 
Rump attaque usb_caralinda_fabrice
Cyber Security Alliance
 
Operation emmental appsec
Cyber Security Alliance
 

Recently uploaded (20)

PDF
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
CIFDAQ
 
PDF
agentic-ai-and-the-future-of-autonomous-systems.pdf
siddharthnetsavvies
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PPT
L2 Rules of Netiquette in Empowerment technology
Archibal2
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PPTX
How to Build a Scalable Micro-Investing Platform in 2025 - A Founder’s Guide ...
Third Rock Techkno
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
PDF
CIFDAQ'S Market Insight: BTC to ETH money in motion
CIFDAQ
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
This slide provides an overview Technology
mineshkharadi333
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Chapter 2 Digital Image Fundamentals.pdf
Getnet Tigabie Askale -(GM)
 
CIFDAQ's Token Spotlight: SKY - A Forgotten Giant's Comeback?
CIFDAQ
 
agentic-ai-and-the-future-of-autonomous-systems.pdf
siddharthnetsavvies
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
L2 Rules of Netiquette in Empowerment technology
Archibal2
 
Doc9.....................................
SofiaCollazos
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
How to Build a Scalable Micro-Investing Platform in 2025 - A Founder’s Guide ...
Third Rock Techkno
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
CIFDAQ'S Market Insight: BTC to ETH money in motion
CIFDAQ
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
This slide provides an overview Technology
mineshkharadi333
 
Software Development Methodologies in 2025
KodekX
 
Chapter 2 Digital Image Fundamentals.pdf
Getnet Tigabie Askale -(GM)
 

2010 - Fédération des identités et OpenID

  • 1. OpenID & SAML, OpenID & SAML OpenID & SAML, SAML OpenID & Identity Federation, SuisseID Identity Federation, SuisseID Strong Authentication ServiceZukunft StrongSign-On Konzepte mit Single Authentication Service Single-Sign-on Concepts with Future & Geneva Application Security Forum 2010 March 4th 2010 Robert Ott, Master of Science (Honors), CFO Robert Ott Fredi Weideli, Master of Computer Science, CTO clavidOpenID Representative Switzerland - ag, Zug 5180 CFO, Clavid AG, Switzerland -
  • 2. Agenda • SECTION 1 OpenID - What is it? How does it work? Integration? • SECTION 2 SAML - What is it? How does it work? • SECTION 3 Identity Federation • SECTION 4 A Word on SuisseID • SECTION 5 Strong Authentication as a Service • SECTION 6 Further Links / Conclusion / Q&A Geneva Application Security Forum 2010, March 4th 2010 Page 2
  • 3. SECTION 1 SECTION 1 OpenID > What is it? > How does it work? > How to integrate? Geneva Application Security Forum 2010, March 4th 2010 Page 3
  • 4. OpenID - What is it? > Internet SingleSignOn > Free Choice of Identity Provider > Relatively Simple Protocol > No License Fee > User-Centric Identity Management > Independent of Identification Methods > Internet Scalable > Non-Profit Organization Geneva Application Security Forum 2010, March 4th 2010 Page 4
  • 5. OpenID - How does it work? User Hans Muster (Domain: www.iid.ch) AUTHENTICATION Identity Provider e.g. clavid.ch hans.muster.iid.ch Identity URL OpenID=hans.muster.iid.ch e.g. hans.muster.iid.ch Enabled Service Geneva Application Security Forum 2010, March 4th 2010 Page 5
  • 6. OpenID - How does it work? User Hans Muster 3 4, 4a Identity Provider e.g. clavid.com hans.muster.clavid.com 5 6 1 2 Identity URL Caption https://hans.muster.clavid.com 1. User enters OpenID 2. Discovery 3. Authentication 4. Approval 4a. Change Attributes 5. Send Attributes 6. Validation Enabled Service Geneva Application Security Forum 2010, March 4th 2010 Page 6
  • 7. OpenID - How does it work? Step 1: A user decides to use a personalized Internet Service supporting OpenID (e.g. local.ch). The user clicks on „Login using OpenID“ and enters its OpenID (e.g. hans.muster.iid.ch). Step 2: The requested Internet Service converts the OpenID into an URL (http://hans.muster.iid.ch) and requests this URL in order to receive the Identity Provider of the user. Step 2a: In this example, the user has delegated its OpenID to the Identity Provider clavid.ch. Step 3: The Identity Provider provides possible authentication methods for that specific user (in this case “Password”). Having successfully authenticated, the next step (approval) is initiated. Step 4: The user decides on the values of the requested attributes to be provided to the Internet Service. The Identity Provider usually provides user specific Personas (attribute templates) to assist the user in this approval process. Step 4a: At this point, the user may decide to change attribute values and store them on the Identity Provider for future approvals for that specific service. Thus, a user can automate future approvals for specific Internet Services. Step 5, 6: The attribute values are then signed and communicated from the Identity Provider to the Internet Service. The Internet Service validates the signature of the provided attributes and finally accepts the user to be authenticated. Geneva Application Security Forum 2010, March 4th 2010 Page 7
  • 8. OpenID - How does it work? Geneva Application Security Forum 2010, March 4th 2010 Page 8
  • 9. OpenID - How does it work? Geneva Application Security Forum 2010, March 4th 2010 Page 9
  • 10. OpenID - User Centric Identity Management TOMORROW ? FUTURE ? TODAY OpenID Provider Username Username Password Password Username Username Password Password Geneva Application Security Forum 2010, March 4th 2010 Page 10
  • 11. OpenID - How to Integrate? Assumptions concerning your current Site • Users sign in with their username and password • There is a form, where new users have to register • Each user is identified by a unique ID in your database • A settings page let users manage their account info Recipe • Extend the database to map the OpenIDs to the user IDs • Extend the registration page with an OpenID input field • Extend the sign in page with an OpenID input field • Extend the settings page to attach and detach openIDs Geneva Application Security Forum 2010, March 4th 2010 Page 11
  • 12. OpenID - How to Integrate? Ingredients • A OpenID Consumer Library • The Standard OpenID Logos • An OpenID Provider to test your site with Geneva Application Security Forum 2010, March 4th 2010 Page 12
  • 13. OpenID - How to Integrate? OpenID Libraries Language Library C# DotNetOpenId, ExtremeSwank C++ Libopkele Java NetMesh InfoGrid LID, OpenID4Java, joid Perl Net::OpenID, OpenID4Perl Python JanRain Ruby JanRain, Heraldry PHP Jan Rain, Zend Framework OpenID Component, Saeven.net's JanRain Service Utility Class, Taral, Simple Class, sfOpenIDPlugin, CakePHP, EasyOpenID, OpenID For PHP, AuthOpenID Snippet Coldfusion CFKit OpenID, CFOpenID, OpenID CFC Apache 2 mod_auth_openid Geneva Application Security Forum 2010, March 4th 2010 Page 13
  • 14. SECTION 2 SECTION 2 SAML >What is it? >How does it work? Geneva Application Security Forum 2010, March 4th 2010 Page 14
  • 15. SAML – What is it? SAML (Security Assertion Markup Language): > Defined by the Oasis Group > Well and Academically Designed Specification > Uses XML Syntax > Used for Authentication & Authorization > SAML Assertions > Statements: Authentication, Attribute, Authorization > SAML Protocols > Queries: Authentication, Artifact, Name Identifier Mapping, etc. > SAML Bindings > SOAP, Reverse-SOAP, HTTP-Get, HTTP-Post, HTTP-Artifact > SAML Profiles > Web Browser SingleSignOn Profile, Identity Provider Discovery Profile, Assertion Query / Request Profile, Attribute Profile Geneva Application Security Forum 2010, March 4th 2010 Page 15
  • 16. SAML – How does it work? User Hans Muster AUTHENTICATION Redirect with Identity Provider <Response> Redirect with e.g. clavid.ch (signed Assertion) <AuthnRequest> Access Resource Enabled Service e.g. Google Apps for Business Geneva Application Security Forum 2010, March 4th 2010 Page 16
  • 17. SAML – How does it work? User Hans Muster 3 2 4 Identity Provider e.g. clavid.ch 4 2 1 6 Enabled Service e.g. Google Apps for Business Geneva Application Security Forum 2010, March 4th 2010 Page 17
  • 18. SAML – How does it work? Step 1: A user decides to use a personalized Internet Service connected to a SAML based Identity provider (e.g. Google Business Application Calendar). Step 2: The Internet Service recognizes that the user is not logged in yet. A SAML <AuthnRequest> is created and sent via redirect to the Identity Provider. Step 3: The Identity Provider provides possible authentication methods for that specific user (in this case “YubiKey” OTP). Having successfully authenticated, the next step is initiated. Step 4: The Identity Provider creates a SAML <Response> containing the user’s identifier for the specific target application. Then it signs the SAML <Response> and sends it via a Post- Redirect to the Internet Services (e.g. Google Calendar) Step 5: The Internet Service (e.g. Google Apps) verifies the signature of the SAML <Response> and now knows the user’s identifier provided by the Identity Provider. Step 6: The Internet Service can now be used by the user. Geneva Application Security Forum 2010, March 4th 2010 Page 18
  • 19. SAML – How does it work? 1) Call Application URL 3) Application Usage 2) Login Geneva Application Security Forum 2010, March 4th 2010 Page 19
  • 20. SECTION 3 SECTION 3 Identity Federation Geneva Application Security Forum 2010, March 4th 2010 Page 20
  • 21. B2B Identity Federation - The Protocol Problem Company A Intranet Internet Service A Travel Proprietary Token Ticket Shop https Internet Service B OpenID Document Management SAML 1.0 Internet Service C Personal Recruting SAML 2.0 SaaS Applications Geneva Application Security Forum 2010, March 4th 2010 Page 21
  • 22. B2B Identity Federation - The Protocol Mess Company A Intranet Internet Service A Proprietary Token OpenID Travel Ticket Shop SAML 1.0 https Internet Service B SAML 2.0 Company B Document Management Intranet Proprietary Token OpenID Internet Service C SAML 1.0 Personal https SAML 2.0 Recruting Company C Proprietary Token SaaS Applications Intranet OpenID SAML 1.0 https SAML 2.0 Geneva Application Security Forum 2010, March 4th 2010 Page 22
  • 23. B2B Identity Federation - The Protocol Solution Company A Intranet Internet Service A Travel Ticket Shop https Internet Service B Internet Identity Provider Proprietary Token Company B Proprietary Token Document Identity Mapping Management Intranet OpenID One Time Passw. (OTP) Internet SSO Internet Service C Biometric (AXSioncs) Mobile Phone (SMS) eID (Identity Card) OpenID SAML 1.0 Personal https SSL Certificates Recruting Internet SSO Company C SAML 2.0 SAML 2.0 SaaS Applications https Intranet https Geneva Application Security Forum 2010, March 4th 2010 Page 23
  • 24. B2B Identity Federation - The Protocol Solution Company A Company B Intranet Intranet https https Internet Identity Provider Proprietary Token SAML 1.0 Company C Identity Federation Intranet One Time Passw. (OTP) Internet SSO Internet SSO Biometric (AXSioncs) Mobile Phone (SMS) eID (Identity Card) SAML 2.0 https SSL Certificates https https Geneva Application Security Forum 2010, March 4th 2010 Page 24
  • 25. SECTION 4 SECTION 4 A Word on SuisseID Geneva Application Security Forum 2010, March 4th 2010 Page 25
  • 26. A Word On SuisseID • SuisseID is currently in Early Draft Specification Phase • SuisseID should be available for public in spring 2010 • SuisseID cost will be refunded by the Government in 2010 • SuisseID will most probably be: – A signature certificate – An authentication certificate – All certificates conform to ZertES – Certificates contain a unique SuisseID number – An Identity Provider Services for attribute exchange • Eligible SuisseID certificate service providers will be: – Swiss Post (SwissSign), Swisscom, QuiVadis, Swiss Government Geneva Application Security Forum 2010, March 4th 2010 Page 26
  • 27. A Word On SuisseID Geneva Application Security Forum 2010, March 4th 2010 Page 27
  • 28. SECTION 5 SECTION 5 Strong Authentication as a Service Geneva Application Security Forum 2010, March 4th 2010 Page 28
  • 29. OpenID - International Identity Providers Username/Password Certificates Biometric OTP Geneva Application Security Forum 2010, March 4th 2010 Page 29
  • 30. Clavid Portal for Strong Authentication Geneva Application Security Forum 2010, March 4th 2010 Page 30
  • 31. Clavid Portal - AXSionics Geneva Application Security Forum 2010, March 4th 2010 Page 31
  • 32. Clavid Portal - Yubikey Geneva Application Security Forum 2010, March 4th 2010 Page 32
  • 33. Clavid Portal - Certificates Geneva Application Security Forum 2010, March 4th 2010 Page 33
  • 34. Clavid Portal - One Time Password OTP Methods: • OATH HOTP (RFC4226) • Challenge/Response (RFC2289) • Mobile OTP (OpenSource Project) • SMS • ... others ... Geneva Application Security Forum 2010, March 4th 2010 Page 34
  • 35. Clavid Portal - Personas Geneva Application Security Forum 2010, March 4th 2010 Page 35
  • 36. Clavid Portal - Login Settings Geneva Application Security Forum 2010, March 4th 2010 Page 36
  • 37. Clavid Login Dialog Geneva Application Security Forum 2010, March 4th 2010 Page 37
  • 38. SECTION 6 SECTION 6 Conclusion >Further References >Questions & Answers >Contact Information Geneva Application Security Forum 2010, March 4th 2010 Page 38
  • 39. Further Links: on OpenID OpenID Identity Providers can be found at: > http://en.wikipedia.org/wiki/OpenID > http://en.wikipedia.org/wiki/List_of_OpenID_providers > http://www.openiddirectory.com/openid-providers-c-1.html > http://www.clavid.com/ (Strong Authentication in Europe) Geneva Application Security Forum 2010, March 4th 2010 Page 39
  • 40. Conclusion > OpenID: An open, well documented specification allowing Internet Single Sign-On (SSO) for individual “Public Services” (B2C) > SAML: Trust based Internet and Intranet Single Sign-On for Business Services (B2B) > Professional Identity Providers already in place > User Centric Identity Management already integrated > Join OpenID Switzerland in order to increase the OpenID momentum > Enable your Internet Services to support OpenID or SAML !!! Geneva Application Security Forum 2010, March 4th 2010 Page 40
  • 41. Demo > SAML-Login to Google Business Apps using AXSionics Fingerprint > SAML-Login to Salesforce.com using YubiKey OTP > OpenID login to local.ch using Swiss PostZertifikat > Online Identity Administration (Clavid Portal) Geneva Application Security Forum 2010, March 4th 2010 Page 41
  • 42. Questions & Answers Geneva Application Security Forum 2010, March 4th 2010 Page 42
  • 43. Contact Information Geneva Application Security Forum 2010, March 4th 2010 Page 43