SlideShare a Scribd company logo
High Availability of Identity Federation System on JBossAS Roger Carhuatocto QA & IT Security Project Manager IN2, Ingeniería de la Información 11 October 2005
me I Worked in several Integrator Companies such as STE Consulting of the Group ALTRAN as Security and integration Consultant In Safelayer Secure Communications I was Project Manager in Horizontal Integration of PKI projects.  I was responsible of Educational Services Area in esCERT-UPC (Spanish Computer Emergency Response Team of Catalonian Technical University), giving technical support to projects related to IT Security. Actually I combines my  time in different initiatives related to IT Security and Open Source Projects (GOS4i, QDT-Java, INTIX-PKI and CP4DF) with leading the technical line in IN2 related to IT Security Integration for Critical Solutions.
Content The problem: Identity management User authentication, access control, privacy, anonymity, accounting, etc. Personalization, SSO, constraints on exploit identity, etc. Solutions based in standards SAML, Liberty Alliance, WS-* XML as backbone AAA: Authentication, Authorization and Attributes Solutions and products Case: IdFed System on JBossAS
Digital Identity Virtual representation of the real identity Real identity (individual identity, set of attributes): {Name=Roger, Addr=Llinars Av, DriverLic=123456, FieldEmploy=Programmer} Identifier:  {Name=Roger} Authenticator (token, credential): {DriverLic=12345} Permission: {Roger can drive a Porsche} Rols that can assume:  It is the vision that the rest of organizations has of the individual For electronic interactions with persons and systems The indentity never is electronic or digital, it is physic The process for establishing and validating the identity is electronic Digital identity of the individuals is distributed between a the organizations/systems whereas in each interaction with these organizations/systems a certain identity is used
Trends in Identity Mgmt Consumer Security Easy access, SSO Anonymity e-Business Consolidate relationship with customers Personalization, target ads, offers, single face to consumer Enterprise True SSO on heterogeneous environments Integration with business partners Goverment e-Goverment, constraints on how businesses exploit identity information Privacy regulations (Spain: LOPD, LSSIce)
Models of Identity Management Silo Predominant model Id-Mgmt environment is operated by a single entity for a fixed user comunity Walled garden Closed community of organizations Single Id-Mgmt System is deployed to serve the common user community of a collection of businesses. i.e B2B Federation There is no single entity that operates the Identity Mgmt System Multiple Identity Provider and partitioned store for identity information
“ A Federation is less painful than a Revolution ” Federation Two or more organizations than decide collaborate with an common objective, in this case to make business transactions or processes (trading relationships)  that cross the edge of each organization (circle of trust). It is an organizational concept, nontechnician. Identity Federation Exchange information on identities between different domains and keeping full control on own identity management Allow the portability of the Digital Identity between applications and domains Liberty Alliance
Elements of an Identity Mgmt System 1/2 Basic elements: Repository (core of the system) Logical data storage facility , Identity data model (i.e. LDAP) Authentication provider / Identity provider (IdP, Asserting Party) Performing primary authentication of an individual wich will link them given identity Produce an authenticator (token) by passwd, Digital Cert (X509), smart card, etc. Policy controls (Access to and use of identity information) Authorization policies (how the information is manipulated) Privacy policies (how identity information may be disclosed) Auditing (how and by whom policy were circumvented) Management elements Provisioning / Service provider (SP, Relying Party) Manage the lifecycle of an identity: creation, linkage, setting and changing attr and privileges, decommissioning of identity Verification of data fro authority, propagate data to affiliated system Longevity (create historical record of an identity)
Elements of an Identity Mgmt System 2/2 Consumable elements: SSO Personalization Access Management Management of AAA: Authentication, Authorization and Attributes Hub of Service Hub of Identity IdP/SP IdP/SP IdP/SP IdP/SP IdP/SP Tributary agency VISA Network Healthcare public system Federation multi-provider IdP SP IdP IdP IdP IdP IdP IdP SP SP SP SP SP SP
Content The problem: Identity management User authentication, access control, privacy, anonymity, accounting, etc. Personalization, SSO, constraints on exploit identity, etc. Solutions based in standards SAML, Liberty Alliance, WS-* XML as backbone AAA: Authentication, Authorization and Attributes Solutions and products  Case: IdFed System on JBossAS
Standards: SAML Service Provider ID Provider AuthN Assertion Request  Credentials SAML: Security Assertion Mark-Up Language Format and  protocol for asking (request) for the identity of a user who tries to enter in the system ,  as well as the format of the answers (response) It is a service of the applications, is transparent (hidden) to the user. The organization who emits the standard is OASIS. Based on XML, with format SOAP Transported through HTTP, HTTPs (preferred) 1 Assertion Response  2
Standards: Why SAML? May 13: Sun and Microsoft announce new identity specifications and additional measures for product interoperability: Web SSO Metadata exchange and interop profile Standards roadmap Web Federated SSO The most evolved. Hard support of the main actors of the market Confluence of Liberty 2.0 and Shibbloleth v.1.2.  Last version: SAML v2.0, March 2005 Liberty  ID-FF 1.1 SAML 1.0 SAML 1.1 Shibboleth 1.x Liberty ID-FF 1.2 SAML 2.0  (Mar2005) Shibboleth 2.0 (4Q2005) WS-Fed Passive interop profile SSO interop profile SSO MEX
Standards: SAML, a assertion Server which send the “assertion” Time valid of the “assertion” User being authenticated Authentication method used
Standards: SAML, functional requirements Authentication, Authorization and Attributes Necessary to develop/integrate a Gateway of IdFed for each application that we want to enable with:  Web SSO  Supplying and management of accounts of user federated Access control Policy for resources federated SAML does not provide: Mechanisms of login (it only transports information on login)  Management of users or repositorios of credentials (ldap, etc.) Management of passwords, etc.
Solutions and products Toolkits Open Source: LASSO, SourceID, Internet2, OpenSaml Grid and SAML/ID-FF: GriShib, GridNet Comercial: Oracle (Phaos), Mycroft, Sun, PingFederate Other products SSL VPN Juniper Networks, PortWise Virtual directories Radiant Logic, OctetString, Symlabs Authorization services Bayshore Networks, Bhold, Epok, Jericho Systems XML/Web services security Actional, DataPower, Forum Systems, Layer 7, Reactivity, Sarvega, Systinet, Vordel
Content The problem: Identity management User authentication, access control, privacy, anonymity, accounting, etc. Personalization, SSO, constraints on exploit identity, etc. Solutions based in standards SAML, Liberty Alliance, WS-* XML as backbone AAA: Authentication, Authorization and Attributes Solutions and products Case: IdFed System on JBossAS
Web Single Sign On (Clasic) Credentials: User/password X509 cert etc Cookie Cookie www.domain.com App A App B App C It is possible make it easy with one SSO intradomain The domain servers, after of the user authentication, send a cookie  This cookie is used, of transparent manner, for the apps of domain in the authentication process It is valid for this domain only No gives any solution for many user identities (credentials)
Cross Domain Single Sign On Credentials: User/password X509 cert etc otherdomain.com App D App E App F mydomain.com App A App B App C Plug-In Plug-In Adding a plug-in (comercial) into servers, is possible to get a interdomain SSO The servers of domain, after of user authentication, to trust its identity Is a instrisive technology, is necesary of technology agreements (generalmente bilaterales) between theys partes. Make it easy magement of many user identities (credentials) parte las múltiples identidades (credenciales) It is not scalable to multiple relationships
Identity Federation (for Web SSO) App D App E App F mydomain.com App A App B App C otherdomain.com All services enabled by adapter can: Request/Ask for identity and method of user authentication Response to others services about of identity, permissions and method of user authentication of a especific user (citizen) The servers/services denied access or not by trusting in information that the other app provide Use specifications for exchange of information of standard manner Solves multiplicity of credentials of the user  by granting differents access levels to applications based in the credential security Any user can do use of credentials choosed, access into app and browsing in all applications federated Credentials: User/password X509 cert etc
Web SSO: IdFed between apps App2 App1 1 2 4 3 6 (1) User is authenticated in App1 by digital certificate (2) User logged in App1 needs to go to App2 (related to App1, but App2 uses user/password for authentication) (3) When user trying to access to App2, (4) the server request to App1 for the parameters of user identity (5) App1 sends a message with information requested, (6) App2 based in security policies gives access to the user ..vice-versa 5
Requirements for IdFed System 1. Functionality Serveral users could use it: grid infrastructure AAA, Federation policies, SSO, Nonrepudiation, Mapping and transformation of attributes, Roaming, etc. Scalability in Management of a IdFed community (many IdFed Systems), Remote configuration, etc. 2. Critical areas, potential problems Throughput, High availability,  Fault tolerance/clustering, strong security, Reliable and Self Recovering, Distributed (Grid?), Several users (Grid?), etc. The standard avoid attacks such as: “replay”, “man in the middle”, etc. 3. Coexistence of protocols and evolution of standards Evolutionary NOT Revolutionary Support SAML 1.x and Liberty Alliance 2.0, Support in the future for SAML 2.0 Recently products s/WS-Federation BMC, IBM, Symlabs Microsoft AD Federation Services as part of Windows Server 2003 R2
IdFed: Common task list Normalize the repository for storing the data required for SAML Develop/Integrate a IdFed Gateway for each aplication. Define federation policies Define mechanism of sincronization between IdFed Systems SAML  Gateway App1 App2 App3 SAML  Gateway SAML  Gateway SAML  Gateway
IdFed: The gateway IDP SP SP SP Based on SAML and Opensource Use OpenSAML (generics libs in C++ and Java)  Modify Lasso/SourceID (Gateway Opensource for Java y .Net) Multiprotocol?, Traductor between protocols? SAML 1.X, 2.0 Id-FF 1.X WS-FEDERATION IDP hub? SP hub? Authentication Assertion
IdFed: Federation policies Define basic policies  Rols and groups Example: Users without certificate: read access to apps federated User with certificate: read-write access Best practices IdFed: Make it easy for adding new federated services to current infrastructure: Identity Providers Service Providers Attribute Providers Services of Location
JBossAS-IdFed 1. FedId Functionality AAA: JAAS/JACC Federation rules: SAML/IDFF (Liberty Alliance) Nonrepudiation, mapping of attributes and X.509 (JAAS module) IDP: JBossAS + Cluster SP: JBossAS Toolkits: Opensource or propietary 2. Critical areas Several users: grid and distributed? High availibility:  Persistence with JBossMQ or grid infrastructure Autodiscovery of other FedID Gateways: multicasting Fail over: HAJNDI, Clustering, JBossMQ,  Security: WS-Security, JBossSX (support non-JAAS and JAAS)
JBossAS-IdFed 3.  Coexistence of protocols and evolution of standards Evolutionary NOT Revolutionary Support SAML 1.x and Liberty Alliance 2.0, Support in the future for SAML 2.0 Recently products s/WS-Federation
JBossAS-IdFed Architecture JAAS JBossSX IDFedGw XML/SAML Middleware (WS, RMI, JMS, EJB) JBoss Microkernel (JMX) HA, cache Clustering
High Availability of Identity Federation System on JBossAS Roger Carhuatocto QA & IT Security Project Manager IN2, Ingeniería de la Información 11 October 2005
Ad

More Related Content

What's hot (19)

End-to-End Identity Management
End-to-End Identity ManagementEnd-to-End Identity Management
End-to-End Identity Management
WSO2
 
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
P2PSystem
 
Design Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity ProvisioningDesign Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity Provisioning
Mike Reams
 
Authentication through Claims-Based Authentication
Authentication through Claims-Based AuthenticationAuthentication through Claims-Based Authentication
Authentication through Claims-Based Authentication
ijtsrd
 
test
testtest
test
pixeldemo
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
Sven Wohlgemuth
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huang
Ken Huang
 
76 s201923
76 s20192376 s201923
76 s201923
IJRAT
 
Windows Identity Foundation
Windows Identity FoundationWindows Identity Foundation
Windows Identity Foundation
manz1234
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
Hitachi ID Systems, Inc.
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
Information Security Services SA
 
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
Chema Alonso
 
Claim based authentaication
Claim based authentaicationClaim based authentaication
Claim based authentaication
Sean Xiong
 
Open am and_radiantone
Open am and_radiantoneOpen am and_radiantone
Open am and_radiantone
Jose R
 
e-Idenity-and-e-Government_ELAK-Code-Camp-Lecture_I
e-Idenity-and-e-Government_ELAK-Code-Camp-Lecture_Ie-Idenity-and-e-Government_ELAK-Code-Camp-Lecture_I
e-Idenity-and-e-Government_ELAK-Code-Camp-Lecture_I
Connected Islands
 
Identity Managment
Identity ManagmentIdentity Managment
Identity Managment
Alanoud Alqoufi
 
Single sign on assistant an authentication brokers
Single sign on assistant an authentication brokersSingle sign on assistant an authentication brokers
Single sign on assistant an authentication brokers
Finalyear Projects
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
Hai Nguyen
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
Hai Nguyen
 
End-to-End Identity Management
End-to-End Identity ManagementEnd-to-End Identity Management
End-to-End Identity Management
WSO2
 
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
P2PSystem
 
Design Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity ProvisioningDesign Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity Provisioning
Mike Reams
 
Authentication through Claims-Based Authentication
Authentication through Claims-Based AuthenticationAuthentication through Claims-Based Authentication
Authentication through Claims-Based Authentication
ijtsrd
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
Sven Wohlgemuth
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huang
Ken Huang
 
76 s201923
76 s20192376 s201923
76 s201923
IJRAT
 
Windows Identity Foundation
Windows Identity FoundationWindows Identity Foundation
Windows Identity Foundation
manz1234
 
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
Chema Alonso
 
Claim based authentaication
Claim based authentaicationClaim based authentaication
Claim based authentaication
Sean Xiong
 
Open am and_radiantone
Open am and_radiantoneOpen am and_radiantone
Open am and_radiantone
Jose R
 
e-Idenity-and-e-Government_ELAK-Code-Camp-Lecture_I
e-Idenity-and-e-Government_ELAK-Code-Camp-Lecture_Ie-Idenity-and-e-Government_ELAK-Code-Camp-Lecture_I
e-Idenity-and-e-Government_ELAK-Code-Camp-Lecture_I
Connected Islands
 
Single sign on assistant an authentication brokers
Single sign on assistant an authentication brokersSingle sign on assistant an authentication brokers
Single sign on assistant an authentication brokers
Finalyear Projects
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
Hai Nguyen
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
Hai Nguyen
 

Viewers also liked (19)

Google cardboard what's inside the box - mildura development corp
Google cardboard   what's inside the box - mildura development corpGoogle cardboard   what's inside the box - mildura development corp
Google cardboard what's inside the box - mildura development corp
Tim Gentle
 
IntelligentEnterprise
IntelligentEnterpriseIntelligentEnterprise
IntelligentEnterprise
Barry Grushkin 9,600 +
 
Data Science-final7
Data Science-final7Data Science-final7
Data Science-final7
Barry Grushkin 9,600 +
 
Distrito 04
Distrito 04Distrito 04
Distrito 04
Victor Manuel Gomez Orozco
 
Sellers Seek Faster cash cycles from Retailers
Sellers Seek Faster cash cycles from RetailersSellers Seek Faster cash cycles from Retailers
Sellers Seek Faster cash cycles from Retailers
Ashish Jhalani
 
TRANSPARÊNCIA COM DINHEIRO PÚBLICO.EXTRATO DE PUBLICAÇÃO NA IMPRENSA OFICIAL ...
TRANSPARÊNCIA COM DINHEIRO PÚBLICO.EXTRATO DE PUBLICAÇÃO NA IMPRENSA OFICIAL ...TRANSPARÊNCIA COM DINHEIRO PÚBLICO.EXTRATO DE PUBLICAÇÃO NA IMPRENSA OFICIAL ...
TRANSPARÊNCIA COM DINHEIRO PÚBLICO.EXTRATO DE PUBLICAÇÃO NA IMPRENSA OFICIAL ...
Antônio Fernandes
 
Public Key Infrastructure
Public Key InfrastructurePublic Key Infrastructure
Public Key Infrastructure
Roger CARHUATOCTO
 
Surprises du monde vivant XXXV - Les Adieux
Surprises du monde vivant XXXV - Les AdieuxSurprises du monde vivant XXXV - Les Adieux
Surprises du monde vivant XXXV - Les Adieux
Romane-de-Centelles
 
Blog slideshare (h istoria del carnaval)
Blog slideshare (h istoria del carnaval)Blog slideshare (h istoria del carnaval)
Blog slideshare (h istoria del carnaval)
Veronica-7
 
Tagger workbook 300dpi rgb 3-21
Tagger workbook 300dpi rgb 3-21Tagger workbook 300dpi rgb 3-21
Tagger workbook 300dpi rgb 3-21
Tagger London
 
Conclusiones encuesta
Conclusiones encuestaConclusiones encuesta
Conclusiones encuesta
chusgomu
 
5 beautiful but Extremely Dangerous Animals
5 beautiful but Extremely Dangerous Animals5 beautiful but Extremely Dangerous Animals
5 beautiful but Extremely Dangerous Animals
Hamza Shakeel
 
Nombre apellido grencia de proyectos
Nombre apellido  grencia de proyectosNombre apellido  grencia de proyectos
Nombre apellido grencia de proyectos
UNIVERSIDAD DE SANTANDER
 
PRESENTATION CREDIT4LIFE (3)
PRESENTATION CREDIT4LIFE (3)PRESENTATION CREDIT4LIFE (3)
PRESENTATION CREDIT4LIFE (3)
Credit4Life LLC Simon Buniak
 
Medios mecánicos de almacenaje
Medios mecánicos de almacenajeMedios mecánicos de almacenaje
Medios mecánicos de almacenaje
Carmen Ginés Balas
 
Vulnerabilidades y soluciones
Vulnerabilidades y solucionesVulnerabilidades y soluciones
Vulnerabilidades y soluciones
Carlos Andres Perez Cabrales
 
Horario
HorarioHorario
Horario
None
 
Gerencia de procesos - Organizaciones orientadas por procesos
Gerencia de procesos - Organizaciones orientadas por procesosGerencia de procesos - Organizaciones orientadas por procesos
Gerencia de procesos - Organizaciones orientadas por procesos
Marta Silvia Tabares
 
Google cardboard what's inside the box - mildura development corp
Google cardboard   what's inside the box - mildura development corpGoogle cardboard   what's inside the box - mildura development corp
Google cardboard what's inside the box - mildura development corp
Tim Gentle
 
Sellers Seek Faster cash cycles from Retailers
Sellers Seek Faster cash cycles from RetailersSellers Seek Faster cash cycles from Retailers
Sellers Seek Faster cash cycles from Retailers
Ashish Jhalani
 
TRANSPARÊNCIA COM DINHEIRO PÚBLICO.EXTRATO DE PUBLICAÇÃO NA IMPRENSA OFICIAL ...
TRANSPARÊNCIA COM DINHEIRO PÚBLICO.EXTRATO DE PUBLICAÇÃO NA IMPRENSA OFICIAL ...TRANSPARÊNCIA COM DINHEIRO PÚBLICO.EXTRATO DE PUBLICAÇÃO NA IMPRENSA OFICIAL ...
TRANSPARÊNCIA COM DINHEIRO PÚBLICO.EXTRATO DE PUBLICAÇÃO NA IMPRENSA OFICIAL ...
Antônio Fernandes
 
Surprises du monde vivant XXXV - Les Adieux
Surprises du monde vivant XXXV - Les AdieuxSurprises du monde vivant XXXV - Les Adieux
Surprises du monde vivant XXXV - Les Adieux
Romane-de-Centelles
 
Blog slideshare (h istoria del carnaval)
Blog slideshare (h istoria del carnaval)Blog slideshare (h istoria del carnaval)
Blog slideshare (h istoria del carnaval)
Veronica-7
 
Tagger workbook 300dpi rgb 3-21
Tagger workbook 300dpi rgb 3-21Tagger workbook 300dpi rgb 3-21
Tagger workbook 300dpi rgb 3-21
Tagger London
 
Conclusiones encuesta
Conclusiones encuestaConclusiones encuesta
Conclusiones encuesta
chusgomu
 
5 beautiful but Extremely Dangerous Animals
5 beautiful but Extremely Dangerous Animals5 beautiful but Extremely Dangerous Animals
5 beautiful but Extremely Dangerous Animals
Hamza Shakeel
 
Horario
HorarioHorario
Horario
None
 
Gerencia de procesos - Organizaciones orientadas por procesos
Gerencia de procesos - Organizaciones orientadas por procesosGerencia de procesos - Organizaciones orientadas por procesos
Gerencia de procesos - Organizaciones orientadas por procesos
Marta Silvia Tabares
 
Ad

Similar to Identity Federation on JBossAS (20)

Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
John Lewis
 
Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric Identity
Oliver Pfaff
 
"Securing SSO Authentication: Strategies to eliminate vulnerabilities", Oleh ...
"Securing SSO Authentication: Strategies to eliminate vulnerabilities", Oleh ..."Securing SSO Authentication: Strategies to eliminate vulnerabilities", Oleh ...
"Securing SSO Authentication: Strategies to eliminate vulnerabilities", Oleh ...
Fwdays
 
Protect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloudProtect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloud
Microsoft
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web Application
Sylvain Maret
 
Web-services
Web-services Web-services
Web-services
webhostingguy
 
WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product Overview
WSO2
 
Campus Consortium EdTalks Featuring Clemson University
Campus Consortium EdTalks Featuring Clemson UniversityCampus Consortium EdTalks Featuring Clemson University
Campus Consortium EdTalks Featuring Clemson University
Campus Consortium
 
Security for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIsSecurity for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIs
idescitation
 
Presentation
PresentationPresentation
Presentation
Laxman Kumar
 
SWXG 2010.6.9 v2
SWXG 2010.6.9 v2SWXG 2010.6.9 v2
SWXG 2010.6.9 v2
Paul Trevithick
 
A A A
A A AA A A
A A A
Cristian Vat
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
ITDogadjaji.com
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
mariona83
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Hitachi ID Systems, Inc.
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
bdemchak
 
Salesforce DevOps Online Training Institute
Salesforce DevOps Online Training InstituteSalesforce DevOps Online Training Institute
Salesforce DevOps Online Training Institute
eshwarvisualpath
 
Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7
EAE
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
Manish Harsh
 
I am sharing 'unit 3' with youuuuuu.PPTX
I am sharing 'unit 3' with youuuuuu.PPTXI am sharing 'unit 3' with youuuuuu.PPTX
I am sharing 'unit 3' with youuuuuu.PPTX
padhaipadhai639
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
John Lewis
 
Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric Identity
Oliver Pfaff
 
"Securing SSO Authentication: Strategies to eliminate vulnerabilities", Oleh ...
"Securing SSO Authentication: Strategies to eliminate vulnerabilities", Oleh ..."Securing SSO Authentication: Strategies to eliminate vulnerabilities", Oleh ...
"Securing SSO Authentication: Strategies to eliminate vulnerabilities", Oleh ...
Fwdays
 
Protect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloudProtect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloud
Microsoft
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web Application
Sylvain Maret
 
WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product Overview
WSO2
 
Campus Consortium EdTalks Featuring Clemson University
Campus Consortium EdTalks Featuring Clemson UniversityCampus Consortium EdTalks Featuring Clemson University
Campus Consortium EdTalks Featuring Clemson University
Campus Consortium
 
Security for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIsSecurity for Future Networks: A Prospective Study of AAIs
Security for Future Networks: A Prospective Study of AAIs
idescitation
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
ITDogadjaji.com
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
mariona83
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Hitachi ID Systems, Inc.
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
bdemchak
 
Salesforce DevOps Online Training Institute
Salesforce DevOps Online Training InstituteSalesforce DevOps Online Training Institute
Salesforce DevOps Online Training Institute
eshwarvisualpath
 
Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7
EAE
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
Manish Harsh
 
I am sharing 'unit 3' with youuuuuu.PPTX
I am sharing 'unit 3' with youuuuuu.PPTXI am sharing 'unit 3' with youuuuuu.PPTX
I am sharing 'unit 3' with youuuuuu.PPTX
padhaipadhai639
 
Ad

More from Roger CARHUATOCTO (20)

[Webinar] Creando un "backend" con WSO2
[Webinar] Creando un "backend" con WSO2 [Webinar] Creando un "backend" con WSO2
[Webinar] Creando un "backend" con WSO2
Roger CARHUATOCTO
 
[Webinar] SOA ágil con WSO2
[Webinar] SOA ágil con WSO2[Webinar] SOA ágil con WSO2
[Webinar] SOA ágil con WSO2
Roger CARHUATOCTO
 
[Webinar] Gestión Identidades y Control de Acceso en los Servicios usando WSO...
[Webinar] Gestión Identidades y Control de Acceso en los Servicios usando WSO...[Webinar] Gestión Identidades y Control de Acceso en los Servicios usando WSO...
[Webinar] Gestión Identidades y Control de Acceso en los Servicios usando WSO...
Roger CARHUATOCTO
 
Comparativa de Suites BPM free open source (v1.0-20110721)
Comparativa de Suites BPM free open source (v1.0-20110721)Comparativa de Suites BPM free open source (v1.0-20110721)
Comparativa de Suites BPM free open source (v1.0-20110721)
Roger CARHUATOCTO
 
Orquestando Procesos de Negocio de manera ágil con Bonita BPM (v1.0)
Orquestando Procesos de Negocio de manera ágil con Bonita BPM (v1.0)Orquestando Procesos de Negocio de manera ágil con Bonita BPM (v1.0)
Orquestando Procesos de Negocio de manera ágil con Bonita BPM (v1.0)
Roger CARHUATOCTO
 
BizLife - Construyendo un Ecosistema Empresarial usando WSO2
BizLife - Construyendo un Ecosistema Empresarial usando WSO2BizLife - Construyendo un Ecosistema Empresarial usando WSO2
BizLife - Construyendo un Ecosistema Empresarial usando WSO2
Roger CARHUATOCTO
 
Chakray.com - Enterprise Security and IAM with WSO2IS and Penrose
Chakray.com - Enterprise Security and IAM with WSO2IS and PenroseChakray.com - Enterprise Security and IAM with WSO2IS and Penrose
Chakray.com - Enterprise Security and IAM with WSO2IS and Penrose
Roger CARHUATOCTO
 
Introducción a la gestión de contenidos web con Liferay Portal 6.1.x
Introducción a la gestión de contenidos web con Liferay Portal 6.1.xIntroducción a la gestión de contenidos web con Liferay Portal 6.1.x
Introducción a la gestión de contenidos web con Liferay Portal 6.1.x
Roger CARHUATOCTO
 
WSO2Con 2013 - WSO2 as a Crypto Platform
WSO2Con 2013 - WSO2 as a Crypto PlatformWSO2Con 2013 - WSO2 as a Crypto Platform
WSO2Con 2013 - WSO2 as a Crypto Platform
Roger CARHUATOCTO
 
Drupal camp2010bcn cmis-drupal_alfresco-v1.1
Drupal camp2010bcn cmis-drupal_alfresco-v1.1Drupal camp2010bcn cmis-drupal_alfresco-v1.1
Drupal camp2010bcn cmis-drupal_alfresco-v1.1
Roger CARHUATOCTO
 
Fast building Vertical Portals: e-Learning and Social Network
Fast building Vertical Portals: e-Learning and Social Network Fast building Vertical Portals: e-Learning and Social Network
Fast building Vertical Portals: e-Learning and Social Network
Roger CARHUATOCTO
 
03 webinar content_deliveryplatform_v1.0-intix
03 webinar content_deliveryplatform_v1.0-intix03 webinar content_deliveryplatform_v1.0-intix
03 webinar content_deliveryplatform_v1.0-intix
Roger CARHUATOCTO
 
01 webinar caso_migracion_portalweb_v1.4.1-intix
01 webinar caso_migracion_portalweb_v1.4.1-intix01 webinar caso_migracion_portalweb_v1.4.1-intix
01 webinar caso_migracion_portalweb_v1.4.1-intix
Roger CARHUATOCTO
 
02 webinar gestion_expedientes_v0.6.1-intix
02 webinar gestion_expedientes_v0.6.1-intix02 webinar gestion_expedientes_v0.6.1-intix
02 webinar gestion_expedientes_v0.6.1-intix
Roger CARHUATOCTO
 
Drupal Camp2010 Bcn Cmis Drupal Alfresco V1 1
Drupal Camp2010 Bcn Cmis Drupal Alfresco V1 1Drupal Camp2010 Bcn Cmis Drupal Alfresco V1 1
Drupal Camp2010 Bcn Cmis Drupal Alfresco V1 1
Roger CARHUATOCTO
 
1st Peruvian It Security Workshop Flyer
1st Peruvian It Security Workshop Flyer1st Peruvian It Security Workshop Flyer
1st Peruvian It Security Workshop Flyer
Roger CARHUATOCTO
 
PKI Aplicada V1.3
PKI Aplicada V1.3PKI Aplicada V1.3
PKI Aplicada V1.3
Roger CARHUATOCTO
 
Calidad y Seguridad en el SDLC V1 4
Calidad y Seguridad en el SDLC  V1 4Calidad y Seguridad en el SDLC  V1 4
Calidad y Seguridad en el SDLC V1 4
Roger CARHUATOCTO
 
Intrusion Detection System V1.2
Intrusion Detection System V1.2Intrusion Detection System V1.2
Intrusion Detection System V1.2
Roger CARHUATOCTO
 
Digital Forensics V1.4
Digital Forensics V1.4Digital Forensics V1.4
Digital Forensics V1.4
Roger CARHUATOCTO
 
[Webinar] Creando un "backend" con WSO2
[Webinar] Creando un "backend" con WSO2 [Webinar] Creando un "backend" con WSO2
[Webinar] Creando un "backend" con WSO2
Roger CARHUATOCTO
 
[Webinar] SOA ágil con WSO2
[Webinar] SOA ágil con WSO2[Webinar] SOA ágil con WSO2
[Webinar] SOA ágil con WSO2
Roger CARHUATOCTO
 
[Webinar] Gestión Identidades y Control de Acceso en los Servicios usando WSO...
[Webinar] Gestión Identidades y Control de Acceso en los Servicios usando WSO...[Webinar] Gestión Identidades y Control de Acceso en los Servicios usando WSO...
[Webinar] Gestión Identidades y Control de Acceso en los Servicios usando WSO...
Roger CARHUATOCTO
 
Comparativa de Suites BPM free open source (v1.0-20110721)
Comparativa de Suites BPM free open source (v1.0-20110721)Comparativa de Suites BPM free open source (v1.0-20110721)
Comparativa de Suites BPM free open source (v1.0-20110721)
Roger CARHUATOCTO
 
Orquestando Procesos de Negocio de manera ágil con Bonita BPM (v1.0)
Orquestando Procesos de Negocio de manera ágil con Bonita BPM (v1.0)Orquestando Procesos de Negocio de manera ágil con Bonita BPM (v1.0)
Orquestando Procesos de Negocio de manera ágil con Bonita BPM (v1.0)
Roger CARHUATOCTO
 
BizLife - Construyendo un Ecosistema Empresarial usando WSO2
BizLife - Construyendo un Ecosistema Empresarial usando WSO2BizLife - Construyendo un Ecosistema Empresarial usando WSO2
BizLife - Construyendo un Ecosistema Empresarial usando WSO2
Roger CARHUATOCTO
 
Chakray.com - Enterprise Security and IAM with WSO2IS and Penrose
Chakray.com - Enterprise Security and IAM with WSO2IS and PenroseChakray.com - Enterprise Security and IAM with WSO2IS and Penrose
Chakray.com - Enterprise Security and IAM with WSO2IS and Penrose
Roger CARHUATOCTO
 
Introducción a la gestión de contenidos web con Liferay Portal 6.1.x
Introducción a la gestión de contenidos web con Liferay Portal 6.1.xIntroducción a la gestión de contenidos web con Liferay Portal 6.1.x
Introducción a la gestión de contenidos web con Liferay Portal 6.1.x
Roger CARHUATOCTO
 
WSO2Con 2013 - WSO2 as a Crypto Platform
WSO2Con 2013 - WSO2 as a Crypto PlatformWSO2Con 2013 - WSO2 as a Crypto Platform
WSO2Con 2013 - WSO2 as a Crypto Platform
Roger CARHUATOCTO
 
Drupal camp2010bcn cmis-drupal_alfresco-v1.1
Drupal camp2010bcn cmis-drupal_alfresco-v1.1Drupal camp2010bcn cmis-drupal_alfresco-v1.1
Drupal camp2010bcn cmis-drupal_alfresco-v1.1
Roger CARHUATOCTO
 
Fast building Vertical Portals: e-Learning and Social Network
Fast building Vertical Portals: e-Learning and Social Network Fast building Vertical Portals: e-Learning and Social Network
Fast building Vertical Portals: e-Learning and Social Network
Roger CARHUATOCTO
 
03 webinar content_deliveryplatform_v1.0-intix
03 webinar content_deliveryplatform_v1.0-intix03 webinar content_deliveryplatform_v1.0-intix
03 webinar content_deliveryplatform_v1.0-intix
Roger CARHUATOCTO
 
01 webinar caso_migracion_portalweb_v1.4.1-intix
01 webinar caso_migracion_portalweb_v1.4.1-intix01 webinar caso_migracion_portalweb_v1.4.1-intix
01 webinar caso_migracion_portalweb_v1.4.1-intix
Roger CARHUATOCTO
 
02 webinar gestion_expedientes_v0.6.1-intix
02 webinar gestion_expedientes_v0.6.1-intix02 webinar gestion_expedientes_v0.6.1-intix
02 webinar gestion_expedientes_v0.6.1-intix
Roger CARHUATOCTO
 
Drupal Camp2010 Bcn Cmis Drupal Alfresco V1 1
Drupal Camp2010 Bcn Cmis Drupal Alfresco V1 1Drupal Camp2010 Bcn Cmis Drupal Alfresco V1 1
Drupal Camp2010 Bcn Cmis Drupal Alfresco V1 1
Roger CARHUATOCTO
 
1st Peruvian It Security Workshop Flyer
1st Peruvian It Security Workshop Flyer1st Peruvian It Security Workshop Flyer
1st Peruvian It Security Workshop Flyer
Roger CARHUATOCTO
 
Calidad y Seguridad en el SDLC V1 4
Calidad y Seguridad en el SDLC  V1 4Calidad y Seguridad en el SDLC  V1 4
Calidad y Seguridad en el SDLC V1 4
Roger CARHUATOCTO
 
Intrusion Detection System V1.2
Intrusion Detection System V1.2Intrusion Detection System V1.2
Intrusion Detection System V1.2
Roger CARHUATOCTO
 

Identity Federation on JBossAS

  • 1. High Availability of Identity Federation System on JBossAS Roger Carhuatocto QA & IT Security Project Manager IN2, Ingeniería de la Información 11 October 2005
  • 2. me I Worked in several Integrator Companies such as STE Consulting of the Group ALTRAN as Security and integration Consultant In Safelayer Secure Communications I was Project Manager in Horizontal Integration of PKI projects. I was responsible of Educational Services Area in esCERT-UPC (Spanish Computer Emergency Response Team of Catalonian Technical University), giving technical support to projects related to IT Security. Actually I combines my time in different initiatives related to IT Security and Open Source Projects (GOS4i, QDT-Java, INTIX-PKI and CP4DF) with leading the technical line in IN2 related to IT Security Integration for Critical Solutions.
  • 3. Content The problem: Identity management User authentication, access control, privacy, anonymity, accounting, etc. Personalization, SSO, constraints on exploit identity, etc. Solutions based in standards SAML, Liberty Alliance, WS-* XML as backbone AAA: Authentication, Authorization and Attributes Solutions and products Case: IdFed System on JBossAS
  • 4. Digital Identity Virtual representation of the real identity Real identity (individual identity, set of attributes): {Name=Roger, Addr=Llinars Av, DriverLic=123456, FieldEmploy=Programmer} Identifier: {Name=Roger} Authenticator (token, credential): {DriverLic=12345} Permission: {Roger can drive a Porsche} Rols that can assume: It is the vision that the rest of organizations has of the individual For electronic interactions with persons and systems The indentity never is electronic or digital, it is physic The process for establishing and validating the identity is electronic Digital identity of the individuals is distributed between a the organizations/systems whereas in each interaction with these organizations/systems a certain identity is used
  • 5. Trends in Identity Mgmt Consumer Security Easy access, SSO Anonymity e-Business Consolidate relationship with customers Personalization, target ads, offers, single face to consumer Enterprise True SSO on heterogeneous environments Integration with business partners Goverment e-Goverment, constraints on how businesses exploit identity information Privacy regulations (Spain: LOPD, LSSIce)
  • 6. Models of Identity Management Silo Predominant model Id-Mgmt environment is operated by a single entity for a fixed user comunity Walled garden Closed community of organizations Single Id-Mgmt System is deployed to serve the common user community of a collection of businesses. i.e B2B Federation There is no single entity that operates the Identity Mgmt System Multiple Identity Provider and partitioned store for identity information
  • 7. “ A Federation is less painful than a Revolution ” Federation Two or more organizations than decide collaborate with an common objective, in this case to make business transactions or processes (trading relationships) that cross the edge of each organization (circle of trust). It is an organizational concept, nontechnician. Identity Federation Exchange information on identities between different domains and keeping full control on own identity management Allow the portability of the Digital Identity between applications and domains Liberty Alliance
  • 8. Elements of an Identity Mgmt System 1/2 Basic elements: Repository (core of the system) Logical data storage facility , Identity data model (i.e. LDAP) Authentication provider / Identity provider (IdP, Asserting Party) Performing primary authentication of an individual wich will link them given identity Produce an authenticator (token) by passwd, Digital Cert (X509), smart card, etc. Policy controls (Access to and use of identity information) Authorization policies (how the information is manipulated) Privacy policies (how identity information may be disclosed) Auditing (how and by whom policy were circumvented) Management elements Provisioning / Service provider (SP, Relying Party) Manage the lifecycle of an identity: creation, linkage, setting and changing attr and privileges, decommissioning of identity Verification of data fro authority, propagate data to affiliated system Longevity (create historical record of an identity)
  • 9. Elements of an Identity Mgmt System 2/2 Consumable elements: SSO Personalization Access Management Management of AAA: Authentication, Authorization and Attributes Hub of Service Hub of Identity IdP/SP IdP/SP IdP/SP IdP/SP IdP/SP Tributary agency VISA Network Healthcare public system Federation multi-provider IdP SP IdP IdP IdP IdP IdP IdP SP SP SP SP SP SP
  • 10. Content The problem: Identity management User authentication, access control, privacy, anonymity, accounting, etc. Personalization, SSO, constraints on exploit identity, etc. Solutions based in standards SAML, Liberty Alliance, WS-* XML as backbone AAA: Authentication, Authorization and Attributes Solutions and products Case: IdFed System on JBossAS
  • 11. Standards: SAML Service Provider ID Provider AuthN Assertion Request Credentials SAML: Security Assertion Mark-Up Language Format and protocol for asking (request) for the identity of a user who tries to enter in the system , as well as the format of the answers (response) It is a service of the applications, is transparent (hidden) to the user. The organization who emits the standard is OASIS. Based on XML, with format SOAP Transported through HTTP, HTTPs (preferred) 1 Assertion Response 2
  • 12. Standards: Why SAML? May 13: Sun and Microsoft announce new identity specifications and additional measures for product interoperability: Web SSO Metadata exchange and interop profile Standards roadmap Web Federated SSO The most evolved. Hard support of the main actors of the market Confluence of Liberty 2.0 and Shibbloleth v.1.2. Last version: SAML v2.0, March 2005 Liberty ID-FF 1.1 SAML 1.0 SAML 1.1 Shibboleth 1.x Liberty ID-FF 1.2 SAML 2.0 (Mar2005) Shibboleth 2.0 (4Q2005) WS-Fed Passive interop profile SSO interop profile SSO MEX
  • 13. Standards: SAML, a assertion Server which send the “assertion” Time valid of the “assertion” User being authenticated Authentication method used
  • 14. Standards: SAML, functional requirements Authentication, Authorization and Attributes Necessary to develop/integrate a Gateway of IdFed for each application that we want to enable with: Web SSO Supplying and management of accounts of user federated Access control Policy for resources federated SAML does not provide: Mechanisms of login (it only transports information on login) Management of users or repositorios of credentials (ldap, etc.) Management of passwords, etc.
  • 15. Solutions and products Toolkits Open Source: LASSO, SourceID, Internet2, OpenSaml Grid and SAML/ID-FF: GriShib, GridNet Comercial: Oracle (Phaos), Mycroft, Sun, PingFederate Other products SSL VPN Juniper Networks, PortWise Virtual directories Radiant Logic, OctetString, Symlabs Authorization services Bayshore Networks, Bhold, Epok, Jericho Systems XML/Web services security Actional, DataPower, Forum Systems, Layer 7, Reactivity, Sarvega, Systinet, Vordel
  • 16. Content The problem: Identity management User authentication, access control, privacy, anonymity, accounting, etc. Personalization, SSO, constraints on exploit identity, etc. Solutions based in standards SAML, Liberty Alliance, WS-* XML as backbone AAA: Authentication, Authorization and Attributes Solutions and products Case: IdFed System on JBossAS
  • 17. Web Single Sign On (Clasic) Credentials: User/password X509 cert etc Cookie Cookie www.domain.com App A App B App C It is possible make it easy with one SSO intradomain The domain servers, after of the user authentication, send a cookie This cookie is used, of transparent manner, for the apps of domain in the authentication process It is valid for this domain only No gives any solution for many user identities (credentials)
  • 18. Cross Domain Single Sign On Credentials: User/password X509 cert etc otherdomain.com App D App E App F mydomain.com App A App B App C Plug-In Plug-In Adding a plug-in (comercial) into servers, is possible to get a interdomain SSO The servers of domain, after of user authentication, to trust its identity Is a instrisive technology, is necesary of technology agreements (generalmente bilaterales) between theys partes. Make it easy magement of many user identities (credentials) parte las múltiples identidades (credenciales) It is not scalable to multiple relationships
  • 19. Identity Federation (for Web SSO) App D App E App F mydomain.com App A App B App C otherdomain.com All services enabled by adapter can: Request/Ask for identity and method of user authentication Response to others services about of identity, permissions and method of user authentication of a especific user (citizen) The servers/services denied access or not by trusting in information that the other app provide Use specifications for exchange of information of standard manner Solves multiplicity of credentials of the user by granting differents access levels to applications based in the credential security Any user can do use of credentials choosed, access into app and browsing in all applications federated Credentials: User/password X509 cert etc
  • 20. Web SSO: IdFed between apps App2 App1 1 2 4 3 6 (1) User is authenticated in App1 by digital certificate (2) User logged in App1 needs to go to App2 (related to App1, but App2 uses user/password for authentication) (3) When user trying to access to App2, (4) the server request to App1 for the parameters of user identity (5) App1 sends a message with information requested, (6) App2 based in security policies gives access to the user ..vice-versa 5
  • 21. Requirements for IdFed System 1. Functionality Serveral users could use it: grid infrastructure AAA, Federation policies, SSO, Nonrepudiation, Mapping and transformation of attributes, Roaming, etc. Scalability in Management of a IdFed community (many IdFed Systems), Remote configuration, etc. 2. Critical areas, potential problems Throughput, High availability, Fault tolerance/clustering, strong security, Reliable and Self Recovering, Distributed (Grid?), Several users (Grid?), etc. The standard avoid attacks such as: “replay”, “man in the middle”, etc. 3. Coexistence of protocols and evolution of standards Evolutionary NOT Revolutionary Support SAML 1.x and Liberty Alliance 2.0, Support in the future for SAML 2.0 Recently products s/WS-Federation BMC, IBM, Symlabs Microsoft AD Federation Services as part of Windows Server 2003 R2
  • 22. IdFed: Common task list Normalize the repository for storing the data required for SAML Develop/Integrate a IdFed Gateway for each aplication. Define federation policies Define mechanism of sincronization between IdFed Systems SAML Gateway App1 App2 App3 SAML Gateway SAML Gateway SAML Gateway
  • 23. IdFed: The gateway IDP SP SP SP Based on SAML and Opensource Use OpenSAML (generics libs in C++ and Java) Modify Lasso/SourceID (Gateway Opensource for Java y .Net) Multiprotocol?, Traductor between protocols? SAML 1.X, 2.0 Id-FF 1.X WS-FEDERATION IDP hub? SP hub? Authentication Assertion
  • 24. IdFed: Federation policies Define basic policies Rols and groups Example: Users without certificate: read access to apps federated User with certificate: read-write access Best practices IdFed: Make it easy for adding new federated services to current infrastructure: Identity Providers Service Providers Attribute Providers Services of Location
  • 25. JBossAS-IdFed 1. FedId Functionality AAA: JAAS/JACC Federation rules: SAML/IDFF (Liberty Alliance) Nonrepudiation, mapping of attributes and X.509 (JAAS module) IDP: JBossAS + Cluster SP: JBossAS Toolkits: Opensource or propietary 2. Critical areas Several users: grid and distributed? High availibility: Persistence with JBossMQ or grid infrastructure Autodiscovery of other FedID Gateways: multicasting Fail over: HAJNDI, Clustering, JBossMQ, Security: WS-Security, JBossSX (support non-JAAS and JAAS)
  • 26. JBossAS-IdFed 3. Coexistence of protocols and evolution of standards Evolutionary NOT Revolutionary Support SAML 1.x and Liberty Alliance 2.0, Support in the future for SAML 2.0 Recently products s/WS-Federation
  • 27. JBossAS-IdFed Architecture JAAS JBossSX IDFedGw XML/SAML Middleware (WS, RMI, JMS, EJB) JBoss Microkernel (JMX) HA, cache Clustering
  • 28. High Availability of Identity Federation System on JBossAS Roger Carhuatocto QA & IT Security Project Manager IN2, Ingeniería de la Información 11 October 2005

Editor's Notes

  • #2: Products JBoss AS Competitors Hibernate Competitors manual JDBC EJB 2.x (all app servers) Oracle Toplink JDO 1. 2. 3. JBossCache (JCache) Competitors OScache (OpenSymphony) Tangersol JBPM Competitors OSworkflow (OpenSympony) *WFM (http://wfmopen.sourceforge.net) Tomcat Competition JRun Weblogic Express IBM Websphere Servlet Engine *Jetty *Resin JBoss IDE Competition AppServer Specific WL Workshop WSAD (Eclipse-based) AppServer agnostic IntelliJ IDEA JBuilder *Eclipse (explain IDE-builder instead of app-builder) MyEclipse Projects Javassist Competitors ASM BCEL SERP CG-LIB (used by Spring) JBoss AOP Competitors AspectWerkz AspectJ Spring CGlib (lower level) dynaop AOPalliance JBoss Microkernel Competitors Spring Hivemind PicoContainer JBossMQ / JBossJMS Competitors IBM MQ-Series MS-MQ SonicMQ Oracle AQ *openJMS *JORAM JBoss Portal Competitors Jetspeed eXO JGroups Competitors Customers Using Ameritrade