SlideShare a Scribd company logo
Shibboleth: Open Source Distributed 
Authentication and Authorization


 Glen Newton
 Head, Research
 glen.newton@nrc-cnrc.gc.ca
 GTEC: Open Source Security
 Strategy
 Ottawa Oct 20 2004
Outline
• Introduction and Preliminaries
   – Authentication and Authorization
   – Authentication models
   – Identity and Privacy
• Shibboleth
• Other closed alternatives
   – Liberty Alliance
   – Others (MS­Passport)


                                        2
Resource Owners and 
Resource Users
• Resource Owner: the owner, producer or 
  distributor of resource. The (or one of the) 
  legal holders and gatekeepers of the 
  resource.
• Resource user: an entity which accesses 
  a resource. Can be an individual, a group, 
  a company, an agent, a system etc. 




                                            3
Authentication and 
Authorization
• Authentication: verifying who you are & 
  associated attributes.
• Authorization: verifying that you are 
  allowed access to a resource (room, web 
  page, file, equipment, etc); assumes 
  authentication.
• Traditionally in the library world, the 
  distinctions between these two concepts 
  are conflated.


                                        4
Authorization Models
• Identity­based
   – The identity is passed to the resource 
     owner who decides whether to grant 
     access: Privacy issues
• Attribute­based
   – Enough attributes are passed to the 
     resource owner to allow access: no or 
     limited Privacy issues.



                                           5
Identity and Privacy: 
Identity
• Identity management: in the physical 
  world: passports; birth certificates; driver’s 
  licenses; national identity cards; SIN; etc. 
• Used by others (government, police, 
  banks, etc.) to verify ID
• In the Internet age, much more difficult 
  problem “Like nailing jello to a wall…”
• For individuals: 
    – proliferation of userids and passwords
    – some digital certificates
    – security smart cards                    6
Identity and Privacy: 
Identity (cont.)
• For organizations
   – Costly management of userids
   – Costly and complex management of 
     relationships with resource owners
   – Security issues
   – Poor general solutions (i.e. access by 
     organizations IP address ranges; etc)




                                           7
Identity and Privacy: 
Privacy
• Privacy has different dimensions:
   – “privacy of the person:… integrity of the 
     individuals body”
   – “privacy of personal behaviour ­ sexual 
     preferences and habits, political 
     activities and religious practices” 
   – “privacy of personal communications:... 
     able to … without routine monitoring of 
     their communications… ”
   – “privacy of personal data”
  From Clarke, 1999
                                            8
Identity and Privacy: 
Privacy (cont.)
• Electronic records, networks, electronic 
  transactions: not just telephone anymore
• A range of expectations: some people are 
  willing to give up more rights in 
  Cyberspace; others expect similar to “real 
  world”
• Canadian legislation: Personal Information 
  Protection and Electronic Documents Act 
  (PIPEDA)


                                          9
Shibboleth
• Intro to Shibboleth
   – What is Shibboleth?
   – What issues does Shibboleth address?
   – Shibboleth architecture
   – How does it work?
   – Who is using it?
• Shibboleth at CISTI



                                       10
What is Shibboleth?
• “Inter­realm attribute­based authorization 
  for Web Services” – Shibboleth web page
   – Architecture and technology to support 
     inter­institutional sharing of resources 
     (middleware)
   – Based on a federated administration 
     trust framework
   – Controlled dissemination of attribute 
     information, based on administration 
     defaults and user preferences

                                           11
What is Shibboleth?
• Internet2/MACE Project; NSF 
  Middleware initiative component
• Players: IBM, Brown U, Ohio State, 
  MIT, CMU, Stanford




                                        12
What is Shibboleth? (cont.)
• Founding assumptions:
   – Federated administration
   – Lightweight mechanisms: disturb as 
     little as possible of existing 
     infrastructure as possible
   – Leverage vendor and standards activity 
     wherever possible




                                         13
What is Shibboleth? (cont.)
• Key concepts:
   – Federated Administration 
   – Access Control Based On Attributes 
   – Active Management of Privacy 
   – Standards Based 
   – A Framework for Multiple, Scaleable 
     Trust and Policy Sets (Federations) 



                                            14
What is Shibboleth? (cont.)
• What issues does Shibboleth address?
  – Resource user:
     • Access from on­campus
     • Access from off­campus
     • User account proliferation
     • Increased privacy
     • Single sign­on/sign­off across 
       domains!!


                                         15
What is Shibboleth? (cont.)
• What issues does Shibboleth address? 
  (cont.)
   – Resource user’s organization:
      • Single authentication database
      • No IP management
      • If previously using IP access, better 
        reporting




                                            16
What is Shibboleth? (cont.)
• What issues does Shibboleth address? 
  (cont.):
   – Resource owner:
      • Ends management of either 
        userid/password or IP address 
        ranges 
      • Security
      • Reporting granularity



                                          17
Shib: How does it work?
1. User requests resource from resource 
   owner
2. User is asked to self­identify their 
   organization
3. User is redirected to her organizations 
   Shib origin instance + authenticates
4. User attributes are transferred to 
   resource owners instance of Shib target 
5. Resource owner compares attributes to 
   Policy associated with user’s 
   organization
6. User gets access to resource           18
Shib: How does it work?




                          19
Shibboleth is:
• “NOT an authentication scheme (relies on 
  home site infrastructure to do this)”
• “NOT an authorisation scheme (leaves 
  this to the resource owner)”.
• “BUT an open, standards based protocol 
  for securely transferring attributes 
  between home site and resource site”.
• “Also provided as an OpenSource 
  reference software implementation”.
   After Paschoud, 
   2004                                 20
Shibboleth
• Who is using it?
  – JISC (UK Joint Information Systems 
    Committee), EBSCO,  Elsevier, OCLC, 
    Sfx (Ex libris), JSTOR, McGraw Hill , 
    Books, Innovative, WebCT, Blackboard, 
    Swiss Education and Research 
    Network (SWITCH), National Science 
    Digital Library (NSDL), more…
  – Carnegie Mellon, Columbia, Dartmouth, 
    Georgetown, London School of 
    Economics, NYU, Ohio State, more…
                                      21
Shibboleth at CISTI
• Prototyped the user owner end of 
  Shibboleth (Target) for 3 NRC 
  Research Press Journals
• Evaluated use within NRC Virtual 
  Library
• Developed code for MySQL db lookup; 
  submitted code to Shibboleth project
• Next steps dependent on adoption by 
  resource producers (for VL) and 
  resource users (for NRC Research 
  Press)                               22
Competing Federated ID 
Stacks




From Blum, 2003           23
Alternatives: 
Liberty Alliance
• Intro to the Liberty Alliance
   – What is the Liberty Alliance?
   – How is the Liberty Alliance different 
     from Shibboleth?
   – Players
   – Future




                                              24
Liberty Alliance
• What is the Liberty Alliance?
  – More commercially oriented than Shib
  – Members include: Sun, Sony, Ericson, 
    GM, Novell, NEC, Oracle, SAP, NTT, 
    Entrust, HP, AmEx.
  – However, Microsoft and IBM have 
    refused to join!




                                       25
Liberty Alliance
• Architecture
   – Very similar to Shibboleth, but more 
     commercially oriented, with special 
     features oriented around mobile device, 
     etc.
   – Less focus on user mediated privacy
   – More reporting




                                         26
Liberty Alliance




                   27
Other Technologies
• Microsoft Passport
  – Centralized database (not Federated)
  – Not standards­based
• Others: Sesame, PAPI, PERMIS




                                       28
What to Adopt?
• Likely adoption of Shibboleth features in 
  Liberty v2, with SAML 2.0
• Interoperability discussions on­going
• Either or both: Liberty more commercial, 
  Shibboleth more 
  library/academic/publisher oriented




                                           29
Questions?
• Glen Newton, CISTI 
  glen.newton@nrc­cnrc.gc.ca




                               30
References
• Blum,  D. 2003. 
  Federating Identity Management: Standards, T
  .
• Blum, D. 2004. 
  Federated Identity: Extending Authentication an
  .
• Clarke, R. 1999. Introduction to
   Dataveillance
   and Information Privacy, and Definitions of Ter
• Lacey, D. 2003. 
  Current Privacy Research and Frameworks
  . SecureWorld Expo.                     31
References (cont.)
• Liberty Alliance Web Site.
• Paschoud. J. 2004. 
  The (now… then…) next of Authentication:Shib
   ALPSP Effective Customer Authentication
• Rapoza, J. 2003. 
  Liberty Alliance Has Missed the Point. 
  eWeek November 24. 
• Shibboleth Project. 
• Weil, N. 2004. 
  NSF middleware initiative goes beyond science
  . InfoWorld May. 
                                       32

More Related Content

What's hot (16)

PPT
Darwin
Doug Moncur
 
PPTX
WTF for businesses for Blockchain
Conrad Dias
 
PDF
Law w04-global cybersecurity-laws_regulations_and_liability
João Rufino de Sales
 
PPTX
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
Jon-Michael C. Brook, CISSP
 
PPTX
WAPWG 16 Jan Thomson holdslide
Sara Day Thomson
 
PPT
Semantic Web
Umang Shukla
 
PPTX
Social Media & Legal Risk
Endcode_org
 
PPTX
Data Protection & Risk Management
Endcode_org
 
PPT
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Shauna_Cox
 
PDF
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
Michael Torres
 
PPTX
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
gallowayandcollens
 
PDF
Dressler Kristof The Right to be Forgotten and Digital Collections
National Information Standards Organization (NISO)
 
PDF
Murray Privacy in the Context of Content Platforms & Discovery Tools
National Information Standards Organization (NISO)
 
PPTX
Cyber Banking Conference
Endcode_org
 
PPTX
Liberty-Search Strategy Analysis
Toni Liberty
 
PPTX
IAB Online Content Regulation: Trends
Endcode_org
 
Darwin
Doug Moncur
 
WTF for businesses for Blockchain
Conrad Dias
 
Law w04-global cybersecurity-laws_regulations_and_liability
João Rufino de Sales
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
Jon-Michael C. Brook, CISSP
 
WAPWG 16 Jan Thomson holdslide
Sara Day Thomson
 
Semantic Web
Umang Shukla
 
Social Media & Legal Risk
Endcode_org
 
Data Protection & Risk Management
Endcode_org
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Shauna_Cox
 
Securing Your Digital Footprint: Idiographic Digital Profiling and the Losing...
Michael Torres
 
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...
gallowayandcollens
 
Dressler Kristof The Right to be Forgotten and Digital Collections
National Information Standards Organization (NISO)
 
Murray Privacy in the Context of Content Platforms & Discovery Tools
National Information Standards Organization (NISO)
 
Cyber Banking Conference
Endcode_org
 
Liberty-Search Strategy Analysis
Toni Liberty
 
IAB Online Content Regulation: Trends
Endcode_org
 

Viewers also liked (19)

PPT
Introduzione a Scrum
Felice Pescatore
 
PDF
WITDOM presentation at Net Futures 2016
Elsa Prieto
 
PDF
H2020 project WITDOM overview
Elsa Prieto
 
PPT
Intro to AppExchange - Building Composite Apps
dreamforce2006
 
PPT
Meri_dliny1
lkorobkova
 
PPT
Shibboleth 2.0 IdP slides - Installfest (Edited)
JISC.AM
 
PDF
04 Wa 2 Soq Booklet Amec
Les1238
 
PPTX
Us studies
katiecartnal
 
PPTX
Kennedy Power PointChapter 50
Rachel King
 
PPT
Taller iglekids 1
adelisj
 
PDF
88L10 MARINE CERT
Brandon Eidson
 
PDF
JJO NEWS #1
jjobrasil
 
PDF
2016/01/04付 オリジナルiTunes週間トップソングトピックス
The Natsu Style
 
PPT
Moodboards
zjhamilton
 
PDF
ACICARE VA
Naman Shah
 
PPTX
Welcome and MAX Keynotes - Dave Sobel and Alistair Forbes
MAXfocus
 
PDF
料理研究一家「古川家」を支えるツールと技術 | CPI MEGA MIX 2015
Masaya Kogawa
 
PPS
A viagem
Mensagens Virtuais
 
PPTX
El amor para zayn malik
melissaberrioacevedo
 
Introduzione a Scrum
Felice Pescatore
 
WITDOM presentation at Net Futures 2016
Elsa Prieto
 
H2020 project WITDOM overview
Elsa Prieto
 
Intro to AppExchange - Building Composite Apps
dreamforce2006
 
Meri_dliny1
lkorobkova
 
Shibboleth 2.0 IdP slides - Installfest (Edited)
JISC.AM
 
04 Wa 2 Soq Booklet Amec
Les1238
 
Us studies
katiecartnal
 
Kennedy Power PointChapter 50
Rachel King
 
Taller iglekids 1
adelisj
 
88L10 MARINE CERT
Brandon Eidson
 
JJO NEWS #1
jjobrasil
 
2016/01/04付 オリジナルiTunes週間トップソングトピックス
The Natsu Style
 
Moodboards
zjhamilton
 
ACICARE VA
Naman Shah
 
Welcome and MAX Keynotes - Dave Sobel and Alistair Forbes
MAXfocus
 
料理研究一家「古川家」を支えるツールと技術 | CPI MEGA MIX 2015
Masaya Kogawa
 
El amor para zayn malik
melissaberrioacevedo
 
Ad

Similar to Shibboleth: Open Source Distributed Authentication and Authorization (20)

PDF
Advanced Research Investigations for SIU Investigators
Sloan Carne
 
PDF
Fund Raisin Digital Pops breakfast event with Charles Russell - 24.10.12
Chameleon
 
PPTX
A Lifecycle Approach to Information Privacy
Micah Altman
 
PDF
Lecture4 Social Web
Marieke van Erp
 
PPTX
Emerging Applications of Blockchain for Supply Chains
MIT Enterprise Forum Cambridge
 
PDF
Keith prabhu global high on cloud summit
administrator_confidis
 
PDF
Blockchain
Michael Cairns
 
PDF
Enterprise social networking v1.2
James Sutter
 
PPTX
Building Effective Frameworks for Social Media Analysis
Open Analytics
 
PDF
OpenDataCourse-02-WhatIsOpenData
routetopa
 
PDF
Responsible AI & Cybersecurity: A tale of two technology risks
Liming Zhu
 
PPTX
INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...
Micah Altman
 
PPTX
From Cryptoequity to Cryptocommons
Raffaele Mauro
 
PPTX
Legal, Policy & the Blockchain
Tudor Stanciu
 
PPTX
SharePointlandia 2013: SharePoint and Compliance
Matthew R. Barrett
 
PDF
Here Comes Everything
Nigel Shadbolt
 
PPTX
What is federated single sign-on?
OpenAthens
 
PPTX
A trust aggregation portal
Erandhi Abeynayake
 
PPTX
Cyber Security - ASGFOA
Peter Henley
 
PPTX
Helping Developers with Privacy
Jason Hong
 
Advanced Research Investigations for SIU Investigators
Sloan Carne
 
Fund Raisin Digital Pops breakfast event with Charles Russell - 24.10.12
Chameleon
 
A Lifecycle Approach to Information Privacy
Micah Altman
 
Lecture4 Social Web
Marieke van Erp
 
Emerging Applications of Blockchain for Supply Chains
MIT Enterprise Forum Cambridge
 
Keith prabhu global high on cloud summit
administrator_confidis
 
Blockchain
Michael Cairns
 
Enterprise social networking v1.2
James Sutter
 
Building Effective Frameworks for Social Media Analysis
Open Analytics
 
OpenDataCourse-02-WhatIsOpenData
routetopa
 
Responsible AI & Cybersecurity: A tale of two technology risks
Liming Zhu
 
INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...
Micah Altman
 
From Cryptoequity to Cryptocommons
Raffaele Mauro
 
Legal, Policy & the Blockchain
Tudor Stanciu
 
SharePointlandia 2013: SharePoint and Compliance
Matthew R. Barrett
 
Here Comes Everything
Nigel Shadbolt
 
What is federated single sign-on?
OpenAthens
 
A trust aggregation portal
Erandhi Abeynayake
 
Cyber Security - ASGFOA
Peter Henley
 
Helping Developers with Privacy
Jason Hong
 
Ad

Recently uploaded (20)

PDF
Home Cleaning App Development Services.pdf
V3cube
 
PPTX
Manual Testing for Accessibility Enhancement
Julia Undeutsch
 
PDF
Dev Dives: Accelerating agentic automation with Autopilot for Everyone
UiPathCommunity
 
PDF
Peak of Data & AI Encore AI-Enhanced Workflows for the Real World
Safe Software
 
PDF
UPDF - AI PDF Editor & Converter Key Features
DealFuel
 
PDF
Transcript: Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
PPTX
Role_of_Artificial_Intelligence_in_Livestock_Extension_Services.pptx
DrRajdeepMadavi
 
PDF
Evolution: How True AI is Redefining Safety in Industry 4.0
vikaassingh4433
 
PPTX
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
PPTX
MuleSoft MCP Support (Model Context Protocol) and Use Case Demo
shyamraj55
 
PDF
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
PDF
NASA A Researcher’s Guide to International Space Station : Fundamental Physics
Dr. PANKAJ DHUSSA
 
PDF
“Voice Interfaces on a Budget: Building Real-time Speech Recognition on Low-c...
Edge AI and Vision Alliance
 
PDF
UiPath DevConnect 2025: Agentic Automation Community User Group Meeting
DianaGray10
 
PPTX
Essential Content-centric Plugins for your Website
Laura Byrne
 
PDF
[GDGoC FPTU] Spring 2025 Summary Slidess
minhtrietgect
 
PDF
Software Development Company Keene Systems, Inc (1).pdf
Custom Software Development Company | Keene Systems, Inc.
 
PDF
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
PPTX
Digital Circuits, important subject in CS
contactparinay1
 
PPTX
Securing Model Context Protocol with Keycloak: AuthN/AuthZ for MCP Servers
Hitachi, Ltd. OSS Solution Center.
 
Home Cleaning App Development Services.pdf
V3cube
 
Manual Testing for Accessibility Enhancement
Julia Undeutsch
 
Dev Dives: Accelerating agentic automation with Autopilot for Everyone
UiPathCommunity
 
Peak of Data & AI Encore AI-Enhanced Workflows for the Real World
Safe Software
 
UPDF - AI PDF Editor & Converter Key Features
DealFuel
 
Transcript: Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
Role_of_Artificial_Intelligence_in_Livestock_Extension_Services.pptx
DrRajdeepMadavi
 
Evolution: How True AI is Redefining Safety in Industry 4.0
vikaassingh4433
 
The Project Compass - GDG on Campus MSIT
dscmsitkol
 
MuleSoft MCP Support (Model Context Protocol) and Use Case Demo
shyamraj55
 
🚀 Let’s Build Our First Slack Workflow! 🔧.pdf
SanjeetMishra29
 
NASA A Researcher’s Guide to International Space Station : Fundamental Physics
Dr. PANKAJ DHUSSA
 
“Voice Interfaces on a Budget: Building Real-time Speech Recognition on Low-c...
Edge AI and Vision Alliance
 
UiPath DevConnect 2025: Agentic Automation Community User Group Meeting
DianaGray10
 
Essential Content-centric Plugins for your Website
Laura Byrne
 
[GDGoC FPTU] Spring 2025 Summary Slidess
minhtrietgect
 
Software Development Company Keene Systems, Inc (1).pdf
Custom Software Development Company | Keene Systems, Inc.
 
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
Digital Circuits, important subject in CS
contactparinay1
 
Securing Model Context Protocol with Keycloak: AuthN/AuthZ for MCP Servers
Hitachi, Ltd. OSS Solution Center.
 

Shibboleth: Open Source Distributed Authentication and Authorization