Top Banner
36
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A A A
Page 2: A A A

AAA

Authentication (topic of the day) Authorization Accounting

Page 3: A A A

Why 3 A’s ?

It’s more modular/flexible More secure Good code/design practice

Page 4: A A A

Aut hent i cat i on

Basic security requirement Request some form of authentication from a

user, server or software Verify that the authentication information

received is correct

Page 5: A A A

Aut hent i cat i on Mechani sms Something you know Something you have Something you are

Page 6: A A A

Somet hi ng you know

Username Password Answer to a question (think CAPTCHA)

Page 7: A A A

Somet hi ng you have

IP Address Security Token Electronic signature

Page 8: A A A

Somet hi ng you are

Fingerprint Iris scan Other biometric scans

Page 9: A A A

So what does al l t hat do? It proves that you are a…

Page 10: A A A

Directory Entry

Page 11: A A A

Who aut hent i cat es a user? Your application Someone else (outsourcing is cool)

Page 12: A A A

Aut h i n Your appl i cat i on

You have the list of users/passwords You have control The user doesn’t have control Doesn’t scale (for you or for your users)

Page 13: A A A

Scal i ng probl em f or you

If you have multiple sites/services there’s no easy way to share accounts

Duplication of user data and more configuration

Page 14: A A A

Scal i ng probl em f or t he user I have:

5 email/webmail accounts 2-3 im accounts 2 secure tokens for electronic banking 10+ linux accounts 200+ user accounts on various websites (most of

which I don’t even remember I have) ..and the list goes on

Page 15: A A A

Out sourced/ Di st r i but ed Aut hent i cat i on Clear separation of functionality Better control/storage of user database Main advantages are increased scalability and

SSO (Single Sign On)

Page 16: A A A

Some concept s

Page 17: A A A

I dent i t y Provi der

a computer system that issues credentials to individual end users and also verifies that the issued credentials are valid.

For OpenID it’s called an OpenID Provider Both creates the usernames/openids/etc. and

does the authentication for them.

Page 18: A A A

Servi ce Provi der

The site that wants to verify the end-user's identifier.

Also called “Relying Party”

Page 19: A A A

Out sourced Aut hent i cat i on Types Centralized (CAMS, or your own solution) Federated (Shibboleth) Decentralized (OpenID)

Page 20: A A A

CAMS

Proprietary (http://www.cafesoft.com/products/cams/camsOverview.html)

Integration with J2EE servers, Apache Pretty good documentation/resources for a

closed/commercial solution

Page 21: A A A

CAMS Archi t ect ure

Page 22: A A A

Cent ral i zed Aut hent i cat i on You can make your own Allows better control over Authentication,

but also provides more possibilities for Authorization and Accounting

Single point for improvements ..but also Single Point of Failure…

Page 23: A A A

Shi bbol et h

Page 24: A A A

Shi bbol et h

Federated authentication and authorization. Open-source and based on open standards

(OpenSAML) Used in Higher Education in

England/Germany http://shibboleth.internet2.edu/

Page 25: A A A

Shi bbol et h - Federat ed

IdPs and SPs are grouped into Federations Federations are based on Trust Example: UK Higher Education Federation,

Deutsches Forschungsnetz Federation

Page 26: A A A

Shi bbol et h - Advant ages

Best suited for Universities or other types of institutions

A service provider only needs to know I am from University/Institution X (which they provide a service to) and not who exactly I am

Where Are You From service – easy finding of your IdP

Page 27: A A A

Shi bbol et h – Browser POST

Page 28: A A A

Shi bbol et h – Browser Art i f act

Page 29: A A A

Shi bbol et h - WAYF

Page 30: A A A

Shi bbol et h - Support

Everything is open-source and there’s a lot of documentation available

Apache2 module available JAAS SecurityFilter available Some WAYF implementation samples

available

Page 31: A A A

OpenI D

Page 32: A A A

OpenI D

Is: An open, decentralized single-sign-on standard a URL A Foundation A buzzword

Page 33: A A A

OpenI D - Advant ages

+ open + gained wide adoption from major players

(Google, Microsoft, Yahoo!) + fully decentralized + lots of application/framework/language

support

Page 34: A A A

OpenI D - Di sadvant ages

- an OpenID is a URL - no standard/specification way for something

like a wayf service - no trust network - big phishing target

Page 35: A A A

OpenI D – Demo(s)

Page 36: A A A

Q&A