Top Banner
A Model for Privacy Enhanced Federated Identity Management Rainer Hörbe, EUSTIX Alliance
13
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A model for privacy-enhance federated identity management

A Model for Privacy Enhanced

Federated Identity Management

Rainer Hörbe, EUSTIX Alliance

Page 2: A model for privacy-enhance federated identity management

Privacy Issues in Federated Identity Management

Page 3: A model for privacy-enhance federated identity management

Standard FIM (e.g. SAML WebSSO) • Data minimization:

• IdPs release only required attributes, only to authorized services

• Limited unlinkability between services • Identifiers are targeted

• Impersonation • (HoK)

!!

PE-FIM • Limited unobservability by TTP

• IdP/AP talks to groups of services, cannot identify service

• Limited unlinkability between services • Messaging, payment and

delivery are pseudonymized; e.g. IdP will proxy SMTP traffic from targets email address to registered one

Technical Privacy Controls for FIM

Rationale for enhanced privacy: scaling federation across vertical sectors

Page 4: A model for privacy-enhance federated identity management

Provide and evaluate principles, techniques,

and tools to support and facilitate the

development and evolution of software-

intensive system

Software Architecture Research Group

Architectural challenge: Technical controls to enhance privacy

Page 5: A model for privacy-enhance federated identity management

Provide and evaluate principles, techniques,

and tools to support and facilitate the

development and evolution of software-

intensive system

Software Architecture Research Group

Options for technical controls Identity escrow (zero-knowlege proof) Late binding (separate authN from attributes) Proxy pool (hub+spoke with many hubs) User-based IdPs (PAD, IMI) Pseudonym SP, targeted attributes (PE-FIM)

!5

Page 6: A model for privacy-enhance federated identity management

Provide and evaluate principles, techniques,

and tools to support and facilitate the

development and evolution of software-

intensive system

Software Architecture Research Group

Pseudonym SP !

!

!

!

!

!6

1.5 The Privacy-enhanced FIM Architecture (PE-FIM)

This model proposes an approach to federated identity management (FIM) that is privacy-friendly with respect to the requirements defined above. It is based on a 3-tier architecture that is an extended hub-and-spoke model with privacy by design princi-ples applied to it. The hub is called the service broker (SB) in this model.

High-level Architecture. The very outset of the PE-FIM model is the introduction of a secure pseudonymous

channel to support requirements R1, R2 and R3. The desired property of this bidirec-tional channel is that an IdP and an SP, or two SPs, can communicate about a princi-pal, where (a) the SPs are pseudonymous to the IdPs, (b) the principal is pseudony-mous to the SPs and (c) the IdP’s and SP’s identities are vouched for by the certificate authority.

Fig. 2. High-level Architecture

It is assumed, but not shown in the picture above, that trust has been established be-tween SP-SB and SB-IdP, using certificates or other means. The core constructs of the proposed model are:

1. A pseudonymous secure channel, which can be used for several purposes:

─ Transmit assertions from an IdP to an SP; ─ Transmit pseudonymous data about a principal between SPs; ─ Transmit security alerts or operations-related messages from the SP to the IdP; ─ Transmit application-level messages from the SP to the principal, relayed by the

IdP using SMTP or another messaging protocol.

2. The secure pseudonymous channel is implemented using a mixture of brokered trust and end-to-end encryption.

─ All messages are relayed via the service broker (SB);

Service Broker

Certificate Authority

Identity Provider Service

Provider

pseudonymous secure channel

one-time certificatesIdP trusts CA

message flow message flow

Page 7: A model for privacy-enhance federated identity management

Provide and evaluate principles, techniques,

and tools to support and facilitate the

development and evolution of software-

intensive system

Software Architecture Research Group

Pseudonymous SP 3-tier architecture (hub-and-spoke) Service broker (hub) does not see user attributes SP issues one-time encryption keys signed by CA Group signatures would work as well Unobservability improves with number of services per Service Broker

!7

Page 8: A model for privacy-enhance federated identity management

Provide and evaluate principles, techniques,

and tools to support and facilitate the

development and evolution of software-

intensive system

Software Architecture Research Group

Targeted Attributes (e-mail)

Targeted email for SP is targeted id @ SB

Targeted email for SB is targeted id @ IdP

SB, IdP act as MTA and rewrite address

!8

Page 9: A model for privacy-enhance federated identity management

Provide and evaluate principles, techniques,

and tools to support and facilitate the

development and evolution of software-

intensive system

Software Architecture Research Group

Pseudonymous Payment & Delivery

Virtual credit cards

Intermediate PO-boxes(?)

!9

Page 10: A model for privacy-enhance federated identity management

Provide and evaluate principles, techniques,

and tools to support and facilitate the

development and evolution of software-

intensive system

Software Architecture Research Group

Out of scope

Display names (could be first name + number)

IP-Addresses (need overlay networks)

!

!10

Page 11: A model for privacy-enhance federated identity management

What else?

The model can be applied to SAML BAE, WS-Trust and OIDC as well.

A profile for SAML looks like this:

Page 12: A model for privacy-enhance federated identity management

Service Broker

IdP-sideMetadata

Feed

Certificate Authority

AP

IdPLoginMX

SP

MX

SAMLProxy

SP-sideMetadata

Feed 2

11

12

13

14

15

17

19

ConsentService

18

19App

110

(4) /AuthnRequest/extension/pefim:SPCertEnc/ds:KeyInfo/.. (6) /Assertion/Advice/EncryptedAssertion

Page 13: A model for privacy-enhance federated identity management

Project Status

Development underway for PoC using OpenAM, Shibboleth and pysaml2

Demo @ EEMA/Vienna April 2014

Pilot project: EDI-federation in Austria

!13