SlideShare una empresa de Scribd logo
1 de 21
Federated Access Management
Mark Cairney
Information Services IT Infrastructure
UNIX Section
University of Edinburgh
What is Federated Access
Management?
• Trust framework between institutions and
services
• User Authentication devolved to each
institution via a local Identity Provider (IdP)
• Authorisation handled by the Service Provider
(SP) based on attributes sent to it by the IdP
What is FAM?
• Trust relationship handled by both sides
containing metadata describing each other
• Federation is responsible for managing and
publishing metadata for all members (IdPs and
SPs)
• Also responsible for establishing policies
regarding data exchange between members
and ensuring they are being adhered to.
What is FAM?
• Federations established at a geographical area
(country/continental) level e.g. InCommon
(US), UKAMF (UK), eduGAIN (Europe)
• Now starting to see inter-federation
agreements e.g. UK Federation <-> eduGAIN
• Establishing standards/good practice becomes
an even bigger issue with inter-federation!
FAM Systems
• Number of competing FAM solutions (both
FOSS and commercial)
– OpenAthens
– Shibboleth
– OpenAM
– Microsoft AD FS
• We’ll be looking at Shibboleth as it’s what I
know best! 
Shibboleth
• Free, Open Source
• Popular in education sector
• Gaining traction outwith education
• 3 main components:
– Identity Provider (IdP)
– Service Provider (SP)
– Discovery Service (DS aka Where Are You From?)
Identity Providers (IdP)
• Locally-installed server integrated with
organisation’s local infrastructure (SSO,
identity management)
• User logs in with their local SSO credentials
• IdP authenticates user and looks them up in
local Identity source (LDAP, AD, database)
Identity Providers (IdP)
• User information parsed, processed and only
permitted attributes are sent back to the
Service Provider (SP)
• By default all members of the UK Federation
are sent a minimal set of attributes
• Additional attributes have to be explicitly
released by the IdP administrator
Can have multiple metadata sources and rules
for attribute disclosure
Service Providers (SP)
• Module performing login to service
• Receives attributes from IdP and uses these to
perform authentication and authorisation of
user.
• N.B. Service Provider performs authorisation
decision based on attribute data received- it’s
NOT the IdP’s job to perform authorisation!!
Discovery Service
• Formerly Known as WAYF (Where Are You
From)
• Essentially a list of available IdPs
• UK Federation run one for general use OR
• Roll your own to present a subset of these
• Optional- you can hardwire your SP to speak
to a specific IdP (but this isn’t really
federation)
SAML
• AKA Security Assertion Markup Language
• Standard dialect for IdPs and SPs to talk to
each other
• Standards (SAML1 / SAML2)
• Possible (though not always straightforward!)
for IdPs and SPs of different flavours e.g.
Shibboleth and OpenAthens to talk to each
other.
WOW!
User
IdP
SP
Discovery
Service
The Federation
• Maintains and publishes the metadata
consumed by member entities (i.e. IdPs and
SPs)
• Metadata used to form trust relationships
• Responsibility for the metadata feed and for
ensuring members adhere to good practice
(security, privacy etc)
• Monolithic
Inter-federation Trust
• More of a political challenge than a technical
one
• Participating federations have to negotiate
common standards re: metadata structure,
key lengths/types, attributes required.
• Best practice wins!
• End result is an aggregated metadata file is
published by participating federations
Other Federated Identity Systems
• OpenAthens- very similar to Shibboleth
• Commercial entity, ran by EduServ
• Can either run your own IdP or have
OpenAthens run it for you for a fee.
• Technology very similar to Shibboleth(SAML-
based, monolithic Federations)
Other Federated Identity Systems
• Eduroam- used in Higher Education to provide
federated roaming wireless access
• Built on FreeRADIUS
• Managed and maintained in the UK by JANET
• External users credentials are relayed back to
their home institution for authentication
Future of Federation
• Current models work well for web-based
authentication (Shibboleth) and/or specific
protocols (eduroam)
• However there is an increasing requirement
for support of multiple protocols and for some
level of devolved federation management
Shibboleth IdPv3
• Still SAML2-based but with a number of
improvements based on experience gained
with v2
• Improvements include:
– User consent for releasing attributes
– Session state largely stored client-side in
encrypted cookie store.
Moonshot
• Based on FreeRADIUS 3 with additional
functionality provided by Shib libraries
• Provides some level of devolved management.
• Multi-protocol support (SSH, Web, Exchange)
Moonshot - Disadvantages
• Requires bleeding-edge versions of
FreeRADIUS and Moonshot dependencies
• Work-in-progress- steep learning curve and
documentation not comprehensive
• Requires software to be installed on both
clients and services to support it- some of
these (e.g. OpenSSH) depend on locally
patched versions.
Questions?
• E: Mark.Cairney@ed.ac.uk
• T: @mcairney
• http://www.ukfederation.org.uk
• http://shibboleth.net/
• http://www.jisc.ac.uk/assent

Más contenido relacionado

Destacado

Mule object stores
Mule object storesMule object stores
Mule object storesKrishna_in
 
Custom filters in mule soft
Custom filters in mule softCustom filters in mule soft
Custom filters in mule softKrishna_in
 
Round robin scheduling
Round robin schedulingRound robin scheduling
Round robin schedulingRaghav S
 
Mule expression component
Mule expression componentMule expression component
Mule expression componentKarnam Karthik
 
Mule ESB Tutorial Part 2
Mule ESB Tutorial Part 2Mule ESB Tutorial Part 2
Mule ESB Tutorial Part 2Srikanth N
 
MuleSoft Anypoint Studio - Essentials - Data Filtering
MuleSoft Anypoint Studio - Essentials - Data FilteringMuleSoft Anypoint Studio - Essentials - Data Filtering
MuleSoft Anypoint Studio - Essentials - Data FilteringVenkataNaveen Kumar
 
Security components in mule esb
Security components in mule esbSecurity components in mule esb
Security components in mule esbhimajareddys
 
Les filtres RSS dans Inoreader : détail de la syntaxe à utiliser (MAJ : mai 2...
Les filtres RSS dans Inoreader : détail de la syntaxe à utiliser (MAJ : mai 2...Les filtres RSS dans Inoreader : détail de la syntaxe à utiliser (MAJ : mai 2...
Les filtres RSS dans Inoreader : détail de la syntaxe à utiliser (MAJ : mai 2...Serge Courrier
 
Mule ESB Tutorial Part 1
Mule ESB Tutorial Part 1Mule ESB Tutorial Part 1
Mule ESB Tutorial Part 1Srikanth N
 
Microservices Best Practices
Microservices Best Practices Microservices Best Practices
Microservices Best Practices MuleSoft
 
Future of Integration | MuleSoft
Future of Integration | MuleSoftFuture of Integration | MuleSoft
Future of Integration | MuleSoftMuleSoft
 
Mule ESB - Integration Simplified
Mule ESB - Integration SimplifiedMule ESB - Integration Simplified
Mule ESB - Integration SimplifiedRich Software
 
Application Architecture: The Next Wave | MuleSoft
Application Architecture: The Next Wave | MuleSoftApplication Architecture: The Next Wave | MuleSoft
Application Architecture: The Next Wave | MuleSoftMuleSoft
 
Digital Businesses of the Future
Digital Businesses of the Future Digital Businesses of the Future
Digital Businesses of the Future MuleSoft
 
Mule splitters
Mule splittersMule splitters
Mule splittersGandham38
 

Destacado (19)

Mule object stores
Mule object storesMule object stores
Mule object stores
 
Custom filters in mule soft
Custom filters in mule softCustom filters in mule soft
Custom filters in mule soft
 
Round robin scheduling
Round robin schedulingRound robin scheduling
Round robin scheduling
 
Filters
FiltersFilters
Filters
 
Mule expression component
Mule expression componentMule expression component
Mule expression component
 
Mule ESB Tutorial Part 2
Mule ESB Tutorial Part 2Mule ESB Tutorial Part 2
Mule ESB Tutorial Part 2
 
MuleSoft Anypoint Studio - Essentials - Data Filtering
MuleSoft Anypoint Studio - Essentials - Data FilteringMuleSoft Anypoint Studio - Essentials - Data Filtering
MuleSoft Anypoint Studio - Essentials - Data Filtering
 
Security components in mule esb
Security components in mule esbSecurity components in mule esb
Security components in mule esb
 
Les filtres RSS dans Inoreader : détail de la syntaxe à utiliser (MAJ : mai 2...
Les filtres RSS dans Inoreader : détail de la syntaxe à utiliser (MAJ : mai 2...Les filtres RSS dans Inoreader : détail de la syntaxe à utiliser (MAJ : mai 2...
Les filtres RSS dans Inoreader : détail de la syntaxe à utiliser (MAJ : mai 2...
 
Active Filter (Low Pass)
Active Filter (Low Pass)Active Filter (Low Pass)
Active Filter (Low Pass)
 
Mule ESB Tutorial Part 1
Mule ESB Tutorial Part 1Mule ESB Tutorial Part 1
Mule ESB Tutorial Part 1
 
Microservices Best Practices
Microservices Best Practices Microservices Best Practices
Microservices Best Practices
 
Future of Integration | MuleSoft
Future of Integration | MuleSoftFuture of Integration | MuleSoft
Future of Integration | MuleSoft
 
Mule ESB - Integration Simplified
Mule ESB - Integration SimplifiedMule ESB - Integration Simplified
Mule ESB - Integration Simplified
 
Application Architecture: The Next Wave | MuleSoft
Application Architecture: The Next Wave | MuleSoftApplication Architecture: The Next Wave | MuleSoft
Application Architecture: The Next Wave | MuleSoft
 
Digital Businesses of the Future
Digital Businesses of the Future Digital Businesses of the Future
Digital Businesses of the Future
 
Mule soft csv_toxml
Mule soft csv_toxmlMule soft csv_toxml
Mule soft csv_toxml
 
Payload and logger
Payload and loggerPayload and logger
Payload and logger
 
Mule splitters
Mule splittersMule splitters
Mule splitters
 

Similar a Federated access management

Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...OpenID Foundation Japan
 
Integration Solution Patterns
Integration Solution Patterns Integration Solution Patterns
Integration Solution Patterns WSO2
 
APIs and Services: One Platform or Two?
APIs and Services: One Platform or Two?APIs and Services: One Platform or Two?
APIs and Services: One Platform or Two?Akana
 
CANARIE - What Do I Need to Connect with eduroam and Shibboleth
CANARIE - What Do I Need to Connect with eduroam and ShibbolethCANARIE - What Do I Need to Connect with eduroam and Shibboleth
CANARIE - What Do I Need to Connect with eduroam and ShibbolethChris Phillips
 
Dreamforce14 Multi Org Collaboration Architecture
Dreamforce14  Multi Org Collaboration ArchitectureDreamforce14  Multi Org Collaboration Architecture
Dreamforce14 Multi Org Collaboration ArchitectureRichard Clark
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptxargost1003
 
API’s and Micro Services 0.5
API’s and Micro Services 0.5API’s and Micro Services 0.5
API’s and Micro Services 0.5Richard Hudson
 
DCEU 18: From Monolith to Microservices
DCEU 18: From Monolith to MicroservicesDCEU 18: From Monolith to Microservices
DCEU 18: From Monolith to MicroservicesDocker, Inc.
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptxirfanullahkhan64
 
cloud session uklug
cloud session uklugcloud session uklug
cloud session uklugdominion
 
Lessons Learned in Implementing PeopleSoft ELS 9.0
Lessons Learned in Implementing PeopleSoft ELS 9.0Lessons Learned in Implementing PeopleSoft ELS 9.0
Lessons Learned in Implementing PeopleSoft ELS 9.0Kenneth Petty, PMP
 
CANARIE Eduroam and Shibboleth Lessons & Areas of interest
CANARIE Eduroam and Shibboleth Lessons & Areas of interestCANARIE Eduroam and Shibboleth Lessons & Areas of interest
CANARIE Eduroam and Shibboleth Lessons & Areas of interestChris Phillips
 
Securing APIs with Open Policy Agent
Securing APIs with Open Policy AgentSecuring APIs with Open Policy Agent
Securing APIs with Open Policy AgentNordic APIs
 
Securing APIs with Open Policy Agent
Securing APIs with Open Policy AgentSecuring APIs with Open Policy Agent
Securing APIs with Open Policy AgentAnders Eknert
 
Basic of computers
Basic of computers Basic of computers
Basic of computers Harsh Porwal
 
Internet, Intranet and Extranet
Internet, Intranet and Extranet Internet, Intranet and Extranet
Internet, Intranet and Extranet Maryam Fida
 
Eunis federation2
Eunis federation2Eunis federation2
Eunis federation2HEAnet
 
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...WSO2
 
Building APIs for Core Systems with Anypoint Platform
Building APIs for Core Systems with Anypoint PlatformBuilding APIs for Core Systems with Anypoint Platform
Building APIs for Core Systems with Anypoint PlatformMuleSoft
 

Similar a Federated access management (20)

Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
 
Integration Solution Patterns
Integration Solution Patterns Integration Solution Patterns
Integration Solution Patterns
 
APIs and Services: One Platform or Two?
APIs and Services: One Platform or Two?APIs and Services: One Platform or Two?
APIs and Services: One Platform or Two?
 
CANARIE - What Do I Need to Connect with eduroam and Shibboleth
CANARIE - What Do I Need to Connect with eduroam and ShibbolethCANARIE - What Do I Need to Connect with eduroam and Shibboleth
CANARIE - What Do I Need to Connect with eduroam and Shibboleth
 
Dreamforce14 Multi Org Collaboration Architecture
Dreamforce14  Multi Org Collaboration ArchitectureDreamforce14  Multi Org Collaboration Architecture
Dreamforce14 Multi Org Collaboration Architecture
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptx
 
API’s and Micro Services 0.5
API’s and Micro Services 0.5API’s and Micro Services 0.5
API’s and Micro Services 0.5
 
DCEU 18: From Monolith to Microservices
DCEU 18: From Monolith to MicroservicesDCEU 18: From Monolith to Microservices
DCEU 18: From Monolith to Microservices
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptx
 
cloud session uklug
cloud session uklugcloud session uklug
cloud session uklug
 
Lessons Learned in Implementing PeopleSoft ELS 9.0
Lessons Learned in Implementing PeopleSoft ELS 9.0Lessons Learned in Implementing PeopleSoft ELS 9.0
Lessons Learned in Implementing PeopleSoft ELS 9.0
 
CANARIE Eduroam and Shibboleth Lessons & Areas of interest
CANARIE Eduroam and Shibboleth Lessons & Areas of interestCANARIE Eduroam and Shibboleth Lessons & Areas of interest
CANARIE Eduroam and Shibboleth Lessons & Areas of interest
 
Securing APIs with Open Policy Agent
Securing APIs with Open Policy AgentSecuring APIs with Open Policy Agent
Securing APIs with Open Policy Agent
 
Securing APIs with Open Policy Agent
Securing APIs with Open Policy AgentSecuring APIs with Open Policy Agent
Securing APIs with Open Policy Agent
 
Basic of computers
Basic of computers Basic of computers
Basic of computers
 
Internet, Intranet and Extranet
Internet, Intranet and Extranet Internet, Intranet and Extranet
Internet, Intranet and Extranet
 
Eunis federation2
Eunis federation2Eunis federation2
Eunis federation2
 
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...
 
Building APIs for Core Systems with Anypoint Platform
Building APIs for Core Systems with Anypoint PlatformBuilding APIs for Core Systems with Anypoint Platform
Building APIs for Core Systems with Anypoint Platform
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Federated access management

  • 1. Federated Access Management Mark Cairney Information Services IT Infrastructure UNIX Section University of Edinburgh
  • 2. What is Federated Access Management? • Trust framework between institutions and services • User Authentication devolved to each institution via a local Identity Provider (IdP) • Authorisation handled by the Service Provider (SP) based on attributes sent to it by the IdP
  • 3. What is FAM? • Trust relationship handled by both sides containing metadata describing each other • Federation is responsible for managing and publishing metadata for all members (IdPs and SPs) • Also responsible for establishing policies regarding data exchange between members and ensuring they are being adhered to.
  • 4. What is FAM? • Federations established at a geographical area (country/continental) level e.g. InCommon (US), UKAMF (UK), eduGAIN (Europe) • Now starting to see inter-federation agreements e.g. UK Federation <-> eduGAIN • Establishing standards/good practice becomes an even bigger issue with inter-federation!
  • 5. FAM Systems • Number of competing FAM solutions (both FOSS and commercial) – OpenAthens – Shibboleth – OpenAM – Microsoft AD FS • We’ll be looking at Shibboleth as it’s what I know best! 
  • 6. Shibboleth • Free, Open Source • Popular in education sector • Gaining traction outwith education • 3 main components: – Identity Provider (IdP) – Service Provider (SP) – Discovery Service (DS aka Where Are You From?)
  • 7. Identity Providers (IdP) • Locally-installed server integrated with organisation’s local infrastructure (SSO, identity management) • User logs in with their local SSO credentials • IdP authenticates user and looks them up in local Identity source (LDAP, AD, database)
  • 8. Identity Providers (IdP) • User information parsed, processed and only permitted attributes are sent back to the Service Provider (SP) • By default all members of the UK Federation are sent a minimal set of attributes • Additional attributes have to be explicitly released by the IdP administrator Can have multiple metadata sources and rules for attribute disclosure
  • 9. Service Providers (SP) • Module performing login to service • Receives attributes from IdP and uses these to perform authentication and authorisation of user. • N.B. Service Provider performs authorisation decision based on attribute data received- it’s NOT the IdP’s job to perform authorisation!!
  • 10. Discovery Service • Formerly Known as WAYF (Where Are You From) • Essentially a list of available IdPs • UK Federation run one for general use OR • Roll your own to present a subset of these • Optional- you can hardwire your SP to speak to a specific IdP (but this isn’t really federation)
  • 11. SAML • AKA Security Assertion Markup Language • Standard dialect for IdPs and SPs to talk to each other • Standards (SAML1 / SAML2) • Possible (though not always straightforward!) for IdPs and SPs of different flavours e.g. Shibboleth and OpenAthens to talk to each other.
  • 13. The Federation • Maintains and publishes the metadata consumed by member entities (i.e. IdPs and SPs) • Metadata used to form trust relationships • Responsibility for the metadata feed and for ensuring members adhere to good practice (security, privacy etc) • Monolithic
  • 14. Inter-federation Trust • More of a political challenge than a technical one • Participating federations have to negotiate common standards re: metadata structure, key lengths/types, attributes required. • Best practice wins! • End result is an aggregated metadata file is published by participating federations
  • 15. Other Federated Identity Systems • OpenAthens- very similar to Shibboleth • Commercial entity, ran by EduServ • Can either run your own IdP or have OpenAthens run it for you for a fee. • Technology very similar to Shibboleth(SAML- based, monolithic Federations)
  • 16. Other Federated Identity Systems • Eduroam- used in Higher Education to provide federated roaming wireless access • Built on FreeRADIUS • Managed and maintained in the UK by JANET • External users credentials are relayed back to their home institution for authentication
  • 17. Future of Federation • Current models work well for web-based authentication (Shibboleth) and/or specific protocols (eduroam) • However there is an increasing requirement for support of multiple protocols and for some level of devolved federation management
  • 18. Shibboleth IdPv3 • Still SAML2-based but with a number of improvements based on experience gained with v2 • Improvements include: – User consent for releasing attributes – Session state largely stored client-side in encrypted cookie store.
  • 19. Moonshot • Based on FreeRADIUS 3 with additional functionality provided by Shib libraries • Provides some level of devolved management. • Multi-protocol support (SSH, Web, Exchange)
  • 20. Moonshot - Disadvantages • Requires bleeding-edge versions of FreeRADIUS and Moonshot dependencies • Work-in-progress- steep learning curve and documentation not comprehensive • Requires software to be installed on both clients and services to support it- some of these (e.g. OpenSSH) depend on locally patched versions.
  • 21. Questions? • E: Mark.Cairney@ed.ac.uk • T: @mcairney • http://www.ukfederation.org.uk • http://shibboleth.net/ • http://www.jisc.ac.uk/assent