SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
SSO with
Boxcryptor
2
Overview
S S O w i t h B o x c r y p t o r
Table of Content
• Preconditions for Boxcryptor SSO
• SSO from a user’s and from an admin’s perspective
• The special case of SSO with encryption and zero knowledge
• SSO and encryption – How we handle key management
• SSO and zero knowledge – Why you need a device management service
• Conclusion
3
What do you need to implement SSO with Boxcryptor
S S O w i t h B o x c r y p t o r
• Identity Provider (IdP or “SSO Provider”)
 Boxcryptor is compatible with any SAML-based SSO solution
 Examples: Active Directory Federation Services (ADFS), Azure Active Directory (Azure AD), Okta, PingIdentity, OneLogin, LastPass, etc.
• Key Management Service (KMS)
 Examples: Hashicorp Vault (On-Premise), Amazon KMS (Cloud), Azure Key Vault (Cloud), etc.
• Device Management System
 Optional
 Examples: Active Directory (Desktops), MobileIron (Mobile), etc.
4
SSO from a User’s Perspective
S S O w i t h B o x c r y p t o r
(1) The user logs into Boxcryptor with his/her email address.
(2) The user is redirected to the company’s Identity Provider (e.g. Active Directory).
(3) The user enters his/her common password for all applications in the company.
5
SSO from an Admin’s Perspective
S S O w i t h B o x c r y p t o r
• The admin adds the user to the company’s SSO solution.
• The admin does not have to go to the Boxcryptor app and add the user there.
• The user does not need a Boxcryptor password and therefore cannot forget it or accidentally
lock himself out of his account.
Note: With the new SSO it is also possible that companies manage and store their own keys in-
house. Therefore, it becomes even simpler to meet compliance standards.
SSO and Zero Knowledge
Encryption
7
SSO and Zero Knowledge Encryption
S S O w i t h B o x c r y p t o r
Standard SSO protocols only handle user authentication, but Boxcryptor also needs zero
knowledge key management for decrypting and encrypting. Therefore, creating a zero knowledge
SSO solution is more complex.
8
Zero Knowledge Encryption without SSO
S S O w i t h B o x c r y p t o r
• Every Boxcryptor user has his/her own password.
• Derivations of single user’s passwords are used for two operations: authentication and
encryption key management.
• When an account is created, Boxcryptor generates a secure password hash and a password key.
• The password hash is used for authentication.
• The password key is used for encryption.
SSO: Authentication is handled by every standard SSO solution. For key management
(encryption) after the zero knowledge paradigm we had to develop a new solution.
9
Encryption – Key Management with SSO
S S O w i t h B o x c r y p t o r
Pre-condition: The Company has a Key Management Service (KMS), because we need another
entity to hold the “password key”. We cannot do it, because then we would be able to use it.
Examples of key management services:
• Amazon KMS
• Azure Key Vault by Microsoft
• Open Source KMS “Vault” by HashiCorp
10
Encryption – Key Management with SSO
S S O w i t h B o x c r y p t o r
• Your KMS creates a user key for each user.
• The KMS sends an ID of this key to Boxcryptor (to the device of the user).
• On the device of the user, Boxcryptor creates a second, secure “password key”.
• Boxcryptor sends this “password key” and the ID of the user key to the KMS.
• The KMS encrypts the “password key” with the user key created earlier.
Result: An encrypted version of the random “password key”. We will store this version and the ID
on our server.
11
What Happens When a User Signs in
S S O w i t h B o x c r y p t o r
• When a user attempts to sign in, the Boxcryptor client requests the encrypted “password key”
and the ID from our server. It sends both to the KMS, which will return the “password key” to the
client.
• The “password key” is used to derive all other keys that Boxcryptor needs to encrypt files or
manage permissions and groups.
Result: Key management is handled only between the user’s device (client) and your KMS.
12
What Happens When a User Signs in
S S O w i t h B o x c r y p t o r
(1) Request encrypted “password key” and ID from the Boxcryptor Server
(2) & (3) Request and reception of the “password key“ via KMS
13
Zero Knowledge SSO
S S O w i t h B o x c r y p t o r
An important factor for zero knowledge is that we do not have access to the company’s KMS. This
can be achieved by:
• Network access restriction: The KMS is only accessible within the company’s firewall.
• Device Management System: The KMS configuration is not stored on our servers in plaintext,
but encrypted with another key that we do not know: The key store key. Only in combination
with this key, the KMS configuration can be read in order to access the KMS. The key store key is
installed on the user’s device with a certificate, handed out by your company’s central device
management system.
Result: Only devices of the company can decrypt and encrypt files.
14
Zero Knowledge: A Device Management System
S S O w i t h B o x c r y p t o r
(1) Reception of the key store key from the company‘s device management system via certificate
(2) Request & reception of the encrypted KMSConfig. from the Boxcryptor server
(3) Decryption of the KMSConfig. with the key store key on the user’s device: access to KMS
15
Conclusion
S S O w i t h B o x c r y p t o r
• Pre-conditions for Boxcryptor SSO:
 Identity Provider
 Key Management Service
 Device Management System (optional)
• Standard SSO handles user authentication
• Boxcryptor SSO handles zero knowledge encryption key management as well
• This is achieved with a KMS and (optionally) a Device Management System
Thank you!
Secomba GmbH
Werner-von-Siemens-Str. 6
86159 Augsburg
+49 821 907861-50
sales@boxcryptor.com

Más contenido relacionado

Similar a Implement SSO with Boxcryptor while maintaining zero-knowledge encryption

[OWASP Poland Day] Saving private token
[OWASP Poland Day] Saving private token[OWASP Poland Day] Saving private token
[OWASP Poland Day] Saving private tokenOWASP
 
Shameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsShameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsSlawomir Jasek
 
BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.Jakub Kałużny
 
CONFidence 2014: Jakub Kałużny: Shameful secrets of proprietary protocols
CONFidence 2014: Jakub Kałużny: Shameful secrets of proprietary protocolsCONFidence 2014: Jakub Kałużny: Shameful secrets of proprietary protocols
CONFidence 2014: Jakub Kałużny: Shameful secrets of proprietary protocolsPROIDEA
 
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018HashiCorp
 
vpn router Mikrotik
vpn router Mikrotikvpn router Mikrotik
vpn router Mikrotiktodangkhoa
 
Managing your secrets in a cloud environment
Managing your secrets in a cloud environmentManaging your secrets in a cloud environment
Managing your secrets in a cloud environmentTaswar Bhatti
 
Implementing lockbox
Implementing lockboxImplementing lockbox
Implementing lockboxsri1srinu2
 
BLOCKSAFE WHITEPAPER
BLOCKSAFE WHITEPAPERBLOCKSAFE WHITEPAPER
BLOCKSAFE WHITEPAPERLandmarkClub
 
Moscow MuleSoft meetup May 2021
Moscow MuleSoft meetup May 2021Moscow MuleSoft meetup May 2021
Moscow MuleSoft meetup May 2021Leadex Systems
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoArash Ramez
 
SSL and CA
SSL and CASSL and CA
SSL and CAX 590
 
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...Cisco Canada
 
Bsidesnova- Pentesting Methodology - Making bits less complicated
Bsidesnova- Pentesting Methodology - Making bits less complicatedBsidesnova- Pentesting Methodology - Making bits less complicated
Bsidesnova- Pentesting Methodology - Making bits less complicatedOctavio Paguaga
 
Samsung. Blockchain Keystore SDK and Use Cases
Samsung. Blockchain Keystore SDK and Use CasesSamsung. Blockchain Keystore SDK and Use Cases
Samsung. Blockchain Keystore SDK and Use CasesLennartF
 
EC PKI Training on-prem and cloud-based PKI
EC PKI Training on-prem and cloud-based PKIEC PKI Training on-prem and cloud-based PKI
EC PKI Training on-prem and cloud-based PKIParnashreeSaha
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchJonathan LeBlanc
 

Similar a Implement SSO with Boxcryptor while maintaining zero-knowledge encryption (20)

[OWASP Poland Day] Saving private token
[OWASP Poland Day] Saving private token[OWASP Poland Day] Saving private token
[OWASP Poland Day] Saving private token
 
Shameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsShameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocols
 
SSL Everywhere!
SSL Everywhere!SSL Everywhere!
SSL Everywhere!
 
Credential provider
Credential providerCredential provider
Credential provider
 
BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.
 
CONFidence 2014: Jakub Kałużny: Shameful secrets of proprietary protocols
CONFidence 2014: Jakub Kałużny: Shameful secrets of proprietary protocolsCONFidence 2014: Jakub Kałużny: Shameful secrets of proprietary protocols
CONFidence 2014: Jakub Kałużny: Shameful secrets of proprietary protocols
 
Ways to protect From Keyloggers!
Ways to protect From Keyloggers!Ways to protect From Keyloggers!
Ways to protect From Keyloggers!
 
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
 
vpn router Mikrotik
vpn router Mikrotikvpn router Mikrotik
vpn router Mikrotik
 
Managing your secrets in a cloud environment
Managing your secrets in a cloud environmentManaging your secrets in a cloud environment
Managing your secrets in a cloud environment
 
Implementing lockbox
Implementing lockboxImplementing lockbox
Implementing lockbox
 
BLOCKSAFE WHITEPAPER
BLOCKSAFE WHITEPAPERBLOCKSAFE WHITEPAPER
BLOCKSAFE WHITEPAPER
 
Moscow MuleSoft meetup May 2021
Moscow MuleSoft meetup May 2021Moscow MuleSoft meetup May 2021
Moscow MuleSoft meetup May 2021
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part Two
 
SSL and CA
SSL and CASSL and CA
SSL and CA
 
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
 
Bsidesnova- Pentesting Methodology - Making bits less complicated
Bsidesnova- Pentesting Methodology - Making bits less complicatedBsidesnova- Pentesting Methodology - Making bits less complicated
Bsidesnova- Pentesting Methodology - Making bits less complicated
 
Samsung. Blockchain Keystore SDK and Use Cases
Samsung. Blockchain Keystore SDK and Use CasesSamsung. Blockchain Keystore SDK and Use Cases
Samsung. Blockchain Keystore SDK and Use Cases
 
EC PKI Training on-prem and cloud-based PKI
EC PKI Training on-prem and cloud-based PKIEC PKI Training on-prem and cloud-based PKI
EC PKI Training on-prem and cloud-based PKI
 
Creating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from ScratchCreating an In-Aisle Purchasing System from Scratch
Creating an In-Aisle Purchasing System from Scratch
 

Último

SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Best Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfBest Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfIdiosysTechnologies1
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 

Último (20)

SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Best Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfBest Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdf
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 

Implement SSO with Boxcryptor while maintaining zero-knowledge encryption

  • 2. 2 Overview S S O w i t h B o x c r y p t o r Table of Content • Preconditions for Boxcryptor SSO • SSO from a user’s and from an admin’s perspective • The special case of SSO with encryption and zero knowledge • SSO and encryption – How we handle key management • SSO and zero knowledge – Why you need a device management service • Conclusion
  • 3. 3 What do you need to implement SSO with Boxcryptor S S O w i t h B o x c r y p t o r • Identity Provider (IdP or “SSO Provider”)  Boxcryptor is compatible with any SAML-based SSO solution  Examples: Active Directory Federation Services (ADFS), Azure Active Directory (Azure AD), Okta, PingIdentity, OneLogin, LastPass, etc. • Key Management Service (KMS)  Examples: Hashicorp Vault (On-Premise), Amazon KMS (Cloud), Azure Key Vault (Cloud), etc. • Device Management System  Optional  Examples: Active Directory (Desktops), MobileIron (Mobile), etc.
  • 4. 4 SSO from a User’s Perspective S S O w i t h B o x c r y p t o r (1) The user logs into Boxcryptor with his/her email address. (2) The user is redirected to the company’s Identity Provider (e.g. Active Directory). (3) The user enters his/her common password for all applications in the company.
  • 5. 5 SSO from an Admin’s Perspective S S O w i t h B o x c r y p t o r • The admin adds the user to the company’s SSO solution. • The admin does not have to go to the Boxcryptor app and add the user there. • The user does not need a Boxcryptor password and therefore cannot forget it or accidentally lock himself out of his account. Note: With the new SSO it is also possible that companies manage and store their own keys in- house. Therefore, it becomes even simpler to meet compliance standards.
  • 6. SSO and Zero Knowledge Encryption
  • 7. 7 SSO and Zero Knowledge Encryption S S O w i t h B o x c r y p t o r Standard SSO protocols only handle user authentication, but Boxcryptor also needs zero knowledge key management for decrypting and encrypting. Therefore, creating a zero knowledge SSO solution is more complex.
  • 8. 8 Zero Knowledge Encryption without SSO S S O w i t h B o x c r y p t o r • Every Boxcryptor user has his/her own password. • Derivations of single user’s passwords are used for two operations: authentication and encryption key management. • When an account is created, Boxcryptor generates a secure password hash and a password key. • The password hash is used for authentication. • The password key is used for encryption. SSO: Authentication is handled by every standard SSO solution. For key management (encryption) after the zero knowledge paradigm we had to develop a new solution.
  • 9. 9 Encryption – Key Management with SSO S S O w i t h B o x c r y p t o r Pre-condition: The Company has a Key Management Service (KMS), because we need another entity to hold the “password key”. We cannot do it, because then we would be able to use it. Examples of key management services: • Amazon KMS • Azure Key Vault by Microsoft • Open Source KMS “Vault” by HashiCorp
  • 10. 10 Encryption – Key Management with SSO S S O w i t h B o x c r y p t o r • Your KMS creates a user key for each user. • The KMS sends an ID of this key to Boxcryptor (to the device of the user). • On the device of the user, Boxcryptor creates a second, secure “password key”. • Boxcryptor sends this “password key” and the ID of the user key to the KMS. • The KMS encrypts the “password key” with the user key created earlier. Result: An encrypted version of the random “password key”. We will store this version and the ID on our server.
  • 11. 11 What Happens When a User Signs in S S O w i t h B o x c r y p t o r • When a user attempts to sign in, the Boxcryptor client requests the encrypted “password key” and the ID from our server. It sends both to the KMS, which will return the “password key” to the client. • The “password key” is used to derive all other keys that Boxcryptor needs to encrypt files or manage permissions and groups. Result: Key management is handled only between the user’s device (client) and your KMS.
  • 12. 12 What Happens When a User Signs in S S O w i t h B o x c r y p t o r (1) Request encrypted “password key” and ID from the Boxcryptor Server (2) & (3) Request and reception of the “password key“ via KMS
  • 13. 13 Zero Knowledge SSO S S O w i t h B o x c r y p t o r An important factor for zero knowledge is that we do not have access to the company’s KMS. This can be achieved by: • Network access restriction: The KMS is only accessible within the company’s firewall. • Device Management System: The KMS configuration is not stored on our servers in plaintext, but encrypted with another key that we do not know: The key store key. Only in combination with this key, the KMS configuration can be read in order to access the KMS. The key store key is installed on the user’s device with a certificate, handed out by your company’s central device management system. Result: Only devices of the company can decrypt and encrypt files.
  • 14. 14 Zero Knowledge: A Device Management System S S O w i t h B o x c r y p t o r (1) Reception of the key store key from the company‘s device management system via certificate (2) Request & reception of the encrypted KMSConfig. from the Boxcryptor server (3) Decryption of the KMSConfig. with the key store key on the user’s device: access to KMS
  • 15. 15 Conclusion S S O w i t h B o x c r y p t o r • Pre-conditions for Boxcryptor SSO:  Identity Provider  Key Management Service  Device Management System (optional) • Standard SSO handles user authentication • Boxcryptor SSO handles zero knowledge encryption key management as well • This is achieved with a KMS and (optionally) a Device Management System
  • 16. Thank you! Secomba GmbH Werner-von-Siemens-Str. 6 86159 Augsburg +49 821 907861-50 sales@boxcryptor.com