SlideShare una empresa de Scribd logo
1 de 21
Federated Access Management
Mark Cairney
Information Services IT Infrastructure
UNIX Section
University of Edinburgh
What is Federated Access
Management?
• Trust framework between institutions and
services
• User Authentication devolved to each
institution via a local Identity Provider (IdP)
• Authorisation handled by the Service Provider
(SP) based on attributes sent to it by the IdP
What is FAM?
• Trust relationship handled by both sides
containing metadata describing each other
• Federation is responsible for managing and
publishing metadata for all members (IdPs and
SPs)
• Also responsible for establishing policies
regarding data exchange between members
and ensuring they are being adhered to.
What is FAM?
• Federations established at a geographical area
(country/continental) level e.g. InCommon
(US), UKAMF (UK), eduGAIN (Europe)
• Now starting to see inter-federation
agreements e.g. UK Federation <-> eduGAIN
• Establishing standards/good practice becomes
an even bigger issue with inter-federation!
FAM Systems
• Number of competing FAM solutions (both
FOSS and commercial)
– OpenAthens
– Shibboleth
– OpenAM
– Microsoft AD FS
• We’ll be looking at Shibboleth as it’s what I
know best! 
Shibboleth
• Free, Open Source
• Popular in education sector
• Gaining traction outwith education
• 3 main components:
– Identity Provider (IdP)
– Service Provider (SP)
– Discovery Service (DS aka Where Are You From?)
Identity Providers (IdP)
• Locally-installed server integrated with
organisation’s local infrastructure (SSO,
identity management)
• User logs in with their local SSO credentials
• IdP authenticates user and looks them up in
local Identity source (LDAP, AD, database)
Identity Providers (IdP)
• User information parsed, processed and only
permitted attributes are sent back to the
Service Provider (SP)
• By default all members of the UK Federation
are sent a minimal set of attributes
• Additional attributes have to be explicitly
released by the IdP administrator
Can have multiple metadata sources and rules
for attribute disclosure
Service Providers (SP)
• Module performing login to service
• Receives attributes from IdP and uses these to
perform authentication and authorisation of
user.
• N.B. Service Provider performs authorisation
decision based on attribute data received- it’s
NOT the IdP’s job to perform authorisation!!
Discovery Service
• Formerly Known as WAYF (Where Are You
From)
• Essentially a list of available IdPs
• UK Federation run one for general use OR
• Roll your own to present a subset of these
• Optional- you can hardwire your SP to speak
to a specific IdP (but this isn’t really
federation)
SAML
• AKA Security Assertion Markup Language
• Standard dialect for IdPs and SPs to talk to
each other
• Standards (SAML1 / SAML2)
• Possible (though not always straightforward!)
for IdPs and SPs of different flavours e.g.
Shibboleth and OpenAthens to talk to each
other.
WOW!
User
IdP
SP
Discovery
Service
The Federation
• Maintains and publishes the metadata
consumed by member entities (i.e. IdPs and
SPs)
• Metadata used to form trust relationships
• Responsibility for the metadata feed and for
ensuring members adhere to good practice
(security, privacy etc)
• Monolithic
Inter-federation Trust
• More of a political challenge than a technical
one
• Participating federations have to negotiate
common standards re: metadata structure,
key lengths/types, attributes required.
• Best practice wins!
• End result is an aggregated metadata file is
published by participating federations
Other Federated Identity Systems
• OpenAthens- very similar to Shibboleth
• Commercial entity, ran by EduServ
• Can either run your own IdP or have
OpenAthens run it for you for a fee.
• Technology very similar to Shibboleth(SAML-
based, monolithic Federations)
Other Federated Identity Systems
• Eduroam- used in Higher Education to provide
federated roaming wireless access
• Built on FreeRADIUS
• Managed and maintained in the UK by JANET
• External users credentials are relayed back to
their home institution for authentication
Future of Federation
• Current models work well for web-based
authentication (Shibboleth) and/or specific
protocols (eduroam)
• However there is an increasing requirement
for support of multiple protocols and for some
level of devolved federation management
Shibboleth IdPv3
• Still SAML2-based but with a number of
improvements based on experience gained
with v2
• Improvements include:
– User consent for releasing attributes
– Session state largely stored client-side in
encrypted cookie store.
Moonshot
• Based on FreeRADIUS 3 with additional
functionality provided by Shib libraries
• Provides some level of devolved management.
• Multi-protocol support (SSH, Web, Exchange)
Moonshot - Disadvantages
• Requires bleeding-edge versions of
FreeRADIUS and Moonshot dependencies
• Work-in-progress- steep learning curve and
documentation not comprehensive
• Requires software to be installed on both
clients and services to support it- some of
these (e.g. OpenSSH) depend on locally
patched versions.
Questions?
• E: Mark.Cairney@ed.ac.uk
• T: @mcairney
• http://www.ukfederation.org.uk
• http://shibboleth.net/
• http://www.jisc.ac.uk/assent

Más contenido relacionado

Destacado

Mule object stores
Mule object storesMule object stores
Mule object storesKrishna_in
 
Custom filters in mule soft
Custom filters in mule softCustom filters in mule soft
Custom filters in mule softKrishna_in
 
Round robin scheduling
Round robin schedulingRound robin scheduling
Round robin schedulingRaghav S
 
Mule expression component
Mule expression componentMule expression component
Mule expression componentKarnam Karthik
 
Mule ESB Tutorial Part 2
Mule ESB Tutorial Part 2Mule ESB Tutorial Part 2
Mule ESB Tutorial Part 2Srikanth N
 
MuleSoft Anypoint Studio - Essentials - Data Filtering
MuleSoft Anypoint Studio - Essentials - Data FilteringMuleSoft Anypoint Studio - Essentials - Data Filtering
MuleSoft Anypoint Studio - Essentials - Data FilteringVenkataNaveen Kumar
 
Security components in mule esb
Security components in mule esbSecurity components in mule esb
Security components in mule esbhimajareddys
 
Les filtres RSS dans Inoreader : détail de la syntaxe à utiliser (MAJ : mai 2...
Les filtres RSS dans Inoreader : détail de la syntaxe à utiliser (MAJ : mai 2...Les filtres RSS dans Inoreader : détail de la syntaxe à utiliser (MAJ : mai 2...
Les filtres RSS dans Inoreader : détail de la syntaxe à utiliser (MAJ : mai 2...Serge Courrier
 
Mule ESB Tutorial Part 1
Mule ESB Tutorial Part 1Mule ESB Tutorial Part 1
Mule ESB Tutorial Part 1Srikanth N
 
Microservices Best Practices
Microservices Best Practices Microservices Best Practices
Microservices Best Practices MuleSoft
 
Future of Integration | MuleSoft
Future of Integration | MuleSoftFuture of Integration | MuleSoft
Future of Integration | MuleSoftMuleSoft
 
Mule ESB - Integration Simplified
Mule ESB - Integration SimplifiedMule ESB - Integration Simplified
Mule ESB - Integration SimplifiedRich Software
 
Application Architecture: The Next Wave | MuleSoft
Application Architecture: The Next Wave | MuleSoftApplication Architecture: The Next Wave | MuleSoft
Application Architecture: The Next Wave | MuleSoftMuleSoft
 
Digital Businesses of the Future
Digital Businesses of the Future Digital Businesses of the Future
Digital Businesses of the Future MuleSoft
 
Mule splitters
Mule splittersMule splitters
Mule splittersGandham38
 

Destacado (19)

Mule object stores
Mule object storesMule object stores
Mule object stores
 
Custom filters in mule soft
Custom filters in mule softCustom filters in mule soft
Custom filters in mule soft
 
Round robin scheduling
Round robin schedulingRound robin scheduling
Round robin scheduling
 
Filters
FiltersFilters
Filters
 
Mule expression component
Mule expression componentMule expression component
Mule expression component
 
Mule ESB Tutorial Part 2
Mule ESB Tutorial Part 2Mule ESB Tutorial Part 2
Mule ESB Tutorial Part 2
 
MuleSoft Anypoint Studio - Essentials - Data Filtering
MuleSoft Anypoint Studio - Essentials - Data FilteringMuleSoft Anypoint Studio - Essentials - Data Filtering
MuleSoft Anypoint Studio - Essentials - Data Filtering
 
Security components in mule esb
Security components in mule esbSecurity components in mule esb
Security components in mule esb
 
Les filtres RSS dans Inoreader : détail de la syntaxe à utiliser (MAJ : mai 2...
Les filtres RSS dans Inoreader : détail de la syntaxe à utiliser (MAJ : mai 2...Les filtres RSS dans Inoreader : détail de la syntaxe à utiliser (MAJ : mai 2...
Les filtres RSS dans Inoreader : détail de la syntaxe à utiliser (MAJ : mai 2...
 
Active Filter (Low Pass)
Active Filter (Low Pass)Active Filter (Low Pass)
Active Filter (Low Pass)
 
Mule ESB Tutorial Part 1
Mule ESB Tutorial Part 1Mule ESB Tutorial Part 1
Mule ESB Tutorial Part 1
 
Microservices Best Practices
Microservices Best Practices Microservices Best Practices
Microservices Best Practices
 
Future of Integration | MuleSoft
Future of Integration | MuleSoftFuture of Integration | MuleSoft
Future of Integration | MuleSoft
 
Mule ESB - Integration Simplified
Mule ESB - Integration SimplifiedMule ESB - Integration Simplified
Mule ESB - Integration Simplified
 
Application Architecture: The Next Wave | MuleSoft
Application Architecture: The Next Wave | MuleSoftApplication Architecture: The Next Wave | MuleSoft
Application Architecture: The Next Wave | MuleSoft
 
Digital Businesses of the Future
Digital Businesses of the Future Digital Businesses of the Future
Digital Businesses of the Future
 
Mule soft csv_toxml
Mule soft csv_toxmlMule soft csv_toxml
Mule soft csv_toxml
 
Payload and logger
Payload and loggerPayload and logger
Payload and logger
 
Mule splitters
Mule splittersMule splitters
Mule splitters
 

Similar a Federated access management

Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...OpenID Foundation Japan
 
Integration Solution Patterns
Integration Solution Patterns Integration Solution Patterns
Integration Solution Patterns WSO2
 
APIs and Services: One Platform or Two?
APIs and Services: One Platform or Two?APIs and Services: One Platform or Two?
APIs and Services: One Platform or Two?Akana
 
CANARIE - What Do I Need to Connect with eduroam and Shibboleth
CANARIE - What Do I Need to Connect with eduroam and ShibbolethCANARIE - What Do I Need to Connect with eduroam and Shibboleth
CANARIE - What Do I Need to Connect with eduroam and ShibbolethChris Phillips
 
Dreamforce14 Multi Org Collaboration Architecture
Dreamforce14  Multi Org Collaboration ArchitectureDreamforce14  Multi Org Collaboration Architecture
Dreamforce14 Multi Org Collaboration ArchitectureRichard Clark
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptxargost1003
 
API’s and Micro Services 0.5
API’s and Micro Services 0.5API’s and Micro Services 0.5
API’s and Micro Services 0.5Richard Hudson
 
DCEU 18: From Monolith to Microservices
DCEU 18: From Monolith to MicroservicesDCEU 18: From Monolith to Microservices
DCEU 18: From Monolith to MicroservicesDocker, Inc.
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptxirfanullahkhan64
 
cloud session uklug
cloud session uklugcloud session uklug
cloud session uklugdominion
 
Lessons Learned in Implementing PeopleSoft ELS 9.0
Lessons Learned in Implementing PeopleSoft ELS 9.0Lessons Learned in Implementing PeopleSoft ELS 9.0
Lessons Learned in Implementing PeopleSoft ELS 9.0Kenneth Petty, PMP
 
CANARIE Eduroam and Shibboleth Lessons & Areas of interest
CANARIE Eduroam and Shibboleth Lessons & Areas of interestCANARIE Eduroam and Shibboleth Lessons & Areas of interest
CANARIE Eduroam and Shibboleth Lessons & Areas of interestChris Phillips
 
Securing APIs with Open Policy Agent
Securing APIs with Open Policy AgentSecuring APIs with Open Policy Agent
Securing APIs with Open Policy AgentNordic APIs
 
Securing APIs with Open Policy Agent
Securing APIs with Open Policy AgentSecuring APIs with Open Policy Agent
Securing APIs with Open Policy AgentAnders Eknert
 
Basic of computers
Basic of computers Basic of computers
Basic of computers Harsh Porwal
 
Internet, Intranet and Extranet
Internet, Intranet and Extranet Internet, Intranet and Extranet
Internet, Intranet and Extranet Maryam Fida
 
Eunis federation2
Eunis federation2Eunis federation2
Eunis federation2HEAnet
 
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...WSO2
 
Building APIs for Core Systems with Anypoint Platform
Building APIs for Core Systems with Anypoint PlatformBuilding APIs for Core Systems with Anypoint Platform
Building APIs for Core Systems with Anypoint PlatformMuleSoft
 

Similar a Federated access management (20)

Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
Enabling Large-Scale Multi-Party Federations with OpenID Connect - OpenID Sum...
 
Integration Solution Patterns
Integration Solution Patterns Integration Solution Patterns
Integration Solution Patterns
 
APIs and Services: One Platform or Two?
APIs and Services: One Platform or Two?APIs and Services: One Platform or Two?
APIs and Services: One Platform or Two?
 
CANARIE - What Do I Need to Connect with eduroam and Shibboleth
CANARIE - What Do I Need to Connect with eduroam and ShibbolethCANARIE - What Do I Need to Connect with eduroam and Shibboleth
CANARIE - What Do I Need to Connect with eduroam and Shibboleth
 
Dreamforce14 Multi Org Collaboration Architecture
Dreamforce14  Multi Org Collaboration ArchitectureDreamforce14  Multi Org Collaboration Architecture
Dreamforce14 Multi Org Collaboration Architecture
 
ITN_Module_3.pptx
ITN_Module_3.pptxITN_Module_3.pptx
ITN_Module_3.pptx
 
API’s and Micro Services 0.5
API’s and Micro Services 0.5API’s and Micro Services 0.5
API’s and Micro Services 0.5
 
DCEU 18: From Monolith to Microservices
DCEU 18: From Monolith to MicroservicesDCEU 18: From Monolith to Microservices
DCEU 18: From Monolith to Microservices
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptx
 
cloud session uklug
cloud session uklugcloud session uklug
cloud session uklug
 
Lessons Learned in Implementing PeopleSoft ELS 9.0
Lessons Learned in Implementing PeopleSoft ELS 9.0Lessons Learned in Implementing PeopleSoft ELS 9.0
Lessons Learned in Implementing PeopleSoft ELS 9.0
 
CANARIE Eduroam and Shibboleth Lessons & Areas of interest
CANARIE Eduroam and Shibboleth Lessons & Areas of interestCANARIE Eduroam and Shibboleth Lessons & Areas of interest
CANARIE Eduroam and Shibboleth Lessons & Areas of interest
 
Securing APIs with Open Policy Agent
Securing APIs with Open Policy AgentSecuring APIs with Open Policy Agent
Securing APIs with Open Policy Agent
 
Securing APIs with Open Policy Agent
Securing APIs with Open Policy AgentSecuring APIs with Open Policy Agent
Securing APIs with Open Policy Agent
 
Basic of computers
Basic of computers Basic of computers
Basic of computers
 
Internet, Intranet and Extranet
Internet, Intranet and Extranet Internet, Intranet and Extranet
Internet, Intranet and Extranet
 
Eunis federation2
Eunis federation2Eunis federation2
Eunis federation2
 
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...
 
Building APIs for Core Systems with Anypoint Platform
Building APIs for Core Systems with Anypoint PlatformBuilding APIs for Core Systems with Anypoint Platform
Building APIs for Core Systems with Anypoint Platform
 

Último

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...SOFTTECHHUB
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 

Último (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 

Federated access management

  • 1. Federated Access Management Mark Cairney Information Services IT Infrastructure UNIX Section University of Edinburgh
  • 2. What is Federated Access Management? • Trust framework between institutions and services • User Authentication devolved to each institution via a local Identity Provider (IdP) • Authorisation handled by the Service Provider (SP) based on attributes sent to it by the IdP
  • 3. What is FAM? • Trust relationship handled by both sides containing metadata describing each other • Federation is responsible for managing and publishing metadata for all members (IdPs and SPs) • Also responsible for establishing policies regarding data exchange between members and ensuring they are being adhered to.
  • 4. What is FAM? • Federations established at a geographical area (country/continental) level e.g. InCommon (US), UKAMF (UK), eduGAIN (Europe) • Now starting to see inter-federation agreements e.g. UK Federation <-> eduGAIN • Establishing standards/good practice becomes an even bigger issue with inter-federation!
  • 5. FAM Systems • Number of competing FAM solutions (both FOSS and commercial) – OpenAthens – Shibboleth – OpenAM – Microsoft AD FS • We’ll be looking at Shibboleth as it’s what I know best! 
  • 6. Shibboleth • Free, Open Source • Popular in education sector • Gaining traction outwith education • 3 main components: – Identity Provider (IdP) – Service Provider (SP) – Discovery Service (DS aka Where Are You From?)
  • 7. Identity Providers (IdP) • Locally-installed server integrated with organisation’s local infrastructure (SSO, identity management) • User logs in with their local SSO credentials • IdP authenticates user and looks them up in local Identity source (LDAP, AD, database)
  • 8. Identity Providers (IdP) • User information parsed, processed and only permitted attributes are sent back to the Service Provider (SP) • By default all members of the UK Federation are sent a minimal set of attributes • Additional attributes have to be explicitly released by the IdP administrator Can have multiple metadata sources and rules for attribute disclosure
  • 9. Service Providers (SP) • Module performing login to service • Receives attributes from IdP and uses these to perform authentication and authorisation of user. • N.B. Service Provider performs authorisation decision based on attribute data received- it’s NOT the IdP’s job to perform authorisation!!
  • 10. Discovery Service • Formerly Known as WAYF (Where Are You From) • Essentially a list of available IdPs • UK Federation run one for general use OR • Roll your own to present a subset of these • Optional- you can hardwire your SP to speak to a specific IdP (but this isn’t really federation)
  • 11. SAML • AKA Security Assertion Markup Language • Standard dialect for IdPs and SPs to talk to each other • Standards (SAML1 / SAML2) • Possible (though not always straightforward!) for IdPs and SPs of different flavours e.g. Shibboleth and OpenAthens to talk to each other.
  • 13. The Federation • Maintains and publishes the metadata consumed by member entities (i.e. IdPs and SPs) • Metadata used to form trust relationships • Responsibility for the metadata feed and for ensuring members adhere to good practice (security, privacy etc) • Monolithic
  • 14. Inter-federation Trust • More of a political challenge than a technical one • Participating federations have to negotiate common standards re: metadata structure, key lengths/types, attributes required. • Best practice wins! • End result is an aggregated metadata file is published by participating federations
  • 15. Other Federated Identity Systems • OpenAthens- very similar to Shibboleth • Commercial entity, ran by EduServ • Can either run your own IdP or have OpenAthens run it for you for a fee. • Technology very similar to Shibboleth(SAML- based, monolithic Federations)
  • 16. Other Federated Identity Systems • Eduroam- used in Higher Education to provide federated roaming wireless access • Built on FreeRADIUS • Managed and maintained in the UK by JANET • External users credentials are relayed back to their home institution for authentication
  • 17. Future of Federation • Current models work well for web-based authentication (Shibboleth) and/or specific protocols (eduroam) • However there is an increasing requirement for support of multiple protocols and for some level of devolved federation management
  • 18. Shibboleth IdPv3 • Still SAML2-based but with a number of improvements based on experience gained with v2 • Improvements include: – User consent for releasing attributes – Session state largely stored client-side in encrypted cookie store.
  • 19. Moonshot • Based on FreeRADIUS 3 with additional functionality provided by Shib libraries • Provides some level of devolved management. • Multi-protocol support (SSH, Web, Exchange)
  • 20. Moonshot - Disadvantages • Requires bleeding-edge versions of FreeRADIUS and Moonshot dependencies • Work-in-progress- steep learning curve and documentation not comprehensive • Requires software to be installed on both clients and services to support it- some of these (e.g. OpenSSH) depend on locally patched versions.
  • 21. Questions? • E: Mark.Cairney@ed.ac.uk • T: @mcairney • http://www.ukfederation.org.uk • http://shibboleth.net/ • http://www.jisc.ac.uk/assent