150 likes | 162 Views
An in-depth analysis of cutting-edge internet security technologies discussed at the Internet2/Educause Advanced CAMP in Colorado. Explore Shibboleth, SAML, XACML, and the evolving landscape of web security frameworks.
E N D
26 Weeks of Securitude, or ... ETAHA* RL “Bob” Morgan, University of Washington Internet2/Educause Advanced CAMP Boulder, Colorado July 2003 * (even the acronyms have acronyms)
Topics Internet2 WGs: • Shibboleth and Federations • WebISO OASIS and related • SAML • XACML • WS-* • Liberty Alliance Open Source Application Foundation / Chandler Credential converter
Shibboleth 1.0 Origin • Java-based Handle Service and Attribute Authority • flexible attribute resolver, attribute release policy expression • basic error-handling Target • binaries for Linux, Solaris; Apache module, separate SHAR process • sophisticated trust management for authn assertion validation • various options for distributed, replicated deployment • attribute definition, acceptance policies, mapping to env vars Other: Attribute naming, entitlements, PKI use
Shibboleth community Library systems people • CNI, DLF, campus libraries Information providers • JSTOR, OCLC, EBSCO, others Learning-management system vendors • Blackboard, WebCT Campus infra architects European NRENs Many random adopters ...
Shibboleth marketing ramps up Attributes
Shibboleth Federations InCommon • the “production” federation • US Higher-Ed Institutions (probably) as origins • real authentication, real attributes, real membership agreement, real PKI • coming this fall InQueue • the “trial” federation • Any “organization of interest” trying Shib and federation • running now with a dozen origins Other federations: Swiss HE, various states, ...
Shibboleth next steps “dot-release” by end of July • fixups and simplifications, better docs, Windows origin Attribute management • visibility for users, admins, GUI management for admins Federation support • federation data management tools, more consistent use Target • Java-based, better Windows, library support, policy mgt, vhosts Outreach to adopters to set directions
WebISO project Documents in process • models/capabilities; target models and integration methods New releases of webiso-style products • Pubcookie, CAS (Yale), Cosign (UMich), A-Select (Surfnet), other Consideration of “Shibboleth integration” • plugging in a WebISO to Shib is easy • will all sites migrate to Shib target? to SAML? • does Shib meet (some, most) requirements for WebISO on its own? • extend Shib project to include weblogin component?
OASIS work SAML (security-services TC) • SAML 1.1 approved, fixups based on experience • SAML 2.0 activity initiated • contributions from Liberty Alliance: metadata, etc • “credentials collector”, session management, alignment with XACML, etc XACML: access-control policy language • 1.0 approved, work begun on 1.1 • Sun provides open-source implementation in Java Web Services Security: protection of SOAP msgs • close to 1.0 approval
Web Services Security Framework Microsoft, IBM, others defined “roadmap” • with large set of proposed specs, not all published yet • WS-Security: fundamental SOAP message protection • WS-Policy: statements about policy of WS entities • WS-SecureConversation: context establishment, msg streams • WS-Trust: security token request/response • WS-Federation: login/logout, with browser profile, pseudonymity • other non-security WS-* specs: routing, transaction, etc Standards story not clear • base spec worked on in OASIS TC, others?
Liberty Alliance 1.1 specs published • now recast as “Identity Federation Framework” (ID-FF) • implementations available, but Liberty-based federations? • major PR win with EU privacy blessing • most SAML extensions contributed to OASIS SAML TC Next steps: Web-Services-based framework • ID-WSF: attribute exchange, discovery, info-sharing/protection • ID-SIS: interface for personal services, calendar, presence, etc(can you say “Hailstorm”?) • drafts available ...
OSAF Founded by Mitch Kapor to do cool open-source applications for end-users First is Chandler, personal information manager • email, calendar, etc • based on peer-to-peer model, rich datastore Working with CSG universities, Mellon • extend model to consider enterprise (university) services • eg IMAP, CAP, SASL, Kerberos • campuses working on joint proposal for further work
Credential converter Requirements for flexible “credential conversion” • more types of authn/authz systems appearing • more systems appearing that require one or another • interest in 3-tier support, implying proxy/delegation Some diverse examples • UMich KX509: map Kerberos cred into X.509 cert • Shib Attribute Authority: esp when doing “attribute derivation” • Microsoft TrustBridge “project” Can a generalized component be built? • we'll find out, with NMI support ...
Conclusion Some very sophisticated infrastructure standards are being produced • the good news is there are many to choose from ... But as always it's about deployments • understanding how infrastructure services are interdependent • understanding costs and benefits • understanding what practices are implied/supported by technologies