1 / 38

Understanding Shibboleth: Enhancing Privacy and Access Control

Learn about Shibboleth, an initiative to share secured web resources, emphasizing privacy and user control. Explore its importance in higher education, current pilots, and attribute-based authorization. Discover the technical components, high-level architecture, managing trust, and various federation deployment models.

dominquez
Download Presentation

Understanding Shibboleth: Enhancing Privacy and Access Control

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Shibboleth

  2. Agenda • Shibboleth Background and Status • Why is Shibboleth Important (to Higher Ed)? • Current Pilots • Course Management • Library Pilots • Other Pilot Projects • Next Steps

  3. Shibboleth Background and Status • Why is Shibboleth Important? • Current Pilots • Next Steps

  4. What is Shibboleth? • An initiative to develop an architecture and policyframework supporting the sharing – between domains -- of secured web resources and services • A project delivering an open source implementation of the architecture and framework What is Shibboleth?

  5. What is Shibboleth? • A system... • with an emphasis on privacy • users control release of their attributes • based on open standards (SAML) and available in open source form • built on “federated administration”

  6. Attribute-based authorization • There is a spectrum of approaches available for attribute-based management of access to controlled resources, • At one end is the attribute-based approach, where attributes are exchanged about a prospective user until the controlled resource has sufficient information to make a decision. This approach does not degrade privacy. • At the other end is the identity-based approach, where the identity of a prospective user is passed to the controlled resource and is used to determine (perhaps with requests for additional attributes about the user) whether to permit access. Since this leads with identity, this approach requires the user to trust the target to protect privacy.

  7. Stage 1 - Addressing Four Scenario’s • Member of campus community accessing licensed resource • Anonymity required • Member of a course accessing remotely controlled resource • Anonymity required • Member of a workgroup accessing controlled resources • Controlled by unique identifiers (e.g. name) • Intra-university information access • Controlled by a variety of identifiers • Taken individually, each of these situations can be solved in a variety of straightforward ways. • Taken together, they present the challenge of meeting the user's reasonable expectations for protection of their personal privacy.

  8. High Level Architecture • Destination and origin site collaborate to provide a privacy-preserving “context” for Shibboleth users • Origin site authenticates user • Destination site requests attributes about user directly from origin site • Users (and organizations) can control what attributes are released

  9. Technical Components • Origin Site – Required Enterprise Infrastructure • Authentication • Attribute Repository • Origin Site – Shib Components • Handle Server • Attribute Authority • Target Site - Required Enterprise Infrastructure • Web Server (Apache or IIS) • Target Site – Shib Components • SHIRE • SHAR • WAYF • Resource Manager

  10. From Shibboleth Arch doc Origin Target

  11. From Shibboleth Arch doc Origin Target

  12. Attribute Authority --Management of Attribute Release Policies • The AA provides ARP management tools/interfaces. • Different ARPs for different targets • Each ARP Specifies which attributes and which values to release • Institutional ARPs (default) • administrative default policies and default attributes • Site can force include and exclude • User ARPs managed via “MyAA” web interface • Release set determined by “combining” Default and User ARP for the specified resource

  13. Typical Attributes in the Higher Ed Community

  14. Managing Trust • When a target receives a request to create a session, the Authn Assertion must be signed (PKI validation), and the origin must be a member of a common Federation. • (today) When an Origin receives a request for attributes, it must be transported across SSL. The name of the Requestor is used to locate the appropriate ARP.

  15. Target – Managing Attribute Acceptance • IC will NOT require members to do business with each other • So, targets will NOT have to accept attributes from every origin • Targets use Attribute Acceptance Policies

  16. Managing Authorization • Target manages rules specifying what attributes must be supplied in order to gain access • Rules are attribute based

  17. Various Federation Deploy Models • A target can be a member of multiple federations. • For each transaction, it will determine the origin, and the federation that origin belongs to, and the policies that federation is operating under • (Currently), an origin can be a member of only one federation.. So a campus that is in multiple federations would have to deploy multiple instances of the Shib origin software… • Soon… support for a multi-federation origin.

  18. InCommon • A federation to support academic and research activities. • Members can be organizations that are : • origins (IdSP’s) • targets (student loan services, content providers) • both (universities, museums, etc.) • Federation functions : • Central registry service and WAYF service • Origin practices on attributes and authentication • Target practices on the management of exchanged attributes • Attribute sets (eduPerson and eduOrg) for use to exchange attributes

  19. InCommon Operation • Operated by Internet2, open to all interested parties; registration fees modest and likely absorbed internally for Internet2 members • Initial governance by NPPAC (I2 CIO policy/planning council) with the intent to propose a light-weight governance structure to club members • Registration services on line; distribution of registry updates nightly • Self-audits by members

  20. Shibboleth Status • Version 1.1 available summer 2003 • Target support for Apache and IIS • Origin implemented in java • Supports ldap and SQL repositories • InQueue operational, InCommon soon • 25 campuses have deployed Shib origins • Growing vendor activity • Information vendors (eg JSTOR, EBSCO, etc) • Admin App’s

  21. Shibboleth Background and Status • Why is Shibboleth Important? • Current Pilots • Next Steps

  22. Why Shibboleth? • Higher Ed is a collaborative enterprise • Faculty have strong ties to peers at other institutions • With wed-based IMS systems, faculty share resources with their peers • Research is a collaborative enterprise • During the next three to five years, Brown will establish several multidisciplinary centers or institutes that will bring faculty expertise and resources together in optimal ways, possibly through collaboration with other institutions. - Robert Zimmer, Provost, Brown University • “Research in the future will be all about collaboration and distributed research groups that are facilitated through technology.” - Andries van Dam, VP Research, Brown University

  23. Why Shibboleth? Security • Better security tools will make collaboration more “painless” and more secure • Current "solutions" are primitive; we can do better today and without local overhaul • Shibboleth Simplifies Management and Use of Distributed Systems

  24. Why Shibboleth?Improved Access Control • Simplifies management of access to extended functionality • Librarians, based on their role, are given a higher-than-usual level of access to an online database to which a college might subscribe. • Librarians and publishers can enforce complicated license agreements that may restrict access to special collections to small groups of faculty researchers

  25. Why Shibboleth?Federated Administration • Users registered only at their “home” or “origin” institution • Flexibly partitions responsibility, policy, technology, and trust • Authorization information sent, instead of authentication information • when possible, use groups instead of people on ACLs • identity information still available for auditing and for applications that require it

  26. Why Shibboleth?Privacy • Higher Ed has privacy obligations • In US, “FERPA” requires permission for release of most personal identification information; encourages least privilege in information access • General interest and concern for privacy is growing • Shibboleth has active (vs. passive) privacy provisions “built in”

  27. Shibboleth Background and Status • Why is Shibboleth Important • Current Pilots • Next Steps

  28. Current Pilots • Course Management • Library Pilots • Other Pilot Projects

  29. Course Management • WebCT • BlackBoard • Webassign

  30. Library Pilot • A dozen+ campuses working with 6 information vendors • Using Shibboleth to control access to electronic resources • Good test case for privacy requirements, trust model needs

  31. Project Goals • Explore and Evaluate the utility of the Shibboleth model (attributes) for controlling access to licensed resources • Identify problems and issues with this approach • How well do existing licenses map to attributes? • Library “walk-in” customers • Physical location sometimes important (being “in” the Law Library) • Managing an environment with both Shib’ed and non-Shib’ed resources

  32. Campus Participants Penn State U. Colorado U. Michigan U. Washington U. Wisconsin – Madison UCOP (U. California System) U.Texas Health Science Center at Houston • Carnegie Mellon • Columbia • Dartmouth • Georgetown • London School of Economics • New York Unv. • Ohio State

  33. Vendor Participants • EBSCO • Elsevier • OCLC • Sfx (Ex libris) • JSTOR • McGraw Hill eBooks

  34. Shibboleth Deployment Issues • Access Issues • Kiosks and walk-ins • logins for on-campus use • Licensing issues • reconciling license structures with directory structures • system and consortial issues • mitigating disintermediation • Functional issues • handling Shibbed and non-Shibbed resources • roll-out strategies • entitlements vs attributes • what attributes to pass • how to structure the attribute name space

  35. Other Pilot Projects • Univ Admin Applications • Student Financial Aid (eg Meteor) • American Association of Medical Colleges • NSDL (National Science Digital Library) • SWITCH - The Swiss National Academic Community • UK/JISC - Controlled Access to Licensed Resources • Univ Texas, Medical Center and instruction • Washington Research Library Consortium (WRLC)

  36. Shibboleth Background and Status • Why is Shibboleth Important • Current Pilots • Next Steps

  37. Next Steps • Get InCommon Operational • Non-Web Use Cases • Federated P2P (LionShare) • Information Access (WebDAV, Streaming Server) • Collaboration (IM, VideoConference) • 3-tier • GUI - Attribute Release Policy Management • Native java-based target implementation

  38. So… What is Shibboleth? • A Web Single-Signon System (SSO)? • An Access Control Mechanism for Attributes? • A Standard Interface and Vocabulary for Attributes? • A Standard for Adding Authn and Authz to Applications?

More Related