240 likes | 253 Views
Explore all about Shibboleth architecture, federations, and their value propositions in the realm of identity service providers. Learn about federated models, research and education federations, virtual organizations, and federating software.
E N D
Intro to Shibboleth and Federation… Ken Klingenstein Director, Internet2 Middleware and Security
Shibboleth • An architecture, consisting of both a payload definition (using SAML) of attributes and a set of privacy-preserving methods of exchanging such payloads. • A project that has managed the development of the architecture and code • A code package, running on a variety of systems, that implements the architecture. • Used to form federations…
Federations • Persistent enterprise-centric trust facilitators • Sector-based, nationally-oriented • Federated operator handles enterprise I/A, management of centralized metadata operations • Members of federation exchange SAML assertions bi-laterally using a federated set of attributes • Members of federation determine what to trust and for what purposes on an application level basis • Steering group sets policy and operational direction • Note the “discovery” of widespread internal federations
Federations … • Might support trust fabric maintenance • Operate a metadata distribution service • Might be the locus for attribute standards • Might be the locus for “minimum but sufficient” IdP and SP operational practice standards • Are not a party to the transactions between IdPs and SPs • Are not involved with entitling access to resources
Federated model • Enterprises and organizations provide local LOA, namespace, credentials, etc. • Uses a variety of end-entity local authentication – PKI, username/password, Kerberos, two-factor, etc. • Enterprises within a vertical sector federate to coordinate LOA’s, namespaces, metadata, etc. • Internal federations within large complex corporations have been “discovered”. • Privacy/security defined in the context of an enterprise or identity service provider
Federation Value Proposition • Set of cooperating IdPs and SPs forms a community needing agreement on: • Trust Fabric • X.509 certs • IdP and SP identifiers & other metadata • Community standard for attribute semantics • Community standards for IdP and SP operational practices • Strength of authentication • Confidentiality • For N IdPs and M SPs, which is easier? • N*M agreements • N+M agreements
Federations and PKI • The rough differences are payload format (SAML vs X.509) and typical length of validity of assertion (real-time vs long-term) • Federations use enterprise-oriented PKI heavily and make end-user PKI both more attractive and more tractable – adding privacy (secrecy), ease of verification, addition of role, etc. • The analytic framework (evaluation methodologies for risk in applications and strength of credentials) and infrastructure developed for PKI is useful for federations. • The same entity can offer both federation and PKI services
The Research and EducationFederation Space • Switch, Haka, JISC, BECTA, InCommon, etc. • Inqueue, becoming TestShib • USGov eAuthentication • State of Texas HE federation • Elsevier, OCLC, Lexis, CERN • ….
Virtual Organizations • Geographically distributed, enterprise distributed community that shares real resources as an organization. • Examples include team science (NEESGrid, HEP, BIRN, NEON), digital content managers (library cataloguers, curators, etc), a state-based life-long learning consortia, a group of researchers coordinating a launch vehicle payload, etc. • On a continuum from interrealm groups (no real resource management, few defined roles) to real organizations (primary identity/authentication providers) • Want to leverage enterprise middleware and external trust fabrics, as well as support centers
Virtual Organizations have… • Real resources that they share and manage • May be computational resources • May be scientific instruments • May be bandwidth • May be shared data and content • Economic data • Museum materials • Cultural and artistic works • A relatively small set of users who tend to travel in common circles • Often the need to have some accounting and regulatory compliance
Virtual organizations vary… • By lifetime of VO • Some are relatively short-term, perhaps 1-2 years • Some may persist for extended periods • By size • By cluster – at any one time, 15-20 experiments (virtual orgs) are active at Fermi Lab, CERN. A shuttle launch may need coordination among several vo’s that have equipment aboard. • By type of domain-specific tools • A number are using Grids • A number subscribe to major scientific data streams • Some have no domain-specific tools
Federating Software • SAML and Shibboleth • Liberty Alliance crowd…Netegrity, Oblix, Nokia, Chase, etc. • WS-*
SAML • Security Access Markup Language – an OASIS standard • SAML 1.0 current eAuth standard; SAML 1.1 widely embedded • SAML 2.0 ratified by OASIS earlier this year • Combines much of the intellectual contributions of the Liberty Alliance with materials from the Shibboleth community – a fusion product • Scott Cantor of Ohio State was the technical editor • Adds some interesting new capabilities, eg. privacy-preservation, actively linked identities • Possibly a plateau product
Shibboleth Athenticate at home org Authorize at resource without knowing user’s identity
Shibboleth Underpinnings • Elements of shibboleth infrastructure must identify and authenticate each other • Home org or Identity Provider (IdP) pieces • Resource or Service Provider (SP) pieces • Attribute assertions about authenticated principals are sent from IdPs to SPs • For it all to work, IdPs and SPs must agree about which attributes and values are tossed around, and their semantics
Shib Timeline • Project formation - Feb 2000 • Inception of SAML effort in OASIS – December 2000 • OpenSAML release – July 2002 • Shib v1.0 April 2003 • Shib v1.2 April 2004 • Shib v1.3 July 2005 – non web services, new fed metadata • Shib v1.3.a Sept 2005 – Federally certified • Shib v 1.3 b - WS-Fed compatible • OpenSAML 2.0 and futures – later camp talks…
Shibboleth v1.3 • Released -- July, 2005 • Certified by GSA for governmental use • Major New Functionality • Full SAML v1.1 support -- BrowserArtifact Profile and AttributePush • Support for SAML-2 metadata schema • Improved Multi-Federation Support • Support for the Federal Gov’t’s E-authn Profile • Native Java SP Implementation • Improved build process
WS-* • A collective of nine or so protocols and architectures to manage interrealm services • Owned by Microsoft, with subordinate status of IBM and BEA • Complex interactions among a different mapping of the problem space • Some published; some still in the white binder…
WS* - Shib Interop • Agreements to build WS-Fed interoperability into Shib • Contracts signed; work underway • WS-Federation + Passive Requestor Profile + Passive Requestor Interoperability Profile • Discussions broached, by Microsoft, in building Shib interoperabilty into WS-Fed; no further discussions • Devils in the details • Can WS-Fed-based SPs work in InCommon without having to muck up federation metadata with WS-Fed-specifics? • All the stuff besides WS-Fed in the WS-* stack
Federations Today and Tomorrow • Some countries fully operational • Scope of service varies from R&E to K-12 • Service models – central NREN, national IT, others… • Invites other collaborations • Others in development • VO support available via GridShib, etc.
Federation key issues • Peering, peering, peering • At what size of the globe? (Confederation?) How do sectors relate? How to relate to a government federation? • On what issues to peer