Delegated authentication Electronic identity: delegated and federated authentication, policy-based access control

Size: px
Start display at page:

Download "Delegated authentication Electronic identity: delegated and federated authentication, policy-based access control"

Transcription

1 Delegated authentication Electronic identity: delegated and federated authentication, policy-based access control Antonio Lioy < polito.it > several RPs (Replying Party) may decide to delegate authentication to a separate entity AS AS (Authentication Server) is performing authn on behalf of the RP interacting with the authn client with one among a set of authentication protocols and finally providing to the RP the authn result in the form of a ticket (or assertion) Politecnico di Torino Dip. Automatica e Informatica Delegated authentication Transmission of authentication result 3. authn protocol client 2. redirect 1. application request AS RP AS can transmit authn result to RP in various ways differences in terms of: speed security and trust implications on services, interfaces, network filters no correct or best solution select based on your application scenario Push ticket ticket sent directly from AS to RP Indirect push ticket ticket sent from AS to client and then from client to RP AS AS 4. authn result (ticket) client 4. ticket RP RP 1

2 Push reference + pull ticket ticket reference sent from AS to client and then from client to RP then ticket pull from RP to AS client 4c. ticket ref AS 4d. ticket Problems with tickets binding with client ticket authentication ticket manipulation (at client) ticket manipulation (by MITM) ticket sniffing (in the network / at client) privacy! listening service at RP incoming firewall at RP ticket replay (by same client) ticket reuse (at different client) RP Ticket protection direct transmission AS RP digital signature by AS + encryption for RP, or secure channel (AS authn + packet integrity/authn + packet encryption + no replay, e.g. TLS) indirect transmission via client digital signature by AS + encryption for RP protection from replay or reuse timestamp (time limit?) binding with ID and/or network address Federated authentication various security domains each one managed by a different AS create a trust relationship so that a RP belonging to one domain will accept the authentication performed by the AS in another domain actors are usually renamed as: IDP (Identity Provider) ~ AS SP (Service Provider) ~ RP XACML extensible Access Control Markup Language Antonio Lioy < polito.it > Politecnico di Torino Dip. Automatica e Informatica What is XACML? a language to describe authorisation policies, defined in terms of: subject (users, computer, services) resource (documents, file, data) identified through URI a language to manage access to resources protected by authorisation: data format to represent request/response transmitted over a client-server protocol of choice OASIS standard (based on XML syntax) 2

3 Policy-based access control model designed by IETF for the description of the admission control policies for QoS on routers: A framework for policy-based admission control (RFC-2753) The COPS (Common Open Policy Service) protocol (RFC-2748) subsequently generalized and extended to : management of information systems (DMTF) access control in distributed environments (OASIS) Components policy-based access control PEP = Policy Enforcement Point protects a resource and allows access only after verification of compatibility with the policy PDP = Policy Decision Point receives all the data (policy, subject, resource, access type, context) and decides whether to permit or deny the access PIP = Policy Information Point provides the info related to the access requested PAP = Policy Access Point provides the policy applicable to the requested access T subject PIP 1. S, O, T 8. authorised/denied 3. context info 7. response PDP PEP context handler 2. request 5. retrieve policy??? policy repository 0. write policy object PAP Context handler PEP: is tightly bound to the application or service (e.g. web server, firewall XML) uses specific formats for requests/responses (few PEP are capable of using directly XACML) context handler: converts access requests/responses from/to XACML enhances the requests with the attribute values (obtained from PIP) often in the form of SAML assertions XACML: policy format <PolicySet> container of single policies or other policy set <Policy> is the single access control policy <Rule> is the single rule in the policy (possibly more than one) <Effect> the effect of the rule (permit/deny) <Condition> condition to be verified (optional) <Target> used to control the applicability of the request and to index the various policies for the PDP <Subject> (one or more) can contain the list of the attributes of the subject to which the policy applies <Action> action allowed by the policy (view, execute, ecc) <Resources> reference to the resources to be protected (URI) XACML: request format <Request> contains the specifications for the subjects, the resources, the action and the environment obtained from the request context <Resource> specifies the data for the resource to which the access was requested, described through its <Attribute> <Action> specifiies the action on the resource, by listing a set of <Attribute> elements connected with the action <Subject> is the subjcet requiring the action, described with a set of its <Attribute> <Attribute> (of Subject, Request, Resource) <AttributeID> (e.g. username, DN, action, URI) <AttributeValue> 3

4 XACML: response format <Response> encapsulates the decision of the PDP <Result> represents a unique authorisation decision <Decision> contains the result of the application of the policy on the request (Permit / Deny / Indeterminate / NotApplicable). <Status> represents the status of the result of the authorisation decision (contains a status code, a message status and the status details) SAML Security Assertion Markup Language Antonio Lioy < polito.it > Politecnico di Torino Dip. Automatica e Informatica What is SAML? a data format used to: represent various types of assertions construct requests of assertions represent responses containing assertions assertion = ASSERTION (base object of SAML) has the scope to simplify and to make standard the interactions aimed to establish permissions in a multi-domain distributed system OASIS standard (based on XML syntax) SAML 1.0 november 2002 original version SAML 1.1 september 2003 SAML 1.* can protect messages with XML-dsig defines profiles for web browser SSO: browser/artifact profile = token SAML by ref browser/post profile = token SAML by value SAML 2.0 Web browser SSO use case march 2005 incompatible with the previous versions can protect messagges with XML-dsig can use XML-enc for identifiers, attributes and assertions (for privacy) defines new protocols, binding and profiles web user authenticate access protected resource source web site ( IdP ) destination web site ( SP ) IdP = Identity Provider SP = Service Provider 4

5 Authorization service use case Back office transaction use case PDP check permission authenticate and qualify authority known to both buyer user request access PEP transact business seller SAML assertion an assertion is: a declaration of a fact regarding a subject (e.g. the role of a user) declaration made by a certain issuer three types of assertions (all regarding security): authentication attributes authorisation decision can be extended to add other types of assertions assertion can be digitally signed (by using XML signature) Info common to all assertions issuer and issuance timestamp assertion ID subject name plus security domain "conditions" for which the assertion is valid: client SAML must reject the assertion containing conditions that are not understood an important condition: assertion validity period other useful information: e.g. explanation / proof of the basis on which the assertion was constructed Authentication assertion an issuer declares that: the subject S was authenticated with the mechanism M at time T attention! SAML does not perform authentication (e.g. password request, challenge and response) but provides a mechanism to create a link with the result of an authentication performed previously by an authentication agent Example of authentication assertion <saml:assertion MajorVersion="1" MinorVersion="0" AssertionID=" " Issuer="Politecnico di Torino" IssueInstant=" T10:02:00Z"> <saml:conditions NotBefore=" T10:00:00Z" NotAfter=" T10:05:00Z" /> <saml:authenticationstatement AuthenticationMethod="password" AuthenticationInstant=" T10:02:00Z"> <saml:subject> <saml:nameidentifier SecurityDomain="polito.it" Name="alioy" /> </saml:subject> </saml:authenticationstatement> </saml:assertion> 5

6 an issuer declares that: the subject S Attribute assertion is associated to the attributes A, B, C, that currently have the values "a", "b", "c", typically obtained from an LDAP query example: "alioy" in "polito.it" is associated to the attribute "Department" with value "DAUIN" Example of attribute assertion <saml:assertion...> <saml:conditions.../> <saml:attributestatement> <saml:subject> <saml:nameidentifier SecurityDomain="polito.it" Name="alioy" /> </saml:subject> <saml:attribute AttributeName="Dipartimento" AttributeNamespace=" <saml:attributevalue> DAUIN </saml:attributevalue> </saml:attribute> </saml:attributestatement> </saml:assertion> Authorization decision assertion an issuer declares that it has taken a decision regarding an access request: made by a subject S for an access of type T to the resource R based on the evidence E the subject can be a person or a program the resource can be a web page, a file, a webservice, Example of authorization decision assertion <saml:assertion...> <saml:conditions.../> <saml:authorizationstatement Decision="Permit" Resource=" <saml:subject> <saml:nameidentifier SecurityDomain="polito.it" Name="alioy" /> </saml:subject> </saml:authorizationstatement> </saml:assertion> SAML: producer-consumer model SAML: protocol for the assertion Policy Policy Policy Asserting Party Credentials Collector Authentication Authority Attribute Authority Policy Decision Point SAML SAML Authentication Assertion Attribute Assertion Authorization Decision Assertion Request for Assertion of Certain Type Response Assertion System Entity Application Request Policy Enforcement Point Relying Party 6

7 Request of authentication assertion conceptually "Please, give me authentication information regarding this subject, if you have any" it is assumed that the requester and the responder have a trust relation: they speak about the same Subject the response is a sort of recommendation letter" for the Subject Example of request of authentication assertion <samlp:request MajorVersion="1" MinorVersion="0" RequestID=" " > <samlp:authenticationquery> <saml:subject> <saml:nameidentifier SecurityDomain="polito.it" Name="alioy" /> </saml:subject> </samlp:authenticationquery> </samlp:request> Trust relation often the assertion is part of a triangle who accepts the assertion must "trust" the entity that generates an assertion in practice the trust relation is established by deciding the security aspects of the assertion exchange push or direct pull on secure channel (e.g. TLS) shared or public key for XMLsignature Binding SAML SAML defines what" to transport, the binding defines how" to transport it, i.e. a network protocol for SAML requests and responses SAML/SOAP-over-HTTP is the original binding 1.0 SAML 2.0 defines other bindings: SAML SOAP binding (based on SOAP 1.1) reverse SOAP (PAOS) binding HTTP redirect (GET) binding HTTP POST binding HTTP artifact binding SAML URI binding SAML Profiles A SAML profile is a concrete manifestation of a defined use case using a particular combination of assertions, protocols and bindings in practice a "profile" is a pattern to make assertions relative to important information for a specific use case: "web browser profile" to implement SSO web "SOAP profile" for assertions on the SOAP payload SSO push use case (C > SP) GET service URI (SP > C) REDIRECT to IdP with SAML-authN-req (C > IdP) GET with SAML-authN-req (C : IDP) authentication exchange (IdP > C) HTML form: POST to SP, with hidden field containing SAML-authN-resp (C > SP) POST with SAML-authN-resp (SP > C) verifies SAML-authN-resp and eventually provides the requested service also named "front-channel exchange" 7

8 SSO push use case 1. service req SP 2. redirect to IdP (w/ authn req) 6. authn res 7. service C 5. redirect to SP (w/ authn res) 4. authn exchange IdP 3. authn req SSO pull use case (C > SP) GET service URI (SP > C) REDIRECT to IdP with SAML-authN-req (C > IdP) GET with SAML-authN-req (IdP > C) HTML form: POST to SP with an artifact (=pointer to SAML-authN-resp on the IdP) (C > SP) POST with artifact (SP > IdP) GET with artifact (IdP > SP) SAML-authN-resp (SP > C) verifies SAML-authN-resp and eventually provides requested service also named "back-channel exchange" SSO pull use case 1. service req 2. redirect to IdP (w/ authn req) 6. artifact 9. service C SP 7. authn-res req SAML SSO for Google Apps a company (partner) installs its own application on Google (service provider) the partner wants to maintain control of the authentication and authorisation part (identity provider) the exchange is based on SAML-2.0 with XML signature 5. redirect to SP (w/ artifact) 4. authn exchange IdP 8. authn-res 3. authn req SAML SSO for Google Apps: details the partner must provide to Google: the URL of hiw own SSO service the X.509 certificato to verify his signatures the step 3 contains (in opaque mode): the URL of Google service requested by the user the SAML authentication request the URL of the ACS (Assertion Consumer Service) the step 6 contains (in opaque mode): the URL of Google service requested by the user the SAML authentication response with XML sig the URL of the ACS 8

9 Federated identity SAML is often used to create federated identity systems SAML typically used in PC / server web-based environments (heavy and difficult to support in light / mobile environments) OpenID-connect makes similar things as SAML the same architecture C / SP / IdP JSON data format and REST protocol (both native on smartphone and tablet) not correlated to OpenID-2.0 an identity layer over Oauth-2.0 (IETF authorisation framework) OpenID-connect (OIDC) delegated authentication system JSON data + REST protocol, native on mobile OS not correlated to OpenID-2.0 but an identity layer over Oauth-2.0 (IETF authorisation framework) user agent = browser or mobile app client = RP wishing to use OIDC for authn OP = OpenID Provider (~IDP), w/ various endpoints AuthZ EP = manages authn protocol Token EP = verifies token validity UserInfo EP = provides user information (if user consents to) OIDC: user authentication OIDC: login with token OIDC: trust, security, and discovery messages authenticated with digital signatures requires registration of public keys among the various actors message exchange protected via secure channel (TLS) no real federation but can use WebFinger to discover the OpenID Providers (if registered with WebFinger) well-known OIDC providers: Google, Facebook, Salesforce, eidas Antonio Lioy < polito.it > Politecnico di Torino Dip. Automatica e Informatica 9

10 eidas regulation European Union Regulation no. 910/2014 electronic identification and trust services for electronic transactions in the internal market ensures that people and businesses can use their own national electronic identification schemes (eids) to access public services in other EU countries where eids are available. adopted on 23 July 2014 eidas eid infrastructure is currently voluntary compulsory for EU public services from 2018/09 private sector adoption is optional but welcome eidas purpose and principles boost confidence and trust towards digital world by adopting the following principles among others mutual acceptance of national e-id common framework for secure interaction between citizens, companies and public administration technological neutrality of requirements required to not restrict to specific solutions level of trust in national electronic identity can be defined by a certain e-id quality level country-specific supervision organisations to verify the Regulation adoption and interact with the European Commission (e.g. for data privacy) eidas implementing acts Commission Implementing Decision (EU) 2015/296 (24 February 2015) eid procedural arrangement for MS cooperation 2015/1501 (8 September 2015) interoperability framework 2015/1502 (8 September 2015) technical specifications for assurance levels for electronic identification means 2015/1984 (3 November 2015) formats and procedures for notification Pan-european eid e-identity = authentication + certified attributes set of certified European attributes lexicon (multilanguage attribute names) syntax (possible values) semantics (e.g. surname) various authentication credentials reusable password, one-time-password, cellphone, software certificate, smart-card used in a transparent way and with legal value (according to the citizen's country) Adaptive security and privacy protection The eidas infrastructure various authentication levels crypto strength of the authn technique strength of the identification process LOA (Level of Assurance) substantial, medium, high requested (by the service) versus effective LOA (depending on the authn technique used) privacy protection and localization user talks with her own country and provides explicit consent for the required attributes attributes managed end-to-end (no storage of personal data in the infrastructure) ( O O ) 1. ask for service Italian citizen service provider 2. use eidas 3. select your country Swedish eidas SP-proxy 4a. consent? 4b. which e-id? 5a. authentication 5b. consent (final) Italian eidas IDP-proxy IDP + AP (Italian) 10

11 eidas Technical specifications version 1.1 publicly available based on STORK1 similar, but not compatible covers e.g. end-to-end encryption of authn response architecture SAML message format SAML attribute profiles cryptographic requirements eidas minimum data-set defines a minimal data-set to be supported by any eidas node for cross-border authentication 8 attributes for natural persons (mandatory) PersonIdentifier, FirstName, FamilyName, DateOfBirth (optional) BirthName, PlaceOfBirth, CurrentAddress, Gender 10 attributes for legal persons (mandatory) LegalName, LegalPersonIdentifier (optional) LegalAddress, VATRegistration, TaxReference, BusinessCodes, LEI, EORI, SEED, SIC 11

Electronic ID at work: issues and perspective

Electronic ID at work: issues and perspective Electronic ID at work: issues and perspective Antonio Lioy < lioy @ polito.it > Politecnico di Torino Dip. Automatica e Informatica Why should I have/use an (e-) ID? to prove my identity to an "authority":

More information

Web Based Single Sign-On and Access Control

Web Based Single Sign-On and Access Control 0-- Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking

More information

Introducing Shibboleth. Sebastian Rieger

Introducing Shibboleth. Sebastian Rieger Introducing Shibboleth Sebastian Rieger sebastian.rieger@gwdg.de Gesellschaft für wissenschaftliche Datenverarbeitung mbh Göttingen, Germany CLARIN AAI Hands On Workshop, 25.02.2009, Oxford eresearch Center

More information

Warm Up to Identity Protocol Soup

Warm Up to Identity Protocol Soup Warm Up to Identity Protocol Soup David Waite Principal Technical Architect 1 Topics What is Digital Identity? What are the different technologies? How are they useful? Where is this space going? 2 Digital

More information

Identity management. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014

Identity management. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014 Identity management Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 Outline 1. Single sign-on 2. SAML and Shibboleth 3. OpenId 4. OAuth 5. (Corporate IAM) 6. Strong identity 2

More information

Network Security. Chapter 10. XML and Web Services. Part II: II: Securing Web Services Part III: Identity Federation

Network Security. Chapter 10. XML and Web Services. Part II: II: Securing Web Services Part III: Identity Federation Network Architectures and Services, Georg Carle Faculty of Informatics Technische Universität München, Germany Network Security Chapter 10 Application Layer Security: Web Services (Part 2) Part I: Introduction

More information

eidas-node Error Codes

eidas-node Error Codes eidas-node Error Codes Version 2.0 Copyright European Commission DIGIT Unit B1 Document history Version Date Modification reason Modified by Origination 08/06/2017 Extracted from the eidas-node Installation,

More information

eidas Interoperability Architecture Version November 2015

eidas Interoperability Architecture Version November 2015 eidas Interoperability Architecture Version 1.00 6. November 2015 1 Introduction This document specifies the interoperability components of the eidas-network, i.e. the components necessary to achieve interoperability

More information

eidas Regulation eid and assurance levels Outcome of eias study

eidas Regulation eid and assurance levels Outcome of eias study eidas Regulation eid and assurance levels Outcome of eias study Dr. Marijke De Soete Security4Biz (Belgium) ETSI eidas Workshop 24 June 2015 Sophia Antipolis eidas Regulation Regulation on electronic identification

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Best Practices: Authentication & Authorization Infrastructure. Massimo Benini HPCAC - April,

Best Practices: Authentication & Authorization Infrastructure. Massimo Benini HPCAC - April, Best Practices: Authentication & Authorization Infrastructure Massimo Benini HPCAC - April, 03 2019 Agenda - Common Vocabulary - Keycloak Overview - OAUTH2 and OIDC - Microservices Auth/Authz techniques

More information

U.S. E-Authentication Interoperability Lab Engineer

U.S. E-Authentication Interoperability Lab Engineer Using Digital Certificates to Establish Federated Trust chris.brown@enspier.com U.S. E-Authentication Interoperability Lab Engineer Agenda U.S. Federal E-Authentication Background Current State of PKI

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications

More information

Lesson 13 Securing Web Services (WS-Security, SAML)

Lesson 13 Securing Web Services (WS-Security, SAML) Lesson 13 Securing Web Services (WS-Security, SAML) Service Oriented Architectures Module 2 - WS Security Unit 1 Auxiliary Protocols Ernesto Damiani Università di Milano element This element

More information

Access Control Service Oriented Architecture

Access Control Service Oriented Architecture http://www.cse.wustl.edu/~jain/cse571-09/ftp/soa/index.html 1 of 13 Access Control Service Oriented Architecture Security Yoon Jae Kim, yj1dreamer AT gmail.com (A project report written under the guidance

More information

Kerberos SAML Profiles

Kerberos SAML Profiles 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Kerberos SAML Profiles Working Draft 03, 10 th February 2004 Document identifier: draft-sstc-solution-profile-kerberos-03

More information

Security analysis of OpenID, followed by a reference implementation of an npabased OpenID provider

Security analysis of OpenID, followed by a reference implementation of an npabased OpenID provider Security analysis of OpenID, followed by a reference implementation of an npabased OpenID provider Sebastian Feld, Norbert Pohlmann Institute for Internet-Security, if(is) Gelsenkirchen University of Applied

More information

Implement SAML 2.0 SSO in WLS using IDM Federation Services

Implement SAML 2.0 SSO in WLS using IDM Federation Services Implement SAML 2.0 SSO in WLS using IDM Federation Services Who we are Experts At Your Service > Over 60 specialists in IT infrastructure > Certified, experienced, passionate Based In Switzerland > 100%

More information

Session 2.1: Federations: Foundation. Scott Koranda Support provided by the National Institute of Allergy and Infectious Diseases

Session 2.1: Federations: Foundation. Scott Koranda Support provided by the National Institute of Allergy and Infectious Diseases Session 2.1: Federations: Foundation Scott Koranda Support provided by the National Institute of Allergy and Infectious Diseases Scott Koranda's participation has been funded in whole or in part with federal

More information

Technical Overview. Version March 2018 Author: Vittorio Bertola

Technical Overview. Version March 2018 Author: Vittorio Bertola Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which

More information

SAT for eid [EIRA extension]

SAT for eid [EIRA extension] SAT for eid [EIRA extension] eid Solution Architecture Template (SAT) v1.0.0 ISA² Action 2.1 - European Interoperability Architecture Page 1 of 1 Change control Modification Details Version 1.0.0 Migration

More information

OPENID CONNECT 101 WHITE PAPER

OPENID CONNECT 101 WHITE PAPER OPENID CONNECT 101 TABLE OF CONTENTS 03 04 EXECUTIVE OVERVIEW WHAT IS OPENID CONNECT? Connect Terminology Relationship to OAuth 08 Relationship to SAML CONNECT IN MORE DETAIL Trust Model Discovery Dynamic

More information

Federated Authentication with Web Services Clients

Federated Authentication with Web Services Clients Federated Authentication with Web Services Clients in the context of SAML based AAI federations Thomas Lenggenhager thomas.lenggenhager@switch.ch Mannheim, 8. March 2011 Overview SAML n-tier Delegation

More information

Security Assertions Markup Language (SAML)

Security Assertions Markup Language (SAML) Security Assertions Markup Language (SAML) The standard XML framework for secure information exchange Netegrity White Paper PUBLISHED: MAY 20, 2001 Copyright 2001 Netegrity, Inc. All Rights Reserved. Netegrity

More information

Security Assertion Markup Language (SAML) applied to AppGate XDP

Security Assertion Markup Language (SAML) applied to AppGate XDP 1 Security Assertion Markup Language (SAML) applied to AppGate XDP Jamie Bodley-Scott AppGate Product Manager May 2016 version2 This document provides background on SAML for those of you who have not used

More information

National Identity Exchange Federation. Web Services System- to- System Profile. Version 1.1

National Identity Exchange Federation. Web Services System- to- System Profile. Version 1.1 National Identity Exchange Federation Web Services System- to- System Profile Version 1.1 July 24, 2015 Table of Contents TABLE OF CONTENTS I 1. TARGET AUDIENCE AND PURPOSE 1 2. NIEF IDENTITY TRUST FRAMEWORK

More information

Identity Provider for SAP Single Sign-On and SAP Identity Management

Identity Provider for SAP Single Sign-On and SAP Identity Management Implementation Guide Document Version: 1.0 2017-05-15 PUBLIC Identity Provider for SAP Single Sign-On and SAP Identity Management Content 1....4 1.1 What is SAML 2.0.... 5 SSO with SAML 2.0.... 6 SLO with

More information

Technical Guideline TR eid-server Part 3: eidas-middleware-service for eidas-token

Technical Guideline TR eid-server Part 3: eidas-middleware-service for eidas-token Technical Guideline TR-03130-3 eid-server Part 3: eidas-middleware-service for eidas-token Version 1.0 5. May 2017 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899

More information

WEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices

WEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices WEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices Chris Steel, Ramesh Nagappan, Ray Lai www.coresecuritypatterns.com February 16, 2005 15:25 16:35

More information

Single Sign-On User Guide. Cvent, Inc 1765 Greensboro Station Place McLean, VA

Single Sign-On User Guide. Cvent, Inc 1765 Greensboro Station Place McLean, VA Single Sign-On User Guide 2018 Cvent, Inc 1765 Greensboro Station Place McLean, VA 22102 www.cvent.com Contents Single Sign-On User Guide... 3 Key Terms... 3 Features Using SSO to Login... 4 Meeting Planners

More information

The EGI AAI CheckIn Service

The EGI AAI CheckIn Service The EGI AAI CheckIn Service Kostas Koumantaros- GRNET On behalf of EGI-Engage JRA1.1 www.egi.eu EGI-Engage is co-funded by the Horizon 2020 Framework Programme of the European Union under grant number

More information

Security Analysis of eidas The Cross-Country Authentication Scheme in Europe

Security Analysis of eidas The Cross-Country Authentication Scheme in Europe Security Analysis of eidas The Cross-Country Authentication Scheme in Europe Nils Engelbertz, Nurullah Erinola, David Herring, Juraj Somorovsky, Vladislav Mladenov, Jörg Schwenk Ruhr University Bochum

More information

Identity management. Tuomas Aura T Information security technology. Aalto University, autumn 2011

Identity management. Tuomas Aura T Information security technology. Aalto University, autumn 2011 Identity management Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 Outline 1. Single sign-on 2. OpenId 3. SAML and Shibboleth 4. Corporate IAM 5. Strong identity 2

More information

Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation

Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation Enhancing cloud applications by using external authentication services After you complete this section, you should understand: Terminology such as authentication, identity, and ID token The benefits of

More information

THE ESSENTIAL OAUTH PRIMER: UNDERSTANDING OAUTH FOR SECURING CLOUD APIS

THE ESSENTIAL OAUTH PRIMER: UNDERSTANDING OAUTH FOR SECURING CLOUD APIS THE ESSENTIAL OAUTH PRIMER: UNDERSTANDING OAUTH FOR SECURING CLOUD APIS TABLE OF CONTENTS 03 03 05 06 07 07 09 11 EXECUTIVE OVERVIEW MOTIVATING USE CASE: TRIPIT TERMINOLOGY INTRODUCTION THE OAUTH 2.0 MODEL

More information

RealMe. SAML v2.0 Messaging Introduction. Richard Bergquist Datacom Systems (Wellington) Ltd. Date: 15 November 2012

RealMe. SAML v2.0 Messaging Introduction. Richard Bergquist Datacom Systems (Wellington) Ltd. Date: 15 November 2012 RealMe Version: Author: 1.0 APPROVED Richard Bergquist Datacom Systems (Wellington) Ltd Date: 15 November 2012 CROWN COPYRIGHT This work is licensed under the Creative Commons Attribution 3.0 New Zealand

More information

eidas SAML Attribute Profile

eidas SAML Attribute Profile eidas SAML Attribute Profile eidas Technical Sub-group, 28 October 2016 Document identifier: eidas/profiles/saml/attributes Abstract: This specification defines the SAML attributes to be used for the assertion

More information

Advanced Configuration for SAML Authentication

Advanced Configuration for SAML Authentication The advanced configuration for SAML authentication includes: Configuring Multiple Identity Providers Multiple Identity Providers can be configured to a SAML authentication service on the Barracuda Web

More information

Oracle Utilities Opower Energy Efficiency Web Portal - Classic Single Sign-On

Oracle Utilities Opower Energy Efficiency Web Portal - Classic Single Sign-On Oracle Utilities Opower Energy Efficiency Web Portal - Classic Single Sign-On Configuration Guide E84772-01 Last Update: Monday, October 09, 2017 Oracle Utilities Opower Energy Efficiency Web Portal -

More information

Registry for identifiers assigned by the Swedish e-identification board

Registry for identifiers assigned by the Swedish e-identification board Registry for identifiers assigned by the Swedish e-identification board Version 1.5-2018-06-19 ELN-0603-v1.5 Table of Contents 1. Background 2. Structure 2.1. URI Identifiers 2.2. OID Identifiers 3. Assigned

More information

Oracle Utilities Opower Solution Extension Partner SSO

Oracle Utilities Opower Solution Extension Partner SSO Oracle Utilities Opower Solution Extension Partner SSO Integration Guide E84763-01 Last Updated: Friday, January 05, 2018 Oracle Utilities Opower Solution Extension Partner SSO Integration Guide Copyright

More information

Configure ISE 2.3 Guest Portal with OKTA SAML SSO

Configure ISE 2.3 Guest Portal with OKTA SAML SSO Configure ISE 2.3 Guest Portal with OKTA SAML SSO Contents Introduction Prerequisites Requirements Components Used Background Information Federated SSO Network Flow Configure Step 1. Configure SAML Identity

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

OIO Bootstrap Token Profile

OIO Bootstrap Token Profile > OIO Bootstrap Token Profile Version 1.0.1 IT- & Telestyrelsen March 2010 2 Content [ Document History 4 Introduction 5 Characteristics of bootstrap tokens 5 Related profiles 6 Assumptions 6 Token Requirements

More information

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Leave Policy. SAML Support for PPO

Leave Policy. SAML Support for PPO Leave Policy SAML Support for PPO January 2015 Table of Contents Why SAML Support for PPO... 3 Introduction to SAML... 3 PPO Implementation... 6 ComponentSpace SAML v2.0 for.net... 6 SAML Security mode...

More information

Last Class. A Question. Federated Identity. ID Avalanche. Problem in general SPKI/SDSI. Lecture 6 : Digital Identity Federation and Privacy Management

Last Class. A Question. Federated Identity. ID Avalanche. Problem in general SPKI/SDSI. Lecture 6 : Digital Identity Federation and Privacy Management CS489/589: Access Control & System Security Lecture 6 : Digital Identity Federation and Privacy Management Last Class SPKI/SDSI Simplified approach to using PK based services Hierarchical CA Decentralized

More information

Inland Revenue. Build Pack. Identity and Access Services. Date: 04/09/2017 Version: 1.5 IN CONFIDENCE

Inland Revenue. Build Pack. Identity and Access Services. Date: 04/09/2017 Version: 1.5 IN CONFIDENCE Inland Revenue Build Pack Identity and Access Services Date: 04/09/2017 Version: 1.5 IN CONFIDENCE About this Document This document is intended to provide Service Providers with the technical detail required

More information

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University Identity Management and Federated ID (Liberty Alliance) ISA 767, Secure Electronic Commerce Xinwen Zhang, xzhang6@gmu.edu George Mason University Identity Identity is the fundamental concept of uniquely

More information

Nordea e-identification Service description

Nordea e-identification Service description Nordea e-identification Service description October 2018 1 Change log Version Description/ Changes 1.0 Initial version 1.1 Minor updates to examples & service hours October 2018 2 Contents Change log...

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!  We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 000-575 Title : IBM Tivoli Federated Identity Manager V6.2.2 Implementation

More information

Authentication in the Cloud. Stefan Seelmann

Authentication in the Cloud. Stefan Seelmann Authentication in the Cloud Stefan Seelmann Agenda Use Cases View Points Existing Solutions Upcoming Solutions Use Cases End user needs login to a site or service End user wants to share access to resources

More information

Authorization Survey Results & Use Cases Presentation to Concordia Working Group

Authorization Survey Results & Use Cases Presentation to Concordia Working Group Authorization Survey Results & Use Cases Presentation to Concordia Working Group Identity and Authorization Services Working Group (IAS-WG) John Tolbert (Boeing) Gavin Illingworth (BMO Financial Group)

More information

SELF SERVICE INTERFACE CODE OF CONNECTION

SELF SERVICE INTERFACE CODE OF CONNECTION SELF SERVICE INTERFACE CODE OF CONNECTION Definitions SSI Administration User Identity Management System Identity Provider Service Policy Enforcement Point (or PEP) SAML Security Patch Smart Card Token

More information

EGI AAI Platform Architecture and Roadmap

EGI AAI Platform Architecture and Roadmap EGI AAI Platform Architecture and Roadmap Christos Kanellopoulos - GRNET Nicolas Liampotis - GRNET On behalf of EGI-Engage JRA1.1 www.egi.eu EGI-Engage is co-funded by the Horizon 2020 Framework Programme

More information

4.2. Authenticating to REST Services. Q u i c k R e f e r e n c e G u i d e. 1. IdentityX 4.2 Updates

4.2. Authenticating to REST Services. Q u i c k R e f e r e n c e G u i d e. 1. IdentityX 4.2 Updates 4.2 Authenticating to REST Services Q u i c k R e f e r e n c e G u i d e In IdentityX 4.1, REST services have an authentication and signing requirement that is handled by the IdentityX REST SDKs. In order

More information

IBM Exam C IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version: 6.0 [ Total Questions: 134 ]

IBM Exam C IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version: 6.0 [ Total Questions: 134 ] s@lm@n IBM Exam C2150-575 IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version: 6.0 [ Total Questions: 134 ] IBM C2150-575 : Practice Test Question No : 1 What is the default file name of

More information

Enterprise SOA Experience Workshop. Module 8: Operating an enterprise SOA Landscape

Enterprise SOA Experience Workshop. Module 8: Operating an enterprise SOA Landscape Enterprise SOA Experience Workshop Module 8: Operating an enterprise SOA Landscape Agenda 1. Authentication and Authorization 2. Web Services and Security 3. Web Services and Change Management 4. Summary

More information

Attribute Profile. Trusted Digital Identity Framework August 2018, version 1.0

Attribute Profile. Trusted Digital Identity Framework August 2018, version 1.0 Attribute Profile Trusted Digital Identity Framework August 2018, version 1.0 Digital Transformation Agency This work is copyright. Apart from any use as permitted under the Copyright Act 1968 and the

More information

ENHANCING CROSS-BORDER EID FEDERATIONS BY USING A MODULAR AND FLEXIBLE ATTRIBUTE MAPPING SERVICE TO MEET NATIONAL LEGAL AND TECHNICAL REQUIREMENTS

ENHANCING CROSS-BORDER EID FEDERATIONS BY USING A MODULAR AND FLEXIBLE ATTRIBUTE MAPPING SERVICE TO MEET NATIONAL LEGAL AND TECHNICAL REQUIREMENTS Vol. 13, No. 2, pp. 52-68 ISSN: 1645-7641 ENHANCING CROSS-BORDER EID FEDERATIONS BY USING A MODULAR AND FLEXIBLE ATTRIBUTE MAPPING SERVICE TO MEET NATIONAL LEGAL AND TECHNICAL Thomas Lenz. E-Government

More information

Major SAML 2.0 Changes. Nate Klingenstein Internet2 EuroCAMP 2007 Helsinki April 17, 2007

Major SAML 2.0 Changes. Nate Klingenstein Internet2 EuroCAMP 2007 Helsinki April 17, 2007 Major SAML 2.0 Changes Nate Klingenstein Internet2 EuroCAMP 2007 Helsinki April 17, 2007 Tokens, Protocols, Bindings, and Profiles Tokens are requests and assertions Protocols bindings are communication

More information

Single Sign-On for PCF. User's Guide

Single Sign-On for PCF. User's Guide Single Sign-On for PCF Version 1.2 User's Guide 2018 Pivotal Software, Inc. Table of Contents Table of Contents Single Sign-On Overview Installation Getting Started with Single Sign-On Manage Service Plans

More information

API Gateway. Version 7.5.1

API Gateway. Version 7.5.1 O A U T H U S E R G U I D E API Gateway Version 7.5.1 15 September 2017 Copyright 2017 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.5.1 No part

More information

Authentication. Katarina

Authentication. Katarina Authentication Katarina Valalikova @KValalikova k.valalikova@evolveum.com 1 Agenda History Multi-factor, adaptive authentication SSO, SAML, OAuth, OpenID Connect Federation 2 Who am I? Ing. Katarina Valaliková

More information

Qualys SAML & Microsoft Active Directory Federation Services Integration

Qualys SAML & Microsoft Active Directory Federation Services Integration Qualys SAML & Microsoft Active Directory Federation Services Integration Microsoft Active Directory Federation Services (ADFS) is currently supported for authentication. The Qualys ADFS integration must

More information

Federal Identity, Credentialing, and Access Management. OpenID 2.0 Profile. Version Release Candidate

Federal Identity, Credentialing, and Access Management. OpenID 2.0 Profile. Version Release Candidate Federal Identity, Credentialing, and Access Management OpenID 2.0 Profile Version 1.0.1 Release Candidate November 18, 2009 Document History Status Release Date Comment Audience Release Candidate Release

More information

Trust Services for Electronic Transactions

Trust Services for Electronic Transactions Trust Services for Electronic Transactions ROUMEN TRIFONOV Faculty of Computer Systems and Control Technical University of Sofia 8 st. Kliment Ohridski bul., 1000 Sofia BULGARIA r_trifonov@tu-sofia.bg

More information

[GSoC Proposal] Securing Airavata API

[GSoC Proposal] Securing Airavata API [GSoC Proposal] Securing Airavata API TITLE: Securing AIRAVATA API ABSTRACT: The goal of this project is to design and implement the solution for securing AIRAVATA API. Particularly, this includes authenticating

More information

DocuSign Single Sign On Implementation Guide Published: June 8, 2016

DocuSign Single Sign On Implementation Guide Published: June 8, 2016 DocuSign Single Sign On Implementation Guide Published: June 8, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents

More information

Interagency Advisory Board Meeting Agenda, August 25, 2009

Interagency Advisory Board Meeting Agenda, August 25, 2009 Interagency Advisory Board Meeting Agenda, August 25, 2009 1. Opening Remarks 2. Policy, process, regulations, technology, and infrastructure to employ HSPD-12 in USDA (Owen Unangst, USDA) 3. Policy and

More information

Enterprise Adoption Best Practices

Enterprise Adoption Best Practices Enterprise Adoption Best Practices Integrating FIDO & Federation Protocols December 2017 Copyright 2013-2017 FIDO Alliance All Rights Reserved. Audience This white paper is aimed at enterprises deploying

More information

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) Version 1.0 Author: Bharadwaj Pulugundla (Verizon) 25.10.2015 Table of content 1. Introduction... 3

More information

Authorization Aspects of the Distributed Dataflow-oriented IoT Framework Calvin

Authorization Aspects of the Distributed Dataflow-oriented IoT Framework Calvin Master s Thesis Authorization Aspects of the Distributed Dataflow-oriented IoT Framework Calvin Tomas Nilsson Department of Electrical and Information Technology, Faculty of Engineering, LTH, Lund University,

More information

CA SiteMinder Federation

CA SiteMinder Federation CA SiteMinder Federation Partnership Federation Guide 12.52 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

TECHNICAL GUIDE SSO SAML. At 360Learning, we don t make promises about technical solutions, we make commitments.

TECHNICAL GUIDE SSO SAML. At 360Learning, we don t make promises about technical solutions, we make commitments. TECHNICAL GUIDE SSO SAML At 360Learning, we don t make promises about technical solutions, we make commitments. This technical guide is part of our Technical Documentation. 2 360Learning is a Leading European

More information

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018 Distributed Systems 25. Authentication Paul Krzyzanowski Rutgers University Fall 2018 2018 Paul Krzyzanowski 1 Authentication For a user (or process): Establish & verify identity Then decide whether to

More information

ComponentSpace SAML v2.0 Developer Guide

ComponentSpace SAML v2.0 Developer Guide ComponentSpace SAML v2.0 Developer Guide Copyright ComponentSpace Pty Ltd 2017-2018. All rights reserved. www.componentspace.com Contents Introduction... 1 Visual Studio and.net Core Support... 1 Application

More information

BIG-IP Access Policy Manager : Authentication and Single Sign-On. Version 13.1

BIG-IP Access Policy Manager : Authentication and Single Sign-On. Version 13.1 BIG-IP Access Policy Manager : Authentication and Single Sign-On Version 13.1 Table of Contents Table of Contents Authentication Concepts... 15 About AAA server support... 15 About AAA high availability

More information

Securing APIs and Microservices with OAuth and OpenID Connect

Securing APIs and Microservices with OAuth and OpenID Connect Securing APIs and Microservices with OAuth and OpenID Connect By Travis Spencer, CEO @travisspencer, @curityio Organizers and founders ü All API Conferences ü API Community ü Active blogosphere 2018 Platform

More information

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Standardization of Entity Authentication Assurance 5th ETSI Security Workshop 20-2222 January 2010 ETSI, Sophia Antipolis, France Erika McCallister, Esq.,

More information

National Identity Exchange Federation. Terminology Reference. Version 1.0

National Identity Exchange Federation. Terminology Reference. Version 1.0 National Identity Exchange Federation Terminology Reference Version 1.0 August 18, 2014 Table of Contents 1. INTRODUCTION AND PURPOSE... 2 2. REFERENCES... 2 3. BASIC NIEF TERMS AND DEFINITIONS... 5 4.

More information

Dissecting NIST Digital Identity Guidelines

Dissecting NIST Digital Identity Guidelines Dissecting NIST 800-63 Digital Identity Guidelines KEY CONSIDERATIONS FOR SELECTING THE RIGHT MULTIFACTOR AUTHENTICATION Embracing Compliance More and more business is being conducted digitally whether

More information

Morningstar ByAllAccounts SAML Connectivity Guide

Morningstar ByAllAccounts SAML Connectivity Guide Morningstar ByAllAccounts SAML Connectivity Guide 2018 Morningstar. All Rights Reserved. AccountView Version: 1.55 Document Version: 1 Document Issue Date: May 25, 2018 Technical Support: (866) 856-4951

More information

Web Services Security: SAML Interop 1 Scenarios

Web Services Security: SAML Interop 1 Scenarios 1 2 3 4 Web Services Security: SAML Interop 1 Scenarios Working Draft 04, Jan 29, 2004 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Document identifier: Location: http://www.oasis-open.org/committees/wss/

More information

Webthority can provide single sign-on to web applications using one of the following authentication methods:

Webthority can provide single sign-on to web applications using one of the following authentication methods: Webthority HOW TO Configure Web Single Sign-On Webthority can provide single sign-on to web applications using one of the following authentication methods: HTTP authentication (for example Kerberos, NTLM,

More information

Tutorial: Building the Services Ecosystem

Tutorial: Building the Services Ecosystem Tutorial: Building the Services Ecosystem GlobusWorld 2018 Steve Tuecke tuecke@globus.org What is a services ecosystem? Anybody can build services with secure REST APIs App Globus Transfer Your Service

More information

CA SiteMinder. Federation in Your Enterprise 12.51

CA SiteMinder. Federation in Your Enterprise 12.51 CA SiteMinder Federation in Your Enterprise 12.51 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation ), is for

More information

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE Integrating VMware Workspace ONE with Okta VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this

More information

Authentication Context Extension

Authentication Context Extension Authentication Context Extension MAPPING CERTIFICATE IDENTITY TO A SAML AUTHENTICATED IDENTITY STEFAN SANTESSON Draft: Authentication Context Certificate Extension draft-santesson-auth-context-extension-04

More information

REFEDS Assurance Framework ver 1.0 (DRAFT 2 May 2018)

REFEDS Assurance Framework ver 1.0 (DRAFT 2 May 2018) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 REFEDS Assurance Framework ver 1.0 (DRAFT 2 May 2018) REFEDS Assurance working group Abstract The Relying Parties

More information

Attribute Specification for the Swedish eid Framework

Attribute Specification for the Swedish eid Framework Attribute Specification for the Swedish eid Framework Version 1.4-2017-03-28 ELN-0604-v1.4 Table of Contents 1. Introduction 1.1. Terminology 1.2. Requirement key words 1.3. Name space references 1.4.

More information

Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0

Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0 1 2 3 4 5 6 7 8 9 10 11 Test Plan for Liberty Alliance SAML Test Event Test Criteria SAML 2.0 Version 3.1 Editor: Kyle Meadors, Drummond Group Inc. Abstract: This document describes the test steps to achieve

More information

esignlive SAML Administrator's Guide Product Release: 6.5 Date: July 05, 2018 esignlive 8200 Decarie Blvd, Suite 300 Montreal, Quebec H4P 2P5

esignlive SAML Administrator's Guide Product Release: 6.5 Date: July 05, 2018 esignlive 8200 Decarie Blvd, Suite 300 Montreal, Quebec H4P 2P5 esignlive SAML Administrator's Guide Product Release: 6.5 Date: July 05, 2018 esignlive 8200 Decarie Blvd, Suite 300 Montreal, Quebec H4P 2P5 Phone: 1-855-MYESIGN Fax: (514) 337-5258 Web: www.esignlive.com

More information

Slack Connector. Version 2.0. User Guide

Slack Connector. Version 2.0. User Guide Slack Connector Version 2.0 User Guide 2015 Ping Identity Corporation. All rights reserved. PingFederate Slack Connector User Guide Version 2.0 December, 2015 Ping Identity Corporation 1001 17th Street,

More information

Security Assertions Markup Language

Security Assertions Markup Language . Send comments to: Phillip Hallam-Baker, Senior Author 401 Edgewater Place, Suite 280 Wakefield MA 01880 Tel 781 245 6996 x227 Email: pbaker@verisign.com Security Assertions Markup Language Straw-man

More information

CA SiteMinder Federation

CA SiteMinder Federation CA SiteMinder Federation Legacy Federation Guide 12.52 SP1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Five9 Plus Adapter for Agent Desktop Toolkit

Five9 Plus Adapter for Agent Desktop Toolkit Cloud Contact Center Software Five9 Plus Adapter for Agent Desktop Toolkit Administrator s Guide September 2017 The Five9 Plus Adapter for Agent Desktop Toolkit integrates the Five9 Cloud Contact Center

More information

Web Security Model and Applications

Web Security Model and Applications Web Security Model and Applications In this Tutorial Motivation: formal security analysis of web applications and standards Our Model of the Web Infrastructure Single Sign-On Case Studies Formal Security

More information

SWAMID Person-Proofed Multi-Factor Profile

SWAMID Person-Proofed Multi-Factor Profile Document SWAMID Person-Proofed Multi-Factor Profile Identifier http://www.swamid.se/policy/assurance/al2mfa Version V1.0 Last modified 2018-09-12 Pages 10 Status FINAL License Creative Commons BY-SA 3.0

More information

Joint Initiative on a PSD2 Compliant XS2A Interface NextGenPSD2 XS2A Framework Operational Rules

Joint Initiative on a PSD2 Compliant XS2A Interface NextGenPSD2 XS2A Framework Operational Rules Joint Initiative on a PSD2 Compliant XS2A Interface NextGenPSD2 XS2A Framework Operational Rules 02.10.2017 Notice This Specification has been prepared by the Participants of the Joint Initiative pan-european

More information