Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation

Similar documents
Configuration Guide - Single-Sign On for OneDesk

Trusted Login Connector (Hosted SSO)

penelope case management software AUTHENTICATION GUIDE v4.4 and higher

Access Management Handbook

Liferay Security Features Overview. How Liferay Approaches Security

Architecture Assessment Case Study. Single Sign on Approach Document PROBLEM: Technology for a Changing World

Best Practices: Authentication & Authorization Infrastructure. Massimo Benini HPCAC - April,

SAML-Based SSO Solution

RSA SecurID Ready Implementation Guide. Last Modified: December 13, 2013

ArcGIS Server and Portal for ArcGIS An Introduction to Security

Morningstar ByAllAccounts SAML Connectivity Guide

Authentication. Katarina

ForgeRock Access Management Core Concepts AM-400 Course Description. Revision B

Cloud Access Manager Configuration Guide

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK

SINGLE SIGN ON SOLUTIONS FOR ICS PRODUCTS

User Management. Juan J. Doval DEIMOS SPACE S.L.U. NextGEOSS, September 25 th 2017

Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...

TECHNICAL GUIDE SSO SAML. At 360Learning, we don t make promises about technical solutions, we make commitments.

Five9 Plus Adapter for Agent Desktop Toolkit

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith

Warm Up to Identity Protocol Soup

About This Document 3. Overview 3. System Requirements 3. Installation & Setup 4

Configuring Confluence

Eric Sachs Director of Product Management Identity, Google. Pam Dingle Senior Technical Architect Office of the CTO, Ping Identity

Connect-2-Everything SAML SSO (client documentation)

Introduction to application management

Identity management. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014

ForgeRock Access Management Customization and APIs

CONFIGURING AD FS AS A THIRD-PARTY IDP IN VMWARE IDENTITY MANAGER: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

WSO2 Identity Management

Salesforce External Identity Implementation Guide

Authentication & Authorization systems developed for CTA

Salesforce External Identity Implementation Guide

Qualys SAML 2.0 Single Sign-On (SSO) Technical Brief

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Pulse Connect Secure 8.x

NETOP PORTAL ADFS & AZURE AD INTEGRATION

TECHNICAL GUIDE SSO SAML Azure AD

Administering Jive Mobile Apps for ios and Android

Microsoft ADFS Configuration

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Better MDM

User Directories. Overview, Pros and Cons

SAML-Based SSO Solution

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Citrix NetScaler Gateway 12.0

OPENID CONNECT 101 WHITE PAPER

openid connect all the things

SSO Integration Overview

Authentication in the Cloud. Stefan Seelmann

How to Use ADFS to Implement Single Sign-On for an ASP.NET MVC Application

Qualys SAML & Microsoft Active Directory Federation Services Integration

Integration of the platform. Technical specifications

13241 Woodland Park Road, Suite 400 Herndon, VA USA A U T H O R : E X O S T A R D ATE: M A R C H V E R S I O N : 3.

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate

Deploying OAuth with Cisco Collaboration Solution Release 12.0

ArcGIS Enterprise Security: An Introduction. Randall Williams Esri PSIRT

SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018

PowerExchange for Facebook: How to Configure Open Authentication using the OAuth Utility

Integrating YuJa Active Learning into Google Apps via SAML

esignlive SAML Administrator's Guide Product Release: 6.5 Date: July 05, 2018 esignlive 8200 Decarie Blvd, Suite 300 Montreal, Quebec H4P 2P5

SAP IoT Application Enablement Best Practices Authorization Guide

Single Sign-On for PCF. User's Guide

Integrating YuJa Active Learning into ADFS via SAML

Five9 Plus Adapter for Microsoft Dynamics CRM

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow)

Azure Active Directory from Zero to Hero

Authentication. August 17, 2018 Version 9.4. For the most recent version of this document, visit our documentation website.

Configuring Alfresco Cloud with ADFS 3.0

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. PingIdentity PingFederate 8

Google Identity Services for work

DDS Identity Federation Service

Access Manager Applications Configuration Guide. October 2016

Contents Introduction... 5 Configuring Single Sign-On... 7 Configuring Identity Federation Using SAML 2.0 Authentication... 29

Authentication Guide

Webthority can provide single sign-on to web applications using one of the following authentication methods:

THE ESSENTIAL OAUTH PRIMER: UNDERSTANDING OAUTH FOR SECURING CLOUD APIS

Box Connector. Version 2.0. User Guide

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University

Integrated Access Management Solutions. Access Televentures

Using Your Own Authentication System with ArcGIS Online. Cameron Kroeker and Gary Lee

Prof. Christos Xenakis

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Salesforce External Identity Implementation Guide

Secure Access Manager User Guide September 2017

Prof. Christos Xenakis

ADFS integration with Ibistic Commerce Platform A walkthrough of the feature and basic configuration

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

OneLogin SCIM. Table of Contents. Summary... 2 System Requirements... 2 Installation & Setup... 2 Contact Us... 6

All about SAML End-to-end Tableau and OKTA integration

SAP Security in a Hybrid World. Kiran Kola

VAM. CAS Installer (for 2FA) Value- Added Module (VAM) Deployment Guide

SOCIAL IDENTITIES IN HIGHER ED: WHY AND HOW WITH REAL-WORLD EXAMPLES

Identity Implementation Guide

IBM Exam C IBM Tivoli Federated Identity Manager V6.2.2 Implementation Version: 6.0 [ Total Questions: 134 ]

Okta Integration Guide for Web Access Management with F5 BIG-IP

CS November 2018

WWPass External Authentication Solution for IBM Security Access Manager 8.0

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

Identity Implementation Guide

Identity Implementation Guide

Transcription:

Enhancing cloud applications by using external authentication services

After you complete this section, you should understand: Terminology such as authentication, identity, and ID token The benefits of external authentication The logical flow for secure external authentication How to configure and use IBM Single Sign On service as a broker to authenticate with multiple identity source types 2

Handling user passwords how hard can it be? Managing credentials within your application is a bad idea! Storing passwords in a database poses security risks Extra work to get it right => writing code with no value add Burden of password management inside your application Ensuring passwords have appropriate quality and lifetimes Secure reset process => writing code with no value add Force users to remember(?) another set of credentials They don t! A compromise of your application could have far reaching consequences Can t integrate well with other applications and services You need a different way to authenticate users! 3

Terminology End-user: A person. Entity: Something with a distinct existence, such as an end-user. Identity: A set of attributes related to an entity. Authentication: A process used to obtain significant confidence to bind an entity to an identity. Authorization: A process where permission is granted for a request by an entity based on a role, policy, or specific grant. Identity provider: A service capable of authenticating an end-user and providing claims of identity to a client. Id token: A token that contains claims from an authentication event. Access token: Cryptographic data that confirms a link between entity and identity. Client or relying party: A consumer of identity provider authentications of an entity, such as a web application. Single sign on: Re-use of an authenticated identity from a provider across multiple applications without additional interaction by the end-user. Reference: OpenID Connect Specification: http://openid.net/specs/openid-connect-core-1_0.html

Benefits of external authentication Users don t need to manage another set of credentials Externalize password management including resets to another service Externalize password quality and policy management Eliminates need for the application to store passwords or hashed passwords Streamlines access to your application when the user is already authenticated by an identity provider Improves security by using an established trust relationship The user holds an established identity with the ID provider, usually confirmed by multiple-factor authentication or issued by his or her enterprise

Sources of external authentication services Identity and access management sources: Enterprise Directory (LDAP) Cloud-based identity providers Social media login services (OAuth, OAuth2, OpenID) By using an external authentication service, applications can also exploit complex authentication methods, including two-factor and biometric. On-premises directory As a service (IDaaS) Social media 6

External authentication high-level flow Generalized interaction diagram for external authentication: all flows use HTTPS Identity Provider (IdP): Facebook, Google, etc. End-user Web browser Relying party (RP) application User response Redirect to IdP (orig_url /protected + callback on RP) Challenge user Request /protected Check request for valid session access token 7

IBM Single Sign On service in Bluemix Configure and control external authentication for web applications Apps use OpenID Connect client to interact with the service Configuration examples for Java and Node.js Apps don t require knowledge of interface to external identity source SSO service control panel supports multiple identity sources o Social media sites (Facebook, Google, LinkedIn) o Cloud directory identity source o SAML enterprise identity source Identity Bridge appliance for LDAP SSO service user login panel uses templates for customization 8

Authentication flow of IBM Single Sign On Identity Providers Social IDs 4 Providerspecific 5 1 Application (Identity Consumer) 3 6 2 Liberty In-cloud directory LDAP 7 Declarative J2EE Security Built-in OpenID Connect support Configured automatically during application staging Onpremises directory SAML SSO service instance (authentication broker) OpenID Connect 1. The application checks for valid session from the user request. 2. If no valid session, the application contacts SSO using OpenID Connect. 3. SSO prompts the user to choose an identity provider, then forwards the request. 4. The identity provider presents the login page to the user. 5. The user authenticates with the provider. 6. The provider places identity claims in id token sent to SSO. 7. SSO returns identity claims including authentication realm and the access token to application. 9 Uses standard node OpenID Connect passport module Example integration code included in documentation

Configuring SSO: high-level steps 1. Add the Single Sign On service to the dashboard. 2. Select the identity source or sources to configure. 3. Configure the settings for identity source. 4. Bind the SSO service to the application and access the Integrate tab to download the Node.js module. 5. Add the integration code into the application. Implement an authentication callback. Node.js and Java samples are provided; others use an OpenID Connect client-compatible library. 6. Provide the callback URL and specify one or more configured identity sources by using the service Integrate tab. 7. Redeploy the application and access a protected URL. 10

Related links IBM Bluemix documentation: Getting started with Single Sign On https://www.ng.bluemix.net/docs/services/singlesignon/index.html OpenID Connect reference specification http://openid.net/specs/openid-connect-core-1_0.html 11