Title: Federated Identity with Ping Federate
1ASR Final Project
February 7th, 2007
Federated Identity withPing Federate
-------------------------------------------- Eunic
e Mondésir Pierre Weill-Tessier ------------------
--------------------------
Project Supervisor M. Maknavicius-Laurent ASR
Coordinator G. Bernard
2Agenda
- Introduction
- Federated Identity concepts
- Presentation of Ping Federate server
- Platform implementation
- Demonstrations
- Conclusion
3Introduction
4Federated Identity Concepts
5Federated Identity concepts
- Why Federated Identity?
- What is Federated Identity?
- Participants of Circle of Trust
- Single Sign On and Single Log Out
- SAML langage
61. Why federated identity?
Federated Identity Concepts
71. Why federated identity?
Federated Identity Concepts
- Multiple authentication parameters
- Heterogeneous authentification and access control
methods - No control on personal informations exhibition
- Need for easier and faster acces to services
82. What is federated identity?
Federated Identity Concepts
- Set of agreements, standards and technologies
- Trust relationships between organizations
- Integrity and privacy perserved
- Independance of organizations
93. Circle of Trust (CoT) participants
Federated Identity Concepts
- Service Provider (SP)
- Provides one or more services within a federation
- Access control policy
- Identity Provider (IdP)
- Creates, maintains, manages identity information
- user must authenticate at an IdP recognized by a
SP
103. Circle of Trust (CoT) participants
Federated Identity Concepts
CoT
- Circle of trust
- Federation of IdP and SP
- Business relationships
- Operational agreements
- Secured communication channels
- Seamless environment
SP
SP
SP
IdP
SP
SP
SP
114.SSO and SLO
Federated Identity Concepts
- Liberty alliance
- Single Sign On (SSO)
- Sign on once at a site (single account)
- Seamless signed-on for other sites
- No extra authentication
- SP both within and across circles of trusts
- Single Log Out (SLO)
- Synchronized session logout
- All sessions authenticated by an IdP closed
125. SAML (Security Assertion Markup Langage)
Federated Identity Concepts
- XML standard developped by OASIS
- Exchanging authentication authorization data
between security domains (IdP and SP) - SSO solution beyond the intranet
- Exchange of assertions between IdP and SP
13Presentation of Ping Federate
14Presentation of Ping Federate server
- How does Ping Federate work ?
- Communication tools of Ping Federate
151. How does Ping Federate work ?
Presentation of Ping Federate server
- Server that passes identities between CoTs
- Distinction between two roles IdP and SP
- Both roles can be combined
- Ping Federate does not interfere with local usage
of the application
162. Communication tools in PF server
Presentation of Ping Federate server
- different environments how communicate?
- Ping Federate provides Integration Toolkits
17Plateform Implementation
18Platform Implementation
- Needs
- LDAP
- Postfix
- Tomcat
- Ping Federate server
191. Needs
Platform Implementation
- Applications often interacts with a database for
authentication - Ping Federate server asks for parameters of a
mail server to send notification mail - Ping Federates sample application runs on Tomcat
Application Server
202. LDAP
Platform Implementation
- Why this protocol ?
- LDAP adapter proposed by PF
- Authentication to IdPs via pop-up window
- Our configuration
- Server OpenLDAP
- Client LDAPBrowser to check our entries
- Simple tree root inetOrgPerson class instances
212. LDAP
Platform Implementation
dn oINT,cFR dn cnEunice, oINT, cFR dn
cnPierre, oINT, cFR
- Attributes we used
- cn, sn
- mail, userPassword
- title
223. Postfix
Platform Implementation
- Why ?
- mail server working on Linux O.S
- Lighter configuration than Sendmail
- No database associated only one user !
- liberty_at_cubitus.int-evry.fr
- IdpAdmin_at_cubitus.int-evry.fr is a fake address
used for the notification only. - IMAP server as a MDA
-
234. Tomcat
Platform Implementation
- Why ?
- Required applications server to test the samples
- Multi-technologies support server (jsp, html)
- Identification tools
- Double authentication based on Role and Login
- Default configuration
- LDAP-using configuration ? JNDI
-
244. Tomcat
Platform Implementation
- Key configuration files
- server.xml defines the database connection
- web.xml defines the security constraint
-
255. Ping Federate
Platform Implementation
- Standalone web administration
- https//cubitus.int-evry.fr9999/pingfederate/app
- Support of multi-account administration
- Modifiable role selection (IdP, SP or both)
- Ease of management
- Server configuration
- Partner configuration
-
265. Ping Federate
Platform Implementation
- Server settings
- Local settings
- Base URL where reaching the server ?
- Federation Info choice of technologies
- Entity ID / realm outside Ping Federate alias
- IdP/SP events systematic redirections
-
275. Ping Federate
Platform Implementation
- Server settings
- Local settings
- IdP/SP adapters management
- Data Store management
- Metadata export
-
285. Ping Federate
Platform Implementation
- Partner settings connections
- IdP connections we are SP
- SP connections we are IdP
- SP affiliations 2 partners Federation
? According to partners configuration Each
CoT defines its policy independently
29Demonstrations
30Test Platform implementation
- Before Ping Federate servers
- Simplification
- Ping Federate servers setting-up
- IdP initiated SSO with ITAM
- SP initiated SSO with ITAM
- SP initiated SSO with LDAP adapter
311. Before Ping Federate servers
Connection to INT services within INT
321. Before Ping Federate servers
Connection to INT services from outside INT
331. Before Ping Federate servers
Connection to ITAM services within INT or from
outside INT not possible
342. Simplification
- All aplications hosted by tomcat server
- Authentcation files serving as database
353. PF servers setting up
- For INT CoT only one PF server (IdP and SP
server) - For ITAM CoT two PF servers, one IdP and one SP
364. IdP initiated SSO with ITAM
Sarah connected to S1 without having passed by
ITAM IdM
375. SP initiated SSO with ITAM
386. SP initiated SSO with LDAP adapter
LDAP adapter
standard adapter
INT IdP interaction with LDAP directory via a
pop-up window
39Conclusion
40Conclusion
- What remains to do ?
- Adapt INTest with Ping Federate (Token)
- Test Multi-partners federation
- Perform tests on security and privacy
- Other solutions ?
- Microsoft CardSpace (.NET)
- WS-Federation
- Servers (Sun One Identity Server, IBM Tivoli,
Microsoft ADFS)
41Thanks for your attention Questions ?