eID federations
David Simonsen APAN 29, February 10th 2010, Sydney
eID federations APAN 29, February 10th 2010, Sydney David Simonsen - - PowerPoint PPT Presentation
eID federations APAN 29, February 10th 2010, Sydney David Simonsen Today's menu eID federations introduction & overview About WAYF, the Danish eID federation (funding organisation, staff etc.) Federation
eID federations
David Simonsen APAN 29, February 10th 2010, Sydney
Today's menu
Introduction & overview
What's the problem?
What's the problem?
What's the problem?
What's the problem?
What's the problem?
What's the problem?
What's the problem?
What's the problem?
What's the problem?
What's the problem?
What's the problem?
If it doesn't simplify life, don't use it
What is a federation?
A circle of trust regarding user information
Who's in here ?
Who's in here ?
Services Institutions Users WAYF's legal stuff Browsers User info
Basic concept
X
WAYF
1
LOGIN3 1
Authorization
Basic concept
X
WAYF
1
LOGIN3 1
Basic concept
X
WAYF
1
LOGIN 3 1Basic concept
Service X in Australia
X
WAYF
1
LOGIN 3 1Basic concept
Service X in Australia Institution 1 in Denmark
X
WAYF
1
LOGIN 3 1What stays the same?
What stays the same?
What stays the same?
Growing federations
About WAYF
Sectors connected
~ 900.000 eID's
Sectors connected
~ 900.000 eID's
Sectors connected
~ 900.000 eID's
Sectors connected
~ 900.000 eID's
Sectors connected
~ 900.000 eID's
Sectors connected
~ 900.000 eID's
Sectors connected
~ 900.000 eID's
Sectors connected
~ 900.000 eID's
Federation architectures
Shibboleth
X Y
WAYF WAYF
2
login
1
login
Services Institutions
WAYF
FEIDE, Norway
WAYF
X
Services
Y
Institutions
2 1
loginDenmark, Holland, Spain ...
WAYF
X
Services
Y
Institutions
2
login1
loginDenmark, Holland, Spain ...
WAYF
X
Services
Y
Institutions
2
login1
loginIdP-list at service: SAML2-scoping
SSL tunnels, data encryption possible
WAYF
3 4 IDP LOGINService Institution
SP 1 2 1 - AuthN. req. Encrypted (SSL), signed 2 - Encrypted (SSL), signed 3 - Encrypted (SSL), not signed (yet) 4 - Encrypted (SSL), signedTrusted Third Party == 'man in the middle' (with Alzheimer)
X WAYFEase of connecting
Single point of contact
WAYF
X
Services
Y
Institutions
2
login1
loginSingle point of contact
WAYF
X
Services
Y
Institutions
2
login1
loginSingle point of contact
WAYF
X
Services
Y
Institutions
2
login1
loginNo metadata management
Shibboleth
X Y
WAYF WAYF
2
login
1
login
Services Institutions
WAYF
Shibboleth
X Y
WAYF WAYF
2
login
1
login
Services Institutions
WAYF
Metadata management
Attribute release policies
Differentiated ARP's
X Y
WAYF WAYF
2
login
1
login
Services Institutions
WAYF
Differentiated ARP's
X Y
WAYF WAYF
2
login
1
login
Services Institutions
WAYF
Reduced negotiation power
Single attribute release policy
Single attribute release policy
One Attribute Release Policy per service
WAYF
X
Services
Y
Institutions
2
login1
loginBranding
Institutional branding
Institutional branding
Institutional branding
Institutional branding
Institutional branding
WAYF
X
Services
Y
Institutions
2
login1
login WAYF XServices
YInstitutions
2 1
loginExtending single-sing-on
WAYF
X
Services
Y
Institutions
2
login1
loginExtending single-sing-on
WAYF
X
Services
Y
Institutions
2
login1
loginExtending single-sing-on
WAYF
X
Services
Y
Institutions
2
login1
loginExtending single-sing-on
WAYF
X
Services
Y
Institutions
2
login1
loginExtending single-sing-on
HEIMAT - transparent login to federation from local SSO
The LMS as dashboard
also external services, via federated access
The LMS as dashboard
also external services, via federated access
Citizens' login service
Citizens' login
DK bank login Citizens' login service
Commercial services Public/gov services
Citizens' login
DK bank login Citizens' login service
Commercial services Public/gov services
External (strong) authentication
WAYF
X
Services
Y
Institutions
2
login1
loginExternal (strong) authentication
WAYF
X
Services
Y
Institutions
2
login1
loginExternal (strong) authentication
WAYF
X
Services
Y
Institutions
2
login1
loginExternal (strong) authentication
WAYF
X
Services
Y
Institutions
2
login1
loginEnrolment of students Password reset self service Expensive services ...
Level of Assurance
Strength of authentication
Shibboleth
X Y
WAYF WAYF
2
login
1
login
Services Institutions
WAYF
SAML1.1 SAML 2 Shib 1.2 Shib 1.3 Shib 2
Protocol translation
WAYF
X
Services
Y
Institutions
2 1
SAML2 Shib 1.3 SAML2 CASProtocol translation
WAYF
X
Services
Y
Institutions
2 1
SAML2 Shib 1.3 SAML2 CASs i m p l e S A M L p h p i n s i d e
http://rnd.feide.no/simplesamlphp
Multi-protocol support
SAML 2.0 as Service Provider
SAML2 profiles
SAML2 profiles
SAML2 profiles
http://saml2int.org/
Attributes
$
Attribute release profiles
Set or calculated attributes
Set or calculated attributes
Services
YInstitutions
2 login 1 loginSet or calculated attributes
Services
YInstitutions
2 login 1 loginSet or calculated attributes
Services
YInstitutions
2 login 1 loginSchacHomeOrg
SchacHomeOrg
WAYF
X
Services
Y
Institutions
2
login1
loginInst2.dk
Targeted ID's
Targeted ID's
Targeted ID's
Targeted ID's
WAYF
Result
X Y
1
p7Herw39Jkybg& a97kll32JHJJH2 AttributtesFormula Userdata
Shibboleth, TargetedID
X Y
WAYF WAYF
2
login
1
login
Services Institutions
WAYF
Shibboleth, TargetedID
X Y
WAYF WAYF
2
login
1
login
Services Institutions
WAYF
Attribute aggregation
SP Virtual IdP / attribut collector for CPH Uni IdP 1 CPH Uni WAYF Login 1 2 3 4 5 6 8 9 12 13 14 7 IdP 2 University Library Login 10 11http://code.google.com/p/springfika/
Attribute mapping
WAYF
X
Services
Y
Institutions
2
login1
loginOID's
urn:oid:2.5.4.42URN's
urn:mace:dir:attribute-def:givenNameEmployee Staff <- Meaning -> <- Format ->
The users' consent
Users’ informed consent to exchange of personal data
Users’ informed consent to exchange of personal data
Principles for data exchange
Principles for data exchange
Transparency
Principles for data exchange
Transparency Legitimate purpose
Principles for data exchange
Transparency Legitimate purpose Proportionality
Users’ informed consent
The consent must be:
Users’ informed consent
The consent must be:
Users’ informed consent
The consent must be:
Users’ informed consent
The consent must be:
Users’ informed consent
The consent must be:
Users’ informed consent
The consent must be:
NO!
Volentary
If you do not consent we will take your money
Volentary
If you do not consent we will take your money
W R O N G
Volentary
If you do not consent we will take your money
W R O N G
Do you consent to sending a personal pseudonym (non-identifiable pointer) to Microsoft?
Volentary
If you do not consent we will take your money
W R O N G
Do you consent to sending a personal pseudonym (non-identifiable pointer) to Microsoft?
Specific
All services may recieve your email-adress
Specific
All services may recieve your email-adress
W R O N G
Fraunhofer Inst. will recieve your email-adress
Specific
All services may recieve your email-adress
W R O N G
Fraunhofer Inst. will recieve your email-adress
Specific
All services may recieve your email-adress
W R O N G
Informed
If you do not consent we will not not decline from not delivering no services
Informed
If you do not consent we will not not decline from not delivering no services
W R O N G
If you do not consent you will not get access
Informed
If you do not consent we will not not decline from not delivering no services
W R O N G
If you do not consent you will not get access
Informed
If you do not consent we will not not decline from not delivering no services
W R O N G
Shibboleth, consent
X Y
WAYF WAYF
2
login
1
login
Services Institutions
WAYF
Shibboleth, consent
X Y
WAYF WAYF
2
login
1
login
Services Institutions
WAYF
Central consent service
WAYF
X
Services
Y
Institutions
CONSENT2
login1
loginCentral consent service
WAYF
X
Services
Y
Institutions
CONSENT2
login1
login CONSENT withdrawelOpt-out
Opt-out
WAYF
X
Services
Y
Institutions
2
login1
login+ +
Opt-out
WAYF
X
Services
Y
Institutions
2
login1
login+
Opt-out
WAYF
X
Services
Y
Institutions
2
login1
loginJANUS - Joint Administration Netbased User Selfservice http://sites.google.com/site/simplesamlphpam/
+
Paper work
Entering the jungle...
Entering the jungle...
Entering the jungle...
Entering the jungle...
Entering the jungle...
Entering the jungle...
Entering the jungle...
Federation policy - liability
X Y
WAYF WAYF
2
login
1
login
Services Institutions
WAYF
Federation policy - liability
X Y
WAYF WAYF
2
login
1
login
Services Institutions
WAYF
Partners Members Members Partners
Legal status - liability
WAYF
X
Services
Y
Institutions
2
login1
loginLegal status - liability
Data controller Data controller
WAYF
X
Services
Y
Institutions
2
login1
loginLegal status - liability
Data processor Data controller Data controller
Contracts
Contracts
Contracts
Contracts
Contracts
Interfederation
Easy inter-federation
WAYF X Y 2 1 login WAYF X Y 2 login 1 loginO n e I d P O n e I d P
Kalmar Union
Metadata aggregate
WAYF, Denmark INSTITUTIONS Inst A Inst B Inst C Inst D Inst E Inst F SERVICES Service 1 Service 2 Service 3 Service 4 FEIDE, Norway INSTITUTIONS Inst G Inst H Inst I Inst J Inst K SERVICES Service 5 Service 6 Service 7 Service 8 HAKA, Finland INSTITUTIONS InstL Inst M Inst N Inst O Inst P SERVICES Service 13 Service 14 Service 15 Service 16 SWAMI, Sweden INSTITUTIONS Inst Q Inst R Inst S Inst T Inst U SERVICES Service 9 Service 10 Service 11 Service 12www.kalmar2.org
Future work
Future work
Future work
Future work
Should institutions educate users?
Future work
Should institutions educate users?
Future work
Should institutions educate users?
Future work
Should institutions educate users?
Future work
Should institutions educate users?
Future work
Should institutions educate users?
Documentation
(http://wayf.dk/wayfweb/articles.html)
Virtual Desktop https://nemserver.sam.sdu.dk/