SlideShare a Scribd company logo
1 of 33
Security
and
Information Assurance
UC San Diego
CSE 294
Winter Quarter 2008
Barry Demchak
Roadmap
 Challenges and Context
 Basic Web Authentication and Authorization
 SAML
 Signon sequence
 Shibboleth
 OpenID
 Compare and Contrast
Information Assurance Challenges
 Managing information-related risks [Wikipedia]
 How can we assure that information is being
used in the way intended and by the people
intended?
 Information: Which information? What quality
of information? What are its characteristics?
 Way: Viewed? Changed? Reconveyed?
 Intended: By whom? With what degree of
certainty?
 People: Browsers? Other user agents?
Computer programs?
Information Assurance Problems (cont’d)
 Subproblems
 Security
 Policy
 Governance
 Data Quality
 Digital Rights Management …
 Parties
 User agents
 Data sources
 Data intermediaries
 Applications
 e-Commerce
 All commerce
 HIPAA
 SOX
 DOD
Consequence of Mishandling Information
 “Thousands of Brits fall victim to data theft”
 -- October 10, 2006 New York Times
 “Medicare and Medicaid Security Gaps Are
Found”
 -- October 8, 2006 New York Times
 “U.S. and Europe Agree on Passenger Data”
 -- October 6, 2006 New York Times
 Is AJAX secure?
 -- October, 2006 SQL Magazine
An Immediate Challenge
 Securing a web site – 3 tier architecture
 Line-level protocols
 Trusted authorities
 AuthenticationAuthentication
 Authorization
 Policy
 Governance
 Failure Detection/
Mitigation
 Process Separation
 Validation/Verification
 Privacy
 Correctness
 Safety
 Availability
 Integrity
 (Scalability)
 Privacy
 Correctness
 Safety
 Availability
 Integrity
 Eavesdropping
 Impersonation (MiM)
Authentication (Single Signon)
 Preserve Privacy
 Hint: Federations
Identity Federation
 Authenticated on one server ⇒ trusted on others
 Standards-based information exchange (SSL, HTTP, SAML, …)
 Result: portable identity
SSO Example – UCSD
Identity at UCSD
Basic Web Authentication/Authorization
1. User surfs to site and supplies credentials
2. Web site validates credentials and determines
capabilities
3. Web site doles out resources per capabilities
 Separate authentication and authorization
mechanisms from web site ⇒ loose coupling and
separation of concerns
 Mechanism reuse
 Minimal impact on web site
 No impact on browser
Web Commerce Use Case
 Carol’s store is part of the Business
Exchange (BusEx)
 Alice is signed up with the BusEx
 Alice wants to buy from Carol, and the BusEx
provides authentication/authorization support
Web Browser Password Access
 Mission
 Convert Alice’s identity into capabilities
 Deliver resource from Carol to Alice
 Store identity on Alice’s PC as cookies for later
 Cast of Characters (roles)
 P = Principal
 CC = Credentials Collector
 AuA.v = Authentication Authority (verifier)
 AuA.a = Authentication Authority (assertions)
 PDP = Policy Decision Point
 PEP = Policy Enforcement Point
Security Attribute Markup Language
 XML framework for marshaling security and
identity information
 Wraps existing security technologies (e.g.,
XACML)
 Describes assertions about subjects
 Bindings for SOAP, HTTP redirect, HTTP
POST, HTTP artifact, URI
 Is not a crypto technology, assertion
maintenance protocol, data format, etc.
SAML Assertion
Example: Alice can read finance database
SAML Assertion (Query Response)
<SAMLQueryResponse>
<RequestID>urn:random:32q4schaw983y5982q35yh98q324==
<Assertion>
<AssertionID>http://www.bizexchange.test/assertion/AE0221
<Issuer>URN:dns-date:www.bizexchange.test:2001-01-03:19283
<ValidityInterval>
<NotBefore>
<NotOnOrAfter>
<Conditions>
<Audience>http://www.bizexchange.test/rule_book.html
<Claims>
<Subject>
<NameID>mailto:Alice@bizex.test
<Object>
<Authority>
<Permission>Read
<Resource>http://store.carol.test/finance
<Role>URN:dns-date:www.bizexchange.test:2001-01-04:right:finance
SAML Assertion (XACML embedded)
<TBS-POLICY-QueryResponse>
<RequestID>urn:random:zwos43i55098w4tawo3i5j09q==
<Assertion>
<AssertionID>http://policy.carol.test/assertion/
<Issuer>URN:dns-date:policy.carol.test:2001-03-03:1204
<ValidityInterval>
<NotBefore>
<NotOnOrAfter>
<Claim>
<Policy>
<Resources>
<string>http://store.carol.test/finance
<ACL>
<ACE>
<Subject>
<Role>URN:dns-date:www.bizexchange.test:2001-01-04:right:finance
<Permit>RWED
<ACE>
<Deny>ED
<Subject>
<Right>URN:dns-date:www.bizexchange.test:2001-01-04:right:ops
<Permit>R
<ACE>
Web Browser Password Access
nd Roles {
ncrypt {
}Establish Identity
Enforce Policy {
Web Browser Password Access
 Choose an Identification Provider (IdP)
 Data Flow
 User Agent (UA) to IdP
 IdP to Service Provider (SP) – redirect through UA
 SP to IdP – verify credential based on ticket
 SP to UA – deliver resource
 Redirect method vs Post method
 HTTP 302
 <form> and Javascript
Decisions and Policy Store
 Retrieve Policy
 Retrieve Assertion
 Compare Policy
and Assertion
 Render result of
decision
Shibboleth Context
About Shibboleth
 Open source project sponsored by MACE
(Middleware Architecture Committee for Education)
of Interent2
 Allows Single Signon and Identity Federations
 Enables policy-driven authorization
 Small integration effort for existing web applications
 Built on standards
 HTTP
 XML
 XML Schema
 XML Signature
 SOAP
 SAML (Security Assertion Markup Language)
Shibboleth Framework
 User Agents (UAs)
 Access SPs oblivious to Shib and SSO
 Shibboleth (Shib)
 Orchestrates access to identity providers (IPs) and
attribute providers (APs)
 Provides SP with only attributes or identities needed to
make decision
 Service Providers (SPs)
 Use and enforce their own authentication mechanisms
 Decide whether a user can access a resource
Shibboleth Workflow (POST method)
Shibboleth Application
Policy
Decision/
Enforcement
Point
Existing Kerberos,
AD, etc
Java on
Tomcat/Apache
C++ on Apache or IIS
HTTP headers
Shibboleth Attribute Transfer
 SP configuration file identifies attributes to be
retrieved from credential
 IdP configuration file identifies attributes to
the provided in the credential
 IdP can identify SP through Shire address
 End result: least privileges is enforced
OpenID
 Federated SSO service
 Open and standards-based (HTTP, et al, but
not SAML)
 Participants: Google, IBM, Microsoft,
VeriSign, Yahoo!, AOL, Symantec, Sun, and
many others
 As of February 2008: 250M openIDs, 10K
Websites
 Objective: Prove that an end user controls an
identifier (e.g., bdemchak.myopenid.com) ⇒
authentication
OpenID Workflow
OpenID Application
Policy
Decision/
Enforcement
Point
Attribute
Parsing
AccessControl
OpenID Capabilities
 Personas associated with ID
 User-control of persona and attributes
released to a particular web site
 Requires explicit web site programming
Shibboleth vs OpenID
 Shibboleth is academic; OpenID is
commercial
 Shibboleth uses SAML; OpenID uses
attribute list
 Shibboleth federation is more flexible
 Shibboleth attempts to ease application
coding
 OpenID leverages validations in the cloud
… this list is only the beginning …
Original Goals
1. User surfs to site and supplies credentials
2. Web site validates credentials and determines
capabilities
3. Web site doles out resources per capabilities
 Separate authentication and authorization
mechanisms from web site ⇒ loose coupling and
separation of concerns
 Mechanism reuse
 Minimal impact on web site
 No impact on browser
References
 http://syswiki.ucsd.edu/index.php/Single_Sign-On
 http://www.openid.net
 http://shibboleth.internet2.net
 http://shibboleth.internet2.edu/docs/draft-mace-shibboleth-
tech-overview-latest.pdf
 http://www.oasis-open.org
 http://www.oasis-open.org/committees/security/docs/draft-
sstc-saml-reqs-00.doc
 http://www.oasis-
open.org/committees/download.php/13525/sstc-saml-exec-
overview-2.0-cd-01-2col.pdf
 http://www.oasis-open.org/committees/security/docs/draft-
sstc-core-phill-07.doc

More Related Content

What's hot

Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
Information security
Information security Information security
Information security AishaIshaq4
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...PECB
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1MLG College of Learning, Inc
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethicsgeneveve_
 

What's hot (20)

Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Information security
Information security Information security
Information security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 1
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 

Similar to Security and information assurance

Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityOliver Pfaff
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossASRoger CARHUATOCTO
 
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6Kenneth Peeples
 
Single Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud ComputingSingle Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud ComputingRahul Roshan
 
Identity, Security and XML Web Services
Identity, Security and XML Web ServicesIdentity, Security and XML Web Services
Identity, Security and XML Web ServicesJorgen Thelin
 
Early Adopting Java WSIT-Experiences with Windows CardSpace
Early Adopting Java WSIT-Experiences with Windows CardSpaceEarly Adopting Java WSIT-Experiences with Windows CardSpace
Early Adopting Java WSIT-Experiences with Windows CardSpaceOliver Pfaff
 
Azure Active Directory by Nikolay Mozgovoy
Azure Active Directory by Nikolay MozgovoyAzure Active Directory by Nikolay Mozgovoy
Azure Active Directory by Nikolay MozgovoySigma Software
 
Navigating The Clouds With An Enterprise IT Strategy
Navigating The Clouds With An Enterprise IT StrategyNavigating The Clouds With An Enterprise IT Strategy
Navigating The Clouds With An Enterprise IT Strategyredmiller1
 
MongoDB World 2019: Securing Application Data from Day One
MongoDB World 2019: Securing Application Data from Day OneMongoDB World 2019: Securing Application Data from Day One
MongoDB World 2019: Securing Application Data from Day OneMongoDB
 
Blockchain: the trust fabric for next generation digital identity management
Blockchain: the trust fabric for next generation  digital identity managementBlockchain: the trust fabric for next generation  digital identity management
Blockchain: the trust fabric for next generation digital identity managementEY
 
GHC18 Abstract - API Security, a Grail Quest
GHC18 Abstract - API Security, a Grail QuestGHC18 Abstract - API Security, a Grail Quest
GHC18 Abstract - API Security, a Grail QuestPaulaPaulSlides
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huangKen Huang
 
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...apidays
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarJohn Lewis
 
WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2
 
S+S Architecture Overview
S+S Architecture OverviewS+S Architecture Overview
S+S Architecture OverviewDavid Solivan
 
UserCentric Identity based Service Invocation
UserCentric Identity based Service InvocationUserCentric Identity based Service Invocation
UserCentric Identity based Service Invocationguestd5dde6
 

Similar to Security and information assurance (20)

Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric Identity
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
 
Single Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud ComputingSingle Sign-On security issue in Cloud Computing
Single Sign-On security issue in Cloud Computing
 
Identity, Security and XML Web Services
Identity, Security and XML Web ServicesIdentity, Security and XML Web Services
Identity, Security and XML Web Services
 
Early Adopting Java WSIT-Experiences with Windows CardSpace
Early Adopting Java WSIT-Experiences with Windows CardSpaceEarly Adopting Java WSIT-Experiences with Windows CardSpace
Early Adopting Java WSIT-Experiences with Windows CardSpace
 
Azure Active Directory by Nikolay Mozgovoy
Azure Active Directory by Nikolay MozgovoyAzure Active Directory by Nikolay Mozgovoy
Azure Active Directory by Nikolay Mozgovoy
 
Navigating The Clouds With An Enterprise IT Strategy
Navigating The Clouds With An Enterprise IT StrategyNavigating The Clouds With An Enterprise IT Strategy
Navigating The Clouds With An Enterprise IT Strategy
 
Windows Azure
Windows AzureWindows Azure
Windows Azure
 
MongoDB World 2019: Securing Application Data from Day One
MongoDB World 2019: Securing Application Data from Day OneMongoDB World 2019: Securing Application Data from Day One
MongoDB World 2019: Securing Application Data from Day One
 
Blockchain: the trust fabric for next generation digital identity management
Blockchain: the trust fabric for next generation  digital identity managementBlockchain: the trust fabric for next generation  digital identity management
Blockchain: the trust fabric for next generation digital identity management
 
GHC18 Abstract - API Security, a Grail Quest
GHC18 Abstract - API Security, a Grail QuestGHC18 Abstract - API Security, a Grail Quest
GHC18 Abstract - API Security, a Grail Quest
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huang
 
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
 
WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product Overview
 
S+S Architecture Overview
S+S Architecture OverviewS+S Architecture Overview
S+S Architecture Overview
 
UserCentric Identity based Service Invocation
UserCentric Identity based Service InvocationUserCentric Identity based Service Invocation
UserCentric Identity based Service Invocation
 
A A A
A A AA A A
A A A
 

More from bdemchak

Cytoscape Network Visualization and Analysis
Cytoscape Network Visualization and AnalysisCytoscape Network Visualization and Analysis
Cytoscape Network Visualization and Analysisbdemchak
 
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...bdemchak
 
Cytoscape Cyberinfrastructure
Cytoscape CyberinfrastructureCytoscape Cyberinfrastructure
Cytoscape Cyberinfrastructurebdemchak
 
No More Silos! Cytoscape CI Enables Interoperability
No More Silos! Cytoscape CI Enables InteroperabilityNo More Silos! Cytoscape CI Enables Interoperability
No More Silos! Cytoscape CI Enables Interoperabilitybdemchak
 
Cytoscape CI Chapter 2
Cytoscape CI Chapter 2Cytoscape CI Chapter 2
Cytoscape CI Chapter 2bdemchak
 
Composable Chat Introduction
Composable Chat IntroductionComposable Chat Introduction
Composable Chat Introductionbdemchak
 
Rich Services: Composable chat
Rich Services: Composable chatRich Services: Composable chat
Rich Services: Composable chatbdemchak
 
Ucsd tum workshop bd
Ucsd tum workshop bdUcsd tum workshop bd
Ucsd tum workshop bdbdemchak
 
Rich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMSRich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMSbdemchak
 
Iscram 2008 presentation
Iscram 2008 presentationIscram 2008 presentation
Iscram 2008 presentationbdemchak
 
Rich feeds policy, the cloud, and CAP
Rich feeds   policy, the cloud, and CAPRich feeds   policy, the cloud, and CAP
Rich feeds policy, the cloud, and CAPbdemchak
 
Rich services to the Rescue
Rich services to the RescueRich services to the Rescue
Rich services to the Rescuebdemchak
 
Hicss 2012 presentation
Hicss 2012 presentationHicss 2012 presentation
Hicss 2012 presentationbdemchak
 
Policy 2012 presentation
Policy 2012 presentationPolicy 2012 presentation
Policy 2012 presentationbdemchak
 
Rich feeds for rescue an integration story
Rich feeds for rescue   an integration storyRich feeds for rescue   an integration story
Rich feeds for rescue an integration storybdemchak
 
Background scenario drivers and critical issues with a focus on technology ...
Background   scenario drivers and critical issues with a focus on technology ...Background   scenario drivers and critical issues with a focus on technology ...
Background scenario drivers and critical issues with a focus on technology ...bdemchak
 
Rich feeds for rescue, palms cyberinfrastructure integration stories
Rich feeds for rescue, palms cyberinfrastructure   integration storiesRich feeds for rescue, palms cyberinfrastructure   integration stories
Rich feeds for rescue, palms cyberinfrastructure integration storiesbdemchak
 
Data quality and uncertainty visualization
Data quality and uncertainty visualizationData quality and uncertainty visualization
Data quality and uncertainty visualizationbdemchak
 
Web programming in clojure
Web programming in clojureWeb programming in clojure
Web programming in clojurebdemchak
 
Structure and interpretation of computer programs modularity, objects, and ...
Structure and interpretation of computer programs   modularity, objects, and ...Structure and interpretation of computer programs   modularity, objects, and ...
Structure and interpretation of computer programs modularity, objects, and ...bdemchak
 

More from bdemchak (20)

Cytoscape Network Visualization and Analysis
Cytoscape Network Visualization and AnalysisCytoscape Network Visualization and Analysis
Cytoscape Network Visualization and Analysis
 
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
The New CyREST: Economical Delivery of Complex, Reproducible Network Biology ...
 
Cytoscape Cyberinfrastructure
Cytoscape CyberinfrastructureCytoscape Cyberinfrastructure
Cytoscape Cyberinfrastructure
 
No More Silos! Cytoscape CI Enables Interoperability
No More Silos! Cytoscape CI Enables InteroperabilityNo More Silos! Cytoscape CI Enables Interoperability
No More Silos! Cytoscape CI Enables Interoperability
 
Cytoscape CI Chapter 2
Cytoscape CI Chapter 2Cytoscape CI Chapter 2
Cytoscape CI Chapter 2
 
Composable Chat Introduction
Composable Chat IntroductionComposable Chat Introduction
Composable Chat Introduction
 
Rich Services: Composable chat
Rich Services: Composable chatRich Services: Composable chat
Rich Services: Composable chat
 
Ucsd tum workshop bd
Ucsd tum workshop bdUcsd tum workshop bd
Ucsd tum workshop bd
 
Rich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMSRich Feeds for RESCUE and PALMS
Rich Feeds for RESCUE and PALMS
 
Iscram 2008 presentation
Iscram 2008 presentationIscram 2008 presentation
Iscram 2008 presentation
 
Rich feeds policy, the cloud, and CAP
Rich feeds   policy, the cloud, and CAPRich feeds   policy, the cloud, and CAP
Rich feeds policy, the cloud, and CAP
 
Rich services to the Rescue
Rich services to the RescueRich services to the Rescue
Rich services to the Rescue
 
Hicss 2012 presentation
Hicss 2012 presentationHicss 2012 presentation
Hicss 2012 presentation
 
Policy 2012 presentation
Policy 2012 presentationPolicy 2012 presentation
Policy 2012 presentation
 
Rich feeds for rescue an integration story
Rich feeds for rescue   an integration storyRich feeds for rescue   an integration story
Rich feeds for rescue an integration story
 
Background scenario drivers and critical issues with a focus on technology ...
Background   scenario drivers and critical issues with a focus on technology ...Background   scenario drivers and critical issues with a focus on technology ...
Background scenario drivers and critical issues with a focus on technology ...
 
Rich feeds for rescue, palms cyberinfrastructure integration stories
Rich feeds for rescue, palms cyberinfrastructure   integration storiesRich feeds for rescue, palms cyberinfrastructure   integration stories
Rich feeds for rescue, palms cyberinfrastructure integration stories
 
Data quality and uncertainty visualization
Data quality and uncertainty visualizationData quality and uncertainty visualization
Data quality and uncertainty visualization
 
Web programming in clojure
Web programming in clojureWeb programming in clojure
Web programming in clojure
 
Structure and interpretation of computer programs modularity, objects, and ...
Structure and interpretation of computer programs   modularity, objects, and ...Structure and interpretation of computer programs   modularity, objects, and ...
Structure and interpretation of computer programs modularity, objects, and ...
 

Recently uploaded

WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...masabamasaba
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Hararemasabamasaba
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 

Recently uploaded (20)

WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 

Security and information assurance

  • 1. Security and Information Assurance UC San Diego CSE 294 Winter Quarter 2008 Barry Demchak
  • 2. Roadmap  Challenges and Context  Basic Web Authentication and Authorization  SAML  Signon sequence  Shibboleth  OpenID  Compare and Contrast
  • 3. Information Assurance Challenges  Managing information-related risks [Wikipedia]  How can we assure that information is being used in the way intended and by the people intended?  Information: Which information? What quality of information? What are its characteristics?  Way: Viewed? Changed? Reconveyed?  Intended: By whom? With what degree of certainty?  People: Browsers? Other user agents? Computer programs?
  • 4. Information Assurance Problems (cont’d)  Subproblems  Security  Policy  Governance  Data Quality  Digital Rights Management …  Parties  User agents  Data sources  Data intermediaries  Applications  e-Commerce  All commerce  HIPAA  SOX  DOD
  • 5. Consequence of Mishandling Information  “Thousands of Brits fall victim to data theft”  -- October 10, 2006 New York Times  “Medicare and Medicaid Security Gaps Are Found”  -- October 8, 2006 New York Times  “U.S. and Europe Agree on Passenger Data”  -- October 6, 2006 New York Times  Is AJAX secure?  -- October, 2006 SQL Magazine
  • 6. An Immediate Challenge  Securing a web site – 3 tier architecture  Line-level protocols  Trusted authorities  AuthenticationAuthentication  Authorization  Policy  Governance  Failure Detection/ Mitigation  Process Separation  Validation/Verification  Privacy  Correctness  Safety  Availability  Integrity  (Scalability)  Privacy  Correctness  Safety  Availability  Integrity  Eavesdropping  Impersonation (MiM)
  • 7. Authentication (Single Signon)  Preserve Privacy  Hint: Federations
  • 8. Identity Federation  Authenticated on one server ⇒ trusted on others  Standards-based information exchange (SSL, HTTP, SAML, …)  Result: portable identity
  • 11. Basic Web Authentication/Authorization 1. User surfs to site and supplies credentials 2. Web site validates credentials and determines capabilities 3. Web site doles out resources per capabilities  Separate authentication and authorization mechanisms from web site ⇒ loose coupling and separation of concerns  Mechanism reuse  Minimal impact on web site  No impact on browser
  • 12. Web Commerce Use Case  Carol’s store is part of the Business Exchange (BusEx)  Alice is signed up with the BusEx  Alice wants to buy from Carol, and the BusEx provides authentication/authorization support
  • 13. Web Browser Password Access  Mission  Convert Alice’s identity into capabilities  Deliver resource from Carol to Alice  Store identity on Alice’s PC as cookies for later  Cast of Characters (roles)  P = Principal  CC = Credentials Collector  AuA.v = Authentication Authority (verifier)  AuA.a = Authentication Authority (assertions)  PDP = Policy Decision Point  PEP = Policy Enforcement Point
  • 14. Security Attribute Markup Language  XML framework for marshaling security and identity information  Wraps existing security technologies (e.g., XACML)  Describes assertions about subjects  Bindings for SOAP, HTTP redirect, HTTP POST, HTTP artifact, URI  Is not a crypto technology, assertion maintenance protocol, data format, etc.
  • 15. SAML Assertion Example: Alice can read finance database
  • 16. SAML Assertion (Query Response) <SAMLQueryResponse> <RequestID>urn:random:32q4schaw983y5982q35yh98q324== <Assertion> <AssertionID>http://www.bizexchange.test/assertion/AE0221 <Issuer>URN:dns-date:www.bizexchange.test:2001-01-03:19283 <ValidityInterval> <NotBefore> <NotOnOrAfter> <Conditions> <Audience>http://www.bizexchange.test/rule_book.html <Claims> <Subject> <NameID>mailto:Alice@bizex.test <Object> <Authority> <Permission>Read <Resource>http://store.carol.test/finance <Role>URN:dns-date:www.bizexchange.test:2001-01-04:right:finance
  • 17. SAML Assertion (XACML embedded) <TBS-POLICY-QueryResponse> <RequestID>urn:random:zwos43i55098w4tawo3i5j09q== <Assertion> <AssertionID>http://policy.carol.test/assertion/ <Issuer>URN:dns-date:policy.carol.test:2001-03-03:1204 <ValidityInterval> <NotBefore> <NotOnOrAfter> <Claim> <Policy> <Resources> <string>http://store.carol.test/finance <ACL> <ACE> <Subject> <Role>URN:dns-date:www.bizexchange.test:2001-01-04:right:finance <Permit>RWED <ACE> <Deny>ED <Subject> <Right>URN:dns-date:www.bizexchange.test:2001-01-04:right:ops <Permit>R <ACE>
  • 18. Web Browser Password Access nd Roles { ncrypt { }Establish Identity Enforce Policy {
  • 19. Web Browser Password Access  Choose an Identification Provider (IdP)  Data Flow  User Agent (UA) to IdP  IdP to Service Provider (SP) – redirect through UA  SP to IdP – verify credential based on ticket  SP to UA – deliver resource  Redirect method vs Post method  HTTP 302  <form> and Javascript
  • 20. Decisions and Policy Store  Retrieve Policy  Retrieve Assertion  Compare Policy and Assertion  Render result of decision
  • 22. About Shibboleth  Open source project sponsored by MACE (Middleware Architecture Committee for Education) of Interent2  Allows Single Signon and Identity Federations  Enables policy-driven authorization  Small integration effort for existing web applications  Built on standards  HTTP  XML  XML Schema  XML Signature  SOAP  SAML (Security Assertion Markup Language)
  • 23. Shibboleth Framework  User Agents (UAs)  Access SPs oblivious to Shib and SSO  Shibboleth (Shib)  Orchestrates access to identity providers (IPs) and attribute providers (APs)  Provides SP with only attributes or identities needed to make decision  Service Providers (SPs)  Use and enforce their own authentication mechanisms  Decide whether a user can access a resource
  • 25. Shibboleth Application Policy Decision/ Enforcement Point Existing Kerberos, AD, etc Java on Tomcat/Apache C++ on Apache or IIS HTTP headers
  • 26. Shibboleth Attribute Transfer  SP configuration file identifies attributes to be retrieved from credential  IdP configuration file identifies attributes to the provided in the credential  IdP can identify SP through Shire address  End result: least privileges is enforced
  • 27. OpenID  Federated SSO service  Open and standards-based (HTTP, et al, but not SAML)  Participants: Google, IBM, Microsoft, VeriSign, Yahoo!, AOL, Symantec, Sun, and many others  As of February 2008: 250M openIDs, 10K Websites  Objective: Prove that an end user controls an identifier (e.g., bdemchak.myopenid.com) ⇒ authentication
  • 30. OpenID Capabilities  Personas associated with ID  User-control of persona and attributes released to a particular web site  Requires explicit web site programming
  • 31. Shibboleth vs OpenID  Shibboleth is academic; OpenID is commercial  Shibboleth uses SAML; OpenID uses attribute list  Shibboleth federation is more flexible  Shibboleth attempts to ease application coding  OpenID leverages validations in the cloud … this list is only the beginning …
  • 32. Original Goals 1. User surfs to site and supplies credentials 2. Web site validates credentials and determines capabilities 3. Web site doles out resources per capabilities  Separate authentication and authorization mechanisms from web site ⇒ loose coupling and separation of concerns  Mechanism reuse  Minimal impact on web site  No impact on browser
  • 33. References  http://syswiki.ucsd.edu/index.php/Single_Sign-On  http://www.openid.net  http://shibboleth.internet2.net  http://shibboleth.internet2.edu/docs/draft-mace-shibboleth- tech-overview-latest.pdf  http://www.oasis-open.org  http://www.oasis-open.org/committees/security/docs/draft- sstc-saml-reqs-00.doc  http://www.oasis- open.org/committees/download.php/13525/sstc-saml-exec- overview-2.0-cd-01-2col.pdf  http://www.oasis-open.org/committees/security/docs/draft- sstc-core-phill-07.doc

Editor's Notes

  1. Update these … to 2007/2008