SlideShare a Scribd company logo
1 of 3
Shibboleth is among the world’s most widely deployed federated identity solutions,
connecting users to applications both within and between organizations.
Many organizations choose to deploy a Shibboleth Identity Provider (IdP) rather
than a commercial single sign-on solution due to its “built in” privacy provisions and
community driven open-source development. Shibboleth also boasts a lightweight
memory footprint and includes support for multi-party federations, like the In
Common Federation.
View our webinar: How 11+ Universities are Using Gluu EDU to normalize and
support a Shibboleth IdP.
As a federated system, a Shibboleth IdP supports secure access to resources across
security domains. Information about a user (known as attributes) is sent from a
home identity provider (IDP) to a service provider (SP), which prepares the
information for protection of sensitive content and use by applications.
The Shibboleth software implements widely used federated identity standards, most
notably the OASIS Security Assertion Markup Language (SAML), to provide a federated
single sign-on and attribute exchange framework.
Without going into excessive detail, this is how the resource-access process happens
between the person, the IDP and the SP:
User Attempts to Access a Protected Resource
SP Determines IDP and Issues Authentication Request
User Authenticates to the IDP
IDP Issues Response to SP
User is redirected back to the SP
Access is granted to the Protected Resource
Why Use a Managed Service for your Shibboleth IDP:
Configuring a Shibboleth Identity Provider involves technical know-how that can be
expensive and time consuming to obtain, and difficult to retain (i.e. retaining employees
with this skill set). Identity Management and Federation protocols and Wam software
such as SAML and Shibboleth are increasingly a niche expertise, which explains why,
among other reasons, ID as a Service (IDaaS) has seen a significant rise in popularity.
A subscription to the Gluu Server can help you reduce the costs associated with
building and operating open source software, such as a Shibboleth IDP. The Gluu Server
stack includes open source software that enables your organization to support the
following open web standards: SAML, OAuth2, LDAP and RADIUS.
At Gluu, we employ Shibboleth Identity Provider experts so you don’t have to. With
Gluu’s managed Shibboleth IdP service and open source product suite, you can add a
layer of support for increasingly complex SAML SSO requirements, while also aligning
with OAuth2 and decreasing dependence on highly specialized skill sets.
Article resource: https://sites.google.com/site/thegluuserver/shibboleth-identity-
provider-idp-what-it-is-and-why-you-should-consider-a-managed-service

More Related Content

What's hot

Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTGlobal Online Trainings
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Managementrver21
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Systems, Inc.
 
OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)GregOracle
 
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?Scott Hoag
 
User Manager
User ManagerUser Manager
User ManagerEmpowerID
 
Password Manager
Password ManagerPassword Manager
Password ManagerEmpowerID
 
Security and Privacy in SharePoint 2010: Healthcare
Security and Privacy in SharePoint 2010: HealthcareSecurity and Privacy in SharePoint 2010: Healthcare
Security and Privacy in SharePoint 2010: HealthcareMarie-Michelle Strah, PhD
 
Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsBertrand Carlier
 
Design Pattern for Federated Single Sign-On Access
Design Pattern for Federated Single Sign-On AccessDesign Pattern for Federated Single Sign-On Access
Design Pattern for Federated Single Sign-On AccessMike Reams
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationDelivery Centric
 
Identity Management
Identity ManagementIdentity Management
Identity Managementrver21
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Managementrver21
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalOracleIDM
 
Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3Atul Goyal
 
Shibboleth
ShibbolethShibboleth
Shibbolethshyamac
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 

What's hot (20)

Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Management
 
Hitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate EditionHitachi ID Identity Express™ - Corporate Edition
Hitachi ID Identity Express™ - Corporate Edition
 
Hitachi ID Privileged Access Manager
Hitachi ID Privileged Access ManagerHitachi ID Privileged Access Manager
Hitachi ID Privileged Access Manager
 
OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)
 
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
 
User Manager
User ManagerUser Manager
User Manager
 
Password Manager
Password ManagerPassword Manager
Password Manager
 
Security and Privacy in SharePoint 2010: Healthcare
Security and Privacy in SharePoint 2010: HealthcareSecurity and Privacy in SharePoint 2010: Healthcare
Security and Privacy in SharePoint 2010: Healthcare
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundations
 
Design Pattern for Federated Single Sign-On Access
Design Pattern for Federated Single Sign-On AccessDesign Pattern for Federated Single Sign-On Access
Design Pattern for Federated Single Sign-On Access
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer Presentation
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Management
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3
 
Shibboleth
ShibbolethShibboleth
Shibboleth
 
Idm Workshop
Idm WorkshopIdm Workshop
Idm Workshop
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 

Viewers also liked

Estrategia de innovación de software
Estrategia de innovación de softwareEstrategia de innovación de software
Estrategia de innovación de softwareHugo Carrion
 
Modulo 1. portafolio diagnostico
Modulo 1. portafolio diagnosticoModulo 1. portafolio diagnostico
Modulo 1. portafolio diagnosticoAdriana Martinez
 
อุปกรณ์เชื่อมต่อคอมพิวเตอร์
อุปกรณ์เชื่อมต่อคอมพิวเตอร์อุปกรณ์เชื่อมต่อคอมพิวเตอร์
อุปกรณ์เชื่อมต่อคอมพิวเตอร์Jamnisa Nymph
 
Empoderament equip directiu web 2.0
Empoderament equip directiu web 2.0Empoderament equip directiu web 2.0
Empoderament equip directiu web 2.0Miquel Prats
 
Conexao subterrânea n109
Conexao subterrânea n109Conexao subterrânea n109
Conexao subterrânea n109Emerson Silva
 
Presentation1
Presentation1Presentation1
Presentation114302
 
A través de la Niebla
A través de la NieblaA través de la Niebla
A través de la NieblaYvonee *
 
Six Traits of Marketing Change Agents - John Ellett, CEO, nFusion.com
Six Traits of Marketing Change Agents - John Ellett, CEO, nFusion.comSix Traits of Marketing Change Agents - John Ellett, CEO, nFusion.com
Six Traits of Marketing Change Agents - John Ellett, CEO, nFusion.comnFusion
 
Keek para o android
Keek para o androidKeek para o android
Keek para o androidchris635
 
07. b. salinan lampiran permendikbud no. 69 th 2013 ttg kurikulum sma ma
07. b. salinan lampiran permendikbud no. 69 th 2013 ttg kurikulum sma ma07. b. salinan lampiran permendikbud no. 69 th 2013 ttg kurikulum sma ma
07. b. salinan lampiran permendikbud no. 69 th 2013 ttg kurikulum sma maNia Piliang
 
Patrimônio histórico e cultural
Patrimônio histórico e culturalPatrimônio histórico e cultural
Patrimônio histórico e culturalJunior Pacifico
 
One piece volume 67 (657-666)
One piece volume 67 (657-666)One piece volume 67 (657-666)
One piece volume 67 (657-666)Marcos Donato
 
Brochure baja taaveekun 1 casb
Brochure baja taaveekun 1 casbBrochure baja taaveekun 1 casb
Brochure baja taaveekun 1 casbZaini Ithnin
 
щоб зростати сильним, спритним...
щоб зростати сильним, спритним...щоб зростати сильним, спритним...
щоб зростати сильним, спритним...lyp439
 
A arte do real e a teoria crítica: algumas considerações
A arte do real e a teoria crítica: algumas consideraçõesA arte do real e a teoria crítica: algumas considerações
A arte do real e a teoria crítica: algumas consideraçõesAndréa Kochhann
 
фия пед.образование (2 профиля)
фия пед.образование (2 профиля)фия пед.образование (2 профиля)
фия пед.образование (2 профиля)NewKamaCat
 
Apresentação Jogos de Quelfes 2015
Apresentação Jogos de Quelfes 2015Apresentação Jogos de Quelfes 2015
Apresentação Jogos de Quelfes 2015Jorge Gomes
 

Viewers also liked (20)

Estrategia de innovación de software
Estrategia de innovación de softwareEstrategia de innovación de software
Estrategia de innovación de software
 
Modulo 1. portafolio diagnostico
Modulo 1. portafolio diagnosticoModulo 1. portafolio diagnostico
Modulo 1. portafolio diagnostico
 
อุปกรณ์เชื่อมต่อคอมพิวเตอร์
อุปกรณ์เชื่อมต่อคอมพิวเตอร์อุปกรณ์เชื่อมต่อคอมพิวเตอร์
อุปกรณ์เชื่อมต่อคอมพิวเตอร์
 
Empoderament equip directiu web 2.0
Empoderament equip directiu web 2.0Empoderament equip directiu web 2.0
Empoderament equip directiu web 2.0
 
Conexao subterrânea n109
Conexao subterrânea n109Conexao subterrânea n109
Conexao subterrânea n109
 
Presentation1
Presentation1Presentation1
Presentation1
 
A través de la Niebla
A través de la NieblaA través de la Niebla
A través de la Niebla
 
veronica
    veronica    veronica
veronica
 
Six Traits of Marketing Change Agents - John Ellett, CEO, nFusion.com
Six Traits of Marketing Change Agents - John Ellett, CEO, nFusion.comSix Traits of Marketing Change Agents - John Ellett, CEO, nFusion.com
Six Traits of Marketing Change Agents - John Ellett, CEO, nFusion.com
 
Keek para o android
Keek para o androidKeek para o android
Keek para o android
 
CELULA PROCARIOTA
CELULA PROCARIOTACELULA PROCARIOTA
CELULA PROCARIOTA
 
07. b. salinan lampiran permendikbud no. 69 th 2013 ttg kurikulum sma ma
07. b. salinan lampiran permendikbud no. 69 th 2013 ttg kurikulum sma ma07. b. salinan lampiran permendikbud no. 69 th 2013 ttg kurikulum sma ma
07. b. salinan lampiran permendikbud no. 69 th 2013 ttg kurikulum sma ma
 
Patrimônio histórico e cultural
Patrimônio histórico e culturalPatrimônio histórico e cultural
Patrimônio histórico e cultural
 
One piece volume 67 (657-666)
One piece volume 67 (657-666)One piece volume 67 (657-666)
One piece volume 67 (657-666)
 
Brochure baja taaveekun 1 casb
Brochure baja taaveekun 1 casbBrochure baja taaveekun 1 casb
Brochure baja taaveekun 1 casb
 
щоб зростати сильним, спритним...
щоб зростати сильним, спритним...щоб зростати сильним, спритним...
щоб зростати сильним, спритним...
 
A arte do real e a teoria crítica: algumas considerações
A arte do real e a teoria crítica: algumas consideraçõesA arte do real e a teoria crítica: algumas considerações
A arte do real e a teoria crítica: algumas considerações
 
фия пед.образование (2 профиля)
фия пед.образование (2 профиля)фия пед.образование (2 профиля)
фия пед.образование (2 профиля)
 
Aurrekontuak
AurrekontuakAurrekontuak
Aurrekontuak
 
Apresentação Jogos de Quelfes 2015
Apresentação Jogos de Quelfes 2015Apresentação Jogos de Quelfes 2015
Apresentação Jogos de Quelfes 2015
 

Similar to Shibboleth identity provider (idp) what it is, and why you should consider a managed service

Leverage Drupal, Shibboleth, and OpenSAML to Connect Federated Identity to th...
Leverage Drupal, Shibboleth, and OpenSAML to Connect Federated Identity to th...Leverage Drupal, Shibboleth, and OpenSAML to Connect Federated Identity to th...
Leverage Drupal, Shibboleth, and OpenSAML to Connect Federated Identity to th...Acquia
 
The Ball Launch on 2013 Microsoft TechDays Part 1/2
The Ball Launch on 2013 Microsoft TechDays Part 1/2The Ball Launch on 2013 Microsoft TechDays Part 1/2
The Ball Launch on 2013 Microsoft TechDays Part 1/2Kallex
 
Protect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloudProtect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloudMicrosoft
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONInfosec Train
 
Gluu server for educational institutions
Gluu server for educational institutionsGluu server for educational institutions
Gluu server for educational institutionsGluu
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarJohn Lewis
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxmariona83
 
SqlSat Victoria governance for PowerBI
SqlSat Victoria governance for PowerBISqlSat Victoria governance for PowerBI
SqlSat Victoria governance for PowerBIBerkovich Consulting
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfVishnuGone
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huangKen Huang
 
Security in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty MutualSecurity in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty MutualVMware Tanzu
 
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conferenceSIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conferenceRichard Tong
 
w Open Source Development Services Face Hardships in 2023 and Beyond.pdf
w Open Source Development Services Face Hardships in 2023 and Beyond.pdfw Open Source Development Services Face Hardships in 2023 and Beyond.pdf
w Open Source Development Services Face Hardships in 2023 and Beyond.pdfGuildITSolutions
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossASRoger CARHUATOCTO
 
SIF IDM Profile Introduction
SIF IDM Profile IntroductionSIF IDM Profile Introduction
SIF IDM Profile IntroductionRichard Tong
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itPeter De Tender
 

Similar to Shibboleth identity provider (idp) what it is, and why you should consider a managed service (20)

Leverage Drupal, Shibboleth, and OpenSAML to Connect Federated Identity to th...
Leverage Drupal, Shibboleth, and OpenSAML to Connect Federated Identity to th...Leverage Drupal, Shibboleth, and OpenSAML to Connect Federated Identity to th...
Leverage Drupal, Shibboleth, and OpenSAML to Connect Federated Identity to th...
 
The Ball Launch on 2013 Microsoft TechDays Part 1/2
The Ball Launch on 2013 Microsoft TechDays Part 1/2The Ball Launch on 2013 Microsoft TechDays Part 1/2
The Ball Launch on 2013 Microsoft TechDays Part 1/2
 
Protect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloudProtect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloud
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
Gluu server for educational institutions
Gluu server for educational institutionsGluu server for educational institutions
Gluu server for educational institutions
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 
SqlSat Victoria governance for PowerBI
SqlSat Victoria governance for PowerBISqlSat Victoria governance for PowerBI
SqlSat Victoria governance for PowerBI
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huang
 
Security in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty MutualSecurity in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty Mutual
 
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conferenceSIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
SIF IDM Profile Usage Guide - Presentation at the 2014 annual conference
 
w Open Source Development Services Face Hardships in 2023 and Beyond.pdf
w Open Source Development Services Face Hardships in 2023 and Beyond.pdfw Open Source Development Services Face Hardships in 2023 and Beyond.pdf
w Open Source Development Services Face Hardships in 2023 and Beyond.pdf
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
The user s identities
The user s identitiesThe user s identities
The user s identities
 
SIF IDM Profile Introduction
SIF IDM Profile IntroductionSIF IDM Profile Introduction
SIF IDM Profile Introduction
 
Identity Management In Cloud Computing
Identity Management In Cloud ComputingIdentity Management In Cloud Computing
Identity Management In Cloud Computing
 
What is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy itWhat is Microsoft Enterprise Mobility Suite and how to deploy it
What is Microsoft Enterprise Mobility Suite and how to deploy it
 

More from Gluu

Pr from our recent nstic pilot award
Pr from our recent nstic pilot awardPr from our recent nstic pilot award
Pr from our recent nstic pilot awardGluu
 
The currency of identifiers
The currency of identifiersThe currency of identifiers
The currency of identifiersGluu
 
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu
 
Gluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu
 
17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management pocGluu
 
Top 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher educationTop 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher educationGluu
 
First o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuFirst o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuGluu
 
How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...Gluu
 
East hackathon api’s for art
East hackathon api’s for artEast hackathon api’s for art
East hackathon api’s for artGluu
 
Gluu’s vision
Gluu’s visionGluu’s vision
Gluu’s visionGluu
 
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu
 
Currency of identifiers ii
Currency of identifiers iiCurrency of identifiers ii
Currency of identifiers iiGluu
 
Federated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxFederated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxGluu
 
Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Gluu
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementGluu
 
Gluu oscon submission
Gluu oscon submissionGluu oscon submission
Gluu oscon submissionGluu
 
Go west young federation
Go west young federationGo west young federation
Go west young federationGluu
 
 Use case for asimba as saml proxy
 Use case for asimba as saml proxy Use case for asimba as saml proxy
 Use case for asimba as saml proxyGluu
 
Postcard from identity next 2013
Postcard from identity next 2013Postcard from identity next 2013
Postcard from identity next 2013Gluu
 

More from Gluu (19)

Pr from our recent nstic pilot award
Pr from our recent nstic pilot awardPr from our recent nstic pilot award
Pr from our recent nstic pilot award
 
The currency of identifiers
The currency of identifiersThe currency of identifiers
The currency of identifiers
 
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
 
Gluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picks
 
17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc
 
Top 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher educationTop 10 applications for multi factor authentication in higher education
Top 10 applications for multi factor authentication in higher education
 
First o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuFirst o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluu
 
How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...
 
East hackathon api’s for art
East hackathon api’s for artEast hackathon api’s for art
East hackathon api’s for art
 
Gluu’s vision
Gluu’s visionGluu’s vision
Gluu’s vision
 
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...
 
Currency of identifiers ii
Currency of identifiers iiCurrency of identifiers ii
Currency of identifiers ii
 
Federated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxFederated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs ox
 
Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access management
 
Gluu oscon submission
Gluu oscon submissionGluu oscon submission
Gluu oscon submission
 
Go west young federation
Go west young federationGo west young federation
Go west young federation
 
 Use case for asimba as saml proxy
 Use case for asimba as saml proxy Use case for asimba as saml proxy
 Use case for asimba as saml proxy
 
Postcard from identity next 2013
Postcard from identity next 2013Postcard from identity next 2013
Postcard from identity next 2013
 

Shibboleth identity provider (idp) what it is, and why you should consider a managed service

  • 1. Shibboleth is among the world’s most widely deployed federated identity solutions, connecting users to applications both within and between organizations. Many organizations choose to deploy a Shibboleth Identity Provider (IdP) rather than a commercial single sign-on solution due to its “built in” privacy provisions and community driven open-source development. Shibboleth also boasts a lightweight memory footprint and includes support for multi-party federations, like the In Common Federation. View our webinar: How 11+ Universities are Using Gluu EDU to normalize and support a Shibboleth IdP. As a federated system, a Shibboleth IdP supports secure access to resources across security domains. Information about a user (known as attributes) is sent from a home identity provider (IDP) to a service provider (SP), which prepares the information for protection of sensitive content and use by applications.
  • 2. The Shibboleth software implements widely used federated identity standards, most notably the OASIS Security Assertion Markup Language (SAML), to provide a federated single sign-on and attribute exchange framework. Without going into excessive detail, this is how the resource-access process happens between the person, the IDP and the SP: User Attempts to Access a Protected Resource SP Determines IDP and Issues Authentication Request User Authenticates to the IDP IDP Issues Response to SP User is redirected back to the SP Access is granted to the Protected Resource Why Use a Managed Service for your Shibboleth IDP: Configuring a Shibboleth Identity Provider involves technical know-how that can be expensive and time consuming to obtain, and difficult to retain (i.e. retaining employees with this skill set). Identity Management and Federation protocols and Wam software such as SAML and Shibboleth are increasingly a niche expertise, which explains why, among other reasons, ID as a Service (IDaaS) has seen a significant rise in popularity.
  • 3. A subscription to the Gluu Server can help you reduce the costs associated with building and operating open source software, such as a Shibboleth IDP. The Gluu Server stack includes open source software that enables your organization to support the following open web standards: SAML, OAuth2, LDAP and RADIUS. At Gluu, we employ Shibboleth Identity Provider experts so you don’t have to. With Gluu’s managed Shibboleth IdP service and open source product suite, you can add a layer of support for increasingly complex SAML SSO requirements, while also aligning with OAuth2 and decreasing dependence on highly specialized skill sets. Article resource: https://sites.google.com/site/thegluuserver/shibboleth-identity- provider-idp-what-it-is-and-why-you-should-consider-a-managed-service