Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

McShibboleth Presentation


Published on

Presentation by Nicole Harris to inaugural meeting of the McShibboleth User Group

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

McShibboleth Presentation

  1. 1. Access Management Transition Programme Meeting Technical Birds of a Feather Session
  2. 2. JISC Announcement <ul><li>In March 2006, JISC formally announced its intention to support federated access management as the preferred access management solution for UK Further and Higher Education </li></ul><ul><li>JISC will continue funding the Athens service until July 2008 </li></ul><ul><li>Athens will be available via a subscription model post July 2008 </li></ul><ul><li>The UK Access Management Federation will launch in November 2006, with early adopters joining in August 2006 </li></ul><ul><li>The Federation is a combined venture between JISC and BECTA </li></ul><ul><li>All members of the successful pilot federation (SDSS) will be seamlessly moved to the UK Access Management Federation </li></ul><ul><li>A full support service will be made available to the JISC community to support the transition to the new service </li></ul>
  3. 3. What is Federated Access Management? <ul><li>Current Athens service is a centralised service: </li></ul><ul><ul><li>Institution provides information about users to Athens (identity information). </li></ul></ul><ul><ul><li>Athens brokers both authentication and authorisation on the part of the institution with service providers. </li></ul></ul><ul><li>Federated Access Management devolves authentication back to the institution: </li></ul><ul><ul><li>Authentication achieved through normal institutional log-on. </li></ul></ul><ul><ul><li>Service Providers trust institutions to appropriately authenticate. </li></ul></ul><ul><ul><li>Service Providers and institutions exchange information about users to determine what they can access (attributes: staff, student, law). </li></ul></ul><ul><ul><li>Same system can be used for internal, external and collaborative access (e-learning partnerships with other institutions, e-portfolios). </li></ul></ul>
  4. 4. Institutional Options <ul><li>BECOME A FULL MEMBER OF THE FEDERATION USING COMMUNITY SUPPORTED TOOLS </li></ul><ul><ul><li>COSTS: Institutional effort to implement software, join federation and enhance institutional directories </li></ul></ul><ul><ul><li>BENEFITS: Full institutional control, skilled staff and access management solution for internal, external and collaborative resources </li></ul></ul><ul><li>BECOME A FULL MEMBER OF THE FEDERATION USING TOOLS WITH PAID-FOR SUPPORT </li></ul><ul><ul><li>COSTS: Cost of support from supplier and institutional effort in liaison with supplier and Federation </li></ul></ul><ul><ul><li>BENEFITS: Full support in implementation and access management solution for internal, external and collaborative resources </li></ul></ul><ul><li>SUBSCRIBE TO AN ‘OUTSOURCED IDENTITY PROVIDER’ TO WORK THROUGH THE FEDERATION ON YOUR BEHALF (SUCH AS USE OF CLASSIC ATHENS WITH THE GATEWAYS) </li></ul><ul><ul><li>COSTS: Subscription costs to external supplier (from July 2008) and internal administration role </li></ul></ul><ul><ul><li>BENEFITS: Minimum institutional effort to achieve access to external resources only </li></ul></ul>
  6. 6. The JISC Roadmap
  7. 7. Reviewing Readiness How many institutions will adopt federated access by July 2008? (FE figures: Scotland, Wales and Northern Ireland only)
  8. 8. Technical Background <ul><li>JISC ‘Institutional Preparedness’ Study (170 institutions): </li></ul><ul><li>Directory Services: </li></ul><ul><ul><li>66% HE / 69% FE use Active Directory </li></ul></ul><ul><ul><li>31% HE / 13% FE use Novell eDirectory </li></ul></ul><ul><ul><li>27% HE / 31 % FE use OpenLDAP </li></ul></ul><ul><li>Outsourcing / Delegation of Identity Management: </li></ul><ul><ul><li>2% of HE / 0% FE outsource directory / identity management </li></ul></ul><ul><ul><li>25% HE allow departmental control of identity management </li></ul></ul><ul><li>Current use of Athens: </li></ul><ul><ul><li>Classic Athens: 57% HE / 78% FE </li></ul></ul><ul><ul><li>AthensDA: 35% HE / 7% FE </li></ul></ul>
  9. 9. Strategic Case: Example – Kings College London <ul><li>VISION STATEMENT: “Using a single password, postgraduate students can access not only King’s own electronic resources but also those of other universities and institutions by co-operative agreements. </li></ul><ul><li>VISION STATEMENT: “Provide services which reduce the burden of administration and information management.” </li></ul><ul><li>VISION STATEMENT: “Provide services which facilitate scholarly communication, collaboration and research </li></ul><ul><li>Federated access management allows not only single sign-on internally using an institutional password, but also allows users to access resources (such as VLEs) at other institutions using that same password (i.e. no need to register elsewhere). </li></ul><ul><li>Devolved authentication means that institution do not have to administer Athens accounts and single sign-on reduces the need for libraries to manage people as well as resources. </li></ul><ul><li>Federated access management supports the adoption of ‘virtual organisations and key research tools (such as open access repositories) have been ‘federated’. </li></ul>
  10. 10. Software Choice <ul><li>Broadly speaking, you can use any software as long as it is SAML compliant, enables you to meet the Rules of Membership (and practically has been tried and tested by the Federation Operator). </li></ul><ul><li>Currently: </li></ul><ul><ul><li>Shibboleth 1.3 is used around 90% of Members (1.1 and 1.2 not recommended). 1.3 is recommended for all new users at present as 2.0 not yet stable and tested. </li></ul></ul><ul><ul><li>Guanxi / Athens IM / others. </li></ul></ul><ul><li>Microsoft ADFS?? </li></ul><ul><ul><li>Extensive testing by JISC projects @ LSE / UKERNA / Internet2 proved that it is technically feasible with some caveats. </li></ul></ul><ul><ul><li>Practically, it would require all Members of the Federation to maintain two sets of metadata. </li></ul></ul><ul><ul><li>As such, will not be supported. </li></ul></ul><ul><ul><li>A better packaged 1.3 and 2.0 Shibboleth for Windows environments coming soon! </li></ul></ul><ul><li>That is all the UK federation is going to tell you about software choice! </li></ul>
  11. 11. Costs <ul><li>Costs associated with adopting federated access management need to be assessed on an institution by institution basis. </li></ul><ul><li>Depend on starting point (state of directory services, choice of directory services, use of Athens, size of institution etc. etc.). </li></ul><ul><li>Depends on ‘end’ goal (full single sign-on implementation or more lightweight approach). </li></ul><ul><li>Use case studies of ‘early adopters’ to judge where you might be – please contact me. </li></ul><ul><li>Talk to the early adopters (they are very nice). </li></ul><ul><li>NMI-EDIT full Enterprise Directory project example: £250,000 capital, £130,000 recurrent. </li></ul><ul><li>Simple adoption of federated access management: £5,000. </li></ul><ul><li>Early adopter projects: £50,000. All successful within these constraints. </li></ul><ul><li>Athens: no more than 50p per user account for all Athens systems. </li></ul>
  12. 12. Achievability: Skill Set (with thanks to Swish!) Setting up a CVS Repository; Populating (importing) new data;Check out/in. CVS Profiles, bindings and extensions SAML Format and content of XML files ; Namespace (xmlns) definition and use ; XML Schema definitions XML Log4j and log4cpp configuration options ; Analyzing stack traces and locating configuration errors. Java Configuration files: server.xml,, tomcat-users.xml Application WAR deployment ; Use of conf, webapps, WEB-INF and classes directories. Mod_jk use and Tomcat modification to use it ; “ant command” and editing and build.xml files.Build WAR and dist files. Tomcat Writing simple web pages ; Meaning of every HTTP code ; CSS authoring HTTP and HTML PKI ; Use of the openssl command and every option Trust stores and certificate stores Obtaining certificates, installing them, converting to/from different encoded methods. Building certificate chains. SSL Knowledge of the configuration files for the webserver and being able to correctly specify values for all directives. Virtual host configuration with SSL. Adding modules, building modules Configuring a content management system to host documentation about procedures and configuration file changes. Webserver (Apache, IIS) Security policy management for controlling port use . Where to install applications, configuration files. Syslogd operation, writing startup services, obtaining and inspecting packet dumps, writing scripts to monitor and control multiple log files in many windows and using filtering, sorting and pattern matching to reformat output. Operating System Minimum requirements Skill area
  13. 13. Joining the Federation: Technical Details
  14. 14. The Rules of Membership - Important Technical Sections <ul><li>Section 3 (major undertakings) </li></ul><ul><ul><li>To provide accurate and up-to-date information (metadata) and promptly make changes to the metadata known to the Federation Operator. </li></ul></ul><ul><ul><li>Reasonable endeavours to comply with the Technical Specifications (Technical Recommendations for Participants). </li></ul></ul><ul><ul><li>Good practice in relation to the configuration, operation and security of the system. </li></ul></ul><ul><ul><li>Good practice in exchange and processing of Data, and in obtaining and managing DNS names, digital certificates and private keys. </li></ul></ul><ul><li>Section 6 (accountability) </li></ul><ul><ul><li>Documented process for issuing credentials. </li></ul></ul><ul><ul><li>Documented process for educating end users. </li></ul></ul><ul><ul><li>Revoke credentials ‘promptly’. </li></ul></ul><ul><ul><li>Do not reissue for 24 months after revocation . </li></ul></ul><ul><ul><li>Keep authentication logs for between 3 – 6 months. </li></ul></ul><ul><li>That’s about it from a technical perspective (see policy session for other arguments). </li></ul>
  15. 15. Technical Recommendations for Participants <ul><li>8 sections: </li></ul><ul><li>Introduction: very general stuff about when and how changes made to documents. </li></ul><ul><li>Software: current software options available to use within the UK federation. </li></ul><ul><li>Authentication Requests and Response Profiles: profiles you need to be able to talk to other members. </li></ul><ul><li>Metadata: the information published describing how members talk to each other. </li></ul><ul><li>Digital Certificates: how to use certificates for both the trust fabric and end users. </li></ul><ul><li>Discovery: all about the ‘discovery problem’. </li></ul><ul><li>Attribute Usage: how to describe your users and their potential access rights. </li></ul><ul><li>References: Where to find out more stuff. </li></ul>
  16. 16. Authentication Requests and Response Profiles <ul><li>Authentication Request Profile: basically just a GET request. </li></ul><ul><li>ONLY recommended Authentication Request Profile is the Shibboleth Authentication Request Profile. All current Members implement this profile. </li></ul><ul><li>Response Profile: how the Identity Provider responds to Service Provider after authentication established. </li></ul><ul><li>Recommended: SAML 1.1 Browser/POST with Attribute Pull. </li></ul><ul><ul><li>Browser/POST only response profile known to be supported by all Members. </li></ul></ul><ul><ul><li>Attribute Pull means that authentication information is sent without attribute information. </li></ul></ul><ul><ul><li>Don’t do it with Attribute Push! </li></ul></ul><ul><li>SAML 1.1 Browser/Artifact with Attribute Push. </li></ul><ul><ul><li>Some good things, e.g. no need for Javascript support in user’s browser. </li></ul></ul><ul><ul><li>Not well supported by Members. </li></ul></ul><ul><ul><li>Do not deploy on its own. </li></ul></ul>
  17. 17. Metadata (1) <ul><li>You must have a policy for attribute release! </li></ul><ul><li>Standard Shibboleth ARP releases eduPersonScopedAffiliation to all Service Providers, easily modifiable to include eduPersonTargetedID as below: </li></ul><ul><li><?xml version=&quot;1.0&quot; encoding=&quot;UTF-8&quot;?> <AttributeReleasePolicy xmlns:xsi=&quot;; xmlns=&quot;urn:mace:shibboleth:arp:1.0&quot; xsi:schemaLocation=&quot;urn:mace:shibboleth:arp:1.0 shibboleth-arp-1.0.xsd&quot; > <Description>Simplest possible ARP plus targeted ID.</Description> <Rule> <Target> <AnyTarget/> </Target> <Attribute name=&quot;urn:mace:dir:attribute-def:eduPersonScopedAffiliation&quot;> <AnyValue release=&quot;permit&quot;/> </Attribute> <Attribute name=&quot;urn:mace:dir:attribute-def:eduPersonTargetedID&quot;> <AnyValue release=&quot;permit&quot;/> </Attribute> </Rule> </AttributeReleasePolicy> </li></ul>
  18. 18. Metadata (2) <ul><li>UK federation metadata available at: . </li></ul><ul><li>Refresh metadata daily – metadata tool with Shibboleth release for this. </li></ul><ul><li>Shibboleth 1.2 metadata currently has to be maintained separately – this will be deprecated, but no date is currently set for this. </li></ul>
  19. 19. Digital Certificates <ul><li>Must use a certificate from one of the published list of providers. </li></ul><ul><li>Recommend that you make use of the free certificates available from the Janet Server Certificate Service (SCS): . </li></ul><ul><li>Follow instructions with regards to compromised keys. </li></ul>
  20. 20. Discovery <ul><li>The Discovery Problem: if the user visits the Service Provider from an unknown context, how does the Service Provider direct them to the right Identity Provider? </li></ul><ul><ul><li>Avoiding Discovery through Institutional Portals. Recommended that you arrange with Service Provider to be updated with any changes to SP configuration. </li></ul></ul><ul><ul><li>SP’s using local WAYFs. JSTOR a good example of this. </li></ul></ul><ul><ul><li>The Central WAYF. </li></ul></ul>
  21. 21. Attribute Usage <ul><li>Recommended Core Set of Attributes: </li></ul><ul><ul><li>eduPersonScopedAffiliation ( </li></ul></ul><ul><ul><li>eduPersonTargetedID (persistent but pseudonymous). </li></ul></ul><ul><ul><li>eduPersonPrincipleName (consistent name across multiple identity providers). </li></ul></ul><ul><ul><li>eduPersonEntitlement (catch-all entitlements). </li></ul></ul><ul><li>Recommendations on how to generate. </li></ul><ul><li>Well described in the documentation. </li></ul><ul><li>Could be a session by itself! </li></ul><ul><li>Get advice from existing users via the mailing lists. </li></ul><ul><li>Be aware of the implications of personal data publication. </li></ul>
  22. 22. Recent Issues <ul><li>How to express Scoped Affiliation for people with multiple roles: </li></ul><ul><ul><li>Can be multi-valued (i.e. student and staff and member). </li></ul></ul><ul><ul><li>Use Attribute Release Policy to manage what is released! </li></ul></ul><ul><li>Where can I find a good up-to-date Shibboleth installation guide: </li></ul><ul><ul><li> . </li></ul></ul><ul><li>What ‘logs’ do I have to keep to meet the requirements of section 6? </li></ul><ul><ul><li>Basically, enough to be able to provide enough ‘reasonable assistance’ to associating an infraction with a named user. </li></ul></ul><ul><ul><li>Standard logs provided by Shibboleth software are more than accurate. </li></ul></ul><ul><li>What attributes do the Federation Gateways use? </li></ul><ul><ul><li>Athens to Shibboleth: eduPersonScopedAffiliation and eduPersonTargetedID. </li></ul></ul><ul><ul><li>Shibboleth to Athens: eduPersonTargetedID and eduPersonEntitlement (optional). </li></ul></ul><ul><li>Anyone using Shibboleth for real? </li></ul><ul><ul><li>Yes! </li></ul></ul><ul><li>Can one institution have several different management domains? </li></ul><ul><ul><li>Yes, so for example MIMAS can be registered as a separate entity within the University of Manchester membership to cover the legal and practical requirements. </li></ul></ul>
  23. 23. Support <ul><li>I know nothing about this area of work at all: </li></ul><ul><ul><li>Try the upcoming basic skills workshops to be provided by Netskills covering SAML, Java and the real basics to get a developer up-to-speed in this area. </li></ul></ul><ul><li>I need help installing this Shibboleth thing: </li></ul><ul><ul><li>Installation guides on Shibboleth Wiki: . </li></ul></ul><ul><ul><li>Shib Common Errors: . </li></ul></ul><ul><ul><li>JISC website: . </li></ul></ul><ul><li>I need help with meeting the recommendations of the UK federation: </li></ul><ul><ul><li>Helpdesk support available: [email_address] . </li></ul></ul><ul><ul><li>Community advice available: [email_address] . </li></ul></ul><ul><ul><li>Contact your outsourced Identity Provider. </li></ul></ul>