SAML and Liferay

Mika Koivisto
Senior Software Engineer
What is SAML?
• Security Assertion Markup Language
• XML based protocol
• OASIS approved standard
  • SAML 1.0 November 2002
  • SAML 1.1 September 2003
  • SAML 2.0 March 2005
• Flexible and extensible protocol designed to be used by
  other standards
Why SAML?




  Source: xkcd.com
Advantages of SAML
•   Platform neutral
•   Loose coupling of directories
•   Improved online experience for end users
•   Supported by many SaaS applications
•   Increased security
•   Strong commercial and open source support
Use Cases
•   Web Single Sign-On
•   Attribute based authorization
•   Identity Federation
•   WS-Security
SAML Roles
• Identity Provider (IdP) / Asserting party
• Service Provider (SP) / Relying party
Liferay and SAML
• Available as a EE plugin
• Supports two operation modes
  • Identity Provider
  • Service Provider
• Based on SAML 2.0
• Provides Web SSO between Liferay and various
  applications including Salesforce and Google Apps
Features
•   IdP initiated Web SSO
•   SP initiated Web SSO
•   SP initiated Single Logout
•   IdP initiated Single Logout
•   Consumes and Produces SAML Metadata
•   Attribute statement generation (IdP)
•   JIT provisioning using attribute statements (SP)
DEMO
Roadmap
• WS-Security
• Management UI
• Scalability improvements
Kiitos!




                Mika Koivisto
          Senior Software Engineer
          mika.koivisto@liferay.com

SAML and Liferay

  • 1.
    SAML and Liferay MikaKoivisto Senior Software Engineer
  • 2.
    What is SAML? •Security Assertion Markup Language • XML based protocol • OASIS approved standard • SAML 1.0 November 2002 • SAML 1.1 September 2003 • SAML 2.0 March 2005 • Flexible and extensible protocol designed to be used by other standards
  • 3.
    Why SAML? Source: xkcd.com
  • 4.
    Advantages of SAML • Platform neutral • Loose coupling of directories • Improved online experience for end users • Supported by many SaaS applications • Increased security • Strong commercial and open source support
  • 5.
    Use Cases • Web Single Sign-On • Attribute based authorization • Identity Federation • WS-Security
  • 6.
    SAML Roles • IdentityProvider (IdP) / Asserting party • Service Provider (SP) / Relying party
  • 7.
    Liferay and SAML •Available as a EE plugin • Supports two operation modes • Identity Provider • Service Provider • Based on SAML 2.0 • Provides Web SSO between Liferay and various applications including Salesforce and Google Apps
  • 8.
    Features • IdP initiated Web SSO • SP initiated Web SSO • SP initiated Single Logout • IdP initiated Single Logout • Consumes and Produces SAML Metadata • Attribute statement generation (IdP) • JIT provisioning using attribute statements (SP)
  • 9.
  • 10.
    Roadmap • WS-Security • ManagementUI • Scalability improvements
  • 11.
    Kiitos! Mika Koivisto Senior Software Engineer mika.koivisto@liferay.com