SlideShare a Scribd company logo
Open-Source Web-SSO of the french
         administrations
What is « Gendarmerie Nationale »
                     4300 agencies
                 ●

                     (300 overseas)
                     105000 users
                 ●


                     1 private network
                 ●

                     connecting all
                     agencies
                     2 datacenters
                 ●
What is Lemonldap::NG
    A powerful distributed Web-SSO system :
●


        an assembly of well tested open-source libraries
    ●


        based on ModPerl API to run inside Apache
    ●



    It centrally manages authentication, user's
●

    attributes propagation and access control
    It includes a sophisticated access rights
●

    management
History of the project
    2002 : First Web-SSO launched on the Gendarmerie's network
●


    2003 : Lemonldap developed by the Ministry of finance
●


    2004 : Studies to replace existing Gendarmerie's Web-SSO
●


    2005 : Lemonldap::NG developped and deployed by
●

    Gendarmerie
    2006 : Lemonldap::NG is chosen by Feder-Id project to
●

    become a Liberty-Alliance Service Provider
    2009 : Gendarmerie is funding the SAML-2 extension
●
Lemonldap::NG on the
               Gendarmerie's network
    105.000 users
●


    average of 40,000 sessions at the same time
●


    about 100 protected applications (98% of the whole)
●

    among which :
        all specific applications (J2EE and PHP)
    ●


        SAP
    ●


        Fudforum
    ●


        Mediawiki
    ●


        Sympa management interface
    ●


        Nagios (all applications based on Apache htaccess)
    ●


        ...
    ●
Feedback and use cases
Double cookie
    Separated protection for HTTP and HTTPS
●

    connections, so that less secured applications
    don't weaken the other ones
    POST / HTTP/1.1
    Host: authentification.gendarmerie.fr

    HTTP/1.x 200 OK
    Date: Tue, 24 Mar 2009 14:18:08 GMT
    Server: Apache
    Set­Proxy­Cookie: lmproxy=4c640e7ff9450bd3cc65c069f3fa920e; 
                      domain=gendarmerie.fr; path=/
    Set­Cookie: lemonldap=d8a6a10a88bcfcdddd4906ad55119ad2; 
                      domain=gendarmerie.fr; path=/; secure
    Set­Cookie: lemonldaphttp=ae92a75d4c15dd3d5eae40ce386594e7; 
                      domain=gendarmerie.fr; path=/
    ...
Internet authentication
    « Proxy-Cookie » enables the Single-Sign-On
●

    to control the access to Internet

    POST / HTTP/1.1
    Host: authentification.gendarmerie.fr

    HTTP/1.x 200 OK
    Date: Tue, 24 Mar 2009 14:18:08 GMT
    Server: Apache
    Set­Proxy­Cookie: lmproxy=4c640e7ff9450bd3cc65c069f3fa920e; 
                      domain=gendarmerie.fr; path=/
    Set­Cookie: lemonldap=d8a6a10a88bcfcdddd4906ad55119ad2; 
                      domain=gendarmerie.fr; path=/; secure
    Set­Cookie: lemonldaphttp=ae92a75d4c15dd3d5eae40ce386594e7; 
                      domain=gendarmerie.fr; path=/
    ...
Internet authentication
Performances
    Overhead of 3ms per hit
●


    Average of 40.000 sessions at the same time
●


    servers can check more than 3000 queries by
●

    minutes without any slowdown
Session Explorer
Development environment
    Principles :
●


        developers must have a valid account (the « real
    ●

        user's account »)
        they can choose any other account (the « spoofed
    ●

        user's account ») to test access control
        accounting and access rules involve both spoofed
    ●

        user's and real user's attributes
Login form
Session Explorer




       Accounting is done
       with both identities
       (spoofed user's /
       real user's)
Sharing authentication with remote
           applications
    Extending the core environment with additional
●

    features to enable sharing of authentication
    with remote applications :
        only a short list of attributes is exported to remote
    ●

        applications
Principles
Client-Server over HTTP
    Lemonldap::NG provides 2 ways to control
●

    access from non-browser clients :
        SOAP authentication : the client gets a cookie with
    ●

        a SOAP request, then uses the cookie as a normal
        browser
        HTTP Auth-Basic authentication : the application is
    ●

        protected by an agent (handler) which requests the
        portal by SOAP using user/password transmitted by
        the client (by Auth-Basic mechanism) :
            authorization still uses Lemonldap::NG rules
        –
Conclusion
    Cost of the project (for the Gendarmerie) :
●


        4 servers
    ●


        4 months of work for 1 developper
    ●



    Result :
●


        a flexible and suitable solution
    ●
Any questions ?

More Related Content

What's hot

Http Proxy Server
Http Proxy ServerHttp Proxy Server
Http Proxy Server
Sourav Roy
 
Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy server
greatbury
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
primeteacher32
 
Group18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.pptGroup18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.ppt
Anitha Selvan
 
Proxy server
Proxy serverProxy server
Proxy server
Proxies Rent
 
Firewall with proxy server.
Firewall with proxy server.Firewall with proxy server.
Firewall with proxy server.
stableproxies
 
Introductiontowebarchitecture 090922221506-phpapp01
Introductiontowebarchitecture 090922221506-phpapp01Introductiontowebarchitecture 090922221506-phpapp01
Introductiontowebarchitecture 090922221506-phpapp01
Maisha Price
 
Proxy server
Proxy serverProxy server
Proxy server
Dlovan Salih
 
Proxy servers
Proxy serversProxy servers
Proxy servers
Kumar
 
Real-time applications with sockets and websockets. Introduction to Smartfoxs...
Real-time applications with sockets and websockets. Introduction to Smartfoxs...Real-time applications with sockets and websockets. Introduction to Smartfoxs...
Real-time applications with sockets and websockets. Introduction to Smartfoxs...
Pablo Monterde Perez
 
SOAP--Simple Object Access Protocol
SOAP--Simple Object Access ProtocolSOAP--Simple Object Access Protocol
SOAP--Simple Object Access Protocol
Masud Rahman
 
Web Proxy Server
Web Proxy ServerWeb Proxy Server
Web Proxy Server
Mohit Dhankher
 
Cc proxy
Cc proxyCc proxy
ASP.NET 3.5 SP1 (VSLive San Francisco 2009)
ASP.NET 3.5 SP1 (VSLive San Francisco 2009)ASP.NET 3.5 SP1 (VSLive San Francisco 2009)
ASP.NET 3.5 SP1 (VSLive San Francisco 2009)
Dave Bost
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
LakshyaArora12
 
Proxy
ProxyProxy
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
Sourav Roy
 
Silverlight 2
Silverlight 2Silverlight 2
Silverlight 2
Dave Bost
 
Wso2 esb-maintenance-guide
Wso2 esb-maintenance-guideWso2 esb-maintenance-guide
Wso2 esb-maintenance-guide
Chanaka Fernando
 
Developing Revolutionary Web Applications using Comet and Ajax Push
Developing Revolutionary Web Applications using Comet and Ajax PushDeveloping Revolutionary Web Applications using Comet and Ajax Push
Developing Revolutionary Web Applications using Comet and Ajax Push
Doris Chen
 

What's hot (20)

Http Proxy Server
Http Proxy ServerHttp Proxy Server
Http Proxy Server
 
Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy server
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
 
Group18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.pptGroup18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.ppt
 
Proxy server
Proxy serverProxy server
Proxy server
 
Firewall with proxy server.
Firewall with proxy server.Firewall with proxy server.
Firewall with proxy server.
 
Introductiontowebarchitecture 090922221506-phpapp01
Introductiontowebarchitecture 090922221506-phpapp01Introductiontowebarchitecture 090922221506-phpapp01
Introductiontowebarchitecture 090922221506-phpapp01
 
Proxy server
Proxy serverProxy server
Proxy server
 
Proxy servers
Proxy serversProxy servers
Proxy servers
 
Real-time applications with sockets and websockets. Introduction to Smartfoxs...
Real-time applications with sockets and websockets. Introduction to Smartfoxs...Real-time applications with sockets and websockets. Introduction to Smartfoxs...
Real-time applications with sockets and websockets. Introduction to Smartfoxs...
 
SOAP--Simple Object Access Protocol
SOAP--Simple Object Access ProtocolSOAP--Simple Object Access Protocol
SOAP--Simple Object Access Protocol
 
Web Proxy Server
Web Proxy ServerWeb Proxy Server
Web Proxy Server
 
Cc proxy
Cc proxyCc proxy
Cc proxy
 
ASP.NET 3.5 SP1 (VSLive San Francisco 2009)
ASP.NET 3.5 SP1 (VSLive San Francisco 2009)ASP.NET 3.5 SP1 (VSLive San Francisco 2009)
ASP.NET 3.5 SP1 (VSLive San Francisco 2009)
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
 
Proxy
ProxyProxy
Proxy
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Silverlight 2
Silverlight 2Silverlight 2
Silverlight 2
 
Wso2 esb-maintenance-guide
Wso2 esb-maintenance-guideWso2 esb-maintenance-guide
Wso2 esb-maintenance-guide
 
Developing Revolutionary Web Applications using Comet and Ajax Push
Developing Revolutionary Web Applications using Comet and Ajax PushDeveloping Revolutionary Web Applications using Comet and Ajax Push
Developing Revolutionary Web Applications using Comet and Ajax Push
 

Similar to Lemonldap::NG, open-source Web-SSO of the french administrations

[LDAPCon 2015] The OpenID Connect Protocol
[LDAPCon 2015] The OpenID Connect Protocol[LDAPCon 2015] The OpenID Connect Protocol
[LDAPCon 2015] The OpenID Connect Protocol
Clément OUDOT
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
AssadLeo1
 
Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3
Truong Minh Yen
 
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
SBWebinars
 
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
Eric Vanderburg
 
Free NetFlow Analyzer training - Getting the initial settings right
Free NetFlow Analyzer training - Getting the initial settings rightFree NetFlow Analyzer training - Getting the initial settings right
Free NetFlow Analyzer training - Getting the initial settings right
ManageEngine, Zoho Corporation
 
SFScon 2020 - Alex Lanz Martin Malfertheiner - OAuth2 OpenID
 SFScon 2020 - Alex Lanz Martin Malfertheiner - OAuth2 OpenID SFScon 2020 - Alex Lanz Martin Malfertheiner - OAuth2 OpenID
SFScon 2020 - Alex Lanz Martin Malfertheiner - OAuth2 OpenID
South Tyrol Free Software Conference
 
NetFlow Analyzer Training Part I: Getting the initial settings right
NetFlow Analyzer Training Part I: Getting the initial settings rightNetFlow Analyzer Training Part I: Getting the initial settings right
NetFlow Analyzer Training Part I: Getting the initial settings right
ManageEngine, Zoho Corporation
 
From Data Push to WebSockets
From Data Push to WebSocketsFrom Data Push to WebSockets
From Data Push to WebSockets
Alessandro Alinone
 
OSMC 2009 | net-snmp: The forgotten classic by Dr. Michael Schwartzkopff
OSMC 2009 | net-snmp: The forgotten classic by Dr. Michael SchwartzkopffOSMC 2009 | net-snmp: The forgotten classic by Dr. Michael Schwartzkopff
OSMC 2009 | net-snmp: The forgotten classic by Dr. Michael Schwartzkopff
NETWAYS
 
Export flows, group traffic, map application traffic and more: NetFlow Analyz...
Export flows, group traffic, map application traffic and more: NetFlow Analyz...Export flows, group traffic, map application traffic and more: NetFlow Analyz...
Export flows, group traffic, map application traffic and more: NetFlow Analyz...
ManageEngine, Zoho Corporation
 
OpManager-Overview-30-9-14.pdf
OpManager-Overview-30-9-14.pdfOpManager-Overview-30-9-14.pdf
OpManager-Overview-30-9-14.pdf
ssusera181ef
 
amrapali builders@@@hacking d link routers with hnap.pdf
amrapali builders@@@hacking d link routers with hnap.pdfamrapali builders@@@hacking d link routers with hnap.pdf
amrapali builders@@@hacking d link routers with hnap.pdf
amrapalibuildersreviews
 
The missing signalling layer for WebRTC
The missing signalling layer for WebRTCThe missing signalling layer for WebRTC
The missing signalling layer for WebRTC
WebRTCConferenceJapan
 
RedIRIS Identity Service latest news and developments - Jamie Perez
  RedIRIS Identity Service latest news and developments - Jamie Perez  RedIRIS Identity Service latest news and developments - Jamie Perez
RedIRIS Identity Service latest news and developments - Jamie Perez
Eduserv
 
HAProxy as Egress Controller
HAProxy as Egress ControllerHAProxy as Egress Controller
HAProxy as Egress Controller
Julien Pivotto
 
Martin Zeiser, Universal Pwn n Play - pacsec -final
Martin Zeiser, Universal Pwn n Play - pacsec -finalMartin Zeiser, Universal Pwn n Play - pacsec -final
Martin Zeiser, Universal Pwn n Play - pacsec -final
PacSecJP
 
Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesCe hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologies
Vi Tính Hoàng Nam
 
Open Management Using OSGi Technology Enabled Services - Stéphane Frénot, Ass...
Open Management Using OSGi Technology Enabled Services - Stéphane Frénot, Ass...Open Management Using OSGi Technology Enabled Services - Stéphane Frénot, Ass...
Open Management Using OSGi Technology Enabled Services - Stéphane Frénot, Ass...
mfrancis
 
[OSSParis 2015] The OpenID Connect Protocol
[OSSParis 2015] The OpenID Connect Protocol[OSSParis 2015] The OpenID Connect Protocol
[OSSParis 2015] The OpenID Connect Protocol
Clément OUDOT
 

Similar to Lemonldap::NG, open-source Web-SSO of the french administrations (20)

[LDAPCon 2015] The OpenID Connect Protocol
[LDAPCon 2015] The OpenID Connect Protocol[LDAPCon 2015] The OpenID Connect Protocol
[LDAPCon 2015] The OpenID Connect Protocol
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
 
Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3Comodo my dlp_techpresentation_060615_v3
Comodo my dlp_techpresentation_060615_v3
 
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
 
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
The Bot Stops Here: Removing the BotNet Threat - Public and Higher Ed Securit...
 
Free NetFlow Analyzer training - Getting the initial settings right
Free NetFlow Analyzer training - Getting the initial settings rightFree NetFlow Analyzer training - Getting the initial settings right
Free NetFlow Analyzer training - Getting the initial settings right
 
SFScon 2020 - Alex Lanz Martin Malfertheiner - OAuth2 OpenID
 SFScon 2020 - Alex Lanz Martin Malfertheiner - OAuth2 OpenID SFScon 2020 - Alex Lanz Martin Malfertheiner - OAuth2 OpenID
SFScon 2020 - Alex Lanz Martin Malfertheiner - OAuth2 OpenID
 
NetFlow Analyzer Training Part I: Getting the initial settings right
NetFlow Analyzer Training Part I: Getting the initial settings rightNetFlow Analyzer Training Part I: Getting the initial settings right
NetFlow Analyzer Training Part I: Getting the initial settings right
 
From Data Push to WebSockets
From Data Push to WebSocketsFrom Data Push to WebSockets
From Data Push to WebSockets
 
OSMC 2009 | net-snmp: The forgotten classic by Dr. Michael Schwartzkopff
OSMC 2009 | net-snmp: The forgotten classic by Dr. Michael SchwartzkopffOSMC 2009 | net-snmp: The forgotten classic by Dr. Michael Schwartzkopff
OSMC 2009 | net-snmp: The forgotten classic by Dr. Michael Schwartzkopff
 
Export flows, group traffic, map application traffic and more: NetFlow Analyz...
Export flows, group traffic, map application traffic and more: NetFlow Analyz...Export flows, group traffic, map application traffic and more: NetFlow Analyz...
Export flows, group traffic, map application traffic and more: NetFlow Analyz...
 
OpManager-Overview-30-9-14.pdf
OpManager-Overview-30-9-14.pdfOpManager-Overview-30-9-14.pdf
OpManager-Overview-30-9-14.pdf
 
amrapali builders@@@hacking d link routers with hnap.pdf
amrapali builders@@@hacking d link routers with hnap.pdfamrapali builders@@@hacking d link routers with hnap.pdf
amrapali builders@@@hacking d link routers with hnap.pdf
 
The missing signalling layer for WebRTC
The missing signalling layer for WebRTCThe missing signalling layer for WebRTC
The missing signalling layer for WebRTC
 
RedIRIS Identity Service latest news and developments - Jamie Perez
  RedIRIS Identity Service latest news and developments - Jamie Perez  RedIRIS Identity Service latest news and developments - Jamie Perez
RedIRIS Identity Service latest news and developments - Jamie Perez
 
HAProxy as Egress Controller
HAProxy as Egress ControllerHAProxy as Egress Controller
HAProxy as Egress Controller
 
Martin Zeiser, Universal Pwn n Play - pacsec -final
Martin Zeiser, Universal Pwn n Play - pacsec -finalMartin Zeiser, Universal Pwn n Play - pacsec -final
Martin Zeiser, Universal Pwn n Play - pacsec -final
 
Ce hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologiesCe hv6 module 54 proxy server technologies
Ce hv6 module 54 proxy server technologies
 
Open Management Using OSGi Technology Enabled Services - Stéphane Frénot, Ass...
Open Management Using OSGi Technology Enabled Services - Stéphane Frénot, Ass...Open Management Using OSGi Technology Enabled Services - Stéphane Frénot, Ass...
Open Management Using OSGi Technology Enabled Services - Stéphane Frénot, Ass...
 
[OSSParis 2015] The OpenID Connect Protocol
[OSSParis 2015] The OpenID Connect Protocol[OSSParis 2015] The OpenID Connect Protocol
[OSSParis 2015] The OpenID Connect Protocol
 

Recently uploaded

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

Lemonldap::NG, open-source Web-SSO of the french administrations

  • 1. Open-Source Web-SSO of the french administrations
  • 2. What is « Gendarmerie Nationale » 4300 agencies ● (300 overseas) 105000 users ● 1 private network ● connecting all agencies 2 datacenters ●
  • 3. What is Lemonldap::NG A powerful distributed Web-SSO system : ● an assembly of well tested open-source libraries ● based on ModPerl API to run inside Apache ● It centrally manages authentication, user's ● attributes propagation and access control It includes a sophisticated access rights ● management
  • 4. History of the project 2002 : First Web-SSO launched on the Gendarmerie's network ● 2003 : Lemonldap developed by the Ministry of finance ● 2004 : Studies to replace existing Gendarmerie's Web-SSO ● 2005 : Lemonldap::NG developped and deployed by ● Gendarmerie 2006 : Lemonldap::NG is chosen by Feder-Id project to ● become a Liberty-Alliance Service Provider 2009 : Gendarmerie is funding the SAML-2 extension ●
  • 5. Lemonldap::NG on the Gendarmerie's network 105.000 users ● average of 40,000 sessions at the same time ● about 100 protected applications (98% of the whole) ● among which : all specific applications (J2EE and PHP) ● SAP ● Fudforum ● Mediawiki ● Sympa management interface ● Nagios (all applications based on Apache htaccess) ● ... ●
  • 7. Double cookie Separated protection for HTTP and HTTPS ● connections, so that less secured applications don't weaken the other ones POST / HTTP/1.1 Host: authentification.gendarmerie.fr HTTP/1.x 200 OK Date: Tue, 24 Mar 2009 14:18:08 GMT Server: Apache Set­Proxy­Cookie: lmproxy=4c640e7ff9450bd3cc65c069f3fa920e;                    domain=gendarmerie.fr; path=/ Set­Cookie: lemonldap=d8a6a10a88bcfcdddd4906ad55119ad2;                    domain=gendarmerie.fr; path=/; secure Set­Cookie: lemonldaphttp=ae92a75d4c15dd3d5eae40ce386594e7;                    domain=gendarmerie.fr; path=/ ...
  • 8. Internet authentication « Proxy-Cookie » enables the Single-Sign-On ● to control the access to Internet POST / HTTP/1.1 Host: authentification.gendarmerie.fr HTTP/1.x 200 OK Date: Tue, 24 Mar 2009 14:18:08 GMT Server: Apache Set­Proxy­Cookie: lmproxy=4c640e7ff9450bd3cc65c069f3fa920e;                    domain=gendarmerie.fr; path=/ Set­Cookie: lemonldap=d8a6a10a88bcfcdddd4906ad55119ad2;                    domain=gendarmerie.fr; path=/; secure Set­Cookie: lemonldaphttp=ae92a75d4c15dd3d5eae40ce386594e7;                    domain=gendarmerie.fr; path=/ ...
  • 10. Performances Overhead of 3ms per hit ● Average of 40.000 sessions at the same time ● servers can check more than 3000 queries by ● minutes without any slowdown
  • 12. Development environment Principles : ● developers must have a valid account (the « real ● user's account ») they can choose any other account (the « spoofed ● user's account ») to test access control accounting and access rules involve both spoofed ● user's and real user's attributes
  • 14. Session Explorer Accounting is done with both identities (spoofed user's / real user's)
  • 15. Sharing authentication with remote applications Extending the core environment with additional ● features to enable sharing of authentication with remote applications : only a short list of attributes is exported to remote ● applications
  • 17. Client-Server over HTTP Lemonldap::NG provides 2 ways to control ● access from non-browser clients : SOAP authentication : the client gets a cookie with ● a SOAP request, then uses the cookie as a normal browser HTTP Auth-Basic authentication : the application is ● protected by an agent (handler) which requests the portal by SOAP using user/password transmitted by the client (by Auth-Basic mechanism) : authorization still uses Lemonldap::NG rules –
  • 18. Conclusion Cost of the project (for the Gendarmerie) : ● 4 servers ● 4 months of work for 1 developper ● Result : ● a flexible and suitable solution ●