"CAS を利用した Single Sign On 環境の構築"

Similar documents
"CAS を利用した Single Sign On 環境の構築"

Dec , IS p. 1/60

"CAS を利用した Single Sign On 環境の構築"

Plan of Talk CAS CAS 2 CAS Single Sign On CAS CAS 2 CAS Aug. 19, 2005 NII p. 2/32

main.dvi

CAS Yale Open Source software Authentication Authorization (nu-cas) Backend Database Authentication Authorization Powered by A

Windows Oracle -Web - Copyright Oracle Corporation Japan, All rights reserved.

Oracle Identity Managementの概要およびアーキテクチャ

Web Web ( (SOAP (SOAP/http (WSDL UDDI 1. 2.XML 3. (XDoS http, https SOAP XML Web/App ( App

1: 3 CAS[3] uportal[4] (Web ) 3.1 CAS CAS[3] Yale JA-SIG [5] CAS 1. 2(1) CAS Web (2)CAS ID LDAP 2. 2(3) CAS Web CAS Ticket (4)Web Ticket 3. Ticket Web

Oracle Calendar Oracle Collaboration Suite 2(9.0.4) Creation Date: Jun 04, 2003 Last Update: Nov 18, 2003 Version:

内閣官房情報セキュリティセンター(NISC)

untitled

25 About what prevent spoofing of misusing a session information


Oracle Web Conferencing Oracle Collaboration Suite 2 (9.0.4) Creation Date: May 14, 2003 Last Update: Jan 21, 2005 Version: 1.21

Oracle Secure Enterprise Search 10gを使用したセキュアな検索

PowerPoint プレゼンテーション

<Documents Title Here>

untitled

7,, i

2

Web ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval

Oracle Application Server 10g(9

<Documents Title Here>

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A

<Documents Title Here>

Web STEPS Web Web Form Cookie HTTP STEPS Web

組織変更ライブラリ

Cisco® ASA シリーズルーター向けDigiCert® 統合ガイド

untitled

Oracle Application Server 10g( )インストール手順書

HP cafe HP of A A B of C C Map on N th Floor coupon A cafe coupon B Poster A Poster A Poster B Poster B Case 1 Show HP of each company on a user scree

スライド 1

<Insert Picture Here> Oracle Business Intelligence 2006/6/27

shio_ PDF

FileMaker Server Getting Started Guide

Encryption Security

IPSJ SIG Technical Report Vol.2013-GN-86 No.35 Vol.2013-CDS-6 No /1/17 1,a) 2,b) (1) (2) (3) Development of Mobile Multilingual Medical

BIG‑IP Access Policy Manager | F5 Datasheet

FirePass Edge Client TM Edge Client LAN Edge Client 7.0 Edge Client Edge Client Edge Client Edge Client Edge Client Edge Client LAN Edge Client VPN Wi

Web Web Web Web i

SAML

1. PKI (EDB/PKI) (Single Sign On; SSO) (PKI) ( ) Private PKI, Free Software ITRC 20th Meeting (Oct. 5, 2006) T. The University of Tokush

_‚Ofl¼

¥Í¥Ã¥È¥ï¡¼¥¯¥×¥í¥°¥é¥ß¥ó¥°ÆÃÏÀ

橡CoreTechAS_OverView.PDF

rzat10pdf.ps

Epson Print Admin

etrust Access Control etrust Access Control UNIX(Linux, Windows) 2

,,, J-SOX ISMS PCIDSS,, IM/VoIP/VoD Copyright 2008 Juniper Networks, Inc. 2

Oracle Application Server 10g(9

雲の中のWebアプリケーション監視術!~いまなら間に合うクラウド時代の性能監視入門~

ICカード利用システムにおいて新たに顕現化したPre-play attackとその対策

2 BIG-IP 800 LTM v HF2 V LTM L L L IP GUI VLAN.

 

第2回_416.ppt

ppt

SSO Sales/Tech combined webinar template

DEIM Forum 2010 D Development of a La

LWW EJ on Ovid LWW Ovid Online (Ovid Web Gateway) Ovid Online LWW tutorial Ovid Online Refresh Ovid Online LWW Ovid Medline, Cinahl, EBMR, Ovid

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

11 Windows XP IP WEP (Web )

i

/07/ /10/12 I

OpenAM(OpenSSO) のご紹介

WIDE 1

Epson Print Admin

P2P? ( )? ( SOX ) ( ) COPYRIGHT 2005 SSH COMMUNICATIONS SECURITY CORP. ALL RIGHTS RESERVED. 2

Aventail EX-2500/1600/750 STv(Ver.8.9) Sep 2007 c 2007 SonicWALL,Inc. All rights reserved.

untitled

DocuCentre-III C3300 / C2200

Microsoft Word - D JP.docx

rzammpdf.ps

untitled

3. RIR 3.1. RIR Regional Internet Registry APNIC Asia Pacific Network Information Centre RIR RIPE NCC Réseaux IP Européens Network Coordination Centre

HIS-CCBASEver2

○広島大学職員任免規則\(案\)

○広島大学船員就業規則

3_23.dvi

Microsoft Word - KUINS-Air_W10_ docx

橡CoreTechDS_Overview.PDF

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR

2

wp_integrating_active_directory_ml

1 Gumblar Fig. 1 Flow of Gumblar attack. Fig. 2 2 RequestPolicy Example of operation based on RequestPolicy. (3-b) (4) PC (5) Web Web Web Web Gumblar

IPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka

FileMaker Server Getting Started Guide

iPhone/iPad/Android(TM) とベリサイン アイデンティティプロテクション(VIP)エンタープライズゲートウェイとの組み合わせによるL2TP+IPsecのワンタイムパスワード設定例

untitled

wp_integrating_AD_10.9_16JAN2014

<Documents Title Here>

untitled

Lync Server 2010 Lync Server Topology Builder BIG-IP LTM Topology Builder IP Lync 2010 BIG IP BIG-IP VE Virtual Edition BIG-IP SSL/TLS BIG-IP Edge Web

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

XMLアクセス機能説明書

honbun.indd

IW2001-B2 1 Internet Week 2001 ( ) Copyright 2001 All Rights Reserved, by Seiji Kumagai IW2001-B2 2 CodeRed Copyright 2001 All Rights

Liberty for XML cons

JP1/Integrated Management - Service Support 操作ガイド

Transcription:

CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40

Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary Jan. 30 2007, p. 2/40

>. Example IP Jan. 30 2007, p. 3/40

> > UserID Password DB Single Sign On DB Jan. 30 2007, p. 4/40

>... CAS...... Jan. 30 2007, p. 5/40

> CAS SSO CAS CAS Jan. 30 2007, p. 6/40

Brief survey of SSO using CAS CAS (Central Authentication Service) Web Application Single Sign On (SSO) Yale University, JA-SIG Open Source Cookie, http direction, JavaScript SSL (https) DB, DB DB Web Application CAS Jan. 30 2007, p. 7/40

Brief... using CAS > Usual Authentication Web Browser 1 Web Application Web Application DB Web Application DB Web Application 2 USER DB Jan. 30 2007, p. 8/40

Brief... using CAS > AuthN mechanisum of CAS USER DB Web Application Sending Ticket Data / Its Reply AuthN CAS Server AuthN Data Web Browser Web Application CAS client library Web Application DB Jan. 30 2007, p. 9/40

Brief... using CAS > Web Browser USER DB AuthN 1 Web Application Sending Ticket Data / Its Reply CAS Server Web Application AuthN Data 2 Web Browser USER DB App. SSL... CAS App. Jan. 30 2007, p. 10/40

Brief... using CAS > AuthN mechanisum of CAS Ticket Granting Cookie (TGC) Cookie Browser TGC Service Ticket (ST) URL Parameter App. One Time Ticket App. CAS Server ST = Jan. 30 2007, p. 11/40

Brief... using CAS > AuthN mechanisum of CAS TGC App. CAS Server Login Window WEB Browser 1. Access 2a. Redirection 2b. Login Window WEB Application https://app.foo/ CAS Server User DB CAS Server TGC App. ST ST WEB Application WEB Browser 4. Redirection with TGC/ST TGC CAS Server 3a. Input User ID/Password 3b. Authentication 3c. Result User DB Jan. 30 2007, p. 12/40

Brief... using CAS > AuthN mechanisum of CAS App. ST CAS Server ST WEB Browser 6. Response WEB Application 5a. Send ST ST 5b. Validation Result CAS Server User DB Jan. 30 2007, p. 13/40

Brief... using CAS > AuthN mechanisum of CAS TGC App. CAS Server redirection WEB Browser TGC 1. Access WEB Application 2a. Redirection https://app.foo/ TGC CAS Server User DB TGC App. ST WEB Browser TGC ST 4. Redirection with ST WEB Application CAS Server User DB TGC Login Window Jan. 30 2007, p. 14/40

Brief... using CAS > CAS ST, App. (current version fix ) CAS Server App. User ID POST method CAS 2 Authorization Jan. 30 2007, p. 15/40

Brief survey of Authorization Environment using CAS 2 CAS 2 (Central Authentication and Authorization Service) CAS ST App. DB CAS Server App. CAS Web Application CAS 2 module FOR WHICH (URL of Web Application) WHO (User) WHEN (Access Time) FROM WHERE (Client) Jan. 30 2007, p. 16/40

Brief... using CAS 2 > Access Control List CAS 2 CAS-ACL dn: cn=entry1,ou=gakumu,ou=cas,o=nagoyauniv cas-allow: (&(uid=naito)(date>=20051010) (date<=20051110)(ip=133.6.130.0/24)) cas-service: https://app.*\.mynu\.jp/.+ cas-attributes: uid,mail URL https://app.*\.mynu\.jp/.+ uid is naito Access time is between 2005/10/10 and 2005/11/10 Client IP: 133.6.130.0/24 Jan. 30 2007, p. 17/40

Brief... using CAS 2 > Access Control List CAS 2 CAS-ACL dn: cn=entry1,ou=gakumu,ou=cas,o=nagoyauniv cas-allow: (&(uid=naito)(date>=20051010) (date<=20051110)(ip=133.6.130.0/24)) cas-service: https://app.*\.mynu\.jp/.+ cas-attributes: uid,mail cas-attributes App.. App. Jan. 30 2007, p. 18/40

Brief... using CAS 2 > AuthZ mechanisum of CAS App. App. URL redirection App. URL CAS-ACL ST WEB Browser TGC ST 2. Redirection with ST WEB Application CAS Server 1a. Authorization 1b. Result CAS-ACL Access Denied Jan. 30 2007, p. 19/40

Brief... using CAS 2 > AuthZ mechanisum of CAS App. ST CAS Server App. URL ST CAS-ACL ST Man-in-Middle Attack ST App. WEB Browser TGC 6. Response WEB Application 3. Send ST ST 5. Validation CAS Server 4a. Authorization 4b. Result CAS-ACL Jan. 30 2007, p. 20/40

Brief... using CAS 2 > AuthZ mechanisum of CAS, ST Access Denied redirection WEB Browser TGC 1. Access Invalid ST WEB Application 5. Redirection 2. Send ST Invalid ST 4. Invalid CAS Server 3a. Authorization 3b. Result CAS-ACL Jan. 30 2007, p. 21/40

CAS 2 CAS 2 CAS 2 CAS 2,... Jan. 30 2007, p. 22/40

> CAS Server CAS Server access log 1000, 3000 Oracle, Jan. 30 2007, p. 23/40

> ID,..., CAS, DB LDAP... Jan. 30 2007, p. 24/40

> ID DB... CAS... CAS DB... CAS DB, DB App. CAS Jan. 30 2007, p. 25/40

> CAS-ACL,. CAS-ACL Role Management = Identity Management Role Management = Jan. 30 2007, p. 26/40

SSO PKI ( ), Jan. 30 2007, p. 27/40

> IC Card with PKI... IC Card BBS light PKI IC Card Reader, BBS SSO/AuthZ Jan. 30 2007, p. 28/40

> Example CAS 2 SSO requirement : requirement :, BBS requirement :,.... Jan. 30 2007, p. 29/40

> Example 3-tiered security hierarchy Level 2 Level 1 Username/Password authentication Level 0 Subscriber ID Level = Level 2 = Level 1 BBS = Level 0 Jan. 30 2007, p. 30/40

> Mutiple-tiered secuirty hierarchy hierarchy CAS 2 Level 2 User Level 2 Application Level 1 User Level 1 Application Level 0 User Level 0 Application Jan. 30 2007, p. 31/40

> CAS 2 secuirty hierarchy CAS-ACL security level CAS-ACL FOR WHICH (URL of Web Application) WHO (User) WHEN (Access Time) FROM WHERE (Client) HOW (Security Level) CAS 2 multiple-tiered AuthN sequence CAS 2 Jan. 30 2007, p. 32/40

... > CAS 2... > security level in CAS-ACL dn: cn=entry1,ou=gakumu,ou=cas,o=nagoyauniv cas-allow: (&(uid=naito)(date>=20051010) (date<=20051110)(ip=133.6.130.0/24)) cas-security-hierarchy: X509 cas-service: https://app.*\.mynu\.jp/.+ cas-attributes: uid,mail URL https://app.*\.mynu\.jp/.+ ACL X509 (Level 2) Jan. 30 2007, p. 33/40

... > CAS 2... > Modify AuthN mechanism in CAS 2 fall down sequence TGC DB... CAS (version 3) SpringFramework Multiple-tiered AuthN sequence Dependancy Injection Multiple-tiered AuthN sequence Jan. 30 2007, p. 34/40

... > CAS 2... > Modify AuthN mechanism in CAS 2 Example 3-tiered hierarchy... bean bean class="x509credentialstoprincipalhandler" property name="loginlevel" value="x509" bean class="bindldapauthenticationhandler" property name="loginlevel" value="pin_uid" bean class="subscriberidldapauthenticationhandler" property name="loginlevel" value="subscriberid" Login Level bean <list> <value>subscriberid</value> <value>pin_uid</value> <value>x509</value> </list> Jan. 30 2007, p. 35/40

... > CAS 2... > Modify AuthZ mechanism in CAS 2 Case 1 : Level 2 Authentication Level 2 TGC Level 2 App. Web Browser TGC with Level 2 ST 2. Redirection 1. Access with client certificate Web Application with Security Level 2 CAS Server Jan. 30 2007, p. 36/40

... > CAS 2... > Modify AuthZ mechanism in CAS 2 Case 2 : Level 1 Level 2 App. ST Web App. CAS Server redirect, Level 2 App. Level 2 TGC Web Browser TGC with Level 1 1. Access 2. Redirection to obtain client certification Web Application with Security Level 2 CAS Server Jan. 30 2007, p. 37/40

Summary CAS 2 SSO/AuthZ. CAS 2 SSO/AuthZ.,. CAS-ACL. SSO/AuthZ,, CAS 2 Beta Version Jan. 30 2007, p. 38/40

References,,,,, CAS, 47 (2006) 1127 1135. Naito, Kajita, Hirano, Mase, Multiple-tiered Security Hierarachy for Web Applications Using Central Authentication and Authorization Service, Proceeding of Middleware Workshop on IEEE International Symposium on Applications and the Internet (SAINT 2007), Hiroshima, JAPAN (2007). Jan. 30 2007, p. 39/40

Q and A Jan. 30 2007, p. 40/40