Transcript
Page 1: Practical Approaches to Web Services Authentication

®

Practical Approaches toPractical Approaches toWeb Services AuthenticationWeb Services Authentication

72nd OGC Technical Committee

Frascati, Italy

Fiona Culloch

March 9, 2010

Sponsored and hosted byESA/ESRIN

Page 2: Practical Approaches to Web Services Authentication

OGC®

Federated Authentication

Page 3: Practical Approaches to Web Services Authentication

OGC®

User Selects Identity Provider

Page 4: Practical Approaches to Web Services Authentication

OGC®

Enters Credentials at IdP

Page 5: Practical Approaches to Web Services Authentication

OGC®

Logged in to Service Provider

Page 6: Practical Approaches to Web Services Authentication

OGC®

Browser-Based Federation Mature

• Implementations– Open-source

• Shibboleth

• SimpleSAMLphp, …

– Commercial• OpenAthens

• Sun

• Novell, …

• Policy infrastructure– Many national federations

Page 7: Practical Approaches to Web Services Authentication

OGC®

But…

• Doesn’t work for non-browser clients!

Page 8: Practical Approaches to Web Services Authentication

OGC®

Why Not?

• The protocols (SAML) require:– HTTP redirection– Cookies– SSL/TLS– User input (usernames, passwords, etc.)– (X)HTML processing

• Web service clients may not support any of these!– (OGC Authentication IE client survey)

• Making IdP discovery/interaction impossible

Page 9: Practical Approaches to Web Services Authentication

OGC®

One Solution Identified

• By UK JISC-funded EDINA project SEE-GEO (2006–08)– Initiated and led by EDINA geospatial team– With input from

• AM Consult (Andreas Matheus)

• UK federation (JISC/EDINA SDSS project)

• Shibboleth Core Team (Chad La Joie)

Page 10: Practical Approaches to Web Services Authentication

OGC®

Concept

• Separate– Client flow (XML over HTTP)– From browser authentication flow (HTML, SAML over HTTP)

• In the client flow– URI must contain valid token– Token validated by browser authentication flow

Page 11: Practical Approaches to Web Services Authentication

OGC®

Authenticating Proxy (“Façade”)

OWS

Façade

Client

http://proxy/...438657...XML

XML

Page 12: Practical Approaches to Web Services Authentication

OGC®

Façade Has Two Faces

OWS

Façade

Client

http://url1/...438657...XML

XMLBrowserSAML

HTML

SP

http://url2/...438657...

Page 13: Practical Approaches to Web Services Authentication

OGC®

Façade Separates Auth. from Application

Façade OWS

SAML, Fed., X.509, Auth. Policy, …

OWS,WMS, WFS, …

Sys. admin.,Auth. policy

(Someone else’s problem!)

App. design,OGC standards,…

(Your problem)

Page 14: Practical Approaches to Web Services Authentication

OGC®

SEE-GEO Work Being Taken Forward

• In the OGC (1H 2010)– Authentication Interoperability Experiment

• Interoperability testing

• Investigate best choice of SAML protocols, bindings

• At EDINA– JISC-funded project WSTIERIA (2010)

• Generalise from OWS to any WS

• Abstract from SAML protocols, bindings to Shibboleth concept of “protected service”

Page 15: Practical Approaches to Web Services Authentication

OGC®

Meanwhile, Elsewhere…

• Shibboleth Core Team / U. of Chicago have developed– Shibboleth extension for web services

• Based on SAML 2.0 Enhanced Client Proxy (ECP)

• Client libraries (for Java, …)

• Supports N-tier use cases!

Page 16: Practical Approaches to Web Services Authentication

OGC®

So Why Bother With Façade?

• No client library required• SAML 2.x / Shibboleth 2.x not required

– As of December 2009, only ~20% of UK federation IdPs SAML 2.0

• Few / zero client modifications required• WSTIERIA taking both approaches forward

Page 17: Practical Approaches to Web Services Authentication

OGC®

Call to Action

• Any volunteer clients?

• Contact us! [email protected]


Top Related