This is my notes. The official presentation slides will be at:
http://www.ja-sig.org/wiki/display/JCON/Denver+2007+presentations
presented by Scott Battaglia, Rutgers University
CAS 3.1 -- Current Release 3.1 RC2presented by Scott Battaglia, Rutgers University
- CAS 3 continues to support CAS 1 and CAS2 protocol
- Functional Improvements:
- Only way to get proxied authentication
- SAML1.1 -- 2.0, see Google Applications
- OASIS stanbdard
- XML based
- Communicates: Authentication/ Entitlement/ Attribute
- OpenID
I got my free one from https://pip.verisignlabs.com/account/welcome - Decentralized framework for user-center digital identify
- User name is URI
- Support "dumb" mode
- Allows CAS clients -> OpenID clients
- Single Sign Out
- Global CAS session / Individual Applciation sessions
- CAS 1/2/3 Logout ends global session
- CAS 3.1 "suggests" that a;; sessions end
- Google Accounts Integration
- Minimal SAML 2
- Key sharing b/e Google Accounts
- Allow Google Accounts to participate in existing SSO solution
- Services Management
- Optional Feature
- Control what services access CAS
- Control what features they have access to, i.e. proxy ..
- Customize Skin - Theme
- Selective attribute(s) to be sent back --> SAML2
- Attributes
- AttributeRepository defines "interesting" attributes
- Services Management dictates who sees what
- CAS sends those attributes to services
- Chaining Attributes - securitycontext
- Pseudo anonymous Support --> Shibboleth
ref. Authentication and Authorization
* http://webjunction.org/do/DisplayContent?id=10858 - send a persistent random identifier
- only identifies user with respect to service
- Authentication Support
- Add support for: NTLM/SPNEGO/RADIUS
- On top of: LDAP; DATABASE; X.509; JASS; FILE ...
- Performance improvements
- Building & Implementation
- Maven 2 - POM
- Ticket Registry
- BerkeleyDBTicketRegistry - Long Term
- JBossCacheTicketRegistry - Distributed
-> multicast - DefaultTicketRegistru - Simple, in-memory, single-instance CAS
- Java 5 requried
- Content Switch / Load Balancer is still recommended
SAML2
http://www.xml.com/pub/a/2005/01/12/saml2.html
What Is SAML? SAML defines an XML-based framework for communicating security and identity (e.g., authentication, entitlements, and attribute) information between computing entities. SAML promotes interoperability between disparate security systems, providing the framework for secure e-business transactions across company boundaries. By abstracting away from the particulars of different security infrastructures (e.g., PKI, Kerberos, LDAP, etc), SAML makes possible the dynamic integration necessary in today's constantly changing business environments.
What Isn't SAML? SAML does not standardize all aspects of identity management. SAML addresses one key aspect of identity management, namely that of how identity information can be communicated from one domain to another. A full identity management solution will also define mechanisms for, amongst other aspects, provisioning (the establishment and subsequent management of accounts and associated privileges), authentication (how an entity proves their right to lay claim to a particular identity), or access control (how the rules for specifying what individual identities are allowed to do are captured). SAML has been designed to be compatible with existing and emerging standards that address these other aspects
No comments:
Post a Comment