18
Authentication via campus single sign-on 2012 VIVO Implementation Fest

Authentication via campus single sign-on 2012 VIVO Implementation Fest

Embed Size (px)

Citation preview

Page 1: Authentication via campus single sign-on 2012 VIVO Implementation Fest

Authentication via campus single sign-on

2012 VIVO Implementation Fest

Page 2: Authentication via campus single sign-on 2012 VIVO Implementation Fest

2

Welcome & Who are we?

Vincent Sposato, University of FloridaEnterprise Software EngineeringPrimarily focused on VIVO operations and reproducible harvests

Alex Viggio, Colorado UniversityOffice of Faculty AffairsFIS Developer

Page 3: Authentication via campus single sign-on 2012 VIVO Implementation Fest

3

Goals of this session

• Provide you with a why for single sign-on

• Provide a basic implementation of a single sign-on solution, as implemented at UF

• Answer questions

Page 4: Authentication via campus single sign-on 2012 VIVO Implementation Fest

Why Single Sign-On?

Page 5: Authentication via campus single sign-on 2012 VIVO Implementation Fest

5

What is single sign-on?

• Is a property of access control of multiple related, but independent software systems

• Is usually an independent authentication system, with stricter rules, that provides confirmation of identity to these systems

• Is often thought to be the unicorn of authentication, as many have heard of it but no one has truly seen it

• Has been referred to as Enterprise Reduced Sign-On

Page 6: Authentication via campus single sign-on 2012 VIVO Implementation Fest

6

Why single sign-on?

• Reduces ‘password fatigue’ from remembering multiple usernames and passwords for different systems

• Reduces amount of duplicating password entry for same user within same environment

• Provides for enforcement of more robust security requirements and compliance reporting, since there is a centralized authentication mechanism

Page 7: Authentication via campus single sign-on 2012 VIVO Implementation Fest

7

Why not single sign-on?

• Potential for increased risk should identities be compromised, as single sign-on gives the ‘keys’ to the castle away

• Loss of singular authentication system, would result in denial of service to a large amount of systems

• Can be difficult to integrate with older systems, and /or closed systems that do not natively support separate authentication

Page 8: Authentication via campus single sign-on 2012 VIVO Implementation Fest

8

Who has single sign-on

Every Major Institution in the world …

That we know of

Page 9: Authentication via campus single sign-on 2012 VIVO Implementation Fest

9

Typical SSO Implementations• Kerberos

– Once authenticated a ticket-granting ticket is given to the system– This TGT is handed around to gain authentication to other systems that

support

• Smart Card– Use of a password to unlock the Smart Card– Other applications make call to the Smart Card without further need to

provide password

• One Time Password (OTP)– RSA SecurID is an example of a OTP, and is the standard for 2-Factor

Authentication

• Integrated Windows Authentication (Active Directory)– Microsoft standard for integrating credentials between supporting systems

– uses Kerberos, SPNEGO, and NTLMSSP – to accomplish SSO

• Shibboleth– Open-source federated identity-based authentication and authorization

system based on Security Assertion Markup Language (SAML)

Page 10: Authentication via campus single sign-on 2012 VIVO Implementation Fest

10

What do I need to have?

• Guides about the Identity Management System @ your institution

• The required software for your identity management system installed and configured on your VIVO application server

Page 11: Authentication via campus single sign-on 2012 VIVO Implementation Fest

Implementing Shibboleth

Page 12: Authentication via campus single sign-on 2012 VIVO Implementation Fest

12

How does it all work

Page 13: Authentication via campus single sign-on 2012 VIVO Implementation Fest

13

Setting up the Server to Secure VIVO

• You can use shibboleth.xml to secure applications

• We use the apache configuration files• Add the following lines fix confusion

between tomcat, apache, and shibboleth

JkUnMount /Shibboleth.ssso/* defaultJkUnMount /Shibboleth defaultJkUnMount /shibboleth-sp/* default

Page 14: Authentication via campus single sign-on 2012 VIVO Implementation Fest

14

Setting up the Server to Secure VIVO

• Next we need to specify the location of VIVO login processing /loginExternalAuth and turn on shibboleth for that file

<Location /loginExternalAuth>AuthType shibbolethShibRequireSession Onrequire valid-userrequire shibbolethShibUseHeaders On

</Location>

Page 15: Authentication via campus single sign-on 2012 VIVO Implementation Fest

15

Setting up VIVO for the SSO

• Most SSO pass an apache header variable once authenticated. If they don’t you’ll need to write an application to generate one based on its method of passing the authenticated users information

• Set in your configuration file– external.Auth.netIDHeaderName

Page 16: Authentication via campus single sign-on 2012 VIVO Implementation Fest

16

Setting up VIVO for the SSO

• Its not always easy to change styles and pages in VIVO for someone who isn’t a web designer. So instead of keeping the login text generic with “Login” we can change the text from the deploy properties file. – externalAuth.buttonText

Page 17: Authentication via campus single sign-on 2012 VIVO Implementation Fest

17

Setting up VIVO for the SSO

• You need to have in your VIVO a data property populated with the identifying information that will come from your SSO. This is used to associate an individual with their profile in VIVO

• Set that data property into– selfEditing.idMatchingPropertyTo– http://vivo.mydomain.edu/ontology/vivo-

md/institutionid

Page 18: Authentication via campus single sign-on 2012 VIVO Implementation Fest

Questions?