Web Single Sign-On Authentication using SAML
📝 Abstract
Companies have increasingly turned to application service providers (ASPs) or Software as a Service (SaaS) vendors to offer specialized web-based services that will cut costs and provide specific and focused applications to users. The complexity of designing, installing, configuring, deploying, and supporting the system with internal resources can be eliminated with this type of methodology, providing great benefit to organizations. However, these models can present an authentication problem for corporations with a large number of external service providers. This paper describes the implementation of Security Assertion Markup Language (SAML) and its capabilities to provide secure single sign-on (SSO) solutions for externally hosted applications.
💡 Analysis
Companies have increasingly turned to application service providers (ASPs) or Software as a Service (SaaS) vendors to offer specialized web-based services that will cut costs and provide specific and focused applications to users. The complexity of designing, installing, configuring, deploying, and supporting the system with internal resources can be eliminated with this type of methodology, providing great benefit to organizations. However, these models can present an authentication problem for corporations with a large number of external service providers. This paper describes the implementation of Security Assertion Markup Language (SAML) and its capabilities to provide secure single sign-on (SSO) solutions for externally hosted applications.
📄 Content
IJCSI International Journal of Computer Science Issues, Vol. 2, 2009
ISSN (Online): 1694-0784
ISSN (Printed): 1694-0814
IJCSI
IJCSI
41
Web Single Sign-On Authentication using SAML
Kelly D. LEWIS, James E. LEWIS, Ph.D.
Information Security, Brown-Forman Corporation Louisville, KY 40210, USA kellydlewis@gmail.com
Engineering Fundamentals, Speed School of Engineering, University of Louisville
Louisville, KY 40292, USA
jel@louisville.edu
Abstract Companies have increasingly turned to application service providers (ASPs) or Software as a Service (SaaS) vendors to offer specialized web-based services that will cut costs and provide specific and focused applications to users. The complexity of designing, installing, configuring, deploying, and supporting the system with internal resources can be eliminated with this type of methodology, providing great benefit to organizations. However, these models can present an authentication problem for corporations with a large number of external service providers. This paper describes the implementation of Security Assertion Markup Language (SAML) and its capabilities to provide secure single sign-on (SSO) solutions for externally hosted applications. Keywords: Security, SAML, Single Sign-On, Web, Authentication
- Introduction Organizations for the most part have recently started using a central authentication source for internal applications and web-based portals. This single source of authentication, when configured properly, provides strong security in the sense that users no longer keep passwords for different systems on sticky notes on monitors or under their keyboards. In addition, management and auditing of users becomes simplified with this central store. As more web services are being hosted by external service providers, the sticky note problem has reoccurred for these outside applications. Users are now forced to remember passwords for HR benefits, travel agencies, expense processing, etc. - or programmers must develop custom SSO code for each site. Management of users becomes a complex problem for the help desk and custom built code for each external service provider can become difficult to administer and maintain. In addition, there are problems for the external service provider as well. Every user in an organization will need to be set up for the service provider’s application, causing a duplicate set of data. Instead, if the organization can control this user data, it would save the service provider time by not needing to set up and terminate user access on a daily basis. Furthermore, one central source would allow the data to be more accurate and up-to-date. Given this set of problems for organizations and their service providers, it is apparent that a solution is needed that provides a standard for authentication information to be exchanged over the Internet. Security Assertion Markup Language (SAML) provides a secure, XML- based solution for exchanging user security information between an identity provider (our organization) and a service provider (ASPs or SaaSs). The SAML standard defines rules and syntax for the data exchange, yet is flexible and can allow for custom data to be transmitted to the external service provider.
- Background The consortium for defining SAML standards and security is OASIS (Organization for the Advancement of Structured Information Standards). They are a non-profit international organization that promotes the development and adoption of open standards for security and web services. OASIS was founded in 1993 under SGML (Standard Generalized Markup Language) Open until its name change in 1998. Headquarters for OASIS are located in North America, but there is active member participation internationally in 100 countries on five continents [1]. IJCSI International Journal of Computer Science Issues, Vol. 2, 2009
IJCSI
IJCSI
42
SAML 1.0 became an OASIS standard toward the end of
2002, with its early formations beginning in 2001. The
goal behind SAML 1.0 was to form a XML framework
to allow for the authentication and authorization from a
single sign-on perspective. At the time of this milestone,
other companies and consortiums started extending
SAML 1.0. While these extensions were being formed,
the SAML 1.1 specification was ratified as an OASIS
standard in the fall of 2003.
The next major revision of SAML is 2.0, and it became
an official OASIS Standard in 2005. SAML 2.0 involves
major changes to the SAML specifications. This is the
first revision of the standard that is not backwards
compatible, and it provides significant additional
functionality [2]. SAML 2.0 now supports W3C XML
encryption to satisfy privacy requirements [3]. Another
advantage that SAML 2.0 includes is the support for
service provider initiated web single sign-on exchanges.
This allows for the service provider to query
This content is AI-processed based on ArXiv data.