SlideShare a Scribd company logo
THETHREE S’ - SINGLE SIGN-ON,
SPNEGO & SAML
Gabriella Davis	

gabriella@turtlepartnership.com	

The Turtle Partnership
WHO AM I?
Gab Davis	

Administrator, Problem Solver, Stubborn Fixer of Things	

Working with IBM technologies and all the things surrounding
and integrating with those 	

Based in London, about half the time
WHAT ISTHIS PRESENTATION
ABOUT?
We are here to talk about concepts	

Once you understand the concepts, their requirements,
limitations and benefits you can make decisions about what you
need	

Hopefully we will give you a good overview of a bunch of
confusing acronyms
I DO NOTTHINKTHAT MEANS
WHATYOUTHINK IT MEANS…
PASSWORD SYNCHRONISATION
You may have the same
password but you’re not the
same person
SINGLE SIGN ON	

!
HELLO, HAVE YOU MET MY FRIEND?
I can vouch for him completely
!
Is trust transferable?
ONE PASSWORD, 	

ONE LOCATION
Authenticating against a single
password in a single place
Sametime
Network
Login
Connections
Mail
Mail
LDAP 	

Password
Synchronising passwords across different
systems
Sametime	

LDAP
Connections	

LDAP
Traveler 	

Authentication
Password
Synchronisation
Tool
STEPS FOR SINGLE PASSWORD,
SINGLE PLACE
For LDAP compliant applications ensure you use the same LDAP
directory source	

For Domino systems, configure Directory Assistance to point to an
LDAP source	

ensure you have an attribute in your LDAP directory that contains the user’s distinguished name so
Domino is returned a valid user name	

You can then empty out the HTTP Password field for all users	

This will work for any Domino application, mail , traveler, Sametime etc	

The user can be entirely remote and with no access to LDAP directly and this will still work
SPNEGO
S imPle
N eGotiation
known as NTLM or Kerberos in Active Directory
GSSAPI
Mechanism
SPNEGO EXAMPLE FOR
DOMINO
1
USER LOGS
INTO
WINDOWS
STEPS
SPNEGO EXAMPLE FOR
DOMINO
1 2
ACTIVE
DIRECTORY
GENERATES
SPNEGO
TOKEN
STEPS
USER LOGS
INTO
WINDOWS
SPNEGO EXAMPLE FOR
DOMINO
1 2 3
ACTIVE
DIRECTORY
GENERATES
SPNEGO
TOKEN
USER TRIES
TO ACCESS
DOMINO
WEBSITE
STEPS
USER LOGS
INTO
WINDOWS
SPNEGO EXAMPLE FOR
DOMINO
1 2 3 4
ACTIVE
DIRECTORY
GENERATES
SPNEGO
TOKEN
USER TRIES
TO ACCESS
DOMINO
WEBSITE
BROWSER
SENDS
SPNEGO
TOKEN TO
DOMINO
ALONG WITH
USER NAME
STEPS
USER LOGS
INTO
WINDOWS
SPNEGO EXAMPLE FOR
DOMINO
1 2 3 4 5
ACTIVE
DIRECTORY
GENERATES
SPNEGO
TOKEN
USER TRIES
TO ACCESS
DOMINO
WEBSITE
BROWSER
SENDS
SPNEGO
TOKEN TO
DOMINO
ALONG WITH
USER NAME
DOMINO
CONTACTS
ACTIVE
DIRECTORY
TO VALIDATE
TOKEN AND
RETRIEVE THE
USER’S NAME
STEPS
USER LOGS
INTO
WINDOWS
DOMINO CREATES A LTPATOKEN FORTHE
VALIDATED USER AND GRANTS ACCESS
Enable Multi Server Single Sign-On To
Extend Access To Other Servers
SETTING UP SPNEGO
Create a Domino Web SSO document 	

Set up a SPN for the Domino server in Active Directory	

Domino must run under whatever account you set up for it	

Run domspnego	

Take the output and give it to your AD administrator to run setspn with 	

Run setspn -a http://<dominohostname> <accountnamerunningdomino>	

Update person documents with AD name appended to FullName (and optional
others like krbPrincipalName and LTPA User Name)
WHY NOT SPNEGO
It requires Active Directory	

It requires users to login to Active Directory	

It requires Microsoft Supported browsers	

It requires a Windows client for the users	

It requires Domino to be on a Windows platform	

at least the first Domino server that’s accessed, the rest can then be reached via Multi Server SSO token generated by Domino	

!
It doesn’t work at all if the user is remotely connecting and not logging into Active Directory	

It has a very specific use case
SAML
A ssertion
M arkup
L anguage
SAML is a protocol and process for exchanging
authorisation and authentication data for a user
between services and servers
S ecurity
IDP (IDENTITY PROVIDER)
Sp (Service Provider)
Sp (Service Provider)
Sp (Service Provider)
NO PASSWORDS…..

TO COMPROMISE

TO EXPIRE



TO INTERCEPT
Once a user has
authenticated with the IdP
they won’t be asked again
SAML EXAMPLE
25
1
USER
ATTEMPTS TO
LOG IN TO A
WEBSITE
STEPS
SAML EXAMPLE
26
1 2
USER
ATTEMPTS TO
LOG IN TO A
WEBSITE
USER IS
REDIRECTED
TO IDENTITY
PROVIDER
STEPS
SAML EXAMPLE
27
1 2 3
USER
ATTEMPTS TO
LOG IN TO A
WEBSITE
USER IS
REDIRECTED
TO IDENTITY
PROVIDER
IDENTITY PROVIDER
REQUESTS
AUTHENTICATION OR
(IF USER IS LOGGED
IN) RETURNS
CREDENTIALS
STEPS
SAML EXAMPLE
28
1 2 3 4
USER
ATTEMPTS TO
LOG IN TO A
WEBSITE
USER IS
REDIRECTED
TO IDENTITY
PROVIDER
IDENTITY PROVIDER
REQUESTS
AUTHENTICATION OR
(IF USER IS LOGGED
IN) RETURNS
CREDENTIALS
USER IS
REDIRECTED
BACK TO
ORIGINAL SITE
WITH SAML
ASSERTION
ATTACHED
STEPS
SAML EXAMPLE
29
1 2 3 4 5
USER
ATTEMPTS TO
LOG IN TO A
WEBSITE
USER IS
REDIRECTED
TO IDENTITY
PROVIDER
IDENTITY PROVIDER
REQUESTS
AUTHENTICATION OR
(IF USER IS LOGGED
IN) RETURNS
CREDENTIALS
USER IS
REDIRECTED
BACK TO
ORIGINAL SITE
WITH SAML
ASSERTION
ATTACHED
ORIGINAL SITE
USES ITS SAML
SERVICE PROVIDER
TO CONFIRM SAML
ASSERTION AND
GRANT ACCESS
STEPS
DEFINITIONS
IdP - Identity Provider (SSO) 	

ADFS (Active Directory Federation Services in Windows 2008 and Windows
2012)	

SAML 2.0 only 	

can be combined with SPNEGO	

Enhances Integrated Windows Authentication (IWA)	

TFIM (Tivoli Federated Identity Manager)	

SAML 1.1 and 2.0
DEFINITIONS
SP - Service Provider	

IBM Domino (web federated login)	

IBM WebSphere	

IBM Notes (requires IDVault) (notes federated login)
MORE DEFINITIONS
IdP (Identity Providers) use HTTP or SOAP to communicate to
SP (Service Providers) via XML based assertions

Assertions have three roles	

Authentication	

Authorisation	

Retrieving Attributes
AN IDP CAN 	

SERVICE MANY SERVICE PROVIDERS
A SP can be
connected to several
IdPs
An IdP can
use a variety of authentication
methods including multi
factor
SETTING UP SAML
Choose your IdP if you don’t already have one	

which fits best in your business	

Build the IdP	

Configure the SP	

!
Sounds easy doesn’t it? 	

It’s really not easy by any means but it is worth the investment in time
WHY NOT SAML
Not everything supports it	

Traveler doesn’t	

Sametime doesn’t	

IDVault is a requirement so IDs that can’t be vaulted can’t be
used	

multiple passwords, smartcards etc
OAUTH
NOT EVERYTHING BELONGSTO
YOU
OAuth is an authentication standard
supported by most major cloud providers
THE USER &THE CONSUMER
Let’s say you want Facebook to post
on your Connections Activity Stream.
!
We need OAuth for that..



You are the User

Facebook is the Consumer
THE SERVICE PROVIDER & ITS
SECRETS
The consumer (Facebook) wanders over to
the Service Provider (IBM Connections) and
asks for permission to post on the Activity
Stream
The Service Provider issues a Secret to
go with every URL request from the user
which authorises access
OAUTH SIMPLIFIED EXAMPLE
40
1
USER ASKS
FACEBOOK (THE
CONSUMER) TO
POST ON THEIR
ACTIVITY
STREAM
STEPS
OAUTH SIMPLIFIED EXAMPLE
41
1 2
USER ASKS
FACEBOOK (THE
CONSUMER) TO
POST ON THEIR
ACTIVITY
STREAM
FACEBOOK
GOES TO
CONNECTIONS
(THE SERVICE
PROVIDER) AND
ASKS FOR
PERMISSION TO
POST
STEPS
OAUTH SIMPLIFIED EXAMPLE
42
1 2 3
USER ASKS
FACEBOOK (THE
CONSUMER) TO
POST ON THEIR
ACTIVITY
STREAM
FACEBOOK
GOES TO
CONNECTIONS
(THE SERVICE
PROVIDER) AND
ASKS FOR
PERMISSION TO
POST
THE SERVICE
PROVIDER GIVES THE
CONSUMER A SECRET
KEY TO GIVE TO THE
USER AND A URL FOR
THE USER TO CLICK
ON
STEPS
OAUTH SIMPLIFIED EXAMPLE
43
1 2 3 4
USER ASKS
FACEBOOK (THE
CONSUMER) TO
POST ON THEIR
ACTIVITY
STREAM
FACEBOOK
GOES TO
CONNECTIONS
(THE SERVICE
PROVIDER) AND
ASKS FOR
PERMISSION TO
POST
THE SERVICE
PROVIDER GIVES THE
CONSUMER A SECRET
KEY TO GIVE TO THE
USER AND A URL FOR
THE USER TO CLICK
ON
THE USER CLICKS
ON THE URL AND
AUTHENTICATES
WITH THE SERVICE
PROVIDER
STEPS
OAUTH SIMPLIFIED EXAMPLE
44
1 2 3 4 5
USER ASKS
FACEBOOK (THE
CONSUMER) TO
POST ON THEIR
ACTIVITY
STREAM
FACEBOOK
GOES TO
CONNECTIONS
(THE SERVICE
PROVIDER) AND
ASKS FOR
PERMISSION TO
POST
THE SERVICE
PROVIDER GIVES THE
CONSUMER A SECRET
KEY TO GIVE TO THE
USER AND A URL FOR
THE USER TO CLICK
ON
THE USER CLICKS
ON THE URL AND
AUTHENTICATES
WITH THE SERVICE
PROVIDER
THE SERVICE
PROVIDER ,
SATISFIED THE
SECRET KEY IS
GOOD, WILL NOW
ALLOW THE
CONSUMER
ACCESS TO ITS
SERVICES
STEPS
THAT WAS REALLY SIMPLIFIED
There are other steps and other secrets to ensure traffic is not intercepted
once authorisation is granted	

There are checks to ensure the Service Provider is who it claims to be	

You don’t want to accidentally authorise a phishing site	

There are also lots of timeouts on the authorisation	

!
Make sure you understand the security of both the Consumer and the Service
Provider as well as what access you are granting the Consumer on your behalf
IN SUMMARY
Think about what your problem actually is, there are plenty of technologies to make the user
experience seamless but they become ever more complex to build and maintain	

What are your priorities. Single password? No password? No authentication with a particular
service	

Many solutions require specific operating systems, software and client versions	

Make sure you meet all requirements before building a plan you can’t deliver on	

Some things are very easy (Single password, SPNEGO)	

Some things are very hard (SAML, OAuth)

There is no one solution, you need to choose the combination that delivers for you
HOWTO FIND ME
Twitter, blogs, Instagram, Facebook and more
gabriella@turtlepartnership.com	

GabriellaDavis (skype)	

http://turtleblog.info	

gabturtle on twitter and elsewhere

More Related Content

PDF
A Technical Guide To Deploying Single Sign On
PDF
Simplifying The S's: Single Sign-On, SPNEGO and SAML
PDF
New Single Sign-on Options for IBM Lotus Notes & Domino (We4IT)
PDF
Domino in the Back, Party In The Front
PPTX
IBM Single Sign-On
PDF
External Users Accessing Connections
PDF
Open Mic "Notes Federated Login"
PDF
A Guide To Single Sign-On for IBM Collaboration Solutions
A Technical Guide To Deploying Single Sign On
Simplifying The S's: Single Sign-On, SPNEGO and SAML
New Single Sign-on Options for IBM Lotus Notes & Domino (We4IT)
Domino in the Back, Party In The Front
IBM Single Sign-On
External Users Accessing Connections
Open Mic "Notes Federated Login"
A Guide To Single Sign-On for IBM Collaboration Solutions

What's hot (18)

PDF
Introduction to OAuth 2.0 - Part 2
PPTX
Introduction to OAuth 2.0 - the technology you need but never really learned
PPTX
Introduction to OAuth 2.0 - Part 1
PPTX
IdP, SAML, OAuth
PDF
Introduction to OAuth 2.0 - Part 1
PDF
Building an SSO platform in php (Zendcon 2010)
PPTX
Introduction to OAuth
PDF
Connect2016 - 1172 Shipping domino
PPT
Open Mic IBM connections and IBM Verse on premise integration
PDF
How to -_implement_clientless_single_sign_on_authentication_in_single_active_...
PDF
Enterprise Single Sign-On - SSO
PDF
How to -_implement_clientless_single_sign_on_authentication_in_multiple_activ...
PDF
IBM Sametime 9 Installation Woes and Proactive Repairs by Keith Brooks
PPTX
SAML Smackdown
PDF
SSL Setup for Oracle 10g AS
PDF
Introduction to SAML 2.0
PDF
Introduction to SAML
PDF
Open mic activity logging
Introduction to OAuth 2.0 - Part 2
Introduction to OAuth 2.0 - the technology you need but never really learned
Introduction to OAuth 2.0 - Part 1
IdP, SAML, OAuth
Introduction to OAuth 2.0 - Part 1
Building an SSO platform in php (Zendcon 2010)
Introduction to OAuth
Connect2016 - 1172 Shipping domino
Open Mic IBM connections and IBM Verse on premise integration
How to -_implement_clientless_single_sign_on_authentication_in_single_active_...
Enterprise Single Sign-On - SSO
How to -_implement_clientless_single_sign_on_authentication_in_multiple_activ...
IBM Sametime 9 Installation Woes and Proactive Repairs by Keith Brooks
SAML Smackdown
SSL Setup for Oracle 10g AS
Introduction to SAML 2.0
Introduction to SAML
Open mic activity logging
Ad

Viewers also liked (10)

PDF
Becoming A Connections Administrator
PDF
Installing & Configuring IBM Domino 9 on CentOS
PPTX
Domino Security - not knowing is not an option (2016 edition)
PDF
The Sametime Mobile Experience
PDF
IBM Traveler Management, Security and Performance
PDF
The SSL Problem and How to Deploy SHA2 Certificates
PDF
Upgrading to Sametime 9.0.1
PDF
Domino Adminblast
PDF
A Guide To Sametime 9.0.1 Audio & Video
PDF
Benefits and Risks of a Single Identity - IBM Connect 2017
Becoming A Connections Administrator
Installing & Configuring IBM Domino 9 on CentOS
Domino Security - not knowing is not an option (2016 edition)
The Sametime Mobile Experience
IBM Traveler Management, Security and Performance
The SSL Problem and How to Deploy SHA2 Certificates
Upgrading to Sametime 9.0.1
Domino Adminblast
A Guide To Sametime 9.0.1 Audio & Video
Benefits and Risks of a Single Identity - IBM Connect 2017
Ad

Similar to ISBG The 3 S's a guide to single sign on (20)

PPTX
Help! I Have An Identity Crisis: A look at various mechanisms of Single Sign On
PDF
Single sign on across drupal 8
PDF
Patterns to Bring Enterprise and Social Identity to the Cloud
PPTX
SSO IN/With Drupal and Identitiy Management
PPTX
SSO - Presentation
PDF
Open sso fisl9.0
PDF
Simplifying identity management with SSO tools
PPTX
Presentation
PDF
CIS13: Federation Protocol Cross-Section
PDF
Single Sign On Across Drupal 8 - DrupalCon Global 2020
PPTX
Single Sign On 101
PPTX
Lecture 20101124
PDF
TrustBearer - CTST 2009 - OpenID & Strong Authentication
PDF
Saml
PDF
Synergies of Cloud Identity: Putting it All Together
PDF
“Secure Portal” or WebSphere Portal – Security with Everything
PDF
Open Source Identity Integration with OpenSSO
PPTX
A recipe for standards-based Cloud IdM
PDF
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
PPTX
Access management
Help! I Have An Identity Crisis: A look at various mechanisms of Single Sign On
Single sign on across drupal 8
Patterns to Bring Enterprise and Social Identity to the Cloud
SSO IN/With Drupal and Identitiy Management
SSO - Presentation
Open sso fisl9.0
Simplifying identity management with SSO tools
Presentation
CIS13: Federation Protocol Cross-Section
Single Sign On Across Drupal 8 - DrupalCon Global 2020
Single Sign On 101
Lecture 20101124
TrustBearer - CTST 2009 - OpenID & Strong Authentication
Saml
Synergies of Cloud Identity: Putting it All Together
“Secure Portal” or WebSphere Portal – Security with Everything
Open Source Identity Integration with OpenSSO
A recipe for standards-based Cloud IdM
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
Access management

More from Gabriella Davis (20)

PDF
A Domino Admins Adventures (Engage 2024)
PDF
Engage2022 - Domino Admin Tips
PDF
. Design Decisions: Developing for Mobile - The Template Experience Project
PDF
Domino Server Health - Monitoring and Managing
PDF
Face Off Domino vs Exchange On Premises
PDF
60 Admin Tips
PDF
Adminlicious - A Guide To TCO Features In Domino v10
PDF
An Introduction to Configuring Domino for Docker
PDF
An Introduction To The DMARC SMTP Validation Requirements
PDF
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...
PDF
An introduction to configuring Domino for Docker
PDF
How To Approach GDPR Preparation & Discovery
PDF
An Introduction To The DMARC SMTP Validation Requirements
PDF
Brand Yourself
PDF
Home Working
PDF
The Imposter Syndrome
PDF
What's New in Notes, Sametime and Verse On-Premises
PDF
An Introduction To Docker
PDF
An Introduction To Docker
PDF
Setting Up a Hybrid Domino Environment to Ease your Way to the Cloud
A Domino Admins Adventures (Engage 2024)
Engage2022 - Domino Admin Tips
. Design Decisions: Developing for Mobile - The Template Experience Project
Domino Server Health - Monitoring and Managing
Face Off Domino vs Exchange On Premises
60 Admin Tips
Adminlicious - A Guide To TCO Features In Domino v10
An Introduction to Configuring Domino for Docker
An Introduction To The DMARC SMTP Validation Requirements
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...
An introduction to configuring Domino for Docker
How To Approach GDPR Preparation & Discovery
An Introduction To The DMARC SMTP Validation Requirements
Brand Yourself
Home Working
The Imposter Syndrome
What's New in Notes, Sametime and Verse On-Premises
An Introduction To Docker
An Introduction To Docker
Setting Up a Hybrid Domino Environment to Ease your Way to the Cloud

Recently uploaded (20)

PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
Tartificialntelligence_presentation.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MIND Revenue Release Quarter 2 2025 Press Release
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A comparative analysis of optical character recognition models for extracting...
Spectral efficient network and resource selection model in 5G networks
NewMind AI Weekly Chronicles - August'25-Week II
Assigned Numbers - 2025 - Bluetooth® Document
Reach Out and Touch Someone: Haptics and Empathic Computing
A comparative study of natural language inference in Swahili using monolingua...
Univ-Connecticut-ChatGPT-Presentaion.pdf
Heart disease approach using modified random forest and particle swarm optimi...
Tartificialntelligence_presentation.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Building Integrated photovoltaic BIPV_UPV.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

ISBG The 3 S's a guide to single sign on

  • 1. THETHREE S’ - SINGLE SIGN-ON, SPNEGO & SAML Gabriella Davis gabriella@turtlepartnership.com The Turtle Partnership
  • 2. WHO AM I? Gab Davis Administrator, Problem Solver, Stubborn Fixer of Things Working with IBM technologies and all the things surrounding and integrating with those Based in London, about half the time
  • 3. WHAT ISTHIS PRESENTATION ABOUT? We are here to talk about concepts Once you understand the concepts, their requirements, limitations and benefits you can make decisions about what you need Hopefully we will give you a good overview of a bunch of confusing acronyms
  • 4. I DO NOTTHINKTHAT MEANS WHATYOUTHINK IT MEANS…
  • 5. PASSWORD SYNCHRONISATION You may have the same password but you’re not the same person
  • 6. SINGLE SIGN ON ! HELLO, HAVE YOU MET MY FRIEND? I can vouch for him completely ! Is trust transferable?
  • 7. ONE PASSWORD, ONE LOCATION
  • 8. Authenticating against a single password in a single place Sametime Network Login Connections Mail Mail LDAP Password
  • 9. Synchronising passwords across different systems Sametime LDAP Connections LDAP Traveler Authentication Password Synchronisation Tool
  • 10. STEPS FOR SINGLE PASSWORD, SINGLE PLACE For LDAP compliant applications ensure you use the same LDAP directory source For Domino systems, configure Directory Assistance to point to an LDAP source ensure you have an attribute in your LDAP directory that contains the user’s distinguished name so Domino is returned a valid user name You can then empty out the HTTP Password field for all users This will work for any Domino application, mail , traveler, Sametime etc The user can be entirely remote and with no access to LDAP directly and this will still work
  • 12. S imPle N eGotiation known as NTLM or Kerberos in Active Directory GSSAPI Mechanism
  • 13. SPNEGO EXAMPLE FOR DOMINO 1 USER LOGS INTO WINDOWS STEPS
  • 14. SPNEGO EXAMPLE FOR DOMINO 1 2 ACTIVE DIRECTORY GENERATES SPNEGO TOKEN STEPS USER LOGS INTO WINDOWS
  • 15. SPNEGO EXAMPLE FOR DOMINO 1 2 3 ACTIVE DIRECTORY GENERATES SPNEGO TOKEN USER TRIES TO ACCESS DOMINO WEBSITE STEPS USER LOGS INTO WINDOWS
  • 16. SPNEGO EXAMPLE FOR DOMINO 1 2 3 4 ACTIVE DIRECTORY GENERATES SPNEGO TOKEN USER TRIES TO ACCESS DOMINO WEBSITE BROWSER SENDS SPNEGO TOKEN TO DOMINO ALONG WITH USER NAME STEPS USER LOGS INTO WINDOWS
  • 17. SPNEGO EXAMPLE FOR DOMINO 1 2 3 4 5 ACTIVE DIRECTORY GENERATES SPNEGO TOKEN USER TRIES TO ACCESS DOMINO WEBSITE BROWSER SENDS SPNEGO TOKEN TO DOMINO ALONG WITH USER NAME DOMINO CONTACTS ACTIVE DIRECTORY TO VALIDATE TOKEN AND RETRIEVE THE USER’S NAME STEPS USER LOGS INTO WINDOWS
  • 18. DOMINO CREATES A LTPATOKEN FORTHE VALIDATED USER AND GRANTS ACCESS Enable Multi Server Single Sign-On To Extend Access To Other Servers
  • 19. SETTING UP SPNEGO Create a Domino Web SSO document Set up a SPN for the Domino server in Active Directory Domino must run under whatever account you set up for it Run domspnego Take the output and give it to your AD administrator to run setspn with Run setspn -a http://<dominohostname> <accountnamerunningdomino> Update person documents with AD name appended to FullName (and optional others like krbPrincipalName and LTPA User Name)
  • 20. WHY NOT SPNEGO It requires Active Directory It requires users to login to Active Directory It requires Microsoft Supported browsers It requires a Windows client for the users It requires Domino to be on a Windows platform at least the first Domino server that’s accessed, the rest can then be reached via Multi Server SSO token generated by Domino ! It doesn’t work at all if the user is remotely connecting and not logging into Active Directory It has a very specific use case
  • 21. SAML
  • 22. A ssertion M arkup L anguage SAML is a protocol and process for exchanging authorisation and authentication data for a user between services and servers S ecurity
  • 23. IDP (IDENTITY PROVIDER) Sp (Service Provider) Sp (Service Provider) Sp (Service Provider)
  • 24. NO PASSWORDS…..
 TO COMPROMISE
 TO EXPIRE
 
 TO INTERCEPT Once a user has authenticated with the IdP they won’t be asked again
  • 25. SAML EXAMPLE 25 1 USER ATTEMPTS TO LOG IN TO A WEBSITE STEPS
  • 26. SAML EXAMPLE 26 1 2 USER ATTEMPTS TO LOG IN TO A WEBSITE USER IS REDIRECTED TO IDENTITY PROVIDER STEPS
  • 27. SAML EXAMPLE 27 1 2 3 USER ATTEMPTS TO LOG IN TO A WEBSITE USER IS REDIRECTED TO IDENTITY PROVIDER IDENTITY PROVIDER REQUESTS AUTHENTICATION OR (IF USER IS LOGGED IN) RETURNS CREDENTIALS STEPS
  • 28. SAML EXAMPLE 28 1 2 3 4 USER ATTEMPTS TO LOG IN TO A WEBSITE USER IS REDIRECTED TO IDENTITY PROVIDER IDENTITY PROVIDER REQUESTS AUTHENTICATION OR (IF USER IS LOGGED IN) RETURNS CREDENTIALS USER IS REDIRECTED BACK TO ORIGINAL SITE WITH SAML ASSERTION ATTACHED STEPS
  • 29. SAML EXAMPLE 29 1 2 3 4 5 USER ATTEMPTS TO LOG IN TO A WEBSITE USER IS REDIRECTED TO IDENTITY PROVIDER IDENTITY PROVIDER REQUESTS AUTHENTICATION OR (IF USER IS LOGGED IN) RETURNS CREDENTIALS USER IS REDIRECTED BACK TO ORIGINAL SITE WITH SAML ASSERTION ATTACHED ORIGINAL SITE USES ITS SAML SERVICE PROVIDER TO CONFIRM SAML ASSERTION AND GRANT ACCESS STEPS
  • 30. DEFINITIONS IdP - Identity Provider (SSO) ADFS (Active Directory Federation Services in Windows 2008 and Windows 2012) SAML 2.0 only can be combined with SPNEGO Enhances Integrated Windows Authentication (IWA) TFIM (Tivoli Federated Identity Manager) SAML 1.1 and 2.0
  • 31. DEFINITIONS SP - Service Provider IBM Domino (web federated login) IBM WebSphere IBM Notes (requires IDVault) (notes federated login)
  • 32. MORE DEFINITIONS IdP (Identity Providers) use HTTP or SOAP to communicate to SP (Service Providers) via XML based assertions
 Assertions have three roles Authentication Authorisation Retrieving Attributes
  • 33. AN IDP CAN SERVICE MANY SERVICE PROVIDERS A SP can be connected to several IdPs An IdP can use a variety of authentication methods including multi factor
  • 34. SETTING UP SAML Choose your IdP if you don’t already have one which fits best in your business Build the IdP Configure the SP ! Sounds easy doesn’t it? It’s really not easy by any means but it is worth the investment in time
  • 35. WHY NOT SAML Not everything supports it Traveler doesn’t Sametime doesn’t IDVault is a requirement so IDs that can’t be vaulted can’t be used multiple passwords, smartcards etc
  • 36. OAUTH
  • 37. NOT EVERYTHING BELONGSTO YOU OAuth is an authentication standard supported by most major cloud providers
  • 38. THE USER &THE CONSUMER Let’s say you want Facebook to post on your Connections Activity Stream. ! We need OAuth for that..
 
 You are the User
 Facebook is the Consumer
  • 39. THE SERVICE PROVIDER & ITS SECRETS The consumer (Facebook) wanders over to the Service Provider (IBM Connections) and asks for permission to post on the Activity Stream The Service Provider issues a Secret to go with every URL request from the user which authorises access
  • 40. OAUTH SIMPLIFIED EXAMPLE 40 1 USER ASKS FACEBOOK (THE CONSUMER) TO POST ON THEIR ACTIVITY STREAM STEPS
  • 41. OAUTH SIMPLIFIED EXAMPLE 41 1 2 USER ASKS FACEBOOK (THE CONSUMER) TO POST ON THEIR ACTIVITY STREAM FACEBOOK GOES TO CONNECTIONS (THE SERVICE PROVIDER) AND ASKS FOR PERMISSION TO POST STEPS
  • 42. OAUTH SIMPLIFIED EXAMPLE 42 1 2 3 USER ASKS FACEBOOK (THE CONSUMER) TO POST ON THEIR ACTIVITY STREAM FACEBOOK GOES TO CONNECTIONS (THE SERVICE PROVIDER) AND ASKS FOR PERMISSION TO POST THE SERVICE PROVIDER GIVES THE CONSUMER A SECRET KEY TO GIVE TO THE USER AND A URL FOR THE USER TO CLICK ON STEPS
  • 43. OAUTH SIMPLIFIED EXAMPLE 43 1 2 3 4 USER ASKS FACEBOOK (THE CONSUMER) TO POST ON THEIR ACTIVITY STREAM FACEBOOK GOES TO CONNECTIONS (THE SERVICE PROVIDER) AND ASKS FOR PERMISSION TO POST THE SERVICE PROVIDER GIVES THE CONSUMER A SECRET KEY TO GIVE TO THE USER AND A URL FOR THE USER TO CLICK ON THE USER CLICKS ON THE URL AND AUTHENTICATES WITH THE SERVICE PROVIDER STEPS
  • 44. OAUTH SIMPLIFIED EXAMPLE 44 1 2 3 4 5 USER ASKS FACEBOOK (THE CONSUMER) TO POST ON THEIR ACTIVITY STREAM FACEBOOK GOES TO CONNECTIONS (THE SERVICE PROVIDER) AND ASKS FOR PERMISSION TO POST THE SERVICE PROVIDER GIVES THE CONSUMER A SECRET KEY TO GIVE TO THE USER AND A URL FOR THE USER TO CLICK ON THE USER CLICKS ON THE URL AND AUTHENTICATES WITH THE SERVICE PROVIDER THE SERVICE PROVIDER , SATISFIED THE SECRET KEY IS GOOD, WILL NOW ALLOW THE CONSUMER ACCESS TO ITS SERVICES STEPS
  • 45. THAT WAS REALLY SIMPLIFIED There are other steps and other secrets to ensure traffic is not intercepted once authorisation is granted There are checks to ensure the Service Provider is who it claims to be You don’t want to accidentally authorise a phishing site There are also lots of timeouts on the authorisation ! Make sure you understand the security of both the Consumer and the Service Provider as well as what access you are granting the Consumer on your behalf
  • 46. IN SUMMARY Think about what your problem actually is, there are plenty of technologies to make the user experience seamless but they become ever more complex to build and maintain What are your priorities. Single password? No password? No authentication with a particular service Many solutions require specific operating systems, software and client versions Make sure you meet all requirements before building a plan you can’t deliver on Some things are very easy (Single password, SPNEGO) Some things are very hard (SAML, OAuth)
 There is no one solution, you need to choose the combination that delivers for you
  • 47. HOWTO FIND ME Twitter, blogs, Instagram, Facebook and more gabriella@turtlepartnership.com GabriellaDavis (skype) http://turtleblog.info gabturtle on twitter and elsewhere