SlideShare a Scribd company logo
SSO With The WSO2 Identity Server
Suresh Attanayake
Software Engineer
About WSO2
• Providing the only complete open source componentized cloud
platform
– Dedicated to removing all the stumbling blocks to enterprise agility
– Enabling you to focus on business logic and business value
• Recognized by leading analyst firms as visionaries and leaders
– Gartner cites WSO2 as visionaries in all 3 categories of applica-
tion infrastructure
– Forrester places WSO2 in top 2 for API Management
• Global corporation with offices in USA, UK & Sri Lanka
– 200+ employees and growing
• Business model of selling comprehensive support & mainte-
nance for our products
150+ globally positioned support customers
Previous : A Walk Through SSO
● Problems with traditional authentication
● How SSO solves those problems
● Need for Open Standards
● Introduction to some open standards and how they
solve the common authentication problems
What we cover today
● OpenID
● SAML 2.0 Web Browser SSO
● WS- Trust
● Solutions
● Demos
OpenID
● Sign into multiple websites with the accounts you
already have.
– No need for new account creation
– Websites don't have to store passwords
● Users passwords are never shared with the
websites.
● Users can decide what information to be shared
with the websites dynamically
● Decentralized identity management
Entities
● OpenID Provider (OP)
– Central Authentication Service
● Relying Party (RP)
– Web Applications
● User Agent
– Web Browser
● User
OpenID Providers
OpenID Identifiers
● Google
– https://profiles.google.com/YourGoogleID
● Blogger
– http://blogname.blogspot.com/
● MySpace
– http://www.myspace.com/username
Relying Parties
Relying Parties
● Over 50,000 web sites
– http://wiki.openid.net/w/page/25453698/Gallery
● One billion user accounts
● Drupal, Wordpress and libraries
● Visit http://openid.net/
OpenID
OpenID Authentication
1. User enters the OpenID Identifier and clicks login
at the Relying Party (RP).
2.RP performs discovery on the provided identifier.
3.RP creates an association with the OpenID
Provider (OP).
4.RP issues an Authentication Request to OP.
5.OP authenticates the user.
6.OP sends an Authentication Response to RP.
7.RP validates the authentication response.
8.RP grants or denies the access to the user.
Discovery
● The Process : The relying party uses the user supplied
identifier to look up necessary information to initiate
the OpenID protocol
● Information
– Version
– OP endpoint URL
– Claimed ID
● Discovery methods
– XRI Resolution
– Yadis
– HTML-Based recovery
Associations
● Process : Sharing a secrete (MAC key) between the
OpenID Provider and the Relying Party
● Association Types
– HMAC-SHA1
– HMAC-SHA256
● Association Session Types
– no-encryption
– DH-SHA1
– DH-SHA256
Authentication Request
● Contains
– Claimed ID
– Association handle
– Return to URL
– More
– Extensions (Attributes)
Authentication Request
Authentication Response
● Contains
– OP Endpoint
– Claimed ID
– Signature
– More
– Extensions (Attributes)
Authentication Response
Attribute exchange
● OpenID Attribute Exchange
● OpenID Simple Registration
OpenID Demo with the WSO2 Identity
Server
Example Solution – Multiple Domains
What OpenID is lacking
● Single Logout
● IDP initiated SSO
● Not utilizing SSL/TLS
SAML 2.0 Web Browser SSO Profile
Entities
● Identity Provider (IDP)
– Single Sign On Service
● Service Provider (SP)
– Assertion Consuming Service
● Principle
SAML Web Browser SSO Profile
Profile Overview
1.User agent access a Service Provider.
2.Service Provider determines the Identity Provider.
3.Service Provider issues an <AuthnRequest> message
to the Identity Provider.
4.Identity Provider identifies the Principle.
5.Identity Provider issues a <Response> message to the
Service Provider.
6.Service Provider grants or denies the access to the
Principle.
Identity Provider Discovery
● Implementation dependent
– Configuration
– Identity Provider Discovery Profile
<AuthnRequest> message
<AuthnResponse> message
SSO with the WSO2 Identity Server
Bindings
“Mapping of SAML request-response message
exchange onto standard message or communication
protocols are called SAML protocol bindings. ”
– HTTP Redirect Binding
– HTTP POST Binding
– HTTP Artifact Binding
Single Logout Profile
1.Service Provider issues a <LogoutRequest>.
2.Identity Provider determines Session Participants.
3.Identity Providers issues <LogoutRequest> to Session
Participants.
4.Session Participants send <LogoutRespone> to the
Identity Provider.
5.Identity Provider send a <LogoutResponse> to the
Single Logout initiator Service Provider.
Single Logout Profile
SAML 2.0 Web Browser SSO Demo
with the WSO2 Identity Server
Example Solution - Federation
What is not interesting about SAML
2.0 Web Browser SSO
● Its XML based
– serialization required
● Cryptographic operations
– Nightmare for scripting languages
WS- Trust
WS-Trust Security Model
● Web Service require set of claims to be in the
incoming request message.
● If the incoming request message doesn't contain the
required claims, then the service should reject or
ignore the request.
● Built with
– Claims
– Policies
– Tokens
WS- Trust
Security Token Service
● Issuing tokens
● Renewing tokens
● Validating tokens
● Token exchange
● Broker trust
Tokens
● X509 public certificates
● XML based tokens (SAML)
● Kerberos shared-secrete tokens
● Digest passwords
<wst:RequestSecurityToken>
<wst:RequestSecurityTokenResponse>
SSO with the WSO2 Identity Server
WS-Trust Demo with the WSO2
Identity Server
Example Solution – Token Exchange
Example Solution – Bridged SSO
Questions?
Thank you

More Related Content

PDF
Introduction of Kubernetes - Trang Nguyen
PPTX
API Security : Patterns and Practices
PDF
PPTX
Intro to OAuth2 and OpenID Connect
PDF
API Gateway How-To: The Many Ways to Apply the Gateway Pattern
PDF
Welcome to the Reactive Revolution:RSocket and Spring Cloud Gateway - Spencer...
PPT
Intro to Amazon S3
PDF
Design patterns for microservice architecture
Introduction of Kubernetes - Trang Nguyen
API Security : Patterns and Practices
Intro to OAuth2 and OpenID Connect
API Gateway How-To: The Many Ways to Apply the Gateway Pattern
Welcome to the Reactive Revolution:RSocket and Spring Cloud Gateway - Spencer...
Intro to Amazon S3
Design patterns for microservice architecture

What's hot (20)

PPSX
Microservices, DevOps & SRE
PPTX
An Introduction to OAuth 2
PDF
Microservices with Java, Spring Boot and Spring Cloud
PDF
API Security Best Practices & Guidelines
PDF
Cloud Native Application
PPTX
Azure Governance
PPTX
Azure devops
PPTX
Mulesoft Anypoint platform introduction
PDF
OAuth 2.0 and OpenID Connect
PDF
OAuth 2.0
PDF
Microservices Interview Questions and Answers | Microservices Architecture Tr...
PPTX
OAuth2 + API Security
PDF
Using patterns and pattern languages to make better architectural decisions
PDF
Infrastructure as Code with Terraform and Ansible
PDF
Building layers of defense for your application
PPTX
What is an API Gateway?
PPTX
An introduction to OAuth 2
PPTX
Stephane Lapointe: Governance in Azure, keep control of your environments
PDF
Cloud Native In-Depth
PPSX
Microservices Docker Kubernetes Istio Kanban DevOps SRE
Microservices, DevOps & SRE
An Introduction to OAuth 2
Microservices with Java, Spring Boot and Spring Cloud
API Security Best Practices & Guidelines
Cloud Native Application
Azure Governance
Azure devops
Mulesoft Anypoint platform introduction
OAuth 2.0 and OpenID Connect
OAuth 2.0
Microservices Interview Questions and Answers | Microservices Architecture Tr...
OAuth2 + API Security
Using patterns and pattern languages to make better architectural decisions
Infrastructure as Code with Terraform and Ansible
Building layers of defense for your application
What is an API Gateway?
An introduction to OAuth 2
Stephane Lapointe: Governance in Azure, keep control of your environments
Cloud Native In-Depth
Microservices Docker Kubernetes Istio Kanban DevOps SRE
Ad

Viewers also liked (20)

PDF
WSO2 Identity Server
PDF
WSO2 Identity Server
PDF
Single sign on using WSO2 identity server
PDF
WSO2 Identity Server - Product Overview
PPTX
WSO2 Identity Server 5.3.0 - Product Release Webinar
PDF
WSO2Con US 2013 - Identity Management Best Practices with WSO2 Identity Server
PPTX
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
PDF
WSO2Con USA 2017: Rise to the Challenge with WSO2 Identity Server and WSO2 AP...
PDF
WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...
PDF
A Walk through SSO
PDF
Методические рекомендации по использованию Единой системы идентификации и аут...
PDF
Scalable Deployment Patterns in WSO2 API Manager
PPT
Understanding OpenID
PDF
Practical Federated Identity
PDF
Customizing the API Store & Publisher in WSO2 API Manager
ODP
Nuxeo Enterprise Platform (Nuxeo EP) - Technical Overview
PDF
Managing Engineering Information with Nuxeo
PDF
Nuxeo Platform 7.4: What's New
PPTX
Enterprise Security and Identity Management Use Cases with WSO2 Identity Server
PDF
Nuxeo platform in 15mn
WSO2 Identity Server
WSO2 Identity Server
Single sign on using WSO2 identity server
WSO2 Identity Server - Product Overview
WSO2 Identity Server 5.3.0 - Product Release Webinar
WSO2Con US 2013 - Identity Management Best Practices with WSO2 Identity Server
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
WSO2Con USA 2017: Rise to the Challenge with WSO2 Identity Server and WSO2 AP...
WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...
A Walk through SSO
Методические рекомендации по использованию Единой системы идентификации и аут...
Scalable Deployment Patterns in WSO2 API Manager
Understanding OpenID
Practical Federated Identity
Customizing the API Store & Publisher in WSO2 API Manager
Nuxeo Enterprise Platform (Nuxeo EP) - Technical Overview
Managing Engineering Information with Nuxeo
Nuxeo Platform 7.4: What's New
Enterprise Security and Identity Management Use Cases with WSO2 Identity Server
Nuxeo platform in 15mn
Ad

Similar to SSO with the WSO2 Identity Server (20)

PDF
Enterprise Single Sign On
PPTX
Presentation
PDF
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
PDF
Borderless Federated-Identity
PDF
Open Source Identity Integration with OpenSSO
PDF
Open sso fisl9.0
PDF
OpenSSO Tech Overview Aquarium
PPTX
WSO2Con USA 2014 - Identity Server Tutorial
PDF
Sso walk-through
PDF
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
PDF
Open source wso2 identity server sso with drupal 8
PDF
End-to-End Identity Management
PDF
JDD2015: Security in the era of modern applications and services - Bolesław D...
PPTX
Help! I Have An Identity Crisis: A look at various mechanisms of Single Sign On
PPTX
Introduction to the WSO2 Identity Server &Contributing to an OS Project
PDF
Introducing SAML 2.0 Protocol: Security and Performance
PDF
Openstack identity protocols unconference
PPTX
IAM Overview Identiverse 2018
PDF
Digital Identity
PPTX
Synergies across APIs and IAM
Enterprise Single Sign On
Presentation
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
Borderless Federated-Identity
Open Source Identity Integration with OpenSSO
Open sso fisl9.0
OpenSSO Tech Overview Aquarium
WSO2Con USA 2014 - Identity Server Tutorial
Sso walk-through
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
Open source wso2 identity server sso with drupal 8
End-to-End Identity Management
JDD2015: Security in the era of modern applications and services - Bolesław D...
Help! I Have An Identity Crisis: A look at various mechanisms of Single Sign On
Introduction to the WSO2 Identity Server &Contributing to an OS Project
Introducing SAML 2.0 Protocol: Security and Performance
Openstack identity protocols unconference
IAM Overview Identiverse 2018
Digital Identity
Synergies across APIs and IAM

More from WSO2 (20)

PDF
Demystifying CMS-0057-F - Compliance Made Seamless with WSO2
PDF
Quantum Threats Are Closer Than You Think – Act Now to Stay Secure
PDF
Modern Platform Engineering with Choreo - The AI-Native Internal Developer Pl...
PDF
Application Modernization with Choreo - The AI-Native Internal Developer Plat...
PDF
Build Smarter, Deliver Faster with Choreo - An AI Native Internal Developer P...
PDF
Platformless Modernization with Choreo.pdf
PDF
Application Modernization with Choreo for the BFSI Sector
PDF
Choreo - The AI-Native Internal Developer Platform as a Service: Overview
PDF
[Roundtable] Choreo - The AI-Native Internal Developer Platform as a Service
PPTX
WSO2Con 2025 - Building AI Applications in the Enterprise (Part 1)
PPTX
WSO2Con 2025 - Building Secure Business Customer and Partner Experience (B2B)...
PPTX
WSO2Con 2025 - Building Secure Customer Experience Apps
PPTX
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
PPTX
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
PPTX
WSO2Con 2025 - Unified Management of Ingress and Egress Across Multiple API G...
PPTX
WSO2Con 2025 - How an Internal Developer Platform Lets Developers Focus on Code
PPTX
WSO2Con 2025 - Architecting Cloud-Native Applications
PDF
Mastering Intelligent Digital Experiences with Platformless Modernization
PDF
Accelerate Enterprise Software Engineering with Platformless
PDF
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
Demystifying CMS-0057-F - Compliance Made Seamless with WSO2
Quantum Threats Are Closer Than You Think – Act Now to Stay Secure
Modern Platform Engineering with Choreo - The AI-Native Internal Developer Pl...
Application Modernization with Choreo - The AI-Native Internal Developer Plat...
Build Smarter, Deliver Faster with Choreo - An AI Native Internal Developer P...
Platformless Modernization with Choreo.pdf
Application Modernization with Choreo for the BFSI Sector
Choreo - The AI-Native Internal Developer Platform as a Service: Overview
[Roundtable] Choreo - The AI-Native Internal Developer Platform as a Service
WSO2Con 2025 - Building AI Applications in the Enterprise (Part 1)
WSO2Con 2025 - Building Secure Business Customer and Partner Experience (B2B)...
WSO2Con 2025 - Building Secure Customer Experience Apps
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
WSO2Con 2025 - Unified Management of Ingress and Egress Across Multiple API G...
WSO2Con 2025 - How an Internal Developer Platform Lets Developers Focus on Code
WSO2Con 2025 - Architecting Cloud-Native Applications
Mastering Intelligent Digital Experiences with Platformless Modernization
Accelerate Enterprise Software Engineering with Platformless
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation

Recently uploaded (20)

PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPT
Teaching material agriculture food technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
KodekX | Application Modernization Development
PDF
Empathic Computing: Creating Shared Understanding
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Per capita expenditure prediction using model stacking based on satellite ima...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Review of recent advances in non-invasive hemoglobin estimation
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Unlocking AI with Model Context Protocol (MCP)
Spectral efficient network and resource selection model in 5G networks
NewMind AI Weekly Chronicles - August'25 Week I
Digital-Transformation-Roadmap-for-Companies.pptx
Teaching material agriculture food technology
Encapsulation_ Review paper, used for researhc scholars
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The AUB Centre for AI in Media Proposal.docx
KodekX | Application Modernization Development
Empathic Computing: Creating Shared Understanding
Chapter 3 Spatial Domain Image Processing.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

SSO with the WSO2 Identity Server

  • 1. SSO With The WSO2 Identity Server Suresh Attanayake Software Engineer
  • 2. About WSO2 • Providing the only complete open source componentized cloud platform – Dedicated to removing all the stumbling blocks to enterprise agility – Enabling you to focus on business logic and business value • Recognized by leading analyst firms as visionaries and leaders – Gartner cites WSO2 as visionaries in all 3 categories of applica- tion infrastructure – Forrester places WSO2 in top 2 for API Management • Global corporation with offices in USA, UK & Sri Lanka – 200+ employees and growing • Business model of selling comprehensive support & mainte- nance for our products
  • 3. 150+ globally positioned support customers
  • 4. Previous : A Walk Through SSO ● Problems with traditional authentication ● How SSO solves those problems ● Need for Open Standards ● Introduction to some open standards and how they solve the common authentication problems
  • 5. What we cover today ● OpenID ● SAML 2.0 Web Browser SSO ● WS- Trust ● Solutions ● Demos
  • 6. OpenID ● Sign into multiple websites with the accounts you already have. – No need for new account creation – Websites don't have to store passwords ● Users passwords are never shared with the websites. ● Users can decide what information to be shared with the websites dynamically ● Decentralized identity management
  • 7. Entities ● OpenID Provider (OP) – Central Authentication Service ● Relying Party (RP) – Web Applications ● User Agent – Web Browser ● User
  • 9. OpenID Identifiers ● Google – https://profiles.google.com/YourGoogleID ● Blogger – http://blogname.blogspot.com/ ● MySpace – http://www.myspace.com/username
  • 11. Relying Parties ● Over 50,000 web sites – http://wiki.openid.net/w/page/25453698/Gallery ● One billion user accounts ● Drupal, Wordpress and libraries ● Visit http://openid.net/
  • 13. OpenID Authentication 1. User enters the OpenID Identifier and clicks login at the Relying Party (RP). 2.RP performs discovery on the provided identifier. 3.RP creates an association with the OpenID Provider (OP). 4.RP issues an Authentication Request to OP. 5.OP authenticates the user. 6.OP sends an Authentication Response to RP. 7.RP validates the authentication response. 8.RP grants or denies the access to the user.
  • 14. Discovery ● The Process : The relying party uses the user supplied identifier to look up necessary information to initiate the OpenID protocol ● Information – Version – OP endpoint URL – Claimed ID ● Discovery methods – XRI Resolution – Yadis – HTML-Based recovery
  • 15. Associations ● Process : Sharing a secrete (MAC key) between the OpenID Provider and the Relying Party ● Association Types – HMAC-SHA1 – HMAC-SHA256 ● Association Session Types – no-encryption – DH-SHA1 – DH-SHA256
  • 16. Authentication Request ● Contains – Claimed ID – Association handle – Return to URL – More – Extensions (Attributes)
  • 18. Authentication Response ● Contains – OP Endpoint – Claimed ID – Signature – More – Extensions (Attributes)
  • 20. Attribute exchange ● OpenID Attribute Exchange ● OpenID Simple Registration
  • 21. OpenID Demo with the WSO2 Identity Server
  • 22. Example Solution – Multiple Domains
  • 23. What OpenID is lacking ● Single Logout ● IDP initiated SSO ● Not utilizing SSL/TLS
  • 24. SAML 2.0 Web Browser SSO Profile
  • 25. Entities ● Identity Provider (IDP) – Single Sign On Service ● Service Provider (SP) – Assertion Consuming Service ● Principle
  • 26. SAML Web Browser SSO Profile
  • 27. Profile Overview 1.User agent access a Service Provider. 2.Service Provider determines the Identity Provider. 3.Service Provider issues an <AuthnRequest> message to the Identity Provider. 4.Identity Provider identifies the Principle. 5.Identity Provider issues a <Response> message to the Service Provider. 6.Service Provider grants or denies the access to the Principle.
  • 28. Identity Provider Discovery ● Implementation dependent – Configuration – Identity Provider Discovery Profile
  • 32. Bindings “Mapping of SAML request-response message exchange onto standard message or communication protocols are called SAML protocol bindings. ” – HTTP Redirect Binding – HTTP POST Binding – HTTP Artifact Binding
  • 33. Single Logout Profile 1.Service Provider issues a <LogoutRequest>. 2.Identity Provider determines Session Participants. 3.Identity Providers issues <LogoutRequest> to Session Participants. 4.Session Participants send <LogoutRespone> to the Identity Provider. 5.Identity Provider send a <LogoutResponse> to the Single Logout initiator Service Provider.
  • 35. SAML 2.0 Web Browser SSO Demo with the WSO2 Identity Server
  • 36. Example Solution - Federation
  • 37. What is not interesting about SAML 2.0 Web Browser SSO ● Its XML based – serialization required ● Cryptographic operations – Nightmare for scripting languages
  • 39. WS-Trust Security Model ● Web Service require set of claims to be in the incoming request message. ● If the incoming request message doesn't contain the required claims, then the service should reject or ignore the request. ● Built with – Claims – Policies – Tokens
  • 41. Security Token Service ● Issuing tokens ● Renewing tokens ● Validating tokens ● Token exchange ● Broker trust
  • 42. Tokens ● X509 public certificates ● XML based tokens (SAML) ● Kerberos shared-secrete tokens ● Digest passwords
  • 46. WS-Trust Demo with the WSO2 Identity Server
  • 47. Example Solution – Token Exchange
  • 48. Example Solution – Bridged SSO