SlideShare a Scribd company logo
Web Access Management (“WAM”) using open source SAML and OAuth2 software
Day by day it is getting more difficult to manage inbound SAML authenticated people
while maintaining SSO and central entitlements management for internal websites, SaaS
platforms and mobile applications.
The diagram above illustrates a concept to centralize Web access management using an
UMA Authorization Server “AS“, where the person uses an IDP SAML to authenticate. In
this case, the UMA Resource Server “RS” and the UMA Relying Party “RP” are
consolidated. The RP sends the user claims, obtained via SAML, with the UMA request to
the AS to authorize the token (in this case, the RPT token…) for a given scope. In this
case, the combined RS-RP is similar to a CA Site minder agent. The only reason this
works is because the domain controls both the IDP (in this case the Asimba proxy) and
the RPs.
Note, in many cases, you may not want the RS to act as the RP. For example, if the
Apache2 server is an API hub, and the client is a mobile app, you want the RP to be the
mobile app which has a connection to the person. There was some discussion on this if
you are the type of person who likes to read sequence diagrams.
Article resource:-http://gluu.webs.com/apps/blog/show/42374398-web-access-
management-using-oauth2-and-saml-wam-2-0

More Related Content

PDF
Cloud identity management meetup 150108
PDF
OpenID Overview - Seoul July 2007
PPT
Web Access Management
PPT
Introduction to Research Methods
KEY
OpenID vs OAuth - Identity on the Web
PDF
Access Management for Cloud and Mobile
PDF
CIS14: PingAccess 101
PDF
OpenID Bootcamp Tutorial
Cloud identity management meetup 150108
OpenID Overview - Seoul July 2007
Web Access Management
Introduction to Research Methods
OpenID vs OAuth - Identity on the Web
Access Management for Cloud and Mobile
CIS14: PingAccess 101
OpenID Bootcamp Tutorial

Similar to Web access management using o auth2 and saml – wam 2.0 (20)

PPTX
2018 Oct IIW User Managed Access (UMA)
PDF
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They Key
PDF
Uma webinar 2014 03-20
PDF
[WSO2Con USA 2018] Identity APIs is the New Black
PDF
UMA for ACE
PPTX
Microservice with OAuth2
PDF
Extending the Power of Consent with User-Managed Access & OpenUMA
PPTX
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
PDF
Technical Deep Dive - OpenID-Connect and OAuth 2.0 in UCS IAM - Florian Best ...
PPTX
IAM Overview Identiverse 2018
PDF
CIS14: User-Managed Access
PPTX
Ladies Be Architects - Study Group III: OAuth 2.0 (Ep 1)
PDF
JDD2015: Security in the era of modern applications and services - Bolesław D...
PDF
[WSO2Con EU 2018] Identity APIs is the New Black
PDF
CIS 2015 User Managed Access - George Fletcher
PPTX
Help! I Have An Identity Crisis: A look at various mechanisms of Single Sign On
PPTX
Extended Security with WSO2 API Management Platform
PPTX
The New Venn of Access Control in the API-Mobile-IOT Era
PDF
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
PDF
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
2018 Oct IIW User Managed Access (UMA)
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They Key
Uma webinar 2014 03-20
[WSO2Con USA 2018] Identity APIs is the New Black
UMA for ACE
Microservice with OAuth2
Extending the Power of Consent with User-Managed Access & OpenUMA
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
Technical Deep Dive - OpenID-Connect and OAuth 2.0 in UCS IAM - Florian Best ...
IAM Overview Identiverse 2018
CIS14: User-Managed Access
Ladies Be Architects - Study Group III: OAuth 2.0 (Ep 1)
JDD2015: Security in the era of modern applications and services - Bolesław D...
[WSO2Con EU 2018] Identity APIs is the New Black
CIS 2015 User Managed Access - George Fletcher
Help! I Have An Identity Crisis: A look at various mechanisms of Single Sign On
Extended Security with WSO2 API Management Platform
The New Venn of Access Control in the API-Mobile-IOT Era
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Ad

More from Gluu (20)

PPSX
Gluu server for educational institutions
PPTX
Pr from our recent nstic pilot award
PPTX
The currency of identifiers
PPTX
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
PPTX
Gluu sxsw 2015 interactive picks
PPTX
17 recommended requirements for an identity and access management poc
PPTX
Top 10 applications for multi factor authentication in higher education
PPTX
First o auth 2.0 and saml identity federation platform to be shown by gluu
PPTX
How & why gluu’s open source authorization and authentication platform was ch...
PPTX
East hackathon api’s for art
PPTX
Gluu’s vision
PPTX
Gluu and canonical to demonstrate instant application security using ubuntu j...
PPTX
Currency of identifiers ii
PPTX
Shibboleth identity provider (idp) what it is, and why you should consider a ...
PPTX
Federated identity and open id connect why higher ed needs ox
PPTX
Packt publishing book proposal api and mobile access management
PPTX
Gluu oscon submission
PPTX
Go west young federation
PPTX
 Use case for asimba as saml proxy
PPTX
Postcard from identity next 2013
Gluu server for educational institutions
Pr from our recent nstic pilot award
The currency of identifiers
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu sxsw 2015 interactive picks
17 recommended requirements for an identity and access management poc
Top 10 applications for multi factor authentication in higher education
First o auth 2.0 and saml identity federation platform to be shown by gluu
How & why gluu’s open source authorization and authentication platform was ch...
East hackathon api’s for art
Gluu’s vision
Gluu and canonical to demonstrate instant application security using ubuntu j...
Currency of identifiers ii
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Federated identity and open id connect why higher ed needs ox
Packt publishing book proposal api and mobile access management
Gluu oscon submission
Go west young federation
 Use case for asimba as saml proxy
Postcard from identity next 2013
Ad

Web access management using o auth2 and saml – wam 2.0

  • 1. Web Access Management (“WAM”) using open source SAML and OAuth2 software Day by day it is getting more difficult to manage inbound SAML authenticated people while maintaining SSO and central entitlements management for internal websites, SaaS platforms and mobile applications. The diagram above illustrates a concept to centralize Web access management using an UMA Authorization Server “AS“, where the person uses an IDP SAML to authenticate. In this case, the UMA Resource Server “RS” and the UMA Relying Party “RP” are consolidated. The RP sends the user claims, obtained via SAML, with the UMA request to the AS to authorize the token (in this case, the RPT token…) for a given scope. In this case, the combined RS-RP is similar to a CA Site minder agent. The only reason this works is because the domain controls both the IDP (in this case the Asimba proxy) and the RPs.
  • 2. Note, in many cases, you may not want the RS to act as the RP. For example, if the Apache2 server is an API hub, and the client is a mobile app, you want the RP to be the mobile app which has a connection to the person. There was some discussion on this if you are the type of person who likes to read sequence diagrams. Article resource:-http://gluu.webs.com/apps/blog/show/42374398-web-access- management-using-oauth2-and-saml-wam-2-0