SAML Implementation Guidelines
Total Page:16
File Type:pdf, Size:1020Kb
1 2 3 SAML Implementation Guidelines 4 Working Draft 01, 27 August 2004 5 Document identifier: 6 sstc-saml-implementation-guidelines-draft-01 7 Location: 8 http://www.oasis-open.org 9 Editor: 10 Charles Knouse ([email protected]) 11 Contributors: 12 Liberty ID-FF Implementation Guideline contributors 13 Abstract: 14 This non-normative specification provides guidelines for the implementation of applications using 15 SAML assertions, protocol, bindings, and profiles. 16 Status: 17 This is a working draft produced by the Security Services Technical Committee. Publication of this 18 draft does not imply TC endorsement. This is an active working draft that may be updated, 19 replaced or obsoleted at any time. See the revision history for details of changes made in this 20 revision. 21 Committee members should submit comments and potential errata to the security- 22 [email protected] list. Others should submit them to the security-services- 23 [email protected] list (to post, you must subscribe; to subscribe, send a message to 24 [email protected] with "subscribe" in the body) or use 25 other OASIS-supported means of submitting comments. The committee will publish vetted errata 26 on the Security Services TC web page (http://www.oasis-open.org/committees/security/). 27 For information on whether any patents have been disclosed that may be essential to 28 implementing this specification, and any offers of patent licensing terms, please refer to the 29 Intellectual Property Rights web page for the Security Services TC (http://www.oasis- 30 open.org/committees/security/ipr.php). 1 sstc-saml-implementation-guidelines-draft-01 27 Aug 2004 2 Copyright © OASIS Open 2004. All Rights Reserved. Page 1 of 40 31 Table of Contents 32 1 Introduction.................................................................................................................................................4 33 1.1 Recommended Knowledge..................................................................................................................4 34 1.2 SAML Architecture...............................................................................................................................4 35 1.3 SAML Environments ...........................................................................................................................5 36 2 User Agent Considerations........................................................................................................................6 37 2.1 Cookies ...............................................................................................................................................6 38 2.1.1 Constraints....................................................................................................................................6 39 2.1.2 Privacy and Security Considerations............................................................................................7 40 2.1.3 URL Encoding...............................................................................................................................7 41 2.2 URL Length Considerations.................................................................................................................7 42 2.3 Use of JavaScript/ECMAScript ...........................................................................................................7 43 2.4 Caching................................................................................................................................................8 44 3 Security Considerations...............................................................................................................................9 45 3.1 Channel Security................................................................................................................................10 46 3.1.1 SSL and TLS..............................................................................................................................10 47 3.1.2 HTTP Basic and Digest Authentication......................................................................................11 48 3.1.3 IPsec and VPNs..........................................................................................................................12 49 3.2 Message Security..............................................................................................................................12 50 3.2.1 XML Signature............................................................................................................................12 51 3.2.2 XML Encryption..........................................................................................................................14 52 3.2.3 WS-Security................................................................................................................................14 53 3.3 Trust Guidelines.................................................................................................................................15 54 3.3.1 Trusting Certificate Authorities...................................................................................................15 55 3.3.2 Trusting Self-Signed Certificates................................................................................................15 56 3.3.3 Evaluating Certificates................................................................................................................15 57 4 Authentication Mechanisms......................................................................................................................16 58 4.1 Authentication Mechanisms are Orthogonal to Single Sign-On ........................................................16 59 4.2 Identity Provider Session State Maintenance....................................................................................16 60 4.3 Credentials.........................................................................................................................................16 61 4.4 Authentication Type, Multi-tiered Authentication................................................................................17 62 4.5 Mutual Authentication.........................................................................................................................18 63 4.6 Validating Liveness ...........................................................................................................................18 64 4.7 Communication Security ...................................................................................................................18 65 4.8 Compromised Credentials ................................................................................................................18 3 sstc-saml-implementation-guidelines-draft-01 27 Aug 2004 4 Copyright © OASIS Open 2004. All Rights Reserved. Page 2 of 40 66 5Replication Considerations.........................................................................................................................19 67 5.1 URL Endpoints...................................................................................................................................19 68 5.2 Keys ..................................................................................................................................................19 69 5.3 Artifacts..............................................................................................................................................19 70 5.4 Received BPP Responses.................................................................................................................19 71 5.5 User Identities and Aliases................................................................................................................19 72 5.6 Session State.....................................................................................................................................20 73 6 Guidelines for Mobile Environments..........................................................................................................21 74 6.1 Some Mobile-specific Deployment Considerations...........................................................................21 75 6.2 Using the SAML SSO Profiles in Mobile Environments.....................................................................21 76 6.2.1 Summary of the SAML Profiles in Mobile Environments............................................................21 77 6.2.2 Methods of Roaming Using the SAML Protocols.......................................................................22 78 6.2.3 WAP and the Enhanced Proxy...................................................................................................23 79 6.3 Mobile Provisioning Using Tamper-resistant Smart Cards ...............................................................25 80 6.3.1 Obtaining EC-Provisioning Document Instances Using a (U)SIM .............................................27 81 6.3.2 Updating EC-Provisioning Document Instances Using a (U)SIM ..............................................28 82 6.3.3 External standardization dependencies......................................................................................29 83 6.4 SAML Authentication Context in Mobile Environments......................................................................29 84 7 Privacy Principles......................................................................................................................................31