Redalyc.Managing Dynamic Identity Federations Using Security
Total Page:16
File Type:pdf, Size:1020Kb
Journal of Theoretical and Applied Electronic Commerce Research E-ISSN: 0718-1876 [email protected] Universidad de Talca Chile Ferdous, Md. Sadek; Poet, Ron Managing Dynamic Identity Federations using Security Assertion Markup Language Journal of Theoretical and Applied Electronic Commerce Research, vol. 10, núm. 2, mayo, 2015, pp. 53-76 Universidad de Talca Curicó, Chile Available in: http://www.redalyc.org/articulo.oa?id=96538544005 How to cite Complete issue Scientific Information System More information about this article Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Journal's homepage in redalyc.org Non-profit academic project, developed under the open access initiative Journal of Theoretical and Applied Electronic Commerce Research This paper is available online at ISSN 0718–1876 Electronic Version www.jtaer.com VOL 10 / ISSUE 2 / MAY 2015 / 53-76 DOI: 10.4067/S0718-18762015000200005 © 2015 Universidad de Talca - Chile Managing Dynamic Identity Federations using Security Assertion Markup Language Md. Sadek Ferdous1 and Ron Poet2 1 School of Computing Science, University of Glasgow, Glasgow, Scotland, [email protected] 2 School of Computing Science, University of Glasgow, Glasgow, Scotland, [email protected] Received 23 January 2014; received in revised form 14 September 2014; accepted 22 September 2014 Abstract Security Assertion Markup Language is one of the most widely used technologies to enable Identity Federations among different organisations. Despite its several advantages, one of its key disadvantages is that it does not allow creating a federation in a dynamic fashion to enable service provisioning (or de-provisioning) in real time. A few approaches have been proposed to rectify this problem. However, most of them require elaborate changes of the language and do not provide mechanisms to manage federations dynamically. This paper presents a better approach based on an already drafted Security Assertion Markup Language Profile and requires no change in its specification, rather it depends on the specific implementation. Our proposed approach covers all aspects regarding the management of dynamic Identity Federation. It will allow users to create federations dynamically between two prior unknown organisations and will allow them to manage such federations as long as it is required. Implicit in each identity federation is the issue of trust. Therefore, the trust issues involved in the management of dynamic federations are analysed in details. Finally, a proof of concept is discussed with a few use-cases to elaborate the practicality of our approach. Keywords: Identity management, Federated identity management, Identity federation, Security assertion markup language (SAML), Trust 53 Managing Dynamic Identity Federations using Security Assertion Markup Language Md. Sadek Ferdous Ron Poet Journal of Theoretical and Applied Electronic Commerce Research This paper is available online at ISSN 0718–1876 Electronic Version www.jtaer.com VOL 10 / ISSUE 2 / MAY 2015 / 53-76 DOI: 10.4067/S0718-18762015000200005 © 2015 Universidad de Talca - Chile 1 Introduction With the continuous evolution of web-enabled (or online) services in the last decade or so, the way those services can be accessed has changed considerably. Many of those services require that the users must register themselves with the Service Provider (SP, in short; organisations that provide online services) to access its services. This is required to provide users with more personalised services as well as to ensure accountability at the SP. Users are issued with digital identities consisting of identifiers and related credentials which users need to present while accessing such services. As the number of web-enabled services as well as the user-base was expanding rapidly, more and more identities and credentials were issued, and soon their management became challenging, both for service providers and for users. Identity Management (IdM, in short) was introduced by the industry to facilitate online management of user identities which resulted in various different Identity Management Systems (IMS, in short). Initially, these systems were not interoperable, meaning digital identities in one system was not recognised by others. As a matter of fact, interoperability was not considered to be important as different organisations managed their own user-bases by themselves in-house. However, as the landscape for web and web-based services started to change, novel business scenarios started to emerge. One prominent example of such scenarios was the cooperation between disparate organisations to provide conglomerated services among business partners. To facilitate such collaborations, organisations felt the necessity to expand their service bases not only to an ever-growing number of users within the organisation but also to users from their business partners. This need gave rise to a novel model of Identity Management known as the Federated Identity Management (FIM, in short) [5], [6]. The FIM offers a flexible and secure way to establish Identity Federation (also known as Federated Identities or Federation of Identities) among organisations from different security domains. This allows organisations to reduce complexities in sharing their protected online resources with users of other organisations that are part of the same identity federation as well as offers much improved user experience by reducing the number of identifier/credential pairs that the users need to remember. There are several core technologies available that allow the creation of federations such as Security Assertion Markup Language (SAML) [23], OpenID [28], WS-Federation [27], etc. Among them, OpenID is merely an authentication protocol where federations can be achieved in a limited way. With the use of its Attribute Exchange extension, attributes can be exchanged among different organisations [29]. Even though OpenID is a very popular authentication protocol for web-enabled services, it is not favoured by many organisations due to its trust everyone policy that virtually asks every organisation to trust other organisations [3]. A new extension called PAPE (Provider Authentication Policy Extension) [30] was proposed in 2008 for enforcing trust mechanisms in a very limited way. Therefore it is safe to say that trust, security and privacy issues have not been addressed thoroughly in the OpenID as of yet. WS-Federation is a federation model with the aim to simplify the cross-domain service access and interaction among several parties. It is a part of the Web Service Protocol Stack (WS-*) which includes WS-Security, WS-SecurityPolicy, WS-MetadataExchange, WS-Trust, etc. Utilising these protocols, WS-Federation allows the creation of a federation that is based on strong trust assumptions and satisfies reasonable amount of security and privacy requirements [7]. Windows CardSpace was based on WS-Federation [36] and was thought to be the driving force for widespread adoption of the WS-Federation. With the demise of CardSpace, the widespread adoption of WS-Federation is uncertain and also in reality it has not been widely used to deploy a federation. On the other hand, SAML has been the most widely used technology for deploying federations in scenarios when there is a need of a federation that requires strong trust assumptions as well as maintains good security and privacy properties. This is why it is favoured as the pick of the technologies by many educational institutes and Governmental web-enabled services all over the world. Despite its several advantages, one major constraint is the method by which trust is established and maintained in the SAML. To enable federations using SAML, trust among participating organisations has to be pre-configured by system administrators. Pre-configuring trust before any interaction hinders the establishment of a federation between two prior unknown parties in a dynamic fashion. Allowing federations to be created dynamically would open up the door for new business scenarios and novel web- enabled services. There have been several proposals and drafts to handle this situation. Most of these works either require a considerable amount of change of the SAML protocol or only provide mechanisms for creating federations in a semi-automated fashion. And also the trust issues involved while creating federations in a semi-automated fashion are not thoroughly examined. To rectify the stated problems a better mechanism was proposed to create federations in a fully automatic dynamic fashion in our previous work [8]. In that work, the key concepts behind dynamic federation were formally defined, trust issues in such scenarios were explored and a proof of concept to illustrate the applicability of the proposal was described. This paper presents an extension of our previous work. Here, it has not only been considered how a dynamic federation can be created, but also have been investigated how such federations can be managed dynamically. The contributions of the current paper over our previous work are: 54 Managing Dynamic Identity Federations using Security Assertion Markup Language Md. Sadek Ferdous Ron Poet Journal of Theoretical and Applied Electronic Commerce Research This paper is available online at ISSN 0718–1876 Electronic Version www.jtaer.com VOL 10 / ISSUE 2 / MAY 2015 / 53-76 DOI: 10.4067/S0718-18762015000200005 © 2015 Universidad de Talca - Chile A new Section to introduce the key concept of Identity and Federated