Security Assertion Markup Language (SAML) V2.0 Technical Overview
Total Page:16
File Type:pdf, Size:1020Kb
2 Security Assertion Markup Language 3 (SAML) V2.0 Technical Overview 4 Working Draft 10, 9 October 2006 5 Document identifier: 6 sstc-saml-tech-overview-2.0-draft-10 7 Location: 8 http://www.oasis-open.org/committees/documents.php?wg_abbrev=security 9 Editors: 10 Nick Ragouzis, Enosis Group LLC 11 John Hughes, PA Consulting 12 Rob Philpott, RSA Security 13 Eve Maler, Sun Microsystems 14 Contributors: 15 Hal Lockhart, BEA 16 Thomas Wisniewski, Entrust 17 Scott Cantor, Internet2 18 Prateek Mishra, Oracle 19 Abstract: 20 The Security Assertion Markup Language (SAML) standard defines a framework for exchanging 21 security information between online business partners. It was developed by the Security Services 22 Technical Committee (SSTC) of the standards organization OASIS (the Organization for the 23 Advancement of Structured Information Standards). This document provides a technical 24 description of SAML V2.0. 25 Status: 26 This draft is a non-normative document that is intended to be approved as a Committee Draft by 27 the SSTC. This document is not currently on an OASIS Standard track. Readers should refer to 28 the normative specification suite for precise information concerning SAML V2.0. 29 Committee members should send comments on this specification to the security- 30 [email protected] list. Others should submit them by filling in the form at 31 http://www.oasis-open.org/committees/comments/form.php?wg_abbrev=security. 32 For information on whether any patents have been disclosed that may be essential to 33 implementing this specification, and any offers of patent licensing terms, please refer to the 34 Intellectual Property Rights section of the Security Services TC web page (http://www.oasis- 35 open.org/committees/security/). 36 sstc-saml-tech-overview-2.0-draft-10 9 October 2006 Copyright © OASIS Open 2006. All Rights Reserved. Page 1 of 61 37 Table of Contents 38 1 Introduction............................................................................................................................................... 5 39 1.1 Drivers of SAML Adoption................................................................................................................. 5 40 1.2 Documentation Roadmap ................................................................................................................. 6 41 2 High-Level SAML Use Cases................................................................................................................... 8 42 2.1 SAML Participants............................................................................................................................. 8 43 2.2 Web Single Sign-On Use Case......................................................................................................... 8 44 2.3 Identity Federation Use Case............................................................................................................ 9 45 3 SAML Architecture.................................................................................................................................. 13 46 3.1 Basic Concepts................................................................................................................................ 13 47 3.2 SAML Components......................................................................................................................... 14 48 3.3 SAML XML Constructs and Examples............................................................................................ 16 49 3.3.1 Relationship of SAML Components......................................................................................... 16 50 3.3.2 Assertion, Subject, and Statement Structure........................................................................... 16 51 3.3.3 Attribute Statement Structure................................................................................................... 18 52 3.3.4 Message Structure and the SOAP Binding.............................................................................. 19 53 3.4 Security in SAML............................................................................................................................. 21 54 3.5 Use of SAML in Other Frameworks................................................................................................. 21 55 3.5.1 Web Services Security (WS-Security)..................................................................................... 21 56 3.5.2 eXtensible Access Control Markup Language (XACML).......................................................... 24 57 4 Major Profiles and Federation Use Cases.............................................................................................. 27 58 4.1 Web Browser SSO Profile............................................................................................................... 27 59 4.1.1 Introduction.............................................................................................................................. 27 60 4.1.2 SP-Initiated SSO: Redirect/POST Bindings............................................................................ 28 61 4.1.3 SP-Initiated SSO: POST/Artifact Bindings.............................................................................. 30 62 4.1.4 IdP-Initiated SSO: POST Binding........................................................................................... 32 63 4.2 ECP Profile...................................................................................................................................... 34 64 4.2.1 Introduction.............................................................................................................................. 34 65 4.2.2 ECP Profile using PAOS binding............................................................................................. 34 66 4.3 Single Logout Profile....................................................................................................................... 35 67 4.3.1 Introduction.............................................................................................................................. 35 68 4.3.2 SP-Initiated Single Logout....................................................................................................... 36 69 4.3.3 SP-Initiated Single Logout with Multiple SPs........................................................................... 37 70 4.3.4 IDP-Initiated Single Logout with Multiple SPs.......................................................................... 37 71 4.4 Establishing and Managing Federated Identities............................................................................. 38 72 4.4.1 Introduction.............................................................................................................................. 38 73 4.4.2 Federation Using Out-of-Band Account Linking....................................................................... 39 74 4.4.3 Federation Using Persistent Pseudonym Identifiers................................................................ 40 75 4.4.4 Federation Using Transient Pseudonym Identifiers................................................................. 42 76 4.4.5 Federation Using Identity Attributes......................................................................................... 44 77 4.4.6 Federation Termination............................................................................................................ 45 78 4.5 Use of Attributes.............................................................................................................................. 46 79 5 Comparison Between SAML V2.0 and SAML V1.1................................................................................ 48 80 5.1 Specification Organization Changes............................................................................................... 48 sstc-saml-tech-overview-2.0-draft-10 9 October 2006 Copyright © OASIS Open 2006. All Rights Reserved. Page 2 of 61 81 5.2 General Changes............................................................................................................................ 48 82 5.3 XML Signature and XML Encryption Support.................................................................................. 49 83 5.4 Name Identifier, Subject, and Subject Confirmation Changes........................................................ 49 84 5.5 General Assertion Changes............................................................................................................. 49 85 5.6 Authentication Statement Changes................................................................................................. 50 86 5.7 Attribute Statement Changes.......................................................................................................... 50 87 5.8 General Request-Response Protocol Changes............................................................................... 50 88 5.9 Changes to SAML Queries.............................................................................................................. 51 89 5.10 New SAML Protocols..................................................................................................................... 51 90 5.11 Bindings Changes.......................................................................................................................... 51 91 5.12 Profiles Changes..........................................................................................................................