When single sign-on works strictly with applications accesses with a web browser, the request to access a web resource is intercepted either by a component in the web server, or by the application itself. Unauthenticated users are diverted to an authentication service and returned only after a successful authentication. Single Sign-On services reviewed in this post:
- SSOGenius (http://www.vlegenius.com/)
- JA-SIG Central Authentication Service (CAS) (http://www.ja-sig.org/products/cas/)
- Java Open Single Sign-On (JOSSO) (http://www.josso.org/)
- Collaborative Single Sign-On (CoSign) (http://www.umich.edu/~umweb/software/cosign/)
- Pubcookie (http://www.pubcookie.org/)
- Stanford WebAuth (http://www.stanford.edu/services/webauth/)
- Open Web SSO (OpenSSO) (http://opensso.dev.java.net/)
1.1 Features:
- Pass authenticated users into Blackboard
- Pass Blackboard users into an external site
- No need to modify the Blackboard configuration
- Independent of domain and time zone
- Easy to implement
1.3 Implementation:
We need to create two scripts of our own, LoginFromBlackboard and LoginToBlackboard on external system. These will send and receive requests to and from Blackboard via the SSOGenius building block.
1.4 How it works:
A user logs onto Blackboard. The user clicks on a special link to the external site. (These can be placed anywhere in Blackboard where links or HTML text can be added) SSOGenius intercepts the request then adds authentication parameters and redirects the user to a special SSO script on the external site. The external SSO script authenticates the user with the new site, using the details sent by SSOGenius. The script should then redirect the client to the desired page on the external system.
1.5 System Requirements:
- Java: JDK1.4.2 or higher.
- Operating System: Linux, Sun Solaris, Microsoft Windows
- Access to an external system (Add/modify the existing code).
- 1.6 License (One year site licenses):
- Standard License: £700.
- FE/School License: £525.
2.1 Features:
- An open and well-documented protocol.
- An open-source Java server component.
- A library of clients for Java, .Net, PHP, Perl, Apache, uPortal, and others.
- Community documentation and implementation support.
- LDAP authentication handler, X.509 Certificates support.
- CAS Server Release: CAS Server 3.0.7 GA
- CAS Client Release for different platforms.
- Redistributions of source code must retain the copyright notice (Copyright © 2000 The JA-SIG Collaborative.), this list of conditions and the following disclaimer.
- Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
- Redistributions of any form whatsoever must retain the following acknowledgement: “This product includes software developed by the JA-SIG Collaborative (http://www.ja-sig.org/).”
- S (Service): A web application that authenticates users via CAS.
- C (Ticket-granting Cookie): A ticket encapsulated by a cookie that is sent to the user’s web browser and returned only to CAS, and only over a secured channel.
- ST (Service Ticket): A ticket sent by CAS, through the user’s browser, to a service. Each ST may be used only once, and must be combined with the unique identifier for one specific service in order to be useful.
- Java: JDK 1.4.2 or higher.
- Apache Tomcat 5.x.
3.1 Features:
- 100% Java with JDK5 compatibility.
- JAAS-based Transparent Single Sign-On across multiple applications and hosts.
- Built-in with a Pluggable Framework to allow the implementation of multiple authentication schemes and stores.
- Provides Identity information to web applications and EJBs through the standard Servlet and EJB Security API respectively.
- Supports Strong Authentication using X.509 client certificates.
- Comes with a Reverse Proxy component that can be used to create n-tier Single Sign-On configurations.
- Support for transparent cross-organization/cross-domain Single Sign-On.
- LDAP support for storing user information and credentials.
- Microsoft Active Directory support for LDAP integration.
- Database support for storing user information and credentials.
- XML support for storing user information and credentials.
- Client API for Microsoft ASP.
3.3 License: BSD License.
3.4 Implementation: Please check JOSSO’s website for diagrams.
3.5 System Requirements:
- JDK 5.0 or higher.
- Apache Tomcat 5.x.
- JBoss 3.2.6+ and JBoss 4.
4.1 Features:
- Passwords are sent only to the central weblogin service over SSL.
- Users need only authenticate once per session to access any number of CoSign-protected sites.
- Optional per-service re-authentication.
- X.509 certificate support.
- No domain cookies used.
- Sessions have both idle and hard timeouts.
- Users can logout of all CoSign-protected services by visiting a single URL.
4.3 License: © 2002 – 2004 Regents of the University of Michigan.
4.4 Implementation (check CoSign’s website for diagrams):
- User visits weblogin before accessing a service
- User attempts to visit a protected service directly
- Apache 1.3.x or higher/Apache 2.x or higher.
- OpenSSL 0.9.7a or higher.
5.1 Latest Build: 3.3.2c
5.2 License: Apache License (Version 2.0).
5.3 Implementation: Check Pubcookie’s website for diagrams.
5.4 System Requirements:
- Web Application Requirements:
- HTTPS connections: Pubcookie flags all cookies “secure”, so applications should be written such that browsers use SSL-protected (https) connections.
- Session creation by HTTP GET requests: Applications should be designed such that sessions are created from a HTTP GET request. Applications should not be designed such that a user’s initial request is a HTTP POST.
- Login Server Requirements:
- Unix platform
- Web server with CGI support
- SSL server certificate
- User-Agent Requirements:
- SSL support
- Cookies supported and enabled
6.1 Features:
Supports any browser that supports SSL/TLS and cookies and requires no special browser configuration.
Implemented as an Apache authentication mechanism.
Built-in LDAPv3 integration.
6.2 Latest Build: WebAuth 3.5.3
6.3 License: © 2002 – 2006 Board of Trustees, Leland Stanford Jr. University
6.4 Implementation: Implemented as Apache 2.0 modules.
6.5 System Requirements:
- Apache 2.0.43 or higher.
- OpenSSL 0.9.7
- cURL 7.10 or higher.
- OpenLDAP or Cyrus SASL for LDAP authentication.
7.1 Features:
- Single Sign-On (SSO)
- Centralized authorization services
- Federated Identity support
- J2EE architecture and comprehensive APIs
- Enterprise-class scalability and reliability
- Real-time audit
- Java Authentication and Authorization Service (JAAS)
- Kerberos
- Lightweight Directory Access Protocol (LDAP)
- Secure Sockets Layer (SSL)
- Active Directory
- X.509 Certificate
- Java Database Connectivity (JDBC)
- LDAP
7.5 Implementation:
OpenSSO contains four modules: Access Manager, Open Federation Library, Open Federation, and J2EE Agents.
7.6 System Requirements:
- Sun JDK 1.5.0 or higher
- Apache Tomcat 5.5.x or higher
- Apache 2.0.x or higher
No comments:
Post a Comment