PKI in federations - approach to non-web services Milan Sova, - - PowerPoint PPT Presentation

pki in federations
SMART_READER_LITE
LIVE PREVIEW

PKI in federations - approach to non-web services Milan Sova, - - PowerPoint PPT Presentation

Everything you never wanted to know about PKI in federations - approach to non-web services Milan Sova, CESNET EuroCAMP, Dubrovnik, 2007 SAMLized applications HTTPS web browser What about email access network access


slide-1
SLIDE 1

PKI in federations

  • approach to non-web

services

Everything you never wanted to know about

Milan Sova, CESNET EuroCAMP, Dubrovnik, 2007

slide-2
SLIDE 2

SAMLized applications

  • HTTPS
  • web browser

What about

  • email access
  • network access
  • message signing & encryption
  • VoIP
  • VPN
  • ...
slide-3
SLIDE 3

Before SAML: X.509

  • CA ... IdP
  • AA ... AA
  • Relying Parties ... SPs, relying parties

...

slide-4
SLIDE 4

X.509

{ { Issuer, ... Subject, Statement (PK/Attrs...), ... } Signature }

slide-5
SLIDE 5

SAML

<saml:Assertion> <saml:Issuer/> <ds:Signature/> <saml:Subject/> <saml:Statement/> ... ... <saml:Assertion>

slide-6
SLIDE 6

Why X.509 didn't make it while SAML seems to be succeeding?

  • format: binary vs. text
  • scope: general vs. specific
  • standards: closed vs. open
  • community: telcos vs. internet
  • assertions: static vs. dynamic
  • trust architecture: root vs. peers
slide-7
SLIDE 7

Why is X.509 not dead yet?

  • ubiquitous code
  • long-term signing
  • document encryption
  • authentication

– TLS servers – even (TLS) users!

slide-8
SLIDE 8

X.509 issues

  • certificate enrollment

– identity management

  • certificate management

– by users

  • “private” keys

– by the relying parties

  • trust anchors
  • CRLs

– by the infrastructure

  • re-keying, modification, revocation...
  • PKI's not easy... BUT...
slide-9
SLIDE 9

X.509 and federations

  • federated CA: certificate enrollment

– federated identity – attributes for authorization

  • different CAs for different purposes
  • an X.509 certificate does not have to

be heavy

  • an X.509 certificate can be

pseudonymous

slide-10
SLIDE 10

Possible X.509 applications

  • network access (eduroam™)

– EAP/TLS – authenticate devices not users

  • VPN

– OpenVPN

  • SIP?

– might work (at least for software clients)

  • WebDAV?

– why not? - it's just HTTPS

slide-11
SLIDE 11