This implementation uses the “SAMLv2 Lightweight Web Browser SSO Profile” and “SAMLv2.0 HTTP POST SimpleSign Binding”. Since the current use cases are fairly restricted we simplified the process even more such that only source-first SSO, using an unsolicited <Response> message is supported.
The actual federation of identifiers is done during the registration process using existing AOL protocols. SAML is then used for the SSO Assertion between the partners. The flow goes something like this...
- User goes to browser and loads site A
- User authenticates at site A using the account credentials associated with site A
- User clicks on link to partner site B
- Site A generates the SSO Assertion for site B using site B's pre-determined federation identifier
- Site A uses the http POST method to post the SSO Assertion to site B
- Site B validates and verifies the SSO Assertion
- User is “signed-on” to site B with site B's federated identifier
Using the Simple-Sign binding significantly simplified the development effort as XMLDSIG is one of the more complicated parts of SAML. As more tools for XMLDSIG become available this will be less and less of a barrier to adoption.
4 comments:
Hello,
Interesting work!
I've a question: is the user obliged to create a local SP account first before being able to federate with his AOL identity?
If no, how do you manage the case where the user wants to stop using his AOL identity to authenticate on SP (using the federation link)? In that case, you have to find a way to create local credentials at SP side. What if he has previously closed his AOL account (dont't know if it is possible...)?
Thanks.
In the current case the "federation" is what I call "explicit" meaning that it is between two known/existing identifiers. One at the partner, and one at AOL. So there are always "local credentials at the SP side".
There are mechanisms to break the explicit federation but at this time they don't use SAML.
Interesting but I couldn't find a reference to it on the AOL site.
Could you give a pointer ? Is there a guide of how to integrate for SSO? We are running a public SAML2 identity provider at ssocircle.com.
Thanks, Chris
At this time we don't have a process for easily adding partners to our "circle-of-trust". So far this has been for explicit partner relationships. However, we are looking into this as a possible future direction.
Post a Comment