knock knock - who's there?

25
Knock, Knock – Who’s There? Towards Federated Authentication Leigh Dodds Chief Technology Officer, Ingenta Society for Scholarly Publishing San Francisco, June 2007

Upload: leigh-dodds

Post on 20-Aug-2015

4.634 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Knock Knock - Who's There?

Knock, Knock – Who’s There?Towards Federated Authentication

Leigh DoddsChief Technology Officer, Ingenta

Society for Scholarly PublishingSan Francisco, June 2007

Page 2: Knock Knock - Who's There?

The Identity Problem

Page 3: Knock Knock - Who's There?

Too many passwords

…Flickr & YouTube & FaceBook & MySpace & LiveJournal & LinkedIn…

Page 4: Knock Knock - Who's There?

Identity Silos

Page 5: Knock Knock - Who's There?

Vendor Lock-In

E.g. Microsoft Passport

Page 6: Knock Knock - Who's There?

Single Sign-On can solve these problems

Single Sign-On = Federated Authentication

Page 7: Knock Knock - Who's There?

Knock, Knock

Page 8: Knock Knock - Who's There?

Who’s There?

Page 9: Knock Knock - Who's There?

Dude..It’s Me…

Page 10: Knock Knock - Who's There?

Who Says?

Page 11: Knock Knock - Who's There?

Er…Ask That Guy…

Page 12: Knock Knock - Who's There?
Page 13: Knock Knock - Who's There?

Hey, do you know this guy?

Page 14: Knock Knock - Who's There?

Dude, that’s Leigh

Page 15: Knock Knock - Who's There?

Respect Mah Authoritah!

Page 16: Knock Knock - Who's There?

Oh, OK. Thanks

Page 17: Knock Knock - Who's There?

Hi, Leigh…

Page 18: Knock Knock - Who's There?

There’s More Than One Way to Implement This

Page 19: Knock Knock - Who's There?

User

Service Provider

Identity Provider

Page 20: Knock Knock - Who's There?

Where Things Differ…

• How do we know who the user’s Identity Provider is?

• How do the Service Providers and Identity Providers talk to one another?

• What information does the Identity Provider expose about the User?

• Can we trust the Identity Provider?

• How does the Identity Provider authenticate the user?

Page 21: Knock Knock - Who's There?
Page 22: Knock Knock - Who's There?
Page 23: Knock Knock - Who's There?

OpenId

• User-centric

• Simple to implement

• Growing number of open source toolkits

• Rapid adoption in web community

• Does not address trust issue

Page 24: Knock Knock - Who's There?

Shibboleth

• Library-centric

• Complex to implement

• Open source software plus commercial options

• Growing adoption in library and publishing communities

• Introduces element of trust

Page 25: Knock Knock - Who's There?

Conclusions & Further Reading

http://del.icio.us/ldodds/tag/ssp-2007-06