CoSign: Collaborative Single Sign-On  
AnnouncementsDiscussion
 

cosign-discuss at umich.edu
general discussion of cosign development and deployment
 

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

FW: Central authentication service survey


  • To: "cosign-discuss Discussion" <cosign-discuss@xxxxxxxxx>
  • Subject: FW: Central authentication service survey
  • From: "Drumm, Daniel" <dgdrumm@xxxxxxxxxxxx>
  • Date: Wed, 12 Oct 2005 08:33:34 -0400
  • Thread-index: AcXO0VKp9IGEnzxqSn24YSi9UV+naQAV6sWg
  • Thread-topic: Central authentication service survey

FYI -
 
This is from MIT. They state they are looking at Pubcookie and Yale's CAS. Now might be a good time to remind them of CoSign. :-)


From: owner-stonesoup@xxxxxxxxxxxxxx [mailto:owner-stonesoup@xxxxxxxxxxxxxx] On Behalf Of Christine Cavanna
Sent: Tuesday, October 11, 2005 10:04 PM
To: amb3@xxxxxxxxxxx
Cc: virtnet@xxxxxxxxxxxxx
Subject: Central authentication service survey

 MIT's response is below:
  1.  What do you use for your central password store (e.g. LDAP, Kerberos)?
MIT Kerberos is our primary authentication method and our primary password store.

  1. Have you considered the replacement of your central authentication service, including the central store, with a different technology (e.g. from Kerberos to LDAP)? Why or why not?
No. We have been able to leverage many different usage scenarios from our use of single primary Kerberos realm.

  1. What mechanisms do you provide for campus application developers to integrate with the central service when the application cannot interface directly with the chosen technology (e.g. LDAP proxy for Kerberos, Active Directory integration with MIT Kerberos, web single sign-on solution, proprietary client solution)?
We use a variety of techniques and methods.

For example, by using Kerberos and a web application users are able to obtain a user X.509 certificate. The user certificates are then used for web authentication in a variety of circumstances including purchasing with external vendors, access to commercial software, administrative tasks, and student services. This technology is used by both central services and departmental applications.

We also have some systems that rely on LDAP authentication. In this case the LDAP server(s) use a module to validate the supplied username/password with the central KDC. This technique is not approved for departmental applications. It is only approved when the LDAP server is run by the same group that is responsible for the KDC operations.

In the case of Active Directory we primarily rely on the cross realm authentication provided by the Kerberos protocol. Most users in the central Windows domain do not know their Windows password. The users initially authenticate to the MIT KDC to obtain their native Windows tgt and service tickets. We also provide the ability for the users to set their own native Windows password. This is done so that applications that only support NTLM can be used by the small population that uses those limited applications.

We also have some RADIUS based systems that validate the username/password using the KDC. These systems are also operated by the same group that is responsible for KDC operations.

There has also been some small scale work done around the use of HTTP/SPNEGO, which really means that Kerberos is being used for web authentication.
  1. If you are using either LDAP authentication or an LDAP proxy for Kerberos, how are you mitigating the risk of password exposure at the application server?
As stated in item 3 above, the use of LDAP authentication is only approved when the application server and LDAP server is run by the same group that is responsible for the operation of the KDC. We feel that this substantially mitigates the risk.
  1. What are the current gaps in your authentication service offering and how do you plan to address them?
This topic is undergoing active debate within our organization. We expect that we will expand our web authentication options in the future. We will likely provide a web loginserver along the lines of Pubcookie or Yales CAS and use this to support a Shibboleth deployment.
  1. Do you use a password synchronization service or an enterprise single sign-on solution? Why or why not?
No. We have found no need of one since Kerberos supports cross realm operations.
  1. Have you deployed or are you planning to deploy a dual-factor authentication service? If so, what technology have you chosen?
We are not planning to widely deploy such a service at this time.
  1. If you have recently completed a project to eliminate reliance on Kerberos 4, are there any lessons learned you can share?
We have not yet completed our elimination of Kerberos 4 on our campus.

 

=============================================================================
Christine Cavanna Fitzgerald                                                      
Special Asst to the VP and Strategic Communications

Information Services and Technology
Massachusetts Institute of Technology
77 Massachusetts Avenue  Room 10-219
Cambridge, MA 02139-4307
cavanna@xxxxxxx
617.253.9814    Voice
617.253.0750    Fax
=============================================================================   ---
You are currently subscribed to stonesoup@xxxxxxxxx as: dgdrumm@xxxxxxxxx
To unsubscribe send an email to stonesoup-request@xxxxxxxxx
with the word UNSUBSCRIBE as the SUBJECT of the message.


 
Copyright © 2002 - 2004 Regents of the University of Michigan :  Page last updated 15-December-2010