On Cryptographically Strong Bindings Of Saml Assertions To Transport Layer Security

CONTEMPORARY CHALLENGES AND SOLUTIONS FOR MOBILE AND MULTIMEDIA TECHNOLOGIES(2013)

引用 3|浏览0
暂无评分
摘要
In recent research, two approaches to protect SAML based Federated Identity Management (FIM) against man-in-the-middle attacks have been proposed. One approach is to bind the SAML assertion and the SAML artifact to the public key contained in a TLS client certificate. Another approach is to strengthen the Same Origin Policy of the browser by taking into account the security guarantees TLS gives. This work presents a third approach which is of further interest beyond IDM protocols, especially for mobile devices relying heavily on the security offered by web technologies. By binding the SAML assertion to cryptographically derived values of the TLS session that has been agreed upon between client and the service provider, this approach provides anonymity of the (mobile) browser while allowing Relying Party and Identity Provider to detect the presence of a man-in-the-middle attack.
更多
查看译文
关键词
mobile browser,idm protocol,saml assertion,cryptographically strong bindings,identity provider,saml assertions,mobile device,man-in-the-middle attack,tls client certificate,transport layer security,saml artifact,federated identity management fim,tls session
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要