首页> 外文会议>Computer Security Applications Conference >Security Analysis of the SAML Single Sign-on Browser/Artifact Profile
【24h】

Security Analysis of the SAML Single Sign-on Browser/Artifact Profile

机译:SAML单点登录浏览器/工件配置文件的安全分析

获取原文

摘要

Many influential industrial players are currently pursuing the development of new protocols for federated identity management. The Security Assertion Markup Language (SAML) is an important standardized example of this new protocol class and will be widely used in business-to-business scenarios to reduce user-management costs. SAML utilizes a constraint based specification that is a popular design technique of this protocol class. It does not include a general security analysis, but provides an attack-by-attack list of countermeasures as security consideration. We present a security analysis of the SAML Single Sign-on Browser/Artifact profile, which is the first one for such a protocol standard. Our analysis of the protocol design reveals several flaws in the specification that can lead to vulnerable implementations. To demonstrate their impact, we exploit some of these flaws to mount attacks on the protocol.
机译:许多有影响力的工业参与者目前正在追求联合身份管理的新协议。安全断言标记语言(SAML)是该新协议类的一个重要标准化示例,并将广泛用于业务对业务场景,以减少用户管理成本。 SAML利用基于约束的规范,这是本协议类的流行设计技术。它不包括一般安全分析,但提供攻击禁止对策列表作为安全考虑。我们对SAML单点登录浏览器/工件配置文件提供了安全分析,这是第一个用于此类协议标准的浏览器。我们对协议设计的分析揭示了在规范中的几个缺陷,这可能导致易受攻击的实现。为了展示他们的影响,我们利用一些这些缺陷来安装对协议的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号