首页> 外文期刊>Computers & Security >An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations
【24h】

An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations

机译:基于浏览器的单点登录协议中的身份验证缺陷:影响和补救措施

获取原文
获取原文并翻译 | 示例
           

摘要

Browser-based Single Sign-On (SSO) protocols relieve the user from the burden of dealing with multiple credentials thereby improving the user experience and the security. In this paper we show that extreme care is required for specifying and implementing the prototypical browser-based SSO use case. We show that the main emerging SSO protocols, namely SAML SSO and OpenID, suffer from an authentication flaw that allows a malicious service provider to hijack a client authentication attempt or force the latter to access a resource without its consent or intention. This may have serious consequences, as evidenced by a Cross-Site Scripting attack that we have identified in the SAML-based SSO for Google Apps and in the SSO available in Novell Access Manager v.3.1. For instance, the attack allowed a malicious web server to impersonate a user on any Google application. We also describe solutions that can be used to mitigate and even solve the problem.
机译:基于浏览器的单点登录(SSO)协议使用户免于处理多个凭证的负担,从而改善了用户体验和安全性。在本文中,我们表明在指定和实现基于浏览器的原型SSO用例时需要格外小心。我们显示出主要的新兴SSO协议(即SAML SSO和OpenID)遭受身份验证漏洞的困扰,该漏洞允许恶意服务提供商劫持客户端身份验证尝试或强迫后者未经其同意或意图访问资源。正如我们在基于SAML的Google Apps SSO和Novell Access Manager v.3.1中可用的SSO中发现的跨站点脚本攻击所证明的那样,这可能会带来严重的后果。例如,该攻击允许恶意Web服务器在任何Google应用程序上模拟用户。我们还将描述可用于缓解甚至解决问题的解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号