Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
11Activity
P. 1
‘Investigation and implementation of Shibboleth SSO authentication mechanism through a specific scenario’

‘Investigation and implementation of Shibboleth SSO authentication mechanism through a specific scenario’

Ratings:

5.0

(6)
|Views: 196 |Likes:
This work titled ‘Investigation and implementation of Shibboleth SSO mechanism
through a case scenario’ presents, discusses, describes and explains the major aspects
and concepts of Shibboleth protocol and provides two related prototypes
implementations of the protocol within a set of chosen tools and environments. The
implementation relies on the project client specifications and recommendations and
therefore follows some imposed deployment infrastructures. The work report first
focuses on the research investigation in Shibboleth concepts, its relationship with
similar mechanisms and its particularities in the Single Sign On mechanism alongside
with its federation principles. It also emphasizes on the SAML (Security Assertion Mark-
up Language), the protocol that Shibboleth implements and on which it relies. The
second major part of this report describes step by step the installation, deployment and
configurations of Shibboleth in working prototypes within Windows based Operating
Systems.

The primary prototype implementation is a sort of initial deployment carried out within a
self-defined ad-hoc environment helping to implement the second prototype.
Considered in this project as the real time prototype as it has been conducted within the
client premises, the second prototype has some similar steps of the primary
implementation and is much more complete in terms of applications integrations and the
Shibboleth log out mechanism. It also focuses more on the client specifications. The
end of this real time prototype provides the integration strategy of 247lib.com/247libDE
application. A testing approach is then provided to demonstrate how successful sample
of simple applications have been integrated into the implementation. The test illustrates
with details description the main use case scenario of authentication through the
Shibboleth based single sign on mechanism. The appendix part of this report and the
CD bound to the report include the configuration files of the project implementation, the
testing data and other project details.

The project report finally discusses the encountered risks and issues faced throughout
the project progress alongside with a critical appraisal and recommendations for future
works.
This work titled ‘Investigation and implementation of Shibboleth SSO mechanism
through a case scenario’ presents, discusses, describes and explains the major aspects
and concepts of Shibboleth protocol and provides two related prototypes
implementations of the protocol within a set of chosen tools and environments. The
implementation relies on the project client specifications and recommendations and
therefore follows some imposed deployment infrastructures. The work report first
focuses on the research investigation in Shibboleth concepts, its relationship with
similar mechanisms and its particularities in the Single Sign On mechanism alongside
with its federation principles. It also emphasizes on the SAML (Security Assertion Mark-
up Language), the protocol that Shibboleth implements and on which it relies. The
second major part of this report describes step by step the installation, deployment and
configurations of Shibboleth in working prototypes within Windows based Operating
Systems.

The primary prototype implementation is a sort of initial deployment carried out within a
self-defined ad-hoc environment helping to implement the second prototype.
Considered in this project as the real time prototype as it has been conducted within the
client premises, the second prototype has some similar steps of the primary
implementation and is much more complete in terms of applications integrations and the
Shibboleth log out mechanism. It also focuses more on the client specifications. The
end of this real time prototype provides the integration strategy of 247lib.com/247libDE
application. A testing approach is then provided to demonstrate how successful sample
of simple applications have been integrated into the implementation. The test illustrates
with details description the main use case scenario of authentication through the
Shibboleth based single sign on mechanism. The appendix part of this report and the
CD bound to the report include the configuration files of the project implementation, the
testing data and other project details.

The project report finally discusses the encountered risks and issues faced throughout
the project progress alongside with a critical appraisal and recommendations for future
works.

More info:

Categories:Types, School Work
Published by: Gilles Rubens Badouet on Oct 28, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
See more
See less

07/04/2014

 
B@\MJW[X
]JH\M[RHWX
 
Lnbuoty `l Mjdhjmmrhjd njg B`cputhjd
―Hjvmsthdnth`j njg hcpomcmjtnth`j `l Rehkk`omteRR@ nutemjthbnth`j cmbenjhsc ter`ude nspmbhlhb sbmjnrh`‘
Nute`r1 Dhooms [ukmjs Kng`umtCRb Jmtw`rf B`cputhjd
RHG1 2879274
 Mcnho1dhooms.kng`umtIdcnho.b`cRupmrvhs`r1 Gr. [nent Hqkno
Rukchttmg hj pnrthno luolhocmjt `l tem rmquhrmcmjts l`r tem Gmdrmm `l Cnstmr `l Rbhmjbm Jmtw`rf B`cputhjd
Nbngmchb Xmnr1 ;9>;/>2
 
― Hjvmsthdnth`j njg hcpomcmjtnth`j `l Rehkk`omte RR@ nutemjthbnth`j cmbenjhsc ter`ude n spmbhlhb sbmjnrh`‘
 
;9>;/;9>2
 
Dhooms [ukmjs Kng`umt| C95BGM Yr`ambt| B`vmjtry ]jhvmrshty| ;9>;-;9>2
 
Yndm > `l >;=
 
Gmbonrnth`j `l @rhdhjnohty
Wehs pr`ambt hs noo cy `wj w`rf njg ens j`t kmmj b`phmg hj pnrt `r hj we`om lr`c njy`temr s`urbm mxbmpt wemrm guoy nbfj`womgdmg. Ns sube, noo usm `l prmvh`usoy pukohsemgw`rf (lr`c k``fs, a`urjnos, cndnzhjms, hjtmrjmt, mtb) ens kmmj nbfj`womgdmg whtehj temcnhj rmp`rt t` nj mjtry hj tem [mlmrmjbms ohst.H ndrmm tent nj mombtr`jhb b`py `l tehs rmp`rt cny km st`rmg njg usmg l`r tem purp`sms `lpondhnrhsc prmvmjth`j njg gmtmbth`j.H ujgmrstnjg tent bemnthjd njg pondhnrhsc b`jsthtutm n krmnbe `l ]jhvmrshty [mduonth`jsnjg whoo km gmnot whte nbb`rghjdoy.Rhdjmg1 Dhooms [ukmjs Kng`umt Gntm1 ;</95/;9>2
 
― Hjvmsthdnth`j njg hcpomcmjtnth`j `l Rehkk`omte RR@ nutemjthbnth`j cmbenjhsc ter`ude n spmbhlhb sbmjnrh`‘
 
;9>;/;9>2
 
Dhooms [ukmjs Kng`umt| C95BGM Yr`ambt| B`vmjtry ]jhvmrshty| ;9>;-;9>2
 
Yndm ; `l >;=
 

Activity (11)

You've already reviewed this. Edit your review.
jonihonstonn added this note
Thank you, that is a very detailed research and implementation of a SSO protocol.
johanmarc added this note
Great topic and nice methodology
jonihonstonn liked this
cavasesavoir liked this
marcelolalaa liked this
mbomrob liked this
robbybadou liked this
martinenjouakeu liked this
johanmarc liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->