13.07.2015 Views

Liberty ID-FF Bindings and Profiles Specification - Liberty Alliance

Liberty ID-FF Bindings and Profiles Specification - Liberty Alliance

Liberty ID-FF Bindings and Profiles Specification - Liberty Alliance

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Liberty</strong> <strong>Alliance</strong> Project:<strong>Liberty</strong> <strong>ID</strong>-<strong>FF</strong> <strong>Bindings</strong> <strong>and</strong> <strong>Profiles</strong> <strong>Specification</strong>Version: 1.2-errata-v2.02108210921102111211221132114211521162117211821192120212121224. Security Considerations4.1. IntroductionThis section describes security considerations associated with <strong>Liberty</strong> protocols for identity federation, single sign-on,federation termination, <strong>and</strong> single logout.<strong>Liberty</strong> protocols, schemas, bindings, <strong>and</strong> profiles inherit <strong>and</strong> use extensively the SAML protocols. Therefore, thesecurity considerations published along with the SAML specification have direct relevance (see [SAMLCore11],[SAMLBind11], <strong>and</strong> [SAMLSec]). Throughout this section if, for any reason, a specific consideration or countermeasuredoes not apply or differs, notice of this fact is made; <strong>and</strong> a description of alternatives is supplied, wherepossible.4.2. General Requirements4.2.1. Security of SSL <strong>and</strong> TLSSSL <strong>and</strong> TLS utilize a suite of possible cipher suites. The security of the SSL or TLS session depends on the chosencipher suite. An entity (that is, a user agent, service provider, or identity provider) that terminates an SSL or TLSconnection needs to offer (or accept) suitable cipher suites during the h<strong>and</strong>shake. The following list of TLS 1.0 ciphersuites (or their SSL 3.0 equivalent) is recommended.212321242125212621272128212921302131• TLS_RSA_WITH_RC4_128_SHA• TLS_RSA_WITH_3DES_EDE_CBC_SHA• TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHAThe above list is not exhaustive. The recommended cipher suites are among the most commonly used. Note: Newcipher suites are added as they are st<strong>and</strong>ardized <strong>and</strong> should be considered for inclusion if they have sufficiently strongsecurity properties. For example, it is anticipated that the AES-based cipher suites being st<strong>and</strong>ardized in the IETF willbe widely adopted <strong>and</strong> deployed.4.2.2. Security ImplementationThe suitable implementation of security protocols is necessary to maintain the security of a system, including21322133• Secure r<strong>and</strong>om or pseudo-r<strong>and</strong>om number generation• Secure storage<strong>Liberty</strong> <strong>Alliance</strong> Project62

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!