13.07.2015 Views

Liberty ID-FF Bindings and Profiles Specification - Liberty Alliance

Liberty ID-FF Bindings and Profiles Specification - Liberty Alliance

Liberty ID-FF Bindings and Profiles Specification - Liberty Alliance

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Liberty</strong> <strong>Alliance</strong> Project:<strong>Liberty</strong> <strong>ID</strong>-<strong>FF</strong> <strong>Bindings</strong> <strong>and</strong> <strong>Profiles</strong> <strong>Specification</strong>Version: 1.2-errata-v2.0224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282Description: After getting an artifact or in step 6 (see Section 3.2.1), a legitimate PrincipalA could pass this artifact or on to another Principal, B. Principal B is now able to use theartifact or , while the actual authentication happened via Principal A.Countermeasure: Implementations where this threat is a concern MUST use the in the authentication statement. The IP address that Principal B uses would be different from the IP address within the. This countermeasure may not suffice when the user agent is behind a firewallor proxy server. IP spoofing may also circumvent this countermeasure.Threat: Stolen artifact <strong>and</strong> subsequent Principal impersonationDescription: See Section 4.1.1.9.1 in [SAMLBind11]Countermeasure: Identity providers MUST enforce a policy of one-time retrieval of the assertion corresponding toan artifact so that a stolen artifact can be used only once. Implementations where this threat is a concern MUST use the in the authentication statement. The IP address of a spurious user agent that attemptsto use the stolen artifact would be different from IP address within the .The service provider may then be able to detect that the IP addresses differ. This countermeasure may not suffice whenthe user agent is behind a firewall or proxy server. IP address spoofing may also circumvent this countermeasure.Threat: Stolen assertion <strong>and</strong> subsequent Principal impersonationDescription: See Section 4.1.1.9.1 in [SAMLBind11]Countermeasure: Refer to the previous threat for requirements.Threat: Rogue service provider uses artifact or assertion to impersonate Principal at a different service providerDescription: Because the contains the , this threat is not possible.Countermeasure: NoneThreat: Rogue identity provider impersonates Principal at a service providerDescription: Because the Principal trusts the identity provider, it is assumed that the identity provider does not misusethe Principal’s trust.Countermeasure: NoneThreat: Identity provider modifies Principal during a session with a service providerDescription: A service provider whose session has exceeded the time must contactthe Identity provider to get a new assertion. The new assertion might be for a different identity.Countermeasure: Service providers should continue to follow assertion processing rules to ensure that the subject ofany assertions received is actually the user for which the assertion is needed.Threat: Rogue user attempts to impersonate currently logged-in legitimate Principal <strong>and</strong> thereby gain access toprotected resources.Description: Once a Principal is successfully logged into an identity provider, subsequent messages from different service providers concerning that Principal will not necessarily cause the Principal to bereauthenticated. Principals must, however, be authenticated unless the identity provider can determine that an is associated not only with the Principal’s identity, but also with a validly authenticated identityprovider session for that Principal.Countermeasure: In implementations where this threat is a concern, identity providers MUST maintain stateinformation concerning active sessions, <strong>and</strong> MUST validate the correspondence between an <strong>and</strong><strong>Liberty</strong> <strong>Alliance</strong> Project66

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!