Token-based Web Single Signon with Enabled Clients
暂无分享,去创建一个
We study a type of web single signon recently introduced by one of four proposed standard protocols of the Liberty Alliance. In contrast to the other three Liberty protocols and prior protocols like Microsoft Passport and the SAML standard, the client is not only a browser, but aware of the protocol, for instance a web-service client. We investigate how this protocol differs from standard three-party authentication, and possible benefits. We call the new protocol class token-based web single signon with enabled clients. We show a man-in-the-middle attack on the original Liberty V1.0 protocol and countermeasures against it. (Such a countermeasure was now added as an erratum, and no deployed implementation will use V1.0.) We also give general guidance for designing secure protocols in this class.
[1] Aviel D. Rubin,et al. Risks of the Passport single signon protocol , 2000, Comput. Networks.
[2] Birgit Pfitzmann,et al. Privacy in browser-based attribute exchange , 2002, WPES '02.
[3] D. Box,et al. Simple Object Access Protocol (SOAP) 1.1, W3C Note , 2000 .