February 27, 2012

SAML tokens and WS-Trust Security Token Service (STS)

I've been working actively in the Apache CXF community with respect to SAML tokens and the WS-Trust SecurityTokenService (STS) since Talend's donation of the STS to the community. I've noticed in various WS-Trust projects that there is a lack of documentation about the different use cases for SAML tokens and the WS-Trust STS.

I'll give a brief introduction into SAML and STS before bringing the two together.


SAML


SAML is an OASIS standard and consists of several specifications. A SAML token is issued by an identity provider. A service provider relies on the identity provider to authenticate a principal (a user). The SAML assertion is provided to the service provider allowing it to make an access control decision. The main problem SAML tries to solve is Web Single Sign On.

There is a clear layering between the SAML specifications thus they can be fairly easy reused in other contexts. Another context besides Web SSO is Web Services communication - which I'll be covering here. Therefore, we only need to look into the SAML Core specification as it describes the syntax and semantics of SAML assertions. The SAML protocols are covered by SAML core too but there are not relevant for Web Services communication. This is also the case for the SAML bindings (how SAML messages are transmitted from one system entity to another) as well as for SAML profile which describes use cases for Web application Single Sign On.

A SAML assertion (also known as SAML security token) contains different kinds of statements: authentication-, attribute- and authorization decision statements. The "authorization decision statement" became deprecated in SAML 2.0 specification as it is covered in XACML and in claims based authorization based on standard SAML attribute statements. The former is quite complex whereas the latter provides already good options for fine grained authorization at less complexity. You can find more information about the latter here.


A SAML assertion contains a subject which identifies the principal. The subject can also contain additional information like key material and the subject confirmation method. One of the main topics in this blog are the different kind of subject confirmation methods and how they correlate to an STS.


As a side note, the subject confirmation method is not defined in the SAML core. Instead, the SAML profile specification defines the following three subject confirmation methods:
  • Holder of Key (HOK)
    The subject must contain key material so the service provider is able to validate that the requestor is in the possession of the key(s)
  • Bearer
    The subject doesn't contain key material and it is up to the service provider to accept the assertion or not
  • Sender vouches (SV)
    The subject doesn't contain key material and it is up to the service provider to accept the assertion or not. The requestor and the identity provider are usually the same.

For more information about SAML I recommend Wikipedia and the documentation at the OASIS committee.

Web Services and SAML

SAML in the context of Web Services is standardized in the SAML token profile here. It describes on the one hand how a SAML token is embedded in a SOAP message and on the other hand what kind of requirements must be met dependent on the SAML version and subject confirmation method.


I can highly recommend the following web services security usecases from OASIS as it describes very interesting use cases by combining transport level and message level security (ex. SAML HOK is very complex and has a performance impact as XML signature is required. This document describes how to use mutual SSL handshake for the proof-of-possession processing)

In 2011, many new security features have been added to CXF. Check the following blog for more information.



WS-Trust STS


The WS-Trust standard introduces a runtime component called Security Token Service (STS). A service consumer requests a security token from the STS which is sent to the service provider. Either the service provider can validate the security token on its own or sends a request to the STS for validation. This pattern is based on an indirect trust relationship between the service provider and the STS instead of between the service provider and service consumer. As long as the service consumer is in the possession of a security token issued by a trusted STS, the service provider accepts the token sent by the service consumer. This is the same pattern as for certificates and certificate authorities. This approach has significant advantages compared to a direct (brokered) trust established between a service provider and service consumer. The specification is an OASIS standard and can be downloaded here.

The STS can issue security tokens based on requirements provided by the service consumer and/or service provider. The requirements of the service provider are either expressed in a WS-Policy document according to WS-SecurityPolicy or out-of-band agreement.


A key benefit of the STS is the reduced complexity for web service consumer. A web service consumer doesn't have to know how to create the various types of security tokens its service providers require. Instead, it sends a request to the STS containing the requirements of the client and the service provider and attaches the returned security token to the outgoing SOAP message to the service provider. One service provider could require a SAML 1.1 token, another a SAML 2.0 token and another a custom binary security token. The service consumer doesn't have to understand SAML 1.1, SAML 2.0 or the custom binary security token. All he has to do is grab the returned token from the STS and attach it to the message. Thus, you can reduce the complexity in your application and move it to a centralized component.


How does a web service consumer know whether it has to go to an STS to request a token? The policy of the service provider contains an IssuedToken assertion with some additional information like the address of the STS, token type, claims, etc.


Now, it's time to explain a few parameters of the request (RST) to the STS.


TokenType
specifies the type of security token requested (ex. SAML 1.1, 2.0, X.509, ...). URIs are defined for all standard security tokens.

KeyType
specifies the type of key desired in the security token. There are three URIs defined:
  • PublicKey
  • SymmetricKey
  • Bearer

Claims
specifies the required and optional claims in the security token. A claim can be the email address, role information, country, etc.


AppliesTo
specifies the scope for which the security token is required. This can be the URL of the service provider.


Lifetime
specifies the creation and expiration time of the security token. The STS is not obligated to honor this range.

These parameters can be retrieved from the WS-SecurityPolicy document also. In that case, they are added as child elements of the SecondaryParameters element in the RST.



SAML and STS 


How does a SAML token and the parameters sent to the STS match with each other. How does the STS know which subject confirmation method should be used? OK, let's start with the more obvious one.

1) TokenType
the token type is either SAML 1.1 or SAML 2.0. The STS creates the corresponding SAML assertion

2) AppliesTo
the AppliesTo element defines the scope and thus match to the SAML AudienceRestriction element in the SAML condition

3) Lifetime
the value of the lifetime or the lifetime choosen by the STS matchs to the SAML conditions NotBefore and NotAfter

4) Claims
the claim values maps to a SAML attribute statement. It's standardized here how claims are encoded as a SAML attribute statement. You can get more information about claims here.


How is the trust between the service provider and the STS established? This is fairly easy. The SAML assertion is signed by the STS. The signing certificate must be configured in the service provider to be trusted.


But how can the STS know whether the subject confirmation method should be HoK, SV or Bearer.
If the KeyType contains the value PublicKey or SymmetricKey, the subject confirmation method is Holder-Of-Key.
If the KeyType contains the value Bearer, the subject confirmation method is Bearer.

The benefit of HoK is that even if somebody gets into the possession of a SAML token he can't 
send requests masquerading as the subject in the SAML token as he doesn't know the key (symmetric or private key). However SAML tokens with Bearer subject confirmation method must be protected. In most cases, Bearer combined with HTTPS is sufficient to prevent that "a man in the middle" can get into the possession of the SAML token.

The subject confirmation methods Bearer and Holder-Of-Key are widely used for all STS use cases as well as for Web Single Sign On in WS-Federation Passive Requestor Profile and SAML Post Profile.


OK, what about sender-vouches? Even it is not clearly stated it makes no sense to request a SAML token from an STS with sender-vouches subject confirmation method.


You might know this paper from IBM which describes how to get a SAML token from the STS with sender-vouches. Even though it's from IBM, I won't change my opinion ;-)

Let's step back once and have a look what the differences are between a SAML token with subject confirmation method Bearer and Sender-Vouches. Utlimately, it is just a string in the ConfirmationMethod element. Of course, an STS can put the string for Sender-Vouches into the SAML token - not a big deal.

The WS-Security SAML token profile defines the processing rules for HoK and Sender Vouches. In the case of Sender-Vouches it says that the attesting entity, (presumed to be) different from the subject, vouches for the verification of the subject. The receiver MUST have an existing trust relationship with the attesting entity. The attesting entity MUST protect the assertion in combination with the message content against modification by another party. The trust is established based on certificates where the attesting entity (service consumer) creates a signature which protects the SAML token and the SOAP body. The service provider verifies the signature to have the confirmation that nobody made changes either to the token or the SOAP body. The receiver (service provider) must have imported the certificate of the service consumer.
A SV SAML token itself is not signed in contrast to Bearer and HoK because there is no third party like an STS. It wouldn't make sense for an STS to issue unsigned SAML tokens as there would be no way to protect against other entities adding additional statements.

Therefore, Sender-Vouches doesn't make sense in the context of STS.

Where is SAML Sender-Vouches used? I blogged about this topic here.


15 comments:

  1. Okay, I'm a little confused in the HOK case that the service consumer need only take the SAML token from the STS and place it in the request to the service provider. Wouldn't the service consumer need to sign something in the SAML token to validate that he was holder of key? Otherwise what's to prevent someone from taking the token and using it somewhere else?

    ReplyDelete
  2. You're right the SAML assertion consumer must validate the holder-of-key possession if stated in the subject confirmation method.
    In that case, the service consumer must either sign the request with the matching private key/cert or (for performance reasons) use mutual ssl handshake on the transport level.
    Both cases are supported by CXF:
    http://coheigea.blogspot.ch/2011/09/saml-securitypolicy-enforcement-in-cxf.html

    ReplyDelete
  3. how service provider and principal(user) in identity provider will communicate and how they are identified?

    ReplyDelete
  4. Not sure I understand your question. The service provider and identity provider/STS usually do not communicate with each other as the service consumer should request a token of a trusted IDP/STS of the service provider (defined in WS-SecurityPolicy).
    There is no communication between the service provider and the IDP/STS because the trust is established based on the signature of the SAML token where only the IDP is in the possession of the private key for signing.

    ReplyDelete
  5. If SSL handshaking is required for HoK (and a client-side certificate to establish identity), what is the advantage of using SAML (with all of the overhead of the IdP) over just SSL with client/server-side certificates? It would seem one is setting up a pretty good way to authenticate the service consumer/provider with SSL alone.

    ReplyDelete
  6. It depends on your requirements. If you only need to know the identity (subject dn of certificate) of the browser user and have got no other requirements like roles, user attributes for your web application, you can get similar functionality for your web application by using mutual SSL handshake. But the certificate is valid quite a long time thus you might need additional authentication on top of it which must be implemented in the application as well.
    The benefit of introducing an IDP reduces the complexity in all your applications as the whole authentication is externalized to a central component. All user attributes can be provided by the IDP without requiring the applications accessing an identity store to get this information which means you introduce a dependency to it in the application. Imagine what is required to support a new authentication mechanism like two factor authentication. You can implement it once in the IDP and use it in all applications where required or implement this functionality in all required applications and technology stacks (Java, .NET)

    ReplyDelete
  7. Oliver, thanks very much for taking the time to post this. It's been very useful to me.
    Kind regards,
    Guy

    ReplyDelete
  8. have you run across any good learning examples for the server-side (consumer) using Camel and CXF that you can point me to?

    ReplyDelete
  9. I assume you mean message consumer from a camel point of view?
    The Apache CXF Fediz project (http://cxf.apache.org/fediz.html) has got an example "wsclientWebapp" where a secured Web Services is called by a secured Web Application. The request to the Web Services is executed on behalf of the browser user. The STS and SAML plays a key role in this example. You can just replace the JAX-WS implementation by a Camel route using the CXF component.
    I can also recommend the blog of my colleague Colm:
    http://coheigea.blogspot.ch

    ReplyDelete
  10. Hi,
    Is it necessary to send the keytype and other information in the RST message to the STS.
    Is it ok to send the soap message without the xml signature(without signed by the SAML token got it from the RSTR message).

    ReplyDelete
  11. There are defaults defined in the WS-Trust spec for keyType etc. Whether it's ok to not sign the soap message for the target web service depends on its policies (WS-SecurityPolicy).

    The following OASIS spec defines some interesting use cases:
    http://docs.oasis-open.org/ws-sx/security-policy/examples/ws-sp-usecases-examples.html

    Colm describes on his blog how to implement some of the above use cases in CXF:
    http://coheigea.blogspot.ch/2011/12/ws-securitypolicy-examples-in-apache.html

    ReplyDelete
  12. how to pass the saml token in sap webservice method ?

    ReplyDelete
    Replies
    1. This depends on the underlying SAP web service stack. Is SAP acting as a web service consumer? Is SAP able to retrieve a token from the STS?

      Delete
  13. One possible use case of "sender vouches" in combination with a STS infrastructure is a centralized Service Bus which uses the STS for security token mediation purposes.

    Although Bearer would also work, SV removes to need for XML signature validation when the trust between the Service Bus and the service provider is established by Mutual SSL.

    ReplyDelete
    Replies
    1. I describe this use case in this post:
      http://owulff.blogspot.com/2012/03/saml-sender-vouches-use-case.html
      where I also provide some rational why I still prefer STS issued tokens except under certain conditions.
      The usage of the client certificate on the transport level is rarely documented but I've found it here:
      http://docs.oasis-open.org/ws-sx/security-policy/examples/ws-sp-usecases-examples.html

      Delete