Skip to Content.
Sympa Menu

shibboleth-dev - Various SAML demos

Subject: Shibboleth Developers

List archive

Various SAML demos


Chronological Thread 
  • From: David Chadwick <>
  • To: Core Middleware Technology Development <>, Christopher Brown <>, TAS3 ALL <>, Nicole Harris <>,
  • Subject: Various SAML demos
  • Date: Mon, 29 Jun 2009 22:38:35 +0100
  • Organization: University of Kent

Dear All

we now have a number of Shibboleth/SAMLv2/Liberty Alliance/LOA/PERMIS demos available at

http://issrg-beta.cs.kent.ac.uk:8080/loademo.html

which show

i) How SAMLv2 attribute assertions are used to authorise access to web sites using a Shibboleth IDP
ii) How SAMLv2 LOA statements (from 1 to 4) are used to authorise access to various web pages of increasing sensitivity
iii) How SAMLv2 and Liberty Alliance protocols are used to aggregate attributes together from various IDPs to grant access to a web site (by providing multiple linked SAML attribute assertions)
iv) How SAMLv2 and LOA and Liberty Alliance are used to aggregate attributes together at varying levels of assurance to grant access to a web site.

All sites are protected using off the shelf PERMIS which has been configured with appropriate policies to support the varying LOAs and attribute assertions from the different sites.

You can set up your own IDP accounts of varying LOAs at 4 different IDPs in order to run the tests, and set up your own IDP linking policy in order to gain access to the sites that require attribute aggregation.

If you have any feedback on the demos please dont hesitate to tell us.

regards

David


*****************************************************************
David W. Chadwick, BSc PhD
Professor of Information Systems Security
The Computing Laboratory, University of Kent, Canterbury, CT2 7NF
Skype Name: davidwchadwick
Tel: +44 1227 82 3221
Fax +44 1227 762 811
Mobile: +44 77 96 44 7184
Email:

Home Page: http://www.cs.kent.ac.uk/people/staff/dwc8/index.html
Research Web site: http://www.cs.kent.ac.uk/research/groups/iss/index.html
Entrust key validation string: MLJ9-DU5T-HV8J
PGP Key ID is 0xBC238DE5

*****************************************************************



  • Various SAML demos, David Chadwick, 06/29/2009

Archive powered by MHonArc 2.6.16.

Top of Page