Claims-Based Authentication for a Web-Based Enterprise

reportActive / Technical Report | Accession Number: ADA607070 | Open PDF

Abstract:

Authentication is the process of determining whether someone or something is, in fact, who or what they are declared to be. The authentication process uses credentials claims containing authentication information within one of many possible authentication protocols to establish the identities of the parties that wish to collaborate. Claims are representations that are provided by a trusted entity and can be verified and validated. Of the many authentication protocols, including self-attestation, usernamepassword and presentation of credentials, only the latter can be treated as claims. This is a key aspect of our enterprise solution, in that all active entities persons, machines, and services are credentialed and the authentication is bi-lateral, that is, each entity makes a claim to the other entity in every communication session initiated. This paper describes authentication that uses the TLS protocols primarily since these are the dominant protocols above the transport layer on the Internet. Other higher layer protocols, such as WS-Security, WS-Federation and WS-Trust, that use a Public Key Infrastructure credential for authentication, integrate via middleware. This authentication is claims based and is a part of an enterprise level security solution that has been piloted and is undergoing operational standup.

Security Markings

DOCUMENT & CONTEXTUAL SUMMARY

Distribution:
Approved For Public Release
Distribution Statement:
Approved For Public Release; Distribution Is Unlimited.

RECORD

Collection: TR
Identifying Numbers
Subject Terms