1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229
|
<pre>Internet Engineering Task Force (IETF) K. Wierenga
Request for Comments: 6595 Cisco Systems, Inc.
Category: Standards Track E. Lear
ISSN: 2070-1721 Cisco Systems GmbH
S. Josefsson
SJD AB
April 2012
A Simple Authentication and Security Layer (SASL) and GSS-API Mechanism
for the Security Assertion Markup Language (SAML)
Abstract
The Security Assertion Markup Language (SAML) has found its usage on
the Internet for Web Single Sign-On. The Simple Authentication and
Security Layer (SASL) and the Generic Security Service Application
Program Interface (GSS-API) are application frameworks to generalize
authentication. This memo specifies a SASL mechanism and a GSS-API
mechanism for SAML 2.0 that allows the integration of existing SAML
Identity Providers with applications using SASL and GSS-API.
Status of This Memo
This is an Internet Standards Track document.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Further information on
Internet Standards is available in <a href="./rfc5741#section-2">Section 2 of RFC 5741</a>.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
<a href="http://www.rfc-editor.org/info/rfc6595">http://www.rfc-editor.org/info/rfc6595</a>.
<span class="grey">Wierenga, et al. Standards Track [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>
Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a> and the IETF Trust's Legal
Provisions Relating to IETF Documents
(<a href="http://trustee.ietf.org/license-info">http://trustee.ietf.org/license-info</a>) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
<a href="#section-1">1</a>. Introduction ....................................................<a href="#page-3">3</a>
<a href="#section-1.1">1.1</a>. Terminology ................................................<a href="#page-4">4</a>
<a href="#section-1.2">1.2</a>. Applicability ..............................................<a href="#page-4">4</a>
<a href="#section-2">2</a>. Authentication Flow .............................................<a href="#page-5">5</a>
<a href="#section-3">3</a>. SAML SASL Mechanism Specification ...............................<a href="#page-7">7</a>
<a href="#section-3.1">3.1</a>. Initial Response ...........................................<a href="#page-8">8</a>
<a href="#section-3.2">3.2</a>. Authentication Request .....................................<a href="#page-8">8</a>
<a href="#section-3.3">3.3</a>. Outcome and Parameters .....................................<a href="#page-9">9</a>
<a href="#section-4">4</a>. SAML GSS-API Mechanism Specification ...........................<a href="#page-10">10</a>
<a href="#section-4.1">4.1</a>. GSS-API Principal Name Types for SAML .....................<a href="#page-11">11</a>
<a href="#section-5">5</a>. Examples .......................................................<a href="#page-11">11</a>
<a href="#section-5.1">5.1</a>. XMPP ......................................................<a href="#page-11">11</a>
<a href="#section-5.2">5.2</a>. IMAP ......................................................<a href="#page-15">15</a>
<a href="#section-6">6</a>. Security Considerations ........................................<a href="#page-17">17</a>
<a href="#section-6.1">6.1</a>. Man-in-the-Middle and Tunneling Attacks ...................<a href="#page-17">17</a>
6.2. Binding SAML Subject Identifiers to Authorization
Identities ................................................<a href="#page-17">17</a>
<a href="#section-6.3">6.3</a>. User Privacy ..............................................<a href="#page-18">18</a>
<a href="#section-6.4">6.4</a>. Collusion between RPs .....................................<a href="#page-18">18</a>
<a href="#section-6.5">6.5</a>. Security Considerations Specific to GSS-API ...............<a href="#page-18">18</a>
<a href="#section-7">7</a>. IANA Considerations ............................................<a href="#page-18">18</a>
<a href="#section-7.1">7.1</a>. IANA Mech-Profile .........................................<a href="#page-18">18</a>
<a href="#section-7.2">7.2</a>. IANA OID ..................................................<a href="#page-19">19</a>
<a href="#section-8">8</a>. References .....................................................<a href="#page-19">19</a>
<a href="#section-8.1">8.1</a>. Normative References ......................................<a href="#page-19">19</a>
<a href="#section-8.2">8.2</a>. Informative References ....................................<a href="#page-21">21</a>
<a href="#appendix-A">Appendix A</a>. Acknowledgments .......................................<a href="#page-22">22</a>
<span class="grey">Wierenga, et al. Standards Track [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>
<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>. Introduction</span>
Security Assertion Markup Language (SAML) 2.0 [<a href="#ref-OASIS-SAMLv2-CORE">OASIS-SAMLv2-CORE</a>] is
a set of specifications that provide various means for a user to be
identified to a Relying Party (RP) through the exchange of (typically
signed) assertions issued by an Identity Provider (IdP). It includes
a number of protocols, protocol bindings [<a href="#ref-OASIS-SAMLv2-BIND">OASIS-SAMLv2-BIND</a>], and
interoperability profiles [<a href="#ref-OASIS-SAMLv2-PROF">OASIS-SAMLv2-PROF</a>] designed for different
use cases.
The Simple Authentication and Security Layer (SASL) [<a href="./rfc4422" title=""Simple Authentication and Security Layer (SASL)"">RFC4422</a>] is a
generalized mechanism for identifying and authenticating a user and
for optionally negotiating a security layer for subsequent protocol
interactions. SASL is used by application protocols like IMAP
[<a href="./rfc3501" title=""INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1"">RFC3501</a>], the Post Office Protocol (POP) [<a href="./rfc1939" title=""Post Office Protocol - Version 3"">RFC1939</a>], and the
Extensible Message and Presence Protocol (XMPP) [<a href="./rfc6120" title=""Extensible Messaging and Presence Protocol (XMPP): Core"">RFC6120</a>]. The
effect is to make modular authentication, so that newer
authentication mechanisms can be added as needed. This memo
specifies just such a mechanism.
The Generic Security Service Application Program Interface (GSS-API)
[<a href="./rfc2743" title=""Generic Security Service Application Program Interface Version 2, Update 1"">RFC2743</a>] provides a framework for applications to support multiple
authentication mechanisms through a unified programming interface.
This document defines a pure SASL mechanism for SAML, but it conforms
to the new bridge between SASL and the GSS-API called GS2 [<a href="./rfc5801" title=""Using Generic Security Service Application Program Interface (GSS-API) Mechanisms in Simple Authentication and Security Layer (SASL): The GS2 Mechanism Family"">RFC5801</a>].
This means that this document defines both a SASL mechanism and a
GSS-API mechanism. The GSS-API interface is OPTIONAL for SASL
implementers, and the GSS-API considerations can be avoided in
environments that use SASL directly without GSS-API.
As currently envisioned, this mechanism enables interworking between
SASL and SAML in order to assert the identity of the user and other
attributes to RPs. As such, while servers (as RPs) will advertise
SASL mechanisms (including SAML), clients will select the SAML SASL
mechanism as their SASL mechanism of choice.
The SAML mechanism described in this memo aims to reuse the Web
Browser Single Sign-On (SSO) profile defined in <a href="#section-4.1">Section 4.1</a> of the
SAML 2.0 profiles specification [<a href="#ref-OASIS-SAMLv2-PROF">OASIS-SAMLv2-PROF</a>] to the maximum
extent and therefore does not establish a separate authentication,
integrity, and confidentiality mechanism. The mechanism assumes that
a security layer, such as Transport Layer Security (TLS) [<a href="./rfc5246" title=""The Transport Layer Security (TLS) Protocol Version 1.2"">RFC5246</a>],
will continue to be used. This specification is appropriate for use
when a browser instance is available. In the absence of a browser
instance, SAML profiles that don't require a browser, such as the
Enhanced Client or Proxy profile (as defined in Section 4.2 of
[<a href="#ref-OASIS-SAMLv2-PROF">OASIS-SAMLv2-PROF</a>], may be used, but that is outside the scope of
this specification.
<span class="grey">Wierenga, et al. Standards Track [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>
Figure 1 describes the interworking between SAML and SASL: this
document requires enhancements to the RP (the SASL server) and to the
client, as the two SASL communication end points, but no changes to
the SAML IdP are necessary. To accomplish this goal, some indirect
messaging is tunneled within SASL, and some use of external methods
is made.
+-----------+
| |
>| Relying |
/ | Party |
// | |
// +-----------+
SAML/ // ^
HTTPS // +--|--+
// | S| |
/ S | A| |
// A | M| |
// S | L| |
// L | | |
// | | |
</ +--|--+
+------------+ v
| | +----------+
| SAML | HTTPS | |
| Identity |<--------------->| Client |
| Provider | | |
+------------+ +----------+
Figure 1: Interworking Architecture
<span class="h3"><a class="selflink" id="section-1.1" href="#section-1.1">1.1</a>. Terminology</span>
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in <a href="./rfc2119">RFC 2119</a> [<a href="./rfc2119" title=""Key words for use in RFCs to Indicate Requirement Levels"">RFC2119</a>].
The reader is assumed to be familiar with the terms used in the
SAML 2.0 core specification [<a href="#ref-OASIS-SAMLv2-CORE">OASIS-SAMLv2-CORE</a>].
<span class="h3"><a class="selflink" id="section-1.2" href="#section-1.2">1.2</a>. Applicability</span>
Because this mechanism transports information that should not be
controlled by an attacker, the SAML mechanism MUST only be used over
channels protected by TLS, or over similar integrity-protected and
authenticated channels. In addition, when TLS is used, the client
MUST successfully validate the server's certificate ([<a href="./rfc5280" title=""Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile"">RFC5280</a>],
[<a href="./rfc6125" title=""Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)"">RFC6125</a>]).
<span class="grey">Wierenga, et al. Standards Track [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>
Note: An Intranet does not constitute such an integrity-protected and
authenticated channel!
<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>. Authentication Flow</span>
While SAML itself is merely a markup language, its common use case
these days is with HTTP [<a href="./rfc2616" title=""Hypertext Transfer Protocol -- HTTP/1.1"">RFC2616</a>] or HTTPS [<a href="./rfc2818" title=""HTTP Over TLS"">RFC2818</a>] and HTML
[<a href="#ref-W3C-REC-HTML401">W3C-REC-HTML401</a>]. What follows is a typical flow:
1. The browser requests a resource of an RP (via an HTTP request).
2. The RP redirects the browser via an HTTP redirect (as described
in <a href="./rfc2616#section-10.3">Section 10.3 of [RFC2616]</a>) to the IdP or an IdP discovery
service. When it does so, it includes the following parameters:
(1) an authentication request that contains the name of the
resource being requested, (2) a browser cookie, and (3) a return
URL as specified in Section 3.1 of [<a href="#ref-OASIS-SAMLv2-PROF">OASIS-SAMLv2-PROF</a>].
3. The user authenticates to the IdP and perhaps authorizes the
release of user attributes to the RP.
4. In its authentication response, the IdP redirects (via an HTTP
redirect) the browser back to the RP with an authentication
assertion (stating that the IdP vouches that the subject has
successfully authenticated), optionally along with some
additional attributes.
5. The RP now has sufficient identity information to approve access
to the resource or not, and acts accordingly. The authentication
is concluded.
When considering this flow in the context of SASL, we note that while
the RP and the client both must change their code to implement this
SASL mechanism, the IdP can remain untouched. The RP already has
some sort of session (probably a TCP connection) established with the
client. However, it may be necessary to redirect a SASL client to
another application or handler. The steps are as follows:
1. The SASL server (RP) advertises support for the SASL SAML20
mechanism to the client.
2. The client initiates a SASL authentication with SAML20 and sends
a domain name that allows the SASL server to determine the
appropriate IdP.
<span class="grey">Wierenga, et al. Standards Track [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>
3. The SASL server transmits an authentication request encoded using
a Uniform Resource Identifier (URI) as described in <a href="./rfc3986">RFC 3986</a>
[<a href="./rfc3986" title=""Uniform Resource Identifier (URI): Generic Syntax"">RFC3986</a>] and an HTTP redirect to the IdP corresponding to the
domain.
4. The SASL client now sends a response consisting of "=".
Authentication continues via the normal SAML flow, and the SASL
server will receive the answer to the challenge out of band from
the SASL conversation.
5. At this point, the SASL client MUST construct a URL containing
the content received in the previous message from the SASL
server. This URL is transmitted to the IdP either by the SASL
client application or an appropriate handler, such as a browser.
6. Next, the user authenticates to the IdP. The manner in which the
end user is authenticated to the IdP, and any policies
surrounding such authentication, are out of scope for SAML and
hence for this document. This step happens out of band from
SASL.
7. The IdP will convey information about the success or failure of
the authentication back to the SASL server (RP) in the form of an
authentication statement or failure, using an indirect response
via the client browser or the handler (and with an external
browser, client control should be passed back to the SASL
client). This step happens out of band from SASL.
8. The SASL server sends an appropriate SASL response to the client.
Please note: What is described here is the case in which the client
has not previously authenticated. It is possible that the client
already holds a valid SAML authentication token so that the user does
not need to be involved in the process anymore, but that would still
be external to SASL. This is classic Web Single Sign-On, in which
the Web Browser client presents the authentication token (cookie) to
the RP without renewed user authentication at the IdP.
<span class="grey">Wierenga, et al. Standards Track [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>
With all of this in mind, the flow appears as follows in Figure 2:
SASL Serv. Client IdP
|>-----(1)----->| | Advertisement
| | |
|<-----(2)-----<| | Initiation
| | |
|>-----(3)----->| | Authentication Request
| | |
|<-----(4)-----<| | Response of "="
| | |
| |<- -(5,6) - ->| Client<>IdP
| | | Authentication
| | |
|<- - - - - - - - - - -(7)- - -| Authentication Statement
| | |
|>-----(8)----->| | SASL Completion with
| | | Status
| | |
----- = SASL
- - - = HTTP or HTTPS (external to SASL)
Figure 2: Authentication Flow
<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>. SAML SASL Mechanism Specification</span>
This section specifies the details of the SAML SASL mechanism. See
<a href="./rfc4422#section-5">Section 5 of [RFC4422]</a> for additional details.
The name of this mechanism is "SAML20". The mechanism is capable of
transferring an authorization identity (via the "gs2-header"). The
mechanism does not offer a security layer.
The mechanism is client-first. The first mechanism message from the
client to the server is the "initial-response". As described in
[<a href="./rfc4422" title=""Simple Authentication and Security Layer (SASL)"">RFC4422</a>], if the application protocol does not support sending a
client response together with the authentication request, the server
will send an empty server challenge to let the client begin. The
second mechanism message is from the server to the client, containing
the SAML "authentication-request". The third mechanism message is
from the client to the server and is the fixed message consisting of
"=". The fourth mechanism message is from the server to the client,
indicating the SASL mechanism outcome.
<span class="grey">Wierenga, et al. Standards Track [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>
<span class="h3"><a class="selflink" id="section-3.1" href="#section-3.1">3.1</a>. Initial Response</span>
A client initiates a SAML20 authentication with SASL by sending the
GS2 header followed by the Identity Provider identifier (message 2 in
Figure 2) and is defined using ABNF [<a href="./rfc5234" title=""Augmented BNF for Syntax Specifications: ABNF"">RFC5234</a>] as follows:
initial-response = gs2-header IdP-Identifier
IdP-Identifier = domain ; domain name with corresponding IdP
The gs2-header is used as follows:
- The "gs2-nonstd-flag" MUST NOT be present.
- The "gs2-cb-flag" MUST be set to "n" because channel-binding
[<a href="./rfc5056" title=""On the Use of Channel Bindings to Secure Channels"">RFC5056</a>] data cannot be integrity protected by the SAML
negotiation. (Note: In theory, channel-binding data could be
inserted in the SAML flow by the client and verified by the
server, but that is currently not supported in SAML.)
- The "gs2-authzid" carries the optional authorization identity as
specified in [<a href="./rfc5801" title=""Using Generic Security Service Application Program Interface (GSS-API) Mechanisms in Simple Authentication and Security Layer (SASL): The GS2 Mechanism Family"">RFC5801</a>] (not to be confused with the
IdP-Identifier).
A domain name is either a "traditional domain name" as described in
[<a href="./rfc1035" title=""Domain names - implementation and specification"">RFC1035</a>] or an "internationalized domain name" as described in
[<a href="./rfc5890" title=""Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework"">RFC5890</a>]. Clients and servers MUST treat the IdP-Identifier as a
domain name slot [<a href="./rfc5890" title=""Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework"">RFC5890</a>]. They also SHOULD support
internationalized domain names (IDNs) in the IdP-Identifier field; if
they do so, all of the domain name's labels MUST be A-labels or
NR-LDH labels [<a href="./rfc5890" title=""Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework"">RFC5890</a>]. If necessary, internationalized labels MUST
be converted from U-labels to A-labels by using the Punycode encoding
[<a href="./rfc3492" title=""Punycode: A Bootstring encoding of Unicode for Internationalized Domain Names in Applications (IDNA)"">RFC3492</a>] for A-labels prior to sending them to the SASL server, as
described in the protocol specification for Internationalized Domain
Names in Applications [<a href="./rfc5891" title=""Internationalized Domain Names in Applications (IDNA): Protocol"">RFC5891</a>].
<span class="h3"><a class="selflink" id="section-3.2" href="#section-3.2">3.2</a>. Authentication Request</span>
The SASL server transmits to the SASL client a URI that redirects the
SAML client to the IdP (corresponding to the domain that the user
provided), with a SAML authentication request as one of the
parameters (message 3 in Figure 2) using the following ABNF:
authentication-request = URI
The URI is specified in [<a href="./rfc3986" title=""Uniform Resource Identifier (URI): Generic Syntax"">RFC3986</a>] and is encoded according to
<a href="#section-3.4">Section 3.4</a> ("HTTP Redirect Binding") of the SAML 2.0 bindings
specification [<a href="#ref-OASIS-SAMLv2-BIND">OASIS-SAMLv2-BIND</a>]. The SAML authentication request
is encoded according to <a href="#section-3.4">Section 3.4</a> ("Authentication Request
<span class="grey">Wierenga, et al. Standards Track [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>
Protocol") of [<a href="#ref-OASIS-SAMLv2-CORE">OASIS-SAMLv2-CORE</a>]. Should the client support
Internationalized Resource Identifiers (IRIs) [<a href="./rfc3987" title=""Internationalized Resource Identifiers (IRIs)"">RFC3987</a>], it MUST
first map the IRI to a URI before transmitting it to the server, as
defined in <a href="./rfc3987#section-3.1">Section 3.1 of [RFC3987]</a>.
Note: The SASL server may have a static mapping of domain to
corresponding IdP or, alternatively, a DNS-lookup mechanism could be
envisioned, but that is out of scope for this document.
Note: While the SASL client MAY sanity-check the URI it received,
ultimately it is the SAML IdP that will be validated by the SAML
client; this topic is out of scope for this document.
The client then sends the authentication request via an HTTP GET
(sent over a server-authenticated TLS channel) to the IdP, as if
redirected to do so from an HTTP server and in accordance with the
Web Browser SSO profile, as described in Section 4.1 of
[<a href="#ref-OASIS-SAMLv2-PROF">OASIS-SAMLv2-PROF</a>] (messages 5 and 6 in Figure 2).
The client handles both user authentication to the IdP and
confirmation or rejection of the authentication of the RP (out of
scope for this document).
After all authentication has been completed by the IdP, the IdP will
send a redirect message to the client in the form of a URI
corresponding to the RP as specified in the authentication request
("AssertionConsumerServiceURL") and with the SAML response as one of
the parameters (message 7 in Figure 2).
Please note: This means that the SASL server needs to implement a
SAML RP. Also, the SASL server needs to correlate the session it has
with the SASL client with the appropriate SAML authentication result.
It can do so by comparing the ID of the SAML authentication request
it has issued with the one it receives in the SAML authentication
statement.
<span class="h3"><a class="selflink" id="section-3.3" href="#section-3.3">3.3</a>. Outcome and Parameters</span>
The SASL server (in its capacity as a SAML RP) now validates the SAML
authentication response it received from the SAML client via HTTP or
HTTPS.
The outcome of that validation by the SASL server constitutes a SASL
mechanism outcome and therefore (as stated in [<a href="./rfc4422" title=""Simple Authentication and Security Layer (SASL)"">RFC4422</a>]) SHALL be
used to set state in the server accordingly, and it SHALL be used by
the server to report that state to the SASL client, as described in
<a href="./rfc4422#section-3.6">[RFC4422], Section 3.6</a> (message 8 in Figure 2).
<span class="grey">Wierenga, et al. Standards Track [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>
<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>. SAML GSS-API Mechanism Specification</span>
This section and its sub-sections are not required for SASL
implementors, but this section MUST be observed to implement the
GSS-API mechanism discussed below.
This section specifies a GSS-API mechanism that, when used via the
GS2 bridge to SASL, behaves like the SASL mechanism defined in this
document. Thus, it can loosely be said that the SAML SASL mechanism
is also a GSS-API mechanism. The SAML user takes the role of the
GSS-API Initiator, and the SAML RP takes the role of the GSS-API
Acceptor. The SAML IdP does not have a role in GSS-API and is
considered an internal matter for the SAML mechanism. The messages
are the same, but
a) the GS2 header on the client's first message and channel-binding
data are excluded when SAML is used as a GSS-API mechanism, and
b) the initial context token header (<a href="./rfc2743#section-3.1">Section 3.1 of [RFC2743]</a>) is
prefixed to the client's first authentication message (context
token).
The GSS-API mechanism OID for SAML is 1.3.6.1.5.5.17 (see <a href="#section-7.2">Section 7.2</a>
for more information). The DER encoding of the OID is
0x2b 0x06 0x01 0x05 0x05 0x11.
SAML20 security contexts MUST have the mutual_state flag
(GSS_C_MUTUAL_FLAG) set to TRUE. SAML does not support credential
delegation; therefore, SAML security contexts MUST have the
deleg_state flag (GSS_C_DELEG_FLAG) set to FALSE.
The mutual authentication property of this mechanism relies on
successfully comparing the TLS server's identity with the negotiated
target name. Since the TLS channel is managed by the application
outside of the GSS-API mechanism, the mechanism itself is unable to
confirm the name, while the application is able to perform this
comparison for the mechanism. For this reason, applications MUST
match the TLS server's identity with the target name, as discussed in
[<a href="./rfc6125" title=""Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)"">RFC6125</a>]. More precisely, to pass identity validation, the client
uses the securely negotiated targ_name as the reference identifier
and matches it to the DNS-ID of the server's certificate, and it MUST
reject the connection if there is a mismatch. For compatibility with
deployed certificate hierarchies, the client MAY also perform a
comparison with the Common Name ID (CN-ID) when there is no DNS-ID
present. Wildcard matching is permitted. The targ_name reference
identifier is a "traditional domain names"; thus, the comparison is
made using case-insensitive ASCII comparison.
<span class="grey">Wierenga, et al. Standards Track [Page 10]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-11" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>
The SAML mechanism does not support per-message tokens or the
GSS_Pseudo_random() function [<a href="./rfc4401" title=""A Pseudo-Random Function (PRF) API Extension for the Generic Security Service Application Program Interface (GSS-API)"">RFC4401</a>].
<span class="h3"><a class="selflink" id="section-4.1" href="#section-4.1">4.1</a>. GSS-API Principal Name Types for SAML</span>
SAML supports standard generic name syntaxes for acceptors such as
GSS_C_NT_HOSTBASED_SERVICE (see <a href="./rfc2743#section-4.1">[RFC2743], Section 4.1</a>). SAML
supports only a single name type for initiators: GSS_C_NT_USER_NAME.
GSS_C_NT_USER_NAME is the default name type for SAML. The query,
display, and exported name syntaxes for SAML principal names are all
the same. There are no SAML-specific name syntaxes -- applications
should use generic GSS-API name types, such as GSS_C_NT_USER_NAME and
GSS_C_NT_HOSTBASED_SERVICE (see <a href="./rfc2743#section-4">[RFC2743] Section 4</a>). The exported
name token, of course, conforms to <a href="./rfc2743#section-3.2">[RFC2743], Section 3.2</a>.
<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a>. Examples</span>
<span class="h3"><a class="selflink" id="section-5.1" href="#section-5.1">5.1</a>. XMPP</span>
Suppose the user has an identity at the SAML IdP saml.example.org and
a Jabber Identifier (JID) "somenode@example.com" and wishes to
authenticate his XMPP [<a href="./rfc6120" title=""Extensible Messaging and Presence Protocol (XMPP): Core"">RFC6120</a>] connection to xmpp.example.com. The
authentication on the wire would then look something like the
following:
Step 1: Client initiates stream to server:
<stream:stream xmlns='jabber:client'
xmlns:stream='http://etherx.jabber.org/streams'
to='example.com' version='1.0'>
Step 2: Server responds with a stream tag sent to client:
<stream:stream
xmlns='jabber:client' xmlns:stream='http://etherx.jabber.org/streams'
id='some_id' from='example.com' version='1.0'>
Step 3: Server informs client of available authentication mechanisms:
<stream:features>
<mechanisms xmlns='urn:ietf:params:xml:ns:xmpp-sasl'>
<mechanism>DIGEST-MD5</mechanism>
<mechanism>PLAIN</mechanism>
<mechanism>SAML20</mechanism>
</mechanisms>
</stream:features>
<span class="grey">Wierenga, et al. Standards Track [Page 11]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-12" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>
Step 4: Client selects an authentication mechanism and provides the
initial client response -- containing the gs2-header and domain --
that has been encoded in base64 according to <a href="./rfc4648#section-4">Section 4 of [RFC4648]</a>:
<auth xmlns='urn:ietf:params:xml:ns:xmpp-sasl' mechanism='SAML20'>
biwsZXhhbXBsZS5vcmc=</auth>
The decoded string is
n,,example.org
Step 5: Server sends a base64-encoded challenge to client in the form
of an HTTP redirect to the SAML IdP corresponding to example.org
(https://saml.example.org) with the SAML authentication request as
specified in the redirection URL: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<span class="grey">Wierenga, et al. Standards Track [Page 12]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-13" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>
MjUwWlhoMFEyeGhjM05TWldZK0RRb2dQQzl6WVcxc2NEcFNaWEYxWlhOMFpX
UkJkWFJvYmtOdmJuUmxlSFErSUEwS1BDOXpZVzFzY0RwQmRYUm9ibEpsY1hW
bGMzUSs=
The decoded challenge is as follows:
https://saml.example.org/SAML/Browser?SAMLRequest=PHNhbWxwOk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Where the decoded SAMLRequest looks like the following:
<samlp:AuthnRequest xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
ID="_bec424fa5103428909a30ff1e31168327f79474984" Version="2.0"
IssueInstant="2007-12-10T11:39:34Z" ForceAuthn="false"
IsPassive="false"
ProtocolBinding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"
AssertionConsumerServiceURL=
"https://xmpp.example.com/SAML/AssertionConsumerService">
<saml:Issuer xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">
https://xmpp.example.com
</saml:Issuer>
<samlp:NameIDPolicy xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
Format="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent"
SPNameQualifier="xmpp.example.com" AllowCreate="true" />
<samlp:RequestedAuthnContext
<span class="grey">Wierenga, et al. Standards Track [Page 13]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-14" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>
xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
Comparison="exact">
<saml:AuthnContextClassRef
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">
urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
</saml:AuthnContextClassRef>
</samlp:RequestedAuthnContext>
</samlp:AuthnRequest>
Note: The server can use the request ID
("_bec424fa5103428909a30ff1e31168327f79474984") to correlate the SASL
session with the SAML authentication.
Step 5 (alternative): Server returns error to client if no SAML
authentication request can be constructed:
<failure xmlns='urn:ietf:params:xml:ns:xmpp-sasl'>
<temporary-auth-failure/>
</failure>
</stream:stream>
Step 6: Client sends the "=" response (base64-encoded) to the
challenge:
<response xmlns='urn:ietf:params:xml:ns:xmpp-sasl'>
PQ==
</response>
The following steps between brackets are out of scope for this
document but are included to better illustrate the entire flow:
[The client now sends the URL to a browser instance for processing.
The browser engages in a normal SAML authentication flow (external to
SASL), like redirection to the IdP (https://saml.example.org); the
user logs into https://saml.example.org and agrees to authenticate to
xmpp.example.com. A redirect is passed back to the client browser.
The client browser in turn sends the AuthN response, which contains
the subject-identifier as an attribute, to the server. If the AuthN
response doesn't contain the JID, the server maps the subject-
identifier received from the IdP to a JID.]
Step 7: Server informs client of successful authentication:
<success xmlns='urn:ietf:params:xml:ns:xmpp-sasl'/>
<span class="grey">Wierenga, et al. Standards Track [Page 14]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-15" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>
Step 7 (alternative): Server informs client of failed authentication:
<failure xmlns='urn:ietf:params:xml:ns:xmpp-sasl'>
<not-authorized/>
</failure>
</stream:stream>
Please note: Line breaks were added to the base64 data for clarity.
<span class="h3"><a class="selflink" id="section-5.2" href="#section-5.2">5.2</a>. IMAP</span>
The following sequence describes an IMAP exchange. Lines beginning
with 'S:' indicate data sent by the server, and lines starting with
'C:' indicate data sent by the client. Long lines are wrapped for
readability.
S: * OK IMAP4rev1
C: . CAPABILITY
S: * CAPABILITY IMAP4rev1 STARTTLS
S: . OK CAPABILITY Completed
C: . STARTTLS
S: . OK Begin TLS negotiation now
C: . CAPABILITY
S: * CAPABILITY IMAP4rev1 AUTH=SAML20
S: . OK CAPABILITY Completed
C: . AUTHENTICATE SAML20
S: +
C: biwsZXhhbXBsZS5vcmc=
S: + aHR0cHM6Ly9zYW1sLmV4YW1wbGUub3JnL1NBTUwvQnJvd3Nlcj9TQU1M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<span class="grey">Wierenga, et al. Standards Track [Page 15]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-16" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>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C: PQ==
S: . OK Success (TLS protection)
The decoded challenge is as follows:
https://saml.example.org/SAML/Browser?SAMLRequest=PHNhbWxwOkF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<span class="grey">Wierenga, et al. Standards Track [Page 16]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-17" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>
Where the decoded SAMLRequest looks like the following:
<samlp:AuthnRequest xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
ID="_bec424fa5103428909a30ff1e31168327f79474984" Version="2.0"
IssueInstant="2007-12-10T11:39:34Z" ForceAuthn="false"
IsPassive="false"
ProtocolBinding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"
AssertionConsumerServiceURL=
"https://mail.example.com/SAML/AssertionConsumerService">
<saml:Issuer xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">
https://xmpp.example.com
</saml:Issuer>
<samlp:NameIDPolicy xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
Format="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent"
SPNameQualifier="xmpp.example.com" AllowCreate="true" />
<samlp:RequestedAuthnContext
xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol"
Comparison="exact">
<saml:AuthnContextClassRef
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion">
urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport
</saml:AuthnContextClassRef>
</samlp:RequestedAuthnContext>
</samlp:AuthnRequest>
<span class="h2"><a class="selflink" id="section-6" href="#section-6">6</a>. Security Considerations</span>
This section addresses only security considerations associated with
the use of SAML with SASL applications. For considerations relating
to SAML in general, and for general SASL security considerations, the
reader is referred to the SAML specifications and to other
literature.
<span class="h3"><a class="selflink" id="section-6.1" href="#section-6.1">6.1</a>. Man-in-the-Middle and Tunneling Attacks</span>
This mechanism is vulnerable to man-in-the-middle and tunneling
attacks unless a client always verifies the server's identity before
proceeding with authentication (see [<a href="./rfc6125" title=""Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)"">RFC6125</a>]). Typically, TLS is
used to provide a secure channel with server authentication.
<span class="h3"><a class="selflink" id="section-6.2" href="#section-6.2">6.2</a>. Binding SAML Subject Identifiers to Authorization Identities</span>
As specified in [<a href="./rfc4422" title=""Simple Authentication and Security Layer (SASL)"">RFC4422</a>], the server is responsible for binding
credentials to a specific authorization identity. It is therefore
necessary that only specific trusted IdPs be allowed. This is a
typical part of SAML trust establishment between RPs and the IdP.
<span class="grey">Wierenga, et al. Standards Track [Page 17]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-18" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>
<span class="h3"><a class="selflink" id="section-6.3" href="#section-6.3">6.3</a>. User Privacy</span>
The IdP is aware of each RP that a user logs into. There is nothing
in the protocol to hide this information from the IdP. It is not a
requirement to track the visits, but there is nothing that prohibits
the collection of information. SASL server implementers should be
aware that SAML IdPs will be able to track -- to some extent -- user
access to their services.
<span class="h3"><a class="selflink" id="section-6.4" href="#section-6.4">6.4</a>. Collusion between RPs</span>
It is possible for RPs to link data that they have collected on the
users. By using the same identifier to log into every RP, collusion
between RPs is possible. In SAML, targeted identity was introduced.
Targeted identity allows the IdP to transform the identifier the user
typed in to an RP-specific opaque identifier. This way, the RP would
never see the actual user identifier but instead would see a randomly
generated identifier.
<span class="h3"><a class="selflink" id="section-6.5" href="#section-6.5">6.5</a>. Security Considerations Specific to GSS-API</span>
Security issues inherent in GSS-API [<a href="./rfc2743" title=""Generic Security Service Application Program Interface Version 2, Update 1"">RFC2743</a>] and GS2 [<a href="./rfc5801" title=""Using Generic Security Service Application Program Interface (GSS-API) Mechanisms in Simple Authentication and Security Layer (SASL): The GS2 Mechanism Family"">RFC5801</a>] apply
to the SAML GSS-API mechanism defined in this document. Further, and
as discussed in <a href="#section-4">Section 4</a>, proper TLS server identity verification is
critical to the security of the mechanism.
<span class="h2"><a class="selflink" id="section-7" href="#section-7">7</a>. IANA Considerations</span>
<span class="h3"><a class="selflink" id="section-7.1" href="#section-7.1">7.1</a>. IANA Mech-Profile</span>
The IANA has registered the following SASL profile:
SASL mechanism profile: SAML20
Security Considerations: See this document
Published Specification: See this document
For further information: Contact the authors of this document.
Owner/Change controller: the IETF
Intended usage: COMMON
Note: None
<span class="grey">Wierenga, et al. Standards Track [Page 18]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-19" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>
<span class="h3"><a class="selflink" id="section-7.2" href="#section-7.2">7.2</a>. IANA OID</span>
The IANA has also assigned a new entry for this GSS mechanism in the
SMI Security for Mechanism Codes sub-registry, whose prefix is
iso.org.dod.internet.security.mechanisms (1.3.6.1.5.5), and
referenced this specification in the registry.
<span class="h2"><a class="selflink" id="section-8" href="#section-8">8</a>. References</span>
<span class="h3"><a class="selflink" id="section-8.1" href="#section-8.1">8.1</a>. Normative References</span>
[<a id="ref-OASIS-SAMLv2-BIND">OASIS-SAMLv2-BIND</a>]
Cantor, S., Ed., Hirsch, F., Ed., Kemp, J., Ed., Philpott,
R., Ed., and E. Maler, Ed., "Bindings for the OASIS
Security Assertion Markup Language (SAML) V2.0", OASIS
Standard saml-bindings-2.0-os, March 2005, <<a href="http://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf">http://</a>
<a href="http://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf">docs.oasis-open.org/security/saml/v2.0/</a>
<a href="http://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf">saml-bindings-2.0-os.pdf</a>>.
[<a id="ref-OASIS-SAMLv2-CORE">OASIS-SAMLv2-CORE</a>]
Cantor, S., Ed., Kemp, J., Ed., Philpott, R., Ed., and E.
Maler, Ed., "Assertions and Protocols for the OASIS
Security Assertion Markup Language (SAML) V2.0", OASIS
Standard saml-core-2.0-os, March 2005, <<a href="http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf">http://</a>
<a href="http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf">docs.oasis-open.org/security/saml/v2.0/</a>
<a href="http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf">saml-core-2.0-os.pdf</a>>.
[<a id="ref-OASIS-SAMLv2-PROF">OASIS-SAMLv2-PROF</a>]
Hughes, J., Ed., Cantor, S., Ed., Hodges, J., Ed., Hirsch,
F., Ed., Mishra, P., Ed., Philpott, R., Ed., and E. Maler,
Ed., "Profiles for the OASIS Security Assertion Markup
Language (SAML) V2.0", OASIS Standard OASIS.saml-profiles-
2.0-os, March 2005, <<a href="http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf">http://docs.oasis-open.org/security/</a>
<a href="http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf">saml/v2.0/saml-profiles-2.0-os.pdf</a>>.
[<a id="ref-RFC1035">RFC1035</a>] Mockapetris, P., "Domain names - implementation and
specification", STD 13, <a href="./rfc1035">RFC 1035</a>, November 1987.
[<a id="ref-RFC2119">RFC2119</a>] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", <a href="https://www.rfc-editor.org/bcp/bcp14">BCP 14</a>, <a href="./rfc2119">RFC 2119</a>, March 1997.
[<a id="ref-RFC2616">RFC2616</a>] Fielding, R., Gettys, J., Mogul, J., Frystyk, H.,
Masinter, L., Leach, P., and T. Berners-Lee, "Hypertext
Transfer Protocol -- HTTP/1.1", <a href="./rfc2616">RFC 2616</a>, June 1999.
[<a id="ref-RFC2743">RFC2743</a>] Linn, J., "Generic Security Service Application Program
Interface Version 2, Update 1", <a href="./rfc2743">RFC 2743</a>, January 2000.
<span class="grey">Wierenga, et al. Standards Track [Page 19]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-20" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>
[<a id="ref-RFC2818">RFC2818</a>] Rescorla, E., "HTTP Over TLS", <a href="./rfc2818">RFC 2818</a>, May 2000.
[<a id="ref-RFC3492">RFC3492</a>] Costello, A., "Punycode: A Bootstring encoding of Unicode
for Internationalized Domain Names in Applications
(IDNA)", <a href="./rfc3492">RFC 3492</a>, March 2003.
[<a id="ref-RFC3986">RFC3986</a>] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform
Resource Identifier (URI): Generic Syntax", STD 66,
<a href="./rfc3986">RFC 3986</a>, January 2005.
[<a id="ref-RFC3987">RFC3987</a>] Duerst, M. and M. Suignard, "Internationalized Resource
Identifiers (IRIs)", <a href="./rfc3987">RFC 3987</a>, January 2005.
[<a id="ref-RFC4422">RFC4422</a>] Melnikov, A., Ed., and K. Zeilenga, Ed., "Simple
Authentication and Security Layer (SASL)", <a href="./rfc4422">RFC 4422</a>,
June 2006.
[<a id="ref-RFC5056">RFC5056</a>] Williams, N., "On the Use of Channel Bindings to Secure
Channels", <a href="./rfc5056">RFC 5056</a>, November 2007.
[<a id="ref-RFC5234">RFC5234</a>] Crocker, D., Ed., and P. Overell, "Augmented BNF for
Syntax Specifications: ABNF", STD 68, <a href="./rfc5234">RFC 5234</a>,
January 2008.
[<a id="ref-RFC5246">RFC5246</a>] Dierks, T. and E. Rescorla, "The Transport Layer Security
(TLS) Protocol Version 1.2", <a href="./rfc5246">RFC 5246</a>, August 2008.
[<a id="ref-RFC5280">RFC5280</a>] Cooper, D., Santesson, S., Farrell, S., Boeyen, S.,
Housley, R., and W. Polk, "Internet X.509 Public Key
Infrastructure Certificate and Certificate Revocation List
(CRL) Profile", <a href="./rfc5280">RFC 5280</a>, May 2008.
[<a id="ref-RFC5801">RFC5801</a>] Josefsson, S. and N. Williams, "Using Generic Security
Service Application Program Interface (GSS-API) Mechanisms
in Simple Authentication and Security Layer (SASL): The
GS2 Mechanism Family", <a href="./rfc5801">RFC 5801</a>, July 2010.
[<a id="ref-RFC5890">RFC5890</a>] Klensin, J., "Internationalized Domain Names for
Applications (IDNA): Definitions and Document Framework",
<a href="./rfc5890">RFC 5890</a>, August 2010.
[<a id="ref-RFC5891">RFC5891</a>] Klensin, J., "Internationalized Domain Names in
Applications (IDNA): Protocol", <a href="./rfc5891">RFC 5891</a>, August 2010.
<span class="grey">Wierenga, et al. Standards Track [Page 20]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-21" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>
[<a id="ref-RFC6125">RFC6125</a>] Saint-Andre, P. and J. Hodges, "Representation and
Verification of Domain-Based Application Service Identity
within Internet Public Key Infrastructure Using X.509
(PKIX) Certificates in the Context of Transport Layer
Security (TLS)", <a href="./rfc6125">RFC 6125</a>, March 2011.
[<a id="ref-W3C-REC-HTML401">W3C-REC-HTML401</a>]
Le Hors, A., Ed., Raggett, D., Ed., and I. Jacobs, Ed.,
"HTML 4.01 Specification", World Wide Web Consortium
Recommendation REC-html401-19991224, December 1999,
<<a href="http://www.w3.org/TR/1999/REC-html401-19991224">http://www.w3.org/TR/1999/REC-html401-19991224</a>>.
<span class="h3"><a class="selflink" id="section-8.2" href="#section-8.2">8.2</a>. Informative References</span>
[<a id="ref-RFC1939">RFC1939</a>] Myers, J. and M. Rose, "Post Office Protocol - Version 3",
STD 53, <a href="./rfc1939">RFC 1939</a>, May 1996.
[<a id="ref-RFC3501">RFC3501</a>] Crispin, M., "INTERNET MESSAGE ACCESS PROTOCOL -
VERSION 4rev1", <a href="./rfc3501">RFC 3501</a>, March 2003.
[<a id="ref-RFC4401">RFC4401</a>] Williams, N., "A Pseudo-Random Function (PRF) API
Extension for the Generic Security Service Application
Program Interface (GSS-API)", <a href="./rfc4401">RFC 4401</a>, February 2006.
[<a id="ref-RFC4648">RFC4648</a>] Josefsson, S., "The Base16, Base32, and Base64 Data
Encodings", <a href="./rfc4648">RFC 4648</a>, October 2006.
[<a id="ref-RFC6120">RFC6120</a>] Saint-Andre, P., "Extensible Messaging and Presence
Protocol (XMPP): Core", <a href="./rfc6120">RFC 6120</a>, March 2011.
<span class="grey">Wierenga, et al. Standards Track [Page 21]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-22" ></span>
<span class="grey"><a href="./rfc6595">RFC 6595</a> A SASL and GSS-API Mechanism for SAML April 2012</span>
<span class="h2"><a class="selflink" id="appendix-A" href="#appendix-A">Appendix A</a>. Acknowledgments</span>
The authors would like to thank Scott Cantor, Joe Hildebrand, Josh
Howlett, Leif Johansson, Thomas Lenggenhager, Diego Lopez, Hank
Mauldin, RL "Bob" Morgan, Stefan Plug, and Hannes Tschofenig for
their review and contributions.
Authors' Addresses
Klaas Wierenga
Cisco Systems, Inc.
Haarlerbergweg 13-19
1101 CH Amsterdam
The Netherlands
Phone: +31 20 357 1752
EMail: klaas@cisco.com
Eliot Lear
Cisco Systems GmbH
Richtistrasse 7
CH-8304 Wallisellen
Switzerland
Phone: +41 44 878 9200
EMail: lear@cisco.com
Simon Josefsson
SJD AB
Johan Olof Wallins vag 13
Solna 171 64
Sweden
EMail: simon@josefsson.org
URI: <a href="http://josefsson.org/">http://josefsson.org/</a>
Wierenga, et al. Standards Track [Page 22]
</pre>
|