Page 211 - Building Digital Libraries
P. 211

CHAPTER 8


                                                          •	 Shibboleth is designed for sharing authentication data
                                                             between organizations in a distributed environment, so it
                                                             federates authentication and distributes the management
                                                             of user information across organizations over the SAML
                                                             protocol to exchange authentication and authorization data.
                                                          •	 Shibboleth is generally more difficult to configure than
                                                             CAS.



                                                   OpenID
                                                   OpenID is different from SAML or CAS in that there’s no trust relation-
                                                   ship with the provider—you accept whatever it tells you and associate with
                                                   a placeholder identifier in the repository. Like Shibboleth, OpenID is a
                                                   federated identification management protocol. However, it differs from
                                                   Shibboleth in several key respects. First, OpenID has been designed under
                                                   the premise that user-identification management can function essentially
                                                   like a URI. Within the OpenID model, a user signs in using a unique URI,
                                                   which is resolved by a service run either by the user or by the authenticating
                                                   organization. Like Shibboleth, the protocol defines how user information is
                                                   securely transmitted between resources, as well as what attributes are needed
                                                   to authenticate users between targets. What makes OpenID different from
                                                   many other authentication services is the notion of a secure URI that acts
                                                   as a user’s user name and password. Within the OpenID model, the URI
                                                   provides the authentication mechanism for the protocol, meaning that how
                                                   one proves ownership of the URI directly relates to how authentication is
                                                   verified within the system.


                                                   OAuth and Social Media Authentication

                                                   OAuth allows third parties such as social media services to authenticate to
                                                   another system. Unlike OpenID, which has a primary purpose of authen-
                                                   tication in a web environment, the primary purpose of OAuth is to allow
                                                   users to permit API authorization for application. As such, the two are
                                                   complementary.
                                                      An example of a repository application of OAuth would be that a user
                                                   would authenticate using a social media account and then be asked for
                                                   permission to share her e-mail address with the repository software. Upon
                                                   the user granting that permission, the e-mail address would be matched to
                                                   an account.
                                                      OAuth and social media authentication offer the following advantages:
                                                          •	 Many users won’t be asked for credentials after logging in
                                                             because simply being logged in to their favorite services
                                                             grants them access.
                                                          •	 If your organization won’t allow vendors outside your
                                                             firewall to connect to your LDAP or other authentication

            196
   206   207   208   209   210   211   212   213   214   215   216