Loading [MathJax]/extensions/MathMenu.js
Re-engineering of web reverse proxy with shibboleth authentication | IEEE Conference Publication | IEEE Xplore

Re-engineering of web reverse proxy with shibboleth authentication


Abstract:

Majority of web authentication is implemented using username and password mechanism. How about leveraging the Shibboleth authentication advantages as an alternative to us...Show More

Abstract:

Majority of web authentication is implemented using username and password mechanism. How about leveraging the Shibboleth authentication advantages as an alternative to username and password based authentication to access a live web site? This challenge is trivial if, the codes that built the external web sites are permissible to be modified. In a case where no access on the codes is available, we introduce a reverse proxy as a middleware between the Shibboleth and the web sites. As part of the solution, we re-engineer the existing web reverse proxy and create Java classes that manage and perform automated authentication to access the web site. We share the development experiences in completing the challenge which is assisted by the open source development efforts.
Date of Conference: 10-12 December 2012
Date Added to IEEE Xplore: 11 March 2013
ISBN Information:
Conference Location: London, UK
References is not available for this document.

I. Introduction

Usemame and password is becoming a de facto standard in web authentication. It can be implemented using HTML (Hypertext Markup Language) form with input text fields to perform the authentication challenge and be part of user identification for a system. The idea is to provide unique identity to represent user to the system, as such only the user is indeed, the user claims to be.

Select All
1.
Zhang, N.; Yao, L.; Chin, J.; Shi, Q.; Nenadic, A.; McNab, A.; Rector, A.; Goble, C.;, "Plugging a scalable authentication framework into Shibboleth," Enabling Technologies: Infrastructure for Collaborative Enterprise, 2005. 14th IEEE International Workshops on, vol., no., pp. 271-276, 13-15 June 2005
2.
Groeper, R.; Grimm, C.; Piger, S.; Wiebelitz, J.;, "An Architecture for Authorization in Grids using Shibboleth and VOMS," Software Engineering and Advanced Applications, 2007. 33rd EUROMICRO Conference on, vol., no., pp.367-374, 28-31 Aug. 2007
3.
Shibboleth, "Shibboleth documentation", https://wiki. shibboleth.net (Accessed Date: June 2011)
4.
Unicon, WebProxy-Portlets - Jasig Wiki, https://wiki.jasig.org/display/ PLT/WebProxy (Accessed Date: September 2011)
5.
Ippon Technologies, ippontech/wip · GitHub, https://github.com/ ippontech/wip (Accessed Date: September 2011)
6.
Anders Nyman, J2EP, http://j2ep.sourceforge.net (Accessed Date: October 2011)
7.
Microsoft, "Cutting Edge: The ASP.NET View State", http://msdn.microsoft.com/en-us/magazine/cc188774.aspx-(Accessed Date: -July 2012)
8.
Nielsen, Jakob (from Miller 1968; Card et al. 1991) (1994). http://www.useit.com/papers/responsetime.html. Usability Engineering: Response Times: The Three Important Limits. Morgan Kaufmann. Retrieved April 27, 2012.
9.
Jourdan, G.-V.;, "Centralized Web Proxy Services: Security and Privacy Considerations," Internet Computing, IEEE, vol.11, no.6, pp.46-52, Nov.-Dec. 2007

Contact IEEE to Subscribe

References

References is not available for this document.