Federated identity management and single sign-on

In an increasingly digitized world, identity and access management is critical to ensuring the security and operationalefficiency of modern organizations.

Federated identity management solutions are rapidly emerging as a key element in addressing these needs because of their ability to simplify authentication and access control through secure, scalable and easily integrated systems.

Among the most globally recognized solutions, Shibboleth stands out as one of the most robust and reliable platforms for digital identity management.

Shibboleth security and reliability: the identity management solution

Shibboleth is open-source software that enablesfederated authentication and secure single sign-on (SSO), allowing organizations to centrally manage access to their systems and applications, even when these are distributed among different entities.

This type of solution is particularly popular in areas where data protection and user privacy are a priority, such as in education, research, but also in the corporate sector, all of which Shibboleth has been working in since the early 2000s.

What distinguishes Shibboleth?

The distinguishing aspect of Shibboleth is its ability to easily integrate with other technologies and platforms, creating a secure ecosystem where users can access the services they want without compromising data protection.

In addition, its open and flexible structure allows companies to adapt it according to their specific needs, making it one of the most strategic choices for those seeking robust and scalable identity management.

The Shibboleth authentication process

Shibboleth is based on an authentication system that allows users to access protected resources through secure identity management.

The authentication process is done easily and securely by following the main steps described below:

1. Request for connection

The user attempts to access a protected resource, such as an application or enterprise system. 

This request is initially intercepted by the Service Provider (SP), which is responsible for protecting the resource, which is predefined in the configuration files of the web server hosting the system.

2. Identity Provider (IdP) Discovery.

The Service Provider (SP), based on the protection configurations, determines which Identity Provider (IdP) to refer to for authentication. 

This "discovery" process is done through a mechanism known as WAYF (Where Are You From), which manages IdP selection based on user preferences. 

The user is then redirected to the selected IdP, which will take care of credential verification.

3. Authentication and choice of attributes

Once the request is directed to the IdP, the IdP decides whether the user can be authenticated. 

Always the IdP selects the attributes to send to the Service Provider (SP), based on the configuration and requirements of the system the user is trying to access. 

These attributes are generally related to the user's credentials and identity.

4. SAML Assertion Transmission.

The Identity Provider (IdP) packages and signs the authentication data into a SAML assertion. This assertion is then transmitted to the Service Provider (SP), which receives and decodes it. 

Once the SP receives the data, it performs a series of security checks to verify the authenticity and validity of the assertion. 

Only if these checks are successful can the authentication process continue.

5. Access to the resource

If the security checks performed by the Service Provider (SP) are positive, the user gains access to the protected resource. 

It is finally redirected to the desired destination, such as a page or application, withfully authenticated access.

Strategic partners for Shibboleth support.

As Members of the Shibboleth Consortium, we are proud to offer comprehensive Shibboleth support for solutions in identity management, actively collaborating in the development and improvement of the system. 

Our experience enables us to accompany clients at every stage of the project, ensuring secure, scalable and compliant management.

Counseling

We help our clients understand how Shibboleth can meet their specific needs, assessing compatibility with existing infrastructure and ensuring that all privacy regulations, such as GDPR, are met.

Implementation

We build custom Shibboleth solutions, seamlessly integrating them into existing enterprise systems (ERP, CRM, etc.). We configure multi-factor authentication (MFA) and federated access through SAML and OIDC, ensuring a secure and smooth implementation.

Support and maintenance

As official members of the Shibboleth Consortium, we offer ongoing support during operation. We manage the monitoring, updating and maintenance of the system, ensuring constant security and efficiency.

Training

We train IT staff and users to ensure optimal management of Shibboleth solutions, with practical and theoretical sessions on the design, management, and maintenance of SSO systems.

The evolution of Shibboleth

Shibboleth is a platform that continues to evolve to integrate with the latest security standards and emerging technologies.

The Shibboleth Consortium, of which we are a part, is committed to improving and expanding the capabilities of the platform, developing new features that meet the growing needs of the market, which means and will mean that companies that choose Shibboleth not only benefit from a secure, high-performance platform, but also contribute to an ongoing development ecosystem and commitment to security and innovation.

In addition, in a constantly changing landscape, privacy and security regulations, such as GDPR, are evolving. Shibboleth adapts quickly to these regulations, ensuring that implemented solutions remain compliant at all times.