By: Rahul Roshan
IIT-KGP(M.Tech)
1
 What is Cloud Computing ?
 Service Models
 Single Sign-On
 ACS Spoofing
 Countermeasures
 References
2
 Cloud Computing is the practice of using a network of remote
servers hosted on the Internet to store, manage, and process
data, rather than a local server or a personal computer.
 Advantages of Cloud Computing:
 Pay as you go
 Cost effective
 Location independent
3
4
INTERNET
USER
ORGANIZATION
PROGRAMMER
CLOUD COPUTING
CLOUD SERVIECE PROVIDER
 Software as a Service (SaaS)
 Access services via browser
 Examples: Google Docs, DropBox, Gmail
5
6
 Platform as a Service (PaaS)
 Provides development environment
 Examples: Microsoft Azure, Google AppEngine
 Infrastructure as a Service (IaaS)
 Provides virtual machines, storages
 Examples: AmazonWeb Services
7
DDoSAttack
60%
DNS Cache
Poisioning
6%
MITM Attack
12%
Password
Based Attacks
22%
Network Security Attacks
8
999
Website: www.xyz.com
Web Server
DatabaseUser
1010
Adversary’sWebsite:
www.attacker.com
Web Server
DatabaseUser
Website: www.xyz.com
11
Phishing Attack Report
Reference: Kaspersky Lab
 Single sign-on (SSO) property allows a user logs in once and gains access
to all systems without being prompted to log in again at each of them.
 SSO works among three parties:
 User (represented as browser)
 Identity Provider (IdP) e.g. Facebook, Gmail
 Relying Party or Service Provider
 No trust relationship between IdP and relying party or service provider.
 Famous Single Sign-On Systems:
 Facebook Connect
 OpenIDConnect
 OAuth
12
13
www.codechef.com
www.topcoder.com
www.slideshare.com
 Benefits
 Reducing time spent re-entering passwords for the same identity
 Reducing overhead to maintain different passwords for different
services
14
 Identity Provider (IdP) is used to provide identifiers for users
looking to interact with a system.
 Security Assertion Markup Language(SAML) is used to exchange
authentication and authorization data between Identity Provider
and Service Provider.
15
 SAML statements are contained in security tokens called assertions.
 SAML consist of three building blocks:
 Protocols: defines how assertions are exchanged between actors.
 Bindings: specify how to embed assertions into transport protocols (e.g., HTTP or
SOAP)
 Profiles: define the interplay of assertions, protocols, and bindings that are necessary
for the needs of a specific use case to be met.
16
 Authentication Request
17
<AuthnRequest IDVersion IssueInstant AssertionConsumerServiceURL?>
<Issuer>?
<Subject>?
<NameIDPolicy>?
<Extensions>?
<Signature>?
<Conditions>?
<RequestedAuthnContext>?
<Scoping>?
</AuthnRequest>
 The optional AssertionConsumerServiceURL (ACSURL) attribute
specifies the endpoint URL to which the IdP must deliver the issued
assertion.
 The authentication request may be protected by a digital signature
(<Signature>)
 The <Issuer> element specifies the SAML authority (the IdP) that
certifies the claim(s).
18
19
FacebookUserwww.codechef.com (RP)
 Adversary is a client in an SSO and attempts to convince the RP
that his browser represents Legitimate user, assuming that he
knows legitimate user’s username through a prior communication.
2020
Legitimate User
Adversary (Malicious User)
IdP (e.g. Gmail) Relying Party
 Adversary leaves malicious web content in user’s browser during
her visiting of his website, which can perform SSO operations
through sending requests to the IdP and the RP.
21
Legitimate User
Adversary (Malicious User)
IdP (e.g. Gmail) Relying Party
 When Legitimate user visits adversary's website, adversary acts as
an RP to the IdP, in an attempt to get user’s credential for the
target RP.
2222
Legitimate User
Adversary (Malicious User)
IdP (e.g. Gmail) Relying Party
 ACS (Assertion Consumer Service) Spoofing allows the adversary
to redirect the security token issued by the IdP to himself, and thus
to impersonate the victim to every federated SP.
 The only prerequisite for this attack is that the victim has to visit a
webpage controlled by the adversary.
 ACS Scanner
 An automated penetration test tool developed to scan ACS vulnerability
 Platform Independent
23
24
IdP
http://IdP.com
U --->UA A
http://ssoattack.org
SP
http://sp.com
1. HTTPGET URL
2. HTTPGET URLsp
3. HTTP 302 IdP,
(<AuthRequest(ID,SP,ACSurl)>, URLsp)
No security context.
User not identifiable
4. HTTP 302 IdP,
<AuthRequest(ID,SP,Badurl)>
,URLsp)
5. HTTP GET IdP,
(<AuthRequest(ID,SP,Badurl)>
,URLsp)
6. User authentication
7. HTTP 200
Form(<Response(AA)>,URLsp,
Badurl)
8. HTTP POST
Badurl,(<Response(AA)>,URLsp)
9. HTTP POST
ACSurl,(<Response(AA)>,URLsp)
Verify and evaluate
assertion
10. HTTP 302 URLsp
Generate
Assertion:
AA=(ID,IdP,SP,U)
SSO System Website Affected SPs ACS Spoofing Common
Vulnerability
Exposure (CVE)
One Login www.onelogin.com 3600+ Yes CVE-2012-
4962
WSO2 Stratos www.wso2.org 3000+ Yes CVE-2012-
4961
SSOCircle www.ssocircle.com 2600+ Yes CVE-2013-0115
Bitium www.bitium.com 1750+ Yes Direct comm.
25
 Whitelisting. One way to mitigate ACS Spoofing is to use a
whitelist of allowed ACSURL values for each and every SP, stored
at IdP.This may induce a significant management overhead for
large IdPs.
 Signing Authentication Request: In theory, signing authentication
requests would make the injection of a malicious ACSURL
impossible.
26
 Preferred mitigation is cookie binding combining the ease of SSO with a
cryptographically strengthened client authentication.
 Solution provided by Andreas Mayer hardens both the SSO protocol and
the session cookies by establishing mutually authenticated channels
between the browser and the other participating entities (i.e. IdP and
SP).
 This builds a holistic authentication layer that prevents a wide range of
attacks, including MITM,ACS Spoofing, and XSS/UI redressing
vulnerabilities.
27
 Rui Wang, Shuo Chen, and XiaoFeng Wang. 2012. Signing Me ontoYour Accounts through
Facebook and Google: ATraffic-Guided Security Study of Commercially Deployed Single-
Sign-On Web Services. In Proceedings of the 2012 IEEE Symposium on Security and
Privacy (SP '12). IEEE Computer Society, Washington, DC, USA, 365-379.
DOI=10.1109/SP.2012.30 http://dx.doi.org/10.1109/SP.2012.30
 Andreas Mayer, Marcus Niemietz,Vladislav Mladenov, and Jörg Schwenk. 2014. Guardians
of the Clouds: When Identity Providers Fail. In Proceedings of the 6th edition of the ACM
Workshop on Cloud Computing Security (CCSW '14). ACM, NewYork, NY, USA, 105-116.
DOI=10.1145/2664168.2664171 http://doi.acm.org/10.1145/2664168.2664171
 A. Armando, R. Carbone, L. Compagna, J. Cuellar, G. Pellegrino, and A. Sorniotti. From
Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure? In SEC,
volume 354 of IFIP Advances in Information and Communication Technology, pages 68{79.
Springer, 2011.
28
 Yuen-Yan Chan. 2006. Weakest link attack on single sign-on and its case in SAML v2.0 web
SSO. In Proceedings of the 2006 international conference on Computational Science and Its
Applications -Volume Part III (ICCSA'06), Marina Gavrilova, Osvaldo Gervasi, Vipin Kumar, C.
Kenneth Tan, and David Taniar (Eds.), Vol. Part III. Springer-Verlag, Berlin, Heidelberg, 507-
516. DOI=10.1007/11751595_54 http://dx.doi.org/10.1007/11751595_54
 Hsin-Yi Tsai; Siebenhaar, M.; Miede, A.;Yu-Lun Huang; Steinmetz, R., "Threat as a Service?:
Virtualization's Impact on Cloud Security," IT Professional , vol.14, no.1, pp.32,37, Jan.-Feb.
2012
doi: 10.1109/MITP.2011.117
29

More Related Content

PPTX
Owasp webgoat
PDF
React security vulnerabilities
PDF
Secure coding guidelines
DOC
Authentication Models
PDF
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
PPTX
WSO2 Identity Server 5.3.0 - Product Release Webinar
PPTX
Spring security
PDF
Security issues in grid computing
Owasp webgoat
React security vulnerabilities
Secure coding guidelines
Authentication Models
Algorithm for Securing SOAP Based Web Services from WSDL Scanning Attacks
WSO2 Identity Server 5.3.0 - Product Release Webinar
Spring security
Security issues in grid computing

What's hot (20)

PDF
Owasp top 10_openwest_2019
PDF
2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Ta...
PDF
Spring Framework - Spring Security
PPTX
Single-Page-Application & REST security
PDF
Modern Security with OAuth 2.0 and JWT and Spring by Dmitry Buzdin
PDF
UMA for ACE
PDF
Hacking the Web
PDF
JavaOne 2014 - Securing RESTful Resources with OAuth2
PDF
Xss frame work
PPT
How "·$% developers defeat the web vulnerability scanners
PPT
Securing RESTful API
PPTX
API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...
PPT
SOA Architecture & SOAP Protocol Architecture Detail & Attack Vector
PDF
J2EE Security with Apache SHIRO
PDF
[OPD 2019] Trusted types and the end of DOM XSS
PDF
Mixing OAuth 2.0, Jersey and Guice to Build an Ecosystem of Apps - JavaOne...
PDF
Lecture #25 : Oauth 2.0
PDF
ConFoo 2015 - Securing RESTful resources with OAuth2
PPTX
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
PDF
A cryptographic mutual authentication scheme for web applications
Owasp top 10_openwest_2019
2019-06-04 aOS Strasbourg - Technique 3 - MS Threat Protection - Seyfallah Ta...
Spring Framework - Spring Security
Single-Page-Application & REST security
Modern Security with OAuth 2.0 and JWT and Spring by Dmitry Buzdin
UMA for ACE
Hacking the Web
JavaOne 2014 - Securing RESTful Resources with OAuth2
Xss frame work
How "·$% developers defeat the web vulnerability scanners
Securing RESTful API
API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...
SOA Architecture & SOAP Protocol Architecture Detail & Attack Vector
J2EE Security with Apache SHIRO
[OPD 2019] Trusted types and the end of DOM XSS
Mixing OAuth 2.0, Jersey and Guice to Build an Ecosystem of Apps - JavaOne...
Lecture #25 : Oauth 2.0
ConFoo 2015 - Securing RESTful resources with OAuth2
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
A cryptographic mutual authentication scheme for web applications
Ad

Viewers also liked (20)

PDF
Journal of Network Security vol 4 issue 3
PPTX
Cloud security ppt
PDF
Need For Ethical & Security Issue In It
PPTX
Issue with Internet in college (Computer Security and Cyber Law)
PPTX
Scalable cloud governance, risk management and compliance
PPT
Data issue affrecting Cloud computing
PPTX
Steven Porter Seville | Ideas about Computer clouding
PPT
security issue
PDF
Cloud data governance, risk management and compliance ny metro joint cyber...
PDF
Accountability for Data Governance in the Cloud
PPTX
Cybersecurity 4 security is sociotechnical issue
PDF
Application Security Trends and Issues
PPT
Big Data (security Issue)
PDF
Trend and Future of Cloud Computing
PPTX
Cloud computing security issues and challenges
PPTX
2016 Future of Cloud Computing Study
PPTX
Data security in cloud computing
PPT
Cloud computing ppt
PPTX
Securing hacked website // Malware infected website filled with backdoors
PDF
LinkedIn SlideShare: Knowledge, Well-Presented
Journal of Network Security vol 4 issue 3
Cloud security ppt
Need For Ethical & Security Issue In It
Issue with Internet in college (Computer Security and Cyber Law)
Scalable cloud governance, risk management and compliance
Data issue affrecting Cloud computing
Steven Porter Seville | Ideas about Computer clouding
security issue
Cloud data governance, risk management and compliance ny metro joint cyber...
Accountability for Data Governance in the Cloud
Cybersecurity 4 security is sociotechnical issue
Application Security Trends and Issues
Big Data (security Issue)
Trend and Future of Cloud Computing
Cloud computing security issues and challenges
2016 Future of Cloud Computing Study
Data security in cloud computing
Cloud computing ppt
Securing hacked website // Malware infected website filled with backdoors
LinkedIn SlideShare: Knowledge, Well-Presented
Ad

Similar to Single Sign-On security issue in Cloud Computing (20)

PPTX
Presentation
PPT
On technical security issues in cloud computing
PDF
O Dell Secure360 Presentation5 12 10b
PPTX
NIC 2014 Modern Authentication for the Cloud Era
PPT
Unit_5 grid and cloud comuting security.pt
PPTX
Help! I Have An Identity Crisis: A look at various mechanisms of Single Sign On
PPTX
Single Sign On 101
PDF
e-SUAP - Security - Windows azure access control list (english version)
DOCX
Directions Answer each question individual and respond with full .docx
PDF
Patterns to Bring Enterprise and Social Identity to the Cloud
PPTX
On Technical Security Issues in Cloud Computing.pptx
PPTX
Federated and fabulous identity
DOCX
School of Computer & Information SciencesITS-532 Cloud C.docx
PPTX
Security on Cloud Computing
PPTX
Cloud security and services
PDF
Openstack identity protocols unconference
PDF
Understanding Claim based Authentication
PPTX
Codemash-2017
PPT
Security issues in cloud
PDF
Security Terms and Concepts in Cloud Computing
Presentation
On technical security issues in cloud computing
O Dell Secure360 Presentation5 12 10b
NIC 2014 Modern Authentication for the Cloud Era
Unit_5 grid and cloud comuting security.pt
Help! I Have An Identity Crisis: A look at various mechanisms of Single Sign On
Single Sign On 101
e-SUAP - Security - Windows azure access control list (english version)
Directions Answer each question individual and respond with full .docx
Patterns to Bring Enterprise and Social Identity to the Cloud
On Technical Security Issues in Cloud Computing.pptx
Federated and fabulous identity
School of Computer & Information SciencesITS-532 Cloud C.docx
Security on Cloud Computing
Cloud security and services
Openstack identity protocols unconference
Understanding Claim based Authentication
Codemash-2017
Security issues in cloud
Security Terms and Concepts in Cloud Computing

Recently uploaded (20)

PDF
B450721.pdf American Journal of Multidisciplinary Research and Review
PDF
Information Technology practical assignment
PPT
Comparison of 2 Population Kuch toh bhadwa chodi karwa raha
PPTX
Male_Genital_SystMale_Genital_System_Anatomy_Illustrated.pptxem_Presentation....
PPTX
Network wired & wireless network ppt for
PDF
Technical SEO Explained: How To Make Your Website Search-Friendly
PPTX
Information and Network Security types of cipher
PPTX
weathering-final for grade 12 students in any kind of school
PPTX
Internet_Addiction_Presentation_2025.pptx
PPTX
Blue And White Modern Business Presentation.pptx
PPT
chapter 5: system unit computing essentials
PDF
Salesforce-Proxy-Statement-Supplement-May-2025.pdf
PDF
Presentation 2.pdfsdddddddddddddddddddddddddddddddddddddd
PPTX
LiFi Technology an effective way of Communication
PPTX
DAT602-Database Design and Development-AT4).pptx
PPTX
Data Flows presentation hubspot crm.pptx
PPTX
c_languagew_structure_and_functions.pptx
PPTX
BIOS-and-VDU-The-Foundations-of-Computer-Startup-and-Display (1).pptx
PPTX
امنية شبكات منهج (cisco networking).pptx
PPTX
Going_to_Greece presentation Greek mythology
B450721.pdf American Journal of Multidisciplinary Research and Review
Information Technology practical assignment
Comparison of 2 Population Kuch toh bhadwa chodi karwa raha
Male_Genital_SystMale_Genital_System_Anatomy_Illustrated.pptxem_Presentation....
Network wired & wireless network ppt for
Technical SEO Explained: How To Make Your Website Search-Friendly
Information and Network Security types of cipher
weathering-final for grade 12 students in any kind of school
Internet_Addiction_Presentation_2025.pptx
Blue And White Modern Business Presentation.pptx
chapter 5: system unit computing essentials
Salesforce-Proxy-Statement-Supplement-May-2025.pdf
Presentation 2.pdfsdddddddddddddddddddddddddddddddddddddd
LiFi Technology an effective way of Communication
DAT602-Database Design and Development-AT4).pptx
Data Flows presentation hubspot crm.pptx
c_languagew_structure_and_functions.pptx
BIOS-and-VDU-The-Foundations-of-Computer-Startup-and-Display (1).pptx
امنية شبكات منهج (cisco networking).pptx
Going_to_Greece presentation Greek mythology

Single Sign-On security issue in Cloud Computing

  • 2.  What is Cloud Computing ?  Service Models  Single Sign-On  ACS Spoofing  Countermeasures  References 2
  • 3.  Cloud Computing is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.  Advantages of Cloud Computing:  Pay as you go  Cost effective  Location independent 3
  • 5.  Software as a Service (SaaS)  Access services via browser  Examples: Google Docs, DropBox, Gmail 5
  • 6. 6
  • 7.  Platform as a Service (PaaS)  Provides development environment  Examples: Microsoft Azure, Google AppEngine  Infrastructure as a Service (IaaS)  Provides virtual machines, storages  Examples: AmazonWeb Services 7
  • 12.  Single sign-on (SSO) property allows a user logs in once and gains access to all systems without being prompted to log in again at each of them.  SSO works among three parties:  User (represented as browser)  Identity Provider (IdP) e.g. Facebook, Gmail  Relying Party or Service Provider  No trust relationship between IdP and relying party or service provider.  Famous Single Sign-On Systems:  Facebook Connect  OpenIDConnect  OAuth 12
  • 14.  Benefits  Reducing time spent re-entering passwords for the same identity  Reducing overhead to maintain different passwords for different services 14
  • 15.  Identity Provider (IdP) is used to provide identifiers for users looking to interact with a system.  Security Assertion Markup Language(SAML) is used to exchange authentication and authorization data between Identity Provider and Service Provider. 15
  • 16.  SAML statements are contained in security tokens called assertions.  SAML consist of three building blocks:  Protocols: defines how assertions are exchanged between actors.  Bindings: specify how to embed assertions into transport protocols (e.g., HTTP or SOAP)  Profiles: define the interplay of assertions, protocols, and bindings that are necessary for the needs of a specific use case to be met. 16
  • 17.  Authentication Request 17 <AuthnRequest IDVersion IssueInstant AssertionConsumerServiceURL?> <Issuer>? <Subject>? <NameIDPolicy>? <Extensions>? <Signature>? <Conditions>? <RequestedAuthnContext>? <Scoping>? </AuthnRequest>
  • 18.  The optional AssertionConsumerServiceURL (ACSURL) attribute specifies the endpoint URL to which the IdP must deliver the issued assertion.  The authentication request may be protected by a digital signature (<Signature>)  The <Issuer> element specifies the SAML authority (the IdP) that certifies the claim(s). 18
  • 20.  Adversary is a client in an SSO and attempts to convince the RP that his browser represents Legitimate user, assuming that he knows legitimate user’s username through a prior communication. 2020 Legitimate User Adversary (Malicious User) IdP (e.g. Gmail) Relying Party
  • 21.  Adversary leaves malicious web content in user’s browser during her visiting of his website, which can perform SSO operations through sending requests to the IdP and the RP. 21 Legitimate User Adversary (Malicious User) IdP (e.g. Gmail) Relying Party
  • 22.  When Legitimate user visits adversary's website, adversary acts as an RP to the IdP, in an attempt to get user’s credential for the target RP. 2222 Legitimate User Adversary (Malicious User) IdP (e.g. Gmail) Relying Party
  • 23.  ACS (Assertion Consumer Service) Spoofing allows the adversary to redirect the security token issued by the IdP to himself, and thus to impersonate the victim to every federated SP.  The only prerequisite for this attack is that the victim has to visit a webpage controlled by the adversary.  ACS Scanner  An automated penetration test tool developed to scan ACS vulnerability  Platform Independent 23
  • 24. 24 IdP http://IdP.com U --->UA A http://ssoattack.org SP http://sp.com 1. HTTPGET URL 2. HTTPGET URLsp 3. HTTP 302 IdP, (<AuthRequest(ID,SP,ACSurl)>, URLsp) No security context. User not identifiable 4. HTTP 302 IdP, <AuthRequest(ID,SP,Badurl)> ,URLsp) 5. HTTP GET IdP, (<AuthRequest(ID,SP,Badurl)> ,URLsp) 6. User authentication 7. HTTP 200 Form(<Response(AA)>,URLsp, Badurl) 8. HTTP POST Badurl,(<Response(AA)>,URLsp) 9. HTTP POST ACSurl,(<Response(AA)>,URLsp) Verify and evaluate assertion 10. HTTP 302 URLsp Generate Assertion: AA=(ID,IdP,SP,U)
  • 25. SSO System Website Affected SPs ACS Spoofing Common Vulnerability Exposure (CVE) One Login www.onelogin.com 3600+ Yes CVE-2012- 4962 WSO2 Stratos www.wso2.org 3000+ Yes CVE-2012- 4961 SSOCircle www.ssocircle.com 2600+ Yes CVE-2013-0115 Bitium www.bitium.com 1750+ Yes Direct comm. 25
  • 26.  Whitelisting. One way to mitigate ACS Spoofing is to use a whitelist of allowed ACSURL values for each and every SP, stored at IdP.This may induce a significant management overhead for large IdPs.  Signing Authentication Request: In theory, signing authentication requests would make the injection of a malicious ACSURL impossible. 26
  • 27.  Preferred mitigation is cookie binding combining the ease of SSO with a cryptographically strengthened client authentication.  Solution provided by Andreas Mayer hardens both the SSO protocol and the session cookies by establishing mutually authenticated channels between the browser and the other participating entities (i.e. IdP and SP).  This builds a holistic authentication layer that prevents a wide range of attacks, including MITM,ACS Spoofing, and XSS/UI redressing vulnerabilities. 27
  • 28.  Rui Wang, Shuo Chen, and XiaoFeng Wang. 2012. Signing Me ontoYour Accounts through Facebook and Google: ATraffic-Guided Security Study of Commercially Deployed Single- Sign-On Web Services. In Proceedings of the 2012 IEEE Symposium on Security and Privacy (SP '12). IEEE Computer Society, Washington, DC, USA, 365-379. DOI=10.1109/SP.2012.30 http://dx.doi.org/10.1109/SP.2012.30  Andreas Mayer, Marcus Niemietz,Vladislav Mladenov, and Jörg Schwenk. 2014. Guardians of the Clouds: When Identity Providers Fail. In Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security (CCSW '14). ACM, NewYork, NY, USA, 105-116. DOI=10.1145/2664168.2664171 http://doi.acm.org/10.1145/2664168.2664171  A. Armando, R. Carbone, L. Compagna, J. Cuellar, G. Pellegrino, and A. Sorniotti. From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure? In SEC, volume 354 of IFIP Advances in Information and Communication Technology, pages 68{79. Springer, 2011. 28
  • 29.  Yuen-Yan Chan. 2006. Weakest link attack on single sign-on and its case in SAML v2.0 web SSO. In Proceedings of the 2006 international conference on Computational Science and Its Applications -Volume Part III (ICCSA'06), Marina Gavrilova, Osvaldo Gervasi, Vipin Kumar, C. Kenneth Tan, and David Taniar (Eds.), Vol. Part III. Springer-Verlag, Berlin, Heidelberg, 507- 516. DOI=10.1007/11751595_54 http://dx.doi.org/10.1007/11751595_54  Hsin-Yi Tsai; Siebenhaar, M.; Miede, A.;Yu-Lun Huang; Steinmetz, R., "Threat as a Service?: Virtualization's Impact on Cloud Security," IT Professional , vol.14, no.1, pp.32,37, Jan.-Feb. 2012 doi: 10.1109/MITP.2011.117 29