Wednesday 5th June, 2013
10:00am to 10:45am
CAS has a wonderfully simply protocol for delegated authentication and single-signon for browser based access to web applications. However, the same protocol may stymie the non-browser and programmatic clients commonly found in RESTful architectures. The CAS login form is fine for humans behind a browser, but programmatic clients and human users using non-browser interfaces such as a CLI (Command Line Interface) and, to some degree, AJAX clients will face difficulties. Such clients may avail themselves of the CAS RESTful login interface, but only if they know in advance to exactly when pre-authenticate; otherwise they will be unexpectedly and unwittingly be forwarded to the CAS login screen and fail.
Our approach transforms some CAS protocol 200 and 302 responses to 401 responses and makes navigating CAS protected REST interfaces a cinch. We prove this with a demonstration: accessing a CAS-protected REST endpoint with a single cURL command.
Vijayanand Bharadwaj is a Sr. Research Scientist at EMC Corporation. After obtaining his PhD in Computer Science from West Virginia University he joined the CTO at EMC. He has been working on advanced development in Cloud Computing, Security, REST, SOA and Systems Resource Management. As part of the Advanced Architecture Group at the CTO he works on devising solutions for EMC?s customers. His interests include Enterprise Integration Patterns, Virtualization, CSCW and anything technology-related. Before joining EMC he was a lecturer and researcher at West Virginia Univ. He spends his spare time with his family and tries to catch up on the latest movies and interesting reads. Though a home body he has travelled quite a bit on the insistence of his wife and has come to enjoy it.
John Field has more than 20 years experience in information security. He is presently a Consultant Scientist and security architect in the EMC office of the CTO, where he is a member of the Architecture and Applied Research group. In this capacity, he does cutting edge security research, security analysis, and advanced development, as well as strategic consulting.
11am Identity Management and the Academic & Research Community by Seth Theriault and Benjamin Oshrin
Sign in to add slides, notes or videos to this session