Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: email of Lithuania's Identity Federation

Table of Contents
printablefalse

Introduction

If you're a service operator (provider of resources to the academic and research community) and are looking for a way to allow higher education users to authenticate to your service via federated access, you find on this page the relevant steps that describe how a service can be integrated with eduGAIN as a SAML Service Provider.

This page’s target audience is technical people (i.e. administrators) of organizations or communities that operate the service. Examples of organizations and communities that typically are interested to operate a service in eduGAIN are:

  • research communities (i.e. international research projects)
  • e-journal content providers (i.e. publishers)
  • cloud service providers (i.e. suppliers of research projects)

This page is for service providers who want to offer their SAML-enabled services to users and institutions in several countries. Thanks to the advantages of eduGAIN, such services can connected to the identity federations of more than 50 countries around the world with scalable efforts. Joining a single eduGAIN member federation allows the users from all other eduGAIN member federations to potentially also access your service (if you allow that). This minimizes the technical and contractual work considerably. If you are interested in a verb brief introduction of eduGAIN in form of a video, please have a look at the About eduGAIN web page.

So, if you're a service operator (provider of resources to the academic and research community) and are looking for a way to allow higher education users to authenticate to your service via federated access, you find on this page the relevant steps that describe how a service can be integrated with eduGAIN as a SAML Service Provider.

This rest of this page’s target audience is technical people (i.e. administrators) of organizations or communities that operate the service. Examples of organizations and communities that typically are interested to operate a service in eduGAIN are:

  • research communities (i.e. international research projects)
  • e-journal content providers (i.e. publishers)
  • cloud service providers (i.e. suppliers of research projects)


Once you have read this page and followed its instructions, you will have deployed a SAML2.0 compliant Service Provider and published it in eduGAIN. This means that a few million higher education users (students, university staff and faculty, researchers) can - depending on the access control rules you define - get access to your services using their home institutions account.

...

  • Enables trustworthy exchange of identity information between federations without many bilateral agreements
  • Reduces the costs of developing and operating services
  • Improves the security and end-user experience of services
  • Enables service providers to greatly expand their user base
  • Enables identity providers to increase the number of services available to their users

Limitations

Please note that eduGAIN currently provides web-based authentication only on a large scale. This means that for federated login, almost always a web browser is involved at the user’s. eduGAIN itself also allows non-browser login via the SAML ECP profile. This profile is however hardly deployed yet by the eduGAIN Identity Providers. Therefore, it is usable only in very few scenarios.

  • Improves the security and end-user experience of services
  • Enables service providers to greatly expand their user base
  • Enables identity providers to increase the number of services available to their users



Limitations

While eduGAIN provides many benefits for service operators, organisations and users, there also are a few limitations that a service operator should be aware ofeduGAIN is a world wide infrastructure that has been operational since 2011. As such it also has a few issues that you should be aware of:Despite the large number of participating countries and organisations, there are still some countries and organisations missing because they don’t offer federated login for their users or because they only offer federated login in their national federation but not (yet) in eduGAIN. With so many involved countries and organisations, coordination and setting standards for all participants is challenging. Also for example because countries typically have different data protection laws and other regulations. This, as well as deployment issues in some countries sometimes results in insufficient release of user attributes from participating Identity Providers. Also, there is no global standard for assurance levels of authentication or user attributes. Because national federations and organisations in general make use of the same user data that is used for enabling access via eduGAIN, it is also in their self-interest to keep user data up-to-date and properly verified. Think of a university that certainly is interested to properly identify their staff members and students before they join the university and get a user account. The same university also is interested to disable an account if a staff member leaves or student finishes his studies after some years.

Joining eduGAIN

The publication in eduGAIN, for a Service Provider allows reaching a large audience of higher education users (students, researchers, staff of higher education institutions) without the technical and administrative difficulties of maintaining and protecting repositories of user credentials. This is because authentication is always handled directly at and by the user’s home Identity Provider, while the Service Provider only has to deal with user Authorization. In Identity and Access Management, authentication is the process of confirming a user’s identity, usually by verifying the knowledge of a set of credentials (username, password). Authorization is the process of determining the access rights an authenticated user is eligible for. In eduGAIN terms, this would mean that a user accesses the Service Provider with an assertion of his identity and the Service Provider trusts that assertion because it comes from a trusted relying party, but it is always the Service Provider that decides to which parts of the service this authenticated user should have access.

...

Country

Contact Address

Joining Instructions

Armenia

admin@afire.asnet.am

Not Available

Austria

eduid@aco.net

https://wiki.univie.ac.at/display/federation/Joining

Belgium

edugain@belnet.be

http://federation.belnet.be/node/12

http://federation.belnet.be/node/27

Brazil

operacao@cafe.rnp.br

https://www.rnp.br/en/services/advanced-services/cafe

Canada

caf@canarie.ca

http://www.canarie.ca/identity/join/

Chile

cofre@reuna.cl

http://cofre.reuna.cl/index.php/en/joining-sp

Colombia

tecnico@renata.edu.co

Not Available

Croatia

team@aaiedu.hr

http://www.aaiedu.hr/za-davatelje-usluga/registar-resursa?language=hr

Czech Republic

eduid-admin@eduid.cz

http://www.eduid.cz/en/join#step-by-step_guide

Denmark

eduGAIN-operations@wayf.dk

http://wayf.dk/en/services/how-to-get-my-service-connected

http://wayf.dk/en/services/edugain

Ecuador

info@cedia.org.ec

Not Available

Estonia

eenet@eenet.ee

http://taat.edu.ee/main/teenusepakkujale/kuidas-liituda/

Finland

haka@csc.fi

https://confluence.csc.fi/display/HAKA/Joining+and+registrations

https://confluence.csc.fi/pages/viewpage.action?pageId=39066043

France

fed-contact@listes.renater.fr

https://services.renater.fr/federation/en/sp

Georgia

gif-support@grena.ge

http://gif.grena.ge/eng/main/index/13

Germany

edugain@dfn.de

https://www.aai.dfn.de/en/join/  and https://wiki.aai.dfn.de/de:edugain

Greece

helpdesk@grnet.gr

Not Available

Hungary

aai@niif.hu

http://www.eduid.hu/hu/reszletek/

Ireland

noc-middleware@heanet.ie

Not Available

Israel

info@iif.iucc.ac.il

https://iif.iucc.ac.il/join/

Italy

idem-help@garr.it

https://www.idem.garr.it/en/join

Italy/International

credentials-admin@ct.infn.it

http://gridp.garr.it/documentation.html

Japan

gakunin-office@nii.ac.jp

https://www.gakunin.jp/en-Join/

Latvia

laife-admin@lanet.lv

Not Available

Lithuania

federacija@litnetfedi@litnet.lt

http://fedi.litnet.lt/en/rps

http://fedi.litnet.lt/en/edugain

Luxembourg

admin@restena.lu

http://www.eduid.lu/en/EN-participate.html

Moldova

leaf@renam.md

http://federations.renam.md/index.php?menu=join

Norway

support@feide.no

https://www.feide.no/service-providers

Poland

kontakt@aai.pionier.net.pl

https://aai.pionier.net.pl/en/index.php?page=rps

Portugal

noc@fccn.pt

https://www.fccn.pt/en/services/connectivity-and-infrastructure/rctsaai-federation/#!/en/services/connectivity-and-infrastructure/rctsaai-federation/service-recipients/

Slovenia

aaa-podpora@arnes.si

https://aai.arnes.si/

South Africasafire@tenet.ac.zahttps://safire.ac.za/participants/sp/join/

Spain

siri@rediris.es

http://www.rediris.es/sir/docs/howto-sp.html

Sweden

operations@swamid.se

https://www.sunet.se/swamid/

Switzerland

aai@switch.ch

https://www.switch.ch/aai/join/

https://www.switch.ch/aai/support/documents/interfederation/

The Netherlands

support@surfconext.nl

https://www.surf.nl/en/services-and-products/surfconext/index.html

https://wiki.surfnet.nl/display/surfconextdev/Documentation+for+Service+Providers

U.S.

admin@incommon.org

https://www.incommon.org/join.html

Ukraine

peano@uran.ua

http://www.peano.uran.ua/~eng/frames.htm

United Kingdom

service@ukfederation.org.uk

http://www.ukfederation.org.uk/content/Documents/JoinFederation

http://www.ukfederation.org.uk/content/Documents/EduGAINParticipation

...

If you have a relationship to one of the above eduGAIN member federations, please follow their guide or get in touch with them using the given contact address. As explained above, a service can join eduGAIN via any eduGAIN member federation that accepts it. In order to become available as an eduGAIN service, a service only has to join one single eduGAIN member federation.

...

  • Shibboleth Service Provider, which is implemented and maintained by the Shibboleth Consortium. It’s the most common and popular SAML implementation in eduGAIN and it also includes most features relevant for eduGAIN. Therefore, this is generally the recommended SAML implementation to use. It works very well with Apache and IIS as web server. It requires root access because it requires the mod_shib web server module.
  • SimpleSAMLphp, which is implemented and maintained by Uninett. This PHP implementation of SAML is recommended only if PHP is already used. It does not require root access but to make use of federated login requires code changes in a PHP application.

Please read section 4.2 (Installation & Configuration), which contains detailed instructions for the installation and necessary configuration of a Service Provider, using one of the aforementioned implementations. Also make sure that, once installed, the Service Provider is tested using the SAML implementations sanity checks (e.g. for Shibboleth running "shibd -t" on linux) to ensure that the software was correctly installed. Ideally, the Service Provider is also tested against a SAML2 Identity Provider to ensure that it was configured correctly.

...

Once the Service Provider software is installed, configured (see section 4.2) and functional, the next step is to register the Service Provider with the UKAMF federation.

Before completing the following form, please also read the section 4.2.4 about SAML2 metadata and how to generate/compose it for your Service Provider.  Then provide the request data and submit the form:

...