|
US$1589.00 · In stock Delivery: <= 10 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 29242-2012: Information security technology -- Authentication and authorization -- Security assertion markup language Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 29242-2012 | English | 1589 |
Add to Cart
|
10 days [Need to translate]
|
Information security technology -- Authentication and authorization -- Security assertion markup language
| Valid |
GB/T 29242-2012
|
PDF similar to GB/T 29242-2012
Basic data | Standard ID | GB/T 29242-2012 (GB/T29242-2012) | | Description (Translated English) | Information security technology -- Authentication and authorization -- Security assertion markup language | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.040 | | Word Count Estimation | 72,713 | | Quoted Standard | ISO/IEC 13568-2002; RFC 1510; RFC 2253; RFC 2396; RFC 2822; RFC 3513 | | Regulation (derived from) | National Standards Bulletin No. 41 of 2012 | | Issuing agency(ies) | General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China, Standardization Administration of the People's Republic of China | | Summary | This standard defines a set of XML-encoded format to comply with security assertions about the syntax, semantics, specification, delivery and processing system entities SAML assertions and SAML protocol set processing rules related to the management syste |
GB/T 29242-2012: Information security technology -- Authentication and authorization -- Security assertion markup language ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information security technology. Authentication and authorization. Security assertion markup language
ICS 35.040
L80
National Standards of People's Republic of China
Information Security Technology Authentication and Authorization
Security Assertion Markup Language
Issued on. 2012-12-31
2013-06-01 implementation
Administration of Quality Supervision, Inspection and Quarantine of People's Republic of China
Standardization Administration of China released
Table of Contents
Introduction Ⅲ
Introduction Ⅳ
1 Scope 1
2 Normative references 1
3 Terms and definitions
4 Abbreviations 2
Consistency 2 5
6 SAML Assertion 2
6.1 Overview 2
6.2 namespace declaration and program head 3
6.3 Name Identifier 4
6.4 Assertion 6
6.5 Subject 8
6.6 Conditions 11
6.7 Recommendation 15
6.8 Statement 16
7 SAML protocol 23
7.1 Overview 23
7.2 namespace declaration and program head 23
7.3 requests and responses 24
7.4 Assertion query and request protocol 29
34 7.5 authentication request protocol
40 7.6 Kana Resolution Protocol
42 7.7 Name Identifier Management Protocol
7.8 Single-point agreement signed out 44
7.9 Name Identifier Mapping Protocol 47
8 SAML version 48
8.1 Overview 48
8.2 SAML specification set version 48
8.3 SAML namespace version 50
9 SAML and XML signature syntax and processing 51
9.1 Overview 51
Assertion 9.2 signatures 51
9.3 Request/Response Signing 51
Signature 51 9.4 Inheritance
9.5 XML signature mechanism 51
10 SAML and XML Encryption Syntax and Processing 52
10.1 Overview 52
A combination of signed and encrypted 10.2 53
11 SAML extensibility 53
11.1 Overview 53
11.2 Expansion Scheme 53
11.3 wildcard expansion program point 54
11.4 Identifier Extension 54
12 SAML-defined identifiers 54
12.1 Overview 54
12.2 Behavior namespace identifier 55
12.3 Attribute name format identifier 56
12.4 name identifier format identifier 56
12.5 License Identifier 58
Appendix A (normative) section defines the format and requirements 60
A.1 program organized and namespace schemaorganizationandnamespaces 60
A.2 string value stringvalues \u200b\u200b60
A.3 URI value URIvalues \u200b\u200b61
A.4 time value timevalues \u200b\u200b61
A.5 ID and ID reference value idandidreferencevalues \u200b\u200b61
Examples Appendix B (informative) signed response 62
References 65
Foreword
This standard is based on the rules of GB/T 1.1-2009 given draft, in the development process with reference to the Information Standards Organization (OASIS.
OrganizationfortheAdvancementofStructuredInformationStandards) of saml-core-2.0-os.
This standard by the National Safety Standardization Technical Committee (SAC/TC260) and focal points.
This standard was drafted. Software, Chinese Academy of Sciences, the Ministry of Industry and Information Technology and Telecommunications Research Institute.
The main drafters of this standard. Chen Chi, FENG Deng, Fu Yanyan, Zhang Liwu, Jingji Wu, Nie Xiuying, Bili Bo, Xue Ning, Jiang Haojie, Wu Jing.
Introduction
In recent years, an increasing number of information systems through Web services, portal and integrated network applications, etc., Ann each other
Increasingly strong demand for full information sharing. But in the field of security across the Internet application scenarios, lack of information on authentication, attribute and authorization information transmission grid
Prescriptive and protocols, interoperability difficult operating conditions, still not been solved between the information security products. This standard is defined by a whole
Sets stringent, compliance, security assertions about the syntax and semantics specification and standard protocols XML encoding format set to ease this
situation.
This standard reference Organization for the Advancement of Structured Information Standards (OASIS) file SecurityAssertionMarkupLanguage
(SAML) v2.0. On the basis of the original file on the increase of the "terms and definitions" section, the description of the scope of the standard, revised the original
Introduction section member and the addition of appendix explains. While adding a protocol diagram illustrates the relationship between the various SAML protocols.
Information Security Technology Authentication and Authorization
Security Assertion Markup Language
1 Scope
This standard defines a series of XML encoding format to comply with security assertions about the syntax, semantics specification, transfer between systems and entities at
Set protocol processing SAML assertions and associated processing rules SAML system management.
This standard applies to the Internet across security domain application scenarios, identification, authentication and authorization services development, testing, evaluation and procurement.
2 Normative references
The following documents for the application of this document is essential. For dated references, only the dated version suitable for use herein
Member. For undated references, the latest edition (including any amendments) applies to this document.
ISO /IEC 13568.2002 Information technology - Z formal specification comment syntax, semantics and formal systems (Informationtech-
nology-Zformalspecificationnotation-Syntax, typesystemandsemantics)
RFC1510Kerberos network authentication requestor (V5) (TheKerberosNetworkAuthenticationService (V5))
RFC2253 Lightweight Directory Access Control (V3) (LightweightDirectoryAccessProtocol (V3))
RFC2396 Uniform Resource Identifiers. Generic Syntax (UniformResourceIdentifiers (URI). GenericSyntax)
RFC2822 Internet Message Format (InternetMessageFormat)
RFC3513 IPV6 address structure (InternetProtocolVersion6 (IPv6) AddressingArchitecture)
3 Terms and Definitions
The following terms and definitions apply to this document.
3.1
Assertion assertion
Generated by the SAML authority for the certification body behavior results, including authorization and attribute information related to the subject or subjects that can be used
Information and other data.
3.2
Identification authentication
Verify the identity of the entities claiming the action.
3.3
Authorization authorization
Given rights, including the right to grant access.
3.4
Binding protocol binding binding, protocolbinding
A protocol on the message and the standard message exchange patterns are mapped to specific forms another protocol standard.
Note. The SAML \u003cAuthnRequest\u003e Message is mapped to an example of the HTTP binding. Hereinafter, the SAML bindings to each
"SAMLxxxbinding" format name.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 29242-2012_English be delivered?Answer: Upon your order, we will start to translate GB/T 29242-2012_English as soon as possible, and keep you informed of the progress. The lead time is typically 6 ~ 10 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 29242-2012_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 29242-2012_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|