33
Enterprise Architecture 2014 Take No Pretenders: Identity and Access Management ITS Webinar 10/7/2014 Eric Goodman, IAM Architect

Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Take No Pretenders: Identity and Access Management

ITS Webinar 10/7/2014

Eric Goodman, IAM Architect

Page 2: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Webinar Overview • IAM Basics

– IAM as an element of EA – Brief overview of IAM – Federated Authentication overview

• IAM and UCOP

– Support Federated Authentication! – Other Considerations for Developers and Integrators – UC and UCOP IAM Resources

• IAM systemwide directions

– MFA – IdP Proxy – Global IDs – Data Release 2

Presenter
Presentation Notes
Webinar(s) will discuss elements of IAM in general, but will also focus on issues specific to UCPath.
Page 3: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

IAM Basics

What is Identity and Access Management?

3

Page 4: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

How Does IAM Apply to ITS? • IAM is an area of Enterprise Architecture (EA) focus

– EA describes significant structural components such as information, process and technology assets and how they are used to support optimized business execution.

– EA supports shared services, interoperability and IT<->business alignment

4

Presenter
Presentation Notes
Want compatibility, interoperability, consistency, etc.
Page 5: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

What is IAM? • Identity and Access Management

– aka IDM, IdM or Identity Management

• Purpose of IAM

• Ensure correct people have access to the appropriate IT resources

• Approach • Establish and maintain one “identity” per person • Central management user accounts

• With support for Delegated and Self-Service functions

• Provision and reconcile accounts 5

Presenter
Presentation Notes
Has several names Provide unified view of users and their access
Page 6: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

From Identity to Accounts

6

Presenter
Presentation Notes
Not all Identities represent actual people. There’s one Fred.
Page 7: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

What is IAM? • Mixture of Technology and Process

• Business Processes

– Common business definitions – Service eligibility – Onboarding processes

• Common Technologies – Database, LDAP, AD, Kerberos, Grouper – CAS, WebAuth, Shibboleth/SAML

7

Presenter
Presentation Notes
Process Examples: What defines a ‘current employee’ or ‘current student’? Do separated employees/graduated students maintain their accounts? What users are granted email accounts? How are accounts generated?
Page 8: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Elements of IAM

8

Presenter
Presentation Notes
There are other ways that people define the elements of IAM. “AAA (Authentication, Authorization and Auditing)”
Page 9: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Elements of IAM • Data Collection

– Onboarding, ideally via Systems of Record (SoR) – “The Merge”

• Account Management – Administrator Account Controls – Self-Service Functions (Change/Reset Pwd, Data Updates)

• Auditing – Central logs tracking account activity/access

9

Page 10: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Elements of IAM • Provisioning

– Managing and reconciling accounts in external systems • Authentication

– Verifying who you are (aka “login”) • Authorization

– Privilege/permission management

See UCPath IAM Webinar #1 (first half) for more IAM detail: https://sp2010.ucop.edu/sites/its/ppsrepl/default.aspx > Technical Webinars > IAM Webinars > 1 Identity Access Management and UCPath

10

Page 11: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

FEDERATED AUTHENTICATION

11

Page 12: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Authentication Approaches • Local Authentication

• Pass-thru Authentication

• Federated Authentication

12

Page 13: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Local Authentication

13

Presenter
Presentation Notes
Password management issues
Page 14: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Local Authentication - Scaling

14

• Pros – Flexibility

• Different usernames and passwords for each site

– No need to integrate with anything else

• Cons – Usability

• Different usernames and passwords for each site • Doesn’t integrate with anything else

– Security • Risk that users will reuse passwords (can’t be audited) • Passwords are used everywhere

Page 15: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Local Authentication - Scaling

15

Page 16: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Pass-thru Authentication

“Borrowing your credentials”

16

Page 17: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Pass-thru Authentication

17

Presenter
Presentation Notes
Replicon, ServiceNow, SharePoint
Page 18: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Pass-thru Authentication - Scaling

18

• Pros – Consistency

• Same username password at each site • Single database for account/password changes

• Cons – Security

• May have to grant external applications access to internal systems • Many sites handle user passwords • Trains users to enter passwords on any web site

– User has no way to validate website • Authentication service can’t distinguish you from the application

– Application is “pretending to be you” – Audit, access issues

Page 19: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Pass-thru Authentication - Scaling

19

Passwords everywhere!

Page 20: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Federated Authentication

Authentication as a service

20

Page 21: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Federated AuthN • What is Federated Authentication?

– Isolates authentication into a separate service – Use your “home” account to access “remote” systems

• Federation Basics – Security Assertion Markup Language (SAML) – Shibboleth – Other protocols and programs exist

• Examples – TRS, Connexxus, LMS

21

Presenter
Presentation Notes
If you’ve used example apps, you’ve seen federation
Page 22: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Federated Authentication

22

Page 23: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Federated Authentication - Scaling

23

Page 24: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Federated Authentication – Scaling • Pros

– Security • Single application handles all passwords • Users always enter passwords on same website

– Flexibility • Changes to authentication process can be handled centrally

– Multi-factor, expired accounts • Provides better privacy hooks

– Federation • Allows integration with multiple account stores/IdPs

– Not limited to users from one campus

• Cons – Largely Web-Only – Learning curve is somewhat steep – Vendor implementations are frequently flawed

24

Page 25: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Common Login Page

25

Page 26: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Federated Authentication For more detail on Federated Authentication, see UCPath

IAM Webinar #3 https://sp2010.ucop.edu/sites/its/ppsrepl/default.aspx > Technical Webinars > IAM Webinars > 3 Logging Into UCPath and Federated Authentication

26

Page 27: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

IAM and UCOP

What does IAM mean to me?

27

Page 28: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

For New Applications • Use Federated Authentication

– More secure than other mechanisms – Especially important when working with vendors

• Insist on SAML integration support

• Avoid Pass Thru Authentication – In some circumstances (esp. non-web applications) Pass-

Thru may be acceptable. – Less secure than SAML integration

• Do not design around local accounts – Users are nearly guaranteed to reuse passwords – Adds account management burden locally

28

Page 29: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Preparing for IAM Integration • Separate code that performs Authentication

– Write code expecting external (SAML) Authentication

• Account != Permission – Rely on Roles or Attributes for access controls (RBAC/ABAC) – Roles and Attributes can be sourced externally

• Use defined UCTrust attributes; don’t create your own

– https://spaces.ais.ucla.edu/display/uctrustwg/UCTrust+OIDs

29

Page 30: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

IAM Resources and Organization • UCOP IAM Team

– Tim Hanson, Manager – Mark Boyce – Krishna Mohan

• Systemwide IAM Support

– Eric Goodman, IAM Architect

• UCTrust – UC-specific “trust web” supporting Federated Authentication

• InCommon

– Higher Ed “trust web” supporting Federated Authentication 30

Page 31: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Systemwide Directions

Projects underway or under consideration

31

Page 32: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

System-wide Directions • IdP Proxy

– Supports vendors with limited SAML support – Allows for central data enhancement during authentication

• Multi-Factor Authentication

– Various projects at different campuses – Desire to see more prevalent system-wide

• Global ID

– Goal is to provide systemwide IDs across UC populations – Let me know if you have use cases!

• Data Release Standardization

– Simplify process of approving and configuring data release

32

Page 33: Take No Pretenders: Identity and Access Managementucop.edu/.../webinars/Identity-Access-Management.pdf · 07/10/2014  · – aka IDM, IdM or Identity Management • Purpose of IAM

Enterprise Architecture 2014

Question & Answer

Additional questions or consultations? Contact Eric Goodman, [email protected]

33