44
Enterprise Security Requirements Dimtuthu Leelarathne Director, Solutions Architecture

Enterprise Security Requirements

Embed Size (px)

Citation preview

Page 1: Enterprise Security Requirements

Enterprise Security Requirements

Dimtuthu Leelarathne Director, Solutions Architecture

Page 2: Enterprise Security Requirements

A dozen solution patterns for common identity problems

in an enterprise!

Page 3: Enterprise Security Requirements

Enterprise Security Landscape

Bordersacrosssystemsdon’tworkanymore

Page 4: Enterprise Security Requirements

Why?

o  Open up APIs o  Bring your own identity

o  Identity maintained in one domain, accessed in other domains o  Social network identities

o  Bring your own device o  Ecosystems o  Mergers/Acquisitions

Page 5: Enterprise Security Requirements

An IAM System

Page 6: Enterprise Security Requirements

WSO2 Identity Server o  5th Generation Product

o  Current version 5.1.0 (released 2015) o  Federated identity and entitlement is a key part of any distributed

architecture o  Internal security threats, Partnerships o  Mergers, De-mergers o  APIs, Cloud systems

o  SSO is important but need to federate and bridge across SSOs o  Open Standards for Identity are changing the industry landscape

o  Based on WSO2 Carbon platform, which provides support for multi-tenancy, logging, clustering, and other common services

Page 7: Enterprise Security Requirements

Identity Server Landscape

Page 8: Enterprise Security Requirements

Enterprise Identity Bus

Page 9: Enterprise Security Requirements

Enterprise Identity Bus (EIB)

Page 10: Enterprise Security Requirements

10

Enterprise Identity Bus

Page 11: Enterprise Security Requirements

What Does an EIB Do ?

Bridges

Tokens

•  OAuth/2

•  OpenID/OpenID Connect

•  SAML2

•  WS-Federation

•  Kerberos, etc

Claims & Claim Dialects

•  Email Addresses

•  Phone Numbers

•  Names, etc

User Stores

•  SPML, SCIM, Salesforce, Google, etc

•  Just in Time provisioning, inbound, outbound

Page 12: Enterprise Security Requirements

A Story

o  Kermit Co is an open-source product development company

o  It has employees, customers, open-source community

o  It has some internal systems used by employees and some external systems

o  Kermit Co is going to upgrade their identity

Page 13: Enterprise Security Requirements

Kermit Cooperation

Page 14: Enterprise Security Requirements

Kermit Co has some internal Applications

o  Employees use several systems o  Office 365 o  Redmine o  Salesforce o  Star Accounts

o  Employee LDAP in Kermit Datacenter cannot be synched to Cloud

Page 15: Enterprise Security Requirements

Problem

o  Employees need to access cloud-based and on premise systems

o  De-centralized Identities o  Password exhaustion, re-login each time à  When the employee login to one system he should login

to the rest o  Different systems use different protocols – SAML 2.0,

WS-Federation

Page 16: Enterprise Security Requirements

SSO for Heterogeneous Systems using different Federation Protocols

Page 17: Enterprise Security Requirements

Problem

o  Ginger is from finance team

o  Her account is hacked

o  All finance data is leaked

à  Need to implement Multi-Factor Authentication (MFA) o  Something you know, Something you have,

Something you are

o  Add FIDO and SMSOTP

Page 18: Enterprise Security Requirements

MFA in Multi-Steps

Page 19: Enterprise Security Requirements

Problem

o  Customers need to authenticate to several system o  Website for product downloads

o  JIRA for issue reporting

o  Certification portal

o  Partner portal

o  All customers are in a different LDAP

Page 20: Enterprise Security Requirements

Handling Different Types of Identities

o  Technically can add to the existing WSO2 IS, but customer identities are, o  Scale is massive o  Control is not within the organization o  Self-service registration should be there o  Social identities & JIT provisioning o  Identity is low assured o  Delegated administration o  User experience must be excellent and distributed

Page 21: Enterprise Security Requirements

Managing Internal/External Identities

Page 22: Enterprise Security Requirements

Problem

o  Need to provide social sign-up/sign-in capabilities to the website

o  Facebook, Google

o  When users sign up via social media Kermit wants to add the user to the External Users DB

à Do just in time provisioning to the External Users DB

Page 23: Enterprise Security Requirements

Identity Federation and JIT

first_name

FirstName

given_name

Page 24: Enterprise Security Requirements

Problem

o  How are the external users going to manage their profile? o  All external users need to

manage their own profiles by logging into the website

o  Make website do direct LDAP calls?

o  Use APIs in WSO2IS o  SCIM – System for Cross-domain Identity

Management o  User information recover service o  User management Service

IcanuseREST/SOAPcallstodousermanagement

Page 25: Enterprise Security Requirements

Identity Management APIs

ExternalUsers

Page 26: Enterprise Security Requirements

Problem

o  Kermit employees need to login to external systems – JIRA, Website & Certificate Portal

o  Kermit employees are not in the external IdP à Kermit employee identities should be federated from internal IdP to external IdP and SPs

Page 27: Enterprise Security Requirements

Identity Federation – Custom Authenticator

Page 28: Enterprise Security Requirements

Problem

o  Matrix is a marketing analytics company that does lead identification for Kermit Co

o  It is file based batch process that update Kermit’s Salesforce

o  Kermit Co wants to automate the process by exposing APIs

o  addSQLead, getRawLeads, getUsers

Page 29: Enterprise Security Requirements

Expose OAuth Protected APIs

Page 30: Enterprise Security Requirements

Problem

o  Kermit Infra team wants to automate provisioning

o  Provisioning users to Apps o  LDAP synching + LDAP groups give same end result as

provisioning o  Per-app roles needs to be managed in central LDAP. Can be quite large

o  WSO2IS adaptors can be used for rule-based provisioning

o  Same Control Domain à Can use either (automated provisioning and LDAP Synching)

o  Different Control Domain à Use provisioning

Page 31: Enterprise Security Requirements

Rule-Based User Provisioning

Page 32: Enterprise Security Requirements

Problem

o  Kermit HCI expert wants to avoid showing login screen on the IdP

o  He wants the Login choices to be displayed on web site itself

à Home Realm Identifier

Page 33: Enterprise Security Requirements

Federation Hub

Page 34: Enterprise Security Requirements

Kermit Co has a pretty decent Identity Infrastructure!

Page 35: Enterprise Security Requirements
Page 36: Enterprise Security Requirements

Gonzo Group of Companies

o  Group of companies with 3 main companies

o  Problem – Require centralized, highly controlled IAM program for it’s external users

Page 37: Enterprise Security Requirements

Multi-tenant Identity Server

Page 38: Enterprise Security Requirements

Problem

o  Gonzo the group of companies wants centralized fine-grained authorization policies

o  Render menu items on web site using centralized authorizations

o  All internally-developed-apps should comply to centralized policy registry

Page 39: Enterprise Security Requirements

Fine-grained Centralized Authorization

Page 40: Enterprise Security Requirements

Problem

o  Gonzo wants all distributor registrations through their website to go through an approval process

Page 41: Enterprise Security Requirements

Workflows

Page 42: Enterprise Security Requirements

Other Advanced Patterns https://medium.facilelogin.com/thirty-solution-patterns-with-the-wso2-identity-server-16f9fd0c0389

Page 43: Enterprise Security Requirements
Page 44: Enterprise Security Requirements

CONTACT US !