78
By Prabath Siriwardena, WSO2 Identity as a Service

Identity as a Service

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Identity as a Service

By Prabath Siriwardena, WSO2

Identity as a Service

Page 2: Identity as a Service
Page 3: Identity as a Service
Page 4: Identity as a Service

IDENTITY goes hand in hand with TRUST

Page 5: Identity as a Service

What makes my IDENTITY?

Page 6: Identity as a Service
Page 7: Identity as a Service

My AGE is part of my IDENTITY

Page 8: Identity as a Service

My PHONE NUMBER is part of my IDENTITY

Page 9: Identity as a Service

My e-MAIL is part of my IDENTITY

Page 10: Identity as a Service

My SSN is part of my IDENTITY

Page 11: Identity as a Service

Who needs my IDENTITY?

Page 12: Identity as a Service

My HR MANAGER

Page 13: Identity as a Service

My FINANCE MANAGER

Page 14: Identity as a Service

My PROJECT MANAGER

Page 15: Identity as a Service

PARTNERS of my company

Page 16: Identity as a Service

LAWS of IDENTITY

Extending internet with an Identity Management Layer

Page 17: Identity as a Service

LAWS of IDENTITY

User control & consent

Page 18: Identity as a Service

LAWS of IDENTITY

User control & consent

Technical Identity Systems must only reveal information identifying a user with the user’s consent.

Page 19: Identity as a Service

LAWS of IDENTITY

Minimal disclosure for a given use

Page 20: Identity as a Service

LAWS of IDENTITY

Minimal disclosure for a given use

The solution which discloses the least amount of identifying Information and

best limits its use is the most stable long term solution.

Page 21: Identity as a Service

LAWS of IDENTITY

Justifiable parties

Page 22: Identity as a Service

LAWS of IDENTITY

Justifiable parties

Digital identity system must be designed so the disclosure of Identifying information is limited

to parties having a necessary And justifiable place in a given identity relationship.

Page 23: Identity as a Service

LAWS of IDENTITY

Directed Identity

Page 24: Identity as a Service

LAWS of IDENTITY

Directed Identity

A universal identity system must support both ‘Omni-directional’ identifiers for use by public entities

and ‘unidirectional’ identifiers for use by private entities, thus facilitating discovery while preventing un-necessary

release of correlation handles.

Page 25: Identity as a Service

LAWS of IDENTITY

Pluralism of operators & technologies

Page 26: Identity as a Service

LAWS of IDENTITY

Pluralism of operators & technologies

A universal identity system must channel and enable the Inter-working of ,multiple identity technologies run by

Multiple identity providers.

Page 27: Identity as a Service

LAWS of IDENTITY

Human Integration

Page 28: Identity as a Service

LAWS of IDENTITY

Human Integration

The universal Identity Meta-system must define the human user to be a component of the distributed system

integrated through unambiguous human-machinecommunication mechanisms offering

protection against Identity attacks.

Page 29: Identity as a Service

LAWS of IDENTITY

Consistent experience across contexts

Page 30: Identity as a Service

LAWS of IDENTITY

Consistent experience across contexts

The unifying identity meta-system must guarantee itsUsers a simple consistent experience while enabling

Separation of contexts through multiple operators and technologies.

Page 31: Identity as a Service

How do we share data related to IDENTITY ???

Page 32: Identity as a Service

DIRECTORY SERVICES : LDAP/AD

Page 33: Identity as a Service

DIRECTORY SERVICES : LDAP/AD

IDENTITY attributes maintained in a central repo

Page 34: Identity as a Service

DIRECTORY SERVICES : LDAP/AD

IDENTITY attributes shared across multiple applications within the same domain

Page 35: Identity as a Service

DIRECTORY SERVICES : LDAP/AD

Enterprise SSO can be established within participating applications

Page 36: Identity as a Service

DIRECTORY SERVICES : LDAP/AD

Protocol incompatibilities could lead to silos

Page 37: Identity as a Service

DIRECTORY SERVICES : LDAP/AD

Directory awareness at the individual application level

Page 38: Identity as a Service

LDAP/Active Directory

HR FINANCE ERP

BUSINESS LOGIC

BUSINESS LOGIC

BUSINESS LOGIC

EXTERNAL

Page 39: Identity as a Service

LDAP/Active Directory

HR FINANCE ERP

BUSINESS LOGIC

BUSINESS LOGIC

BUSINESS LOGIC

Page 40: Identity as a Service

LDAP/Active Directory

HR FINANCE ERP

Identity Service

Page 41: Identity as a Service

LDAP/Active Directory

HR FINANCE ERP

Identity Service

EXTERNAL

Page 42: Identity as a Service

IDENTITY as a SERVICE

Page 43: Identity as a Service

IDENTITY as a SERVICE

Integrates IDENTITY services into application development

Page 44: Identity as a Service

IDENTITY as a SERVICE

Decouples IDENTITY related logic from individual application business logic

Page 45: Identity as a Service

IDENTITY as a SERVICE

User, IDENTITY related data externalized from the applications themselves

Page 46: Identity as a Service

IDENTITY as a SERVICE

Adheres to SOA standards

Page 47: Identity as a Service

IDENTITY SERVICES

AUTHENTICATION

AUTHORIZATION

AUDIT

IDENTITY PROVIDER PROVISIONING

Page 48: Identity as a Service

IDENTITY PROVIDER

Externalize IDENTITY attributes

Page 49: Identity as a Service

IDENTITY PROVIDER

Information Cards

Page 50: Identity as a Service

IDENTITY PROVIDER

OpenID

Page 51: Identity as a Service

IDENTITY PROVIDER

Identity Governance Framework [IGF]

Page 52: Identity as a Service

AUTHENTICATION

User Name/Password

Page 53: Identity as a Service

AUTHENTICATION

User centric identity : CardSpace/OpenID

Page 54: Identity as a Service

AUTHORIZATION

Manages authorization logic

Page 55: Identity as a Service

AUTHORIZATION

XACML

Page 56: Identity as a Service

AUTHORIZATION - XACML

A general purpose authorization policy language

Page 57: Identity as a Service

AUTHORIZATION - XACML

Policy Expressions

1. “Anyone can use web servers between 12:00 AM and 4:00 AM”2. “Salespeople can create orders, but if the total cost is greater

that $1M, a supervisor must approve”3. “Anyone view their own 401K information, but nobody else’s”4. “The print formatting service can access printers and temporary

storage on behalf of any user with the print attribute”5. “The primary physician can have any of her patients’ medical

records sent to a specialist in the same”

Page 58: Identity as a Service

AUTHORIZATION - XACML

XACML Vs SAML

Here comes

another request…

.

Let me process

the Auth’Z

request…

SAML XACML

Page 59: Identity as a Service

PROVISIONING

Supports administration of IDENTITY & ACCESS Management

Page 60: Identity as a Service

PROVISIONING

Provides centralized policy administration and controls

Page 61: Identity as a Service

PROVISIONING

SPML

Page 62: Identity as a Service

PROVISIONING

http://soa.sys-con.com/node/434383

Service Provisioning via SPML in SOASimplifying identity and resource management for distributed servicesBy: Manivannan Gopalan

Page 63: Identity as a Service

AUDITING

Audit all IDENTITY events

Page 64: Identity as a Service

AUDITING -XDAS

Distribute Audit Service

Page 65: Identity as a Service

AUDITING -XDAS

The principle of accountability

Page 66: Identity as a Service

AUDITING -XDAS

Detection of security policy violations

Page 67: Identity as a Service

AUDITING -XDAS

http://www.opengroup.org/pubs/catalog/p441.htm

Page 68: Identity as a Service

IDENTITY SERVICES

AUTHENTICATION[InforCards/OpenID]

AUTHORIZATION[XACML]

AUDIT[XDAS]

IDENTITY PROVIDER[OpenID/InforCards]

PROVISIONING[SPML]

Page 69: Identity as a Service

USER CENTRIC IDENTITY

User in control of identity interactions

Page 70: Identity as a Service

Service Provider/User/Identity Provider

IDENTITY PROVIDER

SERVICE PROVIDER

Page 71: Identity as a Service

Information Cards

Page 72: Identity as a Service

OpenID

http://www.slideshare.net/prabathsiriwardena/understanding-openid/

Page 73: Identity as a Service

BUILDING FEDERATED IDENTITY WITH OPENID

USER STORE

OpenID PROVIDER

REALMSERVICE

PROVIDER

Page 74: Identity as a Service

IDENTITY GOVERNANCE

Establishing policies, controls & enforcement mechanisms

Page 75: Identity as a Service

IDENTITY GOVERNANCE

WHY?

1. A fragile and brittle SOA implementation2. Services that cannot easily be reused because they are unknown to developers or because they were not designed with reuse in mind3. Lack of trust and confidence in services as enterprise assets, which results in a “build it myself” mentality 4. Security breaches that cannot easily be traced5. Unpredictable performance

Page 76: Identity as a Service

IDENTITY GOVERNANCE

IDENTITY GOVERNANCE FRAMEWORK

1. Identity attribute service - a service that supports access to many different identity sources and enforces administrative policy2. CARML: declarative syntax using which clients may specify their attribute requirements3. AAPML: declarative syntax which enables providers of identity-related data to express policy on the usage of information, 4. Multi-language API (Java, .NET, Perl) for reading and writing identity-related attributes

Page 77: Identity as a Service

WSO2 IDENTITY SOLUTION

Page 78: Identity as a Service

Questions…

Thank you…!