Network Team. Overview Digital Identity 2.0 What’s CardSpace Architecture Why CardSpace Demo Future Directions Resources Q&A.

Slides:



Advertisements
Similar presentations
Seven Perspectives on CardSpace Ronny Bjones Security Strategist Microsoft Corporation.
Advertisements

Identity Network Ideals – Heterogeneity & Co-existence
Active Directory Federation Services How does it really work?
Advances in Digital Identity
Securing Your Applications and Web Services with the Geneva Framework Jim Lavin.
 Jan Alexander Program Manager Microsoft Corporation BB43.
 Rich Randall Development Lead Microsoft Corporation BB44.
InfoCard and the Identity Metasystem Kim Cameron, Chief Architect of Identity Microsoft.
2 3 Who are you? What are you allowed to do? How should your experience be personalized? How do I get apps that are provably securable and manageable?
Implementing and Administering AD FS
Windows CardSpace and the Identity Metasystem Glen Gordon Developer Evangelist, Microsoft
Infocard and Eduroam Enrique de la Hoz, Diego R. L ó pez, Antonio Garc í a, Samuel Mu ñ oz.
SAML 2.0 og ”Geneva” OIOSAML Workshop 31. marts 2009 Århus René Løhde, Microsoft
Higgins 1: A species of Tasmanian long-tailed mouse 2: An open source identity framework being developed at the Eclipse Foundation.
Adoption Time Single paradigm, mature tools, stable design patterns and frameworks Software developer’s comfort zone Competing paradigms, no tools,
© 2009 by Mary Ruddy, Manfred Duchrow, Frank Gerhardt, Jochen Hiller, Gunnar Wagenknecht; made available under the EPL v1.0 | Identity Management.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
1 Higgins 1: a species of Tasmanian long-tailed mouse 2: the name of an open source collaboration of IBM, Novell, Oracle, Parity…
 Lynn Ayres Program Manager Identity Services  Tore Sundelin Program Manager Identity Services BB29.
© 2009 The MITRE Corporation. All rights Reserved. April 28, 2009 MITRE Public Release Statement Case Number Norman F. Brickman, Roger.
Vittorio Bertocci Sr. Architect Evangelist Microsoft Corporation ARC204.
The Laws of Identity and Cardspace Charles Young Solidsoft.
Information Card Interoperability Michael B. Jones – Microsoft October 2008.
Mario Szpuszta Solutions Architect Microsoft Austria, Vienna.
Problem Statement AD DB App1 DB App2 AD App4 App6 AD App5 Intranet Extranet Cloud AD App3 DB SSO Separate Sign-in Separate Sign-in Separate Sign-in.
OpenID And the Future of Digital Identity Alicia Bozyk April 1, 2008.
 Kim Cameron Distinguished Engineer Microsoft Corporation BB11.
A claims-based Identity Metasystem
SIM205. (On-Premises) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service)
An Introduction to Information Card Barry Dorrans Charteris plc
Matt Steele Senior Program Manager Microsoft Corporation SESSION CODE: SIA326.
Claims Based Authentication
A Claims Based Identity System Steve Plank Identity Architect Microsoft UK.
EuroPKI 2008 Manuel Sánchez Óscar Cánovas Gabriel López Antonio F. Gómez Skarmeta University of Murcia Levels of Assurance and Reauthentication in Federated.
Windows Azure Dave Glover Developer Evangelist Microsoft Australia Tel:
Chad La Joie Shibboleth’s Future.
SharePoint Security Fundamentals Introduction to Claims-based Security Configuring Claims-based Security Development Opportunities.
Identity & Access Control in the Cloud Name Title Organization.
WS-Trust “From each,according to his ability;to each, according to his need. “ Karl marx Ahmet Emre Naza Selçuk Durna
Keith Brown Cofounder pluralsight.com SIA312 Outline What is identity? Challenges Federated identity How it works from a 10,000 foot view Terminology.
Windows CardSpace Martin Parry Developer Evangelist Microsoft
 Stuart Kwan Group Program Manager Microsoft Corporation  Caleb Baker Senior SDET Microsoft Corporation BB42.
Privacy in Cloud Computing Identity Management System for Cloud Microsoft CardSpace Purdue University.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
Access Management 2.0: UMA for the #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 1.
The Java Context Awareness Framework(JCAF) Ji-Yeon Lee.
February, TRANSCEND SHIRO-CAS INTEGRATION ANALYSIS.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Expenses Timesheets Approvals Expense capture Timesheets Expense capture Timesheets Expense capture Timesheets.
Linus Joyeux Valerie Alonso Managing consultantLead consultant blue-infinity (Switzerland) Active Directory Federation Services v2.
Andrew J. Hewatt, Gayatri Swamynathan and Michael T. Wen Department of Computer Science, UC-Santa Barbara A Case Study of the WS-Security Framework.
Introduction to.NET FX 3.0 (+ sneak preview of.NET FX 3.5) Martin Parry Developer & Platform Group Microsoft Ltd
Brian Puhl Technology Architect Microsoft IT Session Code: ITS212.
Morpheus Server 2.0 정기교육 Version 목 차 Morpheus Server 2.0 SpringFramework API 개발 Morpheus Admin 실 습.
Architectural Patterns For The Cloud Brian H. Prince | Microsoft.
Connected Identity & the role of the Identity Bus Prabath Siriwardena Director of Security Architecture WSO2.
Copyright © 2007 Microsoft Corporation. All Rights Reserved. Claims-based Identity Beyond Identity Silos 1st European Identity Conference 2007 Don Schmidt.
Secure Single Sign-On Across Security Domains
Introduction to Windows Azure AppFabric
Federation made simple
Solving the Identity Crisis
Data and Applications Security Developments and Directions
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Windows Azure AppFabric
An Identity on the Internet
Windows Identity Foundation Overview
Who’s Managing That Identity?
Building "One Size Fits All" Identity Systems Possible or Fantasy
Martin Parry Developer Evangelist Microsoft
Presentation transcript:

Network Team

Overview Digital Identity 2.0 What’s CardSpace Architecture Why CardSpace Demo Future Directions Resources Q&A

Network Team Digital Identity 2.0 사용자 중심 기술을 사용하여 Identity 확인 방식 실제 환경과 유사한 Identity Transactions 의 Open Method 를 강조

Network Team Digital Identity 2.0 User Silo - centric User - centric

Network Team User - centric User 가 정말 원하는 방식이 무엇이든지, 그 방식대로 Identity Information 를 관리해줌. ⇒어떤 정보는 위탁 관리하고, 어떤 정보는 User 가 직접 관리

Network Team Digital Identity 2.0 OpenID 2.0 CardSpace / Higgins SAML Federation Identity System User – Centric Conversation

Network Team What’s CardSpace Microsoft 의 Identity MetaSystem 을 위한 Identity Selector 클라이언트 소프트웨어 사용자들의 디지털 정보를 저장하면서 사용자들 에게 시각적인 정보 카드로 이 사용자 정보를 보 여줌. ⇒사용자에게 일관된 digital Identity Interface 를 제공

Network Team Card Types Personal Cards Managed Cards User - centric 카드를 ID Selector 로 가져온 User 에게 ID Provider 가 제공하는 카드 카드를 ID Selector 로 가져온 User 에게 ID Provider 가 제공하는 카드 User 가 ID Provider 역할도 수행하며 User 가 클레임에 대한 모든 값을 제공하는 카드 User 가 ID Provider 역할도 수행하며 User 가 클레임에 대한 모든 값을 제공하는 카드

Network Team Architecture

Network Team Claims-Based Access Model Application Server Security Token Service End User Claims Framework Your App 3. Read policy 5. Send claims 1.Establish relationship using metadata 2. Read policy trust 4. Get claims Identity Selector Client

Network Team Claim 누군가가 특정 주체에 대해 설명하는 주장들로 구 성 카드를 통해서 표현되는 정보 신원을 증명하려 할 때 제공하는 정보 로컬 컴퓨터 대신에 카드 발급자에 저장

Network Team Object Tag <OBJECT classid=“CLSID:19916E01-B44E-4e31-94A4-4696DF46157B" name="CardSpaceToken“ CODEBASE=“ <PARAM NAME="issuer" VALUE=" > <PARAM NAME="tokenType" VALUE="urn:oasis:names:tc:SAML:1.0:assertion" > <PARAM NAME="requiredClaims" VALUE=" ntifier " >

Network Team Security token WS-Security –XML 전자서명과 XML 암호화 기술을 통하여 메시지의 안전한 전송을 가능하게 하며 또한 인증 및 권한제어 등을 위해 메시지 헤더에 다양한 보안토큰을 삽입하는 방법을 정의 개인 정보를 전달하기 위해 사용 인증 및 권한제어를 위한 용도 + 다양한 컨텍스트에 사용되며 브라우저 기반 웹 환경에서도 사용 가능

Network Team Identity MetaSystem Protocols and architecture for exchange claims

Network Team Identity MetaSystem ● 구성요소 I.Claim 을 사용하여 ID 를 표현하는 방법 II.ID Provider, Relying Party, User 의 협상 방법 III.Claim 과 요구 사항을 가져오기 위한 캡슐화 프 로토콜 IV.Claim 변환을 사용하여 기술 및 조직 경계를 극 복하는 방법 V. 여러 상황, 기술 및 운영자 간의 일관된 사용자 경험

Network Team Identity MetaSystem

Network Team Why CardSapce Home realm discovery Persona’s and other card tricks Credential agility

Network Team Home Realm Discovery App User Federated App NexonGame World Policy Claim: Policy Claim:

Network Team Persona Selection Claim: Admin Claim: User Geneva Identity Server Claims Store Claims Aware App Claim: Admin

Network Team Credential Agility App does not handle credentials –CardSpace handles credential collection –STS(Security Token Service) handles Credential validation –Credential type can vary without affecting the app

Network Team Why CardSapce Regardless of the complex flow of claims, tokens, and token types between the different systems within the metasystem, the user should have a simple, consistent, and comprehensible experience

Network Team Demo

Network Team Future Directions CardSpace 와 OpenID 의 협업 –OpenID 토큰 내용을 포함하는 CardSapce 스키마를 정 의하고, CardSpace 가 SAML 토큰을 얻는 것처럼 OpenID 토큰을 얻음 CardSpace 와 WCF 통합 다른 OS 와의 상호 운용성 –Higgins

Network Team Resources Web Sites/Blogs –MSDN Library –Microsoft windows CardSpace 공식 ace/default.mspxhttp:// ace/default.mspx –Microsoft's CardSpace: Part 1,2,3 ce_getting_started.aspxhttp://dotnetslackers.com/articles/security/microsoft_cardspa ce_getting_started.aspx –Kim Carmeron’s Identity Weblog –Korean Identity Management(KIM)

Network Team Resources Book –Understanding Windows CardSpace: An Introduction to the Concepts and Challenges of Digital Identities /by Vittorio Bertocci, Garrett Serack, Caleb Baker CardSpace Open Source Project –Java 프로젝트 –Ruby 프로젝트

Network Team