Www.oasis-open.org Oasis Identity in the Cloud (IDCloud) Towards standardizing Cloud Identity Anil Saldhana ( Red Hat), Co-Chair Gershon Janssen, Secretary.

Slides:



Advertisements
Similar presentations
Identity Network Ideals – Heterogeneity & Co-existence
Advertisements

Office 365 Identity June 2013 Microsoft Office365 4/2/2017
Oracle IDM at First National Bank
Kantara: From IRM to Context. The World of Access Keeps Expanding App sourcing and hosting User populations App access channels SasS apps Apps in public.
Securing Insecure Prabath Siriwardena, WSO2 Twitter
WSO2 Identity Server Road Map
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
Oasis Identity in the Cloud (IDCloud) Towards standardizing Cloud Identity Anil Saldhana ( Red Hat), Co-Chair Gershon Janssen, Secretary
Cloud Computing Cloud Security– an overview Keke Chen.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Energy Ecosystem Overview David Miller Chief Security Officer.
Identity Management Report By Jean Carreon and Marlon Gonzales.
SAML Right Here, Right Now Hal Lockhart September 25, 2012.
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
Copyright ©2012 Ping Identity Corporation. All rights reserved.1.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Identity Management Hannes Tschofenig. Motivation OAuth was created to allow secure and privacy friendly sharing of data. OAuth is not an authentication.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Paul Andrew. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
Authority of Information Technology Application National Center of Digital Signature Authentication Ninh Binh, June 25, 2010.
Shibboleth: An Introduction
Identity in the Cloud (ID-Cloud) Towards standardizing Cloud Identity
All Rights Reserved 2014 © CMG Consulting LLC Federated Identity Management and Access Andres Carvallo Dwight Moore CMG Consulting, LLC October
Cloud federation Are we there yet? Marek Denis CERN openlab Major Review Geneva, Switzerland › October
ID-cloud GAP analysis work overview Prepared for F2F May 16-17, 2012 Redmond, WA Gershon Janssen, secretary ID-Cloud TC.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
OASIS Cloud Authorization TC (CloudAuthZ) Rakesh Radhakrishnan, TC Member.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
WSO2 Identity Server 4.0 Fall WSO2 Carbon Enterprise Middleware Platform 2.
INDIGO – DataCloud Security and Authorization in WP5 INFN RIA
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
THE CAMPUS IDENTITY SYSTEM Lucy Lynch, NSRC. Learning Objectives Discovering the key role campus networks play in trusted identities for R&E Authoritative.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Access Policy - Federation March 23, 2016
Systems Analysis and Design in a Changing World, Fifth Edition
Unit 3 Virtualization.
eHealth Standards and Profiles in Action for Europe and Beyond
GEOSS Federated Single Sign-On
Azure Active Directory - Business 2 Consumer
ITU-T Focus Group on Cloud Computing
Transforming business
Cloud Security– an overview Keke Chen
Shibboleth Roadmap
eduTEAMS platform for collaboration Niels Van Dijk
Data and Applications Security Developments and Directions
SaaS Application Deep Dive
Recommendation 6: Using ‘cloud computing’ to meet the societal need ‘Faster and transparent access to public sector services’ Cloud computing Faster and.
Federated IdM Across Heterogeneous Clouding Environment
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Cloud Computing Kelley Raines.
THE STEPS TO MANAGE THE GRID
Company Overview & Strategy
ESA Single Sign On (SSO) and Federated Identity Management
Proposal to Create IAM Working Group
OpenID Connect Working Group
Matthew Levy Azure AD B2B vs B2C Matthew Levy
SharePoint Online Authentication Patterns
UNIT No: IV IDENTITY MANAGEMENT MODELS IN IoT
Community AAI with Check-In
Mary Montoya, CIO Bogi Malecki, Project Manager
Privacy Management Reference Model (PMRM) A formal reference model for data privacy.
Fundamental Concepts and Models
OpenID Connect Working Group
Check-in Identity and Access Management solution that makes it easy to secure access to services and resources.
Presentation transcript:

www.oasis-open.org Oasis Identity in the Cloud (IDCloud) Towards standardizing Cloud Identity Anil Saldhana ( Red Hat), Co-Chair Gershon Janssen, Secretary

Cloud Identity Management TC works to address Identity Management challenges related to Cloud Computing Cloud Identity Management is considered a top security concern Identity Management is not completely solved at Enterprise level Standards are evolving Cloud is a new paradigm, so the same problems in new packaging 2 2

Before we start How many of you have Facebook, Google, LinkedIn or any similar Cloud Service accounts? Imagine a company uses a public cloud for its documents. An employee leaves the company. The employee is decommissioned. What happened to the documents? A small manufacturing company requires its employees to use an online benefits system annually, to choose health care benefits for the entire year. The employees work in workshops/units do not use computers regularly at work. Majority of them have Facebook accounts. Do you think they will remember their Benefits system password as much as their Facebook password? Should we use Facebook Connect, for the Benefits system? 3 3

What is it we do? 3 Main objectives: Identifying detailed Use Cases Identity deployment, provisioning and management in a cloud context Gap Analysis of existing Identity Management standards and protocols when applied in the context of Cloud Based on Use Cases and Interoperability Profiles Feed analysis back to the WG responsible for a standard Define Interoperability Profiles for Identity in the Cloud Profiles will be based on use and combinations of existing standards, protocols and formats 4

What is it we do? Other objectives: Glossary on Cloud Identity Harmonized set of definitions, terminologies and vocabulary on Identity in the context of Cloud Do not re-invent the wheel Build on existing standards and specifications Strong liaison relationships with other international working groups ITU-T, DMTF 5

How serious are we about this? Our Technical Committee chairs are: Anil Saldhana (Red Hat) Tony Nadalin (Microsoft) Amongst the member of the Technical Committee are: Red Hat, IBM, Microsoft, CA Technologies, Cisco Systems, SAP, EBay, Novell, Ping Identity, Safe Net, Symantec, Boeing Corp, US DOD, Verisign, Akamai, Alfresco, Citrix, Cap Gemini, Google, Rackspace, Axciom, Huawei, Symplified, Thales, Conformity, Skyworth TTG, MIT, Jericho Systems, PrimeKey, Aveksa, Mellanox, Vanguard Integrity Professionals, NZ Govt ... 6

Current Status Three stages: Formalization of Use Cases [Finished] OASIS Identity In The Cloud Use Case Document v1.0 Gap Analysis of existing IDM standards using the Use Cases [In progress] Defining Profiles for Identity In The Cloud [Scheduled] 7

Use Cases Received 35 Use Cases of Identity Management in the Cloud (Finally, 29 Use Cases are formalized) Structure of Use Cases: Description / user story Goal / Desired outcome Categories covered Applicable Deployment Models Actors Systems Notable Services Dependencies Assumptions Process Flow 8

Use Cases Categorizations: Authentication Single Sign On (SSO) Multi factor Authentication Infrastructure Identity Establishment General Identity Management Infrastructure IdM Federated IdM Authorization Account & Attribute Management Account & Attribute Provisioning Security Tokens Audit & Compliance 9

Use Cases Applicable Deployment and Service Models: Deployment Models: Private Public Community Hybrid Service Models: SaaS PaaS IaaS Other 10

Use Cases High Ranked Use Cases: Managing Identities at all levels in the Cloud Need for Federated Single Sign On across multiple environments Enterprise to Cloud SSO Auditing Multi-factor Authentication for Privileged User Access Mobile Identity authentication using Cloud Provider 11

Use Cases Mobile Identity Authentication Submitted by Bank of America Use case affects Mobile Banking First step is to do automatic mobile device registration Cloud based IAM solutions provide identity proofing, credential management, SSO and Provisioning capabilities. 12

Use Cases Government Provisioning of Cloud Services Submitted by Govt. Of New Zealand. (Colin Walis) Government employee or contractor logs into a web site where he can configure an environment that utilizes one or more cloud services. Identity proofing, authentication along with billing, auditing etc is provided. 13

Analysis GAP Analysis Main Question: Analysis of Identity Management Use Cases in a Cloud context Main Question: “Can the desired goal or outcome be achieved using existing standards?” GAPS: Profile:

Assumptions and Dependencies How do we approach the Analysis Analyzing how a Use Case can be implemented: What is required? USE CASE User Story Goal / Outcome Process Flow Actors Systems Services Assumptions and Dependencies

Scope of analysis Focus on the technological challenge: how to get a user story working. Not looking at legal, policy or economic perspectives

How do we approach the Analysis Step by step / phased drill-down into more detail First pass: identify relevant standards Not reinvent the wheel; we have a broad scope and look at all relevant standards, specifications, recommendations, notes and ‘work in progress’, from both SDOs and non-SDOs RESULT: List is standards Second pass: coarse analysis Find out where the standards fall short or what we perceive as missing Identify Management commonalities and reusable elements RESULT: Identified big / obvious gaps

Consumer Cloud Identity Management, Single Sign-On (SSO) and Example of a Use Case USE CASE: Consumer Cloud Identity Management, Single Sign-On (SSO) and Authentication User Story: For services offered in the cloud, identity management and authentication should to be decoupled from the cloud services themselves. Users subscribing to cloud services expect and need to have an interoperable identity that would be used to obtain different services from different providers. Goal: A user is able to access multiple SaaS applications using a single identity Process Flow: 1. User access SaaS application 2. Login using external IdP 3. IdP transforms & maps identity to SaaS provider format 4. Access to SaaS application established Actors: - Subscriber SaaS Application User Subscriber SaaS Provider Administrator Systems: - Cloud Identity Mgmt. System - External Identity Provider Services: Cloud Provider Identity Federation Service Cloud Provider Attribute Management Service (identity transform) Assumptions and Dependencies: The federated trust relationship between the SaaS application and the identity provider was previously set by the Cloud tenant Administrator. The user accessing the service is already registered and enrolled with the Identity Provider of choice.

Example Analysis of Use Case First pass: Identified relevant standards: SAML OpenID OAuth SPML SCIM WS-Federation IMI Second pass: Identified big / obvious gaps Configuration and association with an IdP is not standardized No standards or rules for mapping or transforming attributes between different (cloud) domains. No profiles or standard roles and related attributes No standards for attributes No audit standards for IDM systems

‘Early’ profiles start to surface Interoperablity profiles (combination of standards and protocols) become visible as identity management patterns surface E.g. the pattern on how we now a days think about the identity eco- system (IdP, RP, AP, etc.)

Conclusions and next steps Produced in-depth work providing good understanding of Identity Management in a Cloud context with respect to technical standards- based feasibility Unsure how to deal with implicit details of use cases: e.g. trust space, attribute space, privacy space Suggest future work to fill the gaps

Resources OASIS IDCloud Technical Committee Homepage http://www.oasis-open.org/committees/id-cloud/ OASIS Technical Committee Wiki http://wiki.oasis-open.org/id-cloud/FrontPage Anil.Saldhana@redhat.com Gershon.Janssen@gmail.com 22