User-Managed Access UMA Work tinyurl.com/umawg | tinyurl.com/umafaq 28 Aug 2013 1.

Slides:



Advertisements
Similar presentations
© 2012 Open Grid Forum Simplifying Inter-Clouds October 10, 2012 Hyatt Regency Hotel Chicago, Illinois, USA.
Advertisements

Identity Network Ideals – Heterogeneity & Co-existence
Impacts of 3 rd Party IaaS on broadband network operations and businesses Prabhat Kumar Managing Partner, i 3 m 3 Solutions.
User-Managed Access UMA Work tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May
The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
Enterprise -> Cloud Outline –Enterprises have many apps outside their control public cloud; business partner applications –Using standards-based SSO (SAML,
DRAGOLJUB NESIC 08/12/2013 DOES IDENTITY MANAGENT REALLY HAVE TO BE DIFFICULT?
WSO2 Identity Server Road Map
A View into the Mi$t 1 RL "Bob" Morgan University of Washington Co-chair, InCommon Technical Advisory Committee.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
Understanding Active Directory
The Business of Identity Management Barry R. Ribbeck Director Systems Architecture & Infrastructure Rice University
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
OAuth option for mHealth Brief Profile Proposal for 2013/14 presented to the IT Infrastructure Planning Committee R Horn (Agfa Healthcare)
Cloud Computing Cloud Security– an overview Keke Chen.
UMA Could I Manage My Own Data. Please?. Agenda Business Trends & Technical Solutions Distributed Business (Decentralisation) Mobility & Automation Delegation.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
The powerful capabilities of JBoss Middleware as cloud based services on OpenShift. Build applications. Integrate with other systems Orchestrate using.
Protecting “Personal Clouds” with UMA and OpenID #UMApcloud for questions 19 June 2014 tinyurl.com/umawg for slides, recording, and more.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Design Extensions to Google+ CS6204 Privacy and Security.
Lecture 6: Cloud Computing By D. Najla Al-Nabhan 1.
The Internet Identity Layer OpenID Connect Update for HIT Standards Committee’s Privacy and Security Workgroup Wednesday, March 12th from 10:00-2:45 PM.
Integrated Financial Applications using Intuit’s PaaS Solution George Chiramattel, Intuit.
Workgroup Discussion on RESTful Application Programming Interface (API) Security Transport & Security Standards Workgroup January 12, 2014.
Copyright ©2012 Ping Identity Corporation. All rights reserved.1.
Chad La Joie Shibboleth’s Future.
11 IT Expo West 2010 General Session: Cloud Computing Nigel Williams SVP Sales.
1 © 2009 Cisco Systems, Inc. All rights reserved.Cisco Confidential Cloud Computing – The Value Proposition Wayne Clark Architect, Intelligent Network.
Enforcement mechanisms for distributed authorization across domains in UMA – aka “UMA trust” Eve Maler | 22 Aug 2012 draft.
Openid Connect
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
20 Oct 2014.
Windows Role-Based Access Control Longhorn Update
UMA’s relationship to distributed authorization concepts 19 October 2013
Accumulus Delivers Enterprise Class Subscription Billing and Automation Solutions for Gaming, Retail, and More on the Scalable Microsoft Azure Platform.
Access Management 2.0: UMA for the #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 1.
Joseph Smarr A Practical Vision for Friends-List Portability Joseph Smarr IIW 2007b, 12/5/2007.
Justin Richer The MITRE Corporation October 8, 2014 Overview of OAuth 2.0 and Blue Button + REST.
User-Managed Access Eve Maler, UMA Work Group | tinyurl.com/umawg 9 December
Chapter 8 – Cloud Computing
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
WSO2 Identity Server 4.0 Fall WSO2 Carbon Enterprise Middleware Platform 2.
Slavko Kukrika MVP Connect Windows 10 to the Cloud – Cloud Join.
Secure Mobile Development with NetIQ Access Manager
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Web Authorization Protocol WG Hannes Tschofenig, Derek Atkins.
UMA and OpenID Connect Plugins for Apache It would be so awesome if we (meaning the citizens of the Internet) had plugins for popular web servers to make.
4/18/2018 1:15 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Azure Active Directory - Business 2 Consumer
Cloud Security– an overview Keke Chen
Data and Applications Security Developments and Directions
Identity Management and Authorization
SaaS Application Deep Dive
The API economy will bring data-sharing power to the people
Federated IdM Across Heterogeneous Clouding Environment
Hosted on Azure, LoginRadius’ Customer Identity
ShepHertz App42 Platform is a cloud ecosystem
OpenID Connect Working Group
DeFacto Planning on the Powerful Microsoft Azure Platform Puts the Power of Intelligent and Timely Planning at Any Business Manager’s Fingertips Partner.
Matthew Levy Azure AD B2B vs B2C Matthew Levy
SharePoint Online Authentication Patterns
Azure Active Directory
OpenID Connect Working Group
API Security: OAuth, OpenID Connect & ABAC
Microsoft Virtual Academy
Presentation transcript:

User-Managed Access UMA Work tinyurl.com/umawg | tinyurl.com/umafaq 28 Aug

The “data price” for online service is too high: typing… Provisioning by hand Provisioning by value Oversharing Lying! 2

The “data price” for online service is too high: connecting… Meaningless consent to unfavorable terms Painful, inconsistent, and messy access management Oblivious oversharing 3

The “data price” for online service is too high: private URLs… Handy but insecure Unsuitable for really sensitive data 4

5 Most data “sharing” today is back-channel and unconsented Image source:

Privacy is about context, control, choice and respect – so UMA enables a “digital footprint control console” Web 2.0 access control is inconsistent and unsophisticated To share with others, you have to list them literally You have to keep rebuilding your “circles” in new apps You can’t advertise content without giving it away You can’t get a global view of who accessed what You can unify access control under a single app Your access policies can test for claims like “over 18” You can reuse the same policies with multiple sites You can control access to stuff with public URLs You can manage and revoke access from one place 6

Enterprise use cases bring WAM into the API economy 7 You create and standardize machine- readable scope descriptions You can centralize scope mgmt at one AS and reuse policies Scopes are entirely proprietary and non- interoperable Access management and policies are done on a pairwise, per- service basis The RO is the enterprise itself The policy administrator is an “RO agent” The AS is a PAP and (pseudo) PDP that can serve as a PIP client

Protocol vs. value-add: the basics 8 Apps can outsource reusable high-quality access control Your access policies can test for claims like “over 18” You can delegate constrained access to autonomous others You can control access to stuff with public URLs You can manage and revoke access from one place You create and standardize machine-readable scope descriptions You can centralize scope mgmt at one AS and reuse policies Protocol + likely AS/RS agreements Protocol + policy/claim support in AS UX and functionality Protocol + “personal discovery” features AS UX and functionality Profiling Protocol ASSUMPTION: STILL HAS API-SPECIFIC SEMANTICS, JUST LIKE OAUTH

Potential ecosystem: “social access control” (à la social sign-in) 9 Most dynamic; Alice-to-Bob sharing is the key differentiator AS RS CCCCCC CC Few, large, IdP-assoc/PDS Some with onboard RS apps Few, large, IdP-assoc/PDS Some with onboard RS apps Work with popular AS+IdPs May outsource local authz Work with popular AS+IdPs May outsource local authz Third-party apps UMA-enabled Benefits High-quality, centralized consumer authz Benefits High-quality, centralized consumer authz Challenges Disruptive change to biz models Trust and assurance API interoperability Challenges Disruptive change to biz models Trust and assurance API interoperability RS

Potential ecosystem: “walled garden PDS’s” 10 Likely highly static partnerships; Alice-to-Alice/Bob/org sharing AS RS C CC NSTIC-ish banks and telcos In-house apps NSTIC-ish banks and telcos In-house apps Part of existing third-party ecosystem Few truly independent apps Benefits Today’s back-channel user data is put under user control/monitoring “Outward” trust growth Benefits Today’s back-channel user data is put under user control/monitoring “Outward” trust growth Challenges Tight binding to the owner of the garden Challenges Tight binding to the owner of the garden RS C

Potential ecosystem: “patient- centric health vaults” 11 Static partnering will center on payers as 900-lb gorillas; highly vertical AS RS CCCCCC CC Payers (insurance, governments) and HISPs Healthcare providers Quantified self apps Healthcare providers Quantified self apps “Mint for patients and caregivers” Benefits Proactive, trackable consent directives Blue Button-like delivery of data Benefits Proactive, trackable consent directives Blue Button-like delivery of data Challenges Sclerotic IT practices Serious security, privacy, and discoverability needs Challenges Sclerotic IT practices Serious security, privacy, and discoverability needs RS

Potential ecosystem: “distributed authz for business” (access management 2.0) 12 AliceCo-to-Employee/Contractor/PartnerBob sharing AS RS CCCCCC CC Firms have own AS, like IdP May have internal apps Firms have own AS, like IdP May have internal apps SaaS, PaaS, IaaS “Claims-based SSO” SaaS, PaaS, IaaS “Claims-based SSO” Third-party apps UMA- enabled Benefits Centralized scope mgmt across web, mobile Less dependent on a “big bang” Benefits Centralized scope mgmt across web, mobile Less dependent on a “big bang” Challenges Legacy apps and WAM practices Challenges Legacy apps and WAM practices AS RSASC

UMA turns online sharing into a privacy-by-design solution 13

UMA turns online sharing into a privacy-by-design solution Historical Municipal Financial Vocational Artistic Social Geolocation Computational Genealogical Biological Legal... Historical Municipal Financial Vocational Artistic Social Geolocation Computational Genealogical Biological Legal... 14

UMA turns online sharing into a privacy-by-design solution I want to share this stuff selectively Among my own apps With family and friends With organizations I want to share this stuff selectively Among my own apps With family and friends With organizations I want to protect this stuff from being seen by everyone in the world 15

UMA turns online sharing into a privacy-by-design solution 16 I want to control access proactively, not just feel forced to consent over and over

Key use cases tudies tudies Subscribing to a friend’s personal cloud Sharing accessibility attributes (“GPII”) E-transcript sharing (“HEAR”) Patient-centric health data access Enterprise “access management 2.0” 17

UMA is a profile of OAuth, with bits added for interop and scale 18 resource owner resource server authorization server client protecte d resource s (unnamed till now)

UMA solves for 1) individual choice and 2) fully modular cloud services 19 App-specific API UMA-enabled client RPT requesting party token

UMA solves for 1) individual choice and 2) fully modular cloud services 20 Protection API Protection client PAT protection API token includes resource registration API and token introspection API

UMA solves for 1) individual choice and 2) fully modular cloud services 21 Authorization API Authorization client AAT authorization API token supports OpenID Connect-based claims-gathering for authz

Key implementations ns ns SMARTAM.net (running authorization service from Cloud Identity UK) Puma (Python libraries for RS- and client- enabling web apps) from ditto Fraunhofer AISEC open- source implementation in Java Gluu OX open-source implementation for Access Management 2.0 use cases 22

Next steps Work on optimization opportunities when UMA and OpenID Connect are used together Issue “Implementor’s Draft” Continue to work with AXN, Scalable Privacy, and others in “trusted identities in cyberspace” ecosystem Profile UMA for higher ed, accessibility attribute sharing, healthcare use cases We welcome your involvement and contributions –Become an UMAnitarian! on Twitter and UserManagedAccess on FB 23

Questions? Thank tinyurl.com/umawg | tinyurl.com/umafaq IIW 16, May

Phase 1: protect a resource 25

Phases 2 and 3: get authorization and access resource 1 of 3 26

Phases 2 and 3: get authorization and access resource 2 of 3 27

28 Phases 2 and 3: get authorization and access resource 1 of 3

Spec call tree for the UMA profile of OAuth 29 UMA coreOAuth 2 OpenID Connect Token introspection OAuth resource set registration UMA binding obligations Dynamic client registration hostmeta UMA native spec Required external component Optional external component Individual IETF I-D