WP8 Combined Demo on IDM GE (NSN) Data Handling GE (SAP) Privacy GE (IBM) Aug. 25 th 2014, v8.

Slides:



Advertisements
Similar presentations
Module: 201 Create and Manage Your Agent Account.
Advertisements

ASP.NET Ajax Supplementary Tutorial. Why Use ASP.NET AJAX? - I ASP.NET AJAX enables you to build rich Web applications that have many advantages over.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Installation & User Guide
Digital Certificate Installation & User Guide For Class-2 Certificates.
WP8 Security and Privacy Identity Management 15. November 2012 Wolfgang Steigerwald (DT) Robert Seidl (NSN)
- 1 - Defense Security Service Background: During the Fall of 2012 Defense Security Service will be integrating ISFD with the Identity Management (IdM)
Overview of User Set-up & Security. Administrator Functions Before adding new Users, we first need to define some User Security Settings To do this navigate.
Digital Certificate Installation & User Guide For Class-2 Certificates.
IIT Kanpur Web Based Land Records Management System Prof. P.K.Kalra Developed by Department of Electrical Engineering Indian Institute.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
DNR-322L & DNR-326.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Grid Security. Typical Grid Scenario Users Resources.
The Sherlock Project Purdue University, Department of Computer Sciences Sponsored by Tellabs, Inc. Doug Clark - Group Leader Tobey Pasheilich Raj Talwar.
Report Distribution Report Distribution in PeopleTools 8.4 Doug Ostler & Eric Knapp 7264.
Esri UC2013. Technical Workshop. Technical Workshop 2013 Esri International User Conference July 8–12, 2013 | San Diego, California Building Secure Applications.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Project Implementation for COSC 5050 Distributed Database Applications Lab1.
Implementing RADIUS AAA Phil & Rick. Content Terms and Concepts Access Control What is AAA? Benefits of AAA What is RADIUS? Microsoft IAS Overview Installation.
Sharepoint Portal Server Basics. Introduction Sharepoint server belongs to Microsoft family of servers Integrated suite of server capabilities Hosted.
CONNECT as an Interoperability Platform - Demo. Agenda Demonstrate CONNECT “As an Evolving Interoperability Platform” –Incremental addition of features.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
Internet Banking Standard FIAT & Standard FIAT-Hybrid Registration Intuit Financial Services University Internet Banking Certification Training.
1 ASP.NET SECURITY Presenter: Van Nguyen. 2 Introduction Security is an integral part of any Web-based application. Understanding ASP.NET security will.
Smart Card Single Sign On with Access Gateway Enterprise Edition
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
IBM Rhapsody Simulation of Distributed PACS and DIR systems Krupa Kuriakose, MASc Candidate.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Design Extensions to Google+ CS6204 Privacy and Security.
Forms Authentication, Users, Roles, Membership Svetlin Nakov Telerik Corporation
DIRAC Web User Interface A.Casajus (Universitat de Barcelona) M.Sapunov (CPPM Marseille) On behalf of the LHCb DIRAC Team.
MAHI Research Database Data Validation System Software Prototype Demonstration September 18, 2001
Nu Vendor Management System A web based tool to Manage Vendors.
Web 2.0: Concepts and Applications 6 Linking Data.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
Copyright 2000 eMation SECURITY - Controlling Data Access with
SITools Enhanced Use of Laboratory Services and Data Romain Conseil
U.S. Department of Agriculture eGovernment Program August 14, 2003 eAuthentication Agency Application Pre-Design Meeting eGovernment Program.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Zscaler New Interface and Reporting From Saturday 8 th June 2013.
National Center for Supercomputing Applications NCSA OPIE Presentation November 2000.
IFORM ACCOUNT MAINTENANCE ICT4D SESSION 4. IFORMBUILDER WEBSITE REQUIREMENTS To access the iFormBuilder website, you need the following items: -Reliable.
1 Welcome to CSC 301 Web Programming Charles Frank.
An Overview of Single Sign-On, Federation, Its Benefits, and Basic Procedures for Integrating Applications.
Module 11: Securing a Microsoft ASP.NET Web Application.
FP6 IT System 1 ELECTRONIC PROPOSAL SUBMISSION SYSTEM.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
FitnessGram® 2015 Student Information System (SIS) Extract Import Training for Georgia School Year.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
Configuring and Deploying Web Applications Lesson 7.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.
Securing Web Applications Lesson 4B / Slide 1 of 34 J2EE Web Components Pre-assessment Questions 1. Identify the correct return type returned by the doStartTag()
1 (c) 2013 FabSoft. MOST Cloud Service What is a Cloud Service? A cloud service is internet-based, meaning that MOST is hosted on a server farm on the.
Lindsey Velez, Director of Instructional Technology Single Sign-On One Click.
1.Switch on the computer and wait for loading. 2.Select the Windows 7 OS at the end of the list. 3.Click on the link ‘Administrator’ 4.Enter the administrator.
1.Switch on the computer and wait for loading. 2.Select the Windows 7 OS at the end of the list. 3.Click on the link ‘Administrator’ 4.Enter the administrator.
Module Overview Installing and Configuring a Network Policy Server
SharePoint Online Authentication Patterns
Access eJournals Form Your Home
Management Application for all segments
Presentation transcript:

WP8 Combined Demo on IDM GE (NSN) Data Handling GE (SAP) Privacy GE (IBM) Aug. 25 th 2014, v8

Overview Description of the Use Case High Level Architecture Prerequisites Message Flow Implementation Details Interfaces Development Tasks with Status Limitations Benefits of the Demonstrator Differences to the ABC4Trust Project Documentation Additional Links

DESCRIPTION OF THE USE CASE  A file storage service (e.g. File Store) will be enhanced with the Data Handling GE and allow access to its resources if the user can satisfy the policies attached to these resources.  With the Privacy GE, users are in full control of which attributes they reveal when interacting with the File Store. The Privacy GE is distributed over 3 sites: the ‘User in the Cloud’, the ‘Verifier as a Service’ and the ‘Issuer Service’.  The ‘Verifier as a Service’ connects to the File Store thereby enhancing it with Privacy GE features.  The ‘Issuer Service’ is integrated into the IDM GE. While respecting privacy of the user, selective attribute sharing will be supported restricted to the ‘need to know’ principle.

HIGH LEVEL ARCHITECTURE: ENROLMENT User Identity Agent new functionality available (IBM) available (NSN) Web Service User Privacy GE credentials Privacy GE User DigitalSelf / Issuer Auth Server DS Portal Data Gateway User login credentials for accessing Issuer Verified User attributes Web Service Privacy GE Issuer

HIGH LEVEL ARCHITECTURE: USE-CASE User Verifier File Store “anonymous access of resources” Web GUI new functionality available (IBM) available (SAP) Map storing verification policy, verifier URL and resource URL based on nonce Map storing policy IDs based on resources File Store login credential for accessing Verifier Web Service Privacy GE Verifier Identity Agent Web Service Privacy GE User Map storing verification policies based on policy ID File Store login credential for accessing Verifier

MESSAGE FLOW (ENROLMENT) Browser Identity Agent Issuer Service Data Gateway Show Credential Repository Login Select ‘Issue Credential’ Get Credential Pop-up Window Enter Username and Password Initialize Issuance. Forward Username and Password Query User Attributes Return User Attributes Return Issuance Policy with User Attributes Issuance Protocol Authenticate Authenticate User Store Credential Display Credential

MESSAGE FLOW (USE-CASE) Browser Identity Agent File Store Verifier aaS Select Resource X Grant Access to Resource Forward Nonce, Resource URL, Success and Failure URLs and Policy X Request Policy X. Forward File Store Credentials Return Policy X Return Nonce, Resource URL, Policy X and Token to Success URL Generate Token Success Request verify Token Enter Username and Password Authenticate Present Login Pop-up Window Lookup Nonce and compare with Transaction Data Check Token Store Transaction Data Authenticate

PREREQUISITES The File Store service has stored resources which can only be accessed by users satisfying the policies attached to them The IDM GE has stored verified attribute values of the user including her login password for accessing the Issuer Service. The FI-WARE relevant attribute values are predestined for generating a Privacy GE credential

IMPLEMENTATION DETAILS I The File Store service will be enhanced to show a list of resources without requiring a preceding login The user can choose a specific resource she wishes to access The user can choose the Identity Agent which must generate the token When the user selects a specific resource with a specific policy ID, the File Store fetches the presentation policy from the Verifier aaS An ‘auto submit form’ will make the user generate an HTTP-POST and send it to the Identity Agent The auto submit form embedded in the GUI of the File Store contains a nonce (generated by and stored in the File Store) the presentation policy received from the Verifier aaS the URL of the requested resource a failed and a success URL of the File Store The File Store stores the ‘transaction data’ using the nonce as handle in its database

After logging in to the Identity Agent, this service generates a presentation token on behalf of the user An auto submit form will make the user generate an HTTP-POST and send it to the File Store The auto submit form embedded in the GUI of the Identity Agent contains the nonce the URL of the requested resource the presentation policy the presentation token The File Store will then fetch the ‘transaction data’ (presentation policy and resource URL) using the nonce as handle compare the received policy with the stored policy compare the received resource URL and the stored resource URL forward the presentation policy and the presentation token to the Verifier aaS IMPLEMENTATION DETAILS II

The Verifier aaS will check the token If the token is ok, the File Store will finally grant access to the requested resource and delete the ‘transaction data’ including the nonce from its database IMPLEMENTATION DETAILS III

INTERFACES I

INTERFACES II

INTERFACES III

INTERFACES IV

DEVELOPMENT TASKS WITH STATUS (IBM) Identity Agent Modified graphical identity selection user interface such that it can run as a web-based cloud service where users are authenticated Added a credential issuance wizard to the Identity Agent that triggers a credential issuance protocol with an issuer service Trigger the generation of a presentation token upon reception of a presentation policy and forward the user to the provided success/failure URL  Future extension: allow users to select which credentials shall be the basis for the token generation, instead of simply selecting the first possible choice (NSN) Issuer Service Provide RESTful interfaces to the methods of this service Authenticate users requesting issuance Enhance the database to allow storage of new attributes Enhance the SelfSignUp application to allow administration of new user accounts (NSN) Verifier as a Service Provide RESTful interfaces to the methods of this service Authenticate services requesting verification Provide pre-defined XML presentation policies files

(SAP) File Store  Provide a UI for the File Store Service −Provide an interface for storing the resources and attaching policies to them −Provide an interface for retrieving the resources without logging in (NSN) Example Applications Develop an Example Drop Box and an Example Broker as feasibility study to verify the chosen interfaces between these entities Develop an Example Issuer (ALL) Perform Integration Tests Test the system with the Example Drop Box Test the final system using SAP’s File Store DEVELOPMENT TASKS WITH STATUS

LIMITATIONS Use of pre-defined attributes/policies only o gender=male o gender=female o age>65 o age>18 o nationality=German o nationality=Swiss o nationality=French o companyName=SAP o companyName=IBM o companyName=NSN Uploading resources to the ‘File Store’ requires authentication of the users and is therefore out of scope of this demo

Benefits of the Demo Developing a demonstrator which can be presented inside FI-WARE and as well outside (e.g. Use Case Projects) in order to advertise the following Generic Enablers: IDM GE Data Handling GE Privacy GE Prove interworking/combination of Security Generic Enablers Propose an easy and clear use case scenario understandable for non-experts

Differences to the ABC4Trust Project I ABC4Trust: The user stores her credential(s) on the smart card. The user application is installed on the user’s PC. FI-WARE: The user application is shifted to the cloud and hosted by the ‘Identity Agent’. Smart cards are not used. ABC4Trust: The issuer is connected to the One-IDM via WSDL and has no access to the IDM LDAP data base. The IDM Portal acts as proxy between user and issuer. FI-WARE: The issuer has direct access to the Digital Self ‘Data Gateway’. The identity agent has direct access to the issuer via RESTful interfaces.

Differences to the ABC4Trust Project II ABC4Trust: The RESTful interfaces are unprotected FI-WARE: The RESTful interfaces have been enhanced to carry authentication credentials ABC4Trust: Requires Firefox or Internet Explorer FI-WARE: Requires Google Chrome ABC4Trust: Deploys Idemix and U-Prove crypto engines FI-WARE: Deploys only the Idemix crypto engine  The two use-cases of the ABC4Trust pilots are significantly different this combined demo which integrates SAPs asset PPL into a File Store

DOCUMENTATION Use Google Chrome as browser In order to start the demo, select the ‘Request Pii’ tab of this URL: Video Clips showing the Demo can be found here: open/combinedDemo/Videos/ How to operate the Demo: open/combinedDemo/Docs/Cookbook%20for%20testing%20the%20com bined%20demo.pdf Source Code and Libraries: open/combinedDemo/Code/

ADDITIONAL LINKS I NSN Registration Tool for adding a IDM GE (One-IDM) account. (The attributes of this account will be used for generating the Privacy-ABC credentials) IBM Identity Agent NSN Example Drop Box:

ADDITIONAL LINKS II NSN Example Identity Broker Issuer Database check URL: eneric NSN Example Issuer without IDM Database: er/external/initIssuanceProtocol er/external/issuanceProtocolStep

THANK YOU!