IdM & OpenID Present by Fangli cai Prantap Bedi. The need for IdM &OpenID As the world of e-business gains global acceptance, the traditional processes.

Slides:



Advertisements
Similar presentations
Click to edit Master title style HEALTH INFORMATION 1 Identity & Access Management Presenter: Mike Davis (760) January 09, 2007.
Advertisements

Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Agenda 2 factor authentication Smart cards Virtual smart cards FIM CM
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
- 1 - Defense Security Service Background: During the Fall of 2012 Defense Security Service will be integrating ISFD with the Identity Management (IdM)
Prepared by Dept. of Information Technology & Telecommunication, May 1, 2015 DoITT Identity Management Security, Provisioning, Authentication.
User Authentication for Enterprise Applications November 16, 2005 Tom Board, NUIT.
Privileged Account Management Jason Fehrenbach, Product Manager.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
By: Ansuya Chauhan.
Active Directory: Final Solution to Enterprise System Integration
Copyright © 2005 Imanami Corporation. All Rights Reserved.1 IdM & Security Robert Haaverson Imanami Corporation.
Identity & Access Management DCS 861 Team2 Kirk M. Anne Carolyn Sher-Decaustis Kevin Kidder Joe Massi John Stewart.
Virtual Directories: Attack Models and Prevention June 2 nd, 2009 Bill Claycomb Systems Analyst Sandia National Laboratories Sandia is a multiprogram laboratory.
OpenID And the Future of Digital Identity Alicia Bozyk April 1, 2008.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Identity Management, what does it solve By Gautham Mudra.
Identity and Access Management
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
Web-based Document Management System By Group 3 Xinyi Dong Matthew Downs Joshua Ferguson Sriram Gopinath Sayan Kole.
IDENTITY MANAGEMENT Hoang Huu Hanh (PhD), OST – Hue University hanh-at-hueuni.edu.vn.
Understanding Workgroups and Active Directory Lesson 3.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Automated Computer Account Management in Active Directory June 2 nd, 2009 Bill Claycomb Systems Analyst Sandia National Laboratories Sandia is a multiprogram.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SecureAware Building an Information Security Management System.
Phishing Rising to the challenge Amy Marasco Microsoft.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Philadelphia Area SharePoint User Group Building Customer/Partner Extranets Designing a Secure Extranet with Sharepoint 2007 Russ Basiura RJB Technical.
Developing Applications for SSO Justen Stepka Authentisoft, LLC
Brent Mosher Senior Sales Consultant Applications Technology Oracle Corporation.
Identity on Force.com & Benefits of SSO Nick Simha.
Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Authority of Information Technology Application National Center of Digital Signature Authentication Ninh Binh, June 25, 2010.
SAP Identity Management 7.2 Implementation
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Audit COM380 University of Sunderland Harry R. Erwin, PhD.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Remote Authenticator /Authorizer Instructor: 張顧耀 老師 Student: 曾冠樺.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Building a Sound Security and Compliance Environment for Dynamics AX Frank Vukovits Dennis Christiansen Fastpath, Inc.
WINDOWS AZURE AND THE HYBRID CLOUD. Hybrid Concepts and Cloud Services.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Identity and Access Management
Simple Authentication for the Web
Data and Applications Security Developments and Directions
SaaS Application Deep Dive
CompTIA Security+ Study Guide (SY0-401)
Cloud Connect Seamlessly
Identity Infrastructure Fundamentals and Key Capabilities
Robert Haaverson Imanami Corporation
1/3/2019 1:47 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
Single Sign On Glen Dorton 1/18/2019.
What are IAM Key Processes.
James Cowling Senior Technical Architect
iSecurity Password-Reset Training
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

IdM & OpenID Present by Fangli cai Prantap Bedi

The need for IdM &OpenID As the world of e-business gains global acceptance, the traditional processes of corporate user administration are no longer able to cope with the demands of increased scale and scope expected from them

IdM Identity management is a solution to mange and secure access to the information and resource of an organization by a combination of processes and technologies..

Identity and Management Authentication Authorization (Access Control) Auditing and Accounting Policy Management

The Structure AuthenticationAuthorization Accounting Auditing Policies

Authentication Web-based Authentication MAC-based Authentication SSO Authentication

Authorization (Access Control) RBAC --access control models UserUser GroupsRolesResource

Example Example of identity management: “Hi! I’m Frank.” (Identity) “… and here‘s my Username and Password to the system” (Authentication) “I want to access my MySJSU account” (Authorization: Allowing Frank to use services for his authorized) “And I want to change my grade in last semester’s course” (Authorization: preventing frank from things his not supposed to do)

Auditing and Accounting Reporting and audit controls are an important part of Identity Management. It is performed to ascertain the validity and reliability of information, and also provide an assessment of a system’s internal control. Audit trails and logs are important for both detecting security violations and re-creating security incidents.

Policy Management Policy Management allows administrators to define rules for moving from one state to another. There rules take the form “if condition, then action,”

IDM Account lifecycle Profile Management Workflow Provisioning Delegated Administration Password Management

Profile Management Profile management provides a way to manage identities and distribute that managed information to external databases, directories, and applications throughout the enterprise, and potentially beyond. This process facilities the self- management of user profile information and the automated replication of accurate profile data to key enterprise systems.[4]

Password management EPV is stand for Enterprise Password Vault. it can provide a help though Check in and Check out passwords, EPV makes sure that only one person is using the account at any given time. and is able to track who and when logged into account

Open ID

What is OpenID Decentralized Single Sign On Mechanism In Simple terms is a URL Made possible by OpedID providers

How Does Open ID Work?

Implementation Light-Weight Identity Yadis Sxip DIX protocol XRI/i-names

User Advantages Eliminates the need to manage multiple accounts with different websites. Is a lightweight application and thus does not put any load on the users computer resources. Logging in is as simple as entering a URL. Eliminates the overhead of entering long forms to signup for a new websit e

Website Advantages Provides simple standardized signup process Takes care of User Account Management Pre-Existing Large Userbase

Disadvantages It is akin to putting all eggs in one basket. OpenID is vulnerable to phishing attacks. It is equivalent to outsourcing the security of you website to a 3 rd party provider.

Future Work and Industry Adoption VeriSign and SUN Microsystems have signed a patent covenant regarding OpenID. AOL has developed OpenID's for all of their users available at The government of Estonia has tied the national identity issued to each citizen with an OpenID located at

Questions?