Oasis Identity in the Cloud (IDCloud) Towards standardizing Cloud Identity Anil Saldhana ( Red Hat), Co-Chair Gershon Janssen, Secretary www.oasis-open.org.

Slides:



Advertisements
Similar presentations
Identity Network Ideals – Heterogeneity & Co-existence
Advertisements

Office 365 Identity June 2013 Microsoft Office365 4/2/2017
Oracle IDM at First National Bank
Kantara: From IRM to Context. The World of Access Keeps Expanding App sourcing and hosting User populations App access channels SasS apps Apps in public.
Securing Insecure Prabath Siriwardena, WSO2 Twitter
WSO2 Identity Server Road Map
A View into the Mi$t 1 RL "Bob" Morgan University of Washington Co-chair, InCommon Technical Advisory Committee.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
S&I Data Provenance Initiative Presentation to the HITSC on Data Provenance September 10, 2014.
Prabath Siriwardena Senior Software Architect. An open source Identity & Entitlement management server.
Aegis Identity Software, Inc. presents Trends in Identity and Access Management in Higher Education to US Federations June 20, 2012 Janet Yarbrough – Director.
Cloud Computing Cloud Security– an overview Keke Chen.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Energy Ecosystem Overview David Miller Chief Security Officer.
Identity Management Report By Jean Carreon and Marlon Gonzales.
A DESCRIPTION OF CONCEPTS AND PLANS MAY 14, 2014 A. HUGHES FOR TFTM The Identity Ecosystem DISCUSSION DRAFT 1.
SAML Right Here, Right Now Hal Lockhart September 25, 2012.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
Copyright ©2012 Ping Identity Corporation. All rights reserved.1.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Openid Connect
Geneva, Switzerland, April 2012 Introduction to session 7 - “Advancing e-health standards: Roles and responsibilities of stakeholders” ​ Marco Carugi.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Paul Andrew. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
Authority of Information Technology Application National Center of Digital Signature Authentication Ninh Binh, June 25, 2010.
Shibboleth: An Introduction
Using Enterprise Logins in Portal for ArcGIS via SAML Greg Ponto & Tom Shippee.
Identity in the Cloud (ID-Cloud) Towards standardizing Cloud Identity
All Rights Reserved 2014 © CMG Consulting LLC Federated Identity Management and Access Andres Carvallo Dwight Moore CMG Consulting, LLC October
Cloud federation Are we there yet? Marek Denis CERN openlab Major Review Geneva, Switzerland › October
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
ID-cloud GAP analysis work overview Prepared for F2F May 16-17, 2012 Redmond, WA Gershon Janssen, secretary ID-Cloud TC.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
OASIS Cloud Authorization TC (CloudAuthZ) Rakesh Radhakrishnan, TC Member.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Jeju Island, Korea, 13 – 16 May 2013Identity Management and Identification Systems GSC17-PLEN-43 ITU-T IDENTITY MANAGEMENT UPDATE Bilel Jamoussi, Chief,
Integrating the Healthcare Enterprise Improving Clinical Care: Enterprise User Authentication For IT Infrastructure Robert Horn Agfa Healthcare.
1 st EGI CTA VT meeting 18 January 2013 C. Vuerli (INAF, Italy), N. Neyroud (CNRS/IN2P3/LAPP, France)
WSO2 Identity Server 4.0 Fall WSO2 Carbon Enterprise Middleware Platform 2.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
INDIGO – DataCloud Security and Authorization in WP5 INFN RIA
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
1 Authorization Federation in Multi-Tenant Multi-Cloud IaaS Navid Pustchi Advisor: Prof. Ravi Sandhu.
Draft-howlett-abfab-trust-router-ps ABFAB, IETF83 Josh Howlett & Margaret Wasserman.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
Oasis Identity in the Cloud (IDCloud) Towards standardizing Cloud Identity Anil Saldhana ( Red Hat), Co-Chair Gershon Janssen, Secretary.
Access Policy - Federation March 23, 2016
Unit 3 Virtualization.
eHealth Standards and Profiles in Action for Europe and Beyond
Azure Active Directory - Business 2 Consumer
Transforming business
Cloud Security– an overview Keke Chen
Data and Applications Security Developments and Directions
SaaS Application Deep Dive
Recommendation 6: Using ‘cloud computing’ to meet the societal need ‘Faster and transparent access to public sector services’ Cloud computing Faster and.
Federated IdM Across Heterogeneous Clouding Environment
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Cloud Computing Kelley Raines.
THE STEPS TO MANAGE THE GRID
ESA Single Sign On (SSO) and Federated Identity Management
Matthew Levy Azure AD B2B vs B2C Matthew Levy
Presentation transcript:

Oasis Identity in the Cloud (IDCloud) Towards standardizing Cloud Identity Anil Saldhana ( Red Hat), Co-Chair Gershon Janssen, Secretary

Cloud Identity Management TC works to address Identity Management challenges related to Cloud Computing Cloud Identity Management is considered a top security concern Identity Management is not completely solved at Enterprise level Standards are evolving Cloud is a new paradigm, so the same problems in new packaging 2

Before we start How many of you have Facebook, Google, LinkedIn or any similar Cloud Service accounts? Imagine a company uses a public cloud for its documents. An employee leaves the company. The employee is decommissioned. What happened to the documents? A small manufacturing company requires its employees to use an online benefits system annually, to choose health care benefits for the entire year. The employees work in workshops/units do not use computers regularly at work. Majority of them have Facebook accounts. Do you think they will remember their Benefits system password as much as their Facebook password? Should we use Facebook Connect, for the Benefits system? 3

4 What is it we do? 3 Main objectives: Identifying detailed Use Cases Identity deployment, provisioning and management in a cloud context Gap Analysis of existing Identity Management standards and protocols when applied in the context of Cloud Based on Use Cases and Interoperability Profiles Feed analysis back to the WG responsible for a standard Define Interoperability Profiles for Identity in the Cloud Profiles will be based on use and combinations of existing standards, protocols and formats

5 What is it we do? Other objectives: Glossary on Cloud Identity Harmonized set of definitions, terminologies and vocabulary on Identity in the context of Cloud Do not re-invent the wheel Build on existing standards and specifications Strong liaison relationships with other international working groups ITU-T, DMTF

6 How serious are we about this? Our Technical Committee chairs are: Anil Saldhana (Red Hat) Tony Nadalin (Microsoft) Amongst the member of the Technical Committee are: Red Hat, IBM, Microsoft, CA Technologies, Cisco Systems, SAP, EBay, Novell, Ping Identity, Safe Net, Symantec, Boeing Corp, US DOD, Verisign, Akamai, Alfresco, Citrix, Cap Gemini, Google, Rackspace, Axciom, Huawei, Symplified, Thales, Conformity, Skyworth TTG, MIT, Jericho Systems, PrimeKey, Aveksa, Mellanox, Vanguard Integrity Professionals, NZ Govt...

7 Current Status Three stages: Formalization of Use Cases [Finished]  OASIS Identity In The Cloud Use Case Document v1.0 Gap Analysis of existing IDM standards using the Use Cases [In progress] Defining Profiles for Identity In The Cloud [Scheduled]

Use Cases Received 35 Use Cases of Identity Management in the Cloud (Finally, 29 Use Cases are formalized) Structure of Use Cases: Description / user story Goal / Desired outcome Categories covered Applicable Deployment Models Actors Systems Notable Services Dependencies Assumptions Process Flow

9 Use Cases Categorizations: Authentication Single Sign On (SSO) Multi factor Authentication Infrastructure Identity Establishment General Identity Management Infrastructure IdM Federated IdM Authorization Account & Attribute Management Account & Attribute Provisioning Security Tokens Audit & Compliance

10 Use Cases Applicable Deployment and Service Models: Deployment Models: Private Public Community Hybrid Service Models: SaaS PaaS IaaS Other

11 Use Cases High Ranked Use Cases: Managing Identities at all levels in the Cloud Need for Federated Single Sign On across multiple environments Enterprise to Cloud SSO Auditing Multi-factor Authentication for Privileged User Access Mobile Identity authentication using Cloud Provider

12 Use Cases Mobile Identity Authentication Submitted by Bank of America Use case affects Mobile Banking First step is to do automatic mobile device registration Cloud based IAM solutions provide identity proofing, credential management, SSO and Provisioning capabilities.

13 Use Cases Government Provisioning of Cloud Services Submitted by Govt. Of New Zealand. (Colin Walis) Government employee or contractor logs into a web site where he can configure an environment that utilizes one or more cloud services. Identity proofing, authentication along with billing, auditing etc is provided.

14 GAP Analysis Analysis of Identity Management Use Cases in a Cloud context Analysis Main Question: “Can the desired goal or outcome be achieved using existing standards?” GAPS:Profile:

15 How do we approach the Analysis Analyzing how a Use Case can be implemented: What is required? USE CASE User Story Process Flow ActorsSystemsServices Assumptions and Dependencies Goal / Outcome

16 Scope of analysis Focus on the technological challenge: how to get a user story working. Not looking at legal, policy or economic perspectives

17 How do we approach the Analysis Step by step / phased drill-down into more detail First pass: identify relevant standards – Not reinvent the wheel; we have a broad scope and look at all relevant standards, specifications, recommendations, notes and ‘work in progress’, from both SDOs and non-SDOs RESULT: List is standards Second pass: coarse analysis – Find out where the standards fall short or what we perceive as missing – Identify Management commonalities and reusable elements RESULT: Identified big / obvious gaps

18 Example of a Use Case USE CASE: Consumer Cloud Identity Management, Single Sign-On (SSO) and Authentication User Story: For services offered in the cloud, identity management and authentication should to be decoupled from the cloud services themselves. Users subscribing to cloud services expect and need to have an interoperable identity that would be used to obtain different services from different providers. Process Flow: 1. User access SaaS application 2. Login using external IdP 3. IdP transforms & maps identity to SaaS provider format 4. Access to SaaS application established Actors: - Subscriber SaaS Application User - Subscriber SaaS Provider Administrator Systems: - Cloud Identity Mgmt. System - External Identity Provider Services: - Cloud Provider Identity Federation Service - Cloud Provider Attribute Management Service (identity transform) Assumptions and Dependencies: -The federated trust relationship between the SaaS application and the identity provider was previously set by the Cloud tenant Administrator. -The user accessing the service is already registered and enrolled with the Identity Provider of choice. Goal: A user is able to access multiple SaaS applications using a single identity

19 Example Analysis of Use Case First pass: Identified relevant standards: – SAML – OpenID – OAuth – SPML – SCIM – WS-Federation – IMI Second pass: Identified big / obvious gaps – Configuration and association with an IdP is not standardized – No standards or rules for mapping or transforming attributes between different (cloud) domains. – No profiles or standard roles and related attributes – No standards for attributes – No audit standards for IDM systems

20 ‘Early’ profiles start to surface Interoperablity profiles (combination of standards and protocols) become visible as identity management patterns surface E.g. the pattern on how we now a days think about the identity eco- system (IdP, RP, AP, etc.)

21 Conclusions and next steps Produced in-depth work providing good understanding of Identity Management in a Cloud context with respect to technical standards- based feasibility Unsure how to deal with implicit details of use cases: e.g. trust space, attribute space, privacy space Suggest future work to fill the gaps

22 Resources OASIS IDCloud Technical Committee Homepage OASIS Technical Committee Wiki