All Contents © 2007 Burton Group. All rights reserved. Addressing Interoperability Challenges June 12 & 13, 2007 Gerry Gebel VP & Service Director

Slides:



Advertisements
Similar presentations
Improving Learning Object Description Mechanisms to Support an Integrated Framework for Ubiquitous Learning Scenarios María Felisa Verdejo Carlos Celorrio.
Advertisements

Interactive Financial eXchange XML Usage in Financial Services Mark Tiggas President, Interactive Financial eXchange Open Applications.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Access Control Patterns & Practices with WSO2 Middleware Prabath Siriwardena.
Digital Identities for Networks and Convergence Joao Girao, Amardeo Sarma.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
XACML 2.0 and Earlier Hal Lockhart, Oracle. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
1 Higgins 1: a species of Tasmanian long-tailed mouse 2: the name of an open source collaboration of IBM, Novell, Oracle, Parity…
© 2009 The MITRE Corporation. All rights Reserved. April 28, 2009 MITRE Public Release Statement Case Number Norman F. Brickman, Roger.
Information Card Interoperability Michael B. Jones – Microsoft October 2008.
Applied Cryptography Week 13 SAML Applied Cryptography SAML and XACML Mike McCarthy Week 13.
XACML By Ganesh Godavari Craig Peltier. Information Sharing Information Sharing relates to the sharing of information between two or more entities. Entities.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
A Use Case for SAML Extensibility Ashish Patel, France Telecom Paul Madsen, NTT.
Audumbar. Access control and privacy Who can access what, under what conditions, and for what purpose.
Combining KMIP and XACML. What is XACML? XML language for access control Coarse or fine-grained Extremely powerful evaluation logic Ability to use any.
XACML Gyanasekaran Radhakrishnan. Raviteja Kadiyam.
NAC 2007 Spring Conference OASIS XACML Update
XACML 2.0 in the Enterprise: Use- Cases and Deployment Challenges Prateek Mishra, Frank Villavicencio, Rich Levinson Oracle Identity Management Group 02/07/2006.
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
XACML Briefing for PMRM TC Hal Lockhart July 8, 2014.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
Web Service Standards, Security & Management Chris Peiris
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
Catalyst 2002 SAML InterOp July 15, 2002 Prateek Mishra San Francisco Netegrity.
James Cabral, David Webber, Farrukh Najmi, July 2012.
Shib in the present and the future Ken Klingenstein Director, Internet2 Middleware and Security.
Authorization Infrastructure, a Standards View Hal Lockhart OASIS.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
OEI’s Services Portfolio December 13, 2007 Draft / Working Concepts.
XACML – The Standard Hal Lockhart, BEA Systems. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
Elisa Bertino Purdue University Pag. 1 Security of Distributed Systems Part II Elisa Bertino CERIAS and CS &ECE Departments Purdue University.
United States Department of Justice Implementing Privacy Policy in Justice Information Sharing: A Technical Framework John Ruegg,
Catalyst 2002 SAML InterOp July 15, 2002 San Francisco.
11 Usage policies for end point access control  XACML is Oasis standard to express enterprise security policies with a common XML based policy language.
Ian Bailey Director Application Architecture Office of CIO, Province of BC A User Centric and Claims Based Architecture for British Columbia.
Secure Systems Research Group - FAU Patterns for Web Services Security Standards Presented by Keiko Hashizume.
Shibboleth: An Introduction
Access Control and Markup Languages Pages 183 – 187 in the CISSP 1.
Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
CSIIR Workshop March 14-15, Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth.
Access Management 2.0: UMA for the #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 1.
Kemal Baykal Rasim Ismayilov
11 Restricting key use with XACML* for access control * Zack’-a-mul.
XACML eXtensible Access Control Markup Language XML World September San Francisco, CA Simon Y. Blackwell Chairperson, XACML Technical Committee.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
Using WS-I to Build Secure Applications Anthony Nadalin Web Services Interoperability Organization (WS-I) Copyright 2008, WS-I, Inc. All rights reserved.
Old Dominion University1 eXtensible Access Control Markup Language [OASIS Standard] Kailash Bhoopalam Java and XML.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
Promoting Web services interoperability across platforms, applications and programming languages Overview Presentation September, 2003.
SAML Interoperability Lab RSA Conference Agenda SAML and the OASIS SSTC SAML Timeline Brief SAML History SAML Interop Lab Q & A Demo.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks OpenSAML extension library and API to support.
XACML Contributions Hal Lockhart, Oracle Corp. 2 Topics Authorization API Finding Input Attributes.
Chris Louloudakis Solution Specialist Identity & Access Management Microsoft Corporation SVR302.
Authorization PDP GE Course (R4) FIWARE Chapter: Security FIWARE GE: Authorization PDP FIWARE GEri: AuthZForce Authorization PDP Owner: Cyril Dangerville,
Institute for Cyber Security
Data and Applications Security Developments and Directions
John O’Keefe Director of Academic Technology & Network Services
XACML and the Cloud.
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Role Based Access Control Update
Tim Bornholtz Director of Technology Services
Groups and Permissions
Presentation transcript:

All Contents © 2007 Burton Group. All rights reserved. Addressing Interoperability Challenges June 12 & 13, 2007 Gerry Gebel VP & Service Director

2 Addressing Interoperability Challenges Agenda Introduction User-centric identity XACML policy Q&A

3 Addressing Interoperability Challenges Agenda Introduction User-centric identity XACML policy Q&A

4 Introduction Why host interoperability demonstrations? Catalyst is a neutral forum for vendors and other technology providers to collaborate on interoperability It’s great to see competitors working toward common goals Interoperability demonstrations provide an indication of technology maturity Not as robust as formal interoperability and testing programs Expose differences in interpretation of specifications Challenge providers to address requirements of realistic scenarios

5 Introduction Interop demonstrations for Catalyst 2007 User-centric identity - June :30pm Information cards, OpenID, etc Johannes Ernst, NetMesh Mike Jones, Microsoft Paul Trevithick, Social Physics XACML - June :30pm Extensible Access Control Markup Language Managed by OASIS Hal Lockhart, BEA Rich Levinson, Oracle WS-I - June :30pm Web services security profiles Not discussed on the call today

6 Addressing Interoperability Challenges Agenda Introduction User-centric identity XACML policy Q&A

7 User-Centric Identity Addressing some key questions Why is user-centric identity important? Why is interoperability important for user-centric identity? What impact does the Catalyst interoperability event have on the industry?

8 User-Centric Identity The Big Idea: Identity “Self-Service” by the User Identity “Self-Service” by the User Good for businesses: Reduced cost More business through reduced friction with customer Single view of the customer Good for the individual: Perception of increased control (e.g. privacy) Less hassle (one root credential for many sites) Higher-value products / services

9 User-Centric Identity Identifiers / URLs Example: Key standards: How it works Users sign up with an OpenID provider Issued URL becomes universal account name Diffie-Hellman-based Identifiers / URLs Example: Key standards: How it works Users sign up with an OpenID provider Issued URL becomes universal account name Diffie-Hellman-based Information Cards Example: Key standards: WS-Trust How it works User obtains card from business or provider “Identity Agent” installed on PC (e.g. Vista CardSpace) or hosted (e.g. Higgins H1) Information Cards Example: Key standards: WS-Trust How it works User obtains card from business or provider “Identity Agent” installed on PC (e.g. Vista CardSpace) or hosted (e.g. Higgins H1)

10 User-Centric Identity Participants and process A combination of vendors, open source projects, and individual contributors Microsoft, IBM, CA, BMC Software, Oracle, VeriSign, Ping Identity, Higgins, Bandit, NetMesh, WSO2, PamelaWare, XMLDAP.org, Internet2 Shibboleth Project, and Ian Brown OSIS Project (“Open-Source Identity System”) Process Weekly conference calls Face to face testing at recent IIW conference Wiki used to collaborate and host documentation

11 User-Centric Identity Expected Interop Outcomes Many vendors participating in interop Demonstrated multi-vendor interoperability Multiple protocols Interop scenarios Expected Interop Outcomes Many vendors participating in interop Demonstrated multi-vendor interoperability Multiple protocols Interop scenarios Why it matters User-Centric Identity is here to stay User-centric identity can be expected to work No more protocol fights Glimpse of disruptive business potential Why it matters User-Centric Identity is here to stay User-centric identity can be expected to work No more protocol fights Glimpse of disruptive business potential

12 Addressing Interoperability Challenges Agenda Introduction User-centric identity XACML policy Q&A

13 XACML Policy XACML 2.0 overview XML language for fine-grained access control Extremely powerful evaluation logic Ability to use any available information Superset of permissions, ACLs, RBAC Scales from Internet to PDA Federated policy administration OASIS and ITU-T Standard

14 XACML Policy Burton Catalyst Conference San Francisco, June 28, 2007, 6-9:30 pm Tentative participants BEA, CA, IBM, Jericho Systems, Oracle, Redhat, Securent, and Symlabs Approach under discussion Two Use cases (Policy Exchange, Decision) Four Stock Trading Scenarios Weekly concalls

15 PAP PDP Repository Policy XACML Policy Policy exchange scenario

16 PEP PDP XACML Policy Decision request scenario

17 XACML Policy Interop challenges Minimize extraneous components Agree on items unspecified by XACML Motivating business cases Present understandable demo Repeatable scenarios Human error Opportunity for ad hoc variants

18 XACML Policy Use cases overview Use cases spec available through OASIS XACML TC Public Home Page. Authorization logic externalized from applications Enables centralization of critical business rules in XACML Policy Decision Point (PDP) Vendor Interoperability achieved through: Common policy specification language Use of common application-specific vocabulary Common request and response for policy execution

19 XACML Policy Use cases interop document Describes planning process for the Interop demo application and test framework Describes architectural approach and implementation options for building demo infrastructure. Contains detailed description of use cases and scenarios at data element and processing level. Shows xacml usage models at a depth that goes beyond xacml-core specs and in total application context. Can be used as sample for doing analysis for new applications

20 XACML Policy Use case 1: Authorization Request - overview Hypothetical Customer high-value stock account application Account is “managed” by professional investment advisor Customer can make trades within portfolio guidelines If customer attempts trade outside programmed guidelines of trade size and credit limits, automatic request for approval is generated for the account manager to review and approve Shows how xacml can be used to extract authorization logic from application using a custom vocabulary Shows how fine grained authorization can be centrally managed for uniform control of enterprise business policies

21 XACML Policy Use case 1: Authorization Request - technical Shows how one vendor Policy Enforcement Point (PEP) can use other vendor PDP Demo has application acting as PEP that sends a XACMLAuthz- DecisionQuery Request to PDP XACML SAML 2.0 profile for PEP/PDP request/response Shows variety of policy execution paths in PDP within Policy hierarchy Shows how Obligations can be used to direct subsequent steps taken by PEP and application to initiate approval processes

22 XACML Policy Use case 2: Policy Exchange Department administrators at vendor-specific Policy Administration Point (PAP) create or modify Policies using custom tools Policy can then be published into a centralized PDP and enforced by PEPs throughout the enterprise Shows how Policy from one vendor PAP(/PDP) can be used by other vendor PDP(/PAP) Create Policy at one vendor’s PAP and add to another vendor’s repository (or export Policy from PDP and add to repository) Import other vendor’s policy from repository to PDP for execution (or to PAP for editing)

23 Addressing Interoperability Challenges Agenda Introduction User-centric identity XACML policy Q&A

24 Addressing Interoperability Challenges