Presentation is loading. Please wait.

Presentation is loading. Please wait.

Trust and Shared Identity Management Across Company Borders Policies, Processes and Agreement Issues to be Considered – A Case Study Markus Salo Concept.

Similar presentations


Presentation on theme: "Trust and Shared Identity Management Across Company Borders Policies, Processes and Agreement Issues to be Considered – A Case Study Markus Salo Concept."— Presentation transcript:

1 Trust and Shared Identity Management Across Company Borders Policies, Processes and Agreement Issues to be Considered – A Case Study Markus Salo Concept Owner for Identity and Access Management Nokia Oyj www.oasis-open.org

2 Introduction In 2006, Nokia and Siemens decide to join their network functions. A new company, Nokia Siemens Networks (NSN), is founded for this purpose. In the beginning, the new company does not yet have the necessary IT infrastructure in place. To ensure viability of NSN, the parent companies have to chip in. One of the necessary IT infrastructure components is, of course, Identity and Access Management (IAM). Our story begins here….

3 In the beginning… n HR functions are the first to separate – all former Nokia, former Siemens and new NSN people are consolidated to NSN HR. Former Nokia people disappear from Nokia HR, and thus from the ken of Nokia’s highly centralized Identity and Access Management (IAM) n How to retain the identities and access rights of former Nokia workforce in Nokia systems until comparable NSN services are in place? n How to create identities and access rights in Nokia- controlled systems for former Siemens, new NSN people if that is required?

4 Well, we have options… n Option 1 (straightforward) l Freeze the identities of former Nokia people to retain access rights l Use normal collaboration processes for former Siemens, new NSN people if they require access to Nokia-administered NSN systems not yet migrated to NSN control n …but there are drawbacks… l Identity information for former Nokia people degrades quickly (terminations, significant attribute changes) l Nobody left at Nokia has an interest in managing former Siemens, new NSN people n Former Siemens, new NSN user volumes may become very high since it takes time to set up services in new company n Applications have come to rely on highly centralized IAM so cannot migrate to NSN control until services are ready

5 …and other options… n Option 2 (more complicated) l Set up trust and identity exchange between companies (mostly one-way) n Get identities for former Nokia people directly from NSN – and this way, we’ll also get all the significant changes in real time n Same mechanism can also be used to get identities for former Siemens, new NSN people who require access to Nokia-administered systems l Identity and authorizations approval authority is (mostly) delegated to NSN since there’s nobody at Nokia who has an interest in this on individual-user level

6 Guess what – we go to option 2! n Not without problems though (and this is only technical!) l IdM technology is not really geared for identity exchange on either side – but we muddle through, adapting existing systems l Access methodologies do not really support massive use in cross-organizational environment n It would have been wonderful to have a scalable, easily deployable federation solution available…again, we adapt existing methods l IAM concept for trust and identity exchange is not ready on either side – we cobble it together as we go along (and this is partly to be blamed for the other problems we had)

7 We did get some things right… n We (correctly) assumed that usage of Nokia-controlled systems by former Siemens, new NSN people would get very high – and designed technical solution to support this n We delegated (most of the) identity and authorizations approval authority to NSN, since NSN is the only party with active interest on authorizing its individual users n We designed and implemented policies to support trust and identity exchange n We designed and implemented processes to support trust and identity exchange n We even managed to harmonize credential spaces (partly anyway), anticipating increased integration needs

8 …but failed to consider others. n We did not check whether NSN had a supportable identity & authorizations approval process in place l What they had was not geared to the user volumes we were facing n We did not verify identity exchange data quality l Checks and filters were not in place, so we ended up getting flawed data, with imaginable consequences n Nokia IdM could not flawlessly support two separate identity sources l Technical limitation, but rooted in the IdM concept n We were unable to define exactly the scope of services Nokia would provide to NSN l And were swamped with service requests that wildly exceeded what we thought was the scope n We did not have a universally applicable authentication mechanism in place, so ended up adapting our existing systems

9 What’s to be learned from this? n If you choose to exercise this kind of trust for collaborating with a partner… l Ensure that your partner is capable of handling the delegated identity and authorizations approval authority without your support n Policies, processes and support systems must be in place l Review your security policies and, if necessary, change them to reflect the trust relationship l Verify the quality of data you are receiving – in the end, you will be left holding the bag l Have the technical IdM capability to support a multi-organizational environment l Define exactly what services you are providing to your partner – this must be stated in agreements n On a technical level, having a workable RBAC solution may help… l Ensure that you have an authentication and connectivity solution to address most access requirements n Again, federation may help as a technical solution

10 To put it all in context…. n Note that the case described here is not one where a purely commercial service is provided by one company to another. In such situations, the scope of activities is severely circumscribed and more easily definable. n Rather, this case describes partnership between companies, a situation where responsibility is harder to affix and the scope of activities may change at a moment’s notice.

11 Thank You!

12 www.oasis-open.org Speaker Bio Markus Salo began his Nokia career in 1997. From almost the very beginning, he became involved in Nokia Identity Management initiatives, and has worked in this area since. He has participated in numerous projects addressing Nokia internal and external identity and access management needs, particularly in his capacity as Identity Management architect. Markus is currently working as Concept Owner for Identity and Access Management, guiding the conceptual development of this field at Nokia. Contact Information: Email: markus.t.salo@nokia.commarkus.t.salo@nokia.com GSM: +358 50309 1872


Download ppt "Trust and Shared Identity Management Across Company Borders Policies, Processes and Agreement Issues to be Considered – A Case Study Markus Salo Concept."

Similar presentations


Ads by Google