Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright ©2012 Ping Identity Corporation. All rights reserved.1.

Similar presentations


Presentation on theme: "Copyright ©2012 Ping Identity Corporation. All rights reserved.1."— Presentation transcript:

1 Copyright ©2012 Ping Identity Corporation. All rights reserved.1

2 2 Unified Identity in Cloud Architectures EEMA 2012 John Bradley @ve7jtb Office of the CTO

3 Copyright ©2012 Ping Identity Corporation. All rights reserved.3 © 2011 Ping Identity Corporation Future of IT Architecture Thousands of applications and services -- everywhere –Some you can control Local web services Local infrastructure Apps/Services on IaaS –Many you can’t control SaaS APIs PaaS APIs IaaS APIs Partner APIs 3

4 Copyright ©2012 Ping Identity Corporation. All rights reserved.4 Ultimate Decentralization Diversity of Architecture –If the cloud vendor’s coding philosophy conflicts with yours, you must adapt Limited Visibility –No database access –No direct audit file access No Contractual Power –Like it or lump it 4

5 Copyright ©2012 Ping Identity Corporation. All rights reserved.5 © 2011 Ping Identity Corporation Decentralization == Chaos? Business Managers operating administration consoles Developers writing API code for the business –Native Mobile apps –Mashups –Are they security specialists? Silos of work with no central control 5

6 Copyright ©2012 Ping Identity Corporation. All rights reserved.6 © 2011 Ping Identity Corporation Fragmentation Causes Risk Business Agility suffers –Decision making is impaired IT response time is low –Every application and service has to be treated differently Productivity suffers –Every application looks and feels different –No secure “ceremony” for users –Developers must re-invent a new process every time Risk to the organization increases –What happens when you fire somebody? 6

7 Copyright ©2012 Ping Identity Corporation. All rights reserved.7 © 2011 Ping Identity Corporation Solution: Centralize & Adapt Industry has adopted “federated identity” to move security decisions into central infrastructure Federated protocols now exist to protect both web applications and APIs Eg SAML, WS-Trust, OAuth 2.0, and openID Connect 7

8 Copyright ©2012 Ping Identity Corporation. All rights reserved.8 What does this mean? Developers don’t set passwords in code –They ask for a token –Token is used during API calls Applications don’t store passwords –They rely on a central authority to identify the user –They validate the central authority not the user Central Infrastructure does the rest –Password validation, security, risk/fraud 8

9 Copyright ©2012 Ping Identity Corporation. All rights reserved.9 Create Infrastructure 9 Legacy SOAP Services Identity Management

10 Copyright ©2012 Ping Identity Corporation. All rights reserved.10 Act as a Client 10 Legacy SOAP Services Identity Management REST Calls Out Cloud Application

11 Copyright ©2012 Ping Identity Corporation. All rights reserved.11 Act as a Server 11 Legacy SOAP Services Identity Management REST Calls In

12 Copyright ©2012 Ping Identity Corporation. All rights reserved.12 Act as an Identity Provider 12 Legacy SOAP Services Identity Management Browser SSO Cloud Application

13 Copyright ©2012 Ping Identity Corporation. All rights reserved.13 Leverage with Mobile Apps 13 REST Calls In Legacy SOAP Services Identity Management 1. Use Browser to Fetch Oauth 2.0 Token 2. Transform Attributes 3. Use Token For API Calls

14 Copyright ©2012 Ping Identity Corporation. All rights reserved.14 Leverage at Cloud Apps 14 Legacy SOAP Services Identity Management Cloud Application 1. Request Token 2. Browser SSO To Fetch SAML Token 3. Generate Oauth 2.0 Token from SAML 4. Access API with Token

15 Copyright ©2012 Ping Identity Corporation. All rights reserved.15 Concrete Example: OAuth 2.0 with SAML 15

16 Copyright ©2012 Ping Identity Corporation. All rights reserved.16 Trigger an OAuth Token Request 16 GET /as/authorization.oauth2? client_id=mobileapp& redirect_uri=mobileapp://redirect_here& response_type=code HTTP/1.1

17 Copyright ©2012 Ping Identity Corporation. All rights reserved.17 User Logs in at Enterprise 17

18 Copyright ©2012 Ping Identity Corporation. All rights reserved.18 Consent at Cloud Service 18

19 Copyright ©2012 Ping Identity Corporation. All rights reserved.19 Client Trades code for Access Token 19 POST /as/token.oauth2 Host: as.com client_id=a&redirect_uri=mobileapp://redirecthere&grant_type=authoriza tion_code&code=wizJmaSTPAf0wqSeB3vmDx2mNSZK6g HTTP/1.1 HTTP/1.1 200 OK Content-Type: application/json; charset=UTF-8 {"token_type":"Bearer","expires_in":"600","refresh_token":"oQWqwMUIL 2ndeMHsWEyFO0GyalvKSvc2QI4YuG82RMGkM","access_token":" lSBbci4Jg8MsjiSqZLBrzEXgd4mKUNhOkyF"} HTTP/1.1 302 Found Location: mobileapp://redirect_here?&code=wizJmaS TPAf0wqSeB3vmDx2mNSZK6g

20 Copyright ©2012 Ping Identity Corporation. All rights reserved.20 Client uses Token at API 20 HTTP/1.1 200 OK Content-Type: application/json; charset=UTF-8 { "aboutMe": "Head SE South", "address": { "city": "New Orleans", "country": "US", "state": "LA", "street": "923 Bourbon Street", "zip": "70116" }, "currentStatus": { GET https://na1.salesforce.com/services/data/v22.0/ch atter/users/me Authorization: Bearer lSBbci4Jg8MsjiSqZLBrzEXg

21 Copyright ©2012 Ping Identity Corporation. All rights reserved.21 Users always authenticate in the same place –Teach them to expect your ceremony –Protect against the Password Antipattern Developers never see or store passwords –Only need to know how to ask for a token and use it at APIs –Or –ask once for credentials but never store them IT oversees every authentication –One attack surface & security plan –One audit point Same infrastructure regardless of medium –Web or web service Architecture Advantages

22 Copyright ©2012 Ping Identity Corporation. All rights reserved.22 © 2011 Ping Identity Corporation Cloud Identity Management Centralizes Cloud Access Control Strengthens Security Integrates with Existing Infrastructure Simplifies Password Maintenance Deploys in Days http://www.pingidentity. com 22


Download ppt "Copyright ©2012 Ping Identity Corporation. All rights reserved.1."

Similar presentations


Ads by Google