We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byBridget Elsworth
Modified over 2 years ago
Møte ”Identitets baserte tjenester”
SSO Authn Authz Identity Role Policy IdM Role Mgmt Service Info resource Trust Policy mgmt + enforcement Compliance -EU -Datatilsynet Simplified SO (gjenta po) Security classific -id/role - resource -serv Standards Technology Federation Logging Audit/ Assurance id propgation
Endre lønn Endre lønn Info classification enforcement PEPPEP
1. ”Segregation of duties”
2. Autentisering/Autorisering DB1 PEPPEP id DB2
3. SOA Sikkerhet Governance SSO - Design time - Run time - Deploy time
Open Questions How to Authorise client ? (Which technology/identifier) How to use this in design ? (How to ensure compliance ?)
Design principles Sep of policy, class and service/resource Policy, decision, enforcement, admin
APS (Keystone) Security “dial tone” Doron Grinstein Chief Architect October 2012 | Version 0.2 | Confidential.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Insight Consulting Siemens Identity Management Survey Conducted April – June 2007 Info
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
Finn Frisch Access Management for the Cloud. Focus area –Externalized authorization –Standardization of externalized authorization (XACML) Swedish Institute.
Security issues in the Cloud Presentation for CloudCamp 2012 (Lagos) Christopher Odutola FVC Inc. Dubai.
Authorization architecture sketches draft-selander-core-access-control-02 draft-gerdes-core-dcaf-authorize-02 draft-seitz-ace-design-considerations-00.
INTRODUCTION: THE FIRST TRY InCommon eduGAIN Policy and Community Working Group.
EDINA 20 th March 2008 EDINA Geo/Grid - Security Prof. Richard O. Sinnott Technical Director, National e-Science Centre University of Glasgow, Scotland.
Shibboleth Use at the National e-Science Centre Hub Glasgow at collaborating institutions in the Shibboleth federation depending.
1 1 Securing (Accountability for) Cloud Content Peter McGoff – SVP and General Counsel.
NRL Security Architecture: A Web Services-Based Solution Anya Kim Naval Research Lab Washington D.C.
University of Murcia Gabriel López. Network authentication in eduroam and SSO token distribution ◦ RADIUS hierarchy ◦ Token based on SAML Network.
Module 7: Designing Security for Accounts and Services.
Identity and Access Management Dustin Puryear Sr. Consultant, Puryear IT, LLC
Best Practices in Enterprise IAM Liza Lowery Massey Montana Government IT Conference December 6, 2007.
Access Management 2.0: UMA for the #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 1.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
Click to edit Master title style HEALTH INFORMATION 1 Identity & Access Management Presenter: Mike Davis (760) January 09, 2007.
Establishing an OU Hierarchy for Managing and Securing Clients Base design on business and IT needs Split hierarchy Separate user and computer OUs Simplifies.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Identity and Access Management in a highly secured Federated Environment Xavier Verhaeghe Vice President Oracle Security Solutions Oracle West Europe.
Security. Audit. Compliance.
PeopleSoft WebGate IDM WebGate (SAL Page) Oracle Access Manager PeopleSoft Environment IDM Environment PeopleSoft Web Server (PIA) 1 Authentication (Y,
A case study of Shibboleth deployment within the U.T. System June 26, 2006 Paul Caskey University of Texas System Copyright Paul Caskey 2006 Not Your Father’s.
VO. VOMS 1. Authentication2. Credentials 3. Authentication Client Resource.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Combining the strengths of UMIST and The Victoria University of Manchester Adapting to Federated Identity SHEBANGS Shibboleth Enabled Bridge to Access.
Beyond Brute Force Strategies for Securely leveraging Mobile Devices Rajesh Pakkath, Sr. Product Manager, Oracle Bob Beach, CIO, Chevron October, 2014.
Access resources in a federation partner organization.
Automated Policy Enforcement Adam Vincent, Layer 7 Federal Technical Director
Information Security Policies and Standards Bryan McLaughlin Information Security Officer Creighton University
On Privacy-aware Information Lifecycle Management (ILM) in Enterprises: Setting the Context Marco Casassa Mont Hewlett-Packard.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
Case Study What Hath Vint Wrought Steve Whitlock Boeing Chief Security Architect Information Protection & Assurance.
Cloud Security Session: Introduction 25 Sep 2014Cloud Security, Kelsey1 David Kelsey (STFC-RAL) EGI-Geant Symposium Amsterdam 25 Sep 2014.
Connect. Communicate. Collaborate Federation Interoperability Made Possible By Design: eduGAIN Diego R. Lopez (RedIRIS)
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
Continuous Compliance Assurance for Trusted Information Sharing: A Research Framework Bonnie W. Morris College of Business & Economics
Exploring InCommon Getting Started with InCommon: Creating Your Roadmap.
Beyond Brute Force Strategies for Securely leveraging Mobile Devices Rajesh Pakkath, Sr. Principal Product Manger, Oracle Bob Beach, CIO, Chevron October,
Information Resources and Communications University of California, Office of the President Current Identity Management Initiatives at UC & Beyond: UCTrust.
FI-WARE Testbed Access Control temporary solution.
SharePoint Security Fundamentals Introduction to Claims-based Security Configuring Claims-based Security Development Opportunities.
WLCG Security TEG, risks and Identity Management David Kelsey GridPP28, Manchester 18 Apr 2012.
16/3/2015 META ACCESS MANAGEMENT SYSTEM Implementing Authorised Access Dr. Erik Vullings MAMS Programme Manager
OGF22 25 th February 2008 OGF22 Demo Slides Prof. Richard O. Sinnott Technical Director, National e-Science Centre University of Glasgow, Scotland
© 2017 SlidePlayer.com Inc. All rights reserved.