Presentation is loading. Please wait.

Presentation is loading. Please wait.

 HVL/Nulli Secundus 2001 Designing a Single Sign On Strategy Guy Huntington, President HVL Derek Small, President Nulli Secundus.

Similar presentations


Presentation on theme: " HVL/Nulli Secundus 2001 Designing a Single Sign On Strategy Guy Huntington, President HVL Derek Small, President Nulli Secundus."— Presentation transcript:

1  HVL/Nulli Secundus 2001 Designing a Single Sign On Strategy Guy Huntington, President HVL Derek Small, President Nulli Secundus

2  HVL/Nulli Secundus 2001 The Issue Single sign on (SSO) today is a common buzzword and goal for many enterprises It’s extremely complex once you peel away the outer layer of strategic desire and look at the system and security implications Do you know what to look for when considering your SSO strategy?

3  HVL/Nulli Secundus 2001 Have You Thought About… Authentication schemes? Identity management? Post authentication actions? Authorization? Post authorization actions? System integration? Directory strategies? Auditing? Overall risk?

4  HVL/Nulli Secundus 2001 The Good News Is SSO… Provides end user ease of use Can reduce or eliminate security lapses between multiple authentication and authorization systems

5  HVL/Nulli Secundus 2001 The Bad News Is SSO… Creates a potential single source of primary authentication which, if vulnerable to attack at any point in the process, can provide a malicious or unwanted person with an entrée to your systems

6  HVL/Nulli Secundus 2001 What’s Driving SSO? End users can’t handle remembering all the different passwords to access the many systems they deal with daily They don’t want to carry in their wallets many separate forms of authentication devices such as loyalty cards, credit cards, smart cards, employee and other forms of ID

7  HVL/Nulli Secundus 2001 It’s a Process, Not a Product SSO isn’t something you buy, nor is it just a single password a user has to remember SSO is a process made up of many sub-components and system interfaces with some form of business driven security logic driving those components It’s only as good as the weakest link in the chain

8  HVL/Nulli Secundus 2001 Islands of Trust Most system within an enterprise weren’t built with common authentication systems in mind Therefore, most enterprises have many independent authentication and authorization islands There are generally few or no standards for these authentication systems

9  HVL/Nulli Secundus 2001 Different Trust Each of these authentication islands uses different approaches to trust Some have an all or none approach –They give you complete or no access to the system/network

10  HVL/Nulli Secundus 2001 Different Approach Others tend to use one authentication method and several layers of authorization –As you drill towards more and more sensitive information it requires higher levels of authorization but still uses the initial authentication

11  HVL/Nulli Secundus 2001 Multiple Layers of Trust A few system use both multiple levels of authentication and authorization –As you drill towards more sensitive information the levels of both authentication and authorization increase

12  HVL/Nulli Secundus 2001 Key Question The core question at the heart of SSO is whether to build bridges between the authentication and authorization islands, reduce the number of islands or keep the islands separate?

13  HVL/Nulli Secundus 2001 Building Bridges You have to address: –Keeping communications secure –Creating common authentication processes (which may not be easy between disparate authentication systems) –Synchronizing the systems so they never get out of step –Accepting levels of trust between systems –Some form of directory strategy

14  HVL/Nulli Secundus 2001 Reduce Islands If you reduce the number of authentication islands, you have to re-engineer systems Most likely requires a modern directory strategy Takes time, money and effort Potentially offers new economies of scale Standardize authentication, authorization and auditing security

15  HVL/Nulli Secundus 2001 Separate Islands Enforce separate security levels for each system This works where the risk is high and end users accept the additional authentication process It fails in modern e-business solutions where end users want single sign on and simplicity for authentication

16  HVL/Nulli Secundus 2001 The SSO Onion We prefer to view the process of achieving SSO like peeling away the layers of an onion Each internal layer is a higher measure of trust all applications will accept with accompanying authentication, authorization and auditing components This should be a goal in working with vendors and reengineering your legacy systems

17  HVL/Nulli Secundus 2001 Reality The reality is you’re not going to reengineer all your systems over a short period of time just for SSO It’s too expensive, time and effort consuming So you need to develop some interim solutions that get you on the road towards SSO, provide ease of use for your users and enhance existing security

18  HVL/Nulli Secundus 2001 Where to Start? Prioritize your authentication needs Consider a directory strategy Consider infrastructure tools Develop building blocks Have a global security strategy

19  HVL/Nulli Secundus 2001 Prioritize Your Needs Before you leap to vendors and product solutions, determine the SSO priorities What’s the cost/ease of use/risk analysis for achieving SSO for your applications?

20  HVL/Nulli Secundus 2001 Prioritize Your Needs Take a look at the current costs for maintaining independent authentication –A place to look is help desk support required for lost passwords –Another place to look is the cost in entering and maintaining username and passwords between systems

21  HVL/Nulli Secundus 2001 Prioritize Your Needs What’s the biggest gripe from your user community re authentication? What levels of inconvenience will they accept? Do you have current risk analysis for your existing systems? What’s the risk analysis if you went to SSO?

22  HVL/Nulli Secundus 2001 Prioritize Your Needs Does SSO give you a competitive advantage? –Would it be perceived by your customers as an advantage over your competition? Could you use it to leverage workflow with your business partners and customers coming in via portals or the webs?

23  HVL/Nulli Secundus 2001 Directory Strategy SSO is very hard to achieve without a directory strategy Directories are good for fast lookups like authentication and authorization

24  HVL/Nulli Secundus 2001 Directory Strategy Directories operate to global IETF LDAP standards They can help integrate authentication, authorization and auditing for the network and back office systems such as ERP, HRIS and data warehouses You need some sort of coordinating hub for SSO to work

25  HVL/Nulli Secundus 2001 Directory Strategy Even such basic concepts of username and password are hard to coordinate between systems without a directory Most systems use different syntax, length, management and storage policies for username and password

26  HVL/Nulli Secundus 2001 Directory Strategy A directory is also key in coordinating form, certificate and biometric authentication schemes between your many systems It can both store and replicate data to and from the authentication systems

27  HVL/Nulli Secundus 2001 Identity Management A big challenge is coordinating the identity knowledge between systems How do you synch up the management of identities of potentially millions of customers, thousands of business partners’ employees and thousands of your own employees?

28  HVL/Nulli Secundus 2001 Identity Management You need to not only synchronize systems but push secure identity management down to the appropriate level This may include end user self service for maintenance of their basic information and password

29  HVL/Nulli Secundus 2001 Coordinating Authentication Schemes How are you going to handle different authentication methods for each application? Are you starting to deploy form, certificate and biometric authentication?

30  HVL/Nulli Secundus 2001 Coordinating Authentication Schemes Are you using or considering SSL/TLS and hashing algorithms to secure authentication? How are you going to maintain state between applications given the internet is stateless? How are you going to mesh this all together and manage it?

31  HVL/Nulli Secundus 2001 Coordinating Authentication Schemes How are you going to recognize different levels of trust between applications? Are you going to accept common levels of trust? How are you going to handle users from different domains? How are you going to handle different authentication timing actions?

32  HVL/Nulli Secundus 2001 Post Authentication When a central system authenticates, what are the post authentication actions between it and each of your other islands? Are you passing HTTP headers, servlets, applets, or Javascript between them? How are you going to handle integration to your portals, data warehouses, NOS’s, directories, ERP, HRIS and other systems?

33  HVL/Nulli Secundus 2001 Authorization How are you going to handle authorization? Are you going to centralize some of it, while also meshing it with the business and authorization logic in your ERP, HRIS or other systems? What authentication and authorization information do you need passed from the SSO central hub that will allow the level of trust to be approved?

34  HVL/Nulli Secundus 2001 Post Authorization What happens when an authorization succeeds? Do you need to pass attributes in HTTP headers or launch applets, servlets, etc? What if authorization fails? What happens to the user and in your auditing between systems?

35  HVL/Nulli Secundus 2001 Auditing Systems How do you presently audit events? Is it granular enough? How are you going to synch up different auditing systems and events from the firewalls, NOS’s, ERP, HRIS, data warehouses and other systems?

36  HVL/Nulli Secundus 2001 Scaling Systems How are you going to scale SSO within your enterprise? Between you and your business partners? With your customers? How do you scale and coordinate the identity management, authentication, authorization and auditing systems on a local, regional, continental and global scale?

37  HVL/Nulli Secundus 2001 Consider New Tools Having directories is not enough You must synch up the disparate identity, authentication, authorization and auditing systems with something that is secure, scalable and manageable This isn’t easy to do on your own E-Business infrastructure tools from companies such as Oblix, Netegrity, Entrust, IBM/Tivoli are essential

38  HVL/Nulli Secundus 2001 Oblix NetPoint In our practice we use Oblix NetPoint Manages the identity piece with delegatable administration down to the end user if desired Coordinates different authentication, authorization and auditing required at different levels of resource and identity granularity

39  HVL/Nulli Secundus 2001 Oblix NetPoint Delegate policy administration Scales quickly and securely using different forms of authentication, encryption, web and directory servers

40  HVL/Nulli Secundus 2001 SSO is Not a Panacea SSO is a process that needs to be very carefully thought out before embarking down the vendor and product solution road The process needs continual review, testing and monitoring to ensure integrity It requires standards and well thought out work-arounds between disparate systems

41  HVL/Nulli Secundus 2001 I’d Like to Learn More … Guy Huntington, HVL: guy@hvl.net www.hvl.net 604-921-6797 Derek Small, Nulli Secundus derek@nulli.com www.nulli.com 403-270-0657

42  HVL/Nulli Secundus 2001 Securing E-Business Presentations… www.hvl.net/ebusiness.htm


Download ppt " HVL/Nulli Secundus 2001 Designing a Single Sign On Strategy Guy Huntington, President HVL Derek Small, President Nulli Secundus."

Similar presentations


Ads by Google