Higgins 1: A species of Tasmanian long-tailed mouse 2: An open source identity framework being developed at the Eclipse Foundation.

Slides:



Advertisements
Similar presentations
The Higgins Data Model Higgins : a species of Tasmanian long-tailed mouse Copyright© Parity Communications, Inc. Made available under EPL v1.0.
Advertisements

Copyright 2008, Parity Communications, Inc. licensed under EPL 1.0 Paul Trevithick, SocialPhysics.org Mary.
Smartphone-based authorization system Advisor: Dr. Wenjun Zeng - Professor Presenter: Yilihamujiang, Ailiyasijiang Zhou, Guanlong Al-Sinani, H. S. (2011).
InfoCard and the Identity Metasystem Kim Cameron, Chief Architect of Identity Microsoft.
Integration Considerations Greg Thompson April 20 th, 2006 Copyright © 2006, Credentica Inc. All Rights Reserved.
WSO2 Identity Server Road Map
Windows CardSpace and the Identity Metasystem Glen Gordon Developer Evangelist, Microsoft
© 2012 Cisco and/or its affiliates. All rights reserved. Presentation_ID Cisco Public Quad APIs and SDK Preview Sachin Smotra Product Manger, Enterprise.
Infocard and Eduroam Enrique de la Hoz, Diego R. L ó pez, Antonio Garc í a, Samuel Mu ñ oz.
Web Services and the Semantic Web: Open Discussion Session Diana Geangalau Ryan Layfield.
© 2009 by Mary Ruddy, Manfred Duchrow, Frank Gerhardt, Jochen Hiller, Gunnar Wagenknecht; made available under the EPL v1.0 | Identity Management.
© 2008 by Parity; made available under the EPL v1.0 Identity Management Authorization and User Profiles: Higgins1.0 and Beyond Paul Trevithick,
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
Higgins 1.1 Architecture Diagrams
1 Higgins 1: a species of Tasmanian long-tailed mouse 2: the name of an open source collaboration of IBM, Novell, Oracle, Parity…
© 2007 IBM Corporation IBM Emerging Technologies Enabling an Accessible Web 2.0 Becky Gibson Web Accessibility Architect.
© 2009 The MITRE Corporation. All rights Reserved. April 28, 2009 MITRE Public Release Statement Case Number Norman F. Brickman, Roger.
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Who are you? From Directories and Identity Silos to Ubiquitous User-Centric Identity Mike Jones, Microsoft and Dale Olds, Novell.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Design Extensions to Google+ CS6204 Privacy and Security.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Digital Object Architecture
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
Enterprise Identity Steve Plank – Microsoft Ivor Bright – Charteris Dave Nesbitt – Oxford Computer Group.
SITools Enhanced Use of Laboratory Services and Data Romain Conseil
IIW 2008b Report November , Mountain View Abbie Barbir Nortel OASIS IDtrust Steering.
Shib-Grid Integrated Authorization (Shintau) George Inman (University of Kent) TF-EMC2 Meeting Prague, 5 th September 2007.
Copyright ©2012 Ping Identity Corporation. All rights reserved.1.
Chad La Joie Shibboleth’s Future.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
Paul Andrew. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
© 2008 by Matt Flaherty & Mary Ruddy; made available under the EPL v1.0 Security & Identity : From present to future Matt Flaherty, IBM Mary Ruddy, Meristic.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 14 Database Connectivity and Web Technologies.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Edugate Glenn Wearen HEAnet.. Summary 1 year Pilot Project / 2 years in production All IoT’s, Universities, Colleges, but only half of HEAnet’s members.
Enhanced Storage Architecture
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
All Rights Reserved 2014 © CMG Consulting LLC Federated Identity Management and Access Andres Carvallo Dwight Moore CMG Consulting, LLC October
Access Management 2.0: UMA for the #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 1.
Status Update on Other GFIPM Activity Threads GFIPM Delivery Team Meeting November 2011.
February, TRANSCEND SHIRO-CAS INTEGRATION ANALYSIS.
Web Services Security Patterns Alex Mackman CM Group Ltd
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Secure Mobile Development with NetIQ Access Manager
Today’s Applications Web API Browser Native app Web API Web API
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
F5 APM & Security Assertion Markup Language ‘sam-el’
Connected Identity & the role of the Identity Bus Prabath Siriwardena Director of Security Architecture WSO2.
International Planetary Data Alliance Registry Project Update September 16, 2011.
Access Policy - Federation March 23, 2016
Introduction to Windows Azure AppFabric
Federation Systems, ADFS, & Shibboleth 2.0
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Windows Azure AppFabric
Chapter 18 MobileApp Design
Matthew Levy Azure AD B2B vs B2C Matthew Levy
Office 365 Development.
Building "One Size Fits All" Identity Systems Possible or Fantasy
Presentation transcript:

Higgins 1: A species of Tasmanian long-tailed mouse 2: An open source identity framework being developed at the Eclipse Foundation

Sections 1.Higgins 1.0 – What we released in Feb Higgins 1.1 – What we’re working on (or in some cases just thinking about) for June Beyond Higgins 1.1 Copyright © 2008 Parity. Made available under EPL 1.02

Section One: Higgins 1.0 Released February 2008 Commercial products based on Higgins 1.0 have been announced by Novell, Serena, Computer Associates and IBM Copyright © 2008 Parity. Made available under EPL 1.03

Higgins is an Identity Framework Enables users and applications to integrate identity, profile, and social relationship information across multiple data sources and protocols. 4Copyright © 2008 Parity. Made available under EPL 1.0

End-users experience Higgins through the UI metaphor of Information Cards using an app called an Identity Selector Information Cards and selectors are just tip of the iceberg of what can be done with Higgins, but it’s a place to start… 5Copyright © 2008 Parity. Made available under EPL 1.0

Today you go from site to site filling in forms and passwords Copyright © 2008 Parity. Made available under EPL 1.06 Type, type, type. Click, click. Here a password, there a password. Everywhere a password. Here a form, there a form,... Websites…

Information Cards Put You in Control Copyright © 2008 Parity. Made available under EPL 1.07 Each card is a slice of the digital you (or a friend of yours) held in some data silo. Any kind of information: your preferences, favorite songs, employee id numbers, drivers licenses, affiliations, your health plan id,...you get the idea, can be accessed using a card. This wallet-like thing is an app called an Identity Selector

Higgins Identity Selectors Copyright © 2008 Parity. Made available under EPL 1.08 Identity Selectors Identity Attribute Service Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Services Identity Providers Identity Selectors

How to Use I-Cards By clicking on a card you can log into sites. No more passwords You can share cards with friends and businesses you trust Some [relationship] cards create permanent connections to your friends, communities and businesses 9

Click Identity Selector “Wallet” Click on a card to send it to a site Copyright © 2008 Parity. Made available under EPL Higgins is interoperable with Microsoft CardSpace™ shown here

Identity Selector Card-based Sign-in Per-site passwords are eliminated Instead, the selector posts a security token that is validated by the relying site Provides some anti-phishing protection Copyright © 2008 Parity. Made available under EPL 1.011

Identity Selector Supported Card Types Copyright © 2008 Parity. Made available under EPL Managed What some other entity says about you Personal What you say about you

Identity Selectors Three Flavors in Higgins 1.0 Firefox-embedded Selector (Javascript) – For Firefox on Windows, Linux, and OSX – Uses hosted I-Card Service Component GTK / Cocoa Selector (C++) – For Firefox on Linux, FreeBSD, and OSX – Available as DigitalMe™ from Novell RCP Selector (Java) – For Eclipse RCP Application 13Copyright © 2008 Parity. Made available under EPL 1.0

Identity Selectors Cards and Tokens Flow Identity Selector Browser Extension & Client App Identity Provider Relying Party Website or App Cards are generated and downloaded from here. A local Token Service issues tokens as requested by Selector. Cards are stored and selected here Tokens containing claim data is requested and received here

Identity Selectors Cards and Tokens Flow Identity Selector Browser Extension & Client App Identity Provider Relying Party Some Higgins Identity Selectors rely on a hosted I-Card Service component

User Identity Provider Relying Website Token Service Browser Browser Extension Identity Selector Internet Key: Generic Technology Higgins Components Identity Selector Component View RP Libraries Selector Higgins Identity Selectors. Client apps for Windows, OSX and Linux I-Card Web Service

User Identity Provider Relying Website Token Service Browser Browser Extension Identity Selector Internet Key: Generic Technology Higgins Components Identity Selector Selector Selector – Component View RP Libraries Selector Higgins includes a Higgins Selector Selector component (Windows-only) Provides an abstraction layer that decouples browser extensions from selectors. I-Card Web Service

Architecture Identity Providers Copyright © 2008 Parity. Made available under EPL Identity Selectors Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Providers Identity Selectors Identity Attribute Service Identity Services

Identity Provider Relying Website Token Service Browser Browser Extension Identity Selector Internet Key: Generic Technology Higgins Components Identity Providers Component View 19 RP Libraries Selector Higgins Token/IdP Service is used by the Identity Provider website User

Identity Providers Two Flavors WS-Trust Security Token Service / IdP – Java WS-Trust Identity Provider – Web service – Sample web site SAML2 IdP – Java SAML2 Identity Provider – Web service Copyright © 2008 Parity. Made available under EPL 1.020

Architecture Relying Party Website Copyright © 2008 Parity. Made available under EPL Identity Selectors Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Providers Identity Selectors Identity Attribute Service Identity Services

Identity Provider Relying Website Token Service Browser Browser Extension Identity Selector Internet Relying Party Website Component View 22 RP Libraries Selector Higgins RP Website provides code to validate tokens from Identity Selectors Key: Generic Technology Higgins Components User

Relying Party Website Multi-Protocol Support Multi-Protocol Relying Party Website Enablement – Information Card authentication – OpenID authentication Copyright © 2008 Parity. Made available under EPL 1.023

Architecture Identity Services Copyright © 2008 Parity. Made available under EPL Identity Selectors Identity Attribute Service Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Services Identity Providers Identity Selectors

Architecture Extensible Identity Services Copyright © 2008 Parity. Made available under EPL CardSpace Protocol Provider-Plugins Implement RP protocols OpenID Managed I-Card Provider-Plugins Implement card types Personal SAMLX509 Relationship Kerberos Token Provider-Plugins Implement security tokens UN/PWIdemix Plug-ins Identity Services Login (un/pw) Key: Beyond Higgins 1.0 Higgins 1.0

Architecture Identity Attribute Service Copyright © 2008 Parity. Made available under EPL Identity Selectors Identity Attribute Service Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Services Identity Providers Identity Selectors

Architecture Extensible Identity Attribute Service Copyright © 2008 Parity. Made available under EPL Identity Attribute Service (IdAS) LDAPXML File IdAS Context Providers-Plugins Connect to existing data sources RDF Google Contacts Others… Plug-ins Key: Beyond Higgins 1.0 Higgins 1.0

Identity Attribute Service The Context Data Model is implemented by Identity Attribute Service Contexts may be accessed using IdAS may employ a variety of authentication approaches The contained Entities may be inspected, navigated and or modified based on authorization policy of the Context IdAS is extended by Context Providers (plugins) Context Providers map existing data sources into the Higgins Context Data Model Copyright © 2008 Parity. Made available under EPL 1.028

Identity Attribute Service Context Data Model (CDM) Data sources are called Contexts – E.g. enterprise directories, social networks, RDF repositories Contexts contain objects called Entities – Entities represent people, organizations, etc. Entities have Attributes ; Attributes have values The core semantics of the model are based on RDF & OWL Copyright © 2008 Parity. Made available under EPL 1.029

Identity Attribute Service CDM extends RDF Globally linked data – Higgins uses UDIs not just HTTP URIs – Some EntityId UDI ids may be globally resolved into a global object graph Supports protocols beyond HTTP – Uses XRDS discovery of UDI endpoint metadata, including protocol for data access Read and write access – Access Control management & enforcement Copyright © 2008 Parity. Made available under EPL 1.030

Architecture Interoperability Points Copyright © 2008 Parity. Made available under EPL Identity Selectors Identity Attribute Service Identity Providers Relying Parties Client Apps, Web Services, Web apps Identity Services Identity Providers Identity Selectors

Interoperability Event Participants RSA Copyright © 2008 Parity. Made available under EPL 1.0

Interoperability Event Participants RSA Copyright © 2008 Parity. Made available under EPL 1.0

Section Two: Higgins 1.1 June 2009 Copyright © 2008 Parity. Made available under EPL 1.034

AIR-Based Selector Based on Adobe AIR – Integrates with Firefox, IE, and Safari – Runs on Windows, OSX and soon Linux – More secure Replaces the Firefox-embedded selector Copyright © 2008 Parity. Made available under EPL 1.035

Identity Attribute Service Access Control Enhancements Policy query API Policy management API Policy semantics modeled directly as Policy Entities and attributes Copyright © 2008 Parity. Made available under EPL 1.036

Identity Attribute Service New Context Providers Google Contacts Open Social Facebook F8 Wrappers for various ID-WSF services (maybe) Copyright © 2008 Parity. Made available under EPL 1.037

Identity Attribute Service XDI Protocol Support XDI Engine provides a new binding for the IdAS Service – Allows any/all attribute data managed by IdAS to be exposed as an XDI data service XDI Context Provider – Allows IdAS to read/write XDI-native data sources Copyright © 2008 Parity. Made available under EPL 1.038

Relationship Cards Relationship Card What you and Best Buy say about you 39Copyright © 2008 Parity. Made available under EPL 1.0

Relationship Cards Human Friendly Data References Card holds a UDI (URI) reference: – A ContextId that identifies a data source, and – A local EntityId object within the context See Copyright © 2008 Parity. Made available under EPL Data object (called an Entity )

Relationship Cards Data Location and Authority Best Buy issued card Entity is stored in Best Buy’s data center Best Buy is authoritative over some attributes You are authoritative over some attributes (e.g. street address) Copyright © 2008 Parity. Made available under EPL 1.041

Relationship Cards Data Model The Entity is described by the Higgins Context Data Model Can be accessed using the Identity Attribute Service 42Copyright © 2008 Parity. Made available under EPL 1.0

Other New Card Types Username/Password Card – To log in to traditional un/pw sites SAML Card (aka S-card) [maybe] – Uses SAML protocol to retrieve token Idemix card (aka Z-card) [maybe] – Support for a new privacy-enhancing token type based on zero-knowledge proofs – Improved support for selective disclosure Copyright © 2008 Parity. Made available under EPL 1.043

OpenID Provider Identity Provider Relying Website I-Card Web Service Token Service Browser Browser Extension Identity Selector Internet Key: Generic Technology Higgins Components Selector as an OpenID Service 44 RP Libraries Selector OpenID 2.0 OP with associated Higgins Selector Service User

ID-WSF Support (maybe) There have been some recent, focused discussions on the integration of Higgins and ID-WSF Higgins I-Card Service could implement: – ID-WSF Discovery Service – ID-WSF Authentication Service (I think) Higgins Context Providers would be written for various ID-WSF services Integration with R-Cards and XRDS Would rely on the OpenLiberty.org code base Copyright © 2008 Parity. Made available under EPL 1.045

IdAS Client Component (maybe) 46

Section Three: Beyond Higgins 1.1 Mobile Higgins Higgins project is seeking project funding and/or contributions to develop a Higgins selector for mobile platforms Copyright © 2008 Parity. Made available under EPL 1.047

Target Platforms Symbian RIM Windows Mobile 6 iPhone Android Copyright © 2008 Parity. Made available under EPL 1.048

Paul Trevithick Mary Ruddy Project Co-leads Copyright © 2008 Parity. Made available under EPL 1.049

Appendix Original Project Goals 50Copyright © 2008 Parity. Made available under EPL 1.0

Goals: 1 of 5 Provide a consistent user experience based on card icons for the management and release of identity data This is needed in order to have a trusted mechanism for authentication and other interactions that is less vulnerable to phishing and other attacks and that works for a wide variety of users and systems See Higgins 1.0 Identity Selector 51Copyright © 2008 Parity. Made available under EPL 1.0

Goals: 2 of 5 Empower users with more convenience and control over personal information distributed across external information silos Provide a single point of control over multiple identities, preferences and relationships See Higgins 1.0 Identity Selector 52Copyright © 2008 Parity. Made available under EPL 1.0

Goals: 3 of 5 Provide an API and data model for the virtual integration and federation of identity and security information from a wide variety of sources See Higgins 1.0 Framework 53Copyright © 2008 Parity. Made available under EPL 1.0

Goals: 4 of 5 Provide plug-in adapters to enable existing data sources including directories, communications systems, collaboration systems and databases each using differing protocols and schemas to be integrated into the framework See Higgins 1.0 Identity Attribute Service and Context Providers (plugins) 54Copyright © 2008 Parity. Made available under EPL 1.0

Goals: 5 of 5 Provide a social relationship data integration framework that enables these relationships to be persistent and reusable across application boundaries It organizes relationships into a set of distinct social contexts within which a person expresses different personas and roles See Higgins 1.0 Context Data Model (CDM) 55Copyright © 2008 Parity. Made available under EPL 1.0