Evolution of Identity Management May 15, 2008 For: CIPS Security Special Interest Group Presented by: Mike Waddingham, PMP President, Code Technology Corp.

Slides:



Advertisements
Similar presentations
The Federation for Identity and Cross-Credentialing Systems (FiXs) FiXs ® - Federated and Secure Identity Management in Operation Implementing.
Advertisements

Identity Federation Rules and Process Linda Elliott President, PingID Network Electronic Authentication Partnership Washington, DC February 12, 2004.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Campus Based Authentication & The Project Presented By: Tim Cameron National Council of Higher Education Loan Programs.
1 Authentication Trustworthiness The Next Stage in Identity-Based Access and Security Tom Board, NUIT.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
Federated Identity Management for the context of storage Bart Kerver - TERENA Storage-meeting, Amsterdam,
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
Script Kiddies; CybercrimeCyber-espionage; Cyber-warfare CybercriminalsState sponsored actions; Unlimited resources Attacks on fortune 500All sectors.
Information Resources and Communications University of California, Office of the President Current Identity Management Initiatives at UC & Beyond: UCTrust.
Information Security in Real Business
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Private Cloud: Application Transformation Business Priorities Presentation.
Introduction to Network Defense
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Cloud Computing Cloud Security– an overview Keke Chen.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
To identity federation and beyond! Josh Howlett JANET(UK) HEAnet 2008.
Copyright 2006 Archistry Limited. All Rights Reserved. SOA Federated Identity Management How much do you really need? Andrew S. Townley Founder and Managing.
Middleware challenges to service providers, the Nordic view TERENA, Ingrid Melve, UNINETT.
Dell Connected Security Solutions Simplify & unify.
Tom Clarke VP, Research & Technology National Center for State Courts.
TSCP Early Work on Trust Framework Agreement Developing a Flexible Trust Agreement PAGE 1 | TSCP.
X-Road – Estonian Interoperability Platform
Challenges to a Canadian Identity Policy: Learning from International Experiences Krista Boa, Andrew Clement & Gus Hosein Identity Project - Canada 7th.
·
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
SUNY System Administration Federation Overview Gavin Hogan July 15th, 2009 A work in progress….
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Ian Bailey Director Application Architecture Office of CIO, Province of BC A User Centric and Claims Based Architecture for British Columbia.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Windows CardSpace Martin Parry Developer Evangelist Microsoft
The privacy risks and rewards of distributed identity Conference Presentation (8 September 2003) Surveillance and Privacy 2003, University of New South.
Information Technology Current Work in System Architecture January 2004 Tom Board Director, NUIT Information Systems Architecture.
Shibboleth What is it and what is it good for? Chad La Joie, Georgetown University.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
E-Authentication & Authorization Presentation to the EA2 Task Force March 6, 2007.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Privilege Management Chapter 22.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Federated Identity Management
2-Oct-0101 October 2001 Directories as Middleware Keith Hazelton, Senior IT Architect University of Wisconsin-Madison Keith Hazelton, Senior IT Architect.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Dr. Ir. Yeffry Handoko Putra
Identity and Access Management
Cyber Security Means Locking the Front Door Too: Use High-Assurance Identity Management to Control Access to the Federal Bridge.
Secure Connected Infrastructure
Secure Single Sign-On Across Security Domains
Cloud Security– an overview Keke Chen
Data and Applications Security Developments and Directions
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
THE STEPS TO MANAGE THE GRID
NAAS 2.0 Features and Enhancements
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Appropriate Access InCommon Identity Assurance Profiles
Presentation transcript:

Evolution of Identity Management May 15, 2008 For: CIPS Security Special Interest Group Presented by: Mike Waddingham, PMP President, Code Technology Corp.

2 Security Context Identity Management is only one part of a broader information security environment which includes:  Perimeter security (firewalls, routers, intrusion detection, etc.)  Virus and malware protection  Data encryption  System management and availability  Application and database security  Physical information security  Business processes and practices

3 Definitions Identity – A set of attributes or claims about an individual Identity Context – there are legal, professional and personal contexts  personal context most complex with name variations and changes and a need for psuedo-anonymous identities Identity Management – Identification of users and their enrolment in a system that is used to manage their electronic identity information Access Management – Determining a set of authorizations and privileges that a validated identity may possess; controlling entitlement by granting or denying access to resources

4 An Identity Management Model Diagram courtesy of Alberta Advanced Education

5 IdM Models There are three primary IdM models in use today:  Centralized – e.g. Federal Gov’t ePass, ASAS, most others  Federated – e.g. General Motors and its suppliers  User Centric – e.g. BC Gov’t pilot projects (using Microsoft CardSpace)

6 Centralized IdM Benefits:  One identity solution for users to learn/use  All apps use same solution and interfaces  Single or Reduced Sign-on can be achieved  Common policies can be implemented once  A single team can often manage a large system  Generally well-understood by users and IT

7 Centralized IdM Shortcomings:  Difficult to scale to large size – imagine GM and its dealers (not just the employees) on one centralized system  Cannot support multiple organizations easily Therefore, it does not reflect the reality of modern distributed business environments…  Users must trust the central org to manage their information properly  Changes can impact all applications

8 Federated IdM Three types of Federated IdM systems:  Ad Hoc – bilateral, org to org  Hub-and-Spoke – islands of federation, dominated by one large organization  Federated Identity Networks – based on a network of members owning an identity platform (e.g. VISA)

9 Federated IdM An identity network is the only effective means to do so while ensuring that operational, legal, and security obligations are met... From “Digital Identity”, by Phil Windley

10 Federated Model

11 Federated Access - Sample Flow

12 Federated Identity Networks Benefits:  SSO across organizational boundaries  Can support common policies and standards across orgs  Strong technical standards exist: WS-*,SAML, SPML, Shibboleth, Liberty Alliance  Agreements of members well defined, support trust, outline consequences of misbehaving  Identity information is distributed  Automatic “Federated provisioning” an option

13 Federated Identity Networks Shortcomings:  Cost of development and operations need to be shared by orgs (not individual users)  Liability not well understood – what are limits to liability for orgs that are responsible for a breach?  Fed ID Networks not well understood by orgs that need them  Negotiation, setup and enforcement of agreements  Difficulty establishing a central, neutral Federation organization

14 User-Centric IdM Puts the user in control of their identity Segments the authentication and authorization processes into three parts:  Authoritative Party: vouches for an aspect of the user’s identity when asked  Relying Party: provides resources (e.g. access to an application) when sufficient credentials are provided  Identity Agent: controlled by the user, acts for the user

15 User-Centric Model

16 User-Centric Access - Sample Flow

17 User-Centric IdM Benefits  Supports user privacy principals  User is in control of their identity  Scales to any size without burden on orgs  Well-suited to public sector  Being pushed by Microsoft and other vendors  Supported by Pan-Canadian initiatives

18 User-Centric IdM Shortcomings  New – not well understood by either users or IT  New – not fully implemented, tested or proven  Not supported on older operating systems (needs Vista, XP with add’l software, or Mac Leopard)  Not mobile – current implementations have the Identity Agent on the user’s fixed PC  User must have knowledge of Identity Agent tools and processes

19 User-Centric IdM Gaining momentum with Open ID plus Microsoft CardSpace and other vendors Pan-Canadian Task Force: Critical operating system ‘tipping point’ coming in the near future – currently approx 20% of desktops can support information cards Open ID and information card convergence? Kim Cameron thinks so:  content/images/2008/02/OpenID/Normal/OpenIDPhish.html content/images/2008/02/OpenID/Normal/OpenIDPhish.html

20 What is Next? Centralized systems continue to be designed and built; strong vendor products available Federated systems emerging where strong business needs exist AND appropriate agreements can be negotiated User-Centric getting all the press, and some implementations are being carried out  Which is best?

21 Questions?

22 Thank You For more information, visit codetechnology.ca