3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,

Slides:



Advertisements
Similar presentations
GT 4 Security Goals & Plans Sam Meder
Advertisements

Agenda 2 factor authentication Smart cards Virtual smart cards FIM CM
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Essentials Chapter 4
Donkey Project Introduction and ideas around February 21, 2003 Yuri Demchenko.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 23: Internet Authentication Applications.
Lecture 23 Internet Authentication Applications
Authentication & Kerberos
Cryptography and Network Security Chapter 15 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
WSO2 Identity Server Road Map
DESIGNING A PUBLIC KEY INFRASTRUCTURE
6/4/2015Page 1 Enterprise Service Bus (ESB) B. Ramamurthy.
Virtual techdays INDIA │ august 2010 Managing Active Directory Using Microsoft Forefront Identity Manager: Amol R Bhandarkar │ Tech Specialist –
Understanding Active Directory
Identity and Access Management
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
SIM205. (On-Premises) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service)
Understanding Active Directory
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Enterprise SharePoint Service (ESPS) 17 August 2011 A Combat Support Agency Defense Information Systems Agency.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
IDENTITY MANAGEMENT Hoang Huu Hanh (PhD), OST – Hue University hanh-at-hueuni.edu.vn.
Cloud Computing Cloud Security– an overview Keke Chen.
IETF-84 (29 July – 3 Aug. 2012) Cloud Computing, Networking, and Service (CCNS) Update for GISFI-10, New Delhi, India Sept Monday-10-September-20121IETF84.
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Unit 1: Protection and Security for Grid Computing Part 2
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Paul Andrew. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
W3C Web Services Architecture Security Discussion Kick-Off Abbie Barbir, Ph.D. Nortel Networks.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Building consumer apps with Azure AD B2C
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Mark Gilbert Microsoft Corporation Services Taxonomy Building Block Services Attached Services Finished Services.
Microsoft Identity Integration Server & Role Base Access Theo Kostelijk Consultant Microsoft BV
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
WSO2 Identity Server 4.0 Fall WSO2 Carbon Enterprise Middleware Platform 2.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
Redmond Protocols Plugfest 2016 Ron Starr, Paul Bartos, Hagit Galatzer, Stephen Guty New and Modified Windows Protocol Documents.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
WSO2 Identity Server. Small company (called company A) had few services deployed on one app server.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Access Policy - Federation March 23, 2016
Identity and Access Management
Basharat Institute of Higher Education
Identity Management (IdM)
Cloud Security– an overview Keke Chen
Data and Applications Security Developments and Directions
Cryptography and Network Security
Federated IdM Across Heterogeneous Clouding Environment
ESA Single Sign On (SSO) and Federated Identity Management
Matthew Levy Azure AD B2B vs B2C Matthew Levy
SharePoint Online Authentication Patterns
Computer Network Information Center, Chinese Academy of Sciences
Presentation transcript:

3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia, February 2015) IDENTITY MANAGEMENT STANDARDIZATION IN THE CLOUD COMPUTING MOUNIR FERJANI Product Manager, Huawei Technologies

AGENDA Access Control Identity paradigm Cloud identity management Scenarios Use Cases and Challenges for identity standardization SCIM core Schema SCIM Protocols Shortcomings

Access control Access control is concerned with determining the allowed activities of legitimate users, mediating every attempt by a user to access a resource in the system. NIST 7316

RBAC Role-based policies require the identification of roles in the system. A role is a collection of permissions to use resources appropriate to a person's job function Least privilege : ensure users have access to only the resources they need automate access certification processes from start to finish to meet ongoing compliance requirements – Policies : separation-of-duties Developer Budget Manager Help Desk Representative Director

ABAC NIST SP

Authorization and Access control create special challenges for identity management

Identity The first concept of identity is a set of identifiers or attributes. NIST sp draft The first concept of identity is a set of identifiers or attributes. NIST sp draft ID for online banking ID for online banking ID to request certificates ID to purchase flights ID for online magazines E-Commerce ID ID for social network Identifiers Unique Identity (ID) Identifiers Unique Identity (ID) Attributes Secret

Certificates

Kerberos Client AS TGS Server ID+Hash(password) Client TGS/TGT TGT Client-to-server Ticket Ticket = Client ID, Client network address, Validity Period, Client/Server Session Key

SAML Assertions Assertion ID Issue Instant Issuer Assertion ID Issue Instant Issuer Subject Asserted Attributes Subject Asserted Attributes Not Before Not After Not Before Not After Subject (user identity) Authentication instant Authentication mechanism Subject (user identity) Authentication instant Authentication mechanism Digital Signature

Identity Management Directory services : – AD, LDAP, RADIUS Identity providers – PKI – SAML : exchange ID via web XML OpenID – RP : Relying parties WS security : SOAP extension Oauth

Identity Provisioning History

Cloud computing Paradigm for enabling network access to a scalable and elastic pool of shareable physical or virtual resources with self-service provisioning and administration on-demand – NOTE – Examples of resources include servers, operating systems, networks, software, applications, and storage equipment. ISO/IEC | Recommendation ITU-T Y

Characteristics On-demand self-service Broad network access Resource pooling Rapid elasticity Measured service 14

Cloud User Ownership change (1) CSP has a multitenant cloud platform User 1 and user 2 belong to enterprise Enterprise is tenant Enterprise is customer of CSP User1 and user 2 are entitled with different identities to access subjects (files) If user 1 leaves enterprise, enterprise will ask CSP to change identity ownership to user 2

Cloud User Ownership change (2) Requirements : – Secure communication protocols between tenant and CSPs – CSP can enforce identity change – Secure log of all identity change availabe for auditing

Migration of the identities Enterprise is customer of CSP1 and has app 1 managing identity information. Enterprise becomes customer of CSP2 and has app 2 managing identity information. Applications and CSP providers support the same identity format& protocol standard – Format of identity – Protocol for managing identities

Identity federation between cloud providers User has an account with application hosted by a CSP1. User requests a service from an application running on CSP2 relying on user's authentication by CSP1 and using identity information provided by CSP1 Trust model establishment between CSPs : – How to securely provide identity information (protocol) – How to verify received identity information – How to process the identity information received

Simple Cloud Identity Management SCIM group : System for Cross-domain Identity Management – Standardize methods for creating, reading, searching, modifying, and deleting user identities and identity- related objects across administrative domains, with the goal of simplifying common tasks related to user identity management in services and applications. – SCIM 1.0. – Protocol : draft-ietf-scim-api-15 – Schema : draft-ietf-scim-core-schema-15

Schema SCIM schema provides a minimal core schema for representing users and groups (resources) Resource is a collection of attributes identified by one or more schemas. Minimally, an attribute consists of the attribute name and at least one simple or complex value either of which may be multi- valued. For each attribute, SCIM schema defines the data type, plurality, mutability, and other distinguishing features of an attribute.

Resources Resource Type Schema Attribute Common Attributes Core Attributes Extended Attributes

Resource Type Name Description Resource Type Endpoint Schema SchemaExtensions Resource

Common Attributes ID External ID Common Attributes Meta Resource Created Last modified Location Version

User resource schema Single attributes : – Username – Name – Display name – Nick name – Title – Timezone – Active – Password

User & Group resource schema User – Multi-valued attributes s Phone numbers Addresses Photos Groups Entitlement Certificates (X509) Roles Group – Display name – Members

Service Provider Schema Single attributes – documentationUrl – changePassword – authenticationSchemes { "schemas": [ "urn:ietf:params:scim:schemas:core:2.0: ServiceProviderConfig" ], "documentationUrl":" m/help/scim.html", …… "authenticationSchemes": [ { "name": "OAuth Bearer Token", "description": "Authentication Scheme using the OAuth Bearer Token Standard", "specUrl": " oauth-v2-bearer-01", ………. oauth-v2-bearer-01 { "schemas": [ "urn:ietf:params:scim:schemas:core:2.0: ServiceProviderConfig" ], "documentationUrl":" m/help/scim.html", …… "authenticationSchemes": [ { "name": "OAuth Bearer Token", "description": "Authentication Scheme using the OAuth Bearer Token Standard", "specUrl": " oauth-v2-bearer-01", ………. oauth-v2-bearer-01

SCIM protocol API REST API – Create Resource – Retrieving Resources – Modifying Resources – Deleting Resources

Identity synchronization CSPs need to integrate with existing systems : – Billing – Accounting – Contract Management Identity formats Format exchange protocol

Cloud Resources provisioning Cloud service automatic provisioning Workflows definition – Automation layer manage provisioning engines – Provisioning engines act on resources using APIs The need to Protection Profile for Hypervisor APIs – Identity of objects belonging to orchestration – Protocol for exchange

Cloud Resources de-provisioning lifecycle Automatic Cloud service de-provisioning – User – Due to contract stopping for postpaid modes – Due to end of validity period Freeze and delete Internal : from orchestration linked to time servers Auto de-provisioning request : – Identity of time servers – Identity of external systems (billing, …) – Identity of objects inside de-provisioning engine

Summary Need for : – Open standards for identity and access management in the cloud – Identity interoperability – Identity orchestration Shortcomings of SCIM : – Do not specify identity for resource pools APIs : like Hypervisor APIs (vdisk APIs, storage APIs, VM provision APIs, SaaS APIs…) – Do not define identity for Broker APIs – Do not define authentication mechanisms : the choice of authentication mechanism will impact interoperability

Proposals to ITU Define a digital identity framework for the cloud computing – Format, Protocols, APIs, secure digital identity, interoperable digital identity Define minimum security requirements for the cloud identity service (PKI, relying or third parties,…)

Thank You Q&A