Identity & Access Management Conversation Karlien Vanden Eynde Product Marketing Manager.

Slides:



Advertisements
Similar presentations
Secure Single Sign-On Across Security Domains
Advertisements

Identity Network Ideals – Heterogeneity & Co-existence
Agenda 2 factor authentication Smart cards Virtual smart cards FIM CM
Brjann Brekkan Sr. Technical Product Manager Microsoft Corporation SESSION CODE: SIA321.
Office 365 Identity June 2013 Microsoft Office365 4/2/2017
Agenda AD to Windows Azure AD Sync Options Federation Architecture
Core identity scenarios Federation and synchronization 2 3 Identity management overview 1 Additional features 4.
Kim Cameron Integration Imperative Cloud Computing Compliance++ Compliance++ Mergers, Supply Chain, Outsourcing, Partnering, Globalization, …
2 3 Who are you? What are you allowed to do? How should your experience be personalized? How do I get apps that are provably securable and manageable?
Microsoft Identity Solutions
Implementing and Administering AD FS
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
1 Higgins 1: a species of Tasmanian long-tailed mouse 2: the name of an open source collaboration of IBM, Novell, Oracle, Parity…
Understanding Active Directory
Problem Statement AD DB App1 DB App2 AD App4 App6 AD App5 Intranet Extranet Cloud AD App3 DB SSO Separate Sign-in Separate Sign-in Separate Sign-in.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
A claims-based Identity Metasystem
SIM205. (On-Premises) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service)
Microsoft Identity and Access Solutions Market Trends and Futures
Christian Paquin Senior Program Manager Microsoft Corporation SESSION CODE: SIA305.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Virtual techdays INDIA │ august 2010 Secure Collaboration: All You Need to Know about Extending Active Directory Rights Management Services (AD RMS)
Matt Steele Senior Program Manager Microsoft Corporation SESSION CODE: SIA326.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Claims Based Authentication
Overview of Access and Information Protection
ARC312. Security Policy Governance Audit Reporting Analysis Data Quality Directory Logon Mobility Provisioning Development Access Control Authentication.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Single Sign-On with Microsoft Azure
Windows Azure Dave Glover Developer Evangelist Microsoft Australia Tel:
Configuring Directory Certificate Services Lesson 13.
Module 5 Configuring Authentication. Module Overview Lesson 1: Understanding Classic SharePoint Authentication Providers Lesson 2: Understanding Federated.
Tech Ed North America /24/2017 1:59 AM SESSION CODE: SIA327
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Microsoft ® Official Course Module 13 Implementing Windows Azure Active Directory.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Paul Andrew. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
Office 365 deployment choices Cutover, Staged, Hybrid What is AD FS (Active Directory Federation Services) Attribute Stores, ADFS Configuration Database.
© 2008 by Matt Flaherty & Mary Ruddy; made available under the EPL v1.0 Security & Identity : From present to future Matt Flaherty, IBM Mary Ruddy, Meristic.
The explosion of devices is eroding the standards-based approach to corporate IT. Devices Deploying and managing applications across platforms is.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
All Rights Reserved 2014 © CMG Consulting LLC Federated Identity Management and Access Andres Carvallo Dwight Moore CMG Consulting, LLC October
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Access resources in a federation partner organization.
Brian Puhl Principal Technology Architect MSIT Identity & Access Management Microsoft Corporation SESSION CODE: SIA302.
Uri Lichtenfeld Security Specialist Certified Security Solutions – Microsoft Partner SESSION CODE: SIA312.
Web Services Security Patterns Alex Mackman CM Group Ltd
Microsoft ® Forefront ™ Identity Manager 2010 Infrastructure Planning and Design Published: June 2010.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Linus Joyeux Valerie Alonso Managing consultantLead consultant blue-infinity (Switzerland) Active Directory Federation Services v2.
Slavko Kukrika MVP Connect Windows 10 to the Cloud – Cloud Join.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Alex Thissen | Achmea Designing and implementing a claims-based architecture Alex Thissen | Achmea Claim typeValue
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
EMS in action Hugh Simpson-Wells and Mark Riley 2016 Redmond Summit | Identity Without Boundaries
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Identity and Access Management
Secure Connected Infrastructure
Secure Single Sign-On Across Security Domains
Stop Those Prying Eyes Getting to Your Data
Data and Applications Security Developments and Directions
SaaS Application Deep Dive
The power of common identity across any cloud
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
9/13/2018 4:54 PM BRK How to get Office 365 to the next level with Azure Active Directory Premium Brjann Brekkan Program Manager Lead – Customer.
Office 365 Identity Management
Presentation transcript:

Identity & Access Management Conversation Karlien Vanden Eynde Product Marketing Manager

Agenda 13:30 – 14:30Wider Identity Conversation Kim Cameron 14:30 – 15:30Microsoft IAM: Business Needs and IT Challenges – Henk Den Baes 15:30 – 16:00Coffee Break 16:00 – 17:15FIM 2010: From Identity Synchronization to Identity Management – Federico Guerrini 17:15 – 17:20 Partner Offerings 17:20 – 18:00Networking & Cocktail

Digital Identity Discussion Kim Cameron Chief Architect of Identity

Identity The stuff of Poets and Philosophers Digital Identity

How the web and the world recognize us in different contexts Foundation for personalization The social “mouse” or “keyboard” Foundation for interaction, collaboration and social phenomena I can’t collaborate over time if I can’t recognize and refer to you Foundation for digital economy

Identity is a mosaic Disruptive ability and tendency to connect all information about individuals brings significant commercial and social risk Person’s need to traverse silos Person’s need for “contextual separation”

Architectural Problem The Internet was not designed with any way to know who you’re connecting to Patchwork quilt of kludges

8

The Claims Based Model

Claims-based model Abstraction layer: for authenticating, authorizing, obtaining information about users, devices and services Claim : statement that is in doubt made by one subject about another subject = Age > 21 Manager = Craig Wittenberg Role= Architect Primordial Claims: Passwords, Keys and Certificates Identity: Metasystem: open standards-based architecture for exchange of claims under user control Claims Transformer: matches impedance What is the Claims-Based Model? Write to model, let infrastructure adapt to environment

Flow in the Claims-Based Model Application: requires, uses claims to describe users Claims provider: supports protocols for issuing claims Relationship: context in which meaning of claims is defined Relationship 2. Get claims 3. Send claims 1. Require claims Claims Provider (Security Token Service) Claims Provider (Security Token Service) SUBJECT Application (requires Claims) Application (requires Claims)

New Claims Identity, Capabilities, Authorization Claims Transformation New semantics at domain boundaries Different issuer (for example “Local STS”) Transform from Identity to Capabilities Claims Augmentation Not just identifiers!! Claims Evaluation and Transform Policy + Claims How the Claims Service works

Where is the industry in the process? 13 Standards widely accepted – OASIS Interoperability deeply tested – OSIS Interoperability Testing and Liberty Alliance Platforms will finally have claims as a built-in feature Microsoft ADFS V2 Shipping now Part of Active Directory – expect wide adoption and deployment given no marginal cost COTS Software can count on claims “being there” Example: Microsoft flagship applications like SharePoint Great products by many vendors Cloud service adoption and strong competition Many proofs of concept by private enterprise and government

New initiatives in consumer space: OpenID 14 Metasystem model Big service providers are all supporting OpenID (Yahoo, AOL, Google, Windows Live, etc) Many small providers (e.g. universities) US Government support Widely available software for ISVs Severe security issues being worked on by the industry

Identity selector for OpenID 15

The Claims Architecture

Architecture, Starting with the Enterprise Microsoft Services Identity Backbone Identity Store Identity Store Enterprise Application Enterprise Application An Enterprise Roles, Properties Its Partner ? Identity Store Identity Store

Industry Standard Components Claims Microsoft Services Identity Backbone Identity Store Identity Store Identity Store Identity Store Claims Service Claims Service Claims Service Claims Service Enterprise Identity Backbone Roles, Properties Enterprise Application Enterprise Application Claims API Claims API

The Claims Service Claims Microsoft Services Identity Backbone Directory Identity Store Identity Store Enterprise Application Enterprise Application Claims API Claims API Claims Service Claims Service Claims Service Claims Service Enterprise Identity Backbone Database Claims Service Claims Service Partner

Architecture Works for Cloud, Too Claims Directory Identity Store Identity Store Cloud Application Cloud Application Claims API Claims API Claims Service Claims Service Claims Service Claims Service Cloud Service Identity Backbone Database Claims Service Claims Service Enterprise University

From Architecture To Off-The-Shelf Product

SharePoint Server Farm Exchange 2010 AD DS AD FS Business Partners AD DS AD FS AD RMS Federation Trust Application Access Redirect to Security Token Service (STS) Authentication Token and claims Post claims Trey Research Account Forest Woodgrove Bank Resource Forest User Account/Credentials Security Token Shared identity with partner organizations and cloud services Boost cross-organizational efficiency and communication with more secure access − Support the sharing of rights-protected messages between organizations − Improved support for Microsoft SharePoint Server as a claims-aware application Active Directory Federation Services

AD DSAD FS Implements a single user access model with native single sign on (SSO) and easier federation to on-premise and cloud services Helps provide consistent security with a single user access model externalized from applications Based on open, industry standard protocols for interoperability Security Token (e.g., Kerberos Ticket) AD FS creates SAML token Signs it with company’s private key Sends it back to the user Access supplied with the token Partner ExchangeSharePointWeb AppClaims-Aware Application Corporate User Single Sign On with Extended Collaboration CLOUD SERVICES

SSO for on-premises and in-cloud applications Native support for Web and application SSO (including multi-factor authentication) Addresses security risks and interoperability problems caused by extending business resources beyond the corporate network and across disparate systems Seamless Access to On-Premises and In-Cloud Web Apps AD DS Remote Employee Business Partners Web Apps Corporate User Auth. Token SSO In-Cloud On-Premises AD FS External users get authentication token from AD FS. Get seamless access to in-cloud and on-premises applications.

Managing the Use of Claims Provisioning Claims and Resources

Active Directory Lotus Domino LDAP SQL Server Oracle DB HR System FIM Workflow Manager Policy-based identity lifecycle management system Built-in workflow for identity management Automatically synchronize all user information to different directories across the enterprise Automates the process of on-boarding users User Enrollment Approval User provisioned on all allowed systems Identity Management User provisioning FIM CM

Forefront Identity Manager 2010 FIM Enables Identity-based Controls for Information Protection Enforced through Windows Server and Active Directory Rights Management Services FIM Enables Application and Network Access Controls Enforced in Forefront Unified Access Gateway FIM Enables Federation and Cloud-based Services FIM supplies data for claims, performs user account provisioning and deprovisioning, and manages smartcards or software certificates

FIM Enables Federation and Cloud FIM supplies ADFS with data for claims For example, construct a “role” claim based on data in FIM to use for authorization in place of security groups FIM supplies cloud-based services with user account provisioning and de-provisioning For services which need a copy of the directory FIM provisions users with smartcards or software certificates Enables users to leverage stronger authentication for access to cloud-based services than just a password

Increase access security beyond username and password solutions Streamline deployment by enrolling user and computer certificates without user intervention Simplify certificate and SmartCard management using Forefront Identity Manager (FIM) Enhance remote access security through certificates with Network Access Protection Stronger authentication through certificates for administrative access and management FIM Manages Primordial Claims HR System Active Directory Certificate Services (AD CS) FIM CM FIM User Enrollment and Authentication request sent by HR System FIM policy triggers request for FIM CM to issue certificate or SmartCard User is validated using multi- factor authentication FIM Certificate Management (CM) requests certificate creation from AD CS Certificate is issued to user and written to either machine or smart card End User SmartCard User ID and Password SmartCard End User

Workflow Management Enables IT to quickly define, automate, and enforce identity management policies IT can use the integrated workflow in the approval/rejection process Automatic notifications for request approvals or rejections

Directions Minimal Disclosure and Interscale Directory

Identity Provider Name:Alice Smith Address:1234 Pine, Seattle, WA D.O.B: Name:Alice Smith Address:1234 Pine, Seattle, WA D.O.B.: Important New Frontier: Minimal Disclosure Technology Relying Party

Identity Provider Relying Party Prove that you are over 21 and from WA Name:Alice Smith Address:1234 Pine, Seattle, WA D.O.B: Which adult from WA is this? Over-21 proof ? Minimal Disclosure Token

Minimal Disclosure Scenarios eID Birth certificate RP

Ordering a New Birth Certificate 35

Minimal Disclosure Scenarios eID Dating site RP

Visiting a Social Website 37

And finally … Towards a federated directory We need a directory metasystem that works holistically in the cloud, in enterprises and organizations, and on devices Shared architecture, data model and semantics, protocols, publication paradigm Policy framework for configuration Simple APIs integrated with developer platforms