Identity in the Cloud (ID-Cloud) Towards standardizing Cloud Identity www.oasis-open.org.

Slides:



Advertisements
Similar presentations
© 2012 Open Grid Forum Simplifying Inter-Clouds October 10, 2012 Hyatt Regency Hotel Chicago, Illinois, USA.
Advertisements

Impacts of 3 rd Party IaaS on broadband network operations and businesses Prabhat Kumar Managing Partner, i 3 m 3 Solutions.
Prepared for [xxxx] – Commercial in Confidence connect transform protect A Cloudy Cyberspace? Tony Roadknight – Technical Architect.
Office 365 Identity June 2013 Microsoft Office365 4/2/2017
All Contents © 2003 Burton Group. All rights reserved. Identity Management Market Update Prepared for Cal State Universities Mike Neuenschwander senior.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
1 Security on OpenStack 11/7/2013 Brian Chong – Global Technology Strategist.
FIA Workshop March, 17, 2014 A multi-PaaS application management system Panagiotis Gouvas (SingularLogic)
Network Identity Kai Kang 27 th October Outline Introduction –Definition –Five drivers –Basic services –Roadmap Network Identity management approaches.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
EbXML Registry Technical Committee n Defining and managing interoperable registries and repositories n The OASIS ebXML Registry TC develops specifications.
Geneva, Switzerland, 4 December 2014 ITU-T Study Group 17 activities in the context of digital financial services and inclusion: Security and Identity.
Oasis Identity in the Cloud (IDCloud) Towards standardizing Cloud Identity Anil Saldhana ( Red Hat), Co-Chair Gershon Janssen, Secretary
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
DOCUMENT #:GSC15-PLEN-64 FOR:Presentation or Information SOURCE:TTA AGENDA ITEM:Plenary 6.14 CONTACT(S):{kipark, chan, Kishik Park, Kangchan.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
NIST Information Technology Laboratory Cloud Computing Program NIST Cloud Computing Program Current Activities Robert Bohn OASIS – International Cloud.
Oracle Confidential – Internal/Restricted/Highly RestrictedCopyright © 2014, Oracle and/or its affiliates. All rights reserved. | Oracle Identity Management.
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
Orchestrating Trusted Cloud Serviced Using TOSCA Simon Moser Cloud Computing Architect & co-chair of the TOSCA Technical Committee IBM.
TOSCA Topology and Orchestration Specification for Cloud Applications International Cloud Symposium October 10-12, 2012 Paul Lipton, VP Industry Standards,
Interoperability in the Cloud By Alex Espinoza
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
SAML Right Here, Right Now Hal Lockhart September 25, 2012.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Gershon Janssen 11 th October 2011 London Privacy Management Reference Model International Cloud Symposium 2011.
SCIM Use Cases Phil Hunt, Bhumip Khasnabish, Anthony.
Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper
SAML 2.1 Building on Success. Outline n Summary of SAML 2.0 n Work done since 2.0 n Objectives of SAML 2.1 n Proposed Task List n Undecided Issues n Invitation.
System Infrastructure Services (Iaas) Business Services Information Services Application Services (SaaS) Application Infrastructure.
Authority of Information Technology Application National Center of Digital Signature Authentication Ninh Binh, June 25, 2010.
UNCLASSIFIED 1 Authorization and Attribute Service Tiger Team (AATT) Update & Status January 13, 2008
© Cloud Security Alliance, 2015 Evelyn de Souza Chair Cloud Security Alliance Data Governance Chair/ Data Privacy and Compliance Leader Cisco Systems.
DOCUMENT #:GSC15-PLEN-82r2 FOR:Presentation SOURCE:ATIS AGENDA ITEM: PLEN 6.14 CONTACT(S): Andrew White ATIS’
ID-cloud GAP analysis work overview Prepared for F2F May 16-17, 2012 Redmond, WA Gershon Janssen, secretary ID-Cloud TC.
Cloud computing Cloud Computing1. NIST: Five essential characteristics On-demand self-service Computing capabilities, disks are demanded over the network.
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
OASIS Cloud Authorization TC (CloudAuthZ) Rakesh Radhakrishnan, TC Member.
Federated Identity Management
SSO Challenge s Implementing Identity Management: ADFS and Azure AD Hugh Valentine Head of Business Development Cloud Point Steve Rastall Managing Director.
3rd Helix Nebula Workshop on Interoperability among e-Infrastructures and Commercial Clouds Carmela ASERO, EGI.eu 17 September 2013, Madrid
INDIGO – DataCloud Security and Authorization in WP5 INFN RIA
Cloud Computing Security With More Than 50 Years Of Security And Enterprise Experience Cloud Raxak Automating Cloud Security. Cloud Raxak automates and.
Enterprise Security Program Overview Presenter: Braulio J. Cabral NCI-CBIIT/caBIG Enterprise Security Program Coordinator.
INTRODUCTION TO CLOUD COMPUTING. CLOUD  The expression cloud is commonly used in science to describe a large agglomeration of objects that visually appear.
1 Authorization Federation in Multi-Tenant Multi-Cloud IaaS Navid Pustchi Advisor: Prof. Ravi Sandhu.
OASIS IDtrust Member Section June Leung Chair, OASIS IDtrust Member Section Steering Committee
Introduction To Cloud Computing By Diptee Chikmurge And Minakshi Vharkate Asst.Professor MIT AOE Alandi(D),Pune.
Web 2.0: Concepts and Applications 6 Linking Data.
ISO - Cloud Computing Standards 1 Cloud Computing Standards ISO Addresses the Challenge Cloud Computing Standards ISO Addresses the Challenge
Oasis Identity in the Cloud (IDCloud) Towards standardizing Cloud Identity Anil Saldhana ( Red Hat), Co-Chair Gershon Janssen, Secretary.
Access Policy - Federation March 23, 2016
eHealth Standards and Profiles in Action for Europe and Beyond
Goodbye to Passwords.
Shibboleth Roadmap
Data and Applications Security Developments and Directions
Recommendation 6: Using ‘cloud computing’ to meet the societal need ‘Faster and transparent access to public sector services’ Cloud computing Faster and.
Federated IdM Across Heterogeneous Clouding Environment
Enterprise IT Brokerage Services
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Cloud Computing Kelley Raines.
Secure & Unified Identity
Company Overview & Strategy
Developing a Baseline On Cloud Security Jim Reavis, Executive Director
Privacy Management Reference Model (PMRM) A formal reference model for data privacy.
Device Registration and Multi-Factor Authentication
Presentation transcript:

Identity in the Cloud (ID-Cloud) Towards standardizing Cloud Identity

Cloud Identity Management n TC works to address Identity Management challenges related to Cloud Computing n Cloud Identity Management is considered a top security concern n Identity Management is not completely solved at Enterprise level l Standards are evolving n Cloud is a new paradigm, so the same problems in new packaging

What is it we do? 3 Main objectives: n Identifying detailed Use Cases l Identity deployment, provisioning and management in a cloud context n Define Interoperability Profiles for Identity in the Cloud l Profiles will be based on use and combinations of existing standards, protocols and formats n Gap Analysis of existing Identity Management standards and protocols when applied in the context of Cloud l Based on Use Cases and Interoperability Profiles l Feed analysis back to the WG responsible for a standard

What is it we do? n Other objectives: l Glossary on Cloud Identity n Harmonized set of definitions, terminologies and vocabulary on Identity in the context of Cloud l Do not re-invent the wheel n Build on existing standards and specifications l Strong liaison relationships with other international working groups n ITU-T, Cloud Security Alliance

How serious are we about this? n Our Technical Committee chairs are: l Anil Saldhana (Red Hat) l Tony Nadalin (Microsoft) n Amongst the member of the Technical Committee are: l Red Hat, IBM, Microsoft, CA Technologies, Cisco Systems, SAP, EBay, Novell, Ping Identity, Safe Net, Symantec, Boeing Corp, US DOD, Verisign, Akamai, Alfresco, Citrix, Cap Gemini, Google, Rackspace, Axciom, Huawei, Symplified, Thales, Conformity, Skyworth TTG, MIT, Jericho Systems, PrimeKey, Aveksa, Mellanox, Vanguard Integrity Professionals, NZ Govt...

Current Status n Three stages: l Use Case formalization (ETA: May/June ’11) l Defining the Interoperability Profiles for Identity in the Cloud (ETA: December ’11) l Gap Analysis of existing Identity Management Standards

Details on Use Cases n Received 35 Use Cases of Identity Management in the Cloud l Structure of Use Cases: n Description / user story n Goal / Desired outcome n Categories covered n Applicable Deployment Models n Actors n Systems n Notable Services n Dependencies n Assumptions n Process Flow

Details on Use Cases n Categorizations: l Authentication n Single Sign On (SSO) n Multi factor Authentication l Infrastructure Identity Establishment l General Identity Management n Infrastructure IdM n Federated IdM l Authorization l Account & Attribute Management n Account & Attribute Provisioning l Security Tokens l Audit & Compliance

Details on Use Cases n Applicable Deployment and Service Models: l Deployment Models: n Private n Public n Community n Hybrid l Service Models: n SaaS n PaaS n IaaS n Other

Details on Use Cases n High Ranked Use Cases: l Managing Identities at all levels in the Cloud l Need for Federated Single Sign On across multiple environments l Enterprise to Cloud SSO l Auditing l Multi-factor Authentication for Privileged User Access

Resources n OASIS Technical Committee Homepage n OASIS Technical Committee Wiki n Wiki Page with links to member submissions