identity & access management jonas syrstad

12
Identity & access management THE KEY TO THE FLEXIBLE WORKSPACE Jonas Syrstad, [email protected]

Upload: meandmine2

Post on 22-May-2015

494 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Identity & access management jonas syrstad

Identity & access management THE KEY TO THE FLEXIBLE WORKSPACE

Jonas Syrstad, [email protected]

Page 2: Identity & access management jonas syrstad

Disclaimer

Avoiding any specific implementation

No deep dive into the protocols

Focus on Enterprises

Page 3: Identity & access management jonas syrstad

Key elements; the 4 A’s

Administration

Authentication

Authorization

Auditing

Page 4: Identity & access management jonas syrstad

Administration

Identity synchronization Data flow

Ownership

Premission management Access

Rights

Page 5: Identity & access management jonas syrstad

Challenges

Ownership of data elements

Processes

Data flow

Page 6: Identity & access management jonas syrstad

Authentication

Trusted 3rd party

Claims based identity

Open standards WS-*

SAML

Page 7: Identity & access management jonas syrstad

Claims based identity

A Claim is a statement that is true or false

A Security token consists of one or many claims

Examples of claim types Name

Email

Gender

Group membership

Role

Page 8: Identity & access management jonas syrstad

Claims based identity architecture

Security tokens issued by a trusted 3rd party

Consumed by a relying party

Penetrates trust and technology boundaries

Page 9: Identity & access management jonas syrstad

Claims based identity architecture

Client(Browser,

mobile app, application)

Claims Provider(STS like ADFS)

Relying party(ASP.NET,

WCF service ++)

Trust relationship

1. Request access

2. Demand Security token

3. Request Security token

4. Provide security token

5. Submit security token

Page 10: Identity & access management jonas syrstad

Technologies

WS-*

SAML 2.0

OAuth

OpenId

Enterprise

Consumer

Hybrid

Page 11: Identity & access management jonas syrstad

Authorization

Determine what the user is allowed to do

An application responsibility

Device classification What

Where

When

Page 12: Identity & access management jonas syrstad

Auditing

Which applications does the users have access to?

How do we track a user across systems and modules Single view of user activity

Automated actions on breaches of protocol