SlideShare uma empresa Scribd logo
1 de 37
Role-Based Identity Management at Mazda Motor Europe Dr. Horst Walther [email_address]   Presented at the Cyprus Infosec - 4th International Conference on Information Security  at October 21 st  , 2004 in  Nicosia  / Cyprus.
The Focus - Mazda Motor Europe ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Project – Mazda User Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mazda Europe – dealers in the hierarchy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Corporate Hierarchy  MME NSC AR, AD CMA Principle Distributor IMT, ID AR, AD AR, AD Principle Car  operator Parts  operator Car  operator Parts  operator MLE MC
Why Roles – demand and warnings? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What are Roles – Origin ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What are Roles - The RBAC Model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: Ferraiolo, Sandhu, Gavrila: A Proposed Standard for Role-Based Access Control, 2000.
RBAC Model - Users ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],User User User User User User User User
RBAC Model - Roles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],User User User User User User User User Role Role Role Role Role
RBAC Model - Permissions ,[object Object],[object Object],[object Object],[object Object],[object Object],Permission Permission Permission Permission Permission Permission Permission Permission User User User User User User User User Role Role Role Role Role
RBAC Model - Permission Sets ,[object Object],Permission Permission Permission Permission Permission Permission Permission Permission Set Set Set Set User User User User User User User User Role Role Role Role Role
RBAC Model - Grants ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Permission Permission Permission Permission Permission Permission Permission Permission Set Set Set Set Grant Grant Grant Grant User User User User User User User User Role Role Role Role Role
Role Hierarchies ,[object Object],[object Object],[object Object],Role Hierarchy  AD NSC CMA MLE Distributor MME ,[object Object],Aggregation of privileges 0 + ++ +++ Role hierarchies are “inverse” to corporate hierarchies
Roles & related Concepts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],If (location == leverkusen)  parking space = true;
RBAC – The NIST Standard RBAC 0  : the minimum requirement  for an RBAC system ,[object Object],[object Object],RBAC 3   : RBAC 1  + RBAC 2 + + 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Security Policies ,[object Object]
Least Privilege Principle   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],limitation
Separation of Duties   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Barings Bank – an Example ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MAC - mandatory access control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DAC - discretionary access control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example -  RBAC for banking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Role Life Cycle Management   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Role Life Cycle Management II ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Role Life Cycle Management III ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How to find roles   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
From Processes to Roles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],activity activity activity process ,[object Object]
Advantages of RBAC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RBAC  – words of warning. ,[object Object],[object Object],[object Object],[object Object]
Pitfalls of RBAC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Where RBAC promises optimal results? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Organisational complexity Frequency of occurrence low high low high For highly sensitive jobs only Optimal efficiency Direct privilege assignment Worthwhile but risky
Best practise advice ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Outlook ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
S top,  A ppendix From here on the back-up-slides follow ...
References – Now there‘s even a book ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
References I ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reference II ,[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Scaling identity to internet proportions
Scaling identity to internet proportionsScaling identity to internet proportions
Scaling identity to internet proportionsOracleIDM
 
Gartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-finalGartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-finalOracleIDM
 
Identity Management: Tools, processes & services
Identity Management: Tools, processes & servicesIdentity Management: Tools, processes & services
Identity Management: Tools, processes & servicesJISC Netskills
 
Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0John Bernhard
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsAlain Huet
 
Ioug webcast entitlements in check
Ioug webcast entitlements in checkIoug webcast entitlements in check
Ioug webcast entitlements in checkOracleIDM
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management ProjectsHitachi ID Systems, Inc.
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0Ganesh Prasad
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oesOracleIDM
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copyOracleIDM
 
CrossIdeas Roadshow IBM IAM Governance Andrea Rossi
CrossIdeas Roadshow IBM IAM Governance Andrea RossiCrossIdeas Roadshow IBM IAM Governance Andrea Rossi
CrossIdeas Roadshow IBM IAM Governance Andrea RossiIBM Sverige
 

Mais procurados (17)

Scaling identity to internet proportions
Scaling identity to internet proportionsScaling identity to internet proportions
Scaling identity to internet proportions
 
Gartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-finalGartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-final
 
Sap grc-access-control-solution
Sap grc-access-control-solutionSap grc-access-control-solution
Sap grc-access-control-solution
 
Identity Management: Tools, processes & services
Identity Management: Tools, processes & servicesIdentity Management: Tools, processes & services
Identity Management: Tools, processes & services
 
Saipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_VitaeSaipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_Vitae
 
Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
 
Ioug webcast entitlements in check
Ioug webcast entitlements in checkIoug webcast entitlements in check
Ioug webcast entitlements in check
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
 
SAP GRC
SAP GRC SAP GRC
SAP GRC
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oes
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Hayat resume 1
Hayat resume 1Hayat resume 1
Hayat resume 1
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copy
 
CrossIdeas Roadshow IBM IAM Governance Andrea Rossi
CrossIdeas Roadshow IBM IAM Governance Andrea RossiCrossIdeas Roadshow IBM IAM Governance Andrea Rossi
CrossIdeas Roadshow IBM IAM Governance Andrea Rossi
 

Semelhante a Role-Based Identity Management at Mazda Motor Europe

Interview Questions For Microsoft Dynamics CRM
Interview Questions For Microsoft Dynamics CRMInterview Questions For Microsoft Dynamics CRM
Interview Questions For Microsoft Dynamics CRMKumari Warsha Goel
 
The Clean Architecture
The Clean ArchitectureThe Clean Architecture
The Clean ArchitectureDmytro Turskyi
 
A Proposed Security Model for Web Enabled Business Process Management System
A Proposed Security Model for Web Enabled Business Process Management SystemA Proposed Security Model for Web Enabled Business Process Management System
A Proposed Security Model for Web Enabled Business Process Management SystemCSCJournals
 
Identity & Access Governance versus Process Agility
Identity & Access Governance versus Process AgilityIdentity & Access Governance versus Process Agility
Identity & Access Governance versus Process AgilityHorst Walther
 
Automating Security Management in PBCS!
Automating Security Management in PBCS!Automating Security Management in PBCS!
Automating Security Management in PBCS!Dayalan Punniyamoorthy
 
IRJET- A Review On - Controlchain: Access Control using Blockchain
IRJET- A Review On - Controlchain: Access Control using BlockchainIRJET- A Review On - Controlchain: Access Control using Blockchain
IRJET- A Review On - Controlchain: Access Control using BlockchainIRJET Journal
 
Soa Taking Theory Into Real World Application
Soa Taking Theory Into Real World ApplicationSoa Taking Theory Into Real World Application
Soa Taking Theory Into Real World ApplicationDavid Linthicum
 
Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC NextLabs, Inc.
 
5(re dfd-erd-data dictionay)
5(re dfd-erd-data dictionay)5(re dfd-erd-data dictionay)
5(re dfd-erd-data dictionay)randhirlpu
 
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070retheauditors
 
Identity_Management_Vendor_Evaluation
Identity_Management_Vendor_EvaluationIdentity_Management_Vendor_Evaluation
Identity_Management_Vendor_EvaluationJerry Ruggieri
 
Falcon Security Essay
Falcon Security EssayFalcon Security Essay
Falcon Security EssayJennifer Wood
 
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...IRJET Journal
 

Semelhante a Role-Based Identity Management at Mazda Motor Europe (20)

Interview Questions For Microsoft Dynamics CRM
Interview Questions For Microsoft Dynamics CRMInterview Questions For Microsoft Dynamics CRM
Interview Questions For Microsoft Dynamics CRM
 
The Clean Architecture
The Clean ArchitectureThe Clean Architecture
The Clean Architecture
 
Data base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access methodData base Access Control a look at Fine grain Access method
Data base Access Control a look at Fine grain Access method
 
A Proposed Security Model for Web Enabled Business Process Management System
A Proposed Security Model for Web Enabled Business Process Management SystemA Proposed Security Model for Web Enabled Business Process Management System
A Proposed Security Model for Web Enabled Business Process Management System
 
Identity & Access Governance versus Process Agility
Identity & Access Governance versus Process AgilityIdentity & Access Governance versus Process Agility
Identity & Access Governance versus Process Agility
 
Automating Security Management in PBCS!
Automating Security Management in PBCS!Automating Security Management in PBCS!
Automating Security Management in PBCS!
 
IRJET- A Review On - Controlchain: Access Control using Blockchain
IRJET- A Review On - Controlchain: Access Control using BlockchainIRJET- A Review On - Controlchain: Access Control using Blockchain
IRJET- A Review On - Controlchain: Access Control using Blockchain
 
Soa Taking Theory Into Real World Application
Soa Taking Theory Into Real World ApplicationSoa Taking Theory Into Real World Application
Soa Taking Theory Into Real World Application
 
Opa in the api management world
Opa in the api management worldOpa in the api management world
Opa in the api management world
 
Sap basis and_security_administration
Sap basis and_security_administrationSap basis and_security_administration
Sap basis and_security_administration
 
Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC
 
5(re dfd-erd-data dictionay)
5(re dfd-erd-data dictionay)5(re dfd-erd-data dictionay)
5(re dfd-erd-data dictionay)
 
Soa To The Rescue
Soa To The RescueSoa To The Rescue
Soa To The Rescue
 
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
SAS 70 in a Post-Sarbanes, SaaS World: Quest Session 52070
 
Metamodel for reputation based agents system – case study for electrical dist...
Metamodel for reputation based agents system – case study for electrical dist...Metamodel for reputation based agents system – case study for electrical dist...
Metamodel for reputation based agents system – case study for electrical dist...
 
Overview Of RBAC
Overview Of RBACOverview Of RBAC
Overview Of RBAC
 
Identity_Management_Vendor_Evaluation
Identity_Management_Vendor_EvaluationIdentity_Management_Vendor_Evaluation
Identity_Management_Vendor_Evaluation
 
Falcon Security Essay
Falcon Security EssayFalcon Security Essay
Falcon Security Essay
 
Soa 2013
Soa 2013Soa 2013
Soa 2013
 
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
 

Mais de CardinaleWay Mazda (20)

Playboy Mazda Cup Racing Schedule
Playboy Mazda Cup Racing SchedulePlayboy Mazda Cup Racing Schedule
Playboy Mazda Cup Racing Schedule
 
Mazda Tribute Ford Escape Gear Product List
Mazda Tribute Ford Escape Gear Product ListMazda Tribute Ford Escape Gear Product List
Mazda Tribute Ford Escape Gear Product List
 
Mazda Rx 8 Compressor
Mazda Rx 8 CompressorMazda Rx 8 Compressor
Mazda Rx 8 Compressor
 
Mazda Rx7 Ignition Operation
Mazda Rx7 Ignition OperationMazda Rx7 Ignition Operation
Mazda Rx7 Ignition Operation
 
Mazda Foundation Form
Mazda Foundation FormMazda Foundation Form
Mazda Foundation Form
 
Mazda Domain Name Dispute Wiho
Mazda Domain Name Dispute WihoMazda Domain Name Dispute Wiho
Mazda Domain Name Dispute Wiho
 
Mazda Catalog
Mazda CatalogMazda Catalog
Mazda Catalog
 
Mazda Case
Mazda CaseMazda Case
Mazda Case
 
Mazda3
Mazda3Mazda3
Mazda3
 
Mazda Price List 2007
Mazda Price List 2007Mazda Price List 2007
Mazda Price List 2007
 
Mazda Challenge Rules
Mazda Challenge RulesMazda Challenge Rules
Mazda Challenge Rules
 
Haltech Mazda3
Haltech Mazda3Haltech Mazda3
Haltech Mazda3
 
Mazda Zoro Talk
Mazda Zoro TalkMazda Zoro Talk
Mazda Zoro Talk
 
Mazda Rotary Engine Conversion Prototype
Mazda Rotary Engine Conversion PrototypeMazda Rotary Engine Conversion Prototype
Mazda Rotary Engine Conversion Prototype
 
Xarsxthroughxthexages 002
Xarsxthroughxthexages 002Xarsxthroughxthexages 002
Xarsxthroughxthexages 002
 
Mazda versus Vette Performance
Mazda versus Vette PerformanceMazda versus Vette Performance
Mazda versus Vette Performance
 
Weighted Score And Topsis
Weighted Score And TopsisWeighted Score And Topsis
Weighted Score And Topsis
 
What Can Be Done Ip Litigation Prall
What Can Be Done Ip Litigation PrallWhat Can Be Done Ip Litigation Prall
What Can Be Done Ip Litigation Prall
 
Mazda Trio Notes
Mazda Trio NotesMazda Trio Notes
Mazda Trio Notes
 
Mazda Trio Meeting
Mazda Trio MeetingMazda Trio Meeting
Mazda Trio Meeting
 

Último

John Deere 7430 7530 Tractors Diagnostic Service Manual W.pdf
John Deere 7430 7530 Tractors Diagnostic Service Manual W.pdfJohn Deere 7430 7530 Tractors Diagnostic Service Manual W.pdf
John Deere 7430 7530 Tractors Diagnostic Service Manual W.pdfExcavator
 
꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...
꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...
꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...Hot Call Girls In Sector 58 (Noida)
 
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂Hot Call Girls In Sector 58 (Noida)
 
Bandra Escorts, (*Pooja 09892124323), Bandra Call Girls Services
Bandra Escorts, (*Pooja 09892124323), Bandra Call Girls ServicesBandra Escorts, (*Pooja 09892124323), Bandra Call Girls Services
Bandra Escorts, (*Pooja 09892124323), Bandra Call Girls ServicesPooja Nehwal
 
Why Won't Your Subaru Key Come Out Of The Ignition Find Out Here!
Why Won't Your Subaru Key Come Out Of The Ignition Find Out Here!Why Won't Your Subaru Key Come Out Of The Ignition Find Out Here!
Why Won't Your Subaru Key Come Out Of The Ignition Find Out Here!AutoScandia
 
Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...
Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...
Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...Hot Call Girls In Sector 58 (Noida)
 
Greenery-Palette Pitch Deck by Slidesgo.pptx
Greenery-Palette Pitch Deck by Slidesgo.pptxGreenery-Palette Pitch Deck by Slidesgo.pptx
Greenery-Palette Pitch Deck by Slidesgo.pptxzohiiimughal286
 
How To Fix Mercedes Benz Anti-Theft Protection Activation Issue
How To Fix Mercedes Benz Anti-Theft Protection Activation IssueHow To Fix Mercedes Benz Anti-Theft Protection Activation Issue
How To Fix Mercedes Benz Anti-Theft Protection Activation IssueTerry Sayther Automotive
 
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一meq5nzfnk
 
(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...
(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...
(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...Hot Call Girls In Sector 58 (Noida)
 
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdfSales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdfAggregage
 
John deere 425 445 455 Maitenance Manual
John deere 425 445 455 Maitenance ManualJohn deere 425 445 455 Maitenance Manual
John deere 425 445 455 Maitenance ManualExcavator
 
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Full night Service for more than 1 person
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Full night Service for more than 1 personDelhi Call Girls Saket 9711199171 ☎✔👌✔ Full night Service for more than 1 person
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Full night Service for more than 1 personshivangimorya083
 
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhiHauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhiHot Call Girls In Sector 58 (Noida)
 
꧁ ୨ Call Girls In Radisson Blu Plaza Delhi Airport, New Delhi ❀7042364481❀ Es...
꧁ ୨ Call Girls In Radisson Blu Plaza Delhi Airport, New Delhi ❀7042364481❀ Es...꧁ ୨ Call Girls In Radisson Blu Plaza Delhi Airport, New Delhi ❀7042364481❀ Es...
꧁ ୨ Call Girls In Radisson Blu Plaza Delhi Airport, New Delhi ❀7042364481❀ Es...Hot Call Girls In Sector 58 (Noida)
 
What Could Cause Your Subaru's Touch Screen To Stop Working
What Could Cause Your Subaru's Touch Screen To Stop WorkingWhat Could Cause Your Subaru's Touch Screen To Stop Working
What Could Cause Your Subaru's Touch Screen To Stop WorkingBruce Cox Imports
 
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111Sapana Sha
 
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...Delhi Call girls
 

Último (20)

John Deere 7430 7530 Tractors Diagnostic Service Manual W.pdf
John Deere 7430 7530 Tractors Diagnostic Service Manual W.pdfJohn Deere 7430 7530 Tractors Diagnostic Service Manual W.pdf
John Deere 7430 7530 Tractors Diagnostic Service Manual W.pdf
 
꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...
꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...
꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...
 
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂
 
Bandra Escorts, (*Pooja 09892124323), Bandra Call Girls Services
Bandra Escorts, (*Pooja 09892124323), Bandra Call Girls ServicesBandra Escorts, (*Pooja 09892124323), Bandra Call Girls Services
Bandra Escorts, (*Pooja 09892124323), Bandra Call Girls Services
 
Why Won't Your Subaru Key Come Out Of The Ignition Find Out Here!
Why Won't Your Subaru Key Come Out Of The Ignition Find Out Here!Why Won't Your Subaru Key Come Out Of The Ignition Find Out Here!
Why Won't Your Subaru Key Come Out Of The Ignition Find Out Here!
 
Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...
Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...
Alina 7042364481 Call Girls Service Pochanpur Colony - independent Pochanpur ...
 
Call Girls In Kirti Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Kirti Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In Kirti Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Kirti Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Greenery-Palette Pitch Deck by Slidesgo.pptx
Greenery-Palette Pitch Deck by Slidesgo.pptxGreenery-Palette Pitch Deck by Slidesgo.pptx
Greenery-Palette Pitch Deck by Slidesgo.pptx
 
How To Fix Mercedes Benz Anti-Theft Protection Activation Issue
How To Fix Mercedes Benz Anti-Theft Protection Activation IssueHow To Fix Mercedes Benz Anti-Theft Protection Activation Issue
How To Fix Mercedes Benz Anti-Theft Protection Activation Issue
 
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一
定制多伦多大学毕业证(UofT毕业证)成绩单(学位证)原版一比一
 
(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...
(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...
(COD) ̄Young Call Girls In Dwarka , New Delhi꧁❤ 7042364481❤꧂ Escorts Service i...
 
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdfSales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
 
John deere 425 445 455 Maitenance Manual
John deere 425 445 455 Maitenance ManualJohn deere 425 445 455 Maitenance Manual
John deere 425 445 455 Maitenance Manual
 
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Full night Service for more than 1 person
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Full night Service for more than 1 personDelhi Call Girls Saket 9711199171 ☎✔👌✔ Full night Service for more than 1 person
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Full night Service for more than 1 person
 
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhiHauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
Hauz Khas Call Girls ☎ 7042364481 independent Escorts Service in delhi
 
꧁ ୨ Call Girls In Radisson Blu Plaza Delhi Airport, New Delhi ❀7042364481❀ Es...
꧁ ୨ Call Girls In Radisson Blu Plaza Delhi Airport, New Delhi ❀7042364481❀ Es...꧁ ୨ Call Girls In Radisson Blu Plaza Delhi Airport, New Delhi ❀7042364481❀ Es...
꧁ ୨ Call Girls In Radisson Blu Plaza Delhi Airport, New Delhi ❀7042364481❀ Es...
 
What Could Cause Your Subaru's Touch Screen To Stop Working
What Could Cause Your Subaru's Touch Screen To Stop WorkingWhat Could Cause Your Subaru's Touch Screen To Stop Working
What Could Cause Your Subaru's Touch Screen To Stop Working
 
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111
ENJOY Call Girls In Okhla Vihar Delhi Call 9654467111
 
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
Call Girls in Malviya Nagar Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts Ser...
 

Role-Based Identity Management at Mazda Motor Europe

  • 1. Role-Based Identity Management at Mazda Motor Europe Dr. Horst Walther [email_address] Presented at the Cyprus Infosec - 4th International Conference on Information Security at October 21 st , 2004 in Nicosia / Cyprus.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. S top, A ppendix From here on the back-up-slides follow ...
  • 35.
  • 36.
  • 37.

Notas do Editor

  1. First let’s give some characterising basic key data: MME (Mazda Motors Europe) is the headquarters, based in Leverkusen / Germany not far from Cologne and Düsseldorf at the banks of the river Rhine. Most of the European logistics and Information processing is done in Mazda Logistics Europe (MLE) in Willebroek / Belgium near Antwerpen. As sales are local business, it’s the responsibility of national sales companies (NSC) in the major European markets and Distributors in emerging or smaller markets. The NSC’s basically service their connected authorised dealers (AR) and authorised repairers (AR). In the most prominent market, Germany, several central marketing areas (CMA) are defined in order to enable common activities among the local dealers. Gently forced by the European commission through it’s so called ‘group exemption regulation’ we need to support independent motor traders (IMT) and independent distributors (ID) as well. The dealers and their employees by far outnumber the ~ 500 employees of Mazda in Europe. We assume, that the actual number of dealers is about 2,500 and that each dealer has delegated access to the system to 2 – 3 of his employees, resulting in 5,000 – 7,500 users at present and an estimated number of ~ 10.000 over the next 3 years.
  2. 1.1       Why roles? So why did we come across with role engineering? Well, we simply need some categorisation of our users as the B2B-Portal requires a basis for personalisation and access control, the proposed workflow-systems demands for similar information and the Indentity Management Software from Netegrity can do it’s job more smoothly and transparently by using roles. Nevertheless, we have been warned. In-house our administrators reported, that they couldn’t recognise any clear privilege pattern for most of the in-house users and predicted as much roles as we do have users – if not more. Additionally the role engineering related literature is full of hidden or even direct hints that those few brave and noble fighters, who would successfully complete a project to introduce role based access control (RBAC) would be guaranteed a seat in the hall of fame. Well that’s not what we are aiming for. Instead, we are deeply convinced that roles represent a very natural way to describe organisational structures. It is obvious, that in existing organisations entitlements and restrictions are determined by several different dimensions … This list is far from being complete, but only few of these determining dimensions lead to own roles (e.g. Hierarchy and Function). The others have to be dealt with differently.
  3. The idea of cross-platform user administration goes back to the late eighties when software companies first saw the need to develop tools, which allowed maintaining users and their privileges on corporate level across all of their production systems in one step. At about the same time researchers in the US worked on methods for access control based on roles (RBAC), an ordering scheme, which originates from the organization theory. When the first tools for cross-platform security administration appeared on the market around the middle of the nineties, it became apparent that the abstraction of the access control concept using role semantics was necessary to exploit the full potential of these administration tool. At the same time, research provided the first formal role models.
  4. The central idea behind roles is to simplify authorisation management by associating permissions with a role and then assigning this role to a user. Roles are often used in applications to enforce policy. For example, an application might impose limits on the size of the transaction being processed depending on whether the user making the request is a member of a specified role. A bank teller might have permission to process transactions only less than a specified threshold, supervisors might have a higher limit, and managers might have a higher limit, etc. In other words, roles can be related to various job positions and the permissions associated with them. A way to look at Roles is the collection of resources and permissions associated with a class of user(s). The class will be granted a consistent set of services based upon their Role. Roles are often equal to job functions in many organisations. Currently, different administrators or application vendors have different definitions of roles. As this situation may serve as a source for confusion, we therefore henceforth will refer to the deserving research of the National Institute of Standards and Technology (NIST).
  5. First let’s give some characterising basic key data: MME (Mazda Motors Europe) is the headquarters, based in Leverkusen / Germany not far from Cologne and Düsseldorf at the banks of the river Rhine. Most of the European logistics and Information processing is done in Mazda Logistics Europe (MLE) in Willebroek / Belgium near Antwerpen. As sales are local business, it’s the responsibility of national sales companies (NSC) in the major European markets and Distributors in emerging or smaller markets. The NSC’s basically service their connected authorised dealers (AR) and authorised repairers (AR). In the most prominent market, Germany, several central marketing areas (CMA) are defined in order to enable common activities among the local dealers. Gently forced by the European commission through it’s so called ‘group exemption regulation’ we need to support independent motor traders (IMT) and independent distributors (ID) as well. The dealers and their employees by far outnumber the ~ 500 employees of Mazda in Europe. We assume, that the actual number of dealers is about 2,500 and that each dealer has delegated access to the system to 2 – 3 of his employees, resulting in 5,000 – 7,500 users at present and an estimated number of ~ 10.000 over the next 3 years.
  6. There are three concepts, which are frequently confused: roles, rules and groups. The confusion originated very much from inaccurate use of the terms isolated from their original context and from reluctant abbreviation of their accurate form. As proposed by the NIST roles can be understood as groupings of cross system privileges on enterprise level. Although rarely defined explicitly, when “groups” are mentioned, they are used as groupings of users. Hence, the general term “group” cannot be used for discrimination with sufficient clarity. To add to this confusion some implementers implement roles through dynamic groups while at the same time maintaining user groups - without being able to clearly state the inherent differences. Rules in contrast to these both statically usable grouping constructs only unfold their power when interpreted at runtime. Rules are generally understood as general expressions using symbolic variables and Boolean or even arithmetic operators. They might be nested using brackets as commonly used delimiters. All three concepts may be used independently but it is recommended to combine them in balanced way in order to achieve optimal modelling results. While dealing with the semantics of user management terms it should be mentioned, that throughout this conference paper the terms entitlement, privilege, access right and permission are used synonymously.
  7. RBAC is now an American National Standard - ANSI INCITS 359-2004 (approved 19 Feb 04). The NIST RBAC Models offer four increasingly powerful yet increasingly demanding variations with respect to implementation. These fine-grained variants allow less sophisticated implementing systems to realise a subset of the full-blown RBAC set rather than failing completely by not complying with the maximum requirements. RBAC0 The minimum requirement for an RBAC system, comparatively easy to implement, but limited in modeling power. RBAC1 Is based on RBAC0 and adds role hierarchies for expressing inheritance relationships. RBAC2 Is based on RBAC0 and adds constraints for expressing restrictions imposed by the enforcement of corporate policies.. RBAC3 Is a combination of both enhancements from RBAC1 and from RBAC2 .
  8. Separation of duties (SoD) is determined from organizational policy. RBAC facilitates splitting administration of the role-user relationship from that of the role-permission relationship . Since many users in an organization typically perform similar functions and have similar access rights, user functions are separated by role. Separation of duties requires that for particular sets of transactions, no single role be allowed to execute all transactions within the set. As an example, there are separate transactions needed to initiate a payment and to authorize a payment. No single role should be capable of executing both transactions. Separation of duties by role is valuable in deterring fraud since fraud can occur if an opportunity exists for collaboration between various job-related capabilities. A role can be further qualified with affiliation. A person’s access could be limited to a geographic or departmental boundary. For example, a role of branch manager could be qualified by an affiliation to a particular branch thereby conferring branch manager permission only within that branch. Both static and dynamic forms of separation exist. Static separation (SSD) means that roles which have been specified as mutually exclusive cannot be included together in a user's set of authorized roles. Dynamic separation (DSD) means that while users may be authorized for roles that are mutually exclusive, those exclusive roles cannot be active at the same time. In other words, static separation of duty enforces the mutual exclusion rule at the time of role definition while dynamic separation of duty enforces the rule at the time roles are selected for execution by a user.
  9. One step, that cannot be done mechanically is the detection of candidates and the subsequent design of roles. As this information is not available explicitly, it must be generated in a non-deterministic reverse engineering process. This step requires good knowledge of the business domain, some experience at least in related business modelling areas and a sound portion of intuition. Watch out for … User categories – List each type of user that requires access to corporate online resources. For example: employees, partners, suppliers, customers, and investors. Jobs – List jobs within each user category. For example in the Employees group, there are several jobs (Director, Manager, Supervisor, Accountant, Sales Representative, Researcher, Designer, and so on) whereas in the Customer group there might be only two (Registered Customer and Guest). Job functions – List business operations within each user and job category. For example, the Sales Representative submits orders, views orders for the district, manages customer complaints, and accesses the company intranet. Registered Customers submit orders, check account status, and check a web site for special incentives for current customers. Aggregate job functions – Identify job functions that everyone, or large numbers of users, perform. Whenever possible, job functions should be consolidated. For example, all Employees use the company intranet; all sales personnel can view order status. Job tasks – List each task in each job function. For example, for using the company intranet, there might be two tasks in that role: view intranet and print intranet pages. When to use groups – Determine when groups are preferable to roles. Groups are best used when there are a low number of users working in a static environment for a specified period. For this situation, groups can be an excellent organization unit that can be easily created and then deleted. Groups are also best suited to support self-subscribing interest areas. Users can easily join and remove themselves from the group requiring minimal, if any, administrator support.
  10. Aus unser Sicht muss sich die Auswahl der Identity Management- Lösungen an den Geschäftsprozessen orientieren. Diese Betrachtungsweise identifiziert die Bereiche, in denen Identity Management vordringlich ist und erlaubt auch eine gezielte Auswahl der erforderlichen Technologien. In dieser Methodik geht es darum, die Rolle von Lieferanten, Mitarbeitern und Kunden in den Geschäftsprozessen zu analysieren und zu gewichten. Daraus lässt sich ableiten, welche Rolle die jeweiligen Gruppen und ihre Identitäten für die Gestaltung von Geschäftsprozessen spielen. Auf dieser Basis lassen sich dann wiederum die erforderlichen Funktionen des Identity Management ermitteln.
  11. Roles are static constructs relying on a minimum stability of the defining business environment. For some cases they turn out to be too static, i.e. too difficult to keep current. This objection is specifically true for dynamic business functions and dynamic industries. For cases like this augmentation of roles by executable business rules may help. Rules can m odify or restrict role-based entitlements e.g. only modify sales data in your territory. They can create additional entitlements not based on roles e.g. anyone in “corporate” gets HQ building access. Thus, they can be used to complement roles. Obviously the effects of role based entitlement assignment can be misunderstood and simply done wrong. From early lessons learned the advice can be given: Don’t try to represent all user entitlement requirements in Roles. Role proliferation is a serious management problem anyway and a security issue too, as security is truly a direct function of transparency and simplicity. Easily situations can be constructed, where role inflation occurs, resulting in more roles than users. Not surprisingly inappropriate design may adversely affect transparency and, even worse, let the situation deteriorate, it was intended to improve. If on the other hand a radically dynamic approach is followed, data requirements for rules may be difficult to meet, especially with respect to availability and reliability.
  12. Frequently occurring business functions with low or medium complexity obviously promise best result to effort ratios. Those functions are most commonly found at the lower end of the traditional enterprise pyramid, where operational functions are located. Here is clearly a good starting point for role engineering. The nearer the role engineer comes to the headquarters and the more he moves up the corporate hierarchy the more difficult his task becomes. The portfolio diagram may serve as a guideline while looking for a good starting point for role engineering.