SlideShare uma empresa Scribd logo
1 de 30
Baixar para ler offline
IDENTITY SOUFFLE
CREATING A WELL-BAKED IDENTITY LIFECYCLE
Pamela Dingle
@pamelarosiedee
Office of the CTO, Ping Identity
•  Heckler Policy
•  Platitudes
•  Meal Plan
•  Pantry Management (data at
rest)
•  Shopping – (data movement)
•  Kitchen Techniques (handling
data)
Agenda
This track is about breadth not depth
What does it mean to Manage Identities
•  Before you can chop
•  Before you can bake
•  Before you can serve
•  You need to know what
you’re trying to make
•  You have to have the right
ingredients in your pantry
Preparation is the key – Identity is State
“I” comes before “A” in IAM
1.  Create and maintain an
accurate picture of the
people, policies, and
resources in your
Enterprise
2.  Leverage that state to
protect and enable
Identity like Cooking is GIGO (garbage in, garbage out)
•  You can have the best
security in the world
– But it won’t help you if
decisions are based on
outdated identity
information
Review the Meal Plan Attribution: Daniel Headrick, G
Pantry Management : Identity Lifecycle
•  Accurate, timely knowledge of who and what constitutes your
Enterprise
–  Every system needs the right set of data in its reach
•  Accounts
•  Resources
•  Policies
–  Data must change everywhere when it is changed at the
authoritative source
•  You know you’re doing it wrong when
–  Your SOX audit finds dead people in application databases
–  It takes 5 days for a new hire to get access to applications
–  A fired employee can walk to Starbucks and download critical
business info from cloud applications
–  An employee has to chase a 100 application admins to change
their name
The Units of User Identity Lifecycle
•  Account
–  A relationship between a user and a
system
•  Identifier
–  Unique keys or “handles” for accounts
•  Username
•  GUID
•  Attribute
–  Distinct piece of information
•  Often a name/value pair
•  Values can be complex
•  Aka: Claim
•  Eg:
–  Name: Pamela
•  Where does data originate?
•  Where should it change?
•  What systems should also
change when authoritative
systems change?
•  Note this only shows data
replication, not the tools that
do the detecting or moving
•  Principle: SSOT or DRY
Track Data Relationship
Start by looking at Data at Rest
SOR HR System
Authoritative for: Account Status
name
department
employee#
Repo: Active Directory
Authoritative for: Identifier
email
groups
password
SOR: Social Networks
Authoritative for: Login Credential
nickname
Repo: MySQL
Authoritative for: Identifier
roles
enrollment date
Internal Apps
Internal APIs
Attribute Provider:
Billing System
Authoritative for: current plan
$$ spent
plan expiry
CC number
Sales Rep
Cloud Apps
Identifiers
•  Identifiers have a scope
–  Not every identifier is globally unique
–  Not every identifier has to be human readable
–  Identifiers can co-exist
•  Advice: standardize one “login id”
–  Best usability for users
–  Federation systems help here
•  Can map user-known id to system-known id
–  Maps may need to be maintained
Accounts
•  Presence/Status of Account is a preliminary access gate
•  When access is needed, pressure to create account is high
–  When access is discarded, no such pressure exists
•  Many [cloud] apps refuse to delete accounts
–  Only disable them
–  Discrepancies can cause havoc
–  Advice: create an identifier recycling plan
•  Hire John Smith (jsmith) & propagate accounts
•  Fire John Smith and hire Jane smith (jsmith)
Attributes
•  User attributes
–  Have an authoritative source
•  Can be self-asserted
–  Source is the identity owner
•  Can be “verified”
–  Source is authoritative and accountable
–  Some attributes are perishable
•  Name infrequently changes
•  Roles frequently change
•  Birthdate never changes
•  Credit rating should be fetched every time
•  Advice: standardize attribute name and format
where possible across systems (eg: date)
Pantry Staple: Directories
•  Directories are specialized
account and attribute
repositories
–  Meant to be used by multiple
applications
–  Highly fault tolerant and
distributed
–  Designed to be hierarchically
accessible via a standard
protocol: LDAP
So you think you know how to Stock the Pantry.
•  What’s next?
Provisioning!
•  Process of getting the right
information to the right
systems at the right time
– CRUD: create, replace, update,
delete based on events
•  Advice: automation reduces risk
Provisioning
•  Pushing accounts and attributes shouldn’t be hard
–  But it is. Many application vendors figure an admin console is
good enough.
•  Common options:
–  Batch (CSV/LDIF)
–  Backend database manipulation (not possible for cloud)
–  Provisioning API
–  SCIM
–  JIT Provisioning
Base elements of a provisioning architecture
•  Process
–  HR adds a new user via admin console
–  Manager requests a promotion for an
employee
–  Customer updates their self-service profile
•  Trigger
•  Attribute or account change detected in AD
•  Help Desk ticket triggers API call to a service
•  Business logic executes on data save
•  Admin gets an email
•  Fulfillment
–  Database row inserted
–  SCIM call made
Provisioning Map
•  Process,Trigger,
and Fulfillment
may all be
managed by
different people
•  A single process
often causes
multiple triggers
and fulfillments
SOR HR System
Authoritative for: Account Status
name
department
employee#
Repo: Active Directory
Authoritative for: Identifier
email
groups
password
SOR: Social Networks
Authoritative for: Login Credential
nickname
Repo: MySQL
Authoritative for: Identifier
roles
enrollment date
Internal Apps
Internal APIs
Attribute Provider:
Billing System
Authoritative for: current plan
$$ spent
plan expiry
CC number
Sales Rep
Cloud Apps
P:Admin App Interface
T: New DB Entry
F: LDAP insert T: New AD Entry
F: DB insert
T: New AD Entry
F: DB insert
T: New AD Entry
F: SCIM create
P: Self Service
T:API CAll
F: DB Delete
T: DB delete
F: SCIM delete
T: DB delete
F: DB delete
T: DB update
F:API call
T: DB delete
F: DB delete
Repo: Oracle
Authoritative for: Scopes
Access Tokens
T: DB delete
F:API Call token wipe
T: DB delete
F:API Call token wipe
T: DB delete
F: DB delete
Provisioning Solutions
•  Provisioning world is a mess
–  Old school provisioning about bypassing
the app
–  No pressure was ever put on vendors
•  Provisioning to the cloud cannot happen
without cooperation by cloud
application vendors
–  Many have no provisioning API
–  Others have proprietary provisioning
APIs
•  Which means provisioning efforts are
unique snowflakes
–  Best hope for the future is SCIM
SCIM
•  System for Cross-Domain Identity
•  It’s just a User Management REST API
–  That works the same way everywhere
•  Ingredients:
–  Users REST endpoint (minimum)
–  Basic Auth creds
•  or better yet, an OAuth access token
–  Create, delete, modify users on somebody else’s platform
HTTP Create to User Endpoint
{
"schemas":
[
"urn:scim:schemas:core:1.0”
],
"externalId":"bjensen”,
"userName":"bjensen",
"name”:
{
"familyName":"Jensen",
"givenName":"Barbara”
},
"emails":
[
{"value":bjensen@babs.com,"type":"work"}
]
}
JSON Returned
{
"userName":"bjensen",
"name”:
{
"familyName":"Jensen",
"givenName":"Barbara”
},
"userType":"basicUser",
"emails":
[
{"value":"bjensen@babs.com","type":"work"}
],
"meta":
{
"lastModified":"2014-06-23T22:56:07.263Z",
"created":"2014-06-23T22:56:07.263Z",
"location":https://gold.pinglabs.net:9031/pf-scim/v1/Users/29166
},
"id":"29166",
"schemas":["urn:scim:schemas:core:1.0"]
}
Just in Time Provisioning
•  Just in Time Provisioning is extremely useful for
customer systems
– System of Record is the Federation Server
– User created in application database the second a
SAML assertion arrives from an authoritative source
– Note: JIT provisioning often doesn’t handle de-prov
Provisioning Architecture
SOR HR System
Authoritative for: Account Status
name
department
employee#
Repo: Active Directory
Authoritative for: Identifier
email
groups
password
SOR: Social Networks
Authoritative for: Login Credential
nickname
Repo: MySQL
Authoritative for: Identifier
roles
enrollment date
Internal Apps
Internal APIs
Attribute Provider:
Billing System
Authoritative for: current plan
$$ spent
plan expiry
CC number
Sales Rep
Cloud Apps
F: DB insert
F: DB insert
T: New AD Entry
P: Self Service
T:API CAll
F: DB Delete
T: DB delete
F: SCIM delete
F: DB delete
T: DB delete
F: DB delete
Repo: Oracle
Authoritative for: Scopes
Access Tokens
T: DB delete
F:API Call token wipe
F:API Call token wipe
F: DB delete
Provisioning
System
F: SCIM create
F:API call
T: DB delete
P:Admin App Interface
T: New DB Entry
F: LDAP insert
Data Ownership & Provenance
•  Other issues you need to think of
–  Who owns the data?
•  Is consent needed to use or move the data?
–  Jurisdiction
•  Where was the data inputted and where can it legally go?
–  Governance
•  Can you prove that the system worked the way you mapped it
•  SOX Attestation
Identities in the Cloud
•  How do you redraw your map when your users live in
the cloud?
–  Architecture becomes fully API & federation driven
–  IDaaS creates a “cloud platform” for user identities
•  Processes are either part of the IDaaS Service or integrated via
API
–  The business must start to see itself as a service provider
Thanks!
@pamelarosiedee
http://pingidentity.com
http://eternallyoptimistic.com

Mais conteúdo relacionado

Destaque

CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in ActionCloudIDSummit
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016 ForgeRock
 
NetSuite training | Netsuite ERP online course from India - GOT
NetSuite training | Netsuite ERP online course from India - GOTNetSuite training | Netsuite ERP online course from India - GOT
NetSuite training | Netsuite ERP online course from India - GOTGlobal Online Trainings
 
Da Vida Caminando con Raymond Arrieta
Da Vida Caminando con Raymond ArrietaDa Vida Caminando con Raymond Arrieta
Da Vida Caminando con Raymond ArrietaVocxy Consulting
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)Amazon Web Services
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 
AWS re:Invent 2016: Elastic Load Balancing Deep Dive and Best Practices (NET403)
AWS re:Invent 2016: Elastic Load Balancing Deep Dive and Best Practices (NET403)AWS re:Invent 2016: Elastic Load Balancing Deep Dive and Best Practices (NET403)
AWS re:Invent 2016: Elastic Load Balancing Deep Dive and Best Practices (NET403)Amazon Web Services
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingJohn Bauer
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
Sr. Gustavo Dibán, "Una experiencia de emprendimiento en TI", - Conferencias ...
Sr. Gustavo Dibán, "Una experiencia de emprendimiento en TI", - Conferencias ...Sr. Gustavo Dibán, "Una experiencia de emprendimiento en TI", - Conferencias ...
Sr. Gustavo Dibán, "Una experiencia de emprendimiento en TI", - Conferencias ...INACAP
 

Destaque (14)

CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in Action
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016
 
NetSuite training | Netsuite ERP online course from India - GOT
NetSuite training | Netsuite ERP online course from India - GOTNetSuite training | Netsuite ERP online course from India - GOT
NetSuite training | Netsuite ERP online course from India - GOT
 
Da Vida Caminando con Raymond Arrieta
Da Vida Caminando con Raymond ArrietaDa Vida Caminando con Raymond Arrieta
Da Vida Caminando con Raymond Arrieta
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
AWS re:Invent 2016: Elastic Load Balancing Deep Dive and Best Practices (NET403)
AWS re:Invent 2016: Elastic Load Balancing Deep Dive and Best Practices (NET403)AWS re:Invent 2016: Elastic Load Balancing Deep Dive and Best Practices (NET403)
AWS re:Invent 2016: Elastic Load Balancing Deep Dive and Best Practices (NET403)
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud Computing
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Sr. Gustavo Dibán, "Una experiencia de emprendimiento en TI", - Conferencias ...
Sr. Gustavo Dibán, "Una experiencia de emprendimiento en TI", - Conferencias ...Sr. Gustavo Dibán, "Una experiencia de emprendimiento en TI", - Conferencias ...
Sr. Gustavo Dibán, "Una experiencia de emprendimiento en TI", - Conferencias ...
 

Semelhante a CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle

CIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground UpCIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground UpCloudIDSummit
 
End-to-End Identity Management
End-to-End Identity ManagementEnd-to-End Identity Management
End-to-End Identity ManagementWSO2
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachQuest
 
Five Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityFive Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityMark Diodati
 
Getting to Flow You: A First Date with Flow Builder
Getting to Flow You: A First Date with Flow BuilderGetting to Flow You: A First Date with Flow Builder
Getting to Flow You: A First Date with Flow Buildersonumanoj
 
Cloud identity management meetup 150108
Cloud identity management meetup 150108Cloud identity management meetup 150108
Cloud identity management meetup 150108Morteza Ansari
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital TransformationWSO2
 
CIS14: How I Came to Share Signals and Learned to Love my Identity System
CIS14: How I Came to Share Signals and Learned to Love my Identity SystemCIS14: How I Came to Share Signals and Learned to Love my Identity System
CIS14: How I Came to Share Signals and Learned to Love my Identity SystemCloudIDSummit
 
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)ForgeRock
 
Stop treating your customers like your employees
Stop treating your customers like your employeesStop treating your customers like your employees
Stop treating your customers like your employeesIan Glazer
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014Kelly Grizzle
 
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You ThinkCIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You ThinkCloudIDSummit
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborationsjbasney
 
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed WorldCIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed WorldCloudIDSummit
 
TACOM 2014: Back To Basics
TACOM 2014: Back To BasicsTACOM 2014: Back To Basics
TACOM 2014: Back To BasicsJoel Cardella
 

Semelhante a CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle (20)

CIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground UpCIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground Up
 
End-to-End Identity Management
End-to-End Identity ManagementEnd-to-End Identity Management
End-to-End Identity Management
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security Breach
 
Five Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityFive Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern Identity
 
Getting to Flow You: A First Date with Flow Builder
Getting to Flow You: A First Date with Flow BuilderGetting to Flow You: A First Date with Flow Builder
Getting to Flow You: A First Date with Flow Builder
 
Cloud identity management meetup 150108
Cloud identity management meetup 150108Cloud identity management meetup 150108
Cloud identity management meetup 150108
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
 
CIS14: How I Came to Share Signals and Learned to Love my Identity System
CIS14: How I Came to Share Signals and Learned to Love my Identity SystemCIS14: How I Came to Share Signals and Learned to Love my Identity System
CIS14: How I Came to Share Signals and Learned to Love my Identity System
 
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
 
Stop treating your customers like your employees
Stop treating your customers like your employeesStop treating your customers like your employees
Stop treating your customers like your employees
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
 
Dell active roles
Dell active roles Dell active roles
Dell active roles
 
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You ThinkCIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborations
 
Human Resources & IT: A Marriage Made in Heaven?
Human Resources & IT: A Marriage Made in Heaven?Human Resources & IT: A Marriage Made in Heaven?
Human Resources & IT: A Marriage Made in Heaven?
 
AI & AWS DeepComposer
AI & AWS DeepComposerAI & AWS DeepComposer
AI & AWS DeepComposer
 
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed WorldCIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
TACOM 2014: Back To Basics
TACOM 2014: Back To BasicsTACOM 2014: Back To Basics
TACOM 2014: Back To Basics
 

Mais de CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCloudIDSummit
 
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...CloudIDSummit
 

Mais de CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin Wilton
 
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
 

Último

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle

  • 1.
  • 2. IDENTITY SOUFFLE CREATING A WELL-BAKED IDENTITY LIFECYCLE Pamela Dingle @pamelarosiedee Office of the CTO, Ping Identity
  • 3. •  Heckler Policy •  Platitudes •  Meal Plan •  Pantry Management (data at rest) •  Shopping – (data movement) •  Kitchen Techniques (handling data) Agenda
  • 4. This track is about breadth not depth
  • 5. What does it mean to Manage Identities •  Before you can chop •  Before you can bake •  Before you can serve •  You need to know what you’re trying to make •  You have to have the right ingredients in your pantry
  • 6. Preparation is the key – Identity is State “I” comes before “A” in IAM 1.  Create and maintain an accurate picture of the people, policies, and resources in your Enterprise 2.  Leverage that state to protect and enable
  • 7. Identity like Cooking is GIGO (garbage in, garbage out) •  You can have the best security in the world – But it won’t help you if decisions are based on outdated identity information
  • 8. Review the Meal Plan Attribution: Daniel Headrick, G
  • 9. Pantry Management : Identity Lifecycle •  Accurate, timely knowledge of who and what constitutes your Enterprise –  Every system needs the right set of data in its reach •  Accounts •  Resources •  Policies –  Data must change everywhere when it is changed at the authoritative source •  You know you’re doing it wrong when –  Your SOX audit finds dead people in application databases –  It takes 5 days for a new hire to get access to applications –  A fired employee can walk to Starbucks and download critical business info from cloud applications –  An employee has to chase a 100 application admins to change their name
  • 10. The Units of User Identity Lifecycle •  Account –  A relationship between a user and a system •  Identifier –  Unique keys or “handles” for accounts •  Username •  GUID •  Attribute –  Distinct piece of information •  Often a name/value pair •  Values can be complex •  Aka: Claim •  Eg: –  Name: Pamela
  • 11. •  Where does data originate? •  Where should it change? •  What systems should also change when authoritative systems change? •  Note this only shows data replication, not the tools that do the detecting or moving •  Principle: SSOT or DRY Track Data Relationship Start by looking at Data at Rest SOR HR System Authoritative for: Account Status name department employee# Repo: Active Directory Authoritative for: Identifier email groups password SOR: Social Networks Authoritative for: Login Credential nickname Repo: MySQL Authoritative for: Identifier roles enrollment date Internal Apps Internal APIs Attribute Provider: Billing System Authoritative for: current plan $$ spent plan expiry CC number Sales Rep Cloud Apps
  • 12. Identifiers •  Identifiers have a scope –  Not every identifier is globally unique –  Not every identifier has to be human readable –  Identifiers can co-exist •  Advice: standardize one “login id” –  Best usability for users –  Federation systems help here •  Can map user-known id to system-known id –  Maps may need to be maintained
  • 13. Accounts •  Presence/Status of Account is a preliminary access gate •  When access is needed, pressure to create account is high –  When access is discarded, no such pressure exists •  Many [cloud] apps refuse to delete accounts –  Only disable them –  Discrepancies can cause havoc –  Advice: create an identifier recycling plan •  Hire John Smith (jsmith) & propagate accounts •  Fire John Smith and hire Jane smith (jsmith)
  • 14. Attributes •  User attributes –  Have an authoritative source •  Can be self-asserted –  Source is the identity owner •  Can be “verified” –  Source is authoritative and accountable –  Some attributes are perishable •  Name infrequently changes •  Roles frequently change •  Birthdate never changes •  Credit rating should be fetched every time •  Advice: standardize attribute name and format where possible across systems (eg: date)
  • 15. Pantry Staple: Directories •  Directories are specialized account and attribute repositories –  Meant to be used by multiple applications –  Highly fault tolerant and distributed –  Designed to be hierarchically accessible via a standard protocol: LDAP
  • 16. So you think you know how to Stock the Pantry. •  What’s next?
  • 17.
  • 18. Provisioning! •  Process of getting the right information to the right systems at the right time – CRUD: create, replace, update, delete based on events •  Advice: automation reduces risk
  • 19. Provisioning •  Pushing accounts and attributes shouldn’t be hard –  But it is. Many application vendors figure an admin console is good enough. •  Common options: –  Batch (CSV/LDIF) –  Backend database manipulation (not possible for cloud) –  Provisioning API –  SCIM –  JIT Provisioning
  • 20. Base elements of a provisioning architecture •  Process –  HR adds a new user via admin console –  Manager requests a promotion for an employee –  Customer updates their self-service profile •  Trigger •  Attribute or account change detected in AD •  Help Desk ticket triggers API call to a service •  Business logic executes on data save •  Admin gets an email •  Fulfillment –  Database row inserted –  SCIM call made
  • 21. Provisioning Map •  Process,Trigger, and Fulfillment may all be managed by different people •  A single process often causes multiple triggers and fulfillments SOR HR System Authoritative for: Account Status name department employee# Repo: Active Directory Authoritative for: Identifier email groups password SOR: Social Networks Authoritative for: Login Credential nickname Repo: MySQL Authoritative for: Identifier roles enrollment date Internal Apps Internal APIs Attribute Provider: Billing System Authoritative for: current plan $$ spent plan expiry CC number Sales Rep Cloud Apps P:Admin App Interface T: New DB Entry F: LDAP insert T: New AD Entry F: DB insert T: New AD Entry F: DB insert T: New AD Entry F: SCIM create P: Self Service T:API CAll F: DB Delete T: DB delete F: SCIM delete T: DB delete F: DB delete T: DB update F:API call T: DB delete F: DB delete Repo: Oracle Authoritative for: Scopes Access Tokens T: DB delete F:API Call token wipe T: DB delete F:API Call token wipe T: DB delete F: DB delete
  • 22. Provisioning Solutions •  Provisioning world is a mess –  Old school provisioning about bypassing the app –  No pressure was ever put on vendors •  Provisioning to the cloud cannot happen without cooperation by cloud application vendors –  Many have no provisioning API –  Others have proprietary provisioning APIs •  Which means provisioning efforts are unique snowflakes –  Best hope for the future is SCIM
  • 23. SCIM •  System for Cross-Domain Identity •  It’s just a User Management REST API –  That works the same way everywhere •  Ingredients: –  Users REST endpoint (minimum) –  Basic Auth creds •  or better yet, an OAuth access token –  Create, delete, modify users on somebody else’s platform
  • 24. HTTP Create to User Endpoint { "schemas": [ "urn:scim:schemas:core:1.0” ], "externalId":"bjensen”, "userName":"bjensen", "name”: { "familyName":"Jensen", "givenName":"Barbara” }, "emails": [ {"value":bjensen@babs.com,"type":"work"} ] }
  • 26. Just in Time Provisioning •  Just in Time Provisioning is extremely useful for customer systems – System of Record is the Federation Server – User created in application database the second a SAML assertion arrives from an authoritative source – Note: JIT provisioning often doesn’t handle de-prov
  • 27. Provisioning Architecture SOR HR System Authoritative for: Account Status name department employee# Repo: Active Directory Authoritative for: Identifier email groups password SOR: Social Networks Authoritative for: Login Credential nickname Repo: MySQL Authoritative for: Identifier roles enrollment date Internal Apps Internal APIs Attribute Provider: Billing System Authoritative for: current plan $$ spent plan expiry CC number Sales Rep Cloud Apps F: DB insert F: DB insert T: New AD Entry P: Self Service T:API CAll F: DB Delete T: DB delete F: SCIM delete F: DB delete T: DB delete F: DB delete Repo: Oracle Authoritative for: Scopes Access Tokens T: DB delete F:API Call token wipe F:API Call token wipe F: DB delete Provisioning System F: SCIM create F:API call T: DB delete P:Admin App Interface T: New DB Entry F: LDAP insert
  • 28. Data Ownership & Provenance •  Other issues you need to think of –  Who owns the data? •  Is consent needed to use or move the data? –  Jurisdiction •  Where was the data inputted and where can it legally go? –  Governance •  Can you prove that the system worked the way you mapped it •  SOX Attestation
  • 29. Identities in the Cloud •  How do you redraw your map when your users live in the cloud? –  Architecture becomes fully API & federation driven –  IDaaS creates a “cloud platform” for user identities •  Processes are either part of the IDaaS Service or integrated via API –  The business must start to see itself as a service provider