SlideShare uma empresa Scribd logo
1 de 37
Baixar para ler offline
Think 2018 / DOC ID / Month XX, 2018 / © 2018 IBM Corporation
THINK CONFERENCE
3685: A Guide To Single Sign-On for IBM
Collaboration Solutions
Gabriella Davis - IBM Lifetime Champion
Technical Director - The Turtle Partnership
gabriella@turtlepartnership.com @gabturtle
• Admin of all things and especially quite complicated
things where the fun is
• Working with the design, deployment and security of
IBM technologies within global infrastructures
• working with the real world security and privacy
aspects of expanding data ecosystems
• Stubborn and relentless problem solver
• http://turtleblog.info
• https://www.turtlepartnership.com
This Session
• What Is Single Identity
• Technologies
• Federation Use Cases
• Protecting Data
What Is Single Identity
Identity & Access Management
• A way of identifying me as an individual who has access to
this system
• SSO uses tokens or cookies to set and read my identity
• Federation allows me to take my identity into different
systems each of which has common information about me
and unique information about me
• I carry my identity across different systems without breaking
the rules for single origin access
Why Is Having A Single Identity Valuable?
Preferences Behaviour &
History
Patterns
BeingPresent
how i use the system,
how i prefer to work with
it, what parts of it i prefer
to see / engage with

what I do, what i
have interacted with
in the past, what I
reuse or repeat
spotting ways in which I reuse
or repeat in order to present
information to me that I might
not be aware of or highlight
information that the pattern
says I should be interested in
just because i’m using
system A doesn’t mean
someone in system B can’t
find and interact with me. I
have one identity if signed
onto multiple systems.
Technology Is Not The Start
• It’s where we end up
• All IAM does in principal is authorise someone to access multiple systems
• Other decisions include
• what access does someone get
• what attributes are shared across systems
• what systems need to be supported now and in the future
• who owns those systems and how much control do you have over them
• All of these things help define the requirements for the technology(ies) to be used
Things get more complicated
• Multiple systems and standards including SAML, OpenID, OAuth, Facebook, Twitter
• Federation can be done using Enterprise systems such as Active Directory, LDAP, SAML or
3rd party applications
• Users require logins across personal, consumer, and enterprise systems using multi factor
authentication
• Authentication often needs to encompass on premises, private cloud and public cloud hosted
systems
• New and more secure methods of authentication appear every day
Authentication is critical to ensure Gab
Davis in SystemA is the same as Gab Davis
in SystemB and the information that goes
with that ‘Gab Davis” is correct
Authentication is not Authorization
Creating Trust Relationships
• Hello - have you met my friend?
• When is trust transferable?
Federated Attributes
• Access rights
• Identity data such as name or email
• System specific attributes such as your areas of responsibility or authority
• Deciding what attributes to share between systems and expose across systems is a critical
part of federation planning
• It’s not just a technology solution
Technologies
Password Synchronisation Not Single Identity
Synchronising passwords across
different systems
Sametime
LDAP
Connections
LDAP
Traveler
Authentication
Password
Synchronisation
Tool
You’re not the same person, you don’t have the same identity,
you’re just using the same password
Single LDAP Source - Simple Single Identity
Authenticating against a single password in a single place
Sametime
Network Login
Web Applications
Mail
Active Directory
Password
Technically you are the same person as you authenticate using the same identity but
that’s it, there are no attributes being held or exchanged.
IWA/Kerberos/SPNEGO SSO
1 2 3 4 5
ACTIVE
DIRECTORY
GENERATES
TOKEN
USER TRIES
TO ACCESS
A WEBSITE
BROWSER SENDS
IWA TOKEN TO
THE WEB SERVER
ALONG WITH
USER NAME
THE WEB SERVER
CONTACTS
ACTIVE
DIRECTORY TO
VALIDATE TOKEN
AND RETRIEVE
THE USER’S NAME
STEPS
USER LOGS
INTO
WINDOWS
Same Origin Policy Problem
• A key concept in web application security it specifies that data stored by one server or
creator of information cannot be accessed by another
• This prevents Server B accessing anything stored by Server A and thereby any script
reading information its source did not create
• This presents problems with carrying authorisations across multiple systems in different
environments and domains
• Which is where federation comes in
Federated Login Is Single Identity
Security Assertion Markup Language
18
1 2 3 4 5
USER
ATTEMPTS TO
LOG IN TO A
WEBSITE
USER IS
REDIRECTED
TO IDENTITY
PROVIDER
IDENTITY PROVIDER
REQUESTS
AUTHENTICATION OR
(IF USER IS LOGGED
IN) RETURNS
CREDENTIALS
USER IS
REDIRECTED BACK
TO ORIGINAL SITE
WITH SAML
ASSERTION
ATTACHED
ORIGINAL SITE USES ITS
SAML SERVICE
PROVIDER TO CONFIRM
SAML ASSERTION AND
GRANT ACCESS
STEPS
SAML - Federated Single Identity
19
• IdP - Identity Provider (SSO)
• ADFS (Active Directory Federation Services)
• can be combined with IWA
• TFIM (Tivoli Federated Identity Manager)
• SP - Service Provider
• IBM Domino (web federated login)
• IBM SmartCloud
• IBM Notes (requires ID Vault) (notes federated login)
SAML Behaviour
• IdP (Identity Providers) use HTTP or SOAP to communicate to SP (Service
Providers) via XML based assertions
• Assertions have three roles
• Authentication
• Authorisation
• Retrieving Attributes
• Many kinds of authentication methods are supported depending on your chosen
IdP
• Once initially federated no subsequent password or credentials are requested
Federation For Social Systems
OAuth / OpenID / Facebook / Twitter
• Consumer and Social Based Federation
• OpenID is identity federation / authentication
• OAuth is authorisation
• OpenID Connect is built on OAuth2 providing authentication and
authorisation mechanisms
Simplified OAuth Process
1 2 3 4 5
USER ASKS
FACEBOOK (THE
CONSUMER) TO
POST ON THEIR
ACTIVITY STREAM
FACEBOOK GOES
TO CONNECTIONS
(THE SERVICE
PROVIDER) AND
ASKS FOR
PERMISSION TO
POST
THE SERVICE PROVIDER
GIVES THE CONSUMER
A SECRET KEY TO GIVE
TO THE USER AND A
URL FOR THE USER TO
CLICK ON
THE USER CLICKS
ON THE URL AND
AUTHENTICATES
WITH THE SERVICE
PROVIDER
THE SERVICE PROVIDER ,
SATISFIED THE SECRET
KEY IS GOOD, WILL NOW
ALLOW THE CONSUMER
ACCESS TO ITS
SERVICES
STEPS
Federation Use Cases
Business to Business (B2B)
• Connecting your business to another you need to work with
• Streamlining processes
• more efficient delivery
• lead to increased revenue
Business to Consumer (B2C)
• Connecting your customers to your systems without requiring them to create an identity
specifically for you
• Less overhead maintaining your own directories and authentication credentials
• less data responsibility means less risk
• increased ease of purchase
• leads to increased revenue
Business to Enterprise (B2E)
• Connecting your employees to your systems
• Few individual and isolated authentication systems
• mean fewer passwords to maintain and remember
• delivers increased security and data protection
These are often 3 separate departments if they
exist at all.
A federated solution must include every use case
Protecting Data
• Do you understand where your most important data that must be protected is?
• Are you sure the people using your systems are who they say they are?
• How compliant does you remain with HIPAA, GDPR etc
• Are you exposing or storing attributes unnecessarily
Data Responsibility & GDPR
• You must know
• what data you have
• why you have it
• who has access to it
• how to erase it
User Awareness & Responsibility
• Once authenticated all systems can be accessed
• Identities are personal and individual
• Sharing biometric information with 3rd party systems
• Does the user know what data they have access to and their role in keeping it secure
• Learn to logout
Now & Next?
Passwordless Systems that use personal
devices like mobile phones or biometric data
to federate
Biometrics
• FAR - False Acceptance Rate
• FRR - False Rejection Rate
• Biometric systems are increasingly developing to minimise both of these - ask what the FAR
and FRR values are for any system you are adopting
Biometrics
• In one way they remove the risk of passwords being exploited however
• Biometric data can be spoofed, especially face recognition or using high definition photographs
• Unlike passwords biometric data cannot be changed
• As 3rd parties are accepting your biometric data for access they also have to store that data
• how secure is their data model
• are they are target for hacking?
• once your fingerprints are accessed from one system they can be used on another
• Ensuring whatever technology you are using is up to date and kept up to date is your primary
protection
Summary
• There is unlikely to be a single technology, instead multiple technologies to serve on premises,
cloud, enterprise, consumer and social requirements are more likely to deliver what is needed
• Consider all current and potential use cases, work with B2B, B2C, B2E teams
• Extensibility of any solution is key to ensure longevity - is there an API?
• Consider your data responsibility around regulations such as GDPR - don’t expose or retain
more than you can justify
• There are many 3rd party IAM products specifically designed to bridge platforms and
technologies several of which you may see exhibiting this week
Questions?
gabriella@turtlepartnership.com
@gabturtle
skype: gabrielladavis
http://turtleblog.info
https://www.turtlepartnership.com
® 2018 IBM Collaboration Solutions
37
Monday
5306 Be Smart and Unleash the Power of your Department
Application using SmartNSF
7743 DIY: How to build your SmartCloud Notes Hybrid
environment. Easy as 1-2-3
2781 IBM Notes Performance Boost – Reloaded
1160 How to adopt team development and Source Control
for Collaborative Application Development
Tuesday
8647 A New Chapter Begins: Domino V10
8633 Domino App Modernization: Client Success Cases
9328 Using Domino to scale 3 people to drive a $1B
business!
8640 Deep Dive: What's new in Notes, Sametime, Verse
on Premises for Users and Administrators
Wednesday
ICS Community Day (8:30-12:30pm)
8943 10 for Domino 10: Top 10 items from the #domino2025
Jams (Think Tank)
8942 Domino Top Secret: Get hands on and personal (Think
Tank)
Thursday
8675 Domino App Modernization Success Stories - Travel
and Transportation
8662 Tips and Tricks: Mobilizing your Domino Apps Master
Class
8508 Tips and Tricks: Domino and JavaScript Development
Master Class
8513 Domino Top-Secret and Domino Full-Stack
Development: The Lab (HOL)
8514 Mobilizing Your IBM Domino Apps (HOL)
And there’s more...

Mais conteúdo relacionado

Mais procurados

Migrating to office 365
Migrating to office 365Migrating to office 365
Migrating to office 365Alan Richards
 
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?Fabrizio Volpe
 
Forefront Unified Access Gateway 2010: An Introduction To Enterprise Features
Forefront Unified Access Gateway 2010: An Introduction To Enterprise FeaturesForefront Unified Access Gateway 2010: An Introduction To Enterprise Features
Forefront Unified Access Gateway 2010: An Introduction To Enterprise FeaturesFabrizio Volpe
 
CloudComputing
CloudComputingCloudComputing
CloudComputingAdi Challa
 
Xen mobile Scalar Decisions EMM Sales-presentation April 25th, 2013
Xen mobile   Scalar Decisions EMM Sales-presentation April 25th, 2013Xen mobile   Scalar Decisions EMM Sales-presentation April 25th, 2013
Xen mobile Scalar Decisions EMM Sales-presentation April 25th, 2013patmisasi
 
Office 365-single-sign-on-with-adfs
Office 365-single-sign-on-with-adfsOffice 365-single-sign-on-with-adfs
Office 365-single-sign-on-with-adfsamitchachra
 
Zimbra collaboration suite
Zimbra collaboration suiteZimbra collaboration suite
Zimbra collaboration suiteramansharma1984
 
ISBG The 3 S's a guide to single sign on
ISBG  The 3 S's a guide to single sign onISBG  The 3 S's a guide to single sign on
ISBG The 3 S's a guide to single sign onGabriella Davis
 
Adfs Shib Interop Um Oxford
Adfs Shib Interop Um OxfordAdfs Shib Interop Um Oxford
Adfs Shib Interop Um Oxfordguestd9aa5
 
NIC 2014 Modern Authentication for the Cloud Era
NIC 2014 Modern Authentication for the Cloud EraNIC 2014 Modern Authentication for the Cloud Era
NIC 2014 Modern Authentication for the Cloud EraMorgan Simonsen
 
Socconx12 integrating ibm connections docs 2 and box
Socconx12 integrating ibm connections docs 2 and boxSocconx12 integrating ibm connections docs 2 and box
Socconx12 integrating ibm connections docs 2 and boxRoberto Boccadoro
 
WINDOWS SERVER 2012 R2: Bring Your Own Device Using AD Federation Services
WINDOWS SERVER 2012 R2: Bring Your Own Device Using AD Federation ServicesWINDOWS SERVER 2012 R2: Bring Your Own Device Using AD Federation Services
WINDOWS SERVER 2012 R2: Bring Your Own Device Using AD Federation ServicesChris Spanougakis
 
Net Druid Presentation
Net Druid PresentationNet Druid Presentation
Net Druid Presentationguestf70326
 
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...Amazon Web Services
 
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...Brian Culver
 
Citrix Day 2014: XenMobile Enterprise Edition
Citrix Day 2014: XenMobile Enterprise EditionCitrix Day 2014: XenMobile Enterprise Edition
Citrix Day 2014: XenMobile Enterprise EditionDigicomp Academy AG
 

Mais procurados (19)

Social Login
Social LoginSocial Login
Social Login
 
Deep thoughts from the real world of azure
Deep thoughts from the real world of azureDeep thoughts from the real world of azure
Deep thoughts from the real world of azure
 
Migrating to office 365
Migrating to office 365Migrating to office 365
Migrating to office 365
 
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
Hybrid Clouds: “Silver Bullet” of the Cloud Computing?
 
Forefront Unified Access Gateway 2010: An Introduction To Enterprise Features
Forefront Unified Access Gateway 2010: An Introduction To Enterprise FeaturesForefront Unified Access Gateway 2010: An Introduction To Enterprise Features
Forefront Unified Access Gateway 2010: An Introduction To Enterprise Features
 
Azure privatelink
Azure privatelinkAzure privatelink
Azure privatelink
 
CloudComputing
CloudComputingCloudComputing
CloudComputing
 
Xen mobile Scalar Decisions EMM Sales-presentation April 25th, 2013
Xen mobile   Scalar Decisions EMM Sales-presentation April 25th, 2013Xen mobile   Scalar Decisions EMM Sales-presentation April 25th, 2013
Xen mobile Scalar Decisions EMM Sales-presentation April 25th, 2013
 
Office 365-single-sign-on-with-adfs
Office 365-single-sign-on-with-adfsOffice 365-single-sign-on-with-adfs
Office 365-single-sign-on-with-adfs
 
Zimbra collaboration suite
Zimbra collaboration suiteZimbra collaboration suite
Zimbra collaboration suite
 
ISBG The 3 S's a guide to single sign on
ISBG  The 3 S's a guide to single sign onISBG  The 3 S's a guide to single sign on
ISBG The 3 S's a guide to single sign on
 
Adfs Shib Interop Um Oxford
Adfs Shib Interop Um OxfordAdfs Shib Interop Um Oxford
Adfs Shib Interop Um Oxford
 
NIC 2014 Modern Authentication for the Cloud Era
NIC 2014 Modern Authentication for the Cloud EraNIC 2014 Modern Authentication for the Cloud Era
NIC 2014 Modern Authentication for the Cloud Era
 
Socconx12 integrating ibm connections docs 2 and box
Socconx12 integrating ibm connections docs 2 and boxSocconx12 integrating ibm connections docs 2 and box
Socconx12 integrating ibm connections docs 2 and box
 
WINDOWS SERVER 2012 R2: Bring Your Own Device Using AD Federation Services
WINDOWS SERVER 2012 R2: Bring Your Own Device Using AD Federation ServicesWINDOWS SERVER 2012 R2: Bring Your Own Device Using AD Federation Services
WINDOWS SERVER 2012 R2: Bring Your Own Device Using AD Federation Services
 
Net Druid Presentation
Net Druid PresentationNet Druid Presentation
Net Druid Presentation
 
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
 
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
SharePointFest 2013 Washington DC - SPT 103 - SharePoint 2013 Extranets: How ...
 
Citrix Day 2014: XenMobile Enterprise Edition
Citrix Day 2014: XenMobile Enterprise EditionCitrix Day 2014: XenMobile Enterprise Edition
Citrix Day 2014: XenMobile Enterprise Edition
 

Semelhante a A Guide To Single Sign-On for IBM Collaboration Solutions

Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19TechSoup
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the CloudRichard Diver
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iPrecisely
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators
 
Data Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarData Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarConcept Searching, Inc
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityGlobalSign
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
 
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2DianaGray10
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business CaseHitachi ID Systems, Inc.
 
Solving problems with authentication
Solving problems with authenticationSolving problems with authentication
Solving problems with authenticationMecklerMedia
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityDrew Madelung
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
IoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architectureIoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architectureVinod Wilson
 
Building open source identity infrastructures
Building open source identity infrastructuresBuilding open source identity infrastructures
Building open source identity infrastructuresFrancesco Chicchiriccò
 
Edugate Futures
Edugate FuturesEdugate Futures
Edugate FuturesHEAnet
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iPrecisely
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
TACOM 2014: Back To Basics
TACOM 2014: Back To BasicsTACOM 2014: Back To Basics
TACOM 2014: Back To BasicsJoel Cardella
 

Semelhante a A Guide To Single Sign-On for IBM Collaboration Solutions (20)

Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
The Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM iThe Best Shield Against Ransomware for IBM i
The Best Shield Against Ransomware for IBM i
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Data Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarData Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint Webinar
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
Building an Identity Management Business Case
Building an Identity Management Business CaseBuilding an Identity Management Business Case
Building an Identity Management Business Case
 
Solving problems with authentication
Solving problems with authenticationSolving problems with authentication
Solving problems with authentication
 
Labelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & SensitivityLabelling in Microsoft 365 - Retention & Sensitivity
Labelling in Microsoft 365 - Retention & Sensitivity
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
IoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architectureIoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architecture
 
Building open source identity infrastructures
Building open source identity infrastructuresBuilding open source identity infrastructures
Building open source identity infrastructures
 
Edugate Futures
Edugate FuturesEdugate Futures
Edugate Futures
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM i
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
TACOM 2014: Back To Basics
TACOM 2014: Back To BasicsTACOM 2014: Back To Basics
TACOM 2014: Back To Basics
 

Mais de Gabriella Davis

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Engage2022 - Domino Admin Tips
Engage2022 - Domino Admin TipsEngage2022 - Domino Admin Tips
Engage2022 - Domino Admin TipsGabriella Davis
 
. Design Decisions: Developing for Mobile - The Template Experience Project
. Design Decisions: Developing for Mobile - The Template Experience Project. Design Decisions: Developing for Mobile - The Template Experience Project
. Design Decisions: Developing for Mobile - The Template Experience ProjectGabriella Davis
 
Domino Server Health - Monitoring and Managing
 Domino Server Health - Monitoring and Managing Domino Server Health - Monitoring and Managing
Domino Server Health - Monitoring and ManagingGabriella Davis
 
Face Off Domino vs Exchange On Premises
Face Off Domino vs Exchange On PremisesFace Off Domino vs Exchange On Premises
Face Off Domino vs Exchange On PremisesGabriella Davis
 
Adminlicious - A Guide To TCO Features In Domino v10
Adminlicious - A Guide To TCO Features In Domino v10Adminlicious - A Guide To TCO Features In Domino v10
Adminlicious - A Guide To TCO Features In Domino v10Gabriella Davis
 
An Introduction to Configuring Domino for Docker
An Introduction to Configuring Domino for DockerAn Introduction to Configuring Domino for Docker
An Introduction to Configuring Domino for DockerGabriella Davis
 
An Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation RequirementsAn Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation RequirementsGabriella Davis
 
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...Gabriella Davis
 
An introduction to configuring Domino for Docker
An introduction to configuring Domino for DockerAn introduction to configuring Domino for Docker
An introduction to configuring Domino for DockerGabriella Davis
 
How To Approach GDPR Preparation & Discovery
How To Approach GDPR Preparation & DiscoveryHow To Approach GDPR Preparation & Discovery
How To Approach GDPR Preparation & DiscoveryGabriella Davis
 
What's New in Notes, Sametime and Verse On-Premises
What's New in Notes, Sametime and Verse On-PremisesWhat's New in Notes, Sametime and Verse On-Premises
What's New in Notes, Sametime and Verse On-PremisesGabriella Davis
 
An Introduction To Docker
An Introduction To DockerAn Introduction To Docker
An Introduction To DockerGabriella Davis
 
An Introduction To Docker
An Introduction To  DockerAn Introduction To  Docker
An Introduction To DockerGabriella Davis
 
Setting Up a Hybrid Domino Environment to Ease your Way to the Cloud
Setting Up a Hybrid Domino Environment to Ease your Way to the CloudSetting Up a Hybrid Domino Environment to Ease your Way to the Cloud
Setting Up a Hybrid Domino Environment to Ease your Way to the CloudGabriella Davis
 
Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterpriseGabriella Davis
 

Mais de Gabriella Davis (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Engage2022 - Domino Admin Tips
Engage2022 - Domino Admin TipsEngage2022 - Domino Admin Tips
Engage2022 - Domino Admin Tips
 
. Design Decisions: Developing for Mobile - The Template Experience Project
. Design Decisions: Developing for Mobile - The Template Experience Project. Design Decisions: Developing for Mobile - The Template Experience Project
. Design Decisions: Developing for Mobile - The Template Experience Project
 
Domino Server Health - Monitoring and Managing
 Domino Server Health - Monitoring and Managing Domino Server Health - Monitoring and Managing
Domino Server Health - Monitoring and Managing
 
Face Off Domino vs Exchange On Premises
Face Off Domino vs Exchange On PremisesFace Off Domino vs Exchange On Premises
Face Off Domino vs Exchange On Premises
 
60 Admin Tips
60 Admin Tips60 Admin Tips
60 Admin Tips
 
Adminlicious - A Guide To TCO Features In Domino v10
Adminlicious - A Guide To TCO Features In Domino v10Adminlicious - A Guide To TCO Features In Domino v10
Adminlicious - A Guide To TCO Features In Domino v10
 
An Introduction to Configuring Domino for Docker
An Introduction to Configuring Domino for DockerAn Introduction to Configuring Domino for Docker
An Introduction to Configuring Domino for Docker
 
An Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation RequirementsAn Introduction To The DMARC SMTP Validation Requirements
An Introduction To The DMARC SMTP Validation Requirements
 
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...
 
An introduction to configuring Domino for Docker
An introduction to configuring Domino for DockerAn introduction to configuring Domino for Docker
An introduction to configuring Domino for Docker
 
How To Approach GDPR Preparation & Discovery
How To Approach GDPR Preparation & DiscoveryHow To Approach GDPR Preparation & Discovery
How To Approach GDPR Preparation & Discovery
 
Brand Yourself
Brand YourselfBrand Yourself
Brand Yourself
 
Home Working
Home WorkingHome Working
Home Working
 
The Imposter Syndrome
The Imposter SyndromeThe Imposter Syndrome
The Imposter Syndrome
 
What's New in Notes, Sametime and Verse On-Premises
What's New in Notes, Sametime and Verse On-PremisesWhat's New in Notes, Sametime and Verse On-Premises
What's New in Notes, Sametime and Verse On-Premises
 
An Introduction To Docker
An Introduction To DockerAn Introduction To Docker
An Introduction To Docker
 
An Introduction To Docker
An Introduction To  DockerAn Introduction To  Docker
An Introduction To Docker
 
Setting Up a Hybrid Domino Environment to Ease your Way to the Cloud
Setting Up a Hybrid Domino Environment to Ease your Way to the CloudSetting Up a Hybrid Domino Environment to Ease your Way to the Cloud
Setting Up a Hybrid Domino Environment to Ease your Way to the Cloud
 
Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterprise
 

Último

VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benonimasabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...masabamasaba
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxAnnaArtyushina1
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 

Último (20)

Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 

A Guide To Single Sign-On for IBM Collaboration Solutions

  • 1. Think 2018 / DOC ID / Month XX, 2018 / © 2018 IBM Corporation
  • 2. THINK CONFERENCE 3685: A Guide To Single Sign-On for IBM Collaboration Solutions Gabriella Davis - IBM Lifetime Champion Technical Director - The Turtle Partnership gabriella@turtlepartnership.com @gabturtle
  • 3. • Admin of all things and especially quite complicated things where the fun is • Working with the design, deployment and security of IBM technologies within global infrastructures • working with the real world security and privacy aspects of expanding data ecosystems • Stubborn and relentless problem solver • http://turtleblog.info • https://www.turtlepartnership.com
  • 4. This Session • What Is Single Identity • Technologies • Federation Use Cases • Protecting Data
  • 5. What Is Single Identity
  • 6. Identity & Access Management • A way of identifying me as an individual who has access to this system • SSO uses tokens or cookies to set and read my identity • Federation allows me to take my identity into different systems each of which has common information about me and unique information about me • I carry my identity across different systems without breaking the rules for single origin access
  • 7. Why Is Having A Single Identity Valuable? Preferences Behaviour & History Patterns BeingPresent how i use the system, how i prefer to work with it, what parts of it i prefer to see / engage with what I do, what i have interacted with in the past, what I reuse or repeat spotting ways in which I reuse or repeat in order to present information to me that I might not be aware of or highlight information that the pattern says I should be interested in just because i’m using system A doesn’t mean someone in system B can’t find and interact with me. I have one identity if signed onto multiple systems.
  • 8. Technology Is Not The Start • It’s where we end up • All IAM does in principal is authorise someone to access multiple systems • Other decisions include • what access does someone get • what attributes are shared across systems • what systems need to be supported now and in the future • who owns those systems and how much control do you have over them • All of these things help define the requirements for the technology(ies) to be used
  • 9. Things get more complicated • Multiple systems and standards including SAML, OpenID, OAuth, Facebook, Twitter • Federation can be done using Enterprise systems such as Active Directory, LDAP, SAML or 3rd party applications • Users require logins across personal, consumer, and enterprise systems using multi factor authentication • Authentication often needs to encompass on premises, private cloud and public cloud hosted systems • New and more secure methods of authentication appear every day
  • 10. Authentication is critical to ensure Gab Davis in SystemA is the same as Gab Davis in SystemB and the information that goes with that ‘Gab Davis” is correct Authentication is not Authorization
  • 11. Creating Trust Relationships • Hello - have you met my friend? • When is trust transferable?
  • 12. Federated Attributes • Access rights • Identity data such as name or email • System specific attributes such as your areas of responsibility or authority • Deciding what attributes to share between systems and expose across systems is a critical part of federation planning • It’s not just a technology solution
  • 14. Password Synchronisation Not Single Identity Synchronising passwords across different systems Sametime LDAP Connections LDAP Traveler Authentication Password Synchronisation Tool You’re not the same person, you don’t have the same identity, you’re just using the same password
  • 15. Single LDAP Source - Simple Single Identity Authenticating against a single password in a single place Sametime Network Login Web Applications Mail Active Directory Password Technically you are the same person as you authenticate using the same identity but that’s it, there are no attributes being held or exchanged.
  • 16. IWA/Kerberos/SPNEGO SSO 1 2 3 4 5 ACTIVE DIRECTORY GENERATES TOKEN USER TRIES TO ACCESS A WEBSITE BROWSER SENDS IWA TOKEN TO THE WEB SERVER ALONG WITH USER NAME THE WEB SERVER CONTACTS ACTIVE DIRECTORY TO VALIDATE TOKEN AND RETRIEVE THE USER’S NAME STEPS USER LOGS INTO WINDOWS
  • 17. Same Origin Policy Problem • A key concept in web application security it specifies that data stored by one server or creator of information cannot be accessed by another • This prevents Server B accessing anything stored by Server A and thereby any script reading information its source did not create • This presents problems with carrying authorisations across multiple systems in different environments and domains • Which is where federation comes in
  • 18. Federated Login Is Single Identity Security Assertion Markup Language 18 1 2 3 4 5 USER ATTEMPTS TO LOG IN TO A WEBSITE USER IS REDIRECTED TO IDENTITY PROVIDER IDENTITY PROVIDER REQUESTS AUTHENTICATION OR (IF USER IS LOGGED IN) RETURNS CREDENTIALS USER IS REDIRECTED BACK TO ORIGINAL SITE WITH SAML ASSERTION ATTACHED ORIGINAL SITE USES ITS SAML SERVICE PROVIDER TO CONFIRM SAML ASSERTION AND GRANT ACCESS STEPS
  • 19. SAML - Federated Single Identity 19 • IdP - Identity Provider (SSO) • ADFS (Active Directory Federation Services) • can be combined with IWA • TFIM (Tivoli Federated Identity Manager) • SP - Service Provider • IBM Domino (web federated login) • IBM SmartCloud • IBM Notes (requires ID Vault) (notes federated login)
  • 20. SAML Behaviour • IdP (Identity Providers) use HTTP or SOAP to communicate to SP (Service Providers) via XML based assertions • Assertions have three roles • Authentication • Authorisation • Retrieving Attributes • Many kinds of authentication methods are supported depending on your chosen IdP • Once initially federated no subsequent password or credentials are requested
  • 21. Federation For Social Systems OAuth / OpenID / Facebook / Twitter • Consumer and Social Based Federation • OpenID is identity federation / authentication • OAuth is authorisation • OpenID Connect is built on OAuth2 providing authentication and authorisation mechanisms
  • 22. Simplified OAuth Process 1 2 3 4 5 USER ASKS FACEBOOK (THE CONSUMER) TO POST ON THEIR ACTIVITY STREAM FACEBOOK GOES TO CONNECTIONS (THE SERVICE PROVIDER) AND ASKS FOR PERMISSION TO POST THE SERVICE PROVIDER GIVES THE CONSUMER A SECRET KEY TO GIVE TO THE USER AND A URL FOR THE USER TO CLICK ON THE USER CLICKS ON THE URL AND AUTHENTICATES WITH THE SERVICE PROVIDER THE SERVICE PROVIDER , SATISFIED THE SECRET KEY IS GOOD, WILL NOW ALLOW THE CONSUMER ACCESS TO ITS SERVICES STEPS
  • 24. Business to Business (B2B) • Connecting your business to another you need to work with • Streamlining processes • more efficient delivery • lead to increased revenue
  • 25. Business to Consumer (B2C) • Connecting your customers to your systems without requiring them to create an identity specifically for you • Less overhead maintaining your own directories and authentication credentials • less data responsibility means less risk • increased ease of purchase • leads to increased revenue
  • 26. Business to Enterprise (B2E) • Connecting your employees to your systems • Few individual and isolated authentication systems • mean fewer passwords to maintain and remember • delivers increased security and data protection
  • 27. These are often 3 separate departments if they exist at all. A federated solution must include every use case
  • 29. • Do you understand where your most important data that must be protected is? • Are you sure the people using your systems are who they say they are? • How compliant does you remain with HIPAA, GDPR etc • Are you exposing or storing attributes unnecessarily
  • 30. Data Responsibility & GDPR • You must know • what data you have • why you have it • who has access to it • how to erase it
  • 31. User Awareness & Responsibility • Once authenticated all systems can be accessed • Identities are personal and individual • Sharing biometric information with 3rd party systems • Does the user know what data they have access to and their role in keeping it secure • Learn to logout
  • 32. Now & Next? Passwordless Systems that use personal devices like mobile phones or biometric data to federate
  • 33. Biometrics • FAR - False Acceptance Rate • FRR - False Rejection Rate • Biometric systems are increasingly developing to minimise both of these - ask what the FAR and FRR values are for any system you are adopting
  • 34. Biometrics • In one way they remove the risk of passwords being exploited however • Biometric data can be spoofed, especially face recognition or using high definition photographs • Unlike passwords biometric data cannot be changed • As 3rd parties are accepting your biometric data for access they also have to store that data • how secure is their data model • are they are target for hacking? • once your fingerprints are accessed from one system they can be used on another • Ensuring whatever technology you are using is up to date and kept up to date is your primary protection
  • 35. Summary • There is unlikely to be a single technology, instead multiple technologies to serve on premises, cloud, enterprise, consumer and social requirements are more likely to deliver what is needed • Consider all current and potential use cases, work with B2B, B2C, B2E teams • Extensibility of any solution is key to ensure longevity - is there an API? • Consider your data responsibility around regulations such as GDPR - don’t expose or retain more than you can justify • There are many 3rd party IAM products specifically designed to bridge platforms and technologies several of which you may see exhibiting this week
  • 37. ® 2018 IBM Collaboration Solutions 37 Monday 5306 Be Smart and Unleash the Power of your Department Application using SmartNSF 7743 DIY: How to build your SmartCloud Notes Hybrid environment. Easy as 1-2-3 2781 IBM Notes Performance Boost – Reloaded 1160 How to adopt team development and Source Control for Collaborative Application Development Tuesday 8647 A New Chapter Begins: Domino V10 8633 Domino App Modernization: Client Success Cases 9328 Using Domino to scale 3 people to drive a $1B business! 8640 Deep Dive: What's new in Notes, Sametime, Verse on Premises for Users and Administrators Wednesday ICS Community Day (8:30-12:30pm) 8943 10 for Domino 10: Top 10 items from the #domino2025 Jams (Think Tank) 8942 Domino Top Secret: Get hands on and personal (Think Tank) Thursday 8675 Domino App Modernization Success Stories - Travel and Transportation 8662 Tips and Tricks: Mobilizing your Domino Apps Master Class 8508 Tips and Tricks: Domino and JavaScript Development Master Class 8513 Domino Top-Secret and Domino Full-Stack Development: The Lab (HOL) 8514 Mobilizing Your IBM Domino Apps (HOL) And there’s more...