SlideShare uma empresa Scribd logo
1 de 15
IDaaS: a missing gap for moving
enterprise applications in Inter-
cloud
Hoang Tri Vo
Cloud Architect, Deutsche Telekom
Frankfurt, 20.07.2016
On behalf of
Prof. Dr. Woldemar Fuhrmann, Darmstadt University of Applied Sciences
Dr. Klaus-Peter Fischer-Hellmann, Digamma GmbH
Agenda
Identity-as-a-Service: a missing gap for moving enterprise applications in Inter-Cloud
18.07.2016 2Hoang Tri Vo / Identity As A Service
2. Why moving?
(Motivating scenario)
1. What is a traditional
Identity Management?
3. Definition?
Requirements?
Proposed model?
1. introduction
traditional identity management
Applications trusts an Identity Provider (IdP) for issuing user attributes
• Applications implement security token request / response (SAML, WS-Trust, WS-Federation)
• Mapping attribute assertion issued by IdP to applications
• Applications & IdP exchange trust credentials
18.07.2016Hoang Tri Vo / Identity As A Service 3
One application : n users
• RBAC: access control based on roles of authenticated users
• Access control in implementation codes  only developers can understand
m applications : n users
1. introduction
Attribute based access control (ABAC) [2]
18.07.2016Hoang Tri Vo / Identity As A Service 4
• Access control based on user attributes
• Security policy stored in Policy Decision Point (PDP), controlled by admin at runtime
Identity as a service
definition [3]
18.07.2016Hoang Tri Vo / Identity As A Service 5
An approach to identity management in which an entity (individual or organization) relies on special
service provider’s functionalities that allows the entity to perform an electronic transaction, which
requires identity data managed by this provider.
2. Motivating scenarios
dynamic sso
18.07.2016Hoang Tri Vo / Identity As A Service 6
Scenario: an Office service migrates to a (SaaS) Cloud provider
Problems:
• SaaS Cloud provider has existing users who want to use the new Office service.
• Office service has local users who want to use SaaS Storage service.
Traditional solution:
• Cloud provider implements Identity Provider (IdP) for SSO
• Manual adaptation of Office service to IdP
2. Motivating scenarios
dynamic service integration
18.07.2016Hoang Tri Vo / Identity As A Service 7
Scenario:
• In Cloud A, users who use Office service, also use Storage service
• Office service wants to support its users by using Storage service as its service backend
Problems:
• Office service might migrate to Cloud B
• As an Independent Software Vendor (ISV), office service does not want to change its implementation
on any target Cloud platforms
2. Motivating scenarios
identity roaming
18.07.2016Hoang Tri Vo / Identity As A Service 8
Scenario:
• Bob lives in Germany and plays online game (interactive application)
• Bob shortly visits a country in Asia
Problems:
• Application access control (in Asia) requires Bob‘s attributes (in Germany)  200 ms latency
• We need to federate user attributes temporally (from Germany to Asia)
• Problem EU Data Protection Directive: personal information may not be disclosed in another country
3. idaas
requirements
18.07.2016Hoang Tri Vo / Identity As A Service 9
What do we have so far?
• Dynamic SSO between Cloud services and IdP
• Dynamic service integration between Cloud services (frequent provisioning/deprovisioning)
• Identity roaming within federated security domains
Requirements:
We extend „the seventh laws of identity“ of Kim Cameron [4] (for traditional IDM) with:
1. Authentication and Authorization Infrastructure (AAI) as a service
• Decoupling security handling from application logic
• AAI implementation is provided by Cloud provider (Cloud platform specific solution)
• Application admin can control the lifecycle of AAI together with lifecycle of Cloud service
(provisioning, update, termination)
2. Privacy-aware access control for identity roaming
3. idaas
proposed trust model
18.07.2016Hoang Tri Vo / Identity As A Service 10
• Trust establishment should take advantages of exiting trust relationships:
• Users trust their home provider: to provide lawful SPs, to protect user privacy
• SPs trust their home provider: to provide natural users (individuals, organizations)
• Automated trust negotiation between users and an SP in the same local domain as well as between
federated domains is the responsibility of home IDaaS and not of the SPs
• SPs should only concentrate on developing and providing their business services
3. idaas
proposed Components
18.07.2016Hoang Tri Vo / Identity As A Service 11
Reuse the reference architecture of XACML [2] with additional extentions:
• Policy Information Point may be an internal/external service outside a Cloud provider, where users
have billing contracts (e.g., mobile network operators etc).
• Application architects describe AAI (security topology) of the application.
• An orchestration engine reads security topology & controls the life cycle of Policy Enforcement Point
and Policy Decision Point at runtime
4. Future work
security lifecycle management Example
18.07.2016Hoang Tri Vo / Identity As A Service 12
1. Modelling application topology incl. Security components
I want to protect my application APIs. A service can access
the APIs on behalf of a logged-in user. The proxy and the
APIs should be in different hosts
 We may extend TOSCA metamodel (an Open Standard for Topology and Orchestration
Specification for Cloud Applications) for describing security topology of Cloud applications
4. Future work
security lifecycle management Example
18.07.2016Hoang Tri Vo / Identity As A Service 13
2. Provisioning application on a Cloud provider according to the topology description
3. Auto generate integration tests
summary
18.07.2016Hoang Tri Vo / Identity As A Service 14
Tradtional IDM IDaaS
SP Provide services for trusted third-party
users (that they do not directly manage)
Outsource IDM to a Cloud provider (to control
its life cycle) due to dynamic provisioning /
deprovisioning of the Cloud application
User Associate user identities from various
SPs with one another
Support user to protect his privacy between
federated security domains
References
(1) N. Grozev and R. Buyya, “Inter-Cloud architectures and application brokering: Taxonomy and survey,” Softw. - Pract. Exp., vol. 44, no. 3, pp.
369–390, 2014.
(2) eXtensible Access Control Markup Language (XACML) Version 3.0,” OASIS Standard, 2013. [Online]. Available: http://docs.oasis-
open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html.
(3) “Identity in the Cloud Use Cases Version 1.0,” OASIS Committee Note 01, 2012. [Online]. Available: http://docs.oasis-open.org/id-
cloud/IDCloud-usecases/v1.0/cn01/IDCloud-usecases-v1.0-cn01.html.“
(4) D. Chadwick, “Federated Identity Management,” in Foundations of Security Analysis and Design V SE - 3, vol. 5705, A. Aldini, G. Barthe, and R.
Gorrieri, Eds. Springer Berlin Heidelberg, 2009, pp. 96–120.
(5) “Topology and Orchestration Specification for Cloud Applications,” OASIS, 2013. [Online]. Available: http://docs.oasis-
open.org/tosca/TOSCA/v1.0/cs01/TOSCA-v1.0-cs01.html.
(6) K. Rannenberg, J. Camenisch, and S. Ahmad, Attribute-based Credentials for Trust. Springer, 2015.
18.07.2016 15Tri Hoang Vo/ Identity As A Service

Mais conteúdo relacionado

Mais procurados

IntraLinks Company Overview
IntraLinks Company OverviewIntraLinks Company Overview
IntraLinks Company Overview
tillbrennan
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
David J Rosenthal
 

Mais procurados (20)

T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access management
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference Architecture
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
IntraLinks Company Overview
IntraLinks Company OverviewIntraLinks Company Overview
IntraLinks Company Overview
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
 
Greytower identity Overview
Greytower identity  OverviewGreytower identity  Overview
Greytower identity Overview
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
Prashant Saxena Business briefing Okta
Prashant Saxena Business briefing OktaPrashant Saxena Business briefing Okta
Prashant Saxena Business briefing Okta
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 

Destaque

Technology executive summary
Technology executive summaryTechnology executive summary
Technology executive summary
Naman Kumar
 
OpenStack keystone identity service
OpenStack keystone identity serviceOpenStack keystone identity service
OpenStack keystone identity service
openstackindia
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
Delivery Centric
 

Destaque (20)

IDaaS. The Now Big Thing
IDaaS. The Now Big ThingIDaaS. The Now Big Thing
IDaaS. The Now Big Thing
 
Secure Amazon EC2 Environment with AWS IAM & Resource-Based Permissions (CPN2...
Secure Amazon EC2 Environment with AWS IAM & Resource-Based Permissions (CPN2...Secure Amazon EC2 Environment with AWS IAM & Resource-Based Permissions (CPN2...
Secure Amazon EC2 Environment with AWS IAM & Resource-Based Permissions (CPN2...
 
IAM Best Practices
IAM Best PracticesIAM Best Practices
IAM Best Practices
 
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
 
The Cloud Skills Gap Opportunity for Training and Consulting Companies
The Cloud Skills Gap Opportunity for Training and Consulting CompaniesThe Cloud Skills Gap Opportunity for Training and Consulting Companies
The Cloud Skills Gap Opportunity for Training and Consulting Companies
 
Closing the Cloud Skills Gap
Closing the Cloud Skills GapClosing the Cloud Skills Gap
Closing the Cloud Skills Gap
 
Oracle Security: Bridging the gap between enterprise and cloud
Oracle Security: Bridging the gap between enterprise and cloudOracle Security: Bridging the gap between enterprise and cloud
Oracle Security: Bridging the gap between enterprise and cloud
 
Technology executive summary
Technology executive summaryTechnology executive summary
Technology executive summary
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
 
CIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity ServiceCIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity Service
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
Identity as a Service
Identity as a ServiceIdentity as a Service
Identity as a Service
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
 
Building IAM for OpenStack
Building IAM for OpenStackBuilding IAM for OpenStack
Building IAM for OpenStack
 
OpenStack keystone identity service
OpenStack keystone identity serviceOpenStack keystone identity service
OpenStack keystone identity service
 
(SEC307) A Progressive Journey Through AWS IAM Federation Options
(SEC307) A Progressive Journey Through AWS IAM Federation Options(SEC307) A Progressive Journey Through AWS IAM Federation Options
(SEC307) A Progressive Journey Through AWS IAM Federation Options
 
AWS IAM and security
AWS IAM and securityAWS IAM and security
AWS IAM and security
 
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 

Semelhante a Identity as a Service: a missing gap for moving enterprise applications in Inter-Cloud

MajorProject_AnilSharma
MajorProject_AnilSharmaMajorProject_AnilSharma
MajorProject_AnilSharma
Anil Sharma
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
IJECEIAES
 

Semelhante a Identity as a Service: a missing gap for moving enterprise applications in Inter-Cloud (20)

How to Adapt Authentication and Authorization Infrastructure of Applications ...
How to Adapt Authentication and Authorization Infrastructure of Applications ...How to Adapt Authentication and Authorization Infrastructure of Applications ...
How to Adapt Authentication and Authorization Infrastructure of Applications ...
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat
 
Cloud Use Cases And Standards
Cloud Use Cases And StandardsCloud Use Cases And Standards
Cloud Use Cases And Standards
 
MajorProject_AnilSharma
MajorProject_AnilSharmaMajorProject_AnilSharma
MajorProject_AnilSharma
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services
 
Cloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patternsCloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patterns
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
An Intro to Cloud Computing
An Intro to Cloud ComputingAn Intro to Cloud Computing
An Intro to Cloud Computing
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
IRJET- Proficient Business Solutions through Cloud Services
IRJET- Proficient Business Solutions through Cloud ServicesIRJET- Proficient Business Solutions through Cloud Services
IRJET- Proficient Business Solutions through Cloud Services
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Identity as a Service: a missing gap for moving enterprise applications in Inter-Cloud

  • 1. IDaaS: a missing gap for moving enterprise applications in Inter- cloud Hoang Tri Vo Cloud Architect, Deutsche Telekom Frankfurt, 20.07.2016 On behalf of Prof. Dr. Woldemar Fuhrmann, Darmstadt University of Applied Sciences Dr. Klaus-Peter Fischer-Hellmann, Digamma GmbH
  • 2. Agenda Identity-as-a-Service: a missing gap for moving enterprise applications in Inter-Cloud 18.07.2016 2Hoang Tri Vo / Identity As A Service 2. Why moving? (Motivating scenario) 1. What is a traditional Identity Management? 3. Definition? Requirements? Proposed model?
  • 3. 1. introduction traditional identity management Applications trusts an Identity Provider (IdP) for issuing user attributes • Applications implement security token request / response (SAML, WS-Trust, WS-Federation) • Mapping attribute assertion issued by IdP to applications • Applications & IdP exchange trust credentials 18.07.2016Hoang Tri Vo / Identity As A Service 3 One application : n users • RBAC: access control based on roles of authenticated users • Access control in implementation codes  only developers can understand m applications : n users
  • 4. 1. introduction Attribute based access control (ABAC) [2] 18.07.2016Hoang Tri Vo / Identity As A Service 4 • Access control based on user attributes • Security policy stored in Policy Decision Point (PDP), controlled by admin at runtime
  • 5. Identity as a service definition [3] 18.07.2016Hoang Tri Vo / Identity As A Service 5 An approach to identity management in which an entity (individual or organization) relies on special service provider’s functionalities that allows the entity to perform an electronic transaction, which requires identity data managed by this provider.
  • 6. 2. Motivating scenarios dynamic sso 18.07.2016Hoang Tri Vo / Identity As A Service 6 Scenario: an Office service migrates to a (SaaS) Cloud provider Problems: • SaaS Cloud provider has existing users who want to use the new Office service. • Office service has local users who want to use SaaS Storage service. Traditional solution: • Cloud provider implements Identity Provider (IdP) for SSO • Manual adaptation of Office service to IdP
  • 7. 2. Motivating scenarios dynamic service integration 18.07.2016Hoang Tri Vo / Identity As A Service 7 Scenario: • In Cloud A, users who use Office service, also use Storage service • Office service wants to support its users by using Storage service as its service backend Problems: • Office service might migrate to Cloud B • As an Independent Software Vendor (ISV), office service does not want to change its implementation on any target Cloud platforms
  • 8. 2. Motivating scenarios identity roaming 18.07.2016Hoang Tri Vo / Identity As A Service 8 Scenario: • Bob lives in Germany and plays online game (interactive application) • Bob shortly visits a country in Asia Problems: • Application access control (in Asia) requires Bob‘s attributes (in Germany)  200 ms latency • We need to federate user attributes temporally (from Germany to Asia) • Problem EU Data Protection Directive: personal information may not be disclosed in another country
  • 9. 3. idaas requirements 18.07.2016Hoang Tri Vo / Identity As A Service 9 What do we have so far? • Dynamic SSO between Cloud services and IdP • Dynamic service integration between Cloud services (frequent provisioning/deprovisioning) • Identity roaming within federated security domains Requirements: We extend „the seventh laws of identity“ of Kim Cameron [4] (for traditional IDM) with: 1. Authentication and Authorization Infrastructure (AAI) as a service • Decoupling security handling from application logic • AAI implementation is provided by Cloud provider (Cloud platform specific solution) • Application admin can control the lifecycle of AAI together with lifecycle of Cloud service (provisioning, update, termination) 2. Privacy-aware access control for identity roaming
  • 10. 3. idaas proposed trust model 18.07.2016Hoang Tri Vo / Identity As A Service 10 • Trust establishment should take advantages of exiting trust relationships: • Users trust their home provider: to provide lawful SPs, to protect user privacy • SPs trust their home provider: to provide natural users (individuals, organizations) • Automated trust negotiation between users and an SP in the same local domain as well as between federated domains is the responsibility of home IDaaS and not of the SPs • SPs should only concentrate on developing and providing their business services
  • 11. 3. idaas proposed Components 18.07.2016Hoang Tri Vo / Identity As A Service 11 Reuse the reference architecture of XACML [2] with additional extentions: • Policy Information Point may be an internal/external service outside a Cloud provider, where users have billing contracts (e.g., mobile network operators etc). • Application architects describe AAI (security topology) of the application. • An orchestration engine reads security topology & controls the life cycle of Policy Enforcement Point and Policy Decision Point at runtime
  • 12. 4. Future work security lifecycle management Example 18.07.2016Hoang Tri Vo / Identity As A Service 12 1. Modelling application topology incl. Security components I want to protect my application APIs. A service can access the APIs on behalf of a logged-in user. The proxy and the APIs should be in different hosts  We may extend TOSCA metamodel (an Open Standard for Topology and Orchestration Specification for Cloud Applications) for describing security topology of Cloud applications
  • 13. 4. Future work security lifecycle management Example 18.07.2016Hoang Tri Vo / Identity As A Service 13 2. Provisioning application on a Cloud provider according to the topology description 3. Auto generate integration tests
  • 14. summary 18.07.2016Hoang Tri Vo / Identity As A Service 14 Tradtional IDM IDaaS SP Provide services for trusted third-party users (that they do not directly manage) Outsource IDM to a Cloud provider (to control its life cycle) due to dynamic provisioning / deprovisioning of the Cloud application User Associate user identities from various SPs with one another Support user to protect his privacy between federated security domains
  • 15. References (1) N. Grozev and R. Buyya, “Inter-Cloud architectures and application brokering: Taxonomy and survey,” Softw. - Pract. Exp., vol. 44, no. 3, pp. 369–390, 2014. (2) eXtensible Access Control Markup Language (XACML) Version 3.0,” OASIS Standard, 2013. [Online]. Available: http://docs.oasis- open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html. (3) “Identity in the Cloud Use Cases Version 1.0,” OASIS Committee Note 01, 2012. [Online]. Available: http://docs.oasis-open.org/id- cloud/IDCloud-usecases/v1.0/cn01/IDCloud-usecases-v1.0-cn01.html.“ (4) D. Chadwick, “Federated Identity Management,” in Foundations of Security Analysis and Design V SE - 3, vol. 5705, A. Aldini, G. Barthe, and R. Gorrieri, Eds. Springer Berlin Heidelberg, 2009, pp. 96–120. (5) “Topology and Orchestration Specification for Cloud Applications,” OASIS, 2013. [Online]. Available: http://docs.oasis- open.org/tosca/TOSCA/v1.0/cs01/TOSCA-v1.0-cs01.html. (6) K. Rannenberg, J. Camenisch, and S. Ahmad, Attribute-based Credentials for Trust. Springer, 2015. 18.07.2016 15Tri Hoang Vo/ Identity As A Service