SlideShare uma empresa Scribd logo
1 de 39
Baixar para ler offline
Security in the Context of
Distributed Computing
Who am I?
Solutions Architect
For DeARX
Based in our Cape Town office
Christhonie Geldenhuys
Topics
A practical view based on our experience with distributed computing
► A look at modern distributed systems
► Authentication
► Creating a seamless experience
► Leveraging Social login
► Additional factors
► Identity Management
► A single view
► Personal data and consent
► Authorisation
► Rate limiting or throttling
An evolution in component size
Source: Tiempo Development
And an evolution in location
Monolithic to Microservices
Source: Tiempo Development
So how does this impact security?
Key considerations remain the same
► Who is accessing
the system?
Authentication
► What can they do?
Authorization
► When/how often
can they do it?
Throttling
Authentication
Traditional monolithic authentication
Typical application level
implementation of role base
access control
Traditional approach cause duplication
Legacy User DB
Active Directory
App 1
App 2
We still see many examples of this!
Traditional approach cause duplication
Active Directory
Application 1
Application 2
This is much better.
Authentication as a service
Use a “Trusted 3rd
party”
Back-end servers
Central authentication mechanism
Provide a single mechanism
for identity management
and authentication.
Integrate applications with
the Identity server.
Benefits of this approach
► A single mechanism for authentication
► Common and shared across all application
► User information in one place
► Easy to maintain
► Can leverage proven security standards
Using an Identity Server provides;
► Central login mechanism
► Customised registration flow
► Customised approval flows
► Advanced authentication techniques
Single Sign-On
Single Sign-On application have the following characteristics;
► Static, well known URL – i.e. http://logon.acme.com
► Authentication session is maintained at this URL;
► Using cookies to identify the session
► Redirect mechanisms are used to redirect to and from this app
Benefits
► This enables the authentication session to span multiple application.
► Login once for a range of applications.
Implementation considerations
► Users and Groups now become a
central responsibility
► Roles remain an application
concern
► Share information via API or
claims.
How do we separate the various identity objects?
Social Login – Use cases
► End-users – Removes the risk to create yet another account
► Occasional or temporary workers – i.e. contractors, not requiring the benefits
corporate-wide access control groups / roles
Identity information and POPI
What is POPI
► Protection of Personal Information Act will regulate the Processing of
Personal Information. 
► Personal Information broadly means any information relating to an
identifiable, living natural person or juristic person (companies, CC’s etc.)
and includes, but is not limited to:
► contact details: email, telephone, address etc.
► demographic information: age, gender, race, birth date, ethnicity etc.
► history: employment, financial, educational, criminal, medical history
► biometric information: blood type etc.
► opinions of and about the person
► private correspondence etc.
► Processing means broadly anything that can be done with the Personal
Information, including collection, usage, storage, dissemination, etc.
Personal information as a service
What if…
► We can access personal data from a central source
► Information is stored once.
► Easy to add, change or remove in one place.
► Central access control
► Provide a customer self-help portal to view or change data.
► Get user content to determine who can use it.
Personal information capture
► Initial user / customer information is
captured as part of the registration
process.
► Additional user information can also be
stored here over time.
Personal information distribution
Obtaining the user consent is one
of the fundamental requirements
of personal information
regulation.
WSO2 Identity Server facilitates
this through its Consent
Management features. 
Support in WSO2 Identity Server
Consent Management
► Provides self-help profile creation, user provisioning to other systems, sharing
of user attributes through SSO, and identity federation are fully based on user
consent
► Users can review, modify, and revoke previously given consent via the
self-care user portal or RESTful Consent API
► Consent API can also be used to integrate WSO2 IS consent management
capabilities with existing applications
► WSO2 IS can be used to manage consent of any 3rd party application via the
RESTful Consent API
User account management by WSO2 IS
Authorization
OAuth to the rescue
WSO2 Identity Server includes
support for the popular OAuth
standards.
API Manager as a first line of defence
API Manager help offloads checking tokens at the point of ingress.
Who is this? – Access tokens
When using Access Tokens…
We might want to check who is using this token;
► For display of user name perhaps
► For additional authorization decisions
► Per operation, per business record, etc.
Access token lookup
► Use API to validate/lookup
token claims.
► Cache token for the validity
period.
► Store principle and claims as
part of cache.
Token validation
lookup
Who is this? - JWT
Access Token or JWT?
Access Token
Benefits
► Small, simple
► Ideal for smaller number of
sessions and “chatty” interfaces.
Drawbacks
► Require lookup
► Mitigated through caching
JWT
Benefits
► Self contained, stateless
► Verification can be self contained,
or via lookup (remember to cache)
Drawbacks
► Large (sometimes larger than
payload). Not ideal for;
► “Chatty” APIs
► Expensive networks, i.e. Mobile,
Satellite, IoT
Trust your services
It is vital to verify the communication path and authenticity of your identity /
authentication infrastructure.
Identity your infrastructure;
► Use HTTPS!
► Check the certificates!
Consider using certificate chains:
Which OAuth flow / grant type?
https://auth0.com/docs/api-auth/which-oauth-flow-to-use
Use the online decision tree to determine which OAuth flow
is best for your application;
Rate limiting
Rate limiting – Why and how
► Limit access to APIs using the
various rate limiting filters.
► Absolute limits or support for burst
traffic.
► API manager continuously monitors
the traffic and limits.
► API suspension is implemented
when limits are reached.
► Rather stop them at the gate than
try to deal with load while under
load.
► Suspension returns pre-defined
error codes (customisable)
► API auto resume after predefined
period(s).
WSO2 Throttling Policies
Summary
► Authentication as a service
► A seamless experience for the user,
across multiple applications
► Identity as a service
► User/customer information in one
place.
► Controlled access to that
information.
► Authorization
► A mechanism to provide access to
resources.
► Rate limiting
► To protect our systems from
over-use and abuse.

Mais conteúdo relacionado

Mais procurados

Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
Roger CARHUATOCTO
 

Mais procurados (14)

Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
Single sign on assistant an authentication brokers
Single sign on assistant an authentication brokersSingle sign on assistant an authentication brokers
Single sign on assistant an authentication brokers
 
Openid
OpenidOpenid
Openid
 
End-to-End Identity Management
End-to-End Identity ManagementEnd-to-End Identity Management
End-to-End Identity Management
 
Uma webinar 2014 06-19
Uma webinar 2014 06-19Uma webinar 2014 06-19
Uma webinar 2014 06-19
 
SCWCD : Secure web
SCWCD : Secure webSCWCD : Secure web
SCWCD : Secure web
 
Securing GIS data
Securing GIS dataSecuring GIS data
Securing GIS data
 
Security Ecosystem of Digital Wallets
Security Ecosystem of Digital Wallets Security Ecosystem of Digital Wallets
Security Ecosystem of Digital Wallets
 
Credit checking
Credit checkingCredit checking
Credit checking
 
Authentication through Claims-Based Authentication
Authentication through Claims-Based AuthenticationAuthentication through Claims-Based Authentication
Authentication through Claims-Based Authentication
 
[POSS 2019] MicroServices authentication and authorization with LemonLDAP::NG
[POSS 2019] MicroServices authentication and authorization with LemonLDAP::NG[POSS 2019] MicroServices authentication and authorization with LemonLDAP::NG
[POSS 2019] MicroServices authentication and authorization with LemonLDAP::NG
 
"Безопасность микросервисных приложений"
"Безопасность микросервисных приложений""Безопасность микросервисных приложений"
"Безопасность микросервисных приложений"
 
Вячеслав Михайлов «Как сделать Single Sign-On в веб-приложении в 10 строк кода»
Вячеслав Михайлов «Как сделать Single Sign-On в веб-приложении в 10 строк кода»Вячеслав Михайлов «Как сделать Single Sign-On в веб-приложении в 10 строк кода»
Вячеслав Михайлов «Как сделать Single Sign-On в веб-приложении в 10 строк кода»
 
DIDS and AppIDS
DIDS and AppIDSDIDS and AppIDS
DIDS and AppIDS
 

Semelhante a [WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computing Environment

Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...
Conference Papers
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...
Conference Papers
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
SafeNet
 
Introduction to Decentralized Finance (DeFi)
Introduction to Decentralized Finance (DeFi)Introduction to Decentralized Finance (DeFi)
Introduction to Decentralized Finance (DeFi)
101 Blockchains
 

Semelhante a [WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computing Environment (20)

SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
unit4.pptx
unit4.pptxunit4.pptx
unit4.pptx
 
Blockchain: the trust fabric for next generation digital identity management
Blockchain: the trust fabric for next generation  digital identity managementBlockchain: the trust fabric for next generation  digital identity management
Blockchain: the trust fabric for next generation digital identity management
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...
 
76 s201923
76 s20192376 s201923
76 s201923
 
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for Applications
 
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
 
AbedElilahElmahmoumP1.pptx
AbedElilahElmahmoumP1.pptxAbedElilahElmahmoumP1.pptx
AbedElilahElmahmoumP1.pptx
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?
 
Introduction to Decentralized Finance (DeFi)
Introduction to Decentralized Finance (DeFi)Introduction to Decentralized Finance (DeFi)
Introduction to Decentralized Finance (DeFi)
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2
 

Mais de WSO2

Mais de WSO2 (20)

Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
WSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the CloudWSO2CON 2024 - Elevating the Integration Game to the Cloud
WSO2CON 2024 - Elevating the Integration Game to the Cloud
 
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
 
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and ApplicationsWSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital BusinessesWSO2CON 2024 - Software Engineering for Digital Businesses
WSO2CON 2024 - Software Engineering for Digital Businesses
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
 
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computing Environment

  • 1. Security in the Context of Distributed Computing
  • 2. Who am I? Solutions Architect For DeARX Based in our Cape Town office Christhonie Geldenhuys
  • 3. Topics A practical view based on our experience with distributed computing ► A look at modern distributed systems ► Authentication ► Creating a seamless experience ► Leveraging Social login ► Additional factors ► Identity Management ► A single view ► Personal data and consent ► Authorisation ► Rate limiting or throttling
  • 4.
  • 5. An evolution in component size Source: Tiempo Development
  • 6. And an evolution in location
  • 8. So how does this impact security?
  • 9. Key considerations remain the same ► Who is accessing the system? Authentication ► What can they do? Authorization ► When/how often can they do it? Throttling
  • 11. Traditional monolithic authentication Typical application level implementation of role base access control
  • 12. Traditional approach cause duplication Legacy User DB Active Directory App 1 App 2 We still see many examples of this!
  • 13. Traditional approach cause duplication Active Directory Application 1 Application 2 This is much better.
  • 14. Authentication as a service Use a “Trusted 3rd party” Back-end servers
  • 15. Central authentication mechanism Provide a single mechanism for identity management and authentication. Integrate applications with the Identity server.
  • 16. Benefits of this approach ► A single mechanism for authentication ► Common and shared across all application ► User information in one place ► Easy to maintain ► Can leverage proven security standards Using an Identity Server provides; ► Central login mechanism ► Customised registration flow ► Customised approval flows ► Advanced authentication techniques
  • 17. Single Sign-On Single Sign-On application have the following characteristics; ► Static, well known URL – i.e. http://logon.acme.com ► Authentication session is maintained at this URL; ► Using cookies to identify the session ► Redirect mechanisms are used to redirect to and from this app Benefits ► This enables the authentication session to span multiple application. ► Login once for a range of applications.
  • 18. Implementation considerations ► Users and Groups now become a central responsibility ► Roles remain an application concern ► Share information via API or claims. How do we separate the various identity objects?
  • 19. Social Login – Use cases ► End-users – Removes the risk to create yet another account ► Occasional or temporary workers – i.e. contractors, not requiring the benefits corporate-wide access control groups / roles
  • 21. What is POPI ► Protection of Personal Information Act will regulate the Processing of Personal Information.  ► Personal Information broadly means any information relating to an identifiable, living natural person or juristic person (companies, CC’s etc.) and includes, but is not limited to: ► contact details: email, telephone, address etc. ► demographic information: age, gender, race, birth date, ethnicity etc. ► history: employment, financial, educational, criminal, medical history ► biometric information: blood type etc. ► opinions of and about the person ► private correspondence etc. ► Processing means broadly anything that can be done with the Personal Information, including collection, usage, storage, dissemination, etc.
  • 22. Personal information as a service What if… ► We can access personal data from a central source ► Information is stored once. ► Easy to add, change or remove in one place. ► Central access control ► Provide a customer self-help portal to view or change data. ► Get user content to determine who can use it.
  • 23. Personal information capture ► Initial user / customer information is captured as part of the registration process. ► Additional user information can also be stored here over time.
  • 24. Personal information distribution Obtaining the user consent is one of the fundamental requirements of personal information regulation. WSO2 Identity Server facilitates this through its Consent Management features. 
  • 25. Support in WSO2 Identity Server Consent Management ► Provides self-help profile creation, user provisioning to other systems, sharing of user attributes through SSO, and identity federation are fully based on user consent ► Users can review, modify, and revoke previously given consent via the self-care user portal or RESTful Consent API ► Consent API can also be used to integrate WSO2 IS consent management capabilities with existing applications ► WSO2 IS can be used to manage consent of any 3rd party application via the RESTful Consent API
  • 28. OAuth to the rescue WSO2 Identity Server includes support for the popular OAuth standards.
  • 29. API Manager as a first line of defence API Manager help offloads checking tokens at the point of ingress.
  • 30. Who is this? – Access tokens When using Access Tokens… We might want to check who is using this token; ► For display of user name perhaps ► For additional authorization decisions ► Per operation, per business record, etc.
  • 31. Access token lookup ► Use API to validate/lookup token claims. ► Cache token for the validity period. ► Store principle and claims as part of cache. Token validation lookup
  • 32. Who is this? - JWT
  • 33. Access Token or JWT? Access Token Benefits ► Small, simple ► Ideal for smaller number of sessions and “chatty” interfaces. Drawbacks ► Require lookup ► Mitigated through caching JWT Benefits ► Self contained, stateless ► Verification can be self contained, or via lookup (remember to cache) Drawbacks ► Large (sometimes larger than payload). Not ideal for; ► “Chatty” APIs ► Expensive networks, i.e. Mobile, Satellite, IoT
  • 34. Trust your services It is vital to verify the communication path and authenticity of your identity / authentication infrastructure. Identity your infrastructure; ► Use HTTPS! ► Check the certificates! Consider using certificate chains:
  • 35. Which OAuth flow / grant type? https://auth0.com/docs/api-auth/which-oauth-flow-to-use Use the online decision tree to determine which OAuth flow is best for your application;
  • 37. Rate limiting – Why and how ► Limit access to APIs using the various rate limiting filters. ► Absolute limits or support for burst traffic. ► API manager continuously monitors the traffic and limits. ► API suspension is implemented when limits are reached. ► Rather stop them at the gate than try to deal with load while under load. ► Suspension returns pre-defined error codes (customisable) ► API auto resume after predefined period(s).
  • 39. Summary ► Authentication as a service ► A seamless experience for the user, across multiple applications ► Identity as a service ► User/customer information in one place. ► Controlled access to that information. ► Authorization ► A mechanism to provide access to resources. ► Rate limiting ► To protect our systems from over-use and abuse.