SlideShare a Scribd company logo
1 of 32
Download to read offline
Cloud Identity Management
Morteza Ansari (linkedin.com/in/mortezaansari)
POLICY
PROVISIONING /
LIFE CYCLE
AUTHENTICATION
AUTHORIZATIONENTITLEMENTS
IDENTITY
MANAGEMENT
Consumer Identity
•  Huge scale and potential rapid growth
•  FB >1.3B active users
•  Instagram 150M active users in less than 3 years
•  Self managed identity
•  Simple namespace
•  Identity won’t drive adoption, but could hamper it
•  Must deal with recovery & credential management
Enterprise Identity
•  Centrally managed/controlled
•  Role based entitlements & authorization
•  Demand more complex security policies
•  Federation is very high priority
•  Namespace complexity
•  Multiple identifiers
•  Account/tenant validation could be tricky
•  Join/Split
Mix of Consumer & Enterprise
•  How does transfer of control pan out
•  Consumer -> enterprise
•  Enterprise -> consumer (?)
•  Who owns data associated with the identity?
•  Namespace is even more complex
•  Account recovery
•  Multiple identifiers
•  …
On-prem to Cloud
Enterprise
IdM
Cloud
On1Prem
Enterprise
IdP
Iden4ty6
Connector
SaaS
Cloud to Cloud
Enterprise
IdM
Cloud
On1Prem
Enterprise
IdP
Iden4ty6
Connector
IDaaS
SaaS2
SaaS1
SaaS Internal Abstraction
Enterprise
IdM
Cloud
On1Prem
Enterprise
IdP
Iden4ty6
Connector
SaaS
On-Prem Connector
IDaaS Bridge
Internal
Service1 Service2 Service3
Hybrid
Org Size 1 300 5K 100K
Provisioning /
De-provisioning
Authentication
Authorization
Core Functionality
Manual
Connector
SCIM
Local Credentials/OTP/Two Factor
Authentication Connector
SAML IdP
OAuth
OpenID Connect
Identity Requirements
Enterprise Consumer IoT
Scale 10-1M 1M-7B 50-100B
Identity Provider SaaS, On-prem,
or cloud IdP
SaaS, Social Everywhere!!!
Policy Enterprise IT Self managed Everywhere!!!
Identities Users, Groups,
Devices, Apps
Users, Apps/
Devices
Users, Devices,
Gateways, Apps,
Controllers, …
Standards
•  SCIM
•  SAML
•  OAuth2 & extensions
•  OpenID Connect
•  Native Apps
What is SCIM?
•  Simple Cloud Identity Management è System for Cross domain Identity
Management
•  Set of pre-defined schema – Users & Groups
•  RESTful API definition
•  CRUD
•  Bulk operations
•  Search
•  Discovery
•  Extension semantics (limited in 1.x)
•  Support for complex data models
•  SIMPLE!!!
Schema
•  Rich information model
•  XML & JSON data models
•  Concrete artifacts
•  Users & Groups
•  Usage semantics
•  MTI & recommended
•  Extensibility
•  Enterprise User
Resource
Core ResourceServiceProviderConfig Schema
id,$meta
GroupUser
Enterprise User
externalId
Operations
•  Discovery
•  Create = POST https://example.com/{v}/{resource}
•  Read = GET https://example.com/{v}/{resource}/{id}
•  Update = PUT https://example.com/{v}/{resource}/{id}
•  Delete = DELETE https://example.com/{v}/{resource}/{id}
•  Update = PATCH https://example.com/{v}/{resource}/{id}
•  Search = https://example.com/{v}/{resource}? filter={attribute} {op}
{value} & sortBy={attributeName} & sortOrder={ascending|descending}
•  Bulk
Create Request
POST /v1/Users HTTP/1.1
Host: example.com
Accept: application/json
Authorization: Bearer h480djs93hd8
{
"schemas": ["urn:scim:schemas:core:1.0"],
"externalId": "bjensen",
"userName":"bjensen",
"name": {
"familyName": "Jensen",
"givenName": "Barbara"
}
}
Operation Resource Type
Format AuthZ
“User” Payload
Create Response
HTTP/1.1 201 Created
Content-Type: application/json
Location: https://example.com/v1/Users/281...
ETag: W/"e180ee84f0671b1"
{`
"schemas": ["urn:scim:schemas:core:1.0"],
"id": "2819c223-7f76-453a-919d-413861904646",
"externalId": "bjensen",
"meta": {
"created": "2011-08-01T21:32:44.882Z",
"lastModified": "2011-08-01T21:32:44.882Z",
"location": "https://example.com/v1/Users/281...",
"version": "W/"e180ee84f0671b1""
},
"name":{
"familyName":"Jensen",
"givenName":"Barbara"
},
"userName":"bjensen"
}
Result code
Format
“Permalink”
SP generated ID
SAML
•  Security Assertion Markup Language
•  XML Based protocol
•  Oasis standard, 2.0 2005
•  Most common enterprise federation
•  SP or IdP initiated flows
•  Web Browser SSO is most common
IdP
Service
Provider
Trust
User
Service,
Request
Authen2ca2on
AuthN vs. AuthZ
AuthN vs. AuthZ
What is OAuth?
•  A token based service for authorization to resources
•  IETF standard – RFC6749, RFC6750
•  Typically has a RESTful binding, always HTTP
•  Removes passwords from resource access
•  Separate token issuance from resources
•  Supports multiple flows to obtain access tokens
•  OAuth is not an authentication service
OAuth Example – 1st Time Access
AuthoriZation
Trust
Web Browser
AutheNtication
Resource
Web App 1. I need the
authorization to change
Homer’s avatar
2. Is this really
Homer?
5. It is
Homer
8. You may change
Homer’s preferences
(access token)
6. Homer, you
cool with this?7. Yep!
9. I need to change Homer’s
avatar (access token)
3. Please enter your username
and password
10. Is access
authorized?
4. HomerJS
1234
11. Access is
authorized
OAuth Example – 2nd, 3rd, 4th… Times
AuthoriZation
Trust
Web Browser
AutheNtication
Resource
Web App 2. Is access
authorized?
3. Access is
authorized
1. I need to change
Homer’s avatar (access
token)
OpenID Connect
•  Nothing to do with OpenID!
•  Based on OAuth2
•  Adds Identity token, session management, UserInfo
endpoint, …
•  Rapidly being adopted
•  Will likely replace SAML
Additional Considerations
Additional Considerations
•  Usability is paramount
•  Analytics is key
•  “Acceptable” changes overtime
Additional Considerations
* Shamelessly “borrowed” from Mark Diodati’s slides
Additional Considerations
* Shamelessly “borrowed” from Mark Diodati’s slides
Additional Considerations
•  Risk based AuthN/AuthZ
•  Don’t forget Device, and App identity
•  Multiple services è Service identity/entitlement
•  Anonymous identity, guest
•  Session distribution
Resources
•  IETF SCIM WG
•  http://simplecloud.info
•  IETF OAuth WG
•  http://oauth.net
•  OpenID Connect
•  Native Apps WG
•  Internet Identity Workshop

More Related Content

Viewers also liked

Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Gluu
 
OpenID Overview - Seoul July 2007
OpenID Overview - Seoul July 2007OpenID Overview - Seoul July 2007
OpenID Overview - Seoul July 2007David Recordon
 
Web Access Management
Web Access ManagementWeb Access Management
Web Access ManagementMolly Knapp
 
Introduction to Research Methods
Introduction to Research MethodsIntroduction to Research Methods
Introduction to Research MethodsMolly Knapp
 
OpenID vs OAuth - Identity on the Web
OpenID vs OAuth - Identity on the WebOpenID vs OAuth - Identity on the Web
OpenID vs OAuth - Identity on the WebRichard Metzler
 
Access Management for Cloud and Mobile
Access Management for Cloud and MobileAccess Management for Cloud and Mobile
Access Management for Cloud and MobileForgeRock
 
CIS14: PingAccess 101
CIS14: PingAccess 101CIS14: PingAccess 101
CIS14: PingAccess 101CloudIDSummit
 
OpenID Bootcamp Tutorial
OpenID Bootcamp TutorialOpenID Bootcamp Tutorial
OpenID Bootcamp TutorialDavid Recordon
 
CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in ActionCloudIDSummit
 
SAML / OpenID Connect / OAuth / SCIM 技術解説 - ID&IT 2014 #idit2014
SAML / OpenID Connect / OAuth / SCIM 技術解説  - ID&IT 2014 #idit2014SAML / OpenID Connect / OAuth / SCIM 技術解説  - ID&IT 2014 #idit2014
SAML / OpenID Connect / OAuth / SCIM 技術解説 - ID&IT 2014 #idit2014Nov Matake
 

Viewers also liked (10)

Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0
 
OpenID Overview - Seoul July 2007
OpenID Overview - Seoul July 2007OpenID Overview - Seoul July 2007
OpenID Overview - Seoul July 2007
 
Web Access Management
Web Access ManagementWeb Access Management
Web Access Management
 
Introduction to Research Methods
Introduction to Research MethodsIntroduction to Research Methods
Introduction to Research Methods
 
OpenID vs OAuth - Identity on the Web
OpenID vs OAuth - Identity on the WebOpenID vs OAuth - Identity on the Web
OpenID vs OAuth - Identity on the Web
 
Access Management for Cloud and Mobile
Access Management for Cloud and MobileAccess Management for Cloud and Mobile
Access Management for Cloud and Mobile
 
CIS14: PingAccess 101
CIS14: PingAccess 101CIS14: PingAccess 101
CIS14: PingAccess 101
 
OpenID Bootcamp Tutorial
OpenID Bootcamp TutorialOpenID Bootcamp Tutorial
OpenID Bootcamp Tutorial
 
CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in Action
 
SAML / OpenID Connect / OAuth / SCIM 技術解説 - ID&IT 2014 #idit2014
SAML / OpenID Connect / OAuth / SCIM 技術解説  - ID&IT 2014 #idit2014SAML / OpenID Connect / OAuth / SCIM 技術解説  - ID&IT 2014 #idit2014
SAML / OpenID Connect / OAuth / SCIM 技術解説 - ID&IT 2014 #idit2014
 

Similar to Cloud identity management meetup 150108

SharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Authentication And Authorization SPTechCon San FranciscoSharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Authentication And Authorization SPTechCon San FranciscoLiam Cleary [MVP]
 
SharePoint Saturday Austin - Share point authentication and authorization
SharePoint Saturday Austin - Share point authentication and authorizationSharePoint Saturday Austin - Share point authentication and authorization
SharePoint Saturday Austin - Share point authentication and authorizationLiam Cleary [MVP]
 
unit 1 Federated Identity Management_4.pptx
unit 1 Federated Identity Management_4.pptxunit 1 Federated Identity Management_4.pptx
unit 1 Federated Identity Management_4.pptxzmulani8
 
Understanding SharePoint Apps, authentication and authorization infrastructur...
Understanding SharePoint Apps, authentication and authorization infrastructur...Understanding SharePoint Apps, authentication and authorization infrastructur...
Understanding SharePoint Apps, authentication and authorization infrastructur...SPC Adriatics
 
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday The Conference DC - Are you who you say you are share poi...SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday The Conference DC - Are you who you say you are share poi...Liam Cleary [MVP]
 
Five Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityFive Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityMark Diodati
 
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...Envision IT
 
IoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architectureIoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architectureVinod Wilson
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014Kelly Grizzle
 
Introduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2CIntroduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2CJoonas Westlin
 
O365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
O365Con18 - Hybrid SharePoint Deep Dive - Thomas VochtenO365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
O365Con18 - Hybrid SharePoint Deep Dive - Thomas VochtenNCCOMMS
 
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You ThinkCIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You ThinkCloudIDSummit
 
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More SafeMake your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More SafeThuan Ng
 
ConFoo 2015 - Securing RESTful resources with OAuth2
ConFoo 2015 - Securing RESTful resources with OAuth2ConFoo 2015 - Securing RESTful resources with OAuth2
ConFoo 2015 - Securing RESTful resources with OAuth2Rodrigo Cândido da Silva
 
OAuth 2.0 and OpenId Connect
OAuth 2.0 and OpenId ConnectOAuth 2.0 and OpenId Connect
OAuth 2.0 and OpenId ConnectSaran Doraiswamy
 
Rest API Security
Rest API SecurityRest API Security
Rest API SecurityStormpath
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authenticationDavid Hoen
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authenticationYoung Alista
 

Similar to Cloud identity management meetup 150108 (20)

SharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Authentication And Authorization SPTechCon San FranciscoSharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Authentication And Authorization SPTechCon San Francisco
 
Integrando Azure AD B2C con Xamarin.Forms
Integrando Azure AD B2C con Xamarin.FormsIntegrando Azure AD B2C con Xamarin.Forms
Integrando Azure AD B2C con Xamarin.Forms
 
.NET MAUI + Azure AD B2C
.NET MAUI + Azure AD B2C.NET MAUI + Azure AD B2C
.NET MAUI + Azure AD B2C
 
SharePoint Saturday Austin - Share point authentication and authorization
SharePoint Saturday Austin - Share point authentication and authorizationSharePoint Saturday Austin - Share point authentication and authorization
SharePoint Saturday Austin - Share point authentication and authorization
 
unit 1 Federated Identity Management_4.pptx
unit 1 Federated Identity Management_4.pptxunit 1 Federated Identity Management_4.pptx
unit 1 Federated Identity Management_4.pptx
 
Understanding SharePoint Apps, authentication and authorization infrastructur...
Understanding SharePoint Apps, authentication and authorization infrastructur...Understanding SharePoint Apps, authentication and authorization infrastructur...
Understanding SharePoint Apps, authentication and authorization infrastructur...
 
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday The Conference DC - Are you who you say you are share poi...SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
 
Five Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityFive Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern Identity
 
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
 
IoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architectureIoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architecture
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
 
Introduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2CIntroduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2C
 
O365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
O365Con18 - Hybrid SharePoint Deep Dive - Thomas VochtenO365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
O365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
 
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You ThinkCIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
 
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More SafeMake your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
 
ConFoo 2015 - Securing RESTful resources with OAuth2
ConFoo 2015 - Securing RESTful resources with OAuth2ConFoo 2015 - Securing RESTful resources with OAuth2
ConFoo 2015 - Securing RESTful resources with OAuth2
 
OAuth 2.0 and OpenId Connect
OAuth 2.0 and OpenId ConnectOAuth 2.0 and OpenId Connect
OAuth 2.0 and OpenId Connect
 
Rest API Security
Rest API SecurityRest API Security
Rest API Security
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authentication
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authentication
 

Recently uploaded

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Recently uploaded (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Cloud identity management meetup 150108

  • 1. Cloud Identity Management Morteza Ansari (linkedin.com/in/mortezaansari)
  • 2.
  • 4. Consumer Identity •  Huge scale and potential rapid growth •  FB >1.3B active users •  Instagram 150M active users in less than 3 years •  Self managed identity •  Simple namespace •  Identity won’t drive adoption, but could hamper it •  Must deal with recovery & credential management
  • 5. Enterprise Identity •  Centrally managed/controlled •  Role based entitlements & authorization •  Demand more complex security policies •  Federation is very high priority •  Namespace complexity •  Multiple identifiers •  Account/tenant validation could be tricky •  Join/Split
  • 6. Mix of Consumer & Enterprise •  How does transfer of control pan out •  Consumer -> enterprise •  Enterprise -> consumer (?) •  Who owns data associated with the identity? •  Namespace is even more complex •  Account recovery •  Multiple identifiers •  …
  • 11. Org Size 1 300 5K 100K Provisioning / De-provisioning Authentication Authorization Core Functionality Manual Connector SCIM Local Credentials/OTP/Two Factor Authentication Connector SAML IdP OAuth OpenID Connect
  • 12. Identity Requirements Enterprise Consumer IoT Scale 10-1M 1M-7B 50-100B Identity Provider SaaS, On-prem, or cloud IdP SaaS, Social Everywhere!!! Policy Enterprise IT Self managed Everywhere!!! Identities Users, Groups, Devices, Apps Users, Apps/ Devices Users, Devices, Gateways, Apps, Controllers, …
  • 13. Standards •  SCIM •  SAML •  OAuth2 & extensions •  OpenID Connect •  Native Apps
  • 14. What is SCIM? •  Simple Cloud Identity Management è System for Cross domain Identity Management •  Set of pre-defined schema – Users & Groups •  RESTful API definition •  CRUD •  Bulk operations •  Search •  Discovery •  Extension semantics (limited in 1.x) •  Support for complex data models •  SIMPLE!!!
  • 15. Schema •  Rich information model •  XML & JSON data models •  Concrete artifacts •  Users & Groups •  Usage semantics •  MTI & recommended •  Extensibility •  Enterprise User Resource Core ResourceServiceProviderConfig Schema id,$meta GroupUser Enterprise User externalId
  • 16. Operations •  Discovery •  Create = POST https://example.com/{v}/{resource} •  Read = GET https://example.com/{v}/{resource}/{id} •  Update = PUT https://example.com/{v}/{resource}/{id} •  Delete = DELETE https://example.com/{v}/{resource}/{id} •  Update = PATCH https://example.com/{v}/{resource}/{id} •  Search = https://example.com/{v}/{resource}? filter={attribute} {op} {value} & sortBy={attributeName} & sortOrder={ascending|descending} •  Bulk
  • 17. Create Request POST /v1/Users HTTP/1.1 Host: example.com Accept: application/json Authorization: Bearer h480djs93hd8 { "schemas": ["urn:scim:schemas:core:1.0"], "externalId": "bjensen", "userName":"bjensen", "name": { "familyName": "Jensen", "givenName": "Barbara" } } Operation Resource Type Format AuthZ “User” Payload
  • 18. Create Response HTTP/1.1 201 Created Content-Type: application/json Location: https://example.com/v1/Users/281... ETag: W/"e180ee84f0671b1" {` "schemas": ["urn:scim:schemas:core:1.0"], "id": "2819c223-7f76-453a-919d-413861904646", "externalId": "bjensen", "meta": { "created": "2011-08-01T21:32:44.882Z", "lastModified": "2011-08-01T21:32:44.882Z", "location": "https://example.com/v1/Users/281...", "version": "W/"e180ee84f0671b1"" }, "name":{ "familyName":"Jensen", "givenName":"Barbara" }, "userName":"bjensen" } Result code Format “Permalink” SP generated ID
  • 19. SAML •  Security Assertion Markup Language •  XML Based protocol •  Oasis standard, 2.0 2005 •  Most common enterprise federation •  SP or IdP initiated flows •  Web Browser SSO is most common IdP Service Provider Trust User Service, Request Authen2ca2on
  • 22. What is OAuth? •  A token based service for authorization to resources •  IETF standard – RFC6749, RFC6750 •  Typically has a RESTful binding, always HTTP •  Removes passwords from resource access •  Separate token issuance from resources •  Supports multiple flows to obtain access tokens •  OAuth is not an authentication service
  • 23. OAuth Example – 1st Time Access AuthoriZation Trust Web Browser AutheNtication Resource Web App 1. I need the authorization to change Homer’s avatar 2. Is this really Homer? 5. It is Homer 8. You may change Homer’s preferences (access token) 6. Homer, you cool with this?7. Yep! 9. I need to change Homer’s avatar (access token) 3. Please enter your username and password 10. Is access authorized? 4. HomerJS 1234 11. Access is authorized
  • 24. OAuth Example – 2nd, 3rd, 4th… Times AuthoriZation Trust Web Browser AutheNtication Resource Web App 2. Is access authorized? 3. Access is authorized 1. I need to change Homer’s avatar (access token)
  • 25. OpenID Connect •  Nothing to do with OpenID! •  Based on OAuth2 •  Adds Identity token, session management, UserInfo endpoint, … •  Rapidly being adopted •  Will likely replace SAML
  • 27. Additional Considerations •  Usability is paramount •  Analytics is key •  “Acceptable” changes overtime
  • 28. Additional Considerations * Shamelessly “borrowed” from Mark Diodati’s slides
  • 29. Additional Considerations * Shamelessly “borrowed” from Mark Diodati’s slides
  • 30. Additional Considerations •  Risk based AuthN/AuthZ •  Don’t forget Device, and App identity •  Multiple services è Service identity/entitlement •  Anonymous identity, guest •  Session distribution
  • 31.
  • 32. Resources •  IETF SCIM WG •  http://simplecloud.info •  IETF OAuth WG •  http://oauth.net •  OpenID Connect •  Native Apps WG •  Internet Identity Workshop