Team9 presentation version 3(1)

149 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
149
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Team9 presentation version 3(1)

  1. 1. AUTHENTICATIONAS ASERVICEby TEAM9 SOLUTIONS
  2. 2. OBJECTIVE What is Authentication? About cloud computing & its services Authentication as a service(AaaS) Components of AaaS Authentication Federation Advantages of AaaS AaaS Service Providers
  3. 3. AUTHENTICATION Authentication is the process of identifying auser Authentication lets an entity prove who he/sheclaims to be Authentication is the process of validating orconfirming that access credentials provided by a user (for instance, a user ID andpassword) are valid. A user in this case couldbe a person, another application, or a serviceAuthentication does not guaranteeauthorization.
  4. 4. CLOUD COMPUTING & SERVICE Computing resources are provisioned, used and madeavailable on internet or intranet. Cloud computing makes heavy use of Virtualization andSDN (software defined networking ) Services that run on top of the cloud computing arecalled cloud services. Gmail is a very good example of cloud service.
  5. 5. AUTHENTICATION AS A SERVICE(AaaS) As online access to services becomes ubiquitous andthe cloud access model gains momentum, authenticationis increasingly becoming a focal point for securityprofessionals. With bank accounts, health records, corporateintellectual property and politically sensitive informationbeing just a few clicks away, no matter where in theworld you are ,it is natural to worry about the identity ofthose wishing to gain access .This is whereAuthentication comes into play
  6. 6. AUTHENTICATION AS A SERVICE(AaaS) Authentication server and other resources needed forauthentication are placed on the internet (cloud) and areused by clients/users that are physically distant. The authentication servers and other components arenow on the cloud and not on the server farm of anenterprise network. The Cloud Security Alliance (CSA) is a non-profitorganization with a mission to promote the use of bestpractices for providing security within Cloud Computing,and to provide education, led by a broad coalition ofindustry practitioners, corporations, associations andother key stakeholders.
  7. 7. COMPONENTS OF AaaS Cloud Federation: It refers to the unionization ofsoftware, infrastructure and platform services fromdifferent networks that can be accessed by a client viathe internet. It is important to note that federated cloudcomputing services still rely on the existence of physicaldata centers. Service Provider (SP): Provide hosting authenticationservice. Identity Provider (IdP): An authoritative source ofidentity data for users provides the primaryauthentication of the user. The Identity Provider can bethe service consumer itself, or external to it.
  8. 8. AUTHENTICATION AS A SERVICE(AaaS) AaaS involves Federated Single Sign-On (SSO) usingindustry standards such as SAML, OAUTH and OpenID. Enables 2 factor strong authentication with convenientsoft OTP token support.
  9. 9. AUTHENTICATION FEDERATION
  10. 10. ADVANTAGE OF AaaS Elastic capability – scale up/down on demand Resources are abstracted /virtualized Interoperability between different platforms High availability Secure and reliable ( two factor) Pay as you go service or pay per use service (flexiblepayment mode) Single Sign On ( SSO)
  11. 11. AaaS SERVICE PROVIDERS Support a wide range of tokens and tokenlessauthentication methods allowing each user to choose theright token type for their individual needs. Strong authentication can be provided , standards suchas RADIUS and SAML and the availability of APIs andagents for other applications. We support 3rd party tokens ensuring that existinginvestment in tokens is not lost when users migrate toour solution. The comprehensive degree of automation in the solutiondrastically reduces the cost of management andadministration.
  12. 12. AaaS SERVICE PROVIDERS
  13. 13. Conclusion Authentication As A Service (AaaS) gives us all thebenefits of cloud computing without worrying aboutthe security of our personal or business data. AaaS also provide the countermeasures against IDtheft, sensitive information like credit card, healthrecords etc.

×