SlideShare a Scribd company logo
1 of 28
Download to read offline
Extending UMA Protocol to support
                                Trusted Claims (tClaims)

                                 Newcastle University

                                    Domenico Catalano
                                    and the Smart Team




       13th July, 2011                      1                  V.3

Wednesday, July 13, 2011
Who I am

                           • Domenico Catalano
                           • Senior Sales Consultant @Oracle
                             Italy + Sun
                           • Identity & Security Architect
                           • Leadership team member (UX)
                             @Kantara UMA WG


                                       2
Wednesday, July 13, 2011
Agenda

                     • UMA Conceptual model
                     • tClaims Requirements Analysis
                     • OpenID Connect
                     • UMA/OpenID Connect Integration approach
                     • User Interaction
                     • Trust Model consideration
                     • Q&A
                                          3
Wednesday, July 13, 2011
UMA Conceptual Model

                                                     UMA
                                                      AM
                                                  policy decision
                                        Control        Point



                                                     Protect




                                                                           Authorize

                     Authorizing User                                                                   Requesting
                                        Manage                                                            Party




                               UMA                                                                 External
                              Domain                                                               Domain
                                                                           Protected
                                                                    HOST   Resource    Requester


                                                                            Access




                                                                              4
Wednesday, July 13, 2011
UMA Trusted Claims

                    • UMA Trusted Claims approach is designed to support
                           Claims-based Access Control.

                    • In a Claim-based Access Control, the decision to
                           grant access to a protected resource is made based
                           on Subject’s information, such as name, age, email
                           address, role, location, or credit score, etc.

                                                  Claims   Trusted Claims
                                          Trusted                           usted C
                                                                                      laims




                                                           5
Wednesday, July 13, 2011
tClaims example scenarios


                    • Enterprise class scenario
                           ‣ Accessing Personal Loan Special Program

                    • Social/web class scenario
                           ‣ Sharing photo with “bob@gmail.com”




                                                 6
Wednesday, July 13, 2011
Accessing Personal Loan special program
                        Enterprise Class Scenario

                    • Bank online service provides an User-
                           Managed Claims access control to restrict
                           and personalize access to special program/
                           service (i.e. personal loan with low interest
                           rate) to users which have determinate
                           employment (i.e. government employee),
                           and have an high credit score.



                                                7
Wednesday, July 13, 2011
Alice at
  Bank site
                                              Bank of Future
  for requesting
                                                                                                                                      10.0



                                                                 online Banking

  access to a                                                                                                            Welcome aalice



  restricted
  service.                                          Access to Loyalty Program
                                                    You have selected a protected resource to access special loyalty


  An UMA
                                                    program for US Government Employee:

                                                         Personal Loan with low interest rate (2%)

  protected                                         Select your UMA Authorization Manager to provide trusted Claims to
                                                    grant access to this resource.


  resource.                                            CopMonkey AM




                           © copyright 2009 CMInc. All rights reserved.




                                                                                    8
Wednesday, July 13, 2011
Sharing Photo with “bob@gmail.com
                                Social/web Class Scenario



                    • Alice wants share a photo gallery with bob if
                           Bob has an account email “bob@gmail.com”
                           and he is 18 years old.




                                             9
Wednesday, July 13, 2011
Alice defines
  claims-based
  authorization
  policy, using In-
  App widget




                           10
Wednesday, July 13, 2011
Requirements Analysis

                     • Authorizing User (Resource Owner) needs a claims-
                           based access control to restrict access to own
                           resources based on Requesting Party’s Identity
                           attributes.

                     • Identity attributes must issued by a Trusted Third
                           Party (TTP) and verifiable by a Claims Requester.

                     • Claims may be logically aggregated to provide a
                           collection of attributes from different Attribute
                           Providers (Claims Host).

                                                   11
Wednesday, July 13, 2011
OpenID Connect


                    • OpenID Connect provides authentication,
                           authorization, and attribute transmission capability. It
                           allows third party attested claims from distributed
                           sources.

                    • This specification is largely compliant with OAuth
                           2.0 draft 15.

                           OpenID Connect Core 1.0 - draft 04




                                                                12
Wednesday, July 13, 2011
OpenID Connect protocol overview

                    •      OpenID Connect protocol in abstract follows the following steps:
                           1. The Client sends a request to the Server’s End-User
                              Authorization Endpoint.

                           2. The Server authenticates the user and obtains appropriate
                              authorization.

                           3. The Server responds with access_token and a few other
                              variables.

                           4. The Client sends a request with access_token to the Userinfo
                              Endpoint.

                           5. Userinfo Endpoint returns the additional user supported by the
                              Server.

                                                        13
Wednesday, July 13, 2011
UMA Conceptual Model

                                                     UMA
                                                      AM
                                                  policy decision
                                        Control        Point



                                                     Protect




                                                                           Authorize

                     Authorizing User                                                                   Requesting
                                        Manage                                                            Party




                               UMA                                                                 External
                              Domain                                                               Domain
                                                                           Protected
                                                                    HOST   Resource    Requester


                                                                            Access




                                                                             14
Wednesday, July 13, 2011
UMA Conceptual Model
                                                                    with tClaims
                                                                                                                      OpenID
                                                     UMA            Claims
                                                                                               1. Request
                                                                    Client   3. Access_token                          Connect
                                                      AM
                                                                                                                        AS
                                                  policy decision
                                        Control        Point             5. Userinfo
                                                                                                                                        2. AuthN
                                                                                                                                         AuthZ

                                                                                                       4. Request Userinfo
                                                     Protect
                                                                                                                             Protect



                                                                                        Authorize
                                                                                                                        UserInfo
                     Authorizing User                                                                                   EndPoint                   Requesting
                                        Manage                                                                                                       Party



                                                                                                                                       SSO

                               UMA                                                                                                           OpenID
                              Domain                                                                                                         Domain
                                                                                        Protected
                                                                    HOST                Resource       Requester


                                                                                         Access




                                                                                          15
Wednesday, July 13, 2011
UMA/OpenID Connect
                                      Integration approach
                                                             UserInfo
                                                             EndPoint


                                                              Claims
                                            Claims           Provider              Protected Resource




                               UMA
                                                 Claims                       AuthZ         OpenID
                            Authorization
                                                 Client                       Server    Identity Provider
                              Manager

                             OpenID RP

                                                                             OpenID Connect
                                SSO                                                             AuthN
                                                                                                AuthZ




                                                          Requesting Party




                                                                16
Wednesday, July 13, 2011
User eXperience




                                  17
Wednesday, July 13, 2011
Scenario


                    • Sharing Photo with “bob@gmail.com”
                           ‣ Host In-App Fast Sharing settings.
                           ‣ Requesting Party requests direct access to
                             Protected Resource.
                           ‣ OpenID Connect interaction.



                                                  18
Wednesday, July 13, 2011
Alice at
  Host Site

  Protected
  Resource by
  CopMonkey
  AM                            in-App Fast
                                AuthZ Settings for
                                sharing




                           19
Wednesday, July 13, 2011
Alice defines
  claims-based
  authorization
  policy, using In-
  App widget




                           20
Wednesday, July 13, 2011
Protected
  Resource is
  ready for
  sharing under
  authZ policy




                           21
Wednesday, July 13, 2011
Alice shares
 the Protected
                                              Photo4Sharing
 resource
                                                                                                                                                               10.0



                                                          online photo Service

 through twitter                 Home                Photo Gallery        Places              Share          Settings                            Hello Alice




                                                                                                 Alice
                                                                                                 twitter
                                 Photo View                                                                             Resource Sharing
                                                                                        Photo4Sharing: Places:Venice:Bridge at
                                     Places> Venice> Bridge                                         Edit        CopMonkey Protected
                                                                                        http://photo4sharing.com/AB112FFD
                                                                                                                Resource
                                                                                        22 hours ago reply              CopMonkey In-App Claim-
                                                                                                                        based authorization
                                                                                        Tweet text goes here.
                                                                                                                URL
                                                                                        keep it under 140 characters            photo4sharing.com/AB112FFD

                                                                                        http://bit.ly/ds5c6z
                                                                                        22 hours ago reply              Share

                                                                                        Never thought I'd say this, but sign out
                                                                                        of twitter.com, now! There's a nice new
                                                                                        homepage to check out.
                                                                                        http://bit.ly/ds5c6z
                                                                                        22 hours ago reply

                                                                                        homepage to check out.
                                                                                        http://bit.ly/ds5c6z
                                                                                        22 hours ago reply




                           © copyright 2009 CMInc. All rights reserved.




                                                                                   22
Wednesday, July 13, 2011
Bob attempts
 to access to
 protected
 resource.

 Bob is redirect
 to AM to
 convey claims




                           23
Wednesday, July 13, 2011
CopMonkey
 authenticates
 Bob through
 OpenID, in
 order to
 initialize
 OpenID
 Connect
 protocol




                           24
Wednesday, July 13, 2011
Bob is redirect
 to IdP’s
 authorization
 service to grant
 claims.




                           25
Wednesday, July 13, 2011
Bob gets access
 to the
 protected
 resource




                           26
Wednesday, July 13, 2011
Trust Model Consideration
                                                                 Bootstrapping Trust
                                                                                                                                                                                    Claims
                                                                                                                                                                                   Provider

                                                                                               AuthN        IdP                                               AuthN                     IdP
        Subject                                         Subject                                                        Subject



                         Self Registration                           Affiliate Registration                                          Affiliate Registration


                                                                                                                                                                                  LoA Certification


                         UMA                                         UMA                                                              UMA
                                              AM                                               AM                                                             AM        Trusted
     Self Registration                             Affiliate Registration                                          Affiliate Registration                               Framework


                          Host Introduction                                Host Introduction                                              Host Introduction




         Host                                            Host                                                           Host                                                           TFP


                      A                                                                     B                                                           C
               Self-Registration                                                    Affiliate or SSO                                            Affiliate or SSO with
                                                                                                                                               Trusted Framework




                                                                                                       27
Wednesday, July 13, 2011
Thanks




                             28
Wednesday, July 13, 2011

More Related Content

More from Domenico Catalano

Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMADomenico Catalano
 
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioUMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioDomenico Catalano
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationDomenico Catalano
 
User-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management PlatformUser-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management PlatformDomenico Catalano
 
Securing Internet Payment Systems
Securing Internet Payment SystemsSecuring Internet Payment Systems
Securing Internet Payment SystemsDomenico Catalano
 
Exploring Visualization Techniques to Enhance Privacy Control UX for User-Man...
Exploring Visualization Techniques to Enhance Privacy Control UX for User-Man...Exploring Visualization Techniques to Enhance Privacy Control UX for User-Man...
Exploring Visualization Techniques to Enhance Privacy Control UX for User-Man...Domenico Catalano
 

More from Domenico Catalano (6)

Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioUMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenario
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
 
User-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management PlatformUser-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management Platform
 
Securing Internet Payment Systems
Securing Internet Payment SystemsSecuring Internet Payment Systems
Securing Internet Payment Systems
 
Exploring Visualization Techniques to Enhance Privacy Control UX for User-Man...
Exploring Visualization Techniques to Enhance Privacy Control UX for User-Man...Exploring Visualization Techniques to Enhance Privacy Control UX for User-Man...
Exploring Visualization Techniques to Enhance Privacy Control UX for User-Man...
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

UMA Trusted Claims

  • 1. Extending UMA Protocol to support Trusted Claims (tClaims) Newcastle University Domenico Catalano and the Smart Team 13th July, 2011 1 V.3 Wednesday, July 13, 2011
  • 2. Who I am • Domenico Catalano • Senior Sales Consultant @Oracle Italy + Sun • Identity & Security Architect • Leadership team member (UX) @Kantara UMA WG 2 Wednesday, July 13, 2011
  • 3. Agenda • UMA Conceptual model • tClaims Requirements Analysis • OpenID Connect • UMA/OpenID Connect Integration approach • User Interaction • Trust Model consideration • Q&A 3 Wednesday, July 13, 2011
  • 4. UMA Conceptual Model UMA AM policy decision Control Point Protect Authorize Authorizing User Requesting Manage Party UMA External Domain Domain Protected HOST Resource Requester Access 4 Wednesday, July 13, 2011
  • 5. UMA Trusted Claims • UMA Trusted Claims approach is designed to support Claims-based Access Control. • In a Claim-based Access Control, the decision to grant access to a protected resource is made based on Subject’s information, such as name, age, email address, role, location, or credit score, etc. Claims Trusted Claims Trusted usted C laims 5 Wednesday, July 13, 2011
  • 6. tClaims example scenarios • Enterprise class scenario ‣ Accessing Personal Loan Special Program • Social/web class scenario ‣ Sharing photo with “bob@gmail.com” 6 Wednesday, July 13, 2011
  • 7. Accessing Personal Loan special program Enterprise Class Scenario • Bank online service provides an User- Managed Claims access control to restrict and personalize access to special program/ service (i.e. personal loan with low interest rate) to users which have determinate employment (i.e. government employee), and have an high credit score. 7 Wednesday, July 13, 2011
  • 8. Alice at Bank site Bank of Future for requesting 10.0 online Banking access to a Welcome aalice restricted service. Access to Loyalty Program You have selected a protected resource to access special loyalty An UMA program for US Government Employee: Personal Loan with low interest rate (2%) protected Select your UMA Authorization Manager to provide trusted Claims to grant access to this resource. resource. CopMonkey AM © copyright 2009 CMInc. All rights reserved. 8 Wednesday, July 13, 2011
  • 9. Sharing Photo with “bob@gmail.com Social/web Class Scenario • Alice wants share a photo gallery with bob if Bob has an account email “bob@gmail.com” and he is 18 years old. 9 Wednesday, July 13, 2011
  • 10. Alice defines claims-based authorization policy, using In- App widget 10 Wednesday, July 13, 2011
  • 11. Requirements Analysis • Authorizing User (Resource Owner) needs a claims- based access control to restrict access to own resources based on Requesting Party’s Identity attributes. • Identity attributes must issued by a Trusted Third Party (TTP) and verifiable by a Claims Requester. • Claims may be logically aggregated to provide a collection of attributes from different Attribute Providers (Claims Host). 11 Wednesday, July 13, 2011
  • 12. OpenID Connect • OpenID Connect provides authentication, authorization, and attribute transmission capability. It allows third party attested claims from distributed sources. • This specification is largely compliant with OAuth 2.0 draft 15. OpenID Connect Core 1.0 - draft 04 12 Wednesday, July 13, 2011
  • 13. OpenID Connect protocol overview • OpenID Connect protocol in abstract follows the following steps: 1. The Client sends a request to the Server’s End-User Authorization Endpoint. 2. The Server authenticates the user and obtains appropriate authorization. 3. The Server responds with access_token and a few other variables. 4. The Client sends a request with access_token to the Userinfo Endpoint. 5. Userinfo Endpoint returns the additional user supported by the Server. 13 Wednesday, July 13, 2011
  • 14. UMA Conceptual Model UMA AM policy decision Control Point Protect Authorize Authorizing User Requesting Manage Party UMA External Domain Domain Protected HOST Resource Requester Access 14 Wednesday, July 13, 2011
  • 15. UMA Conceptual Model with tClaims OpenID UMA Claims 1. Request Client 3. Access_token Connect AM AS policy decision Control Point 5. Userinfo 2. AuthN AuthZ 4. Request Userinfo Protect Protect Authorize UserInfo Authorizing User EndPoint Requesting Manage Party SSO UMA OpenID Domain Domain Protected HOST Resource Requester Access 15 Wednesday, July 13, 2011
  • 16. UMA/OpenID Connect Integration approach UserInfo EndPoint Claims Claims Provider Protected Resource UMA Claims AuthZ OpenID Authorization Client Server Identity Provider Manager OpenID RP OpenID Connect SSO AuthN AuthZ Requesting Party 16 Wednesday, July 13, 2011
  • 17. User eXperience 17 Wednesday, July 13, 2011
  • 18. Scenario • Sharing Photo with “bob@gmail.com” ‣ Host In-App Fast Sharing settings. ‣ Requesting Party requests direct access to Protected Resource. ‣ OpenID Connect interaction. 18 Wednesday, July 13, 2011
  • 19. Alice at Host Site Protected Resource by CopMonkey AM in-App Fast AuthZ Settings for sharing 19 Wednesday, July 13, 2011
  • 20. Alice defines claims-based authorization policy, using In- App widget 20 Wednesday, July 13, 2011
  • 21. Protected Resource is ready for sharing under authZ policy 21 Wednesday, July 13, 2011
  • 22. Alice shares the Protected Photo4Sharing resource 10.0 online photo Service through twitter Home Photo Gallery Places Share Settings Hello Alice Alice twitter Photo View Resource Sharing Photo4Sharing: Places:Venice:Bridge at Places> Venice> Bridge Edit CopMonkey Protected http://photo4sharing.com/AB112FFD Resource 22 hours ago reply CopMonkey In-App Claim- based authorization Tweet text goes here. URL keep it under 140 characters photo4sharing.com/AB112FFD http://bit.ly/ds5c6z 22 hours ago reply Share Never thought I'd say this, but sign out of twitter.com, now! There's a nice new homepage to check out. http://bit.ly/ds5c6z 22 hours ago reply homepage to check out. http://bit.ly/ds5c6z 22 hours ago reply © copyright 2009 CMInc. All rights reserved. 22 Wednesday, July 13, 2011
  • 23. Bob attempts to access to protected resource. Bob is redirect to AM to convey claims 23 Wednesday, July 13, 2011
  • 24. CopMonkey authenticates Bob through OpenID, in order to initialize OpenID Connect protocol 24 Wednesday, July 13, 2011
  • 25. Bob is redirect to IdP’s authorization service to grant claims. 25 Wednesday, July 13, 2011
  • 26. Bob gets access to the protected resource 26 Wednesday, July 13, 2011
  • 27. Trust Model Consideration Bootstrapping Trust Claims Provider AuthN IdP AuthN IdP Subject Subject Subject Self Registration Affiliate Registration Affiliate Registration LoA Certification UMA UMA UMA AM AM AM Trusted Self Registration Affiliate Registration Affiliate Registration Framework Host Introduction Host Introduction Host Introduction Host Host Host TFP A B C Self-Registration Affiliate or SSO Affiliate or SSO with Trusted Framework 27 Wednesday, July 13, 2011
  • 28. Thanks 28 Wednesday, July 13, 2011