SlideShare a Scribd company logo
Cloud Identity Management
Morteza Ansari (linkedin.com/in/mortezaansari)
POLICY
PROVISIONING /
LIFE CYCLE
AUTHENTICATION
AUTHORIZATIONENTITLEMENTS
IDENTITY
MANAGEMENT
Consumer Identity
•  Huge scale and potential rapid growth
•  FB >1.3B active users
•  Instagram 150M active users in less than 3 years
•  Self managed identity
•  Simple namespace
•  Identity won’t drive adoption, but could hamper it
•  Must deal with recovery & credential management
Enterprise Identity
•  Centrally managed/controlled
•  Role based entitlements & authorization
•  Demand more complex security policies
•  Federation is very high priority
•  Namespace complexity
•  Multiple identifiers
•  Account/tenant validation could be tricky
•  Join/Split
Mix of Consumer & Enterprise
•  How does transfer of control pan out
•  Consumer -> enterprise
•  Enterprise -> consumer (?)
•  Who owns data associated with the identity?
•  Namespace is even more complex
•  Account recovery
•  Multiple identifiers
•  …
On-prem to Cloud
Enterprise
IdM
Cloud
On1Prem
Enterprise
IdP
Iden4ty6
Connector
SaaS
Cloud to Cloud
Enterprise
IdM
Cloud
On1Prem
Enterprise
IdP
Iden4ty6
Connector
IDaaS
SaaS2
SaaS1
SaaS Internal Abstraction
Enterprise
IdM
Cloud
On1Prem
Enterprise
IdP
Iden4ty6
Connector
SaaS
On-Prem Connector
IDaaS Bridge
Internal
Service1 Service2 Service3
Hybrid
Org Size 1 300 5K 100K
Provisioning /
De-provisioning
Authentication
Authorization
Core Functionality
Manual
Connector
SCIM
Local Credentials/OTP/Two Factor
Authentication Connector
SAML IdP
OAuth
OpenID Connect
Identity Requirements
Enterprise Consumer IoT
Scale 10-1M 1M-7B 50-100B
Identity Provider SaaS, On-prem,
or cloud IdP
SaaS, Social Everywhere!!!
Policy Enterprise IT Self managed Everywhere!!!
Identities Users, Groups,
Devices, Apps
Users, Apps/
Devices
Users, Devices,
Gateways, Apps,
Controllers, …
Standards
•  SCIM
•  SAML
•  OAuth2 & extensions
•  OpenID Connect
•  Native Apps
What is SCIM?
•  Simple Cloud Identity Management è System for Cross domain Identity
Management
•  Set of pre-defined schema – Users & Groups
•  RESTful API definition
•  CRUD
•  Bulk operations
•  Search
•  Discovery
•  Extension semantics (limited in 1.x)
•  Support for complex data models
•  SIMPLE!!!
Schema
•  Rich information model
•  XML & JSON data models
•  Concrete artifacts
•  Users & Groups
•  Usage semantics
•  MTI & recommended
•  Extensibility
•  Enterprise User
Resource
Core ResourceServiceProviderConfig Schema
id,$meta
GroupUser
Enterprise User
externalId
Operations
•  Discovery
•  Create = POST https://example.com/{v}/{resource}
•  Read = GET https://example.com/{v}/{resource}/{id}
•  Update = PUT https://example.com/{v}/{resource}/{id}
•  Delete = DELETE https://example.com/{v}/{resource}/{id}
•  Update = PATCH https://example.com/{v}/{resource}/{id}
•  Search = https://example.com/{v}/{resource}? filter={attribute} {op}
{value} & sortBy={attributeName} & sortOrder={ascending|descending}
•  Bulk
Create Request
POST /v1/Users HTTP/1.1
Host: example.com
Accept: application/json
Authorization: Bearer h480djs93hd8
{
"schemas": ["urn:scim:schemas:core:1.0"],
"externalId": "bjensen",
"userName":"bjensen",
"name": {
"familyName": "Jensen",
"givenName": "Barbara"
}
}
Operation Resource Type
Format AuthZ
“User” Payload
Create Response
HTTP/1.1 201 Created
Content-Type: application/json
Location: https://example.com/v1/Users/281...
ETag: W/"e180ee84f0671b1"
{`
"schemas": ["urn:scim:schemas:core:1.0"],
"id": "2819c223-7f76-453a-919d-413861904646",
"externalId": "bjensen",
"meta": {
"created": "2011-08-01T21:32:44.882Z",
"lastModified": "2011-08-01T21:32:44.882Z",
"location": "https://example.com/v1/Users/281...",
"version": "W/"e180ee84f0671b1""
},
"name":{
"familyName":"Jensen",
"givenName":"Barbara"
},
"userName":"bjensen"
}
Result code
Format
“Permalink”
SP generated ID
SAML
•  Security Assertion Markup Language
•  XML Based protocol
•  Oasis standard, 2.0 2005
•  Most common enterprise federation
•  SP or IdP initiated flows
•  Web Browser SSO is most common
IdP
Service
Provider
Trust
User
Service,
Request
Authen2ca2on
AuthN vs. AuthZ
AuthN vs. AuthZ
What is OAuth?
•  A token based service for authorization to resources
•  IETF standard – RFC6749, RFC6750
•  Typically has a RESTful binding, always HTTP
•  Removes passwords from resource access
•  Separate token issuance from resources
•  Supports multiple flows to obtain access tokens
•  OAuth is not an authentication service
OAuth Example – 1st Time Access
AuthoriZation
Trust
Web Browser
AutheNtication
Resource
Web App 1. I need the
authorization to change
Homer’s avatar
2. Is this really
Homer?
5. It is
Homer
8. You may change
Homer’s preferences
(access token)
6. Homer, you
cool with this?7. Yep!
9. I need to change Homer’s
avatar (access token)
3. Please enter your username
and password
10. Is access
authorized?
4. HomerJS
1234
11. Access is
authorized
OAuth Example – 2nd, 3rd, 4th… Times
AuthoriZation
Trust
Web Browser
AutheNtication
Resource
Web App 2. Is access
authorized?
3. Access is
authorized
1. I need to change
Homer’s avatar (access
token)
OpenID Connect
•  Nothing to do with OpenID!
•  Based on OAuth2
•  Adds Identity token, session management, UserInfo
endpoint, …
•  Rapidly being adopted
•  Will likely replace SAML
Additional Considerations
Additional Considerations
•  Usability is paramount
•  Analytics is key
•  “Acceptable” changes overtime
Additional Considerations
* Shamelessly “borrowed” from Mark Diodati’s slides
Additional Considerations
* Shamelessly “borrowed” from Mark Diodati’s slides
Additional Considerations
•  Risk based AuthN/AuthZ
•  Don’t forget Device, and App identity
•  Multiple services è Service identity/entitlement
•  Anonymous identity, guest
•  Session distribution
Resources
•  IETF SCIM WG
•  http://simplecloud.info
•  IETF OAuth WG
•  http://oauth.net
•  OpenID Connect
•  Native Apps WG
•  Internet Identity Workshop

More Related Content

Viewers also liked

Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0
Gluu
 
OpenID Overview - Seoul July 2007
OpenID Overview - Seoul July 2007OpenID Overview - Seoul July 2007
OpenID Overview - Seoul July 2007
David Recordon
 
Web Access Management
Web Access ManagementWeb Access Management
Web Access Management
Molly Knapp
 
Introduction to Research Methods
Introduction to Research MethodsIntroduction to Research Methods
Introduction to Research Methods
Molly Knapp
 
OpenID vs OAuth - Identity on the Web
OpenID vs OAuth - Identity on the WebOpenID vs OAuth - Identity on the Web
OpenID vs OAuth - Identity on the Web
Richard Metzler
 
Access Management for Cloud and Mobile
Access Management for Cloud and MobileAccess Management for Cloud and Mobile
Access Management for Cloud and Mobile
ForgeRock
 
CIS14: PingAccess 101
CIS14: PingAccess 101CIS14: PingAccess 101
CIS14: PingAccess 101
CloudIDSummit
 
OpenID Bootcamp Tutorial
OpenID Bootcamp TutorialOpenID Bootcamp Tutorial
OpenID Bootcamp Tutorial
David Recordon
 
CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in Action
CloudIDSummit
 
SAML / OpenID Connect / OAuth / SCIM 技術解説 - ID&IT 2014 #idit2014
SAML / OpenID Connect / OAuth / SCIM 技術解説  - ID&IT 2014 #idit2014SAML / OpenID Connect / OAuth / SCIM 技術解説  - ID&IT 2014 #idit2014
SAML / OpenID Connect / OAuth / SCIM 技術解説 - ID&IT 2014 #idit2014Nov Matake
 

Viewers also liked (10)

Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0
 
OpenID Overview - Seoul July 2007
OpenID Overview - Seoul July 2007OpenID Overview - Seoul July 2007
OpenID Overview - Seoul July 2007
 
Web Access Management
Web Access ManagementWeb Access Management
Web Access Management
 
Introduction to Research Methods
Introduction to Research MethodsIntroduction to Research Methods
Introduction to Research Methods
 
OpenID vs OAuth - Identity on the Web
OpenID vs OAuth - Identity on the WebOpenID vs OAuth - Identity on the Web
OpenID vs OAuth - Identity on the Web
 
Access Management for Cloud and Mobile
Access Management for Cloud and MobileAccess Management for Cloud and Mobile
Access Management for Cloud and Mobile
 
CIS14: PingAccess 101
CIS14: PingAccess 101CIS14: PingAccess 101
CIS14: PingAccess 101
 
OpenID Bootcamp Tutorial
OpenID Bootcamp TutorialOpenID Bootcamp Tutorial
OpenID Bootcamp Tutorial
 
CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in Action
 
SAML / OpenID Connect / OAuth / SCIM 技術解説 - ID&IT 2014 #idit2014
SAML / OpenID Connect / OAuth / SCIM 技術解説  - ID&IT 2014 #idit2014SAML / OpenID Connect / OAuth / SCIM 技術解説  - ID&IT 2014 #idit2014
SAML / OpenID Connect / OAuth / SCIM 技術解説 - ID&IT 2014 #idit2014
 

Similar to Cloud identity management meetup 150108

SharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Authentication And Authorization SPTechCon San FranciscoSharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Authentication And Authorization SPTechCon San Francisco
Liam Cleary [MVP]
 
Integrando Azure AD B2C con Xamarin.Forms
Integrando Azure AD B2C con Xamarin.FormsIntegrando Azure AD B2C con Xamarin.Forms
Integrando Azure AD B2C con Xamarin.Forms
César Jesús Angulo Gasco
 
.NET MAUI + Azure AD B2C
.NET MAUI + Azure AD B2C.NET MAUI + Azure AD B2C
.NET MAUI + Azure AD B2C
César Jesús Angulo Gasco
 
SharePoint Saturday Austin - Share point authentication and authorization
SharePoint Saturday Austin - Share point authentication and authorizationSharePoint Saturday Austin - Share point authentication and authorization
SharePoint Saturday Austin - Share point authentication and authorization
Liam Cleary [MVP]
 
unit 1 Federated Identity Management_4.pptx
unit 1 Federated Identity Management_4.pptxunit 1 Federated Identity Management_4.pptx
unit 1 Federated Identity Management_4.pptx
zmulani8
 
Understanding SharePoint Apps, authentication and authorization infrastructur...
Understanding SharePoint Apps, authentication and authorization infrastructur...Understanding SharePoint Apps, authentication and authorization infrastructur...
Understanding SharePoint Apps, authentication and authorization infrastructur...
SPC Adriatics
 
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday The Conference DC - Are you who you say you are share poi...SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
Liam Cleary [MVP]
 
Five Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityFive Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern Identity
Mark Diodati
 
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
Envision IT
 
IoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architectureIoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architecture
Vinod Wilson
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
Kelly Grizzle
 
Introduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2CIntroduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2C
Joonas Westlin
 
O365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
O365Con18 - Hybrid SharePoint Deep Dive - Thomas VochtenO365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
O365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
NCCOMMS
 
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You ThinkCIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CloudIDSummit
 
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More SafeMake your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
Thuan Ng
 
ConFoo 2015 - Securing RESTful resources with OAuth2
ConFoo 2015 - Securing RESTful resources with OAuth2ConFoo 2015 - Securing RESTful resources with OAuth2
ConFoo 2015 - Securing RESTful resources with OAuth2
Rodrigo Cândido da Silva
 
OAuth 2.0 and OpenId Connect
OAuth 2.0 and OpenId ConnectOAuth 2.0 and OpenId Connect
OAuth 2.0 and OpenId Connect
Saran Doraiswamy
 
Rest API Security
Rest API SecurityRest API Security
Rest API Security
Stormpath
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authentication
David Hoen
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authentication
Young Alista
 

Similar to Cloud identity management meetup 150108 (20)

SharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Authentication And Authorization SPTechCon San FranciscoSharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Authentication And Authorization SPTechCon San Francisco
 
Integrando Azure AD B2C con Xamarin.Forms
Integrando Azure AD B2C con Xamarin.FormsIntegrando Azure AD B2C con Xamarin.Forms
Integrando Azure AD B2C con Xamarin.Forms
 
.NET MAUI + Azure AD B2C
.NET MAUI + Azure AD B2C.NET MAUI + Azure AD B2C
.NET MAUI + Azure AD B2C
 
SharePoint Saturday Austin - Share point authentication and authorization
SharePoint Saturday Austin - Share point authentication and authorizationSharePoint Saturday Austin - Share point authentication and authorization
SharePoint Saturday Austin - Share point authentication and authorization
 
unit 1 Federated Identity Management_4.pptx
unit 1 Federated Identity Management_4.pptxunit 1 Federated Identity Management_4.pptx
unit 1 Federated Identity Management_4.pptx
 
Understanding SharePoint Apps, authentication and authorization infrastructur...
Understanding SharePoint Apps, authentication and authorization infrastructur...Understanding SharePoint Apps, authentication and authorization infrastructur...
Understanding SharePoint Apps, authentication and authorization infrastructur...
 
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday The Conference DC - Are you who you say you are share poi...SharePoint Saturday The Conference DC - Are you who you say you are share poi...
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
 
Five Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityFive Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern Identity
 
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
Envision it SharePoint Extranet Webinar Series - Federation and SharePoint On...
 
IoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architectureIoT mobile app device cloud identity and security architecture
IoT mobile app device cloud identity and security architecture
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
 
Introduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2CIntroduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2C
 
O365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
O365Con18 - Hybrid SharePoint Deep Dive - Thomas VochtenO365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
O365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
 
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You ThinkCIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
 
Make your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More SafeMake your Azure PaaS Deployment More Safe
Make your Azure PaaS Deployment More Safe
 
ConFoo 2015 - Securing RESTful resources with OAuth2
ConFoo 2015 - Securing RESTful resources with OAuth2ConFoo 2015 - Securing RESTful resources with OAuth2
ConFoo 2015 - Securing RESTful resources with OAuth2
 
OAuth 2.0 and OpenId Connect
OAuth 2.0 and OpenId ConnectOAuth 2.0 and OpenId Connect
OAuth 2.0 and OpenId Connect
 
Rest API Security
Rest API SecurityRest API Security
Rest API Security
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authentication
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authentication
 

Recently uploaded

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 

Recently uploaded (20)

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 

Cloud identity management meetup 150108

  • 1. Cloud Identity Management Morteza Ansari (linkedin.com/in/mortezaansari)
  • 2.
  • 4. Consumer Identity •  Huge scale and potential rapid growth •  FB >1.3B active users •  Instagram 150M active users in less than 3 years •  Self managed identity •  Simple namespace •  Identity won’t drive adoption, but could hamper it •  Must deal with recovery & credential management
  • 5. Enterprise Identity •  Centrally managed/controlled •  Role based entitlements & authorization •  Demand more complex security policies •  Federation is very high priority •  Namespace complexity •  Multiple identifiers •  Account/tenant validation could be tricky •  Join/Split
  • 6. Mix of Consumer & Enterprise •  How does transfer of control pan out •  Consumer -> enterprise •  Enterprise -> consumer (?) •  Who owns data associated with the identity? •  Namespace is even more complex •  Account recovery •  Multiple identifiers •  …
  • 11. Org Size 1 300 5K 100K Provisioning / De-provisioning Authentication Authorization Core Functionality Manual Connector SCIM Local Credentials/OTP/Two Factor Authentication Connector SAML IdP OAuth OpenID Connect
  • 12. Identity Requirements Enterprise Consumer IoT Scale 10-1M 1M-7B 50-100B Identity Provider SaaS, On-prem, or cloud IdP SaaS, Social Everywhere!!! Policy Enterprise IT Self managed Everywhere!!! Identities Users, Groups, Devices, Apps Users, Apps/ Devices Users, Devices, Gateways, Apps, Controllers, …
  • 13. Standards •  SCIM •  SAML •  OAuth2 & extensions •  OpenID Connect •  Native Apps
  • 14. What is SCIM? •  Simple Cloud Identity Management è System for Cross domain Identity Management •  Set of pre-defined schema – Users & Groups •  RESTful API definition •  CRUD •  Bulk operations •  Search •  Discovery •  Extension semantics (limited in 1.x) •  Support for complex data models •  SIMPLE!!!
  • 15. Schema •  Rich information model •  XML & JSON data models •  Concrete artifacts •  Users & Groups •  Usage semantics •  MTI & recommended •  Extensibility •  Enterprise User Resource Core ResourceServiceProviderConfig Schema id,$meta GroupUser Enterprise User externalId
  • 16. Operations •  Discovery •  Create = POST https://example.com/{v}/{resource} •  Read = GET https://example.com/{v}/{resource}/{id} •  Update = PUT https://example.com/{v}/{resource}/{id} •  Delete = DELETE https://example.com/{v}/{resource}/{id} •  Update = PATCH https://example.com/{v}/{resource}/{id} •  Search = https://example.com/{v}/{resource}? filter={attribute} {op} {value} & sortBy={attributeName} & sortOrder={ascending|descending} •  Bulk
  • 17. Create Request POST /v1/Users HTTP/1.1 Host: example.com Accept: application/json Authorization: Bearer h480djs93hd8 { "schemas": ["urn:scim:schemas:core:1.0"], "externalId": "bjensen", "userName":"bjensen", "name": { "familyName": "Jensen", "givenName": "Barbara" } } Operation Resource Type Format AuthZ “User” Payload
  • 18. Create Response HTTP/1.1 201 Created Content-Type: application/json Location: https://example.com/v1/Users/281... ETag: W/"e180ee84f0671b1" {` "schemas": ["urn:scim:schemas:core:1.0"], "id": "2819c223-7f76-453a-919d-413861904646", "externalId": "bjensen", "meta": { "created": "2011-08-01T21:32:44.882Z", "lastModified": "2011-08-01T21:32:44.882Z", "location": "https://example.com/v1/Users/281...", "version": "W/"e180ee84f0671b1"" }, "name":{ "familyName":"Jensen", "givenName":"Barbara" }, "userName":"bjensen" } Result code Format “Permalink” SP generated ID
  • 19. SAML •  Security Assertion Markup Language •  XML Based protocol •  Oasis standard, 2.0 2005 •  Most common enterprise federation •  SP or IdP initiated flows •  Web Browser SSO is most common IdP Service Provider Trust User Service, Request Authen2ca2on
  • 22. What is OAuth? •  A token based service for authorization to resources •  IETF standard – RFC6749, RFC6750 •  Typically has a RESTful binding, always HTTP •  Removes passwords from resource access •  Separate token issuance from resources •  Supports multiple flows to obtain access tokens •  OAuth is not an authentication service
  • 23. OAuth Example – 1st Time Access AuthoriZation Trust Web Browser AutheNtication Resource Web App 1. I need the authorization to change Homer’s avatar 2. Is this really Homer? 5. It is Homer 8. You may change Homer’s preferences (access token) 6. Homer, you cool with this?7. Yep! 9. I need to change Homer’s avatar (access token) 3. Please enter your username and password 10. Is access authorized? 4. HomerJS 1234 11. Access is authorized
  • 24. OAuth Example – 2nd, 3rd, 4th… Times AuthoriZation Trust Web Browser AutheNtication Resource Web App 2. Is access authorized? 3. Access is authorized 1. I need to change Homer’s avatar (access token)
  • 25. OpenID Connect •  Nothing to do with OpenID! •  Based on OAuth2 •  Adds Identity token, session management, UserInfo endpoint, … •  Rapidly being adopted •  Will likely replace SAML
  • 27. Additional Considerations •  Usability is paramount •  Analytics is key •  “Acceptable” changes overtime
  • 28. Additional Considerations * Shamelessly “borrowed” from Mark Diodati’s slides
  • 29. Additional Considerations * Shamelessly “borrowed” from Mark Diodati’s slides
  • 30. Additional Considerations •  Risk based AuthN/AuthZ •  Don’t forget Device, and App identity •  Multiple services è Service identity/entitlement •  Anonymous identity, guest •  Session distribution
  • 31.
  • 32. Resources •  IETF SCIM WG •  http://simplecloud.info •  IETF OAuth WG •  http://oauth.net •  OpenID Connect •  Native Apps WG •  Internet Identity Workshop