Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamil Nadu, India
Defining Identity as a Service (IDaaS)
 Application delivery model (like software-as-a-service, or SaaS)
 Allows users to connect to and use identity management services from
the cloud.
 Ensures the right people in an organization have the right access to the
right resources
 Identity and access management (IAM) computing uses online computer
power, database storage, and other IT resources.
 Identity service is one that stores the information associated with a
digital entity in a form that can be queried managed for use in electronic
transactions
Why IDaaS?
• Deliver access services efficiently and cost-effectively
• Protect against internal and external security threats
• Meet regulatory compliance requirements around security and
privacy
Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
Defining Identity as a Service (IDaaS) Examples
Single Sign-on (SSO)
Authentication service allowing a user to access multiple applications
and sites using one set of credentials.
Multi-Factor Authentication (MFA)
Multi-step account login process that requires users to enter more
information than just a password
Identity Management
To ensure that only the right people can access the appropriate data
and resources — at the right times and for the right reasons.
Provisioning
When a worker is assigned a role through your system, they would
be automatically provisioned access with a role-based IAM solution.
Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
Defining Identity as a Service (IDaaS)
IDaaS Servers
.COM, .ORG, .EDU, .MIL, .TV, .RU
Core functions
– A data stores
– Query Engine
– Policy Engine
Identity
 A set of characteristics or traits that make something
recognizable or known a digital identity
 Attributes and metadata of an object along with a set of
relationships with other objects that makes an object
identifiable
Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
An identity can belong to a person and may include the following
Things you are
Biological characteristics such as age, race, gender,
appearance
Things you know
Biography, personal data such as social security numbers,
PINs, where you went to school
Things you have
A pattern of blood vessels in your eye, your fingerprints, a
bank account you can access, a security key you were given, objects
and possessions
Things you relate to
Your family and friends, a software license, beliefs and
values, activities and endeavors, personal selections and choices,
habits and practices, an iGoogle account
Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
Digital Identities
For user and machine accounts
Identities are created and stored in domain security
Databases that are the basis for any network domain,
In directory services, and in data stores in federated systems
Network Interface
the point of interconnection between a computer and a private or public
network
Identified uniquely by Media Access Control (MAC) addresses,
Alternatively are referred to as Ethernet Hardware Addresses (EHAs).
EHAs - (HW Address) is your Ethernet card's unique identity
It is the assignment of a network identity to a specific MAC address that allows
systems to be found on networks.
Media Access Control
Network data transfer policy that determines how data is transmitted between two
computer terminals through a network cable.
Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
Windows Product Activation
Microsoft validates your installation
During Activation it Creates an identification index or profile of your system
 A 25-character software product key and product ID
 The uniquely assigned Global Unique Identifier or GUID
 PC manufacturer
 CPU type and serial number
 BIOS checksum
 Network adapter and its MAC address
 Display adapter
 SCSCI and
 DE adapters
 RAM amount
 Hard drive and volume serial number
 Optical drive
 Region and language settings and user locale
From the above information, a code is calculated, checked, and entered into the registration
database.
Each of these uniquely identified hardware attributes is assigned a weighting factor such that an
overall sum may be calculated
Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
Networked identity service classes
Forms of identity services
To validate Web sites, transactions, transaction participants, clients, and network
services
Identity as a Service (IDaaS) offers
 Authentication services (identity verification)
 Directory services
 Federated identity
 Identity governance
 Identity and profile management
 Policies, roles, and enforcement
 Provisioning (external policy administration)
 Registration
 Risk and event monitoring, including audits
 Single sign-on services (pass-through authentication)
Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
Identity System Codes of Conduct
IDaaS is cloud-based authentication built and operated by a third-party provider.
Working with IDaaS software, evaluate IDaaS applications on the following basis
User control for consent
Users control their identity and must consent(to agree to something) to the use of their
information.
Minimal Disclosure
The minimal amount of information should be disclosed for an intended use.
Justifiable access
Only parties who have a justified use of the information contained in a digital identity and
have a trusted identity relationship with the owner of the information may be given access to that
information.
Directional Exposure
An ID system must support bidirectional identification for a public entity so that it is
discoverable and a unidirectional identifier for private entities, thus protecting the private ID.
Interoperability
A cloud computing ID system must interoperate with other identity services from other
identity providers.
Unambiguous human identification
An IDaaS application must provide an unambiguous mechanism for allowing a human to
interact with a system while protecting that user against an identity attack.
Consistency of Service
An IDaaS service must be simple to use, consistent across all its uses, and able to operate in
different contexts using different technologies.
Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
IDaaS interoperability
Cloud computing IDaaS applications must rely on a set of developing industry standards to
provide interoperability
User centric authentication (usually in the form of information cards)
The OpenID and CardSpace specifications support this type of data object.
The XACML Policy Language
A general-purpose authorization policy language
Allows a distributed ID system to write and enforce custom policy expressions.
XACML can work with SAML when SAML presents a request for ID authorization,
XACML checks the ID request against its policies and either allows or denies the request.
The SPML Provisioning Language
This is an XML request/response language that is used to integrate and interoperate
service provisioning requests. SPML is a standard of OASIS’s Provision Services Technical
Committee (PSTC) that conforms to the SOA architecture.
The XDAS Audit System
The Distributed Audit Service provides accountability for users accessing a system, and
the detection of security policy violations when attempts are made to access the system by
unauthorized users or by users accessing the system in an unauthorized way
Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
Networked identity service classes
Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
The Identity Governance Framework (IGF) is a standards initiative of the Liberty Alliance.
Exchange and control of identity information using standards such as WS-Trust, ID-WSF,
SAML, and LDAP directory services.
Client Attribute Requirements Markup Language (CARML)
User Authentication
OpenID
– Developing industry standard for authenticating “end users” by storing their digital
identity in a common format.
– An identity is created in an OpenID system,
– Information is stored in the system of any OpenID service provider
– Translated into a unique identifier.
– Identifiers take the form of a Uniform Resource Locator (URL) or as an Extensible
Resource Identifier (XRI)
– Authenticated by that OpenID service provider
– unique identity of the URL;
Identity providers
AOL, Facebook, Google, IBM, Microsoft, MySpace, Orange, PayPal, VeriSign,
LiveJournal, Ustream, Yahoo!
Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
Trusted providers and their URL formats
Blogger: .blogger.com or .blogspot.com
MySpace: myspace.com/
Google: https://www.google.com/accounts/o8/id l Google Profile: google.com/profiles/
Microsoft: accountservices.passport.net/
MyOpenID: .myopenid.com
Orange: openid.orange.fr/username or simply orange.fr/ Verisign: .pip.verisinglabs.com
WordPress: .wordpress.com
Yahoo!: openid.yahoo.com
CardSpace
Microsoft software client
The company’s Identity Metasystem and built into the Web Services Protocol Stack.
This stack is built on the OASIS standards (WS-Trust, WS-Security, WS-SecurityPolicy, and WS-
MetadataExchange)
A CardSpace object called an Identity Selector stores a digital identity
Making it available to Windows applications in the form of a visual Information Card
Can be accepted by complying applications and Web sites
Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
Authorization markup languages
Information requests and replies in cloud computing are nearly always in the form of
XML replies or requests
XML files are text files and are self-describing.
XML files contain a schema that describes the data it contains or contains a point to
another text file with its schema
XACML and SAML - specialized XML files are in the identity framework
XACML
Extensible Access Control Markup Language
Separates access control functionality into several components
An attribute-based access control policy language or XML-based language.
Designed to express security policies and access requests to information.
Used for web services, digital rights management, and enterprise security
applications
SAML
Security Assertion Markup Language
open federation standard that allows an identity provider (IdP) to authenticate users
and then pass an authentication token to another application known as a service
provider
Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
SAML integrates with XACML to implement a policy engine in a Service Oriented Architecture to
support identity services authorization.
Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
Networked identity service classes
Policy Administration Point (PAP)
location at which policy is managed
Policy Decision Point (PDP)
Policy requests are passed through to the location(PAP)
where the policy logic can be executed
The result of the policy is transmitted through the PAP
Evaluates policies against access requests provided by Policy Enforcement
Points (PEP) Deciding authority
Policy Enforcement Point (PEP)
Enforces the PDP policy decision
Protects an enterprise's data by enforcing access control
Responsible for receiving authorization requests that are sent to the
policy decision point (PDP) for evaluation data and resources must
be protected
Policy Information Point (PIP)
Provides additional information that can be used to determine policy logic
Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
Security Assertion Markup Language
XML-based markup language for security assertions
statements that service providers use to make access-control
decisions
The statements an identity provider sends to a service provider
that contain
• authentication
• attribute
• authorization decision information
Allows people to sign in once using one set of credentials and
access multiple applications.
Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu

Defining Identity as a Service (IDaaS) in Cloud Computing

  • 1.
    Dr.M.Pyingkodi, Dept ofComputer Applications, Kongu Engineering College, Erode, Tamil Nadu, India
  • 2.
    Defining Identity asa Service (IDaaS)  Application delivery model (like software-as-a-service, or SaaS)  Allows users to connect to and use identity management services from the cloud.  Ensures the right people in an organization have the right access to the right resources  Identity and access management (IAM) computing uses online computer power, database storage, and other IT resources.  Identity service is one that stores the information associated with a digital entity in a form that can be queried managed for use in electronic transactions Why IDaaS? • Deliver access services efficiently and cost-effectively • Protect against internal and external security threats • Meet regulatory compliance requirements around security and privacy Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
  • 3.
    Defining Identity asa Service (IDaaS) Examples Single Sign-on (SSO) Authentication service allowing a user to access multiple applications and sites using one set of credentials. Multi-Factor Authentication (MFA) Multi-step account login process that requires users to enter more information than just a password Identity Management To ensure that only the right people can access the appropriate data and resources — at the right times and for the right reasons. Provisioning When a worker is assigned a role through your system, they would be automatically provisioned access with a role-based IAM solution. Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
  • 4.
    Defining Identity asa Service (IDaaS) IDaaS Servers .COM, .ORG, .EDU, .MIL, .TV, .RU Core functions – A data stores – Query Engine – Policy Engine Identity  A set of characteristics or traits that make something recognizable or known a digital identity  Attributes and metadata of an object along with a set of relationships with other objects that makes an object identifiable Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
  • 5.
    An identity canbelong to a person and may include the following Things you are Biological characteristics such as age, race, gender, appearance Things you know Biography, personal data such as social security numbers, PINs, where you went to school Things you have A pattern of blood vessels in your eye, your fingerprints, a bank account you can access, a security key you were given, objects and possessions Things you relate to Your family and friends, a software license, beliefs and values, activities and endeavors, personal selections and choices, habits and practices, an iGoogle account Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
  • 6.
    Digital Identities For userand machine accounts Identities are created and stored in domain security Databases that are the basis for any network domain, In directory services, and in data stores in federated systems Network Interface the point of interconnection between a computer and a private or public network Identified uniquely by Media Access Control (MAC) addresses, Alternatively are referred to as Ethernet Hardware Addresses (EHAs). EHAs - (HW Address) is your Ethernet card's unique identity It is the assignment of a network identity to a specific MAC address that allows systems to be found on networks. Media Access Control Network data transfer policy that determines how data is transmitted between two computer terminals through a network cable. Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
  • 7.
    Windows Product Activation Microsoftvalidates your installation During Activation it Creates an identification index or profile of your system  A 25-character software product key and product ID  The uniquely assigned Global Unique Identifier or GUID  PC manufacturer  CPU type and serial number  BIOS checksum  Network adapter and its MAC address  Display adapter  SCSCI and  DE adapters  RAM amount  Hard drive and volume serial number  Optical drive  Region and language settings and user locale From the above information, a code is calculated, checked, and entered into the registration database. Each of these uniquely identified hardware attributes is assigned a weighting factor such that an overall sum may be calculated Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
  • 8.
    Networked identity serviceclasses Forms of identity services To validate Web sites, transactions, transaction participants, clients, and network services Identity as a Service (IDaaS) offers  Authentication services (identity verification)  Directory services  Federated identity  Identity governance  Identity and profile management  Policies, roles, and enforcement  Provisioning (external policy administration)  Registration  Risk and event monitoring, including audits  Single sign-on services (pass-through authentication) Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
  • 9.
    Identity System Codesof Conduct IDaaS is cloud-based authentication built and operated by a third-party provider. Working with IDaaS software, evaluate IDaaS applications on the following basis User control for consent Users control their identity and must consent(to agree to something) to the use of their information. Minimal Disclosure The minimal amount of information should be disclosed for an intended use. Justifiable access Only parties who have a justified use of the information contained in a digital identity and have a trusted identity relationship with the owner of the information may be given access to that information. Directional Exposure An ID system must support bidirectional identification for a public entity so that it is discoverable and a unidirectional identifier for private entities, thus protecting the private ID. Interoperability A cloud computing ID system must interoperate with other identity services from other identity providers. Unambiguous human identification An IDaaS application must provide an unambiguous mechanism for allowing a human to interact with a system while protecting that user against an identity attack. Consistency of Service An IDaaS service must be simple to use, consistent across all its uses, and able to operate in different contexts using different technologies. Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
  • 10.
    IDaaS interoperability Cloud computingIDaaS applications must rely on a set of developing industry standards to provide interoperability User centric authentication (usually in the form of information cards) The OpenID and CardSpace specifications support this type of data object. The XACML Policy Language A general-purpose authorization policy language Allows a distributed ID system to write and enforce custom policy expressions. XACML can work with SAML when SAML presents a request for ID authorization, XACML checks the ID request against its policies and either allows or denies the request. The SPML Provisioning Language This is an XML request/response language that is used to integrate and interoperate service provisioning requests. SPML is a standard of OASIS’s Provision Services Technical Committee (PSTC) that conforms to the SOA architecture. The XDAS Audit System The Distributed Audit Service provides accountability for users accessing a system, and the detection of security policy violations when attempts are made to access the system by unauthorized users or by users accessing the system in an unauthorized way Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
  • 11.
    Networked identity serviceclasses Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu The Identity Governance Framework (IGF) is a standards initiative of the Liberty Alliance. Exchange and control of identity information using standards such as WS-Trust, ID-WSF, SAML, and LDAP directory services. Client Attribute Requirements Markup Language (CARML)
  • 12.
    User Authentication OpenID – Developingindustry standard for authenticating “end users” by storing their digital identity in a common format. – An identity is created in an OpenID system, – Information is stored in the system of any OpenID service provider – Translated into a unique identifier. – Identifiers take the form of a Uniform Resource Locator (URL) or as an Extensible Resource Identifier (XRI) – Authenticated by that OpenID service provider – unique identity of the URL; Identity providers AOL, Facebook, Google, IBM, Microsoft, MySpace, Orange, PayPal, VeriSign, LiveJournal, Ustream, Yahoo! Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
  • 13.
    Trusted providers andtheir URL formats Blogger: .blogger.com or .blogspot.com MySpace: myspace.com/ Google: https://www.google.com/accounts/o8/id l Google Profile: google.com/profiles/ Microsoft: accountservices.passport.net/ MyOpenID: .myopenid.com Orange: openid.orange.fr/username or simply orange.fr/ Verisign: .pip.verisinglabs.com WordPress: .wordpress.com Yahoo!: openid.yahoo.com CardSpace Microsoft software client The company’s Identity Metasystem and built into the Web Services Protocol Stack. This stack is built on the OASIS standards (WS-Trust, WS-Security, WS-SecurityPolicy, and WS- MetadataExchange) A CardSpace object called an Identity Selector stores a digital identity Making it available to Windows applications in the form of a visual Information Card Can be accepted by complying applications and Web sites Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
  • 14.
    Authorization markup languages Informationrequests and replies in cloud computing are nearly always in the form of XML replies or requests XML files are text files and are self-describing. XML files contain a schema that describes the data it contains or contains a point to another text file with its schema XACML and SAML - specialized XML files are in the identity framework XACML Extensible Access Control Markup Language Separates access control functionality into several components An attribute-based access control policy language or XML-based language. Designed to express security policies and access requests to information. Used for web services, digital rights management, and enterprise security applications SAML Security Assertion Markup Language open federation standard that allows an identity provider (IdP) to authenticate users and then pass an authentication token to another application known as a service provider Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
  • 15.
    SAML integrates withXACML to implement a policy engine in a Service Oriented Architecture to support identity services authorization. Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
  • 16.
    Networked identity serviceclasses Policy Administration Point (PAP) location at which policy is managed Policy Decision Point (PDP) Policy requests are passed through to the location(PAP) where the policy logic can be executed The result of the policy is transmitted through the PAP Evaluates policies against access requests provided by Policy Enforcement Points (PEP) Deciding authority Policy Enforcement Point (PEP) Enforces the PDP policy decision Protects an enterprise's data by enforcing access control Responsible for receiving authorization requests that are sent to the policy decision point (PDP) for evaluation data and resources must be protected Policy Information Point (PIP) Provides additional information that can be used to determine policy logic Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu
  • 17.
    Security Assertion MarkupLanguage XML-based markup language for security assertions statements that service providers use to make access-control decisions The statements an identity provider sends to a service provider that contain • authentication • attribute • authorization decision information Allows people to sign in once using one set of credentials and access multiple applications. Dr.M.Pyingkodi, Dept of Computer Applications, Kongu Engineering College, Erode, Tamilnadu