SlideShare a Scribd company logo
1 of 43
Download to read offline
Session 6 - FIWARE Identity Management and Access Control
Fernando López, Cloud & Platform Senior Expert
fernando.lopez@fiware.org
@flopezaguilar
FIWARE Foundation, e.V.
Learning Goals
1
● What are the security components?
● Which types of accessing support are allowed?
● How to offer security access to your applica:ons?
● What is eIDAS and eID? How to integrate with eIDAS, eID?
FIWARE Ecosystem
2
● A framework of open source platform components which can be assembled
together and with other third-party components to accelerate the development
of Smart Solutions.
FIWARE Ecosystem
3
● A framework of open source platform components which can be assembled
together and with other third-party components to accelerate the development
of Smart Solutions.
FIWARE Ecosystem
4
● A framework of open source platform components which can be assembled
together and with other third-party components to accelerate the development
of Smart Solutions.
FIWARE Ecosystem
5
● A framework of open source platform components which can be assembled
together and with other third-party components to accelerate the development
of Smart Solutions.
FIWARE Ecosystem
6
● A framework of open source pla;orm components which can be assembled
together and with other third-party components to accelerate the development
of Smart Solu<ons.
FIWARE Ecosystem
7
● A framework of open source platform components which can be assembled
together and with other third-party components to accelerate the development
of Smart Solutions.
FIWARE Ecosystem
8
● A framework of open source pla;orm components which can be assembled
together and with other third-party components to accelerate the development
of Smart Solu<ons.
FIWARE Ecosystem
9
● A framework of open source platform components which can be assembled
together and with other third-party components to accelerate the development
of Smart Solutions.
Access Control
IAM Generic Enablers
Identity & Access Control Management
10
● Keyrock – Iden:ty Management
● Wilma – PEP Proxy
● AuthZForce – Authoriza:on PDP
Keyrock
Main features
11
Web Interface and Rest API for managing Identity
● Users, devices and groups management
● OAuth 2.0 - based Single Sign On
● Application - scoped roles and permissions management
● Support for local and remote PAP/PDP
● JSON Web Tokens (JWT) and Permanent Tokens support
● MySQL / PostgreSQL and external DB driver
● European eID authentication compatibility (CEF eIDAS)
12
PEP Proxy for securing service backends
● Basic and complex AC policies support
● OAuth 2.0 Access Tokens support
● JSON Web Tokens (JWT) support
● Custom PDP configuration
● Integrated with API Management tools
o APInf & API Umbrella
o Kong
Wilma
Main features
13
PAP and PDP Server for managing complex AC policies
● XACML-3.0 standard-compliant
● Cloud-ready RESTful ABAC framework with XML optimization
● Multi-tenant REST API for PDP and PAP
● Standards:
o OASIS: XACML 3.0 + Profiles (REST, RBAC, Multiple Decision)
o ISO: Fast Infoset
● Extensible to attribute providers (PIP), functions, etc.
AuthZForce
Main features
14
Identity and AC Management
OAuth 2.0 flow
IAM	Infrastructure	
IdM	
Service	Applica4on	
Oauth	2.0	requests	
access-token	
User	info	request
15
Identity and AC Management
Accessing GEs and services
IAM	Infrastructure	
IdM	 PAP	
Policies	DB	
PDP	
Service	Applica8on	
Service	Backend	
PEP	
OAuth2 flow
Request
+ token
Check auth
16
Identity and AC Management
Accessing GEs and services
● Level 1: Authentication
● Level 2: Basic Authorization
● Level 3: Advanced Authorization
17
Identity and AC Management
Accessing GEs and services
● Level 1: Authen<ca<on
o Check if a user has been authen:cated
● Level 2: Basic Authoriza:on
● Level 3: Advanced Authoriza:on
18
Identity and AC Management
Level 1: Authentication
IAM Infrastructure
IdM
Service Application
Service Backend
PEP
OAuth2 flow
Request
+ token
Check token
19
Identity and AC Management
Accessing GEs and services
● Level 1: Authentication
● Level 2: Basic Authorization
o Checks if a user has permissions to access a resource
o HTTP verb + resource path
● Level 3: Advanced Authorization
20
Identity and AC Management
Level 2: Basic Authorization
IAM Infrastructure
IdM
PAP
PDP
Service Application
Service Backend
PEP
OAuth2 flow
Request
+ token
Check token
21
Iden<ty and AC Management
Accessing GEs and services
● Level 1: Authentication
● Level 2: Basic Authorization
● Level 3: Advanced Authorization
o Custom XACML policies
22
Identity and AC Management
Level 3: Advanced Authorization
IAM Infrastructure
IdP
Service Application
Service Backend
PEP
OAuth2 flow
Request
+ token
Check token
PAP
Policies DB
PDP
Check auth
23
● A JSON Web Token (JWT) is a JSON object defined
in RFC 7519 as a safe way to represent a set of
information between two parties.
● The token is composed of a header, a payload,
and a signature.
Identity and AC Management
JSON Web Tokens
Encoded
Decoded
24
Identity and AC Management
JSON Web Tokens
IAM Infrastructure
Service Application
Service Backend
PEP
OAuth2 flow
(JWT)
Request
+ JWT
IdM
PAP
PDP
Token
validation
25
Iden<ty and AC Management
JSON Web Tokens
IAM Infrastructure
Service Application
Service Backend
PEP
OAuth2 flow
(JWT)
Request
+ JWT
IdM
PAP
PDP
Token
validation
Check
authorization
26
API Management
APInf & PEP Proxy
Request+
APIKey
Web Service
Application
Service Backend Service Backend Service Backend Service Backend
Service
Backend
Service
Backend
Service
Backend
Service
Backend
27
API Management
APInf & PEP Proxy
IAM Infrastructure
IdM
PAP
PDP
Web Service
Application
PEP
OAuth2 flow
Request
+ access_token
Check token
access_token
OK + user info
(roles)
eID Integration
CEF eIDAS
28
● eIDAS (electronic IDentification, Authentication and trust Services) is an EU regulation to enable
secure and seamless electronic interactions between businesses, citizens and public authorities.
● Access to European services by national eID
eIDAS
country 1
eIDAS
country 2
eIDAS
country 3
Service
User
country 2
eID
eID Integration
FIWARE Identity Gateway
29
● Integration of FIWARE Security Framework with eIDAS
● Every application registered in Keyrock can be linked to a eIDAS node
o By an OAuth 2.0 – SAML2 gateway
● Users can then authenticate using their national eID
o AC policies based on user eIDAS profile
● Transparent for applications providers
eID Integration
FIWARE Identity Gateway
30
IAM Infrastructure
IdP
Service Application
Oauth 2.0 requests
access-token
User info request
eIDAS
eIDAS
node 1
IdP 1
eIDAS
node 2
IdP 2
…
SAML flow
Authentication
Data Usage Control
31
● Security Framework and Data Usage Control
o Ensures data sovereignty
o Regulates what is allowed to happen with the data
(future usage).
● Integra:on with Big Data and Processing GEs
Data Usage Control
32
Data Usage Control
33
Data Usage Control
34
Data Usage Control
35
Summary: Terms
36
● PDP, Policy Decision Point (PDP) evaluates and issues authorization decisions.
● PAP, Policy Administration Point (PAP) is the point which manages policies.
● PEP, The Policy Enforcement Point (PEP) is a network device on which policy decisions are carried out
or enforced.
● PIP
● IAM, Identity and Access Management (IAM) is a framework of policies and technologies for ensuring
that the proper people in an enterprise have the appropriate access to technology resources.
● IdM, Identity Management (IdM), also know as IAM.
Summary: Terms
37
● JWT, JSON Web Tokens (JWT) are an open, industry standard RFC 7519 method for representing
claims securely between two parties.
● XACML, the eXtensible Access Control Mark-up Language (XACML) is a standard language policy that
makes decisions through the cooperation of different components in XML format.
● OAuth2, OAuth is an open standard for access delegation, commonly used as a way for Internet users
to grant websites or applications access to their information on other websites but without giving
them the passwords.
● ABAC, Attribute-based access control (ABAC), also known as policy-based access control, defines an
access control paradigm whereby access rights are granted to users through the use of policies which
combine attributes together.
Summary: Terms
38
● RBAC, role-based access control (RBAC) or role-based security is an approach to restric:ng system
access to authorized users.
● eID, An electronic iden:fica:on ("eID") is a digital solu:on for proof of iden:ty of ci:zens or
organiza:ons, for example in view to access benefits or services provided by government authori:es,
banks or other companies, for mobile payments, etc.
● eIDAS, electronic IDen:fica:on, Authen:ca:on and trust Services (eIDAS) is an EU regula:on on / a
set of standards for electronic iden:fica:on and trust services for electronic transac:ons in the
European Single Market.
● ODRL, The Open Digital Rights Language (ODRL) is a policy expression language that provides a
flexible and interoperable informa:on model, vocabulary, and encoding mechanisms for represen:ng
statements about the usage of content and services.
Security GEs documentation
39
● FIWARE Catalogue
o https://www.fiware.org/developers/catalogue
● FIWARE Academy
o https://fiware-academy.readthedocs.io/en/latest/index.html
● Identity Management – Keyrock
o Repo: https://github.com/ging/fiware-idm
● PEP Proxy – Wilma
o Repo: https://github.com/ging/fiware-pep-proxy
● Authorization PDP – AuthZForce
o Repo: https://github.com/authzforce/server
Question & Answer
40
fiware-tech-help@lists.fiware.org
4
1
http://fiware.org
Follow @FIWARE on Twitter
4
2

More Related Content

What's hot

FIWARE Wednesday Webinars - Architecting Your Smart Solution Using FIWARE
FIWARE Wednesday Webinars - Architecting Your Smart Solution Using FIWAREFIWARE Wednesday Webinars - Architecting Your Smart Solution Using FIWARE
FIWARE Wednesday Webinars - Architecting Your Smart Solution Using FIWAREFIWARE
 
FIWARE Global Summit - Moving Towards a Data Economy Business Model: A Real E...
FIWARE Global Summit - Moving Towards a Data Economy Business Model: A Real E...FIWARE Global Summit - Moving Towards a Data Economy Business Model: A Real E...
FIWARE Global Summit - Moving Towards a Data Economy Business Model: A Real E...FIWARE
 
FIWARE Global Summit - FIWARE Overview
FIWARE Global Summit - FIWARE OverviewFIWARE Global Summit - FIWARE Overview
FIWARE Global Summit - FIWARE OverviewFIWARE
 
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...FIWARE
 
20181012 fiware at_construction_conference
20181012 fiware at_construction_conference20181012 fiware at_construction_conference
20181012 fiware at_construction_conferencestefano de panfilis
 
FIWARE Wednesday Webinars - Cities as Enablers of the Data Economy: Smart Dat...
FIWARE Wednesday Webinars - Cities as Enablers of the Data Economy: Smart Dat...FIWARE Wednesday Webinars - Cities as Enablers of the Data Economy: Smart Dat...
FIWARE Wednesday Webinars - Cities as Enablers of the Data Economy: Smart Dat...FIWARE
 
FIWARE Wednesday Webinars - NGSI-LD and Smart Data Models: Standard Access to...
FIWARE Wednesday Webinars - NGSI-LD and Smart Data Models: Standard Access to...FIWARE Wednesday Webinars - NGSI-LD and Smart Data Models: Standard Access to...
FIWARE Wednesday Webinars - NGSI-LD and Smart Data Models: Standard Access to...FIWARE
 
FIWARE Global Summit - FIWARE Overview
FIWARE Global Summit - FIWARE OverviewFIWARE Global Summit - FIWARE Overview
FIWARE Global Summit - FIWARE OverviewFIWARE
 
FIWARE Global Summit - Next Steps
FIWARE Global Summit - Next StepsFIWARE Global Summit - Next Steps
FIWARE Global Summit - Next StepsFIWARE
 
Schema.fiware.org: FIWARE Harmonized Data Models
Schema.fiware.org: FIWARE Harmonized Data ModelsSchema.fiware.org: FIWARE Harmonized Data Models
Schema.fiware.org: FIWARE Harmonized Data ModelsFIWARE
 
FIWARE Global Summit - What Comes Next?
FIWARE Global Summit - What Comes Next?FIWARE Global Summit - What Comes Next?
FIWARE Global Summit - What Comes Next?FIWARE
 
Power to Smart Citizens: reTHINK @ Smart Cities, Paulo Chainho, TADSummit 2018
Power to Smart Citizens: reTHINK @ Smart Cities, Paulo Chainho, TADSummit 2018Power to Smart Citizens: reTHINK @ Smart Cities, Paulo Chainho, TADSummit 2018
Power to Smart Citizens: reTHINK @ Smart Cities, Paulo Chainho, TADSummit 2018Alan Quayle
 
FIWARE Global Summit - Idra: A Solution for Open Data Interoperability
FIWARE Global Summit - Idra: A Solution for Open Data InteroperabilityFIWARE Global Summit - Idra: A Solution for Open Data Interoperability
FIWARE Global Summit - Idra: A Solution for Open Data InteroperabilityFIWARE
 
FIWARE Global Summit - Exploring a New Opportunity in Data Economy: A Case of...
FIWARE Global Summit - Exploring a New Opportunity in Data Economy: A Case of...FIWARE Global Summit - Exploring a New Opportunity in Data Economy: A Case of...
FIWARE Global Summit - Exploring a New Opportunity in Data Economy: A Case of...FIWARE
 
FIWARE Global Summit - Real-time Media Stream Processing using Kurento
FIWARE Global Summit - Real-time Media Stream Processing using KurentoFIWARE Global Summit - Real-time Media Stream Processing using Kurento
FIWARE Global Summit - Real-time Media Stream Processing using KurentoFIWARE
 
FIWARE: Cross-domain concepts and technologies in domain Reference Architectures
FIWARE: Cross-domain concepts and technologies in domain Reference ArchitecturesFIWARE: Cross-domain concepts and technologies in domain Reference Architectures
FIWARE: Cross-domain concepts and technologies in domain Reference ArchitecturesOPEN DEI
 
FIWARE Tech Summit - How to Enable Industrial Data Platforms: Regulations, In...
FIWARE Tech Summit - How to Enable Industrial Data Platforms: Regulations, In...FIWARE Tech Summit - How to Enable Industrial Data Platforms: Regulations, In...
FIWARE Tech Summit - How to Enable Industrial Data Platforms: Regulations, In...FIWARE
 

What's hot (20)

Fiware overview
Fiware overviewFiware overview
Fiware overview
 
FIWARE Wednesday Webinars - Architecting Your Smart Solution Using FIWARE
FIWARE Wednesday Webinars - Architecting Your Smart Solution Using FIWAREFIWARE Wednesday Webinars - Architecting Your Smart Solution Using FIWARE
FIWARE Wednesday Webinars - Architecting Your Smart Solution Using FIWARE
 
FIWARE Global Summit - Moving Towards a Data Economy Business Model: A Real E...
FIWARE Global Summit - Moving Towards a Data Economy Business Model: A Real E...FIWARE Global Summit - Moving Towards a Data Economy Business Model: A Real E...
FIWARE Global Summit - Moving Towards a Data Economy Business Model: A Real E...
 
FIWARE Global Summit - FIWARE Overview
FIWARE Global Summit - FIWARE OverviewFIWARE Global Summit - FIWARE Overview
FIWARE Global Summit - FIWARE Overview
 
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
 
20181012 fiware at_construction_conference
20181012 fiware at_construction_conference20181012 fiware at_construction_conference
20181012 fiware at_construction_conference
 
FIWARE Wednesday Webinars - Cities as Enablers of the Data Economy: Smart Dat...
FIWARE Wednesday Webinars - Cities as Enablers of the Data Economy: Smart Dat...FIWARE Wednesday Webinars - Cities as Enablers of the Data Economy: Smart Dat...
FIWARE Wednesday Webinars - Cities as Enablers of the Data Economy: Smart Dat...
 
FIWARE Wednesday Webinars - NGSI-LD and Smart Data Models: Standard Access to...
FIWARE Wednesday Webinars - NGSI-LD and Smart Data Models: Standard Access to...FIWARE Wednesday Webinars - NGSI-LD and Smart Data Models: Standard Access to...
FIWARE Wednesday Webinars - NGSI-LD and Smart Data Models: Standard Access to...
 
FIWARE Global Summit - FIWARE Overview
FIWARE Global Summit - FIWARE OverviewFIWARE Global Summit - FIWARE Overview
FIWARE Global Summit - FIWARE Overview
 
FIWARE Global Summit - Next Steps
FIWARE Global Summit - Next StepsFIWARE Global Summit - Next Steps
FIWARE Global Summit - Next Steps
 
Schema.fiware.org: FIWARE Harmonized Data Models
Schema.fiware.org: FIWARE Harmonized Data ModelsSchema.fiware.org: FIWARE Harmonized Data Models
Schema.fiware.org: FIWARE Harmonized Data Models
 
Fiware overview3
Fiware overview3Fiware overview3
Fiware overview3
 
FIWARE Data usage control
FIWARE Data usage controlFIWARE Data usage control
FIWARE Data usage control
 
FIWARE Global Summit - What Comes Next?
FIWARE Global Summit - What Comes Next?FIWARE Global Summit - What Comes Next?
FIWARE Global Summit - What Comes Next?
 
Power to Smart Citizens: reTHINK @ Smart Cities, Paulo Chainho, TADSummit 2018
Power to Smart Citizens: reTHINK @ Smart Cities, Paulo Chainho, TADSummit 2018Power to Smart Citizens: reTHINK @ Smart Cities, Paulo Chainho, TADSummit 2018
Power to Smart Citizens: reTHINK @ Smart Cities, Paulo Chainho, TADSummit 2018
 
FIWARE Global Summit - Idra: A Solution for Open Data Interoperability
FIWARE Global Summit - Idra: A Solution for Open Data InteroperabilityFIWARE Global Summit - Idra: A Solution for Open Data Interoperability
FIWARE Global Summit - Idra: A Solution for Open Data Interoperability
 
FIWARE Global Summit - Exploring a New Opportunity in Data Economy: A Case of...
FIWARE Global Summit - Exploring a New Opportunity in Data Economy: A Case of...FIWARE Global Summit - Exploring a New Opportunity in Data Economy: A Case of...
FIWARE Global Summit - Exploring a New Opportunity in Data Economy: A Case of...
 
FIWARE Global Summit - Real-time Media Stream Processing using Kurento
FIWARE Global Summit - Real-time Media Stream Processing using KurentoFIWARE Global Summit - Real-time Media Stream Processing using Kurento
FIWARE Global Summit - Real-time Media Stream Processing using Kurento
 
FIWARE: Cross-domain concepts and technologies in domain Reference Architectures
FIWARE: Cross-domain concepts and technologies in domain Reference ArchitecturesFIWARE: Cross-domain concepts and technologies in domain Reference Architectures
FIWARE: Cross-domain concepts and technologies in domain Reference Architectures
 
FIWARE Tech Summit - How to Enable Industrial Data Platforms: Regulations, In...
FIWARE Tech Summit - How to Enable Industrial Data Platforms: Regulations, In...FIWARE Tech Summit - How to Enable Industrial Data Platforms: Regulations, In...
FIWARE Tech Summit - How to Enable Industrial Data Platforms: Regulations, In...
 

Similar to FIWARE Identity Management and Access Control

Securing FIWARE Architectures
Securing FIWARE ArchitecturesSecuring FIWARE Architectures
Securing FIWARE ArchitecturesFIWARE
 
FIWARE Identity Management and Access Control
FIWARE Identity Management and Access ControlFIWARE Identity Management and Access Control
FIWARE Identity Management and Access ControlFIWARE
 
FIWARE Training: Identity Management and Access Control
FIWARE Training: Identity Management and Access ControlFIWARE Training: Identity Management and Access Control
FIWARE Training: Identity Management and Access ControlFIWARE
 
FIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access ControlFIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access ControlFIWARE
 
FIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access ControlFIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access ControlFIWARE
 
FIWARE Global Summit - Keyrock: Protecting Microservices
FIWARE Global Summit - Keyrock: Protecting MicroservicesFIWARE Global Summit - Keyrock: Protecting Microservices
FIWARE Global Summit - Keyrock: Protecting MicroservicesFIWARE
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Synacts
 
Security Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemSecurity Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemInductive Automation
 
MuleSoft Surat Virtual Meetup#19 - Identity and Client Management With MuleSoft
MuleSoft Surat Virtual Meetup#19 - Identity and Client Management With MuleSoftMuleSoft Surat Virtual Meetup#19 - Identity and Client Management With MuleSoft
MuleSoft Surat Virtual Meetup#19 - Identity and Client Management With MuleSoftJitendra Bafna
 
OpenAM - An Introduction
OpenAM - An IntroductionOpenAM - An Introduction
OpenAM - An IntroductionForgeRock
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsGeorge Fletcher
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2Donald Malloy
 
CPaaS.io Y1 Review Meeting - Citizen Empowerment
CPaaS.io Y1 Review Meeting - Citizen EmpowermentCPaaS.io Y1 Review Meeting - Citizen Empowerment
CPaaS.io Y1 Review Meeting - Citizen EmpowermentStephan Haller
 
The Role of Data Virtualization in an API Economy
The Role of Data Virtualization in an API EconomyThe Role of Data Virtualization in an API Economy
The Role of Data Virtualization in an API EconomyDenodo
 
CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCloudIDSummit
 
Implementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with SpringImplementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with SpringVMware Tanzu
 
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIsWSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIsWSO2
 
Introduction to Gravitational Teleport
Introduction to Gravitational TeleportIntroduction to Gravitational Teleport
Introduction to Gravitational TeleportTeleport
 

Similar to FIWARE Identity Management and Access Control (20)

Securing FIWARE Architectures
Securing FIWARE ArchitecturesSecuring FIWARE Architectures
Securing FIWARE Architectures
 
FIWARE Identity Management and Access Control
FIWARE Identity Management and Access ControlFIWARE Identity Management and Access Control
FIWARE Identity Management and Access Control
 
FIWARE Training: Identity Management and Access Control
FIWARE Training: Identity Management and Access ControlFIWARE Training: Identity Management and Access Control
FIWARE Training: Identity Management and Access Control
 
FIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access ControlFIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access Control
 
FIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access ControlFIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access Control
 
FIWARE Global Summit - Keyrock: Protecting Microservices
FIWARE Global Summit - Keyrock: Protecting MicroservicesFIWARE Global Summit - Keyrock: Protecting Microservices
FIWARE Global Summit - Keyrock: Protecting Microservices
 
Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04Digital ID Protocol - Presentation 2015-12-04
Digital ID Protocol - Presentation 2015-12-04
 
Security Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemSecurity Best Practices for Your Ignition System
Security Best Practices for Your Ignition System
 
MuleSoft Surat Virtual Meetup#19 - Identity and Client Management With MuleSoft
MuleSoft Surat Virtual Meetup#19 - Identity and Client Management With MuleSoftMuleSoft Surat Virtual Meetup#19 - Identity and Client Management With MuleSoft
MuleSoft Surat Virtual Meetup#19 - Identity and Client Management With MuleSoft
 
OpenAM - An Introduction
OpenAM - An IntroductionOpenAM - An Introduction
OpenAM - An Introduction
 
Webinar hiware
Webinar hiwareWebinar hiware
Webinar hiware
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open Standards
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2
 
CPaaS.io Y1 Review Meeting - Citizen Empowerment
CPaaS.io Y1 Review Meeting - Citizen EmpowermentCPaaS.io Y1 Review Meeting - Citizen Empowerment
CPaaS.io Y1 Review Meeting - Citizen Empowerment
 
The Role of Data Virtualization in an API Economy
The Role of Data Virtualization in an API EconomyThe Role of Data Virtualization in an API Economy
The Role of Data Virtualization in an API Economy
 
CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open Standards
 
Implementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with SpringImplementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with Spring
 
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIsWSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
 
Introduction to Gravitational Teleport
Introduction to Gravitational TeleportIntroduction to Gravitational Teleport
Introduction to Gravitational Teleport
 

More from Fernando Lopez Aguilar

Big Data and Machine Learning with FIWARE
Big Data and Machine Learning with FIWAREBig Data and Machine Learning with FIWARE
Big Data and Machine Learning with FIWAREFernando Lopez Aguilar
 
Operational Dashboards with FIWARE WireCloud
Operational Dashboards with FIWARE WireCloudOperational Dashboards with FIWARE WireCloud
Operational Dashboards with FIWARE WireCloudFernando Lopez Aguilar
 
Creating a Context-Aware solution, Complex Event Processing with FIWARE Perseo
Creating a Context-Aware solution, Complex Event Processing with FIWARE PerseoCreating a Context-Aware solution, Complex Event Processing with FIWARE Perseo
Creating a Context-Aware solution, Complex Event Processing with FIWARE PerseoFernando Lopez Aguilar
 
Data persistency (draco, cygnus, sth comet, quantum leap)
Data persistency (draco, cygnus, sth comet, quantum leap)Data persistency (draco, cygnus, sth comet, quantum leap)
Data persistency (draco, cygnus, sth comet, quantum leap)Fernando Lopez Aguilar
 
Cloud and Big Data in the agriculture sector
Cloud and Big Data in the agriculture sectorCloud and Big Data in the agriculture sector
Cloud and Big Data in the agriculture sectorFernando Lopez Aguilar
 
Context Information Management in IoT enabled smart systems - the basics
Context Information Management in IoT enabled smart systems - the basicsContext Information Management in IoT enabled smart systems - the basics
Context Information Management in IoT enabled smart systems - the basicsFernando Lopez Aguilar
 
Setting up your virtual infrastructure using FIWARE Lab Cloud
Setting up your virtual infrastructure using FIWARE Lab CloudSetting up your virtual infrastructure using FIWARE Lab Cloud
Setting up your virtual infrastructure using FIWARE Lab CloudFernando Lopez Aguilar
 
Connecting to the internet of things (IoT)
Connecting to the internet of things (IoT)Connecting to the internet of things (IoT)
Connecting to the internet of things (IoT)Fernando Lopez Aguilar
 

More from Fernando Lopez Aguilar (20)

DW2020 Data Models - FIWARE Platform
DW2020 Data Models - FIWARE PlatformDW2020 Data Models - FIWARE Platform
DW2020 Data Models - FIWARE Platform
 
How to deploy a smart city platform?
How to deploy a smart city platform?How to deploy a smart city platform?
How to deploy a smart city platform?
 
Data Modeling with NGSI, NGSI-LD
Data Modeling with NGSI, NGSI-LDData Modeling with NGSI, NGSI-LD
Data Modeling with NGSI, NGSI-LD
 
Big Data and Machine Learning with FIWARE
Big Data and Machine Learning with FIWAREBig Data and Machine Learning with FIWARE
Big Data and Machine Learning with FIWARE
 
Operational Dashboards with FIWARE WireCloud
Operational Dashboards with FIWARE WireCloudOperational Dashboards with FIWARE WireCloud
Operational Dashboards with FIWARE WireCloud
 
Creating a Context-Aware solution, Complex Event Processing with FIWARE Perseo
Creating a Context-Aware solution, Complex Event Processing with FIWARE PerseoCreating a Context-Aware solution, Complex Event Processing with FIWARE Perseo
Creating a Context-Aware solution, Complex Event Processing with FIWARE Perseo
 
Data persistency (draco, cygnus, sth comet, quantum leap)
Data persistency (draco, cygnus, sth comet, quantum leap)Data persistency (draco, cygnus, sth comet, quantum leap)
Data persistency (draco, cygnus, sth comet, quantum leap)
 
How to debug IoT Agents
How to debug IoT AgentsHow to debug IoT Agents
How to debug IoT Agents
 
What is an IoT Agent
What is an IoT AgentWhat is an IoT Agent
What is an IoT Agent
 
FIWARE Overview
FIWARE OverviewFIWARE Overview
FIWARE Overview
 
Overview of the FIWARE Ecosystem
Overview of the FIWARE EcosystemOverview of the FIWARE Ecosystem
Overview of the FIWARE Ecosystem
 
Cloud and Big Data in the agriculture sector
Cloud and Big Data in the agriculture sectorCloud and Big Data in the agriculture sector
Cloud and Big Data in the agriculture sector
 
Berlin OpenStack Summit'18
Berlin OpenStack Summit'18Berlin OpenStack Summit'18
Berlin OpenStack Summit'18
 
Context Information Management in IoT enabled smart systems - the basics
Context Information Management in IoT enabled smart systems - the basicsContext Information Management in IoT enabled smart systems - the basics
Context Information Management in IoT enabled smart systems - the basics
 
FIWARE IoT Introduction 1
FIWARE IoT Introduction 1FIWARE IoT Introduction 1
FIWARE IoT Introduction 1
 
Introduction to FIWARE IoT
Introduction to FIWARE IoTIntroduction to FIWARE IoT
Introduction to FIWARE IoT
 
Setting up your virtual infrastructure using FIWARE Lab Cloud
Setting up your virtual infrastructure using FIWARE Lab CloudSetting up your virtual infrastructure using FIWARE Lab Cloud
Setting up your virtual infrastructure using FIWARE Lab Cloud
 
Connecting to the internet of things (IoT)
Connecting to the internet of things (IoT)Connecting to the internet of things (IoT)
Connecting to the internet of things (IoT)
 
Fiware, the future internet
Fiware, the future internetFiware, the future internet
Fiware, the future internet
 
Fiware, the future internet
Fiware, the future internetFiware, the future internet
Fiware, the future internet
 

Recently uploaded

₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 

Recently uploaded (20)

₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 

FIWARE Identity Management and Access Control

  • 1. Session 6 - FIWARE Identity Management and Access Control Fernando López, Cloud & Platform Senior Expert fernando.lopez@fiware.org @flopezaguilar FIWARE Foundation, e.V.
  • 2. Learning Goals 1 ● What are the security components? ● Which types of accessing support are allowed? ● How to offer security access to your applica:ons? ● What is eIDAS and eID? How to integrate with eIDAS, eID?
  • 3. FIWARE Ecosystem 2 ● A framework of open source platform components which can be assembled together and with other third-party components to accelerate the development of Smart Solutions.
  • 4. FIWARE Ecosystem 3 ● A framework of open source platform components which can be assembled together and with other third-party components to accelerate the development of Smart Solutions.
  • 5. FIWARE Ecosystem 4 ● A framework of open source platform components which can be assembled together and with other third-party components to accelerate the development of Smart Solutions.
  • 6. FIWARE Ecosystem 5 ● A framework of open source platform components which can be assembled together and with other third-party components to accelerate the development of Smart Solutions.
  • 7. FIWARE Ecosystem 6 ● A framework of open source pla;orm components which can be assembled together and with other third-party components to accelerate the development of Smart Solu<ons.
  • 8. FIWARE Ecosystem 7 ● A framework of open source platform components which can be assembled together and with other third-party components to accelerate the development of Smart Solutions.
  • 9. FIWARE Ecosystem 8 ● A framework of open source pla;orm components which can be assembled together and with other third-party components to accelerate the development of Smart Solu<ons.
  • 10. FIWARE Ecosystem 9 ● A framework of open source platform components which can be assembled together and with other third-party components to accelerate the development of Smart Solutions. Access Control
  • 11. IAM Generic Enablers Identity & Access Control Management 10 ● Keyrock – Iden:ty Management ● Wilma – PEP Proxy ● AuthZForce – Authoriza:on PDP
  • 12. Keyrock Main features 11 Web Interface and Rest API for managing Identity ● Users, devices and groups management ● OAuth 2.0 - based Single Sign On ● Application - scoped roles and permissions management ● Support for local and remote PAP/PDP ● JSON Web Tokens (JWT) and Permanent Tokens support ● MySQL / PostgreSQL and external DB driver ● European eID authentication compatibility (CEF eIDAS)
  • 13. 12 PEP Proxy for securing service backends ● Basic and complex AC policies support ● OAuth 2.0 Access Tokens support ● JSON Web Tokens (JWT) support ● Custom PDP configuration ● Integrated with API Management tools o APInf & API Umbrella o Kong Wilma Main features
  • 14. 13 PAP and PDP Server for managing complex AC policies ● XACML-3.0 standard-compliant ● Cloud-ready RESTful ABAC framework with XML optimization ● Multi-tenant REST API for PDP and PAP ● Standards: o OASIS: XACML 3.0 + Profiles (REST, RBAC, Multiple Decision) o ISO: Fast Infoset ● Extensible to attribute providers (PIP), functions, etc. AuthZForce Main features
  • 15. 14 Identity and AC Management OAuth 2.0 flow IAM Infrastructure IdM Service Applica4on Oauth 2.0 requests access-token User info request
  • 16. 15 Identity and AC Management Accessing GEs and services IAM Infrastructure IdM PAP Policies DB PDP Service Applica8on Service Backend PEP OAuth2 flow Request + token Check auth
  • 17. 16 Identity and AC Management Accessing GEs and services ● Level 1: Authentication ● Level 2: Basic Authorization ● Level 3: Advanced Authorization
  • 18. 17 Identity and AC Management Accessing GEs and services ● Level 1: Authen<ca<on o Check if a user has been authen:cated ● Level 2: Basic Authoriza:on ● Level 3: Advanced Authoriza:on
  • 19. 18 Identity and AC Management Level 1: Authentication IAM Infrastructure IdM Service Application Service Backend PEP OAuth2 flow Request + token Check token
  • 20. 19 Identity and AC Management Accessing GEs and services ● Level 1: Authentication ● Level 2: Basic Authorization o Checks if a user has permissions to access a resource o HTTP verb + resource path ● Level 3: Advanced Authorization
  • 21. 20 Identity and AC Management Level 2: Basic Authorization IAM Infrastructure IdM PAP PDP Service Application Service Backend PEP OAuth2 flow Request + token Check token
  • 22. 21 Iden<ty and AC Management Accessing GEs and services ● Level 1: Authentication ● Level 2: Basic Authorization ● Level 3: Advanced Authorization o Custom XACML policies
  • 23. 22 Identity and AC Management Level 3: Advanced Authorization IAM Infrastructure IdP Service Application Service Backend PEP OAuth2 flow Request + token Check token PAP Policies DB PDP Check auth
  • 24. 23 ● A JSON Web Token (JWT) is a JSON object defined in RFC 7519 as a safe way to represent a set of information between two parties. ● The token is composed of a header, a payload, and a signature. Identity and AC Management JSON Web Tokens Encoded Decoded
  • 25. 24 Identity and AC Management JSON Web Tokens IAM Infrastructure Service Application Service Backend PEP OAuth2 flow (JWT) Request + JWT IdM PAP PDP Token validation
  • 26. 25 Iden<ty and AC Management JSON Web Tokens IAM Infrastructure Service Application Service Backend PEP OAuth2 flow (JWT) Request + JWT IdM PAP PDP Token validation Check authorization
  • 27. 26 API Management APInf & PEP Proxy Request+ APIKey Web Service Application Service Backend Service Backend Service Backend Service Backend
  • 28. Service Backend Service Backend Service Backend Service Backend 27 API Management APInf & PEP Proxy IAM Infrastructure IdM PAP PDP Web Service Application PEP OAuth2 flow Request + access_token Check token access_token OK + user info (roles)
  • 29. eID Integration CEF eIDAS 28 ● eIDAS (electronic IDentification, Authentication and trust Services) is an EU regulation to enable secure and seamless electronic interactions between businesses, citizens and public authorities. ● Access to European services by national eID eIDAS country 1 eIDAS country 2 eIDAS country 3 Service User country 2 eID
  • 30. eID Integration FIWARE Identity Gateway 29 ● Integration of FIWARE Security Framework with eIDAS ● Every application registered in Keyrock can be linked to a eIDAS node o By an OAuth 2.0 – SAML2 gateway ● Users can then authenticate using their national eID o AC policies based on user eIDAS profile ● Transparent for applications providers
  • 31. eID Integration FIWARE Identity Gateway 30 IAM Infrastructure IdP Service Application Oauth 2.0 requests access-token User info request eIDAS eIDAS node 1 IdP 1 eIDAS node 2 IdP 2 … SAML flow Authentication
  • 32. Data Usage Control 31 ● Security Framework and Data Usage Control o Ensures data sovereignty o Regulates what is allowed to happen with the data (future usage). ● Integra:on with Big Data and Processing GEs
  • 37. Summary: Terms 36 ● PDP, Policy Decision Point (PDP) evaluates and issues authorization decisions. ● PAP, Policy Administration Point (PAP) is the point which manages policies. ● PEP, The Policy Enforcement Point (PEP) is a network device on which policy decisions are carried out or enforced. ● PIP ● IAM, Identity and Access Management (IAM) is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. ● IdM, Identity Management (IdM), also know as IAM.
  • 38. Summary: Terms 37 ● JWT, JSON Web Tokens (JWT) are an open, industry standard RFC 7519 method for representing claims securely between two parties. ● XACML, the eXtensible Access Control Mark-up Language (XACML) is a standard language policy that makes decisions through the cooperation of different components in XML format. ● OAuth2, OAuth is an open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other websites but without giving them the passwords. ● ABAC, Attribute-based access control (ABAC), also known as policy-based access control, defines an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together.
  • 39. Summary: Terms 38 ● RBAC, role-based access control (RBAC) or role-based security is an approach to restric:ng system access to authorized users. ● eID, An electronic iden:fica:on ("eID") is a digital solu:on for proof of iden:ty of ci:zens or organiza:ons, for example in view to access benefits or services provided by government authori:es, banks or other companies, for mobile payments, etc. ● eIDAS, electronic IDen:fica:on, Authen:ca:on and trust Services (eIDAS) is an EU regula:on on / a set of standards for electronic iden:fica:on and trust services for electronic transac:ons in the European Single Market. ● ODRL, The Open Digital Rights Language (ODRL) is a policy expression language that provides a flexible and interoperable informa:on model, vocabulary, and encoding mechanisms for represen:ng statements about the usage of content and services.
  • 40. Security GEs documentation 39 ● FIWARE Catalogue o https://www.fiware.org/developers/catalogue ● FIWARE Academy o https://fiware-academy.readthedocs.io/en/latest/index.html ● Identity Management – Keyrock o Repo: https://github.com/ging/fiware-idm ● PEP Proxy – Wilma o Repo: https://github.com/ging/fiware-pep-proxy ● Authorization PDP – AuthZForce o Repo: https://github.com/authzforce/server
  • 43. 4 2