SlideShare a Scribd company logo
IDENTITY RELATIONSHIP
MANAGEMENT IN THE
INTERNET OF THINGS
TRIANGULATING PEOPLE, DEVICES, AND SERVICES
Eve Maler | @xmlgrrl | eve.maler@forgerock.com
10 June 2015
From the web
to the IoT,
the “fear/greed”
tension around
data sharing is
growing
If privacy isn’t secrecy, what does IRM need
to make selective data sharing viable?
Context The right moment to make the decision to share
Control The ability to share just the right amount
Choice The true ability to say no and to change one’s mind
Respect Regard for one’s wishes and preferences
Existing consent tools, are good, but…
OAuth: standard and scoped…but opt-in,
point-to-point, and single-party
“Share”: proactive and party-to-party…but
proprietary, point-to-point, and often insecure
The new
Venn of
access
control and
consent
Organizations need UMA to deliver selective
sharing in IoT environments
The
mechanism:
federated
authorization
on top of
OAuth
Loosely coupled to enable
centralized authorization-as-
a-service for any number of
an individual’s resource
servers
A new concept, to enable
party-to-party sharing
driven by policy (or access
approval) rather than
requiring the individual to
be present at access time
Authorization data is added to this token
if trust in the requesting party is
successfully elevated, typically through
authentication and/or claims-gathering
Let’s see it in action with a
connected-car scenario
What just
happened?
Resource	
  
owner	
  
Resource	
  
server	
  
Authoriza0on	
  
server	
  
Client	
  
Authoriza0on	
  
API	
  
UI	
  
UI	
  
UI	
  
Reques,ng	
  
party	
  
Protec0on	
  
API	
  
Authoriza*on	
  
client	
  
Protec*on	
  
client	
  
RS-­‐specific	
  
API	
  
RS-­‐specific	
  
client	
  
2	
  
1	
  
5	
  
RPT	
  
6	
  
7	
  
8	
  
3	
  
4	
  
PAT	
  
11	
  
AAT	
  
PAT	
  
PAT	
  
RPT	
  
chooses	
  resources	
  to	
  
protect	
  –	
  out	
  of	
  band	
  
sets	
  policies	
  –	
  
out	
  of	
  band	
  
AAT	
  
9	
  
10	
  
PAT	
  
RS	
  needs	
  OAuth	
  client	
  creden,als	
  at	
  AS	
  to	
  get	
  PAT	
  
C	
  needs	
  OAuth	
  client	
  creden,als	
  at	
  AS	
  to	
  get	
  AAT	
  
All	
  protec,on	
  API	
  calls	
  must	
  carry	
  PAT	
  
All	
  authoriza,on	
  API	
  calls	
  must	
  carry	
  AAT	
  
	
  
1.  RS	
  registers	
  resource	
  sets	
  and	
  scopes	
  (ongoing	
  
–	
  CRUD	
  API	
  calls)	
  
2.  C	
  requests	
  resource	
  (provisioned	
  out	
  of	
  band;	
  
must	
  be	
  unique	
  to	
  RO)	
  
3.  RS	
  registers	
  permission	
  (resource	
  set	
  and	
  
scope)	
  for	
  aQempted	
  access	
  
4.  AS	
  returns	
  permission	
  0cket	
  
5.  RS	
  returns	
  error	
  403	
  with	
  as_uri	
  and	
  
permission	
  0cket	
  
6.  C	
  requests	
  authz	
  data,	
  providing	
  permission	
  
0cket	
  
7.  (AVer	
  claims-­‐gathering	
  flows	
  not	
  shown)	
  AS	
  
gives	
  RPT	
  and	
  authz	
  data	
  
8.  C	
  requests	
  resource	
  with	
  RPT	
  
9.  RS	
  introspects	
  RPT	
  at	
  AS	
  (default	
  profile)	
  
10.  AS	
  returns	
  token	
  status	
  
11.  RS	
  returns	
  20x	
  
UProtect
DriveSafe,
then
AllForYourCar
DriveSafe
Hans
Alice
Taking this “webby” approach to IoT sharing
relationships requires careful attention
A deeper “systems design” view of
vulnerabilities is required – e.g….
Authentication and linkages have new
constraints – but also new options
logical physical
Access control must
fail closed
Life and limb is at risk
if access control fails
closed
Usually the “constrained
entity” (if there is one); often
a device paired to a service
and gateway
Is a connection
available at access
attempt time? What
to do if not?
THANKS!
Eve Maler (@xmlgrrl)
THANKS!
Eve Maler | @xmlgrrl | eve.maler@forgerock.com
10 June 2015

More Related Content

Similar to CIS 2015 Identity Relationship Management in the Internet of Things

Single-Page-Application & REST security
Single-Page-Application & REST securitySingle-Page-Application & REST security
Single-Page-Application & REST security
Igor Bossenko
 

Similar to CIS 2015 Identity Relationship Management in the Internet of Things (20)

Digital Consent: Taking UMA from Concept to Reality
Digital Consent: Taking UMA from Concept to RealityDigital Consent: Taking UMA from Concept to Reality
Digital Consent: Taking UMA from Concept to Reality
 
OAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellOAuth in the Real World featuring Webshell
OAuth in the Real World featuring Webshell
 
UMA for ACE
UMA for ACEUMA for ACE
UMA for ACE
 
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract ContextsUser-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
 
Single-Page-Application & REST security
Single-Page-Application & REST securitySingle-Page-Application & REST security
Single-Page-Application & REST security
 
Facebook data breach and OAuth2
   Facebook data breach and OAuth2   Facebook data breach and OAuth2
Facebook data breach and OAuth2
 
Identity Enabling Web Services
Identity Enabling Web ServicesIdentity Enabling Web Services
Identity Enabling Web Services
 
Webapp security (with notes)
Webapp security (with notes)Webapp security (with notes)
Webapp security (with notes)
 
UserCentric Identity based Service Invocation
UserCentric Identity based Service InvocationUserCentric Identity based Service Invocation
UserCentric Identity based Service Invocation
 
Securing RESTful API
Securing RESTful APISecuring RESTful API
Securing RESTful API
 
OAuth Tokens
OAuth TokensOAuth Tokens
OAuth Tokens
 
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
 
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
 
O auth2.0 guide
O auth2.0 guideO auth2.0 guide
O auth2.0 guide
 
Secure Webservices
Secure WebservicesSecure Webservices
Secure Webservices
 
Rest API Security - A quick understanding of Rest API Security
Rest API Security - A quick understanding of Rest API SecurityRest API Security - A quick understanding of Rest API Security
Rest API Security - A quick understanding of Rest API Security
 
DIWD Concordia
DIWD ConcordiaDIWD Concordia
DIWD Concordia
 
FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)
FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)
FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)
 
attacks-oauth-secure-oauth-implementation-33644.pdf
attacks-oauth-secure-oauth-implementation-33644.pdfattacks-oauth-secure-oauth-implementation-33644.pdf
attacks-oauth-secure-oauth-implementation-33644.pdf
 
Restful api
Restful apiRestful api
Restful api
 

More from CloudIDSummit

CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin Wilton
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

CIS 2015 Identity Relationship Management in the Internet of Things

  • 1. IDENTITY RELATIONSHIP MANAGEMENT IN THE INTERNET OF THINGS TRIANGULATING PEOPLE, DEVICES, AND SERVICES Eve Maler | @xmlgrrl | eve.maler@forgerock.com 10 June 2015
  • 2. From the web to the IoT, the “fear/greed” tension around data sharing is growing
  • 3. If privacy isn’t secrecy, what does IRM need to make selective data sharing viable? Context The right moment to make the decision to share Control The ability to share just the right amount Choice The true ability to say no and to change one’s mind Respect Regard for one’s wishes and preferences
  • 4. Existing consent tools, are good, but… OAuth: standard and scoped…but opt-in, point-to-point, and single-party “Share”: proactive and party-to-party…but proprietary, point-to-point, and often insecure
  • 6. Organizations need UMA to deliver selective sharing in IoT environments
  • 7. The mechanism: federated authorization on top of OAuth Loosely coupled to enable centralized authorization-as- a-service for any number of an individual’s resource servers A new concept, to enable party-to-party sharing driven by policy (or access approval) rather than requiring the individual to be present at access time Authorization data is added to this token if trust in the requesting party is successfully elevated, typically through authentication and/or claims-gathering
  • 8. Let’s see it in action with a connected-car scenario
  • 9. What just happened? Resource   owner   Resource   server   Authoriza0on   server   Client   Authoriza0on   API   UI   UI   UI   Reques,ng   party   Protec0on   API   Authoriza*on   client   Protec*on   client   RS-­‐specific   API   RS-­‐specific   client   2   1   5   RPT   6   7   8   3   4   PAT   11   AAT   PAT   PAT   RPT   chooses  resources  to   protect  –  out  of  band   sets  policies  –   out  of  band   AAT   9   10   PAT   RS  needs  OAuth  client  creden,als  at  AS  to  get  PAT   C  needs  OAuth  client  creden,als  at  AS  to  get  AAT   All  protec,on  API  calls  must  carry  PAT   All  authoriza,on  API  calls  must  carry  AAT     1.  RS  registers  resource  sets  and  scopes  (ongoing   –  CRUD  API  calls)   2.  C  requests  resource  (provisioned  out  of  band;   must  be  unique  to  RO)   3.  RS  registers  permission  (resource  set  and   scope)  for  aQempted  access   4.  AS  returns  permission  0cket   5.  RS  returns  error  403  with  as_uri  and   permission  0cket   6.  C  requests  authz  data,  providing  permission   0cket   7.  (AVer  claims-­‐gathering  flows  not  shown)  AS   gives  RPT  and  authz  data   8.  C  requests  resource  with  RPT   9.  RS  introspects  RPT  at  AS  (default  profile)   10.  AS  returns  token  status   11.  RS  returns  20x   UProtect DriveSafe, then AllForYourCar DriveSafe Hans Alice
  • 10. Taking this “webby” approach to IoT sharing relationships requires careful attention A deeper “systems design” view of vulnerabilities is required – e.g…. Authentication and linkages have new constraints – but also new options logical physical Access control must fail closed Life and limb is at risk if access control fails closed Usually the “constrained entity” (if there is one); often a device paired to a service and gateway Is a connection available at access attempt time? What to do if not?
  • 12. THANKS! Eve Maler | @xmlgrrl | eve.maler@forgerock.com 10 June 2015