SlideShare a Scribd company logo
Internet-of-Things
Identity & Security with Open Standards
Where are we today?
Devices and Solutions are exploding
● personal
o fitness, watches, ...
● household
o lights, detectors, thermostats, appliances, ...
● medical
o heart rate monitors, ...
Emerging Pattern
Each device has it’s own service in the cloud
Device reports data to the service
User accesses their device’s data via cloud
APIs
Three examples
Internet Connected Dishwasher
Big Data analytics
● how often I wash dishes
● when I have guests
● when I’m not at home
● when I’m canning
Challenges
Security
Ubiquity & Variety
Data Model
User Experience & Management
Bruce Schneider
https://www.schneier.com/essays/archives/2014/01/the_internet_of_thin.html
The computers in our routers and modems are much more powerful than
the PCs of the mid-1990s, and the Internet of Things will put computers
into all sorts of consumer devices.
The industries producing these devices are even less capable of fixing the
problem than the PC and software industries were.
Security Layers
Samsung Gear Live
Types of “things”
personal (fitbit)
shared (family, doctor, neighbor)
medical (heart monitor)
industrial (air conditioner)
temporary (beer glasses)
Data Model Requirements
Authorization / Revocation
Co-ownership
Grouping / Aggregation
Policy Inheritance
Privacy By Design
User Experience
● How do I allow my son to change the
thermostat but only within a limited range?
● How do I easily add a light bulb to the family
room and have it inherit the policy already
assigned to the other lights in the “family
room”?
● How do I let my friend borrow the car such that
driving data is delivered to both of us?
User Experience
● How do I sell my washing machine? (and reset
to initial state?)
o Can I save my policy from the old washing machine
and apply it to the new one?
● How do I craft custom experiences such that
when a World Cup game comes on, the light
change to my preferred team’s colors, the
blinds close and the TV tunes to the correct
channel?
Key Elements to Usability
Simple onboarding process
● provisioning device into personal cloud
● grouping device with other like devices
● pre-authorization of
o who/what can query the device
o who/what can control the device
Key Elements to Usability
Simple Authorization model
● out-of-band user consent channel
● alerts of abnormalities
● sharing / multi-access
● centralized policy management
Key Elements to Usability
Simple de-provisioning
● revocation of authorized capabilities
● reset of device to initial state
● removal of device from groups and
relationships
● archive activity data for historical purposes
Building for a Better
Tomorrow
Building Blocks
OAuth2
OpenID Connect
User Managed Access
Personal Clouds
OAuth2 Basics
● Framework for API
Authorization
o e.g. Valet Key
● Get a token (RFC 6749)
o code, implicit,
refresh, assertion, ...
● Use a token (RFC 6750)
o bearer token profile
OAuth2 Dynamic Registration
Client Registration Endpoint
● Initial Access Token
o out-of-band AuthZ
● Software Statement
o signed claims provided by software stack
OAuth2 Dynamic Registration flow
OpenID Connect Basics
Identity layer build on top of OAuth2
● id_token
● user claims
● session management
● logout
User Managed Access (UMA)
resource owner
resource server
authorization
server
client
protected
resource
s
(unnamed till
now)
UMA, Kantara Initiative: Used with Permission
UMA & Online Sharing
I want to share this stuff
selectively
• Among my own apps
• With family and friends
• With organizations
I want to protect this stuff
from being seen by
everyone in the world
UMA, Kantara Initiative: Used with Permission
I want to control access
proactively, not just feel forced
to consent over and over
UMA request flow
Alice shares calendar with Bob
● Alice emails Bob a link to her calendar
● Bob goes to his calendar software and
subscribes to Alice’s calendar using the link
provided by Alice in the email
OAuth2 Code Flow
UMA Request Flow
UMA 3.1.1UMA 3.4.1UMA 3.1.2UMA 3.2.2 / OAuth2 Token Introspection
Personal Clouds
Slide by Phil Windley: Used with Permission
Persistent Compute Object (PICO)
Identity—they represent a specific entity
Storage—they persistently encapsulate both structured and unstructured data
Open event network—they respond to events
Processing—they run applications autonomously
Event Channels—they have connections to other picos
APIs—they provide access to and access other online services
Slide by Phil Windley: Used with Permission
Picos are Decentralized & Networked
Slide by Phil Windley: Used with Permission
Picos Use an Event Query Model
Slide by Phil Windley: Used with Permission
Programming Model
Program in any language you like
OAuth access to pico
Pico provides
user data
processing
API and inter-pico communications
Slide by Phil Windley: Used with Permission
Applying to IoT
Sample Use Case
Adding new garage door opener to my Internet
of Things
- already have Car, Lights, Thermostat, etc
Goal: garage door is up when I drive in the
driveway
Data Model
Solution Key Components
Trusted Introduction
Transport Security
Activity Authorization
Standards Support
● OAuth2
● UMA
Architectural Requirements
Owner Pico functions as the UMA AS
Each Pico functions as an UMA client
● pico channel authz is RPT introspection
Smart phone app functions as an UMA client
Tight binding between device and device Pico
Assumptions
Device manufactured with a Software
Statement
Device supports bi-directional NFC
Device supports HTTPS
User has a smart phone bound to their
personal cloud (trusted app)
Software Statement
JSON Signed Web Token (JWS)
● Issuer claim [iss] (manufacturer)
● Subject claim [sub] (device unique id)
● JWT ID claim [jti] (unique id)
● Device type [com.example.device.type]
Public key for signature must be retrievable via
the issuer claim.
User Provisioning Experience
User tells personal cloud app to add a device
User “taps” the Garage Door opener
Garage Door opener flashes an LED to signal success
Personal cloud app shows Garage Door as being
connected to the House pico
Personal cloud app can query (or change) the open/closed
state of the door
NFC “Tap” garage door opener
1. Device transfers
software statement
to phone
2. Phone transfers
UMA AS endpoint
to device
a. optionally network
connectivity creds
Phone app adds device to cloud
Pre-Register Device
[Software_Statement]
Add Garage Door Opener
to House?
Create ‘Garage Door’
Garage Door Obtains Access_Token
Register Device
[Software_Statement]
Client_ID & Client_Secret
OAuth2 Client
Assertion Flow
Access_Token
[UMA AAT]
Garage Door connects to pico
Where’s my Pico?
[AAT]
Endpoint: https://…
Pico ID: 123UMA RPT Req (3.4.1)
[AAT, Pico ID]
RPT
(pre-authorized) Establish Connection
[RPT]
Where are we?
Garage Door device is connected to it’s pico
Policy for what/who can query/control the
garage door managed by the Owner pico and
implemented via UMA
What do we want?
Garage door to open when I drive into the
driveway
Assume:
Car is already connected to it’s ‘Car’ pico
‘Car’ pico has a channel with the ‘House’ pico
Car has geo-fence capability
Opening the Garage Door
Decommissioning the Garage Door
1. User, via their trusted app, instructs the Owner pico to
remove the ‘Garage Door’ pico
2. The Owner pico sends a message to the ‘House’ pico to
delete the ‘Garage Door’ pico
3. The ‘Garage Door’ pico can now archive any historical
data before sending a message to the ‘Garage Door’ to
reset to factory defaults
4. Owner pico revokes all ‘Garage Door’ access tokens
Benefits of this approach
● Collected data is stored and managed under
the user’s control
● Authorization policy across the personal IoT
cloud is centrally managed
o Lots of opportunity for innovation in how to help the
user manage their devices
o Authorization policy can be inherited across the data
model
● Implementable today with existing standards
References
UMA
● UMA 101 2013-10-29
● UMA Webinar 2014-03-20
● UMA Core Spec
Personal Clouds:
● Connecting Things
OAuth 2:
● Dynamic Client Registration
● Token Introspection
JOSE
● JSON Web Token
● JSON Web Signature
Questions
Acknowledgements
● UMA: Eve Maler & Domenico Catalano
● CloudOS: Phil Windley
Contact Information:
● Email: george.fletcher@teamaol.com
● Twitter: @gffletch

More Related Content

What's hot

IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
Eurotech
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
EC-Council
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
Koenig Solutions Ltd.
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
ForgeRock
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
Tutun Juhana
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prusty
amarprusty
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
Bryan Len
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Design World
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
Clare Nelson, CISSP, CIPP-E
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
Christopher Frenz
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
Leonardo De Moura Rocha Lima
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
Vasco Veloso
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
noornabi16
 
Internet of Things Security Patterns
Internet of Things Security PatternsInternet of Things Security Patterns
Internet of Things Security Patterns
Mark Benson
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
sreelekha appakondappagari
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Charalampos Doukas
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
CAS
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Denim Group
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
University of Ontario Institute of Technology (UOIT)
 

What's hot (20)

IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prusty
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
Internet of Things Security Patterns
Internet of Things Security PatternsInternet of Things Security Patterns
Internet of Things Security Patterns
 
security and privacy-Internet of things
security and privacy-Internet of thingssecurity and privacy-Internet of things
security and privacy-Internet of things
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health Devices
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 

Viewers also liked

Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoT
AllSeen Alliance
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2
 
The identity of things & the smart cities of tomorrow webinar may 2015
The identity of things & the smart cities of tomorrow webinar may 2015The identity of things & the smart cities of tomorrow webinar may 2015
The identity of things & the smart cities of tomorrow webinar may 2015
ForgeRock
 
Kapil Thangavelu - Cloud Custodian
Kapil Thangavelu - Cloud CustodianKapil Thangavelu - Cloud Custodian
Kapil Thangavelu - Cloud Custodian
ServerlessConf
 
Publicidad
PublicidadPublicidad
Publicidaddanidaco
 
Craig's Letter of Recommendation
Craig's Letter of RecommendationCraig's Letter of Recommendation
Craig's Letter of RecommendationCraig Braddick
 
Brijesh Prabhakar July 18
Brijesh Prabhakar  July 18Brijesh Prabhakar  July 18
Brijesh Prabhakar July 18
Brijesh Prabhakar
 
Gestion exitosa del cambiov1
Gestion exitosa del cambiov1Gestion exitosa del cambiov1
Gestion exitosa del cambiov1
SABMiller
 
Jornada Innovación Madrid. Ponencia 'De los retos a las iniciativas pasando p...
Jornada Innovación Madrid. Ponencia 'De los retos a las iniciativas pasando p...Jornada Innovación Madrid. Ponencia 'De los retos a las iniciativas pasando p...
Jornada Innovación Madrid. Ponencia 'De los retos a las iniciativas pasando p...
iSOCO
 
La planificació sociocultural
La planificació socioculturalLa planificació sociocultural
La planificació sociocultural
carlesmonclus
 
Nd p olswang nombramiento j felix de luis 31 05 2011
Nd p olswang nombramiento j felix de luis 31 05 2011Nd p olswang nombramiento j felix de luis 31 05 2011
Nd p olswang nombramiento j felix de luis 31 05 2011evercom
 
Workshop Soziale Netzwerke
Workshop Soziale NetzwerkeWorkshop Soziale Netzwerke
Workshop Soziale Netzwerke
marull
 
Catalogo 16
Catalogo 16Catalogo 16
Catalogo 16
Andrea M
 
Amigo plus
Amigo plusAmigo plus
Amigo plus
Salvador Navarro
 
Tema 4 El resurgir de las ciudades
Tema 4 El resurgir de las ciudadesTema 4 El resurgir de las ciudades
Tema 4 El resurgir de las ciudades
francisco gonzalez
 
Orientación y apoyo psicológico a adolescentes adictos a internet. pf
Orientación y apoyo psicológico a adolescentes adictos a internet. pfOrientación y apoyo psicológico a adolescentes adictos a internet. pf
Orientación y apoyo psicológico a adolescentes adictos a internet. pf
Expectativas
 
Medidas de tendencia central
Medidas de tendencia centralMedidas de tendencia central
Medidas de tendencia centralMary Corado
 
The World of Ludus
The World of LudusThe World of Ludus
The World of Ludus
Jesse Schell
 
La desconfianza online en Bolivia - Mariano Cabrera Lanfranconi
La desconfianza online en Bolivia - Mariano Cabrera LanfranconiLa desconfianza online en Bolivia - Mariano Cabrera Lanfranconi
La desconfianza online en Bolivia - Mariano Cabrera Lanfranconi
Mariano Cabrera Lanfranconi
 

Viewers also liked (20)

Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoT
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
 
The identity of things & the smart cities of tomorrow webinar may 2015
The identity of things & the smart cities of tomorrow webinar may 2015The identity of things & the smart cities of tomorrow webinar may 2015
The identity of things & the smart cities of tomorrow webinar may 2015
 
Kapil Thangavelu - Cloud Custodian
Kapil Thangavelu - Cloud CustodianKapil Thangavelu - Cloud Custodian
Kapil Thangavelu - Cloud Custodian
 
Publicidad
PublicidadPublicidad
Publicidad
 
Craig's Letter of Recommendation
Craig's Letter of RecommendationCraig's Letter of Recommendation
Craig's Letter of Recommendation
 
Brijesh Prabhakar July 18
Brijesh Prabhakar  July 18Brijesh Prabhakar  July 18
Brijesh Prabhakar July 18
 
Gestion exitosa del cambiov1
Gestion exitosa del cambiov1Gestion exitosa del cambiov1
Gestion exitosa del cambiov1
 
Jornada Innovación Madrid. Ponencia 'De los retos a las iniciativas pasando p...
Jornada Innovación Madrid. Ponencia 'De los retos a las iniciativas pasando p...Jornada Innovación Madrid. Ponencia 'De los retos a las iniciativas pasando p...
Jornada Innovación Madrid. Ponencia 'De los retos a las iniciativas pasando p...
 
PHP Sucks?!
PHP Sucks?!PHP Sucks?!
PHP Sucks?!
 
La planificació sociocultural
La planificació socioculturalLa planificació sociocultural
La planificació sociocultural
 
Nd p olswang nombramiento j felix de luis 31 05 2011
Nd p olswang nombramiento j felix de luis 31 05 2011Nd p olswang nombramiento j felix de luis 31 05 2011
Nd p olswang nombramiento j felix de luis 31 05 2011
 
Workshop Soziale Netzwerke
Workshop Soziale NetzwerkeWorkshop Soziale Netzwerke
Workshop Soziale Netzwerke
 
Catalogo 16
Catalogo 16Catalogo 16
Catalogo 16
 
Amigo plus
Amigo plusAmigo plus
Amigo plus
 
Tema 4 El resurgir de las ciudades
Tema 4 El resurgir de las ciudadesTema 4 El resurgir de las ciudades
Tema 4 El resurgir de las ciudades
 
Orientación y apoyo psicológico a adolescentes adictos a internet. pf
Orientación y apoyo psicológico a adolescentes adictos a internet. pfOrientación y apoyo psicológico a adolescentes adictos a internet. pf
Orientación y apoyo psicológico a adolescentes adictos a internet. pf
 
Medidas de tendencia central
Medidas de tendencia centralMedidas de tendencia central
Medidas de tendencia central
 
The World of Ludus
The World of LudusThe World of Ludus
The World of Ludus
 
La desconfianza online en Bolivia - Mariano Cabrera Lanfranconi
La desconfianza online en Bolivia - Mariano Cabrera LanfranconiLa desconfianza online en Bolivia - Mariano Cabrera Lanfranconi
La desconfianza online en Bolivia - Mariano Cabrera Lanfranconi
 

Similar to Internet of Things: Identity & Security with Open Standards

CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open Standards
CloudIDSummit
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual World
Ping Identity
 
Neudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS HealthcareNeudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS Healthcare
Mike Rossi
 
Security Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemSecurity Best Practices for Your Ignition System
Security Best Practices for Your Ignition System
Inductive Automation
 
Securing the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank ChaversSecuring the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank Chavers
WithTheBest
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns
John Mathon
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
WSO2
 
IRJET- Secure Buddy: An Intelligent Door Lock
IRJET-  	  Secure Buddy: An Intelligent Door LockIRJET-  	  Secure Buddy: An Intelligent Door Lock
IRJET- Secure Buddy: An Intelligent Door Lock
IRJET Journal
 
Security analysis of emerging smart home applications 11.2016
Security analysis of emerging smart home applications 11.2016Security analysis of emerging smart home applications 11.2016
Security analysis of emerging smart home applications 11.2016
단국-삼성 모바일연구소 Samsung Mobile Institute
 
ciphertext presentation at Enterprise Connect 2018 TADHack session
ciphertext presentation at Enterprise Connect 2018 TADHack sessionciphertext presentation at Enterprise Connect 2018 TADHack session
ciphertext presentation at Enterprise Connect 2018 TADHack session
Alan Quayle
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT Patterns
WSO2
 
Augmate connect_Deck
Augmate connect_DeckAugmate connect_Deck
Augmate connect_Deck
Etheralabs
 
Session 1908 connecting devices to the IBM IoT Cloud
Session 1908   connecting devices to the  IBM IoT CloudSession 1908   connecting devices to the  IBM IoT Cloud
Session 1908 connecting devices to the IBM IoT Cloud
PeterNiblett
 
Anonymous Individual Integration for IoT
Anonymous Individual Integration for IoTAnonymous Individual Integration for IoT
Anonymous Individual Integration for IoT
Paul Fremantle
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
OracleIDM
 
Augmate connect deck
Augmate connect deckAugmate connect deck
Augmate connect deck
Etheralabs
 
FIWARE Identity Management and Access Control
FIWARE Identity Management and Access ControlFIWARE Identity Management and Access Control
FIWARE Identity Management and Access Control
Fernando Lopez Aguilar
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Honeywell
 
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Carsten Rhod Gregersen
 
IRJET- Voice Based Home Automation System using Raspberry Pi
IRJET-  	  Voice Based Home Automation System using Raspberry PiIRJET-  	  Voice Based Home Automation System using Raspberry Pi
IRJET- Voice Based Home Automation System using Raspberry Pi
IRJET Journal
 

Similar to Internet of Things: Identity & Security with Open Standards (20)

CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open Standards
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual World
 
Neudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS HealthcareNeudesic IoT HIMSS Healthcare
Neudesic IoT HIMSS Healthcare
 
Security Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemSecurity Best Practices for Your Ignition System
Security Best Practices for Your Ignition System
 
Securing the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank ChaversSecuring the Internet of Things - Hank Chavers
Securing the Internet of Things - Hank Chavers
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
IRJET- Secure Buddy: An Intelligent Door Lock
IRJET-  	  Secure Buddy: An Intelligent Door LockIRJET-  	  Secure Buddy: An Intelligent Door Lock
IRJET- Secure Buddy: An Intelligent Door Lock
 
Security analysis of emerging smart home applications 11.2016
Security analysis of emerging smart home applications 11.2016Security analysis of emerging smart home applications 11.2016
Security analysis of emerging smart home applications 11.2016
 
ciphertext presentation at Enterprise Connect 2018 TADHack session
ciphertext presentation at Enterprise Connect 2018 TADHack sessionciphertext presentation at Enterprise Connect 2018 TADHack session
ciphertext presentation at Enterprise Connect 2018 TADHack session
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT Patterns
 
Augmate connect_Deck
Augmate connect_DeckAugmate connect_Deck
Augmate connect_Deck
 
Session 1908 connecting devices to the IBM IoT Cloud
Session 1908   connecting devices to the  IBM IoT CloudSession 1908   connecting devices to the  IBM IoT Cloud
Session 1908 connecting devices to the IBM IoT Cloud
 
Anonymous Individual Integration for IoT
Anonymous Individual Integration for IoTAnonymous Individual Integration for IoT
Anonymous Individual Integration for IoT
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Augmate connect deck
Augmate connect deckAugmate connect deck
Augmate connect deck
 
FIWARE Identity Management and Access Control
FIWARE Identity Management and Access ControlFIWARE Identity Management and Access Control
FIWARE Identity Management and Access Control
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...Living bits and things 2013 - Using peer-to-peer and distributed technologies...
Living bits and things 2013 - Using peer-to-peer and distributed technologies...
 
IRJET- Voice Based Home Automation System using Raspberry Pi
IRJET-  	  Voice Based Home Automation System using Raspberry PiIRJET-  	  Voice Based Home Automation System using Raspberry Pi
IRJET- Voice Based Home Automation System using Raspberry Pi
 

Recently uploaded

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 

Internet of Things: Identity & Security with Open Standards

  • 2. Where are we today? Devices and Solutions are exploding ● personal o fitness, watches, ... ● household o lights, detectors, thermostats, appliances, ... ● medical o heart rate monitors, ...
  • 3. Emerging Pattern Each device has it’s own service in the cloud Device reports data to the service User accesses their device’s data via cloud APIs
  • 5. Internet Connected Dishwasher Big Data analytics ● how often I wash dishes ● when I have guests ● when I’m not at home ● when I’m canning
  • 6. Challenges Security Ubiquity & Variety Data Model User Experience & Management
  • 7. Bruce Schneider https://www.schneier.com/essays/archives/2014/01/the_internet_of_thin.html The computers in our routers and modems are much more powerful than the PCs of the mid-1990s, and the Internet of Things will put computers into all sorts of consumer devices. The industries producing these devices are even less capable of fixing the problem than the PC and software industries were.
  • 10. Types of “things” personal (fitbit) shared (family, doctor, neighbor) medical (heart monitor) industrial (air conditioner) temporary (beer glasses)
  • 11. Data Model Requirements Authorization / Revocation Co-ownership Grouping / Aggregation Policy Inheritance Privacy By Design
  • 12. User Experience ● How do I allow my son to change the thermostat but only within a limited range? ● How do I easily add a light bulb to the family room and have it inherit the policy already assigned to the other lights in the “family room”? ● How do I let my friend borrow the car such that driving data is delivered to both of us?
  • 13. User Experience ● How do I sell my washing machine? (and reset to initial state?) o Can I save my policy from the old washing machine and apply it to the new one? ● How do I craft custom experiences such that when a World Cup game comes on, the light change to my preferred team’s colors, the blinds close and the TV tunes to the correct channel?
  • 14. Key Elements to Usability Simple onboarding process ● provisioning device into personal cloud ● grouping device with other like devices ● pre-authorization of o who/what can query the device o who/what can control the device
  • 15. Key Elements to Usability Simple Authorization model ● out-of-band user consent channel ● alerts of abnormalities ● sharing / multi-access ● centralized policy management
  • 16. Key Elements to Usability Simple de-provisioning ● revocation of authorized capabilities ● reset of device to initial state ● removal of device from groups and relationships ● archive activity data for historical purposes
  • 17. Building for a Better Tomorrow
  • 18. Building Blocks OAuth2 OpenID Connect User Managed Access Personal Clouds
  • 19. OAuth2 Basics ● Framework for API Authorization o e.g. Valet Key ● Get a token (RFC 6749) o code, implicit, refresh, assertion, ... ● Use a token (RFC 6750) o bearer token profile
  • 20. OAuth2 Dynamic Registration Client Registration Endpoint ● Initial Access Token o out-of-band AuthZ ● Software Statement o signed claims provided by software stack
  • 22. OpenID Connect Basics Identity layer build on top of OAuth2 ● id_token ● user claims ● session management ● logout
  • 23. User Managed Access (UMA) resource owner resource server authorization server client protected resource s (unnamed till now) UMA, Kantara Initiative: Used with Permission
  • 24. UMA & Online Sharing I want to share this stuff selectively • Among my own apps • With family and friends • With organizations I want to protect this stuff from being seen by everyone in the world UMA, Kantara Initiative: Used with Permission I want to control access proactively, not just feel forced to consent over and over
  • 25. UMA request flow Alice shares calendar with Bob ● Alice emails Bob a link to her calendar ● Bob goes to his calendar software and subscribes to Alice’s calendar using the link provided by Alice in the email
  • 26. OAuth2 Code Flow UMA Request Flow UMA 3.1.1UMA 3.4.1UMA 3.1.2UMA 3.2.2 / OAuth2 Token Introspection
  • 27. Personal Clouds Slide by Phil Windley: Used with Permission
  • 28. Persistent Compute Object (PICO) Identity—they represent a specific entity Storage—they persistently encapsulate both structured and unstructured data Open event network—they respond to events Processing—they run applications autonomously Event Channels—they have connections to other picos APIs—they provide access to and access other online services Slide by Phil Windley: Used with Permission
  • 29. Picos are Decentralized & Networked Slide by Phil Windley: Used with Permission
  • 30. Picos Use an Event Query Model Slide by Phil Windley: Used with Permission
  • 31. Programming Model Program in any language you like OAuth access to pico Pico provides user data processing API and inter-pico communications Slide by Phil Windley: Used with Permission
  • 33. Sample Use Case Adding new garage door opener to my Internet of Things - already have Car, Lights, Thermostat, etc Goal: garage door is up when I drive in the driveway
  • 35. Solution Key Components Trusted Introduction Transport Security Activity Authorization Standards Support ● OAuth2 ● UMA
  • 36. Architectural Requirements Owner Pico functions as the UMA AS Each Pico functions as an UMA client ● pico channel authz is RPT introspection Smart phone app functions as an UMA client Tight binding between device and device Pico
  • 37. Assumptions Device manufactured with a Software Statement Device supports bi-directional NFC Device supports HTTPS User has a smart phone bound to their personal cloud (trusted app)
  • 38. Software Statement JSON Signed Web Token (JWS) ● Issuer claim [iss] (manufacturer) ● Subject claim [sub] (device unique id) ● JWT ID claim [jti] (unique id) ● Device type [com.example.device.type] Public key for signature must be retrievable via the issuer claim.
  • 39. User Provisioning Experience User tells personal cloud app to add a device User “taps” the Garage Door opener Garage Door opener flashes an LED to signal success Personal cloud app shows Garage Door as being connected to the House pico Personal cloud app can query (or change) the open/closed state of the door
  • 40. NFC “Tap” garage door opener 1. Device transfers software statement to phone 2. Phone transfers UMA AS endpoint to device a. optionally network connectivity creds
  • 41. Phone app adds device to cloud Pre-Register Device [Software_Statement] Add Garage Door Opener to House? Create ‘Garage Door’
  • 42. Garage Door Obtains Access_Token Register Device [Software_Statement] Client_ID & Client_Secret OAuth2 Client Assertion Flow Access_Token [UMA AAT]
  • 43. Garage Door connects to pico Where’s my Pico? [AAT] Endpoint: https://… Pico ID: 123UMA RPT Req (3.4.1) [AAT, Pico ID] RPT (pre-authorized) Establish Connection [RPT]
  • 44. Where are we? Garage Door device is connected to it’s pico Policy for what/who can query/control the garage door managed by the Owner pico and implemented via UMA
  • 45. What do we want? Garage door to open when I drive into the driveway Assume: Car is already connected to it’s ‘Car’ pico ‘Car’ pico has a channel with the ‘House’ pico Car has geo-fence capability
  • 47. Decommissioning the Garage Door 1. User, via their trusted app, instructs the Owner pico to remove the ‘Garage Door’ pico 2. The Owner pico sends a message to the ‘House’ pico to delete the ‘Garage Door’ pico 3. The ‘Garage Door’ pico can now archive any historical data before sending a message to the ‘Garage Door’ to reset to factory defaults 4. Owner pico revokes all ‘Garage Door’ access tokens
  • 48. Benefits of this approach ● Collected data is stored and managed under the user’s control ● Authorization policy across the personal IoT cloud is centrally managed o Lots of opportunity for innovation in how to help the user manage their devices o Authorization policy can be inherited across the data model ● Implementable today with existing standards
  • 49. References UMA ● UMA 101 2013-10-29 ● UMA Webinar 2014-03-20 ● UMA Core Spec Personal Clouds: ● Connecting Things OAuth 2: ● Dynamic Client Registration ● Token Introspection JOSE ● JSON Web Token ● JSON Web Signature
  • 50. Questions Acknowledgements ● UMA: Eve Maler & Domenico Catalano ● CloudOS: Phil Windley Contact Information: ● Email: george.fletcher@teamaol.com ● Twitter: @gffletch

Editor's Notes

  1. Examples of Nest, Hue and Fitbit
  2. Focusing on “application security” layer Physical tamper resistant (?) Network software updates (?) device access authorization Application events / activities / authorization
  3. Auto-software updates * interesting issue regarding when to auto-update?
  4. Management authorization grouping Control / Sharing co-ownership / lending data privacy Provisioning / De-provisioning
  5. reset to initial state needs to delete all sensitive data
  6. proof-of-possession token being worked on in the IETF working group
  7. UMA is a profile of OAuth, with bits added for interop and scale
  8. Privacy by design
  9. UMA Spec 3.1.1
  10. PICO, Event Modelign
  11. Centralize authorization policy in the Owner Pico
  12. Existing technology: NFC used
  13. UMA and OAuth2 specs Registers software statement with Owner Pico (UMA AS) Owner Pico determines device type and asks the user if they want to associate the device with their house Owner Pico sends a message to the ‘House’ pico to create a ‘Garage Door’ pico A pico channel for messages is established between the ‘House’ pico and the ‘Garage Door’ pico Creating a pico includes provisioning it with an access_token that represents the pico Creating a pico channel includes requesting an RPT from the Owner pico (UMA /rpt) for the destination pico Authorization for the RPT is determined by the AuthZ policy maintained by the Owner Pico
  14. Performs discovery on the provided endpoint to determine OAuth2 client reg endpoint Dynamically registers for a client_id and secret passing the software_statement Owner pico (UMA AS) matches the software_statement to the previous created ‘Garage Door’ pico Owner pico returns client_id and secret Garage door generates a client assertion (JWS) using client_secret to sign the request. Client assertion contains at least the software statement Garage door uses the client assertion flow to obtain an access_token. Owner pico issues the access_token with pre-approved authorizations based on the policy currently associated with the pico hierarchy
  15. The access token returned by the AS functions as the UMA AAT Garage Door requests provisioning information from the Owner pico (AAT) Owner Pico validates AAT determines associated pico and returns the pico_id of the ‘Garage Door’ Pico Garage Door requests a Request Permission Ticket (UMA RPT) using AAT & pico_id Owner Pico return an RPT Garage Door establishes a connection to the ‘Garage Door’ pico passing the RPT ‘Garage Door’ pico validates the RPT before establishing the connection ‘Garage Door’ pico requests a RPT for the Garage Door device ‘Garage Door’ pico uses RPT to establish bi-directional comm channel
  16. Car crosses into the geo-fence around the house Car sends a message via it’s pico channel to the ‘Car’ pico that it’s inside the boundary ‘Car’ pico passes a ‘Car is home’ event to the ‘House’ pico The ‘House’ pico processes the rules associated with the ‘Car is home’ event This includes sending a message to the ‘Garage Door’ pico to set the door to open before the ‘Car’ pico processes the event, it validates the RPT to make sure that the sender is authorized to raise such events ‘Car’ pico passes it’s RPT for the ‘House’ pico when raising the ‘Car is home’ event ‘House’ pico validates the RPT before processing the event