SlideShare a Scribd company logo
Using IDaaS to Enable IAM for Applications
JULY 22, 2014
2	
  
Introduction – Ken Riggio
•  VP, Software Development - Ticketing
•  B2B Identity and Access Management
•  B2C Identity and Access Management
•  Consolidated System of Inventory and Catalog Management
•  Integration
•  Music Enthusiast m/
•  Dungeon Master!
•  Computer Nerd
•  NOT an Identity Management Expert
3	
  
Introduction – Live Nation Entertainment
•  Business Segments
•  Concerts
•  Venue Owner (House of Blues, Verizon Amphitheater, …)
•  Venue Operator
•  Promoters
•  Festival Operator
•  Artist Nation
•  Artist Management
•  Sponsorships & Advertising
•  Ticketing ($1.4 Billion in Revenue, 21.7% of total)
4	
  
Introduction – Ticketing
•  Clients (thousands of clients, tens of thousands of users)
•  Arenas, Stadiums, Amphitheaters, Music Clubs, Concert Promoters,
Professional Sport Franchises and Leagues, College Sports Teams,
Performing Arts Venues, Museums, Theaters
•  Sales Channels (hundreds of millions of users)
•  Web Sites – Ticketmaster, Livenation, TicketWeb, TicketsNow, Get Me In!,
TicketExchange, … (71%)
•  Mobile Apps (14%)
•  Ticket Outlets – Venue Box Offices, Walmart, Retail Kiosks, … (10%)
•  Telephone (5%)
5	
  
Business Objectives – Re-Architecture
•  The Old
•  17+ different systems that do the same thing…
•  Old technology (i.e. Assembly Programs running on VAX emulator)
•  Monolithic Applications
•  Long Delivery Cycles
•  The New
•  Consolidated and Unified Experience
•  Primarily Java & JavaScript (Node.js)
•  SOA 2.0 and EDA
•  Continuous Integration and Continuous Delivery
6	
  
Business Objectives – Core Principles
•  Increase Business Agility
•  More features, faster.
•  React quickly to new business opportunities.
•  Adopt new technologies as the become available.
•  Technology should enable, not constrain.
•  Reduce Operational Expenses
•  Focus head count on building the future, not supporting
the past.
7	
  
Requirements – Identity and Access Management
•  B2B
•  Multiple Tenants (Clients)
•  Authentication
•  Authorization
•  Access to various applications
•  Web Applications
•  Mobile Applications
•  Scanners (Devices)
•  Roles
•  Entitlements
•  User Management (Delegated Administration)
8	
  
Requirements – Identity and Access Management
•  B2C
•  Multiple Tenants (Channels with Different User Bases)
•  Authentication
•  Authorization
•  Access to Premium Services
•  Fraud Flags and Restrictions
•  Bot Mitigation
•  User Self Service
9	
  
Challenges – Identity and Access Management
•  B2B
•  Data Firewall
•  Clients
•  Internal Live Nation Segments (Ticketing v. Concerts)
•  Cross Tenant Entitlements
•  Tenant A wants to enable Tenant B to be a Promoter for Tenant A’s
events.
•  B2C
•  Performance (Burst Traffic!!!)
•  Both
•  Legacy… Integration, Migration…. Dealing with the past in general!
10	
  
Solution – Identity Bridge Service
•  Don’t Try To Read the
Diagram! ;)
•  API that abstracts and
integrates with
multiple identity
providers.
•  A common API
•  Really wish I
knew about SCIM
when we started
this project.
11	
  
Solution – Identity Bridge Service
•  Ignore the Fine Print, I will walk
you through it.
•  Multiple Consuming
Applications
•  Common Interface (IBS)
•  Routed to 1 or more Identity
Providers based on phase of
integration and migration
•  Bridge provider facilitates lazy
migration.
•  Strangler Pattern
12	
  
Solution – Bring it to the Cloud
•  Identity Bridge Service API (IBS)
•  Authentication
•  Authorization
•  User Management
•  Tenant Provisioning
•  Session Management
•  IBS Eats Its Own Dog Food
•  Access to the API is controlled using its own authentication and
authorization services.
•  Web-based User Interface (also protected using IBS)
13	
  
Solution – Bring it to the Cloud
IBS	
  
VERIZON	
  AMP	
  
HOB	
  
FILLMORE	
  
14	
  
Integration – Varying Client Capabilities
•  Small Clients
•  Few Employees
•  Little or No Technical Abilities
•  Limited Resources
•  Big Clients
•  Thousands of Employees
•  Strong Technical Team, Potentially Have Their Own Development
Teams
•  Have Their Own Internal Identity Solutions
15	
  
Integration – Client Needs
•  However, They Both Have Same Core Needs
•  User Provisioning
•  User Management
•  Authentication
•  Authorization
•  Why?
•  Create and Manage Events, Products, Merchandising, Pricing
•  Reporting
•  Marketing
•  Sales
•  Access Control (umm..Ticket Scanning)
16	
  
Integration – Client Implementation Options
•  Small Clients
•  Use Our Web-Based “Permissioning” UI
•  Use Our Applications and Scanners
•  Big Clients
•  Multiple Options
•  They Can Use Ours and do the “swivel chair”
•  They Can Use Our “Services” integrating with their own UI
•  Their Local Identity Solution can Provision Users through IBS to
leverage the Ticketing application platform.
17	
  
Integration – Our Web-Based “Permissioning” UI
18	
  
Integration – Our Web-Based “Permissioning” UI
19	
  
Integration – A Quick Digression into Mobile
•  Issues Exist on Desktop but Mobile has Made it Worse
•  Lots of reverse engineering, de-compiling, and data extraction
•  Certificates, API Keys, Long Running Access Tokens, etc. have
been farmed and used by bots.
•  Audits and Logs show “same device application” calling us
thousands of times per minute trying to get access to tickets
•  Privacy Laws have pushed us to use device application ids,
instead of actually device information as part of authentication
(smaller fingerprint L).
•  Most companies would love the fact that people are creating
automated ways of buying their stuff… For us, it’s a nightmare.
20	
  
Integration – A Quick Digression into Mobile
•  Mitigation Strategies
•  Session-based
•  No more than one concurrent session
•  A given token cannot be used more than once. Each response
returns a new session token.
•  Alerts
•  Speed bumps
•  Off switch :P
21	
  
Deployment– B2B vs B2C
•  Ultimately, There is No Functional Difference
•  We have different scaling issues though
•  B2B has Constant Moderate Usage
•  B2C has Period Burst Usage
•  Options
•  Scale solution to handle both concurrently
•  Provide two physical deployments, one service B2B, the other B2C.
•  We chose the later.

More Related Content

What's hot

prebooking_1.0
prebooking_1.0prebooking_1.0
prebooking_1.0
Nathan Maust
 
PayLo Merchant Presentation
PayLo Merchant PresentationPayLo Merchant Presentation
PayLo Merchant Presentation
SignaPayPartnerServi
 
Kiosks
KiosksKiosks
Presentation of future of mobile commerce
Presentation of future of mobile commercePresentation of future of mobile commerce
Presentation of future of mobile commerce
MOUMITA KARMAKAR
 
Mobile id public_2
Mobile id public_2Mobile id public_2
Mobile id public_2
SmartLviv
 
Oyo rooms
Oyo roomsOyo rooms
R2integrated Talk For Wit
R2integrated Talk For WitR2integrated Talk For Wit
R2integrated Talk For Wit
SpeakerBox
 

What's hot (7)

prebooking_1.0
prebooking_1.0prebooking_1.0
prebooking_1.0
 
PayLo Merchant Presentation
PayLo Merchant PresentationPayLo Merchant Presentation
PayLo Merchant Presentation
 
Kiosks
KiosksKiosks
Kiosks
 
Presentation of future of mobile commerce
Presentation of future of mobile commercePresentation of future of mobile commerce
Presentation of future of mobile commerce
 
Mobile id public_2
Mobile id public_2Mobile id public_2
Mobile id public_2
 
Oyo rooms
Oyo roomsOyo rooms
Oyo rooms
 
R2integrated Talk For Wit
R2integrated Talk For WitR2integrated Talk For Wit
R2integrated Talk For Wit
 

Similar to CIS14: Using IDaaS to Enable IAM for Multiple Web-based and Mobile B2B and B2C Applications

Intuit APIs for financial transaction aggregation & data categorization
Intuit APIs for financial transaction aggregation & data categorizationIntuit APIs for financial transaction aggregation & data categorization
Intuit APIs for financial transaction aggregation & data categorization
Naga Addagadde
 
DigitalKYC_Modules.pdf
DigitalKYC_Modules.pdfDigitalKYC_Modules.pdf
DigitalKYC_Modules.pdf
FinTech Belgium
 
apidays LIVE Hong Kong - The Future of Legacy - How to leverage legacy and on...
apidays LIVE Hong Kong - The Future of Legacy - How to leverage legacy and on...apidays LIVE Hong Kong - The Future of Legacy - How to leverage legacy and on...
apidays LIVE Hong Kong - The Future of Legacy - How to leverage legacy and on...
apidays
 
apidays LIVE Hong Kong 2021 - Enterprise Integration Patterns for OpenAPI Ini...
apidays LIVE Hong Kong 2021 - Enterprise Integration Patterns for OpenAPI Ini...apidays LIVE Hong Kong 2021 - Enterprise Integration Patterns for OpenAPI Ini...
apidays LIVE Hong Kong 2021 - Enterprise Integration Patterns for OpenAPI Ini...
apidays
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
Prof. Jacques Folon (Ph.D)
 
IBM API management Philip Little
IBM API management Philip LittleIBM API management Philip Little
IBM API management Philip Little
Valeri Illescas
 
Craft Conference 2015 - Evolution of the PayPal API: Platform & Culture
Craft Conference 2015 - Evolution of the PayPal API: Platform & CultureCraft Conference 2015 - Evolution of the PayPal API: Platform & Culture
Craft Conference 2015 - Evolution of the PayPal API: Platform & Culture
Deepak Nadig
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
Hitachi ID Systems, Inc.
 
Moving To MicroServices
Moving To MicroServicesMoving To MicroServices
Moving To MicroServices
David Walker
 
Company Profile 2023 updated.pdf
Company Profile 2023 updated.pdfCompany Profile 2023 updated.pdf
Company Profile 2023 updated.pdf
JudelGuiraldo
 
API First Mobile Strategy
API First Mobile StrategyAPI First Mobile Strategy
API First Mobile Strategy
Nitin Gaur
 
Bigiota Company Profile
Bigiota Company ProfileBigiota Company Profile
Bigiota Company Profile
Krishna Kumar Maurya
 
Api management customer
Api management customerApi management customer
Api management customer
nick_garrod
 
Synergies across APIs and IAM
Synergies across APIs and IAMSynergies across APIs and IAM
Synergies across APIs and IAM
Sagara Gunathunga
 
API Strategy Introduction
API Strategy IntroductionAPI Strategy Introduction
API Strategy Introduction
Doug Gregory
 
#1922 rest-push2 ap-im-v6
#1922 rest-push2 ap-im-v6#1922 rest-push2 ap-im-v6
#1922 rest-push2 ap-im-v6
Jack Carnes
 
Flink Forward Berlin 2017: Bas Geerdink, Martijn Visser - Fast Data at ING - ...
Flink Forward Berlin 2017: Bas Geerdink, Martijn Visser - Fast Data at ING - ...Flink Forward Berlin 2017: Bas Geerdink, Martijn Visser - Fast Data at ING - ...
Flink Forward Berlin 2017: Bas Geerdink, Martijn Visser - Fast Data at ING - ...
Flink Forward
 
How to Manage Digital User Experience for Web Applications
How to Manage Digital User Experience for Web ApplicationsHow to Manage Digital User Experience for Web Applications
How to Manage Digital User Experience for Web Applications
eG Innovations
 
Guide to an API-first Strategy
Guide to an API-first StrategyGuide to an API-first Strategy
Guide to an API-first Strategy
Kellton Tech Solutions Ltd
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
Ping Identity
 

Similar to CIS14: Using IDaaS to Enable IAM for Multiple Web-based and Mobile B2B and B2C Applications (20)

Intuit APIs for financial transaction aggregation & data categorization
Intuit APIs for financial transaction aggregation & data categorizationIntuit APIs for financial transaction aggregation & data categorization
Intuit APIs for financial transaction aggregation & data categorization
 
DigitalKYC_Modules.pdf
DigitalKYC_Modules.pdfDigitalKYC_Modules.pdf
DigitalKYC_Modules.pdf
 
apidays LIVE Hong Kong - The Future of Legacy - How to leverage legacy and on...
apidays LIVE Hong Kong - The Future of Legacy - How to leverage legacy and on...apidays LIVE Hong Kong - The Future of Legacy - How to leverage legacy and on...
apidays LIVE Hong Kong - The Future of Legacy - How to leverage legacy and on...
 
apidays LIVE Hong Kong 2021 - Enterprise Integration Patterns for OpenAPI Ini...
apidays LIVE Hong Kong 2021 - Enterprise Integration Patterns for OpenAPI Ini...apidays LIVE Hong Kong 2021 - Enterprise Integration Patterns for OpenAPI Ini...
apidays LIVE Hong Kong 2021 - Enterprise Integration Patterns for OpenAPI Ini...
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
IBM API management Philip Little
IBM API management Philip LittleIBM API management Philip Little
IBM API management Philip Little
 
Craft Conference 2015 - Evolution of the PayPal API: Platform & Culture
Craft Conference 2015 - Evolution of the PayPal API: Platform & CultureCraft Conference 2015 - Evolution of the PayPal API: Platform & Culture
Craft Conference 2015 - Evolution of the PayPal API: Platform & Culture
 
Hitachi ID Identity Manager
Hitachi ID Identity ManagerHitachi ID Identity Manager
Hitachi ID Identity Manager
 
Moving To MicroServices
Moving To MicroServicesMoving To MicroServices
Moving To MicroServices
 
Company Profile 2023 updated.pdf
Company Profile 2023 updated.pdfCompany Profile 2023 updated.pdf
Company Profile 2023 updated.pdf
 
API First Mobile Strategy
API First Mobile StrategyAPI First Mobile Strategy
API First Mobile Strategy
 
Bigiota Company Profile
Bigiota Company ProfileBigiota Company Profile
Bigiota Company Profile
 
Api management customer
Api management customerApi management customer
Api management customer
 
Synergies across APIs and IAM
Synergies across APIs and IAMSynergies across APIs and IAM
Synergies across APIs and IAM
 
API Strategy Introduction
API Strategy IntroductionAPI Strategy Introduction
API Strategy Introduction
 
#1922 rest-push2 ap-im-v6
#1922 rest-push2 ap-im-v6#1922 rest-push2 ap-im-v6
#1922 rest-push2 ap-im-v6
 
Flink Forward Berlin 2017: Bas Geerdink, Martijn Visser - Fast Data at ING - ...
Flink Forward Berlin 2017: Bas Geerdink, Martijn Visser - Fast Data at ING - ...Flink Forward Berlin 2017: Bas Geerdink, Martijn Visser - Fast Data at ING - ...
Flink Forward Berlin 2017: Bas Geerdink, Martijn Visser - Fast Data at ING - ...
 
How to Manage Digital User Experience for Web Applications
How to Manage Digital User Experience for Web ApplicationsHow to Manage Digital User Experience for Web Applications
How to Manage Digital User Experience for Web Applications
 
Guide to an API-first Strategy
Guide to an API-first StrategyGuide to an API-first Strategy
Guide to an API-first Strategy
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 

More from CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
CloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
CloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
CloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Recently uploaded

Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 

Recently uploaded (20)

Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 

CIS14: Using IDaaS to Enable IAM for Multiple Web-based and Mobile B2B and B2C Applications

  • 1. Using IDaaS to Enable IAM for Applications JULY 22, 2014
  • 2. 2   Introduction – Ken Riggio •  VP, Software Development - Ticketing •  B2B Identity and Access Management •  B2C Identity and Access Management •  Consolidated System of Inventory and Catalog Management •  Integration •  Music Enthusiast m/ •  Dungeon Master! •  Computer Nerd •  NOT an Identity Management Expert
  • 3. 3   Introduction – Live Nation Entertainment •  Business Segments •  Concerts •  Venue Owner (House of Blues, Verizon Amphitheater, …) •  Venue Operator •  Promoters •  Festival Operator •  Artist Nation •  Artist Management •  Sponsorships & Advertising •  Ticketing ($1.4 Billion in Revenue, 21.7% of total)
  • 4. 4   Introduction – Ticketing •  Clients (thousands of clients, tens of thousands of users) •  Arenas, Stadiums, Amphitheaters, Music Clubs, Concert Promoters, Professional Sport Franchises and Leagues, College Sports Teams, Performing Arts Venues, Museums, Theaters •  Sales Channels (hundreds of millions of users) •  Web Sites – Ticketmaster, Livenation, TicketWeb, TicketsNow, Get Me In!, TicketExchange, … (71%) •  Mobile Apps (14%) •  Ticket Outlets – Venue Box Offices, Walmart, Retail Kiosks, … (10%) •  Telephone (5%)
  • 5. 5   Business Objectives – Re-Architecture •  The Old •  17+ different systems that do the same thing… •  Old technology (i.e. Assembly Programs running on VAX emulator) •  Monolithic Applications •  Long Delivery Cycles •  The New •  Consolidated and Unified Experience •  Primarily Java & JavaScript (Node.js) •  SOA 2.0 and EDA •  Continuous Integration and Continuous Delivery
  • 6. 6   Business Objectives – Core Principles •  Increase Business Agility •  More features, faster. •  React quickly to new business opportunities. •  Adopt new technologies as the become available. •  Technology should enable, not constrain. •  Reduce Operational Expenses •  Focus head count on building the future, not supporting the past.
  • 7. 7   Requirements – Identity and Access Management •  B2B •  Multiple Tenants (Clients) •  Authentication •  Authorization •  Access to various applications •  Web Applications •  Mobile Applications •  Scanners (Devices) •  Roles •  Entitlements •  User Management (Delegated Administration)
  • 8. 8   Requirements – Identity and Access Management •  B2C •  Multiple Tenants (Channels with Different User Bases) •  Authentication •  Authorization •  Access to Premium Services •  Fraud Flags and Restrictions •  Bot Mitigation •  User Self Service
  • 9. 9   Challenges – Identity and Access Management •  B2B •  Data Firewall •  Clients •  Internal Live Nation Segments (Ticketing v. Concerts) •  Cross Tenant Entitlements •  Tenant A wants to enable Tenant B to be a Promoter for Tenant A’s events. •  B2C •  Performance (Burst Traffic!!!) •  Both •  Legacy… Integration, Migration…. Dealing with the past in general!
  • 10. 10   Solution – Identity Bridge Service •  Don’t Try To Read the Diagram! ;) •  API that abstracts and integrates with multiple identity providers. •  A common API •  Really wish I knew about SCIM when we started this project.
  • 11. 11   Solution – Identity Bridge Service •  Ignore the Fine Print, I will walk you through it. •  Multiple Consuming Applications •  Common Interface (IBS) •  Routed to 1 or more Identity Providers based on phase of integration and migration •  Bridge provider facilitates lazy migration. •  Strangler Pattern
  • 12. 12   Solution – Bring it to the Cloud •  Identity Bridge Service API (IBS) •  Authentication •  Authorization •  User Management •  Tenant Provisioning •  Session Management •  IBS Eats Its Own Dog Food •  Access to the API is controlled using its own authentication and authorization services. •  Web-based User Interface (also protected using IBS)
  • 13. 13   Solution – Bring it to the Cloud IBS   VERIZON  AMP   HOB   FILLMORE  
  • 14. 14   Integration – Varying Client Capabilities •  Small Clients •  Few Employees •  Little or No Technical Abilities •  Limited Resources •  Big Clients •  Thousands of Employees •  Strong Technical Team, Potentially Have Their Own Development Teams •  Have Their Own Internal Identity Solutions
  • 15. 15   Integration – Client Needs •  However, They Both Have Same Core Needs •  User Provisioning •  User Management •  Authentication •  Authorization •  Why? •  Create and Manage Events, Products, Merchandising, Pricing •  Reporting •  Marketing •  Sales •  Access Control (umm..Ticket Scanning)
  • 16. 16   Integration – Client Implementation Options •  Small Clients •  Use Our Web-Based “Permissioning” UI •  Use Our Applications and Scanners •  Big Clients •  Multiple Options •  They Can Use Ours and do the “swivel chair” •  They Can Use Our “Services” integrating with their own UI •  Their Local Identity Solution can Provision Users through IBS to leverage the Ticketing application platform.
  • 17. 17   Integration – Our Web-Based “Permissioning” UI
  • 18. 18   Integration – Our Web-Based “Permissioning” UI
  • 19. 19   Integration – A Quick Digression into Mobile •  Issues Exist on Desktop but Mobile has Made it Worse •  Lots of reverse engineering, de-compiling, and data extraction •  Certificates, API Keys, Long Running Access Tokens, etc. have been farmed and used by bots. •  Audits and Logs show “same device application” calling us thousands of times per minute trying to get access to tickets •  Privacy Laws have pushed us to use device application ids, instead of actually device information as part of authentication (smaller fingerprint L). •  Most companies would love the fact that people are creating automated ways of buying their stuff… For us, it’s a nightmare.
  • 20. 20   Integration – A Quick Digression into Mobile •  Mitigation Strategies •  Session-based •  No more than one concurrent session •  A given token cannot be used more than once. Each response returns a new session token. •  Alerts •  Speed bumps •  Off switch :P
  • 21. 21   Deployment– B2B vs B2C •  Ultimately, There is No Functional Difference •  We have different scaling issues though •  B2B has Constant Moderate Usage •  B2C has Period Burst Usage •  Options •  Scale solution to handle both concurrently •  Provide two physical deployments, one service B2B, the other B2C. •  We chose the later.