SlideShare a Scribd company logo
Access Management 2.0:
UMA for the Enterprise	

@UMAWG
#UMAam20 for questions
20 March 2014
tinyurl.com/umawg for slides, recording, and more
1
Agenda
•  The realities and
challenges of modern
access control (CA)
•  “UMA for the Enterprise
101”
•  Enterprise UMA case
study and demo (Gluu)
•  What vendors are saying
and doing about UMA
•  Q&A
2	

Thanks to CA Technologies
for sponsoring this webinar!
Thanks to Kantara for
supporting the UMA work!
Thanks to our additional
webinar participants!
The realities and challenges of
modern access control
3	

Further reading:
tinyurl.com/umaam20
4	
   	
  	
  	
  
Copyright © 2014 CA. All rights reserved.
UMA	
  Con(nues	
  The	
  Shi0	
  In	
  Iden(ty	
  Management	
  
That	
  Began	
  With	
  OAuth	
  
The Traditional Enterprise The 21st Century Enterprise
This is the secret to
achieving scale and
agile federation
“UMA for the Enterprise 101”
5	

Further reading:
tinyurl.com/umafaq
OAuth is a three-entity protocol for
securing API calls in a user context
6	

Source:	
  The	
  OAuth	
  2.0	
  Authoriza4on	
  Framework,	
  h;p://tools.ie@.org/html/rfc6749	
  
End-user resource
owner gets
redirected to AS to
log in and consent
to access token
issuance
AS and RS are
typically in the
same domain and
communicate in a
proprietary way
UMA’s original goal: apply privacy-
by-design to OAuth data sharing
7	

Standardized APIs for
privacy and “selective
sharing”
Outsources protection to
a centralized “digital
footprint control console”
The “user” in User-Managed
Access (UMA)
Some guy not
accounted for
in OAuth…
Further reading:
tinyurl.com/umapbd
Emergent UMA properties: flexible,
modern, claims-based authorization
8	

Source:	
  XACMLinfo.org,	
  h;p://xacmlinfo.org/2011/10/30/xacml-­‐reference-­‐architecture/	
  
consumes authz data associated with token
native or a client of offboard source(s), in any language(s)
claims gathered through user interaction and/or consuming ID tokens
UMA and XACML can coexist nicely
The RS
exposes
whatever
value-add API
it wants,
protected by an
AS
9	

App-specific API
UMA-enabled
client
RPTrequesting party token
The AS
exposes an
UMA-
standardized
protection API
to the RS
10	

ProtectionAPI
Protectionclient
PAT
protection API token
includes resource
registration API and token
introspection API
The AS
exposes an
UMA-
standardized
authorization
API to the client
11	

Authorization API
Authorization client
AAT
authorization API token
supports OpenID
Connect-based claims-
gathering for authz
UMA, SAML, and OpenID Connect can coexist nicely
Key use cases
•  Managing
personal data
store access
•  E-transcript
sharing
•  Patient-centric
health data
access
•  …and enterprise access management 2.0
12	

Source:	
  MIT	
  Consor4um	
  for	
  Kerberos	
  and	
  Internet	
  Trust,	
  h;ps://kit.mit.edu	
  
AM1.0 vs AM2.0
•  Complex and feature-rich
•  Usually proprietary
•  Mobile/API-unfriendly
•  Brittle deployment
architecture
•  Not agnostic to authn
method
•  Hard to source distributed
policies
•  Usually coarse-grained
•  RESTful and simpler
•  Standard interop baseline
•  Mobile/API-friendly
•  Just call authz endpoints
vs. deploying an agent
•  Agnostic to authn method
and federation usage
•  Flexible in policy
expression and sourcing
•  Leverages API’s “scope-
grained authorization”
13
Enterprise UMA case study
14
What vendors are saying and doing
about UMA
15	

Further	
  reading:	
  
4nyurl.com/uma1iop	
  
NuveAM by Cloud Identity
•  UMA-compliant AS:
–  Access control to Web data
–  API security and management
–  Real-time monitoring and audit
•  Use cases: Securing Personal Data Services (PDS) and
access management 2.0 (API security)
•  Uses open standards, including UMA, OAuth 2.0, OpenID
Connect, and SAML 2.0
•  Open source frameworks: Java and Python
•  Support for mobile (Android)
•  Integrates with Identity Management and Identity Federation
http://www.cloudidentity.co.uk/products/nuveam
16
NuveAM by Cloud Identity
17
NuveAM for the enterprises
18	

•  Management of resources, APIs,
permissions, and access control policies
•  Access control on demand
•  Detailed audit information
•  Application management: resource servers
and clients (with NuveLogin)
•  Integration with identity management
•  Integration with identity federation and SSO
NuveAM for the enterprises
19
NuveAM for the enterprises
20
Next steps
21
Next steps for the WG…and you
•  Get involved!
–  Become an “UMAnitarian” (it’s free)
–  Participate in the interop and
our implementation discussions
–  Follow and engage with @UMAWG on Twitter
•  Current work:
–  Technical: claim profiling to allow claim-gathering
using SAML, OpenID Connect, LDAP…
–  Business: Binding Obligations spec to tie “terms of
authorization” to multi-party state changes
•  Stay tuned for another webinar in Q2
22	

Join	
  at:	
  
4nyurl.com/umawg	
  
Questions? Thank you!	

@UMAWG
#UMAam20 for questions
20 March 2014
tinyurl.com/umawg for slides, recording, and more
23

More Related Content

What's hot

Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
Ahmed Banafa
 
Existing system
Existing systemExisting system
Existing system
madhukarreddy007
 
Presentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloudPresentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloud
Hassan EL ALLOUSSI
 
Identity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationIdentity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital Transformation
Uthaiyashankar
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
cloudresearcher
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
Tomppa Järvinen
 
Sovereign identity
Sovereign identitySovereign identity
Reducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesReducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniques
VISTA InfoSec
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
Iaetsd Iaetsd
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacks
John Davis
 
Exploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareExploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in Healthcare
Ionixx Technologies Inc.
 
The emerging pci dss and nist standards
The emerging pci dss and nist standardsThe emerging pci dss and nist standards
The emerging pci dss and nist standards
Ulf Mattsson
 
Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?
Priyanka Aash
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
IJERA Editor
 
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
OpenAthens
 
IT-Security@Contemporary Life
IT-Security@Contemporary LifeIT-Security@Contemporary Life
IT-Security@Contemporary Life
Oliver Pfaff
 

What's hot (16)

Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
Existing system
Existing systemExisting system
Existing system
 
Presentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloudPresentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloud
 
Identity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationIdentity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital Transformation
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
 
Sovereign identity
Sovereign identitySovereign identity
Sovereign identity
 
Reducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesReducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniques
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacks
 
Exploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareExploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in Healthcare
 
The emerging pci dss and nist standards
The emerging pci dss and nist standardsThe emerging pci dss and nist standards
The emerging pci dss and nist standards
 
Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
 
IT-Security@Contemporary Life
IT-Security@Contemporary LifeIT-Security@Contemporary Life
IT-Security@Contemporary Life
 

Viewers also liked

20120512 robots en verzekeraar
20120512 robots en verzekeraar20120512 robots en verzekeraar
20120512 robots en verzekeraarJGB de Groot
 
καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!
καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!
καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!Kostas Tampakis
 
אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...
אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...
אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...yossi koren
 
A face of greece!!
A face of greece!!A face of greece!!
A face of greece!!
Kostas Tampakis
 
20100427 eyjafjalljokull
20100427 eyjafjalljokull20100427 eyjafjalljokull
20100427 eyjafjalljokullNSTDA THAILAND
 
РИФ 2016, Перформанс в регионах. Блондинка.ру.
РИФ 2016, Перформанс в регионах. Блондинка.ру.РИФ 2016, Перформанс в регионах. Блондинка.ру.
РИФ 2016, Перформанс в регионах. Блондинка.ру.
Тарасов Константин
 
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...
Тарасов Константин
 
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителю
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителюРИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителю
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителю
Тарасов Константин
 
РИФ 2016, Performance-маркетинг в электронной коммерции
РИФ 2016, Performance-маркетинг в электронной коммерцииРИФ 2016, Performance-маркетинг в электронной коммерции
РИФ 2016, Performance-маркетинг в электронной коммерции
Тарасов Константин
 
! автоматизированное управление рекламой 19 terehov-etarget2011
! автоматизированное управление рекламой 19 terehov-etarget2011! автоматизированное управление рекламой 19 terehov-etarget2011
! автоматизированное управление рекламой 19 terehov-etarget2011Тарасов Константин
 
!Rif13.17apr s14--parshukova увеличение эффективности контекста
!Rif13.17apr s14--parshukova увеличение эффективности контекста!Rif13.17apr s14--parshukova увеличение эффективности контекста
!Rif13.17apr s14--parshukova увеличение эффективности контекстаТарасов Константин
 
! реализовать настройки га 14 sergeev-etarget2011
! реализовать настройки га 14 sergeev-etarget2011! реализовать настройки га 14 sergeev-etarget2011
! реализовать настройки га 14 sergeev-etarget2011Тарасов Константин
 
РИФ 2016, Make SMM not Likes
РИФ 2016, Make SMM not LikesРИФ 2016, Make SMM not Likes
РИФ 2016, Make SMM not Likes
Тарасов Константин
 
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламе
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламеРИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламе
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламе
Тарасов Константин
 
35 bark-optimization2010 стратегия развития сайта и seo
35 bark-optimization2010 стратегия развития сайта и seo35 bark-optimization2010 стратегия развития сайта и seo
35 bark-optimization2010 стратегия развития сайта и seoТарасов Константин
 

Viewers also liked (20)

420
420420
420
 
20120512 robots en verzekeraar
20120512 robots en verzekeraar20120512 robots en verzekeraar
20120512 robots en verzekeraar
 
καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!
καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!
καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!
 
Fotos extra1
Fotos extra1Fotos extra1
Fotos extra1
 
אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...
אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...
אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...
 
A face of greece!!
A face of greece!!A face of greece!!
A face of greece!!
 
20100427 eyjafjalljokull
20100427 eyjafjalljokull20100427 eyjafjalljokull
20100427 eyjafjalljokull
 
РИФ 2016, Перформанс в регионах. Блондинка.ру.
РИФ 2016, Перформанс в регионах. Блондинка.ру.РИФ 2016, Перформанс в регионах. Блондинка.ру.
РИФ 2016, Перформанс в регионах. Блондинка.ру.
 
Projektijuhtimine
ProjektijuhtimineProjektijuhtimine
Projektijuhtimine
 
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...
 
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителю
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителюРИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителю
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителю
 
22apr s51-a-sergeev-110426092204-phpapp01
22apr s51-a-sergeev-110426092204-phpapp0122apr s51-a-sergeev-110426092204-phpapp01
22apr s51-a-sergeev-110426092204-phpapp01
 
РИФ 2016, Performance-маркетинг в электронной коммерции
РИФ 2016, Performance-маркетинг в электронной коммерцииРИФ 2016, Performance-маркетинг в электронной коммерции
РИФ 2016, Performance-маркетинг в электронной коммерции
 
! автоматизированное управление рекламой 19 terehov-etarget2011
! автоматизированное управление рекламой 19 terehov-etarget2011! автоматизированное управление рекламой 19 terehov-etarget2011
! автоматизированное управление рекламой 19 terehov-etarget2011
 
!Rif13.17apr s14--parshukova увеличение эффективности контекста
!Rif13.17apr s14--parshukova увеличение эффективности контекста!Rif13.17apr s14--parshukova увеличение эффективности контекста
!Rif13.17apr s14--parshukova увеличение эффективности контекста
 
! реализовать настройки га 14 sergeev-etarget2011
! реализовать настройки га 14 sergeev-etarget2011! реализовать настройки га 14 sergeev-etarget2011
! реализовать настройки га 14 sergeev-etarget2011
 
РИФ 2016, Make SMM not Likes
РИФ 2016, Make SMM not LikesРИФ 2016, Make SMM not Likes
РИФ 2016, Make SMM not Likes
 
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламе
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламеРИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламе
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламе
 
Rosja -soczi
Rosja  -socziRosja  -soczi
Rosja -soczi
 
35 bark-optimization2010 стратегия развития сайта и seo
35 bark-optimization2010 стратегия развития сайта и seo35 bark-optimization2010 стратегия развития сайта и seo
35 bark-optimization2010 стратегия развития сайта и seo
 

Similar to Uma webinar 2014 03-20

Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
ForgeRock
 
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Eve Maler
 
Security On The Cloud
Security On The CloudSecurity On The Cloud
Security On The Cloud
Tu Pham
 
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
DianaGray10
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
James Sutter
 
API, Integration, and SOA Convergence
API, Integration, and SOA ConvergenceAPI, Integration, and SOA Convergence
API, Integration, and SOA Convergence
Kasun Indrasiri
 
D@W REST security
D@W REST securityD@W REST security
D@W REST security
Gaurav Sharma
 
API’s and Micro Services 0.5
API’s and Micro Services 0.5API’s and Micro Services 0.5
API’s and Micro Services 0.5
Richard Hudson
 
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitTop 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Amazon Web Services
 
Shared Security Responsibility Model of AWS
Shared Security Responsibility Model of AWSShared Security Responsibility Model of AWS
Shared Security Responsibility Model of AWS
Akshay Mathur
 
The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3
The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3 The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3
The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3
SSH Communications Security
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
Ping Identity
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
Chinatu Uzuegbu
 
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
SolarWinds
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over Perimeter
ForgeRock
 
Webinar hiware
Webinar hiwareWebinar hiware
Webinar hiware
Seokminyoon4
 
Identiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffingIdentiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffing
JoshuaCiccone2
 
EasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng OeiEasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng Oei
Vietnam Open Infrastructure User Group
 
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIsWSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2
 

Similar to Uma webinar 2014 03-20 (20)

Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
 
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
 
Security On The Cloud
Security On The CloudSecurity On The Cloud
Security On The Cloud
 
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
 
API, Integration, and SOA Convergence
API, Integration, and SOA ConvergenceAPI, Integration, and SOA Convergence
API, Integration, and SOA Convergence
 
D@W REST security
D@W REST securityD@W REST security
D@W REST security
 
API’s and Micro Services 0.5
API’s and Micro Services 0.5API’s and Micro Services 0.5
API’s and Micro Services 0.5
 
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitTop 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
 
Shared Security Responsibility Model of AWS
Shared Security Responsibility Model of AWSShared Security Responsibility Model of AWS
Shared Security Responsibility Model of AWS
 
The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3
The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3 The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3
The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over Perimeter
 
Webinar hiware
Webinar hiwareWebinar hiware
Webinar hiware
 
Identiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffingIdentiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffing
 
EasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng OeiEasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng Oei
 
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIsWSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
 

More from kantarainitiative

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022
kantarainitiative
 
2021 Annual General Meeting
2021 Annual General Meeting2021 Annual General Meeting
2021 Annual General Meeting
kantarainitiative
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary
kantarainitiative
 
2020 Annual General Meeting
2020 Annual General Meeting2020 Annual General Meeting
2020 Annual General Meeting
kantarainitiative
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiative
kantarainitiative
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020
kantarainitiative
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
kantarainitiative
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
kantarainitiative
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020
kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
kantarainitiative
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
kantarainitiative
 
Kantara orientation 2018
Kantara orientation 2018Kantara orientation 2018
Kantara orientation 2018
kantarainitiative
 
Kantara Overview 2017
Kantara Overview 2017Kantara Overview 2017
Kantara Overview 2017
kantarainitiative
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
kantarainitiative
 
Cloud Identity Summit
Cloud Identity SummitCloud Identity Summit
Cloud Identity Summit
kantarainitiative
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
kantarainitiative
 
Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)
kantarainitiative
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016
kantarainitiative
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Update
kantarainitiative
 

More from kantarainitiative (20)

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022
 
2021 Annual General Meeting
2021 Annual General Meeting2021 Annual General Meeting
2021 Annual General Meeting
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary
 
2020 Annual General Meeting
2020 Annual General Meeting2020 Annual General Meeting
2020 Annual General Meeting
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiative
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara orientation 2018
Kantara orientation 2018Kantara orientation 2018
Kantara orientation 2018
 
Kantara Overview 2017
Kantara Overview 2017Kantara Overview 2017
Kantara Overview 2017
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
Cloud Identity Summit
Cloud Identity SummitCloud Identity Summit
Cloud Identity Summit
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Update
 

Recently uploaded

Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 

Recently uploaded (20)

Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 

Uma webinar 2014 03-20

  • 1. Access Management 2.0: UMA for the Enterprise @UMAWG #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 1
  • 2. Agenda •  The realities and challenges of modern access control (CA) •  “UMA for the Enterprise 101” •  Enterprise UMA case study and demo (Gluu) •  What vendors are saying and doing about UMA •  Q&A 2 Thanks to CA Technologies for sponsoring this webinar! Thanks to Kantara for supporting the UMA work! Thanks to our additional webinar participants!
  • 3. The realities and challenges of modern access control 3 Further reading: tinyurl.com/umaam20
  • 4. 4         Copyright © 2014 CA. All rights reserved. UMA  Con(nues  The  Shi0  In  Iden(ty  Management   That  Began  With  OAuth   The Traditional Enterprise The 21st Century Enterprise This is the secret to achieving scale and agile federation
  • 5. “UMA for the Enterprise 101” 5 Further reading: tinyurl.com/umafaq
  • 6. OAuth is a three-entity protocol for securing API calls in a user context 6 Source:  The  OAuth  2.0  Authoriza4on  Framework,  h;p://tools.ie@.org/html/rfc6749   End-user resource owner gets redirected to AS to log in and consent to access token issuance AS and RS are typically in the same domain and communicate in a proprietary way
  • 7. UMA’s original goal: apply privacy- by-design to OAuth data sharing 7 Standardized APIs for privacy and “selective sharing” Outsources protection to a centralized “digital footprint control console” The “user” in User-Managed Access (UMA) Some guy not accounted for in OAuth… Further reading: tinyurl.com/umapbd
  • 8. Emergent UMA properties: flexible, modern, claims-based authorization 8 Source:  XACMLinfo.org,  h;p://xacmlinfo.org/2011/10/30/xacml-­‐reference-­‐architecture/   consumes authz data associated with token native or a client of offboard source(s), in any language(s) claims gathered through user interaction and/or consuming ID tokens UMA and XACML can coexist nicely
  • 9. The RS exposes whatever value-add API it wants, protected by an AS 9 App-specific API UMA-enabled client RPTrequesting party token
  • 10. The AS exposes an UMA- standardized protection API to the RS 10 ProtectionAPI Protectionclient PAT protection API token includes resource registration API and token introspection API
  • 11. The AS exposes an UMA- standardized authorization API to the client 11 Authorization API Authorization client AAT authorization API token supports OpenID Connect-based claims- gathering for authz UMA, SAML, and OpenID Connect can coexist nicely
  • 12. Key use cases •  Managing personal data store access •  E-transcript sharing •  Patient-centric health data access •  …and enterprise access management 2.0 12 Source:  MIT  Consor4um  for  Kerberos  and  Internet  Trust,  h;ps://kit.mit.edu  
  • 13. AM1.0 vs AM2.0 •  Complex and feature-rich •  Usually proprietary •  Mobile/API-unfriendly •  Brittle deployment architecture •  Not agnostic to authn method •  Hard to source distributed policies •  Usually coarse-grained •  RESTful and simpler •  Standard interop baseline •  Mobile/API-friendly •  Just call authz endpoints vs. deploying an agent •  Agnostic to authn method and federation usage •  Flexible in policy expression and sourcing •  Leverages API’s “scope- grained authorization” 13
  • 15. What vendors are saying and doing about UMA 15 Further  reading:   4nyurl.com/uma1iop  
  • 16. NuveAM by Cloud Identity •  UMA-compliant AS: –  Access control to Web data –  API security and management –  Real-time monitoring and audit •  Use cases: Securing Personal Data Services (PDS) and access management 2.0 (API security) •  Uses open standards, including UMA, OAuth 2.0, OpenID Connect, and SAML 2.0 •  Open source frameworks: Java and Python •  Support for mobile (Android) •  Integrates with Identity Management and Identity Federation http://www.cloudidentity.co.uk/products/nuveam 16
  • 17. NuveAM by Cloud Identity 17
  • 18. NuveAM for the enterprises 18 •  Management of resources, APIs, permissions, and access control policies •  Access control on demand •  Detailed audit information •  Application management: resource servers and clients (with NuveLogin) •  Integration with identity management •  Integration with identity federation and SSO
  • 19. NuveAM for the enterprises 19
  • 20. NuveAM for the enterprises 20
  • 22. Next steps for the WG…and you •  Get involved! –  Become an “UMAnitarian” (it’s free) –  Participate in the interop and our implementation discussions –  Follow and engage with @UMAWG on Twitter •  Current work: –  Technical: claim profiling to allow claim-gathering using SAML, OpenID Connect, LDAP… –  Business: Binding Obligations spec to tie “terms of authorization” to multi-party state changes •  Stay tuned for another webinar in Q2 22 Join  at:   4nyurl.com/umawg  
  • 23. Questions? Thank you! @UMAWG #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 23