SlideShare a Scribd company logo
1 of 68
Download to read offline
End to End Identity Management
Johann Dilantha Nallathamby
Technical Lead
WSO2
Defining the Topic
1. Define Identity
2. Define end-to-end
3. Define Managing of Identities
Defining Identity
Simply,
• Who am I?
• What are my attributes?
• What are my behaviours?
• What are my relationships?
Defining End-to-End
Life of a single Identity over time
Defining End-to-End
Resource access by Identities at a given snapshot of time
Defining Management
Defining Management
I am an Engineer, not a manager!!
Let’s look at management in terms of challenges and solutions
Defining Management
I am an Engineer, not a manager!!
Let’s look at management in terms of challenges and solutions
Let’s look at the story of Bob
Beginnings of Bob’s journey ...
• Bob is a senior engineer
• Bob is working for a startup called “X”
• Bob is responsible for the Identity Management of his staff.
• His company has a handful of employees
• They have only a very few applications
• Bob’s life was going good :)
Few years down the line ...
• Bob’s company was doing very well
• They are now having a large number of employees after
rapidly expanding
• They are planning to recruit even more
• They now have several internal and cloud applications
• Identity Management is becoming a headache for Bob!!
User accounts in all the systems
Robert
(An employee)
Cloud email Service
Username = “robert”
Password = “robert-pass”
Expense
Management
System
HR System
Username = “robert2”
Password = “robert2-pass”
Username = “robert2”
Password = “robert2-pass”
Username = “robert_5”
Password = “K67robert2-AB-#2”
Bob thinks why not a centralized user directory?
Bob has an idea in mind
Robert
Mail ClientUsername = “robert”
Password = “robert-pass”
HR System
Expense
Management
System
Username = “robert2”
Password = “robert2-pass”
Username = “robert”
Password = “robert-pass”
Username = “robert”
Password = “robert-pass”
User
store
Bob has some difficult questions to find answers
“How am I going to migrate all our users into this central
directory? I am sure there will be few teams who are not going
to take this very well.”
“What type of user directory am I to
propose for this centralized store?
Engineering uses a JDBC database to
store its users; IT uses an LDAP; which
one should we go for in our
centralized solution?”
“More importantly, does a user directory solve all the problem
that I have now and may get in the future? I know that user
directories can store identity attributes securely. But can they
manage aspects such as uniqueness, temporality, ownership,
trustworthiness of those attributes?”
“Can they store/track user behaviors”
“Can they manage identity relationships?”
“But the biggest of them all is that my user experience is still
pretty bad. My users will have to enter the same set of
credentials to get logged into each application they are going
to use.”
“Is username/password authentication secure enough?”
Identity Integration
Brokered Authentication
Identity Broker
(e.g. WSO2 IS)
Service provider
(e.g. HR System)
Robert
Username = “robert”
Password = “robert-pass”
Token
Token
User
store
Standard authentication request
Single Sign On
Robert
Mail ClientUsername = “robert”
Password = “robert-pass”
HR System
Expense
Management
System
Username = “robert2”
Password = “robert2-pass”
Username = “robert”
Password = “robert-pass”
Username = “robert”
Password = “robert-pass”
Identity Broker
(e.g. WSO2 IS)
Decouple Authentication and SSO
Bob realizes that what he wants is an Identity Provider that
provides,
• Identity Integration
• Brokered Authentication
• Single Sign On
• Decoupling of Authentication Method from SSO Protocol
Bob sets up an Identity Provider ...
OpenID Connect Complete Protocol Suite Support
“My authorization rules are all over my applications, and I
am having a hard time managing them because,
• They have been written into the applications’ code
• They are constantly changing”
Bob faces another problem ...
How can I ...
• Effectively govern my resources
• Globally enforce access control policies on those
resources
• Make any policy updates immediately effective
• Get a consolidated set of audit trails on who is
accessing those resources with all other contextual
details
Defining Resource Access
• Subject
– User
– Group
• Object
– Protected Resource
• Verb
– Action that can be performed on a protected
resource
• Context
– Environmental attributes such as time, Client IPs,
etc.
Understanding Bob’s problem
Understanding Bob’s problem
Resources bring permissions to our Identity ecosystem
Permission = {Resource + Action}
There are only two kinds of authorization problems
in the world ...
Is Alice allowed to update accounts?
What resources is Alice allowed to update?
Bob searches for some existing authorization models
• Access Matrix / Access Control Table / Access Control List
• Role Based Access Control (RBAC)
• Group Based Access Control
• Attribute Based Access Control (ABAC)
• Ownership and sharing based Access Control
• Multilevel Access Control
All of them seem to have some limitation
• The number of rules grow and become hard to manage
• Not fine grained enough.
• Hard to manage with a constantly changing environment.
Bob: “If only my authorization logic was centralized,
externalized, policy based, fine-grain and easy to
manage...”
eXtensible Access Control Markup Language (XACML)
/data/files
/data/archives
/data/visualize
/data/details
Policy decision Point
If user = jane
Permit.
If role = clark and
Action = write
Deny.
Policy Store
Policy Administration
Point
Policy Enforcement
Point(PEP)
User = Tao
User = David
User = Jane
Trivia:
Authentication, authorization, and auditing are collectively
known as the gold standards of security. All three words start
with the prefix 'Au'; which is the periodic symbol for Gold.
Authentication, Authorization and Auditing are done
Bob: “Still I am provisioning all new accounts manually to our
Identity Broker as well as each and every cloud application
that we use. Although they support federated authentication
with our Identity Broker still they need a mapped account in
the cloud. If only I can automate that..”
Outbound Provisioning
Identity server
Extern Inc.
<<< Create User >>>
Username: jane
Email: jane@extern.com
Cloud email service
<<< Create User >>>
Username: jane
Password: jane123
Email: jane@extern.com
<<< Create User >>>
Username: jane
<<< Create User >>>
Username: jane@extern.com
Contacts Directory
Expense Management
System
Bob: “I would also like to be able to decentralize
control and empower my users to govern their
identities but with set of governance policies to
control it.”
Self Sign Up
Workflows
Identity
server
Update roles
Approve role
assignment
Approve role
assignment
Assigned to
“supervisors” role
Assigned to “James”
Event Handler
Request
Initiator
Callback
Handler
Executor Manager
Database
Process
Template
Initializer
Executor
Process Template Implementations
WSO2 IS Workflow Architecture
Account Recovery
• User onboarding
• Account Disabling
• Account Locking
• Brute Force Prevention
• Idle Account Locking
• Password Complexity policies
• Password History
• Password Expiry
• Admin Initiated Password Reset
• Account Linking
Identity Governance and Administration (IGA)
WSO2 IS Analytics
Analytics
Analytics
Analytics
• Login Attempts
– By user
– By role
– By identity store
– By service provider
– By identity provider
• Alerts
– Suspicious login
– Abnormally long sessions
• Sessions
– Top longest durations
– Average session duration
per user
– Session count
Analytics
Alright Yeah!! Bob’s got a top notch Identity Management system
running in place that manages all his employee accounts efficiently.
Bob has been promoted as an Identity Architect in the company!!
The board has decided to acquire company “Y” across the globe. The
CTO tells Bob that those new employees will need to have access to
their applications and wants him to see how best they can manage
access from those other employees to the existing applications.
After some time ...
• “Y” has its own Identity and Access Management
system just like “X”.
• The system is connected to their corporate user
directory.
• The security architect over there will not expose the
corporate directory directly outside the firewall for
“X” to consume.
• Bob doesn’t want to be going and changing all their
applications to support this new Identity Provider.
Things are not looking good for Bob ...
Problem:
• Users will use applications across
enterprise borders and cloud
Solution:
• Multiple trust domains with
multiple Identity Providers
• Federated authentication based on
the trust relationship
Identity Federation
Bob goes into the meeting with Y’s security architect
thinking that this is a done deal. In the meeting he gets
to know that their Identity Provider doesn’t support
“OpenID Connect”. It only supports “SAML2 SSO”.
Bob: “All our applications here work with OpenID
Connect. What kind of Identity Provider doesn’t
support OpenID Connect.
Also I saw that they are using some custom claim URIs
that is not part of OpenID Connect.”
Bob has a meeting with Security Architect of “Y”
Federation Silos
Problem:
• Multiple Identity Federation protocols
• E.g. OpenID Connect, SAML2, OpenID, CAS, etc.
Identity Bus
1. Identity Hub
2. Identity Bridge
3. Claim Transformation
4. Role Transformation
Bob: “How am I going to authorize these users? Our authorization is
entirely centralized in our Identity Provider. Our applications talk
with our Identity Provider for authorization. Y’s IAM couldn’t even
do OpenID Connect. There is no way in the world it supports XACML.
And before I forget we also need to provision accounts for these
users in all our cloud applications.”
But wait ...
Just-In-Time (JIT) Provisioning
Identity
Broker
Identity Broker
Username: jane
Password: jane123
Email:
saman@wso2.com
1. Access request
2 .Auth request
3. Auth
request
4. Auth
response
User
Directory
5. Add user
Outbound JIT Provisioning
Identity
Broker
Identity Broker
Username: jane
Password: jane123
Email:
saman@wso2.com
1. Access request
2 .Auth request
3. Auth
request
4. Auth
response
5. Add user
Provisioning Bridge
“Phew!! That was close. I was saved by the Bus.”
Hop on to the Enterprise Identity Bus
Extending the Identity Ecosystem
Bob’s CTO calls him and tells him, “we have decided to expose our
internal applications as services for our clients to consume. Find out
how we can expose them securely”
Bob was expecting this to come his way, with all the hype
surrounding APIs.
Some time goes by and ....
Problem:
Consumers need access to backend APIs on behalf of the logged
in user.
Solution:
Delegated Access Control with OAuth2
First result on Google Search reveals OAuth2
Bob’s CTO again calls him and tells him, “we have decided to
consume one of our partner services through our API gateway.
However it is a secured endpoint which expects some kind of an
authorization token.”
Time goes by again ...
• Frequently, downstream services need to make data level
entitlements and need to record an identity in the audit trail.
• To do so, the service must know the identity of the end user.
Trusted Subsystems
• Trusted subsystem generated identity tokens
When downstream services trust the trusted subsystem to assert the
original caller's identity, without requiring additional evidence from other
parties. These tokens are self-issued and self-contained.
• Third party generated identity tokens
When the downstream services trust the trusted subsystem to assert
claims regarding the original caller in conjunction with third party evidence
that satisfies an additional set of security requirements. They can be
self-contained tokens.
Trusted Subsystems - Identity Flows
• User self-signed tokens
When the trusted subsystem is authorized to perform a set of application
functions and when there must be evidence from the original caller that the
caller initiated the request.
• Identity/Credential Mapping
Special function of the trusted subsystem role, where the goal is to
transform an identity to another related identity for the purpose of gaining
access to downstream resources that only recognize the transformed identity.
Trusted Subsystem - Identity Flows
Bob decides to use JWT Grant Profile for OAuth2
• Identity Provider
• Centralized Authorization and Auditing
• Outbound Provisioning
• Self service and Account and Password Control Policies
• Workflows
• Analytics
• Identity Federation
• Just-In-Time Provisioning / Provisioning Bridge
• Delegated Access Control
• Trusted Subsystems
Bob’s successful journey so far in the digital enterprise ...
Thank You!

More Related Content

What's hot

[WSO2Con EU 2017] Cloud-Native API Management
[WSO2Con EU 2017] Cloud-Native API Management[WSO2Con EU 2017] Cloud-Native API Management
[WSO2Con EU 2017] Cloud-Native API ManagementWSO2
 
Developing Enterprise Applications with the WSO2 Application Platform
Developing Enterprise Applications with the WSO2 Application PlatformDeveloping Enterprise Applications with the WSO2 Application Platform
Developing Enterprise Applications with the WSO2 Application PlatformNuwan Bandara
 
Delivering the Promise of SOA - Enterprise Integration Made Easy
Delivering the Promise of SOA - Enterprise Integration Made EasyDelivering the Promise of SOA - Enterprise Integration Made Easy
Delivering the Promise of SOA - Enterprise Integration Made EasyWSO2
 
[WSO2Con EU 2017] Managing the End-to-End Lifecycle of User Identities Across...
[WSO2Con EU 2017] Managing the End-to-End Lifecycle of User Identities Across...[WSO2Con EU 2017] Managing the End-to-End Lifecycle of User Identities Across...
[WSO2Con EU 2017] Managing the End-to-End Lifecycle of User Identities Across...WSO2
 
[WSO2Con EU 2017] Resilience Patterns with Ballerina
[WSO2Con EU 2017] Resilience Patterns with Ballerina[WSO2Con EU 2017] Resilience Patterns with Ballerina
[WSO2Con EU 2017] Resilience Patterns with BallerinaWSO2
 
[WSO2Con EU 2017] Microservice Architecture (MSA) and Integration Microservices
[WSO2Con EU 2017] Microservice Architecture (MSA) and Integration Microservices[WSO2Con EU 2017] Microservice Architecture (MSA) and Integration Microservices
[WSO2Con EU 2017] Microservice Architecture (MSA) and Integration MicroservicesWSO2
 
[WSO2Con EU 2017] Ballerina Connectors for Seamless Integration
[WSO2Con EU 2017] Ballerina Connectors for Seamless Integration[WSO2Con EU 2017] Ballerina Connectors for Seamless Integration
[WSO2Con EU 2017] Ballerina Connectors for Seamless IntegrationWSO2
 
WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...
WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...
WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...WSO2
 
Addressing Security Concerns with WSO2 Governance Registry Policy Store
Addressing Security Concerns with WSO2 Governance Registry Policy StoreAddressing Security Concerns with WSO2 Governance Registry Policy Store
Addressing Security Concerns with WSO2 Governance Registry Policy StoreWSO2
 
Integration Solution Patterns
Integration Solution Patterns Integration Solution Patterns
Integration Solution Patterns WSO2
 
APIs from the Edge to the Mesh
APIs from the Edge to the MeshAPIs from the Edge to the Mesh
APIs from the Edge to the MeshNordic APIs
 
Introduction to Configurable Governance Artifacts
Introduction to Configurable Governance ArtifactsIntroduction to Configurable Governance Artifacts
Introduction to Configurable Governance ArtifactsWSO2
 
[WSO2Con EU 2017] Microservices for Enterprises
[WSO2Con EU 2017] Microservices for Enterprises[WSO2Con EU 2017] Microservices for Enterprises
[WSO2Con EU 2017] Microservices for EnterprisesWSO2
 
Building open source identity infrastructures
Building open source identity infrastructuresBuilding open source identity infrastructures
Building open source identity infrastructuresFrancesco Chicchiriccò
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMHasiniG
 
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...CloudIDSummit
 
WSO2 Application Server - 5.0.0
WSO2 Application Server - 5.0.0WSO2 Application Server - 5.0.0
WSO2 Application Server - 5.0.0WSO2
 
An Enhanced User Experience for Automobile Purchases with the WSO2 Mobile Ser...
An Enhanced User Experience for Automobile Purchases with the WSO2 Mobile Ser...An Enhanced User Experience for Automobile Purchases with the WSO2 Mobile Ser...
An Enhanced User Experience for Automobile Purchases with the WSO2 Mobile Ser...WSO2
 

What's hot (20)

[WSO2Con EU 2017] Cloud-Native API Management
[WSO2Con EU 2017] Cloud-Native API Management[WSO2Con EU 2017] Cloud-Native API Management
[WSO2Con EU 2017] Cloud-Native API Management
 
Developing Enterprise Applications with the WSO2 Application Platform
Developing Enterprise Applications with the WSO2 Application PlatformDeveloping Enterprise Applications with the WSO2 Application Platform
Developing Enterprise Applications with the WSO2 Application Platform
 
Delivering the Promise of SOA - Enterprise Integration Made Easy
Delivering the Promise of SOA - Enterprise Integration Made EasyDelivering the Promise of SOA - Enterprise Integration Made Easy
Delivering the Promise of SOA - Enterprise Integration Made Easy
 
[WSO2Con EU 2017] Managing the End-to-End Lifecycle of User Identities Across...
[WSO2Con EU 2017] Managing the End-to-End Lifecycle of User Identities Across...[WSO2Con EU 2017] Managing the End-to-End Lifecycle of User Identities Across...
[WSO2Con EU 2017] Managing the End-to-End Lifecycle of User Identities Across...
 
[WSO2Con EU 2017] Resilience Patterns with Ballerina
[WSO2Con EU 2017] Resilience Patterns with Ballerina[WSO2Con EU 2017] Resilience Patterns with Ballerina
[WSO2Con EU 2017] Resilience Patterns with Ballerina
 
[WSO2Con EU 2017] Microservice Architecture (MSA) and Integration Microservices
[WSO2Con EU 2017] Microservice Architecture (MSA) and Integration Microservices[WSO2Con EU 2017] Microservice Architecture (MSA) and Integration Microservices
[WSO2Con EU 2017] Microservice Architecture (MSA) and Integration Microservices
 
[WSO2Con EU 2017] Ballerina Connectors for Seamless Integration
[WSO2Con EU 2017] Ballerina Connectors for Seamless Integration[WSO2Con EU 2017] Ballerina Connectors for Seamless Integration
[WSO2Con EU 2017] Ballerina Connectors for Seamless Integration
 
WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...
WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...
WSO2Con USA 2017: Managing Verifone’s New Payment Device “Carbon” with WSO2’s...
 
Addressing Security Concerns with WSO2 Governance Registry Policy Store
Addressing Security Concerns with WSO2 Governance Registry Policy StoreAddressing Security Concerns with WSO2 Governance Registry Policy Store
Addressing Security Concerns with WSO2 Governance Registry Policy Store
 
Integration Solution Patterns
Integration Solution Patterns Integration Solution Patterns
Integration Solution Patterns
 
APIs from the Edge to the Mesh
APIs from the Edge to the MeshAPIs from the Edge to the Mesh
APIs from the Edge to the Mesh
 
Introduction to Configurable Governance Artifacts
Introduction to Configurable Governance ArtifactsIntroduction to Configurable Governance Artifacts
Introduction to Configurable Governance Artifacts
 
Enhancing Unified Communication Experience through Microsoft Lync SDK and UCMA
Enhancing Unified Communication Experience through Microsoft Lync SDK and UCMAEnhancing Unified Communication Experience through Microsoft Lync SDK and UCMA
Enhancing Unified Communication Experience through Microsoft Lync SDK and UCMA
 
[WSO2Con EU 2017] Microservices for Enterprises
[WSO2Con EU 2017] Microservices for Enterprises[WSO2Con EU 2017] Microservices for Enterprises
[WSO2Con EU 2017] Microservices for Enterprises
 
iPlanet presentation
iPlanet presentationiPlanet presentation
iPlanet presentation
 
Building open source identity infrastructures
Building open source identity infrastructuresBuilding open source identity infrastructures
Building open source identity infrastructures
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIM
 
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...
CIS 2015- Provisioning IDaas- Using SCIM to Enable Cloud Identity- Pat Patter...
 
WSO2 Application Server - 5.0.0
WSO2 Application Server - 5.0.0WSO2 Application Server - 5.0.0
WSO2 Application Server - 5.0.0
 
An Enhanced User Experience for Automobile Purchases with the WSO2 Mobile Ser...
An Enhanced User Experience for Automobile Purchases with the WSO2 Mobile Ser...An Enhanced User Experience for Automobile Purchases with the WSO2 Mobile Ser...
An Enhanced User Experience for Automobile Purchases with the WSO2 Mobile Ser...
 

Viewers also liked

WSO2Con USA 2017: Identity Solution Patterns
WSO2Con USA 2017: Identity Solution PatternsWSO2Con USA 2017: Identity Solution Patterns
WSO2Con USA 2017: Identity Solution PatternsWSO2
 
WSO2Con USA 2017: Building an Effective API Architecture
WSO2Con USA 2017: Building an Effective API ArchitectureWSO2Con USA 2017: Building an Effective API Architecture
WSO2Con USA 2017: Building an Effective API ArchitectureWSO2
 
WSO2Con USA 2017: Implementing a Modern API Management Solution that Benefits...
WSO2Con USA 2017: Implementing a Modern API Management Solution that Benefits...WSO2Con USA 2017: Implementing a Modern API Management Solution that Benefits...
WSO2Con USA 2017: Implementing a Modern API Management Solution that Benefits...WSO2
 
WSO2Con USA 2017: APIs as Your Digital Connector
WSO2Con USA 2017: APIs as Your Digital ConnectorWSO2Con USA 2017: APIs as Your Digital Connector
WSO2Con USA 2017: APIs as Your Digital ConnectorWSO2
 
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...WSO2
 
API Security: the full story
API Security: the full storyAPI Security: the full story
API Security: the full story42Crunch
 
WSO2Con EU 2016: Identity Management – A Cornerstone for the Connected Enter...
WSO2Con EU 2016: Identity Management –  A Cornerstone for the Connected Enter...WSO2Con EU 2016: Identity Management –  A Cornerstone for the Connected Enter...
WSO2Con EU 2016: Identity Management – A Cornerstone for the Connected Enter...WSO2
 
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 EcosystemWSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 EcosystemWSO2
 
WSO2Con US 2013 - Identity Management Best Practices with WSO2 Identity Server
WSO2Con US 2013 - Identity Management Best Practices with WSO2 Identity ServerWSO2Con US 2013 - Identity Management Best Practices with WSO2 Identity Server
WSO2Con US 2013 - Identity Management Best Practices with WSO2 Identity ServerWSO2
 
Detecção de Fraudes em Licitações Usando Batch Analytics com WSO2
Detecção de Fraudes em Licitações Usando Batch Analytics com WSO2Detecção de Fraudes em Licitações Usando Batch Analytics com WSO2
Detecção de Fraudes em Licitações Usando Batch Analytics com WSO2WSO2
 
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...WSO2
 
Integração SAP com Plataformas 100% OpenSource
Integração SAP com Plataformas 100% OpenSourceIntegração SAP com Plataformas 100% OpenSource
Integração SAP com Plataformas 100% OpenSourceWSO2
 
Enhanced Developer Experience with WSO2 Enterprise Service Bus Tooling
Enhanced Developer Experience with WSO2 Enterprise Service Bus ToolingEnhanced Developer Experience with WSO2 Enterprise Service Bus Tooling
Enhanced Developer Experience with WSO2 Enterprise Service Bus ToolingWSO2
 
Webinar: Message Tracing and Debugging in WSO2 Enterprise Service Bus
Webinar: Message Tracing and Debugging in WSO2 Enterprise Service BusWebinar: Message Tracing and Debugging in WSO2 Enterprise Service Bus
Webinar: Message Tracing and Debugging in WSO2 Enterprise Service BusWSO2
 
Dealing with Common Data Requirements in Your Enterprise
Dealing with Common Data Requirements in Your EnterpriseDealing with Common Data Requirements in Your Enterprise
Dealing with Common Data Requirements in Your EnterpriseWSO2
 
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0WSO2
 
How Privacy in the Cloud Affects Organizations
How Privacy in the Cloud Affects OrganizationsHow Privacy in the Cloud Affects Organizations
How Privacy in the Cloud Affects OrganizationsWSO2
 
Solution Architecture Patterns for Digital Transformation
Solution Architecture Patterns for Digital TransformationSolution Architecture Patterns for Digital Transformation
Solution Architecture Patterns for Digital TransformationWSO2
 
WSO2Con USA 2017: Discover Data That Matters: Deep Dive into WSO2 Analytics
WSO2Con USA 2017: Discover Data That Matters: Deep Dive into WSO2 AnalyticsWSO2Con USA 2017: Discover Data That Matters: Deep Dive into WSO2 Analytics
WSO2Con USA 2017: Discover Data That Matters: Deep Dive into WSO2 AnalyticsWSO2
 

Viewers also liked (19)

WSO2Con USA 2017: Identity Solution Patterns
WSO2Con USA 2017: Identity Solution PatternsWSO2Con USA 2017: Identity Solution Patterns
WSO2Con USA 2017: Identity Solution Patterns
 
WSO2Con USA 2017: Building an Effective API Architecture
WSO2Con USA 2017: Building an Effective API ArchitectureWSO2Con USA 2017: Building an Effective API Architecture
WSO2Con USA 2017: Building an Effective API Architecture
 
WSO2Con USA 2017: Implementing a Modern API Management Solution that Benefits...
WSO2Con USA 2017: Implementing a Modern API Management Solution that Benefits...WSO2Con USA 2017: Implementing a Modern API Management Solution that Benefits...
WSO2Con USA 2017: Implementing a Modern API Management Solution that Benefits...
 
WSO2Con USA 2017: APIs as Your Digital Connector
WSO2Con USA 2017: APIs as Your Digital ConnectorWSO2Con USA 2017: APIs as Your Digital Connector
WSO2Con USA 2017: APIs as Your Digital Connector
 
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
 
API Security: the full story
API Security: the full storyAPI Security: the full story
API Security: the full story
 
WSO2Con EU 2016: Identity Management – A Cornerstone for the Connected Enter...
WSO2Con EU 2016: Identity Management –  A Cornerstone for the Connected Enter...WSO2Con EU 2016: Identity Management –  A Cornerstone for the Connected Enter...
WSO2Con EU 2016: Identity Management – A Cornerstone for the Connected Enter...
 
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 EcosystemWSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
 
WSO2Con US 2013 - Identity Management Best Practices with WSO2 Identity Server
WSO2Con US 2013 - Identity Management Best Practices with WSO2 Identity ServerWSO2Con US 2013 - Identity Management Best Practices with WSO2 Identity Server
WSO2Con US 2013 - Identity Management Best Practices with WSO2 Identity Server
 
Detecção de Fraudes em Licitações Usando Batch Analytics com WSO2
Detecção de Fraudes em Licitações Usando Batch Analytics com WSO2Detecção de Fraudes em Licitações Usando Batch Analytics com WSO2
Detecção de Fraudes em Licitações Usando Batch Analytics com WSO2
 
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
WSO2 Guest Webinar: Securing SaaS Apps with Multi-factor Authentication with ...
 
Integração SAP com Plataformas 100% OpenSource
Integração SAP com Plataformas 100% OpenSourceIntegração SAP com Plataformas 100% OpenSource
Integração SAP com Plataformas 100% OpenSource
 
Enhanced Developer Experience with WSO2 Enterprise Service Bus Tooling
Enhanced Developer Experience with WSO2 Enterprise Service Bus ToolingEnhanced Developer Experience with WSO2 Enterprise Service Bus Tooling
Enhanced Developer Experience with WSO2 Enterprise Service Bus Tooling
 
Webinar: Message Tracing and Debugging in WSO2 Enterprise Service Bus
Webinar: Message Tracing and Debugging in WSO2 Enterprise Service BusWebinar: Message Tracing and Debugging in WSO2 Enterprise Service Bus
Webinar: Message Tracing and Debugging in WSO2 Enterprise Service Bus
 
Dealing with Common Data Requirements in Your Enterprise
Dealing with Common Data Requirements in Your EnterpriseDealing with Common Data Requirements in Your Enterprise
Dealing with Common Data Requirements in Your Enterprise
 
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
 
How Privacy in the Cloud Affects Organizations
How Privacy in the Cloud Affects OrganizationsHow Privacy in the Cloud Affects Organizations
How Privacy in the Cloud Affects Organizations
 
Solution Architecture Patterns for Digital Transformation
Solution Architecture Patterns for Digital TransformationSolution Architecture Patterns for Digital Transformation
Solution Architecture Patterns for Digital Transformation
 
WSO2Con USA 2017: Discover Data That Matters: Deep Dive into WSO2 Analytics
WSO2Con USA 2017: Discover Data That Matters: Deep Dive into WSO2 AnalyticsWSO2Con USA 2017: Discover Data That Matters: Deep Dive into WSO2 Analytics
WSO2Con USA 2017: Discover Data That Matters: Deep Dive into WSO2 Analytics
 

Similar to End to End Identity Management Guide

JDD2015: Security in the era of modern applications and services - Bolesław D...
JDD2015: Security in the era of modern applications and services - Bolesław D...JDD2015: Security in the era of modern applications and services - Bolesław D...
JDD2015: Security in the era of modern applications and services - Bolesław D...PROIDEA
 
Authentication and Authorization in Asp.Net
Authentication and Authorization in Asp.NetAuthentication and Authorization in Asp.Net
Authentication and Authorization in Asp.NetShivanand Arur
 
Bdd with Cucumber and Mocha
Bdd with Cucumber and MochaBdd with Cucumber and Mocha
Bdd with Cucumber and MochaAtish Narlawar
 
7 Deadly Sins in Azure AD App Development
7 Deadly Sins in Azure AD App Development7 Deadly Sins in Azure AD App Development
7 Deadly Sins in Azure AD App DevelopmentJoonas Westlin
 
Microservices Journey NYC
Microservices Journey NYCMicroservices Journey NYC
Microservices Journey NYCChristian Posta
 
BSides Hawaii 2020: Dude, Wheres My Domain Admins
BSides Hawaii 2020: Dude, Wheres My Domain AdminsBSides Hawaii 2020: Dude, Wheres My Domain Admins
BSides Hawaii 2020: Dude, Wheres My Domain AdminsJoel M. Leo
 
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"..."Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"...PROIDEA
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCloudIDSummit
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCloudIDSummit
 
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)NAFCU Services Corporation
 
스타트업과 개발자를 위한 AWS 클라우드 태권 세미나
스타트업과 개발자를 위한 AWS 클라우드 태권 세미나스타트업과 개발자를 위한 AWS 클라우드 태권 세미나
스타트업과 개발자를 위한 AWS 클라우드 태권 세미나Amazon Web Services Korea
 
Composite Applications with SOA, BPEL and Java EE
Composite  Applications with SOA, BPEL and Java EEComposite  Applications with SOA, BPEL and Java EE
Composite Applications with SOA, BPEL and Java EEDmitri Shiryaev
 
IWMW 2000: Self Evident Applications for Universities
IWMW 2000: Self Evident Applications for UniversitiesIWMW 2000: Self Evident Applications for Universities
IWMW 2000: Self Evident Applications for UniversitiesIWMW
 
[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilitiesOWASP
 
From Monoliths to Services: Paying Your Technical Debt
From Monoliths to Services: Paying Your Technical DebtFrom Monoliths to Services: Paying Your Technical Debt
From Monoliths to Services: Paying Your Technical DebtTechWell
 
SocialNetGate Value Proposition
SocialNetGate Value PropositionSocialNetGate Value Proposition
SocialNetGate Value PropositionSocialNetGate
 

Similar to End to End Identity Management Guide (20)

JDD2015: Security in the era of modern applications and services - Bolesław D...
JDD2015: Security in the era of modern applications and services - Bolesław D...JDD2015: Security in the era of modern applications and services - Bolesław D...
JDD2015: Security in the era of modern applications and services - Bolesław D...
 
Authentication and Authorization in Asp.Net
Authentication and Authorization in Asp.NetAuthentication and Authorization in Asp.Net
Authentication and Authorization in Asp.Net
 
Bdd with Cucumber and Mocha
Bdd with Cucumber and MochaBdd with Cucumber and Mocha
Bdd with Cucumber and Mocha
 
A Microservice Journey
A Microservice JourneyA Microservice Journey
A Microservice Journey
 
7 Deadly Sins in Azure AD App Development
7 Deadly Sins in Azure AD App Development7 Deadly Sins in Azure AD App Development
7 Deadly Sins in Azure AD App Development
 
Microservices Journey NYC
Microservices Journey NYCMicroservices Journey NYC
Microservices Journey NYC
 
BSides Hawaii 2020: Dude, Wheres My Domain Admins
BSides Hawaii 2020: Dude, Wheres My Domain AdminsBSides Hawaii 2020: Dude, Wheres My Domain Admins
BSides Hawaii 2020: Dude, Wheres My Domain Admins
 
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"..."Inter- application vulnerabilities. hunting for bugs in secure applications"...
"Inter- application vulnerabilities. hunting for bugs in secure applications"...
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
 
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
Solving the Credit Union 'Tower of Babel' (Conference Session Slides)
 
스타트업과 개발자를 위한 AWS 클라우드 태권 세미나
스타트업과 개발자를 위한 AWS 클라우드 태권 세미나스타트업과 개발자를 위한 AWS 클라우드 태권 세미나
스타트업과 개발자를 위한 AWS 클라우드 태권 세미나
 
Composite Applications with SOA, BPEL and Java EE
Composite  Applications with SOA, BPEL and Java EEComposite  Applications with SOA, BPEL and Java EE
Composite Applications with SOA, BPEL and Java EE
 
Openid
OpenidOpenid
Openid
 
IWMW 2000: Self Evident Applications for Universities
IWMW 2000: Self Evident Applications for UniversitiesIWMW 2000: Self Evident Applications for Universities
IWMW 2000: Self Evident Applications for Universities
 
[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities
 
From Monoliths to Services: Paying Your Technical Debt
From Monoliths to Services: Paying Your Technical DebtFrom Monoliths to Services: Paying Your Technical Debt
From Monoliths to Services: Paying Your Technical Debt
 
Gateway to Agile: XP and BDD
Gateway to Agile: XP and BDD Gateway to Agile: XP and BDD
Gateway to Agile: XP and BDD
 
SocialNetGate Value Proposition
SocialNetGate Value PropositionSocialNetGate Value Proposition
SocialNetGate Value Proposition
 
IAM
IAMIAM
IAM
 

More from WSO2

Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
How to Create a Service in Choreo
How to Create a Service in ChoreoHow to Create a Service in Choreo
How to Create a Service in ChoreoWSO2
 
Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023WSO2
 
Platform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on AzurePlatform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on AzureWSO2
 
GartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdfGartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdfWSO2
 
[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in Minutes[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in MinutesWSO2
 
Modernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityModernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityWSO2
 
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...WSO2
 
CIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdfCIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdfWSO2
 
Delivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing ChoreoDelivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing ChoreoWSO2
 
Fueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected ProductsFueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected ProductsWSO2
 
A Reference Methodology for Agile Digital Businesses
 A Reference Methodology for Agile Digital Businesses A Reference Methodology for Agile Digital Businesses
A Reference Methodology for Agile Digital BusinessesWSO2
 
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)WSO2
 
Lessons from the pandemic - From a single use case to true transformation
 Lessons from the pandemic - From a single use case to true transformation Lessons from the pandemic - From a single use case to true transformation
Lessons from the pandemic - From a single use case to true transformationWSO2
 
Adding Liveliness to Banking Experiences
Adding Liveliness to Banking ExperiencesAdding Liveliness to Banking Experiences
Adding Liveliness to Banking ExperiencesWSO2
 
Building a Future-ready Bank
Building a Future-ready BankBuilding a Future-ready Bank
Building a Future-ready BankWSO2
 
WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021WSO2
 
[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIs[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIsWSO2
 
[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native Deployment[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native DeploymentWSO2
 
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”WSO2
 

More from WSO2 (20)

Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
How to Create a Service in Choreo
How to Create a Service in ChoreoHow to Create a Service in Choreo
How to Create a Service in Choreo
 
Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023Ballerina Tech Talk - May 2023
Ballerina Tech Talk - May 2023
 
Platform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on AzurePlatform Strategy to Deliver Digital Experiences on Azure
Platform Strategy to Deliver Digital Experiences on Azure
 
GartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdfGartnerITSymSessionSlides.pdf
GartnerITSymSessionSlides.pdf
 
[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in Minutes[Webinar] How to Create an API in Minutes
[Webinar] How to Create an API in Minutes
 
Modernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos IdentityModernizing the Student Journey with Ethos Identity
Modernizing the Student Journey with Ethos Identity
 
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
Choreo - Build unique digital experiences on WSO2's platform, secured by Etho...
 
CIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdfCIO Summit Berlin 2022.pptx.pdf
CIO Summit Berlin 2022.pptx.pdf
 
Delivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing ChoreoDelivering New Digital Experiences Fast - Introducing Choreo
Delivering New Digital Experiences Fast - Introducing Choreo
 
Fueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected ProductsFueling the Digital Experience Economy with Connected Products
Fueling the Digital Experience Economy with Connected Products
 
A Reference Methodology for Agile Digital Businesses
 A Reference Methodology for Agile Digital Businesses A Reference Methodology for Agile Digital Businesses
A Reference Methodology for Agile Digital Businesses
 
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
Workflows in WSO2 API Manager - WSO2 API Manager Community Call (12/15/2021)
 
Lessons from the pandemic - From a single use case to true transformation
 Lessons from the pandemic - From a single use case to true transformation Lessons from the pandemic - From a single use case to true transformation
Lessons from the pandemic - From a single use case to true transformation
 
Adding Liveliness to Banking Experiences
Adding Liveliness to Banking ExperiencesAdding Liveliness to Banking Experiences
Adding Liveliness to Banking Experiences
 
Building a Future-ready Bank
Building a Future-ready BankBuilding a Future-ready Bank
Building a Future-ready Bank
 
WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021WSO2 API Manager Community Call - November 2021
WSO2 API Manager Community Call - November 2021
 
[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIs[API World ] - Managing Asynchronous APIs
[API World ] - Managing Asynchronous APIs
 
[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native Deployment[API World 2021 ] - Understanding Cloud Native Deployment
[API World 2021 ] - Understanding Cloud Native Deployment
 
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
[API Word 2021] - Quantum Duality of “API as a Business and a Technology”
 

Recently uploaded

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

End to End Identity Management Guide

  • 1. End to End Identity Management Johann Dilantha Nallathamby Technical Lead WSO2
  • 2. Defining the Topic 1. Define Identity 2. Define end-to-end 3. Define Managing of Identities
  • 3. Defining Identity Simply, • Who am I? • What are my attributes? • What are my behaviours? • What are my relationships?
  • 4. Defining End-to-End Life of a single Identity over time
  • 5. Defining End-to-End Resource access by Identities at a given snapshot of time
  • 7. Defining Management I am an Engineer, not a manager!! Let’s look at management in terms of challenges and solutions
  • 8. Defining Management I am an Engineer, not a manager!! Let’s look at management in terms of challenges and solutions Let’s look at the story of Bob
  • 9. Beginnings of Bob’s journey ... • Bob is a senior engineer • Bob is working for a startup called “X” • Bob is responsible for the Identity Management of his staff. • His company has a handful of employees • They have only a very few applications • Bob’s life was going good :)
  • 10. Few years down the line ... • Bob’s company was doing very well • They are now having a large number of employees after rapidly expanding • They are planning to recruit even more • They now have several internal and cloud applications • Identity Management is becoming a headache for Bob!!
  • 11. User accounts in all the systems Robert (An employee) Cloud email Service Username = “robert” Password = “robert-pass” Expense Management System HR System Username = “robert2” Password = “robert2-pass” Username = “robert2” Password = “robert2-pass” Username = “robert_5” Password = “K67robert2-AB-#2”
  • 12. Bob thinks why not a centralized user directory?
  • 13. Bob has an idea in mind Robert Mail ClientUsername = “robert” Password = “robert-pass” HR System Expense Management System Username = “robert2” Password = “robert2-pass” Username = “robert” Password = “robert-pass” Username = “robert” Password = “robert-pass” User store
  • 14. Bob has some difficult questions to find answers “How am I going to migrate all our users into this central directory? I am sure there will be few teams who are not going to take this very well.” “What type of user directory am I to propose for this centralized store? Engineering uses a JDBC database to store its users; IT uses an LDAP; which one should we go for in our centralized solution?”
  • 15. “More importantly, does a user directory solve all the problem that I have now and may get in the future? I know that user directories can store identity attributes securely. But can they manage aspects such as uniqueness, temporality, ownership, trustworthiness of those attributes?” “Can they store/track user behaviors” “Can they manage identity relationships?”
  • 16. “But the biggest of them all is that my user experience is still pretty bad. My users will have to enter the same set of credentials to get logged into each application they are going to use.”
  • 19. Brokered Authentication Identity Broker (e.g. WSO2 IS) Service provider (e.g. HR System) Robert Username = “robert” Password = “robert-pass” Token Token User store Standard authentication request
  • 20. Single Sign On Robert Mail ClientUsername = “robert” Password = “robert-pass” HR System Expense Management System Username = “robert2” Password = “robert2-pass” Username = “robert” Password = “robert-pass” Username = “robert” Password = “robert-pass” Identity Broker (e.g. WSO2 IS)
  • 22. Bob realizes that what he wants is an Identity Provider that provides, • Identity Integration • Brokered Authentication • Single Sign On • Decoupling of Authentication Method from SSO Protocol Bob sets up an Identity Provider ...
  • 23. OpenID Connect Complete Protocol Suite Support
  • 24. “My authorization rules are all over my applications, and I am having a hard time managing them because, • They have been written into the applications’ code • They are constantly changing” Bob faces another problem ...
  • 25. How can I ... • Effectively govern my resources • Globally enforce access control policies on those resources • Make any policy updates immediately effective • Get a consolidated set of audit trails on who is accessing those resources with all other contextual details
  • 26. Defining Resource Access • Subject – User – Group • Object – Protected Resource • Verb – Action that can be performed on a protected resource • Context – Environmental attributes such as time, Client IPs, etc. Understanding Bob’s problem
  • 27. Understanding Bob’s problem Resources bring permissions to our Identity ecosystem Permission = {Resource + Action}
  • 28. There are only two kinds of authorization problems in the world ... Is Alice allowed to update accounts? What resources is Alice allowed to update?
  • 29. Bob searches for some existing authorization models • Access Matrix / Access Control Table / Access Control List • Role Based Access Control (RBAC) • Group Based Access Control • Attribute Based Access Control (ABAC) • Ownership and sharing based Access Control • Multilevel Access Control
  • 30. All of them seem to have some limitation • The number of rules grow and become hard to manage • Not fine grained enough. • Hard to manage with a constantly changing environment.
  • 31. Bob: “If only my authorization logic was centralized, externalized, policy based, fine-grain and easy to manage...”
  • 32. eXtensible Access Control Markup Language (XACML) /data/files /data/archives /data/visualize /data/details Policy decision Point If user = jane Permit. If role = clark and Action = write Deny. Policy Store Policy Administration Point Policy Enforcement Point(PEP) User = Tao User = David User = Jane
  • 33. Trivia: Authentication, authorization, and auditing are collectively known as the gold standards of security. All three words start with the prefix 'Au'; which is the periodic symbol for Gold. Authentication, Authorization and Auditing are done
  • 34. Bob: “Still I am provisioning all new accounts manually to our Identity Broker as well as each and every cloud application that we use. Although they support federated authentication with our Identity Broker still they need a mapped account in the cloud. If only I can automate that..”
  • 35. Outbound Provisioning Identity server Extern Inc. <<< Create User >>> Username: jane Email: jane@extern.com Cloud email service <<< Create User >>> Username: jane Password: jane123 Email: jane@extern.com <<< Create User >>> Username: jane <<< Create User >>> Username: jane@extern.com Contacts Directory Expense Management System
  • 36. Bob: “I would also like to be able to decentralize control and empower my users to govern their identities but with set of governance policies to control it.”
  • 38. Workflows Identity server Update roles Approve role assignment Approve role assignment Assigned to “supervisors” role Assigned to “James”
  • 41. • User onboarding • Account Disabling • Account Locking • Brute Force Prevention • Idle Account Locking • Password Complexity policies • Password History • Password Expiry • Admin Initiated Password Reset • Account Linking Identity Governance and Administration (IGA)
  • 46. • Login Attempts – By user – By role – By identity store – By service provider – By identity provider • Alerts – Suspicious login – Abnormally long sessions • Sessions – Top longest durations – Average session duration per user – Session count Analytics
  • 47. Alright Yeah!! Bob’s got a top notch Identity Management system running in place that manages all his employee accounts efficiently. Bob has been promoted as an Identity Architect in the company!!
  • 48. The board has decided to acquire company “Y” across the globe. The CTO tells Bob that those new employees will need to have access to their applications and wants him to see how best they can manage access from those other employees to the existing applications. After some time ...
  • 49. • “Y” has its own Identity and Access Management system just like “X”. • The system is connected to their corporate user directory. • The security architect over there will not expose the corporate directory directly outside the firewall for “X” to consume. • Bob doesn’t want to be going and changing all their applications to support this new Identity Provider. Things are not looking good for Bob ...
  • 50. Problem: • Users will use applications across enterprise borders and cloud Solution: • Multiple trust domains with multiple Identity Providers • Federated authentication based on the trust relationship Identity Federation
  • 51. Bob goes into the meeting with Y’s security architect thinking that this is a done deal. In the meeting he gets to know that their Identity Provider doesn’t support “OpenID Connect”. It only supports “SAML2 SSO”. Bob: “All our applications here work with OpenID Connect. What kind of Identity Provider doesn’t support OpenID Connect. Also I saw that they are using some custom claim URIs that is not part of OpenID Connect.” Bob has a meeting with Security Architect of “Y”
  • 52. Federation Silos Problem: • Multiple Identity Federation protocols • E.g. OpenID Connect, SAML2, OpenID, CAS, etc.
  • 53. Identity Bus 1. Identity Hub 2. Identity Bridge 3. Claim Transformation 4. Role Transformation
  • 54. Bob: “How am I going to authorize these users? Our authorization is entirely centralized in our Identity Provider. Our applications talk with our Identity Provider for authorization. Y’s IAM couldn’t even do OpenID Connect. There is no way in the world it supports XACML. And before I forget we also need to provision accounts for these users in all our cloud applications.” But wait ...
  • 55. Just-In-Time (JIT) Provisioning Identity Broker Identity Broker Username: jane Password: jane123 Email: saman@wso2.com 1. Access request 2 .Auth request 3. Auth request 4. Auth response User Directory 5. Add user
  • 56. Outbound JIT Provisioning Identity Broker Identity Broker Username: jane Password: jane123 Email: saman@wso2.com 1. Access request 2 .Auth request 3. Auth request 4. Auth response 5. Add user
  • 58. “Phew!! That was close. I was saved by the Bus.” Hop on to the Enterprise Identity Bus
  • 60. Bob’s CTO calls him and tells him, “we have decided to expose our internal applications as services for our clients to consume. Find out how we can expose them securely” Bob was expecting this to come his way, with all the hype surrounding APIs. Some time goes by and ....
  • 61. Problem: Consumers need access to backend APIs on behalf of the logged in user. Solution: Delegated Access Control with OAuth2 First result on Google Search reveals OAuth2
  • 62. Bob’s CTO again calls him and tells him, “we have decided to consume one of our partner services through our API gateway. However it is a secured endpoint which expects some kind of an authorization token.” Time goes by again ...
  • 63. • Frequently, downstream services need to make data level entitlements and need to record an identity in the audit trail. • To do so, the service must know the identity of the end user. Trusted Subsystems
  • 64. • Trusted subsystem generated identity tokens When downstream services trust the trusted subsystem to assert the original caller's identity, without requiring additional evidence from other parties. These tokens are self-issued and self-contained. • Third party generated identity tokens When the downstream services trust the trusted subsystem to assert claims regarding the original caller in conjunction with third party evidence that satisfies an additional set of security requirements. They can be self-contained tokens. Trusted Subsystems - Identity Flows
  • 65. • User self-signed tokens When the trusted subsystem is authorized to perform a set of application functions and when there must be evidence from the original caller that the caller initiated the request. • Identity/Credential Mapping Special function of the trusted subsystem role, where the goal is to transform an identity to another related identity for the purpose of gaining access to downstream resources that only recognize the transformed identity. Trusted Subsystem - Identity Flows
  • 66. Bob decides to use JWT Grant Profile for OAuth2
  • 67. • Identity Provider • Centralized Authorization and Auditing • Outbound Provisioning • Self service and Account and Password Control Policies • Workflows • Analytics • Identity Federation • Just-In-Time Provisioning / Provisioning Bridge • Delegated Access Control • Trusted Subsystems Bob’s successful journey so far in the digital enterprise ...