+ All Categories
Home > Technology > Identity & access management jonas syrstad

Identity & access management jonas syrstad

Date post: 22-May-2015
Category:
Upload: meandmine2
View: 493 times
Download: 0 times
Share this document with a friend
Popular Tags:
12
Identity & access management THE KEY TO THE FLEXIBLE WORKSPACE Jonas Syrstad, [email protected]
Transcript
Page 1: Identity & access management jonas syrstad

Identity & access management THE KEY TO THE FLEXIBLE WORKSPACE

Jonas Syrstad, [email protected]

Page 2: Identity & access management jonas syrstad

Disclaimer

Avoiding any specific implementation

No deep dive into the protocols

Focus on Enterprises

Page 3: Identity & access management jonas syrstad

Key elements; the 4 A’s

Administration

Authentication

Authorization

Auditing

Page 4: Identity & access management jonas syrstad

Administration

Identity synchronization Data flow

Ownership

Premission management Access

Rights

Page 5: Identity & access management jonas syrstad

Challenges

Ownership of data elements

Processes

Data flow

Page 6: Identity & access management jonas syrstad

Authentication

Trusted 3rd party

Claims based identity

Open standards WS-*

SAML

Page 7: Identity & access management jonas syrstad

Claims based identity

A Claim is a statement that is true or false

A Security token consists of one or many claims

Examples of claim types Name

Email

Gender

Group membership

Role

Page 8: Identity & access management jonas syrstad

Claims based identity architecture

Security tokens issued by a trusted 3rd party

Consumed by a relying party

Penetrates trust and technology boundaries

Page 9: Identity & access management jonas syrstad

Claims based identity architecture

Client(Browser,

mobile app, application)

Claims Provider(STS like ADFS)

Relying party(ASP.NET,

WCF service ++)

Trust relationship

1. Request access

2. Demand Security token

3. Request Security token

4. Provide security token

5. Submit security token

Page 10: Identity & access management jonas syrstad

Technologies

WS-*

SAML 2.0

OAuth

OpenId

Enterprise

Consumer

Hybrid

Page 11: Identity & access management jonas syrstad

Authorization

Determine what the user is allowed to do

An application responsibility

Device classification What

Where

When

Page 12: Identity & access management jonas syrstad

Auditing

Which applications does the users have access to?

How do we track a user across systems and modules Single view of user activity

Automated actions on breaches of protocol


Recommended