building open source identity building open source
play

Building Open Source Identity Building Open Source Identity - PowerPoint PPT Presentation

Building Open Source Identity Building Open Source Identity Infrastructures Infrastructures Francesco Chicchiricc Francesco Chicchiricc ilgrosso@apache.org ilgrosso@apache.org https://about.me/ilgrosso https://about.me/ilgrosso The


  1. Building Open Source Identity Building Open Source Identity Infrastructures Infrastructures Francesco Chicchiriccò Francesco Chicchiriccò ilgrosso@apache.org ilgrosso@apache.org https://about.me/ilgrosso https://about.me/ilgrosso

  2. The Identity Management Need The Identity Management Need

  3. Identity Vs Account Source: https://saberhamidi.wordpress.com/2015/02/22/topic-2-should-we-have-more-than-one-online-identity/

  4. Identity Vs Account • Account • record containing data about a person • technical info needed by the information system for which the account is created and managed • (Digital) Identity • representation of a set of claims made by one digital subject about itself • ...it's you

  5. Why Identity Management? • Operational costs • Multiple sources of identity data • Manual user provisioning and password reset • Labor-intensive, paper-based approval • Compliance • No record of who has access to which IT resources • Diffjcult to deprovision access rights upon termination • No complete audit trail available • Hard to prevent unauthorized access

  6. Which identity?

  7. Identity Solutions Identity Solutions

  8. Identity T echnologies • Identity Stores • Storage of user information • Provisioning Engines • Synchronize account data across identity stores and a broad range of data formats, models, meanings and purposes • Access Managers • Security mechanisms that take place when a user is accessing a specifjc system or functionality

  9. Identity Store • Examples • LDAP / Active Directory • RDBMS • Meta and Virtual Directories • Accounts can be created and managed in one place only • Each application manages authentication separately • The user may use the same password for all the connected applications

  10. ...is it enough? • Heterogeneity of systems • Lack of a single source of information • HR for corporate id, Groupware for mail address, ... • Need for a local user database • Inconsistent policies • Lack of workfmow management • Hidden infra management cost, growing with organization

  11. Provisioning Engine • Keeping the identity stores as much synchronized as possible (and practical) • Need to be customizable and fmexible • Priority: non-intrusive • Focused on application back-end • Critical: data exchange with identity stores • Connectors • Agents

  12. Identity Lifecycle

  13. Access Manager • Mediator to all access to all applications • Focused on application front-end • Aspects • Authentication • Single SignOn • Authorization (OAuth, XACML, ...) • Federation (SAML, Liberty, ...) • Mainly applicable to web applications • Diffjcult integration with pre-existing apps

  14. Reference Identity Scenario

  15. Identity Infrastructures Identity Infrastructures

  16. Gather... • Number and type of identities • Number of roles / groups (and what are they used for) • External resources (all covered by standard connectors?) • Approval workfmow(s)? • Self-service? • Which applications to protect? • Which authentication mechanisms? • Which authorization types? ...essentially, shape the identity and access fmows

  17. ...design... • Schema for various identities (users, roles, groups, ...) • Identify mapping for all resources • Not too complex! • Watch roles size to avoid RBAC's role explosion • Don't be tempted to redesign the whole network • Provisioning needs to be fmexible • Reduce impact of access management on existing applications • Prioritize requirements

  18. ...build... • Carefully choose the building blocks • Can't simply buy COTS • On-premises • Proprietary • Open Source • As-a-service • Consider prototyping the designed solution (PoC)

  19. ...and start again • IAM is a continuous process, not a turn-key project • New applications to protect • New resources to integrate • Identity fmows evolution • IAM deliveries frequently fail • Mix of complex and unrelated technologies • Unexpected interactions • Mess with internal processes • Discover Policy Vs Reality

  20. The Open Source Identity Stack The Open Source Identity Stack

  21. Open Source IAM • Why? • Flexibility, adaptability and agility • Cost efgectiveness • Start small and grow • Solid information security • No vendor lock-in • Caveats • Integration with proprietary software (AD over all) • Enterprise support availability

  22. Available Components

  23. Selection Criteria • Open Standards • Design for integration • Well-established • Supported • Alive • ...Open Source!

  24. The Identity Ecosystem • Triggered by open companies in the Open Source IAM area • Common place for open source players, system integrators and service providers • Ensuring IAM open source components work well together • Easy access to enterprise support providers • Several options for each single component • More at http://www.identity-ecosystem.org/

  25. Real World Use Cases Real World Use Cases

  26. Disclaimer Disclaimer I am V.P . Apache Syncope and CEO of Tirasa, providing I am V.P . Apache Syncope and CEO of Tirasa, providing enterprise support and services for Apache Syncope, enterprise support and services for Apache Syncope, so… so… don't be surprised Syncope is everywhere :-) don't be surprised Syncope is everywhere :-)

  27. #1 Stadtwerke München • One of largest German municipal utilities • Mobile ticketing for public transportation and bike sharing • self-registration • login • password reset • user suspend / reactivate • > 250k registered users • > 80k authentications per day

  28. #2 Ospedali Riuniti Ancona • University hospital • Active synchronization from HR to Microsoft Active Directory • Centralized provisioning, authentication and authorization of medical record systems • Windows domain SSO • SAML 2.0 federation with regional network • ~ 5000 users

  29. #3 Stichting Bibliotheek.nl • Dutch foundation that aims to expand and manage the Digital National Library • The IAM infrastructure aims to hold all users of the national library in the Netherlands, fed by a continuous feed from the local libraries • All Dutch library members can authenticate and use digital services connected to the IAM infrastructure • > 8 million users

  30. #4 University of Milan • Very complex provisioning fmows involving • Microsoft Active Directory • OpenLDAP • 3 difgerent RDBMS • Oracle E-Mail Server • ~ 5k employees • > 60k students • ~ 800 roles

  31. Questions? All text and image content in this document is licensed under the Creative Commons Attribution-Share Alike 3.0 License (unless otherwise specified). Apache, Syncope, Apache Syncope, the Apache feather logo, the Apache Syncope project logo and the Apache Syncope logo are trademarks of The Apache Software Foundation. All other marks mentioned may be trademarks or registered trademarks of their respective owners.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend