digital identity as a basis for internet security
play

Digital Identity as a Basis for Internet Security Infrastructure - PowerPoint PPT Presentation

Digital Identity as a Basis for Internet Security Infrastructure Ing. Radovan Semank Business Global Systems Agenda Introduction Unified User Management Public Key Infrastructure Digital Identity Conclusion Introduction


  1. Digital Identity as a Basis for Internet Security Infrastructure Ing. Radovan Semančík Business Global Systems

  2. Agenda  Introduction  Unified User Management  Public Key Infrastructure  Digital Identity  Conclusion

  3. Introduction  Traditional Internet Security Systems:  Passwords (ad-hoc)  Kerberos  Commercial: NIS, NIS+, LanMan, SecureID,...  Authentication/Single Sign-On only  Need to change  Cross-domain SSO  B2B interactions  Web Services

  4. Unified User Management “Directory” Server

  5. Unified User Management  Directories (LDAP), Meta-directories, User provisioning systems, ...  Good for isolated (enterprise) environment  Mostly LDAP-based solutions  LDAP does not maintain long-term user session  Limited support for dynamic attributes and services  Limited Internet-size scalability  Global directory (“X.500” model) infeasible

  6. Public Key Infrastructure  Based on public key cryptography  In common use on the Internet  X.509, SSL/TLS, IPsec (IKE), S/MIME  Naming problem  X.509 originally extension to X.500 – global directory service assumed  Privacy problem  What attributes to include in the certificate?  Complexity problem  User-side processing makes deployments difficult

  7. Digital Identity  On-line security server model  Based on Security Assertion Markup Language (SAML) – OASIS Standard  User profile manager: Identity Provider Authentication Identity Provider User Profile SAML Service Provider Access

  8. Digital Identity on the Internet  Global Internet environment  No global ID  No single provider  Privacy  Pseudonyms (user handles)  User profile split among different identity providers  Different trust levels

  9. Digital Identity on the Internet Organization Boundaries User Identity Profile Provider Auth. Service Provider Identity Provider Service User Provider Profile

  10. Conclusion  Traditional security systems no longer feasible  Unified User Management good in enterprise  Public Key Infrastructure as a support system  Digital Identity services  Simplified Sign-On  User profiles  Web applications security framework  Web Services security

  11. Questions?

  12. B u s i n e s s G l o b a l S y s t e m s , a . s . Thank you ... Ing. Radovan Semančík Business Global Systems, a.s. Pluhová 2 83248 Bratislava semancik@bgs.sk C o m p l e x n e t w o r k i n g s o l u t i o n s

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend