in a cooperative scenario
play

in a Cooperative Scenario Marius Politze, Bernd Decker IT Center - PowerPoint PPT Presentation

Extending the OAuth2 Workflow to Audit Data Usage for Users and Service Providers in a Cooperative Scenario Marius Politze, Bernd Decker IT Center RWTH Aachen University Setting Support the core processes: Teaching, Learning and Research


  1. Extending the OAuth2 Workflow to Audit Data Usage for Users and Service Providers in a Cooperative Scenario Marius Politze, Bernd Decker IT Center RWTH Aachen University

  2. Setting Support the core processes: Teaching, Learning and Research • Connect legacy systems with a single, consistent API • Develop an SOA that fits to the processes at the university  Start with eLearning  Generalize and try to apply to other fields:  Campus Management, Identity Management  Research Data Management / eScience • Security by design  Confidentiality  Integrity  Availability • Protect personal and confidential data 3 Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker 10. DFN Forum Kommunikationstechnologien, 31.05.2017

  3. System Landscape by Service Provider Workload EvaSys CMS (CAMPUS / SharePoint Monitoring Information Support CAMPUSOffice) (StOEHn) Displays Chat SelfService CMS (SOS, Backup POS) Service providers: Shibboleth IT Center Student WLAN / Lifecycle Eduroam E-Services University Administration Identity OAuth2 University Audience Management Response Library Sysem eLearning Center RWTH Aachen LMS (L²P) REST API Other (RWTH) News Facebook Other (Extern) E-Learning LMS (Moodle) Homepages RSS Student Life University Dynexite Library Blogs Self Assessment Loan, Orders Student Quiz2Go / Search and University Jobs Click it Now Public Reservations Canteens Sports Transport 4 Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker 10. DFN Forum Kommunikationstechnologien, 31.05.2017

  4. App Landscape IT-ServiceDesk Support Chat 18% SyncMyL²P 9% • Since 2014 as a service Android Lab App5 WS14 • 35 active apps 4%  10 by Institutes  25 by Students Information Displays 2% • 50.000 authorized app instances RWTHApp 63% LMS Import 2% • 22.000 active users Eduroam Account Manager 1% Other 1% Authorized App-Instances in November 2016 5 Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker 10. DFN Forum Kommunikationstechnologien, 31.05.2017

  5. Goals • Provide an authorization system for  Distributed systems  Processes crossing system boundaries • Allow users to check how their data is used  Real time and retrospective monitoring  Which systems are using data on my behalf? • Provide Data usage and Analytics for  User-Centric Security  Distributed service providers  and (external) app developers 6 Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker 10. DFN Forum Kommunikationstechnologien, 31.05.2017

  6. OAuth2 at Commercial Service Providers • Tightly coupled with their web services  Authorization for local scopes  Used for applications • Applications using multiple services still require multiple logins  1:1 mapping of services providers and logins  Crossing system boundaries not supported • Authentication via authorization  Use user info supplied by a service provider to identify the user  Leads to possible security vulnerabilities [1] [1] R. Yang, W. C. Lau, and T. Liu, Signing into One Billion Mobile App Accounts Effortlessly with OAuth2.0, in Black Hat Europe, 2016. 7 Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker 10. DFN Forum Kommunikationstechnologien, 31.05.2017

  7. OAuth2 at RWTH Aachen University • Secure, device based Authorizations  (De)Authorizations via Webinterface  No credentials are passed to apps • OAuth2 as a service  Integrates Shibboleth as authentication  Possibility to provide a federative service (DFN, …) • Established at RWTH  RWTHApp has ~20.000 active users  Procedure scales across different applications 8 Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker 10. DFN Forum Kommunikationstechnologien, 31.05.2017

  8. Endpoints in the Cooperative Workflow • Authorize • Code Endpoints for web application and device workflow • Token • TokenInfo • Context Endpoint for cooperative workflow  Resolve (user) context of an authorization  4-Tuple: (Validity, Application, Identity, Service Provider) 9 Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker 10. DFN Forum Kommunikationstechnologien, 31.05.2017

  9. OAuth2 in the Cooperative Workflow Validity Application Identity Service Provider Data Warehouse 10 Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker 10. DFN Forum Kommunikationstechnologien, 31.05.2017

  10. Auditing Data Usage in the Cooperative Workflow • Use information about resolved contexts for auditing  Record existing 4-tuples  No information about actual data usage Number of users accessing service providers through RWTHApp • Make collected data available to  … service providers  … app developers  … users • Central collection of audit data  OAuth2 system manages the audit data  Takes care of proper anonymization  … and data security 11 Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker 10. DFN Forum Kommunikationstechnologien, 31.05.2017

  11. Extending Audit Logging • Extend logged data by  Resource  Operation  Cost • Cannot be generated directly from OAuth2 Workflow  Services need to provide data  Interpretation and granularity up to service providers • Keep auditing data central  Enforce data and privacy regulations  Supply information to service providers, app developers and users 13 Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker 10. DFN Forum Kommunikationstechnologien, 31.05.2017

  12. Detailed Statistics for Service Providers Users per Application and Resource GetWhatsNewSince GetStructuredMaterials GetEMails GetCourseRooms GetCourseRoom GetAnnouncements DownloadStructuredMaterial 0 1000 2000 3000 4000 5000 6000 7000 8000 9000 RWTHApp Sync My L2P Android Lab App5 WS14 L2P NewsTicker Native L²P (i9 Mobile Learning Lab) 14 Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker 10. DFN Forum Kommunikationstechnologien, 31.05.2017

  13. … App Developers Users per Service Provider and Resource for RWTHApp 10000 9000 8000 7000 6000 5000 4000 3000 2000 1000 0 Events JobOffers Library News Rooms eLearning 15 Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker 10. DFN Forum Kommunikationstechnologien, 31.05.2017

  14. … and Users Timeline of Calls per Service Provider for RWTHApp 16 14 12 10 8 6 4 2 0 eLearning Timetable Library UserInfo News Canteens Rooms JobOffers 16 Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker 10. DFN Forum Kommunikationstechnologien, 31.05.2017

  15. Wrap Up • OAuth2 cooperative workflow  Single OAuth2 instance manages authorizations  Reuse authorizations for all service providers  Allows processes to cross system boundaries • Simple centralized auditing  User-centric: Security by Transparency  Allows enforcement of privacy and data protection laws • Extended audit logging  Detailed reports for service providers, app developers and users  Additional information controlled by service providers 17 Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker 10. DFN Forum Kommunikationstechnologien, 31.05.2017

  16. What’s Next? • Current Reports limited to monthly PDFs  More interactive web based system  Prototype currently available to service providers  Allow explorative analysis and auditing • Extend the Reach  Mostly used in eLearning services  Currently transferring to eScience services • Further extensions to OAuth2 Workflows  Allow third party service providers  Federative model • Automated usage analysis? 18 Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker 10. DFN Forum Kommunikationstechnologien, 31.05.2017

  17. Thank you for your attention Vielen Dank für Ihre Aufmerksamkeit

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend