in a Cooperative Scenario Marius Politze, Bernd Decker IT Center - - PowerPoint PPT Presentation

in a cooperative scenario
SMART_READER_LITE
LIVE PREVIEW

in a Cooperative Scenario Marius Politze, Bernd Decker IT Center - - PowerPoint PPT Presentation

Extending the OAuth2 Workflow to Audit Data Usage for Users and Service Providers in a Cooperative Scenario Marius Politze, Bernd Decker IT Center RWTH Aachen University Setting Support the core processes: Teaching, Learning and Research


slide-1
SLIDE 1

Extending the OAuth2 Workflow to Audit Data Usage for Users and Service Providers in a Cooperative Scenario

Marius Politze, Bernd Decker IT Center RWTH Aachen University

slide-2
SLIDE 2

Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker

  • 10. DFN Forum Kommunikationstechnologien, 31.05.2017

3

Setting Support the core processes: Teaching, Learning and Research

  • Connect legacy systems with a single, consistent API
  • Develop an SOA that fits to the processes at the university

 Start with eLearning  Generalize and try to apply to other fields:

  • Campus Management, Identity Management
  • Research Data Management / eScience
  • Security by design

 Confidentiality  Integrity  Availability

  • Protect personal and confidential data
slide-3
SLIDE 3

Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker

  • 10. DFN Forum Kommunikationstechnologien, 31.05.2017

4

System Landscape by Service Provider

RWTH Aachen REST API

Student Lifecycle

CMS (CAMPUS / CAMPUSOffice) EvaSys Workload Monitoring (StOEHn) CMS (SOS, POS)

E-Services

SharePoint Information Displays WLAN / Eduroam Support Chat Backup

E-Learning

LMS (L²P) LMS (Moodle) Dynexite Self Assessment Quiz2Go / Click it Now Audience Response Sysem

Student Life

University Sports Canteens Public Transport Student Jobs

University Library

Loan, Orders and Reservations Search

News

Facebook Blogs Homepages RSS

Identity Management

Shibboleth SelfService OAuth2

Service providers:

IT Center University Administration University Library eLearning Center Other (RWTH) Other (Extern)

slide-4
SLIDE 4

Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker

  • 10. DFN Forum Kommunikationstechnologien, 31.05.2017

5

App Landscape

  • Since 2014 as a service
  • 35 active apps

 10 by Institutes  25 by Students

  • 50.000 authorized app instances
  • 22.000 active users

RWTHApp 63% IT-ServiceDesk Support Chat 18% SyncMyL²P 9% Android Lab App5 WS14 4% Information Displays 2% LMS Import 2% Eduroam Account Manager 1% Other 1%

Authorized App-Instances in November 2016

slide-5
SLIDE 5

Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker

  • 10. DFN Forum Kommunikationstechnologien, 31.05.2017

6

Goals

  • Provide an authorization system for

 Distributed systems  Processes crossing system boundaries

  • Allow users to check how their data is used

 Real time and retrospective monitoring  Which systems are using data on my behalf?

  • Provide Data usage and Analytics for

 User-Centric Security  Distributed service providers  and (external) app developers

slide-6
SLIDE 6

Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker

  • 10. DFN Forum Kommunikationstechnologien, 31.05.2017

7

OAuth2 at Commercial Service Providers

  • Tightly coupled with their web services

 Authorization for local scopes  Used for applications

  • Applications using multiple services still

require multiple logins

 1:1 mapping of services providers and logins  Crossing system boundaries not supported

  • Authentication via authorization

 Use user info supplied by a service provider to identify the user  Leads to possible security vulnerabilities [1]

[1] R. Yang, W. C. Lau, and T. Liu, Signing into One Billion Mobile App Accounts Effortlessly with OAuth2.0, in Black Hat Europe, 2016.

slide-7
SLIDE 7

Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker

  • 10. DFN Forum Kommunikationstechnologien, 31.05.2017

8

OAuth2 at RWTH Aachen University

  • Secure, device based Authorizations

 (De)Authorizations via Webinterface  No credentials are passed to apps

  • OAuth2 as a service

 Integrates Shibboleth as authentication  Possibility to provide a federative service (DFN, …)

  • Established at RWTH

 RWTHApp has ~20.000 active users  Procedure scales across different applications

slide-8
SLIDE 8

Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker

  • 10. DFN Forum Kommunikationstechnologien, 31.05.2017

9

Endpoints in the Cooperative Workflow

  • Authorize
  • Code
  • Token
  • TokenInfo
  • Context

 Resolve (user) context of an authorization  4-Tuple: (Validity, Application, Identity, Service Provider)

Endpoints for web application and device workflow Endpoint for cooperative workflow

slide-9
SLIDE 9

Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker

  • 10. DFN Forum Kommunikationstechnologien, 31.05.2017

10

OAuth2 in the Cooperative Workflow

Data Warehouse

Validity Application Identity Service Provider

slide-10
SLIDE 10

Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker

  • 10. DFN Forum Kommunikationstechnologien, 31.05.2017

11

Auditing Data Usage in the Cooperative Workflow

  • Use information about resolved contexts for auditing

 Record existing 4-tuples  No information about actual data usage

  • Make collected data available to

 … service providers  … app developers  … users

  • Central collection of audit data

 OAuth2 system manages the audit data  Takes care of proper anonymization  … and data security

Number of users accessing service providers through RWTHApp

slide-11
SLIDE 11

Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker

  • 10. DFN Forum Kommunikationstechnologien, 31.05.2017

13

Extending Audit Logging

  • Extend logged data by

 Resource  Operation  Cost

  • Cannot be generated directly from OAuth2 Workflow

 Services need to provide data  Interpretation and granularity up to service providers

  • Keep auditing data central

 Enforce data and privacy regulations  Supply information to service providers, app developers and users

slide-12
SLIDE 12

Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker

  • 10. DFN Forum Kommunikationstechnologien, 31.05.2017

14

Detailed Statistics for Service Providers

1000 2000 3000 4000 5000 6000 7000 8000 9000 DownloadStructuredMaterial GetAnnouncements GetCourseRoom GetCourseRooms GetEMails GetStructuredMaterials GetWhatsNewSince RWTHApp Sync My L2P Android Lab App5 WS14 L2P NewsTicker Native L²P (i9 Mobile Learning Lab)

Users per Application and Resource

slide-13
SLIDE 13

Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker

  • 10. DFN Forum Kommunikationstechnologien, 31.05.2017

15

… App Developers

1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 Events JobOffers Library News Rooms eLearning

Users per Service Provider and Resource for RWTHApp

slide-14
SLIDE 14

Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker

  • 10. DFN Forum Kommunikationstechnologien, 31.05.2017

16

… and Users

2 4 6 8 10 12 14 16 eLearning Timetable Library UserInfo News Canteens Rooms JobOffers

Timeline of Calls per Service Provider for RWTHApp

slide-15
SLIDE 15

Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker

  • 10. DFN Forum Kommunikationstechnologien, 31.05.2017

17

Wrap Up

  • OAuth2 cooperative workflow

 Single OAuth2 instance manages authorizations  Reuse authorizations for all service providers  Allows processes to cross system boundaries

  • Simple centralized auditing

 User-centric: Security by Transparency  Allows enforcement of privacy and data protection laws

  • Extended audit logging

 Detailed reports for service providers, app developers and users  Additional information controlled by service providers

slide-16
SLIDE 16

Extending the OAuth Workflow to Audit Data Usage Marius Politze, Bernd Decker

  • 10. DFN Forum Kommunikationstechnologien, 31.05.2017

18

What’s Next?

  • Current Reports limited to monthly PDFs

 More interactive web based system  Prototype currently available to service providers  Allow explorative analysis and auditing

  • Extend the Reach

 Mostly used in eLearning services  Currently transferring to eScience services

  • Further extensions to OAuth2 Workflows

 Allow third party service providers  Federative model

  • Automated usage analysis?
slide-17
SLIDE 17

Thank you for your attention Vielen Dank für Ihre Aufmerksamkeit