SlideShare a Scribd company logo
1 of 38
Download to read offline
Deploying an Identity Provider in a Complex,
Federated and Siloed World
PING Conference - July 2013
1
• Challenges you will face:
• How to accommodate new requirements
• Problems you can encounter and why
• Authentication
• Authorization
• Approach to solving these challenges:
• A federated identity service
• Identity Hub storage
• Aggregation
• Mapping
• Correlation
• Join
• Caching
• Leveraging the federated identity service for not just cloud apps, but also
legacy apps as well.
Talking Points
2
The Challenges
3
SAML
Authentication and Federation:
The Cloud and Web Apps Imperative
OpenID
Connect
OAuth 2.0
4
The Current Security Conundrum
Security Means:
SAML, OAuth,
OpenID
Identity
Infrastructure
A complete
federation
solution requires
federating both
access and
identities
5
The Directory
Original Model for Security
• Any security system based on identity is composed of two parts:
• A registry of identity information
• The security means (which is supported by the identity information)
Kerberos, SASL, SSL
6
Current Infrastructure:
Multiple Doors and Locks
AD Sun
RACF
LDAPHR
Role DB
7
The Challenge of a Fragmented Distributed Identity
System
Existing Identity Infrastructure
Legacy Applications
SaaS/Cloud/BYOD/
Partner Apps
8
The Challenges
• For many initiatives, such as federation and portal security, you need:
1. One global reference identity source for authenticating users.
2. And to support authorization, you want that one identity source to contain the
richest profile possible for each identity.
• But you cannot afford to just create another green field directory because:
1. It would be a huge effort to populate it
2. The information already exists in other silos
• You need one central access point, but don’t want to start over from
scratch.
9
Identity Provider Challenges
10
Authentication Challenges – The Details
Goal: Enable Authentication and SSO Across Multiple Sources
1. The first step is identification, or finding the user entry that
needs to be authenticated. But
• Identities are spread across multiple data sources, such as multiple
AD domains/forests.
• Identities are described differently in each source, such as “uid” vs.
“sAMAccountName” vs. “LOGIN.”
2. The second step is credential checking. Each source supports
its own authentication mechanism:
• Different encryption of passwords and schema elements (such as
userPassword vs. unicodePwd, etc).
• Existing internal (employee) user IDs & passwords in Active
Directory.
• External user credentials may be stored elsewhere (SunOne,
Oracle, etc).
11
Goal: Attribute-Based or Groups-Based Authorization
1. Profile information exists in multiple data sources
2. Data sources have their own schema elements (object classes and
attributes)
• group/member (AD)
• groupOfUniqueNames/uniquemember (Sun)
3. Inflexible group definition
• Static (hard-coded) group members
• Rely on client application logic to build members via an extra search
(based on memberURL attribute)
Authorization Challenges – The Details
12
User Identification Challenges
sameperson,differentidentifiers
differentpeoplesameidentifiers
13
Identification Challenges of SSO
LDAP Directory
Active Directory
employeeNumber=E562098000Z
samAccountName=Andrew_Fuller
objectClass=user
mail: andrew_fuller@radiant.com
departmentNumber=234
uid=AFuller
title=VP Sales
givenName=Andrew
sn=Fuller
departmentNumber=234
employeeID=562_09_8000
Name=Andrew_Fuller
ID: andrew_fuller@setree1.com
login=AFuller
ID=562_09_8000
Salesforce knows Andrew by an ID of
andrew_fuller@radiant.com
SharePoint knows Andrew
by an ID of AFuller
14
Attribute-Driven Authorization Challenges
LDAP DirectoryActive Directory HR Database
employeeNumber=2
samAccountName=Andrew_Fuller
objectClass=user
mail: andrew_fuller@setree1.com
departmentNumber=234
memberOf=cn=AllUsers,ou=Groups,dc=ad
uid=AFuller
title=VP Sales
givenName=Andrew
sn=Fuller
departmentNumber=234
cn=Regional Sales
objectclass=groupOfUniqueNames
unqiueMemeber=uid=afuller,ou=people,o=sun
EmployeeID=509-34-5855
ClearanceLevel=1
Region=PA
UserID=EMP_Andrew_Fuller
DeptID=Sales234
Is this the same person?
If so, what groups is he a member of?
If so, how can I get a global profile when there is no single common identifier?
15
Solving Challenges
16
A Federated Identity Service
Existing Identity Infrastructure
Legacy Applications
SaaS/Cloud/BYOD/
Partner Apps
17
Identity Integration
Accounting
Marketing Support
Business
Development
Call Center Fulfillment
Order Mgmt.
Sales
HR
18
Federated Identity Service
The High Level Components
The “Identity Hub” supported by
Identity and context virtualization
The “storage” is a directory (for
speed and scalability)
The “services” are metadata extraction,
view design, mapping, correlation, join,
synchronization (persistent cache with
auto-refresh)
19
Identity and Context Virtualization Process
20
Identity Integration (Aggregation and Correlation)
21
• Union requires some kind
of criteria, one or more
attributes, to detect and
correlate same-users
across systems. This is
the common, global
identifier.
• A match based on this
attributes(s) allows us to
remove duplicates.
• The result is a “union
compatible” operation,
where all users are
represented exactly once,
and only once, in the
virtualized global list.
emplogin firstname lastname
smatthews Sarah Matthews
lanalandry Lana Landry
employeeID givenName sn title
llandry Lana Landry Writer
smatthews Steve Matthews Janitor
LOGIN firstname lastname role group homephone
llandry Lana Landry Tech Writer Marketing 4152096800
smatthews Sarah Matthews CEO Admin 4152096802
firstname lastname
Sarah Matthews
Lana Landry
Steve Matthews
System A
System B
System C
Global List (Union)
Identity Correlation Example
- Creating a UNION Set
22
Identity Views Delivered in Format and Content
Expected by Applications
23
Solving Authentication Challenges
How does a Federated Identity Service help solve authentication challenges?
Step Challenge Can be solved by
Identification Identities spread across
multiple sources
Integrating users from multiple
sources
Identities described
differently in each source
Object and Attribute Mapping to
provide a common schema
Credential
Checking
Different encryption of
passwords and schema
elements
Providing a single form of
authentication to application,
and the flexibility to delegate
the credential checking to the
backend or customize some
other validation mechanism
24
Solving Authorization Challenges
Type Challenge Can be solved by
Attribute-
Based
Profile attributes spread
across multiple sources
Integrating users from multiple
sources, in order to build a
global profile
Groups-Based Existing groups and
potential group members
spread across multiple
data silos
Offering Flexible Group
Definitions:
- Aggregate/map existing
groups
- Build new group
definitions with dynamic
members
How does a Federated Identity Service help solve authorization challenges?
25
Example: Identity Correlation and Profile Creation
LDAP Directory
Active Directory
HR Database
employeeNumber=2
samAcountName=Andrew_Fuller
objectClass=user
mail: andrew_fuller@setree1.com
uid=AFuller
title=VP Sales
ClearanceLevel=1
Region=PA
CorrelatedIdentityView
employeeNumber=2
samAccountName=Andrew_Fuller
objectClass=user
mail: andrew_fuller@setree1.com
departmentNumber=234
uid=AFuller
title=VP Sales
givenName=Andrew
sn=Fuller
departmentNumber=234
EmployeeID=509-34-5855
ClearanceLevel=1
Region=PA
UserID=EMP_Andrew_Fuller
DeptID=Sales234
26
Example: Dynamic Group Creation and Profile
Extension
cn=Sales
objectClass=group
member=Andrew_Fuller
**Based on identities that have:
• ClearanceLevel=1
• title=VP Sales
• Region=PA
CorrelatedIdentityViewDynamicGroupsView
ComputedAttribute(memberOf)
basedonalookupinthe
dynamicgroupsview
employeeNumber=2
samAcountName=Andrew_Fuller
objectClass=user
mail: andrew_fuller@setree1.com
uid=AFuller
title=VP Sales
ClearanceLevel=1
Region=PA
memberOf=cn=Sales
27
Example: Dynamic Group Creation
28
Persistent (disk-based) Cache
Sources
View Definitions
P. CACHE
Materialized
View
Sources
View Definitions
Run Time View
No Cache
Addressing Performance Challenges
Sources
View Definitions
Memory Cache
Memory Cache
29
Introduction to Common Use Cases
30
Support for Authentication and as an Attribute
Server
31
Use Case: PAM Authentication
Credentials Checking Delegated to Backend
UNIX/LINUX Clients
Authentication Request
Re-use existing users
and credentials!
AD Domain 1 AD Domain 2 Sun
Credentials Checking forwarded to
authoritative source
32
Use Case: PAM Authentication
Storing PAM Specific Attribute Extension in VDS
sAMAccountName=jsmith
sn=Smith
givenName=John
title=operations manager
uidNumber = 100
gidNumber = 108
gecos = Andrew Fuller
loginshell = /bin/zsh
homedirectory = /home/afuller
shadowLastChange = 10877
…
sAMAccountName=jsmith
sn=Smith
givenName=John
title=operations manager
Base Profile
Extended Attributes
These extended attributes
can be stored in any source:
“local” or some other backend
Join of all attributes and
presented as a single entry
UNIX/LINUX Clients
AD Domain 1
33
Use Case: Oracle Names Resolution
Oracle Clients
Oracle DB Servers
VDS local LDAP stores oracle context data
Schema extended at VDS
Each client configured to point to VDS to lookup DB
34
Use Case: Global Address List for Email Clients
LDAP Directory
Active Directory
HR Database
employeeNumber=9
samAcountName=Alice_Lee
objectClass=user
mail: alee@mycompanycom
cn=Alice Lee
title=VP Sales
ClearanceLevel=1
Region=PA
departmentNumber=234
telephoneNumber=415-520-2203
Correlated Identity View
employeeNumber=9
samAccountName=Alice_Lee
objectClass=user
mail: alee@mycompany.com
departmentNumber=234
uid=Alee
title=VP Sales
givenName=Alice
sn=Lee
telephoneNumber=415-520-2203
EmployeeID=509-34-5855
ClearanceLevel=1
Region=PA
UserID=EMP_Alice_Lee
DeptID=Sales234
35
Compliance
LDAP Directory
Active Directory
HR Database
employeeNumber=9
samAcountName=Alice_Lee
objectClass=user
mail: alee@mycompanycom
cn=Alice Lee
title=Guru Inside Sales Manager
ClearanceLevel=1
Region=PA
departmentNumber=234
telephoneNumber=415-520-2203
source=HR Database
source=LDAP Directory
source= Active Directory
Correlated Identity View
employeeNumber=9
samAccountName=Alice_Lee
objectClass=user
mail: alee@mycompany.com
departmentNumber=234
uid=Alee
title=Guru Inside Sales Manager
givenName=Alice
sn=Lee
telephoneNumber=415-520-2203
EmployeeID=509-34-5855
ClearanceLevel=1
Region=PA
UserID=EMP_Alice_Lee
DeptID=Sales234
Reports
Which Data Sources Does Alice Have Active Accounts In?
36
Use Case: FID and Provisioning
Legacy Applications
(and respective stores)
AD Sun LDAP
Cloud Apps
LDAP/
SQL/
SPML
FID
as reference image
SPML
SCIM
37
• Summary
• In order to accommodate new requirements you will face challenges around
authentication and authorization.
• Multiple existing different identity silos means
• Many methods for credentials checking
• Many locations housing different aspects (attributes/groups) of an identity
• These challenges can be solved with a Federated Identity Service based on
virtualization.
• You can leverage the federated identity service for not just cloud apps, but also
legacy apps and other initiatives as well.
• Coming Up: A Foundation for the Future
• Michel Prompt shows you how the Federated Identity Service you put in place
today is a key piece of infrastructure that prepares you for the future.
Summary
39

More Related Content

What's hot

Open am and_radiantone
Open am and_radiantoneOpen am and_radiantone
Open am and_radiantoneJose R
 
SPSTCDC - Managed Metadata and Taxonomies in SharePoint 2010 - Playing Tag
SPSTCDC - Managed Metadata and Taxonomies in SharePoint 2010 - Playing TagSPSTCDC - Managed Metadata and Taxonomies in SharePoint 2010 - Playing Tag
SPSTCDC - Managed Metadata and Taxonomies in SharePoint 2010 - Playing TagKnowledge Management Associates, LLC
 
SharePoint 2010 Managed Metadata Service
SharePoint 2010 Managed Metadata ServiceSharePoint 2010 Managed Metadata Service
SharePoint 2010 Managed Metadata ServiceCraig Pilkenton
 
SPSCT15 - Must Love Term Sets: The New and Improved Managed Metadata Service ...
SPSCT15 - Must Love Term Sets: The New and Improved Managed Metadata Service ...SPSCT15 - Must Love Term Sets: The New and Improved Managed Metadata Service ...
SPSCT15 - Must Love Term Sets: The New and Improved Managed Metadata Service ...Jonathan Ralton
 
Easy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 UsmanEasy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 UsmanUsman Zafar Malik
 
Leveraging SharePoint for Extranets
Leveraging SharePoint for ExtranetsLeveraging SharePoint for Extranets
Leveraging SharePoint for ExtranetsAvtex
 
End-to-End Identity Management
End-to-End Identity ManagementEnd-to-End Identity Management
End-to-End Identity ManagementWSO2
 
WSO2Con USA 2017: Identity and Access Management in the Era of Digital Transf...
WSO2Con USA 2017: Identity and Access Management in the Era of Digital Transf...WSO2Con USA 2017: Identity and Access Management in the Era of Digital Transf...
WSO2Con USA 2017: Identity and Access Management in the Era of Digital Transf...WSO2
 
Identity Management
Identity ManagementIdentity Management
Identity Managementrver21
 
CANARIE - What Do I Need to Connect with eduroam and Shibboleth
CANARIE - What Do I Need to Connect with eduroam and ShibbolethCANARIE - What Do I Need to Connect with eduroam and Shibboleth
CANARIE - What Do I Need to Connect with eduroam and ShibbolethChris Phillips
 
Building business applications using business connectivity services using sha...
Building business applications using business connectivity services using sha...Building business applications using business connectivity services using sha...
Building business applications using business connectivity services using sha...Chakkaradeep Chandran
 
SPSBOS15 - Must Love Term Sets: The New and Improved Managed Metadata Service...
SPSBOS15 - Must Love Term Sets: The New and Improved Managed Metadata Service...SPSBOS15 - Must Love Term Sets: The New and Improved Managed Metadata Service...
SPSBOS15 - Must Love Term Sets: The New and Improved Managed Metadata Service...Jonathan Ralton
 
PROACTEYE IDENTITY MANAGEMENT
PROACTEYE IDENTITY MANAGEMENTPROACTEYE IDENTITY MANAGEMENT
PROACTEYE IDENTITY MANAGEMENThardik soni
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Managementrver21
 
Campus Consortium EdTalks Featuring Clemson University
Campus Consortium EdTalks Featuring Clemson UniversityCampus Consortium EdTalks Featuring Clemson University
Campus Consortium EdTalks Featuring Clemson UniversityCampus Consortium
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Managementrver21
 
Adfs Shib Interop Um Oxford
Adfs Shib Interop Um OxfordAdfs Shib Interop Um Oxford
Adfs Shib Interop Um Oxfordguestd9aa5
 

What's hot (19)

Open am and_radiantone
Open am and_radiantoneOpen am and_radiantone
Open am and_radiantone
 
SPSTCDC - Managed Metadata and Taxonomies in SharePoint 2010 - Playing Tag
SPSTCDC - Managed Metadata and Taxonomies in SharePoint 2010 - Playing TagSPSTCDC - Managed Metadata and Taxonomies in SharePoint 2010 - Playing Tag
SPSTCDC - Managed Metadata and Taxonomies in SharePoint 2010 - Playing Tag
 
SharePoint 2010 Managed Metadata Service
SharePoint 2010 Managed Metadata ServiceSharePoint 2010 Managed Metadata Service
SharePoint 2010 Managed Metadata Service
 
SPSCT15 - Must Love Term Sets: The New and Improved Managed Metadata Service ...
SPSCT15 - Must Love Term Sets: The New and Improved Managed Metadata Service ...SPSCT15 - Must Love Term Sets: The New and Improved Managed Metadata Service ...
SPSCT15 - Must Love Term Sets: The New and Improved Managed Metadata Service ...
 
Playing Tag: Managed Metadata and Taxonomies in SharePoint 2010
Playing Tag: Managed Metadata and Taxonomies in SharePoint 2010Playing Tag: Managed Metadata and Taxonomies in SharePoint 2010
Playing Tag: Managed Metadata and Taxonomies in SharePoint 2010
 
Easy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 UsmanEasy Learning Presentation Moss 2007 Usman
Easy Learning Presentation Moss 2007 Usman
 
Leveraging SharePoint for Extranets
Leveraging SharePoint for ExtranetsLeveraging SharePoint for Extranets
Leveraging SharePoint for Extranets
 
End-to-End Identity Management
End-to-End Identity ManagementEnd-to-End Identity Management
End-to-End Identity Management
 
WSO2Con USA 2017: Identity and Access Management in the Era of Digital Transf...
WSO2Con USA 2017: Identity and Access Management in the Era of Digital Transf...WSO2Con USA 2017: Identity and Access Management in the Era of Digital Transf...
WSO2Con USA 2017: Identity and Access Management in the Era of Digital Transf...
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 
CANARIE - What Do I Need to Connect with eduroam and Shibboleth
CANARIE - What Do I Need to Connect with eduroam and ShibbolethCANARIE - What Do I Need to Connect with eduroam and Shibboleth
CANARIE - What Do I Need to Connect with eduroam and Shibboleth
 
Building business applications using business connectivity services using sha...
Building business applications using business connectivity services using sha...Building business applications using business connectivity services using sha...
Building business applications using business connectivity services using sha...
 
Idm Workshop
Idm WorkshopIdm Workshop
Idm Workshop
 
SPSBOS15 - Must Love Term Sets: The New and Improved Managed Metadata Service...
SPSBOS15 - Must Love Term Sets: The New and Improved Managed Metadata Service...SPSBOS15 - Must Love Term Sets: The New and Improved Managed Metadata Service...
SPSBOS15 - Must Love Term Sets: The New and Improved Managed Metadata Service...
 
PROACTEYE IDENTITY MANAGEMENT
PROACTEYE IDENTITY MANAGEMENTPROACTEYE IDENTITY MANAGEMENT
PROACTEYE IDENTITY MANAGEMENT
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Management
 
Campus Consortium EdTalks Featuring Clemson University
Campus Consortium EdTalks Featuring Clemson UniversityCampus Consortium EdTalks Featuring Clemson University
Campus Consortium EdTalks Featuring Clemson University
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Management
 
Adfs Shib Interop Um Oxford
Adfs Shib Interop Um OxfordAdfs Shib Interop Um Oxford
Adfs Shib Interop Um Oxford
 

Similar to CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World

SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365Scott Hoag
 
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?Scott Hoag
 
SYDSP - Office 365 and Cloud Identity - What does it mean for me?
SYDSP  - Office 365 and Cloud Identity - What does it mean for me?SYDSP  - Office 365 and Cloud Identity - What does it mean for me?
SYDSP - Office 365 and Cloud Identity - What does it mean for me?Scott Hoag
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huangKen Huang
 
CIS14: Creating a Federated Identity Service for Better SSO
CIS14: Creating a Federated Identity Service for Better SSOCIS14: Creating a Federated Identity Service for Better SSO
CIS14: Creating a Federated Identity Service for Better SSOCloudIDSummit
 
Chapter_11_LDAP_and_Kerberos-converted.pptx
Chapter_11_LDAP_and_Kerberos-converted.pptxChapter_11_LDAP_and_Kerberos-converted.pptx
Chapter_11_LDAP_and_Kerberos-converted.pptxahmedsayed947221
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxmariona83
 
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365Scott Hoag
 
Material modulo02 asf6501(6425-b_01)
Material   modulo02 asf6501(6425-b_01)Material   modulo02 asf6501(6425-b_01)
Material modulo02 asf6501(6425-b_01)JSantanderQ
 
Building IAM for OpenStack
Building IAM for OpenStackBuilding IAM for OpenStack
Building IAM for OpenStackSteve Martinelli
 
IDM Resume _ Kiran
IDM Resume _ KiranIDM Resume _ Kiran
IDM Resume _ KiranKiran Kumar
 
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB201904_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019Kumton Suttiraksiri
 
IBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsIBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsSandeep Patil
 
Five Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityFive Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityMark Diodati
 
How AD has been re-engineered to extend to the cloud
How AD has been re-engineered to extend to the cloudHow AD has been re-engineered to extend to the cloud
How AD has been re-engineered to extend to the cloudLDAPCon
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications WebinarTodd Clayton
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADuberbaum
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsFredBrandonAuthorMCP
 

Similar to CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World (20)

SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
 
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
 
SYDSP - Office 365 and Cloud Identity - What does it mean for me?
SYDSP  - Office 365 and Cloud Identity - What does it mean for me?SYDSP  - Office 365 and Cloud Identity - What does it mean for me?
SYDSP - Office 365 and Cloud Identity - What does it mean for me?
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huang
 
CIS14: Creating a Federated Identity Service for Better SSO
CIS14: Creating a Federated Identity Service for Better SSOCIS14: Creating a Federated Identity Service for Better SSO
CIS14: Creating a Federated Identity Service for Better SSO
 
Chapter_11_LDAP_and_Kerberos-converted.pptx
Chapter_11_LDAP_and_Kerberos-converted.pptxChapter_11_LDAP_and_Kerberos-converted.pptx
Chapter_11_LDAP_and_Kerberos-converted.pptx
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
 
Material modulo02 asf6501(6425-b_01)
Material   modulo02 asf6501(6425-b_01)Material   modulo02 asf6501(6425-b_01)
Material modulo02 asf6501(6425-b_01)
 
Building IAM for OpenStack
Building IAM for OpenStackBuilding IAM for OpenStack
Building IAM for OpenStack
 
IDM Resume _ Kiran
IDM Resume _ KiranIDM Resume _ Kiran
IDM Resume _ Kiran
 
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB201904_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
04_Extending and Securing Enterprise Applications in Microsoft Azure_GAB2019
 
IBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsIBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for Protocols
 
Five Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityFive Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern Identity
 
IDM Introduction
IDM IntroductionIDM Introduction
IDM Introduction
 
How AD has been re-engineered to extend to the cloud
How AD has been re-engineered to extend to the cloudHow AD has been re-engineered to extend to the cloud
How AD has been re-engineered to extend to the cloud
 
Acc Updated Resume
Acc Updated ResumeAcc Updated Resume
Acc Updated Resume
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
 
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management SolutionsSC-900 Capabilities of Microsoft Identity and Access Management Solutions
SC-900 Capabilities of Microsoft Identity and Access Management Solutions
 

More from CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Recently uploaded

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Recently uploaded (20)

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World

  • 1. Deploying an Identity Provider in a Complex, Federated and Siloed World PING Conference - July 2013 1
  • 2. • Challenges you will face: • How to accommodate new requirements • Problems you can encounter and why • Authentication • Authorization • Approach to solving these challenges: • A federated identity service • Identity Hub storage • Aggregation • Mapping • Correlation • Join • Caching • Leveraging the federated identity service for not just cloud apps, but also legacy apps as well. Talking Points 2
  • 4. SAML Authentication and Federation: The Cloud and Web Apps Imperative OpenID Connect OAuth 2.0 4
  • 5. The Current Security Conundrum Security Means: SAML, OAuth, OpenID Identity Infrastructure A complete federation solution requires federating both access and identities 5
  • 6. The Directory Original Model for Security • Any security system based on identity is composed of two parts: • A registry of identity information • The security means (which is supported by the identity information) Kerberos, SASL, SSL 6
  • 7. Current Infrastructure: Multiple Doors and Locks AD Sun RACF LDAPHR Role DB 7
  • 8. The Challenge of a Fragmented Distributed Identity System Existing Identity Infrastructure Legacy Applications SaaS/Cloud/BYOD/ Partner Apps 8
  • 9. The Challenges • For many initiatives, such as federation and portal security, you need: 1. One global reference identity source for authenticating users. 2. And to support authorization, you want that one identity source to contain the richest profile possible for each identity. • But you cannot afford to just create another green field directory because: 1. It would be a huge effort to populate it 2. The information already exists in other silos • You need one central access point, but don’t want to start over from scratch. 9
  • 11. Authentication Challenges – The Details Goal: Enable Authentication and SSO Across Multiple Sources 1. The first step is identification, or finding the user entry that needs to be authenticated. But • Identities are spread across multiple data sources, such as multiple AD domains/forests. • Identities are described differently in each source, such as “uid” vs. “sAMAccountName” vs. “LOGIN.” 2. The second step is credential checking. Each source supports its own authentication mechanism: • Different encryption of passwords and schema elements (such as userPassword vs. unicodePwd, etc). • Existing internal (employee) user IDs & passwords in Active Directory. • External user credentials may be stored elsewhere (SunOne, Oracle, etc). 11
  • 12. Goal: Attribute-Based or Groups-Based Authorization 1. Profile information exists in multiple data sources 2. Data sources have their own schema elements (object classes and attributes) • group/member (AD) • groupOfUniqueNames/uniquemember (Sun) 3. Inflexible group definition • Static (hard-coded) group members • Rely on client application logic to build members via an extra search (based on memberURL attribute) Authorization Challenges – The Details 12
  • 14. Identification Challenges of SSO LDAP Directory Active Directory employeeNumber=E562098000Z samAccountName=Andrew_Fuller objectClass=user mail: andrew_fuller@radiant.com departmentNumber=234 uid=AFuller title=VP Sales givenName=Andrew sn=Fuller departmentNumber=234 employeeID=562_09_8000 Name=Andrew_Fuller ID: andrew_fuller@setree1.com login=AFuller ID=562_09_8000 Salesforce knows Andrew by an ID of andrew_fuller@radiant.com SharePoint knows Andrew by an ID of AFuller 14
  • 15. Attribute-Driven Authorization Challenges LDAP DirectoryActive Directory HR Database employeeNumber=2 samAccountName=Andrew_Fuller objectClass=user mail: andrew_fuller@setree1.com departmentNumber=234 memberOf=cn=AllUsers,ou=Groups,dc=ad uid=AFuller title=VP Sales givenName=Andrew sn=Fuller departmentNumber=234 cn=Regional Sales objectclass=groupOfUniqueNames unqiueMemeber=uid=afuller,ou=people,o=sun EmployeeID=509-34-5855 ClearanceLevel=1 Region=PA UserID=EMP_Andrew_Fuller DeptID=Sales234 Is this the same person? If so, what groups is he a member of? If so, how can I get a global profile when there is no single common identifier? 15
  • 17. A Federated Identity Service Existing Identity Infrastructure Legacy Applications SaaS/Cloud/BYOD/ Partner Apps 17
  • 19. Federated Identity Service The High Level Components The “Identity Hub” supported by Identity and context virtualization The “storage” is a directory (for speed and scalability) The “services” are metadata extraction, view design, mapping, correlation, join, synchronization (persistent cache with auto-refresh) 19
  • 20. Identity and Context Virtualization Process 20
  • 21. Identity Integration (Aggregation and Correlation) 21
  • 22. • Union requires some kind of criteria, one or more attributes, to detect and correlate same-users across systems. This is the common, global identifier. • A match based on this attributes(s) allows us to remove duplicates. • The result is a “union compatible” operation, where all users are represented exactly once, and only once, in the virtualized global list. emplogin firstname lastname smatthews Sarah Matthews lanalandry Lana Landry employeeID givenName sn title llandry Lana Landry Writer smatthews Steve Matthews Janitor LOGIN firstname lastname role group homephone llandry Lana Landry Tech Writer Marketing 4152096800 smatthews Sarah Matthews CEO Admin 4152096802 firstname lastname Sarah Matthews Lana Landry Steve Matthews System A System B System C Global List (Union) Identity Correlation Example - Creating a UNION Set 22
  • 23. Identity Views Delivered in Format and Content Expected by Applications 23
  • 24. Solving Authentication Challenges How does a Federated Identity Service help solve authentication challenges? Step Challenge Can be solved by Identification Identities spread across multiple sources Integrating users from multiple sources Identities described differently in each source Object and Attribute Mapping to provide a common schema Credential Checking Different encryption of passwords and schema elements Providing a single form of authentication to application, and the flexibility to delegate the credential checking to the backend or customize some other validation mechanism 24
  • 25. Solving Authorization Challenges Type Challenge Can be solved by Attribute- Based Profile attributes spread across multiple sources Integrating users from multiple sources, in order to build a global profile Groups-Based Existing groups and potential group members spread across multiple data silos Offering Flexible Group Definitions: - Aggregate/map existing groups - Build new group definitions with dynamic members How does a Federated Identity Service help solve authorization challenges? 25
  • 26. Example: Identity Correlation and Profile Creation LDAP Directory Active Directory HR Database employeeNumber=2 samAcountName=Andrew_Fuller objectClass=user mail: andrew_fuller@setree1.com uid=AFuller title=VP Sales ClearanceLevel=1 Region=PA CorrelatedIdentityView employeeNumber=2 samAccountName=Andrew_Fuller objectClass=user mail: andrew_fuller@setree1.com departmentNumber=234 uid=AFuller title=VP Sales givenName=Andrew sn=Fuller departmentNumber=234 EmployeeID=509-34-5855 ClearanceLevel=1 Region=PA UserID=EMP_Andrew_Fuller DeptID=Sales234 26
  • 27. Example: Dynamic Group Creation and Profile Extension cn=Sales objectClass=group member=Andrew_Fuller **Based on identities that have: • ClearanceLevel=1 • title=VP Sales • Region=PA CorrelatedIdentityViewDynamicGroupsView ComputedAttribute(memberOf) basedonalookupinthe dynamicgroupsview employeeNumber=2 samAcountName=Andrew_Fuller objectClass=user mail: andrew_fuller@setree1.com uid=AFuller title=VP Sales ClearanceLevel=1 Region=PA memberOf=cn=Sales 27
  • 28. Example: Dynamic Group Creation 28
  • 29. Persistent (disk-based) Cache Sources View Definitions P. CACHE Materialized View Sources View Definitions Run Time View No Cache Addressing Performance Challenges Sources View Definitions Memory Cache Memory Cache 29
  • 30. Introduction to Common Use Cases 30
  • 31. Support for Authentication and as an Attribute Server 31
  • 32. Use Case: PAM Authentication Credentials Checking Delegated to Backend UNIX/LINUX Clients Authentication Request Re-use existing users and credentials! AD Domain 1 AD Domain 2 Sun Credentials Checking forwarded to authoritative source 32
  • 33. Use Case: PAM Authentication Storing PAM Specific Attribute Extension in VDS sAMAccountName=jsmith sn=Smith givenName=John title=operations manager uidNumber = 100 gidNumber = 108 gecos = Andrew Fuller loginshell = /bin/zsh homedirectory = /home/afuller shadowLastChange = 10877 … sAMAccountName=jsmith sn=Smith givenName=John title=operations manager Base Profile Extended Attributes These extended attributes can be stored in any source: “local” or some other backend Join of all attributes and presented as a single entry UNIX/LINUX Clients AD Domain 1 33
  • 34. Use Case: Oracle Names Resolution Oracle Clients Oracle DB Servers VDS local LDAP stores oracle context data Schema extended at VDS Each client configured to point to VDS to lookup DB 34
  • 35. Use Case: Global Address List for Email Clients LDAP Directory Active Directory HR Database employeeNumber=9 samAcountName=Alice_Lee objectClass=user mail: alee@mycompanycom cn=Alice Lee title=VP Sales ClearanceLevel=1 Region=PA departmentNumber=234 telephoneNumber=415-520-2203 Correlated Identity View employeeNumber=9 samAccountName=Alice_Lee objectClass=user mail: alee@mycompany.com departmentNumber=234 uid=Alee title=VP Sales givenName=Alice sn=Lee telephoneNumber=415-520-2203 EmployeeID=509-34-5855 ClearanceLevel=1 Region=PA UserID=EMP_Alice_Lee DeptID=Sales234 35
  • 36. Compliance LDAP Directory Active Directory HR Database employeeNumber=9 samAcountName=Alice_Lee objectClass=user mail: alee@mycompanycom cn=Alice Lee title=Guru Inside Sales Manager ClearanceLevel=1 Region=PA departmentNumber=234 telephoneNumber=415-520-2203 source=HR Database source=LDAP Directory source= Active Directory Correlated Identity View employeeNumber=9 samAccountName=Alice_Lee objectClass=user mail: alee@mycompany.com departmentNumber=234 uid=Alee title=Guru Inside Sales Manager givenName=Alice sn=Lee telephoneNumber=415-520-2203 EmployeeID=509-34-5855 ClearanceLevel=1 Region=PA UserID=EMP_Alice_Lee DeptID=Sales234 Reports Which Data Sources Does Alice Have Active Accounts In? 36
  • 37. Use Case: FID and Provisioning Legacy Applications (and respective stores) AD Sun LDAP Cloud Apps LDAP/ SQL/ SPML FID as reference image SPML SCIM 37
  • 38. • Summary • In order to accommodate new requirements you will face challenges around authentication and authorization. • Multiple existing different identity silos means • Many methods for credentials checking • Many locations housing different aspects (attributes/groups) of an identity • These challenges can be solved with a Federated Identity Service based on virtualization. • You can leverage the federated identity service for not just cloud apps, but also legacy apps and other initiatives as well. • Coming Up: A Foundation for the Future • Michel Prompt shows you how the Federated Identity Service you put in place today is a key piece of infrastructure that prepares you for the future. Summary 39