SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Access Management for the
Internet of Things
Kanishk Mahajan
Principal Product Manager
Oracle Identity & Access Management
The following is intended to outline our general product direction.
It is intended for information purposes only, and may not be
incorporated into any contract.
It is not a commitment to deliver any material, code, or
functionality, and should not be relied upon in making purchasing
decisions. The development, release, and timing of any features
or functionality described for Oracle’s products remains at the
sole discretion of Oracle.

2

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Program Agenda
 Introducing Identity for the Internet Of Things
 Security Challenges for the Internet of Things
 Oracle Access Management 11gR2- Securing access for the

Internet of Things
 Customer Case Study
 Demo
 Q&A

3
Introducing Identity for the
Internet of Things

4
Internet Of Things
Internet of Things
• Refers to the general idea of
things, including everyday objects
that are:
• Readable/recognizable
• Locatable/Addressable
• Controllable
• Communicable

5
Identity for the Internet Of Things
Composite Identities
• Identity as a communication endpoint:
• User
• Service
• Device
• Software Module
• Sensor
• User identities are tied to Things based on:
• Interaction
• Context

6
Identity for the Internet of Things
Social Networks
• Connect, Communicate, Share
• Use public or private social
networks
• Link physical and virtual
Things, services, devices,
APIs
• Allow reacting to events

7
Identity for the Internet of Things
Securing the “Smart Toaster”
• Securing Autonomous
Independent Things
• Context Aware Authentication
• Securing Communication
• Person to Thing
Communication
• Thing to Thing
Communication

8
Security Challenges for the
Internet of Things

9
Security is a Barrier for Adoption of IoT
“The horizontal evolution of M2M will require
full end-to-end security. Significant efforts
need to be invested into M2M application
security in order for the M2M market to fully
evolve. Whether this is through open source
initiatives or standards development, the
demand for increased M2M application
security will have to be answered, and
sooner rather than later.”
ABI Research, M2M Dream Challenged by Alarming Security
Concerns, Feb 2013

40%
30%

Of embedded systems and
applications developers have
not proactively addressed
security in existing
development projects
Median CAGR growth (2011-2014)
in shipments of security
solutions for industrial
automation, medical devices,
consumer electronics,
automotive and retail

Source: VDC Research
Strategic Insights 2012: Embedded Software & Tools Market,
Security Development & Runtime Solutions

10
Challenges in IoT Security

Control

• What protection measures are possible as thousands of
intelligent things cooperate with other real and virtual entities in
random and unpredictable ways?
• How do you ensure security given IoT’s highly distributed
nature and use of fragile technologies, such as limited-function
embedded devices?
• How do you leverage investments in existing internet security
technologies for the highly fragmented IoT networks?
• How can you define and enable trust in a dynamic IoT network
with weak trust links between network nodes?

Access

• Typical challenges for IoT service
providers

11
Key IoT Security Requirements
Onboarding &
Enrollment
Authentication &
Authorization
Device Metadata &
Control
Policy & Key
Management
Application
Management &
Provisioning

• Mutual authentication between
devices and server
• Confidentiality of data transfer
over multi-protocol networks
• Device data management
• Governance of trust
relationships in IoT networks
• Device applications provisioning
& management

12
Oracle IoT Security Solution
Overview
Intranet

DMZ
Short Range Networks
(BT, Zigbee, Serial)
Non-IP protocol

Oracle Access Manager

REST/OAUTH

HTTP/SMTP/COAP/

App

Oracle Unified
Gateway

OAM Protected

With M&S and Adaptive Access

App

Resources

Device Enrollment
Device Operations

Oracle Identity
Governance

13
Oracle Access Management
Securing Access for the Internet
of Things

14

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Internet Of Things – Use Case
Vehicle Telematics and a Social
Network for Cars
 Private social network that connects

customers with their cars, their
dealership, and with the manufacturer
– Customers can choose to extend
their network to family, friends, and
others using public social networks
such as Twitter and Facebook
 Vehicle Telematics allows the cars to

communicate with customers, the
manufacturer and the dealership

15

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Access Management 11gR2 – Securing
Social Access
Step-up

 Turns social integration into an

administrator action
 Provides out-of-the-box support
for leading social providers
 Provides increased levels of
assurance as user progresses to
more secure services
 Simplifies registration and single
sign-on from multiple providers

16

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

authentication
Simplified

OAUTH

Registration

Tick-box
configuration

SIMPLE & SECURE

Federation
Securing Internet of Things using OAM 11gR2 Social
Securing a Social Network for Cars
OAUTH

SIMPLE & SECURE
Federation

17

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Oracle Mobile & Social Access Management
Deployment Architecture
Corporate DMZ

Corporate Network
Oracle Access Manager

OAM Agent

Directory Services

OES PDP
Mobile and Social
Oracle Adaptive Access
Manager

OES PDP

Oracle Enterprise
Gateway
Web Services Manager Service Bus

HTTP/REST/SOAP/OAuth
Clients
18

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Context Aware Authorization
and Data Redaction

18

SOAP/REST and
Legacy Web Services
Securing Internet of Things using OAM 11gR2 Mobile and Gateway
Securing Vehicle Telematics

HTTP / REST / SOAP / OAuth Clients

19

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

REST/SOAP
Oracle Application Gateway
Oracle Mobile & Social

Manufacturer
Internet Of Things – Use Case
Smart Home Appliances
 A Refrigerator actively manages its

energy consumption by securely
communicating with the electric utility
company
– automatically moves its defrost

cycle to a non-peak time based
on response from the utility
company

20

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Oracle Access Management – OAuth 2.0 Server
 OAuth Server
– Provides OAuth Authorization Server, Resource

Server and Client
– Supports 3-legged and 2-legged OAuth
– Shares same client framework as Mobile & Social
– Provides OAuth user profile service and custom
scope definition
21

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
2-legged OAuth
Service to Service
① The requesting service (OAuth Client)

preregisters with the OAuth Authorization
Server and receives client credentials
② The requesting service uses its client

credentials to connect to a resource server
③ The Resource server validates the clients

credentials and provides the requested
content

22

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Securing Internet of Things using OAM 11gr2 OAuth 2.0
Service
Securing Smart Home Appliances
Refrigerator
(OAuth Client)

Authorization
Server (OAM
11gR2)

Electric Utility
Company (Resource
Server)

0. Pre-register with the OAuth Az Server (OAM)
0. Client Credentials

1 Authenticate with Client
Credentials
2. Access Token
3. Access Token

 Client must request
token from OAM token
endpoint after
successful authn
 OAM must sign the
access token
 Resource Server
validates the token
against OAM

23

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Internet Of Things – Use Case
Mobile Access to Things
 Use a mobile device as a

remote control hub to monitor
and manage interconnected
devices and Things

24

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Example Login Flow – Native App with OAM
Client
App(Mobile)
1

Mobile and Social
Server(Server)

Security App
(Mobile)

Request Access
Token

2 - If valid token in local credential
store, return token to App, else
continue below.

-

4

Extracts device attributes and ID
contexts

-

Use token to
make calls to
server
application
protected by
OAM

Accept username/password

-

5

Present login page

-

Oracle
SDK

Makes authentication call with
user/password, device attributes
and device tokens

-

-

Registers Device/App if
unregistered

-

Authenticates with OAM Server

-

Publishes ID context to OAM Server
and OES for authorization decisions

-

Invokes OAAM for risk analysis

-

Responds User/Access Tokens

Stores User/Access Token

-

3 - Validates device tokens

Returns token to Client App

25
Oracle Access Management Client SDKs
Native Libraries for iOS, Android and JAVA
Store/Access Keys, Tokens, Handles
and other secure data
Access Mobile Device Information
(OS, Carrier, Geolocation, IP/MAC)

Quickly build security into your
mobile applications

Support KBA, OTP via Email and SMS

Manage Single Sign-on

Copyright © 2012, Oracle and/or its affiliates. All right

26
Mobile Authentication
Flexible Options for Devices, Applications and Users

Copyright © 2012, Oracle and/or its affiliates. All right

27
Securing Internet of Things using OAM 11gr2 Mobile Service
Securing Mobile Access to Things

Device Fingerprinting & Tracking
Device Registration
Lost & Stolen Devices
GPS/WIFI Location Awareness
Risk-based KBA & OTP
Transactional risk analysis

28

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Customer Case Study

Copyright © 2012, Oracle and/or its affiliates. All right

29
Demo

Copyright © 2012, Oracle and/or its affiliates. All right

30
Questions

Copyright © 2011, Oracle and/or its affiliates. All right

31
Other Identity Management Sessions
Thursday 09/26,
CON8836 11:00AM
Thursday 09/26,
CON 4342 12:30PM
Thursday 09/26,
CON9024 2:00PM

Thursday, 09/26

CON8902 2:00PM

Thursday, 09/26,
CON8826 3:30PM

Moscone
West, Room
2018
Moscone
West, Room
2018
Moscone
West, Room
2018
Marriot
Marquis –
Golden Gate
C3
Moscone
West, Room
2018

Copyright © 2011, Oracle and/or its affiliates. All right

Leveraging the Cloud to simplify your Guru Shashikumar,
Identity Management implementation Oracle

Identity Services in the New GM IT

GM

Next Generation Optimized Directory - Etienne Remillon,
Oracle Unified Directory
Oracle
Developing Secure Mobile
Applications

Mark Wilcox, Oracle

Zero Capital Investment by leveraging Mike
Neuenschwander,
Identity Management as a Service
Oracle
32
Oracle Fusion Middleware
Business Innovation Platform for the Enterprise and Cloud
 Complete and Integrated
Web

Social

Mobile

 Best-in-class

User Engagement
Business
Process
Management

 Open standards
Content
Management

Service Integration

Business
Intelligence

Data Integration

Identity Management
Development
Tools

Cloud Application
Foundation

 On-premise and Cloud
 Foundation for Oracle
Fusion Applications and
Oracle Cloud

Enterprise
Management

33
34
35

Weitere ähnliche Inhalte

Was ist angesagt?

Presentation- on OIM
Presentation- on OIMPresentation- on OIM
Presentation- on OIMTamim Khan
 
Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3Atul Goyal
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationDelivery Centric
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation Delivery Centric
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2OracleIDM
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Oracle
 
OIM Sizing Guide 11gR2PS1
OIM Sizing Guide 11gR2PS1OIM Sizing Guide 11gR2PS1
OIM Sizing Guide 11gR2PS1Atul Goyal
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalOracleIDM
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalOracleIDM
 
Self Service Access Control - Help Yourself to More Productivity
Self Service Access Control - Help Yourself to More ProductivitySelf Service Access Control - Help Yourself to More Productivity
Self Service Access Control - Help Yourself to More ProductivityAtul Goyal
 
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...oow123
 
Oracle Access Manager Overview
Oracle Access Manager OverviewOracle Access Manager Overview
Oracle Access Manager Overviewguestf6dc99b
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...OracleIDM
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overviewEslam Hafez
 
OIM Connector for Webservices
OIM Connector for WebservicesOIM Connector for Webservices
OIM Connector for WebservicesAtul Goyal
 

Was ist angesagt? (20)

Presentation- on OIM
Presentation- on OIMPresentation- on OIM
Presentation- on OIM
 
Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer Presentation
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation
 
Idm Workshop
Idm WorkshopIdm Workshop
Idm Workshop
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
 
Oracle Identity Manager Basics
Oracle Identity Manager BasicsOracle Identity Manager Basics
Oracle Identity Manager Basics
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
 
OIM Sizing Guide 11gR2PS1
OIM Sizing Guide 11gR2PS1OIM Sizing Guide 11gR2PS1
OIM Sizing Guide 11gR2PS1
 
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminarOverview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
 
Oim Poc1.0
Oim Poc1.0Oim Poc1.0
Oim Poc1.0
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Self Service Access Control - Help Yourself to More Productivity
Self Service Access Control - Help Yourself to More ProductivitySelf Service Access Control - Help Yourself to More Productivity
Self Service Access Control - Help Yourself to More Productivity
 
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
 
Oracle Access Manager Overview
Oracle Access Manager OverviewOracle Access Manager Overview
Oracle Access Manager Overview
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overview
 
OIM Connector for Webservices
OIM Connector for WebservicesOIM Connector for Webservices
OIM Connector for Webservices
 

Andere mochten auch

Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentationstefanjung
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTAllSeen Alliance
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
Eneco - Mirjam van Gils - Smart Consumer Summit 2016
Eneco - Mirjam van Gils - Smart Consumer Summit 2016Eneco - Mirjam van Gils - Smart Consumer Summit 2016
Eneco - Mirjam van Gils - Smart Consumer Summit 2016Multiscope
 
WSO2Con EU 2015: Implementing an Open API for Smart Thermostats with WSO2′s A...
WSO2Con EU 2015: Implementing an Open API for Smart Thermostats with WSO2′s A...WSO2Con EU 2015: Implementing an Open API for Smart Thermostats with WSO2′s A...
WSO2Con EU 2015: Implementing an Open API for Smart Thermostats with WSO2′s A...WSO2
 
Big Data Expo 2015 - Anchormen Enter the Lambda-architecture
Big Data Expo 2015 - Anchormen Enter the Lambda-architectureBig Data Expo 2015 - Anchormen Enter the Lambda-architecture
Big Data Expo 2015 - Anchormen Enter the Lambda-architectureBigDataExpo
 
Mie2017 dag1 ronde3_perspective_ziggo_v1.5_kc
Mie2017 dag1 ronde3_perspective_ziggo_v1.5_kcMie2017 dag1 ronde3_perspective_ziggo_v1.5_kc
Mie2017 dag1 ronde3_perspective_ziggo_v1.5_kcPerspective
 
Mie2017 dag2 ronde4_perspective_toon-eneco_v1.0_kc2
Mie2017 dag2 ronde4_perspective_toon-eneco_v1.0_kc2Mie2017 dag2 ronde4_perspective_toon-eneco_v1.0_kc2
Mie2017 dag2 ronde4_perspective_toon-eneco_v1.0_kc2Perspective
 
Joe saves energy with Quby
Joe saves energy with QubyJoe saves energy with Quby
Joe saves energy with QubyVisual Friday
 
Quby michiel fokke
Quby michiel fokkeQuby michiel fokke
Quby michiel fokkeBigDataExpo
 
Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...Andrejs Prokopjevs
 

Andere mochten auch (13)

Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoT
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Eneco - Mirjam van Gils - Smart Consumer Summit 2016
Eneco - Mirjam van Gils - Smart Consumer Summit 2016Eneco - Mirjam van Gils - Smart Consumer Summit 2016
Eneco - Mirjam van Gils - Smart Consumer Summit 2016
 
WSO2Con EU 2015: Implementing an Open API for Smart Thermostats with WSO2′s A...
WSO2Con EU 2015: Implementing an Open API for Smart Thermostats with WSO2′s A...WSO2Con EU 2015: Implementing an Open API for Smart Thermostats with WSO2′s A...
WSO2Con EU 2015: Implementing an Open API for Smart Thermostats with WSO2′s A...
 
271
271271
271
 
Big Data Expo 2015 - Anchormen Enter the Lambda-architecture
Big Data Expo 2015 - Anchormen Enter the Lambda-architectureBig Data Expo 2015 - Anchormen Enter the Lambda-architecture
Big Data Expo 2015 - Anchormen Enter the Lambda-architecture
 
Mie2017 dag1 ronde3_perspective_ziggo_v1.5_kc
Mie2017 dag1 ronde3_perspective_ziggo_v1.5_kcMie2017 dag1 ronde3_perspective_ziggo_v1.5_kc
Mie2017 dag1 ronde3_perspective_ziggo_v1.5_kc
 
Eneco
EnecoEneco
Eneco
 
Mie2017 dag2 ronde4_perspective_toon-eneco_v1.0_kc2
Mie2017 dag2 ronde4_perspective_toon-eneco_v1.0_kc2Mie2017 dag2 ronde4_perspective_toon-eneco_v1.0_kc2
Mie2017 dag2 ronde4_perspective_toon-eneco_v1.0_kc2
 
Joe saves energy with Quby
Joe saves energy with QubyJoe saves energy with Quby
Joe saves energy with Quby
 
Quby michiel fokke
Quby michiel fokkeQuby michiel fokke
Quby michiel fokke
 
Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...
 

Ähnlich wie Access Management for IoT

Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudIndus Khaitan
 
B4 the identity of things-securing the internet of everything
B4   the identity of things-securing the internet of everythingB4   the identity of things-securing the internet of everything
B4 the identity of things-securing the internet of everythingDr. Wilfred Lin (Ph.D.)
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Javaterrencebarr
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...OracleIDM
 
OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)GregOracle
 
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...GregOracle
 
Connecting devices to the internet of things
Connecting devices to the internet of thingsConnecting devices to the internet of things
Connecting devices to the internet of thingsBernard Kufluk
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities DeckPete Wassell
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation Delivery Centric
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Session 1908 connecting devices to the IBM IoT Cloud
Session 1908   connecting devices to the  IBM IoT CloudSession 1908   connecting devices to the  IBM IoT Cloud
Session 1908 connecting devices to the IBM IoT CloudPeterNiblett
 
Hi600 ch08_text_slides
Hi600  ch08_text_slidesHi600  ch08_text_slides
Hi600 ch08_text_slidesljmcneill33
 
EduID Mobile App - Use-Cases, Concepts and Implementation
EduID Mobile App - Use-Cases, Concepts and ImplementationEduID Mobile App - Use-Cases, Concepts and Implementation
EduID Mobile App - Use-Cases, Concepts and ImplementationChristian Glahn
 
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Indus Khaitan
 
Oracle Blockchain Platform
Oracle Blockchain PlatformOracle Blockchain Platform
Oracle Blockchain PlatformJuarez Junior
 

Ähnlich wie Access Management for IoT (20)

Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
B4 the identity of things-securing the internet of everything
B4   the identity of things-securing the internet of everythingB4   the identity of things-securing the internet of everything
B4 the identity of things-securing the internet of everything
 
Oracle mobile cloud service
Oracle mobile cloud serviceOracle mobile cloud service
Oracle mobile cloud service
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)
 
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
 
Connecting devices to the internet of things
Connecting devices to the internet of thingsConnecting devices to the internet of things
Connecting devices to the internet of things
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Session 1908 connecting devices to the IBM IoT Cloud
Session 1908   connecting devices to the  IBM IoT CloudSession 1908   connecting devices to the  IBM IoT Cloud
Session 1908 connecting devices to the IBM IoT Cloud
 
Hi600 ch08_text_slides
Hi600  ch08_text_slidesHi600  ch08_text_slides
Hi600 ch08_text_slides
 
EduID Mobile App - Use-Cases, Concepts and Implementation
EduID Mobile App - Use-Cases, Concepts and ImplementationEduID Mobile App - Use-Cases, Concepts and Implementation
EduID Mobile App - Use-Cases, Concepts and Implementation
 
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
 
Oracle Blockchain Platform
Oracle Blockchain PlatformOracle Blockchain Platform
Oracle Blockchain Platform
 
Voip automation framework
Voip automation frameworkVoip automation framework
Voip automation framework
 

Mehr von OracleIDM

Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users finalOracleIDM
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalOracleIDM
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...OracleIDM
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2OracleIDM
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy finalOracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pubOracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidatedOracleIDM
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1OracleIDM
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12OracleIDM
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…OracleIDM
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2OracleIDM
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4OracleIDM
 
Csooow12 amit-jasuja-securing-new-experience6
Csooow12 amit-jasuja-securing-new-experience6Csooow12 amit-jasuja-securing-new-experience6
Csooow12 amit-jasuja-securing-new-experience6OracleIDM
 

Mehr von OracleIDM (18)

Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidated
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 
Csooow12 amit-jasuja-securing-new-experience6
Csooow12 amit-jasuja-securing-new-experience6Csooow12 amit-jasuja-securing-new-experience6
Csooow12 amit-jasuja-securing-new-experience6
 

Kürzlich hochgeladen

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Kürzlich hochgeladen (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

Access Management for IoT

  • 1. Access Management for the Internet of Things Kanishk Mahajan Principal Product Manager Oracle Identity & Access Management
  • 2. The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 2 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 3. Program Agenda  Introducing Identity for the Internet Of Things  Security Challenges for the Internet of Things  Oracle Access Management 11gR2- Securing access for the Internet of Things  Customer Case Study  Demo  Q&A 3
  • 4. Introducing Identity for the Internet of Things 4
  • 5. Internet Of Things Internet of Things • Refers to the general idea of things, including everyday objects that are: • Readable/recognizable • Locatable/Addressable • Controllable • Communicable 5
  • 6. Identity for the Internet Of Things Composite Identities • Identity as a communication endpoint: • User • Service • Device • Software Module • Sensor • User identities are tied to Things based on: • Interaction • Context 6
  • 7. Identity for the Internet of Things Social Networks • Connect, Communicate, Share • Use public or private social networks • Link physical and virtual Things, services, devices, APIs • Allow reacting to events 7
  • 8. Identity for the Internet of Things Securing the “Smart Toaster” • Securing Autonomous Independent Things • Context Aware Authentication • Securing Communication • Person to Thing Communication • Thing to Thing Communication 8
  • 9. Security Challenges for the Internet of Things 9
  • 10. Security is a Barrier for Adoption of IoT “The horizontal evolution of M2M will require full end-to-end security. Significant efforts need to be invested into M2M application security in order for the M2M market to fully evolve. Whether this is through open source initiatives or standards development, the demand for increased M2M application security will have to be answered, and sooner rather than later.” ABI Research, M2M Dream Challenged by Alarming Security Concerns, Feb 2013 40% 30% Of embedded systems and applications developers have not proactively addressed security in existing development projects Median CAGR growth (2011-2014) in shipments of security solutions for industrial automation, medical devices, consumer electronics, automotive and retail Source: VDC Research Strategic Insights 2012: Embedded Software & Tools Market, Security Development & Runtime Solutions 10
  • 11. Challenges in IoT Security Control • What protection measures are possible as thousands of intelligent things cooperate with other real and virtual entities in random and unpredictable ways? • How do you ensure security given IoT’s highly distributed nature and use of fragile technologies, such as limited-function embedded devices? • How do you leverage investments in existing internet security technologies for the highly fragmented IoT networks? • How can you define and enable trust in a dynamic IoT network with weak trust links between network nodes? Access • Typical challenges for IoT service providers 11
  • 12. Key IoT Security Requirements Onboarding & Enrollment Authentication & Authorization Device Metadata & Control Policy & Key Management Application Management & Provisioning • Mutual authentication between devices and server • Confidentiality of data transfer over multi-protocol networks • Device data management • Governance of trust relationships in IoT networks • Device applications provisioning & management 12
  • 13. Oracle IoT Security Solution Overview Intranet DMZ Short Range Networks (BT, Zigbee, Serial) Non-IP protocol Oracle Access Manager REST/OAUTH HTTP/SMTP/COAP/ App Oracle Unified Gateway OAM Protected With M&S and Adaptive Access App Resources Device Enrollment Device Operations Oracle Identity Governance 13
  • 14. Oracle Access Management Securing Access for the Internet of Things 14 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 15. Internet Of Things – Use Case Vehicle Telematics and a Social Network for Cars  Private social network that connects customers with their cars, their dealership, and with the manufacturer – Customers can choose to extend their network to family, friends, and others using public social networks such as Twitter and Facebook  Vehicle Telematics allows the cars to communicate with customers, the manufacturer and the dealership 15 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 16. Access Management 11gR2 – Securing Social Access Step-up  Turns social integration into an administrator action  Provides out-of-the-box support for leading social providers  Provides increased levels of assurance as user progresses to more secure services  Simplifies registration and single sign-on from multiple providers 16 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. authentication Simplified OAUTH Registration Tick-box configuration SIMPLE & SECURE Federation
  • 17. Securing Internet of Things using OAM 11gR2 Social Securing a Social Network for Cars OAUTH SIMPLE & SECURE Federation 17 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 18. Oracle Mobile & Social Access Management Deployment Architecture Corporate DMZ Corporate Network Oracle Access Manager OAM Agent Directory Services OES PDP Mobile and Social Oracle Adaptive Access Manager OES PDP Oracle Enterprise Gateway Web Services Manager Service Bus HTTP/REST/SOAP/OAuth Clients 18 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Context Aware Authorization and Data Redaction 18 SOAP/REST and Legacy Web Services
  • 19. Securing Internet of Things using OAM 11gR2 Mobile and Gateway Securing Vehicle Telematics HTTP / REST / SOAP / OAuth Clients 19 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. REST/SOAP Oracle Application Gateway Oracle Mobile & Social Manufacturer
  • 20. Internet Of Things – Use Case Smart Home Appliances  A Refrigerator actively manages its energy consumption by securely communicating with the electric utility company – automatically moves its defrost cycle to a non-peak time based on response from the utility company 20 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 21. Oracle Access Management – OAuth 2.0 Server  OAuth Server – Provides OAuth Authorization Server, Resource Server and Client – Supports 3-legged and 2-legged OAuth – Shares same client framework as Mobile & Social – Provides OAuth user profile service and custom scope definition 21 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 22. 2-legged OAuth Service to Service ① The requesting service (OAuth Client) preregisters with the OAuth Authorization Server and receives client credentials ② The requesting service uses its client credentials to connect to a resource server ③ The Resource server validates the clients credentials and provides the requested content 22 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 23. Securing Internet of Things using OAM 11gr2 OAuth 2.0 Service Securing Smart Home Appliances Refrigerator (OAuth Client) Authorization Server (OAM 11gR2) Electric Utility Company (Resource Server) 0. Pre-register with the OAuth Az Server (OAM) 0. Client Credentials 1 Authenticate with Client Credentials 2. Access Token 3. Access Token  Client must request token from OAM token endpoint after successful authn  OAM must sign the access token  Resource Server validates the token against OAM 23 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 24. Internet Of Things – Use Case Mobile Access to Things  Use a mobile device as a remote control hub to monitor and manage interconnected devices and Things 24 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 25. Example Login Flow – Native App with OAM Client App(Mobile) 1 Mobile and Social Server(Server) Security App (Mobile) Request Access Token 2 - If valid token in local credential store, return token to App, else continue below. - 4 Extracts device attributes and ID contexts - Use token to make calls to server application protected by OAM Accept username/password - 5 Present login page - Oracle SDK Makes authentication call with user/password, device attributes and device tokens - - Registers Device/App if unregistered - Authenticates with OAM Server - Publishes ID context to OAM Server and OES for authorization decisions - Invokes OAAM for risk analysis - Responds User/Access Tokens Stores User/Access Token - 3 - Validates device tokens Returns token to Client App 25
  • 26. Oracle Access Management Client SDKs Native Libraries for iOS, Android and JAVA Store/Access Keys, Tokens, Handles and other secure data Access Mobile Device Information (OS, Carrier, Geolocation, IP/MAC) Quickly build security into your mobile applications Support KBA, OTP via Email and SMS Manage Single Sign-on Copyright © 2012, Oracle and/or its affiliates. All right 26
  • 27. Mobile Authentication Flexible Options for Devices, Applications and Users Copyright © 2012, Oracle and/or its affiliates. All right 27
  • 28. Securing Internet of Things using OAM 11gr2 Mobile Service Securing Mobile Access to Things Device Fingerprinting & Tracking Device Registration Lost & Stolen Devices GPS/WIFI Location Awareness Risk-based KBA & OTP Transactional risk analysis 28 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 29. Customer Case Study Copyright © 2012, Oracle and/or its affiliates. All right 29
  • 30. Demo Copyright © 2012, Oracle and/or its affiliates. All right 30
  • 31. Questions Copyright © 2011, Oracle and/or its affiliates. All right 31
  • 32. Other Identity Management Sessions Thursday 09/26, CON8836 11:00AM Thursday 09/26, CON 4342 12:30PM Thursday 09/26, CON9024 2:00PM Thursday, 09/26 CON8902 2:00PM Thursday, 09/26, CON8826 3:30PM Moscone West, Room 2018 Moscone West, Room 2018 Moscone West, Room 2018 Marriot Marquis – Golden Gate C3 Moscone West, Room 2018 Copyright © 2011, Oracle and/or its affiliates. All right Leveraging the Cloud to simplify your Guru Shashikumar, Identity Management implementation Oracle Identity Services in the New GM IT GM Next Generation Optimized Directory - Etienne Remillon, Oracle Unified Directory Oracle Developing Secure Mobile Applications Mark Wilcox, Oracle Zero Capital Investment by leveraging Mike Neuenschwander, Identity Management as a Service Oracle 32
  • 33. Oracle Fusion Middleware Business Innovation Platform for the Enterprise and Cloud  Complete and Integrated Web Social Mobile  Best-in-class User Engagement Business Process Management  Open standards Content Management Service Integration Business Intelligence Data Integration Identity Management Development Tools Cloud Application Foundation  On-premise and Cloud  Foundation for Oracle Fusion Applications and Oracle Cloud Enterprise Management 33
  • 34. 34
  • 35. 35

Hinweis der Redaktion

  1. The concept of the Internet of Things includes network-enabling virtually any type of product or machinery so that data about the object can be captured and communicated. In effect, these networked Things become "smart objects" that can become part of the Internet and active participants in business processes. The Internet of Things describes a world where humans are surrounded by machines that communicate with each other and with them. People need an understanding of this multi-device environment and the network needs a representation of “who” the user is.The Internet of Things defines a virtual identity as the endpoint of communication - independent of the device - allowing users to interact with several devices, seamlessly, under one name. The user may have several virtual identities to represent the different personas and aspects of their service usage.
  2. Identities may represent entities of all kinds including persons, devices and software. The internet of Things defines two types of identities: - an Identinet where identities are at the end point of all communications. These identities may represent entities of all kinds including persons, devices and software. - a digital shadow –also called a virtual identity or a composite identity – represents the digital shadow of entities in the digital world. The digital shadow designates the concept of entities using services, nodes, equipment and infrastructure in a specific context which allows users to attach their identity to a Thing- a service, node or infrastructure based on their interaction with that Thing. By attaching a user identity to a Thing based on the user’s usage of the Thing – users attach multiple entry points into the physical Internet without losing a consistent view on that dataUsers have Many/Many relationships with Things. For e.g. Many cars in the family: All family members drive all cars but each has specific privileges with their own individual cars. Other common scenarios include rental car scenarios or where service equipment is shared by several field employees.
  3. In a social network- individuals only connect with thosethey know ANDwith those who are interested in following their activity—without the expectation of reciprocationIn the above description:1) is relevant to the Internet of Things as people not only share relations with friends, but they also have relations toThings - to favoritebooks, movies, gadget, items, products, food, devices, automobiles…2) is very relevant to the Internet of Things as it allows building a technical publish/subscribe type of network where various sensorsand actuators post their state. For e.g. Twitter is a commonly used online social network that allows plugins (publishers/subscribers) topost events from selectedsensors to Twitter and listen for Tweets themselves from devices they are interested in.--the washingmachine twittering when it has done its job, the stereo telling the worldabout the music you are listening to, or the mobile phone announcing the callsyou have made recently.
  4. Most Things on the Internet are : Autonomous Independent Things i.e. 1. don’t require another device (such as a smartphone or web service) to function2. able to sense contextand are able to autonomously interact with other things, sensors, and services.The graphic depicts a WiFi enabled toaster that makes light fun of this. However, consider the “Smart” refrigerator:Stage 1: Non autonomous i.e. provides value to users using interaction with other devices such as smartphones : The refrigerator owner scans cartons of milk with his smartphone, which triggers a reminder when the milk expireStage 2: Partially autonomous: The refrigerator detects the milk on its own and issues reminders across a broader range of connected appsStage3: Autonomous Independent: The refrigerator orders replacement milk just before it’s empty or expires — entirely on its own.
  5. OAM provides an easy framework for applications to connect and integrate with social networks. OAM Social also provides out of the box integration with trust for social logins (use for initial authn, step up for anything else). Built-in integration with Federation provides linking local to social accounts and new capabilities such as Oauth server support provides the ability to build private social networks while allowing for the capability to leverage public OAuth servers such as FaceBook or Twitter and OpenID authentication via Google.
  6. Oracle Adaptive Access ManagerDevice Fingerprinting and Registration DatabaseRisk-Based Authentication that Factors Mobile ContextOracle ApplicationGatewayEnables Mobile Application REST API’s and protects API’s, webservices, and SOA infrastructure from external threats and invalid / suspicious requestsExtends Access Management with authentication, authorization, audit to REST API’s, web servicesOracle Entitlement ServerMake AuthorizationDecisions and Redact Data based on User,Mobile, or any other ContextExternalize AuthorizationPolicies from Application CodeOracle Access Management : Mobile & SocialMobile Identity and Access GatewayAuthentication, Registration, and User Profile Services for MobileOracle Web Services ManagerLast mile security for an organizations backend web services and SOA infrastructure Embedded agentsNative Mobile Security SDKNative Login Screens / Secure Credential StorageEasy Integration w/ SSO and Web Services SecurityNative Mobile Security AppsLogin App for Native and Web Apps Providing Device ContextNative White Pages App Integrated w/ User Profile Services
  7. Consider using OAM,OAM M&S and OAG to validate and secure JWT tokens during various REST invocations for service to service interactions between the apps on the vehicle, dealer, vendor and the user. Several of these services are invoked from native mobile apps on the vehicle or the dealer or the user. The tokens are validated with policies configured on Oracle M&S that include device registration and device fingerprinting.
  8. Uses the Oauth 2.0 client credentials grant flow—the client is also the resource ownerThe client credentials grant uses client credentials as an authorization grant. This grant makes sense when the client is also the resource owner.The following sequence diagram shows the successful process.
  9. Username and PasswordSocial LogonStep up Auth and OTP, can be applied:-first time with this device (device registration)-sensitive application-high risk score-user with high level of access to application
  10. Mobile Application Access SecurityIntegrates native mobile apps, mobile web with corporate systems & informationAccess management, authorizations, API security, and fraud detectionDevice context based fine grained authorizationSupport for iOS Mobile Device Security ElementsDevice security – jailbreak detection at loginDevice lifecycle – white-list/blacklist/lost device managementDevice fingerprinting
  11. With Fusion Middleware, you can extend and maximize your existing technology investment with the same technologies used in Fusion Applications, including embedded analytics and social collaboration, and mobile and cloud computing. Oracle’s complete SOA platform lets your IT organization rapidly design, assemble, deploy, and manage adaptable business applications and—with Oracle’s business process management tools—even bring the task of modeling business processes directly to the business analysts. Oracle Business Intelligence foundation brings together all your enterprise data sources in a single, easy-to-use solution, delivering consistent insights whether it’s through ad hoc queries and analysis, interactive dashboards, scorecards, OLAP, or reporting. And, your existing enterprise applications can leverage the rich social networking capabilities and content sharing that users have come to expect in consumer software. Oracle Fusion Middleware is based on 100 percent open standards, so you aren’t locked into one deployment model when your business requirements change.