SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Identity Manager
in Software
Defined Net
Mohammad Faraji
Email: ms.faraji@utoronto.ca
SAVI Identity Manager Design
Requirements


    SAVI is a federation of autonomous systems:
        Testbeds
        Cloud Datacenters
        Information Providers (e.g. Identity providers)
    Researcher needs a fine-grained Access
     Control to have flexibility:
        Policy negotiation
        Attribute Assertion
SAVI Federation Architecture

                            SAVI Federation       SAVI Core
                               Oversight            node
                              Trust Anchor
       Domain                  (Keystone)
       Admin
User    User    User       Service Accounting
 1       2       3                               SAVI edge
                                (Beacon)
                                                   node
                               Repository


                                                Testbed

    Identity
   Providers
                                               Remote
                                               Datacenter
                                                   s
Authentication Interoperability Standard
Security Assertion Markup Language - SAML



                 Policy                 Policy          Policy


  Credentials     Authentication           Attribute    Policy Decision
   Collector        Authority              Authority         Point



                SAML
                  Authentication           Attribute     Authorization
                    Assertion              Assertion       Decision
                                                          Assertion




   System                 Application                  Policy Enforcement
    Entity                 Request                            Point


  Source: OASIS SAML Standard
5

    Authorization Interoperability Standards
    eXtensible Access Control Markup Language – XACML



                                XACML
                       Policy                      Policy Serve in SAVI



                                                                     XML
                                 XML
                                             XML            XML
                                                                      XACML
                                XACML
                                           XACML             XACML



              Federation Layer         Virtualizatio         Openflow         Firewall
                                            n                 Switch




   Policy server distributes policy changes to all network elements
    using XACML
6


SAVI Access Control Technologies

                              Access-control lists (ACL)
                     Lists of specific users and groups and permissions


                   Role-Based Access Control - (RBAC)
        Access based on users roles. Role assignment. Role authentication.
                              Action authorization

                                     Empty Role
                    Contains just roles without any associated role

                          Explicit Capability Mapping                        Under Developm
          Roles have capabilities not in the context of any given resource
                                 Restricted Roles
              The role, capability, resource collection will be complete


              Attribute-Based Access Control - (ABAC)
                  On user attributes and object metadata
Attribute Based Access Control (ABAC)


      Subject Attributes
          Related to a subject (e.g. user, application, process) that
           defines the identity and characteristics of the subject
          E.g. identifier, name, job title, role
      Resource Attributes
          Associated with a resource (web service, system function, or
           data)
          E.g. Dublin Core metadata elements
      Environment Attributes
          Describes the operational, technical, or situational environment
           or context in which the information access occurs
          E.g. current date time, current threat level, network security
           classification
ABAC Policy Formulation
1.   S, R, and E are subjects, resources, and environments,
     respectively;
2.   SAk (1 k K), RAm (1 m M), and EAn (1 n N) are the pre-
     defined attributes for subjects, resources, and environments,
     respectively;
3.   ATTR(s), ATTR(r), and ATTR(e) are attribute assignment relations
     for subject s, resource r, and environment e, respectively:


                  ATTR( s)   SA1 SA2 ... SAK
                  ATTR(r )   RA1 RA2 ... RAM
                  ATTR(e)    EA1 EA2 ... EAN
ABAC in SAVI
Researcher               SA                                          Edge Node
                      SOAP Msg          1                 3
                                                                 Resources




                                                Control

                                                Service
                                                                    APIs




                                                Web
                         1
                 SA
                                            2
                                                          RA
                                                Access         Service Catalog
     Trust Anchor                EA             Control           (Beacon)

SA
                              Policy                                   Attribute
                              Admin.        Policy Unit
                              Service                                  & Policy
      Identity
                                                                       Services
      Provider

Weitere ähnliche Inhalte

Was ist angesagt?

(ATS3-GS03) Accelrys Enterprise Platform Deeper Dive
(ATS3-GS03) Accelrys Enterprise Platform Deeper Dive(ATS3-GS03) Accelrys Enterprise Platform Deeper Dive
(ATS3-GS03) Accelrys Enterprise Platform Deeper DiveBIOVIA
 
How to Choose A SOA Gateway from Layer 7
How to Choose A SOA Gateway from Layer 7How to Choose A SOA Gateway from Layer 7
How to Choose A SOA Gateway from Layer 7CA API Management
 
Cloudforce Essentials 2012 - Understanding Force.com in 60 Minutes or Less
Cloudforce Essentials 2012 - Understanding Force.com  in 60 Minutes or LessCloudforce Essentials 2012 - Understanding Force.com  in 60 Minutes or Less
Cloudforce Essentials 2012 - Understanding Force.com in 60 Minutes or LessSalesforce_APAC
 
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...virtual-campus
 
Layer 7: Understanding XML & Web Services Performance
Layer 7: Understanding  XML & Web Services PerformanceLayer 7: Understanding  XML & Web Services Performance
Layer 7: Understanding XML & Web Services PerformanceCA API Management
 
My private cloud overview
My private cloud overviewMy private cloud overview
My private cloud overviewdavidwchadwick
 
High Value Cloud Services
High Value Cloud ServicesHigh Value Cloud Services
High Value Cloud ServicesLaura Ventura
 
Anish Karmakar S C A
Anish  Karmakar    S C AAnish  Karmakar    S C A
Anish Karmakar S C ASOA Symposium
 
Venus-c: Using open source clouds in eScience
Venus-c: Using open source clouds in eScienceVenus-c: Using open source clouds in eScience
Venus-c: Using open source clouds in eScienceOW2
 

Was ist angesagt? (9)

(ATS3-GS03) Accelrys Enterprise Platform Deeper Dive
(ATS3-GS03) Accelrys Enterprise Platform Deeper Dive(ATS3-GS03) Accelrys Enterprise Platform Deeper Dive
(ATS3-GS03) Accelrys Enterprise Platform Deeper Dive
 
How to Choose A SOA Gateway from Layer 7
How to Choose A SOA Gateway from Layer 7How to Choose A SOA Gateway from Layer 7
How to Choose A SOA Gateway from Layer 7
 
Cloudforce Essentials 2012 - Understanding Force.com in 60 Minutes or Less
Cloudforce Essentials 2012 - Understanding Force.com  in 60 Minutes or LessCloudforce Essentials 2012 - Understanding Force.com  in 60 Minutes or Less
Cloudforce Essentials 2012 - Understanding Force.com in 60 Minutes or Less
 
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
S-CUBE LP: Service Level Agreement based Service infrastructures in the conte...
 
Layer 7: Understanding XML & Web Services Performance
Layer 7: Understanding  XML & Web Services PerformanceLayer 7: Understanding  XML & Web Services Performance
Layer 7: Understanding XML & Web Services Performance
 
My private cloud overview
My private cloud overviewMy private cloud overview
My private cloud overview
 
High Value Cloud Services
High Value Cloud ServicesHigh Value Cloud Services
High Value Cloud Services
 
Anish Karmakar S C A
Anish  Karmakar    S C AAnish  Karmakar    S C A
Anish Karmakar S C A
 
Venus-c: Using open source clouds in eScience
Venus-c: Using open source clouds in eScienceVenus-c: Using open source clouds in eScience
Venus-c: Using open source clouds in eScience
 

Ähnlich wie Identity Manager in Cloud with Openflow Switches

IdM in Smart Applications on Virtual Infrastructure
IdM in Smart Applications on Virtual InfrastructureIdM in Smart Applications on Virtual Infrastructure
IdM in Smart Applications on Virtual InfrastructureMohammad Faraji
 
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
Layer 7: The Importance of Standards for Enterprise SOA and Cloud SecurityLayer 7: The Importance of Standards for Enterprise SOA and Cloud Security
Layer 7: The Importance of Standards for Enterprise SOA and Cloud SecurityCA API Management
 
SANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerSANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerOracleIDM
 
6.Live Framework 和Mesh Services
6.Live Framework 和Mesh Services6.Live Framework 和Mesh Services
6.Live Framework 和Mesh ServicesGaryYoung
 
Seasonal Burst Handling Using Hybrid Cloud Infrastructure from Cloud Security...
Seasonal Burst Handling Using Hybrid Cloud Infrastructure from Cloud Security...Seasonal Burst Handling Using Hybrid Cloud Infrastructure from Cloud Security...
Seasonal Burst Handling Using Hybrid Cloud Infrastructure from Cloud Security...CA API Management
 
Mike Taulty MIX10 Silverlight 4 Patterns Frameworks
Mike Taulty MIX10 Silverlight 4 Patterns FrameworksMike Taulty MIX10 Silverlight 4 Patterns Frameworks
Mike Taulty MIX10 Silverlight 4 Patterns Frameworksukdpe
 
Building reliable systems from unreliable components
Building reliable systems from unreliable componentsBuilding reliable systems from unreliable components
Building reliable systems from unreliable componentsArnon Rotem-Gal-Oz
 
Introducing SQL Server Data Services
Introducing SQL Server Data ServicesIntroducing SQL Server Data Services
Introducing SQL Server Data Servicesgoodfriday
 
Introducing SQL Server Data Services
Introducing SQL Server Data ServicesIntroducing SQL Server Data Services
Introducing SQL Server Data Servicesgoodfriday
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOpenStorageSummit
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementNoam Bunder
 
02 Ms Online Identity Session 1
02 Ms Online Identity   Session 102 Ms Online Identity   Session 1
02 Ms Online Identity Session 1Sivadon Chaisiri
 
Denial of Service in Software Defined Netoworks
Denial of Service in Software Defined NetoworksDenial of Service in Software Defined Netoworks
Denial of Service in Software Defined NetoworksMohammad Faraji
 
Projecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudProjecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudScientia Groups
 
AWS Cloud School | London - Part 1
AWS Cloud School | London - Part 1AWS Cloud School | London - Part 1
AWS Cloud School | London - Part 1Amazon Web Services
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudAmazon Web Services
 
2. FOMS _ FeedHenry_ Mícheál Ó Foghlú
2. FOMS _ FeedHenry_ Mícheál Ó Foghlú2. FOMS _ FeedHenry_ Mícheál Ó Foghlú
2. FOMS _ FeedHenry_ Mícheál Ó FoghlúFOMS011
 

Ähnlich wie Identity Manager in Cloud with Openflow Switches (20)

IdM in Smart Applications on Virtual Infrastructure
IdM in Smart Applications on Virtual InfrastructureIdM in Smart Applications on Virtual Infrastructure
IdM in Smart Applications on Virtual Infrastructure
 
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
Layer 7: The Importance of Standards for Enterprise SOA and Cloud SecurityLayer 7: The Importance of Standards for Enterprise SOA and Cloud Security
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
 
SANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerSANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements Server
 
6.Live Framework 和Mesh Services
6.Live Framework 和Mesh Services6.Live Framework 和Mesh Services
6.Live Framework 和Mesh Services
 
Seasonal Burst Handling Using Hybrid Cloud Infrastructure from Cloud Security...
Seasonal Burst Handling Using Hybrid Cloud Infrastructure from Cloud Security...Seasonal Burst Handling Using Hybrid Cloud Infrastructure from Cloud Security...
Seasonal Burst Handling Using Hybrid Cloud Infrastructure from Cloud Security...
 
Mike Taulty MIX10 Silverlight 4 Patterns Frameworks
Mike Taulty MIX10 Silverlight 4 Patterns FrameworksMike Taulty MIX10 Silverlight 4 Patterns Frameworks
Mike Taulty MIX10 Silverlight 4 Patterns Frameworks
 
OpenStack Security
OpenStack SecurityOpenStack Security
OpenStack Security
 
Building reliable systems from unreliable components
Building reliable systems from unreliable componentsBuilding reliable systems from unreliable components
Building reliable systems from unreliable components
 
Introducing SQL Server Data Services
Introducing SQL Server Data ServicesIntroducing SQL Server Data Services
Introducing SQL Server Data Services
 
Introducing SQL Server Data Services
Introducing SQL Server Data ServicesIntroducing SQL Server Data Services
Introducing SQL Server Data Services
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal Stern
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement Management
 
02 Ms Online Identity Session 1
02 Ms Online Identity   Session 102 Ms Online Identity   Session 1
02 Ms Online Identity Session 1
 
Security Best Practices on AWS
Security Best Practices on AWSSecurity Best Practices on AWS
Security Best Practices on AWS
 
Denial of Service in Software Defined Netoworks
Denial of Service in Software Defined NetoworksDenial of Service in Software Defined Netoworks
Denial of Service in Software Defined Netoworks
 
apiGrove
apiGroveapiGrove
apiGrove
 
Projecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudProjecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the Cloud
 
AWS Cloud School | London - Part 1
AWS Cloud School | London - Part 1AWS Cloud School | London - Part 1
AWS Cloud School | London - Part 1
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS Cloud
 
2. FOMS _ FeedHenry_ Mícheál Ó Foghlú
2. FOMS _ FeedHenry_ Mícheál Ó Foghlú2. FOMS _ FeedHenry_ Mícheál Ó Foghlú
2. FOMS _ FeedHenry_ Mícheál Ó Foghlú
 

Identity Manager in Cloud with Openflow Switches

  • 1. Identity Manager in Software Defined Net Mohammad Faraji Email: ms.faraji@utoronto.ca
  • 2. SAVI Identity Manager Design Requirements  SAVI is a federation of autonomous systems:  Testbeds  Cloud Datacenters  Information Providers (e.g. Identity providers)  Researcher needs a fine-grained Access Control to have flexibility:  Policy negotiation  Attribute Assertion
  • 3. SAVI Federation Architecture SAVI Federation SAVI Core Oversight node Trust Anchor Domain (Keystone) Admin User User User Service Accounting 1 2 3 SAVI edge (Beacon) node Repository Testbed Identity Providers   Remote  Datacenter  s
  • 4. Authentication Interoperability Standard Security Assertion Markup Language - SAML Policy Policy Policy Credentials Authentication Attribute Policy Decision Collector Authority Authority Point SAML Authentication Attribute Authorization Assertion Assertion Decision Assertion System Application Policy Enforcement Entity Request Point Source: OASIS SAML Standard
  • 5. 5 Authorization Interoperability Standards eXtensible Access Control Markup Language – XACML XACML Policy Policy Serve in SAVI XML XML XML XML XACML XACML XACML XACML Federation Layer Virtualizatio Openflow Firewall n Switch  Policy server distributes policy changes to all network elements using XACML
  • 6. 6 SAVI Access Control Technologies Access-control lists (ACL) Lists of specific users and groups and permissions Role-Based Access Control - (RBAC) Access based on users roles. Role assignment. Role authentication. Action authorization Empty Role Contains just roles without any associated role Explicit Capability Mapping Under Developm Roles have capabilities not in the context of any given resource Restricted Roles The role, capability, resource collection will be complete Attribute-Based Access Control - (ABAC) On user attributes and object metadata
  • 7. Attribute Based Access Control (ABAC)  Subject Attributes  Related to a subject (e.g. user, application, process) that defines the identity and characteristics of the subject  E.g. identifier, name, job title, role  Resource Attributes  Associated with a resource (web service, system function, or data)  E.g. Dublin Core metadata elements  Environment Attributes  Describes the operational, technical, or situational environment or context in which the information access occurs  E.g. current date time, current threat level, network security classification
  • 8. ABAC Policy Formulation 1. S, R, and E are subjects, resources, and environments, respectively; 2. SAk (1 k K), RAm (1 m M), and EAn (1 n N) are the pre- defined attributes for subjects, resources, and environments, respectively; 3. ATTR(s), ATTR(r), and ATTR(e) are attribute assignment relations for subject s, resource r, and environment e, respectively: ATTR( s) SA1 SA2 ... SAK ATTR(r ) RA1 RA2 ... RAM ATTR(e) EA1 EA2 ... EAN
  • 9. ABAC in SAVI Researcher SA Edge Node SOAP Msg 1 3 Resources Control Service APIs Web 1 SA 2 RA Access Service Catalog Trust Anchor EA Control (Beacon) SA Policy Attribute Admin. Policy Unit Service & Policy Identity Services Provider