SlideShare a Scribd company logo
1 of 36
Up 2011 Global Cloud Computing Conference, December, 2011 Up in the Air:  The Future of Cloud Identity Management Ken Huang, Director of Cloud Security, CGI
About Ken Huang ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why Traditional IDAM is not sufficient for Cloud? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Top 8 Reasons Why Cloud Provider needs IDAM 1) To make sure who is using your service. 2) To be compliant with government regulations. 3) To provide Separation of Duty  and Least Privileged access to the data hosted on behalf of cloud consumer. 4) To build a trust relationship with cloud consumer. If you don't care about IAM, you will certainly lose the trust of the customers.  5) For user based subscription model (such as  salesforce.com ), cloud provider need to have IAM to provision, audit, de-provision users and to provider correct billing statement according to usage. 6) To support potential e-Discovery as required by law enforcement agency. 7) To be able to support wide range of users. 8) To support other functions within Cloud Provider such as BI, Sales, and Executive decisions.
Top 8 Reasons why Cloud Consumer needs IDAM 1) Network security is not enough, Identity Based Security is essential for the Cloud Consumer. 2) Audit tracking and compliance is still Cloud Consumer's responsibility.  3) SSO with the applications on the cloud. 4) The Identity Federation will be in strong need . 5: For small and middle size companies may need to leverage IDAAS to save the cost. 6: Measure effectiveness of the cloud service (you need the identities). 7: Verify the billing provided by Cloud Provider. 8: Modification of existing in house User Provisioning for the Cloud.
IDAM is a Foundational Component for Cloud 1: NIST Reference Architecture has Security and Privacy as Cross Cutting Service.  IDAM is the main enabler of Security and Privacy 2: IDAM is essential regardless of Service model (IAAS, PAAS, SAAS, DAAS, XAAS)  and  deployment model (Public, Private, Community, Hybrid)
1: OASIC IDCloud  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OASIS IDCloud TC  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OASIS IDCloud TC ,[object Object],[object Object],[object Object],[object Object],[object Object]
OASIS ID Cloud Status ,[object Object],[object Object],[object Object],[object Object]
OASIS ID Cloud : Total 32 Use Cases ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
2:  OpenGroup Jericho ,[object Object],[object Object],[object Object],[object Object],[object Object]
Jericho Cloud Cube Perimeterised Deperimeterised Proprietary Open  Internal External
Jericho COA ,[object Object],[object Object]
“ Identity” Commandments by Jericho ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3:  CSA’s Trusted Cloud Initiative ,[object Object],[object Object],[object Object],[object Object],[object Object]
Trusted Cloud Initiative by CSA ,[object Object],[object Object],[object Object]
Domain 12 of CSA Guide
CSA Guide On Identity Management ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identity Provisioning – Recommendations by CSA ,[object Object],[object Object],[object Object]
Authentication Recommendation for SAAS/PAAS by CSA ,[object Object],[object Object],[object Object]
Authentication Recommendation for IAAS by CSA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Federation Recommendation by CSA ,[object Object],[object Object],[object Object],[object Object]
Access Control Recommendation by CSA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IDaaS Recommendations by CSA ,[object Object],[object Object],[object Object],[object Object]
4:  Simple Cloud Identity Management ,[object Object],[object Object],[object Object],[object Object],[object Object]
Simple Cloud Identity Management (SCIM) ,[object Object],[object Object],[object Object]
SCIM deliverables ,[object Object],[object Object],[object Object],[object Object]
SCIM Restful Web Service API endpoints Resource Endpoint Operations Description User /User GET ,  POST ,  PUT ,  PATCH ,  DELETE Retrieve/Modify Users User Query/Listing /Users GET Retrieve User(s) via ad hoc queries Group /Group GET ,  POST ,  PUT ,  PATCH ,  DELETE Retrieve/Modify Groups User Query/Listing /Groups GET Retrieve Group(s) via ad hoc queries User Password /User/{userId}/password PATCH Change a User's password Service Provider Configuration /ServiceProviderConfig GET Retrieve the Service Provider's Configuration Resource Schema /Schema GET Retrieve a Resource's Schema Resource Schema Query/Listing /Schemas GET Retrieve Resource Schema(s) via ad hoc queries Bulk /Bulk POST Bulk modify Resources
5:  NSTIC ,[object Object],[object Object],[object Object],[object Object],[object Object]
US Government on Cloud Identity Policy Initiatives ,[object Object],[object Object],[object Object],[object Object]
Guiding Principles for NSTIC ,[object Object],[object Object],[object Object],[object Object]
Comparison Standard Or Initiative Deliverable Industrial support OASIS  IDCloud Use case, profiles and gap analysis 21 sponsors  including DoD, Microsoft, CA, IBM, CISCO, Symantec, SAP Jericho White paper 58 members including DoD, HP, IBM, Microsoft, Oracle, Raytheon, Mitre CSA TCI Guide  Over 100 members.  Novell is the initial sponsor for TCI SCIM Use case, Restful API guide, SAML profile, Core schema Ping Identity, The UnboundID SCIM SDK,  Sailpoint, etc NSTIC Strategy document Paypal, IBM, Microsoft, CA etc
Recommendation  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion and Q/A  ,[object Object],[object Object],[object Object]

More Related Content

What's hot

Anil saldhana oasisid_cloud
Anil saldhana oasisid_cloudAnil saldhana oasisid_cloud
Anil saldhana oasisid_cloud
Anil Saldanha
 
Open am and_radiantone
Open am and_radiantoneOpen am and_radiantone
Open am and_radiantone
Jose R
 
451 Research Client Event Nov 10
451 Research Client Event Nov 10451 Research Client Event Nov 10
451 Research Client Event Nov 10
stavvmc
 
Identity Management In Cloud Computing
Identity Management In Cloud ComputingIdentity Management In Cloud Computing
CA CloudMinder Vasu Surabhi
CA CloudMinder Vasu SurabhiCA CloudMinder Vasu Surabhi
CA CloudMinder Vasu Surabhi
Vasu Surabhi
 
CA security-Management -Vasu Surabhi
CA security-Management -Vasu SurabhiCA security-Management -Vasu Surabhi
CA security-Management -Vasu Surabhi
Vasu Surabhi
 
CA Security - Deloitte IAM Summit - Vasu
CA Security - Deloitte IAM Summit  - VasuCA Security - Deloitte IAM Summit  - Vasu
CA Security - Deloitte IAM Summit - Vasu
Vasu Surabhi
 

What's hot (20)

Anil saldhana oasisid_cloud
Anil saldhana oasisid_cloudAnil saldhana oasisid_cloud
Anil saldhana oasisid_cloud
 
IAM Tools
IAM ToolsIAM Tools
IAM Tools
 
Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory
 
Open am and_radiantone
Open am and_radiantoneOpen am and_radiantone
Open am and_radiantone
 
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderCase Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
What is Two Factor Authentication
What is Two Factor AuthenticationWhat is Two Factor Authentication
What is Two Factor Authentication
 
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
 
451 Research Client Event Nov 10
451 Research Client Event Nov 10451 Research Client Event Nov 10
451 Research Client Event Nov 10
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Design Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity ProvisioningDesign Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity Provisioning
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
Identity Management In Cloud Computing
Identity Management In Cloud ComputingIdentity Management In Cloud Computing
Identity Management In Cloud Computing
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
CA CloudMinder Vasu Surabhi
CA CloudMinder Vasu SurabhiCA CloudMinder Vasu Surabhi
CA CloudMinder Vasu Surabhi
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a service
 
CA security-Management -Vasu Surabhi
CA security-Management -Vasu SurabhiCA security-Management -Vasu Surabhi
CA security-Management -Vasu Surabhi
 
CA Security - Deloitte IAM Summit - Vasu
CA Security - Deloitte IAM Summit  - VasuCA Security - Deloitte IAM Summit  - Vasu
CA Security - Deloitte IAM Summit - Vasu
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
 

Similar to Up 2011-ken huang

School of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxSchool of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docx
jeffsrosalyn
 
(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013
STO STRATEGY
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
mariona83
 
(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013
STO STRATEGY
 
(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013
STO STRATEGY
 
(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013
STO STRATEGY
 

Similar to Up 2011-ken huang (20)

Cloud security for financial services
Cloud security for financial servicesCloud security for financial services
Cloud security for financial services
 
School of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxSchool of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docx
 
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack OverviewCloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
 
Cloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patternsCloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patterns
 
(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013
 
An interoperability framework for
An interoperability framework forAn interoperability framework for
An interoperability framework for
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services
 
Saas security
Saas securitySaas security
Saas security
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern Architectures
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 
(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013(Pdf) yury chemerkin intelligence_sec_2013
(Pdf) yury chemerkin intelligence_sec_2013
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEDEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
 
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...
 
(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013(Pdf) yury chemerkin ita_2013
(Pdf) yury chemerkin ita_2013
 
(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013(Pdf) yury chemerkin deep_intel_2013
(Pdf) yury chemerkin deep_intel_2013
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public Sector
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Up 2011-ken huang

  • 1. Up 2011 Global Cloud Computing Conference, December, 2011 Up in the Air:  The Future of Cloud Identity Management Ken Huang, Director of Cloud Security, CGI
  • 2.
  • 3.
  • 4.
  • 5. Top 8 Reasons Why Cloud Provider needs IDAM 1) To make sure who is using your service. 2) To be compliant with government regulations. 3) To provide Separation of Duty  and Least Privileged access to the data hosted on behalf of cloud consumer. 4) To build a trust relationship with cloud consumer. If you don't care about IAM, you will certainly lose the trust of the customers. 5) For user based subscription model (such as salesforce.com ), cloud provider need to have IAM to provision, audit, de-provision users and to provider correct billing statement according to usage. 6) To support potential e-Discovery as required by law enforcement agency. 7) To be able to support wide range of users. 8) To support other functions within Cloud Provider such as BI, Sales, and Executive decisions.
  • 6. Top 8 Reasons why Cloud Consumer needs IDAM 1) Network security is not enough, Identity Based Security is essential for the Cloud Consumer. 2) Audit tracking and compliance is still Cloud Consumer's responsibility. 3) SSO with the applications on the cloud. 4) The Identity Federation will be in strong need . 5: For small and middle size companies may need to leverage IDAAS to save the cost. 6: Measure effectiveness of the cloud service (you need the identities). 7: Verify the billing provided by Cloud Provider. 8: Modification of existing in house User Provisioning for the Cloud.
  • 7. IDAM is a Foundational Component for Cloud 1: NIST Reference Architecture has Security and Privacy as Cross Cutting Service. IDAM is the main enabler of Security and Privacy 2: IDAM is essential regardless of Service model (IAAS, PAAS, SAAS, DAAS, XAAS) and deployment model (Public, Private, Community, Hybrid)
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Jericho Cloud Cube Perimeterised Deperimeterised Proprietary Open Internal External
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Domain 12 of CSA Guide
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. SCIM Restful Web Service API endpoints Resource Endpoint Operations Description User /User GET ,  POST ,  PUT ,  PATCH ,  DELETE Retrieve/Modify Users User Query/Listing /Users GET Retrieve User(s) via ad hoc queries Group /Group GET ,  POST ,  PUT ,  PATCH ,  DELETE Retrieve/Modify Groups User Query/Listing /Groups GET Retrieve Group(s) via ad hoc queries User Password /User/{userId}/password PATCH Change a User's password Service Provider Configuration /ServiceProviderConfig GET Retrieve the Service Provider's Configuration Resource Schema /Schema GET Retrieve a Resource's Schema Resource Schema Query/Listing /Schemas GET Retrieve Resource Schema(s) via ad hoc queries Bulk /Bulk POST Bulk modify Resources
  • 31.
  • 32.
  • 33.
  • 34. Comparison Standard Or Initiative Deliverable Industrial support OASIS IDCloud Use case, profiles and gap analysis 21 sponsors including DoD, Microsoft, CA, IBM, CISCO, Symantec, SAP Jericho White paper 58 members including DoD, HP, IBM, Microsoft, Oracle, Raytheon, Mitre CSA TCI Guide Over 100 members. Novell is the initial sponsor for TCI SCIM Use case, Restful API guide, SAML profile, Core schema Ping Identity, The UnboundID SCIM SDK, Sailpoint, etc NSTIC Strategy document Paypal, IBM, Microsoft, CA etc
  • 35.
  • 36.

Editor's Notes

  1. Use Case driven
  2. ITU: International Telecommunication Union
  3. Infrastructure Identity Establishment : This category includes use cases that feature establishment of identity and trust between cloud providers their partners and customers and includes consideration of topics such as Certificate Services (e.g. x.509),  Signature Validation, Transaction Validation, Non-repudiation, etc.. Infrastructure Identity Management: This subcategory includes use cases that feature Virtualization, Separation of Identities across different IT infrastructural layers (e.g. Server Platform, Operating System (OS), Middleware, Virtual Machine (VM), Application, etc).
  4. Overall Jericho thinks that deperimeterised cloud formation is most important formation of the cloud and should be focus of the work for the cloud security. Identity is shifting from Enterprise Centric to Principal Centric and from ACL List to Resource centric.
  5. It is not a standard but just a white paper