SlideShare ist ein Scribd-Unternehmen logo
1 von 50
Downloaden Sie, um offline zu lesen
Identity, Access & Privacy in the New Hybrid
Enterprise
 Scott Morrison             Eve Maler
  CTO, Layer 7 Technologies   Principal Analyst, Forrester Research, Inc.


May 17, 2012
Housekeeping
 Questions
 - Chat any questions you have and we’ll answer them at the end of this call

 Twitter                                                     facebook.com/layer7

 - Today’s event hashtag:
                                                              layer7.com/linkedin
   - #L7webinar
                                                              layer7.com/blogs
 - Follow us on Twitter:
   - @layer7
   - @forrester
   - @xmlgrrl
   - @kscottmorrison
Identity, Access, And Privacy
In The New Hybrid Enterprise
Eve Maler, Principal Analyst



May 17, 2012




2   © 2011 Forrester Research, Inc. Reproduction Prohibited
      2009
“         Sounds awesome – maybe later?
                         SAML and friends have succeeded in
                                                                    ”
                         one realm, but the extended enterprise
                         has strained them to the breaking point.




3   © 2011 Forrester Research, Inc. Reproduction Prohibited
Agenda


Many enterprises aren’t just extended – they’re over-extended.

IAM challenges favor Zero Trust and emerging technologies.

Plan for the new “Venn” of access control in the API economy.

Learn from your peers: Brandish IT carrots instead of sticks.




4   © 2011 Forrester Research, Inc. Reproduction Prohibited
Steve Yegge’s rant crystallized the
challenge

    [Jeff Bezos] issued a mandate that was so out there, so huge and
    eye-bulgingly ponderous, that it made all of his other mandates look
    like unsolicited peer bonuses. … “1) All teams will henceforth
    expose their data and functionality through service interfaces.” …

    Like anything else big and important in life, Accessibility has an evil
    twin who, jilted by the unbalanced affection displayed by their parents
    in their youth, has grown into an equally powerful Arch-Nemesis (yes,
    there's more than one nemesis to accessibility) named Security. And
    boy howdy are the two ever at odds.

    But I'll argue that Accessibility is actually more important than Security
    because dialing Accessibility to zero means you have no product at
    all, whereas dialing Security to zero can still get you a reasonably
    successful product such as the Playstation Network.

5   © 2011 Forrester Research, Inc. Reproduction Prohibited
The extended enterprise requires you to think outside
the box (or…get a bigger box)
                                                                 App sourcing and hosting




                                                               SaaS apps

                                                Apps in public clouds

                                                               Partner apps

                                                 Apps in private clouds

                                        On-premises enterprise apps

                                              Enterprise computers                Employees
                                                                                       Contractors
                             Enterprise-issued devices
                                                                                              Partners
                            Public computers                                                        Members
             Personal devices                                                                           Customers




    App access channels                                                                                       User populations



6    © 2011 Forrester Research, Inc. Reproduction Prohibited
Even social use cases press for better access
control with accessibility and agility




7   © 2011 Forrester Research, Inc. Reproduction Prohibited
And yet SAML-based identity federation still reaches
mostly large enterprises with deep pockets




8   © 2011 Forrester Research, Inc. Reproduction Prohibited
                                                   Source: October 26, 2011, “OpenID Connect Heralds The ‘Identity Singularity’” Forrester report
And loosely coupled SOA security solutions aren’t
rushing to fill the gap




9   © 2011 Forrester Research, Inc. Reproduction Prohibited

              Source: January 5, 2009 Forrester report “Web Services Security Specifications: WS-Security Achieves Critical Mass Of User Adoption”
Agenda


 Many enterprises aren’t just extended – they’re over-extended.

 IAM challenges favor Zero Trust and emerging technologies.

 Plan for the new “Venn” of access control in the API economy.

 Learn from your peers: Brandish IT carrots instead of sticks.




10   © 2011 Forrester Research, Inc. Reproduction Prohibited
Introducing Zero Trust Identity




         In Zero Trust, all interfaces are untrusted.
         Assume every business and IAM function is “equally
         far apart,” and treat all traffic among them as
         untrusted until it proves itself otherwise.




11   © 2011 Forrester Research, Inc. Reproduction Prohibited

     Source: September 14, 2010, “No More Chewy Centers: Introducing The Zero Trust Model Of Information Security” Forrester report
Internal to the
                                                                                                                                            organization
                                                                 Staff
                                                               user store

                                                                                        Organization serves as
                                                                                        an identity server for                              At external
                                                                                         business functions                                 partners

                                                               Consumer
                                                               user store
                                                                                                                                            Exposed to
                                                                                                                                            customers

Plan for both
inward and                                                                           A security token service (STS)
outward identity                                                                     handles token issuance, translation,
                                                                                     and consumption.

propagation
                                                                                                                               Staff
                                                                                                                             user store




                                                                                          Organization serves as
                                                                                           an identity client of            Institutional
                                                                                                user stores                  user store
                                                        For functions internal
                                                         to the organization



                                                                                                                             Consumer
                                                                                                                             user store
12   © 2011 Forrester Research, Inc. Reproduction Prohibited
                                                                                 Source: March 22, 2012 “Navigate The Future of IAM” Forrester report
Go from IDaaS to “IAM as an API”

                                                                 The business app’s
                                                                 own API determines
                                                                 access control
                                                                 granularity
     Back-end apps, web apps, mobile apps . . .                                                              Business apps

          API client                     API client                                              IAM API client           IAM API client



                                                                 Robustly protect all
                        Internet                                 interfaces, regardless                        Internet
                                                                 of their sourcing
                                                                 model




                                                                                                      APIs for authentication,
              Web service and app APIs                                                             authorization, provisioning . . .



                         Scale-out                                                                               IAM
                       infrastructure                                                                       infrastructure


                                                                                                     Applying the pattern
                 API façade pattern                                                                    to IAM functions


13     © 2011 Forrester Research, Inc. Reproduction Prohibited
                                                                                Source: March 22, 2012 “Navigate The Future of IAM” Forrester report
New identity solutions disrupt…but attract.
                    Or, The good thing about reinventing the wheel is that
                    you can get a round one.*
                                                               *Douglas Crockford, inventor of JavaScript Object Notation (JSON)




14   © 2011 Forrester Research, Inc. Reproduction Prohibited

                                                                                                          Source: tom-margie | CC BY-SA 2.0 | flickr.com
Emerging standards for IAM interfaces have an edge
 over traditional ones for Zero Trust



                                                 Provisioning,      Authentication,    Authorization,
             IAM                                                 session management,     consent,
                                                   proofing,
         functionality                                              SSO, federation    access control
                                                  self service
         Established
         SOA-friendly
          standards
           Emerging
          web-friendly
           standards
                                                  SCIM                 Connect




15   © 2011 Forrester Research, Inc. Reproduction Prohibited
Why are these technologies attractive?
 Security pros’ control diminishes with distance




16   © 2011 Forrester Research, Inc. Reproduction Prohibited
Agenda


 Many enterprises aren’t just extended – they’re over-extended.

 IAM challenges favor Zero Trust and emerging technologies.

 Plan for the new “Venn” of access control in the API economy.

 Learn from your peers: Brandish IT carrots instead of sticks.




17   © 2011 Forrester Research, Inc. Reproduction Prohibited
18   © 2011 Forrester Research, Inc. Reproduction Prohibited
OAuth magic: let a person delegate constrained
 access from one app to another




19   © 2011 Forrester Research, Inc. Reproduction Prohibited
OpenID Connect magic: turn SSO into a robust
    OAuth-protected identity API

                                                                OAuth delegated
    SAML and OpenID SSO                                                                    OpenID Connect
                                                                  authorization
       standardize…                                                                        standardizes…
                                                                 standardizes…

      Initiating user’s login
      session
                                                        X        Initiating user’s login
                                                                 session
                                                                                            Initiating user’s login
                                                                                            session


X
      Collecting user’s                                          Collecting user’s          Collecting user’s
      consent to share                                           consent to share           consent to share
      attributes                                                 attributes                 attributes


                                                        X
                                                                                            High-security identity
      High-security identity                                     High-security identity
                                                                                            tokens (using JSON
      tokens (SAML only)                                         tokens
                                                                                            Web Tokens)


X     Distributed and
      aggregated claims
                                                                                            Distributed and
                                                                                            aggregated claims


X     Session timeout
                                                                                            Session timeout (on
                                                                                            the docket)
20    © 2011 Forrester Research, Inc. Reproduction Prohibited
An OpenID Connect killer app:
“Street Identity”
1. Service provider (SP) needs
   trusted data
2. Attribute provider (AP) has it

3. Identity provider (IdP) can
   broker your permission to
   provide it
4. AP can demand a fee from SP
   for it
5. Lather, rinse, and repeat for:
      – Credit scores
      – Verified email addresses
      – Proofed identities backed by
        strong authentication…


 21     © 2011 Forrester Research, Inc. Reproduction Prohibited
OpenID Connect will dramatically lower the price and
 complexity bar for all identity federation


                                               Already exposing customer identities using a draft
                                               OpenID Connect-style API



                                               Working to expose workforce identities through
                                               OpenID Connect




      LOB apps and smaller partners can get into the federation game more
     easily; complex SAML-based solutions will see price pressure over time


22   © 2011 Forrester Research, Inc. Reproduction Prohibited
UMA magic: turn sharing of online access with others
 into OAuth-derived “privacy by design” solution

 Alice-to-Alice, Alice-to-Bob,
  Alice-to-org…and org-to-org
 Claims-based and policy-
  based authorization
     – Not just consent

 User can impose terms and
  conditions on requesters
     – Not just accept terms

 Centralizable authorization
  function
     – Not just point-to-point




23   © 2011 Forrester Research, Inc. Reproduction Prohibited
Killer apps for UMA

 UMAnized Street Identity:
     – Centralized management
       and policy-driven sharing of
       addresses etc. with anyone

 APIified access
  management:                                                                            IdP
                                                                     AP
     – Direct control and auditing
       of all employee SaaS
       access                                                         PEP
                                                                RS                         PDP
                                                                                AS
 Zero Trust B2B2C privacy:
     – Telco allows location
       sharing today – and health
       record sharing tomorrow                                                          RP



                                                                            client
                                                                                     requester
24    © 2011 Forrester Research, Inc. Reproduction Prohibited
Agenda


 Many enterprises aren’t just extended – they’re over-extended.

 IAM challenges favor Zero Trust and emerging technologies.

 Plan for the new “Venn” of access control in the API economy.

 Learn from your peers: Brandish IT carrots instead of sticks.




25   © 2011 Forrester Research, Inc. Reproduction Prohibited
One research organization’s experience with
 emerging IAM technologies for “Enterprise 2.0”
 Objectives:                                                   Approach:
  Unified authentication and                                   IdP proxy from internal SAML
   authorization flows for all                                   SSO systems
   protected resources
                                                                Leverage OpenID (and soon
  Serve internal and external users                             OpenID Connect)
   alike, using internal and external
                                                                “Graylist” approach: users take
   apps
                                                                 responsibility for dynamic external
  Remove friction and risk in getting                           service provider choices
   all new internal apps to federate                             – Organization is in charge of
                                                                   whitelists and blacklists
  Enable brokered distributed
   attribute provisioning                                       Devs partnered with IT from the
                                                                 beginning
  Enable use by people with pre-
   proofed high-quality credentials                              – Rationale that worked: “Ad hoc
                                                                   login creation is worse”
26   © 2011 Forrester Research, Inc. Reproduction Prohibited
Its architecture




                                    External OP                                     Database
DMZ
                                                               Corporate Firewall
Intranet
                                                                                               User Data
                              Two-Factor Signon
                                                                                Internal OP




                                                                               Corporate SSO



27   © 2011 Forrester Research, Inc. Reproduction Prohibited
Its results

     New internal apps federate “by default” even if
     they’re in the long tail


     IT gets a level of comfort by operating production-
     quality servers itself


     Dynamic associations with external apps are
     auditable


                                                                While they prefer OAuth-based tech,
                                                               OpenID 2.0 has become legacy already!


                                                               Not enough external SaaS providers are
                                                                enabling standardized inbound SSO

28   © 2011 Forrester Research, Inc. Reproduction Prohibited
Drawing lessons from this experience


                                               Low-usage internal apps aren’t necessarily low-
                                                sensitivity apps; protect them by reducing friction
                                               For extranet apps and APIs, think light weight,
                                                particularly for partners with unsophisticated IT

                                               Expect protocol discussions to reflect partner power
                                                relationships


                                               Bet on “reach” vs. “rich” – in distributed computing,
                                                it always wins in the end




29   © 2011 Forrester Research, Inc. Reproduction Prohibited
Scott Morrison
 CTO, Layer 7 Technologies
The Old Enterprise
                                                                           Line of
Formal and structured security & connectivity                             business
 VPNs & prop. Protocols for thick clients                                 servers

 HTTP(s) for browsers
 SOAP+WS-* for B2B

                                             Firewall


                                   VPN
                                                                                     Enterprise
   Road                                                                               Network
Warriors with
    VPN

                                  SSL                   WS-S




                    Browser                                     Formal
                    Clients                                    Trading
                                                               Partners
The New Hybrid Enterprise
                                                         Line of
Highly agile security & connectivity                    business
 REST, OAuth, OpenID Connect, UMA                       servers




                                       Firewall



                                                                   Enterprise
      Mobile                                                        Network
      Devices




                Clouds


                                                    Informal,
                                                   API-driven
                                                  integrations
The Hybrid Enterprise Made Possible By APIs




                                                    API
                                                   Server




    Mobile App

                                                An API is a
                                                RESTful service
                 Web Client

                                      Web App

                              5
                                  5
For Example:




  GET http://services.layer7.com/staff/Scott




                       6
http://services.layer7.com/staff/Scott
For Example:

 {
     "firstName": ”Scott       ",
     "lastName" : ”Morrison",
     ”title"    : “CTO”,
     "address" :
     {
         "streetAddress": ”405-1100 Melville",
         "city"      : ”Vancouver",
         ”prov"       : ”BC",
         "postalCode" : ”V6E 4A6"
     },
     "phoneNumber":
     [
         {
           "type" : ”office",
           "number": ”605 681-9377"
         },
         {
           "type" : ”home",
           "number": ”604 555-4567"
         }
     ]
 }




                                                 7
Why Zero Trust?




                  Source: http://www.yurock.net/santa-getting-
                  arrested/
A Sensible Response




                      Source:
                      http://skreened.com/impossiblethings6/keep-calm-trust-no-one
Or Better Yet:




                 AND USE
                  OAUTH,
                  OPENID
                 CONNECT
                  & UMA
What Do These Do?



OAuth        To get access to an API.
OpenID       To share information about users.
Connect
UMA          To give a user the power to control
             how their attributes are shared.
Priority #1: OAuth




              Make it easy
              Make it scale
How to Make OAuth Easy
Simple, drop-in virtual or hardware                                                     Protected
  gateway                                              SecureSpan
                                                                                        Resource

 Acts as both Authorization Server (AS) and             Gateway
                                                      Protecting RS
  Resource Server (RS)
 Advanced security on all APIs
                                                                                Directory
 Threat detection, audit, QoS mgmt, etc   Firewall


                                                                                              Enterprise
                                                                                               Network
                                                                             SecureSpan
       Mobile                                                                Gateway as
       Devices                                                                   AS




                                                                       All Authorization Grants
                                                                       ➠ Authorization code
             Clouds,
           Webapps, etc                                                ➠ Implicit

                                                          Informal,    ➠ Resource owner password
                                                         API-driven      credentials
                                                        integrations
                                                                       ➠ Client credentials
How Easy?
How Easy?
How Easy?
How to Make OAuth Web Scale



          SecureSpan                 Secure Zone              Protected
            Gateway                                           Resource
                        Firewall 2
           cluster RS
                        DMZ
          Firewall 1                                                           Directory




                                                                SecureSpan
                                                                 Gateway as
                                                                Secure Token
                                                                   Store

                                              SecureSpan
                                                Gateway
                                              cluster as AS
How to Make OAuth Scale – Architecture
                                                 Resource provider
                          Internal (secure) network                    DMZ                                         Internet
                                                                                       •    Who is asking
                                                                                       •    Which API?
                                                                                       •    What scope?
                                                                                       •    Is token valid?
                                Resource                                               •    etc…
 Accessed when                   Server
                                                                  API Proxy
 client requests
    resources
                                                                   Server                                      •   Prove who you are
                                                                                                               •   Authorize entitlement
                                                                                                               •   etc…
                                  OVP

 Accessed when                                                   Authorization                                      client
                                 Client
 client requests                                                    Server
user authorization               Store
   and tokens
                                 Token                               Token
                                 Store                               Server
                                                                                                        •     Create
                                                                                                        •     Check
                                 IDMS                                                                   •     Expire
                                                                                                        •     Revoke
                                                                                                        •     etc…



              Accessible through an LDAP query
                                     Endpoints accessible through an API
                                          Endpoints accessible through OAuth protocol API
Priority #2: Introduce OpenID Connect
                                         Resource provider
                 Internal (secure) network                        DMZ                               Internet

                                                                                  Core
                                                                                         •   Provide IDtoken
                                                                                         •   Validate and return claims
                       Resource                              CheckID
                        Server
                                                              UserInfo                        •     Provide access token
                                                                                              •     Get attributes (eg:
                                                                                                    family_name, picture,
                                                                                                    gender, birthdate, etc)
                         OVP                                                 Optional
                                                           SessionMgmt
                                                                                                    client
                        Client
                        Store                                                Optional
                                                                                               1.    Refresh endpoint
                                                           DynamicReg                          2.    End session endpoint
                        Token
                        Store
                                                             Discovery
                        IDMS



     Accessible through an LDAP query
                            Endpoints accessible through an API
                                        Endpoints accessible to outside clients
Summary
 Implement OAuth now!
 - Don’t roll your own
 - Plan for failure
 - Plan for scale
 Plan for OpenID Connect
 - Understand what you need to share
 - Look to integration with existing identity providers
 Keep a very close eye on UMA
 - This is the missing piece in the puzzle
 - Maturing very fast
Questions?




       Scott Morrison         Eve Maler
       CTO                    Principal Analyst
       Layer 7 Technologies   Forrester Research, Inc.

       smorrison@layer7.com   emaler@forrester.com

Weitere ähnliche Inhalte

Was ist angesagt?

DPA Perfecting IT
DPA Perfecting ITDPA Perfecting IT
DPA Perfecting IT
ebuc
 
IDC Whitepaper On The Value Of Sa
IDC Whitepaper On The Value Of SaIDC Whitepaper On The Value Of Sa
IDC Whitepaper On The Value Of Sa
wtaylor2408
 
Bigdata Final NSF I-Corps Presentation
Bigdata Final NSF I-Corps PresentationBigdata Final NSF I-Corps Presentation
Bigdata Final NSF I-Corps Presentation
Stanford University
 
Justice Federal Credit Union Success Story
Justice Federal Credit Union Success StoryJustice Federal Credit Union Success Story
Justice Federal Credit Union Success Story
Imprivata
 
Maximizing business value from it virtual class
Maximizing business value from it   virtual classMaximizing business value from it   virtual class
Maximizing business value from it virtual class
Deusto Business School
 

Was ist angesagt? (19)

DPA Perfecting IT
DPA Perfecting ITDPA Perfecting IT
DPA Perfecting IT
 
IDC Whitepaper On The Value Of Sa
IDC Whitepaper On The Value Of SaIDC Whitepaper On The Value Of Sa
IDC Whitepaper On The Value Of Sa
 
Dpa perfecting-it
Dpa perfecting-itDpa perfecting-it
Dpa perfecting-it
 
The Best Analytics Tools
The Best Analytics ToolsThe Best Analytics Tools
The Best Analytics Tools
 
Bigdata Final NSF I-Corps Presentation
Bigdata Final NSF I-Corps PresentationBigdata Final NSF I-Corps Presentation
Bigdata Final NSF I-Corps Presentation
 
Propalms network case studies
Propalms network case studiesPropalms network case studies
Propalms network case studies
 
IPM_E_10.2.12
IPM_E_10.2.12IPM_E_10.2.12
IPM_E_10.2.12
 
Next generation MDM
Next generation MDMNext generation MDM
Next generation MDM
 
CMS_01.03.12
CMS_01.03.12CMS_01.03.12
CMS_01.03.12
 
OSS Business models
OSS Business modelsOSS Business models
OSS Business models
 
Service Offerings_Bio
Service Offerings_BioService Offerings_Bio
Service Offerings_Bio
 
Capítulo 3 Programas de Aplicacion
Capítulo 3 Programas de AplicacionCapítulo 3 Programas de Aplicacion
Capítulo 3 Programas de Aplicacion
 
Justice Federal Credit Union Success Story
Justice Federal Credit Union Success StoryJustice Federal Credit Union Success Story
Justice Federal Credit Union Success Story
 
Datenwiederherstllung für Microsoft Exchange
Datenwiederherstllung für Microsoft ExchangeDatenwiederherstllung für Microsoft Exchange
Datenwiederherstllung für Microsoft Exchange
 
Small Business EDI Integration
Small Business EDI IntegrationSmall Business EDI Integration
Small Business EDI Integration
 
The Changes In Service Delivery With Cloud Computing
The Changes In Service Delivery With Cloud ComputingThe Changes In Service Delivery With Cloud Computing
The Changes In Service Delivery With Cloud Computing
 
The collaborative enterprise
The collaborative enterpriseThe collaborative enterprise
The collaborative enterprise
 
Maximizing business value from it virtual class
Maximizing business value from it   virtual classMaximizing business value from it   virtual class
Maximizing business value from it virtual class
 
CGS_E_1.3.12
CGS_E_1.3.12CGS_E_1.3.12
CGS_E_1.3.12
 

Andere mochten auch

Andere mochten auch (6)

CIS 2015 User Managed Access - George Fletcher
CIS 2015 User Managed Access - George FletcherCIS 2015 User Managed Access - George Fletcher
CIS 2015 User Managed Access - George Fletcher
 
BBC Linked Data Journey
BBC Linked Data JourneyBBC Linked Data Journey
BBC Linked Data Journey
 
How to Achieve Agile API Security
How to Achieve Agile API SecurityHow to Achieve Agile API Security
How to Achieve Agile API Security
 
Protect your APIs from Cyber Threats
Protect your APIs from Cyber ThreatsProtect your APIs from Cyber Threats
Protect your APIs from Cyber Threats
 
Deep-Dive: API Security in the Digital Age
Deep-Dive: API Security in the Digital AgeDeep-Dive: API Security in the Digital Age
Deep-Dive: API Security in the Digital Age
 
Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
 

Ähnlich wie Identity access and privacy in the new hybrid enterprise slides

Enterprise Apps Future State
Enterprise Apps Future StateEnterprise Apps Future State
Enterprise Apps Future State
Bruce MacVarish
 
Why Server Virtualization Demands an End-user’s Perspective
Why Server Virtualization Demands an End-user’s PerspectiveWhy Server Virtualization Demands an End-user’s Perspective
Why Server Virtualization Demands an End-user’s Perspective
Compuware APM
 
Kpmgsam Maturity Survey Oct08 123675516403 Phpapp01
Kpmgsam Maturity Survey Oct08 123675516403 Phpapp01Kpmgsam Maturity Survey Oct08 123675516403 Phpapp01
Kpmgsam Maturity Survey Oct08 123675516403 Phpapp01
Vicky Makhija
 

Ähnlich wie Identity access and privacy in the new hybrid enterprise slides (20)

Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
 
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Peregrine Guard - An Enterprise Mobile Security Product by i7 NetworksPeregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
 
Innovations in Data Grid Technology with Oracle Coherence
Innovations in Data Grid Technology with Oracle CoherenceInnovations in Data Grid Technology with Oracle Coherence
Innovations in Data Grid Technology with Oracle Coherence
 
Innovations in Grid Computing with Oracle Coherence
Innovations in Grid Computing with Oracle CoherenceInnovations in Grid Computing with Oracle Coherence
Innovations in Grid Computing with Oracle Coherence
 
Empowering the Business with Agile Analytics
Empowering the Business with Agile AnalyticsEmpowering the Business with Agile Analytics
Empowering the Business with Agile Analytics
 
Enterprise Apps Future State
Enterprise Apps Future StateEnterprise Apps Future State
Enterprise Apps Future State
 
E intelligence
E intelligenceE intelligence
E intelligence
 
CRM Architecture
CRM ArchitectureCRM Architecture
CRM Architecture
 
What is your Enterprise App Store Strategy?
What is your Enterprise App Store Strategy?What is your Enterprise App Store Strategy?
What is your Enterprise App Store Strategy?
 
Bring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective programBring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective program
 
Why Server Virtualization Demands an End-user’s Perspective
Why Server Virtualization Demands an End-user’s PerspectiveWhy Server Virtualization Demands an End-user’s Perspective
Why Server Virtualization Demands an End-user’s Perspective
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew David
 
Kpmgsam Maturity Survey Oct08 123675516403 Phpapp01
Kpmgsam Maturity Survey Oct08 123675516403 Phpapp01Kpmgsam Maturity Survey Oct08 123675516403 Phpapp01
Kpmgsam Maturity Survey Oct08 123675516403 Phpapp01
 
Introduccion M D S
Introduccion M D SIntroduccion M D S
Introduccion M D S
 
Introduccion a SQL Server Master Data Services
Introduccion a SQL Server Master Data ServicesIntroduccion a SQL Server Master Data Services
Introduccion a SQL Server Master Data Services
 
Privacy final presentaiton
Privacy final presentaitonPrivacy final presentaiton
Privacy final presentaiton
 
Exicon intro20
Exicon intro20Exicon intro20
Exicon intro20
 
Customer MDM Is Key To Strategic Business Success
Customer MDM Is Key To Strategic Business SuccessCustomer MDM Is Key To Strategic Business Success
Customer MDM Is Key To Strategic Business Success
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412
 

Mehr von CA API Management

5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
CA API Management
 

Mehr von CA API Management (20)

Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterprise
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIs
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches Webinar
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your Data
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & Win
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail Experience
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Identity access and privacy in the new hybrid enterprise slides

  • 1. Identity, Access & Privacy in the New Hybrid Enterprise  Scott Morrison  Eve Maler CTO, Layer 7 Technologies Principal Analyst, Forrester Research, Inc. May 17, 2012
  • 2. Housekeeping  Questions - Chat any questions you have and we’ll answer them at the end of this call  Twitter facebook.com/layer7 - Today’s event hashtag: layer7.com/linkedin - #L7webinar layer7.com/blogs - Follow us on Twitter: - @layer7 - @forrester - @xmlgrrl - @kscottmorrison
  • 3. Identity, Access, And Privacy In The New Hybrid Enterprise Eve Maler, Principal Analyst May 17, 2012 2 © 2011 Forrester Research, Inc. Reproduction Prohibited 2009
  • 4. Sounds awesome – maybe later? SAML and friends have succeeded in ” one realm, but the extended enterprise has strained them to the breaking point. 3 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 5. Agenda Many enterprises aren’t just extended – they’re over-extended. IAM challenges favor Zero Trust and emerging technologies. Plan for the new “Venn” of access control in the API economy. Learn from your peers: Brandish IT carrots instead of sticks. 4 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 6. Steve Yegge’s rant crystallized the challenge [Jeff Bezos] issued a mandate that was so out there, so huge and eye-bulgingly ponderous, that it made all of his other mandates look like unsolicited peer bonuses. … “1) All teams will henceforth expose their data and functionality through service interfaces.” … Like anything else big and important in life, Accessibility has an evil twin who, jilted by the unbalanced affection displayed by their parents in their youth, has grown into an equally powerful Arch-Nemesis (yes, there's more than one nemesis to accessibility) named Security. And boy howdy are the two ever at odds. But I'll argue that Accessibility is actually more important than Security because dialing Accessibility to zero means you have no product at all, whereas dialing Security to zero can still get you a reasonably successful product such as the Playstation Network. 5 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 7. The extended enterprise requires you to think outside the box (or…get a bigger box) App sourcing and hosting SaaS apps Apps in public clouds Partner apps Apps in private clouds On-premises enterprise apps Enterprise computers Employees Contractors Enterprise-issued devices Partners Public computers Members Personal devices Customers App access channels User populations 6 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 8. Even social use cases press for better access control with accessibility and agility 7 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 9. And yet SAML-based identity federation still reaches mostly large enterprises with deep pockets 8 © 2011 Forrester Research, Inc. Reproduction Prohibited Source: October 26, 2011, “OpenID Connect Heralds The ‘Identity Singularity’” Forrester report
  • 10. And loosely coupled SOA security solutions aren’t rushing to fill the gap 9 © 2011 Forrester Research, Inc. Reproduction Prohibited Source: January 5, 2009 Forrester report “Web Services Security Specifications: WS-Security Achieves Critical Mass Of User Adoption”
  • 11. Agenda Many enterprises aren’t just extended – they’re over-extended. IAM challenges favor Zero Trust and emerging technologies. Plan for the new “Venn” of access control in the API economy. Learn from your peers: Brandish IT carrots instead of sticks. 10 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 12. Introducing Zero Trust Identity In Zero Trust, all interfaces are untrusted. Assume every business and IAM function is “equally far apart,” and treat all traffic among them as untrusted until it proves itself otherwise. 11 © 2011 Forrester Research, Inc. Reproduction Prohibited Source: September 14, 2010, “No More Chewy Centers: Introducing The Zero Trust Model Of Information Security” Forrester report
  • 13. Internal to the organization Staff user store Organization serves as an identity server for At external business functions partners Consumer user store Exposed to customers Plan for both inward and A security token service (STS) outward identity handles token issuance, translation, and consumption. propagation Staff user store Organization serves as an identity client of Institutional user stores user store For functions internal to the organization Consumer user store 12 © 2011 Forrester Research, Inc. Reproduction Prohibited Source: March 22, 2012 “Navigate The Future of IAM” Forrester report
  • 14. Go from IDaaS to “IAM as an API” The business app’s own API determines access control granularity Back-end apps, web apps, mobile apps . . . Business apps API client API client IAM API client IAM API client Robustly protect all Internet interfaces, regardless Internet of their sourcing model APIs for authentication, Web service and app APIs authorization, provisioning . . . Scale-out IAM infrastructure infrastructure Applying the pattern API façade pattern to IAM functions 13 © 2011 Forrester Research, Inc. Reproduction Prohibited Source: March 22, 2012 “Navigate The Future of IAM” Forrester report
  • 15. New identity solutions disrupt…but attract. Or, The good thing about reinventing the wheel is that you can get a round one.* *Douglas Crockford, inventor of JavaScript Object Notation (JSON) 14 © 2011 Forrester Research, Inc. Reproduction Prohibited Source: tom-margie | CC BY-SA 2.0 | flickr.com
  • 16. Emerging standards for IAM interfaces have an edge over traditional ones for Zero Trust Provisioning, Authentication, Authorization, IAM session management, consent, proofing, functionality SSO, federation access control self service Established SOA-friendly standards Emerging web-friendly standards SCIM Connect 15 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 17. Why are these technologies attractive? Security pros’ control diminishes with distance 16 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 18. Agenda Many enterprises aren’t just extended – they’re over-extended. IAM challenges favor Zero Trust and emerging technologies. Plan for the new “Venn” of access control in the API economy. Learn from your peers: Brandish IT carrots instead of sticks. 17 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 19. 18 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 20. OAuth magic: let a person delegate constrained access from one app to another 19 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 21. OpenID Connect magic: turn SSO into a robust OAuth-protected identity API OAuth delegated SAML and OpenID SSO OpenID Connect authorization standardize… standardizes… standardizes… Initiating user’s login session X Initiating user’s login session Initiating user’s login session X Collecting user’s Collecting user’s Collecting user’s consent to share consent to share consent to share attributes attributes attributes X High-security identity High-security identity High-security identity tokens (using JSON tokens (SAML only) tokens Web Tokens) X Distributed and aggregated claims Distributed and aggregated claims X Session timeout Session timeout (on the docket) 20 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 22. An OpenID Connect killer app: “Street Identity” 1. Service provider (SP) needs trusted data 2. Attribute provider (AP) has it 3. Identity provider (IdP) can broker your permission to provide it 4. AP can demand a fee from SP for it 5. Lather, rinse, and repeat for: – Credit scores – Verified email addresses – Proofed identities backed by strong authentication… 21 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 23. OpenID Connect will dramatically lower the price and complexity bar for all identity federation Already exposing customer identities using a draft OpenID Connect-style API Working to expose workforce identities through OpenID Connect LOB apps and smaller partners can get into the federation game more easily; complex SAML-based solutions will see price pressure over time 22 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 24. UMA magic: turn sharing of online access with others into OAuth-derived “privacy by design” solution  Alice-to-Alice, Alice-to-Bob, Alice-to-org…and org-to-org  Claims-based and policy- based authorization – Not just consent  User can impose terms and conditions on requesters – Not just accept terms  Centralizable authorization function – Not just point-to-point 23 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 25. Killer apps for UMA  UMAnized Street Identity: – Centralized management and policy-driven sharing of addresses etc. with anyone  APIified access management: IdP AP – Direct control and auditing of all employee SaaS access PEP RS PDP AS  Zero Trust B2B2C privacy: – Telco allows location sharing today – and health record sharing tomorrow RP client requester 24 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 26. Agenda Many enterprises aren’t just extended – they’re over-extended. IAM challenges favor Zero Trust and emerging technologies. Plan for the new “Venn” of access control in the API economy. Learn from your peers: Brandish IT carrots instead of sticks. 25 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 27. One research organization’s experience with emerging IAM technologies for “Enterprise 2.0” Objectives: Approach:  Unified authentication and  IdP proxy from internal SAML authorization flows for all SSO systems protected resources  Leverage OpenID (and soon  Serve internal and external users OpenID Connect) alike, using internal and external  “Graylist” approach: users take apps responsibility for dynamic external  Remove friction and risk in getting service provider choices all new internal apps to federate – Organization is in charge of whitelists and blacklists  Enable brokered distributed attribute provisioning  Devs partnered with IT from the beginning  Enable use by people with pre- proofed high-quality credentials – Rationale that worked: “Ad hoc login creation is worse” 26 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 28. Its architecture External OP Database DMZ Corporate Firewall Intranet User Data Two-Factor Signon Internal OP Corporate SSO 27 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 29. Its results New internal apps federate “by default” even if they’re in the long tail IT gets a level of comfort by operating production- quality servers itself Dynamic associations with external apps are auditable While they prefer OAuth-based tech, OpenID 2.0 has become legacy already! Not enough external SaaS providers are enabling standardized inbound SSO 28 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 30. Drawing lessons from this experience  Low-usage internal apps aren’t necessarily low- sensitivity apps; protect them by reducing friction  For extranet apps and APIs, think light weight, particularly for partners with unsophisticated IT  Expect protocol discussions to reflect partner power relationships  Bet on “reach” vs. “rich” – in distributed computing, it always wins in the end 29 © 2011 Forrester Research, Inc. Reproduction Prohibited
  • 31. Scott Morrison  CTO, Layer 7 Technologies
  • 32. The Old Enterprise Line of Formal and structured security & connectivity business  VPNs & prop. Protocols for thick clients servers  HTTP(s) for browsers  SOAP+WS-* for B2B Firewall VPN Enterprise Road Network Warriors with VPN SSL WS-S Browser Formal Clients Trading Partners
  • 33. The New Hybrid Enterprise Line of Highly agile security & connectivity business  REST, OAuth, OpenID Connect, UMA servers Firewall Enterprise Mobile Network Devices Clouds Informal, API-driven integrations
  • 34. The Hybrid Enterprise Made Possible By APIs API Server Mobile App An API is a RESTful service Web Client Web App 5 5
  • 35. For Example: GET http://services.layer7.com/staff/Scott 6
  • 36. http://services.layer7.com/staff/Scott For Example: { "firstName": ”Scott ", "lastName" : ”Morrison", ”title" : “CTO”, "address" : { "streetAddress": ”405-1100 Melville", "city" : ”Vancouver", ”prov" : ”BC", "postalCode" : ”V6E 4A6" }, "phoneNumber": [ { "type" : ”office", "number": ”605 681-9377" }, { "type" : ”home", "number": ”604 555-4567" } ] } 7
  • 37. Why Zero Trust? Source: http://www.yurock.net/santa-getting- arrested/
  • 38. A Sensible Response Source: http://skreened.com/impossiblethings6/keep-calm-trust-no-one
  • 39. Or Better Yet: AND USE OAUTH, OPENID CONNECT & UMA
  • 40. What Do These Do? OAuth To get access to an API. OpenID To share information about users. Connect UMA To give a user the power to control how their attributes are shared.
  • 41. Priority #1: OAuth  Make it easy  Make it scale
  • 42. How to Make OAuth Easy Simple, drop-in virtual or hardware Protected gateway SecureSpan Resource  Acts as both Authorization Server (AS) and Gateway Protecting RS Resource Server (RS)  Advanced security on all APIs Directory  Threat detection, audit, QoS mgmt, etc Firewall Enterprise Network SecureSpan Mobile Gateway as Devices AS All Authorization Grants ➠ Authorization code Clouds, Webapps, etc ➠ Implicit Informal, ➠ Resource owner password API-driven credentials integrations ➠ Client credentials
  • 46. How to Make OAuth Web Scale SecureSpan Secure Zone Protected Gateway Resource Firewall 2 cluster RS DMZ Firewall 1 Directory SecureSpan Gateway as Secure Token Store SecureSpan Gateway cluster as AS
  • 47. How to Make OAuth Scale – Architecture Resource provider Internal (secure) network DMZ Internet • Who is asking • Which API? • What scope? • Is token valid? Resource • etc… Accessed when Server API Proxy client requests resources Server • Prove who you are • Authorize entitlement • etc… OVP Accessed when Authorization client Client client requests Server user authorization Store and tokens Token Token Store Server • Create • Check IDMS • Expire • Revoke • etc… Accessible through an LDAP query Endpoints accessible through an API Endpoints accessible through OAuth protocol API
  • 48. Priority #2: Introduce OpenID Connect Resource provider Internal (secure) network DMZ Internet Core • Provide IDtoken • Validate and return claims Resource CheckID Server UserInfo • Provide access token • Get attributes (eg: family_name, picture, gender, birthdate, etc) OVP Optional SessionMgmt client Client Store Optional 1. Refresh endpoint DynamicReg 2. End session endpoint Token Store Discovery IDMS Accessible through an LDAP query Endpoints accessible through an API Endpoints accessible to outside clients
  • 49. Summary  Implement OAuth now! - Don’t roll your own - Plan for failure - Plan for scale  Plan for OpenID Connect - Understand what you need to share - Look to integration with existing identity providers  Keep a very close eye on UMA - This is the missing piece in the puzzle - Maturing very fast
  • 50. Questions? Scott Morrison Eve Maler CTO Principal Analyst Layer 7 Technologies Forrester Research, Inc. smorrison@layer7.com emaler@forrester.com