SlideShare ist ein Scribd-Unternehmen logo
1 von 28
XACML pilot at a large Dutch bank
Using XACML to implement context-
enhanced authorizations
Maarten Wegdam, Novay
With contributions of Martijn Oostdijk, Novay
XACML seminar, 26 April 2012




                            www.novay.nl | maarten.wegdam@novay.nl
                            | +31 53 4850414 | @maartenwegdam |
                            http://maarten.wegdam.name (blog) |
                            http://www.linkedin.com/in/wegdam
formerly Telematica
    research & advice
                                Instituut




                               innovation projects
    multi-disciplinairy, ~50
                               (government, financial, health)
     researchers/advisors




2
digital identity,
    Managing Advisor                                    privacy, trust

                                          Maarten
                                         Maarten
                                          Wegdam
                                        Wegdam
      PhD in computer                                   CV: KPN Research,
    science (RuG, UT)                                   Bell Labs, UD@UT




3        XACML pilot - context-enhanced authorization
Authorization & Context?




                                                     (Attribute Based
                                                     Access Control)




4     XACML pilot - context-enhanced authorization
Context-enhanced authz

    • XACML pilot at a large Dutch bank
    • Context = location and more
    • DYNAMIC!! policies
    • Usefulness through use cases +
      feasibility study through demonstrator
    • Scope: employees



5   XACML pilot - context-enhanced authorization
CEA – the movie
    http://youtu.be/lGUprbxJNvE




6   XACML pilot - context-enhanced authorization
I will NOT discuss
    • ABAC
    • XACML

    So I have MORE TIME FOR
    • Context-enhanced authz
    • Use case + demonstrator
    • Lessons learned


7    XACML pilot - context-enhanced authorization
Context and examples
                                 Environment                                   Social
                                                      Physiological
                                    • security                              • SN friends
                                    incidents
                                                       • heart rate
                                                                          • activity twitter




                                    Location
                                 • cell-id, GPS             Time              Mental
                                    • country          • office hours       • stressed
                                   • proximity



                                                                             Activities
                                    Network                Device
                                                                            • travelling
                                     • VPN                 • type
                                                                             • meeting
                                     • Wifi             • ownership
                                                                             • sleeping


8                          XACML pilot - context-enhanced authorization
Use-cases – a high level …

    Read-only outside the office for transactions


    Used device


    User proximity


    Data loss prevention when travelling


9       XACML pilot - context-enhanced authorization
Demonstrator
      Proximity
       dongle                         User                   Application

     NFC reader
                               Context client

       Google
       Latitude

                                                             Policies
       Outlook                                      Policy
                                                    Engine
       Google
      Calendar                                                    Policies incl.
                                                                  ctxt variables
                                   Context
     Device Mgmt                   server

10         XACML pilot - context-enhanced authorization
11   XACML pilot - context-enhanced authorization
12   XACML pilot - context-enhanced authorization
13   XACML pilot - context-enhanced authorization
Our approach: authZ levels
     All
     • @office, proximity, IT-dept. mngd laptop

     A lot
     • @home, proximity, IT-dept. mngd laptop, 6.00-23.00

     Some
     • @office, user mngd (registered) iPad, agenda, 06.00-23.00
     • IT-dept. mngd laptop, proximity, agenda, time in 6.00-23.00

     A little
     • Proximity, registered device

     Nothing

14           XACML pilot - context-enhanced authorization
15   XACML pilot - context-enhanced authorization
16   XACML pilot - context-enhanced authorization
17   XACML pilot - context-enhanced authorization
LESSONS LEARNED


18     XACML pilot - context-enhanced authorization
Main lesson

     YES we can 
 It is useful

 It is feasible using XACML
 tooling

 BUT … (next slides)


19       XACML pilot - context-enhanced authorization
Context – low-hanging fruit
     Location, location, location
     Stuff derived from location
     Used device (BYOD, enterprise mobility etc)
     Used network (VPN/local, access point etc)
     Time-of-day
     Security incidents / events
     And of course normal usage patterns

         Please note: context is just an attribute
20
         for XACML, but then dynamic
     XACML pilot - context-enhanced authorization
Quality of context

     Sensors have limitations


     Context is vague
      (probability, accuracy, outdated)

     Requires knowing how vague, and
     combining context: not trivial!

21   XACML pilot - context-enhanced authorization
Authenticity of context

     Attack by faking or disabling context sources

     We need verification
     • Rely on trusted sources, e.g., company owned
     • Combining multiple sources (cf. quality of context)
     • Context history
     Depends very much on specific scenario


22      XACML pilot - context-enhanced authorization
Trust in context vs usefullness



   needed
   trust in
 authenticity
  of context




23          XACML pilot - context-enhanced authorization
Context is privacy sensitive

     Minimize privacy consequences
      • Limit (centralized) storage
      • Minimize sensing
      • Privacy-by-design, PETs etc
     Acceptance
      • Ensure sufficient benefit for the users!!!
      • Transparency & consent

24   XACML pilot - context-enhanced authorization
Complexity of policies


     Context will increase complexity
     • Complete and conflict free

     Expressing context at high abstraction helps

     Not too high: lose quality and authenticity

     We defined discrete ‘authz levels’


25     XACML pilot - context-enhanced authorization
Scalability & performance

     Typical XACML attribute are static,
     context is not: perf & scalability challenge

     No more caching 

     Pre-fetching context helps performance,
     bad for scalability

26     XACML pilot - context-enhanced authorization
Centralization - take authz out of the application (cf
                  authn)
 Key take-aways

                  Use attributes (ABAC), XACML is the standard to do
                  this multi-vendor and across domains

                  Our pilot: use dynamic attributes (i.e., context)

                  Yes it is useful, yes it is feasible

                  But w.r.t. context: authenticity, quality & privacy

                  But w.r.t. dyn attributes / XACML: complexity of
                  policies & scalability/performance

27                  XACML pilot - context-enhanced authorization
More information
     • Project page @Novay
        • http://www.novay.nl/okb/projects/context-enhanced-authorization/12435
        • Whitepaper: Feasibility of Context-enhanced Authorization , in the banking
          sector
     • Blogposts with more technical XACML experiences
        • http://martijno.blogspot.com/2012/02/xacml-with-tivoli-security-policy.html
     • Ack: Martijn Oostdijk, Bob Hulsebosch, Jaap Reitsma, Ruud
       Kosman & other Novay colleagues, IBM, Rabobank

       www.novay.nl | maarten.wegdam@novay.nl
       | +31 53 4850414 | @maartenwegdam |
       http://maarten.wegdam.name (blog) |
       http://www.linkedin.com/in/wegdam

28            XACML pilot - context-enhanced authorization

Weitere ähnliche Inhalte

Ähnlich wie XACML pilot at a large Dutch bank, Using XACML to implement context-enhanced authorizations

Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computingikanow
 
Cloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium BusinessesCloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium BusinessesAl Sabawi
 
Cloudy with a chance of downtime
Cloudy with a chance of downtimeCloudy with a chance of downtime
Cloudy with a chance of downtimeAFCOM
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfChinatu Uzuegbu
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesCloudPassage
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementOracleIDM
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Kalix: Tackling the The Cloud to Edge Continuum
Kalix: Tackling the The Cloud to Edge ContinuumKalix: Tackling the The Cloud to Edge Continuum
Kalix: Tackling the The Cloud to Edge ContinuumJonas Bonér
 
PCTY 2012, Risk Based Access Control v. Pat Wardrop
PCTY 2012, Risk Based Access Control v. Pat WardropPCTY 2012, Risk Based Access Control v. Pat Wardrop
PCTY 2012, Risk Based Access Control v. Pat WardropIBM Danmark
 
Fosec2011 keynote address
Fosec2011 keynote addressFosec2011 keynote address
Fosec2011 keynote addressthreesixty
 
Big data movement webcast
Big data movement webcastBig data movement webcast
Big data movement webcasttervela
 
DSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGADSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGAAndris Soroka
 
Making Sense of the Cloud
Making Sense of the CloudMaking Sense of the Cloud
Making Sense of the CloudSpiceworks
 
Govcert2011 - Context-enhanced Authorization
Govcert2011 - Context-enhanced AuthorizationGovcert2011 - Context-enhanced Authorization
Govcert2011 - Context-enhanced AuthorizationMartijn Oostdijk
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloudAjay Rathi
 
Blueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT ProductBlueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT ProductGuy Vinograd ☁
 
DLT analytics and AI workshop 13 march 2019
DLT analytics and AI workshop   13 march  2019DLT analytics and AI workshop   13 march  2019
DLT analytics and AI workshop 13 march 2019Stavros Zervoudakis
 
Ciso executive forum 2013
Ciso executive forum 2013Ciso executive forum 2013
Ciso executive forum 2013Bill Burns
 

Ähnlich wie XACML pilot at a large Dutch bank, Using XACML to implement context-enhanced authorizations (20)

Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
 
Cloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium BusinessesCloud Computing for Small & Medium Businesses
Cloud Computing for Small & Medium Businesses
 
Cloudy with a chance of downtime
Cloudy with a chance of downtimeCloudy with a chance of downtime
Cloudy with a chance of downtime
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud Guidelines
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Kalix: Tackling the The Cloud to Edge Continuum
Kalix: Tackling the The Cloud to Edge ContinuumKalix: Tackling the The Cloud to Edge Continuum
Kalix: Tackling the The Cloud to Edge Continuum
 
PCTY 2012, Risk Based Access Control v. Pat Wardrop
PCTY 2012, Risk Based Access Control v. Pat WardropPCTY 2012, Risk Based Access Control v. Pat Wardrop
PCTY 2012, Risk Based Access Control v. Pat Wardrop
 
Rubik cloud risks-jun2012
Rubik cloud risks-jun2012Rubik cloud risks-jun2012
Rubik cloud risks-jun2012
 
Fosec2011 keynote address
Fosec2011 keynote addressFosec2011 keynote address
Fosec2011 keynote address
 
Big data movement webcast
Big data movement webcastBig data movement webcast
Big data movement webcast
 
DSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGADSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGA
 
Making Sense of the Cloud
Making Sense of the CloudMaking Sense of the Cloud
Making Sense of the Cloud
 
Govcert2011 - Context-enhanced Authorization
Govcert2011 - Context-enhanced AuthorizationGovcert2011 - Context-enhanced Authorization
Govcert2011 - Context-enhanced Authorization
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
 
Blueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT ProductBlueprint for creating a Secure IoT Product
Blueprint for creating a Secure IoT Product
 
DLT analytics and AI workshop 13 march 2019
DLT analytics and AI workshop   13 march  2019DLT analytics and AI workshop   13 march  2019
DLT analytics and AI workshop 13 march 2019
 
Ciso executive forum 2013
Ciso executive forum 2013Ciso executive forum 2013
Ciso executive forum 2013
 

Mehr von wegdam

Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...
Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...
Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...wegdam
 
Digital onboarding: selfie-check with passport, a case study
Digital onboarding: selfie-check with passport, a case studyDigital onboarding: selfie-check with passport, a case study
Digital onboarding: selfie-check with passport, a case studywegdam
 
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...wegdam
 
FIDOs place in the identity ecosystem
FIDOs place in the identity ecosystemFIDOs place in the identity ecosystem
FIDOs place in the identity ecosystemwegdam
 
AWARENESS overview @ closing working - context-aware mobile health (March 2008)
AWARENESS overview @ closing working - context-aware mobile health (March 2008)AWARENESS overview @ closing working - context-aware mobile health (March 2008)
AWARENESS overview @ closing working - context-aware mobile health (March 2008)wegdam
 
#SNRD12 Maak student baas over eigen data
#SNRD12 Maak student baas over eigen data#SNRD12 Maak student baas over eigen data
#SNRD12 Maak student baas over eigen datawegdam
 
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobiel
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobielNovay Tuesday Update - Digitale identiteiten: herbruikbaar en mobiel
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobielwegdam
 
Cloud privacy & security - Een verkenning van tools en technieken
Cloud privacy & security - Een verkenning van tools en techniekenCloud privacy & security - Een verkenning van tools en technieken
Cloud privacy & security - Een verkenning van tools en techniekenwegdam
 
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...wegdam
 
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...wegdam
 
The user perspective on consent for identity federations (TNC 2011)
The user perspective on consent for identity federations (TNC 2011)The user perspective on consent for identity federations (TNC 2011)
The user perspective on consent for identity federations (TNC 2011)wegdam
 
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...wegdam
 
User controlled privacy voor de SURFfederatie
User controlled privacy voor de SURFfederatieUser controlled privacy voor de SURFfederatie
User controlled privacy voor de SURFfederatiewegdam
 
cidSafe project, 23 September 2010, for EEMA event
cidSafe project, 23 September 2010, for EEMA eventcidSafe project, 23 September 2010, for EEMA event
cidSafe project, 23 September 2010, for EEMA eventwegdam
 
2de cid safe netwerkbijeenkomst (Dutch, 29
2de cid safe netwerkbijeenkomst (Dutch, 292de cid safe netwerkbijeenkomst (Dutch, 29
2de cid safe netwerkbijeenkomst (Dutch, 29wegdam
 
User consent for consumer identity (@ISSE2010)
User consent for consumer identity (@ISSE2010)User consent for consumer identity (@ISSE2010)
User consent for consumer identity (@ISSE2010)wegdam
 
cidSafe project overview (in Dutch!!!)
cidSafe project overview (in Dutch!!!)cidSafe project overview (in Dutch!!!)
cidSafe project overview (in Dutch!!!)wegdam
 
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...wegdam
 
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)wegdam
 
Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010wegdam
 

Mehr von wegdam (20)

Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...
Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...
Van irisscan tot kontafdruk- biometrische authenticatie anno 2017 - Heliview ...
 
Digital onboarding: selfie-check with passport, a case study
Digital onboarding: selfie-check with passport, a case studyDigital onboarding: selfie-check with passport, a case study
Digital onboarding: selfie-check with passport, a case study
 
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...
Banken als identiteitsproviders (BankID, eID Stelsel) - PIMN / ECP bijeenkoms...
 
FIDOs place in the identity ecosystem
FIDOs place in the identity ecosystemFIDOs place in the identity ecosystem
FIDOs place in the identity ecosystem
 
AWARENESS overview @ closing working - context-aware mobile health (March 2008)
AWARENESS overview @ closing working - context-aware mobile health (March 2008)AWARENESS overview @ closing working - context-aware mobile health (March 2008)
AWARENESS overview @ closing working - context-aware mobile health (March 2008)
 
#SNRD12 Maak student baas over eigen data
#SNRD12 Maak student baas over eigen data#SNRD12 Maak student baas over eigen data
#SNRD12 Maak student baas over eigen data
 
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobiel
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobielNovay Tuesday Update - Digitale identiteiten: herbruikbaar en mobiel
Novay Tuesday Update - Digitale identiteiten: herbruikbaar en mobiel
 
Cloud privacy & security - Een verkenning van tools en technieken
Cloud privacy & security - Een verkenning van tools en techniekenCloud privacy & security - Een verkenning van tools en technieken
Cloud privacy & security - Een verkenning van tools en technieken
 
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...
Identiteit & Authenticatie voor UMCs SIG Informatie Beveiliging IAM themadag ...
 
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...
Digitale identiteiten: vertrouwen, identity providers en de toekomst (Novay T...
 
The user perspective on consent for identity federations (TNC 2011)
The user perspective on consent for identity federations (TNC 2011)The user perspective on consent for identity federations (TNC 2011)
The user perspective on consent for identity federations (TNC 2011)
 
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...
Consumer and Citizen Identities: Government Issued or Trust Frameworks? (Euro...
 
User controlled privacy voor de SURFfederatie
User controlled privacy voor de SURFfederatieUser controlled privacy voor de SURFfederatie
User controlled privacy voor de SURFfederatie
 
cidSafe project, 23 September 2010, for EEMA event
cidSafe project, 23 September 2010, for EEMA eventcidSafe project, 23 September 2010, for EEMA event
cidSafe project, 23 September 2010, for EEMA event
 
2de cid safe netwerkbijeenkomst (Dutch, 29
2de cid safe netwerkbijeenkomst (Dutch, 292de cid safe netwerkbijeenkomst (Dutch, 29
2de cid safe netwerkbijeenkomst (Dutch, 29
 
User consent for consumer identity (@ISSE2010)
User consent for consumer identity (@ISSE2010)User consent for consumer identity (@ISSE2010)
User consent for consumer identity (@ISSE2010)
 
cidSafe project overview (in Dutch!!!)
cidSafe project overview (in Dutch!!!)cidSafe project overview (in Dutch!!!)
cidSafe project overview (in Dutch!!!)
 
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
Consumer Identity: a Dutch Perspective on Benefits, Issues and Next Steps (EI...
 
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)
OpenIdplus.nl Proof of Concept uitkomsten (in Dutch)
 
Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010
 

Kürzlich hochgeladen

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 

Kürzlich hochgeladen (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 

XACML pilot at a large Dutch bank, Using XACML to implement context-enhanced authorizations

  • 1. XACML pilot at a large Dutch bank Using XACML to implement context- enhanced authorizations Maarten Wegdam, Novay With contributions of Martijn Oostdijk, Novay XACML seminar, 26 April 2012 www.novay.nl | maarten.wegdam@novay.nl | +31 53 4850414 | @maartenwegdam | http://maarten.wegdam.name (blog) | http://www.linkedin.com/in/wegdam
  • 2. formerly Telematica research & advice Instituut innovation projects multi-disciplinairy, ~50 (government, financial, health) researchers/advisors 2
  • 3. digital identity, Managing Advisor privacy, trust Maarten Maarten Wegdam Wegdam PhD in computer CV: KPN Research, science (RuG, UT) Bell Labs, UD@UT 3 XACML pilot - context-enhanced authorization
  • 4. Authorization & Context? (Attribute Based Access Control) 4 XACML pilot - context-enhanced authorization
  • 5. Context-enhanced authz • XACML pilot at a large Dutch bank • Context = location and more • DYNAMIC!! policies • Usefulness through use cases + feasibility study through demonstrator • Scope: employees 5 XACML pilot - context-enhanced authorization
  • 6. CEA – the movie http://youtu.be/lGUprbxJNvE 6 XACML pilot - context-enhanced authorization
  • 7. I will NOT discuss • ABAC • XACML So I have MORE TIME FOR • Context-enhanced authz • Use case + demonstrator • Lessons learned 7 XACML pilot - context-enhanced authorization
  • 8. Context and examples Environment Social Physiological • security • SN friends incidents • heart rate • activity twitter Location • cell-id, GPS Time Mental • country • office hours • stressed • proximity Activities Network Device • travelling • VPN • type • meeting • Wifi • ownership • sleeping 8 XACML pilot - context-enhanced authorization
  • 9. Use-cases – a high level … Read-only outside the office for transactions Used device User proximity Data loss prevention when travelling 9 XACML pilot - context-enhanced authorization
  • 10. Demonstrator Proximity dongle User Application NFC reader Context client Google Latitude Policies Outlook Policy Engine Google Calendar Policies incl. ctxt variables Context Device Mgmt server 10 XACML pilot - context-enhanced authorization
  • 11. 11 XACML pilot - context-enhanced authorization
  • 12. 12 XACML pilot - context-enhanced authorization
  • 13. 13 XACML pilot - context-enhanced authorization
  • 14. Our approach: authZ levels All • @office, proximity, IT-dept. mngd laptop A lot • @home, proximity, IT-dept. mngd laptop, 6.00-23.00 Some • @office, user mngd (registered) iPad, agenda, 06.00-23.00 • IT-dept. mngd laptop, proximity, agenda, time in 6.00-23.00 A little • Proximity, registered device Nothing 14 XACML pilot - context-enhanced authorization
  • 15. 15 XACML pilot - context-enhanced authorization
  • 16. 16 XACML pilot - context-enhanced authorization
  • 17. 17 XACML pilot - context-enhanced authorization
  • 18. LESSONS LEARNED 18 XACML pilot - context-enhanced authorization
  • 19. Main lesson YES we can  It is useful It is feasible using XACML tooling BUT … (next slides) 19 XACML pilot - context-enhanced authorization
  • 20. Context – low-hanging fruit Location, location, location Stuff derived from location Used device (BYOD, enterprise mobility etc) Used network (VPN/local, access point etc) Time-of-day Security incidents / events And of course normal usage patterns Please note: context is just an attribute 20 for XACML, but then dynamic XACML pilot - context-enhanced authorization
  • 21. Quality of context Sensors have limitations Context is vague (probability, accuracy, outdated) Requires knowing how vague, and combining context: not trivial! 21 XACML pilot - context-enhanced authorization
  • 22. Authenticity of context Attack by faking or disabling context sources We need verification • Rely on trusted sources, e.g., company owned • Combining multiple sources (cf. quality of context) • Context history Depends very much on specific scenario 22 XACML pilot - context-enhanced authorization
  • 23. Trust in context vs usefullness needed trust in authenticity of context 23 XACML pilot - context-enhanced authorization
  • 24. Context is privacy sensitive Minimize privacy consequences • Limit (centralized) storage • Minimize sensing • Privacy-by-design, PETs etc Acceptance • Ensure sufficient benefit for the users!!! • Transparency & consent 24 XACML pilot - context-enhanced authorization
  • 25. Complexity of policies Context will increase complexity • Complete and conflict free Expressing context at high abstraction helps Not too high: lose quality and authenticity We defined discrete ‘authz levels’ 25 XACML pilot - context-enhanced authorization
  • 26. Scalability & performance Typical XACML attribute are static, context is not: perf & scalability challenge No more caching  Pre-fetching context helps performance, bad for scalability 26 XACML pilot - context-enhanced authorization
  • 27. Centralization - take authz out of the application (cf authn) Key take-aways Use attributes (ABAC), XACML is the standard to do this multi-vendor and across domains Our pilot: use dynamic attributes (i.e., context) Yes it is useful, yes it is feasible But w.r.t. context: authenticity, quality & privacy But w.r.t. dyn attributes / XACML: complexity of policies & scalability/performance 27 XACML pilot - context-enhanced authorization
  • 28. More information • Project page @Novay • http://www.novay.nl/okb/projects/context-enhanced-authorization/12435 • Whitepaper: Feasibility of Context-enhanced Authorization , in the banking sector • Blogposts with more technical XACML experiences • http://martijno.blogspot.com/2012/02/xacml-with-tivoli-security-policy.html • Ack: Martijn Oostdijk, Bob Hulsebosch, Jaap Reitsma, Ruud Kosman & other Novay colleagues, IBM, Rabobank www.novay.nl | maarten.wegdam@novay.nl | +31 53 4850414 | @maartenwegdam | http://maarten.wegdam.name (blog) | http://www.linkedin.com/in/wegdam 28 XACML pilot - context-enhanced authorization