SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
Identity Management and Access Control
Security and API Management Chapter
Álvaro Alonso – alvaro.alonso@upm.es
FIWARE Security Team
Universidad Politécnica de Madrid
FIWARE Ecosystem
▪ A framework of open source platform components which can be
assembled together and with other third-party components to accelerate
the development of Smart Solutions.
FIWARE Ecosystem
▪ A framework of open source platform components which can be
assembled together and with other third-party components to accelerate
the development of Smart Solutions.
FIWARE Ecosystem
▪ A framework of open source platform components which can be
assembled together and with other third-party components to accelerate
the development of Smart Solutions.
FIWARE Ecosystem
▪ A framework of open source platform components which can be
assembled together and with other third-party components to accelerate
the development of Smart Solutions.
FIWARE Ecosystem
▪ A framework of open source platform components which can be
assembled together and with other third-party components to accelerate
the development of Smart Solutions.
FIWARE Ecosystem
▪ A framework of open source platform components which can be
assembled together and with other third-party components to accelerate
the development of Smart Solutions.
FIWARE Ecosystem
▪ A framework of open source platform components which can be
assembled together and with other third-party components to accelerate
the development of Smart Solutions.
FIWARE Ecosystem
▪ A framework of open source platform components which can be
assembled together and with other third-party components to accelerate
the development of Smart Solutions.
Access Control
IAM Generic Enablers
Identity & Access Control Management
▪ Keyrock – Identity Management
▪ Wilma – PEP Proxy
▪ AuthZForce – Authorization PDP
https://keyrock-fiware.github.io
Keyrock
Main features
Web Interface and Rest API for managing Identity
▪ Users, devices and groups management
▪ OAuth 2.0 and OpenID Connect - Single Sign On
▪ Application - scoped roles and permissions management
▪ Support for local and remote PAP/PDP
▪ JSON Web Tokens (JWT) and Permanent Tokens support
▪ Two factor authentication
▪ MySQL / PostgreSQL and external DB driver
▪ European eID authentication compatibility (CEF eIDAS)
PEP Proxy for securing service backends
▪ Basic and complex AC policies support
▪ OAuth 2.0 Access Tokens support
▪ JSON Web Tokens (JWT) support
▪ Custom PDP configuration
▪ Integrated with API Management tools
• APInf & API Umbrella
• KONG
Wilma
Main features
PAP and PDP Server for managing complex AC policies
▪ XACML-3.0 standard-compliant
▪ Cloud-ready RESTful ABAC framework with XML optimization
▪ Multi-tenant REST API for PDP and PAP
▪ Standards:
▪ OASIS: XACML 3.0 + Profiles (REST, RBAC, Multiple Decision)
▪ ISO: Fast Infoset
▪ Extensible to attribute providers (PIP), functions, etc.
AuthZForce
Main features
Identity and AC Management
OAuth 2.0 flow
IAM Infrastructure
IdM
Service Applica4on
Oauth 2.0 requests
access-token
User info request
Identity and AC Management
Accessing GEs and services
IAM Infrastructure
IdM PAP
Policies DB
PDP
Service Applica8on
Service Backend
PEP
OAuth2 flow
Request
+ token
Check auth
Identity and AC Management
Accessing GEs and services
▪ Level 1: Authentication
▪ Level 2: Basic Authorization
▪ Level 3: Advanced Authorization
Identity and AC Management
Accessing GEs and services
▪ Level 1: Authentication
• Check if a user has been authenticated
▪ Level 2: Basic Authorization
▪ Level 3: Advanced Authorization
Identity and AC Management
Level 1: Authentication
IAM Infrastructure
IdM
Service Application
Service Backend
PEP
OAuth2 flow
Request
+ token
Check
token
Identity and AC Management
Accessing GEs and services
▪ Level 1: Authentication
• Check if a user has been authenticated
▪ Level 2: Basic Authorization
• Checks if a user has permissions to access a resource
• HTTP verb + resource path
▪ Level 3: Advanced Authorization
Identity and AC Management
Level 2: Basic Authorization
IAM Infrastructure
Service Application
Service Backend
PEP
OAuth2 flow
Request
+ token
IdM
PAP
PDP
Check token
& authorization
Identity and AC Management
Accessing GEs and services
▪ Level 1: Authentication
• Check if a user has been authenticated
▪ Level 2: Basic Authorization
• Checks if a user has permissions to access a resource
• HTTP verb + resource path
▪ Level 3: Advanced Authorization
• Custom XACML policies
Identity and AC Management
Level 3: Advanced Authorization
IAM Infrastructure
IdP
Service Application
Service Backend
PEP
OAuth2 flow
Request
+ token
Check
token
PAP
Policies DB
PDP
Check auth
Identity and AC Management
JSON Web Tokens
▪ A JSON Web Token (JWT) is a JSON
object defined in RFC 7519 as a safe
way to represent a set of information
between two parties.
▪ The token is composed of a header, a
payload, and a signature.
IAM Infrastructure
Service Application
Service Backend
PEP
OAuth2 flow
(JWT)
Request
+ JWT
IdM
PAP
PDP
Identity and AC Management
JSON Web Tokens
Token
validation
IAM Infrastructure
Service Application
Service Backend
PEP
OAuth2 flow
(JWT)
Request
+ JWT
IdM
PAP
PDP
Check
authorization
Identity and AC Management
JSON Web Tokens
Token
validation
Keyrock
Identity attributes
▪ Definition of custom attributes in users’ profile
• List of attributes configurable in config file
• Users can define the values in the UI
▪ The attributes are included in the users’ profile returned when
validating a token
▪ Service providers can use them for personalizing the services
▪ Typical use case -> Accessibility
Research paper published at https://doi.org/10.3390/app9183813
Keyrock
Identity attributes
▪ Typical use case -> Accessibility
• Provide interfaces adapted to the users’ functional capabilities
Keyrock
External DB Authentication
▪ SQL/LDAP External Authentication Driver
▪ Documentation available
• https://fiware-
idm.readthedocs.io/en/latest/installation_and_administration_guide/confi
guration/index.html#external-authentication-ldap
OAuth2
Keyrock’s
Database
- Orgs
- Apps
- Roles
- …
LDAP
Server
Users directory
- username
- password
- email
Authentication
check
API Management
API Umbrella & PEP Proxy
Back-end
Request
+
API
Key
Web App
API Umbrella
Back-end Back-end Back-end
API Management
API Umbrella & PEP Proxy
Back
end
App
IAM
Infrastruture
Request
+
access-token
Web App
Oauth
Library
PEP Proxy API Umbrella
access-token
OK + user info (roles)
Oauth2 flows
access_token
Back
end
App
Back
end
App
Back
end
App
eID Integration
CEF eIDAS
▪ eIDAS (electronic IDentification, Authentication and trust
Services) is an EU regulation to enable secure and seamless
electronic interactions between businesses, citizens and public
authorities.
▪ Access to European services by national eID
eIDAS
country 1
eIDAS
country 2
eIDAS
country 3
Service
User
country 2
eID
eID Integration
FIWARE Identity Gateway
▪ Integration of FIWARE Security Framework with eIDAS
▪ Every application registered in Keyrock can be linked to a
eIDAS node
• By an OAuth 2.0 – SAML2 gateway
▪ Users can then authenticate using their national eID
• AC policies based on user eIDAS profile
▪ Transparent for applications providers
eID Integration
FIWARE Identity Gateway
IAM Infrastructure
IdP
Service Application
Oauth 2.0 requests
access-token
User info request
eIDAS
eIDAS
node 1
IdP 1
eIDAS
node 2
IdP 2
…
SAML flow
Authentication
Data Usage Control
▪ Security Framework and Data
Usage Control
• Ensures data sovereignty
• Regulates what is allowed to
happen with the data (future
usage).
▪ Integration with Big Data and
Processing GEs
Data Usage Control
Security GEs documentation
▪ Identity Management – Keyrock
• https://keyrock-fiware.github.io
• https://github.com/ging/fiware-idm
• https://catalogue.fiware.org/enablers/identity-management-keyrock
▪ PEP Proxy – Wilma
• https://github.com/ging/fiware-pep-proxy
• https://catalogue.fiware.org/enablers/pep-proxy-wilma
▪ Authorization PDP – AuthZForce
• https://github.com/authzforce/server
• https://catalogue.fiware.org/enablers/authorization-pdp-authzforce
Thank you!
http://fiware.org
Follow @FIWARE on Twitter

Weitere ähnliche Inhalte

Was ist angesagt?

FIWARE Training: JSON-LD and NGSI-LD
FIWARE Training: JSON-LD and NGSI-LDFIWARE Training: JSON-LD and NGSI-LD
FIWARE Training: JSON-LD and NGSI-LD
FIWARE
 

Was ist angesagt? (20)

Session 4 - Bringing the pieces together - Detailed review of a reference ex...
Session 4 -  Bringing the pieces together - Detailed review of a reference ex...Session 4 -  Bringing the pieces together - Detailed review of a reference ex...
Session 4 - Bringing the pieces together - Detailed review of a reference ex...
 
IdM and AC
IdM and ACIdM and AC
IdM and AC
 
Container Security Deep Dive & Kubernetes
Container Security Deep Dive & Kubernetes Container Security Deep Dive & Kubernetes
Container Security Deep Dive & Kubernetes
 
Creating a Context-Aware solution, Complex Event Processing with FIWARE Perseo
Creating a Context-Aware solution, Complex Event Processing with FIWARE PerseoCreating a Context-Aware solution, Complex Event Processing with FIWARE Perseo
Creating a Context-Aware solution, Complex Event Processing with FIWARE Perseo
 
FIWARE Training: JSON-LD and NGSI-LD
FIWARE Training: JSON-LD and NGSI-LDFIWARE Training: JSON-LD and NGSI-LD
FIWARE Training: JSON-LD and NGSI-LD
 
FIWARE Training: NGSI-LD Advanced Operations
FIWARE Training: NGSI-LD Advanced OperationsFIWARE Training: NGSI-LD Advanced Operations
FIWARE Training: NGSI-LD Advanced Operations
 
Session 2 - NGSI-LD primer & Smart Data Models | Train the Trainers Program
Session 2 - NGSI-LD primer & Smart Data Models | Train the Trainers ProgramSession 2 - NGSI-LD primer & Smart Data Models | Train the Trainers Program
Session 2 - NGSI-LD primer & Smart Data Models | Train the Trainers Program
 
Kong, Keyrock, Keycloak, i4Trust - Options to Secure FIWARE in Production
Kong, Keyrock, Keycloak, i4Trust - Options to Secure FIWARE in ProductionKong, Keyrock, Keycloak, i4Trust - Options to Secure FIWARE in Production
Kong, Keyrock, Keycloak, i4Trust - Options to Secure FIWARE in Production
 
FIWARE Training: NGSI-LD Introduction
FIWARE Training: NGSI-LD IntroductionFIWARE Training: NGSI-LD Introduction
FIWARE Training: NGSI-LD Introduction
 
Designing APIs with OpenAPI Spec
Designing APIs with OpenAPI SpecDesigning APIs with OpenAPI Spec
Designing APIs with OpenAPI Spec
 
Session 3 - i4Trust components for Identity Management and Access Control i4T...
Session 3 - i4Trust components for Identity Management and Access Control i4T...Session 3 - i4Trust components for Identity Management and Access Control i4T...
Session 3 - i4Trust components for Identity Management and Access Control i4T...
 
Hyperledger Indy tutorial
Hyperledger Indy tutorialHyperledger Indy tutorial
Hyperledger Indy tutorial
 
Building secure applications with keycloak
Building secure applications with keycloak Building secure applications with keycloak
Building secure applications with keycloak
 
Using Vault to decouple MySQL Secrets
Using Vault to decouple MySQL SecretsUsing Vault to decouple MySQL Secrets
Using Vault to decouple MySQL Secrets
 
SIngle Sign On with Keycloak
SIngle Sign On with KeycloakSIngle Sign On with Keycloak
SIngle Sign On with Keycloak
 
Deep dive into Kubernetes Networking
Deep dive into Kubernetes NetworkingDeep dive into Kubernetes Networking
Deep dive into Kubernetes Networking
 
FIWARE Training: JSON-LD and NGSI-LD
FIWARE Training: JSON-LD and NGSI-LDFIWARE Training: JSON-LD and NGSI-LD
FIWARE Training: JSON-LD and NGSI-LD
 
Opa gatekeeper
Opa gatekeeperOpa gatekeeper
Opa gatekeeper
 
OpenAPI 3.0, And What It Means for the Future of Swagger
OpenAPI 3.0, And What It Means for the Future of SwaggerOpenAPI 3.0, And What It Means for the Future of Swagger
OpenAPI 3.0, And What It Means for the Future of Swagger
 
Hashicorp Vault ppt
Hashicorp Vault pptHashicorp Vault ppt
Hashicorp Vault ppt
 

Ähnlich wie FIWARE Identity Management and Access Control

Ähnlich wie FIWARE Identity Management and Access Control (20)

FIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access ControlFIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access Control
 
FIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access ControlFIWARE Global Summit - Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access Control
 
FIWARE Global Summit - Keyrock: Protecting Microservices
FIWARE Global Summit - Keyrock: Protecting MicroservicesFIWARE Global Summit - Keyrock: Protecting Microservices
FIWARE Global Summit - Keyrock: Protecting Microservices
 
FIWARE Global Summit - Adding Identity Management, Access Control and API Man...
FIWARE Global Summit - Adding Identity Management, Access Control and API Man...FIWARE Global Summit - Adding Identity Management, Access Control and API Man...
FIWARE Global Summit - Adding Identity Management, Access Control and API Man...
 
Securing FIWARE Architectures
Securing FIWARE ArchitecturesSecuring FIWARE Architectures
Securing FIWARE Architectures
 
FIWARE Identity Management and Access Control
FIWARE Identity Management and Access ControlFIWARE Identity Management and Access Control
FIWARE Identity Management and Access Control
 
Five Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityFive Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern Identity
 
Adding identity management and access control to your app
Adding identity management and access control to your appAdding identity management and access control to your app
Adding identity management and access control to your app
 
Adding Identity Management and Access Control to your App
Adding Identity Management and Access Control to your AppAdding Identity Management and Access Control to your App
Adding Identity Management and Access Control to your App
 
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...
 
API Security in a Microservice Architecture
API Security in a Microservice ArchitectureAPI Security in a Microservice Architecture
API Security in a Microservice Architecture
 
Adding Identity Management and Access Control to your Application
Adding Identity Management and Access Control to your ApplicationAdding Identity Management and Access Control to your Application
Adding Identity Management and Access Control to your Application
 
An Authentication and Authorization Architecture for a Microservices World
An Authentication and Authorization Architecture for a Microservices WorldAn Authentication and Authorization Architecture for a Microservices World
An Authentication and Authorization Architecture for a Microservices World
 
Oauth2.0
Oauth2.0Oauth2.0
Oauth2.0
 
OpenId Connect Protocol
OpenId Connect ProtocolOpenId Connect Protocol
OpenId Connect Protocol
 
FIware Identity Manager
FIware Identity ManagerFIware Identity Manager
FIware Identity Manager
 
WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product Overview
 
Understanding Identity in the World of Web APIs – Ronnie Mitra, API Architec...
Understanding Identity in the World of Web APIs – Ronnie Mitra,  API Architec...Understanding Identity in the World of Web APIs – Ronnie Mitra,  API Architec...
Understanding Identity in the World of Web APIs – Ronnie Mitra, API Architec...
 
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker IdentityFederation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker Identity
 
Implementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with SpringImplementing Microservices Security Patterns & Protocols with Spring
Implementing Microservices Security Patterns & Protocols with Spring
 

Mehr von FIWARE

Cameron Brooks_FGS23_FIWARE Summit_Keynote_Cameron.pptx
Cameron Brooks_FGS23_FIWARE Summit_Keynote_Cameron.pptxCameron Brooks_FGS23_FIWARE Summit_Keynote_Cameron.pptx
Cameron Brooks_FGS23_FIWARE Summit_Keynote_Cameron.pptx
FIWARE
 
Boris Otto_FGS2023_Opening- EU Innovations from Data_PUB_V1_BOt.pptx
Boris Otto_FGS2023_Opening- EU Innovations from Data_PUB_V1_BOt.pptxBoris Otto_FGS2023_Opening- EU Innovations from Data_PUB_V1_BOt.pptx
Boris Otto_FGS2023_Opening- EU Innovations from Data_PUB_V1_BOt.pptx
FIWARE
 
Bjoern de Vidts_FGS23_Opening_athumi - bjord de vidts - personal data spaces....
Bjoern de Vidts_FGS23_Opening_athumi - bjord de vidts - personal data spaces....Bjoern de Vidts_FGS23_Opening_athumi - bjord de vidts - personal data spaces....
Bjoern de Vidts_FGS23_Opening_athumi - bjord de vidts - personal data spaces....
FIWARE
 
Abdulrahman Ibrahim_FGS23 Opening - Abdulrahman Ibrahim.pdf
Abdulrahman Ibrahim_FGS23 Opening - Abdulrahman Ibrahim.pdfAbdulrahman Ibrahim_FGS23 Opening - Abdulrahman Ibrahim.pdf
Abdulrahman Ibrahim_FGS23 Opening - Abdulrahman Ibrahim.pdf
FIWARE
 
FGS2023_Opening_Red Hat Keynote Andrea Battaglia.pdf
FGS2023_Opening_Red Hat Keynote Andrea Battaglia.pdfFGS2023_Opening_Red Hat Keynote Andrea Battaglia.pdf
FGS2023_Opening_Red Hat Keynote Andrea Battaglia.pdf
FIWARE
 

Mehr von FIWARE (20)

Behm_Herne_NeMo_akt.pptx
Behm_Herne_NeMo_akt.pptxBehm_Herne_NeMo_akt.pptx
Behm_Herne_NeMo_akt.pptx
 
Katharina Hogrebe Herne Digital Days.pdf
 Katharina Hogrebe Herne Digital Days.pdf Katharina Hogrebe Herne Digital Days.pdf
Katharina Hogrebe Herne Digital Days.pdf
 
Christoph Mertens_IDSA_Introduction to Data Spaces.pptx
Christoph Mertens_IDSA_Introduction to Data Spaces.pptxChristoph Mertens_IDSA_Introduction to Data Spaces.pptx
Christoph Mertens_IDSA_Introduction to Data Spaces.pptx
 
Behm_Herne_NeMo.pptx
Behm_Herne_NeMo.pptxBehm_Herne_NeMo.pptx
Behm_Herne_NeMo.pptx
 
Evangelists + iHubs Promo Slides.pptx
Evangelists + iHubs Promo Slides.pptxEvangelists + iHubs Promo Slides.pptx
Evangelists + iHubs Promo Slides.pptx
 
Lukas Künzel Smart City Operating System.pptx
Lukas Künzel Smart City Operating System.pptxLukas Künzel Smart City Operating System.pptx
Lukas Künzel Smart City Operating System.pptx
 
Pierre Golz Der Transformationsprozess im Konzern Stadt.pptx
Pierre Golz Der Transformationsprozess im Konzern Stadt.pptxPierre Golz Der Transformationsprozess im Konzern Stadt.pptx
Pierre Golz Der Transformationsprozess im Konzern Stadt.pptx
 
Dennis Wendland_The i4Trust Collaboration Programme.pptx
Dennis Wendland_The i4Trust Collaboration Programme.pptxDennis Wendland_The i4Trust Collaboration Programme.pptx
Dennis Wendland_The i4Trust Collaboration Programme.pptx
 
Ulrich Ahle_FIWARE.pptx
Ulrich Ahle_FIWARE.pptxUlrich Ahle_FIWARE.pptx
Ulrich Ahle_FIWARE.pptx
 
Aleksandar Vrglevski _FIWARE DACH_OSIH.pptx
Aleksandar Vrglevski _FIWARE DACH_OSIH.pptxAleksandar Vrglevski _FIWARE DACH_OSIH.pptx
Aleksandar Vrglevski _FIWARE DACH_OSIH.pptx
 
Water Quality - Lukas Kuenzel.pdf
Water Quality - Lukas Kuenzel.pdfWater Quality - Lukas Kuenzel.pdf
Water Quality - Lukas Kuenzel.pdf
 
Cameron Brooks_FGS23_FIWARE Summit_Keynote_Cameron.pptx
Cameron Brooks_FGS23_FIWARE Summit_Keynote_Cameron.pptxCameron Brooks_FGS23_FIWARE Summit_Keynote_Cameron.pptx
Cameron Brooks_FGS23_FIWARE Summit_Keynote_Cameron.pptx
 
FiWareSummit.msGIS-Data-to-Value.2023.06.12.pptx
FiWareSummit.msGIS-Data-to-Value.2023.06.12.pptxFiWareSummit.msGIS-Data-to-Value.2023.06.12.pptx
FiWareSummit.msGIS-Data-to-Value.2023.06.12.pptx
 
Boris Otto_FGS2023_Opening- EU Innovations from Data_PUB_V1_BOt.pptx
Boris Otto_FGS2023_Opening- EU Innovations from Data_PUB_V1_BOt.pptxBoris Otto_FGS2023_Opening- EU Innovations from Data_PUB_V1_BOt.pptx
Boris Otto_FGS2023_Opening- EU Innovations from Data_PUB_V1_BOt.pptx
 
Bjoern de Vidts_FGS23_Opening_athumi - bjord de vidts - personal data spaces....
Bjoern de Vidts_FGS23_Opening_athumi - bjord de vidts - personal data spaces....Bjoern de Vidts_FGS23_Opening_athumi - bjord de vidts - personal data spaces....
Bjoern de Vidts_FGS23_Opening_athumi - bjord de vidts - personal data spaces....
 
Abdulrahman Ibrahim_FGS23 Opening - Abdulrahman Ibrahim.pdf
Abdulrahman Ibrahim_FGS23 Opening - Abdulrahman Ibrahim.pdfAbdulrahman Ibrahim_FGS23 Opening - Abdulrahman Ibrahim.pdf
Abdulrahman Ibrahim_FGS23 Opening - Abdulrahman Ibrahim.pdf
 
FGS2023_Opening_Red Hat Keynote Andrea Battaglia.pdf
FGS2023_Opening_Red Hat Keynote Andrea Battaglia.pdfFGS2023_Opening_Red Hat Keynote Andrea Battaglia.pdf
FGS2023_Opening_Red Hat Keynote Andrea Battaglia.pdf
 
HTAG_Skalierung_Plattform_lokal_final_versand.pptx
HTAG_Skalierung_Plattform_lokal_final_versand.pptxHTAG_Skalierung_Plattform_lokal_final_versand.pptx
HTAG_Skalierung_Plattform_lokal_final_versand.pptx
 
WE_LoRaWAN _ IoT.pptx
WE_LoRaWAN  _ IoT.pptxWE_LoRaWAN  _ IoT.pptx
WE_LoRaWAN _ IoT.pptx
 
EU Opp_Clara Pezuela - German chapter.pptx
EU Opp_Clara Pezuela - German chapter.pptxEU Opp_Clara Pezuela - German chapter.pptx
EU Opp_Clara Pezuela - German chapter.pptx
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

FIWARE Identity Management and Access Control

  • 1. Identity Management and Access Control Security and API Management Chapter Álvaro Alonso – alvaro.alonso@upm.es FIWARE Security Team Universidad Politécnica de Madrid
  • 2. FIWARE Ecosystem ▪ A framework of open source platform components which can be assembled together and with other third-party components to accelerate the development of Smart Solutions.
  • 3. FIWARE Ecosystem ▪ A framework of open source platform components which can be assembled together and with other third-party components to accelerate the development of Smart Solutions.
  • 4. FIWARE Ecosystem ▪ A framework of open source platform components which can be assembled together and with other third-party components to accelerate the development of Smart Solutions.
  • 5. FIWARE Ecosystem ▪ A framework of open source platform components which can be assembled together and with other third-party components to accelerate the development of Smart Solutions.
  • 6. FIWARE Ecosystem ▪ A framework of open source platform components which can be assembled together and with other third-party components to accelerate the development of Smart Solutions.
  • 7. FIWARE Ecosystem ▪ A framework of open source platform components which can be assembled together and with other third-party components to accelerate the development of Smart Solutions.
  • 8. FIWARE Ecosystem ▪ A framework of open source platform components which can be assembled together and with other third-party components to accelerate the development of Smart Solutions.
  • 9. FIWARE Ecosystem ▪ A framework of open source platform components which can be assembled together and with other third-party components to accelerate the development of Smart Solutions. Access Control
  • 10. IAM Generic Enablers Identity & Access Control Management ▪ Keyrock – Identity Management ▪ Wilma – PEP Proxy ▪ AuthZForce – Authorization PDP
  • 12. Keyrock Main features Web Interface and Rest API for managing Identity ▪ Users, devices and groups management ▪ OAuth 2.0 and OpenID Connect - Single Sign On ▪ Application - scoped roles and permissions management ▪ Support for local and remote PAP/PDP ▪ JSON Web Tokens (JWT) and Permanent Tokens support ▪ Two factor authentication ▪ MySQL / PostgreSQL and external DB driver ▪ European eID authentication compatibility (CEF eIDAS)
  • 13. PEP Proxy for securing service backends ▪ Basic and complex AC policies support ▪ OAuth 2.0 Access Tokens support ▪ JSON Web Tokens (JWT) support ▪ Custom PDP configuration ▪ Integrated with API Management tools • APInf & API Umbrella • KONG Wilma Main features
  • 14. PAP and PDP Server for managing complex AC policies ▪ XACML-3.0 standard-compliant ▪ Cloud-ready RESTful ABAC framework with XML optimization ▪ Multi-tenant REST API for PDP and PAP ▪ Standards: ▪ OASIS: XACML 3.0 + Profiles (REST, RBAC, Multiple Decision) ▪ ISO: Fast Infoset ▪ Extensible to attribute providers (PIP), functions, etc. AuthZForce Main features
  • 15. Identity and AC Management OAuth 2.0 flow IAM Infrastructure IdM Service Applica4on Oauth 2.0 requests access-token User info request
  • 16. Identity and AC Management Accessing GEs and services IAM Infrastructure IdM PAP Policies DB PDP Service Applica8on Service Backend PEP OAuth2 flow Request + token Check auth
  • 17. Identity and AC Management Accessing GEs and services ▪ Level 1: Authentication ▪ Level 2: Basic Authorization ▪ Level 3: Advanced Authorization
  • 18. Identity and AC Management Accessing GEs and services ▪ Level 1: Authentication • Check if a user has been authenticated ▪ Level 2: Basic Authorization ▪ Level 3: Advanced Authorization
  • 19. Identity and AC Management Level 1: Authentication IAM Infrastructure IdM Service Application Service Backend PEP OAuth2 flow Request + token Check token
  • 20. Identity and AC Management Accessing GEs and services ▪ Level 1: Authentication • Check if a user has been authenticated ▪ Level 2: Basic Authorization • Checks if a user has permissions to access a resource • HTTP verb + resource path ▪ Level 3: Advanced Authorization
  • 21. Identity and AC Management Level 2: Basic Authorization IAM Infrastructure Service Application Service Backend PEP OAuth2 flow Request + token IdM PAP PDP Check token & authorization
  • 22. Identity and AC Management Accessing GEs and services ▪ Level 1: Authentication • Check if a user has been authenticated ▪ Level 2: Basic Authorization • Checks if a user has permissions to access a resource • HTTP verb + resource path ▪ Level 3: Advanced Authorization • Custom XACML policies
  • 23. Identity and AC Management Level 3: Advanced Authorization IAM Infrastructure IdP Service Application Service Backend PEP OAuth2 flow Request + token Check token PAP Policies DB PDP Check auth
  • 24. Identity and AC Management JSON Web Tokens ▪ A JSON Web Token (JWT) is a JSON object defined in RFC 7519 as a safe way to represent a set of information between two parties. ▪ The token is composed of a header, a payload, and a signature.
  • 25. IAM Infrastructure Service Application Service Backend PEP OAuth2 flow (JWT) Request + JWT IdM PAP PDP Identity and AC Management JSON Web Tokens Token validation
  • 26. IAM Infrastructure Service Application Service Backend PEP OAuth2 flow (JWT) Request + JWT IdM PAP PDP Check authorization Identity and AC Management JSON Web Tokens Token validation
  • 27. Keyrock Identity attributes ▪ Definition of custom attributes in users’ profile • List of attributes configurable in config file • Users can define the values in the UI ▪ The attributes are included in the users’ profile returned when validating a token ▪ Service providers can use them for personalizing the services ▪ Typical use case -> Accessibility Research paper published at https://doi.org/10.3390/app9183813
  • 28. Keyrock Identity attributes ▪ Typical use case -> Accessibility • Provide interfaces adapted to the users’ functional capabilities
  • 29. Keyrock External DB Authentication ▪ SQL/LDAP External Authentication Driver ▪ Documentation available • https://fiware- idm.readthedocs.io/en/latest/installation_and_administration_guide/confi guration/index.html#external-authentication-ldap OAuth2 Keyrock’s Database - Orgs - Apps - Roles - … LDAP Server Users directory - username - password - email Authentication check
  • 30. API Management API Umbrella & PEP Proxy Back-end Request + API Key Web App API Umbrella Back-end Back-end Back-end
  • 31. API Management API Umbrella & PEP Proxy Back end App IAM Infrastruture Request + access-token Web App Oauth Library PEP Proxy API Umbrella access-token OK + user info (roles) Oauth2 flows access_token Back end App Back end App Back end App
  • 32. eID Integration CEF eIDAS ▪ eIDAS (electronic IDentification, Authentication and trust Services) is an EU regulation to enable secure and seamless electronic interactions between businesses, citizens and public authorities. ▪ Access to European services by national eID eIDAS country 1 eIDAS country 2 eIDAS country 3 Service User country 2 eID
  • 33. eID Integration FIWARE Identity Gateway ▪ Integration of FIWARE Security Framework with eIDAS ▪ Every application registered in Keyrock can be linked to a eIDAS node • By an OAuth 2.0 – SAML2 gateway ▪ Users can then authenticate using their national eID • AC policies based on user eIDAS profile ▪ Transparent for applications providers
  • 34. eID Integration FIWARE Identity Gateway IAM Infrastructure IdP Service Application Oauth 2.0 requests access-token User info request eIDAS eIDAS node 1 IdP 1 eIDAS node 2 IdP 2 … SAML flow Authentication
  • 35. Data Usage Control ▪ Security Framework and Data Usage Control • Ensures data sovereignty • Regulates what is allowed to happen with the data (future usage). ▪ Integration with Big Data and Processing GEs
  • 37. Security GEs documentation ▪ Identity Management – Keyrock • https://keyrock-fiware.github.io • https://github.com/ging/fiware-idm • https://catalogue.fiware.org/enablers/identity-management-keyrock ▪ PEP Proxy – Wilma • https://github.com/ging/fiware-pep-proxy • https://catalogue.fiware.org/enablers/pep-proxy-wilma ▪ Authorization PDP – AuthZForce • https://github.com/authzforce/server • https://catalogue.fiware.org/enablers/authorization-pdp-authzforce