SlideShare a Scribd company logo
1 of 33
3rd SG13 Regional Workshop for Africa on โ€œITU-T
Standardization Challenges for Developing Countries
Working for a Connected Africaโ€
(Livingstone, Zambia, 23-24 February 2015)
IDENTITY MANAGEMENT
STANDARDIZATION IN THE CLOUD
COMPUTING
MOUNIR FERJANI
Product Manager, Huawei Technologies
mounir.ferjani@huawei.com
AGENDA
โ€ข Access Control
โ€ข Identity paradigm
โ€ข Cloud identity management Scenarios
โ€ข Use Cases and Challenges for identity
standardization
โ€ข SCIM core Schema
โ€ข SCIM Protocols
โ€ข Shortcomings
Access control
โ€ข Access control is concerned with determining
the allowed activities of legitimate users,
mediating every attempt by a user to access a
resource in the system.
NIST 7316
RBAC
โ€ข Role-based policies require the identification of roles in the system.
A role is a collection of permissions to use resources appropriate to
a person's job function
โ€ข Least privilege : ensure users have access to only the resources they
need
โ€ข automate access certification processes from start to finish to meet
ongoing compliance requirements
โ€“ Policies : separation-of-duties
Developer
Budget
Manager
Help Desk
Representative
Director
ABAC
NIST SP 800-162
Authorization and Access control
create special challenges for identity
management
Identity
The first concept of
identity is a set of
identifiers or attributes.
NIST sp800-103-draft
ID for online
banking
ID to request
certificates
ID to purchase
flights
ID for online
magazines
E-Commerce
ID
ID for social
network
Identifiers
Unique
Identity
(ID)
Attributes Secret
Certificates
Kerberos
Client
AS
TGS
Server
TGT
Client-to-server Ticket
Ticket = Client ID, Client network address,
Validity Period, Client/Server Session Key
SAML Assertions
Assertion ID
Issue Instant
Issuer
Subject
Asserted Attributes
Not Before
Not After
Subject (user identity)
Authentication instant
Authentication
mechanism
Digital Signature
Identity Management
โ€ข Directory services :
โ€“ AD, LDAP, RADIUS
โ€ข Identity providers
โ€“ PKI
โ€“ SAML : exchange ID via web XML
โ€ข OpenID
โ€“ RP : Relying parties
โ€ข WS security : SOAP extension
โ€ข Oauth
Identity Provisioning History
Cloud computing
โ€ข Paradigm for enabling network access to a scalable
and elastic pool of shareable physical or virtual
resources with self-service provisioning and
administration on-demand
โ€“ NOTE โ€“ Examples of resources include servers, operating
systems, networks, software, applications, and storage
equipment.
โ€ข ISO/IEC 17788 | Recommendation ITU-T Y.3500
13
Characteristics
โ€ข On-demand self-service
โ€ข Broad network access
โ€ข Resource pooling
โ€ข Rapid elasticity
โ€ข Measured service
14
Cloud User Ownership change (1)
โ€ข CSP has a multitenant cloud platform
โ€ข User 1 and user 2 belong to enterprise
โ€ข Enterprise is tenant
โ€ข Enterprise is customer of CSP
โ€ข User1 and user 2 are entitled with different identities to access
subjects (files)
โ€ข If user 1 leaves enterprise, enterprise will ask CSP to change identity
ownership to user 2
Cloud User Ownership change (2)
โ€ข Requirements :
โ€“ Secure communication protocols between tenant
and CSPs
โ€“ CSP can enforce identity change
โ€“ Secure log of all identity change availabe for
auditing
Migration of the identities
โ€ข Enterprise is customer of CSP1 and has app 1
managing identity information.
โ€ข Enterprise becomes customer of CSP2 and has
app 2 managing identity information.
โ€ข Applications and CSP providers support the same
identity format& protocol standard
โ€“ Format of identity
โ€“ Protocol for managing identities
Identity federation between cloud
providers
โ€ข User has an account with application hosted by a CSP1.
โ€ข User requests a service from an application running on
CSP2 relying on user's authentication by CSP1 and
using identity information provided by CSP1
โ€ข Trust model establishment between CSPs :
โ€“ How to securely provide identity information (protocol)
โ€“ How to verify received identity information
โ€“ How to process the identity information received
Simple Cloud Identity Management
โ€ข SCIM group : System for Cross-domain Identity
Management
โ€“ Standardize methods for creating, reading, searching,
modifying, and deleting user identities and identity-
related objects across administrative domains, with
the goal of simplifying common tasks related to user
identity management in services and applications.
โ€“ SCIM 1.0.
โ€“ Protocol : draft-ietf-scim-api-15
โ€“ Schema : draft-ietf-scim-core-schema-15
Schema
โ€ข SCIM schema provides a minimal core schema for
representing users and groups (resources)
โ€ข Resource is a collection of attributes identified by one
or more schemas.
โ€ข Minimally, an attribute consists of the attribute name
and at least one simple or complex value either of
which may be multi- valued.
โ€ข For each attribute, SCIM schema defines the data type,
plurality, mutability, and other distinguishing features
of an attribute.
Resources
Resource Type
Schema Attribute
Common Attributes
Core Attributes
Extended Attributes
Resource Type
Name
Description
Resource Type
Endpoint
Schema
SchemaExtensions
Resource
Common Attributes
ID
External ID
Common Attributes
Meta
Resource
Created Last modified
Location
Version
User resource schema
โ€ข Single attributes :
โ€“ Username
โ€“ Name
โ€“ Display name
โ€“ Nick name
โ€“ Title
โ€“ Timezone
โ€“ Active
โ€“ Password
User & Group resource schema
โ€ข User
โ€“ Multi-valued attributes
โ€ข Emails
โ€ข Phone numbers
โ€ข Addresses
โ€ข Photos
โ€ข Groups
โ€ข Entitlement
โ€ข Certificates (X509)
โ€ข Roles
โ€ข Group
โ€“ Display name
โ€“ Members
Service Provider Schema
โ€ข Single attributes
โ€“ documentationUrl
โ€“ changePassword
โ€“ authenticationSchemes
{ "schemas": [
"urn:ietf:params:scim:schemas:core:2.0:
ServiceProviderConfig" ],
"documentationUrl":"http://example.co
m/help/scim.html",
โ€ฆโ€ฆ
โ€ฆโ€ฆ
"authenticationSchemes": [ { "name":
"OAuth Bearer Token", "description":
"Authentication Scheme using the OAuth
Bearer Token Standard", "specUrl":
"http://tools.ietf.org/html/draft-ietf-
oauth-v2-bearer-01", โ€ฆโ€ฆโ€ฆ.
SCIM protocol API
โ€ข REST API
โ€“ Create Resource
โ€“ Retrieving Resources
โ€“ Modifying Resources
โ€“ Deleting Resources
Identity synchronization
โ€ข CSPs need to integrate with existing systems :
โ€“ Billing
โ€“ Accounting
โ€“ Contract Management
โ€ข Identity formats
โ€ข Format exchange protocol
Cloud Resources provisioning
โ€ข Cloud service automatic provisioning
โ€ข Workflows definition
โ€“ Automation layer manage provisioning engines
โ€“ Provisioning engines act on resources using APIs
โ€ข The need to Protection Profile for Hypervisor APIs
โ€“ Identity of objects belonging to orchestration
โ€“ Protocol for exchange
Cloud Resources de-provisioning
lifecycle
โ€ข Automatic Cloud service de-provisioning
โ€“ User
โ€“ Due to contract stopping for postpaid modes
โ€“ Due to end of validity period
โ€ข Freeze and delete
โ€ข Internal : from orchestration linked to time servers
โ€ข Auto de-provisioning request :
โ€“ Identity of time servers
โ€“ Identity of external systems (billing, โ€ฆ)
โ€“ Identity of objects inside de-provisioning engine
Summary
โ€ข Need for :
โ€“ Open standards for identity and access management in the
cloud
โ€“ Identity interoperability
โ€“ Identity orchestration
โ€ข Shortcomings of SCIM :
โ€“ Do not specify identity for resource pools APIs : like Hypervisor
APIs (vdisk APIs, storage APIs, VM provision APIs, SaaS APIsโ€ฆ)
โ€“ Do not define identity for Broker APIs
โ€“ Do not define authentication mechanisms : the choice of
authentication mechanism will impact interoperability
Proposals to ITU
โ€ข Define a digital identity framework for the
cloud computing
โ€“ Format, Protocols, APIs, secure digital identity,
interoperable digital identity
โ€ข Define minimum security requirements for the
cloud identity service (PKI, relying or third
parties,โ€ฆ)
Thank You
Q&A

More Related Content

Similar to Identity Management Standardization in the cloud computing

dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
Anne Starr
ย 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak
ย 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns
WSO2
ย 
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
mfrancis
ย 
OpenIDM 3.0 - What's New
OpenIDM 3.0 - What's NewOpenIDM 3.0 - What's New
OpenIDM 3.0 - What's New
ForgeRock
ย 
APIโ€™s and Micro Services 0.5
APIโ€™s and Micro Services 0.5APIโ€™s and Micro Services 0.5
APIโ€™s and Micro Services 0.5
Richard Hudson
ย 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
Anne Starr
ย 
1588487811-chp-11-c-enterprise-application-integration.ppt
1588487811-chp-11-c-enterprise-application-integration.ppt1588487811-chp-11-c-enterprise-application-integration.ppt
1588487811-chp-11-c-enterprise-application-integration.ppt
KalsoomTahir2
ย 

Similar to Identity Management Standardization in the cloud computing (20)

talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
ย 
Predix
PredixPredix
Predix
ย 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
ย 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
ย 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
ย 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns
ย 
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
Enabling Technologies for Branded Wireless Services - Boris Klots, Motorola, ...
ย 
OpenIDM 3.0 - What's New
OpenIDM 3.0 - What's NewOpenIDM 3.0 - What's New
OpenIDM 3.0 - What's New
ย 
Creating a Centralized Consumer Profile Management Service with WebSphere Dat...
Creating a Centralized Consumer Profile Management Service with WebSphere Dat...Creating a Centralized Consumer Profile Management Service with WebSphere Dat...
Creating a Centralized Consumer Profile Management Service with WebSphere Dat...
ย 
Presentation cisco intelligent automation for cloud
Presentation   cisco intelligent automation for cloudPresentation   cisco intelligent automation for cloud
Presentation cisco intelligent automation for cloud
ย 
Cloud Security Guidance from CESG and AWS
Cloud Security Guidance from CESG and AWSCloud Security Guidance from CESG and AWS
Cloud Security Guidance from CESG and AWS
ย 
APIโ€™s and Micro Services 0.5
APIโ€™s and Micro Services 0.5APIโ€™s and Micro Services 0.5
APIโ€™s and Micro Services 0.5
ย 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services
ย 
ISTIO Deep Dive
ISTIO Deep DiveISTIO Deep Dive
ISTIO Deep Dive
ย 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
ย 
Grid computing 2 (1)
Grid computing 2 (1)Grid computing 2 (1)
Grid computing 2 (1)
ย 
Centrify Access Manager Presentation.pptx
Centrify Access Manager Presentation.pptxCentrify Access Manager Presentation.pptx
Centrify Access Manager Presentation.pptx
ย 
1588487811-chp-11-c-enterprise-application-integration.ppt
1588487811-chp-11-c-enterprise-application-integration.ppt1588487811-chp-11-c-enterprise-application-integration.ppt
1588487811-chp-11-c-enterprise-application-integration.ppt
ย 
--Enterprise-Application-Integration.ppt
--Enterprise-Application-Integration.ppt--Enterprise-Application-Integration.ppt
--Enterprise-Application-Integration.ppt
ย 
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud ComputingVTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
VTU Open Elective 6th Sem CSE - Module 2 - Cloud Computing
ย 

Recently uploaded

VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
singhpriety023
ย 
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐ŸฅตLow Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Chandigarh Call girls 9053900678 Call girls in Chandigarh
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
SUHANI PANDEY
ย 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
SUHANI PANDEY
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
SUHANI PANDEY
ย 
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
soniya singh
ย 

Recently uploaded (20)

VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
ย 
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
All Time Service Available Call Girls Mg Road ๐Ÿ‘Œ โญ๏ธ 6378878445
ย 
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas โ˜Ž 9711199171 Book Your One night Stand
ย 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
ย 
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
ย 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
ย 
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐ŸฅตLow Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
ย 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
ย 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
ย 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
ย 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
ย 
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
ย 
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
ย 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
ย 
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
ย 
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort ServiceBusty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
Busty DesiโšกCall Girls in Vasundhara Ghaziabad >เผ’8448380779 Escort Service
ย 

Identity Management Standardization in the cloud computing

  • 1. 3rd SG13 Regional Workshop for Africa on โ€œITU-T Standardization Challenges for Developing Countries Working for a Connected Africaโ€ (Livingstone, Zambia, 23-24 February 2015) IDENTITY MANAGEMENT STANDARDIZATION IN THE CLOUD COMPUTING MOUNIR FERJANI Product Manager, Huawei Technologies mounir.ferjani@huawei.com
  • 2. AGENDA โ€ข Access Control โ€ข Identity paradigm โ€ข Cloud identity management Scenarios โ€ข Use Cases and Challenges for identity standardization โ€ข SCIM core Schema โ€ข SCIM Protocols โ€ข Shortcomings
  • 3. Access control โ€ข Access control is concerned with determining the allowed activities of legitimate users, mediating every attempt by a user to access a resource in the system. NIST 7316
  • 4. RBAC โ€ข Role-based policies require the identification of roles in the system. A role is a collection of permissions to use resources appropriate to a person's job function โ€ข Least privilege : ensure users have access to only the resources they need โ€ข automate access certification processes from start to finish to meet ongoing compliance requirements โ€“ Policies : separation-of-duties Developer Budget Manager Help Desk Representative Director
  • 6. Authorization and Access control create special challenges for identity management
  • 7. Identity The first concept of identity is a set of identifiers or attributes. NIST sp800-103-draft ID for online banking ID to request certificates ID to purchase flights ID for online magazines E-Commerce ID ID for social network Identifiers Unique Identity (ID) Attributes Secret
  • 9. Kerberos Client AS TGS Server TGT Client-to-server Ticket Ticket = Client ID, Client network address, Validity Period, Client/Server Session Key
  • 10. SAML Assertions Assertion ID Issue Instant Issuer Subject Asserted Attributes Not Before Not After Subject (user identity) Authentication instant Authentication mechanism Digital Signature
  • 11. Identity Management โ€ข Directory services : โ€“ AD, LDAP, RADIUS โ€ข Identity providers โ€“ PKI โ€“ SAML : exchange ID via web XML โ€ข OpenID โ€“ RP : Relying parties โ€ข WS security : SOAP extension โ€ข Oauth
  • 13. Cloud computing โ€ข Paradigm for enabling network access to a scalable and elastic pool of shareable physical or virtual resources with self-service provisioning and administration on-demand โ€“ NOTE โ€“ Examples of resources include servers, operating systems, networks, software, applications, and storage equipment. โ€ข ISO/IEC 17788 | Recommendation ITU-T Y.3500 13
  • 14. Characteristics โ€ข On-demand self-service โ€ข Broad network access โ€ข Resource pooling โ€ข Rapid elasticity โ€ข Measured service 14
  • 15. Cloud User Ownership change (1) โ€ข CSP has a multitenant cloud platform โ€ข User 1 and user 2 belong to enterprise โ€ข Enterprise is tenant โ€ข Enterprise is customer of CSP โ€ข User1 and user 2 are entitled with different identities to access subjects (files) โ€ข If user 1 leaves enterprise, enterprise will ask CSP to change identity ownership to user 2
  • 16. Cloud User Ownership change (2) โ€ข Requirements : โ€“ Secure communication protocols between tenant and CSPs โ€“ CSP can enforce identity change โ€“ Secure log of all identity change availabe for auditing
  • 17. Migration of the identities โ€ข Enterprise is customer of CSP1 and has app 1 managing identity information. โ€ข Enterprise becomes customer of CSP2 and has app 2 managing identity information. โ€ข Applications and CSP providers support the same identity format& protocol standard โ€“ Format of identity โ€“ Protocol for managing identities
  • 18. Identity federation between cloud providers โ€ข User has an account with application hosted by a CSP1. โ€ข User requests a service from an application running on CSP2 relying on user's authentication by CSP1 and using identity information provided by CSP1 โ€ข Trust model establishment between CSPs : โ€“ How to securely provide identity information (protocol) โ€“ How to verify received identity information โ€“ How to process the identity information received
  • 19. Simple Cloud Identity Management โ€ข SCIM group : System for Cross-domain Identity Management โ€“ Standardize methods for creating, reading, searching, modifying, and deleting user identities and identity- related objects across administrative domains, with the goal of simplifying common tasks related to user identity management in services and applications. โ€“ SCIM 1.0. โ€“ Protocol : draft-ietf-scim-api-15 โ€“ Schema : draft-ietf-scim-core-schema-15
  • 20. Schema โ€ข SCIM schema provides a minimal core schema for representing users and groups (resources) โ€ข Resource is a collection of attributes identified by one or more schemas. โ€ข Minimally, an attribute consists of the attribute name and at least one simple or complex value either of which may be multi- valued. โ€ข For each attribute, SCIM schema defines the data type, plurality, mutability, and other distinguishing features of an attribute.
  • 21. Resources Resource Type Schema Attribute Common Attributes Core Attributes Extended Attributes
  • 23. Common Attributes ID External ID Common Attributes Meta Resource Created Last modified Location Version
  • 24. User resource schema โ€ข Single attributes : โ€“ Username โ€“ Name โ€“ Display name โ€“ Nick name โ€“ Title โ€“ Timezone โ€“ Active โ€“ Password
  • 25. User & Group resource schema โ€ข User โ€“ Multi-valued attributes โ€ข Emails โ€ข Phone numbers โ€ข Addresses โ€ข Photos โ€ข Groups โ€ข Entitlement โ€ข Certificates (X509) โ€ข Roles โ€ข Group โ€“ Display name โ€“ Members
  • 26. Service Provider Schema โ€ข Single attributes โ€“ documentationUrl โ€“ changePassword โ€“ authenticationSchemes { "schemas": [ "urn:ietf:params:scim:schemas:core:2.0: ServiceProviderConfig" ], "documentationUrl":"http://example.co m/help/scim.html", โ€ฆโ€ฆ โ€ฆโ€ฆ "authenticationSchemes": [ { "name": "OAuth Bearer Token", "description": "Authentication Scheme using the OAuth Bearer Token Standard", "specUrl": "http://tools.ietf.org/html/draft-ietf- oauth-v2-bearer-01", โ€ฆโ€ฆโ€ฆ.
  • 27. SCIM protocol API โ€ข REST API โ€“ Create Resource โ€“ Retrieving Resources โ€“ Modifying Resources โ€“ Deleting Resources
  • 28. Identity synchronization โ€ข CSPs need to integrate with existing systems : โ€“ Billing โ€“ Accounting โ€“ Contract Management โ€ข Identity formats โ€ข Format exchange protocol
  • 29. Cloud Resources provisioning โ€ข Cloud service automatic provisioning โ€ข Workflows definition โ€“ Automation layer manage provisioning engines โ€“ Provisioning engines act on resources using APIs โ€ข The need to Protection Profile for Hypervisor APIs โ€“ Identity of objects belonging to orchestration โ€“ Protocol for exchange
  • 30. Cloud Resources de-provisioning lifecycle โ€ข Automatic Cloud service de-provisioning โ€“ User โ€“ Due to contract stopping for postpaid modes โ€“ Due to end of validity period โ€ข Freeze and delete โ€ข Internal : from orchestration linked to time servers โ€ข Auto de-provisioning request : โ€“ Identity of time servers โ€“ Identity of external systems (billing, โ€ฆ) โ€“ Identity of objects inside de-provisioning engine
  • 31. Summary โ€ข Need for : โ€“ Open standards for identity and access management in the cloud โ€“ Identity interoperability โ€“ Identity orchestration โ€ข Shortcomings of SCIM : โ€“ Do not specify identity for resource pools APIs : like Hypervisor APIs (vdisk APIs, storage APIs, VM provision APIs, SaaS APIsโ€ฆ) โ€“ Do not define identity for Broker APIs โ€“ Do not define authentication mechanisms : the choice of authentication mechanism will impact interoperability
  • 32. Proposals to ITU โ€ข Define a digital identity framework for the cloud computing โ€“ Format, Protocols, APIs, secure digital identity, interoperable digital identity โ€ข Define minimum security requirements for the cloud identity service (PKI, relying or third parties,โ€ฆ)