SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Quantum Framework Identity and Trust Jin Peng Feb 12, 2009
Identities in System (Network) Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Quantum Framework Bring people and network together through identity and trust management People Identity Network Element Identity AAA PKI Security Confidentiality, Integrity, Availability (CIA) ‏
Open Source Stack JAVA JBOSS OpenSSO SpringFrame Bounty Castle OpenSSL JavaSSH Quantum Frame CND (openLDAP) ‏ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Quantum Framework Primary Quantum Frame (1) ‏ ,[object Object],[object Object],[object Object],[object Object],Backup Quantum Frame (0/1) ‏ Member Quantum Frame (0/n) ‏ member Quantum Frame (0/n) ‏ member Quantum Frame (0/n) ‏
Common Login and Single Sign-On Common Login page for a security domain Only login once, Single Sign-On inside the security domain  Built-in RADIUS service for CLI login
Manage administrative user
Support multiple external authentication protocols
Role based per element type or per instance access control
Support different permissions (authorization model) for different type of element
Control security policies centrally
Monitor Active Sessions
Review Audit Log
A Common Registry for Network Elements ,[object Object],[object Object],[object Object],[object Object],[object Object]
Manage Network Elements network level services can be integrated dynamically into the main navigator New type of network element, new instance of elements and their web based management console can be registered dynamically.
Dynamic grouping of registered elements and network services You can only see links that you are granted access rights
Mashup with Quantum Framework Quantum: Network metadata registry: (Universal Description Discovery and Integration) ‏ what are on the network (inventory),  what can they do (SOA), what are their relations, how to reach them, how to protect them (security) ‏ Quantum: Security: AAA and PKI Fault/ Performance Management Other Network services Subscriber Management Configuration Deployment Patching Quantum Framework Third party Applications Nortel Management Applications Combinations of Third party discovery and Nortel Registration Legends:
Launches Subscriber Manager Launches Deployment Manager Launches SNMP Profile Manager Launches NRS Manager Launches Element Manager, BCC Launches Base Manager Launches Central Patch Manager Graphical View of  CS1000 Services Mashup on top of Quantum Framework
An example of Mashup service based on element registry: Central Deployment Management
Circle of Trust Base on Public Key Infrastructure  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Circle of Trust  (Manage network elements' X.509 certificate, trusted Certificate Authority and Certificate Revocation List centrally ) ‏
Circle of Trust  (Built-in Private Certificate Authority to bootstrap the trust and reduce cost of using commercial CA ) ‏
Internal Open Source ,[object Object],[object Object],[object Object]
Integration options with Quantum Framework There are a number of possible integration options. From the most loosely coupled hyper link model to fully engaged with the network level mash service or even provide new network Mashup services. Level 1: Add the URL of your application as bookmark in Quantum's element table level 2: Integrate with Quantum's authentication service, achieve Single Sign-On and common login through RADIUS, (REST or SOAP )Web Service, SAML based Federation etc. Level 3: Integrate with Quantum's authorization and UDDI element registry service, declare your own element type, registered your applications as managed element or services, query access control decisions from Quantum's central PDP (Policy Decision Point) ‏ Level 4: Declare supported (Web) services in your element type definition, integrate with existing network Mashup services such as Subscriber Manager, Certificate Manager, Deployment Manager Level 5: Create new network Mashup services (alarm management, Performance management, topology management)
Subscriber Manager Deployment Manager Central Patch Manager IP-Sec Management SNMP Profile Manager Element Manager EM Phone Provisioning EM Node Manager NRS Manager Central User Manager Base Manager SNMP Agent in Elements UCM Framework CP for SNMP, NTP, Security SNMP Trap Server System Level Network Level Hardware CPU level Quantum in CS1000 - Network, System and Hardware View
CND MySQL config CS1000  System 1 Web Services xmsg ftp Quantum in CS1000:  Physical  Deployment view of Muti-system – network view Cust AD MySQL CS1000  System 2 MySQL config Linux UCM -m EM/BCC Call Server Linux UCM-primary SubMgr Linux UCM-back NRSM TPS GW Linux L-SLP Linux NRS/SPS UCM-m L-SLP Linux ECM-m ECM-m TPS GW Linux ECM-m MC Vxworks Vxworks SMS comp Core comp Linux UCM EM/BCC Call Server TPS GW TPS GW Linux UCM MC Vxworks VxEll L-SLP Linux UCM-m
Quantum Framework Evolution Path Identity Management Administrative User Subscriber Network UDDI Element Registry System Management People Unified Communication Centralized AAA,PKI   SOA ,  MOM  ( Message Oriented Middleware ) ‏ What we do now What we do next

Weitere ähnliche Inhalte

Was ist angesagt?

Tacacs
TacacsTacacs
Tacacs1 2d
 
TACACS Protocol
TACACS ProtocolTACACS Protocol
TACACS ProtocolNetwax Lab
 
Popeye – Fine-grained Network Access Control for Mobile Users
Popeye – Fine-grained Network Access Control for Mobile UsersPopeye – Fine-grained Network Access Control for Mobile Users
Popeye – Fine-grained Network Access Control for Mobile UsersTal Lavian Ph.D.
 
Overview of Windows Vista Devices and Windows Communication Foundation (WCF)
Overview of Windows Vista Devices and Windows Communication Foundation (WCF)Overview of Windows Vista Devices and Windows Communication Foundation (WCF)
Overview of Windows Vista Devices and Windows Communication Foundation (WCF)Jorgen Thelin
 
Service Mesh 101 - Digging into your service
Service Mesh 101 - Digging into your service Service Mesh 101 - Digging into your service
Service Mesh 101 - Digging into your service Huynh Thai Bao
 
Radius server,PAP and CHAP Protocols
Radius server,PAP and CHAP ProtocolsRadius server,PAP and CHAP Protocols
Radius server,PAP and CHAP ProtocolsDhananjay Aloorkar
 
Hardening a SQL Server 2008 Implementation
Hardening a SQL Server 2008 Implementation Hardening a SQL Server 2008 Implementation
Hardening a SQL Server 2008 Implementation Mark Ginnebaugh
 
OmniAccess_8550_Datasheet
OmniAccess_8550_DatasheetOmniAccess_8550_Datasheet
OmniAccess_8550_DatasheetJulien Kirsch
 
13 palo alto url web filtering concept
13 palo alto url web filtering concept13 palo alto url web filtering concept
13 palo alto url web filtering conceptMostafa El Lathy
 
WCF (Windows Communication Foundation)
WCF (Windows Communication Foundation)WCF (Windows Communication Foundation)
WCF (Windows Communication Foundation)ipower softwares
 
Mule digital signature processor
Mule digital signature processorMule digital signature processor
Mule digital signature processorKrishna_in
 

Was ist angesagt? (20)

Tacacs
TacacsTacacs
Tacacs
 
TACACS Protocol
TACACS ProtocolTACACS Protocol
TACACS Protocol
 
Unit 6
Unit 6Unit 6
Unit 6
 
Popeye – Fine-grained Network Access Control for Mobile Users
Popeye – Fine-grained Network Access Control for Mobile UsersPopeye – Fine-grained Network Access Control for Mobile Users
Popeye – Fine-grained Network Access Control for Mobile Users
 
K8s Webhook Admission
K8s Webhook AdmissionK8s Webhook Admission
K8s Webhook Admission
 
Overview of Windows Vista Devices and Windows Communication Foundation (WCF)
Overview of Windows Vista Devices and Windows Communication Foundation (WCF)Overview of Windows Vista Devices and Windows Communication Foundation (WCF)
Overview of Windows Vista Devices and Windows Communication Foundation (WCF)
 
Service Mesh 101 - Digging into your service
Service Mesh 101 - Digging into your service Service Mesh 101 - Digging into your service
Service Mesh 101 - Digging into your service
 
Radius server,PAP and CHAP Protocols
Radius server,PAP and CHAP ProtocolsRadius server,PAP and CHAP Protocols
Radius server,PAP and CHAP Protocols
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
 
Hardening a SQL Server 2008 Implementation
Hardening a SQL Server 2008 Implementation Hardening a SQL Server 2008 Implementation
Hardening a SQL Server 2008 Implementation
 
Proxy
ProxyProxy
Proxy
 
WCF
WCFWCF
WCF
 
Radius1
Radius1Radius1
Radius1
 
OmniAccess_8550_Datasheet
OmniAccess_8550_DatasheetOmniAccess_8550_Datasheet
OmniAccess_8550_Datasheet
 
13 palo alto url web filtering concept
13 palo alto url web filtering concept13 palo alto url web filtering concept
13 palo alto url web filtering concept
 
WCF (Windows Communication Foundation)
WCF (Windows Communication Foundation)WCF (Windows Communication Foundation)
WCF (Windows Communication Foundation)
 
Mule digital signature processor
Mule digital signature processorMule digital signature processor
Mule digital signature processor
 
WCF
WCFWCF
WCF
 
For linked in
For linked inFor linked in
For linked in
 
AAA in a nutshell
AAA in a nutshellAAA in a nutshell
AAA in a nutshell
 

Andere mochten auch

Quantum Architecture Overview
Quantum Architecture OverviewQuantum Architecture Overview
Quantum Architecture Overviewjinpeng
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

Andere mochten auch (7)

Quantum Architecture Overview
Quantum Architecture OverviewQuantum Architecture Overview
Quantum Architecture Overview
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Ähnlich wie Quantum Architecture Overview

Implementing Active Directory and Information Security Audit also VAPT in Fin...
Implementing Active Directory and Information Security Audit also VAPT in Fin...Implementing Active Directory and Information Security Audit also VAPT in Fin...
Implementing Active Directory and Information Security Audit also VAPT in Fin...KajolPatel17
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 
Implementing Private Clouds
Implementing Private CloudsImplementing Private Clouds
Implementing Private CloudsJohn Pritchard
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authenticationdkaya
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computingsashi799
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE Mahzad Zahedi
 
CloudStack DC Meetup - Apache CloudStack Overview and 4.1/4.2 Preview
CloudStack DC Meetup - Apache CloudStack Overview and 4.1/4.2 PreviewCloudStack DC Meetup - Apache CloudStack Overview and 4.1/4.2 Preview
CloudStack DC Meetup - Apache CloudStack Overview and 4.1/4.2 PreviewChip Childers
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentationjasonlan
 
Workshop - Openstack, Cloud Computing, Virtualization
Workshop - Openstack, Cloud Computing, VirtualizationWorkshop - Openstack, Cloud Computing, Virtualization
Workshop - Openstack, Cloud Computing, VirtualizationJayaprakash R
 
Openstack workshop @ Kalasalingam
Openstack workshop @ KalasalingamOpenstack workshop @ Kalasalingam
Openstack workshop @ KalasalingamBeny Raja
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Rishabh Dangwal
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld
 
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...apidays
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 

Ähnlich wie Quantum Architecture Overview (20)

Cloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit PlanningCloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit Planning
 
Day6
Day6Day6
Day6
 
Implementing Active Directory and Information Security Audit also VAPT in Fin...
Implementing Active Directory and Information Security Audit also VAPT in Fin...Implementing Active Directory and Information Security Audit also VAPT in Fin...
Implementing Active Directory and Information Security Audit also VAPT in Fin...
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
Gradution Project
Gradution ProjectGradution Project
Gradution Project
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Implementing Private Clouds
Implementing Private CloudsImplementing Private Clouds
Implementing Private Clouds
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
On technical security issues in cloud computing
On technical security issues in cloud computingOn technical security issues in cloud computing
On technical security issues in cloud computing
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE
 
CloudStack DC Meetup - Apache CloudStack Overview and 4.1/4.2 Preview
CloudStack DC Meetup - Apache CloudStack Overview and 4.1/4.2 PreviewCloudStack DC Meetup - Apache CloudStack Overview and 4.1/4.2 Preview
CloudStack DC Meetup - Apache CloudStack Overview and 4.1/4.2 Preview
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentation
 
Workshop - Openstack, Cloud Computing, Virtualization
Workshop - Openstack, Cloud Computing, VirtualizationWorkshop - Openstack, Cloud Computing, Virtualization
Workshop - Openstack, Cloud Computing, Virtualization
 
Openstack workshop @ Kalasalingam
Openstack workshop @ KalasalingamOpenstack workshop @ Kalasalingam
Openstack workshop @ Kalasalingam
 
Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
 
Introduction to Microsoft Azure 101
Introduction to Microsoft Azure 101Introduction to Microsoft Azure 101
Introduction to Microsoft Azure 101
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
 
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 

Quantum Architecture Overview

  • 1. Quantum Framework Identity and Trust Jin Peng Feb 12, 2009
  • 2.
  • 3. Quantum Framework Bring people and network together through identity and trust management People Identity Network Element Identity AAA PKI Security Confidentiality, Integrity, Availability (CIA) ‏
  • 4.
  • 5.
  • 6. Common Login and Single Sign-On Common Login page for a security domain Only login once, Single Sign-On inside the security domain Built-in RADIUS service for CLI login
  • 8. Support multiple external authentication protocols
  • 9. Role based per element type or per instance access control
  • 10. Support different permissions (authorization model) for different type of element
  • 14.
  • 15. Manage Network Elements network level services can be integrated dynamically into the main navigator New type of network element, new instance of elements and their web based management console can be registered dynamically.
  • 16. Dynamic grouping of registered elements and network services You can only see links that you are granted access rights
  • 17. Mashup with Quantum Framework Quantum: Network metadata registry: (Universal Description Discovery and Integration) ‏ what are on the network (inventory), what can they do (SOA), what are their relations, how to reach them, how to protect them (security) ‏ Quantum: Security: AAA and PKI Fault/ Performance Management Other Network services Subscriber Management Configuration Deployment Patching Quantum Framework Third party Applications Nortel Management Applications Combinations of Third party discovery and Nortel Registration Legends:
  • 18. Launches Subscriber Manager Launches Deployment Manager Launches SNMP Profile Manager Launches NRS Manager Launches Element Manager, BCC Launches Base Manager Launches Central Patch Manager Graphical View of CS1000 Services Mashup on top of Quantum Framework
  • 19. An example of Mashup service based on element registry: Central Deployment Management
  • 20.
  • 21. Circle of Trust (Manage network elements' X.509 certificate, trusted Certificate Authority and Certificate Revocation List centrally ) ‏
  • 22. Circle of Trust (Built-in Private Certificate Authority to bootstrap the trust and reduce cost of using commercial CA ) ‏
  • 23.
  • 24. Integration options with Quantum Framework There are a number of possible integration options. From the most loosely coupled hyper link model to fully engaged with the network level mash service or even provide new network Mashup services. Level 1: Add the URL of your application as bookmark in Quantum's element table level 2: Integrate with Quantum's authentication service, achieve Single Sign-On and common login through RADIUS, (REST or SOAP )Web Service, SAML based Federation etc. Level 3: Integrate with Quantum's authorization and UDDI element registry service, declare your own element type, registered your applications as managed element or services, query access control decisions from Quantum's central PDP (Policy Decision Point) ‏ Level 4: Declare supported (Web) services in your element type definition, integrate with existing network Mashup services such as Subscriber Manager, Certificate Manager, Deployment Manager Level 5: Create new network Mashup services (alarm management, Performance management, topology management)
  • 25. Subscriber Manager Deployment Manager Central Patch Manager IP-Sec Management SNMP Profile Manager Element Manager EM Phone Provisioning EM Node Manager NRS Manager Central User Manager Base Manager SNMP Agent in Elements UCM Framework CP for SNMP, NTP, Security SNMP Trap Server System Level Network Level Hardware CPU level Quantum in CS1000 - Network, System and Hardware View
  • 26. CND MySQL config CS1000 System 1 Web Services xmsg ftp Quantum in CS1000: Physical Deployment view of Muti-system – network view Cust AD MySQL CS1000 System 2 MySQL config Linux UCM -m EM/BCC Call Server Linux UCM-primary SubMgr Linux UCM-back NRSM TPS GW Linux L-SLP Linux NRS/SPS UCM-m L-SLP Linux ECM-m ECM-m TPS GW Linux ECM-m MC Vxworks Vxworks SMS comp Core comp Linux UCM EM/BCC Call Server TPS GW TPS GW Linux UCM MC Vxworks VxEll L-SLP Linux UCM-m
  • 27. Quantum Framework Evolution Path Identity Management Administrative User Subscriber Network UDDI Element Registry System Management People Unified Communication Centralized AAA,PKI SOA , MOM ( Message Oriented Middleware ) ‏ What we do now What we do next

Hinweis der Redaktion

  1. Quantum maintains three centralized repositories: Repository about people (Identity), who they are, the information that is related to each people (phone number, e-mail, password), how to keep them in sync with external people database (LDAP sync), how to correlated authentication processes (external authentication, federation) ‏ Repository about network, what are in the network (applications, devices), what can they do (supported Web Services WSDL etc.), how to reach them Repository about network security polices that can make sure people use or manage the network with CIA (Confidentiality, Integrity and Availability) ‏
  2. Quantum Framework 1.0 is the about integration of CS1000 OAM security with MFT carrier security solution. A lot of valuable lessoned. Quantum Framework 2.0 is a total re-write of the internal components: (Target products is CS1000, Multimedia applications, Contact Centers. ) ‏ Better architecture, remove dependencies on MFT code, work directly with OpenSSO. UDDI based network metadata repository. Build the core of SOA. Pure Java based Private Certificate Authority, SOA based certificate management. Security enabled notification framework based on JBoss JMS. Quantum Framework 3.0 is about subscribers authentication and integration into the Unified Communication.