SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Ramnish Singh
IT Advisor
Microsoft Corporation
Session Code:
Agenda
•   Microsoft’s Identity and Access Strategy

•   “Geneva” Claims Based Access
         User access challenges
         Identity Metasystem and claims solution
         Introducing “Geneva” claims based access platform
Identity & Access Customer Challenges
 • Compliance with regulatory                                 • Reducing help desk burden for
   requirements                                                 end users

 • Auditable processes for                                    • Managing the complexity of
   granting access to resources                                  distributed identity
                                                                    information
                                               Operational
                                  Compliance
                                                Efficiency


                                  Business
                                                IT Security
                                   Agility
                                                                  • Integrated user
 • Enabling new high                                                provisioning &
   business value scenarios                                          credential management
 • Supporting mergers, acquisitions                           • Ensuring that only authorized
   & reorganizations                                            users can access resources
Customers’ Identity & Access
Requirements
  Identity & Access Management
   Compliance and Audit: Monitoring, reporting , auditing of identity-based access activity


   Policy Management: Identity policy, user/role-based access policy, federation policy, Delegation


   Access Management: Group Management, Federation/Trust Management, Entitlements, RBAC


   Identity & Credential Management: User provisioning, Certificate & Smartcard Management, User self-service




  Identity-Based Access
        Remote Access                   Network Access                   App Access                     Info Access
    Access resources remotely         Identity-oriented edge          SSO, Web/Ent/Host             Drive Encryption, ILP,
         – e.g. SSL VPN                  access - e.g. NAP             Access, Federation            Rights Management




  Identity Infrastructure
   Identity & Credentials Infrastructure: Directory Identity/Credentials, InfoCards, Meta/Virtual Directory, Basic Policy
Microsoft’s Identity & Access
Strategy
Comprehensive
                         User Centric                 Open &                 Best TCO
  Solutions
                                                     Extensible




  Turnkey Offerings     Rich Office Integration      Service oriented      Simplified Licensing



On Premises and Cloud      Consistent User         Application Platform
                                                                            Easiest to Deploy
                             Experience                Integration


 Physical and Virtual      Privacy Enabled        Open and Interoperable   Broadest Ecosystem
Introducing



 “            ”
Identity & Access Silos Block
Business Needs
Business Needs
• Flexible Collaboration: Enable collaboration within the enterprise, across
  organizational boundaries, and on the Web while satisfying security requirements
• Business Agility: Improve ability to react to changing business needs by enabling
  existing systems to interoperate with new systems such as cloud services and SOA




              User Access Challenges
              • Lack of System Interoperability: Difficult for users to gain access across diverse
                applications and systems to collaborate seamlessly with other users
              • Hard to Extend User Access: Complex to extend user access from existing
                applications and systems to new applications and systems, and cloud services and
                SOA could multiply these challenges



                             What‟s Needed to Solve the Challenges
                             • Single Identity Model: A single simplified user access model that works across different
                               applications and systems to enable collaboration while helping to maintain security
                             • Interoperability: An open and adaptable user access model that enables identities to
                               interoperate with applications and systems regardless of location or architecture
Shared Industry Solution:
 Identity Metasystem and Claims
The industry has created a vision and architecture to address the challenges of
identity interoperability

   What is the                    A shared industry vision for interoperable identity
    Identity                      •   Single identity model that works in enterprises, federation and consumer Web
  Metasystem?                     •   Works with existing IT infrastructures
                                  •   Interoperability based on open protocols
                                  •   Architecture based on claims


                                  Claims describe identity attributes within the Identity Metasystem
     What are                     • Used to drive application behavior
     Claims?                      • Can disclose identity information selectively
                                  • Delivered inside security tokens produced by a security token service (STS)

 Learn more about the Identity Metasystem
 • Overview: http://www.identityblog.com/?p=355
 •   A public policy perspective: http://www.ipc.on.ca/images/Resources/up-7laws_whitepaper.pdf
 •   OASIS standards body: http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=imi
 •   An industry association: http://informationcard.net/
 •   An open source project: http://www.eclipse.org/org/press-release/20080221_higgins.php
Introducing “Geneva”
What is “Geneva”?                                       What does “Geneva” include?
• Microsoft‟s open platform for simplified and          “Geneva” includes three components for enabling claims-based access:
   security-enhanced user access based on
                                                        • For Developers: “Geneva” Framework for building .NET applications that use
   claims
                                                            claims to make user access decisions
• Based on the shared industry vision for an            • For IT: “Geneva” Server security token service (STS) for issuing and transforming
   interoperable Identity Metasystem via claims
                                                            claims and managing user access
                                                        • For Users: Windows CardSpace “Geneva” helps users navigate access decisions

Why should I adopt “Geneva”?
                             •   Simplifies application development by externalizing user access from applications via claims
    Simplifies
   User Access               •   Reduces development effort with pre-built security logic and .NET tools

                             •   Helps users navigate multiple logins, manage different personas, and control information sharing


Streamlines Access           •   Helps speed deployment of applications and enhances security via reduced custom implementation work
  Management &               •   Simplifies user access management with authentication externalized from applications
     Security
                             •   Enables easier collaboration between organizations with automated federation tools


     Enhances                •   More quickly adapt user access control methods to meet changing business needs
 Interoperability &          •   Enables users, applications and systems to work better together regardless of location or architecture
    Adaptability
                             •   Includes built-in interoperability via open industry standards including WS-* and SAML
Illustration of the Full System
One example of how “Geneva” components might be used together


                        1. A user wants               User
                           to access an
                           application


                                                     Windows
                                                    CardSpace
                                                    “Geneva”


                               2. Gets claims                          3. Sends claims

                                                                  ?
                     „Identity Provider‟                                   „Relying Party‟
                                                                           App or Service

                                                                                Built with
                          “Geneva”
                                                       Trust                   “Geneva”
                           Server
                                                                              Framework



                                    Interoperable via industry standard protocols
“Geneva” Interoperates with Other Claims
 Infrastructure
                            1. User wants to access                 User
                               an application



                                                                             Browser or
                                                         Windows
  Mix and match “Geneva” components                     CardSpace   - OR -
                                                                             Third Party
                                                                              Identity
  with 3rd party claims-based STS‟s,                     “Geneva”
                                                                              Selector
  frameworks, and clients

                                    2. Gets claims                                         3. Sends claims




                           „Identity Provider‟                                                 „Relying Party‟
                                                                                               App or Service
Microsoft Services
Connector (MSC) and      “Geneva”
                                                                                        Built with
.NET Access Control       Server,              Third Party                                                       Third Party
Service (ACS) are both               - OR -
                                                                    Trust               “Geneva”        - OR -
                          MSC, or                 STS                                                            Framework
built on “Geneva”                                                                      Framework
                           ACS
technology and claims
architecture


                                              Interoperable via industry standard protocols
Example Scenarios
Benefits                  Scenarios

                      •   Step-Up Authentication: Build an application that requires users to step up to a higher level
    Simplifies            of authentication to approve sensitive transactions
Application Access
                      •   Cloud SSO: Extend SSO from on-premises Active Directory to Microsoft cloud services with
                          Microsoft Services Connector or .NET Access Control Service (built on “Geneva” technology)



                      •   Federated Document Collaboration: Enable employees and partners to collaborate with Office
Streamlines Access
                          documents and SharePoint via federation
  Management &
     Security         •   Managed Info Cards: Issue managed information cards to employees to reduce the need to
                          remember multiple logins



     Enhances         •   Legacy Interoperability: Implement “Geneva” to help disparate existing applications achieve
 Interoperability &       seamless user access while laying a foundation to add claims-based apps
    Adaptability
                      •   Flexible Authentication: Change authentication methods across multiple applications from
                          username/password to smart cards
Features
Features                Details
                    •   Pre-built user access logic based on claims
    Developer       •   Developer framework and ASP.NET controls
   Experiences
                    •   Externalize authentication from applications and support multiple authentication types


                    •   Federation provider STS with simple administration tools to quickly set up federations

   Federation       •   Federation between on-premises directories and cloud services

                    •   Multi-protocol federation, including WS-* and SAML 2.0 protocols


                    •   Identity provider STS to issue claims and managed CardSpace identities
  Authentication    •   Applications can be built to prompt users for stronger credentials for scenarios requiring higher security
    Flexibility
                    •   Switch authentication types with minimal application re-coding


                    •   Built-in interoperability via open industry protocols including WS-* and SAML 2.0
 Interoperability   •   STS translates between claims and other protocols to enable claims and non-claims interoperability

                    •   Implements the industry Identity Metasystem vision for interoperable identity via claims


                    •   Next generation CardSpace helps users navigate between multiple logons
     User           •   Streamlined download and installation delivers efficient Web and client experience with CardSpace
  Experiences
                    •   User control and transparency for how information is shared
“Geneva” Schedule
                                                                RTM
                                         Beta 2                2nd Half
                  Beta 1                 1st Half               2009
                  October                 2009
                   2008




•   Licensing: All three components will be available under Windows license
•   Ship Vehicle: All three components will be available as separate web downloads
•   Version Support: Beta 1 supports Windows Server 2008 and Windows Vista. Support at RTM
    will be announced at a later date
Summary
Single Simplified Identity Model
•   Externalizes user access from applications via claims
•   Reduces application development effort
•   Helps users make identity decisions



Streamlines Access Management and Security
•   Speeds deployment of applications
•   Consolidates user access management in hands of IT
•   Automates federation



Interoperable and Adaptable
•   Flexible to change authentication methods
•   Works independent of location or architecture
•   Interoperable via claims, WS-* and SAML 2.0 protocol
Developer Benefits
What does “Geneva” offer developers?                              What can developers build with “Geneva”?
•     “Geneva” Framework: SDK to build claims based               •    Claims aware .NET applications
      applications
                                                                  •    User authentication experience with CardSpace “Geneva”
•     Windows CardSpace “Geneva”: Identity client platform
                                                                  •    Custom security token services (STS)



Why should developers use “Geneva”?

      Improves               •   Simplifies application development by externalizing user access from applications via claims
     Developer               •   Enables developers to code to a single simplified identity model based on claims
     Productivity            •   Includes pre-built security logic with .NET tools to free up time for more value-added work

                             •   Helps provide consistent security with a single user access model externalized from applications
     Enhances
     Application             •   Enhances consistency of security with pre-built user access logic
      Security               •   Provides seamless user access to on-premises software and cloud services


                             •   Offers built-in interoperability via industry protocols including WS-* and SAML 2.0
     Interoperable
                             •   Implements the industry Identity Metasystem vision for interoperable identity
    and Extensible
                             •   Enables interoperability between users, applications, systems and other resources via claims
IT Professional Benefits
What does “Geneva” offer IT pros?                                     What can IT pros do with “Geneva”?
•   “Geneva” Server: Security token service (STS) with                •    Deploy an STS to enable user access to applications via
    identity and federation provider roles plus user access                claims
    management capabilities
                                                                      •    Quickly establish federations with partners and customers
•   Windows CardSpace “Geneva”: Authentication client
                                                                      •    Issue managed identity cards to users


Why should developers use “Geneva”?

Streamlines User             •   Implements a single user access model with native single sign on and easier federation

     Access                  •   Builds on and interoperates with existing identity infrastructure investments
  Management                 •   Works with identity management infrastructure such as Active Directory and Identity Lifecycle Manager


                             •   Helps provide consistent security with a single user access model externalized from applications
    Enhances
    Application              •   Vests more complete control over user access decisions with IT instead of developers

     Security                •   Provides seamless access between on-premises software and cloud services


                             •   Based on industry standard protocols including WS-* and SAML 2.0 for interoperability
Interoperable &              •   Meet new business needs faster by allowing applications and infrastructure to evolve independently
   Adaptable
                             •   Integrates new authentication methods with fewer application code changes
Comparing AD FS, CardSpace1, WCF
with Geneva          “Geneva” Framework
                                                          “Geneva” Server
           AD FS 1.1                                    CardSpace “Geneva”
         CardSpace 1.0
             WCF                                     • End to end claims support
                                                     • Pre-built ASP.NET controls
   • Passive browser federation
   • WS-* protocols                                  • Federate Office documents
                                     “Geneva” Adds
   • Self-issued information cards                   • SAML 2.0 protocol support

   • Federated SharePoint                            • Native SSO

   • Federated rights management                     • Active client federation
                                                     • Automated trust management
                                                     • Managed information cards
                                                     • Streamlined client UI
“Geneva” Beta 1 vs. Future Features
Component                       Beta 1 Features                           Features We Will Add by RTM

                  •   Externalize authentication from the app    •   SAML 2.0 IDP and SP protocol support for SSO
                  •   Multiple authentication types supported
                  •   Identity delegation
                  •   Step-up authentication
“Geneva”          •   Write apps to accept managed CardSpace
Framework             identities
                  •   SAML 2.0 token format
                  •   Transform claims into Kerberos tokens
                  •   Provision an STS in relying party apps



                  •   Identity provider integrated with Active   •   Automated trust management
                      Directory                                  •   SAML 2.0 protocol for SP for SSO
                  •   Issue managed CardSpace identities         •   Support for alternate identity attribute stores
                  •   SAML 2.0 protocol for IDP for SSO          •   Issue multiple CardSpace identities for multiple
                  •   SAML 2.0 token format                          user roles
“Geneva” Server   •   Transform claims into Kerberos tokens      •   Extranet access support
                  •   Easy trust establishment                   •   Powershell support
                  •   Identity delegation management             •   Interoperability of WS-Fed with mobile and other
                                                                     low-performance clients



                  •   Support for managed information card       •   User self-issued information cards
                      issuance                                   •   Backward compatibility for Windows apps
CardSpace         •   Small download (less than 5mb)             •   Challenge-response for authentication assurance
                  •   Streamlined UI                             •   Secure desktop
“Geneva”          •   Inline UI for websites
“Geneva” Beta 1 vs. Future Scenarios
                        Beta 1 Scenarios                                     Scenarios We Will Enable by Final Release
Enable employees and partners to collaborate with Office documents           Accept self-issued information cards on an e-commerce website
and SharePoint via federation.                                               to speed checkout and improve security.

Extend single sign on from an on-premises directory such as Active
Directory to cloud services such as those offered by Live.

Build an application that asks users to step up to a higher level of
authentication based on context

Build an application that later allows IT to change authentication methods
from username/password to smart cards without app code changes.

Build a chain of applications and services that act on behalf of users
while maintaining control of identity disclosure within claims.

Issue managed information cards to employees to reduce the need to
remember multiple logins.

Implement “Geneva” to help an existing Kerberos application achieve
seamless user access while laying a foundation to add claims-based apps.

Implement federation with partners on heterogeneous infrastructures
and maintain trusts automatically.
Demo Title
Name
Title
Company
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should
 not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS,
                                                                           IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Weitere ähnliche Inhalte

Was ist angesagt?

End-to-End Identity Management
End-to-End Identity ManagementEnd-to-End Identity Management
End-to-End Identity ManagementWSO2
 
IDSA Overview at CSA SV
IDSA Overview at CSA SVIDSA Overview at CSA SV
IDSA Overview at CSA SVVishwas Manral
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyOkta-Inc
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCloudIDSummit
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE Mahzad Zahedi
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...IJCNCJournal
 
Enterprise Security Requirements
Enterprise Security RequirementsEnterprise Security Requirements
Enterprise Security RequirementsWSO2
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...IBM Danmark
 
Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory Vignesh Ganesan I Microsoft MVP
 
Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Accenture
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David RossGraeme Wood
 
Securing Software-as-a-Service: Cover your SaaS and protect enterprise data
Securing Software-as-a-Service: Cover your SaaS and protect enterprise dataSecuring Software-as-a-Service: Cover your SaaS and protect enterprise data
Securing Software-as-a-Service: Cover your SaaS and protect enterprise dataPistoia Alliance
 
Quest One Identity Management Summary
Quest One Identity Management   SummaryQuest One Identity Management   Summary
Quest One Identity Management SummaryQuest Software
 
Azure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protectionsAzure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protectionsAndres Canello
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...Amazon Web Services
 
Web Single sign on system
Web Single sign on systemWeb Single sign on system
Web Single sign on systemSwati Sinha
 
Layer 7: Managing SOA Security and Operations with SecureSpan
Layer 7: Managing SOA Security and Operations with SecureSpanLayer 7: Managing SOA Security and Operations with SecureSpan
Layer 7: Managing SOA Security and Operations with SecureSpanCA API Management
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustInformation Security Services SA
 

Was ist angesagt? (19)

End-to-End Identity Management
End-to-End Identity ManagementEnd-to-End Identity Management
End-to-End Identity Management
 
IDSA Overview at CSA SV
IDSA Overview at CSA SVIDSA Overview at CSA SV
IDSA Overview at CSA SV
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
 
Enterprise Security Requirements
Enterprise Security RequirementsEnterprise Security Requirements
Enterprise Security Requirements
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
 
Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory Protect Identities and Access to resources with Azure Active Directory
Protect Identities and Access to resources with Azure Active Directory
 
Veriphyr bright talk 20120523
Veriphyr bright talk 20120523Veriphyr bright talk 20120523
Veriphyr bright talk 20120523
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
Securing Software-as-a-Service: Cover your SaaS and protect enterprise data
Securing Software-as-a-Service: Cover your SaaS and protect enterprise dataSecuring Software-as-a-Service: Cover your SaaS and protect enterprise data
Securing Software-as-a-Service: Cover your SaaS and protect enterprise data
 
Quest One Identity Management Summary
Quest One Identity Management   SummaryQuest One Identity Management   Summary
Quest One Identity Management Summary
 
Azure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protectionsAzure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protections
 
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
 
Web Single sign on system
Web Single sign on systemWeb Single sign on system
Web Single sign on system
 
Layer 7: Managing SOA Security and Operations with SecureSpan
Layer 7: Managing SOA Security and Operations with SecureSpanLayer 7: Managing SOA Security and Operations with SecureSpan
Layer 7: Managing SOA Security and Operations with SecureSpan
 
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de EntrustISS SA le presenta los Escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
 

Andere mochten auch

CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...CloudIDSummit
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTGlobal Online Trinings
 
Enterprise & Web based Federated Identity Management & Data Access Controls
Enterprise & Web based Federated Identity Management & Data Access Controls Enterprise & Web based Federated Identity Management & Data Access Controls
Enterprise & Web based Federated Identity Management & Data Access Controls Kingsley Uyi Idehen
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionCA API Management
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-OnAWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-OnAmazon Web Services
 
SCIM in the Real World: Adoption is Growing
SCIM in the Real World: Adoption is GrowingSCIM in the Real World: Adoption is Growing
SCIM in the Real World: Adoption is GrowingKelly Grizzle
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014Kelly Grizzle
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overviewEslam Hafez
 
Enemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling AccessEnemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling AccessBeyondTrust
 

Andere mochten auch (10)

CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
Enterprise & Web based Federated Identity Management & Data Access Controls
Enterprise & Web based Federated Identity Management & Data Access Controls Enterprise & Web based Federated Identity Management & Data Access Controls
Enterprise & Web based Federated Identity Management & Data Access Controls
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT Mission
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-OnAWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
 
SCIM in the Real World: Adoption is Growing
SCIM in the Real World: Adoption is GrowingSCIM in the Real World: Adoption is Growing
SCIM in the Real World: Adoption is Growing
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overview
 
Enemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling AccessEnemy from Within: Managing and Controlling Access
Enemy from Within: Managing and Controlling Access
 

Ähnlich wie Federated Identity Architectures Integrating With The Cloud

Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...
Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...
Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...eG Innovations
 
How to Deliver Maximum Citrix Performance and User Satisfaction
How to Deliver Maximum Citrix Performance and User SatisfactionHow to Deliver Maximum Citrix Performance and User Satisfaction
How to Deliver Maximum Citrix Performance and User SatisfactioneG Innovations
 
Unified Cloud Performance Monitoring - The Need of The Hour
Unified Cloud Performance Monitoring - The Need of The HourUnified Cloud Performance Monitoring - The Need of The Hour
Unified Cloud Performance Monitoring - The Need of The HoureG Innovations
 
How to consolidate Citrix Monitoring in a Single Pane of Glass
How to consolidate Citrix Monitoring in a Single Pane of GlassHow to consolidate Citrix Monitoring in a Single Pane of Glass
How to consolidate Citrix Monitoring in a Single Pane of GlasseG Innovations
 
How to become a Citrix Performance Hero
How to become a Citrix Performance HeroHow to become a Citrix Performance Hero
How to become a Citrix Performance HeroeG Innovations
 
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Forefront - Unified Access Gateway (UAG) PresentationMicrosoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Forefront - Unified Access Gateway (UAG) PresentationMicrosoft Private Cloud
 
How to Deliver an Exceptional End User Experience in your Citrix Environment
How to Deliver an Exceptional End User Experience in your Citrix EnvironmentHow to Deliver an Exceptional End User Experience in your Citrix Environment
How to Deliver an Exceptional End User Experience in your Citrix EnvironmenteG Innovations
 
Software as a Service Advantages
Software as a Service AdvantagesSoftware as a Service Advantages
Software as a Service Advantagescorncrew1
 
eG Citrix Performance Management & Analytics IBM Webinar 040815
eG Citrix Performance Management & Analytics   IBM Webinar 040815eG Citrix Performance Management & Analytics   IBM Webinar 040815
eG Citrix Performance Management & Analytics IBM Webinar 040815eG Innovations
 
Gartner Buyers Guide Summary
Gartner Buyers Guide SummaryGartner Buyers Guide Summary
Gartner Buyers Guide SummaryKim Jensen
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012gaborvodics
 
DemandTec case study
DemandTec case studyDemandTec case study
DemandTec case studySymplified
 
Dowless Corp Cap 12 06 08
Dowless  Corp Cap  12 06 08Dowless  Corp Cap  12 06 08
Dowless Corp Cap 12 06 08jdowless
 
eG Enterprise Citrix XenDesktop Monitor Product Tour
eG Enterprise Citrix XenDesktop Monitor Product ToureG Enterprise Citrix XenDesktop Monitor Product Tour
eG Enterprise Citrix XenDesktop Monitor Product ToureG Innovations
 
The Complete User Experience Monitoring Solution - eG Enterprise v7
The Complete User Experience Monitoring Solution - eG Enterprise v7The Complete User Experience Monitoring Solution - eG Enterprise v7
The Complete User Experience Monitoring Solution - eG Enterprise v7eG Innovations
 
How to Monitor Your Java & .NET Applications with eG Enterprise
How to Monitor Your Java & .NET Applications with eG EnterpriseHow to Monitor Your Java & .NET Applications with eG Enterprise
How to Monitor Your Java & .NET Applications with eG EnterpriseeG Innovations
 
How to Deliver Exceptional User Experience for VMware Horizon VDI Environments
How to Deliver Exceptional User Experience for VMware Horizon VDI EnvironmentsHow to Deliver Exceptional User Experience for VMware Horizon VDI Environments
How to Deliver Exceptional User Experience for VMware Horizon VDI EnvironmentseG Innovations
 

Ähnlich wie Federated Identity Architectures Integrating With The Cloud (20)

Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...
Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...
Why does Citrix use eG Enterprise for End-to-End Monitoring at Citrix Summit ...
 
How to Deliver Maximum Citrix Performance and User Satisfaction
How to Deliver Maximum Citrix Performance and User SatisfactionHow to Deliver Maximum Citrix Performance and User Satisfaction
How to Deliver Maximum Citrix Performance and User Satisfaction
 
Unified Cloud Performance Monitoring - The Need of The Hour
Unified Cloud Performance Monitoring - The Need of The HourUnified Cloud Performance Monitoring - The Need of The Hour
Unified Cloud Performance Monitoring - The Need of The Hour
 
How to consolidate Citrix Monitoring in a Single Pane of Glass
How to consolidate Citrix Monitoring in a Single Pane of GlassHow to consolidate Citrix Monitoring in a Single Pane of Glass
How to consolidate Citrix Monitoring in a Single Pane of Glass
 
How to become a Citrix Performance Hero
How to become a Citrix Performance HeroHow to become a Citrix Performance Hero
How to become a Citrix Performance Hero
 
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Forefront - Unified Access Gateway (UAG) PresentationMicrosoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
 
How to Deliver an Exceptional End User Experience in your Citrix Environment
How to Deliver an Exceptional End User Experience in your Citrix EnvironmentHow to Deliver an Exceptional End User Experience in your Citrix Environment
How to Deliver an Exceptional End User Experience in your Citrix Environment
 
Webinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility StrategyWebinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility Strategy
 
Software as a Service Advantages
Software as a Service AdvantagesSoftware as a Service Advantages
Software as a Service Advantages
 
eG Citrix Performance Management & Analytics IBM Webinar 040815
eG Citrix Performance Management & Analytics   IBM Webinar 040815eG Citrix Performance Management & Analytics   IBM Webinar 040815
eG Citrix Performance Management & Analytics IBM Webinar 040815
 
Gartner Buyers Guide Summary
Gartner Buyers Guide SummaryGartner Buyers Guide Summary
Gartner Buyers Guide Summary
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
 
DemandTec case study
DemandTec case studyDemandTec case study
DemandTec case study
 
att
attatt
att
 
Dowless Corp Cap 12 06 08
Dowless  Corp Cap  12 06 08Dowless  Corp Cap  12 06 08
Dowless Corp Cap 12 06 08
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
eG Enterprise Citrix XenDesktop Monitor Product Tour
eG Enterprise Citrix XenDesktop Monitor Product ToureG Enterprise Citrix XenDesktop Monitor Product Tour
eG Enterprise Citrix XenDesktop Monitor Product Tour
 
The Complete User Experience Monitoring Solution - eG Enterprise v7
The Complete User Experience Monitoring Solution - eG Enterprise v7The Complete User Experience Monitoring Solution - eG Enterprise v7
The Complete User Experience Monitoring Solution - eG Enterprise v7
 
How to Monitor Your Java & .NET Applications with eG Enterprise
How to Monitor Your Java & .NET Applications with eG EnterpriseHow to Monitor Your Java & .NET Applications with eG Enterprise
How to Monitor Your Java & .NET Applications with eG Enterprise
 
How to Deliver Exceptional User Experience for VMware Horizon VDI Environments
How to Deliver Exceptional User Experience for VMware Horizon VDI EnvironmentsHow to Deliver Exceptional User Experience for VMware Horizon VDI Environments
How to Deliver Exceptional User Experience for VMware Horizon VDI Environments
 

Mehr von rsnarayanan

Kevin Ms Web Platform
Kevin Ms Web PlatformKevin Ms Web Platform
Kevin Ms Web Platformrsnarayanan
 
Harish Understanding Aspnet
Harish Understanding AspnetHarish Understanding Aspnet
Harish Understanding Aspnetrsnarayanan
 
Harish Aspnet Dynamic Data
Harish Aspnet Dynamic DataHarish Aspnet Dynamic Data
Harish Aspnet Dynamic Datarsnarayanan
 
Harish Aspnet Deployment
Harish Aspnet DeploymentHarish Aspnet Deployment
Harish Aspnet Deploymentrsnarayanan
 
Whats New In Sl3
Whats New In Sl3Whats New In Sl3
Whats New In Sl3rsnarayanan
 
Silverlight And .Net Ria Services – Building Lob And Business Applications Wi...
Silverlight And .Net Ria Services – Building Lob And Business Applications Wi...Silverlight And .Net Ria Services – Building Lob And Business Applications Wi...
Silverlight And .Net Ria Services – Building Lob And Business Applications Wi...rsnarayanan
 
Advanced Silverlight
Advanced SilverlightAdvanced Silverlight
Advanced Silverlightrsnarayanan
 
Occasionally Connected Systems
Occasionally Connected SystemsOccasionally Connected Systems
Occasionally Connected Systemsrsnarayanan
 
Developing Php Applications Using Microsoft Software And Services
Developing Php Applications Using Microsoft Software And ServicesDeveloping Php Applications Using Microsoft Software And Services
Developing Php Applications Using Microsoft Software And Servicesrsnarayanan
 
Build Mission Critical Applications On The Microsoft Platform Using Eclipse J...
Build Mission Critical Applications On The Microsoft Platform Using Eclipse J...Build Mission Critical Applications On The Microsoft Platform Using Eclipse J...
Build Mission Critical Applications On The Microsoft Platform Using Eclipse J...rsnarayanan
 
J Query The Write Less Do More Javascript Library
J Query   The Write Less Do More Javascript LibraryJ Query   The Write Less Do More Javascript Library
J Query The Write Less Do More Javascript Libraryrsnarayanan
 
Ms Sql Business Inteligence With My Sql
Ms Sql Business Inteligence With My SqlMs Sql Business Inteligence With My Sql
Ms Sql Business Inteligence With My Sqlrsnarayanan
 
Windows 7 For Developers
Windows 7 For DevelopersWindows 7 For Developers
Windows 7 For Developersrsnarayanan
 
What Is New In Wpf 3.5 Sp1
What Is New In Wpf 3.5 Sp1What Is New In Wpf 3.5 Sp1
What Is New In Wpf 3.5 Sp1rsnarayanan
 
Ux For Developers
Ux For DevelopersUx For Developers
Ux For Developersrsnarayanan
 
A Lap Around Internet Explorer 8
A Lap Around Internet Explorer 8A Lap Around Internet Explorer 8
A Lap Around Internet Explorer 8rsnarayanan
 

Mehr von rsnarayanan (20)

Walther Aspnet4
Walther Aspnet4Walther Aspnet4
Walther Aspnet4
 
Walther Ajax4
Walther Ajax4Walther Ajax4
Walther Ajax4
 
Kevin Ms Web Platform
Kevin Ms Web PlatformKevin Ms Web Platform
Kevin Ms Web Platform
 
Harish Understanding Aspnet
Harish Understanding AspnetHarish Understanding Aspnet
Harish Understanding Aspnet
 
Walther Mvc
Walther MvcWalther Mvc
Walther Mvc
 
Harish Aspnet Dynamic Data
Harish Aspnet Dynamic DataHarish Aspnet Dynamic Data
Harish Aspnet Dynamic Data
 
Harish Aspnet Deployment
Harish Aspnet DeploymentHarish Aspnet Deployment
Harish Aspnet Deployment
 
Whats New In Sl3
Whats New In Sl3Whats New In Sl3
Whats New In Sl3
 
Silverlight And .Net Ria Services – Building Lob And Business Applications Wi...
Silverlight And .Net Ria Services – Building Lob And Business Applications Wi...Silverlight And .Net Ria Services – Building Lob And Business Applications Wi...
Silverlight And .Net Ria Services – Building Lob And Business Applications Wi...
 
Advanced Silverlight
Advanced SilverlightAdvanced Silverlight
Advanced Silverlight
 
Netcf Gc
Netcf GcNetcf Gc
Netcf Gc
 
Occasionally Connected Systems
Occasionally Connected SystemsOccasionally Connected Systems
Occasionally Connected Systems
 
Developing Php Applications Using Microsoft Software And Services
Developing Php Applications Using Microsoft Software And ServicesDeveloping Php Applications Using Microsoft Software And Services
Developing Php Applications Using Microsoft Software And Services
 
Build Mission Critical Applications On The Microsoft Platform Using Eclipse J...
Build Mission Critical Applications On The Microsoft Platform Using Eclipse J...Build Mission Critical Applications On The Microsoft Platform Using Eclipse J...
Build Mission Critical Applications On The Microsoft Platform Using Eclipse J...
 
J Query The Write Less Do More Javascript Library
J Query   The Write Less Do More Javascript LibraryJ Query   The Write Less Do More Javascript Library
J Query The Write Less Do More Javascript Library
 
Ms Sql Business Inteligence With My Sql
Ms Sql Business Inteligence With My SqlMs Sql Business Inteligence With My Sql
Ms Sql Business Inteligence With My Sql
 
Windows 7 For Developers
Windows 7 For DevelopersWindows 7 For Developers
Windows 7 For Developers
 
What Is New In Wpf 3.5 Sp1
What Is New In Wpf 3.5 Sp1What Is New In Wpf 3.5 Sp1
What Is New In Wpf 3.5 Sp1
 
Ux For Developers
Ux For DevelopersUx For Developers
Ux For Developers
 
A Lap Around Internet Explorer 8
A Lap Around Internet Explorer 8A Lap Around Internet Explorer 8
A Lap Around Internet Explorer 8
 

Kürzlich hochgeladen

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Kürzlich hochgeladen (20)

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Federated Identity Architectures Integrating With The Cloud

  • 1.
  • 2. Ramnish Singh IT Advisor Microsoft Corporation Session Code:
  • 3. Agenda • Microsoft’s Identity and Access Strategy • “Geneva” Claims Based Access User access challenges Identity Metasystem and claims solution Introducing “Geneva” claims based access platform
  • 4. Identity & Access Customer Challenges • Compliance with regulatory • Reducing help desk burden for requirements end users • Auditable processes for • Managing the complexity of granting access to resources distributed identity information Operational Compliance Efficiency Business IT Security Agility • Integrated user • Enabling new high provisioning & business value scenarios credential management • Supporting mergers, acquisitions • Ensuring that only authorized & reorganizations users can access resources
  • 5. Customers’ Identity & Access Requirements Identity & Access Management Compliance and Audit: Monitoring, reporting , auditing of identity-based access activity Policy Management: Identity policy, user/role-based access policy, federation policy, Delegation Access Management: Group Management, Federation/Trust Management, Entitlements, RBAC Identity & Credential Management: User provisioning, Certificate & Smartcard Management, User self-service Identity-Based Access Remote Access Network Access App Access Info Access Access resources remotely Identity-oriented edge SSO, Web/Ent/Host Drive Encryption, ILP, – e.g. SSL VPN access - e.g. NAP Access, Federation Rights Management Identity Infrastructure Identity & Credentials Infrastructure: Directory Identity/Credentials, InfoCards, Meta/Virtual Directory, Basic Policy
  • 6. Microsoft’s Identity & Access Strategy Comprehensive User Centric Open & Best TCO Solutions Extensible Turnkey Offerings Rich Office Integration Service oriented Simplified Licensing On Premises and Cloud Consistent User Application Platform Easiest to Deploy Experience Integration Physical and Virtual Privacy Enabled Open and Interoperable Broadest Ecosystem
  • 8. Identity & Access Silos Block Business Needs Business Needs • Flexible Collaboration: Enable collaboration within the enterprise, across organizational boundaries, and on the Web while satisfying security requirements • Business Agility: Improve ability to react to changing business needs by enabling existing systems to interoperate with new systems such as cloud services and SOA User Access Challenges • Lack of System Interoperability: Difficult for users to gain access across diverse applications and systems to collaborate seamlessly with other users • Hard to Extend User Access: Complex to extend user access from existing applications and systems to new applications and systems, and cloud services and SOA could multiply these challenges What‟s Needed to Solve the Challenges • Single Identity Model: A single simplified user access model that works across different applications and systems to enable collaboration while helping to maintain security • Interoperability: An open and adaptable user access model that enables identities to interoperate with applications and systems regardless of location or architecture
  • 9. Shared Industry Solution: Identity Metasystem and Claims The industry has created a vision and architecture to address the challenges of identity interoperability What is the A shared industry vision for interoperable identity Identity • Single identity model that works in enterprises, federation and consumer Web Metasystem? • Works with existing IT infrastructures • Interoperability based on open protocols • Architecture based on claims Claims describe identity attributes within the Identity Metasystem What are • Used to drive application behavior Claims? • Can disclose identity information selectively • Delivered inside security tokens produced by a security token service (STS) Learn more about the Identity Metasystem • Overview: http://www.identityblog.com/?p=355 • A public policy perspective: http://www.ipc.on.ca/images/Resources/up-7laws_whitepaper.pdf • OASIS standards body: http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=imi • An industry association: http://informationcard.net/ • An open source project: http://www.eclipse.org/org/press-release/20080221_higgins.php
  • 10. Introducing “Geneva” What is “Geneva”? What does “Geneva” include? • Microsoft‟s open platform for simplified and “Geneva” includes three components for enabling claims-based access: security-enhanced user access based on • For Developers: “Geneva” Framework for building .NET applications that use claims claims to make user access decisions • Based on the shared industry vision for an • For IT: “Geneva” Server security token service (STS) for issuing and transforming interoperable Identity Metasystem via claims claims and managing user access • For Users: Windows CardSpace “Geneva” helps users navigate access decisions Why should I adopt “Geneva”? • Simplifies application development by externalizing user access from applications via claims Simplifies User Access • Reduces development effort with pre-built security logic and .NET tools • Helps users navigate multiple logins, manage different personas, and control information sharing Streamlines Access • Helps speed deployment of applications and enhances security via reduced custom implementation work Management & • Simplifies user access management with authentication externalized from applications Security • Enables easier collaboration between organizations with automated federation tools Enhances • More quickly adapt user access control methods to meet changing business needs Interoperability & • Enables users, applications and systems to work better together regardless of location or architecture Adaptability • Includes built-in interoperability via open industry standards including WS-* and SAML
  • 11. Illustration of the Full System One example of how “Geneva” components might be used together 1. A user wants User to access an application Windows CardSpace “Geneva” 2. Gets claims 3. Sends claims ? „Identity Provider‟ „Relying Party‟ App or Service Built with “Geneva” Trust “Geneva” Server Framework Interoperable via industry standard protocols
  • 12. “Geneva” Interoperates with Other Claims Infrastructure 1. User wants to access User an application Browser or Windows Mix and match “Geneva” components CardSpace - OR - Third Party Identity with 3rd party claims-based STS‟s, “Geneva” Selector frameworks, and clients 2. Gets claims 3. Sends claims „Identity Provider‟ „Relying Party‟ App or Service Microsoft Services Connector (MSC) and “Geneva” Built with .NET Access Control Server, Third Party Third Party Service (ACS) are both - OR - Trust “Geneva” - OR - MSC, or STS Framework built on “Geneva” Framework ACS technology and claims architecture Interoperable via industry standard protocols
  • 13. Example Scenarios Benefits Scenarios • Step-Up Authentication: Build an application that requires users to step up to a higher level Simplifies of authentication to approve sensitive transactions Application Access • Cloud SSO: Extend SSO from on-premises Active Directory to Microsoft cloud services with Microsoft Services Connector or .NET Access Control Service (built on “Geneva” technology) • Federated Document Collaboration: Enable employees and partners to collaborate with Office Streamlines Access documents and SharePoint via federation Management & Security • Managed Info Cards: Issue managed information cards to employees to reduce the need to remember multiple logins Enhances • Legacy Interoperability: Implement “Geneva” to help disparate existing applications achieve Interoperability & seamless user access while laying a foundation to add claims-based apps Adaptability • Flexible Authentication: Change authentication methods across multiple applications from username/password to smart cards
  • 14. Features Features Details • Pre-built user access logic based on claims Developer • Developer framework and ASP.NET controls Experiences • Externalize authentication from applications and support multiple authentication types • Federation provider STS with simple administration tools to quickly set up federations Federation • Federation between on-premises directories and cloud services • Multi-protocol federation, including WS-* and SAML 2.0 protocols • Identity provider STS to issue claims and managed CardSpace identities Authentication • Applications can be built to prompt users for stronger credentials for scenarios requiring higher security Flexibility • Switch authentication types with minimal application re-coding • Built-in interoperability via open industry protocols including WS-* and SAML 2.0 Interoperability • STS translates between claims and other protocols to enable claims and non-claims interoperability • Implements the industry Identity Metasystem vision for interoperable identity via claims • Next generation CardSpace helps users navigate between multiple logons User • Streamlined download and installation delivers efficient Web and client experience with CardSpace Experiences • User control and transparency for how information is shared
  • 15. “Geneva” Schedule RTM Beta 2 2nd Half Beta 1 1st Half 2009 October 2009 2008 • Licensing: All three components will be available under Windows license • Ship Vehicle: All three components will be available as separate web downloads • Version Support: Beta 1 supports Windows Server 2008 and Windows Vista. Support at RTM will be announced at a later date
  • 16. Summary Single Simplified Identity Model • Externalizes user access from applications via claims • Reduces application development effort • Helps users make identity decisions Streamlines Access Management and Security • Speeds deployment of applications • Consolidates user access management in hands of IT • Automates federation Interoperable and Adaptable • Flexible to change authentication methods • Works independent of location or architecture • Interoperable via claims, WS-* and SAML 2.0 protocol
  • 17. Developer Benefits What does “Geneva” offer developers? What can developers build with “Geneva”? • “Geneva” Framework: SDK to build claims based • Claims aware .NET applications applications • User authentication experience with CardSpace “Geneva” • Windows CardSpace “Geneva”: Identity client platform • Custom security token services (STS) Why should developers use “Geneva”? Improves • Simplifies application development by externalizing user access from applications via claims Developer • Enables developers to code to a single simplified identity model based on claims Productivity • Includes pre-built security logic with .NET tools to free up time for more value-added work • Helps provide consistent security with a single user access model externalized from applications Enhances Application • Enhances consistency of security with pre-built user access logic Security • Provides seamless user access to on-premises software and cloud services • Offers built-in interoperability via industry protocols including WS-* and SAML 2.0 Interoperable • Implements the industry Identity Metasystem vision for interoperable identity and Extensible • Enables interoperability between users, applications, systems and other resources via claims
  • 18. IT Professional Benefits What does “Geneva” offer IT pros? What can IT pros do with “Geneva”? • “Geneva” Server: Security token service (STS) with • Deploy an STS to enable user access to applications via identity and federation provider roles plus user access claims management capabilities • Quickly establish federations with partners and customers • Windows CardSpace “Geneva”: Authentication client • Issue managed identity cards to users Why should developers use “Geneva”? Streamlines User • Implements a single user access model with native single sign on and easier federation Access • Builds on and interoperates with existing identity infrastructure investments Management • Works with identity management infrastructure such as Active Directory and Identity Lifecycle Manager • Helps provide consistent security with a single user access model externalized from applications Enhances Application • Vests more complete control over user access decisions with IT instead of developers Security • Provides seamless access between on-premises software and cloud services • Based on industry standard protocols including WS-* and SAML 2.0 for interoperability Interoperable & • Meet new business needs faster by allowing applications and infrastructure to evolve independently Adaptable • Integrates new authentication methods with fewer application code changes
  • 19. Comparing AD FS, CardSpace1, WCF with Geneva “Geneva” Framework “Geneva” Server AD FS 1.1 CardSpace “Geneva” CardSpace 1.0 WCF • End to end claims support • Pre-built ASP.NET controls • Passive browser federation • WS-* protocols • Federate Office documents “Geneva” Adds • Self-issued information cards • SAML 2.0 protocol support • Federated SharePoint • Native SSO • Federated rights management • Active client federation • Automated trust management • Managed information cards • Streamlined client UI
  • 20. “Geneva” Beta 1 vs. Future Features Component Beta 1 Features Features We Will Add by RTM • Externalize authentication from the app • SAML 2.0 IDP and SP protocol support for SSO • Multiple authentication types supported • Identity delegation • Step-up authentication “Geneva” • Write apps to accept managed CardSpace Framework identities • SAML 2.0 token format • Transform claims into Kerberos tokens • Provision an STS in relying party apps • Identity provider integrated with Active • Automated trust management Directory • SAML 2.0 protocol for SP for SSO • Issue managed CardSpace identities • Support for alternate identity attribute stores • SAML 2.0 protocol for IDP for SSO • Issue multiple CardSpace identities for multiple • SAML 2.0 token format user roles “Geneva” Server • Transform claims into Kerberos tokens • Extranet access support • Easy trust establishment • Powershell support • Identity delegation management • Interoperability of WS-Fed with mobile and other low-performance clients • Support for managed information card • User self-issued information cards issuance • Backward compatibility for Windows apps CardSpace • Small download (less than 5mb) • Challenge-response for authentication assurance • Streamlined UI • Secure desktop “Geneva” • Inline UI for websites
  • 21. “Geneva” Beta 1 vs. Future Scenarios Beta 1 Scenarios Scenarios We Will Enable by Final Release Enable employees and partners to collaborate with Office documents Accept self-issued information cards on an e-commerce website and SharePoint via federation. to speed checkout and improve security. Extend single sign on from an on-premises directory such as Active Directory to cloud services such as those offered by Live. Build an application that asks users to step up to a higher level of authentication based on context Build an application that later allows IT to change authentication methods from username/password to smart cards without app code changes. Build a chain of applications and services that act on behalf of users while maintaining control of identity disclosure within claims. Issue managed information cards to employees to reduce the need to remember multiple logins. Implement “Geneva” to help an existing Kerberos application achieve seamless user access while laying a foundation to add claims-based apps. Implement federation with partners on heterogeneous infrastructures and maintain trusts automatically.
  • 23.
  • 24.
  • 25. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Hinweis der Redaktion

  1. If you would like to host your demo on the Virtual Server, please use the myVPC demo slide, not this slide.