SlideShare a Scribd company logo
1 of 48
Download to read offline
IBM Identity and Access
Management PoV 2016
๋ฐ•ํ˜•๊ทผ ์‹ค์žฅ
์ œํ’ˆ ๊ธฐ๋Šฅ ์ผ๋ฐ˜
IBM IDENTITY AND ACCESS MANAGEMENT POV 2016
3 IBM Security
IM ์ด์ค‘ํ™” ๊ตฌ์„ฑ
- ๊ณ„์ •๊ด€๋ฆฌ์‹œ์Šคํ…œ์€ ๋‘ ๋Œ€์˜ ์„œ๋ฒ„์— Active-Active ๋กœ ์šด์˜ํ•ฉ๋‹ˆ๋‹ค. Active ์„œ๋ฒ„ ๋‹ค์šด ์‹œ ์ž๋™์ ์œผ๋กœ ๋‹ค๋ฅธ Active ์‹œ์Šคํ…œ์ด Take-over ํ•˜๋„๋ก
๊ตฌ์„ฑํ•ฉ๋‹ˆ๋‹ค.
- ๋‘ ๋Œ€ ์ด์ƒ์˜ ์„œ๋ฒ„์— L4์Šค์œ„์น˜๋ฅผ ํ†ตํ•œ clustering ํ˜•ํƒœ๋กœ ๊ตฌ์„ฑํ•˜์—ฌ, ํ‰์†Œ์— load-balancing ์œผ๋กœ ๋ถ€ํ•˜ ๋ถ„์‚ฐํ•˜๋„๋ก ์šด์˜ํ•˜๋ฉฐ, ์„œ๋ฒ„ ๋‹ค์šด ์‹œ
๋‚˜๋จธ์ง€ ์„œ๋ฒ„๊ฐ€ ์‹ค์‹œ๊ฐ„ take-over๋ฅผ ํ•˜๋„๋ก ๊ตฌ์„ฑํ•˜์—ฌ ์ง€์†์ ์ธ ์„œ๋น„์Šค๋ฅผ ์ˆ˜ํ–‰ํ•˜๋„๋ก ๊ตฌ์„ฑํ•ฉ๋‹ˆ๋‹ค.
๊ณ„์ •๊ด€๋ฆฌ ์‹œ์Šคํ…œ
ISIM 1
LDAP(Master)
O/S
L4 Switch L4 Switch
Load-Balancing ์ž๋™ Fail-over
์‚ฌ์šฉ์ž ์‚ฌ์šฉ์ž
๊ณ„์ •๊ด€๋ฆฌ ์‹œ์Šคํ…œ
ISIM 2
LDAP(Master)
O/S
๊ณ„์ •๊ด€๋ฆฌ ์‹œ์Šคํ…œ
ISIM 1
LDAP(Master)
O/S
๊ณ„์ •๊ด€๋ฆฌ ์‹œ์Šคํ…œ
ISIM 2
LDAP(Master)
O/S
์žฅ์• 
์‹œ์Šคํ…œ ์žฅ์•  ์‹œ, ์ž๋™ Fail-over๋ฅผ ์ˆ˜ํ–‰ํ•˜๋„๋ก ์‹œ์Šคํ…œ ์•„ํ‚คํ…์ฒ˜๋ฅผ ๋””์ž์ธํ•˜์˜€์Šต๋‹ˆ๋‹ค. IM์„ ๊ตฌ์„ฑํ•˜๋Š” WAS, LDAP, DB๋„
์ž์ฒด์ ์ธ ์ด์ค‘ํ™”๋ฅผ ๊ตฌ์„ฑํ•˜๊ณ  ์žˆ์–ด, ์–ด๋Š ํ•œ์ชฝ์˜ ์žฅ์• ๊ฐ€ ๋ฐœ์ƒํ•˜์—ฌ๋„ ๋™์ž‘์—๋Š” ๋ฌธ์ œ๊ฐ€ ์—†์Šต๋‹ˆ๋‹ค.
1. ์†”๋ฃจ์…˜ ์†Œ๊ฐœ ๋ฐ ๊ตฌ์กฐ
4 IBM Security
ISIM์€ ID/ํŒจ์Šค์›Œ๋“œ ์ •์ฑ… ํ†ตํ•ฉ๊ด€๋ฆฌ, ์›Œํฌํ”Œ๋กœ์šฐ, ํ”„๋กœ๋น„์ €๋‹, ์…€ํ”„์„œ๋น„์Šค, ๊ฐ์‚ฌ ๋ฐ ๋ณด๊ณ  ๋“ฑ์˜ ๊ธฐ๋Šฅ์„ ๊ฐ–์ถ”๊ณ  ์žˆ์œผ๋ฉฐ, Web๊ธฐ๋ฐ˜์˜ Admin Console
๋กœ ๊ด€๋ฆฌ์ž๊ฐ€ ์•„๋ž˜ ์ฃผ์š” ๊ธฐ๋Šฅ์— ๋Œ€ํ•œ ๊ด€๋ฆฌ๋ฅผ ํ•˜๊ณ , ์‚ฌ์šฉ์ž๋Š” ๋ณ„๋„ ์ œ๊ณต๋˜๋Š” Self Console์„ ์ด์šฉํ•˜์—ฌ ๋น„๋ฐ€๋ฒˆํ˜ธ ๋ณ€๊ฒฝ ๋“ฑ ์ž์‹ ์˜ ๊ณ„์ •๊ด€๋ จ ์ •๋ณด๋ฅผ
๊ด€๋ฆฌํ•ฉ๋‹ˆ๋‹ค.
ISIM ์ฃผ์š”๊ธฐ๋Šฅ
์ฃผ์š” ๊ด€๋ฆฌ ๊ธฐ๋Šฅ ๊ธฐ๋Šฅ ์„ค๋ช…
๋น„๋ฐ€๋ฒˆํ˜ธ ๋ณ€๊ฒฝ ์„ ํƒํ•œ ์‚ฌ์šฉ์ž์˜ ๋น„๋ฐ€๋ฒˆํ˜ธ๋ฅผ ๊ด€๋ฆฌ์ž๊ฐ€ ์„ค์ •ํ•˜๊ฑฐ๋‚˜ ์‹œ์Šคํ…œ์—์„œ ์ƒ์„ฑํ•œ ๋น„๋ฐ€๋ฒˆํ˜ธ๋กœ ๋ณ€๊ฒฝํ•ฉ๋‹ˆ๋‹ค.
์—ญํ•  ๊ด€๋ฆฌ ์—ญํ• (Role)์„ ์ถ”๊ฐ€, ๋ณ€๊ฒฝ, ์‚ญ์ œํ•˜๊ณ  ์—ญํ•  ๋ฉค๋ฒ„์‹ญ์„ ๊ด€๋ฆฌํ•˜๊ฑฐ๋‚˜ ์—ญํ•  ๊ณ„์ธต ๊ตฌ์กฐ๋ฅผ ๊ด€๋ฆฌํ•ฉ๋‹ˆ๋‹ค.
์กฐ์ง ๊ตฌ์กฐ ๊ด€๋ฆฌ ์กฐ์ง์ •๋ณด๋ฅผ ํŠธ๋ฆฌ ํ˜•ํƒœ๋กœ ๊ด€๋ฆฌํ•˜๋ฉฐ ์กฐ์ง, ์œ„์น˜ ๋ฐ ๊ธฐํƒ€ ๊ตฌ์„ฑ์š”์†Œ๋ฅผ ์ž‘์„ฑ, ๋ณ€๊ฒฝ ๋˜๋Š” ์‚ญ์ œํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
์‚ฌ์šฉ์ž ๊ด€๋ฆฌ ๊ด€๋ฆฌ ๋Œ€์ƒ ์‚ฌ์šฉ์ž ๋ชฉ๋ก์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ์‚ฌ์šฉ์ž์˜ ์ •๋ณด ์ˆ˜์ • ๋ฐ ์—ฐ๊ณ„๋œ ๊ณ„์ •์„ ๊ฒ€์ƒ‰/๊ด€๋ฆฌ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
์„œ๋น„์Šค ๊ด€๋ฆฌ ๊ด€๋ฆฌ ๋Œ€์ƒ ์„œ๋น„์Šค ๋ชฉ๋ก์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ์„œ๋น„์Šค์˜ ์ˆ˜์ • ๋ฐ ์—ฐ๋™์ƒํƒœ ํ™•์ธ๊ณผ ์„œ๋น„์Šค์— ์—ฐ๊ณ„๋œ ๊ณ„์ •์„ ๊ฒ€์ƒ‰/๊ด€๋ฆฌ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
Orphan ๊ณ„์ • ๊ด€๋ฆฌ ์†Œ์œ ์ž๊ฐ€ ์—†๋Š” ๊ณ ์•„๊ณ„์ • ๋ชฉ๋ก์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ๊ฐ ์„œ๋น„์Šค ๋ณ„๋กœ ๊ณ ์•„๊ณ„์ •์„ ๊ฒ€์ƒ‰ํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ ๊ณ ์•„๊ณ„์ • ๊ด€๋ฆฌ๋ฅผ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
๊ทธ๋ฃน๊ด€๋ฆฌ ๊ฐ ์„œ๋น„์Šค์—์„œ ๊ด€๋ฆฌ๋˜๋Š” ๊ทธ๋ฃน์˜ ๋ชฉ๋ก์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ์ฃผ๋กœ OS์˜ ๊ทธ๋ฃน์„ ๊ด€๋ฆฌํ•˜๋ฉฐ ๊ทธ๋ฃน์˜ ๊ฒ€์ƒ‰/๋ณ€๊ฒฝ/์ƒ์„ฑ/์‚ญ์ œ๋ฅผ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
๊ณต์œ  ์•ก์„ธ์Šค ๊ด€๋ฆฌ ๊ฐ ์„œ๋น„์Šค์˜ ๊ณต์œ ๊ณ„์ •์„ ๊ด€๋ฆฌํ•ฉ๋‹ˆ๋‹ค. ๊ณต์œ ๊ณ„์ • ์ •์ฑ…์— ๋”ฐ๋ผ ๋“ฑ๋ก๋œ ๊ณต์œ ๊ณ„์ •์„ ์‚ฌ์šฉ์ž์—๊ฒŒ ํ• ๋‹น/ํšŒ์ˆ˜ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
์ •์ฑ… ๊ด€๋ฆฌ ๊ณ„์ •๊ด€๋ฆฌ์—์„œ ์‚ฌ์šฉ์ž/๊ณ„์ •์„ ๊ด€๋ฆฌํ•˜๊ธฐ ์œ„ํ•œ Provisioning, Reconciliation, ID ์ƒ์„ฑ, ๋น„๋ฐ€๋ฒˆํ˜ธ, ์žฌ์ธ์ฆ ๋“ฑ์˜ ์ •์ฑ…์„ ๊ด€๋ฆฌํ•ฉ๋‹ˆ๋‹ค.
์›Œํฌํ”Œ๋กœ์šฐ ๊ด€๋ฆฌ ๊ณ„์ • ๋ฐ ๊ถŒํ•œ์— ๋Œ€ํ•œ ์ƒ์„ฑ/๋ณ€๊ฒฝ/์‚ญ์ œ/์ƒํƒœ ๋ณ€๊ฒฝ ์‹œ ์Šน์ธ ์ ˆ์ฐจ ๋ฐ ๋™์ž‘ ์ ˆ์ฐจ๋ฅผ ์ •์˜ํ•œ ์›Œํฌํ”Œ๋กœ์šฐ๋ฅผ ์ƒ์„ฑ/๋ณ€๊ฒฝ/์‚ญ์ œ ํ•ฉ๋‹ˆ๋‹ค.
์‹œ์Šคํ…œ ๋ณด์•ˆ ์„ค์ • ๊ณ„์ •๊ด€๋ฆฌ ์‹œ์Šคํ…œ ์ž์ฒด์˜ ๋ณด์•ˆ ์„ค์ • ๋ฐ ISIM ๋‚ด๋ถ€ ๊ทธ๋ฃน๋ณ„ ์ ‘๊ทผ ํ™”๋ฉด/๊ธฐ๋Šฅ์„ ์„ค์ • ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
๋ณด๊ณ ์„œ ์š”์ฒญ, ์‚ฌ์šฉ์ž ๋ฐ ๊ณ„์ •, ์„œ๋น„์Šค, ๊ฐ์‚ฌ ๋ฐ ๋ณด์•ˆ, ์‚ฌ์šฉ์ž ์ •์˜ ๋ณด๊ณ ์„œ๋ฅผ ์ œ๊ณตํ•˜๋ฉฐ ์‚ฌ์šฉ์ž๊ฐ€ ์‹ ๊ทœ ๋ณด๊ณ ์„œ๋ฅผ ์ƒ์„ฑ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
์‹œ์Šคํ…œ ๊ตฌ์„ฑ ์‚ฌ์šฉ์ž/์„œ๋น„์Šค/๊ถŒํ•œ/์†Œ์œ ๊ถŒ Profile, ์ด๋ฉ”์ผ/ํ™”๋ฉด ์–‘์‹, ๊ธ€๋กœ๋ฒŒ ์ •์ฑ…, Life-Cycle Rule, ๊ธ€๋กœ๋ฒŒ ์ •์ฑ…์— ๋Œ€ํ•ด ์„ค์ • ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
์š”์ฒญ ๋ณด๊ธฐ ์‚ฌ์šฉ์ž ๋˜๋Š” ์‹œ์Šคํ…œ์— ์˜ํ•ด ์š”์ฒญ๋œ Task์— ๋Œ€ํ•œ ํ˜„ํ™ฉ ๋ฐ ๊ฒฐ๊ณผ๋ฅผ ๋‹ค์–‘ํ•œ ๊ฒ€์ƒ‰ ์กฐ๊ฑด์— ์˜ํ•ด ํ™•์ธ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
ํ™œ๋™ ๊ด€๋ฆฌ ์‚ฌ์šฉ์ž์˜ ์Šน์ธ ์š”์ฒญ ๋ชฉ๋ก, ์Šน์ธ ๊ถŒํ•œ ์œ„์ž„ ์„ค์ • ๋“ฑ ์‚ฌ์šฉ์ž์˜ ๊ฐœ์ž…์ด ํ•„์š”ํ•œ ํ™œ๋™ ๋ชฉ๋ก์„ ๋ณผ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
1. ์†”๋ฃจ์…˜ ์†Œ๊ฐœ ๋ฐ ๊ตฌ์กฐ
5 IBM Security
ISIM์€ Eclipse ๊ธฐ๋ฐ˜์˜ ๋…๋ฆฝ๋œ ISIM Adapter ๊ฐœ๋ฐœ๋„๊ตฌ์ธ ADT(Adapter Development Tool)์„ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค. ADT๋Š” ๊ฐœ๋ฐœ์ž PC์— ์„ค์น˜ํ•˜
์—ฌ ์‚ฌ์šฉ์ด ๊ฐ€๋Šฅํ•˜๋ฏ€๋กœ ๊ฐœ๋ฐœ์ž๋Š” ์ต์ˆ™ํ•œ ํ™˜๊ฒฝ์—์„œ ๋‹ค์–‘ํ•œ ๋ ˆํผ๋Ÿฐ์Šค๋ฅผ ํ†ตํ•ด ์‹ ์†ํ•œ ๊ฐœ๋ฐœ์„ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
2. ๊ธฐ๋ณธ ๊ธฐ๋Šฅ
2.3. Adapter Development Tool ์ง€์›
Adapter Interface ์„ค์ • ๋‚ด์žฅ๋œ Javascript ์ด์šฉํ•œ ๊ฐœ๋ฐœ
6 IBM Security
ISIM์€ ์ธ์‚ฌ ์ •๋ณด๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ์ •์ฑ… ๊ธฐ๋ฐ˜์˜ ์ „์‚ฌ ์ธํ”„๋ผ์— ๋Œ€ํ•œ ๊ณ„์ • ๊ด€๋ฆฌ๋ฅผ ์ˆ˜ํ–‰ํ•ฉ๋‹ˆ๋‹ค.
2.2 ์ธ์‚ฌ ์ •๋ณด ์—ฐ๋™
2. ๊ธฐ๋ณธ ๊ธฐ๋Šฅ
LDAP
(์‚ฌ์šฉ์ž/๊ณ„์ •
์ •๋ณด)
ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ…
Security Identity Manager
ISIM Adapter
์‚ฌ์šฉ์ž ์—ฐ๋™
๋™๊ธฐํ™”
์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ณ„์ •
๊ณ„์ •/๊ถŒํ•œ DB
OS ๊ณ„์ •
OS
DB ๊ณ„์ •
DB
์‚ฌ์šฉ์ž
๊ณ„์ •์‹ ์ฒญ
7 IBM Security
ISIM์€ ๊ณ„์ •๊ด€๋ฆฌ๋ฅผ ์œ„ํ•œ ๊ด€๋ฆฌ์ž ์ฝ˜์†”๊ณผ ์‚ฌ์šฉ์ž๋ฅผ ์œ„ํ•œ ์…€ํ”„์„œ๋น„์Šค๋ฅผ ๊ธฐ๋ณธ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ๋˜ํ•œ, Customizing ๋œ ๊ณ„์ •๊ด€๋ฆฌํฌํƒˆ ๋ณ„๋„ ์ œ๊ณต์ด ๊ฐ€๋Šฅํ•ฉ
๋‹ˆ๋‹ค. ISIM์€ ๋Œ€์ƒ์‹œ์Šคํ…œ๊ณผ์˜ ๋™๊ธฐํ™” ๊ธฐ๋Šฅ์„ ํ†ตํ•ด ์‚ฌ์šฉ์ž-๊ณ„์ • ๊ฐ„ ์ •๋ณด ์ผ์น˜ ๋ฐ ์‹œ์Šคํ…œ์—์„œ ๋ถˆ๋ฒ•์œผ๋กœ ์ƒ์„ฑํ•œ ๊ณ„์ •์„ ๊ฒ€์ถœํ•˜์—ฌ ์ž๋™ ์กฐ์น˜ํ•ฉ๋‹ˆ
๋‹ค. ๊ฒฐ์žฌ์‹œ์Šคํ…œ๊ณผ ๊ฐ™์€ ์—…๋ฌด ์‹œ์Šคํ…œ ์—ฐ๊ณ„๋Š” ๊ณ„์ •๊ด€๋ฆฌ ํฌํƒˆ์—์„œ ์—…๋ฌด์‹œ์Šคํ…œ์ด ์ œ๊ณตํ•ด ์ฃผ๋Š” ์ธํ„ฐํŽ˜์ด์Šค๋กœ ์—ฐ๋™์„ ์ง„ํ–‰ํ•ฉ๋‹ˆ๋‹ค.
3.1 ๊ณ„์ • ์ƒ์„ฑ/์ˆ˜์ •/์ž ๊ธˆ/์‚ญ์ œ ๊ด€๋ฆฌ - ๊ณ„์ • ์ƒ์„ฑ/์ˆ˜์ •/์ž ๊ธˆ/์‚ญ์ œ ๊ด€๋ฆฌ์ž ๋ฐ ์‚ฌ์šฉ์ž ํฌํƒˆ ์ œ๊ณต
3. ๊ณ„์ • ๊ด€๋ฆฌ
๊ธฐ๋ณธ ๊ด€๋ฆฌ์ž ์ฝ˜์†” Customizing๋œ L์‚ฌ ๊ณ„์ •๊ด€๋ฆฌ ํฌํƒˆ ์˜ˆ๊ธฐ๋ณธ ์‚ฌ์šฉ์ž ์…€ํ”„์„œ๋น„์Šค
3.1 ๊ณ„์ • ์ƒ์„ฑ/์ˆ˜์ •/์ž ๊ธˆ/์‚ญ์ œ ๊ด€๋ฆฌ โ€“ ๋‚ด๋ถ€ ๊ฒฐ์ œ ์‹œ์Šคํ…œ๊ณผ์˜ ์—ฐ๋™ ์ œ๊ณต
๋‚ด๋ถ€ ๊ฒฐ์žฌ ์‹œ์Šคํ…œ
๊ณ„์ • ์ƒ์„ฑ/์ˆ˜์ •/์‚ญ์ œ ๊ฒฐ์žฌ ์š”์ฒญ
๊ฒฐ์žฌ ๊ฒฐ๊ณผ ์ œ๊ณต
๊ณ„์ •๊ด€๋ฆฌ ํฌํƒˆ โ€ข ๊ณ„์ •๊ด€๋ฆฌํฌํƒˆ์„ ํ†ตํ•ด ๊ณ„์ • ์ƒ์„ฑ/์ˆ˜์ •/์‚ญ์ œ ์š”์ฒญ ์ ‘์ˆ˜
โ€ข ๋‚ด๋ถ€ ๊ฒฐ์žฌ ์‹œ์Šคํ…œ์œผ๋กœ ๊ณ„์ •๊ด€๋ฆฌํฌํƒˆ์—์„œ ๊ฒฐ์žฌ ์š”์ฒญ
- ๊ฒฐ์žฌ์‹œ์Šคํ…œ์—์„œ ์ œ๊ณตํ•˜๋Š” ์ธํ„ฐํŽ˜์ด์Šค ์‚ฌ์šฉ
โ€ข ๊ฒฐ์žฌ ์ง„ํ–‰์„ ์ง€์†์ ์œผ๋กœ ํ™•์ธ
โ€ข ๊ฒฐ์žฌ๊ฐ€ ์™„๋ฃŒ๋œ ๊ฒฝ์šฐ ๊ณ„์ • ์ƒ์„ฑ/์ˆ˜์ •/์‚ญ์ œ ์‹คํ–‰
8 IBM Security
ISIM์€ Java ๊ธฐ๋ฐ˜์˜ ๋‹ค์–‘ํ•œ API๋ฅผ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค. ISIM์€ API์— ๋Œ€ํ•œ ์ƒ์„ธ Document์™€ ์ƒ˜ํ”Œ ์ฝ”๋“œ๋ฅผ ์ œ๊ณตํ•จ์œผ๋กœ์จ ๊ฐœ๋ฐœ์ž๊ฐ€ ํ•ด๋‹น API
๋ฅผ ์ด์šฉํ•˜์—ฌ ์™ธ๋ถ€ ์‹œ์Šคํ…œ ์—ฐ๊ณ„, UI ์ปค์Šคํ„ฐ๋งˆ์ด์ง• ๋ฐ ํ™•์žฅ ๊ฐœ๋ฐœ์„ ์‰ฝ๊ฒŒ ํ•  ์ˆ˜ ์žˆ๋„๋ก ํ•ฉ๋‹ˆ๋‹ค.
์ง€์› API ์ข…๋ฅ˜
๏‚ก ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜(๊ณ„์ • ์ƒ์„ฑ/๋ณ€๊ฒฝ/์‚ญ์ œ ๋“ฑ)
๏‚ก ๊ถŒํ•œ
๏‚ก ๋ฐ์ดํ„ฐ ์„œ๋น„์Šค
๏‚ก SDI Integration
๏‚ก Java Script
๏‚ก ๋ฉ”์ผ
๏‚ก ํŒจ์Šค์›Œ๋“œ
๏‚ก ์ •์ฑ…
๏‚ก Single Sign-on
๏‚ก ์›Œํฌํ”Œ๋กœ์šฐ
๏‚ก ์Šน์ธ ๋ฐ ๊ฒฐ๊ณผ
try {
// create platform context
Hashtable env = new Hashtable();
env.put(InitialPlatformContext.CONTEXT_FACTORY,
"com.ibm.iISIM.apps.impl.websphere.WebspherePlatformContextFactory");
env.put(PlatformContext.PLATFORM_URL, "iiop://localhost");
PlatformContext platform = new InitialPlatformContext(env);
// create authentication handler
PlatformCallbackHandler handler =
new PlatformCallbackHandler("jdoe", "secret");
handler.setPlatformContext(platform);
// attempt authentication
LoginContext lc = new LoginContext("ISIM", handler);
lc.login();
// create manager
PersonManager mgr = new PersonManager(platform, lc.getSubject());
// find user
Collection people = mgr.getPeople(null, โ€ฆโ€ฆโ€ฆโ€ฆ
์ƒ˜ํ”Œ API
3. ๊ณ„์ • ๊ด€๋ฆฌ
3.1. ๋‹ค์–‘ํ•œ API ์ง€์›
9 IBM Security
3. ๊ณ„์ • ๊ด€๋ฆฌ
ISIM์€ ์‚ฌ์šฉ์ž ๋ณธ์ธ์ด ์ž์‹ ์˜ ์ •๋ณด๋ฅผ ๊ด€๋ฆฌํ•˜๊ณ  ๋น„๋ฐ€๋ฒˆํ˜ธ ๋ณ€๊ฒฝ ๋ฐ ๊ณ„์ •/๊ถŒํ•œ ์‹ ์ฒญ, ์‹ ์ฒญ๋‚ด์—ญ ๋ณด๊ธฐ, ์Šน์ธ ์š”์ฒญ ์ฒ˜๋ฆฌ ๋“ฑ๊ณผ ๊ฐ™์ด ๊ณ„์ •
๋ฐ ๊ถŒํ•œ์— ๋Œ€ํ•œ ๊ด€๋ฆฌ๋ฅผ ์Šค์Šค๋กœ ํ•  ์ˆ˜ ์žˆ๋„๋ก UI๋ฅผ ์ œ๊ณตํ•˜์—ฌ ์ „์‚ฌ์ ์ธ ๊ด€๋ฆฌ ๋ถ€๋‹ด์„ ๊ฐ์†Œ ์‹œํ‚ต๋‹ˆ๋‹ค.
์…€ํ”„ ์„œ๋น„์Šค ๊ธฐ๋Šฅ
์Šน์ธ ๋Œ€๊ธฐ ๋ชฉ๋ก
์Šน์ธ์— ๋Œ€ํ•œ ๊ด€๋ฆฌ
๊ณ„์ • ๋ฐ ๊ถŒํ•œ ๊ด€๋ฆฌ
์š”์ฒญ ๊ฒฐ๊ณผ ํ™•์ธ
๋น„๋ฐ€๋ฒˆํ˜ธ ๊ด€๋ฆฌ
๊ณต์œ  ๊ณ„์ • ์š”์ฒญ/ํ™•์ธ
์‚ฌ์šฉ์ž ํ”„๋กœํŒŒ์ผ ๊ด€๋ฆฌ
10 IBM Security
๊ณ„์ • ๋กœ๊ทธ์ธ์— ์‚ฌ์šฉ๋˜๋Š” ์•”ํ˜ธ ์ •์ฑ… ๊ด€๋ฆฌ ๊ธฐ๋Šฅ์„ ์ œ๊ณตํ•˜๋ฉฐ, ์•”ํ˜ธ ์ •์ฑ…์— ํฌํ•จ๋œ ๋ฌธ์ž ๊ตฌ์„ฑ, ๋ณ€๊ฒฝ ์ฃผ๊ธฐ, ์•”ํ˜ธ ์ด๋ ฅ๊ด€๋ฆฌ ์ •์ฑ… ๋ฐ˜์˜์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. ๊ธˆ์ง€์–ด ์‚ฌ์ „ ๊ตฌ์„ฑ์„ ํ†ตํ•ด ๋…ธ์ถœ๋˜๊ธฐ ์‰ฌ์šด ๋‹จ์–ด ๋“ฑ ์‚ฌ์šฉ
๊ธˆ์ง€ ๋ฌธ์ž๊ตฌ์„ฑ์„ ์„ค์ • ํ•˜์—ฌ ์•”ํ˜ธ ์ ์šฉ์„ ์ œํ•œํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
์•”ํ˜ธ ์ •์ฑ…
๏‚ก์ตœ์†Œ ๊ธธ์ด
๏‚ก์ตœ๋Œ€ ๊ธธ์ด
๏‚ก์ตœ๋Œ€ ๋ฐ˜๋ณต ๋ถ„์ž
๏‚กํ•„์ˆ˜ ์ตœ์†Œ ๊ณ ์œ  ๋ฌธ์ž
๏‚กํ•„์ˆ˜ ์ตœ์†Œ ์˜๋ฌธ/์ˆซ์ž
๏‚ก์˜ฌ๋ฐ”๋ฅด์ง€ ์•Š์€ ๋ฌธ์ž
๏‚กํ•„์ˆ˜ ๋ฌธ์ž
๏‚ก๋ฌธ์ž ์ œํ•œ
๏‚ก์‹œ์ž‘ ๋ฌธ์ž
๏‚ก๋ฐ˜๋ณต ํžˆ์Šคํ† ๋ฆฌ ๊ธธ์ด
๏‚ก์ „ํ™˜๋œ ํžˆ์Šคํ† ๋ฆฌ ๊ธธ์ด
๏‚ก์‚ฌ์šฉ์ž ์ด๋ฆ„ ํ—ˆ์šฉ ์—ฌ๋ถ€
๏‚ก์‚ฌ์šฉ์ž ์ด๋ฆ„ ๋Œ€์†Œ๋ฌธ์ž ๊ตฌ๋ถ„
๏‚ก์‚ฌ์šฉ์ž ID ํ—ˆ์šฉ ์—ฌ๋ถ€
๏‚ก์‚ฌ์šฉ์ž ID ๋Œ€์†Œ๋ฌธ์ž ๊ตฌ๋ถ„
๏‚ก์‚ฌ์ „ ๊ธฐ๋ฐ˜ ํŒจ์Šค ์›Œ๋“œ ์‚ฌ์šฉ ๋ถˆ๊ฐ€
- ์„ค์ •๋œ ๋น„๋ฐ€๋ฒˆํ˜ธ๋Š” ๋Œ€์ƒ์‹œ์Šคํ…œ์—์„œ ์š”๊ตฌํ•˜๋Š” ์•”ํ˜ธํ™” ๋ฐฉ์‹์œผ๋กœ ์•”ํ˜ธํ™”๋˜์–ด ์ „๋‹ฌ
- ๋น„๋ฐ€๋ฒˆํ˜ธ ๋ถ„์‹ค ์‹œ ์‚ฌ์šฉ์ž ์Šค์Šค๋กœ ๋น„๋ฐ€๋ฒˆํ˜ธ ์ดˆ๊ธฐํ™”๋ฅผ ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์› (์ดˆ๊ธฐํ™”๋œ ๋น„๋ฐ€๋ฒˆํ˜ธ๋Š” SMS, Email๋“ฑ์„ ํ†ตํ•ด ์ „์†ก)
- ๊ด€๋ฆฌ์ž์— ์˜ํ•œ ์‚ฌ์šฉ์ž ๋น„๋ฐ€๋ฒˆํ˜ธ ๋ณ€๊ฒฝ ๊ธฐ๋Šฅ ์ง€์›
3. ๊ณ„์ • ๊ด€๋ฆฌ
11 IBM Security
์‚ฌ์šฉ์ž๋Š” ์ œ๊ณต๋˜๋Š” ์…€ํ”„์„œ๋น„์Šค๋ฅผ ์ด์šฉํ•˜์—ฌ ์‚ฌ์šฉ์ž๊ฐ€ ์ง์ ‘ ID๋ฅผ ์‹ ์ฒญํ•˜๊ณ , ์‚ญ์ œํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋˜ํ•œ, Password๋„ ์…€ํ”„์„œ๋น„์Šค๋ฅผ ํ†ตํ•ด ์ดˆ๊ธฐํ™”/๋ณ€๊ฒฝ์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค.
์…€ํ”„์„œ๋น„์Šค ID/PW ๊ด€๋ฆฌ
- ID๋Š” ID ์ •์ฑ…๊ด€๋ฆฌ์— ์˜ํ•ด ์ž๋™์œผ๋กœ ์ƒ์„ฑ๋ฉ๋‹ˆ๋‹ค. ์‚ฌ์šฉ์ž๋Š” ์„œ๋น„์Šค์— ๋Œ€ํ•œ ๊ณ„์ • ์‹ ์ฒญ๋งŒ์œผ๋กœ ID๋ฅผ ์ƒ์„ฑํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
- ๊ณ„์ • ์‹ ์ฒญ ์‹œ ๊ฐ ์„œ๋น„์Šค ๋ณ„๋กœ ํ•„์š”ํ•œ ๋ถ€๊ฐ€์ •๋ณด๋ฅผ ์„ค์ • ํ•  ์ˆ˜ ์žˆ๋„๋ก ํ™”๋ฉด ๊ตฌ์„ฑ์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค.
- Password๋Š” ๋น„๋ฐ€๋ฒˆํ˜ธ ์ •์ฑ…๊ด€๋ฆฌ์—์„œ ํ—ˆ์šฉ๋œ ํ˜•ํƒœ๋กœ ์ƒ์„ฑ ๊ฐ€๋Šฅํ•˜์—ฌ, ์ „์‚ฌ ๋น„๋ฐ€๋ฒˆํ˜ธ ๊ทœ์ • ์ค€์ˆ˜๋ฅผ ๊ฐ•์ œํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
์…€ํ”„์„œ๋น„์Šค ์˜ˆ์ œ
3. ๊ณ„์ • ๊ด€๋ฆฌ
12 IBM Security
3. ๊ณ„์ • ๊ด€๋ฆฌ
์…€ํ”„์„œ๋น„์Šค๋ฅผ ํ†ตํ•ด ์‚ฌ์šฉ์ž๋Š” ์‚ฌ์šฉํ•˜๊ณ ์ž ํ•˜๋Š” ์‹œ์Šคํ…œ์— ๊ณ„์ •์„ ์‹ ์ฒญ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์‹ ์ฒญํ•œ ๊ณ„์ • ํ˜„ํ™ฉ์€ ์‹ ์ฒญ ๋ชฉ๋ก์„
ํ†ตํ•ด ํ™•์ธ์ด ๊ฐ€๋Šฅํ•˜๋ฉฐ ๊ณ„์ • ์‹ ์ฒญ ์Šน์ธ์ด ์™„๋ฃŒ๋˜์—ˆ์„ ๊ฒฝ์šฐ ์ ‘์† ์‹œ์Šคํ…œ ๋ชฉ๋ก์— ์ถ”๊ฐ€๋œ ์‹œ์Šคํ…œ์ด ๋‚˜ํƒ€๋‚˜๊ฒŒ ๋ฉ๋‹ˆ๋‹ค.
์‚ฌ์šฉ์ž ๊ณ„์ • ์‹ ์ฒญ
์‚ฌ์šฉ์ž ๊ณ„์ • ์‹ ์ฒญ ์…€ํ”„์„œ๋น„์Šค ์˜ˆ์ œ๋ชจ๋ฐ”์ผ ์…€ํ”„์„œ๋น„์Šค ์˜ˆ์ œ
13 IBM Security
3. ๊ณ„์ • ๊ด€๋ฆฌ
์‚ฌ์šฉ์ž๋Š” ์…€ํ”„์„œ๋น„์Šค๋ฅผ ํ†ตํ•ด ์ž์‹ ์˜ ๊ถŒํ•œ ํ˜„ํ™ฉ์— ๋Œ€ํ•ด ํ™•์ธ์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. ๋˜ํ•œ ๊ถŒํ•œ ์‹ ์ฒญ ์‹œ ์†Œ์œ ํ•œ ๊ถŒํ•œ์— ๋Œ€ํ•ด์„œ๋Š”
์žฌ ์‹ ์ฒญ์„ ํ•˜๋”๋ผ๋„ ์ž๋™์œผ๋กœ ๊ถŒํ•œ ์‹ ์ฒญ ํ•ญ๋ชฉ์—์„œ ์ œ์™ธ๋ฉ๋‹ˆ๋‹ค.
์…€ํ”„์„œ๋น„์Šค ์‚ฌ์šฉ์ž ๊ถŒํ•œ
- ์‚ฌ์šฉ์ž๋Š” ์…€ํ”„์„œ๋น„์Šค๋ฅผ ํ†ตํ•ด ์ž์‹ ์ด ์†Œ์œ ํ•œ ๊ถŒํ•œ์— ๋Œ€ํ•œ ํ™•์ธ์„ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
- ์†Œ์œ ํ•œ ๊ถŒํ•œ์„ ์„ ํƒํ•˜์—ฌ ๊ถŒํ•œ์— ๋Œ€ํ•œ ๋ณ€๊ฒฝ/์‚ญ์ œ๋ฅผ ์š”์ฒญํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
- ๊ถŒํ•œ ์‹ ์ฒญ ์‹œ ๊ถŒํ•œ์„ ์ค‘๋ณต ์‹ ์ฒญํ•˜๋ฉด ์ž๋™ ์ œ์™ธํ•˜์—ฌ, ๊ถŒํ•œ์˜ ์ž˜๋ชป๋œ ์‹ ์ฒญ์„ ์‚ฌ์ „์— ๋ฐฉ์ง€ํ•ฉ๋‹ˆ๋‹ค.
์‚ฌ์šฉ์ž ๊ถŒํ•œํ™•์ธ ์…€ํ”„์„œ๋น„์Šค ์˜ˆ์ œ
14 IBM Security
3. ๊ณ„์ • ๊ด€๋ฆฌ
3.1 ๊ณ„์ • ์ƒ์„ฑ/์ˆ˜์ •/์ž ๊ธˆ/์‚ญ์ œ ๊ด€๋ฆฌ โ€“ ๊ณ„์ •๊ด€๋ฆฌ ์†”๋ฃจ์…˜๊ณผ ๊ด€๋ฆฌ๋Œ€์ƒ ์‹œ์Šคํ…œ ๊ฐ„ ์‚ฌ์šฉ์ž ๊ณ„์ • ๋™๊ธฐํ™”
์†Œ์œ ์ž๊ฐ€ ์—†๋Š” ๊ณ ์•„๊ณ„์ •(Orphan)์ž„์„ ํ†ตํ•ด
์‹œ์Šคํ…œ์—์„œ ์ง์ ‘ ์ƒ์„ฑ๋œ ์ž„์˜(๋ถˆ๋ฒ•)๊ณ„์ • ํ™•์ธ
-> ์‚ญ์ œ ํ˜น์€ ์†Œ์œ ์ž ์ง€์ •์œผ๋กœ ๊ด€๋ฆฌ
ISIM Server
๊ด€๋ฆฌ ๋Œ€์ƒ ์‹œ์Šคํ…œ
ISDI
1 ์‹œ์Šคํ…œ์—์„œ ์ž„์˜(๋ถˆ๋ฒ•) ๊ณ„์ • ์ƒ์„ฑ
ISIM Server ๊ณ„์ • ์ •๋ณด ์ˆ˜์ง‘
2 ISIM์—์„œ ๋™๊ธฐํ™”(reconciliation) ์ˆ˜ํ–‰
3 ์‹œ์Šคํ…œ์—์„œ ์ง์ ‘ ์ƒ์„ฑ๋œ ๊ณ„์ •์„ ํฌํ•จํ•œ
๊ณ„์ • ๋ฆฌ์ŠคํŠธ ์ œ๊ณต
4 5 ISIM ๋ณด๊ณ ์„œ๋ฅผ ํ†ตํ•œ ๋ฆฌํฌํŒ…
(๊ฐ์‚ฌ ๋ณด๊ณ ์„œ๊ฐ€ ๊ธฐ๋ณธ์œผ๋กœ ์ œ๊ณต๋จ)
3.1 ๊ณ„์ • ์ƒ์„ฑ/์ˆ˜์ •/์ž ๊ธˆ/์‚ญ์ œ ๊ด€๋ฆฌ โ€“ ๊ณ„์ • ์šฉ๋„๋ณ„ ๋“ฑ๋ก ๋ฐ ๊ณ„์ • ๋งŒ๋ฃŒ์ผ ์ง€์ •
๊ณ„์ • ์œ ํ˜• ์„ค์ •(๊ณต์šฉ๊ณ„์ •์€ ์‹œ์Šคํ…œ์œผ๋กœ ์„ค์ •) ๊ณ„์ • ๋งŒ๋ฃŒ์ผ ์ง€์ • ๊ธฐ๋Šฅ
15 IBM Security
3. ๊ณ„์ • ๊ด€๋ฆฌ
ISIM์€ ์—…๋ฌด ์‹œ์Šคํ…œ์„ ์—ฐ๊ณ„ํ•˜์—ฌ ๊ณ„์ •์„ ์—ฐ๋™ ํ•  ๋•Œ ๋‹ค์–‘ํ•œ ์ •์ฑ… ์„ค์ •์— ์˜ํ•ด ๊ณ„์ •์„ ๊ด€๋ฆฌ ํ•ฉ๋‹ˆ๋‹ค. ๊ณ„์ • ์ƒ์„ฑ ์‹œ Provisioning, ID ์ƒ
์„ฑ ์ •์ฑ…์ด, ๊ณ„์ • ๊ฒ€์ฆ ์‹œ Provisioning, ์†Œ์œ ์ž ๊ฒฐ์ •, ์žฌ์ธ์ฆ, Life Cycle ์ •์ฑ…์— ์˜ํ•ด ๊ณ„์ •์— ๋Œ€ํ•œ ๊ด€๋ฆฌ๊ฐ€ ์ด๋ฃจ์–ด ์ง‘๋‹ˆ๋‹ค.
์—…๋ฌด์‹œ์Šคํ…œ ์—ฐ๋™
์ธ์‚ฌ
๋“ฑ๋ก/์ˆ˜์ •/์‚ญ์ œ LDAP
(์‚ฌ์šฉ์ž/๊ณ„์ •
์ •๋ณด)
Security Identity Manager
HR
Repository
AD
๊ณ„์ • LDAPExchange
๊ณ„์ • LDAP๊ทธ๋ฃน์›จ์–ด
๊ณ„์ • DBํฌํƒˆ
๊ณ„์ • DB
๏ƒผ Provisioning ์ •์ฑ…
- ๊ณ„์ • ์ƒ์„ฑ ๋Œ€์ƒ ์‹œ์Šคํ…œ ์ •์˜
- ๊ณ„์ • ์ƒ์„ฑ ์‚ฌ์šฉ์ž ์ •์˜
- ๊ณ„์ •์˜ ์†์„ฑ๊ฐ’ ์ƒ์„ฑ/๋ณ€๊ฒฝ
- RBAC์— ์˜ํ•œ ๊ณ„์ •/๊ถŒํ•œ ์ž๋™ ์ƒ์„ฑ
- ์‚ฌ์šฉ์ž ์‹ ์ฒญ์— ์˜ํ•œ ๊ณ„์ •/๊ถŒํ•œ ์ˆ˜๋™ ์ƒ์„ฑ
๏ƒผ ID ์ƒ์„ฑ ์ •์ฑ…
- ๋Œ€์ƒ ์‹œ์Šคํ…œ ๋ณ„ ID ์ƒ์„ฑ ๊ทœ์น™ ์„ค์ •
- ์‚ฌ์šฉ์ž ์œ ํ˜• ๋ณ„ ID ์ƒ์„ฑ ๊ทœ์น™ ์„ค์ •
๏ƒผ Provisioning ์ •์ฑ…
- ๊ณ„์ • ์†์„ฑ๊ฐ’์˜ Provisioning ์ •์ฑ… ์ค€์ˆ˜์—ฌ๋ถ€ ๊ฒ€์ฆ
- Provisioning ์ •์ฑ… ๋ฏธ์ค€์ˆ˜ ์‹œ ์ •์ฑ… ์ ์šฉ์—ฌ๋ถ€ ์„ค์ •
๏ƒผ ์†Œ์œ ์ž ๊ฒฐ์ • ์ •์ฑ…
- ๊ณ„์ •์˜ Key ์ •๋ณด๋ฅผ ๊ธฐ์ค€์œผ๋กœ ์†Œ์œ ์ž ๊ฒฐ์ •
- ์†Œ์œ ์ž ๊ฒฐ์ •์„ ์œ„ํ•œ Key ๋ถ„์„ ์ •์ฑ… ์„ค์ •
๏ƒผ ์žฌ์ธ์ฆ ์ •์ฑ…
- ์ผ์ • ๊ธฐ๊ฐ„๋งˆ๋‹ค ์‚ฌ์šฉ๊ณ„์ •์˜ ์‹ค์‚ฌ์šฉ ์—ฌ๋ถ€ ๊ฒ€์ฆ
- ๊ณ„์ • ์‚ฌ์šฉ์ž์˜ ๊ด€๋ฆฌ์ž์— ์˜ํ•œ ๊ณ„์ • ์œ ํšจ์„ฑ ํŒ๋‹จ
๏ƒผ Life Cycle ์ •์ฑ…
- ์œ ํšจ ๊ธฐ๊ฐ„์ด ์ง€๋‚œ ๊ณ„์ •์— ๋Œ€ํ•œ ์ž ๊ธˆ
- ์ผ์ • ๊ธฐ๊ฐ„ ๋กœ๊ทธ์ธ ํ•˜์ง€ ์•Š์€ ๊ณ„์ •์— ๋Œ€ํ•œ ์ž ๊ธˆ
Policies
16 IBM Security
๋Œ€์ƒ ์‹œ์Šคํ…œ์œผ๋กœ ๊ณ„์ • ์ƒ์„ฑ ์‹œ ์ ์šฉ๋˜๋Š” ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ…์„ ์—ญํ• , ์กฐ์ง, ์‹œ์Šคํ…œ ์„ ํƒ ์ •์ฑ…, ์ ์šฉ ๋ฒ”์œ„, ์Šค์ผ€์ฅด ์ •์ฑ…์„ ์ ์šฉํ•˜์—ฌ ๋‹ค์–‘ํ•˜๊ฒŒ ์ง€์ •ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋˜ํ•œ, โ€˜๋ฏธ๋ฆฌ๋ณด๊ธฐโ€™ ๋ฐ โ€˜์ดˆ์•ˆ์œผ๋กœ ์ €์žฅโ€™
๊ธฐ๋Šฅ์„ ์ด์šฉํ•˜์—ฌ ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ…์„ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ํ•˜์—ฌ ๊ฒฐ๊ณผ๋ฅผ ๋ฏธ๋ฆฌ ํ™•์ธํ•ฉ๋‹ˆ๋‹ค.
์กฐ๊ฑด ๋ณ„ ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ… ๊ตฌ์„ฑ
ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ… ์ ์šฉ ์กฐ์ง ๋ฐ ๋ฒ”์œ„
ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ… ์ ์šฉ ์‚ฌ์šฉ์ž ์—ญํ™œ
ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ… ์ ์šฉ ์„œ๋น„์Šค ๋Œ€์ƒ
3. ๊ณ„์ • ๊ด€๋ฆฌ
17 IBM Security
HR์—์„œ ๋™๊ธฐํ™”๋œ ์ธ์‚ฌ์ •๋ณด๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ์‚ฌ์šฉ์ž์˜ ๊ณ„์ •์„ ์ƒ์„ฑํ•˜๊ฑฐ๋‚˜ ๋ณ€๊ฒฝ๋œ ์ •๋ณด๋ฅผ ์†Œ์œ ํ•˜๊ณ  ์žˆ๋Š” ๊ณ„์ •์— ๋ฐ˜์˜ํ•ฉ๋‹ˆ๋‹ค. ์ด๋•Œ ๊ฐ Provisioning ๋ณ„ ์ •์ฑ…์— ๋”ฐ๋ผ ๋ณ€๊ฒฝ๋˜๋Š”
์ •๋ณด๋ฅผ ๊ฐ€๊ณตํ•˜์—ฌ ๋Œ€์ƒ ์„œ๋น„์Šค์˜ ๊ณ„์ •์—์„œ ์ธ์‹ํ•  ์ˆ˜ ์žˆ๋„๋ก ์„ค์ •ํ•ฉ๋‹ˆ๋‹ค.
ํ”„๋กœ๋น„์ €๋‹ ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ
ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ…
ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ… ๋ณ„ ๋ฐ์ดํ„ฐ ๋ณ€๊ฒฝ ์„ค์ •* ๋‹ค์ˆ˜์˜ ์„œ๋น„์Šค๋ฅผ ํ•œ ๊ฐœ์˜ ์ •์ฑ…์œผ๋กœ ์„ค์ • ๊ฐ€๋Šฅ
* ํ•œ ๊ฐœ์˜ ์„œ๋น„์Šค์— ๋Œ€ํ•ด ๋‹ค์ˆ˜์˜ ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ… ์„ค์ •
๊ฐ€๋Šฅ
3. ๊ณ„์ • ๊ด€๋ฆฌ
18 IBM Security
๋Œ€์ƒ ์‹œ์Šคํ…œ์œผ๋กœ ๊ณ„์ • ์ƒ์„ฑ ์‹œ ์ ์šฉ๋˜๋Š” ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ…์„ ์—ญํ• , ์กฐ์ง, ์‹œ์Šคํ…œ ์„ ํƒ ์ •์ฑ…, ์ ์šฉ ๋ฒ”์œ„, ์Šค์ผ€์ฅด ์ •์ฑ…์„ ์ ์šฉํ•˜์—ฌ ๋‹ค์–‘ํ•˜๊ฒŒ ์ง€์ •ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋˜ํ•œ, โ€˜๋ฏธ๋ฆฌ๋ณด๊ธฐโ€™ ๋ฐ โ€˜์ดˆ์•ˆ์œผ๋กœ ์ €์žฅโ€™
๊ธฐ๋Šฅ์„ ์ด์šฉํ•˜์—ฌ ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ…์„ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ํ•˜์—ฌ ๊ฒฐ๊ณผ๋ฅผ ๋ฏธ๋ฆฌ ํ™•์ธํ•ฉ๋‹ˆ๋‹ค.
Provisioning ์ •์ฑ… ๋ฏธ๋ฆฌ ๋ณด๊ธฐ
ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ… ๋ฏธ๋ฆฌ๋ณด๊ธฐ
ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ… ์ดˆ์•ˆ ์ €์žฅ
ํ”„๋กœ๋น„์ €๋‹ ์ ์šฉ ๋ฐฉ์‹ ๋ฐ ์Šค์ผ€์ค„
- ๋ฐฐํฌ ์ •์ฑ…์„ ์‹ค์ œ๋กœ ์ ์šฉํ•˜๊ธฐ ์ „์— ๋‹ค์–‘ํ•œ ์ •์ฑ… ๊ตฌ์„ฑํ•˜๊ณ  ์‹œํ—˜ํ•˜๊ณ  ์‹œํ—˜ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ดˆ์•ˆ ์ €์žฅ๊ธฐ๋Šฅ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.
- ๊ณ„์ • ๋ฐฐํฌ ์ „ ๋ฐฐํฌ ์ •์ฑ…(Provisioning)์— ๋”ฐ๋ฅธ ๋ฐฐํฌ๊ฒฐ๊ณผ๋ฅผ ๋ฏธ๋ฆฌ ์‹œํ—˜ํ•  ์ˆ˜ ์žˆ๋Š” ๊ธฐ๋Šฅ์ œ๊ณต์„ ํ†ตํ•ด ๊ถŒํ•œ ๋ฐฐํฌ์˜ ํœด๋จผ์—๋Ÿฌ ๋ฐฉ์ง€
3. ๊ณ„์ • ๊ด€๋ฆฌ
19 IBM Security
3.2 ๊ณ„์ • ์‹ค ์†Œ์œ ์ฃผ ๊ด€๋ฆฌ
3. ๊ณ„์ • ๊ด€๋ฆฌ
OS/DB์˜ ๊ณ„์ •์€ ์†Œ์œ ์ฃผ๋กœ ์ง€์ •๋œ ์‚ฌ์šฉ์ž์™€ ๋งตํ•‘๊ด€๊ณ„๋ฅผ ์œ ์ง€ํ•˜๋ฉฐ, ๊ณ„์ •์˜ ์ƒ์„ฑ ๋ฐ ๊ด€๋ฆฌ๋ฅผ ์œ„ํ•ด ์ •์˜๋œ ์ตœ์†Œํ•œ์˜ ํ•„์ˆ˜ ์ •๋ณด๋งŒ ์‚ฌ์šฉ์ž ์ •๋ณด์™€
๋™๊ธฐํ™” ๋ฉ๋‹ˆ๋‹ค. ๊ฐ ์„œ๋ฒ„์˜ ๊ณ„์ • ๋ชฉ๋ก์„ ํ™•์ธํ•˜๋ฉด ์‹ค ์†Œ์œ ์ฃผ์— ๋Œ€ํ•œ ์ •๋ณดํ™•์ธ์ด ๊ฐ€๋Šฅํ•˜๋ฉฐ, ๊ณต์šฉ๊ณ„์ •์œผ๋กœ ๊ด€๋ฆฌ๋˜๋Š” ์‹œ์Šคํ…œ ๊ณ„์ •์˜ ๊ฒฝ์šฐ ์ •์ฑ…์—
์˜ํ•ด ํ•„์š” ์‚ฌ์šฉ์ž์—๊ฒŒ ํ• ๋‹น ๋ฐ ํšŒ์ˆ˜๊ฐ€ ์ง€์›๋˜๋ฉฐ, ํ˜„์žฌ ์‚ฌ์šฉํ•˜๊ณ  ์žˆ๋Š” ์‚ฌ์šฉ์ž๊ฐ€ ๋ˆ„๊ตฌ์ธ์ง€ ํ™•์ธ์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค.
๊ณต์šฉ๊ณ„์ • ๊ด€๋ฆฌ ์ •์ฑ…
์„ค์ •
๊ณ„
์ •
ํ• 
๋‹น
๊ณต์šฉ๊ณ„์ • ์‚ฌ์šฉ์ž ํ• ๋‹น ํ˜„ํ™ฉ
๊ณ„์ • ์œ ํ˜• ๋ฐ ์†Œ์œ ์ž
๊ด€๋ฆฌ ๊ณต์šฉ๊ณ„์ • ์‚ฌ์šฉ์ž ํ™•์ธ
20 IBM Security
ISIM์—์„œ ์ œ๊ณตํ•˜๋Š” ์กฐ์ •(Reconciliation) ์ž‘์—…์„ ํ†ตํ•ด์„œ ๊ณ ์ŠคํŠธ ๊ณ„์ • ๋ฐ ๊ณ ์•„ ๊ณ„์ •์„ ์ฐพ์•„๋‚ด๊ณ  ํ•ด๋‹น ๋ชฉ๋ก์„ ๊ด€๋ฆฌ์ž์—๊ฒŒ ํ†ต๋ณด ํ›„, ๊ด€๋ฆฌ์ž์˜ ์ž„์˜ ์กฐ์น˜ ๋˜๋Š” ์ •์˜๋œ ์ •์ฑ…์— ์˜ํ•œ
์ž๋™ ์กฐ์น˜๊ฐ€ ์ˆ˜ํ–‰๋˜๋„๋ก ํ•ฉ๋‹ˆ๋‹ค.
Reconciliation ์ •์ฑ…
- ์‹œ์Šคํ…œ์— ๋‚จ์•„์žˆ๋Š” ํœด๋ฉด๊ณ„์ •, ์ ์ ˆํ•œ ์Šน์ธ ์ ˆ์น˜๋ฅผ ๊ฑฐ์น˜์ง€ ์•Š๊ณ  ๋งŒ๋“ค์–ด์ง„ ๊ณ„์ • ๋˜๋Š” ์‹œ์Šคํ…œ์„ ์‚ฌ์šฉํ•  ์ด์œ ๊ฐ€ ์—†๋Š”๋ฐ๋„ ์ž˜๋ชป ์ƒ์„ฑ๋œ ๊ณ„
์ • ๋“ฑ์„ ์ฐพ์•„ ์ ์ ˆํ•œ ์กฐ์น˜๋ฅผ ํ•จ์œผ๋กœ์จ ๋ณด์•ˆ์„ฑ์„ ํ–ฅ์ƒ์‹œํ‚ต๋‹ˆ๋‹ค.
- ๋ถ€์—ฌ๋œ ๊ถŒํ•œ์— ์œ„๋ฐฐ๋˜์ง€ ์•Š๋Š” ๋ฒ”์œ„์—์„œ ์‹œ์Šคํ…œ์„ ์‚ฌ์šฉํ•˜๊ณ  ์žˆ๋Š”์ง€๋ฅผ ๊ฐ์‚ฌํ•˜๊ณ  ๋ณด๊ณ ํ•ฉ๋‹ˆ๋‹ค.
- Reconciliation ์ž‘์—…์€ ์‚ฌ์šฉ์ž ์š”์ฒญ ์ฆ‰์‹œ ๋˜๋Š” ์Šค์ผ€์ค„์„ ์ •์˜ํ•˜์—ฌ ์ž‘์—…์ด ์ˆ˜ํ–‰๋ฉ๋‹ˆ๋‹ค.
์†Œ์œ ์ž๊ฐ€ ์—†๋Š” ๊ณ ์•„๊ณ„์ •(Orphan)์ž„์„ ํ†ตํ•ด
์‹œ์Šคํ…œ์—์„œ ์ง์ ‘ ์ƒ์„ฑ๋œ ๊ณ„์ •์ž„์„ ํ™•์ธ
-> ์‚ญ์ œ ํ˜น์€ ์†Œ์œ ์ž ์ง€์ •์œผ๋กœ ๊ด€๋ฆฌ ์‹œ์ž‘
ISIM Server
๊ด€๋ฆฌ ๋Œ€์ƒ ์‹œ์Šคํ…œ
ISIM Connector
1 ์‹œ์Šคํ…œ์—์„œ ์ง์ ‘ ๊ณ„์ • ์ƒ์„ฑ
ISIM Server
๊ณ„์ • ์ •๋ณด ์ˆ˜์ง‘ ๋ฐ ์ „์†ก
2 ISIM์—์„œ โ€˜์กฐ์ •โ€™(reconciliation) ์ˆ˜ํ–‰
3
4 ์‹œ์Šคํ…œ์—์„œ ์ง์ ‘ ์ƒ์„ฑ๋œ ๊ณ„์ •์„ ํฌํ•จํ•œ
๊ณ„์ • ๋ฆฌ์ŠคํŠธ ์ œ๊ณต
5 4 ISIM ๋ณด๊ณ ์„œ๋ฅผ ํ†ตํ•œ ๋ฆฌํฌํŒ…
(๊ฐ์‚ฌ ๋ณด๊ณ ์„œ๊ฐ€ ๊ธฐ๋ณธ์œผ๋กœ ์ œ๊ณต๋จ)
3. ๊ณ„์ • ๊ด€๋ฆฌ
21 IBM Security
ISIM์€ ๋ณ„๋„์˜ ๊ณ ์•„๊ณ„์ • ๊ด€๋ฆฌ ๋ฉ”๋‰ด๋ฅผ ํ†ตํ•ด, ํ˜„์žฌ ์‹๋ณ„๋˜์–ด ์žˆ๋Š” ๊ณ ์•„๊ณ„์ •์— ๋Œ€ํ•œ ์ฆ‰๊ฐ์ ์ธ ํ˜„ํ™ฉํŒŒ์•…์„ ์ œ๊ณตํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ๊ณ ์•„๊ณ„์ •์€ ์‚ฌ์šฉ์ž์—๊ฒŒ ์ˆ˜๋™์œผ๋กœ ์ง€์ •ํ•˜๊ฑฐ๋‚˜ ๊ณ„์ •
์ค‘์ง€ ๋˜๋Š” ์‚ญ์ œ๋ฅผ ํ†ตํ•ด ๊ณ ์•„๊ณ„์ •์— ๋Œ€ํ•œ ๊ด€๋ฆฌ๋ฅผ ์ˆ˜ํ–‰ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
๊ณ ์•„๊ณ„์ • ๊ด€๋ฆฌ ์ •์ฑ…
* ๊ณ ์•„๊ณ„์ •๊ด€๋ฆฌ ๋ฉ”๋‰ด ์ œ๊ณต
* ๋ชจ๋“  ๊ณ ์•„๊ณ„์ •์„ ํ†ตํ•ฉ ๊ด€๋ฆฌ
* ๊ณ ์•„๊ณ„์ •์˜ ๋ชฉ๋ก์—์„œ ๊ด€๋ฆฌ ๊ธฐ๋Šฅ ์ œ๊ณต
* ๊ณ„์ •์˜ ์‚ฌ์šฉ์ž ์ง€์ •/์‚ญ์ œ/์ผ์‹œ์ค‘๋‹จ ๊ธฐ๋Šฅ ์ œ๊ณต
* ๊ณ ์•„๊ณ„์ •์˜ ์ƒ์„ธ ๊ณ„์ • ๋‚ด์šฉ ํ™•์ธ
* ๊ณ„์ •์— ๋Œ€ํ•œ ์ˆ˜์ •์€ ์‚ฌ์šฉ์ž ์ง€์ • ํ›„ ๊ฐ€๋Šฅ
3. ๊ณ„์ • ๊ด€๋ฆฌ
22 IBM Security
๊ณ„์ • ์ƒ์„ฑ ์‹œ ์ •์ฑ…์— ์˜ํ•ด ๊ณ„์ •์— ๋Œ€ํ•œ ์œ ํšจ๊ธฐ๊ฐ„ ํ˜น์€ ์žฌ์Šน์ธ ๊ธฐ๊ฐ„์„ ์„ค์ •ํ•˜์—ฌ, ๊ธฐ๊ฐ„์ด ๋งŒ๋ฃŒ๋˜๋ฉด ์žฌ์ธ์ฆ(Recertification) ์ •์ฑ…์„
ํ†ตํ•ด ๊ณ„์ • ์—ฐ์žฅ ํ”„๋กœ์„ธ์Šค๋ฅผ ์ง„ํ–‰ํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์‚ฌ์šฉ์ž์˜ ์‹ ์ฒญ์— ์˜ํ•œ ๊ณ„์ • ์—ฐ์žฅ ํ”„๋กœ์„ธ์Šค๋ฅผ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค.
๊ณ„์ • ์žฌ์ธ์ฆ ์ •์ฑ…
* ๊ด€๋ฆฌ์ž์˜ ์Šน์ธ ์—…๋ฌด๋กœ ๋“ฑ๋ก
* ๋ถ€์„œ์žฅ์„ ๊ธฐ๋ณธ ๊ด€๋ฆฌ์ž๋กœ ์„ค์ •
๊ณ„์ • ๊ด€๋ฆฌ์ž์— ์˜ํ•œ ๊ณ„์ • ์žฌ์ธ์ฆ ๊ณ„์ • ์žฌ์ธ์ฆ ์ •์ฑ… ์„ค์ •
3. ๊ณ„์ • ๊ด€๋ฆฌ
23 IBM Security
์ผ์ • ๊ธฐ๊ฐ„ ๋™์•ˆ SSO์˜ ์ ‘๊ทผ ์ด๋ ฅ์„ ๋ถ„์„ ํ•˜์—ฌ ํœด๋ฉด ๊ณ„์ •์„ ํƒ์ง€ํ•˜๊ณ , ํ•ด๋‹น ๊ณ„์ •์„ ๊ด€๋ฆฌ์ž๊ฐ€ ์ž„์˜ ์กฐ์น˜ ํ•˜๊ฑฐ๋‚˜ ์ •์˜๋œ ์ •์ฑ…์— ์˜ํ•ด ์ž๋™ ์กฐ์น˜๊ฐ€ ์ˆ˜ํ–‰๋˜๋„๋ก ๊ตฌ์ถ•ํ•ฉ๋‹ˆ๋‹ค.
ํœด๋ฉด๊ณ„์ •์˜ ์ฐจ๋‹จ ๋ฐ ๊ด€๋ฆฌ
Last Login ISAM
ํœด๋ฉด๊ณ„์ • ์ฒ˜๋ฆฌ ์ •์ฑ…
ISIM(๊ณ„์ •/๊ถŒํ•œ ์ค‘์•™ ๊ด€๋ฆฌ ์ธํ”„๋ผ) Active Directory
ํฌํƒˆ
๊ณ„์ •/๊ถŒํ•œ/์ •์ฑ…
LDAP
RBAC ์ •์ฑ… ์ ์šฉ AD
LOG DB
๊ทธ๋ฃน์›จ์–ด
๊ณ„์ • DB
๊ณ„์ • DB
์‹ ์ฒญ ๊ธฐ๋ฐ˜
ํœด๋ฉด
๊ณ„์ •
์ฐจ๋‹จ
Windows Account
OS
Linux/Unix Account
OS
- SSO์˜ ๋งˆ์ง€๋ง‰ ๋กœ๊ทธ์ธ ๋‚ ์งœ๋ฅผ ๊ธฐ์ค€์œผ๋กœ ๊ด€๋ฆฌ์ž๊ฐ€ ์„ค์ •ํ•œ ์ผ์ž ์ด์ƒ ์ ‘์†์ด ์—†๋Š” ๊ฒฝ์šฐ ํœด๋ฉด๊ณ„์ •์œผ๋กœ ํŒ๋‹จ ํ•ฉ๋‹ˆ๋‹ค.
- ํœด๋ฉด์ƒํƒœ๋กœ ํŒ๋‹จ๋œ ๊ณ„์ •์€ ์ฒ˜๋ฆฌ ์ •์ฑ…์— ๋”ฐ๋ผ ๊ณ„์ •์€ ์ž ๊ทธ๊ฑฐ๋‚˜ ์‚ญ์ œํ•˜์—ฌ, ๊ด€๋ฆฌ์ž์˜ ์Šน์ธ ์—†์ด๋Š” ์ ‘์†์„ ์ฐจ๋‹จํ•ฉ๋‹ˆ๋‹ค.
3. ๊ณ„์ • ๊ด€๋ฆฌ
24 IBM Security
ISIM์€ OS์—์„œ ๊ฐ€์ง€๊ณ  ์žˆ๋Š” ๊ทธ๋ฃน์— ๋Œ€ํ•œ ๊ด€๋ฆฌ ๊ธฐ๋Šฅ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. Customizing ๋œ ๊ณ„์ •๊ด€๋ฆฌํฌํƒˆ์—์„œ OS์˜ ๊ทธ๋ฃน์— ๋Œ€ํ•ด ์ƒ์„ฑ/์ˆ˜์ •/์‚ญ์ œ๊ฐ€ ๊ฐ€
๋Šฅํ•˜๋ฉฐ ๋‚ด๋ถ€ ๊ฒฐ์žฌ ์‹œ์Šคํ…œ๊ณผ ์—ฐ๋™ํ•˜์—ฌ ๊ฒฐ์žฌ๋ฅผ ์š”์ฒญ, ๊ฒฐ๊ณผ ํ™•์ธ ํ›„ ISIM API๋ฅผ ํ˜ธ์ถœํ•˜์—ฌ ๊ทธ๋ฃน์— ๋Œ€ํ•œ ์ƒ์„ฑ/์ˆ˜์ •/์‚ญ์ œ๋ฅผ ์ง„ํ–‰ํ•˜๊ณ  ๊ฒฐ๊ณผ๋ฅผ ํ™•์ธํ•ฉ
๋‹ˆ๋‹ค.
3.4 ๊ทธ๋ฃน ์ƒ์„ฑ/์ˆ˜์ •/์‚ญ์ œ ๊ด€๋ฆฌ
3. ๊ณ„์ • ๊ด€๋ฆฌ
๋‚ด๋ถ€ ๊ฒฐ์žฌ ์‹œ์Šคํ…œ
5. ๊ทธ๋ฃน ์ƒ์„ฑ/์ˆ˜์ •/์‚ญ์ œ
API ํ˜ธ์ถœ
1์ฐจ ๊ฒฐ์žฌ์ž 2์ฐจ ๊ฒฐ์žฌ์ž ์ตœ์ข… ์Šน์ธ์ž
7. ์‹คํ–‰ ๊ฒฐ๊ณผ ํ†ต๋ณด
ISIM
3. ๊ฒฐ์žฌ ์š”์ฒญ / ์Šน์ธ
์‹ ์ฒญ์ž
1. ๊ทธ๋ฃน ์ƒ์„ฑ/์ˆ˜์ •/์‚ญ์ œ ์‹ ์ฒญ
ISIM API
2. ๊ฒฐ์žฌ ์š”์ฒญ
6. ๊ทธ๋ฃน ์ƒ์„ฑ/์ˆ˜์ •/์‚ญ์ œ
๊ณ„์ •๊ด€๋ฆฌํฌํƒˆ
OS ๊ทธ๋ฃน ๊ด€๋ฆฌ ํ™”๋ฉด
๋Œ€์ƒ์‹œ์Šคํ…œ
4. ์Šน์ธ ํ™•์ธ
25 IBM Security
ISIM์€ ๊ทธ๋ฃน๊ด€๋ฆฌ ๊ธฐ๋Šฅ์„ ํ†ตํ•ด ๊ฐ ๊ทธ๋ฃน์˜ ๋ฉค๋ฒ„์— ๋Œ€ํ•œ ์ถ”๊ฐ€/์‚ญ์ œ๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ๋ฉค๋ฒ„๋ฅผ ์ถ”๊ฐ€/์‚ญ์ œ๋ฅผ ํ•  ๋•Œ ์ฆ‰์‹œ ๋˜๋Š” ์‹œ๊ฐ„์„ ์ง€์ •ํ•˜์—ฌ ์ ์šฉ์ด
๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค.
3.5 ๊ทธ๋ฃน ๋ฉค๋ฒ„ ๋ณ€๊ฒฝ ๊ด€๋ฆฌ
3. ๊ณ„์ • ๊ด€๋ฆฌ
๋ฉค๋ฒ„ ๊ด€๋ฆฌ ๋ฉ”๋‰ด
๋ฉค๋ฒ„ ํ˜„ํ™ฉ
26 IBM Security
HR์—์„œ ์—ฐ๊ณ„๋œ ์‚ฌ์šฉ์ž์˜ ์ƒ์„ฑ/๋ณ€๊ฒฝ/์‚ญ์ œ ์ •๋ณด๋Š” ISIM์—์„œ ๊ด€๋ฆฌ๋˜๋Š” ์‚ฌ์šฉ์ž์˜ ์†Œ์œ ๊ณ„์ •์— ์˜ํ–ฅ์„ ์ค๋‹ˆ๋‹ค. ์‚ฌ์šฉ์ž์˜ ์ธ์‚ฌ์ •๋ณด ๋ณ€๊ฒฝ์œผ๋กœ ์ธํ•ด
์†Œ์œ ๊ณ„์ •์— ๋Œ€ํ•ด ์ •๋ณด/์ƒํƒœ ๋ณ€๊ฒฝ์ด ์ผ์–ด๋‚˜๊ฑฐ๋‚˜ ์‹ ๊ทœ ์‹œ์Šคํ…œ์— ๋Œ€ํ•œ ๊ณ„์ •์ƒ์„ฑ์ด ์ง„ํ–‰๋ฉ๋‹ˆ๋‹ค.
3.6 ์ธ์‚ฌ ๋ณ€๋™ ์‚ฌํ•ญ ๊ด€๋ฆฌ
3. ๊ณ„์ • ๊ด€๋ฆฌ
์ธ์‚ฌ
๋“ฑ๋ก/์ˆ˜์ •/์‚ญ์ œ
LDAP
(์‚ฌ์šฉ์ž/๊ณ„์ •
์ •๋ณด)
์‚ฌ์šฉ์ž/๊ณ„์ • ์ทจํ•ฉ ์ •์ฑ…
Security Identity Manager
์ธ์‚ฌ์‹œ์Šคํ…œ
Repository
๊ตฌ๋ถ„ ๊ฐ’
์ด๋ฆ„ ํ™๊ธธ๋™
์กฐ์ง ์˜์—…1ํŒ€
์ง๊ธ‰ ๊ณผ์žฅ
์ง์ฑ… ํŒ€์žฅ
โ€ฆ โ€ฆ
๊ณ„์ • ์ •๋ณด
์ธํ”„๋ผ ๊ณ„์ • ๊ตฌ์„ฑ ์ •๋ณด
UNIX ID, ์ด๋ฆ„, ์กฐ์ง, โ€ฆ
์ ‘๊ทผ์ œ์–ด ID, ์ด๋ฆ„, ์กฐ์ง, ์ง๊ธ‰, ์ง์ฑ…, โ€ฆ
DB ID, ์ด๋ฆ„, ์ง๊ธ‰, โ€ฆ
LINUX ID, ์ด๋ฆ„, ์ง๊ธ‰, ์ง์ฑ…, โ€ฆ
Attribute ๊ฐ’
ID kd.hong
์ด๋ฆ„ ํ™๊ธธ๋™
์กฐ์ง Sales#1
์ง๊ธ‰ GJ
์ง์ฑ… Team.Mng
โ€ฆ โ€ฆ
๊ตฌ๋ถ„ ๊ฐ’
ID kd.hong
์ด๋ฆ„ ํ™๊ธธ๋™
์ง๊ธ‰ POS5100
์ง์ฑ… TSK3200
โ€ฆ โ€ฆ
์‚ฌ์šฉ์ž/๊ณ„์ • ์ •๋ณด(IM Repository)
์‚ฌ์šฉ์ž ์ธ์‚ฌ ์ •๋ณด(HR Repository)
์„œ๋ฒ„ ์ ‘๊ทผ์ œ์–ด
๊ณ„์ • DB
OS Account
OS
DB Account
DB
27 IBM Security
ISIM์€ SDI๋ฅผ ์ด์šฉํ•˜์—ฌ ๋‹ค์–‘ํ•œ ์ข…๋ฅ˜์˜ ๋ณต์ˆ˜๊ฐœ์˜ HR๊ณผ ์—ฐ๊ณ„ํ•˜์—ฌ ์‚ฌ์šฉ์ž๋ฅผ ์ƒ์„ฑํ•ฉ๋‹ˆ๋‹ค. ๋˜ํ•œ, ์‚ฌ์šฉ์ž ์œ ํ˜•์„ ๋‹ค๋ฅด๊ฒŒ ์ƒ์„ฑํ•˜์—ฌ ๊ด€๋ฆฌ
์˜ ํŽธ์˜์„ฑ์„ ๋†’์ž…๋‹ˆ๋‹ค. ID ๋ณ€๊ฒฝ ์‹œ ID์˜ ๊ด€๋ฆฌ ์œ ํ˜•์— ๋”ฐ๋ผ ๋Œ€์ƒ ์‹œ์Šคํ…œ์œผ๋กœ ๊ณ„์ • ์ •๋ณด๋ฅผ ๊ฐฑ์‹  ๋˜๋Š” ์‹ ๊ทœ ๊ณ„์ •์„ ์ƒ์„ฑํ•ฉ๋‹ˆ๋‹ค.
์ธ์‚ฌ ๋™๊ธฐํ™” ๋ฐฉ์•ˆ
3. ๊ณ„์ • ๊ด€๋ฆฌ
ID ๊ตฌ๋ถ„ HR IM System ๋น„๊ณ 
Employee Number ์‚ฌ๋ฒˆ ๋ณ€๊ฒฝ ์‚ฌ์šฉ์ž ์ •๋ณด ๊ฐฑ์‹  ๊ณ„์ • ์ •๋ณด ๊ฐฑ์‹  ์‚ฌ๋ฒˆ์ด Key์ธ ์‹œ์Šคํ…œ์€ ๊ณ„์ •์ƒ์„ฑ
Integrated ID ID ๋ณ€๊ฒฝ ์‚ฌ์šฉ์ž ์ƒ์„ฑ ๊ณ„์ • ์ƒ์„ฑ IM์—์„œ ์‹ ๊ทœ ์‚ฌ์šฉ์ž ์ƒ์„ฑ์œผ๋กœ ์ฒ˜๋ฆฌ
Login ID - ID ๋ณ€๊ฒฝ ๊ณ„์ • ์ •๋ณด ๊ฐฑ์‹  Login ID๊ฐ€ Key์ธ ์‹œ์Šคํ…œ์€ ๊ณ„์ •์ƒ์„ฑ
๏ƒผ ID ๋ณ€๊ฒฝ ์‹œ ์ฒ˜๋ฆฌ ๋ฐฉ์‹
๏ƒผ ๋‹ค์ค‘ HR ์—ฐ๊ณ„ ๋ฐ ๋„๊ธ‰์ง ๊ด€๋ฆฌ
์ธ์‚ฌ
Repository
์žฌ๋ฌด
Repository
LDAP
(์‚ฌ์šฉ์ž/๊ณ„์ •
์ •๋ณด)
Security Identity Manager
๊ณ„์•ฝ์ง ์‚ฌ์šฉ์ž ์ƒ์„ฑ ์ง์› ์œ ํ˜•๋ณ„ Profile ๊ด€๋ฆฌ
์Šค์ผ€์ค„์— ์˜ํ•œ
์ž๋™ ๋™๊ธฐํ™”
28 IBM Security
๋‹ค์–‘ํ•œ ํ˜•ํƒœ์˜ HR Repository์™€์˜ ์—ฐ๋™์„ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•ด ISIM์€ ์ „๋ฌธ Meta Directory Solution์ธ SDI(Tivoli Directory Integrator)๋ฅผ
๋ฒˆ๋“ค๋กœ ์ œ๊ณตํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. SDI์˜ ๊ตฌ์„ฑ์„ ํ†ตํ•ด ๋‹จ์ผ ๋˜๋Š” ๋‹ค์ค‘์˜ HR ์‹œ์Šคํ…œ๊ณผ ์—ฐ๊ณ„ํ•˜์—ฌ ์‚ฌ์šฉ์ž ์ •๋ณด๋ฅผ ๋™๊ธฐํ™” ํ•ฉ๋‹ˆ๋‹ค.
๋‹ค์ค‘ HR ์‹œ์Šคํ…œ ์—ฐ๊ณ„ ์ง€์›
ISIM LDAP
์‚ฌ์šฉ์ž ์ •๋ณด ๋ณ€๊ฒฝ
(Trigger)
์‚ฌ์šฉ์ž
Repository
SDI
connector
์‚ฌ์šฉ์ž ์ •๋ณด Update
๋ฐ์ดํ„ฐ์˜ ๋ฉ”ํƒ€๋ฅผ
๋งคํ•‘ํ•จ
๋กœ์ง ์ˆ˜ํ–‰์„ ์œ„
ํ•œ Script์ˆ˜ํ–‰
๋ฐ์ดํ„ฐ ํ•„๋“œ ๋งคํ•‘ ํ›„์—๋Š” ๋ฐ์ดํ„ฐ ์—ฐ๋™
์ž‘์—…์ด ์‹ค์‹œ๊ฐ„ ๋˜๋Š” ๋ฐฐ์น˜๋กœ ์ž๋™
์ˆ˜ํ–‰๋จ
๊ตฌ๋ถ„ ์ง€์› Platform
LDAP
IBM Directory Server, MS Active Directory, iPlanet/Sun ONE,
Novell NDS/edirectory
๊ธฐํƒ€ ํ‘œ์ค€ LDAP ์ง€์› Directory Server
JDBC
Oracle, SQL-Server, DB2, MySQL, Informix
๊ธฐํƒ€ JDBC Driver ์ง€์› DB
Package
Application
SAP ABAP/ALE, Exchange, Domino Notes, IBM MQ,
IBM Tivoli Identity Manager, IBM Tivoli Access Manager
JAVA API JNDI, JMS, JMX, MemoryQueue, MemoryStream ์ง€์›
OS zOS(Change Log), NT4 Domain ISAM registries, MailBox
File System ํŒŒ์ผ ์‹œ์Šคํ…œ ํ˜•ํƒœ์˜ ํŒŒ์ผ (parser ์‚ฌ์šฉ), Log File
HTTP HTTP Server/Client, URI
Web Services Both publish and consume Web Services, DSMLv2/SOAP
๊ธฐํƒ€ TCP, SNMP, FTP, CLI, Script, ISIMer, SystemQueue ๋“ฑ
3. ๊ณ„์ • ๊ด€๋ฆฌ
29 IBM Security
HR ์‹œ์Šคํ…œ์„ SDI๋ฅผ ํ†ตํ•ด ์—ฐ๊ณ„ ํ›„ ISIM์— Feed(HR ์—ฐ๋™ ์„œ๋น„์Šค)๋กœ ๋“ฑ๋กํ•˜์—ฌ ์ธ์‚ฌ์ •๋ณด๋ฅผ ๋™๊ธฐํ™” ํ•ฉ๋‹ˆ๋‹ค. ์—ฐ๊ณ„๋œ
์ธ์‚ฌ์ •๋ณด๋Š” ์ฃผ๊ธฐ์ ์œผ๋กœ ์ž๋™ ๋™๊ธฐํ™”๊ฐ€ ์ง„ํ–‰๋˜๋ฉฐ, ISIM์˜ ๋™๊ธฐํ™” ๋ชจ๋“ˆ์„ ํ†ตํ•ด ๋ณ€๊ฒฝ๋‚ด์šฉ์„ ์ถ”์ ํ•˜์—ฌ ๋ฐ˜์˜ํ•ฉ๋‹ˆ๋‹ค.
์ธ์‚ฌ
๋“ฑ๋ก/์ˆ˜์ •/์‚ญ์ œ
LDAP
(์‚ฌ์šฉ์ž/๊ณ„
์ • ์ •๋ณด)
ISIM Sync Engine
Security Identity Manager
์ธ์‚ฌ๊ด€๋ฆฌ ์ •๋ณด์— ๋”ฐ๋ผ ISIM์˜
์‚ฌ์šฉ์ž ์ •๋ณด๋ฅผ ์—ฌ๋Ÿฌ ๊ฐœ ์ •์˜ ๊ฐ€๋Šฅ
HR
Repository
#1
์‚ฌ์šฉ์ž ์ •๋ณด ๊ด€๋ฆฌ
์ธ์‚ฌ์ •๋ณด Mapping
์—ฐ๋™ Schedule ์„ค์ •
์‚ฌ์šฉ์ž ์ •๋ณด #1
์‚ฌ์šฉ์ž๊ณ„์ •/
๊ถŒํ•œ๊ด€๋ฆฌ
์‹œ์Šคํ…œ ์šด์˜์ž
์ธ์‚ฌ์ •๋ณด ์—ฐ๊ณ„ ๊ตฌ์„ฑ
ํ•œ๊ตญ ์ธ์‚ฌ ๋‹ด๋‹น์ž
์ธ์‚ฌ
๋“ฑ๋ก/์ˆ˜์ •/์‚ญ์ œ
HR
Repository
#2
์ค‘๊ตญ ์ธ์‚ฌ ๋‹ด๋‹น์ž
SDI ๋™๊ธฐํ™”
์‚ฌ์šฉ์ž ์ •๋ณด #2
๋ณต์ˆ˜๊ฐœ์˜ HR ์‹œ์Šคํ…œ์— ๋Œ€ํ•ด ๊ฐ๊ฐ์˜
์ •๋ณด ํ˜•ํƒœ์— ๋งž๋„๋ก ๊ตฌ์„ฑ ๊ฐ€๋Šฅ
3. ๊ณ„์ • ๊ด€๋ฆฌ
30 IBM Security
HR์—์„œ์—ฐ๊ณ„๋œ์‚ฌ์šฉ์ž์˜์ƒ์„ฑ/๋ณ€๊ฒฝ/์‚ญ์ œ์ •๋ณด๋Š”ISIM์—์„œ๊ด€๋ฆฌ๋˜๋Š”์‚ฌ์šฉ์ž์˜์†Œ์œ ๊ณ„์ •์—์˜ํ–ฅ์„์ค๋‹ˆ๋‹ค. ์‚ฌ์šฉ์ž์˜์ธ์‚ฌ์ •๋ณด๋ณ€๊ฒฝ์œผ๋กœ์ธํ•ด์†Œ์œ ๊ณ„์ •์—๋Œ€ํ•ด์ •๋ณด/์ƒํƒœ๋ณ€๊ฒฝ์ด์ผ์–ด๋‚˜๊ฑฐ๋‚˜์‹ ๊ทœ
์‹œ์Šคํ…œ์—๋Œ€ํ•œ๊ณ„์ •์ƒ์„ฑ์ดFeed์™€๊ฐ™์ด์ง„ํ–‰๋ฉ๋‹ˆ๋‹ค.
์‚ฌ์šฉ์ž ์ •๋ณด ๋ฐ˜์˜
์ธ์‚ฌ
๋“ฑ๋ก/์ˆ˜์ •/์‚ญ์ œ
LDAP
(์‚ฌ์šฉ์ž/๊ณ„์ •
์ •๋ณด)
ISIM Sync Engine
Security Identity Manager
HR
Repository
AD
Exchange
๊ณ„์ • LDAP
๊ทธ๋ฃน์›จ์–ด
๊ณ„์ • LDAP
๊ณ„์ • DB
ํฌํƒˆ
๊ณ„์ • DB
๊ตฌ๋ถ„ ๊ฐ’
์ด๋ฆ„ ํ™๊ธธ๋™
์กฐ์ง ์˜์—…1ํŒ€
์ง๊ธ‰ ๊ณผ์žฅ
์ง์ฑ… ํŒ€์žฅ
โ€ฆ โ€ฆ
์‚ฌ์šฉ์ž/๊ณ„์ • ์ •๋ณด(IM Repository)
ํฌํƒˆ ๊ณ„์ • ์ •๋ณด
์„œ๋น„์Šค ๊ณ„์ • ๊ตฌ์„ฑ ์ •๋ณด
AD ID, ์ด๋ฆ„, ์กฐ์ง, โ€ฆ
Exchange ID, ์ด๋ฆ„, ์กฐ์ง, ์ง๊ธ‰, ์ง์ฑ…,
โ€ฆ
๊ทธ๋ฃน์›จ์–ด ID, ์ด๋ฆ„, ์ง๊ธ‰, โ€ฆ
ํฌํƒˆ ID, ์ด๋ฆ„, ์ง๊ธ‰, ์ง์ฑ…, โ€ฆ
Attribute ๊ฐ’
ID kd.hong
์ด๋ฆ„ ํ™๊ธธ๋™
์กฐ์ง Sales#1
์ง๊ธ‰ GJ
์ง์ฑ… Team.
โ€ฆ โ€ฆ
๊ตฌ๋ถ„ ๊ฐ’
ID kd.hong
์ด๋ฆ„ ํ™๊ธธ๋™
์ง๊ธ‰ POS5100
์ง์ฑ… TSK3200
โ€ฆ โ€ฆ
์‚ฌ์šฉ์ž ์ธ์‚ฌ ์ •๋ณด(HR Repository)
3. ๊ณ„์ • ๊ด€๋ฆฌ
31 IBM Security
ISIM์€ HR์—์„œ ์ œ๊ณต๋˜๋Š” ์กฐ์ง์ •๋ณด Table์„ ๋‚ด์žฅ๋œ SDI๋กœ ์ฃผ๊ธฐ์ ์œผ๋กœ ์—ฐ๋™ํ•˜์—ฌ AD ๋ฐ ์กฐ์ง์ •๋ณด๊ฐ€ ํ•„์š”ํ•œ
์‹œ์Šคํ…œ์˜ ํ˜•์‹์— ๋งž๋„๋ก ๋ณ€ํ™˜ํ•˜์—ฌ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ๋˜ํ•œ, ISIM์˜ ๋‚ด๋ถ€ ์กฐ์ง์ •๋ณด์™€ ์—ฐ๊ณ„๋˜์–ด HR์—์„œ ์ œ๊ณ ํ•˜๋Š”
์กฐ์ง์ •๋ณด๋ฅผ Treeํ˜•ํƒœ๋กœ ํ™•์ธํ•ฉ๋‹ˆ๋‹ค.์กฐ์ง์ •๋ณด ์—ฐ๋™
HR
Repository
Application
Repository
Security Directory Integrator
Active Directory
ISIM
Database Table
LDAP
HR ์กฐ์ง์ •๋ณด
3. ๊ณ„์ • ๊ด€๋ฆฌ
* ์กฐ์ง์ •๋ณด๋Š” ISIM์— ๋ฌด์ƒ์ œ๊ณต๋˜๋Š” SDI์—์„œ ISIM๊ณผ ๋ณ„๋„๋กœ ์ฒ˜๋ฆฌํ•จ
* SDI๋Š” ์ž์ฒด ์Šค์ผ€์ค„๋ง ์—”์ง„์— ์˜ํ•ด ์ผ์ • ์ฃผ๊ธฐ๋กœ ์กฐ์ง์ •๋ณด๋ฅผ Provisioning
ํ•จ
32 IBM Security
๋Œ€์ƒ ์‹œ์Šคํ…œ์œผ๋กœ ๊ณ„์ • ์ƒ์„ฑ ์‹œ ISIM์€ ID ์ •์ฑ… ์„ค์ •์„ ํ†ตํ•ด ๊ฐ ์‹œ์Šคํ…œ์—์„œ ์‚ฌ์šฉํ•˜๋Š” ID ํ˜•์‹์— ๋งž๋„๋ก ID๋ฅผ ์ƒ์„ฑ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ID ์ •์ฑ…์€ ์—ฌ๋Ÿฌ ๊ฐœ์˜ ์‹œ์Šคํ…œ์„ ํ•˜๋‚˜์˜
์ •์ฑ…์œผ๋กœ ํ†ตํ•ฉํ•˜์—ฌ ๊ด€๋ฆฌํ•  ์ˆ˜๋„ ์žˆ์œผ๋ฉฐ, ๊ฐ๊ฐ์˜ ์‹œ์Šคํ…œ ๋ณ„๋กœ๋„ ์„ค์ •์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค.
ID ์ •์ฑ…
ID ์ƒ์„ฑ ์ •์ฑ…
ID ์ •์ฑ… ๋ณ„ ID ์ƒ์„ฑ ์Šคํฌ๋ฆฝํŠธ* ๋‹ค์ˆ˜์˜ ์„œ๋น„์Šค๋ฅผ ํ•œ ๊ฐœ์˜ ์ •์ฑ…์œผ๋กœ ์„ค์ • ๊ฐ€๋Šฅ
* ์‹œ์Šคํ…œ์ด ์†Œ์†๋œ ์กฐ์ง ๋‹จ์œ„๋กœ ID ์ƒ์„ฑ ์ •์ฑ… ์„ค์ • ๊ฐ€๋Šฅ
* ์ค‘๋ณต๊ณ„์ • ์กด์žฌ ์—ฌ๋ถ€ ํŒŒ์•… ๊ธฐ๋Šฅ ๊ธฐ๋ณธ ๋‚ด์žฅ * ์‚ฌ์šฉ์ž ์ •๋ณด๋ฅผ ์ด์šฉํ•œ ๊ทœ์น™์œผ๋กœ ๋‹จ์ˆœ ์ •์˜ ๊ฐ€๋Šฅ
* ์Šคํฌ๋ฆฝํŠธ ์‚ฌ์šฉ์„ ํ†ตํ•œ ๋‹ค์–‘ํ•œ ์กฐ๊ฑด์— ๋งŒ์กฑํ•˜๋Š” ID ์ƒ์„ฑ
์ง€์›
3. ๊ณ„์ • ๊ด€๋ฆฌ
33 IBM Security
Feed๋ฅผ ํ†ตํ•ด HR์—์„œ ์ธ์‚ฌ์ •๋ณด ๋™๊ธฐํ™”๋ฅผ ์š”์ฒญํ•˜๋ฉด ํ•ด๋‹น ์ด๋ ฅ์ด ๋™๊ธฐํ™” ์‹œ์ž‘๊ณผ ๋™์‹œ์— ISIM์— ์ €์žฅ๋ฉ๋‹ˆ๋‹ค. ์‚ฌ์šฉ์ž๋Š” ์š”์ฒญ๋‚ด์—ญ์„ ํ™•์ธํ•˜์—ฌ ๋™๊ธฐํ™”์˜ ์ง„ํ–‰/์™„๋ฃŒ ์—ฌ๋ถ€ ๋ฐ ์˜ค๋ฅ˜
๋ฐœ์ƒ ์—ฌ๋ถ€๋ฅผ ์•Œ ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์ถ”ํ›„ ๋ณด๊ณ ์„œ๋กœ ๋‚ด์—ญํ™•์ธ๋„ ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค.
์ธ์‚ฌ๋™๊ธฐํ™” ์ด๋ ฅ ๋ฐ ์˜ค๋ฅ˜ ๋ณด๊ณ 
์ธ์‚ฌ ๋™๊ธฐํ™” ์š”์ฒญ ๋ชฉ๋ก
๋™๊ธฐํ™” ์„ฑ๊ณต ๊ฒฐ๊ณผ
๋™๊ธฐํ™” ์˜ค๋ฅ˜ ๊ฒฐ๊ณผ
์ธ์‚ฌ ๋™๊ธฐํ™” ๊ด€๋ จ ๋ณด๊ณ ์„œ
3. ๊ณ„์ • ๊ด€๋ฆฌ
34 IBM Security
3. ๊ณ„์ • ๊ด€๋ฆฌ
ISIM์€ ์‚ฌ์šฉ์ž ๋ฐ ๊ณ„์ •, ๊ถŒํ•œ์˜ ์ƒ์„ฑ/๋ณ€๊ฒฝ/์‚ญ์ œ ๋ฐ ๊ณ„์ •์˜ ์ž ๊ธˆ/ํ•ด์ œ, ์•”ํ˜ธ ๋ณ€๊ฒฝ, ์š”์ฒญ ์Šน์ธ, ์‚ฌ์šฉ์ž ํ†ต๋ณด์— ๊ฑฐ์ณ ๋‚ด๋ถ€์—์„œ ์ง„ํ–‰๋˜
๋Š” ํ”„๋กœ์„ธ์Šค๋ฅผ ์›Œํฌํ”Œ๋กœ์šฐ๋กœ ์ •์˜ํ•˜์—ฌ ์—…๋ฌด ํ˜„ํ™ฉ์— ๋งž๋„๋ก ๊ตฌ์„ฑ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
์›Œํฌํ”Œ๋กœ์šฐ
์Šน์ธ ์›Œํฌํ”Œ๋กœ์šฐ
์กฐ์ž‘ ์›Œํฌํ”Œ๋กœ์šฐ
๊ณ„์ • ์š”์ฒญ
๊ถŒํ•œ ์š”์ฒญ
1์ฐจ ์Šน์ธ 2์ฐจ ์Šน์ธ 3์ฐจ ์Šน์ธ
๊ณ„์ • ์ƒ์„ฑ
๊ถŒํ•œ ์ƒ์„ฑ
๊ณ„์ •/๊ถŒํ•œ ์š”์ฒญ/๋ณ€๊ฒฝ/์‚ญ์ œ
์ž ๊ธˆ/ํ•ด์ œ/ํ†ต๋ณด
๊ณ„์ • ์ž ๊ธˆ
๊ณ„์ • ํ•ด์ œ
๊ณ„์ • ๋ณ€๊ฒฝ
๊ณ„์ • ์‚ญ์ œ
Account
35 IBM Security
ISIM์€ ๊ณ„์ •/๊ถŒํ•œ ์ฒ˜๋ฆฌ ์ ˆ์ฐจ ๊ตฌ์„ฑ ๋ฐ ์š”์ฒญ์— ๋Œ€ํ•œ ๋‹ค๋‹จ๊ณ„ ๊ฒฐ์žฌ๋ฅผ ๊ตฌ์„ฑํ•˜๊ธฐ ์œ„ํ•ด ์›Œํฌํ”Œ๋กœ์šฐ ๊ธฐ๋Šฅ์„ ๋‚ด์žฅํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์›Œํฌํ”Œ๋กœ์šฐ๋Š” Java Applet ๊ธฐ๋ฐ˜์˜ ๋””์ž์ด๋„ˆ๋ฅผ
์ด์šฉํ•˜์—ฌ GUIํ˜•์‹์œผ๋กœ ๊ตฌ์„ฑ์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค.
๊ณ„์ธต์  ์Šน์ธ ์ง€์› ๋ฐ SMS ํ†ต๋ณด
- ์›Œํฌํ”Œ๋กœ์šฐ์—์„œ ์ œ๊ณต๋˜๋Š” Java Script๋ฅผ ์ด์šฉํ•˜์—ฌ ์ƒ์„ธํ•œ ๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ๊ฐ€ ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค.
- ์›Œํฌํ”Œ๋กœ์šฐ์—์„œ SMS๋‚˜ email์„ ์—ฐ๋™ํ•˜์—ฌ ๊ฒฐ์žฌ์˜ ์ง„ํ–‰์ƒํƒœ ๋ฐ ์™„๋ฃŒ์—ฌ๋ถ€์— ๋Œ€ํ•ด ์‹ ์ฒญ์ž์—๊ฒŒ ํ†ต๋ณด๋ฅผ ํ•ฉ๋‹ˆ๋‹ค.
- ์š”์ฒญํ•œ ๊ฒฐ์žฌ์— ๋Œ€ํ•ด์„œ ์‹ ์ฒญ์ž๋Š” ์Šน์ธ ํ˜„ํ™ฉ์— ๋Œ€ํ•ด ํ™•์ธ์ด ๊ฐ€๋Šฅํ•˜๋ฉฐ, ์Šน์ธ์ž๋Š” ์ž์‹ ์˜ ๊ฒฐ์žฌ ์š”์ฒญ๊ฑด์— ๋Œ€ํ•ด ํ˜„ํ™ฉํŒŒ์•…์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค.
์›Œํฌํ”Œ๋กœ์šฐ ๋””์ž์ด๋„ˆ 3๋‹จ๊ณ„ ๊ฒฐ์žฌ ์ƒ์„ฑ ์˜ˆ์ œ
3. ๊ณ„์ • ๊ด€๋ฆฌ
36 IBM Security
ISIM์—์„œ ์ œ๊ณตํ•˜๋Š” GUI ๊ธฐ๋ฐ˜์˜ ์›Œํฌํ”Œ๋กœ์šฐ ํŽธ์ง‘๊ธฐ๋ฅผ ์ด์šฉํ•˜์—ฌ ์›Œํฌํ”Œ๋กœ์šฐ ํ”„๋กœ์„ธ์Šค์— ๋Œ€ํ•œ ์œ ์—ฐํ•œ ์ •์˜ ๋ฐ ์›Œํฌํ”Œ๋กœ์šฐ ๊ฐ ๋‹จ๊ณ„๋ณ„ ์„ค์ •์„ ํ†ตํ•ด ๋‹ค์–‘ํ•œ ๋น„์ฆˆ๋‹ˆ์Šค ๋กœ์ง์„
๊ตฌํ˜„ํ•ฉ๋‹ˆ๋‹ค.
๊ฒฐ์žฌ ๊ด€๋ฆฌ ๊ธฐ๋Šฅ (๊ณ„์†)
- Drag & Drop์„ ํ†ตํ•œ ์›Œํฌํ”Œ๋กœ์šฐ ์„ค๊ณ„, ๊ตฌํ˜„, ์‹ค์‹œ๊ฐ„ ๋ฐ˜์˜
- ์กฐ์ง๋ณ„, ์„œ๋ฒ„๋ณ„ ๋‹ค๋ฅธ ์›Œํฌํ”Œ๋กœ์šฐ ์ง€์›
- ์›Œํฌํ”Œ๋กœ์šฐ Template ์ œ๊ณต
- ์‚ฌ์šฉ์ž ๊ณ„์ •์„ ๊ด€๋ฆฌํ•˜๊ธฐ ์œ„ํ•œ ์ž‘์—… ํ”„๋กœ์„ธ์Šค๋ฅผ ์›Œํฌํ”Œ๋กœ์šฐ๋ฅผ ํ†ตํ•ด
์ž๋™ํ™”ํ•ฉ๋‹ˆ๋‹ค.
- ์‚ฌ์šฉ์ž ๊ณ„์ • ์ƒ์„ฑ, ๋ณ€๊ฒฝ, ์Šน์ธ์— ๋Œ€ํ•œ ์š”์ฒญ, ์Šน์ธ, ๊ฑฐ๋ถ€, ์‹œ์Šคํ…œ ๋ฐ˜์˜
๋“ฑ์˜ ์ž‘์—… ์ ˆ์ฐจ๋ฅผ ์›Œํฌํ”Œ๋กœ์šฐ ์•ˆ์— ์ •์˜ํ•ฉ๋‹ˆ๋‹ค.
- ์›Œํฌํ”Œ๋กœ์šฐ ์•ˆ์˜ ๊ฐ ๋‹จ๊ณ„๋Š” ๋ฐ˜๋ณต ์„ค์ •์ด ๊ฐ€๋Šฅํ•˜๋ฉฐ Java Script ์ฝ”๋”ฉ์„
ํ†ตํ•ด ์ปค์Šคํ„ฐ๋งˆ์ด์ง• ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
- ์›Œํฌํ”Œ๋กœ์šฐ ์ •์˜๋Š” ๊ด€๋ฆฌ์ž๊ฐ€ ์‰ฝ๊ฒŒ ์ •์˜ํ•  ์ˆ˜ ์žˆ๋„๋ก GUI ๊ธฐ๋ฐ˜์˜
์›Œํฌํ”Œ๋กœ์šฐ ๋””์ž์ธ ๋„๊ตฌ๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.
- ์›Œํฌํ”Œ๋กœ์šฐ ์ •์˜๋Š” ์‹œ์Šคํ…œ ๋ณ„ ๋˜๋Š” Global ํ•˜๊ฒŒ ์ •์˜ ๊ฐ€๋Šฅ ํ•ฉ๋‹ˆ๋‹ค.
Drag-and-Drop ์„ ํ†ต ํ•œ ์šฉ ์ด ํ•œ
์„ค์ •
3. ๊ณ„์ • ๊ด€๋ฆฌ
37 IBM Security
ISIM์€ ์Šน์ธ ์›Œํฌํ”Œ๋กœ์šฐ ์„ค๊ณ„ ์‹œ ๋‹ค๋ฅธ ์‚ฌ๋žŒ์—๊ฒŒ ์Šน์ธ์„ ํ•  ์ˆ˜ ์žˆ๋„๋ก ๊ถŒํ•œ์„ ์œ„์ž„ ์ฃผ๋Š” escalation ๊ธฐ๋Šฅ์„ ์ ์šฉํ•  ์ˆ˜ ์žˆ์œผ๋ฏ€๋กœ, ์ด๋ฅผ ์ด์šฉํ•˜์—ฌ ์Šน์ธ์ž๊ฐ€ ์ผ์ • ๊ธฐ๊ฐ„ ๋™์•ˆ ์Šน์ธ์„
์ง„ํ–‰ํ•˜์ง€ ์•Š์œผ๋ฉด ์ž๋™์œผ๋กœ ์ง€์ •๋œ escalation ์Šน์ธ์ž์—๊ฒŒ ์Šน์ธ์ด ์š”์ฒญ๋ฉ๋‹ˆ๋‹ค.
์Šน์ธ ๋‹ด๋‹น์ž ์ง€์ •
์Šน์ธ ๋‹ด๋‹น์ž ๋ถ€์žฌ ์‹œ
๊ถŒํ•œ ์œ„์ž„ ๋ฐ›์„ ๋‹ด๋‹น์ž ์ง€์ •
์Šน์ธ ๋‹ด๋‹น์ž๊ฐ€ ์Šน์ธ์„
์•ˆ ํ•  ๊ฒฝ์šฐ์—
์œ„์ž„ ๋ฐ›์€ ๋‹ด๋‹น์ž์—๊ฒŒ
์–ผ๋งˆ ํ›„ ์š”์ฒญ์ด ๊ฐ€๋„๋ก ํ•  ๊ฒƒ
์ธ์ง€ ๊ธฐ๊ฐ„ ์ •์˜(escalation)
์Šน์ธ ๊ถŒํ•œ์˜ ์œ„์ž„ ๋ฐ ํšŒ์ˆ˜
3. ๊ณ„์ • ๊ด€๋ฆฌ
38 IBM Security
ISIM์€ ์Šน์ธ์ž๊ฐ€ ์ถœ์žฅ/ํœด๊ฐ€/์—…๋ฌด ๋“ฑ์˜ ์‚ฌ์œ ๋กœ ํŠน์ • ๊ธฐ๊ฐ„ ๋™์•ˆ ์Šน์ธํ™œ๋™์ด ๋ถˆ๊ฐ€๋Šฅ ํ•  ๊ฒฝ์šฐ ์Šน์ธ์ž๊ฐ€ ์œ„์ž„์ž์™€ ๊ธฐ๊ฐ„์„ ์„ค์ •ํ•˜์—ฌ ์Šน์ธํ™œ๋™์„ ์œ„์ž„ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์œ„์ž„
์Šค์ผ€์ค„์€ ๋ณต์ˆ˜ ๊ฐœ๋ฅผ ์„ค์ • ํ•  ์ˆ˜ ์žˆ์œผ๋ฏ€๋กœ ๋‹ค์–‘ํ•œ ์œ„์ž„ ์„ค์ •์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค.
์Šน์ธ ๊ถŒํ•œ์˜ ์œ„์ž„ ๋ฐ ํšŒ์ˆ˜ (๊ณ„์†)
์œ„์ž„ ๋‹ด๋‹น์ž ์ง€์ •
์œ„์ž„ ๊ธฐ๊ฐ„ ์„ค์ •
์„ค์ • ๋œ ์œ„์ž„ ์Šค์ผ€์ค„
3. ๊ณ„์ • ๊ด€๋ฆฌ
39 IBM Security
๊ด€๋ฆฌ์ž๊ฐ€ ISIM ์ƒ์—์„œ ์—…๋ฌด(Rule)๋ฅผ ์ƒ์„ฑ, ์‚ญ์ œ, ๊ด€๋ฆฌํ•  ์ˆ˜ ์žˆ๋„๋ก ํ•˜๋ฉฐ, ์—…๋ฌด(Rule)์— ๋”ฐ๋ฅธ ์‹œ์Šคํ…œ ๊ถŒํ•œ(๋ฉ”๋‰ด ๋ฐ ๊ธฐ๋Šฅ)์„ ์กฐ์ž‘ํ•˜๊ฑฐ๋‚˜ ์ ์šฉ๋˜๋Š” ๊ตฌ์„ฑ์›์˜ ์กฐ๊ฑด์„ ๊ด€๋ฆฌํ•  ์ˆ˜
์žˆ๋„๋ก ๊ตฌ์ถ•ํ•ฉ๋‹ˆ๋‹ค.
๊ถŒํ•œ Rule ์ž‘์„ฑ ๋ฐ ์ƒ์„ธํ™” ํ‘œ๊ธฐ
ํ˜„์—… ๊ด€๋ฆฌ์ž Rule ๊ด€๋ฆฌ ํ™”๋ฉด
Rule์— ๋งคํ•‘๋œ ๊ตฌ์„ฑ์› ๊ด€๋ฆฌ
Rule-๊ถŒํ•œ ๋งคํ•‘ ๊ด€๋ฆฌ
Rule์— ๋งคํ•‘๋œ ๊ถŒํ•œ ๋ฆฌ์ŠคํŠธ
3. ๊ณ„์ • ๊ด€๋ฆฌ
40 IBM Security
ISIM์˜ ์‚ฌ์šฉ์ž ์ •๋ณด์—์„œ ์‚ฌ์šฉ์ž์—๊ฒŒ ๋ถ€์—ฌ๋œ ๊ถŒํ•œ ํ˜„ํ™ฉ์„ ํ™•์ธ ํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์…€ํ”„์„œ๋น„์Šค๋ฅผ ํ†ตํ•ด ๊ถŒํ•œ์„ ์‹ ์ฒญ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์‚ฌ์šฉ์ž ํ‡ด์‚ฌ/ํœด์ง/์ „๋ฐฐ ๋“ฑ์˜
์ธ์‚ฌ ๋ณ€๊ฒฝ์‚ฌํ•ญ์ด ๋ฐœ์ƒํ•  ๊ฒฝ์šฐ ์ •์ฑ…์— ๋”ฐ๋ผ ๊ถŒํ•œ์„ ์‚ญ์ œํ•˜๊ฑฐ๋‚˜ ๋ณด์กดํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
๊ฐœ์ธ๋ณ„ ๊ถŒํ•œ ๊ด€๋ฆฌ
์‚ฌ์šฉ์ž ์ •๋ณด์˜ ๊ถŒํ•œ ๋ถ€์—ฌ ํ˜„ํ™ฉ
์…€ํ”„์„œ๋น„์Šค๋ฅผ ํ†ตํ•œ ๊ถŒํ•œ ์š”์ฒญ
3. ๊ณ„์ • ๊ด€๋ฆฌ
41 IBM Security
์—ญํ•  ๊ธฐ๋ฐ˜ ๋™์  ๋ถ€์—ฌ(RBAC) ์ •์ฑ…์„ ํ†ตํ•ด ์ •์˜๋œ ์กฐ๊ฑด์— ๋งŒ์กฑํ•˜๋Š” ์‚ฌ์šฉ์ž์—๊ฒŒ ๋™์‹œ์— ๊ถŒํ•œ์— ๋Œ€ํ•œ ๋“ฑ๋ก์ด ๊ฐ€๋Šฅํ•˜๋ฉฐ, ์‚ฌ์šฉ์ž ๋ณธ์ธ์˜ ๊ถŒํ•œ ์‹ ์ฒญ ํ›„ ์Šน์ธ์— ๋”ฐ๋ฅธ ์ˆ˜๋™ ๊ถŒํ•œ
๋“ฑ๋ก๋„ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค.
๊ถŒํ•œ์˜ ๊ฐœ๋ณ„ ๋“ฑ๋ก ๋ฐ ์ผ๊ด„ ๋“ฑ๋ก
์กฐ๊ฑด ์ƒ์„ฑ์— ๋”ฐ๋ฅธ ์ž๋™ ๊ถŒํ•œ ๋“ฑ๋ก
์…€ํ”„์„œ๋น„์Šค๋ฅผ ํ†ตํ•œ ์ˆ˜๋™ ๊ถŒํ•œ ๋“ฑ๋ก
3. ๊ณ„์ • ๊ด€๋ฆฌ
42 IBM Security
ISIM์€ ์—…๋ฌด๋ถ„๋ฆฌ์ •์ฑ…(Separation of Duties)์„ ๊ธฐ๋ณธ ์ง€์›ํ•˜๊ณ  ์žˆ์–ด, ํšŒ์‚ฌ๋‚ด์˜ ์—ฌ๋Ÿฌ ์—…๋ฌด ์ค‘ ์ƒํ˜ธ ๋ฐฐํƒ€์ ์œผ๋กœ ์„ค์ •๋˜์–ด์•ผ ํ•˜๋Š” ์—…๋ฌด(์˜ˆ : ๊ตฌ๋งค-๊ฒฐ์žฌ)์˜ ๊ถŒํ•œ์„ ๋“ฑ๋กํ•˜์—ฌ
์‚ฌ์šฉ์ž์—๊ฒŒ ๊ถŒํ•œ ๋ถ€์—ฌ ์‹œ ์—…๋ฌด๋ถ„๋ฆฌ์ •์ฑ…์— ์œ„๋ฐ˜๋˜๋Š” ๊ถŒํ•œ ๋ถ€์—ฌ๋ฅผ ์‚ฌ์ „์— ๋ฐฉ์ง€ํ•ฉ๋‹ˆ๋‹ค.
SoD ์ •์ฑ… ๊ตฌ์„ฑ
์—…๋ฌด๋ถ„๋ฆฌ์ •์ฑ… ๋ชฉ๋ก
์—…๋ฌด๋ถ„๋ฆฌ์ •์ฑ… ์„ค์ •
๋ฐฐํƒ€๊ถŒํ•œ ์„ค์ •
๊ด€๋ฆฌ์ž์— ์˜ํ•œ ๋ฐฐํƒ€๊ถŒํ•œ ์Šน์ธ
3. ๊ณ„์ • ๊ด€๋ฆฌ
43 IBM Security
4.1 ์•”ํ˜ธ ์ •์ฑ… ๊ด€๋ฆฌ
4. ์•”ํ˜ธ ๊ด€๋ฆฌ
๊ณ„์ • ๋กœ๊ทธ์ธ์— ์‚ฌ์šฉ๋˜๋Š” ์•”ํ˜ธ ์ •์ฑ… ๊ด€๋ฆฌ ๊ธฐ๋Šฅ์„ ์ œ๊ณตํ•˜๋ฉฐ, ๊ณ ๊ฐ์‚ฌ์˜ ์•”ํ˜ธ ์ •์ฑ…์— ํฌํ•จ๋œ ๋ฌธ์ž ๊ตฌ์„ฑ, ๋ณ€๊ฒฝ ์ฃผ๊ธฐ, ์•”ํ˜ธ ์ด๋ ฅ๊ด€๋ฆฌ ์ •์ฑ… ๋ฐ˜์˜์ด
๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. ๊ธˆ์ง€์–ด ์‚ฌ์ „ ๊ตฌ์„ฑ์„ ํ†ตํ•ด ๋…ธ์ถœ๋˜๊ธฐ ์‰ฌ์šด ๋‹จ์–ด ๋“ฑ ์‚ฌ์šฉ ๊ธˆ์ง€ ๋ฌธ์ž๊ตฌ์„ฑ์„ ์„ค์ • ํ•˜์—ฌ ์•”ํ˜ธ ์ ์šฉ์„ ์ œํ•œํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
๏‚ก ์ตœ์†Œ ๊ธธ์ด
๏‚ก ์ตœ๋Œ€ ๊ธธ์ด
๏‚ก ์ตœ๋Œ€ ๋ฐ˜๋ณต ๋ถ„์ž
๏‚ก ํ•„์ˆ˜ ์ตœ์†Œ ๊ณ ์œ  ๋ฌธ์ž
๏‚ก ํ•„์ˆ˜ ์ตœ์†Œ ์˜๋ฌธ/์ˆซ์ž
๏‚ก ์˜ฌ๋ฐ”๋ฅด์ง€ ์•Š์€ ๋ฌธ์ž
๏‚ก ํ•„์ˆ˜ ๋ฌธ์ž
๏‚ก ๋ฌธ์ž ์ œํ•œ
๏‚ก ์‹œ์ž‘ ๋ฌธ์ž
๏‚ก ๋ฐ˜๋ณต ํžˆ์Šคํ† ๋ฆฌ ๊ธธ์ด
๏‚ก ์ „ํ™˜๋œ ํžˆ์Šคํ† ๋ฆฌ ๊ธธ์ด
๏‚ก ์‚ฌ์šฉ์ž ์ด๋ฆ„ ํ—ˆ์šฉ ์—ฌ๋ถ€
๏‚ก ์‚ฌ์šฉ์ž ์ด๋ฆ„ ๋Œ€์†Œ๋ฌธ์ž ๊ตฌ๋ถ„
๏‚ก ์‚ฌ์šฉ์ž ID ํ—ˆ์šฉ ์—ฌ๋ถ€
๏‚ก ์‚ฌ์šฉ์ž ID ๋Œ€์†Œ๋ฌธ์ž ๊ตฌ๋ถ„
๏‚ก ์‚ฌ์ „ ๊ธฐ๋ฐ˜ ํŒจ์Šค ์›Œ๋“œ ์‚ฌ์šฉ ๋ถˆ๊ฐ€
- ๋น„๋ฐ€๋ฒˆํ˜ธ ๋ถ„์‹ค ์‹œ ์‚ฌ์šฉ์ž ์Šค์Šค๋กœ ๋น„๋ฐ€๋ฒˆํ˜ธ ์ดˆ๊ธฐํ™”๋ฅผ ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์› (์ดˆ๊ธฐํ™”๋œ ๋น„๋ฐ€๋ฒˆํ˜ธ๋Š” SMS, Email๋“ฑ์„ ํ†ตํ•ด ์ „์†ก)
- ๊ด€๋ฆฌ์ž์— ์˜ํ•œ ์‚ฌ์šฉ์ž ๋น„๋ฐ€๋ฒˆํ˜ธ ๋ณ€๊ฒฝ ๊ธฐ๋Šฅ ์ง€์›
44 IBM Security
4.2 ์ผ๊ด„ ์ „์ฒด ์•”ํ˜ธ ๋ณ€๊ฒฝ
4. ์•”ํ˜ธ ๊ด€๋ฆฌ
LDAP
(์‚ฌ์šฉ์ž/๊ณ„์ •
์ •๋ณด)
์•”ํ˜ธ๊ด€๋ฆฌ ์ •์ฑ…
Security Identity Manager
๊ณ„์ •๊ด€๋ฆฌํฌํƒˆ
๊ด€๋ฆฌ์ž
Command Line Interface
์•”ํ˜ธ๋ณ€๊ฒฝ API ํ˜ธ์ถœ
Random ๋˜๋Š”
์‚ฌ์ „์ง€์ • ํŒจ์Šค์›Œ๋“œ
OS/DB ๊ณ„์ •
ํŒจ์Šค์›Œ๋“œ ๋ณ€๊ฒฝ ํ†ต๋ณด ๋ฉ”์ผ
- ์ž๋™ ๋ณ€๊ฒฝ ์˜ˆ์™ธ ๊ณ„์ •์€ ๊ณ„์ •์ •๋ณด์— ๋ณ„๋„์˜ ์‹๋ณ„ ๊ฐ’์„ ์„ค์ •ํ•˜์—ฌ ํŒจ์Šค์›Œ๋“œ ๋ณ€๊ฒฝ ์‹œ ์ž๋™์œผ๋กœ ์˜ˆ์™ธ ๋˜๋„๋ก ์•”ํ˜ธ๋ณ€๊ฒฝ ํ”„๋กœ์„ธ์Šค๋ฅผ ์„ค์ •
- ์ž๋™ ๋ณ€๊ฒฝ ์˜ˆ์™ธ ๊ณ„์ •์€ ์‚ฌ์ „์— ์‹๋ณ„์ด ๋˜์–ด์•ผ ํ•จ
ISIM์€ ๋Œ€๋Ÿ‰ ๊ณ„์ •์˜ ํŒจ์Šค์›Œ๋“œ ์ผ๊ด„ ๋ณ€๊ฒฝ์„ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•ด CLI ๋ช…๋ น์–ด๋ฅผ ํ†ตํ•œ ์•”ํ˜ธ ๋ณ€๊ฒฝ/API๋ฅผ ํ†ตํ•œ ์•”ํ˜ธ ๋ณ€๊ฒฝ์„ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค. ๊ด€๋ฆฌ์ž๋Š” ์ด ๊ธฐ
๋Šฅ์„ ์ด์šฉํ•˜์—ฌ ๋Œ€๋Ÿ‰์˜ ๊ณ„์ •์„ ์„ ํƒํ•œ ํ›„ ๋ฏธ๋ฆฌ ์ •์˜๋˜์–ด ์žˆ๋Š” ๋˜๋Š” ์ž„์˜๋กœ ์ƒ์„ฑ๋˜๋Š” ํŒจ์Šค์›Œ๋“œ๋กœ ๋ณ€๊ฒฝ์„ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ํŒจ์Šค์›Œ๋“œ๊ฐ€ ๋ณ€๊ฒฝ๋œ ์‚ฌ
์šฉ์ž ๋˜๋Š” ๊ณ„์ •์˜ ์†Œ์œ ์ž์—๊ฒŒ๋Š” ํŒจ์Šค์›Œ๋“œ ๋ณ€๊ฒฝ์— ๋Œ€ํ•œ ํ†ต์ง€ ๋ฉ”์ผ์ด ๋ฐœ์†ก๋ฉ๋‹ˆ๋‹ค.
์„œ๋ฒ„ ์ ‘๊ทผ์ œ์–ด
๊ณ„์ • DB
OS Account
OS
DB Account
DB
45 IBM Security
4.3 ์•”ํ˜ธ ์ฃผ๊ธฐ ๊ด€๋ฆฌ
4. ์•”ํ˜ธ ๊ด€๋ฆฌ
ISIM์€ ๋ผ์ดํ”„์‚ฌ์ดํด ์ •์ฑ… ์‹คํ–‰์„ ํ†ตํ•ด ๊ณ„์ •์˜ ์•”ํ˜ธ ๋งŒ๋ฃŒ์ผ์„ ์‹๋ณ„ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ๊ธฐ๋Šฅ์„ ์ด์šฉํ•˜์—ฌ ์•”ํ˜ธ๊ฐ€ ๋งŒ๋ฃŒ๋œ ๊ณ„์ •์€ ์ •์˜๋œ ํ”„๋กœ์„ธ
์Šค์— ๋”ฐ๋ผ ๊ณ„์ • ์ž ๊ธˆ, ์†Œ์œ ์ž์—๊ฒŒ ์•”ํ˜ธ ๋งŒ๋ฃŒ ๋ฉ”์ผ ๋ฐœ์†ก ๋“ฑ์˜ ๊ธฐ๋Šฅ์„ ์ˆ˜ํ–‰ํ•˜๊ณ . ์•”ํ˜ธ ๋งŒ๋ฃŒ์ผ์ด ๋„๋ž˜ํ•œ ๊ณ„์ •์€ ์†Œ์œ ์ž์—๊ฒŒ ์•”ํ˜ธ ๋งŒ๋ฃŒ์˜ˆ์ • ๋ฉ”์ผ
๋ฐœ์†ก์„ ํ†ตํ•ด ๋งŒ๋ฃŒ์ผ ์ „ ์•”ํ˜ธ ๋ณ€๊ฒฝ์„ ์œ ๋„ํ•ฉ๋‹ˆ๋‹ค.
LDAP
(์‚ฌ์šฉ์ž/๊ณ„์ •
์ •๋ณด)
๋ผ์ดํ”„์‚ฌ์ดํด ์ •์ฑ…
Security Identity Manager
์•”ํ˜ธ ๋งŒ๋ฃŒ์ผ ๋„๋ž˜
์•”ํ˜ธ ๋งŒ๋ฃŒ
๋งŒ๋ฃŒ๋ฉ”์ผ ๋ฐœ์†ก
๊ณ„์ • ์ž ๊ธˆ
๋งŒ๋ฃŒ์˜ˆ์ • ๋ฉ”์ผ
๋ฐœ์†ก
- ISIM์„ ํ†ตํ•ด ์•”ํ˜ธ๋ฅผ ๋ณ€๊ฒฝํ•œ ๊ฒฝ์šฐ์— ๋ณ€๊ฒฝ์ฃผ๊ธฐ ๋ฏธ์ค€์ˆ˜ ๊ณ„์ • ํŒ๋‹จ ๊ฐ€๋Šฅ
- OS๋‚˜ DB์—์„œ ์•”ํ˜ธ๋ฅผ ์ง์ ‘ ๋ณ€๊ฒฝํ•œ ๊ฒฝ์šฐ์—๋„ ISIM์˜ ์•”ํ˜ธ ๋ณ€๊ฒฝ์ผ ๊ธฐ์ค€์œผ๋กœ ์•”ํ˜ธ๋ณ€๊ฒฝ ์ฃผ๊ธฐ ๊ด€๋ฆฌ
- ์•”ํ˜ธ ๋งŒ๋ฃŒ์˜ˆ์ • ๋ฉ”์ผ์€ ๋งŒ๋ฃŒ์˜ˆ์ •์ผ ์ „ ์ •์˜๋œ ์ผ์ž ๋ณ„๋กœ ์—ฌ๋Ÿฌ ๋ฒˆ ๋ฐœ์†ก ๊ฐ€๋Šฅ (์˜ˆ : 5์ผ์ „, 3์ผ์ „, 1์ผ์ „ ๋“ฑ)
- ๋งŒ๋ฃŒ์ผ ๊นŒ์ง€ ์•”ํ˜ธ๋ณ€๊ฒฝ์„ ํ•˜์ง€ ์•Š์€ ๊ฒฝ์šฐ ๊ณ„์ • ์ž ๊ธˆ, ์•”ํ˜ธ ์ดˆ๊ธฐํ™” ๋ฐ ์‚ฌ์šฉ์ž ์ง€์ • ํ”„๋กœ์„ธ์Šค ์ ์šฉ ๊ฐ€๋Šฅ
์•”ํ˜ธ ๋งŒ๋ฃŒ์ผ ์„ค์ • ํ™”๋ฉด
46 IBM Security
ISIM์€ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋˜๋Š” ์Šคํฌ๋ฆฝํŠธ์— Hard Coding ๋˜์–ด ์žˆ๋Š” ID/PW๋กœ ์ธํ•ด ๋ฐœ์ƒํ•˜๋Š” ๊ณ„์ •๊ด€๋ฆฌ/๋ณด์•ˆ๊ด€๋ จ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด IBM
Privileged Identity Manager(PIM) for Applications ํ™•์žฅ ๊ธฐ๋Šฅ์„ ์‚ฌ์šฉํ•˜์—ฌ, ์ผ๋ถ€ ์†Œ์Šค์ฝ”๋“œ ์ˆ˜์ •๋งŒ์œผ๋กœ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜๊ณผ ์Šคํฌ๋ฆฝํŠธ์— ์‹ ๋ขฐ์„ฑ์ด ๋ณด์žฅ
๋œ ID/PW๋ฅผ ๋™์ ์œผ๋กœ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค.
4.6 ์•”ํ˜ธ ๊ด€๋ฆฌ API ์ œ๊ณต
4. ์•”ํ˜ธ ๊ด€๋ฆฌ
์• ํ”Œ๋ฆฌ์ผ€์ด์…˜, ์Šคํฌ๋ฆฝํŠธ ์•ˆ์— ํ•˜๋“œ์ฝ”๋”ฉ๋œ ํ˜น์€ ๊ตฌ์„ฑ ํŒŒ์ผ์ด๋‚˜
์ €์žฅ์†Œ์— ์ €์žฅ๋œ ์‹ ๋ขฐ์ •๋ณด
PIM์€ ์•ˆ์ „ํ•˜๊ฒŒ ์ €์žฅ๋œ ์‹ ๋ขฐ ์ •๋ณด๋ฅผ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜๊ณผ ์Šคํฌ๋ฆฝํŠธ๋Š”
OAuth 2.0๊ณผ ์ธ์Šคํ„ด์Šค ์ง€๋ฌธ์„ ์‚ฌ์šฉํ•˜์—ฌ ์ธ์ฆ
๋ฌธ์ œ ์Šคํฌ๋ฆฝํŠธ
// Example Java code that reads credentials from a properties file
String username = prop.getProperty("user");
String password = prop.getProperty("pass");
connect(username, password);
ํ•ด๊ฒฐ๋œ ์Šคํฌ๋ฆฝํŠธ
//com.ibm.ispim.appid.client.api.Credential
Credential ldapCred;
try {
ldapCred = appIdManager.getCredential("ldap.jke.org")
} catch (ExecutionException e) {
logger.error(e.getMessage());
}
...
String username = ldapCred.getUserID();
String password = ldapCred.getPassword();
connect(username, password);
PIM for App ์ ์šฉ ์˜ˆ
47 IBM Security
6. ๋ณด๊ณ ์„œ
ISIM์€์‚ฌ์šฉ์ž๊ฐ€ ์›ํ•˜๋Š” Report์˜ ๊ฐ€๊ณต ๋ฐ ์ œ๊ณต์„ ์œ„ํ•ด ์ „์„ธ๊ณ„ 1์œ„ ์ œํ’ˆ์ธ Cognos Business Intelligence (Cognos BI)๋ฅผ ๋ฒˆ๋“ค๋กœ ์ œ๊ณตํ•˜๊ณ  ์žˆ์Šต๋‹ˆ
๋‹ค. ISIM์˜ ๋ฆฌํฌํŠธ ๊ด€๋ จ DB๋ฅผ Cognos BI์™€ ์—ฐ๋™ํ•˜์—ฌ ํ•„์š”ํ•œ ๋ฆฌํฌํŠธ๋ฅผ ์„ค๊ณ„ํ•˜๊ณ  ์ฃผ๊ธฐ์ ์œผ๋กœ ์ƒ์„ฑํ•˜๋ฉฐ ์–ธ์ œ๋“ ์ง€ ์กฐํšŒ๊ฐ€ ๊ฐ€๋Šฅํ•˜๋„๋ก ๊ธฐ๋Šฅ์„ ์ œ
๊ณตํ•ฉ๋‹ˆ๋‹ค.
6.1 ํ†ตํ•ฉ ๋ณด์•ˆ๋กœ๊ทธ ๋ถ„์„ ๋ณด๊ณ ์„œ ์ œ๊ณต
- ISIM ์ œ๊ณต ๋ฆฌํฌํŠธ ๊ด€๋ จ ๋‚ด์šฉ : ๊ณ„์ •-์‹ค์‚ฌ์šฉ์ž ๋งตํ•‘ ํ˜„ํ™ฉ, ๋ฏธ์‚ฌ์šฉ ๊ณ„์ • ํ˜„ํ™ฉ, ๊ณ„์ • ๊ด€๋ฆฌ ๋‚ด์—ญ, ๊ณ„์ •๊ด€๋ฆฌ ์ •์ฑ…/๊ฐ์‚ฌ ๋‚ด์—ญ, ์•”ํ˜ธ ๋ณ€๊ฒฝ์ฃผ๊ธฐ ๋งŒ๋ฃŒ ๋‚ด์—ญ
- ์ •์˜๋œ ๋ณด๊ณ ์„œ๋Š” Web์œผ๋กœ ์กฐํšŒ ๊ฐ€๋Šฅํ•˜๋ฉฐ PDF, HTML, EXCEL, CSV, XMLํ˜•ํƒœ๋กœ ์ €์žฅ ๊ฐ€๋Šฅ
- ํ†ตํ•ฉ ๋กœ๊ทธ๊ด€๋ฆฌ ์‹œ์Šคํ…œ์œผ๋กœ ์—ฐ๋™ํ•˜๊ธฐ ์œ„ํ•œ ์—ฐ๋™ ์ธํ„ฐํŽ˜์ด์Šค ์ œ๊ณต
6.2 ํ†ต๊ณ„ ๋ณด๊ณ ์„œ ์ œ๊ณต
6.3 ๋‹ค์–‘ํ•œ ์ถœ๋ ฅํ˜•์‹ ์ง€์›
6.4 ํ†ตํ•ฉ ๋กœ๊ทธ๊ด€๋ฆฌ ์‹œ์Šคํ…œ ์—ฐ๋™
Cognos Business Intelligence Server
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
ยฉ Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express
or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of,
creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these
materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may
change at any time at IBMโ€™s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and
other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks
or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise.
Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or
product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are
designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective.
IBM DOES NOT WARRANT THAT ANYSYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT
OF ANY PARTY.
FOLLOW US ON:
THANK YOU

More Related Content

Viewers also liked

Viewers also liked (15)

Advanced persistent threats(APT) - Infographic
Advanced persistent threats(APT) - InfographicAdvanced persistent threats(APT) - Infographic
Advanced persistent threats(APT) - Infographic
ย 
Identity Governance Solutions
Identity Governance SolutionsIdentity Governance Solutions
Identity Governance Solutions
ย 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
ย 
Security & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarSecurity & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things Webinar
ย 
The Future is Now: Whatโ€™s New in ForgeRock Identity Management
The Future is Now: Whatโ€™s New in ForgeRock Identity Management The Future is Now: Whatโ€™s New in ForgeRock Identity Management
The Future is Now: Whatโ€™s New in ForgeRock Identity Management
ย 
The Future is Now: Whatโ€™s New in ForgeRock Identity Gateway
The Future is Now: Whatโ€™s New in ForgeRock Identity GatewayThe Future is Now: Whatโ€™s New in ForgeRock Identity Gateway
The Future is Now: Whatโ€™s New in ForgeRock Identity Gateway
ย 
8K Miles - User Identity Governance & Compliance
8K Miles - User Identity Governance & Compliance8K Miles - User Identity Governance & Compliance
8K Miles - User Identity Governance & Compliance
ย 
Identity & Access Governance
Identity & Access GovernanceIdentity & Access Governance
Identity & Access Governance
ย 
The Future is Now: Whatโ€™s New in ForgeRock Access Management
The Future is Now: Whatโ€™s New in ForgeRock Access Management The Future is Now: Whatโ€™s New in ForgeRock Access Management
The Future is Now: Whatโ€™s New in ForgeRock Access Management
ย 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit
ย 
Identity Management with the ForgeRock Identity Platform - So Whatโ€™s New?
Identity Management with the ForgeRock Identity Platform - So Whatโ€™s New?Identity Management with the ForgeRock Identity Platform - So Whatโ€™s New?
Identity Management with the ForgeRock Identity Platform - So Whatโ€™s New?
ย 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
ย 
Choosing The Right Sales Strategy
Choosing The Right Sales StrategyChoosing The Right Sales Strategy
Choosing The Right Sales Strategy
ย 
THE SEVEN STEPS OF SALES PLANNING
THE SEVEN STEPS OF SALES PLANNINGTHE SEVEN STEPS OF SALES PLANNING
THE SEVEN STEPS OF SALES PLANNING
ย 
Strategic Marketing & Sales Plan Template
Strategic Marketing & Sales Plan TemplateStrategic Marketing & Sales Plan Template
Strategic Marketing & Sales Plan Template
ย 

Similar to IBM Identity Governance & Intelligence

์˜คํ”ผ์Šค์„ธ์ดํผ ์†Œ๊ฐœ์ž๋ฃŒ
์˜คํ”ผ์Šค์„ธ์ดํผ ์†Œ๊ฐœ์ž๋ฃŒ์˜คํ”ผ์Šค์„ธ์ดํผ ์†Œ๊ฐœ์ž๋ฃŒ
์˜คํ”ผ์Šค์„ธ์ดํผ ์†Œ๊ฐœ์ž๋ฃŒ
silverfox2580
ย 
ํฌํŠธ์œˆ์†Œ๊ฐœ์„œ
ํฌํŠธ์œˆ์†Œ๊ฐœ์„œ ํฌํŠธ์œˆ์†Œ๊ฐœ์„œ
ํฌํŠธ์œˆ์†Œ๊ฐœ์„œ
CFP ์ด๊ฒฝ์„,
ย 
Secure Work System v2.0 แ„‰แ…ฉแ„€แ…ขแ„Œแ…กแ„…แ…ญ_201503
Secure Work System v2.0 แ„‰แ…ฉแ„€แ…ขแ„Œแ…กแ„…แ…ญ_201503Secure Work System v2.0 แ„‰แ…ฉแ„€แ…ขแ„Œแ…กแ„…แ…ญ_201503
Secure Work System v2.0 แ„‰แ…ฉแ„€แ…ขแ„Œแ…กแ„…แ…ญ_201503
silverfox2580
ย 
ํšŒ์‚ฌ ๊ณ„์ •/ํŒจ์Šค์›Œ๋“œ ๊ทธ๋Œ€๋กœ AWS ๊ด€๋ฆฌ ์ฝ˜์†” ๋ฐ EC2 ์ธ์Šคํ„ด์Šค ์‚ฌ์šฉํ•˜๊ธฐ - ์ด์ •ํ›ˆ, AWS ์†”๋ฃจ์…˜์ฆˆ ์•„ํ‚คํ…ํŠธ:: AWS Summit O...
ํšŒ์‚ฌ ๊ณ„์ •/ํŒจ์Šค์›Œ๋“œ ๊ทธ๋Œ€๋กœ AWS ๊ด€๋ฆฌ ์ฝ˜์†” ๋ฐ EC2 ์ธ์Šคํ„ด์Šค ์‚ฌ์šฉํ•˜๊ธฐ - ์ด์ •ํ›ˆ, AWS ์†”๋ฃจ์…˜์ฆˆ ์•„ํ‚คํ…ํŠธ::  AWS Summit O...ํšŒ์‚ฌ ๊ณ„์ •/ํŒจ์Šค์›Œ๋“œ ๊ทธ๋Œ€๋กœ AWS ๊ด€๋ฆฌ ์ฝ˜์†” ๋ฐ EC2 ์ธ์Šคํ„ด์Šค ์‚ฌ์šฉํ•˜๊ธฐ - ์ด์ •ํ›ˆ, AWS ์†”๋ฃจ์…˜์ฆˆ ์•„ํ‚คํ…ํŠธ::  AWS Summit O...
ํšŒ์‚ฌ ๊ณ„์ •/ํŒจ์Šค์›Œ๋“œ ๊ทธ๋Œ€๋กœ AWS ๊ด€๋ฆฌ ์ฝ˜์†” ๋ฐ EC2 ์ธ์Šคํ„ด์Šค ์‚ฌ์šฉํ•˜๊ธฐ - ์ด์ •ํ›ˆ, AWS ์†”๋ฃจ์…˜์ฆˆ ์•„ํ‚คํ…ํŠธ:: AWS Summit O...
Amazon Web Services Korea
ย 
AWS Builders Online Series | ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€ - ์ด์ฃผํ˜•, AWS ํ…Œ๋ฆฌํ† ๋ฆฌ ๋งค๋‹ˆ์ €
AWS Builders Online Series | ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€ - ์ด์ฃผํ˜•, AWS ํ…Œ๋ฆฌํ† ๋ฆฌ ๋งค๋‹ˆ์ €AWS Builders Online Series | ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€ - ์ด์ฃผํ˜•, AWS ํ…Œ๋ฆฌํ† ๋ฆฌ ๋งค๋‹ˆ์ €
AWS Builders Online Series | ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€ - ์ด์ฃผํ˜•, AWS ํ…Œ๋ฆฌํ† ๋ฆฌ ๋งค๋‹ˆ์ €
Amazon Web Services Korea
ย 
ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€ - ์ด์ฃผํ˜•, AWS ์–ด์นด์šดํŠธ ๋งค๋‹ˆ์ € :: AWS Builders 100
ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€ - ์ด์ฃผํ˜•, AWS ์–ด์นด์šดํŠธ ๋งค๋‹ˆ์ € :: AWS Builders 100ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€ - ์ด์ฃผํ˜•, AWS ์–ด์นด์šดํŠธ ๋งค๋‹ˆ์ € :: AWS Builders 100
ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€ - ์ด์ฃผํ˜•, AWS ์–ด์นด์šดํŠธ ๋งค๋‹ˆ์ € :: AWS Builders 100
Amazon Web Services Korea
ย 
[AWS Builders] ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€
[AWS Builders] ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€[AWS Builders] ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€
[AWS Builders] ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€
Amazon Web Services Korea
ย 

Similar to IBM Identity Governance & Intelligence (20)

net helper ์ž์‚ฐ๊ด€๋ฆฌ์ œ์•ˆ์„œ
net helper ์ž์‚ฐ๊ด€๋ฆฌ์ œ์•ˆ์„œ net helper ์ž์‚ฐ๊ด€๋ฆฌ์ œ์•ˆ์„œ
net helper ์ž์‚ฐ๊ด€๋ฆฌ์ œ์•ˆ์„œ
ย 
์˜คํ”ผ์Šค์„ธ์ดํผ ์†Œ๊ฐœ์ž๋ฃŒ
์˜คํ”ผ์Šค์„ธ์ดํผ ์†Œ๊ฐœ์ž๋ฃŒ์˜คํ”ผ์Šค์„ธ์ดํผ ์†Œ๊ฐœ์ž๋ฃŒ
์˜คํ”ผ์Šค์„ธ์ดํผ ์†Œ๊ฐœ์ž๋ฃŒ
ย 
WiseMon ์ œํ’ˆ์†Œ๊ฐœ์„œ
WiseMon ์ œํ’ˆ์†Œ๊ฐœ์„œWiseMon ์ œํ’ˆ์†Œ๊ฐœ์„œ
WiseMon ์ œํ’ˆ์†Œ๊ฐœ์„œ
ย 
OAM_์‹ค๋ฌผ์ž์‚ฐ๊ด€๋ฆฌ
OAM_์‹ค๋ฌผ์ž์‚ฐ๊ด€๋ฆฌ OAM_์‹ค๋ฌผ์ž์‚ฐ๊ด€๋ฆฌ
OAM_์‹ค๋ฌผ์ž์‚ฐ๊ด€๋ฆฌ
ย 
SET (์‹œ์Šคํ…œ ์šด์˜ ๊ด€๋ฆฌ)
SET (์‹œ์Šคํ…œ ์šด์˜ ๊ด€๋ฆฌ)  SET (์‹œ์Šคํ…œ ์šด์˜ ๊ด€๋ฆฌ)
SET (์‹œ์Šคํ…œ ์šด์˜ ๊ด€๋ฆฌ)
ย 
ํฌํŠธ์œˆ์†Œ๊ฐœ์„œ
ํฌํŠธ์œˆ์†Œ๊ฐœ์„œ ํฌํŠธ์œˆ์†Œ๊ฐœ์„œ
ํฌํŠธ์œˆ์†Œ๊ฐœ์„œ
ย 
์›นํ•„ํ„ฐ ์‹œ์˜จ
์›นํ•„ํ„ฐ ์‹œ์˜จ์›นํ•„ํ„ฐ ์‹œ์˜จ
์›นํ•„ํ„ฐ ์‹œ์˜จ
ย 
201412 ์ „์‚ฐ์ž์‚ฐํ†ตํ•ฉ๊ด€๋ฆฌ
201412 ์ „์‚ฐ์ž์‚ฐํ†ตํ•ฉ๊ด€๋ฆฌ201412 ์ „์‚ฐ์ž์‚ฐํ†ตํ•ฉ๊ด€๋ฆฌ
201412 ์ „์‚ฐ์ž์‚ฐํ†ตํ•ฉ๊ด€๋ฆฌ
ย 
์˜คํ”ผ์Šคํ‚คํผ ์ œ์•ˆ์„œ ์ผ๋ฐ˜๊ธฐ์—…์šฉ Z
์˜คํ”ผ์Šคํ‚คํผ ์ œ์•ˆ์„œ ์ผ๋ฐ˜๊ธฐ์—…์šฉ Z์˜คํ”ผ์Šคํ‚คํผ ์ œ์•ˆ์„œ ์ผ๋ฐ˜๊ธฐ์—…์šฉ Z
์˜คํ”ผ์Šคํ‚คํผ ์ œ์•ˆ์„œ ์ผ๋ฐ˜๊ธฐ์—…์šฉ Z
ย 
2017 ์˜คํ”ผ์Šคํ‚คํผ ์ œ์•ˆ์„œ ์ค‘์†Œ๊ธฐ์—…์šฉ
2017 ์˜คํ”ผ์Šคํ‚คํผ ์ œ์•ˆ์„œ ์ค‘์†Œ๊ธฐ์—…์šฉ 2017 ์˜คํ”ผ์Šคํ‚คํผ ์ œ์•ˆ์„œ ์ค‘์†Œ๊ธฐ์—…์šฉ
2017 ์˜คํ”ผ์Šคํ‚คํผ ์ œ์•ˆ์„œ ์ค‘์†Œ๊ธฐ์—…์šฉ
ย 
Secure Work System v2.0 แ„‰แ…ฉแ„€แ…ขแ„Œแ…กแ„…แ…ญ_201503
Secure Work System v2.0 แ„‰แ…ฉแ„€แ…ขแ„Œแ…กแ„…แ…ญ_201503Secure Work System v2.0 แ„‰แ…ฉแ„€แ…ขแ„Œแ…กแ„…แ…ญ_201503
Secure Work System v2.0 แ„‰แ…ฉแ„€แ…ขแ„Œแ…กแ„…แ…ญ_201503
ย 
GS๋ฆฌํ…Œ์ผ ํ†ตํ•ฉ ๋ฌผ๋ฅ˜์‹œ์Šคํ…œ ๊ตฌ์ถ• ํ”„๋กœ์ ํŠธ ์ œ์•ˆ์„œ
GS๋ฆฌํ…Œ์ผ ํ†ตํ•ฉ ๋ฌผ๋ฅ˜์‹œ์Šคํ…œ ๊ตฌ์ถ• ํ”„๋กœ์ ํŠธ ์ œ์•ˆ์„œGS๋ฆฌํ…Œ์ผ ํ†ตํ•ฉ ๋ฌผ๋ฅ˜์‹œ์Šคํ…œ ๊ตฌ์ถ• ํ”„๋กœ์ ํŠธ ์ œ์•ˆ์„œ
GS๋ฆฌํ…Œ์ผ ํ†ตํ•ฉ ๋ฌผ๋ฅ˜์‹œ์Šคํ…œ ๊ตฌ์ถ• ํ”„๋กœ์ ํŠธ ์ œ์•ˆ์„œ
ย 
ํšŒ์‚ฌ ๊ณ„์ •/ํŒจ์Šค์›Œ๋“œ ๊ทธ๋Œ€๋กœ AWS ๊ด€๋ฆฌ ์ฝ˜์†” ๋ฐ EC2 ์ธ์Šคํ„ด์Šค ์‚ฌ์šฉํ•˜๊ธฐ - ์ด์ •ํ›ˆ, AWS ์†”๋ฃจ์…˜์ฆˆ ์•„ํ‚คํ…ํŠธ:: AWS Summit O...
ํšŒ์‚ฌ ๊ณ„์ •/ํŒจ์Šค์›Œ๋“œ ๊ทธ๋Œ€๋กœ AWS ๊ด€๋ฆฌ ์ฝ˜์†” ๋ฐ EC2 ์ธ์Šคํ„ด์Šค ์‚ฌ์šฉํ•˜๊ธฐ - ์ด์ •ํ›ˆ, AWS ์†”๋ฃจ์…˜์ฆˆ ์•„ํ‚คํ…ํŠธ::  AWS Summit O...ํšŒ์‚ฌ ๊ณ„์ •/ํŒจ์Šค์›Œ๋“œ ๊ทธ๋Œ€๋กœ AWS ๊ด€๋ฆฌ ์ฝ˜์†” ๋ฐ EC2 ์ธ์Šคํ„ด์Šค ์‚ฌ์šฉํ•˜๊ธฐ - ์ด์ •ํ›ˆ, AWS ์†”๋ฃจ์…˜์ฆˆ ์•„ํ‚คํ…ํŠธ::  AWS Summit O...
ํšŒ์‚ฌ ๊ณ„์ •/ํŒจ์Šค์›Œ๋“œ ๊ทธ๋Œ€๋กœ AWS ๊ด€๋ฆฌ ์ฝ˜์†” ๋ฐ EC2 ์ธ์Šคํ„ด์Šค ์‚ฌ์šฉํ•˜๊ธฐ - ์ด์ •ํ›ˆ, AWS ์†”๋ฃจ์…˜์ฆˆ ์•„ํ‚คํ…ํŠธ:: AWS Summit O...
ย 
Spring Security
Spring SecuritySpring Security
Spring Security
ย 
[์˜คํ”ˆ์†Œ์Šค์ปจ์„คํŒ…]MySQL Monitoring
[์˜คํ”ˆ์†Œ์Šค์ปจ์„คํŒ…]MySQL Monitoring[์˜คํ”ˆ์†Œ์Šค์ปจ์„คํŒ…]MySQL Monitoring
[์˜คํ”ˆ์†Œ์Šค์ปจ์„คํŒ…]MySQL Monitoring
ย 
Guardium ๋ฐ์ดํ„ฐ ๋ณด์•ˆ
Guardium ๋ฐ์ดํ„ฐ ๋ณด์•ˆGuardium ๋ฐ์ดํ„ฐ ๋ณด์•ˆ
Guardium ๋ฐ์ดํ„ฐ ๋ณด์•ˆ
ย 
AWS Builders Online Series | ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€ - ์ด์ฃผํ˜•, AWS ํ…Œ๋ฆฌํ† ๋ฆฌ ๋งค๋‹ˆ์ €
AWS Builders Online Series | ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€ - ์ด์ฃผํ˜•, AWS ํ…Œ๋ฆฌํ† ๋ฆฌ ๋งค๋‹ˆ์ €AWS Builders Online Series | ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€ - ์ด์ฃผํ˜•, AWS ํ…Œ๋ฆฌํ† ๋ฆฌ ๋งค๋‹ˆ์ €
AWS Builders Online Series | ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€ - ์ด์ฃผํ˜•, AWS ํ…Œ๋ฆฌํ† ๋ฆฌ ๋งค๋‹ˆ์ €
ย 
[ํŒจ์Šค์›Œ๋“œ๊ด€๋ฆฌ] APPM for CCTV
[ํŒจ์Šค์›Œ๋“œ๊ด€๋ฆฌ] APPM for CCTV[ํŒจ์Šค์›Œ๋“œ๊ด€๋ฆฌ] APPM for CCTV
[ํŒจ์Šค์›Œ๋“œ๊ด€๋ฆฌ] APPM for CCTV
ย 
ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€ - ์ด์ฃผํ˜•, AWS ์–ด์นด์šดํŠธ ๋งค๋‹ˆ์ € :: AWS Builders 100
ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€ - ์ด์ฃผํ˜•, AWS ์–ด์นด์šดํŠธ ๋งค๋‹ˆ์ € :: AWS Builders 100ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€ - ์ด์ฃผํ˜•, AWS ์–ด์นด์šดํŠธ ๋งค๋‹ˆ์ € :: AWS Builders 100
ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€ - ์ด์ฃผํ˜•, AWS ์–ด์นด์šดํŠธ ๋งค๋‹ˆ์ € :: AWS Builders 100
ย 
[AWS Builders] ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€
[AWS Builders] ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€[AWS Builders] ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€
[AWS Builders] ํ”„๋ฆฌํ‹ฐ์–ด ์„œ๋น„์Šค๋ถ€ํ„ฐ ๊ณ„์ • ๋ณด์•ˆ๊นŒ์ง€
ย 

More from ์œ  ๊น€

Securing the c suite report(kor)
Securing the c suite report(kor)Securing the c suite report(kor)
Securing the c suite report(kor)
์œ  ๊น€
ย 
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ vol.9
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ vol.9์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ vol.9
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ vol.9
์œ  ๊น€
ย 
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.8
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.8์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.8
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.8
์œ  ๊น€
ย 
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.7
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.7 ์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.7
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.7
์œ  ๊น€
ย 
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.6
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.6์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.6
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.6
์œ  ๊น€
ย 

More from ์œ  ๊น€ (16)

์˜์—…๋ณธ๋ถ€ ๊น€์ด์‚ฌ๋Š” ๊ณ„์•ฝ ๊ฐ€๋Šฅ์„ฑ ๋†’์€ ๊ณ ๊ฐ๋“ค์„ ์–ด๋–ป๊ฒŒ ์กฑ์ง‘๊ฒŒ์ฒ˜๋Ÿผ ๊ณจ๋ผ ๋‚ผ๊นŒ?
์˜์—…๋ณธ๋ถ€ ๊น€์ด์‚ฌ๋Š” ๊ณ„์•ฝ ๊ฐ€๋Šฅ์„ฑ ๋†’์€ ๊ณ ๊ฐ๋“ค์„ ์–ด๋–ป๊ฒŒ ์กฑ์ง‘๊ฒŒ์ฒ˜๋Ÿผ ๊ณจ๋ผ ๋‚ผ๊นŒ?์˜์—…๋ณธ๋ถ€ ๊น€์ด์‚ฌ๋Š” ๊ณ„์•ฝ ๊ฐ€๋Šฅ์„ฑ ๋†’์€ ๊ณ ๊ฐ๋“ค์„ ์–ด๋–ป๊ฒŒ ์กฑ์ง‘๊ฒŒ์ฒ˜๋Ÿผ ๊ณจ๋ผ ๋‚ผ๊นŒ?
์˜์—…๋ณธ๋ถ€ ๊น€์ด์‚ฌ๋Š” ๊ณ„์•ฝ ๊ฐ€๋Šฅ์„ฑ ๋†’์€ ๊ณ ๊ฐ๋“ค์„ ์–ด๋–ป๊ฒŒ ์กฑ์ง‘๊ฒŒ์ฒ˜๋Ÿผ ๊ณจ๋ผ ๋‚ผ๊นŒ?
ย 
IBM Qradar์™€ bigfix ์—ฐ๋™์ด ์ œ๊ณตํ•˜๋Š” ๊ฐ€์น˜
IBM Qradar์™€ bigfix ์—ฐ๋™์ด ์ œ๊ณตํ•˜๋Š” ๊ฐ€์น˜IBM Qradar์™€ bigfix ์—ฐ๋™์ด ์ œ๊ณตํ•˜๋Š” ๊ฐ€์น˜
IBM Qradar์™€ bigfix ์—ฐ๋™์ด ์ œ๊ณตํ•˜๋Š” ๊ฐ€์น˜
ย 
์ œ 2 ๊ธˆ์œต๊ถŒ ๊ณ ๊ฐ์„ ์œ„ํ•œ ์ •๋ณด๋ณดํ˜ธ ์„ธ๋ฏธ๋‚˜
์ œ 2 ๊ธˆ์œต๊ถŒ  ๊ณ ๊ฐ์„ ์œ„ํ•œ ์ •๋ณด๋ณดํ˜ธ ์„ธ๋ฏธ๋‚˜์ œ 2 ๊ธˆ์œต๊ถŒ  ๊ณ ๊ฐ์„ ์œ„ํ•œ ์ •๋ณด๋ณดํ˜ธ ์„ธ๋ฏธ๋‚˜
์ œ 2 ๊ธˆ์œต๊ถŒ ๊ณ ๊ฐ์„ ์œ„ํ•œ ์ •๋ณด๋ณดํ˜ธ ์„ธ๋ฏธ๋‚˜
ย 
2016 cost of data breach study kor
2016 cost of data breach study kor2016 cost of data breach study kor
2016 cost of data breach study kor
ย 
IBM Connections Cloud
IBM Connections CloudIBM Connections Cloud
IBM Connections Cloud
ย 
Ibm ๋ณด์•ˆ์‚ฌ์—…๋ถ€ ์„œ๋น„์Šค ๋ฐ ์†”๋ฃจ์…˜ ์†Œ๊ฐœ 160428
Ibm ๋ณด์•ˆ์‚ฌ์—…๋ถ€ ์„œ๋น„์Šค ๋ฐ ์†”๋ฃจ์…˜ ์†Œ๊ฐœ 160428Ibm ๋ณด์•ˆ์‚ฌ์—…๋ถ€ ์„œ๋น„์Šค ๋ฐ ์†”๋ฃจ์…˜ ์†Œ๊ฐœ 160428
Ibm ๋ณด์•ˆ์‚ฌ์—…๋ถ€ ์„œ๋น„์Šค ๋ฐ ์†”๋ฃจ์…˜ ์†Œ๊ฐœ 160428
ย 
Securing the c suite report(kor)
Securing the c suite report(kor)Securing the c suite report(kor)
Securing the c suite report(kor)
ย 
IBM ๋ณด์•ˆ์‚ฌ์—…๋ถ€ ์„œ๋น„์Šค ๋ฐ ์†”๋ฃจ์…˜ ์†Œ๊ฐœ
IBM ๋ณด์•ˆ์‚ฌ์—…๋ถ€ ์„œ๋น„์Šค ๋ฐ ์†”๋ฃจ์…˜ ์†Œ๊ฐœ IBM ๋ณด์•ˆ์‚ฌ์—…๋ถ€ ์„œ๋น„์Šค ๋ฐ ์†”๋ฃจ์…˜ ์†Œ๊ฐœ
IBM ๋ณด์•ˆ์‚ฌ์—…๋ถ€ ์„œ๋น„์Šค ๋ฐ ์†”๋ฃจ์…˜ ์†Œ๊ฐœ
ย 
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ vol.9
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ vol.9์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ vol.9
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ vol.9
ย 
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.8
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.8์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.8
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.8
ย 
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.7
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.7 ์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.7
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.7
ย 
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.6
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.6์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.6
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ Vol.6
ย 
์ด์ค€ํฌ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜Vol.3
์ด์ค€ํฌ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜Vol.3์ด์ค€ํฌ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜Vol.3
์ด์ค€ํฌ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜Vol.3
ย 
Weekly insight 3Min Digest_vol6
Weekly insight 3Min Digest_vol6Weekly insight 3Min Digest_vol6
Weekly insight 3Min Digest_vol6
ย 
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ 4(ํ†ตํ•ฉ๋ณธ)
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ 4(ํ†ตํ•ฉ๋ณธ)์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ 4(ํ†ตํ•ฉ๋ณธ)
์ด์ค€ํฌ์˜ ๋ฆฌํ…Œ์ผ ํ๋ ˆ์ด์…˜ 4(ํ†ตํ•ฉ๋ณธ)
ย 
Trion final business proposal yu kim
Trion final business proposal yu kimTrion final business proposal yu kim
Trion final business proposal yu kim
ย 

IBM Identity Governance & Intelligence

  • 1. IBM Identity and Access Management PoV 2016 ๋ฐ•ํ˜•๊ทผ ์‹ค์žฅ
  • 2. ์ œํ’ˆ ๊ธฐ๋Šฅ ์ผ๋ฐ˜ IBM IDENTITY AND ACCESS MANAGEMENT POV 2016
  • 3. 3 IBM Security IM ์ด์ค‘ํ™” ๊ตฌ์„ฑ - ๊ณ„์ •๊ด€๋ฆฌ์‹œ์Šคํ…œ์€ ๋‘ ๋Œ€์˜ ์„œ๋ฒ„์— Active-Active ๋กœ ์šด์˜ํ•ฉ๋‹ˆ๋‹ค. Active ์„œ๋ฒ„ ๋‹ค์šด ์‹œ ์ž๋™์ ์œผ๋กœ ๋‹ค๋ฅธ Active ์‹œ์Šคํ…œ์ด Take-over ํ•˜๋„๋ก ๊ตฌ์„ฑํ•ฉ๋‹ˆ๋‹ค. - ๋‘ ๋Œ€ ์ด์ƒ์˜ ์„œ๋ฒ„์— L4์Šค์œ„์น˜๋ฅผ ํ†ตํ•œ clustering ํ˜•ํƒœ๋กœ ๊ตฌ์„ฑํ•˜์—ฌ, ํ‰์†Œ์— load-balancing ์œผ๋กœ ๋ถ€ํ•˜ ๋ถ„์‚ฐํ•˜๋„๋ก ์šด์˜ํ•˜๋ฉฐ, ์„œ๋ฒ„ ๋‹ค์šด ์‹œ ๋‚˜๋จธ์ง€ ์„œ๋ฒ„๊ฐ€ ์‹ค์‹œ๊ฐ„ take-over๋ฅผ ํ•˜๋„๋ก ๊ตฌ์„ฑํ•˜์—ฌ ์ง€์†์ ์ธ ์„œ๋น„์Šค๋ฅผ ์ˆ˜ํ–‰ํ•˜๋„๋ก ๊ตฌ์„ฑํ•ฉ๋‹ˆ๋‹ค. ๊ณ„์ •๊ด€๋ฆฌ ์‹œ์Šคํ…œ ISIM 1 LDAP(Master) O/S L4 Switch L4 Switch Load-Balancing ์ž๋™ Fail-over ์‚ฌ์šฉ์ž ์‚ฌ์šฉ์ž ๊ณ„์ •๊ด€๋ฆฌ ์‹œ์Šคํ…œ ISIM 2 LDAP(Master) O/S ๊ณ„์ •๊ด€๋ฆฌ ์‹œ์Šคํ…œ ISIM 1 LDAP(Master) O/S ๊ณ„์ •๊ด€๋ฆฌ ์‹œ์Šคํ…œ ISIM 2 LDAP(Master) O/S ์žฅ์•  ์‹œ์Šคํ…œ ์žฅ์•  ์‹œ, ์ž๋™ Fail-over๋ฅผ ์ˆ˜ํ–‰ํ•˜๋„๋ก ์‹œ์Šคํ…œ ์•„ํ‚คํ…์ฒ˜๋ฅผ ๋””์ž์ธํ•˜์˜€์Šต๋‹ˆ๋‹ค. IM์„ ๊ตฌ์„ฑํ•˜๋Š” WAS, LDAP, DB๋„ ์ž์ฒด์ ์ธ ์ด์ค‘ํ™”๋ฅผ ๊ตฌ์„ฑํ•˜๊ณ  ์žˆ์–ด, ์–ด๋Š ํ•œ์ชฝ์˜ ์žฅ์• ๊ฐ€ ๋ฐœ์ƒํ•˜์—ฌ๋„ ๋™์ž‘์—๋Š” ๋ฌธ์ œ๊ฐ€ ์—†์Šต๋‹ˆ๋‹ค. 1. ์†”๋ฃจ์…˜ ์†Œ๊ฐœ ๋ฐ ๊ตฌ์กฐ
  • 4. 4 IBM Security ISIM์€ ID/ํŒจ์Šค์›Œ๋“œ ์ •์ฑ… ํ†ตํ•ฉ๊ด€๋ฆฌ, ์›Œํฌํ”Œ๋กœ์šฐ, ํ”„๋กœ๋น„์ €๋‹, ์…€ํ”„์„œ๋น„์Šค, ๊ฐ์‚ฌ ๋ฐ ๋ณด๊ณ  ๋“ฑ์˜ ๊ธฐ๋Šฅ์„ ๊ฐ–์ถ”๊ณ  ์žˆ์œผ๋ฉฐ, Web๊ธฐ๋ฐ˜์˜ Admin Console ๋กœ ๊ด€๋ฆฌ์ž๊ฐ€ ์•„๋ž˜ ์ฃผ์š” ๊ธฐ๋Šฅ์— ๋Œ€ํ•œ ๊ด€๋ฆฌ๋ฅผ ํ•˜๊ณ , ์‚ฌ์šฉ์ž๋Š” ๋ณ„๋„ ์ œ๊ณต๋˜๋Š” Self Console์„ ์ด์šฉํ•˜์—ฌ ๋น„๋ฐ€๋ฒˆํ˜ธ ๋ณ€๊ฒฝ ๋“ฑ ์ž์‹ ์˜ ๊ณ„์ •๊ด€๋ จ ์ •๋ณด๋ฅผ ๊ด€๋ฆฌํ•ฉ๋‹ˆ๋‹ค. ISIM ์ฃผ์š”๊ธฐ๋Šฅ ์ฃผ์š” ๊ด€๋ฆฌ ๊ธฐ๋Šฅ ๊ธฐ๋Šฅ ์„ค๋ช… ๋น„๋ฐ€๋ฒˆํ˜ธ ๋ณ€๊ฒฝ ์„ ํƒํ•œ ์‚ฌ์šฉ์ž์˜ ๋น„๋ฐ€๋ฒˆํ˜ธ๋ฅผ ๊ด€๋ฆฌ์ž๊ฐ€ ์„ค์ •ํ•˜๊ฑฐ๋‚˜ ์‹œ์Šคํ…œ์—์„œ ์ƒ์„ฑํ•œ ๋น„๋ฐ€๋ฒˆํ˜ธ๋กœ ๋ณ€๊ฒฝํ•ฉ๋‹ˆ๋‹ค. ์—ญํ•  ๊ด€๋ฆฌ ์—ญํ• (Role)์„ ์ถ”๊ฐ€, ๋ณ€๊ฒฝ, ์‚ญ์ œํ•˜๊ณ  ์—ญํ•  ๋ฉค๋ฒ„์‹ญ์„ ๊ด€๋ฆฌํ•˜๊ฑฐ๋‚˜ ์—ญํ•  ๊ณ„์ธต ๊ตฌ์กฐ๋ฅผ ๊ด€๋ฆฌํ•ฉ๋‹ˆ๋‹ค. ์กฐ์ง ๊ตฌ์กฐ ๊ด€๋ฆฌ ์กฐ์ง์ •๋ณด๋ฅผ ํŠธ๋ฆฌ ํ˜•ํƒœ๋กœ ๊ด€๋ฆฌํ•˜๋ฉฐ ์กฐ์ง, ์œ„์น˜ ๋ฐ ๊ธฐํƒ€ ๊ตฌ์„ฑ์š”์†Œ๋ฅผ ์ž‘์„ฑ, ๋ณ€๊ฒฝ ๋˜๋Š” ์‚ญ์ œํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์‚ฌ์šฉ์ž ๊ด€๋ฆฌ ๊ด€๋ฆฌ ๋Œ€์ƒ ์‚ฌ์šฉ์ž ๋ชฉ๋ก์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ์‚ฌ์šฉ์ž์˜ ์ •๋ณด ์ˆ˜์ • ๋ฐ ์—ฐ๊ณ„๋œ ๊ณ„์ •์„ ๊ฒ€์ƒ‰/๊ด€๋ฆฌ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์„œ๋น„์Šค ๊ด€๋ฆฌ ๊ด€๋ฆฌ ๋Œ€์ƒ ์„œ๋น„์Šค ๋ชฉ๋ก์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ์„œ๋น„์Šค์˜ ์ˆ˜์ • ๋ฐ ์—ฐ๋™์ƒํƒœ ํ™•์ธ๊ณผ ์„œ๋น„์Šค์— ์—ฐ๊ณ„๋œ ๊ณ„์ •์„ ๊ฒ€์ƒ‰/๊ด€๋ฆฌ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. Orphan ๊ณ„์ • ๊ด€๋ฆฌ ์†Œ์œ ์ž๊ฐ€ ์—†๋Š” ๊ณ ์•„๊ณ„์ • ๋ชฉ๋ก์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ๊ฐ ์„œ๋น„์Šค ๋ณ„๋กœ ๊ณ ์•„๊ณ„์ •์„ ๊ฒ€์ƒ‰ํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ ๊ณ ์•„๊ณ„์ • ๊ด€๋ฆฌ๋ฅผ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๊ทธ๋ฃน๊ด€๋ฆฌ ๊ฐ ์„œ๋น„์Šค์—์„œ ๊ด€๋ฆฌ๋˜๋Š” ๊ทธ๋ฃน์˜ ๋ชฉ๋ก์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ์ฃผ๋กœ OS์˜ ๊ทธ๋ฃน์„ ๊ด€๋ฆฌํ•˜๋ฉฐ ๊ทธ๋ฃน์˜ ๊ฒ€์ƒ‰/๋ณ€๊ฒฝ/์ƒ์„ฑ/์‚ญ์ œ๋ฅผ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๊ณต์œ  ์•ก์„ธ์Šค ๊ด€๋ฆฌ ๊ฐ ์„œ๋น„์Šค์˜ ๊ณต์œ ๊ณ„์ •์„ ๊ด€๋ฆฌํ•ฉ๋‹ˆ๋‹ค. ๊ณต์œ ๊ณ„์ • ์ •์ฑ…์— ๋”ฐ๋ผ ๋“ฑ๋ก๋œ ๊ณต์œ ๊ณ„์ •์„ ์‚ฌ์šฉ์ž์—๊ฒŒ ํ• ๋‹น/ํšŒ์ˆ˜ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ •์ฑ… ๊ด€๋ฆฌ ๊ณ„์ •๊ด€๋ฆฌ์—์„œ ์‚ฌ์šฉ์ž/๊ณ„์ •์„ ๊ด€๋ฆฌํ•˜๊ธฐ ์œ„ํ•œ Provisioning, Reconciliation, ID ์ƒ์„ฑ, ๋น„๋ฐ€๋ฒˆํ˜ธ, ์žฌ์ธ์ฆ ๋“ฑ์˜ ์ •์ฑ…์„ ๊ด€๋ฆฌํ•ฉ๋‹ˆ๋‹ค. ์›Œํฌํ”Œ๋กœ์šฐ ๊ด€๋ฆฌ ๊ณ„์ • ๋ฐ ๊ถŒํ•œ์— ๋Œ€ํ•œ ์ƒ์„ฑ/๋ณ€๊ฒฝ/์‚ญ์ œ/์ƒํƒœ ๋ณ€๊ฒฝ ์‹œ ์Šน์ธ ์ ˆ์ฐจ ๋ฐ ๋™์ž‘ ์ ˆ์ฐจ๋ฅผ ์ •์˜ํ•œ ์›Œํฌํ”Œ๋กœ์šฐ๋ฅผ ์ƒ์„ฑ/๋ณ€๊ฒฝ/์‚ญ์ œ ํ•ฉ๋‹ˆ๋‹ค. ์‹œ์Šคํ…œ ๋ณด์•ˆ ์„ค์ • ๊ณ„์ •๊ด€๋ฆฌ ์‹œ์Šคํ…œ ์ž์ฒด์˜ ๋ณด์•ˆ ์„ค์ • ๋ฐ ISIM ๋‚ด๋ถ€ ๊ทธ๋ฃน๋ณ„ ์ ‘๊ทผ ํ™”๋ฉด/๊ธฐ๋Šฅ์„ ์„ค์ • ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋ณด๊ณ ์„œ ์š”์ฒญ, ์‚ฌ์šฉ์ž ๋ฐ ๊ณ„์ •, ์„œ๋น„์Šค, ๊ฐ์‚ฌ ๋ฐ ๋ณด์•ˆ, ์‚ฌ์šฉ์ž ์ •์˜ ๋ณด๊ณ ์„œ๋ฅผ ์ œ๊ณตํ•˜๋ฉฐ ์‚ฌ์šฉ์ž๊ฐ€ ์‹ ๊ทœ ๋ณด๊ณ ์„œ๋ฅผ ์ƒ์„ฑ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์‹œ์Šคํ…œ ๊ตฌ์„ฑ ์‚ฌ์šฉ์ž/์„œ๋น„์Šค/๊ถŒํ•œ/์†Œ์œ ๊ถŒ Profile, ์ด๋ฉ”์ผ/ํ™”๋ฉด ์–‘์‹, ๊ธ€๋กœ๋ฒŒ ์ •์ฑ…, Life-Cycle Rule, ๊ธ€๋กœ๋ฒŒ ์ •์ฑ…์— ๋Œ€ํ•ด ์„ค์ • ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์š”์ฒญ ๋ณด๊ธฐ ์‚ฌ์šฉ์ž ๋˜๋Š” ์‹œ์Šคํ…œ์— ์˜ํ•ด ์š”์ฒญ๋œ Task์— ๋Œ€ํ•œ ํ˜„ํ™ฉ ๋ฐ ๊ฒฐ๊ณผ๋ฅผ ๋‹ค์–‘ํ•œ ๊ฒ€์ƒ‰ ์กฐ๊ฑด์— ์˜ํ•ด ํ™•์ธ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ํ™œ๋™ ๊ด€๋ฆฌ ์‚ฌ์šฉ์ž์˜ ์Šน์ธ ์š”์ฒญ ๋ชฉ๋ก, ์Šน์ธ ๊ถŒํ•œ ์œ„์ž„ ์„ค์ • ๋“ฑ ์‚ฌ์šฉ์ž์˜ ๊ฐœ์ž…์ด ํ•„์š”ํ•œ ํ™œ๋™ ๋ชฉ๋ก์„ ๋ณผ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. 1. ์†”๋ฃจ์…˜ ์†Œ๊ฐœ ๋ฐ ๊ตฌ์กฐ
  • 5. 5 IBM Security ISIM์€ Eclipse ๊ธฐ๋ฐ˜์˜ ๋…๋ฆฝ๋œ ISIM Adapter ๊ฐœ๋ฐœ๋„๊ตฌ์ธ ADT(Adapter Development Tool)์„ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค. ADT๋Š” ๊ฐœ๋ฐœ์ž PC์— ์„ค์น˜ํ•˜ ์—ฌ ์‚ฌ์šฉ์ด ๊ฐ€๋Šฅํ•˜๋ฏ€๋กœ ๊ฐœ๋ฐœ์ž๋Š” ์ต์ˆ™ํ•œ ํ™˜๊ฒฝ์—์„œ ๋‹ค์–‘ํ•œ ๋ ˆํผ๋Ÿฐ์Šค๋ฅผ ํ†ตํ•ด ์‹ ์†ํ•œ ๊ฐœ๋ฐœ์„ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. 2. ๊ธฐ๋ณธ ๊ธฐ๋Šฅ 2.3. Adapter Development Tool ์ง€์› Adapter Interface ์„ค์ • ๋‚ด์žฅ๋œ Javascript ์ด์šฉํ•œ ๊ฐœ๋ฐœ
  • 6. 6 IBM Security ISIM์€ ์ธ์‚ฌ ์ •๋ณด๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ์ •์ฑ… ๊ธฐ๋ฐ˜์˜ ์ „์‚ฌ ์ธํ”„๋ผ์— ๋Œ€ํ•œ ๊ณ„์ • ๊ด€๋ฆฌ๋ฅผ ์ˆ˜ํ–‰ํ•ฉ๋‹ˆ๋‹ค. 2.2 ์ธ์‚ฌ ์ •๋ณด ์—ฐ๋™ 2. ๊ธฐ๋ณธ ๊ธฐ๋Šฅ LDAP (์‚ฌ์šฉ์ž/๊ณ„์ • ์ •๋ณด) ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ… Security Identity Manager ISIM Adapter ์‚ฌ์šฉ์ž ์—ฐ๋™ ๋™๊ธฐํ™” ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ณ„์ • ๊ณ„์ •/๊ถŒํ•œ DB OS ๊ณ„์ • OS DB ๊ณ„์ • DB ์‚ฌ์šฉ์ž ๊ณ„์ •์‹ ์ฒญ
  • 7. 7 IBM Security ISIM์€ ๊ณ„์ •๊ด€๋ฆฌ๋ฅผ ์œ„ํ•œ ๊ด€๋ฆฌ์ž ์ฝ˜์†”๊ณผ ์‚ฌ์šฉ์ž๋ฅผ ์œ„ํ•œ ์…€ํ”„์„œ๋น„์Šค๋ฅผ ๊ธฐ๋ณธ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ๋˜ํ•œ, Customizing ๋œ ๊ณ„์ •๊ด€๋ฆฌํฌํƒˆ ๋ณ„๋„ ์ œ๊ณต์ด ๊ฐ€๋Šฅํ•ฉ ๋‹ˆ๋‹ค. ISIM์€ ๋Œ€์ƒ์‹œ์Šคํ…œ๊ณผ์˜ ๋™๊ธฐํ™” ๊ธฐ๋Šฅ์„ ํ†ตํ•ด ์‚ฌ์šฉ์ž-๊ณ„์ • ๊ฐ„ ์ •๋ณด ์ผ์น˜ ๋ฐ ์‹œ์Šคํ…œ์—์„œ ๋ถˆ๋ฒ•์œผ๋กœ ์ƒ์„ฑํ•œ ๊ณ„์ •์„ ๊ฒ€์ถœํ•˜์—ฌ ์ž๋™ ์กฐ์น˜ํ•ฉ๋‹ˆ ๋‹ค. ๊ฒฐ์žฌ์‹œ์Šคํ…œ๊ณผ ๊ฐ™์€ ์—…๋ฌด ์‹œ์Šคํ…œ ์—ฐ๊ณ„๋Š” ๊ณ„์ •๊ด€๋ฆฌ ํฌํƒˆ์—์„œ ์—…๋ฌด์‹œ์Šคํ…œ์ด ์ œ๊ณตํ•ด ์ฃผ๋Š” ์ธํ„ฐํŽ˜์ด์Šค๋กœ ์—ฐ๋™์„ ์ง„ํ–‰ํ•ฉ๋‹ˆ๋‹ค. 3.1 ๊ณ„์ • ์ƒ์„ฑ/์ˆ˜์ •/์ž ๊ธˆ/์‚ญ์ œ ๊ด€๋ฆฌ - ๊ณ„์ • ์ƒ์„ฑ/์ˆ˜์ •/์ž ๊ธˆ/์‚ญ์ œ ๊ด€๋ฆฌ์ž ๋ฐ ์‚ฌ์šฉ์ž ํฌํƒˆ ์ œ๊ณต 3. ๊ณ„์ • ๊ด€๋ฆฌ ๊ธฐ๋ณธ ๊ด€๋ฆฌ์ž ์ฝ˜์†” Customizing๋œ L์‚ฌ ๊ณ„์ •๊ด€๋ฆฌ ํฌํƒˆ ์˜ˆ๊ธฐ๋ณธ ์‚ฌ์šฉ์ž ์…€ํ”„์„œ๋น„์Šค 3.1 ๊ณ„์ • ์ƒ์„ฑ/์ˆ˜์ •/์ž ๊ธˆ/์‚ญ์ œ ๊ด€๋ฆฌ โ€“ ๋‚ด๋ถ€ ๊ฒฐ์ œ ์‹œ์Šคํ…œ๊ณผ์˜ ์—ฐ๋™ ์ œ๊ณต ๋‚ด๋ถ€ ๊ฒฐ์žฌ ์‹œ์Šคํ…œ ๊ณ„์ • ์ƒ์„ฑ/์ˆ˜์ •/์‚ญ์ œ ๊ฒฐ์žฌ ์š”์ฒญ ๊ฒฐ์žฌ ๊ฒฐ๊ณผ ์ œ๊ณต ๊ณ„์ •๊ด€๋ฆฌ ํฌํƒˆ โ€ข ๊ณ„์ •๊ด€๋ฆฌํฌํƒˆ์„ ํ†ตํ•ด ๊ณ„์ • ์ƒ์„ฑ/์ˆ˜์ •/์‚ญ์ œ ์š”์ฒญ ์ ‘์ˆ˜ โ€ข ๋‚ด๋ถ€ ๊ฒฐ์žฌ ์‹œ์Šคํ…œ์œผ๋กœ ๊ณ„์ •๊ด€๋ฆฌํฌํƒˆ์—์„œ ๊ฒฐ์žฌ ์š”์ฒญ - ๊ฒฐ์žฌ์‹œ์Šคํ…œ์—์„œ ์ œ๊ณตํ•˜๋Š” ์ธํ„ฐํŽ˜์ด์Šค ์‚ฌ์šฉ โ€ข ๊ฒฐ์žฌ ์ง„ํ–‰์„ ์ง€์†์ ์œผ๋กœ ํ™•์ธ โ€ข ๊ฒฐ์žฌ๊ฐ€ ์™„๋ฃŒ๋œ ๊ฒฝ์šฐ ๊ณ„์ • ์ƒ์„ฑ/์ˆ˜์ •/์‚ญ์ œ ์‹คํ–‰
  • 8. 8 IBM Security ISIM์€ Java ๊ธฐ๋ฐ˜์˜ ๋‹ค์–‘ํ•œ API๋ฅผ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค. ISIM์€ API์— ๋Œ€ํ•œ ์ƒ์„ธ Document์™€ ์ƒ˜ํ”Œ ์ฝ”๋“œ๋ฅผ ์ œ๊ณตํ•จ์œผ๋กœ์จ ๊ฐœ๋ฐœ์ž๊ฐ€ ํ•ด๋‹น API ๋ฅผ ์ด์šฉํ•˜์—ฌ ์™ธ๋ถ€ ์‹œ์Šคํ…œ ์—ฐ๊ณ„, UI ์ปค์Šคํ„ฐ๋งˆ์ด์ง• ๋ฐ ํ™•์žฅ ๊ฐœ๋ฐœ์„ ์‰ฝ๊ฒŒ ํ•  ์ˆ˜ ์žˆ๋„๋ก ํ•ฉ๋‹ˆ๋‹ค. ์ง€์› API ์ข…๋ฅ˜ ๏‚ก ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜(๊ณ„์ • ์ƒ์„ฑ/๋ณ€๊ฒฝ/์‚ญ์ œ ๋“ฑ) ๏‚ก ๊ถŒํ•œ ๏‚ก ๋ฐ์ดํ„ฐ ์„œ๋น„์Šค ๏‚ก SDI Integration ๏‚ก Java Script ๏‚ก ๋ฉ”์ผ ๏‚ก ํŒจ์Šค์›Œ๋“œ ๏‚ก ์ •์ฑ… ๏‚ก Single Sign-on ๏‚ก ์›Œํฌํ”Œ๋กœ์šฐ ๏‚ก ์Šน์ธ ๋ฐ ๊ฒฐ๊ณผ try { // create platform context Hashtable env = new Hashtable(); env.put(InitialPlatformContext.CONTEXT_FACTORY, "com.ibm.iISIM.apps.impl.websphere.WebspherePlatformContextFactory"); env.put(PlatformContext.PLATFORM_URL, "iiop://localhost"); PlatformContext platform = new InitialPlatformContext(env); // create authentication handler PlatformCallbackHandler handler = new PlatformCallbackHandler("jdoe", "secret"); handler.setPlatformContext(platform); // attempt authentication LoginContext lc = new LoginContext("ISIM", handler); lc.login(); // create manager PersonManager mgr = new PersonManager(platform, lc.getSubject()); // find user Collection people = mgr.getPeople(null, โ€ฆโ€ฆโ€ฆโ€ฆ ์ƒ˜ํ”Œ API 3. ๊ณ„์ • ๊ด€๋ฆฌ 3.1. ๋‹ค์–‘ํ•œ API ์ง€์›
  • 9. 9 IBM Security 3. ๊ณ„์ • ๊ด€๋ฆฌ ISIM์€ ์‚ฌ์šฉ์ž ๋ณธ์ธ์ด ์ž์‹ ์˜ ์ •๋ณด๋ฅผ ๊ด€๋ฆฌํ•˜๊ณ  ๋น„๋ฐ€๋ฒˆํ˜ธ ๋ณ€๊ฒฝ ๋ฐ ๊ณ„์ •/๊ถŒํ•œ ์‹ ์ฒญ, ์‹ ์ฒญ๋‚ด์—ญ ๋ณด๊ธฐ, ์Šน์ธ ์š”์ฒญ ์ฒ˜๋ฆฌ ๋“ฑ๊ณผ ๊ฐ™์ด ๊ณ„์ • ๋ฐ ๊ถŒํ•œ์— ๋Œ€ํ•œ ๊ด€๋ฆฌ๋ฅผ ์Šค์Šค๋กœ ํ•  ์ˆ˜ ์žˆ๋„๋ก UI๋ฅผ ์ œ๊ณตํ•˜์—ฌ ์ „์‚ฌ์ ์ธ ๊ด€๋ฆฌ ๋ถ€๋‹ด์„ ๊ฐ์†Œ ์‹œํ‚ต๋‹ˆ๋‹ค. ์…€ํ”„ ์„œ๋น„์Šค ๊ธฐ๋Šฅ ์Šน์ธ ๋Œ€๊ธฐ ๋ชฉ๋ก ์Šน์ธ์— ๋Œ€ํ•œ ๊ด€๋ฆฌ ๊ณ„์ • ๋ฐ ๊ถŒํ•œ ๊ด€๋ฆฌ ์š”์ฒญ ๊ฒฐ๊ณผ ํ™•์ธ ๋น„๋ฐ€๋ฒˆํ˜ธ ๊ด€๋ฆฌ ๊ณต์œ  ๊ณ„์ • ์š”์ฒญ/ํ™•์ธ ์‚ฌ์šฉ์ž ํ”„๋กœํŒŒ์ผ ๊ด€๋ฆฌ
  • 10. 10 IBM Security ๊ณ„์ • ๋กœ๊ทธ์ธ์— ์‚ฌ์šฉ๋˜๋Š” ์•”ํ˜ธ ์ •์ฑ… ๊ด€๋ฆฌ ๊ธฐ๋Šฅ์„ ์ œ๊ณตํ•˜๋ฉฐ, ์•”ํ˜ธ ์ •์ฑ…์— ํฌํ•จ๋œ ๋ฌธ์ž ๊ตฌ์„ฑ, ๋ณ€๊ฒฝ ์ฃผ๊ธฐ, ์•”ํ˜ธ ์ด๋ ฅ๊ด€๋ฆฌ ์ •์ฑ… ๋ฐ˜์˜์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. ๊ธˆ์ง€์–ด ์‚ฌ์ „ ๊ตฌ์„ฑ์„ ํ†ตํ•ด ๋…ธ์ถœ๋˜๊ธฐ ์‰ฌ์šด ๋‹จ์–ด ๋“ฑ ์‚ฌ์šฉ ๊ธˆ์ง€ ๋ฌธ์ž๊ตฌ์„ฑ์„ ์„ค์ • ํ•˜์—ฌ ์•”ํ˜ธ ์ ์šฉ์„ ์ œํ•œํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์•”ํ˜ธ ์ •์ฑ… ๏‚ก์ตœ์†Œ ๊ธธ์ด ๏‚ก์ตœ๋Œ€ ๊ธธ์ด ๏‚ก์ตœ๋Œ€ ๋ฐ˜๋ณต ๋ถ„์ž ๏‚กํ•„์ˆ˜ ์ตœ์†Œ ๊ณ ์œ  ๋ฌธ์ž ๏‚กํ•„์ˆ˜ ์ตœ์†Œ ์˜๋ฌธ/์ˆซ์ž ๏‚ก์˜ฌ๋ฐ”๋ฅด์ง€ ์•Š์€ ๋ฌธ์ž ๏‚กํ•„์ˆ˜ ๋ฌธ์ž ๏‚ก๋ฌธ์ž ์ œํ•œ ๏‚ก์‹œ์ž‘ ๋ฌธ์ž ๏‚ก๋ฐ˜๋ณต ํžˆ์Šคํ† ๋ฆฌ ๊ธธ์ด ๏‚ก์ „ํ™˜๋œ ํžˆ์Šคํ† ๋ฆฌ ๊ธธ์ด ๏‚ก์‚ฌ์šฉ์ž ์ด๋ฆ„ ํ—ˆ์šฉ ์—ฌ๋ถ€ ๏‚ก์‚ฌ์šฉ์ž ์ด๋ฆ„ ๋Œ€์†Œ๋ฌธ์ž ๊ตฌ๋ถ„ ๏‚ก์‚ฌ์šฉ์ž ID ํ—ˆ์šฉ ์—ฌ๋ถ€ ๏‚ก์‚ฌ์šฉ์ž ID ๋Œ€์†Œ๋ฌธ์ž ๊ตฌ๋ถ„ ๏‚ก์‚ฌ์ „ ๊ธฐ๋ฐ˜ ํŒจ์Šค ์›Œ๋“œ ์‚ฌ์šฉ ๋ถˆ๊ฐ€ - ์„ค์ •๋œ ๋น„๋ฐ€๋ฒˆํ˜ธ๋Š” ๋Œ€์ƒ์‹œ์Šคํ…œ์—์„œ ์š”๊ตฌํ•˜๋Š” ์•”ํ˜ธํ™” ๋ฐฉ์‹์œผ๋กœ ์•”ํ˜ธํ™”๋˜์–ด ์ „๋‹ฌ - ๋น„๋ฐ€๋ฒˆํ˜ธ ๋ถ„์‹ค ์‹œ ์‚ฌ์šฉ์ž ์Šค์Šค๋กœ ๋น„๋ฐ€๋ฒˆํ˜ธ ์ดˆ๊ธฐํ™”๋ฅผ ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์› (์ดˆ๊ธฐํ™”๋œ ๋น„๋ฐ€๋ฒˆํ˜ธ๋Š” SMS, Email๋“ฑ์„ ํ†ตํ•ด ์ „์†ก) - ๊ด€๋ฆฌ์ž์— ์˜ํ•œ ์‚ฌ์šฉ์ž ๋น„๋ฐ€๋ฒˆํ˜ธ ๋ณ€๊ฒฝ ๊ธฐ๋Šฅ ์ง€์› 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 11. 11 IBM Security ์‚ฌ์šฉ์ž๋Š” ์ œ๊ณต๋˜๋Š” ์…€ํ”„์„œ๋น„์Šค๋ฅผ ์ด์šฉํ•˜์—ฌ ์‚ฌ์šฉ์ž๊ฐ€ ์ง์ ‘ ID๋ฅผ ์‹ ์ฒญํ•˜๊ณ , ์‚ญ์ œํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋˜ํ•œ, Password๋„ ์…€ํ”„์„œ๋น„์Šค๋ฅผ ํ†ตํ•ด ์ดˆ๊ธฐํ™”/๋ณ€๊ฒฝ์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. ์…€ํ”„์„œ๋น„์Šค ID/PW ๊ด€๋ฆฌ - ID๋Š” ID ์ •์ฑ…๊ด€๋ฆฌ์— ์˜ํ•ด ์ž๋™์œผ๋กœ ์ƒ์„ฑ๋ฉ๋‹ˆ๋‹ค. ์‚ฌ์šฉ์ž๋Š” ์„œ๋น„์Šค์— ๋Œ€ํ•œ ๊ณ„์ • ์‹ ์ฒญ๋งŒ์œผ๋กœ ID๋ฅผ ์ƒ์„ฑํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. - ๊ณ„์ • ์‹ ์ฒญ ์‹œ ๊ฐ ์„œ๋น„์Šค ๋ณ„๋กœ ํ•„์š”ํ•œ ๋ถ€๊ฐ€์ •๋ณด๋ฅผ ์„ค์ • ํ•  ์ˆ˜ ์žˆ๋„๋ก ํ™”๋ฉด ๊ตฌ์„ฑ์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. - Password๋Š” ๋น„๋ฐ€๋ฒˆํ˜ธ ์ •์ฑ…๊ด€๋ฆฌ์—์„œ ํ—ˆ์šฉ๋œ ํ˜•ํƒœ๋กœ ์ƒ์„ฑ ๊ฐ€๋Šฅํ•˜์—ฌ, ์ „์‚ฌ ๋น„๋ฐ€๋ฒˆํ˜ธ ๊ทœ์ • ์ค€์ˆ˜๋ฅผ ๊ฐ•์ œํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์…€ํ”„์„œ๋น„์Šค ์˜ˆ์ œ 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 12. 12 IBM Security 3. ๊ณ„์ • ๊ด€๋ฆฌ ์…€ํ”„์„œ๋น„์Šค๋ฅผ ํ†ตํ•ด ์‚ฌ์šฉ์ž๋Š” ์‚ฌ์šฉํ•˜๊ณ ์ž ํ•˜๋Š” ์‹œ์Šคํ…œ์— ๊ณ„์ •์„ ์‹ ์ฒญ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์‹ ์ฒญํ•œ ๊ณ„์ • ํ˜„ํ™ฉ์€ ์‹ ์ฒญ ๋ชฉ๋ก์„ ํ†ตํ•ด ํ™•์ธ์ด ๊ฐ€๋Šฅํ•˜๋ฉฐ ๊ณ„์ • ์‹ ์ฒญ ์Šน์ธ์ด ์™„๋ฃŒ๋˜์—ˆ์„ ๊ฒฝ์šฐ ์ ‘์† ์‹œ์Šคํ…œ ๋ชฉ๋ก์— ์ถ”๊ฐ€๋œ ์‹œ์Šคํ…œ์ด ๋‚˜ํƒ€๋‚˜๊ฒŒ ๋ฉ๋‹ˆ๋‹ค. ์‚ฌ์šฉ์ž ๊ณ„์ • ์‹ ์ฒญ ์‚ฌ์šฉ์ž ๊ณ„์ • ์‹ ์ฒญ ์…€ํ”„์„œ๋น„์Šค ์˜ˆ์ œ๋ชจ๋ฐ”์ผ ์…€ํ”„์„œ๋น„์Šค ์˜ˆ์ œ
  • 13. 13 IBM Security 3. ๊ณ„์ • ๊ด€๋ฆฌ ์‚ฌ์šฉ์ž๋Š” ์…€ํ”„์„œ๋น„์Šค๋ฅผ ํ†ตํ•ด ์ž์‹ ์˜ ๊ถŒํ•œ ํ˜„ํ™ฉ์— ๋Œ€ํ•ด ํ™•์ธ์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. ๋˜ํ•œ ๊ถŒํ•œ ์‹ ์ฒญ ์‹œ ์†Œ์œ ํ•œ ๊ถŒํ•œ์— ๋Œ€ํ•ด์„œ๋Š” ์žฌ ์‹ ์ฒญ์„ ํ•˜๋”๋ผ๋„ ์ž๋™์œผ๋กœ ๊ถŒํ•œ ์‹ ์ฒญ ํ•ญ๋ชฉ์—์„œ ์ œ์™ธ๋ฉ๋‹ˆ๋‹ค. ์…€ํ”„์„œ๋น„์Šค ์‚ฌ์šฉ์ž ๊ถŒํ•œ - ์‚ฌ์šฉ์ž๋Š” ์…€ํ”„์„œ๋น„์Šค๋ฅผ ํ†ตํ•ด ์ž์‹ ์ด ์†Œ์œ ํ•œ ๊ถŒํ•œ์— ๋Œ€ํ•œ ํ™•์ธ์„ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. - ์†Œ์œ ํ•œ ๊ถŒํ•œ์„ ์„ ํƒํ•˜์—ฌ ๊ถŒํ•œ์— ๋Œ€ํ•œ ๋ณ€๊ฒฝ/์‚ญ์ œ๋ฅผ ์š”์ฒญํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. - ๊ถŒํ•œ ์‹ ์ฒญ ์‹œ ๊ถŒํ•œ์„ ์ค‘๋ณต ์‹ ์ฒญํ•˜๋ฉด ์ž๋™ ์ œ์™ธํ•˜์—ฌ, ๊ถŒํ•œ์˜ ์ž˜๋ชป๋œ ์‹ ์ฒญ์„ ์‚ฌ์ „์— ๋ฐฉ์ง€ํ•ฉ๋‹ˆ๋‹ค. ์‚ฌ์šฉ์ž ๊ถŒํ•œํ™•์ธ ์…€ํ”„์„œ๋น„์Šค ์˜ˆ์ œ
  • 14. 14 IBM Security 3. ๊ณ„์ • ๊ด€๋ฆฌ 3.1 ๊ณ„์ • ์ƒ์„ฑ/์ˆ˜์ •/์ž ๊ธˆ/์‚ญ์ œ ๊ด€๋ฆฌ โ€“ ๊ณ„์ •๊ด€๋ฆฌ ์†”๋ฃจ์…˜๊ณผ ๊ด€๋ฆฌ๋Œ€์ƒ ์‹œ์Šคํ…œ ๊ฐ„ ์‚ฌ์šฉ์ž ๊ณ„์ • ๋™๊ธฐํ™” ์†Œ์œ ์ž๊ฐ€ ์—†๋Š” ๊ณ ์•„๊ณ„์ •(Orphan)์ž„์„ ํ†ตํ•ด ์‹œ์Šคํ…œ์—์„œ ์ง์ ‘ ์ƒ์„ฑ๋œ ์ž„์˜(๋ถˆ๋ฒ•)๊ณ„์ • ํ™•์ธ -> ์‚ญ์ œ ํ˜น์€ ์†Œ์œ ์ž ์ง€์ •์œผ๋กœ ๊ด€๋ฆฌ ISIM Server ๊ด€๋ฆฌ ๋Œ€์ƒ ์‹œ์Šคํ…œ ISDI 1 ์‹œ์Šคํ…œ์—์„œ ์ž„์˜(๋ถˆ๋ฒ•) ๊ณ„์ • ์ƒ์„ฑ ISIM Server ๊ณ„์ • ์ •๋ณด ์ˆ˜์ง‘ 2 ISIM์—์„œ ๋™๊ธฐํ™”(reconciliation) ์ˆ˜ํ–‰ 3 ์‹œ์Šคํ…œ์—์„œ ์ง์ ‘ ์ƒ์„ฑ๋œ ๊ณ„์ •์„ ํฌํ•จํ•œ ๊ณ„์ • ๋ฆฌ์ŠคํŠธ ์ œ๊ณต 4 5 ISIM ๋ณด๊ณ ์„œ๋ฅผ ํ†ตํ•œ ๋ฆฌํฌํŒ… (๊ฐ์‚ฌ ๋ณด๊ณ ์„œ๊ฐ€ ๊ธฐ๋ณธ์œผ๋กœ ์ œ๊ณต๋จ) 3.1 ๊ณ„์ • ์ƒ์„ฑ/์ˆ˜์ •/์ž ๊ธˆ/์‚ญ์ œ ๊ด€๋ฆฌ โ€“ ๊ณ„์ • ์šฉ๋„๋ณ„ ๋“ฑ๋ก ๋ฐ ๊ณ„์ • ๋งŒ๋ฃŒ์ผ ์ง€์ • ๊ณ„์ • ์œ ํ˜• ์„ค์ •(๊ณต์šฉ๊ณ„์ •์€ ์‹œ์Šคํ…œ์œผ๋กœ ์„ค์ •) ๊ณ„์ • ๋งŒ๋ฃŒ์ผ ์ง€์ • ๊ธฐ๋Šฅ
  • 15. 15 IBM Security 3. ๊ณ„์ • ๊ด€๋ฆฌ ISIM์€ ์—…๋ฌด ์‹œ์Šคํ…œ์„ ์—ฐ๊ณ„ํ•˜์—ฌ ๊ณ„์ •์„ ์—ฐ๋™ ํ•  ๋•Œ ๋‹ค์–‘ํ•œ ์ •์ฑ… ์„ค์ •์— ์˜ํ•ด ๊ณ„์ •์„ ๊ด€๋ฆฌ ํ•ฉ๋‹ˆ๋‹ค. ๊ณ„์ • ์ƒ์„ฑ ์‹œ Provisioning, ID ์ƒ ์„ฑ ์ •์ฑ…์ด, ๊ณ„์ • ๊ฒ€์ฆ ์‹œ Provisioning, ์†Œ์œ ์ž ๊ฒฐ์ •, ์žฌ์ธ์ฆ, Life Cycle ์ •์ฑ…์— ์˜ํ•ด ๊ณ„์ •์— ๋Œ€ํ•œ ๊ด€๋ฆฌ๊ฐ€ ์ด๋ฃจ์–ด ์ง‘๋‹ˆ๋‹ค. ์—…๋ฌด์‹œ์Šคํ…œ ์—ฐ๋™ ์ธ์‚ฌ ๋“ฑ๋ก/์ˆ˜์ •/์‚ญ์ œ LDAP (์‚ฌ์šฉ์ž/๊ณ„์ • ์ •๋ณด) Security Identity Manager HR Repository AD ๊ณ„์ • LDAPExchange ๊ณ„์ • LDAP๊ทธ๋ฃน์›จ์–ด ๊ณ„์ • DBํฌํƒˆ ๊ณ„์ • DB ๏ƒผ Provisioning ์ •์ฑ… - ๊ณ„์ • ์ƒ์„ฑ ๋Œ€์ƒ ์‹œ์Šคํ…œ ์ •์˜ - ๊ณ„์ • ์ƒ์„ฑ ์‚ฌ์šฉ์ž ์ •์˜ - ๊ณ„์ •์˜ ์†์„ฑ๊ฐ’ ์ƒ์„ฑ/๋ณ€๊ฒฝ - RBAC์— ์˜ํ•œ ๊ณ„์ •/๊ถŒํ•œ ์ž๋™ ์ƒ์„ฑ - ์‚ฌ์šฉ์ž ์‹ ์ฒญ์— ์˜ํ•œ ๊ณ„์ •/๊ถŒํ•œ ์ˆ˜๋™ ์ƒ์„ฑ ๏ƒผ ID ์ƒ์„ฑ ์ •์ฑ… - ๋Œ€์ƒ ์‹œ์Šคํ…œ ๋ณ„ ID ์ƒ์„ฑ ๊ทœ์น™ ์„ค์ • - ์‚ฌ์šฉ์ž ์œ ํ˜• ๋ณ„ ID ์ƒ์„ฑ ๊ทœ์น™ ์„ค์ • ๏ƒผ Provisioning ์ •์ฑ… - ๊ณ„์ • ์†์„ฑ๊ฐ’์˜ Provisioning ์ •์ฑ… ์ค€์ˆ˜์—ฌ๋ถ€ ๊ฒ€์ฆ - Provisioning ์ •์ฑ… ๋ฏธ์ค€์ˆ˜ ์‹œ ์ •์ฑ… ์ ์šฉ์—ฌ๋ถ€ ์„ค์ • ๏ƒผ ์†Œ์œ ์ž ๊ฒฐ์ • ์ •์ฑ… - ๊ณ„์ •์˜ Key ์ •๋ณด๋ฅผ ๊ธฐ์ค€์œผ๋กœ ์†Œ์œ ์ž ๊ฒฐ์ • - ์†Œ์œ ์ž ๊ฒฐ์ •์„ ์œ„ํ•œ Key ๋ถ„์„ ์ •์ฑ… ์„ค์ • ๏ƒผ ์žฌ์ธ์ฆ ์ •์ฑ… - ์ผ์ • ๊ธฐ๊ฐ„๋งˆ๋‹ค ์‚ฌ์šฉ๊ณ„์ •์˜ ์‹ค์‚ฌ์šฉ ์—ฌ๋ถ€ ๊ฒ€์ฆ - ๊ณ„์ • ์‚ฌ์šฉ์ž์˜ ๊ด€๋ฆฌ์ž์— ์˜ํ•œ ๊ณ„์ • ์œ ํšจ์„ฑ ํŒ๋‹จ ๏ƒผ Life Cycle ์ •์ฑ… - ์œ ํšจ ๊ธฐ๊ฐ„์ด ์ง€๋‚œ ๊ณ„์ •์— ๋Œ€ํ•œ ์ž ๊ธˆ - ์ผ์ • ๊ธฐ๊ฐ„ ๋กœ๊ทธ์ธ ํ•˜์ง€ ์•Š์€ ๊ณ„์ •์— ๋Œ€ํ•œ ์ž ๊ธˆ Policies
  • 16. 16 IBM Security ๋Œ€์ƒ ์‹œ์Šคํ…œ์œผ๋กœ ๊ณ„์ • ์ƒ์„ฑ ์‹œ ์ ์šฉ๋˜๋Š” ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ…์„ ์—ญํ• , ์กฐ์ง, ์‹œ์Šคํ…œ ์„ ํƒ ์ •์ฑ…, ์ ์šฉ ๋ฒ”์œ„, ์Šค์ผ€์ฅด ์ •์ฑ…์„ ์ ์šฉํ•˜์—ฌ ๋‹ค์–‘ํ•˜๊ฒŒ ์ง€์ •ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋˜ํ•œ, โ€˜๋ฏธ๋ฆฌ๋ณด๊ธฐโ€™ ๋ฐ โ€˜์ดˆ์•ˆ์œผ๋กœ ์ €์žฅโ€™ ๊ธฐ๋Šฅ์„ ์ด์šฉํ•˜์—ฌ ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ…์„ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ํ•˜์—ฌ ๊ฒฐ๊ณผ๋ฅผ ๋ฏธ๋ฆฌ ํ™•์ธํ•ฉ๋‹ˆ๋‹ค. ์กฐ๊ฑด ๋ณ„ ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ… ๊ตฌ์„ฑ ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ… ์ ์šฉ ์กฐ์ง ๋ฐ ๋ฒ”์œ„ ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ… ์ ์šฉ ์‚ฌ์šฉ์ž ์—ญํ™œ ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ… ์ ์šฉ ์„œ๋น„์Šค ๋Œ€์ƒ 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 17. 17 IBM Security HR์—์„œ ๋™๊ธฐํ™”๋œ ์ธ์‚ฌ์ •๋ณด๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ์‚ฌ์šฉ์ž์˜ ๊ณ„์ •์„ ์ƒ์„ฑํ•˜๊ฑฐ๋‚˜ ๋ณ€๊ฒฝ๋œ ์ •๋ณด๋ฅผ ์†Œ์œ ํ•˜๊ณ  ์žˆ๋Š” ๊ณ„์ •์— ๋ฐ˜์˜ํ•ฉ๋‹ˆ๋‹ค. ์ด๋•Œ ๊ฐ Provisioning ๋ณ„ ์ •์ฑ…์— ๋”ฐ๋ผ ๋ณ€๊ฒฝ๋˜๋Š” ์ •๋ณด๋ฅผ ๊ฐ€๊ณตํ•˜์—ฌ ๋Œ€์ƒ ์„œ๋น„์Šค์˜ ๊ณ„์ •์—์„œ ์ธ์‹ํ•  ์ˆ˜ ์žˆ๋„๋ก ์„ค์ •ํ•ฉ๋‹ˆ๋‹ค. ํ”„๋กœ๋น„์ €๋‹ ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ… ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ… ๋ณ„ ๋ฐ์ดํ„ฐ ๋ณ€๊ฒฝ ์„ค์ •* ๋‹ค์ˆ˜์˜ ์„œ๋น„์Šค๋ฅผ ํ•œ ๊ฐœ์˜ ์ •์ฑ…์œผ๋กœ ์„ค์ • ๊ฐ€๋Šฅ * ํ•œ ๊ฐœ์˜ ์„œ๋น„์Šค์— ๋Œ€ํ•ด ๋‹ค์ˆ˜์˜ ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ… ์„ค์ • ๊ฐ€๋Šฅ 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 18. 18 IBM Security ๋Œ€์ƒ ์‹œ์Šคํ…œ์œผ๋กœ ๊ณ„์ • ์ƒ์„ฑ ์‹œ ์ ์šฉ๋˜๋Š” ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ…์„ ์—ญํ• , ์กฐ์ง, ์‹œ์Šคํ…œ ์„ ํƒ ์ •์ฑ…, ์ ์šฉ ๋ฒ”์œ„, ์Šค์ผ€์ฅด ์ •์ฑ…์„ ์ ์šฉํ•˜์—ฌ ๋‹ค์–‘ํ•˜๊ฒŒ ์ง€์ •ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋˜ํ•œ, โ€˜๋ฏธ๋ฆฌ๋ณด๊ธฐโ€™ ๋ฐ โ€˜์ดˆ์•ˆ์œผ๋กœ ์ €์žฅโ€™ ๊ธฐ๋Šฅ์„ ์ด์šฉํ•˜์—ฌ ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ…์„ ์‹œ๋ฎฌ๋ ˆ์ด์…˜ํ•˜์—ฌ ๊ฒฐ๊ณผ๋ฅผ ๋ฏธ๋ฆฌ ํ™•์ธํ•ฉ๋‹ˆ๋‹ค. Provisioning ์ •์ฑ… ๋ฏธ๋ฆฌ ๋ณด๊ธฐ ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ… ๋ฏธ๋ฆฌ๋ณด๊ธฐ ํ”„๋กœ๋น„์ €๋‹ ์ •์ฑ… ์ดˆ์•ˆ ์ €์žฅ ํ”„๋กœ๋น„์ €๋‹ ์ ์šฉ ๋ฐฉ์‹ ๋ฐ ์Šค์ผ€์ค„ - ๋ฐฐํฌ ์ •์ฑ…์„ ์‹ค์ œ๋กœ ์ ์šฉํ•˜๊ธฐ ์ „์— ๋‹ค์–‘ํ•œ ์ •์ฑ… ๊ตฌ์„ฑํ•˜๊ณ  ์‹œํ—˜ํ•˜๊ณ  ์‹œํ—˜ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ดˆ์•ˆ ์ €์žฅ๊ธฐ๋Šฅ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. - ๊ณ„์ • ๋ฐฐํฌ ์ „ ๋ฐฐํฌ ์ •์ฑ…(Provisioning)์— ๋”ฐ๋ฅธ ๋ฐฐํฌ๊ฒฐ๊ณผ๋ฅผ ๋ฏธ๋ฆฌ ์‹œํ—˜ํ•  ์ˆ˜ ์žˆ๋Š” ๊ธฐ๋Šฅ์ œ๊ณต์„ ํ†ตํ•ด ๊ถŒํ•œ ๋ฐฐํฌ์˜ ํœด๋จผ์—๋Ÿฌ ๋ฐฉ์ง€ 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 19. 19 IBM Security 3.2 ๊ณ„์ • ์‹ค ์†Œ์œ ์ฃผ ๊ด€๋ฆฌ 3. ๊ณ„์ • ๊ด€๋ฆฌ OS/DB์˜ ๊ณ„์ •์€ ์†Œ์œ ์ฃผ๋กœ ์ง€์ •๋œ ์‚ฌ์šฉ์ž์™€ ๋งตํ•‘๊ด€๊ณ„๋ฅผ ์œ ์ง€ํ•˜๋ฉฐ, ๊ณ„์ •์˜ ์ƒ์„ฑ ๋ฐ ๊ด€๋ฆฌ๋ฅผ ์œ„ํ•ด ์ •์˜๋œ ์ตœ์†Œํ•œ์˜ ํ•„์ˆ˜ ์ •๋ณด๋งŒ ์‚ฌ์šฉ์ž ์ •๋ณด์™€ ๋™๊ธฐํ™” ๋ฉ๋‹ˆ๋‹ค. ๊ฐ ์„œ๋ฒ„์˜ ๊ณ„์ • ๋ชฉ๋ก์„ ํ™•์ธํ•˜๋ฉด ์‹ค ์†Œ์œ ์ฃผ์— ๋Œ€ํ•œ ์ •๋ณดํ™•์ธ์ด ๊ฐ€๋Šฅํ•˜๋ฉฐ, ๊ณต์šฉ๊ณ„์ •์œผ๋กœ ๊ด€๋ฆฌ๋˜๋Š” ์‹œ์Šคํ…œ ๊ณ„์ •์˜ ๊ฒฝ์šฐ ์ •์ฑ…์— ์˜ํ•ด ํ•„์š” ์‚ฌ์šฉ์ž์—๊ฒŒ ํ• ๋‹น ๋ฐ ํšŒ์ˆ˜๊ฐ€ ์ง€์›๋˜๋ฉฐ, ํ˜„์žฌ ์‚ฌ์šฉํ•˜๊ณ  ์žˆ๋Š” ์‚ฌ์šฉ์ž๊ฐ€ ๋ˆ„๊ตฌ์ธ์ง€ ํ™•์ธ์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. ๊ณต์šฉ๊ณ„์ • ๊ด€๋ฆฌ ์ •์ฑ… ์„ค์ • ๊ณ„ ์ • ํ•  ๋‹น ๊ณต์šฉ๊ณ„์ • ์‚ฌ์šฉ์ž ํ• ๋‹น ํ˜„ํ™ฉ ๊ณ„์ • ์œ ํ˜• ๋ฐ ์†Œ์œ ์ž ๊ด€๋ฆฌ ๊ณต์šฉ๊ณ„์ • ์‚ฌ์šฉ์ž ํ™•์ธ
  • 20. 20 IBM Security ISIM์—์„œ ์ œ๊ณตํ•˜๋Š” ์กฐ์ •(Reconciliation) ์ž‘์—…์„ ํ†ตํ•ด์„œ ๊ณ ์ŠคํŠธ ๊ณ„์ • ๋ฐ ๊ณ ์•„ ๊ณ„์ •์„ ์ฐพ์•„๋‚ด๊ณ  ํ•ด๋‹น ๋ชฉ๋ก์„ ๊ด€๋ฆฌ์ž์—๊ฒŒ ํ†ต๋ณด ํ›„, ๊ด€๋ฆฌ์ž์˜ ์ž„์˜ ์กฐ์น˜ ๋˜๋Š” ์ •์˜๋œ ์ •์ฑ…์— ์˜ํ•œ ์ž๋™ ์กฐ์น˜๊ฐ€ ์ˆ˜ํ–‰๋˜๋„๋ก ํ•ฉ๋‹ˆ๋‹ค. Reconciliation ์ •์ฑ… - ์‹œ์Šคํ…œ์— ๋‚จ์•„์žˆ๋Š” ํœด๋ฉด๊ณ„์ •, ์ ์ ˆํ•œ ์Šน์ธ ์ ˆ์น˜๋ฅผ ๊ฑฐ์น˜์ง€ ์•Š๊ณ  ๋งŒ๋“ค์–ด์ง„ ๊ณ„์ • ๋˜๋Š” ์‹œ์Šคํ…œ์„ ์‚ฌ์šฉํ•  ์ด์œ ๊ฐ€ ์—†๋Š”๋ฐ๋„ ์ž˜๋ชป ์ƒ์„ฑ๋œ ๊ณ„ ์ • ๋“ฑ์„ ์ฐพ์•„ ์ ์ ˆํ•œ ์กฐ์น˜๋ฅผ ํ•จ์œผ๋กœ์จ ๋ณด์•ˆ์„ฑ์„ ํ–ฅ์ƒ์‹œํ‚ต๋‹ˆ๋‹ค. - ๋ถ€์—ฌ๋œ ๊ถŒํ•œ์— ์œ„๋ฐฐ๋˜์ง€ ์•Š๋Š” ๋ฒ”์œ„์—์„œ ์‹œ์Šคํ…œ์„ ์‚ฌ์šฉํ•˜๊ณ  ์žˆ๋Š”์ง€๋ฅผ ๊ฐ์‚ฌํ•˜๊ณ  ๋ณด๊ณ ํ•ฉ๋‹ˆ๋‹ค. - Reconciliation ์ž‘์—…์€ ์‚ฌ์šฉ์ž ์š”์ฒญ ์ฆ‰์‹œ ๋˜๋Š” ์Šค์ผ€์ค„์„ ์ •์˜ํ•˜์—ฌ ์ž‘์—…์ด ์ˆ˜ํ–‰๋ฉ๋‹ˆ๋‹ค. ์†Œ์œ ์ž๊ฐ€ ์—†๋Š” ๊ณ ์•„๊ณ„์ •(Orphan)์ž„์„ ํ†ตํ•ด ์‹œ์Šคํ…œ์—์„œ ์ง์ ‘ ์ƒ์„ฑ๋œ ๊ณ„์ •์ž„์„ ํ™•์ธ -> ์‚ญ์ œ ํ˜น์€ ์†Œ์œ ์ž ์ง€์ •์œผ๋กœ ๊ด€๋ฆฌ ์‹œ์ž‘ ISIM Server ๊ด€๋ฆฌ ๋Œ€์ƒ ์‹œ์Šคํ…œ ISIM Connector 1 ์‹œ์Šคํ…œ์—์„œ ์ง์ ‘ ๊ณ„์ • ์ƒ์„ฑ ISIM Server ๊ณ„์ • ์ •๋ณด ์ˆ˜์ง‘ ๋ฐ ์ „์†ก 2 ISIM์—์„œ โ€˜์กฐ์ •โ€™(reconciliation) ์ˆ˜ํ–‰ 3 4 ์‹œ์Šคํ…œ์—์„œ ์ง์ ‘ ์ƒ์„ฑ๋œ ๊ณ„์ •์„ ํฌํ•จํ•œ ๊ณ„์ • ๋ฆฌ์ŠคํŠธ ์ œ๊ณต 5 4 ISIM ๋ณด๊ณ ์„œ๋ฅผ ํ†ตํ•œ ๋ฆฌํฌํŒ… (๊ฐ์‚ฌ ๋ณด๊ณ ์„œ๊ฐ€ ๊ธฐ๋ณธ์œผ๋กœ ์ œ๊ณต๋จ) 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 21. 21 IBM Security ISIM์€ ๋ณ„๋„์˜ ๊ณ ์•„๊ณ„์ • ๊ด€๋ฆฌ ๋ฉ”๋‰ด๋ฅผ ํ†ตํ•ด, ํ˜„์žฌ ์‹๋ณ„๋˜์–ด ์žˆ๋Š” ๊ณ ์•„๊ณ„์ •์— ๋Œ€ํ•œ ์ฆ‰๊ฐ์ ์ธ ํ˜„ํ™ฉํŒŒ์•…์„ ์ œ๊ณตํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ๊ณ ์•„๊ณ„์ •์€ ์‚ฌ์šฉ์ž์—๊ฒŒ ์ˆ˜๋™์œผ๋กœ ์ง€์ •ํ•˜๊ฑฐ๋‚˜ ๊ณ„์ • ์ค‘์ง€ ๋˜๋Š” ์‚ญ์ œ๋ฅผ ํ†ตํ•ด ๊ณ ์•„๊ณ„์ •์— ๋Œ€ํ•œ ๊ด€๋ฆฌ๋ฅผ ์ˆ˜ํ–‰ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๊ณ ์•„๊ณ„์ • ๊ด€๋ฆฌ ์ •์ฑ… * ๊ณ ์•„๊ณ„์ •๊ด€๋ฆฌ ๋ฉ”๋‰ด ์ œ๊ณต * ๋ชจ๋“  ๊ณ ์•„๊ณ„์ •์„ ํ†ตํ•ฉ ๊ด€๋ฆฌ * ๊ณ ์•„๊ณ„์ •์˜ ๋ชฉ๋ก์—์„œ ๊ด€๋ฆฌ ๊ธฐ๋Šฅ ์ œ๊ณต * ๊ณ„์ •์˜ ์‚ฌ์šฉ์ž ์ง€์ •/์‚ญ์ œ/์ผ์‹œ์ค‘๋‹จ ๊ธฐ๋Šฅ ์ œ๊ณต * ๊ณ ์•„๊ณ„์ •์˜ ์ƒ์„ธ ๊ณ„์ • ๋‚ด์šฉ ํ™•์ธ * ๊ณ„์ •์— ๋Œ€ํ•œ ์ˆ˜์ •์€ ์‚ฌ์šฉ์ž ์ง€์ • ํ›„ ๊ฐ€๋Šฅ 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 22. 22 IBM Security ๊ณ„์ • ์ƒ์„ฑ ์‹œ ์ •์ฑ…์— ์˜ํ•ด ๊ณ„์ •์— ๋Œ€ํ•œ ์œ ํšจ๊ธฐ๊ฐ„ ํ˜น์€ ์žฌ์Šน์ธ ๊ธฐ๊ฐ„์„ ์„ค์ •ํ•˜์—ฌ, ๊ธฐ๊ฐ„์ด ๋งŒ๋ฃŒ๋˜๋ฉด ์žฌ์ธ์ฆ(Recertification) ์ •์ฑ…์„ ํ†ตํ•ด ๊ณ„์ • ์—ฐ์žฅ ํ”„๋กœ์„ธ์Šค๋ฅผ ์ง„ํ–‰ํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์‚ฌ์šฉ์ž์˜ ์‹ ์ฒญ์— ์˜ํ•œ ๊ณ„์ • ์—ฐ์žฅ ํ”„๋กœ์„ธ์Šค๋ฅผ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค. ๊ณ„์ • ์žฌ์ธ์ฆ ์ •์ฑ… * ๊ด€๋ฆฌ์ž์˜ ์Šน์ธ ์—…๋ฌด๋กœ ๋“ฑ๋ก * ๋ถ€์„œ์žฅ์„ ๊ธฐ๋ณธ ๊ด€๋ฆฌ์ž๋กœ ์„ค์ • ๊ณ„์ • ๊ด€๋ฆฌ์ž์— ์˜ํ•œ ๊ณ„์ • ์žฌ์ธ์ฆ ๊ณ„์ • ์žฌ์ธ์ฆ ์ •์ฑ… ์„ค์ • 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 23. 23 IBM Security ์ผ์ • ๊ธฐ๊ฐ„ ๋™์•ˆ SSO์˜ ์ ‘๊ทผ ์ด๋ ฅ์„ ๋ถ„์„ ํ•˜์—ฌ ํœด๋ฉด ๊ณ„์ •์„ ํƒ์ง€ํ•˜๊ณ , ํ•ด๋‹น ๊ณ„์ •์„ ๊ด€๋ฆฌ์ž๊ฐ€ ์ž„์˜ ์กฐ์น˜ ํ•˜๊ฑฐ๋‚˜ ์ •์˜๋œ ์ •์ฑ…์— ์˜ํ•ด ์ž๋™ ์กฐ์น˜๊ฐ€ ์ˆ˜ํ–‰๋˜๋„๋ก ๊ตฌ์ถ•ํ•ฉ๋‹ˆ๋‹ค. ํœด๋ฉด๊ณ„์ •์˜ ์ฐจ๋‹จ ๋ฐ ๊ด€๋ฆฌ Last Login ISAM ํœด๋ฉด๊ณ„์ • ์ฒ˜๋ฆฌ ์ •์ฑ… ISIM(๊ณ„์ •/๊ถŒํ•œ ์ค‘์•™ ๊ด€๋ฆฌ ์ธํ”„๋ผ) Active Directory ํฌํƒˆ ๊ณ„์ •/๊ถŒํ•œ/์ •์ฑ… LDAP RBAC ์ •์ฑ… ์ ์šฉ AD LOG DB ๊ทธ๋ฃน์›จ์–ด ๊ณ„์ • DB ๊ณ„์ • DB ์‹ ์ฒญ ๊ธฐ๋ฐ˜ ํœด๋ฉด ๊ณ„์ • ์ฐจ๋‹จ Windows Account OS Linux/Unix Account OS - SSO์˜ ๋งˆ์ง€๋ง‰ ๋กœ๊ทธ์ธ ๋‚ ์งœ๋ฅผ ๊ธฐ์ค€์œผ๋กœ ๊ด€๋ฆฌ์ž๊ฐ€ ์„ค์ •ํ•œ ์ผ์ž ์ด์ƒ ์ ‘์†์ด ์—†๋Š” ๊ฒฝ์šฐ ํœด๋ฉด๊ณ„์ •์œผ๋กœ ํŒ๋‹จ ํ•ฉ๋‹ˆ๋‹ค. - ํœด๋ฉด์ƒํƒœ๋กœ ํŒ๋‹จ๋œ ๊ณ„์ •์€ ์ฒ˜๋ฆฌ ์ •์ฑ…์— ๋”ฐ๋ผ ๊ณ„์ •์€ ์ž ๊ทธ๊ฑฐ๋‚˜ ์‚ญ์ œํ•˜์—ฌ, ๊ด€๋ฆฌ์ž์˜ ์Šน์ธ ์—†์ด๋Š” ์ ‘์†์„ ์ฐจ๋‹จํ•ฉ๋‹ˆ๋‹ค. 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 24. 24 IBM Security ISIM์€ OS์—์„œ ๊ฐ€์ง€๊ณ  ์žˆ๋Š” ๊ทธ๋ฃน์— ๋Œ€ํ•œ ๊ด€๋ฆฌ ๊ธฐ๋Šฅ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. Customizing ๋œ ๊ณ„์ •๊ด€๋ฆฌํฌํƒˆ์—์„œ OS์˜ ๊ทธ๋ฃน์— ๋Œ€ํ•ด ์ƒ์„ฑ/์ˆ˜์ •/์‚ญ์ œ๊ฐ€ ๊ฐ€ ๋Šฅํ•˜๋ฉฐ ๋‚ด๋ถ€ ๊ฒฐ์žฌ ์‹œ์Šคํ…œ๊ณผ ์—ฐ๋™ํ•˜์—ฌ ๊ฒฐ์žฌ๋ฅผ ์š”์ฒญ, ๊ฒฐ๊ณผ ํ™•์ธ ํ›„ ISIM API๋ฅผ ํ˜ธ์ถœํ•˜์—ฌ ๊ทธ๋ฃน์— ๋Œ€ํ•œ ์ƒ์„ฑ/์ˆ˜์ •/์‚ญ์ œ๋ฅผ ์ง„ํ–‰ํ•˜๊ณ  ๊ฒฐ๊ณผ๋ฅผ ํ™•์ธํ•ฉ ๋‹ˆ๋‹ค. 3.4 ๊ทธ๋ฃน ์ƒ์„ฑ/์ˆ˜์ •/์‚ญ์ œ ๊ด€๋ฆฌ 3. ๊ณ„์ • ๊ด€๋ฆฌ ๋‚ด๋ถ€ ๊ฒฐ์žฌ ์‹œ์Šคํ…œ 5. ๊ทธ๋ฃน ์ƒ์„ฑ/์ˆ˜์ •/์‚ญ์ œ API ํ˜ธ์ถœ 1์ฐจ ๊ฒฐ์žฌ์ž 2์ฐจ ๊ฒฐ์žฌ์ž ์ตœ์ข… ์Šน์ธ์ž 7. ์‹คํ–‰ ๊ฒฐ๊ณผ ํ†ต๋ณด ISIM 3. ๊ฒฐ์žฌ ์š”์ฒญ / ์Šน์ธ ์‹ ์ฒญ์ž 1. ๊ทธ๋ฃน ์ƒ์„ฑ/์ˆ˜์ •/์‚ญ์ œ ์‹ ์ฒญ ISIM API 2. ๊ฒฐ์žฌ ์š”์ฒญ 6. ๊ทธ๋ฃน ์ƒ์„ฑ/์ˆ˜์ •/์‚ญ์ œ ๊ณ„์ •๊ด€๋ฆฌํฌํƒˆ OS ๊ทธ๋ฃน ๊ด€๋ฆฌ ํ™”๋ฉด ๋Œ€์ƒ์‹œ์Šคํ…œ 4. ์Šน์ธ ํ™•์ธ
  • 25. 25 IBM Security ISIM์€ ๊ทธ๋ฃน๊ด€๋ฆฌ ๊ธฐ๋Šฅ์„ ํ†ตํ•ด ๊ฐ ๊ทธ๋ฃน์˜ ๋ฉค๋ฒ„์— ๋Œ€ํ•œ ์ถ”๊ฐ€/์‚ญ์ œ๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ๋ฉค๋ฒ„๋ฅผ ์ถ”๊ฐ€/์‚ญ์ œ๋ฅผ ํ•  ๋•Œ ์ฆ‰์‹œ ๋˜๋Š” ์‹œ๊ฐ„์„ ์ง€์ •ํ•˜์—ฌ ์ ์šฉ์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. 3.5 ๊ทธ๋ฃน ๋ฉค๋ฒ„ ๋ณ€๊ฒฝ ๊ด€๋ฆฌ 3. ๊ณ„์ • ๊ด€๋ฆฌ ๋ฉค๋ฒ„ ๊ด€๋ฆฌ ๋ฉ”๋‰ด ๋ฉค๋ฒ„ ํ˜„ํ™ฉ
  • 26. 26 IBM Security HR์—์„œ ์—ฐ๊ณ„๋œ ์‚ฌ์šฉ์ž์˜ ์ƒ์„ฑ/๋ณ€๊ฒฝ/์‚ญ์ œ ์ •๋ณด๋Š” ISIM์—์„œ ๊ด€๋ฆฌ๋˜๋Š” ์‚ฌ์šฉ์ž์˜ ์†Œ์œ ๊ณ„์ •์— ์˜ํ–ฅ์„ ์ค๋‹ˆ๋‹ค. ์‚ฌ์šฉ์ž์˜ ์ธ์‚ฌ์ •๋ณด ๋ณ€๊ฒฝ์œผ๋กœ ์ธํ•ด ์†Œ์œ ๊ณ„์ •์— ๋Œ€ํ•ด ์ •๋ณด/์ƒํƒœ ๋ณ€๊ฒฝ์ด ์ผ์–ด๋‚˜๊ฑฐ๋‚˜ ์‹ ๊ทœ ์‹œ์Šคํ…œ์— ๋Œ€ํ•œ ๊ณ„์ •์ƒ์„ฑ์ด ์ง„ํ–‰๋ฉ๋‹ˆ๋‹ค. 3.6 ์ธ์‚ฌ ๋ณ€๋™ ์‚ฌํ•ญ ๊ด€๋ฆฌ 3. ๊ณ„์ • ๊ด€๋ฆฌ ์ธ์‚ฌ ๋“ฑ๋ก/์ˆ˜์ •/์‚ญ์ œ LDAP (์‚ฌ์šฉ์ž/๊ณ„์ • ์ •๋ณด) ์‚ฌ์šฉ์ž/๊ณ„์ • ์ทจํ•ฉ ์ •์ฑ… Security Identity Manager ์ธ์‚ฌ์‹œ์Šคํ…œ Repository ๊ตฌ๋ถ„ ๊ฐ’ ์ด๋ฆ„ ํ™๊ธธ๋™ ์กฐ์ง ์˜์—…1ํŒ€ ์ง๊ธ‰ ๊ณผ์žฅ ์ง์ฑ… ํŒ€์žฅ โ€ฆ โ€ฆ ๊ณ„์ • ์ •๋ณด ์ธํ”„๋ผ ๊ณ„์ • ๊ตฌ์„ฑ ์ •๋ณด UNIX ID, ์ด๋ฆ„, ์กฐ์ง, โ€ฆ ์ ‘๊ทผ์ œ์–ด ID, ์ด๋ฆ„, ์กฐ์ง, ์ง๊ธ‰, ์ง์ฑ…, โ€ฆ DB ID, ์ด๋ฆ„, ์ง๊ธ‰, โ€ฆ LINUX ID, ์ด๋ฆ„, ์ง๊ธ‰, ์ง์ฑ…, โ€ฆ Attribute ๊ฐ’ ID kd.hong ์ด๋ฆ„ ํ™๊ธธ๋™ ์กฐ์ง Sales#1 ์ง๊ธ‰ GJ ์ง์ฑ… Team.Mng โ€ฆ โ€ฆ ๊ตฌ๋ถ„ ๊ฐ’ ID kd.hong ์ด๋ฆ„ ํ™๊ธธ๋™ ์ง๊ธ‰ POS5100 ์ง์ฑ… TSK3200 โ€ฆ โ€ฆ ์‚ฌ์šฉ์ž/๊ณ„์ • ์ •๋ณด(IM Repository) ์‚ฌ์šฉ์ž ์ธ์‚ฌ ์ •๋ณด(HR Repository) ์„œ๋ฒ„ ์ ‘๊ทผ์ œ์–ด ๊ณ„์ • DB OS Account OS DB Account DB
  • 27. 27 IBM Security ISIM์€ SDI๋ฅผ ์ด์šฉํ•˜์—ฌ ๋‹ค์–‘ํ•œ ์ข…๋ฅ˜์˜ ๋ณต์ˆ˜๊ฐœ์˜ HR๊ณผ ์—ฐ๊ณ„ํ•˜์—ฌ ์‚ฌ์šฉ์ž๋ฅผ ์ƒ์„ฑํ•ฉ๋‹ˆ๋‹ค. ๋˜ํ•œ, ์‚ฌ์šฉ์ž ์œ ํ˜•์„ ๋‹ค๋ฅด๊ฒŒ ์ƒ์„ฑํ•˜์—ฌ ๊ด€๋ฆฌ ์˜ ํŽธ์˜์„ฑ์„ ๋†’์ž…๋‹ˆ๋‹ค. ID ๋ณ€๊ฒฝ ์‹œ ID์˜ ๊ด€๋ฆฌ ์œ ํ˜•์— ๋”ฐ๋ผ ๋Œ€์ƒ ์‹œ์Šคํ…œ์œผ๋กœ ๊ณ„์ • ์ •๋ณด๋ฅผ ๊ฐฑ์‹  ๋˜๋Š” ์‹ ๊ทœ ๊ณ„์ •์„ ์ƒ์„ฑํ•ฉ๋‹ˆ๋‹ค. ์ธ์‚ฌ ๋™๊ธฐํ™” ๋ฐฉ์•ˆ 3. ๊ณ„์ • ๊ด€๋ฆฌ ID ๊ตฌ๋ถ„ HR IM System ๋น„๊ณ  Employee Number ์‚ฌ๋ฒˆ ๋ณ€๊ฒฝ ์‚ฌ์šฉ์ž ์ •๋ณด ๊ฐฑ์‹  ๊ณ„์ • ์ •๋ณด ๊ฐฑ์‹  ์‚ฌ๋ฒˆ์ด Key์ธ ์‹œ์Šคํ…œ์€ ๊ณ„์ •์ƒ์„ฑ Integrated ID ID ๋ณ€๊ฒฝ ์‚ฌ์šฉ์ž ์ƒ์„ฑ ๊ณ„์ • ์ƒ์„ฑ IM์—์„œ ์‹ ๊ทœ ์‚ฌ์šฉ์ž ์ƒ์„ฑ์œผ๋กœ ์ฒ˜๋ฆฌ Login ID - ID ๋ณ€๊ฒฝ ๊ณ„์ • ์ •๋ณด ๊ฐฑ์‹  Login ID๊ฐ€ Key์ธ ์‹œ์Šคํ…œ์€ ๊ณ„์ •์ƒ์„ฑ ๏ƒผ ID ๋ณ€๊ฒฝ ์‹œ ์ฒ˜๋ฆฌ ๋ฐฉ์‹ ๏ƒผ ๋‹ค์ค‘ HR ์—ฐ๊ณ„ ๋ฐ ๋„๊ธ‰์ง ๊ด€๋ฆฌ ์ธ์‚ฌ Repository ์žฌ๋ฌด Repository LDAP (์‚ฌ์šฉ์ž/๊ณ„์ • ์ •๋ณด) Security Identity Manager ๊ณ„์•ฝ์ง ์‚ฌ์šฉ์ž ์ƒ์„ฑ ์ง์› ์œ ํ˜•๋ณ„ Profile ๊ด€๋ฆฌ ์Šค์ผ€์ค„์— ์˜ํ•œ ์ž๋™ ๋™๊ธฐํ™”
  • 28. 28 IBM Security ๋‹ค์–‘ํ•œ ํ˜•ํƒœ์˜ HR Repository์™€์˜ ์—ฐ๋™์„ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•ด ISIM์€ ์ „๋ฌธ Meta Directory Solution์ธ SDI(Tivoli Directory Integrator)๋ฅผ ๋ฒˆ๋“ค๋กœ ์ œ๊ณตํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. SDI์˜ ๊ตฌ์„ฑ์„ ํ†ตํ•ด ๋‹จ์ผ ๋˜๋Š” ๋‹ค์ค‘์˜ HR ์‹œ์Šคํ…œ๊ณผ ์—ฐ๊ณ„ํ•˜์—ฌ ์‚ฌ์šฉ์ž ์ •๋ณด๋ฅผ ๋™๊ธฐํ™” ํ•ฉ๋‹ˆ๋‹ค. ๋‹ค์ค‘ HR ์‹œ์Šคํ…œ ์—ฐ๊ณ„ ์ง€์› ISIM LDAP ์‚ฌ์šฉ์ž ์ •๋ณด ๋ณ€๊ฒฝ (Trigger) ์‚ฌ์šฉ์ž Repository SDI connector ์‚ฌ์šฉ์ž ์ •๋ณด Update ๋ฐ์ดํ„ฐ์˜ ๋ฉ”ํƒ€๋ฅผ ๋งคํ•‘ํ•จ ๋กœ์ง ์ˆ˜ํ–‰์„ ์œ„ ํ•œ Script์ˆ˜ํ–‰ ๋ฐ์ดํ„ฐ ํ•„๋“œ ๋งคํ•‘ ํ›„์—๋Š” ๋ฐ์ดํ„ฐ ์—ฐ๋™ ์ž‘์—…์ด ์‹ค์‹œ๊ฐ„ ๋˜๋Š” ๋ฐฐ์น˜๋กœ ์ž๋™ ์ˆ˜ํ–‰๋จ ๊ตฌ๋ถ„ ์ง€์› Platform LDAP IBM Directory Server, MS Active Directory, iPlanet/Sun ONE, Novell NDS/edirectory ๊ธฐํƒ€ ํ‘œ์ค€ LDAP ์ง€์› Directory Server JDBC Oracle, SQL-Server, DB2, MySQL, Informix ๊ธฐํƒ€ JDBC Driver ์ง€์› DB Package Application SAP ABAP/ALE, Exchange, Domino Notes, IBM MQ, IBM Tivoli Identity Manager, IBM Tivoli Access Manager JAVA API JNDI, JMS, JMX, MemoryQueue, MemoryStream ์ง€์› OS zOS(Change Log), NT4 Domain ISAM registries, MailBox File System ํŒŒ์ผ ์‹œ์Šคํ…œ ํ˜•ํƒœ์˜ ํŒŒ์ผ (parser ์‚ฌ์šฉ), Log File HTTP HTTP Server/Client, URI Web Services Both publish and consume Web Services, DSMLv2/SOAP ๊ธฐํƒ€ TCP, SNMP, FTP, CLI, Script, ISIMer, SystemQueue ๋“ฑ 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 29. 29 IBM Security HR ์‹œ์Šคํ…œ์„ SDI๋ฅผ ํ†ตํ•ด ์—ฐ๊ณ„ ํ›„ ISIM์— Feed(HR ์—ฐ๋™ ์„œ๋น„์Šค)๋กœ ๋“ฑ๋กํ•˜์—ฌ ์ธ์‚ฌ์ •๋ณด๋ฅผ ๋™๊ธฐํ™” ํ•ฉ๋‹ˆ๋‹ค. ์—ฐ๊ณ„๋œ ์ธ์‚ฌ์ •๋ณด๋Š” ์ฃผ๊ธฐ์ ์œผ๋กœ ์ž๋™ ๋™๊ธฐํ™”๊ฐ€ ์ง„ํ–‰๋˜๋ฉฐ, ISIM์˜ ๋™๊ธฐํ™” ๋ชจ๋“ˆ์„ ํ†ตํ•ด ๋ณ€๊ฒฝ๋‚ด์šฉ์„ ์ถ”์ ํ•˜์—ฌ ๋ฐ˜์˜ํ•ฉ๋‹ˆ๋‹ค. ์ธ์‚ฌ ๋“ฑ๋ก/์ˆ˜์ •/์‚ญ์ œ LDAP (์‚ฌ์šฉ์ž/๊ณ„ ์ • ์ •๋ณด) ISIM Sync Engine Security Identity Manager ์ธ์‚ฌ๊ด€๋ฆฌ ์ •๋ณด์— ๋”ฐ๋ผ ISIM์˜ ์‚ฌ์šฉ์ž ์ •๋ณด๋ฅผ ์—ฌ๋Ÿฌ ๊ฐœ ์ •์˜ ๊ฐ€๋Šฅ HR Repository #1 ์‚ฌ์šฉ์ž ์ •๋ณด ๊ด€๋ฆฌ ์ธ์‚ฌ์ •๋ณด Mapping ์—ฐ๋™ Schedule ์„ค์ • ์‚ฌ์šฉ์ž ์ •๋ณด #1 ์‚ฌ์šฉ์ž๊ณ„์ •/ ๊ถŒํ•œ๊ด€๋ฆฌ ์‹œ์Šคํ…œ ์šด์˜์ž ์ธ์‚ฌ์ •๋ณด ์—ฐ๊ณ„ ๊ตฌ์„ฑ ํ•œ๊ตญ ์ธ์‚ฌ ๋‹ด๋‹น์ž ์ธ์‚ฌ ๋“ฑ๋ก/์ˆ˜์ •/์‚ญ์ œ HR Repository #2 ์ค‘๊ตญ ์ธ์‚ฌ ๋‹ด๋‹น์ž SDI ๋™๊ธฐํ™” ์‚ฌ์šฉ์ž ์ •๋ณด #2 ๋ณต์ˆ˜๊ฐœ์˜ HR ์‹œ์Šคํ…œ์— ๋Œ€ํ•ด ๊ฐ๊ฐ์˜ ์ •๋ณด ํ˜•ํƒœ์— ๋งž๋„๋ก ๊ตฌ์„ฑ ๊ฐ€๋Šฅ 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 30. 30 IBM Security HR์—์„œ์—ฐ๊ณ„๋œ์‚ฌ์šฉ์ž์˜์ƒ์„ฑ/๋ณ€๊ฒฝ/์‚ญ์ œ์ •๋ณด๋Š”ISIM์—์„œ๊ด€๋ฆฌ๋˜๋Š”์‚ฌ์šฉ์ž์˜์†Œ์œ ๊ณ„์ •์—์˜ํ–ฅ์„์ค๋‹ˆ๋‹ค. ์‚ฌ์šฉ์ž์˜์ธ์‚ฌ์ •๋ณด๋ณ€๊ฒฝ์œผ๋กœ์ธํ•ด์†Œ์œ ๊ณ„์ •์—๋Œ€ํ•ด์ •๋ณด/์ƒํƒœ๋ณ€๊ฒฝ์ด์ผ์–ด๋‚˜๊ฑฐ๋‚˜์‹ ๊ทœ ์‹œ์Šคํ…œ์—๋Œ€ํ•œ๊ณ„์ •์ƒ์„ฑ์ดFeed์™€๊ฐ™์ด์ง„ํ–‰๋ฉ๋‹ˆ๋‹ค. ์‚ฌ์šฉ์ž ์ •๋ณด ๋ฐ˜์˜ ์ธ์‚ฌ ๋“ฑ๋ก/์ˆ˜์ •/์‚ญ์ œ LDAP (์‚ฌ์šฉ์ž/๊ณ„์ • ์ •๋ณด) ISIM Sync Engine Security Identity Manager HR Repository AD Exchange ๊ณ„์ • LDAP ๊ทธ๋ฃน์›จ์–ด ๊ณ„์ • LDAP ๊ณ„์ • DB ํฌํƒˆ ๊ณ„์ • DB ๊ตฌ๋ถ„ ๊ฐ’ ์ด๋ฆ„ ํ™๊ธธ๋™ ์กฐ์ง ์˜์—…1ํŒ€ ์ง๊ธ‰ ๊ณผ์žฅ ์ง์ฑ… ํŒ€์žฅ โ€ฆ โ€ฆ ์‚ฌ์šฉ์ž/๊ณ„์ • ์ •๋ณด(IM Repository) ํฌํƒˆ ๊ณ„์ • ์ •๋ณด ์„œ๋น„์Šค ๊ณ„์ • ๊ตฌ์„ฑ ์ •๋ณด AD ID, ์ด๋ฆ„, ์กฐ์ง, โ€ฆ Exchange ID, ์ด๋ฆ„, ์กฐ์ง, ์ง๊ธ‰, ์ง์ฑ…, โ€ฆ ๊ทธ๋ฃน์›จ์–ด ID, ์ด๋ฆ„, ์ง๊ธ‰, โ€ฆ ํฌํƒˆ ID, ์ด๋ฆ„, ์ง๊ธ‰, ์ง์ฑ…, โ€ฆ Attribute ๊ฐ’ ID kd.hong ์ด๋ฆ„ ํ™๊ธธ๋™ ์กฐ์ง Sales#1 ์ง๊ธ‰ GJ ์ง์ฑ… Team. โ€ฆ โ€ฆ ๊ตฌ๋ถ„ ๊ฐ’ ID kd.hong ์ด๋ฆ„ ํ™๊ธธ๋™ ์ง๊ธ‰ POS5100 ์ง์ฑ… TSK3200 โ€ฆ โ€ฆ ์‚ฌ์šฉ์ž ์ธ์‚ฌ ์ •๋ณด(HR Repository) 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 31. 31 IBM Security ISIM์€ HR์—์„œ ์ œ๊ณต๋˜๋Š” ์กฐ์ง์ •๋ณด Table์„ ๋‚ด์žฅ๋œ SDI๋กœ ์ฃผ๊ธฐ์ ์œผ๋กœ ์—ฐ๋™ํ•˜์—ฌ AD ๋ฐ ์กฐ์ง์ •๋ณด๊ฐ€ ํ•„์š”ํ•œ ์‹œ์Šคํ…œ์˜ ํ˜•์‹์— ๋งž๋„๋ก ๋ณ€ํ™˜ํ•˜์—ฌ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ๋˜ํ•œ, ISIM์˜ ๋‚ด๋ถ€ ์กฐ์ง์ •๋ณด์™€ ์—ฐ๊ณ„๋˜์–ด HR์—์„œ ์ œ๊ณ ํ•˜๋Š” ์กฐ์ง์ •๋ณด๋ฅผ Treeํ˜•ํƒœ๋กœ ํ™•์ธํ•ฉ๋‹ˆ๋‹ค.์กฐ์ง์ •๋ณด ์—ฐ๋™ HR Repository Application Repository Security Directory Integrator Active Directory ISIM Database Table LDAP HR ์กฐ์ง์ •๋ณด 3. ๊ณ„์ • ๊ด€๋ฆฌ * ์กฐ์ง์ •๋ณด๋Š” ISIM์— ๋ฌด์ƒ์ œ๊ณต๋˜๋Š” SDI์—์„œ ISIM๊ณผ ๋ณ„๋„๋กœ ์ฒ˜๋ฆฌํ•จ * SDI๋Š” ์ž์ฒด ์Šค์ผ€์ค„๋ง ์—”์ง„์— ์˜ํ•ด ์ผ์ • ์ฃผ๊ธฐ๋กœ ์กฐ์ง์ •๋ณด๋ฅผ Provisioning ํ•จ
  • 32. 32 IBM Security ๋Œ€์ƒ ์‹œ์Šคํ…œ์œผ๋กœ ๊ณ„์ • ์ƒ์„ฑ ์‹œ ISIM์€ ID ์ •์ฑ… ์„ค์ •์„ ํ†ตํ•ด ๊ฐ ์‹œ์Šคํ…œ์—์„œ ์‚ฌ์šฉํ•˜๋Š” ID ํ˜•์‹์— ๋งž๋„๋ก ID๋ฅผ ์ƒ์„ฑ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ID ์ •์ฑ…์€ ์—ฌ๋Ÿฌ ๊ฐœ์˜ ์‹œ์Šคํ…œ์„ ํ•˜๋‚˜์˜ ์ •์ฑ…์œผ๋กœ ํ†ตํ•ฉํ•˜์—ฌ ๊ด€๋ฆฌํ•  ์ˆ˜๋„ ์žˆ์œผ๋ฉฐ, ๊ฐ๊ฐ์˜ ์‹œ์Šคํ…œ ๋ณ„๋กœ๋„ ์„ค์ •์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. ID ์ •์ฑ… ID ์ƒ์„ฑ ์ •์ฑ… ID ์ •์ฑ… ๋ณ„ ID ์ƒ์„ฑ ์Šคํฌ๋ฆฝํŠธ* ๋‹ค์ˆ˜์˜ ์„œ๋น„์Šค๋ฅผ ํ•œ ๊ฐœ์˜ ์ •์ฑ…์œผ๋กœ ์„ค์ • ๊ฐ€๋Šฅ * ์‹œ์Šคํ…œ์ด ์†Œ์†๋œ ์กฐ์ง ๋‹จ์œ„๋กœ ID ์ƒ์„ฑ ์ •์ฑ… ์„ค์ • ๊ฐ€๋Šฅ * ์ค‘๋ณต๊ณ„์ • ์กด์žฌ ์—ฌ๋ถ€ ํŒŒ์•… ๊ธฐ๋Šฅ ๊ธฐ๋ณธ ๋‚ด์žฅ * ์‚ฌ์šฉ์ž ์ •๋ณด๋ฅผ ์ด์šฉํ•œ ๊ทœ์น™์œผ๋กœ ๋‹จ์ˆœ ์ •์˜ ๊ฐ€๋Šฅ * ์Šคํฌ๋ฆฝํŠธ ์‚ฌ์šฉ์„ ํ†ตํ•œ ๋‹ค์–‘ํ•œ ์กฐ๊ฑด์— ๋งŒ์กฑํ•˜๋Š” ID ์ƒ์„ฑ ์ง€์› 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 33. 33 IBM Security Feed๋ฅผ ํ†ตํ•ด HR์—์„œ ์ธ์‚ฌ์ •๋ณด ๋™๊ธฐํ™”๋ฅผ ์š”์ฒญํ•˜๋ฉด ํ•ด๋‹น ์ด๋ ฅ์ด ๋™๊ธฐํ™” ์‹œ์ž‘๊ณผ ๋™์‹œ์— ISIM์— ์ €์žฅ๋ฉ๋‹ˆ๋‹ค. ์‚ฌ์šฉ์ž๋Š” ์š”์ฒญ๋‚ด์—ญ์„ ํ™•์ธํ•˜์—ฌ ๋™๊ธฐํ™”์˜ ์ง„ํ–‰/์™„๋ฃŒ ์—ฌ๋ถ€ ๋ฐ ์˜ค๋ฅ˜ ๋ฐœ์ƒ ์—ฌ๋ถ€๋ฅผ ์•Œ ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์ถ”ํ›„ ๋ณด๊ณ ์„œ๋กœ ๋‚ด์—ญํ™•์ธ๋„ ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. ์ธ์‚ฌ๋™๊ธฐํ™” ์ด๋ ฅ ๋ฐ ์˜ค๋ฅ˜ ๋ณด๊ณ  ์ธ์‚ฌ ๋™๊ธฐํ™” ์š”์ฒญ ๋ชฉ๋ก ๋™๊ธฐํ™” ์„ฑ๊ณต ๊ฒฐ๊ณผ ๋™๊ธฐํ™” ์˜ค๋ฅ˜ ๊ฒฐ๊ณผ ์ธ์‚ฌ ๋™๊ธฐํ™” ๊ด€๋ จ ๋ณด๊ณ ์„œ 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 34. 34 IBM Security 3. ๊ณ„์ • ๊ด€๋ฆฌ ISIM์€ ์‚ฌ์šฉ์ž ๋ฐ ๊ณ„์ •, ๊ถŒํ•œ์˜ ์ƒ์„ฑ/๋ณ€๊ฒฝ/์‚ญ์ œ ๋ฐ ๊ณ„์ •์˜ ์ž ๊ธˆ/ํ•ด์ œ, ์•”ํ˜ธ ๋ณ€๊ฒฝ, ์š”์ฒญ ์Šน์ธ, ์‚ฌ์šฉ์ž ํ†ต๋ณด์— ๊ฑฐ์ณ ๋‚ด๋ถ€์—์„œ ์ง„ํ–‰๋˜ ๋Š” ํ”„๋กœ์„ธ์Šค๋ฅผ ์›Œํฌํ”Œ๋กœ์šฐ๋กœ ์ •์˜ํ•˜์—ฌ ์—…๋ฌด ํ˜„ํ™ฉ์— ๋งž๋„๋ก ๊ตฌ์„ฑ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์›Œํฌํ”Œ๋กœ์šฐ ์Šน์ธ ์›Œํฌํ”Œ๋กœ์šฐ ์กฐ์ž‘ ์›Œํฌํ”Œ๋กœ์šฐ ๊ณ„์ • ์š”์ฒญ ๊ถŒํ•œ ์š”์ฒญ 1์ฐจ ์Šน์ธ 2์ฐจ ์Šน์ธ 3์ฐจ ์Šน์ธ ๊ณ„์ • ์ƒ์„ฑ ๊ถŒํ•œ ์ƒ์„ฑ ๊ณ„์ •/๊ถŒํ•œ ์š”์ฒญ/๋ณ€๊ฒฝ/์‚ญ์ œ ์ž ๊ธˆ/ํ•ด์ œ/ํ†ต๋ณด ๊ณ„์ • ์ž ๊ธˆ ๊ณ„์ • ํ•ด์ œ ๊ณ„์ • ๋ณ€๊ฒฝ ๊ณ„์ • ์‚ญ์ œ Account
  • 35. 35 IBM Security ISIM์€ ๊ณ„์ •/๊ถŒํ•œ ์ฒ˜๋ฆฌ ์ ˆ์ฐจ ๊ตฌ์„ฑ ๋ฐ ์š”์ฒญ์— ๋Œ€ํ•œ ๋‹ค๋‹จ๊ณ„ ๊ฒฐ์žฌ๋ฅผ ๊ตฌ์„ฑํ•˜๊ธฐ ์œ„ํ•ด ์›Œํฌํ”Œ๋กœ์šฐ ๊ธฐ๋Šฅ์„ ๋‚ด์žฅํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์›Œํฌํ”Œ๋กœ์šฐ๋Š” Java Applet ๊ธฐ๋ฐ˜์˜ ๋””์ž์ด๋„ˆ๋ฅผ ์ด์šฉํ•˜์—ฌ GUIํ˜•์‹์œผ๋กœ ๊ตฌ์„ฑ์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. ๊ณ„์ธต์  ์Šน์ธ ์ง€์› ๋ฐ SMS ํ†ต๋ณด - ์›Œํฌํ”Œ๋กœ์šฐ์—์„œ ์ œ๊ณต๋˜๋Š” Java Script๋ฅผ ์ด์šฉํ•˜์—ฌ ์ƒ์„ธํ•œ ๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ๊ฐ€ ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. - ์›Œํฌํ”Œ๋กœ์šฐ์—์„œ SMS๋‚˜ email์„ ์—ฐ๋™ํ•˜์—ฌ ๊ฒฐ์žฌ์˜ ์ง„ํ–‰์ƒํƒœ ๋ฐ ์™„๋ฃŒ์—ฌ๋ถ€์— ๋Œ€ํ•ด ์‹ ์ฒญ์ž์—๊ฒŒ ํ†ต๋ณด๋ฅผ ํ•ฉ๋‹ˆ๋‹ค. - ์š”์ฒญํ•œ ๊ฒฐ์žฌ์— ๋Œ€ํ•ด์„œ ์‹ ์ฒญ์ž๋Š” ์Šน์ธ ํ˜„ํ™ฉ์— ๋Œ€ํ•ด ํ™•์ธ์ด ๊ฐ€๋Šฅํ•˜๋ฉฐ, ์Šน์ธ์ž๋Š” ์ž์‹ ์˜ ๊ฒฐ์žฌ ์š”์ฒญ๊ฑด์— ๋Œ€ํ•ด ํ˜„ํ™ฉํŒŒ์•…์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. ์›Œํฌํ”Œ๋กœ์šฐ ๋””์ž์ด๋„ˆ 3๋‹จ๊ณ„ ๊ฒฐ์žฌ ์ƒ์„ฑ ์˜ˆ์ œ 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 36. 36 IBM Security ISIM์—์„œ ์ œ๊ณตํ•˜๋Š” GUI ๊ธฐ๋ฐ˜์˜ ์›Œํฌํ”Œ๋กœ์šฐ ํŽธ์ง‘๊ธฐ๋ฅผ ์ด์šฉํ•˜์—ฌ ์›Œํฌํ”Œ๋กœ์šฐ ํ”„๋กœ์„ธ์Šค์— ๋Œ€ํ•œ ์œ ์—ฐํ•œ ์ •์˜ ๋ฐ ์›Œํฌํ”Œ๋กœ์šฐ ๊ฐ ๋‹จ๊ณ„๋ณ„ ์„ค์ •์„ ํ†ตํ•ด ๋‹ค์–‘ํ•œ ๋น„์ฆˆ๋‹ˆ์Šค ๋กœ์ง์„ ๊ตฌํ˜„ํ•ฉ๋‹ˆ๋‹ค. ๊ฒฐ์žฌ ๊ด€๋ฆฌ ๊ธฐ๋Šฅ (๊ณ„์†) - Drag & Drop์„ ํ†ตํ•œ ์›Œํฌํ”Œ๋กœ์šฐ ์„ค๊ณ„, ๊ตฌํ˜„, ์‹ค์‹œ๊ฐ„ ๋ฐ˜์˜ - ์กฐ์ง๋ณ„, ์„œ๋ฒ„๋ณ„ ๋‹ค๋ฅธ ์›Œํฌํ”Œ๋กœ์šฐ ์ง€์› - ์›Œํฌํ”Œ๋กœ์šฐ Template ์ œ๊ณต - ์‚ฌ์šฉ์ž ๊ณ„์ •์„ ๊ด€๋ฆฌํ•˜๊ธฐ ์œ„ํ•œ ์ž‘์—… ํ”„๋กœ์„ธ์Šค๋ฅผ ์›Œํฌํ”Œ๋กœ์šฐ๋ฅผ ํ†ตํ•ด ์ž๋™ํ™”ํ•ฉ๋‹ˆ๋‹ค. - ์‚ฌ์šฉ์ž ๊ณ„์ • ์ƒ์„ฑ, ๋ณ€๊ฒฝ, ์Šน์ธ์— ๋Œ€ํ•œ ์š”์ฒญ, ์Šน์ธ, ๊ฑฐ๋ถ€, ์‹œ์Šคํ…œ ๋ฐ˜์˜ ๋“ฑ์˜ ์ž‘์—… ์ ˆ์ฐจ๋ฅผ ์›Œํฌํ”Œ๋กœ์šฐ ์•ˆ์— ์ •์˜ํ•ฉ๋‹ˆ๋‹ค. - ์›Œํฌํ”Œ๋กœ์šฐ ์•ˆ์˜ ๊ฐ ๋‹จ๊ณ„๋Š” ๋ฐ˜๋ณต ์„ค์ •์ด ๊ฐ€๋Šฅํ•˜๋ฉฐ Java Script ์ฝ”๋”ฉ์„ ํ†ตํ•ด ์ปค์Šคํ„ฐ๋งˆ์ด์ง• ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. - ์›Œํฌํ”Œ๋กœ์šฐ ์ •์˜๋Š” ๊ด€๋ฆฌ์ž๊ฐ€ ์‰ฝ๊ฒŒ ์ •์˜ํ•  ์ˆ˜ ์žˆ๋„๋ก GUI ๊ธฐ๋ฐ˜์˜ ์›Œํฌํ”Œ๋กœ์šฐ ๋””์ž์ธ ๋„๊ตฌ๋ฅผ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. - ์›Œํฌํ”Œ๋กœ์šฐ ์ •์˜๋Š” ์‹œ์Šคํ…œ ๋ณ„ ๋˜๋Š” Global ํ•˜๊ฒŒ ์ •์˜ ๊ฐ€๋Šฅ ํ•ฉ๋‹ˆ๋‹ค. Drag-and-Drop ์„ ํ†ต ํ•œ ์šฉ ์ด ํ•œ ์„ค์ • 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 37. 37 IBM Security ISIM์€ ์Šน์ธ ์›Œํฌํ”Œ๋กœ์šฐ ์„ค๊ณ„ ์‹œ ๋‹ค๋ฅธ ์‚ฌ๋žŒ์—๊ฒŒ ์Šน์ธ์„ ํ•  ์ˆ˜ ์žˆ๋„๋ก ๊ถŒํ•œ์„ ์œ„์ž„ ์ฃผ๋Š” escalation ๊ธฐ๋Šฅ์„ ์ ์šฉํ•  ์ˆ˜ ์žˆ์œผ๋ฏ€๋กœ, ์ด๋ฅผ ์ด์šฉํ•˜์—ฌ ์Šน์ธ์ž๊ฐ€ ์ผ์ • ๊ธฐ๊ฐ„ ๋™์•ˆ ์Šน์ธ์„ ์ง„ํ–‰ํ•˜์ง€ ์•Š์œผ๋ฉด ์ž๋™์œผ๋กœ ์ง€์ •๋œ escalation ์Šน์ธ์ž์—๊ฒŒ ์Šน์ธ์ด ์š”์ฒญ๋ฉ๋‹ˆ๋‹ค. ์Šน์ธ ๋‹ด๋‹น์ž ์ง€์ • ์Šน์ธ ๋‹ด๋‹น์ž ๋ถ€์žฌ ์‹œ ๊ถŒํ•œ ์œ„์ž„ ๋ฐ›์„ ๋‹ด๋‹น์ž ์ง€์ • ์Šน์ธ ๋‹ด๋‹น์ž๊ฐ€ ์Šน์ธ์„ ์•ˆ ํ•  ๊ฒฝ์šฐ์— ์œ„์ž„ ๋ฐ›์€ ๋‹ด๋‹น์ž์—๊ฒŒ ์–ผ๋งˆ ํ›„ ์š”์ฒญ์ด ๊ฐ€๋„๋ก ํ•  ๊ฒƒ ์ธ์ง€ ๊ธฐ๊ฐ„ ์ •์˜(escalation) ์Šน์ธ ๊ถŒํ•œ์˜ ์œ„์ž„ ๋ฐ ํšŒ์ˆ˜ 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 38. 38 IBM Security ISIM์€ ์Šน์ธ์ž๊ฐ€ ์ถœ์žฅ/ํœด๊ฐ€/์—…๋ฌด ๋“ฑ์˜ ์‚ฌ์œ ๋กœ ํŠน์ • ๊ธฐ๊ฐ„ ๋™์•ˆ ์Šน์ธํ™œ๋™์ด ๋ถˆ๊ฐ€๋Šฅ ํ•  ๊ฒฝ์šฐ ์Šน์ธ์ž๊ฐ€ ์œ„์ž„์ž์™€ ๊ธฐ๊ฐ„์„ ์„ค์ •ํ•˜์—ฌ ์Šน์ธํ™œ๋™์„ ์œ„์ž„ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์œ„์ž„ ์Šค์ผ€์ค„์€ ๋ณต์ˆ˜ ๊ฐœ๋ฅผ ์„ค์ • ํ•  ์ˆ˜ ์žˆ์œผ๋ฏ€๋กœ ๋‹ค์–‘ํ•œ ์œ„์ž„ ์„ค์ •์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. ์Šน์ธ ๊ถŒํ•œ์˜ ์œ„์ž„ ๋ฐ ํšŒ์ˆ˜ (๊ณ„์†) ์œ„์ž„ ๋‹ด๋‹น์ž ์ง€์ • ์œ„์ž„ ๊ธฐ๊ฐ„ ์„ค์ • ์„ค์ • ๋œ ์œ„์ž„ ์Šค์ผ€์ค„ 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 39. 39 IBM Security ๊ด€๋ฆฌ์ž๊ฐ€ ISIM ์ƒ์—์„œ ์—…๋ฌด(Rule)๋ฅผ ์ƒ์„ฑ, ์‚ญ์ œ, ๊ด€๋ฆฌํ•  ์ˆ˜ ์žˆ๋„๋ก ํ•˜๋ฉฐ, ์—…๋ฌด(Rule)์— ๋”ฐ๋ฅธ ์‹œ์Šคํ…œ ๊ถŒํ•œ(๋ฉ”๋‰ด ๋ฐ ๊ธฐ๋Šฅ)์„ ์กฐ์ž‘ํ•˜๊ฑฐ๋‚˜ ์ ์šฉ๋˜๋Š” ๊ตฌ์„ฑ์›์˜ ์กฐ๊ฑด์„ ๊ด€๋ฆฌํ•  ์ˆ˜ ์žˆ๋„๋ก ๊ตฌ์ถ•ํ•ฉ๋‹ˆ๋‹ค. ๊ถŒํ•œ Rule ์ž‘์„ฑ ๋ฐ ์ƒ์„ธํ™” ํ‘œ๊ธฐ ํ˜„์—… ๊ด€๋ฆฌ์ž Rule ๊ด€๋ฆฌ ํ™”๋ฉด Rule์— ๋งคํ•‘๋œ ๊ตฌ์„ฑ์› ๊ด€๋ฆฌ Rule-๊ถŒํ•œ ๋งคํ•‘ ๊ด€๋ฆฌ Rule์— ๋งคํ•‘๋œ ๊ถŒํ•œ ๋ฆฌ์ŠคํŠธ 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 40. 40 IBM Security ISIM์˜ ์‚ฌ์šฉ์ž ์ •๋ณด์—์„œ ์‚ฌ์šฉ์ž์—๊ฒŒ ๋ถ€์—ฌ๋œ ๊ถŒํ•œ ํ˜„ํ™ฉ์„ ํ™•์ธ ํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์…€ํ”„์„œ๋น„์Šค๋ฅผ ํ†ตํ•ด ๊ถŒํ•œ์„ ์‹ ์ฒญ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์‚ฌ์šฉ์ž ํ‡ด์‚ฌ/ํœด์ง/์ „๋ฐฐ ๋“ฑ์˜ ์ธ์‚ฌ ๋ณ€๊ฒฝ์‚ฌํ•ญ์ด ๋ฐœ์ƒํ•  ๊ฒฝ์šฐ ์ •์ฑ…์— ๋”ฐ๋ผ ๊ถŒํ•œ์„ ์‚ญ์ œํ•˜๊ฑฐ๋‚˜ ๋ณด์กดํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๊ฐœ์ธ๋ณ„ ๊ถŒํ•œ ๊ด€๋ฆฌ ์‚ฌ์šฉ์ž ์ •๋ณด์˜ ๊ถŒํ•œ ๋ถ€์—ฌ ํ˜„ํ™ฉ ์…€ํ”„์„œ๋น„์Šค๋ฅผ ํ†ตํ•œ ๊ถŒํ•œ ์š”์ฒญ 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 41. 41 IBM Security ์—ญํ•  ๊ธฐ๋ฐ˜ ๋™์  ๋ถ€์—ฌ(RBAC) ์ •์ฑ…์„ ํ†ตํ•ด ์ •์˜๋œ ์กฐ๊ฑด์— ๋งŒ์กฑํ•˜๋Š” ์‚ฌ์šฉ์ž์—๊ฒŒ ๋™์‹œ์— ๊ถŒํ•œ์— ๋Œ€ํ•œ ๋“ฑ๋ก์ด ๊ฐ€๋Šฅํ•˜๋ฉฐ, ์‚ฌ์šฉ์ž ๋ณธ์ธ์˜ ๊ถŒํ•œ ์‹ ์ฒญ ํ›„ ์Šน์ธ์— ๋”ฐ๋ฅธ ์ˆ˜๋™ ๊ถŒํ•œ ๋“ฑ๋ก๋„ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค. ๊ถŒํ•œ์˜ ๊ฐœ๋ณ„ ๋“ฑ๋ก ๋ฐ ์ผ๊ด„ ๋“ฑ๋ก ์กฐ๊ฑด ์ƒ์„ฑ์— ๋”ฐ๋ฅธ ์ž๋™ ๊ถŒํ•œ ๋“ฑ๋ก ์…€ํ”„์„œ๋น„์Šค๋ฅผ ํ†ตํ•œ ์ˆ˜๋™ ๊ถŒํ•œ ๋“ฑ๋ก 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 42. 42 IBM Security ISIM์€ ์—…๋ฌด๋ถ„๋ฆฌ์ •์ฑ…(Separation of Duties)์„ ๊ธฐ๋ณธ ์ง€์›ํ•˜๊ณ  ์žˆ์–ด, ํšŒ์‚ฌ๋‚ด์˜ ์—ฌ๋Ÿฌ ์—…๋ฌด ์ค‘ ์ƒํ˜ธ ๋ฐฐํƒ€์ ์œผ๋กœ ์„ค์ •๋˜์–ด์•ผ ํ•˜๋Š” ์—…๋ฌด(์˜ˆ : ๊ตฌ๋งค-๊ฒฐ์žฌ)์˜ ๊ถŒํ•œ์„ ๋“ฑ๋กํ•˜์—ฌ ์‚ฌ์šฉ์ž์—๊ฒŒ ๊ถŒํ•œ ๋ถ€์—ฌ ์‹œ ์—…๋ฌด๋ถ„๋ฆฌ์ •์ฑ…์— ์œ„๋ฐ˜๋˜๋Š” ๊ถŒํ•œ ๋ถ€์—ฌ๋ฅผ ์‚ฌ์ „์— ๋ฐฉ์ง€ํ•ฉ๋‹ˆ๋‹ค. SoD ์ •์ฑ… ๊ตฌ์„ฑ ์—…๋ฌด๋ถ„๋ฆฌ์ •์ฑ… ๋ชฉ๋ก ์—…๋ฌด๋ถ„๋ฆฌ์ •์ฑ… ์„ค์ • ๋ฐฐํƒ€๊ถŒํ•œ ์„ค์ • ๊ด€๋ฆฌ์ž์— ์˜ํ•œ ๋ฐฐํƒ€๊ถŒํ•œ ์Šน์ธ 3. ๊ณ„์ • ๊ด€๋ฆฌ
  • 43. 43 IBM Security 4.1 ์•”ํ˜ธ ์ •์ฑ… ๊ด€๋ฆฌ 4. ์•”ํ˜ธ ๊ด€๋ฆฌ ๊ณ„์ • ๋กœ๊ทธ์ธ์— ์‚ฌ์šฉ๋˜๋Š” ์•”ํ˜ธ ์ •์ฑ… ๊ด€๋ฆฌ ๊ธฐ๋Šฅ์„ ์ œ๊ณตํ•˜๋ฉฐ, ๊ณ ๊ฐ์‚ฌ์˜ ์•”ํ˜ธ ์ •์ฑ…์— ํฌํ•จ๋œ ๋ฌธ์ž ๊ตฌ์„ฑ, ๋ณ€๊ฒฝ ์ฃผ๊ธฐ, ์•”ํ˜ธ ์ด๋ ฅ๊ด€๋ฆฌ ์ •์ฑ… ๋ฐ˜์˜์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. ๊ธˆ์ง€์–ด ์‚ฌ์ „ ๊ตฌ์„ฑ์„ ํ†ตํ•ด ๋…ธ์ถœ๋˜๊ธฐ ์‰ฌ์šด ๋‹จ์–ด ๋“ฑ ์‚ฌ์šฉ ๊ธˆ์ง€ ๋ฌธ์ž๊ตฌ์„ฑ์„ ์„ค์ • ํ•˜์—ฌ ์•”ํ˜ธ ์ ์šฉ์„ ์ œํ•œํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๏‚ก ์ตœ์†Œ ๊ธธ์ด ๏‚ก ์ตœ๋Œ€ ๊ธธ์ด ๏‚ก ์ตœ๋Œ€ ๋ฐ˜๋ณต ๋ถ„์ž ๏‚ก ํ•„์ˆ˜ ์ตœ์†Œ ๊ณ ์œ  ๋ฌธ์ž ๏‚ก ํ•„์ˆ˜ ์ตœ์†Œ ์˜๋ฌธ/์ˆซ์ž ๏‚ก ์˜ฌ๋ฐ”๋ฅด์ง€ ์•Š์€ ๋ฌธ์ž ๏‚ก ํ•„์ˆ˜ ๋ฌธ์ž ๏‚ก ๋ฌธ์ž ์ œํ•œ ๏‚ก ์‹œ์ž‘ ๋ฌธ์ž ๏‚ก ๋ฐ˜๋ณต ํžˆ์Šคํ† ๋ฆฌ ๊ธธ์ด ๏‚ก ์ „ํ™˜๋œ ํžˆ์Šคํ† ๋ฆฌ ๊ธธ์ด ๏‚ก ์‚ฌ์šฉ์ž ์ด๋ฆ„ ํ—ˆ์šฉ ์—ฌ๋ถ€ ๏‚ก ์‚ฌ์šฉ์ž ์ด๋ฆ„ ๋Œ€์†Œ๋ฌธ์ž ๊ตฌ๋ถ„ ๏‚ก ์‚ฌ์šฉ์ž ID ํ—ˆ์šฉ ์—ฌ๋ถ€ ๏‚ก ์‚ฌ์šฉ์ž ID ๋Œ€์†Œ๋ฌธ์ž ๊ตฌ๋ถ„ ๏‚ก ์‚ฌ์ „ ๊ธฐ๋ฐ˜ ํŒจ์Šค ์›Œ๋“œ ์‚ฌ์šฉ ๋ถˆ๊ฐ€ - ๋น„๋ฐ€๋ฒˆํ˜ธ ๋ถ„์‹ค ์‹œ ์‚ฌ์šฉ์ž ์Šค์Šค๋กœ ๋น„๋ฐ€๋ฒˆํ˜ธ ์ดˆ๊ธฐํ™”๋ฅผ ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์› (์ดˆ๊ธฐํ™”๋œ ๋น„๋ฐ€๋ฒˆํ˜ธ๋Š” SMS, Email๋“ฑ์„ ํ†ตํ•ด ์ „์†ก) - ๊ด€๋ฆฌ์ž์— ์˜ํ•œ ์‚ฌ์šฉ์ž ๋น„๋ฐ€๋ฒˆํ˜ธ ๋ณ€๊ฒฝ ๊ธฐ๋Šฅ ์ง€์›
  • 44. 44 IBM Security 4.2 ์ผ๊ด„ ์ „์ฒด ์•”ํ˜ธ ๋ณ€๊ฒฝ 4. ์•”ํ˜ธ ๊ด€๋ฆฌ LDAP (์‚ฌ์šฉ์ž/๊ณ„์ • ์ •๋ณด) ์•”ํ˜ธ๊ด€๋ฆฌ ์ •์ฑ… Security Identity Manager ๊ณ„์ •๊ด€๋ฆฌํฌํƒˆ ๊ด€๋ฆฌ์ž Command Line Interface ์•”ํ˜ธ๋ณ€๊ฒฝ API ํ˜ธ์ถœ Random ๋˜๋Š” ์‚ฌ์ „์ง€์ • ํŒจ์Šค์›Œ๋“œ OS/DB ๊ณ„์ • ํŒจ์Šค์›Œ๋“œ ๋ณ€๊ฒฝ ํ†ต๋ณด ๋ฉ”์ผ - ์ž๋™ ๋ณ€๊ฒฝ ์˜ˆ์™ธ ๊ณ„์ •์€ ๊ณ„์ •์ •๋ณด์— ๋ณ„๋„์˜ ์‹๋ณ„ ๊ฐ’์„ ์„ค์ •ํ•˜์—ฌ ํŒจ์Šค์›Œ๋“œ ๋ณ€๊ฒฝ ์‹œ ์ž๋™์œผ๋กœ ์˜ˆ์™ธ ๋˜๋„๋ก ์•”ํ˜ธ๋ณ€๊ฒฝ ํ”„๋กœ์„ธ์Šค๋ฅผ ์„ค์ • - ์ž๋™ ๋ณ€๊ฒฝ ์˜ˆ์™ธ ๊ณ„์ •์€ ์‚ฌ์ „์— ์‹๋ณ„์ด ๋˜์–ด์•ผ ํ•จ ISIM์€ ๋Œ€๋Ÿ‰ ๊ณ„์ •์˜ ํŒจ์Šค์›Œ๋“œ ์ผ๊ด„ ๋ณ€๊ฒฝ์„ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•ด CLI ๋ช…๋ น์–ด๋ฅผ ํ†ตํ•œ ์•”ํ˜ธ ๋ณ€๊ฒฝ/API๋ฅผ ํ†ตํ•œ ์•”ํ˜ธ ๋ณ€๊ฒฝ์„ ์ง€์›ํ•ฉ๋‹ˆ๋‹ค. ๊ด€๋ฆฌ์ž๋Š” ์ด ๊ธฐ ๋Šฅ์„ ์ด์šฉํ•˜์—ฌ ๋Œ€๋Ÿ‰์˜ ๊ณ„์ •์„ ์„ ํƒํ•œ ํ›„ ๋ฏธ๋ฆฌ ์ •์˜๋˜์–ด ์žˆ๋Š” ๋˜๋Š” ์ž„์˜๋กœ ์ƒ์„ฑ๋˜๋Š” ํŒจ์Šค์›Œ๋“œ๋กœ ๋ณ€๊ฒฝ์„ ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ํŒจ์Šค์›Œ๋“œ๊ฐ€ ๋ณ€๊ฒฝ๋œ ์‚ฌ ์šฉ์ž ๋˜๋Š” ๊ณ„์ •์˜ ์†Œ์œ ์ž์—๊ฒŒ๋Š” ํŒจ์Šค์›Œ๋“œ ๋ณ€๊ฒฝ์— ๋Œ€ํ•œ ํ†ต์ง€ ๋ฉ”์ผ์ด ๋ฐœ์†ก๋ฉ๋‹ˆ๋‹ค. ์„œ๋ฒ„ ์ ‘๊ทผ์ œ์–ด ๊ณ„์ • DB OS Account OS DB Account DB
  • 45. 45 IBM Security 4.3 ์•”ํ˜ธ ์ฃผ๊ธฐ ๊ด€๋ฆฌ 4. ์•”ํ˜ธ ๊ด€๋ฆฌ ISIM์€ ๋ผ์ดํ”„์‚ฌ์ดํด ์ •์ฑ… ์‹คํ–‰์„ ํ†ตํ•ด ๊ณ„์ •์˜ ์•”ํ˜ธ ๋งŒ๋ฃŒ์ผ์„ ์‹๋ณ„ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ๊ธฐ๋Šฅ์„ ์ด์šฉํ•˜์—ฌ ์•”ํ˜ธ๊ฐ€ ๋งŒ๋ฃŒ๋œ ๊ณ„์ •์€ ์ •์˜๋œ ํ”„๋กœ์„ธ ์Šค์— ๋”ฐ๋ผ ๊ณ„์ • ์ž ๊ธˆ, ์†Œ์œ ์ž์—๊ฒŒ ์•”ํ˜ธ ๋งŒ๋ฃŒ ๋ฉ”์ผ ๋ฐœ์†ก ๋“ฑ์˜ ๊ธฐ๋Šฅ์„ ์ˆ˜ํ–‰ํ•˜๊ณ . ์•”ํ˜ธ ๋งŒ๋ฃŒ์ผ์ด ๋„๋ž˜ํ•œ ๊ณ„์ •์€ ์†Œ์œ ์ž์—๊ฒŒ ์•”ํ˜ธ ๋งŒ๋ฃŒ์˜ˆ์ • ๋ฉ”์ผ ๋ฐœ์†ก์„ ํ†ตํ•ด ๋งŒ๋ฃŒ์ผ ์ „ ์•”ํ˜ธ ๋ณ€๊ฒฝ์„ ์œ ๋„ํ•ฉ๋‹ˆ๋‹ค. LDAP (์‚ฌ์šฉ์ž/๊ณ„์ • ์ •๋ณด) ๋ผ์ดํ”„์‚ฌ์ดํด ์ •์ฑ… Security Identity Manager ์•”ํ˜ธ ๋งŒ๋ฃŒ์ผ ๋„๋ž˜ ์•”ํ˜ธ ๋งŒ๋ฃŒ ๋งŒ๋ฃŒ๋ฉ”์ผ ๋ฐœ์†ก ๊ณ„์ • ์ž ๊ธˆ ๋งŒ๋ฃŒ์˜ˆ์ • ๋ฉ”์ผ ๋ฐœ์†ก - ISIM์„ ํ†ตํ•ด ์•”ํ˜ธ๋ฅผ ๋ณ€๊ฒฝํ•œ ๊ฒฝ์šฐ์— ๋ณ€๊ฒฝ์ฃผ๊ธฐ ๋ฏธ์ค€์ˆ˜ ๊ณ„์ • ํŒ๋‹จ ๊ฐ€๋Šฅ - OS๋‚˜ DB์—์„œ ์•”ํ˜ธ๋ฅผ ์ง์ ‘ ๋ณ€๊ฒฝํ•œ ๊ฒฝ์šฐ์—๋„ ISIM์˜ ์•”ํ˜ธ ๋ณ€๊ฒฝ์ผ ๊ธฐ์ค€์œผ๋กœ ์•”ํ˜ธ๋ณ€๊ฒฝ ์ฃผ๊ธฐ ๊ด€๋ฆฌ - ์•”ํ˜ธ ๋งŒ๋ฃŒ์˜ˆ์ • ๋ฉ”์ผ์€ ๋งŒ๋ฃŒ์˜ˆ์ •์ผ ์ „ ์ •์˜๋œ ์ผ์ž ๋ณ„๋กœ ์—ฌ๋Ÿฌ ๋ฒˆ ๋ฐœ์†ก ๊ฐ€๋Šฅ (์˜ˆ : 5์ผ์ „, 3์ผ์ „, 1์ผ์ „ ๋“ฑ) - ๋งŒ๋ฃŒ์ผ ๊นŒ์ง€ ์•”ํ˜ธ๋ณ€๊ฒฝ์„ ํ•˜์ง€ ์•Š์€ ๊ฒฝ์šฐ ๊ณ„์ • ์ž ๊ธˆ, ์•”ํ˜ธ ์ดˆ๊ธฐํ™” ๋ฐ ์‚ฌ์šฉ์ž ์ง€์ • ํ”„๋กœ์„ธ์Šค ์ ์šฉ ๊ฐ€๋Šฅ ์•”ํ˜ธ ๋งŒ๋ฃŒ์ผ ์„ค์ • ํ™”๋ฉด
  • 46. 46 IBM Security ISIM์€ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋˜๋Š” ์Šคํฌ๋ฆฝํŠธ์— Hard Coding ๋˜์–ด ์žˆ๋Š” ID/PW๋กœ ์ธํ•ด ๋ฐœ์ƒํ•˜๋Š” ๊ณ„์ •๊ด€๋ฆฌ/๋ณด์•ˆ๊ด€๋ จ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด IBM Privileged Identity Manager(PIM) for Applications ํ™•์žฅ ๊ธฐ๋Šฅ์„ ์‚ฌ์šฉํ•˜์—ฌ, ์ผ๋ถ€ ์†Œ์Šค์ฝ”๋“œ ์ˆ˜์ •๋งŒ์œผ๋กœ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜๊ณผ ์Šคํฌ๋ฆฝํŠธ์— ์‹ ๋ขฐ์„ฑ์ด ๋ณด์žฅ ๋œ ID/PW๋ฅผ ๋™์ ์œผ๋กœ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. 4.6 ์•”ํ˜ธ ๊ด€๋ฆฌ API ์ œ๊ณต 4. ์•”ํ˜ธ ๊ด€๋ฆฌ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜, ์Šคํฌ๋ฆฝํŠธ ์•ˆ์— ํ•˜๋“œ์ฝ”๋”ฉ๋œ ํ˜น์€ ๊ตฌ์„ฑ ํŒŒ์ผ์ด๋‚˜ ์ €์žฅ์†Œ์— ์ €์žฅ๋œ ์‹ ๋ขฐ์ •๋ณด PIM์€ ์•ˆ์ „ํ•˜๊ฒŒ ์ €์žฅ๋œ ์‹ ๋ขฐ ์ •๋ณด๋ฅผ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜๊ณผ ์Šคํฌ๋ฆฝํŠธ๋Š” OAuth 2.0๊ณผ ์ธ์Šคํ„ด์Šค ์ง€๋ฌธ์„ ์‚ฌ์šฉํ•˜์—ฌ ์ธ์ฆ ๋ฌธ์ œ ์Šคํฌ๋ฆฝํŠธ // Example Java code that reads credentials from a properties file String username = prop.getProperty("user"); String password = prop.getProperty("pass"); connect(username, password); ํ•ด๊ฒฐ๋œ ์Šคํฌ๋ฆฝํŠธ //com.ibm.ispim.appid.client.api.Credential Credential ldapCred; try { ldapCred = appIdManager.getCredential("ldap.jke.org") } catch (ExecutionException e) { logger.error(e.getMessage()); } ... String username = ldapCred.getUserID(); String password = ldapCred.getPassword(); connect(username, password); PIM for App ์ ์šฉ ์˜ˆ
  • 47. 47 IBM Security 6. ๋ณด๊ณ ์„œ ISIM์€์‚ฌ์šฉ์ž๊ฐ€ ์›ํ•˜๋Š” Report์˜ ๊ฐ€๊ณต ๋ฐ ์ œ๊ณต์„ ์œ„ํ•ด ์ „์„ธ๊ณ„ 1์œ„ ์ œํ’ˆ์ธ Cognos Business Intelligence (Cognos BI)๋ฅผ ๋ฒˆ๋“ค๋กœ ์ œ๊ณตํ•˜๊ณ  ์žˆ์Šต๋‹ˆ ๋‹ค. ISIM์˜ ๋ฆฌํฌํŠธ ๊ด€๋ จ DB๋ฅผ Cognos BI์™€ ์—ฐ๋™ํ•˜์—ฌ ํ•„์š”ํ•œ ๋ฆฌํฌํŠธ๋ฅผ ์„ค๊ณ„ํ•˜๊ณ  ์ฃผ๊ธฐ์ ์œผ๋กœ ์ƒ์„ฑํ•˜๋ฉฐ ์–ธ์ œ๋“ ์ง€ ์กฐํšŒ๊ฐ€ ๊ฐ€๋Šฅํ•˜๋„๋ก ๊ธฐ๋Šฅ์„ ์ œ ๊ณตํ•ฉ๋‹ˆ๋‹ค. 6.1 ํ†ตํ•ฉ ๋ณด์•ˆ๋กœ๊ทธ ๋ถ„์„ ๋ณด๊ณ ์„œ ์ œ๊ณต - ISIM ์ œ๊ณต ๋ฆฌํฌํŠธ ๊ด€๋ จ ๋‚ด์šฉ : ๊ณ„์ •-์‹ค์‚ฌ์šฉ์ž ๋งตํ•‘ ํ˜„ํ™ฉ, ๋ฏธ์‚ฌ์šฉ ๊ณ„์ • ํ˜„ํ™ฉ, ๊ณ„์ • ๊ด€๋ฆฌ ๋‚ด์—ญ, ๊ณ„์ •๊ด€๋ฆฌ ์ •์ฑ…/๊ฐ์‚ฌ ๋‚ด์—ญ, ์•”ํ˜ธ ๋ณ€๊ฒฝ์ฃผ๊ธฐ ๋งŒ๋ฃŒ ๋‚ด์—ญ - ์ •์˜๋œ ๋ณด๊ณ ์„œ๋Š” Web์œผ๋กœ ์กฐํšŒ ๊ฐ€๋Šฅํ•˜๋ฉฐ PDF, HTML, EXCEL, CSV, XMLํ˜•ํƒœ๋กœ ์ €์žฅ ๊ฐ€๋Šฅ - ํ†ตํ•ฉ ๋กœ๊ทธ๊ด€๋ฆฌ ์‹œ์Šคํ…œ์œผ๋กœ ์—ฐ๋™ํ•˜๊ธฐ ์œ„ํ•œ ์—ฐ๋™ ์ธํ„ฐํŽ˜์ด์Šค ์ œ๊ณต 6.2 ํ†ต๊ณ„ ๋ณด๊ณ ์„œ ์ œ๊ณต 6.3 ๋‹ค์–‘ํ•œ ์ถœ๋ ฅํ˜•์‹ ์ง€์› 6.4 ํ†ตํ•ฉ ๋กœ๊ทธ๊ด€๋ฆฌ ์‹œ์Šคํ…œ ์—ฐ๋™ Cognos Business Intelligence Server
  • 48. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions ยฉ Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBMโ€™s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANYSYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. FOLLOW US ON: THANK YOU