SlideShare a Scribd company logo
© Hitachi, Ltd. 2024. All rights reserved.
Exploring Best Practices for Implementing
Authn and Authz in a Cloud-Native Environment
All Day DevOps 2024
Hitachi, Ltd.
OSS Solution Center
10/11/2024
Yoshiyuki Tabata
2
© Hitachi, Ltd. 2024. All rights reserved.
1. Importance of Authentication and Authorization
2. Difficulty to Implement Authentication and Authorization
3. Current Trends of Authentication and Authorization
Contents
4. Exploring Best Practices for Implementing Authn and Authz
3
© Hitachi, Ltd. 2024. All rights reserved.
Speaker
• Specialist in API authorization
 Consulting for API management infrastructure and authentication/authorization systems in the financial, public,
social, and industrial fields
• Contributor to OSS related to authentication, authorization, and API management
 Keycloak (IAM OSS)
 3scale (API management OSS)
• Other activities
 Speaker at events such as KubeCon, Apidays, Open Source Summit, etc.
 Author of Keycloak books (Japanese) and writer of web articles about IAM (Japanese)
Yoshiyuki Tabata
 Senior OSS Consultant at Hitachi, Ltd.
 CNCF Ambassador / Cloud Native Community Japan
organizer / Cloud Native Security Japan founder
 LinkedIn: @ytabata, X: @yo_tabata,
GitHub: @y-tabata
4
© Hitachi, Ltd. 2024. All rights reserved.
1. Importance of Authentication and Authorization
2. Difficulty to Implement Authentication and Authorization
3. Current Trends of Authentication and Authorization
Contents
4. Exploring Best Practices for Implementing Authn and Authz
5
© Hitachi, Ltd. 2024. All rights reserved.
What is Authentication / Authorization
Authentication (Authn) is the process of verifying an entity's
identity.
Authorization (Authz) is the process of verifying that a requested
action or service is approved for a specific entity.
entities resources / APIs
request
Authentication
Who/What does request
resources?
Authorization
Can the entity take some
action regarding resources?
6
© Hitachi, Ltd. 2024. All rights reserved.
Authn and Authz in OWASP Top 10 API Security Risks
The top 3 security risks are regarding "Authn/Authz".
* OWASP Top 10 API Security Risks - 2023 https://owasp.org/API-Security/editions/2023/en/0x11-t10/
Broken Object Level
Authorization
Broken Object Property
Level Authorization
Broken Function Level Authorization
Broken Authentication
Unrestricted Access to Sensitive Business Flows
Security Misconfiguration
Unrestricted Resource Consumption
Server Side Request Forgery
Improper Inventory Management
Unsafe Consumption of APIs
1
2
3
4
6
7
8
9
10
5
7
© Hitachi, Ltd. 2024. All rights reserved.
Authorization in OWASP Top 10 API Security Risks
Authorization is the most significant security risk, with 3 risks
ranking in the top 5.
#1 Broken Object Level Authorization
Must not allow user 101 to obtain user 102's
resources.
#3 Broken Object Property Level Authorization
Must not allow a general user to change sensitive
object properties like "rank".
#5 Broken Function Level Authorization
Must not allow a general user to call
administrator function.
User 101
GET /users/102
PUT /users/101
{"rank": "gold"}
GET /admin/users/all
8
© Hitachi, Ltd. 2024. All rights reserved.
1. Importance of Authentication and Authorization
2. Difficulty to Implement Authentication and Authorization
3. Current Trends of Authentication and Authorization
Contents
4. Exploring Best Practices for Implementing Authn and Authz
9
© Hitachi, Ltd. 2024. All rights reserved.
Various Standards for Authentication
This year marks 10 years since OpenID Connect 1.0 was
published.
In recent years, various standards have been published to address various
attacks and social needs, and more will likely increase in the future.
Standards:
OSS: …
OIDF standardizes
IETF standardizes
OASIS
standardizes
W3C standardizes
…
SAML 2.0
Web Authentication
OpenID Connect
Core 1.0
RFC6749:
OAuth 2.0
extend
FAPI 1.0 FAPI 2.0
OAuth
2.1
OID4VCI
OpenID Connect
Discovery 1.0
RFC 7636:
PKCE
RFC 6750: Bearer
Token
RFC 9449:
DPoP
RFC 7662: Token
Introspection
RFC 8693: Token
Exchange
OpenID Connect
DCR 1.0
RFC 8705: OAuth
MTLS
RFC 8628:
Device Flow
CIBA
FAPI-CIBA
JARM
10
© Hitachi, Ltd. 2024. All rights reserved.
No Standards and Various OSS for Authorization
There is no standard and there are a lot of excellent OSS.
Currently, OIDF AuthZEN WG is working to develop standards to address
this situation.
No standards for communicating
authorization information
…
Standards:
OSS:
11
© Hitachi, Ltd. 2024. All rights reserved.
1. Importance of Authentication and Authorization
2. Difficulty to Implement Authentication and Authorization
3. Current Trends of Authentication and Authorization
Contents
4. Exploring Best Practices for Implementing Authn and Authz
12
© Hitachi, Ltd. 2024. All rights reserved.
Current Trend of Authentication
In a cloud-native environment, not only User Authentication like
OIDC, but also Workload Authentication is becoming increasingly
important.
In today's world, with an increasing number of complex software functions
being built and deployed as workloads, IETF Workload Identity in Multi
System Environments (WIMSE) WG was established in 2024 and is
developing standards for workload authentication.
Current Active Internet-Drafts Date Description
WIMSE Service to Service
Authentication
2024-08-15 Describes protocols for two workloads to verify
each other's identity.
Workload Identity in a Multi System
Environment (WIMSE) Architecture
2024-07-08 Describes workload identity and its use cases.
Best Current Practice for OAuth 2.0
Client Authentication in Workload
Environments
2024-07-08 Describes OAuth 2.0 client authentication method
in workload environments utilizing service account
token volume projection and RFC7523.
13
© Hitachi, Ltd. 2024. All rights reserved.
Current Trend of Authorization
Authorization is recognized as the most important security risk, and
while there is a demand for dynamic and fine-grained authorization
schemes.
OIDF Authorization Exchange (AuthZEN) WG was established in 2023
and is developing standards for authorization.
Current Drafts Date Description
Authorization API 1.0 2024-09-15 Describes API specification between Policy
Decision Points (PDP) and Policy Enforcement
Points (PEP).
14
© Hitachi, Ltd. 2024. All rights reserved.
1. Importance of Authentication and Authorization
2. Difficulty to Implement Authentication and Authorization
3. Current Trends of Authentication and Authorization
Contents
4. Exploring Best Practices for Implementing Authn and Authz
15
© Hitachi, Ltd. 2024. All rights reserved.
Best Practice of Authentication (User Authentication)
Assess the adverse impact of failures and choose the appropriate
user authentication methods among the many available, following
NIST SP 800-63 Digital Identity Guidelines.
Revision 4 of NIST SP 800-63 is currently available as a draft.
Authenticator Assurance Levels (AAL) Permitted Authentication
AAL1 single-factor authentication like password
authentication
AAL2 multi-factor authentication like synced passkey
based on W3C Web Authentication (WebAuthn)
AAL3 multi-factor cryptographic authentication like
device-bound passkey based on WebAuthn
16
© Hitachi, Ltd. 2024. All rights reserved.
Best Practice of Authentication (User Authentication)
User authentication does not need to be implemented individually in
the workload but is typically delegated to an IdP such as Keycloak.
When delegating user authentication, choose the appropriate federation
protocol, following NIST SP 800-63.
Federation Assurance Levels (FAL) Federation Protocols
FAL1 OIDC implicit flow
SAML Web SSO profile
FAL2 OIDC authorization code flow
SAML artifact binding profile
FAL3 OIDC holder-of-key ID token (no standard)
SAML Holder-of-Key profile
17
© Hitachi, Ltd. 2024. All rights reserved.
Best Practice of Authentication (User Authentication)
When adopting OIDC, more specific implementation will be decided
concerning OAuth 2.0 Security Best Current Practice, which
summarizes the latest security recommendations for OAuth 2.0.
OIDC has a high affinity for cloud-native environments and is often adopted
because it is based on OAuth 2.0, the standard for API protection.
Threat examples Mitigations
Cross-Site Request Forgery (CSRF) RFC7636: Proof Key for Code Exchange (PKCE)
Misuse of Stolen Access Tokens RFC8705: OAuth 2.0 Mutual-TLS Client
Authentication and Certificate-Bound Access
Tokens (OAuth MTLS)
RFC9449: OAuth 2.0 Demonstrating Proof of
Possession (DPoP)
18
© Hitachi, Ltd. 2024. All rights reserved.
Node Node
Best Practice of Authentication (Workload Authentication)
The current mainstream is mTLS authentication using X.509
certificates with a SPIFFE-compliant implementation such as SPIRE.
Some ways to interact with SPIRE Agent include implementing its client with
SPIFFE Library, using SPIRE Helper utility, or using Envoy Proxy.
Workload Workload
SPIRE Agent SPIRE Agent
SPIRE Server
mTLS
x.509 certificates
x.509 certificates
workload identities workload identities
19
© Hitachi, Ltd. 2024. All rights reserved.
Best Practice of Authorization
Separate authorization logic from application logic using the P*P
architecture defined in XACML and NIST SP 800-162.
By separating the authorization logic, workloads are freed from having to
keep up with the complexity of authorization conditions as the service
grows.
entities (subjects) resources / APIs (objects)
1. unauthorized request Policy
Enforcement
Point (PEP)
4. authorized request
Policy
Decision
Point (PDP)
Policy
Information
Point (PIP)
Policy
Administration
Point (PAP)
authorization
policies data
2. authorization
delegation
3. authorization
decision
20
© Hitachi, Ltd. 2024. All rights reserved.
Best Practice of Authorization
Depending on your use case, choose the PDP authorization model
between Attribute-Based Access Control (ABAC) and
Relationship-Based Access Control (ReBAC).
entities (subjects) resources / APIs (objects)
1. unauthorized request Policy
Enforcement
Point (PEP)
4. authorized request
Policy
Decision
Point (PDP)
Policy
Information
Point (PIP)
Policy
Administration
Point (PAP)
authorization
policies data
2. authorization
delegation
3. authorization
decision
21
© Hitachi, Ltd. 2024. All rights reserved.
Best Practice of Authorization
Depending on your use case, choose the PDP authorization model
between Attribute-Based Access Control (ABAC) and
Relationship-Based Access Control (ReBAC).
ABAC (Policy as Code) ReBAC (Policy as Graph)
Features Good at very fine-grained
authorization, including depending on
dynamic attributes such as time and
location.
Good at authorization using complex
hierarchical relationships.
Use case
example
Managers who are in APAC can view
Trade Confidential files during
business hours.
Users who are assigned the Member
role of the Development team will also
be granted the Edit role for all files in
that folder if the Development team is
the parent of that folder.
Representative
implementation
Open Policy Agent (OPA) OpenFGA
22
© Hitachi, Ltd. 2024. All rights reserved.
Best Practice of Authorization
Interaction between PDP and PEP is implemented following OIDF
AuthZEN WG Authorization API 1.0.
Since this specification is still a draft, it is possible to break changes, so it is
necessary to keep a close eye on trends.
entities (subjects) resources / APIs (objects)
1. unauthorized request Policy
Enforcement
Point (PEP)
4. authorized request
Policy
Decision
Point (PDP)
Policy
Information
Point (PIP)
Policy
Administration
Point (PAP)
authorization
policies data
2. authorization
delegation
3. authorization
decision
23
© Hitachi, Ltd. 2024. All rights reserved.
Best Practice of Authorization
Obtain user identities used for authorization following RFC7662:
OAuth 2.0 Token Introspection.
Access token added to Token Introspection request is obtained from API
request.
entities resources / APIs
1. API request w/ access token
(following RFC6750: OAuth 2.0 Bearer Token Usage)
Authorization
Server
2. Token Introspection request
w/ access token
(following RFC7662)
24
© Hitachi, Ltd. 2024. All rights reserved.
In a cloud-native environment, the workload may need to interact
with others. In this case, obtain a token following RFC8693: OAuth
2.0 Token Exchange and use it within a trusted domain.
For details on this interaction, refer to Transaction Tokens, a draft of the
IETF oauth WG.
Trusted Domain
Best Practice of Authorization
entities
1. API request
w/ access token
Authorization
Server
2. Token Exchange request
w/ access token
Workload Workload
4. API request
w/ new token
3. Token Exchange response
w/ new token
25
© Hitachi, Ltd. 2024. All rights reserved.
Trusted Domain A
If workloads are distributed across multiple trusted domains, obtain a
token for the other trusted domain following RFC8693 and RFC7523:
JWT Profile for OAuth 2.0 Authorization Grants.
For details on this interaction, refer to OAuth Identity and Authorization
Chaining Across Domains, a draft of the IETF oauth WG.
Trusted Domain B
Best Practice of Authorization
entities
1. API request
w/ access token
Authorization
Server
Workload Workload
6. API request
w/ new access token
Authorization
Server
2. Token Exchange
request w/ access token
3. Token Exchange
response
w/ authz grant JWT
4. Token request
w/ authz grant JWT
5. Token response
w/ new access token
26
© Hitachi, Ltd. 2024. All rights reserved.
Summary of Best Practice
 Authentication
 User Authentication
 NIST SP 800-63 Digital Identity Guidelines (AAL and FAL)
 OAuth 2.0 Security Best Current Practice
 Workload Authentication
 SPIFFE
 Authorization
 Architecture: P*P architecture (XACML / NIST SP 800-162)
 PDP and PEP interaction: Authorization API 1.0
 Authorization Model: ABAC / ReBAC
 User Identity Propagation
 External to Internal
 RFC6750: OAuth 2.0 Bearer Token Usage
 RFC7662: OAuth 2.0 Token Introspection
 Internal to Internal (Same Trusted Domain)
 RFC8693: OAuth 2.0 Token Exchange
 Transaction Tokens
 Internal to Internal (Distributed across Multiple Trusted Domains)
 RFC8693: OAuth 2.0 Token Exchange
 RFC7523: JWT Profile for OAuth 2.0 Authorization Grants
 OAuth Identity and Authorization Chaining Across Domains
27
© Hitachi, Ltd. 2024. All rights reserved.
Let’s Join CNCF IAM White Paper PJ and TAG Security APAC!
We are currently working on a project to write a white paper on
Identity and Access Management (IAM) to discuss best
practices for authentication and authorization such as those
introduced in this session. If you are interested, don't hesitate to
get in touch with us!
https://github.com/cncf/tag-security/issues/1332
The CNCF Security Technical Advisory Group (TAG Security)
APAC region meetings have started every other week from
August 21st! This is in a more friendly time zone for the security
freaks in attendance today, so please join us!
https://zoom-lfx.platform.linuxfoundation.org/meetings/cncf?view=week
28
© Hitachi, Ltd. 2024. All rights reserved.
Trademarks
• OpenID is a trademark or registered trademark of OpenID Foundation in the United States and other
countries.
• GitHub is a trademark or registered trademark of GitHub, Inc. in the United States and other countries.
• X is a trademark or registered trademark of X Corp. in the United States and other countries.
• Other brand names and product names used in this material are trademarks, registered trademarks, or
trade names of their respective holders.
© Hitachi, Ltd. 2024. All rights reserved.
Yoshiyuki Tabata
10/11/2024
Hitachi, Ltd.
OSS Solution Center
END
Exploring Best Practices for Implementing
Authn and Authz in a Cloud-Native Environment
29
Exploring Best Practices for Implementing Authn and Authz in a Cloud-Native Environment
Ad

More Related Content

Similar to Exploring Best Practices for Implementing Authn and Authz in a Cloud-Native Environment (20)

Securing RESTful API
Securing RESTful APISecuring RESTful API
Securing RESTful API
Muhammad Zbeedat
 
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They Key
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They KeyOAuth2 for IoT Security: Why OpenID Connect & UMA Are They Key
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They Key
Mike Schwartz
 
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Codit
 
IRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and EthereumIRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and Ethereum
IRJET Journal
 
OAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellOAuth in the Real World featuring Webshell
OAuth in the Real World featuring Webshell
CA API Management
 
EduID Mobile App - Use-Cases, Concepts and Implementation
EduID Mobile App - Use-Cases, Concepts and ImplementationEduID Mobile App - Use-Cases, Concepts and Implementation
EduID Mobile App - Use-Cases, Concepts and Implementation
Christian Glahn
 
APIdays London 2020: Toward certifying Financial-grade API security profile w...
APIdays London 2020: Toward certifying Financial-grade API security profile w...APIdays London 2020: Toward certifying Financial-grade API security profile w...
APIdays London 2020: Toward certifying Financial-grade API security profile w...
Hitachi, Ltd. OSS Solution Center.
 
Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2
Donald Malloy
 
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak
 
apidays LIVE LONDON - Toward certifying Financial-grade API profile with Keyc...
apidays LIVE LONDON - Toward certifying Financial-grade API profile with Keyc...apidays LIVE LONDON - Toward certifying Financial-grade API profile with Keyc...
apidays LIVE LONDON - Toward certifying Financial-grade API profile with Keyc...
apidays
 
Oracle API Platform Cloud Service Best Practices & Lessons Learnt
Oracle API Platform Cloud Service Best Practices & Lessons LearntOracle API Platform Cloud Service Best Practices & Lessons Learnt
Oracle API Platform Cloud Service Best Practices & Lessons Learnt
luisw19
 
Oracle Blockchain Platform
Oracle Blockchain PlatformOracle Blockchain Platform
Oracle Blockchain Platform
Juarez Junior
 
How Does a Workload Authenticate an API Request?: Implementing Transaction To...
How Does a Workload Authenticate an API Request?: Implementing Transaction To...How Does a Workload Authenticate an API Request?: Implementing Transaction To...
How Does a Workload Authenticate an API Request?: Implementing Transaction To...
Hitachi, Ltd. OSS Solution Center.
 
Getting Started with API Management – Why It's Needed On-prem and in the Cloud
Getting Started with API Management – Why It's Needed On-prem and in the CloudGetting Started with API Management – Why It's Needed On-prem and in the Cloud
Getting Started with API Management – Why It's Needed On-prem and in the Cloud
Revelation Technologies
 
CCICI CIP 1.0 Testbed - Security access implementation and reference - v1.0
CCICI CIP 1.0 Testbed - Security access implementation and reference - v1.0CCICI CIP 1.0 Testbed - Security access implementation and reference - v1.0
CCICI CIP 1.0 Testbed - Security access implementation and reference - v1.0
Krishna-Kumar
 
API, Integration, and SOA Convergence
API, Integration, and SOA ConvergenceAPI, Integration, and SOA Convergence
API, Integration, and SOA Convergence
Kasun Indrasiri
 
Free and open cloud security posture monitoring
Free and open cloud security posture monitoringFree and open cloud security posture monitoring
Free and open cloud security posture monitoring
Elasticsearch
 
APIdays Paris 2019 - What are protected and secured by security requirements ...
APIdays Paris 2019 - What are protected and secured by security requirements ...APIdays Paris 2019 - What are protected and secured by security requirements ...
APIdays Paris 2019 - What are protected and secured by security requirements ...
apidays
 
APIdays Paris 2019 : Financial-grade API (FAPI) Security Profile
APIdays Paris 2019 : Financial-grade API (FAPI) Security ProfileAPIdays Paris 2019 : Financial-grade API (FAPI) Security Profile
APIdays Paris 2019 : Financial-grade API (FAPI) Security Profile
Hitachi, Ltd. OSS Solution Center.
 
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
ForgeRock
 
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They Key
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They KeyOAuth2 for IoT Security: Why OpenID Connect & UMA Are They Key
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They Key
Mike Schwartz
 
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Codit
 
IRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and EthereumIRJET- Proof of Document using Multichain and Ethereum
IRJET- Proof of Document using Multichain and Ethereum
IRJET Journal
 
OAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellOAuth in the Real World featuring Webshell
OAuth in the Real World featuring Webshell
CA API Management
 
EduID Mobile App - Use-Cases, Concepts and Implementation
EduID Mobile App - Use-Cases, Concepts and ImplementationEduID Mobile App - Use-Cases, Concepts and Implementation
EduID Mobile App - Use-Cases, Concepts and Implementation
Christian Glahn
 
APIdays London 2020: Toward certifying Financial-grade API security profile w...
APIdays London 2020: Toward certifying Financial-grade API security profile w...APIdays London 2020: Toward certifying Financial-grade API security profile w...
APIdays London 2020: Toward certifying Financial-grade API security profile w...
Hitachi, Ltd. OSS Solution Center.
 
Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2Cartes Asia Dem 2010 V2
Cartes Asia Dem 2010 V2
Donald Malloy
 
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud ManagementSukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak-Agile-DevOps-Cloud Management
Sukumar Nayak
 
apidays LIVE LONDON - Toward certifying Financial-grade API profile with Keyc...
apidays LIVE LONDON - Toward certifying Financial-grade API profile with Keyc...apidays LIVE LONDON - Toward certifying Financial-grade API profile with Keyc...
apidays LIVE LONDON - Toward certifying Financial-grade API profile with Keyc...
apidays
 
Oracle API Platform Cloud Service Best Practices & Lessons Learnt
Oracle API Platform Cloud Service Best Practices & Lessons LearntOracle API Platform Cloud Service Best Practices & Lessons Learnt
Oracle API Platform Cloud Service Best Practices & Lessons Learnt
luisw19
 
Oracle Blockchain Platform
Oracle Blockchain PlatformOracle Blockchain Platform
Oracle Blockchain Platform
Juarez Junior
 
How Does a Workload Authenticate an API Request?: Implementing Transaction To...
How Does a Workload Authenticate an API Request?: Implementing Transaction To...How Does a Workload Authenticate an API Request?: Implementing Transaction To...
How Does a Workload Authenticate an API Request?: Implementing Transaction To...
Hitachi, Ltd. OSS Solution Center.
 
Getting Started with API Management – Why It's Needed On-prem and in the Cloud
Getting Started with API Management – Why It's Needed On-prem and in the CloudGetting Started with API Management – Why It's Needed On-prem and in the Cloud
Getting Started with API Management – Why It's Needed On-prem and in the Cloud
Revelation Technologies
 
CCICI CIP 1.0 Testbed - Security access implementation and reference - v1.0
CCICI CIP 1.0 Testbed - Security access implementation and reference - v1.0CCICI CIP 1.0 Testbed - Security access implementation and reference - v1.0
CCICI CIP 1.0 Testbed - Security access implementation and reference - v1.0
Krishna-Kumar
 
API, Integration, and SOA Convergence
API, Integration, and SOA ConvergenceAPI, Integration, and SOA Convergence
API, Integration, and SOA Convergence
Kasun Indrasiri
 
Free and open cloud security posture monitoring
Free and open cloud security posture monitoringFree and open cloud security posture monitoring
Free and open cloud security posture monitoring
Elasticsearch
 
APIdays Paris 2019 - What are protected and secured by security requirements ...
APIdays Paris 2019 - What are protected and secured by security requirements ...APIdays Paris 2019 - What are protected and secured by security requirements ...
APIdays Paris 2019 - What are protected and secured by security requirements ...
apidays
 
APIdays Paris 2019 : Financial-grade API (FAPI) Security Profile
APIdays Paris 2019 : Financial-grade API (FAPI) Security ProfileAPIdays Paris 2019 : Financial-grade API (FAPI) Security Profile
APIdays Paris 2019 : Financial-grade API (FAPI) Security Profile
Hitachi, Ltd. OSS Solution Center.
 
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
ForgeRock
 

More from Hitachi, Ltd. OSS Solution Center. (20)

KubeCon + CloudNativeCon North America セキュリティ周りrecap
KubeCon + CloudNativeCon North America セキュリティ周りrecapKubeCon + CloudNativeCon North America セキュリティ周りrecap
KubeCon + CloudNativeCon North America セキュリティ周りrecap
Hitachi, Ltd. OSS Solution Center.
 
Let’s Join Cloud Native Computing Foundation TAG Security APAC!
Let’s Join Cloud Native Computing Foundation TAG Security APAC!Let’s Join Cloud Native Computing Foundation TAG Security APAC!
Let’s Join Cloud Native Computing Foundation TAG Security APAC!
Hitachi, Ltd. OSS Solution Center.
 
CloudNativeSecurityCon North America 2024 Overview
CloudNativeSecurityCon North America 2024 OverviewCloudNativeSecurityCon North America 2024 Overview
CloudNativeSecurityCon North America 2024 Overview
Hitachi, Ltd. OSS Solution Center.
 
Authentication and Authorization of The Latest Keycloak
Authentication and Authorization of The Latest KeycloakAuthentication and Authorization of The Latest Keycloak
Authentication and Authorization of The Latest Keycloak
Hitachi, Ltd. OSS Solution Center.
 
KeycloakのCNCF incubating project入りまでのアップストリーム活動の歩み
KeycloakのCNCF incubating project入りまでのアップストリーム活動の歩みKeycloakのCNCF incubating project入りまでのアップストリーム活動の歩み
KeycloakのCNCF incubating project入りまでのアップストリーム活動の歩み
Hitachi, Ltd. OSS Solution Center.
 
KubeCon NA 2023 Recap: Challenge to Implementing “Scalable” Authorization wit...
KubeCon NA 2023 Recap: Challenge to Implementing “Scalable” Authorization wit...KubeCon NA 2023 Recap: Challenge to Implementing “Scalable” Authorization wit...
KubeCon NA 2023 Recap: Challenge to Implementing “Scalable” Authorization wit...
Hitachi, Ltd. OSS Solution Center.
 
パスキーでリードする: NGINXとKeycloakによる効率的な認証・認可
パスキーでリードする: NGINXとKeycloakによる効率的な認証・認可パスキーでリードする: NGINXとKeycloakによる効率的な認証・認可
パスキーでリードする: NGINXとKeycloakによる効率的な認証・認可
Hitachi, Ltd. OSS Solution Center.
 
Keycloakの全体像: 基本概念、ユースケース、そして最新の開発動向
Keycloakの全体像: 基本概念、ユースケース、そして最新の開発動向Keycloakの全体像: 基本概念、ユースケース、そして最新の開発動向
Keycloakの全体像: 基本概念、ユースケース、そして最新の開発動向
Hitachi, Ltd. OSS Solution Center.
 
NGINXでの認可について考える
NGINXでの認可について考えるNGINXでの認可について考える
NGINXでの認可について考える
Hitachi, Ltd. OSS Solution Center.
 
Security Considerations for API Gateway Aggregation
Security Considerations for API Gateway AggregationSecurity Considerations for API Gateway Aggregation
Security Considerations for API Gateway Aggregation
Hitachi, Ltd. OSS Solution Center.
 
KeycloakでFAPIに対応した高セキュリティなAPIを公開する
KeycloakでFAPIに対応した高セキュリティなAPIを公開するKeycloakでFAPIに対応した高セキュリティなAPIを公開する
KeycloakでFAPIに対応した高セキュリティなAPIを公開する
Hitachi, Ltd. OSS Solution Center.
 
IDガバナンス&管理の基礎
IDガバナンス&管理の基礎IDガバナンス&管理の基礎
IDガバナンス&管理の基礎
Hitachi, Ltd. OSS Solution Center.
 
Keycloakのステップアップ認証について
Keycloakのステップアップ認証についてKeycloakのステップアップ認証について
Keycloakのステップアップ認証について
Hitachi, Ltd. OSS Solution Center.
 
NGINXをBFF (Backend for Frontend)として利用した話
NGINXをBFF (Backend for Frontend)として利用した話NGINXをBFF (Backend for Frontend)として利用した話
NGINXをBFF (Backend for Frontend)として利用した話
Hitachi, Ltd. OSS Solution Center.
 
KeycloakでAPI認可に入門する
KeycloakでAPI認可に入門するKeycloakでAPI認可に入門する
KeycloakでAPI認可に入門する
Hitachi, Ltd. OSS Solution Center.
 
What API Specifications and Tools Help Engineers to Construct a High-Security...
What API Specifications and Tools Help Engineers to Construct a High-Security...What API Specifications and Tools Help Engineers to Construct a High-Security...
What API Specifications and Tools Help Engineers to Construct a High-Security...
Hitachi, Ltd. OSS Solution Center.
 
Implementing security and availability requirements for banking API system us...
Implementing security and availability requirements for banking API system us...Implementing security and availability requirements for banking API system us...
Implementing security and availability requirements for banking API system us...
Hitachi, Ltd. OSS Solution Center.
 
Overall pictures of Identity provider mix-up attack patterns and trade-offs b...
Overall pictures of Identity provider mix-up attack patterns and trade-offs b...Overall pictures of Identity provider mix-up attack patterns and trade-offs b...
Overall pictures of Identity provider mix-up attack patterns and trade-offs b...
Hitachi, Ltd. OSS Solution Center.
 
Apache con@home 2021_sha
Apache con@home 2021_shaApache con@home 2021_sha
Apache con@home 2021_sha
Hitachi, Ltd. OSS Solution Center.
 
Node-RED Installer, Standalone Installer using Electron
Node-RED Installer, Standalone Installer using ElectronNode-RED Installer, Standalone Installer using Electron
Node-RED Installer, Standalone Installer using Electron
Hitachi, Ltd. OSS Solution Center.
 
KubeCon + CloudNativeCon North America セキュリティ周りrecap
KubeCon + CloudNativeCon North America セキュリティ周りrecapKubeCon + CloudNativeCon North America セキュリティ周りrecap
KubeCon + CloudNativeCon North America セキュリティ周りrecap
Hitachi, Ltd. OSS Solution Center.
 
Let’s Join Cloud Native Computing Foundation TAG Security APAC!
Let’s Join Cloud Native Computing Foundation TAG Security APAC!Let’s Join Cloud Native Computing Foundation TAG Security APAC!
Let’s Join Cloud Native Computing Foundation TAG Security APAC!
Hitachi, Ltd. OSS Solution Center.
 
KeycloakのCNCF incubating project入りまでのアップストリーム活動の歩み
KeycloakのCNCF incubating project入りまでのアップストリーム活動の歩みKeycloakのCNCF incubating project入りまでのアップストリーム活動の歩み
KeycloakのCNCF incubating project入りまでのアップストリーム活動の歩み
Hitachi, Ltd. OSS Solution Center.
 
KubeCon NA 2023 Recap: Challenge to Implementing “Scalable” Authorization wit...
KubeCon NA 2023 Recap: Challenge to Implementing “Scalable” Authorization wit...KubeCon NA 2023 Recap: Challenge to Implementing “Scalable” Authorization wit...
KubeCon NA 2023 Recap: Challenge to Implementing “Scalable” Authorization wit...
Hitachi, Ltd. OSS Solution Center.
 
パスキーでリードする: NGINXとKeycloakによる効率的な認証・認可
パスキーでリードする: NGINXとKeycloakによる効率的な認証・認可パスキーでリードする: NGINXとKeycloakによる効率的な認証・認可
パスキーでリードする: NGINXとKeycloakによる効率的な認証・認可
Hitachi, Ltd. OSS Solution Center.
 
Keycloakの全体像: 基本概念、ユースケース、そして最新の開発動向
Keycloakの全体像: 基本概念、ユースケース、そして最新の開発動向Keycloakの全体像: 基本概念、ユースケース、そして最新の開発動向
Keycloakの全体像: 基本概念、ユースケース、そして最新の開発動向
Hitachi, Ltd. OSS Solution Center.
 
KeycloakでFAPIに対応した高セキュリティなAPIを公開する
KeycloakでFAPIに対応した高セキュリティなAPIを公開するKeycloakでFAPIに対応した高セキュリティなAPIを公開する
KeycloakでFAPIに対応した高セキュリティなAPIを公開する
Hitachi, Ltd. OSS Solution Center.
 
What API Specifications and Tools Help Engineers to Construct a High-Security...
What API Specifications and Tools Help Engineers to Construct a High-Security...What API Specifications and Tools Help Engineers to Construct a High-Security...
What API Specifications and Tools Help Engineers to Construct a High-Security...
Hitachi, Ltd. OSS Solution Center.
 
Implementing security and availability requirements for banking API system us...
Implementing security and availability requirements for banking API system us...Implementing security and availability requirements for banking API system us...
Implementing security and availability requirements for banking API system us...
Hitachi, Ltd. OSS Solution Center.
 
Overall pictures of Identity provider mix-up attack patterns and trade-offs b...
Overall pictures of Identity provider mix-up attack patterns and trade-offs b...Overall pictures of Identity provider mix-up attack patterns and trade-offs b...
Overall pictures of Identity provider mix-up attack patterns and trade-offs b...
Hitachi, Ltd. OSS Solution Center.
 
Ad

Recently uploaded (20)

Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Social Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTechSocial Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTech
Steve Jonas
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
TrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token ListingTrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token Listing
Trs Labs
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
MINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PRMINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PR
MIND CTI
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveDesigning Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep Dive
ScyllaDB
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
Social Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTechSocial Media App Development Company-EmizenTech
Social Media App Development Company-EmizenTech
Steve Jonas
 
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...
Aqusag Technologies
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
TrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token ListingTrsLabs Consultants - DeFi, WEb3, Token Listing
TrsLabs Consultants - DeFi, WEb3, Token Listing
Trs Labs
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
MINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PRMINDCTI revenue release Quarter 1 2025 PR
MINDCTI revenue release Quarter 1 2025 PR
MIND CTI
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Ad

Exploring Best Practices for Implementing Authn and Authz in a Cloud-Native Environment

  • 1. © Hitachi, Ltd. 2024. All rights reserved. Exploring Best Practices for Implementing Authn and Authz in a Cloud-Native Environment All Day DevOps 2024 Hitachi, Ltd. OSS Solution Center 10/11/2024 Yoshiyuki Tabata
  • 2. 2 © Hitachi, Ltd. 2024. All rights reserved. 1. Importance of Authentication and Authorization 2. Difficulty to Implement Authentication and Authorization 3. Current Trends of Authentication and Authorization Contents 4. Exploring Best Practices for Implementing Authn and Authz
  • 3. 3 © Hitachi, Ltd. 2024. All rights reserved. Speaker • Specialist in API authorization  Consulting for API management infrastructure and authentication/authorization systems in the financial, public, social, and industrial fields • Contributor to OSS related to authentication, authorization, and API management  Keycloak (IAM OSS)  3scale (API management OSS) • Other activities  Speaker at events such as KubeCon, Apidays, Open Source Summit, etc.  Author of Keycloak books (Japanese) and writer of web articles about IAM (Japanese) Yoshiyuki Tabata  Senior OSS Consultant at Hitachi, Ltd.  CNCF Ambassador / Cloud Native Community Japan organizer / Cloud Native Security Japan founder  LinkedIn: @ytabata, X: @yo_tabata, GitHub: @y-tabata
  • 4. 4 © Hitachi, Ltd. 2024. All rights reserved. 1. Importance of Authentication and Authorization 2. Difficulty to Implement Authentication and Authorization 3. Current Trends of Authentication and Authorization Contents 4. Exploring Best Practices for Implementing Authn and Authz
  • 5. 5 © Hitachi, Ltd. 2024. All rights reserved. What is Authentication / Authorization Authentication (Authn) is the process of verifying an entity's identity. Authorization (Authz) is the process of verifying that a requested action or service is approved for a specific entity. entities resources / APIs request Authentication Who/What does request resources? Authorization Can the entity take some action regarding resources?
  • 6. 6 © Hitachi, Ltd. 2024. All rights reserved. Authn and Authz in OWASP Top 10 API Security Risks The top 3 security risks are regarding "Authn/Authz". * OWASP Top 10 API Security Risks - 2023 https://owasp.org/API-Security/editions/2023/en/0x11-t10/ Broken Object Level Authorization Broken Object Property Level Authorization Broken Function Level Authorization Broken Authentication Unrestricted Access to Sensitive Business Flows Security Misconfiguration Unrestricted Resource Consumption Server Side Request Forgery Improper Inventory Management Unsafe Consumption of APIs 1 2 3 4 6 7 8 9 10 5
  • 7. 7 © Hitachi, Ltd. 2024. All rights reserved. Authorization in OWASP Top 10 API Security Risks Authorization is the most significant security risk, with 3 risks ranking in the top 5. #1 Broken Object Level Authorization Must not allow user 101 to obtain user 102's resources. #3 Broken Object Property Level Authorization Must not allow a general user to change sensitive object properties like "rank". #5 Broken Function Level Authorization Must not allow a general user to call administrator function. User 101 GET /users/102 PUT /users/101 {"rank": "gold"} GET /admin/users/all
  • 8. 8 © Hitachi, Ltd. 2024. All rights reserved. 1. Importance of Authentication and Authorization 2. Difficulty to Implement Authentication and Authorization 3. Current Trends of Authentication and Authorization Contents 4. Exploring Best Practices for Implementing Authn and Authz
  • 9. 9 © Hitachi, Ltd. 2024. All rights reserved. Various Standards for Authentication This year marks 10 years since OpenID Connect 1.0 was published. In recent years, various standards have been published to address various attacks and social needs, and more will likely increase in the future. Standards: OSS: … OIDF standardizes IETF standardizes OASIS standardizes W3C standardizes … SAML 2.0 Web Authentication OpenID Connect Core 1.0 RFC6749: OAuth 2.0 extend FAPI 1.0 FAPI 2.0 OAuth 2.1 OID4VCI OpenID Connect Discovery 1.0 RFC 7636: PKCE RFC 6750: Bearer Token RFC 9449: DPoP RFC 7662: Token Introspection RFC 8693: Token Exchange OpenID Connect DCR 1.0 RFC 8705: OAuth MTLS RFC 8628: Device Flow CIBA FAPI-CIBA JARM
  • 10. 10 © Hitachi, Ltd. 2024. All rights reserved. No Standards and Various OSS for Authorization There is no standard and there are a lot of excellent OSS. Currently, OIDF AuthZEN WG is working to develop standards to address this situation. No standards for communicating authorization information … Standards: OSS:
  • 11. 11 © Hitachi, Ltd. 2024. All rights reserved. 1. Importance of Authentication and Authorization 2. Difficulty to Implement Authentication and Authorization 3. Current Trends of Authentication and Authorization Contents 4. Exploring Best Practices for Implementing Authn and Authz
  • 12. 12 © Hitachi, Ltd. 2024. All rights reserved. Current Trend of Authentication In a cloud-native environment, not only User Authentication like OIDC, but also Workload Authentication is becoming increasingly important. In today's world, with an increasing number of complex software functions being built and deployed as workloads, IETF Workload Identity in Multi System Environments (WIMSE) WG was established in 2024 and is developing standards for workload authentication. Current Active Internet-Drafts Date Description WIMSE Service to Service Authentication 2024-08-15 Describes protocols for two workloads to verify each other's identity. Workload Identity in a Multi System Environment (WIMSE) Architecture 2024-07-08 Describes workload identity and its use cases. Best Current Practice for OAuth 2.0 Client Authentication in Workload Environments 2024-07-08 Describes OAuth 2.0 client authentication method in workload environments utilizing service account token volume projection and RFC7523.
  • 13. 13 © Hitachi, Ltd. 2024. All rights reserved. Current Trend of Authorization Authorization is recognized as the most important security risk, and while there is a demand for dynamic and fine-grained authorization schemes. OIDF Authorization Exchange (AuthZEN) WG was established in 2023 and is developing standards for authorization. Current Drafts Date Description Authorization API 1.0 2024-09-15 Describes API specification between Policy Decision Points (PDP) and Policy Enforcement Points (PEP).
  • 14. 14 © Hitachi, Ltd. 2024. All rights reserved. 1. Importance of Authentication and Authorization 2. Difficulty to Implement Authentication and Authorization 3. Current Trends of Authentication and Authorization Contents 4. Exploring Best Practices for Implementing Authn and Authz
  • 15. 15 © Hitachi, Ltd. 2024. All rights reserved. Best Practice of Authentication (User Authentication) Assess the adverse impact of failures and choose the appropriate user authentication methods among the many available, following NIST SP 800-63 Digital Identity Guidelines. Revision 4 of NIST SP 800-63 is currently available as a draft. Authenticator Assurance Levels (AAL) Permitted Authentication AAL1 single-factor authentication like password authentication AAL2 multi-factor authentication like synced passkey based on W3C Web Authentication (WebAuthn) AAL3 multi-factor cryptographic authentication like device-bound passkey based on WebAuthn
  • 16. 16 © Hitachi, Ltd. 2024. All rights reserved. Best Practice of Authentication (User Authentication) User authentication does not need to be implemented individually in the workload but is typically delegated to an IdP such as Keycloak. When delegating user authentication, choose the appropriate federation protocol, following NIST SP 800-63. Federation Assurance Levels (FAL) Federation Protocols FAL1 OIDC implicit flow SAML Web SSO profile FAL2 OIDC authorization code flow SAML artifact binding profile FAL3 OIDC holder-of-key ID token (no standard) SAML Holder-of-Key profile
  • 17. 17 © Hitachi, Ltd. 2024. All rights reserved. Best Practice of Authentication (User Authentication) When adopting OIDC, more specific implementation will be decided concerning OAuth 2.0 Security Best Current Practice, which summarizes the latest security recommendations for OAuth 2.0. OIDC has a high affinity for cloud-native environments and is often adopted because it is based on OAuth 2.0, the standard for API protection. Threat examples Mitigations Cross-Site Request Forgery (CSRF) RFC7636: Proof Key for Code Exchange (PKCE) Misuse of Stolen Access Tokens RFC8705: OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens (OAuth MTLS) RFC9449: OAuth 2.0 Demonstrating Proof of Possession (DPoP)
  • 18. 18 © Hitachi, Ltd. 2024. All rights reserved. Node Node Best Practice of Authentication (Workload Authentication) The current mainstream is mTLS authentication using X.509 certificates with a SPIFFE-compliant implementation such as SPIRE. Some ways to interact with SPIRE Agent include implementing its client with SPIFFE Library, using SPIRE Helper utility, or using Envoy Proxy. Workload Workload SPIRE Agent SPIRE Agent SPIRE Server mTLS x.509 certificates x.509 certificates workload identities workload identities
  • 19. 19 © Hitachi, Ltd. 2024. All rights reserved. Best Practice of Authorization Separate authorization logic from application logic using the P*P architecture defined in XACML and NIST SP 800-162. By separating the authorization logic, workloads are freed from having to keep up with the complexity of authorization conditions as the service grows. entities (subjects) resources / APIs (objects) 1. unauthorized request Policy Enforcement Point (PEP) 4. authorized request Policy Decision Point (PDP) Policy Information Point (PIP) Policy Administration Point (PAP) authorization policies data 2. authorization delegation 3. authorization decision
  • 20. 20 © Hitachi, Ltd. 2024. All rights reserved. Best Practice of Authorization Depending on your use case, choose the PDP authorization model between Attribute-Based Access Control (ABAC) and Relationship-Based Access Control (ReBAC). entities (subjects) resources / APIs (objects) 1. unauthorized request Policy Enforcement Point (PEP) 4. authorized request Policy Decision Point (PDP) Policy Information Point (PIP) Policy Administration Point (PAP) authorization policies data 2. authorization delegation 3. authorization decision
  • 21. 21 © Hitachi, Ltd. 2024. All rights reserved. Best Practice of Authorization Depending on your use case, choose the PDP authorization model between Attribute-Based Access Control (ABAC) and Relationship-Based Access Control (ReBAC). ABAC (Policy as Code) ReBAC (Policy as Graph) Features Good at very fine-grained authorization, including depending on dynamic attributes such as time and location. Good at authorization using complex hierarchical relationships. Use case example Managers who are in APAC can view Trade Confidential files during business hours. Users who are assigned the Member role of the Development team will also be granted the Edit role for all files in that folder if the Development team is the parent of that folder. Representative implementation Open Policy Agent (OPA) OpenFGA
  • 22. 22 © Hitachi, Ltd. 2024. All rights reserved. Best Practice of Authorization Interaction between PDP and PEP is implemented following OIDF AuthZEN WG Authorization API 1.0. Since this specification is still a draft, it is possible to break changes, so it is necessary to keep a close eye on trends. entities (subjects) resources / APIs (objects) 1. unauthorized request Policy Enforcement Point (PEP) 4. authorized request Policy Decision Point (PDP) Policy Information Point (PIP) Policy Administration Point (PAP) authorization policies data 2. authorization delegation 3. authorization decision
  • 23. 23 © Hitachi, Ltd. 2024. All rights reserved. Best Practice of Authorization Obtain user identities used for authorization following RFC7662: OAuth 2.0 Token Introspection. Access token added to Token Introspection request is obtained from API request. entities resources / APIs 1. API request w/ access token (following RFC6750: OAuth 2.0 Bearer Token Usage) Authorization Server 2. Token Introspection request w/ access token (following RFC7662)
  • 24. 24 © Hitachi, Ltd. 2024. All rights reserved. In a cloud-native environment, the workload may need to interact with others. In this case, obtain a token following RFC8693: OAuth 2.0 Token Exchange and use it within a trusted domain. For details on this interaction, refer to Transaction Tokens, a draft of the IETF oauth WG. Trusted Domain Best Practice of Authorization entities 1. API request w/ access token Authorization Server 2. Token Exchange request w/ access token Workload Workload 4. API request w/ new token 3. Token Exchange response w/ new token
  • 25. 25 © Hitachi, Ltd. 2024. All rights reserved. Trusted Domain A If workloads are distributed across multiple trusted domains, obtain a token for the other trusted domain following RFC8693 and RFC7523: JWT Profile for OAuth 2.0 Authorization Grants. For details on this interaction, refer to OAuth Identity and Authorization Chaining Across Domains, a draft of the IETF oauth WG. Trusted Domain B Best Practice of Authorization entities 1. API request w/ access token Authorization Server Workload Workload 6. API request w/ new access token Authorization Server 2. Token Exchange request w/ access token 3. Token Exchange response w/ authz grant JWT 4. Token request w/ authz grant JWT 5. Token response w/ new access token
  • 26. 26 © Hitachi, Ltd. 2024. All rights reserved. Summary of Best Practice  Authentication  User Authentication  NIST SP 800-63 Digital Identity Guidelines (AAL and FAL)  OAuth 2.0 Security Best Current Practice  Workload Authentication  SPIFFE  Authorization  Architecture: P*P architecture (XACML / NIST SP 800-162)  PDP and PEP interaction: Authorization API 1.0  Authorization Model: ABAC / ReBAC  User Identity Propagation  External to Internal  RFC6750: OAuth 2.0 Bearer Token Usage  RFC7662: OAuth 2.0 Token Introspection  Internal to Internal (Same Trusted Domain)  RFC8693: OAuth 2.0 Token Exchange  Transaction Tokens  Internal to Internal (Distributed across Multiple Trusted Domains)  RFC8693: OAuth 2.0 Token Exchange  RFC7523: JWT Profile for OAuth 2.0 Authorization Grants  OAuth Identity and Authorization Chaining Across Domains
  • 27. 27 © Hitachi, Ltd. 2024. All rights reserved. Let’s Join CNCF IAM White Paper PJ and TAG Security APAC! We are currently working on a project to write a white paper on Identity and Access Management (IAM) to discuss best practices for authentication and authorization such as those introduced in this session. If you are interested, don't hesitate to get in touch with us! https://github.com/cncf/tag-security/issues/1332 The CNCF Security Technical Advisory Group (TAG Security) APAC region meetings have started every other week from August 21st! This is in a more friendly time zone for the security freaks in attendance today, so please join us! https://zoom-lfx.platform.linuxfoundation.org/meetings/cncf?view=week
  • 28. 28 © Hitachi, Ltd. 2024. All rights reserved. Trademarks • OpenID is a trademark or registered trademark of OpenID Foundation in the United States and other countries. • GitHub is a trademark or registered trademark of GitHub, Inc. in the United States and other countries. • X is a trademark or registered trademark of X Corp. in the United States and other countries. • Other brand names and product names used in this material are trademarks, registered trademarks, or trade names of their respective holders.
  • 29. © Hitachi, Ltd. 2024. All rights reserved. Yoshiyuki Tabata 10/11/2024 Hitachi, Ltd. OSS Solution Center END Exploring Best Practices for Implementing Authn and Authz in a Cloud-Native Environment 29