SlideShare a Scribd company logo
Federation for the cloud: opportunities for a single identityVladimir JirasekApril 2011
TeaserCloud computing has changed the way IT departments deliver the services to the business. Many organisations, small or big, need to share the data with their partners. Furthermore, organisations need to give access to their systems to the users furthermore organisations. Traditional models relied on creating accounts in local identity databases. More recent approach uses federation between two organisations that trust each other. However, what if you take federation concept to the cloud. Can there be such a service as federated identity in the cloud? Could we all end-up with one single identity that is used for all our activities? The presentation will give some fresh views on this topic.
Problem definition – Personal spaceUsers have multiple “credentials” that they use to access different resourcesPasswords are usually reused thus increasing the risk of account compromisePKI has not solved the problem, created new; has challenges where user interaction is neededUsers want seamless access to resources without losing the comfort – one identity reusable everywhere?Can I use my personal identity at work? No? Why not?
How many identities do I have?I have over 200 identities in my 1Password dabatase
Problem definition – corporate spaceManagement of user identities in a typical corporation is a challenge. Size does matter.Typical applications can reuse existing identity and access platforms (AD, LDAP, Kerberos, PKI) however this requires good project governance and architectureCompanies have business relationships with 3rd parties – built on trust and supported by contracts, yet many corporations manage 3rd party account on their internal IAM platforms – security, cost and compliance issuesCompanies engage with cloud providers and the problem of managing identities and access to cloud service is something that needs to be solved
User identity experience in a typical company – still challengesBusiness applications placed on the company networkMany applications support SSO with odd ones out of SSO platformIAM platform
User identity experience in a typical company with a number of 3rd parties3rd parties access company’s applications3rd parties providersOffering services to the businessBusiness applications placed on the company networkInternal Systems use IAM platformIAM platform
User identity experience in a typical company with cloudCloud providersBusiness applications placed on the company networkMany applications support SSO with odd ones out of SSO platformIAM platform
Put it all together and there are lots of challengesChallenges in internal IAM platforms and its implementationChallenges in accessing Cloud services and managing users identities and entitlementsChallenges in accessing 3rd party servicesChallenges in managing 3rd party access to company resourcesAdd the challenges with end users and their personal identities and the situation becomes very hard to manageMindset change resistance with lack of guidance and maturity models
One personal identity?Use the identityCan I end up with just one identity?Issue an identityTrusted agency
Business solutionSSO inside a companyIdentity federation and automated account provisioning with 3rd parties and cloud providers (in content provider mode)Inbound federation with 3rd parties (in identity provider mode)
Solution for both?Cloud providersBusiness applications placed in the cloudGovernment trusted assured cloud identity brokerIAM platform
Where are we today?Different assurance standards even for paper travel documents (such as passports) issued by different governmentSome government issue e-Identity – usually used for message signing and eGovernment portals accessIM cloud providers promised yet not emerging (is there a business model?)Technology supports the vision
What next?Sort internal SSOCloud providers to support prominent cloud identity provider platformsDevelop world-wide standards for identity assurance – both business and government related (CAMM can help at least with the business side)Create business model for cloud providers to support new identity platforms

More Related Content

PDF
Cloud computing identity management summary
PPTX
IAM Tools
PDF
IdM Reference Architecture
PPTX
Cloud introduction
PPTX
Connector Framework
PPTX
Active Directory Self-Service Suite Overview
PDF
Identity as a Service: a missing gap for moving enterprise applications in In...
PPTX
Short Sales Overview of EmpowerID
Cloud computing identity management summary
IAM Tools
IdM Reference Architecture
Cloud introduction
Connector Framework
Active Directory Self-Service Suite Overview
Identity as a Service: a missing gap for moving enterprise applications in In...
Short Sales Overview of EmpowerID

What's hot (18)

PPT
Saleswax - -public
PDF
Cloud Identity and Access Management
PPTX
Authentication cloud
PPTX
Federation Services
PPTX
Cloud computing
PPTX
3 Building Blocks For Managing Cloud Applications Webinar
PPTX
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
PPTX
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
PPTX
Symposium Cloud En Grid Computing Microsoft Online Strategy - 21-4-2009
PPTX
IdM vs. IDaaS
PPTX
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
PPTX
Greytower identity Overview
PPTX
Identity and Access Management
PPTX
Enterprise Social Computing
PDF
Microsoft Cloud Identity and Access Management Poster - Atidan
PPT
barcamphanoi - Enterprise 2.0
PDF
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
PDF
Identity and Access Management Tools
Saleswax - -public
Cloud Identity and Access Management
Authentication cloud
Federation Services
Cloud computing
3 Building Blocks For Managing Cloud Applications Webinar
Leading Trends in IAM Webinar 2: Minimizing Complexities in IT Operations
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Symposium Cloud En Grid Computing Microsoft Online Strategy - 21-4-2009
IdM vs. IDaaS
Zero-compromise IDaaS: Achieve Both Security and Workforce Productivity
Greytower identity Overview
Identity and Access Management
Enterprise Social Computing
Microsoft Cloud Identity and Access Management Poster - Atidan
barcamphanoi - Enterprise 2.0
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Identity and Access Management Tools
Ad

Similar to Federation For The Cloud Opportunities For A Single Identity (20)

PDF
Extending Enterprise Security into the Cloud
PPT
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
PDF
Architecting a cloud scale identity fabric
PDF
Architecting a Cloud-Scale Identity Fabric
PDF
451 Research Client Event Nov 10
PPT
Up 2011-ken huang
PDF
Anil saldhana oasisid_cloud
PDF
Optimizing Identity and Access Management (IAM) Frameworks
PDF
A Single Strong Authentication Platform for Cloud and On-Premise Applications
DOCX
School of Computer & Information SciencesITS-532 Cloud C.docx
PDF
Iam cloud security_vision_wp_236732
PPTX
Identity and User Access Management.pptx
PPTX
Building a Secure Cloud with Identity Management
PDF
Windows Server 2008 R2 Active Directory ADFS Claims Base Identity for Windows...
PDF
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
PDF
Anil saldhana cloud identity
PDF
Security Issues for Cloud Applications
PDF
A Guide To Single Sign-On for IBM Collaboration Solutions
PDF
CIS14: Lean In: Enterprise Cloud Identity
PPT
Cloud Security: Trust and Transformation
Extending Enterprise Security into the Cloud
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
Architecting a cloud scale identity fabric
Architecting a Cloud-Scale Identity Fabric
451 Research Client Event Nov 10
Up 2011-ken huang
Anil saldhana oasisid_cloud
Optimizing Identity and Access Management (IAM) Frameworks
A Single Strong Authentication Platform for Cloud and On-Premise Applications
School of Computer & Information SciencesITS-532 Cloud C.docx
Iam cloud security_vision_wp_236732
Identity and User Access Management.pptx
Building a Secure Cloud with Identity Management
Windows Server 2008 R2 Active Directory ADFS Claims Base Identity for Windows...
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Anil saldhana cloud identity
Security Issues for Cloud Applications
A Guide To Single Sign-On for IBM Collaboration Solutions
CIS14: Lean In: Enterprise Cloud Identity
Cloud Security: Trust and Transformation
Ad

More from Vladimir Jirasek (17)

PDF
Vulnerability management - beyond scanning
PPTX
Vulnerability Management @ DevSecOps London Gathering
PPTX
C-Level tools for Cloud security
PPTX
Secure your cloud applications by building solid foundations with enterprise ...
PPTX
Cloud security and security architecture
PPTX
2012 10 cloud security architecture
PPT
Mobile phone as Trusted identity assistant
KEY
Security architecture for LSE 2009
PPTX
Mobile security summit - 10 mobile risks
PDF
Information Risk Security model and metrics
PPTX
Integrating Qualys into the patch and vulnerability management processes
PPTX
Securing mobile population for White Hats
PPTX
Security models for security architecture
PPTX
Meaningfull security metrics
PPTX
CAMM presentation for Cyber Security Gas and Oil june 2011
PDF
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
PPT
Qualys Webex 24 June 2008
Vulnerability management - beyond scanning
Vulnerability Management @ DevSecOps London Gathering
C-Level tools for Cloud security
Secure your cloud applications by building solid foundations with enterprise ...
Cloud security and security architecture
2012 10 cloud security architecture
Mobile phone as Trusted identity assistant
Security architecture for LSE 2009
Mobile security summit - 10 mobile risks
Information Risk Security model and metrics
Integrating Qualys into the patch and vulnerability management processes
Securing mobile population for White Hats
Security models for security architecture
Meaningfull security metrics
CAMM presentation for Cyber Security Gas and Oil june 2011
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
Qualys Webex 24 June 2008

Federation For The Cloud Opportunities For A Single Identity

  • 1. Federation for the cloud: opportunities for a single identityVladimir JirasekApril 2011
  • 2. TeaserCloud computing has changed the way IT departments deliver the services to the business. Many organisations, small or big, need to share the data with their partners. Furthermore, organisations need to give access to their systems to the users furthermore organisations. Traditional models relied on creating accounts in local identity databases. More recent approach uses federation between two organisations that trust each other. However, what if you take federation concept to the cloud. Can there be such a service as federated identity in the cloud? Could we all end-up with one single identity that is used for all our activities? The presentation will give some fresh views on this topic.
  • 3. Problem definition – Personal spaceUsers have multiple “credentials” that they use to access different resourcesPasswords are usually reused thus increasing the risk of account compromisePKI has not solved the problem, created new; has challenges where user interaction is neededUsers want seamless access to resources without losing the comfort – one identity reusable everywhere?Can I use my personal identity at work? No? Why not?
  • 4. How many identities do I have?I have over 200 identities in my 1Password dabatase
  • 5. Problem definition – corporate spaceManagement of user identities in a typical corporation is a challenge. Size does matter.Typical applications can reuse existing identity and access platforms (AD, LDAP, Kerberos, PKI) however this requires good project governance and architectureCompanies have business relationships with 3rd parties – built on trust and supported by contracts, yet many corporations manage 3rd party account on their internal IAM platforms – security, cost and compliance issuesCompanies engage with cloud providers and the problem of managing identities and access to cloud service is something that needs to be solved
  • 6. User identity experience in a typical company – still challengesBusiness applications placed on the company networkMany applications support SSO with odd ones out of SSO platformIAM platform
  • 7. User identity experience in a typical company with a number of 3rd parties3rd parties access company’s applications3rd parties providersOffering services to the businessBusiness applications placed on the company networkInternal Systems use IAM platformIAM platform
  • 8. User identity experience in a typical company with cloudCloud providersBusiness applications placed on the company networkMany applications support SSO with odd ones out of SSO platformIAM platform
  • 9. Put it all together and there are lots of challengesChallenges in internal IAM platforms and its implementationChallenges in accessing Cloud services and managing users identities and entitlementsChallenges in accessing 3rd party servicesChallenges in managing 3rd party access to company resourcesAdd the challenges with end users and their personal identities and the situation becomes very hard to manageMindset change resistance with lack of guidance and maturity models
  • 10. One personal identity?Use the identityCan I end up with just one identity?Issue an identityTrusted agency
  • 11. Business solutionSSO inside a companyIdentity federation and automated account provisioning with 3rd parties and cloud providers (in content provider mode)Inbound federation with 3rd parties (in identity provider mode)
  • 12. Solution for both?Cloud providersBusiness applications placed in the cloudGovernment trusted assured cloud identity brokerIAM platform
  • 13. Where are we today?Different assurance standards even for paper travel documents (such as passports) issued by different governmentSome government issue e-Identity – usually used for message signing and eGovernment portals accessIM cloud providers promised yet not emerging (is there a business model?)Technology supports the vision
  • 14. What next?Sort internal SSOCloud providers to support prominent cloud identity provider platformsDevelop world-wide standards for identity assurance – both business and government related (CAMM can help at least with the business side)Create business model for cloud providers to support new identity platforms

Editor's Notes

  • #4: A typical user has very big problem, without even realising it. Multitude of internet services require users to create “new account” and repeat the registration process all over again. This bring two problems:Multiple accounts to managePassword problemLet’s start with the first one. When I looked into my 1Password database this morning I counted 380 credential details for various websites and further 50 accounts for non web based services. It is truly incredible number and without the help of a password manager software I could not manage this exposition of accounts. That leads me us to the second problem – passwords, still, only supported authentication by most websites. Recent studies and security incidents have confirmed our suspicion: that people choose simple passwords and share it across many systems. This is not only problem for those users but also for companies. I will come to that later.Sheer number of various website guarantees that people will not use unique passwords and those password are unlikely to be anything considered strong. I believe people have desire to use one identity system across many resources and it is up to us, security professionals, business, service providers and also governments to come up with a usable system. The generation Y has shown us that bringing personal internet experiences and ways of working to business is inevitable. Many businesses banned Facebook few year ago, while many business now are allowing social networks to thrive amongst their employees. Times are changing. Inevitably we will be facing questions from new employees, such as “I want to use my Facebook, Google, Live ID to sign in to the network… What, it is not possible. You are so 2011.”
  • #5: I tried to illustrate some of the most popular websites on my password keying. I cannot reuse my credentials across any of them. Let’s now go to the business side of the problems.
  • #6: Business face even bigger challenges related to identities. The number of internal applications in business tends to rise with the size of the company. And if the businesses are not careful and operate good project and architecture governance, many of these applications might implement their own authentication and authorisation capabilities. The matter is also not helped by software vendors that, sometimes, require specific Idm system implementation in order for their application/system to operate correctly or even with a warranty.In the end an organisation may have a few IAM systems (AD, LDAP (many variations), Kerberos, PKI (many implementations)) which further confuses both company users and projects.Building on this complexity, companies also want to do business with 3rd parties. These trusted partners, trusted limited by the contract signed, need to access company resources (data and systems). The policy has always been that 3rd party users must have their named accounts created in the 1st party IAM systems. This brings a raft of challenge, such as managing the flow of the information about leavers and joiners between two companies; so my company can disable the accounts for users in your company. In effect I do not trust your company to manage your users properly, so I’d rather do it myself and control the process. In many cases this approach leads to ghost accounts of 3rd party users that still have access to my system, yet they have long left the 32rd party company.Final piece I the puzzle is the Cloud. The problem with cloud and identities in business is similar to the problems in the personal space. Unless the cloud provider and the business can agree and support compatible IAM architecture, the business users will need to use yet another credentials to access the cloud provide services. This is especially problem in SME sector, very same sector that is most likely to actually use Cloud services.However, on the other and, there is genuinely lack of a good trust assurance model that companies could use easily, scaled to their needs and most importantly agreeable by all parties.
  • #7: In this example the corporate user uses his personal device to access company applications. Just ignore the location of the user, intranet, internet for now. The company has one or many IAM platforms (pictures on the left). In many organisations this is Active directory also used to authenticate users to their computers. Now there are numerous applications available to the user. Again, ignore the location of the systems an the access path. In the example here, there on odd application that is not hooked into the company IAM system. Hence the user has to remember another set of credentials. These credential, usually set by user, are likely to be exactly the same as with in the company IAM system, obviously for convenience reasons. What that means to company risk profile? The company has spend considerable amount of money building secure IAM platform. Yet there is an odd system that potentially has not gone through the same security architecture and review process and this system is storing exactly same password for the user. I hope you see the point here. Your IAM platform is as weak as the weakest application that is not using your IAM platform.The lessons learned from this example is: build usable, extendable and secure IAM platform and push very hard to hook all company systems into it!
  • #8: Building on the example from the previous slide, this time we add 3rd party to the mix. The business has linked all internal systems with the company’s IAM platform. Great. Now there are 3rd party systems that need to be accessed. Same problems arise, if even one 3rd party application is not using user’s company’s IAM platform. The situation is even less clear as there potentially little visibility about security controls within the 3rd party application (second from the left).The problem is even is exaggerated by the fact that the likelihood of compatible IAM solution on provider and user side is obviously lower then if discussing just systems within one organisation. The provisioning of the accounts on the 3rd party side is also an issue to be resolved. Even if the organisations have compatible IAM platforms and can so SSO between them, the account provisioning is usually done by a batch process.And, as discussed before 3rd parties may also want to access internal resources in your organisation. Most organisations simply create internal accounts for these users, which brings several management and risk challenges.
  • #9: Finally, with the Cloud services fully on the radar or company CIOs the issue of 3rd parties is replicated with the cloud providers. In effect some 3rd parties could be classed as Cloud providers actually. Here, the problem of reused passwords is even bigger as many cloud based services (especially SaaS) do allow acess from anywhere on the internet. Hence, if a username and password is compromised your organisation has little control over who actually accesses the cloud application. Some cloud providers provide additional controls and can limit IP ranges that can login to the application – effectively linking information from the network layer with the application layer.
  • #10: Let’s now summarise the challenges that businesses face in IAM space:Unless all internal systems in the company network do utilise services of the internal IAM platform, the risk of credential compromise though leakage in these systems needs to managed. This in essence is a usually unaccounted for element in the business cases for common IAM platform. Accessing cloud services and making sure the access control is fit for purpose is a problem organisations need to face. The standards are evolving and not all cloud providers offer federation and SSO services.Outsourcing services to 3rd parties face exactly the same challenges though the likelihood of tailored solution with 3rd party is higher.If 3rdparties needs to access your company internal resources, the cost of management of their internal accounts is usually higher thnafor internal users. Also, the out of sync issues are hard to resolve. Companies are also cautious to trust 3rd party to manage their IAM processes. Companies will be tested on how they adapt their identity capabilities when it comes to the personal space – that is both employees accessing company resources and customers accessing your business services. As new models for identity assurance emerge (more on that later) companies will be forced by market forces to adapt these new frameworks.
  • #11: Recent NSTIC (NATIONAL STRATEGY FOR TRUSTED IDENTITIES IN CYBERSPACE) vision document shows the way forward where an identity ecosystem framework is created. Such a vision will require a lot of work both on the technology and also policies and processes side. Ultimately the decision needs to be give to people of what identity attributes are shared with the service provider, while the service provider needs to have reasonable (required) level of assurance that the identity provided is actually as stated. collection of trusted accredited identity providers issue
  • #14: Point out different standards for getting physical identity, this is likely to be replicated to eID. Especially if those physical documents are used to obtain the eID.I personally use the eID to digitally sign the documents. However cannot use it to gain access to websites.