SlideShare a Scribd company logo
1 of 30
Download to read offline
IDENTITY SOUFFLE
CREATING A WELL-BAKED IDENTITY LIFECYCLE
Pamela Dingle
@pamelarosiedee
Office of the CTO, Ping Identity
•  Heckler Policy
•  Platitudes
•  Meal Plan
•  Pantry Management (data at
rest)
•  Shopping – (data movement)
•  Kitchen Techniques (handling
data)
Agenda
This track is about breadth not depth
What does it mean to Manage Identities
•  Before you can chop
•  Before you can bake
•  Before you can serve
•  You need to know what
you’re trying to make
•  You have to have the right
ingredients in your pantry
Preparation is the key – Identity is State
“I” comes before “A” in IAM
1.  Create and maintain an
accurate picture of the
people, policies, and
resources in your
Enterprise
2.  Leverage that state to
protect and enable
Identity like Cooking is GIGO (garbage in, garbage out)
•  You can have the best
security in the world
– But it won’t help you if
decisions are based on
outdated identity
information
Review the Meal Plan Attribution: Daniel Headrick, G
Pantry Management : Identity Lifecycle
•  Accurate, timely knowledge of who and what constitutes your
Enterprise
–  Every system needs the right set of data in its reach
•  Accounts
•  Resources
•  Policies
–  Data must change everywhere when it is changed at the
authoritative source
•  You know you’re doing it wrong when
–  Your SOX audit finds dead people in application databases
–  It takes 5 days for a new hire to get access to applications
–  A fired employee can walk to Starbucks and download critical
business info from cloud applications
–  An employee has to chase a 100 application admins to change
their name
The Units of User Identity Lifecycle
•  Account
–  A relationship between a user and a
system
•  Identifier
–  Unique keys or “handles” for accounts
•  Username
•  GUID
•  Attribute
–  Distinct piece of information
•  Often a name/value pair
•  Values can be complex
•  Aka: Claim
•  Eg:
–  Name: Pamela
•  Where does data originate?
•  Where should it change?
•  What systems should also
change when authoritative
systems change?
•  Note this only shows data
replication, not the tools that
do the detecting or moving
•  Principle: SSOT or DRY
Track Data Relationship
Start by looking at Data at Rest
SOR HR System
Authoritative for: Account Status
name
department
employee#
Repo: Active Directory
Authoritative for: Identifier
email
groups
password
SOR: Social Networks
Authoritative for: Login Credential
nickname
Repo: MySQL
Authoritative for: Identifier
roles
enrollment date
Internal Apps
Internal APIs
Attribute Provider:
Billing System
Authoritative for: current plan
$$ spent
plan expiry
CC number
Sales Rep
Cloud Apps
Identifiers
•  Identifiers have a scope
–  Not every identifier is globally unique
–  Not every identifier has to be human readable
–  Identifiers can co-exist
•  Advice: standardize one “login id”
–  Best usability for users
–  Federation systems help here
•  Can map user-known id to system-known id
–  Maps may need to be maintained
Accounts
•  Presence/Status of Account is a preliminary access gate
•  When access is needed, pressure to create account is high
–  When access is discarded, no such pressure exists
•  Many [cloud] apps refuse to delete accounts
–  Only disable them
–  Discrepancies can cause havoc
–  Advice: create an identifier recycling plan
•  Hire John Smith (jsmith) & propagate accounts
•  Fire John Smith and hire Jane smith (jsmith)
Attributes
•  User attributes
–  Have an authoritative source
•  Can be self-asserted
–  Source is the identity owner
•  Can be “verified”
–  Source is authoritative and accountable
–  Some attributes are perishable
•  Name infrequently changes
•  Roles frequently change
•  Birthdate never changes
•  Credit rating should be fetched every time
•  Advice: standardize attribute name and format
where possible across systems (eg: date)
Pantry Staple: Directories
•  Directories are specialized
account and attribute
repositories
–  Meant to be used by multiple
applications
–  Highly fault tolerant and
distributed
–  Designed to be hierarchically
accessible via a standard
protocol: LDAP
So you think you know how to Stock the Pantry.
•  What’s next?
Provisioning!
•  Process of getting the right
information to the right
systems at the right time
– CRUD: create, replace, update,
delete based on events
•  Advice: automation reduces risk
Provisioning
•  Pushing accounts and attributes shouldn’t be hard
–  But it is. Many application vendors figure an admin console is
good enough.
•  Common options:
–  Batch (CSV/LDIF)
–  Backend database manipulation (not possible for cloud)
–  Provisioning API
–  SCIM
–  JIT Provisioning
Base elements of a provisioning architecture
•  Process
–  HR adds a new user via admin console
–  Manager requests a promotion for an
employee
–  Customer updates their self-service profile
•  Trigger
•  Attribute or account change detected in AD
•  Help Desk ticket triggers API call to a service
•  Business logic executes on data save
•  Admin gets an email
•  Fulfillment
–  Database row inserted
–  SCIM call made
Provisioning Map
•  Process,Trigger,
and Fulfillment
may all be
managed by
different people
•  A single process
often causes
multiple triggers
and fulfillments
SOR HR System
Authoritative for: Account Status
name
department
employee#
Repo: Active Directory
Authoritative for: Identifier
email
groups
password
SOR: Social Networks
Authoritative for: Login Credential
nickname
Repo: MySQL
Authoritative for: Identifier
roles
enrollment date
Internal Apps
Internal APIs
Attribute Provider:
Billing System
Authoritative for: current plan
$$ spent
plan expiry
CC number
Sales Rep
Cloud Apps
P:Admin App Interface
T: New DB Entry
F: LDAP insert T: New AD Entry
F: DB insert
T: New AD Entry
F: DB insert
T: New AD Entry
F: SCIM create
P: Self Service
T:API CAll
F: DB Delete
T: DB delete
F: SCIM delete
T: DB delete
F: DB delete
T: DB update
F:API call
T: DB delete
F: DB delete
Repo: Oracle
Authoritative for: Scopes
Access Tokens
T: DB delete
F:API Call token wipe
T: DB delete
F:API Call token wipe
T: DB delete
F: DB delete
Provisioning Solutions
•  Provisioning world is a mess
–  Old school provisioning about bypassing
the app
–  No pressure was ever put on vendors
•  Provisioning to the cloud cannot happen
without cooperation by cloud
application vendors
–  Many have no provisioning API
–  Others have proprietary provisioning
APIs
•  Which means provisioning efforts are
unique snowflakes
–  Best hope for the future is SCIM
SCIM
•  System for Cross-Domain Identity
•  It’s just a User Management REST API
–  That works the same way everywhere
•  Ingredients:
–  Users REST endpoint (minimum)
–  Basic Auth creds
•  or better yet, an OAuth access token
–  Create, delete, modify users on somebody else’s platform
HTTP Create to User Endpoint
{
"schemas":
[
"urn:scim:schemas:core:1.0”
],
"externalId":"bjensen”,
"userName":"bjensen",
"name”:
{
"familyName":"Jensen",
"givenName":"Barbara”
},
"emails":
[
{"value":bjensen@babs.com,"type":"work"}
]
}
JSON Returned
{
"userName":"bjensen",
"name”:
{
"familyName":"Jensen",
"givenName":"Barbara”
},
"userType":"basicUser",
"emails":
[
{"value":"bjensen@babs.com","type":"work"}
],
"meta":
{
"lastModified":"2014-06-23T22:56:07.263Z",
"created":"2014-06-23T22:56:07.263Z",
"location":https://gold.pinglabs.net:9031/pf-scim/v1/Users/29166
},
"id":"29166",
"schemas":["urn:scim:schemas:core:1.0"]
}
Just in Time Provisioning
•  Just in Time Provisioning is extremely useful for
customer systems
– System of Record is the Federation Server
– User created in application database the second a
SAML assertion arrives from an authoritative source
– Note: JIT provisioning often doesn’t handle de-prov
Provisioning Architecture
SOR HR System
Authoritative for: Account Status
name
department
employee#
Repo: Active Directory
Authoritative for: Identifier
email
groups
password
SOR: Social Networks
Authoritative for: Login Credential
nickname
Repo: MySQL
Authoritative for: Identifier
roles
enrollment date
Internal Apps
Internal APIs
Attribute Provider:
Billing System
Authoritative for: current plan
$$ spent
plan expiry
CC number
Sales Rep
Cloud Apps
F: DB insert
F: DB insert
T: New AD Entry
P: Self Service
T:API CAll
F: DB Delete
T: DB delete
F: SCIM delete
F: DB delete
T: DB delete
F: DB delete
Repo: Oracle
Authoritative for: Scopes
Access Tokens
T: DB delete
F:API Call token wipe
F:API Call token wipe
F: DB delete
Provisioning
System
F: SCIM create
F:API call
T: DB delete
P:Admin App Interface
T: New DB Entry
F: LDAP insert
Data Ownership & Provenance
•  Other issues you need to think of
–  Who owns the data?
•  Is consent needed to use or move the data?
–  Jurisdiction
•  Where was the data inputted and where can it legally go?
–  Governance
•  Can you prove that the system worked the way you mapped it
•  SOX Attestation
Identities in the Cloud
•  How do you redraw your map when your users live in
the cloud?
–  Architecture becomes fully API & federation driven
–  IDaaS creates a “cloud platform” for user identities
•  Processes are either part of the IDaaS Service or integrated via
API
–  The business must start to see itself as a service provider
Thanks!
@pamelarosiedee
http://pingidentity.com
http://eternallyoptimistic.com

More Related Content

Similar to CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle

CIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground UpCIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground UpCloudIDSummit
 
End-to-End Identity Management
End-to-End Identity ManagementEnd-to-End Identity Management
End-to-End Identity ManagementWSO2
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachQuest
 
Five Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityFive Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityMark Diodati
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
Getting to Flow You: A First Date with Flow Builder
Getting to Flow You: A First Date with Flow BuilderGetting to Flow You: A First Date with Flow Builder
Getting to Flow You: A First Date with Flow Buildersonumanoj
 
Cloud identity management meetup 150108
Cloud identity management meetup 150108Cloud identity management meetup 150108
Cloud identity management meetup 150108Morteza Ansari
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital TransformationWSO2
 
CIS14: How I Came to Share Signals and Learned to Love my Identity System
CIS14: How I Came to Share Signals and Learned to Love my Identity SystemCIS14: How I Came to Share Signals and Learned to Love my Identity System
CIS14: How I Came to Share Signals and Learned to Love my Identity SystemCloudIDSummit
 
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)ForgeRock
 
Stop treating your customers like your employees
Stop treating your customers like your employeesStop treating your customers like your employees
Stop treating your customers like your employeesIan Glazer
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014Kelly Grizzle
 
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You ThinkCIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You ThinkCloudIDSummit
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborationsjbasney
 
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed WorldCIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed WorldCloudIDSummit
 

Similar to CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle (20)

CIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground UpCIS14: Identity at Scale: Building from the Ground Up
CIS14: Identity at Scale: Building from the Ground Up
 
End-to-End Identity Management
End-to-End Identity ManagementEnd-to-End Identity Management
End-to-End Identity Management
 
Reducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security BreachReducing the Chance of an Office 365 Security Breach
Reducing the Chance of an Office 365 Security Breach
 
Five Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityFive Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern Identity
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Getting to Flow You: A First Date with Flow Builder
Getting to Flow You: A First Date with Flow BuilderGetting to Flow You: A First Date with Flow Builder
Getting to Flow You: A First Date with Flow Builder
 
Cloud identity management meetup 150108
Cloud identity management meetup 150108Cloud identity management meetup 150108
Cloud identity management meetup 150108
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
 
CIS14: How I Came to Share Signals and Learned to Love my Identity System
CIS14: How I Came to Share Signals and Learned to Love my Identity SystemCIS14: How I Came to Share Signals and Learned to Love my Identity System
CIS14: How I Came to Share Signals and Learned to Love my Identity System
 
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
Stop Treating Your Customers Like Your Employees (Ian Glazer, Salesforce)
 
Stop treating your customers like your employees
Stop treating your customers like your employeesStop treating your customers like your employees
Stop treating your customers like your employees
 
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
SCIM: Why It’s More Important, and More Simple, Than You Think - CIS 2014
 
Dell active roles
Dell active roles Dell active roles
Dell active roles
 
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You ThinkCIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
CIS14: SCIM: Why It’s More Important, and More Simple, Than You Think
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 
Trusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research CollaborationsTrusting External Identity Providers for Global Research Collaborations
Trusting External Identity Providers for Global Research Collaborations
 
Human Resources & IT: A Marriage Made in Heaven?
Human Resources & IT: A Marriage Made in Heaven?Human Resources & IT: A Marriage Made in Heaven?
Human Resources & IT: A Marriage Made in Heaven?
 
AI & AWS DeepComposer
AI & AWS DeepComposerAI & AWS DeepComposer
AI & AWS DeepComposer
 
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed WorldCIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World
CIS13: Deploying an Identity Provider in a Complex, Federated and Siloed World
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 

More from CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCloudIDSummit
 

More from CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin WiltonCIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 The Ethics of Personal Data - Robin Wilton
 

Recently uploaded

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

CIS14: Identity Souffle: Creating a Well-baked Identity Lifecycle

  • 1.
  • 2. IDENTITY SOUFFLE CREATING A WELL-BAKED IDENTITY LIFECYCLE Pamela Dingle @pamelarosiedee Office of the CTO, Ping Identity
  • 3. •  Heckler Policy •  Platitudes •  Meal Plan •  Pantry Management (data at rest) •  Shopping – (data movement) •  Kitchen Techniques (handling data) Agenda
  • 4. This track is about breadth not depth
  • 5. What does it mean to Manage Identities •  Before you can chop •  Before you can bake •  Before you can serve •  You need to know what you’re trying to make •  You have to have the right ingredients in your pantry
  • 6. Preparation is the key – Identity is State “I” comes before “A” in IAM 1.  Create and maintain an accurate picture of the people, policies, and resources in your Enterprise 2.  Leverage that state to protect and enable
  • 7. Identity like Cooking is GIGO (garbage in, garbage out) •  You can have the best security in the world – But it won’t help you if decisions are based on outdated identity information
  • 8. Review the Meal Plan Attribution: Daniel Headrick, G
  • 9. Pantry Management : Identity Lifecycle •  Accurate, timely knowledge of who and what constitutes your Enterprise –  Every system needs the right set of data in its reach •  Accounts •  Resources •  Policies –  Data must change everywhere when it is changed at the authoritative source •  You know you’re doing it wrong when –  Your SOX audit finds dead people in application databases –  It takes 5 days for a new hire to get access to applications –  A fired employee can walk to Starbucks and download critical business info from cloud applications –  An employee has to chase a 100 application admins to change their name
  • 10. The Units of User Identity Lifecycle •  Account –  A relationship between a user and a system •  Identifier –  Unique keys or “handles” for accounts •  Username •  GUID •  Attribute –  Distinct piece of information •  Often a name/value pair •  Values can be complex •  Aka: Claim •  Eg: –  Name: Pamela
  • 11. •  Where does data originate? •  Where should it change? •  What systems should also change when authoritative systems change? •  Note this only shows data replication, not the tools that do the detecting or moving •  Principle: SSOT or DRY Track Data Relationship Start by looking at Data at Rest SOR HR System Authoritative for: Account Status name department employee# Repo: Active Directory Authoritative for: Identifier email groups password SOR: Social Networks Authoritative for: Login Credential nickname Repo: MySQL Authoritative for: Identifier roles enrollment date Internal Apps Internal APIs Attribute Provider: Billing System Authoritative for: current plan $$ spent plan expiry CC number Sales Rep Cloud Apps
  • 12. Identifiers •  Identifiers have a scope –  Not every identifier is globally unique –  Not every identifier has to be human readable –  Identifiers can co-exist •  Advice: standardize one “login id” –  Best usability for users –  Federation systems help here •  Can map user-known id to system-known id –  Maps may need to be maintained
  • 13. Accounts •  Presence/Status of Account is a preliminary access gate •  When access is needed, pressure to create account is high –  When access is discarded, no such pressure exists •  Many [cloud] apps refuse to delete accounts –  Only disable them –  Discrepancies can cause havoc –  Advice: create an identifier recycling plan •  Hire John Smith (jsmith) & propagate accounts •  Fire John Smith and hire Jane smith (jsmith)
  • 14. Attributes •  User attributes –  Have an authoritative source •  Can be self-asserted –  Source is the identity owner •  Can be “verified” –  Source is authoritative and accountable –  Some attributes are perishable •  Name infrequently changes •  Roles frequently change •  Birthdate never changes •  Credit rating should be fetched every time •  Advice: standardize attribute name and format where possible across systems (eg: date)
  • 15. Pantry Staple: Directories •  Directories are specialized account and attribute repositories –  Meant to be used by multiple applications –  Highly fault tolerant and distributed –  Designed to be hierarchically accessible via a standard protocol: LDAP
  • 16. So you think you know how to Stock the Pantry. •  What’s next?
  • 17.
  • 18. Provisioning! •  Process of getting the right information to the right systems at the right time – CRUD: create, replace, update, delete based on events •  Advice: automation reduces risk
  • 19. Provisioning •  Pushing accounts and attributes shouldn’t be hard –  But it is. Many application vendors figure an admin console is good enough. •  Common options: –  Batch (CSV/LDIF) –  Backend database manipulation (not possible for cloud) –  Provisioning API –  SCIM –  JIT Provisioning
  • 20. Base elements of a provisioning architecture •  Process –  HR adds a new user via admin console –  Manager requests a promotion for an employee –  Customer updates their self-service profile •  Trigger •  Attribute or account change detected in AD •  Help Desk ticket triggers API call to a service •  Business logic executes on data save •  Admin gets an email •  Fulfillment –  Database row inserted –  SCIM call made
  • 21. Provisioning Map •  Process,Trigger, and Fulfillment may all be managed by different people •  A single process often causes multiple triggers and fulfillments SOR HR System Authoritative for: Account Status name department employee# Repo: Active Directory Authoritative for: Identifier email groups password SOR: Social Networks Authoritative for: Login Credential nickname Repo: MySQL Authoritative for: Identifier roles enrollment date Internal Apps Internal APIs Attribute Provider: Billing System Authoritative for: current plan $$ spent plan expiry CC number Sales Rep Cloud Apps P:Admin App Interface T: New DB Entry F: LDAP insert T: New AD Entry F: DB insert T: New AD Entry F: DB insert T: New AD Entry F: SCIM create P: Self Service T:API CAll F: DB Delete T: DB delete F: SCIM delete T: DB delete F: DB delete T: DB update F:API call T: DB delete F: DB delete Repo: Oracle Authoritative for: Scopes Access Tokens T: DB delete F:API Call token wipe T: DB delete F:API Call token wipe T: DB delete F: DB delete
  • 22. Provisioning Solutions •  Provisioning world is a mess –  Old school provisioning about bypassing the app –  No pressure was ever put on vendors •  Provisioning to the cloud cannot happen without cooperation by cloud application vendors –  Many have no provisioning API –  Others have proprietary provisioning APIs •  Which means provisioning efforts are unique snowflakes –  Best hope for the future is SCIM
  • 23. SCIM •  System for Cross-Domain Identity •  It’s just a User Management REST API –  That works the same way everywhere •  Ingredients: –  Users REST endpoint (minimum) –  Basic Auth creds •  or better yet, an OAuth access token –  Create, delete, modify users on somebody else’s platform
  • 24. HTTP Create to User Endpoint { "schemas": [ "urn:scim:schemas:core:1.0” ], "externalId":"bjensen”, "userName":"bjensen", "name”: { "familyName":"Jensen", "givenName":"Barbara” }, "emails": [ {"value":bjensen@babs.com,"type":"work"} ] }
  • 26. Just in Time Provisioning •  Just in Time Provisioning is extremely useful for customer systems – System of Record is the Federation Server – User created in application database the second a SAML assertion arrives from an authoritative source – Note: JIT provisioning often doesn’t handle de-prov
  • 27. Provisioning Architecture SOR HR System Authoritative for: Account Status name department employee# Repo: Active Directory Authoritative for: Identifier email groups password SOR: Social Networks Authoritative for: Login Credential nickname Repo: MySQL Authoritative for: Identifier roles enrollment date Internal Apps Internal APIs Attribute Provider: Billing System Authoritative for: current plan $$ spent plan expiry CC number Sales Rep Cloud Apps F: DB insert F: DB insert T: New AD Entry P: Self Service T:API CAll F: DB Delete T: DB delete F: SCIM delete F: DB delete T: DB delete F: DB delete Repo: Oracle Authoritative for: Scopes Access Tokens T: DB delete F:API Call token wipe F:API Call token wipe F: DB delete Provisioning System F: SCIM create F:API call T: DB delete P:Admin App Interface T: New DB Entry F: LDAP insert
  • 28. Data Ownership & Provenance •  Other issues you need to think of –  Who owns the data? •  Is consent needed to use or move the data? –  Jurisdiction •  Where was the data inputted and where can it legally go? –  Governance •  Can you prove that the system worked the way you mapped it •  SOX Attestation
  • 29. Identities in the Cloud •  How do you redraw your map when your users live in the cloud? –  Architecture becomes fully API & federation driven –  IDaaS creates a “cloud platform” for user identities •  Processes are either part of the IDaaS Service or integrated via API –  The business must start to see itself as a service provider