SlideShare a Scribd company logo
1 of 15
IDaaS: a missing gap for moving
enterprise applications in Inter-
cloud
Hoang Tri Vo
Cloud Architect, Deutsche Telekom
Frankfurt, 20.07.2016
On behalf of
Prof. Dr. Woldemar Fuhrmann, Darmstadt University of Applied Sciences
Dr. Klaus-Peter Fischer-Hellmann, Digamma GmbH
Agenda
Identity-as-a-Service: a missing gap for moving enterprise applications in Inter-Cloud
18.07.2016 2Hoang Tri Vo / Identity As A Service
2. Why moving?
(Motivating scenario)
1. What is a traditional
Identity Management?
3. Definition?
Requirements?
Proposed model?
1. introduction
traditional identity management
Applications trusts an Identity Provider (IdP) for issuing user attributes
• Applications implement security token request / response (SAML, WS-Trust, WS-Federation)
• Mapping attribute assertion issued by IdP to applications
• Applications & IdP exchange trust credentials
18.07.2016Hoang Tri Vo / Identity As A Service 3
One application : n users
• RBAC: access control based on roles of authenticated users
• Access control in implementation codes  only developers can understand
m applications : n users
1. introduction
Attribute based access control (ABAC) [2]
18.07.2016Hoang Tri Vo / Identity As A Service 4
• Access control based on user attributes
• Security policy stored in Policy Decision Point (PDP), controlled by admin at runtime
Identity as a service
definition [3]
18.07.2016Hoang Tri Vo / Identity As A Service 5
An approach to identity management in which an entity (individual or organization) relies on special
service provider’s functionalities that allows the entity to perform an electronic transaction, which
requires identity data managed by this provider.
2. Motivating scenarios
dynamic sso
18.07.2016Hoang Tri Vo / Identity As A Service 6
Scenario: an Office service migrates to a (SaaS) Cloud provider
Problems:
• SaaS Cloud provider has existing users who want to use the new Office service.
• Office service has local users who want to use SaaS Storage service.
Traditional solution:
• Cloud provider implements Identity Provider (IdP) for SSO
• Manual adaptation of Office service to IdP
2. Motivating scenarios
dynamic service integration
18.07.2016Hoang Tri Vo / Identity As A Service 7
Scenario:
• In Cloud A, users who use Office service, also use Storage service
• Office service wants to support its users by using Storage service as its service backend
Problems:
• Office service might migrate to Cloud B
• As an Independent Software Vendor (ISV), office service does not want to change its implementation
on any target Cloud platforms
2. Motivating scenarios
identity roaming
18.07.2016Hoang Tri Vo / Identity As A Service 8
Scenario:
• Bob lives in Germany and plays online game (interactive application)
• Bob shortly visits a country in Asia
Problems:
• Application access control (in Asia) requires Bob‘s attributes (in Germany)  200 ms latency
• We need to federate user attributes temporally (from Germany to Asia)
• Problem EU Data Protection Directive: personal information may not be disclosed in another country
3. idaas
requirements
18.07.2016Hoang Tri Vo / Identity As A Service 9
What do we have so far?
• Dynamic SSO between Cloud services and IdP
• Dynamic service integration between Cloud services (frequent provisioning/deprovisioning)
• Identity roaming within federated security domains
Requirements:
We extend „the seventh laws of identity“ of Kim Cameron [4] (for traditional IDM) with:
1. Authentication and Authorization Infrastructure (AAI) as a service
• Decoupling security handling from application logic
• AAI implementation is provided by Cloud provider (Cloud platform specific solution)
• Application admin can control the lifecycle of AAI together with lifecycle of Cloud service
(provisioning, update, termination)
2. Privacy-aware access control for identity roaming
3. idaas
proposed trust model
18.07.2016Hoang Tri Vo / Identity As A Service 10
• Trust establishment should take advantages of exiting trust relationships:
• Users trust their home provider: to provide lawful SPs, to protect user privacy
• SPs trust their home provider: to provide natural users (individuals, organizations)
• Automated trust negotiation between users and an SP in the same local domain as well as between
federated domains is the responsibility of home IDaaS and not of the SPs
• SPs should only concentrate on developing and providing their business services
3. idaas
proposed Components
18.07.2016Hoang Tri Vo / Identity As A Service 11
Reuse the reference architecture of XACML [2] with additional extentions:
• Policy Information Point may be an internal/external service outside a Cloud provider, where users
have billing contracts (e.g., mobile network operators etc).
• Application architects describe AAI (security topology) of the application.
• An orchestration engine reads security topology & controls the life cycle of Policy Enforcement Point
and Policy Decision Point at runtime
4. Future work
security lifecycle management Example
18.07.2016Hoang Tri Vo / Identity As A Service 12
1. Modelling application topology incl. Security components
I want to protect my application APIs. A service can access
the APIs on behalf of a logged-in user. The proxy and the
APIs should be in different hosts
 We may extend TOSCA metamodel (an Open Standard for Topology and Orchestration
Specification for Cloud Applications) for describing security topology of Cloud applications
4. Future work
security lifecycle management Example
18.07.2016Hoang Tri Vo / Identity As A Service 13
2. Provisioning application on a Cloud provider according to the topology description
3. Auto generate integration tests
summary
18.07.2016Hoang Tri Vo / Identity As A Service 14
Tradtional IDM IDaaS
SP Provide services for trusted third-party
users (that they do not directly manage)
Outsource IDM to a Cloud provider (to control
its life cycle) due to dynamic provisioning /
deprovisioning of the Cloud application
User Associate user identities from various
SPs with one another
Support user to protect his privacy between
federated security domains
References
(1) N. Grozev and R. Buyya, “Inter-Cloud architectures and application brokering: Taxonomy and survey,” Softw. - Pract. Exp., vol. 44, no. 3, pp.
369–390, 2014.
(2) eXtensible Access Control Markup Language (XACML) Version 3.0,” OASIS Standard, 2013. [Online]. Available: http://docs.oasis-
open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html.
(3) “Identity in the Cloud Use Cases Version 1.0,” OASIS Committee Note 01, 2012. [Online]. Available: http://docs.oasis-open.org/id-
cloud/IDCloud-usecases/v1.0/cn01/IDCloud-usecases-v1.0-cn01.html.“
(4) D. Chadwick, “Federated Identity Management,” in Foundations of Security Analysis and Design V SE - 3, vol. 5705, A. Aldini, G. Barthe, and R.
Gorrieri, Eds. Springer Berlin Heidelberg, 2009, pp. 96–120.
(5) “Topology and Orchestration Specification for Cloud Applications,” OASIS, 2013. [Online]. Available: http://docs.oasis-
open.org/tosca/TOSCA/v1.0/cs01/TOSCA-v1.0-cs01.html.
(6) K. Rannenberg, J. Camenisch, and S. Ahmad, Attribute-based Credentials for Trust. Springer, 2015.
18.07.2016 15Tri Hoang Vo/ Identity As A Service

More Related Content

What's hot

T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.ForgeRock
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference ArchitectureHannu Kasanen
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a PriorityOkta-Inc
 
IntraLinks Company Overview
IntraLinks Company OverviewIntraLinks Company Overview
IntraLinks Company Overviewtillbrennan
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsAlain Huet
 
Greytower identity Overview
Greytower identity  OverviewGreytower identity  Overview
Greytower identity OverviewWilliam Brant
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyDavid J Rosenthal
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise ReportOkta-Inc
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0Ganesh Prasad
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementPrashanth BS
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Sverige
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesOneLogin
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Jack Forbes
 

What's hot (20)

T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access management
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference Architecture
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
IntraLinks Company Overview
IntraLinks Company OverviewIntraLinks Company Overview
IntraLinks Company Overview
 
Identity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling conceptsIdentity and Access Management - Data modeling concepts
Identity and Access Management - Data modeling concepts
 
Greytower identity Overview
Greytower identity  OverviewGreytower identity  Overview
Greytower identity Overview
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
Prashant Saxena Business briefing Okta
Prashant Saxena Business briefing OktaPrashant Saxena Business briefing Okta
Prashant Saxena Business briefing Okta
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 

Viewers also liked

IDaaS. The Now Big Thing
IDaaS. The Now Big ThingIDaaS. The Now Big Thing
IDaaS. The Now Big ThingNishant Kaushik
 
Secure Amazon EC2 Environment with AWS IAM & Resource-Based Permissions (CPN2...
Secure Amazon EC2 Environment with AWS IAM & Resource-Based Permissions (CPN2...Secure Amazon EC2 Environment with AWS IAM & Resource-Based Permissions (CPN2...
Secure Amazon EC2 Environment with AWS IAM & Resource-Based Permissions (CPN2...Amazon Web Services
 
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or LessAmazon Web Services
 
The Cloud Skills Gap Opportunity for Training and Consulting Companies
The Cloud Skills Gap Opportunity for Training and Consulting CompaniesThe Cloud Skills Gap Opportunity for Training and Consulting Companies
The Cloud Skills Gap Opportunity for Training and Consulting CompaniesITpreneurs
 
Closing the Cloud Skills Gap
Closing the Cloud Skills GapClosing the Cloud Skills Gap
Closing the Cloud Skills GapScott Lowe
 
Oracle Security: Bridging the gap between enterprise and cloud
Oracle Security: Bridging the gap between enterprise and cloudOracle Security: Bridging the gap between enterprise and cloud
Oracle Security: Bridging the gap between enterprise and cloudNormand Sauve
 
Technology executive summary
Technology executive summaryTechnology executive summary
Technology executive summaryNaman Kumar
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementManish Harsh
 
CIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity ServiceCIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity ServiceCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleEnterpriseGRC Solutions, Inc.
 
Building IAM for OpenStack
Building IAM for OpenStackBuilding IAM for OpenStack
Building IAM for OpenStackSteve Martinelli
 
OpenStack keystone identity service
OpenStack keystone identity serviceOpenStack keystone identity service
OpenStack keystone identity serviceopenstackindia
 
(SEC307) A Progressive Journey Through AWS IAM Federation Options
(SEC307) A Progressive Journey Through AWS IAM Federation Options(SEC307) A Progressive Journey Through AWS IAM Federation Options
(SEC307) A Progressive Journey Through AWS IAM Federation OptionsAmazon Web Services
 
AWS IAM and security
AWS IAM and securityAWS IAM and security
AWS IAM and securityErik Paulsson
 
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...oow123
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationDelivery Centric
 

Viewers also liked (20)

IDaaS. The Now Big Thing
IDaaS. The Now Big ThingIDaaS. The Now Big Thing
IDaaS. The Now Big Thing
 
Secure Amazon EC2 Environment with AWS IAM & Resource-Based Permissions (CPN2...
Secure Amazon EC2 Environment with AWS IAM & Resource-Based Permissions (CPN2...Secure Amazon EC2 Environment with AWS IAM & Resource-Based Permissions (CPN2...
Secure Amazon EC2 Environment with AWS IAM & Resource-Based Permissions (CPN2...
 
IAM Best Practices
IAM Best PracticesIAM Best Practices
IAM Best Practices
 
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
 
The Cloud Skills Gap Opportunity for Training and Consulting Companies
The Cloud Skills Gap Opportunity for Training and Consulting CompaniesThe Cloud Skills Gap Opportunity for Training and Consulting Companies
The Cloud Skills Gap Opportunity for Training and Consulting Companies
 
Closing the Cloud Skills Gap
Closing the Cloud Skills GapClosing the Cloud Skills Gap
Closing the Cloud Skills Gap
 
Oracle Security: Bridging the gap between enterprise and cloud
Oracle Security: Bridging the gap between enterprise and cloudOracle Security: Bridging the gap between enterprise and cloud
Oracle Security: Bridging the gap between enterprise and cloud
 
Technology executive summary
Technology executive summaryTechnology executive summary
Technology executive summary
 
SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
 
CIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity ServiceCIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity Service
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
Identity as a Service
Identity as a ServiceIdentity as a Service
Identity as a Service
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
 
Building IAM for OpenStack
Building IAM for OpenStackBuilding IAM for OpenStack
Building IAM for OpenStack
 
OpenStack keystone identity service
OpenStack keystone identity serviceOpenStack keystone identity service
OpenStack keystone identity service
 
(SEC307) A Progressive Journey Through AWS IAM Federation Options
(SEC307) A Progressive Journey Through AWS IAM Federation Options(SEC307) A Progressive Journey Through AWS IAM Federation Options
(SEC307) A Progressive Journey Through AWS IAM Federation Options
 
AWS IAM and security
AWS IAM and securityAWS IAM and security
AWS IAM and security
 
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 

Similar to Identity as a Service: a missing gap for moving enterprise applications in Inter-Cloud

How to Adapt Authentication and Authorization Infrastructure of Applications ...
How to Adapt Authentication and Authorization Infrastructure of Applications ...How to Adapt Authentication and Authorization Infrastructure of Applications ...
How to Adapt Authentication and Authorization Infrastructure of Applications ...Hoang Tri Vo
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit satIAESIJEECS
 
Cloud Use Cases And Standards
Cloud Use Cases And StandardsCloud Use Cases And Standards
Cloud Use Cases And StandardsGovCloud Network
 
MajorProject_AnilSharma
MajorProject_AnilSharmaMajorProject_AnilSharma
MajorProject_AnilSharmaAnil Sharma
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Standards Customer Council
 
Cloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patternsCloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patternsIJERA Editor
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and ChallengesIRJET Journal
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...IRJET Journal
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET Journal
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
IRJET- Proficient Business Solutions through Cloud Services
IRJET- Proficient Business Solutions through Cloud ServicesIRJET- Proficient Business Solutions through Cloud Services
IRJET- Proficient Business Solutions through Cloud ServicesIRJET Journal
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud ComputingIRJET Journal
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computingPuneet Arora
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computingHossam Zein
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 

Similar to Identity as a Service: a missing gap for moving enterprise applications in Inter-Cloud (20)

How to Adapt Authentication and Authorization Infrastructure of Applications ...
How to Adapt Authentication and Authorization Infrastructure of Applications ...How to Adapt Authentication and Authorization Infrastructure of Applications ...
How to Adapt Authentication and Authorization Infrastructure of Applications ...
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat5. ijece guideforauthors 2012 edit sat
5. ijece guideforauthors 2012 edit sat
 
Cloud Use Cases And Standards
Cloud Use Cases And StandardsCloud Use Cases And Standards
Cloud Use Cases And Standards
 
MajorProject_AnilSharma
MajorProject_AnilSharmaMajorProject_AnilSharma
MajorProject_AnilSharma
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services
 
Cloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patternsCloud Computing: A study of cloud architecture and its patterns
Cloud Computing: A study of cloud architecture and its patterns
 
IRJET- An Overview on Cloud Computing and Challenges
IRJET-  	  An Overview on Cloud Computing and ChallengesIRJET-  	  An Overview on Cloud Computing and Challenges
IRJET- An Overview on Cloud Computing and Challenges
 
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
Cloud Computing: Its Applications and Security Issues (A Major Challenge in C...
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
 
SECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTINGSECURITY ISSUES IN CLOUD COMPUTING
SECURITY ISSUES IN CLOUD COMPUTING
 
An Intro to Cloud Computing
An Intro to Cloud ComputingAn Intro to Cloud Computing
An Intro to Cloud Computing
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
IRJET- Proficient Business Solutions through Cloud Services
IRJET- Proficient Business Solutions through Cloud ServicesIRJET- Proficient Business Solutions through Cloud Services
IRJET- Proficient Business Solutions through Cloud Services
 
IRJET- Single to Multi Cloud Data Security in Cloud Computing
IRJET-  	  Single to Multi Cloud Data Security in Cloud ComputingIRJET-  	  Single to Multi Cloud Data Security in Cloud Computing
IRJET- Single to Multi Cloud Data Security in Cloud Computing
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Identity as a Service: a missing gap for moving enterprise applications in Inter-Cloud

  • 1. IDaaS: a missing gap for moving enterprise applications in Inter- cloud Hoang Tri Vo Cloud Architect, Deutsche Telekom Frankfurt, 20.07.2016 On behalf of Prof. Dr. Woldemar Fuhrmann, Darmstadt University of Applied Sciences Dr. Klaus-Peter Fischer-Hellmann, Digamma GmbH
  • 2. Agenda Identity-as-a-Service: a missing gap for moving enterprise applications in Inter-Cloud 18.07.2016 2Hoang Tri Vo / Identity As A Service 2. Why moving? (Motivating scenario) 1. What is a traditional Identity Management? 3. Definition? Requirements? Proposed model?
  • 3. 1. introduction traditional identity management Applications trusts an Identity Provider (IdP) for issuing user attributes • Applications implement security token request / response (SAML, WS-Trust, WS-Federation) • Mapping attribute assertion issued by IdP to applications • Applications & IdP exchange trust credentials 18.07.2016Hoang Tri Vo / Identity As A Service 3 One application : n users • RBAC: access control based on roles of authenticated users • Access control in implementation codes  only developers can understand m applications : n users
  • 4. 1. introduction Attribute based access control (ABAC) [2] 18.07.2016Hoang Tri Vo / Identity As A Service 4 • Access control based on user attributes • Security policy stored in Policy Decision Point (PDP), controlled by admin at runtime
  • 5. Identity as a service definition [3] 18.07.2016Hoang Tri Vo / Identity As A Service 5 An approach to identity management in which an entity (individual or organization) relies on special service provider’s functionalities that allows the entity to perform an electronic transaction, which requires identity data managed by this provider.
  • 6. 2. Motivating scenarios dynamic sso 18.07.2016Hoang Tri Vo / Identity As A Service 6 Scenario: an Office service migrates to a (SaaS) Cloud provider Problems: • SaaS Cloud provider has existing users who want to use the new Office service. • Office service has local users who want to use SaaS Storage service. Traditional solution: • Cloud provider implements Identity Provider (IdP) for SSO • Manual adaptation of Office service to IdP
  • 7. 2. Motivating scenarios dynamic service integration 18.07.2016Hoang Tri Vo / Identity As A Service 7 Scenario: • In Cloud A, users who use Office service, also use Storage service • Office service wants to support its users by using Storage service as its service backend Problems: • Office service might migrate to Cloud B • As an Independent Software Vendor (ISV), office service does not want to change its implementation on any target Cloud platforms
  • 8. 2. Motivating scenarios identity roaming 18.07.2016Hoang Tri Vo / Identity As A Service 8 Scenario: • Bob lives in Germany and plays online game (interactive application) • Bob shortly visits a country in Asia Problems: • Application access control (in Asia) requires Bob‘s attributes (in Germany)  200 ms latency • We need to federate user attributes temporally (from Germany to Asia) • Problem EU Data Protection Directive: personal information may not be disclosed in another country
  • 9. 3. idaas requirements 18.07.2016Hoang Tri Vo / Identity As A Service 9 What do we have so far? • Dynamic SSO between Cloud services and IdP • Dynamic service integration between Cloud services (frequent provisioning/deprovisioning) • Identity roaming within federated security domains Requirements: We extend „the seventh laws of identity“ of Kim Cameron [4] (for traditional IDM) with: 1. Authentication and Authorization Infrastructure (AAI) as a service • Decoupling security handling from application logic • AAI implementation is provided by Cloud provider (Cloud platform specific solution) • Application admin can control the lifecycle of AAI together with lifecycle of Cloud service (provisioning, update, termination) 2. Privacy-aware access control for identity roaming
  • 10. 3. idaas proposed trust model 18.07.2016Hoang Tri Vo / Identity As A Service 10 • Trust establishment should take advantages of exiting trust relationships: • Users trust their home provider: to provide lawful SPs, to protect user privacy • SPs trust their home provider: to provide natural users (individuals, organizations) • Automated trust negotiation between users and an SP in the same local domain as well as between federated domains is the responsibility of home IDaaS and not of the SPs • SPs should only concentrate on developing and providing their business services
  • 11. 3. idaas proposed Components 18.07.2016Hoang Tri Vo / Identity As A Service 11 Reuse the reference architecture of XACML [2] with additional extentions: • Policy Information Point may be an internal/external service outside a Cloud provider, where users have billing contracts (e.g., mobile network operators etc). • Application architects describe AAI (security topology) of the application. • An orchestration engine reads security topology & controls the life cycle of Policy Enforcement Point and Policy Decision Point at runtime
  • 12. 4. Future work security lifecycle management Example 18.07.2016Hoang Tri Vo / Identity As A Service 12 1. Modelling application topology incl. Security components I want to protect my application APIs. A service can access the APIs on behalf of a logged-in user. The proxy and the APIs should be in different hosts  We may extend TOSCA metamodel (an Open Standard for Topology and Orchestration Specification for Cloud Applications) for describing security topology of Cloud applications
  • 13. 4. Future work security lifecycle management Example 18.07.2016Hoang Tri Vo / Identity As A Service 13 2. Provisioning application on a Cloud provider according to the topology description 3. Auto generate integration tests
  • 14. summary 18.07.2016Hoang Tri Vo / Identity As A Service 14 Tradtional IDM IDaaS SP Provide services for trusted third-party users (that they do not directly manage) Outsource IDM to a Cloud provider (to control its life cycle) due to dynamic provisioning / deprovisioning of the Cloud application User Associate user identities from various SPs with one another Support user to protect his privacy between federated security domains
  • 15. References (1) N. Grozev and R. Buyya, “Inter-Cloud architectures and application brokering: Taxonomy and survey,” Softw. - Pract. Exp., vol. 44, no. 3, pp. 369–390, 2014. (2) eXtensible Access Control Markup Language (XACML) Version 3.0,” OASIS Standard, 2013. [Online]. Available: http://docs.oasis- open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html. (3) “Identity in the Cloud Use Cases Version 1.0,” OASIS Committee Note 01, 2012. [Online]. Available: http://docs.oasis-open.org/id- cloud/IDCloud-usecases/v1.0/cn01/IDCloud-usecases-v1.0-cn01.html.“ (4) D. Chadwick, “Federated Identity Management,” in Foundations of Security Analysis and Design V SE - 3, vol. 5705, A. Aldini, G. Barthe, and R. Gorrieri, Eds. Springer Berlin Heidelberg, 2009, pp. 96–120. (5) “Topology and Orchestration Specification for Cloud Applications,” OASIS, 2013. [Online]. Available: http://docs.oasis- open.org/tosca/TOSCA/v1.0/cs01/TOSCA-v1.0-cs01.html. (6) K. Rannenberg, J. Camenisch, and S. Ahmad, Attribute-based Credentials for Trust. Springer, 2015. 18.07.2016 15Tri Hoang Vo/ Identity As A Service