Secure Cloud Computing with SkIDentity: A Cloud- Teamroom for the Automotive Industry
|
|
|
- Jocelyn Porter
- 10 years ago
- Views:
Transcription
1 Secure Cloud Computing with SkIDentity: A Cloud- Teamroom for the Automotive Industry Michael Kubach, Fraunhofer IAO Nobelstr. 12, Stuttgart [email protected] Eray Özmü, Universität Stuttgart Nobelstr. 12, Stuttgart [email protected] Guntram Flach, Fraunhofer IGD Joachim-Jungius-Str. 11, Rostock [email protected] Abstract: A major security-challenge in the automotive industry is to enable the secure and flexible engineering cooperation with changing partners in complex development projects. Therefore an effective interorganizational identity management is needed to control access to cooperative development platforms. This identity management has to be based on reliable identification of engineers of various partners with different credentials. The SkIDentity-Project, that aims to build trusted identities for the cloud, addresses this scenario. By integrating the existing components, services and trust infrastructures into a comprehensive, legally valid and economically viable identity infrastructure the technology enables to provide trusted identities for the cloud and secure complete business processes and value chains. One pilot-application of the project is the Cloud-Teamroom for the Automotive Industry. It is adjusted to the specific requirements of the value chains in the automotive industry. Thanks to the SkIDentity-Technology, and via the so-called eid-broker, engineers from different partners can access the cloudteamroom. For the required strong authentication they can use the credentials that are already available in their company. This paper presents the SkIDentitytechnology and exemplifies it by means of the pilot-application. 1 Introduction Trustworthy cloud computing requires secure and reliable mechanisms for authentication. At the same time user interfaces and authentication processes have to be designed as user-friendly as possible to achieve a high user acceptance [Se14]. Only systems that are accepted by users and that are actually used can make the authentication to cloud computing systems sustainably safer. This highlights that security is not merely a technological challenge. Therefore the goal is a solution that combines good usability with high technical security. 39
2 The SkIDentity project 1 accordingly strives to create an architecture that is designed to flexibly work together with solutions from multiple vendors [Sk14]. Through a federated identity management (FidM), organizations will be able to offer one or multiple authentication services or make use of external identity information and authentication for applications operated by them; a multitude of combinations being possible. Both the technical and organizational aspects, as well as the legal requirements are taken into account by the project. As a result, the user should be able to use her preferred identity card (credential) for strong authentication in various applications. This reduces the number of authentication information to remember or credentials to manage by the individual user. Moreover, it saves her from having to become acquainted with new authentication procedures with every new service she uses. At the same time this simplification increases security because the authentication steps and sequences are always familiar, comprehensible, understandable, and recognizable for the user. However, the user is not the only stakeholder that has to be considered for an identity management system. As Roßnagel and Zibuschka have argued, all relevant stakeholders for an identity management system have to be taken into account [ZR12]. This means that we have to look at the service providers requirements as well. They have to implement and operate the system, which means that they have to make significant investments in terms of money and other resources [KRS13]. Therefore, they will only be willing to implement a specific identity management system if these investments are likely to pay off. So there needs to be a business case for the service providers to implement the identity management system. For example this could be (a) the possibility to raise the number of potential customers or users of the provided service or (b) to reduce the costs induced by the authentication process. The SkIDentity-Technology enables both: (a) As users can perform a strong authentication with the service using the credentials they already possess, the number of potential users and customers is raised. And (b) the handling of credentials is facilitated as there is no need for the service to give out its own credentials. Already available credentials such as national electronic ID- Cards (eids) or other identity tokens such as OTP-Generators or even mobile phones can be easily integrated. Therefore cost savings can be achieved. The third relevant stakeholder for an identity management system is the identity provider. It can be assumed that the goal of the identity provider is to gain a large base of users and service providers that rely on its identity provision services. The business model of the identity provider could be that both or one of these groups of users pay for the identity provider s service. Thus, a higher number of users and service providers should raise the revenue of the identity provider. At the same time, as we have already 1 SkIDentity is among the winners of the Trusted Cloud technology competition ( of the Federal Ministry of Economics and Energy (BMWi) and aims at providing trusted electronic identities for cloud computing services. It brings together an interdisciplinary team of experts led by the ecsec GmbH with the participation of the ENX Association, the Fraunhofer Institutes IAO and IGD, the Open SignCubes GmbH, Ruhr University Bochum, the University of Passau, the Urospace GmbH and VDG Versicherungswirtschaftlicher Datendienst GmbH. Additionally, the SkIDentity-project is supported by relevant organizations such as the Federal Association for Information Technology, Telecommunications and New Media (BITKOM), EuroCloud Deutschland_eco e.v., ProSTEP ivip e.v. and TeleTrusT IT Security Association Germany e.v. and renowned companies such as DATEV eg, easy Login GmbH, media transfer AG, SAP AG und SiXFORM GmbH. 40
3 described above, a higher number of users is in the interest of the service provider as well. Moreover, a higher number of potential services that can be used with a specific credential already in the hands of a user is in the user s interest. From an economic science perspective this illustrates that network effects apply to identity management systems so that in this case we are faced with a multi-sided market [ZR12], [Ha04], [Ev03]. The article shows how the SkIDentity-Technology achieves what is described above and exemplifies this by means of the pilot-application. Thus, it is organized as follows. Section 2 outlines the scenario in the automotive industry in greater detail. In section 3 we describe the system architecture of the SkIDentity-Technology. Subsequently, in section 4, we present the pilot-application Cloud Teamroom as realized in the project, before we conclude our findings in section 5. 2 Pilot-Application Scenario: Automotive Industry The automotive industry can be characterized as highly competitive and globalized. A relatively small number of car makers (original equipment manufacturers OEMs) are spread over the world. Most of them target the world-market and therefore compete against each other on a global scale. This industry has always been driven by new technologies and technological advances are often quickly adopted into new products. Within the last one or two decades, this led to a tighter integration and interconnection of simple parts into more complex systems. The OEMs have reacted to these new challenges by outsourcing the production and even the development of those systems. Thus, the tasks of the suppliers have grown from manufacturing simple parts to manufacturing complex systems. As these systems require a highly specialized knowledge, they are often not only made, but also designed by the supplier according to the OEM s specification [WRZ12], [Vo04]. The development described above has led to the current situation in which a significant amount of the value is not generated by the OEM itself, but by the extended workbench consisting of its suppliers. Yet, these suppliers (Tier1-suppliers) usually have an extended workbench with suppliers (Tier2-suppliers) as well. Here, we can see the distributed value chain of the automotive industry [Vo04]. The intense competition in the automotive industry makes a continuous reduction of the time-to-market of new products imperative. This is achieved inter alia through an interactive collaboration between the engineers at OEMs and suppliers in multi-user applications [VS02]. However, due to the complex network-like structure of competition in the automotive industry, OEMs, Tier-1 and Tier2-suppliers at the same time cooperate for different components each with numerous competing partners. For this reason, an effective access control for sharing and collaboratively editing of technical specifications and component design is absolutely necessary to protect the intellectual capital of each partner. 41
4 The effective interorganizational access control that is required already constitutes a major challenge for the identity management (IdM) inside of a single organization. However, if several independent companies (OEMs, Tier1-, Tier2-suppliers and, where appropriate, Service/Cloud providers) are involved, the complexity of the task of a trusted authentication of all engineers involved increases significantly. For example, different companies use their own authentication methods and security policies that must be implemented by service/cloud providers. In addition, dependent on the specific demand, engineers are assigned to or withdrawn from projects by their mother company. Therefore, access rights and permissions permanently have to be kept up-to-date (Enrolement/De-Provision/De-Enrolement). The economic and technical capabilities, particularly of smaller organizations without major IT departments thus quickly reach their limits, due to the variety of requirements that need to be fulfilled. Moreover, the complexity of the task can provoke errors, leading to security problems and, in the end, costly loss of intellectual capital or the termination of working relationships. In a scenario as depicted, a SkIDentity-based solution could address the identity management-specific challenges. But before this solution is presented, we ll outline the system architecture of the SkIDentiy-Technology in the following section. 3 SkIDentity System-Architecture in Brief SkIDentity builds upon the concept of Federated Identity Management (FIdM) [HRZ10]. The architecture enables the use of various authentication methods, services and protocols in a consistent and secure way in any application. Particularly, the SkIDentitytechnology renders it possible to use government-issued electronic Identity Cards (eids) for a great variety of services. These eids or similar documents, such as the German neuer Personalausweis (npa), are increasingly available in the general population all over Europe, as they are being issued by more and more states [Fu13]. Thanks to the official trust anchor, due to being issued by the public authorities, these credentials are perceived as very save and over time they will be widespread. The design of the SkIDentity system-architecture therefore pays particular attention to compliance with the requirements of the German eid-law. 42
5 Figure 1: SkIDentity reference-architecture The SkIDentity reference-architecture for strong and trustable authentication in the cloud can be broken down into three major components. As shown in Figure 1, these are located at the user/client, the service provider and infrastructure components. Identity Broker (IdB) The IdB is the central component in the SkIDentity-infrastructure. When an authentication request is sent by the Cloud Connector (CC) or Federation Service (FS), he determines which credentials are available from the user, so that an appropriate service for the user authentication can be selected. Federation Service (FS) The FS is an optional service that supports protocols for identity federation such as [Ha12], [Op07], or [Ca05]. If the authentication policy supports it, a single-sign-on becomes possible. In this way a user only needs to authenticate once to use a multitude of applications (for a certain time). Cloud Connector (CC) Via the CC, the Cloud Application (CA) is integrated into the SkIDentity-infrastructure. The CA represents the cloud application that the user actually wants to access. The CC is operated at the CA. It enables the CA to use identities and authentication with a protocol that is supported by an IdB or a FS. CAs that already support such functionality have already implemented a CC. But the CC can also be integrated directly into a CA afterwards by using a program library if the functionality hasn t been implemented right from the start. Alternatively, it can work as an independent process that receives the data from an IdB or FS to transmit it in a compatible format to the CA. 43
6 Authentication Services (AS) To perform the actual user authentication the IdB calls the AS. Dependent on the credential, a suitable authentication protocol is used for this communication. As an example: to authenticate with the npa the Extended Access Control (EAC) protocol according to [Fe12] is used. The following chapter will show how the now outlined SkIDentity system-architecture can be used to build an application that addresses the challenges of the automotive scenario described earlier in this paper. 4 Pilot-Application: Cloud-Teamroom for the Automotive Industry The pilot-application that has been developed in the SkIDentity project is a cloudteamroom for the automotive industry. It provides a cloud-based collaborative workspace that can be accessed by different users with specific, variable permissions. By utilizing the Identity Broker for the authentication, credentials that are already available in the organizations can be used. It is not necessary to give out (and after termination of the project collect) special credentials to engineers of partner organizations that are supposed to work on the platform. The cloud-teamroom was integrated into the architecture of SkIDentity and developed in a way so that it can serve as an experimental system for further research and development work in the sense of agile software development [PEM03] as well as public presentations. The overall concept of the cloud-teamroom is pictured in Figure 2. One or more companies in a manufacturer-supplier network in the automotive industry opt for the use of the SkIDentity-infrastructure for the secure authentication at a shared cloud-service. The cloud-teamroom of the realized pilot-application is an example for this application scenario. 2 Technically, it is based on the Open Source software system owncloud for cloud storage and data synchronization [Ow14]. While the company names used below are fictitious, the whole scenario is realistic. It was developed according to the results of five qualitative interviews with major OEMs and suppliers from the European automotive industry. These interviews were conducted in 2012 and 2013, recorded and transliterated for analysis. 2 The pilot-application can be accessed via: 44
7 OEM: Complete Access Cloud Service: Team-Room Specific security privileges for different users Tier1: Restricted Access Tier2: Further Restricted Access eid-broker Integrates different IDM Services Controls Identities OEM: Car Manufacturer Defines Component Specifications Tier1: Large Automobile Supplier Develops Component Tier2: Engineering Bureau Develops Component Part Authentication with PKI Authentication with OTP-Generator Authentication with eid Figure 2: Concept of the Cloud-Teamroom for the Automotive Industry The authentication through SkIDentity to log on to the service can be done by clicking on the SkIDentity-Button embedded into the login-screen of the cloud-service. The SkIDentity Identity Selector pops up to show the user which credentials are available for authentication at the cloud service (see Figure 3). After the user has selected his available/preferred credential she gets redirected to the IdP to perform the authentication process there. If the authentication is successful, the user is granted access and she gets logged on to the service to use it as intended. For example he can access 3-D-Model- Data (see Figure 4). Specific read/write-permissions for individual engineers are handled in the cloud service (here: the owncloud solution), not through the SkIDentity- Technology. 45
8 Figure 3: Login to the Cloud-Teamroom with the Identity Selector by SkIDentity According to the qualitative interviews the Open Source platform owncloud, which is originally designed for data storage in the cloud, was customized to fit the needs of users in an automotive scenario. Depending on the role a user holds, the design and the functions presented in the cloud-teamroom vary. By using the SkIDentity-infrastructure each user obtains a unique ID which is used inside owncloud as the specific user ID. This user ID corresponds to an owncloud user which then can be authorized inside the owncloud user management settings. By assigning the user to a user group the administrator can easily manage their access rights and available functions inside the cloud-teamroom. 46
9 Figure 4: Exemplary Functionality of the Cloud-Teamroom: View of 3D-Model-Data In a fictitious case study for the pilot-application, based on the results of the qualitative interviews, three companies from the automotive cooperate in a development project. The cloud-teamroom is operated by the fictitious car maker EMC European Motor Company. It is a big global player in the automotive industry with a highly capable ITdepartment and considerable resources. In the development project it cooperates with CCG - Car Components Group and Ingenieurbüro Schneider on a new car component. CCG is a Tier1-Supplier of medium size. Ingenieurbüro Schneider is a small independent engineering bureau that is very specialized on a specific part of the component (Tier2-Supplier). In the pilot-case four possible credentials are available: 1. A software certificate, stored on the desktop PCs of EMC. This OEM operates the cloud-teamroom in this case study and his desktop PCs are operated in a safe environment and protected by physical as well as software (PKI-based) access control. Therefore a software certificate is highly convenient while at the same time being very secure. 2. EMC-Company Smartcard, based on a PKI-Infrastructure. This Smartcard allows engineers of EMC to access the cloud-teamroom from any computer with a suitable card-reader that fulfils the company s security policy. 3. CCG-Smartcard, provided to the company by the ENX-association (ENX-ID). ENX is a respected organization in the automotive industry that already 47
10 provides a secure communications network to the industry [En14]. Moreover, as it is founded and supervised by most major OEMs and suppliers it serves as a trust anchor for the electronic identities assigned with the smartcard. Thus, ENX serves as an IdP for CCG. Engineers of CCG can use this Smartcard to use internal services as well as to access the cloud-teamroom. 4. German national ID-Card: neuer Personalausweis (npa). As Ingenieurbüro Schneider is a Company with only a hand full of employees it doesn t have an IT-department, not to mention a PKI-Infrastructure. However, the engineers possess an npa which they can use for strong authentication at the cloudteamroom. This shows how strong authentication in the complex value chain of the automotive industry can be achieved by making use of the SkIDentity-technology and with limited resources. Each partner just uses the credential that is most convenient for him. At the same time a high level of security and trust is achieved. 4 Conclusion With the example of a cloud-teamroom for the automotive industry, this paper has shown how an effective interorganizational identity management can be realized with the SkIDentity-technology. The approach enables reliable identification of engineers of various partners with different credentials while being easy to implement into existing structures and processes. In addition to the evaluation of the approach used in the current pilot-application, future work will be especially concerned with the further analysis of the results of a qualitative market study on Federated Identity Management in the automotive industry. First results of this analysis have already been integrated into the design of the pilot-application. The combined results will be used to revise the SkIDentity reference-architecture as a whole. Moreover, they will be used to iteratively refine the pilot-application and to conceptualize business models for SkIDentity in the successive project phases. References [Se13] C. Senk, Future of Cloud-Based Services for Multi-factor Authentication: Results of a Delphi Study, in Cloud Computing, vol. 112, M. Yousif and L. Schubert, Eds. Springer International Publishing, 2013, pp [Sk14] SkIDentity, Skidentity-Project Website, Skidentity-Project Website, [ZR12] [Online]. Available: J. Zibuschka and H. Roßnagel, Stakeholder Economics of Identity Management Infrastructures for the Web, in Proceedings of the 17th Nordic Workshop on Secure IT Systems (NordSec 2012), Karlskrone, Sweden, [KRS13] M. Kubach, H. Roßnagel, and R. Sellung, Service providers requirements for eid solutions: Empirical evidence from the leisure sector, in Open 48
11 Identity Summit Lecture Notes in Informatics (LNI) - Proceedings, D. Hühnlein and H. Roßnagel, Eds. Bonn, 2013, pp [Ha04] A. Hagiu, Two-sided platforms: Pricing and social efficiency, [Ev03] D. S. Evans, The Antitrust Economics of Two-sided Markets, Yale J. Regul., vol. 20, no. 2, pp , [WRZ12] I. Wehrenberg, H. Roßnagel, and J. Zibuschka, Secure Identities for Engineering Collaboration in the Automotive Industry, presented at the MIGW Conference on Mobility in a Globalised World, Bamberg, 2012, pp [Vo04] G. Volpato, The OEM-FTS relationship in automotive industry, Int. J. Automot. Technol. Ldots, vol. 4, no. 2/3, pp , [VS02] G. Volpato and A. Stocchetti, The role of ICT in the strategic integration of the automotive supply-chain, Int. J. Automot. Technol. Manag., vol. 2, no. 3/4, p. 239, [HRZ10] D. Hühnlein, H. Roßnagel, and J. Zibuschka, Diffusion of Federated Identity Management, in Sicherheit 2010, F. C. Freiling, Ed. Bonn: Köllen Druck + Verlag GmbH, 2010, pp [Fu13] FutureID Project, Survey and Analysis of Existing eid and Credential Systems, Deliverable D32.1, [Ha12] D. Hardt, Ed., The OAuth 2.0 Authorization Framework, IETF RFC [Op07] OpenID Foundation, OpenID Authentication [Ca05] [Fe12] S. Cantor, J. Kemp, R. Philpott, and E. Maler, Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V Federal Office for Information Security (BSI), Advanced Security Mechanism for Machine Readable Travel Documents - Extended Access Control (EAC), Password Authentication Connection Establishment (PACE), and Restricted Identification (RI), Technical Directive (BSI-TR-03110) Version 2.10, [PEM03] F. Paetsch, A. Eberlein, and F. Maurer, Requirements engineering and agile software development, in 2012 IEEE 21st International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003, pp [Ow14] [En14] owncloud, owncloud, Your Cloud, Your Data, Your Way!, [Online]. Available: www. ENX Association, ENX Association, ENX - The communications network of the European automotive industry, [Online]. Available: 49
Identity Management and Cloud Computing in the Automotive Industry First Empirical Results from a Quantitative Survey
Identity Management and Cloud Computing in the Automotive Industry First Empirical Results from a Quantitative Survey Nicolas Fähnrich, Michael Kubach Fraunhofer IAO Open Identity Summit Berlin, Germany,
Federal Ministry for Economic Affairs and Energy (BMWi) Germany Unit Digital Technologies http://www.digitale-technologien.de www.bmwi.
Trusted Cloud Initiative Germany Federal Ministry for Economic Affairs and Energy (BMWi) Germany Unit Digital Technologies http://www.digitale-technologien.de www.bmwi.de Cloud Computing Objectives of
White Paper PalmSecure truedentity
White Paper PalmSecure truedentity Fujitsu PalmSecure truedentity is used for mutual service and user authentication. The user's identity always remains in the possession of the user. A truedentity server
An Open ecard Plug-in for accessing the German national Personal Health Record
An Open ecard Plug-in for accessing the German national Personal Health Record Raik Kuhlisch 1 Dirk Petrautzki 2 Johannes Schmölz 3 Ben Kraufmann 1 Florian Thiemer 1 Tobias Wich 3 Detlef Hühnlein 3 Thomas
IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0
International Virtual Observatory Alliance IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 IVOA Proposed Recommendation 20151029 Working group http://www.ivoa.net/twiki/bin/view/ivoa/ivoagridandwebservices
Author. Ginés Dólera Tormo. Advisors Dr. Félix Gómez Mármol (NEC Laboratories Europe) Prof. Dr. Gregorio Martínez Pérez (University of Murcia)
Systems with Faculty of Computer Science ENHANCING USER CENTRIC IDENTITY MANAGEMENT SYSTEMS WITH REPUTATION MODELS IN DISTRIBUTED ENVIRONMENTS Author Advisors Dr. Félix Gómez Mármol (NEC Laboratories Europe)
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Cybersecurity and Secure Authentication with SAP Single Sign-On
Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart [email protected]
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper
Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper TABLE OF CONTENTS INTRODUCTION... 3 Where we came from... 3 The User s Dilemma with the Cloud... 4 The Administrator
Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department [email protected]
Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department [email protected] Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation
Server based signature service. Overview
1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...
Cloud SSO and Federated Identity Management Solutions and Services
Cloud SSO and Federated Identity Management Solutions and Services Achieving Balance Between Availability and Protection Discussion Points What is Cloud Single Sign-On (SSO) What is Federated Identity
IGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
An Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
SWIFT: Advanced identity management
SWIFT: Advanced identity management Elena Torroglosa, Alejandro Pérez, Gabriel López, Antonio F. Gómez-Skarmeta and Oscar Cánovas Department of Information and Communications Engineering University of
2 Authentication and identity management services in multi-platform cloud infrastructure
Abstract The security provision within multi-platform cloud computing environment is still considered not to be properly solved due to different problems with technical and humanbased origin. ICT users
USING FEDERATED AUTHENTICATION WITH M-FILES
M-FILES CORPORATION USING FEDERATED AUTHENTICATION WITH M-FILES VERSION 1.0 Abstract This article provides an overview of federated identity management and an introduction on using federated authentication
Cloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
SAML Privacy-Enhancing Profile
SAML Privacy-Enhancing Profile Moritz Horsch 1, Max Tuengerthal 2, Tobias Wich 2 1 Technische Universität Darmstadt, Hochschulstraße 10, 64289 Darmstadt [email protected] 2 ecsec GmbH,
On the Application of Trust and Reputation Management and User-centric Techniques for Identity Management Systems
On the Application of Trust and Reputation Management and User-centric Techniques for Identity Management Systems Ginés Dólera Tormo Security Group NEC Laboratories Europe Email: [email protected]
Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm
Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect
Simplify and Secure Cloud Access to Critical Business Data
SAP Brief SAP Technology SAP Cloud Identity Objectives Simplify and Secure Cloud Access to Critical Business Data Gain simplicity and security in a single cloud solution Gain simplicity and security in
Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect
Identity Federation: Bridging the Identity Gap Michael Koyfman, Senior Global Security Solutions Architect The Need for Federation 5 key patterns that drive Federation evolution - Mary E. Ruddy, Gartner
WHITEPAPER. NAPPS: A Game-Changer for Mobile Single Sign-On (SSO)
WHITEPAPER NAPPS: A Game-Changer for Mobile Single Sign-On (SSO) INTRODUCTION The proliferation of mobile applications, including mobile apps custom to an organization, makes the need for an SSO solution
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
CLAIMS-BASED IDENTITY FOR WINDOWS
CLAIMS-BASED IDENTITY FOR WINDOWS TECHNOLOGIES AND SCENARIOS DAVID CHAPPELL FEBRUARY 2011 SPONSORED BY MICROSOFT CORPORATION CONTENTS Understanding Claims-Based Identity... 3 The Problem: Working with
A Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
managing SSO with shared credentials
managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Final Project Report December 9, 2012. Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540
Final Project Report December 9, 2012 Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540 CONTENTS Project Proposal... 4 Project title... 4 Faculty Advisor... 4 Introduction...
PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN
PROVIDING SINGLE SIGN-ON TO AMAZON EC2 APPLICATIONS FROM AN ON-PREMISES WINDOWS DOMAIN CONNECTING TO THE CLOUD DAVID CHAPPELL DECEMBER 2009 SPONSORED BY AMAZON AND MICROSOFT CORPORATION CONTENTS The Challenge:
Cloud Computing. Chapter 5 Identity as a Service (IDaaS)
Cloud Computing Chapter 5 Identity as a Service (IDaaS) Learning Objectives Describe challenges related to ID management. Describe and discuss single sign-on (SSO) capabilities. List the advantages of
White Paper. What is an Identity Provider, and Why Should My Organization Become One?
White Paper What is an Identity Provider, and Why Should My Organization Become One? May 2015 Executive Overview Tame Access Control Security Risks: Become an Identity Provider (IdP) Organizations today
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
White Paper Identity and Access Management (IAM). Gain Agility through IAM in Companies and Complex Supply Chains.
White Paper Identity and Access Management (IAM). Gain Agility through IAM in Companies and Complex Supply Chains. Contents at a Glance. 3 1. Introduction 4 2. Scope and General Conditions 7 3. Tasks and
Authentication and Authorization for Mobile Devices
Authentication and Authorization for Mobile Devices Bachelor of Science Thesis in Software Engineering and Management NAVID RANJBAR MAHDI ABDINEJADI The Author grants to Chalmers University of Technology
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver
Enabling Federation and Web-Single Sign-On in Heterogeneous Landscapes with the Identity Provider and Security Token Service Supplied by SAP NetWeaver SAP Product Management, SAP NetWeaver Identity Management
SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security
International Telecommunication Union ITU-T Y.2723 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/2013) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS
Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach
Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach Ruchir Choudhry [email protected]; Abstract. J2EE based Web applications have largely spread over our multiple
Increase the Security of Your Box Account With Single Sign-On
A Box White Paper Increase the Security of Your Box Account With Single Sign-On Box s high level of security, 24x7 support and 99.9% uptime are critical for us. The biggest benefits are the reliability
idp Connect for OutSystems applications
idp Connect for OutSystems applications THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
DocuSign Single Sign On Implementation Guide Published: March 17, 2016
DocuSign Single Sign On Implementation Guide Published: March 17, 2016 Copyright Copyright 2003-2016 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents
FAQs Electronic residence permit
FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit
Identity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP [email protected]. http://www.owasp.
Identity Management Basics Derek Browne, CISSP, ISSAP [email protected] May 9, 2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms
WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT
WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT Executive Overview SAML (Security Assertion Markup Language) is a standard that facilitates the exchange of security information. Developed by
Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Federated and Service-Oriented Identity Management at a University
Federated and Service-Oriented Identity Management at a University Frank Schell 1, Thorsten Höllrigl 1, Hannes Hartenstein 1 1 Steinbuch Centre for Computing, University of Karlsruhe (TH), Karlsruhe Institute
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
Trend of Federated Identity Management for Web Services
30 Trend of Federated Identity Management for Web Services Chulung Kim, Sangyong Han Abstract While Web service providers offer different approaches to implementing security, users of Web services demand
How to create a SP and a IDP which are visible across tenant space via Config files in IS
How to create a SP and a IDP which are visible across tenant space via Config files in IS This Documentation is explaining the way to create a SP and IDP which works are visible to all the tenant domains.
FAQs - New German ID Card. General
FAQs - New German ID Card General 1) How to change from the old ID card to the new one? The new Law on Identification Cards came into effect on 1 November 2010. Since then, citizens can apply for the new
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
CryptoNET: Security Management Protocols
CryptoNET: Security Management Protocols ABDUL GHAFOOR ABBASI, SEAD MUFTIC CoS, School of Information and Communication Technology Royal Institute of Technology Borgarfjordsgatan 15, SE-164 40, Kista,
Identity and Access Management
Cut costs. Increase security. Support compliance. www.siemens.com/iam Scenarios for greater efficiency and enhanced security Cost pressure is combining with increased security needs compliance requirements
Preventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
Vidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
DualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.
DualShield Integration Guide Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,
HP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
Single Sign On Integration Guide. Document version: 20.01.12
Single Sign On Integration Guide Document version: 20.01.12 Table of Contents About this document... 3 Purpose... 3 Target... 3 Support... 3 Overview... 4 SAML... 5 SAML in general... 5 How SAML is used
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the
Automotive Supply Chain Best Practices OFTP2 EXPLAINED. Version No 1.0. Date: October 2009. Copyright Odette International Ltd
Date: Copyright Odette International Ltd CONTENTS What is OFTP2 and what are its advantages?... 2 Secure OFTP2... 3 How does OFTP2 work?... 4 What are the main advantages of OFTP2?... 4 Globalisation of
SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011
NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity
Regular data supply and partner data management in the cloud
Strategies for controlling the flood of development data: Regular data supply and partner data management in the cloud Ralf Luithardt (SSC-Services GmbH), Dr. Anna Wasmer (PDTec AG) Globalisation and the
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
SAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
Open Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0
sm Open Data Center Alliance Usage: Identity Interoperability Guide rev. 1.0 Open Data Center Alliance Usage: Identity Interoperability Guide Rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary...
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
Business-Driven, Compliant Identity Management
Solution in Detail NetWeaver NetWeaver Identity Business-Driven, Compliant Identity Using NetWeaver Identity Managing users in heterogeneous IT landscapes presents many challenges for organizations. System
Business-Driven, Compliant Identity Management
SAP Solution in Detail SAP NetWeaver SAP Identity Management Business-Driven, Compliant Identity Management Table of Contents 3 Quick Facts 4 Business Challenges: Managing Costs, Process Change, and Compliance
Getting Started with AD/LDAP SSO
Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories
