midpoint Overview Radovan Semančík December 2015



Similar documents
Open Source Identity Management

Identity Management with midpoint. Radovan Semančík FOSDEM, January 2016

Securing your business

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014

G Cloud 6 CDG Service Definition for Forgerock Software Services

Apache Syncope OpenSource IdM

LDAPCON Sébastien Bahloul

Tech Brief: Upgrading from Sun IAM to ForgeRock Open Identity Stack

WHITEPAPER OpenIDM. Identity lifecycle management for users, devices, & things

SAP Identity Management Overview

Enterprise Open Source Identity Middleware. Anders Askåsen, Product Manager

WHITEPAPER ForgeRock Identity Management. Identity lifecycle management for users, devices, and things

First-hand Information about the Enhanced Functionality and Integration Options Within SAP NetWeaver Identity Management 7.2

SAM Enterprise Identity Manager

Access Management Analysis of some available solutions

Enterprise Identity Management Reference Architecture

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

Communiqué 4. Standardized Global Content Management. Designed for World s Leading Enterprises. Industry Leading Products & Platform

IBM Tivoli Identity Manager

IBM WebSphere Cast Iron Cloud Integration

Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

The Unique Alternative to the Big Four. Identity and Access Management

IBM Tivoli Directory Integrator

Business Process Management

OracleAS Identity Management Solving Real World Problems

SAP Identity Management Overview

Identity Governance Evolution

Oracle Identity Manager, Oracle Internet Directory

These requirements led to several challenges in deploying identity related applications within the enterprise:

Oracle Reference Architecture and Oracle Cloud

The Circle of Life: Protecting Your Sun IAM Investment with ForgeRock s Open Identity Stack (formerly Sun Open Source IAM)

Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success

Oracle Identity Analytics Architecture. An Oracle White Paper July 2010

Centralized Oracle Database Authentication and Authorization in a Directory

Migration and Developer Productivity Solutions Retargeting IT for Emerging Business Needs

Apache Sentry. Prasad Mujumdar

can I customize my identity management deployment without extensive coding and services?

Active Directory Manager Pro New Features

Security As A Service Leveraged by Apache Projects. Oliver Wulff, Talend

How To Make A Multi-Tenant Platform Secure And Secure

SAP NetWeaver Identity

Oracle Role Manager. An Oracle White Paper Updated June 2009

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

IBM Rational Asset Manager

Sisense. Product Highlights.

100% NO CODING NO DEVELOPING IMMEDIATE BUSINESS -25% -70% UNLIMITED SCALABILITY DEVELOPMENT TIME SOFTWARE STABILITY

<Insert Picture Here> Move to Oracle Database with Oracle SQL Developer Migrations

Three Campus Case Studies: Managing Access with Grouper

Can I customize my identity management deployment without extensive coding and services?

Trust but Verify: Best Practices for Monitoring Privileged Users

Documentation. CloudAnywhere. Page 1

ActiveRoles Server v 6.7

tibbr Now, the Information Finds You.

TG Web. Technical FAQ

Authentication: Password Madness

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

How to Get to Single Sign-On

1 Introduction Product Description Strengths and Challenges Copyright... 5

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Identity Access Management Challenges and Best Practices

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

Authentication Integration

Inside the Digital Commerce Engine. The architecture and deployment of the Elastic Path Digital Commerce Engine

HP OO 10.X - SiteScope Monitoring Templates

Take Control of Identities & Data Loss. Vipul Kumra

Category: Business Process and Integration Solution for Small Business and the Enterprise

Professional Profile

300+ APIs Everywhere

Cross-domain Identity Management System for Cloud Environment

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Get Cloud Ready: Secure Access to Google Apps and Other SaaS Applications

Single Sign On. SSO & ID Management for Web and Mobile Applications

Server-side OSGi with Apache Sling. Felix Meschberger Day Management AG 124

Pro<DOC/> e-commerce Technology An Introduction

Bala Vellaiappan Shan Balasubramanian Suchitra Subbakrishna DTS-ESOD

Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

Government of Canada Directory Services Architecture. Presentation to the Architecture Framework Advisory Committee November 4, 2013

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

EXECUTIVE VIEW. EmpowerID KuppingerCole Report. By Peter Cummings October By Peter Cummings

Active Directory Implemenation

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

TEST AUTOMATION FRAMEWORK

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

CA Federation Manager

Oracle Primavera Gateway

BONITA, The Open Source BPM Solution

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Aspire Systems - Experience in Digital Marketing and Social Media

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Populating Your Domino Directory (Or ANY Domino Database) With Tivoli Directory Integrator. Marie Scott Thomas Duffbert Duff

Gabriel Magariño. Software Engineer. Overview Revisited

Transcription:

midpoint Overview Radovan Semančík December 2015

Agenda Identity Management Introduction midpoint Introduction midpoint Architecture Conclusion

Identity Management Introduction

Identity Management System Admin Requester Approver Users Application Application Provisioning System Identity Repository Application HR Application CRM Application A M

Identity Management: Provisioning Making sure that users have the correct access rights Automating the processes of access right management Hiring new employee: creating accounts Reorg: modifications of access privileges Layoffs: deleting/disabling accounts Visibility and security Audits, attestations, reporting

User Provisioning System HR Workflow Engine LDAP Domain SOAP Agent SQL ERP Legacy System Database Applications

About Evolveum

Evolveum Team History since approx. 2000 various LDAP and IDM projects, various companies since 2004: nlight IDM Professional Services Sun Microsystems, Novell 2010-2011: Cooperation with ForgeRock Contributing to OpenIDM v1 2011: Evolveum Independent development of midpoint Cooperative business model

Evolveum Focused open source development company Almost all employees are engineers Development and research Minimalistic sales and marketing All team members have academic degree (including 2 PhDs) Indirect partner-based business Customer Partner Evolveum Cooperation is the key

Ecosystem Pure open source model No open-core or dual licencing Contributions are welcome Distributed development Code created by several development teams Coordinated and integrated by Evolveum Evolveum is a maintainer, not owner of the code Cooperation instead of domination Evolveum partners add value Cloud, integrated solutions, managed services, extensions, plugins, connectors,... Trade influence for control to get mutual benefits

Open Source Identity Ecosystem OSIAM (Access Management) Shibboleth (Federation) (GRC) Syncope (Identity Provisioning) (Access Management) midpoint (Identity Provisioning) ConnId (Identity Connectors) (Identity Repository) 389 Directory Server (Identity Repository) CAS (Single Sign-On) Fortress (IAM SDK) OpenLDAP (Directory Server)

midpoint Introduction

MidPoint at a Glance Open-source User Provisioning system 100% open-source, no licence cost, no usage restrictions Next-generation system Open architecture, extensible, standard-based, Java/XML/REST Deployment and maintenance efficiency 20% of effort to get 80% of result Based on a decade of IDM experience

MidPoint Big Picture Target Systems midpoint Source Systems Identity Connectors

midpoint Features Overview Identity Lifecycle Management Hiring people, firing people, changing assignments RBAC, workflows, processes, rules, policies Identity Integration Connectors for source and target systems ( resources ) Customizable and Extensible Extensible using expressions and plug-ins (open-closed principle) High-level standard languages (Groovy, JavaScript, XPath2, BPMN) 100% open source, maven, git

Inside midpoint Modern lightweight Java architecture Spring, Spring Security, Prism Objects, Wicket Extensible by scripting expressions Groovy, Python, JavaScript, XPath v2,... Connectors Polygon, ConnId, OpenICF External services REST, SOAP/WSDL Workflow Activiti BPM engine integration

Unique Features Completely open Open source, open development process, customize anything Works out-of-the-box Many IDM configurations already pre-implemented Advanced RBAC/ABAC Conditional roles, parametric roles, Relative Changes, Synchronization and Consistency Easy to maintain consistency, lock-free, self-healing system PrismObjects Dynamic schemas, customization, unifying XML and JSON

MidPoint in numbers At least 13 years of IDM experience At least 11 years of research (12 publications) More than 5 years of active development (13 releases) More than 460 000 lines of code Estimated project cost: $10 315 309 (COCOMO, openhub.net) Average 100 commits per month (total 9007 commits) More than 3300 automated tests More than 500 wiki pages containing documentation

The past, the present and the future

midpoint History 2004: nlight IDM specialist company Mostly Sun IDM (but also other technologies) 2009: Sun acquired by Oracle Death of Sun IDM.. end of business? Spring 2010: OpenIDMv1 nlight cooperating with ForgeRock on OpenIDM development Spring 2011: ForgeRock is changing course OpenIDMv2 plan: drop everything, reinvent everything May 2011: midpoint project start Evolveum established by nlight and others 2012 and on: independent development Technolgical leadership Cooperation with other open source companies: Identity Ecosystem

Current State (version 3.2) Rich provisioning functionality (mappings, scripting,...) Live synchronization, reconciliation, import Advanced RBAC, organizational structure Administration GUI Generic synchronization, entitlements Fine-grained authorizations, delegated administration Advanced features Time constraints, higher-order dependencies, consistency, Governance (technology preview)

Where is midpoint used

Roadmap MidPoint 3.0 (Newton) RELEASED New look and feel, usability improvements MidPoint 3.4 RELEASED Access certification (preview), MidPoint 3.3 (Lincoln) RELEASED Improved GUI, wizards, MidPoint 3.2 (Tycho) Delegated administration, generic sync, REST, MidPoint 3.1, 3.1.1 (Sinan) RELEASED Access certification, synchronization GUI, Spring 2015

MidPoint 3.x Is Revolutionary It goes beyond Identity Management Generic Synchronization Synchronize everything with everything Entitlements Support for groups and privileges (PIM) REST (and JSON and YAML later) Delegated Administration Fine-grained authorizations + organizational structure New GUI Look and Feel - Customizable

Open and Dynamic Development Completely open development Public distributed source code management (git, planned soon) Public task tracking (Jira) Public communication and documentation (mailing lists, wiki) Public planning (roadmap, Jira) User (customer) participation (Paying) customers influence roadmap and take precedence MidPoint users can influence the development plan Contributions

midpoint Architecture

MidPoint Big Picture Target Systems midpoint Source Systems Identity Connectors

Internal Architecture midpoint Administrators Users User Interface User Interface Business Logic Resources IDM Model Provisioning Repository

Internal Architecture Custom User Interface Administrators Users Admin User Interface Business Logic (workflow) Processing the policies IDM Model RBAC, mappings, conditions,... Relational Database Provisioning Repository ConnId Identity Connector Framework Resources

Internal Architecture Administrators Users User Interface User Interface Customized Fixed ( off the shelf ) Business Logic IDM Model Resources Provisioning Repository

Internal Architecture User Interface Part Extensible User Interface Deployer/Customer may provide his own code, Administrators extend the interfaces, even replace some Users Business Logic components Customized Fixed ( off the shelf ) IDM Model Configurable Part Provisioning Deployer/Customer should only configure the components here. The structure and code Repository should not be changed. Resources

Technologies Platform: Lightweight Java Java, Spring, Spring Security, Backlog (SLF4J) Data Model: Prism Objects (generated from XML Schemas) Web GUI (AJAX): Wicket Business logic and customization Groovy, JavaScript or XPath v2 for mappings and expressions Activiti BPM Workflow Interfaces: Java API, SOAP and REST Java APIs most efficient (parts of midpoint are embeddable) Web services (SOAP/WSDL, full schema support) REST interface

Identity Connectors Common Identity Connector Framework Sun Identity Connector Framework ConnId Compatible connectors AD, DB Table, DB2, MySQL, Oracle, RACF, Solaris, SPML, VMS, FlatFile, XML, Solaris, SAP,... LDAP: OpenLDAP, 389ds, OpenDJ, edirectory, Active Directory CSV file, Office365, SAS, GitLab, Lotus, LifeRay

Concrete Architecture - Web Container (Application Server) J2EE Web Container midpoint GUI Web Service Provisioning Model Repository RDB

Architecture Documentation UML Model (astah*) https://svn.evolveum.com/midpoint/design

midpoint Deployment Example

Example midpoint Deployment Architecture Microsoft Applications Administrator AD Connector (remote) midpoint User Self-Service (Web GUI) Identity Management Policies (rules, processes) Web GUI Scheduled Exports ADSI Active Directory CSV File SQL IDM Logic FlatFile Connector Custom HR System midpoint Identity Repository (Relational DB) DB Table Connector Oracle Database Database Applications

User Details

Approval Work Items (Workflow)

Approval (Workflow)

Resource and System Diagnostics

Built-it XML Editor

Live Demo http://demo.evolveum.com/ Documentation: search for Live demo in wiki.evolveum.com

Conclusion

(Much) More Information midpoint Wiki https://wiki.evolveum.com/display/midpoint/home Architecture and Design (in Wiki) Wiki pages under [Architecture and Design] page Live architecture documentation Includes UML diagrams We try to keep it (reasonably) up to date midpoint Mailing List

Conclusion Identity Management Goal: Operational efficiency & security (audit) Easy to start, complex to maintain midpoint Commercial open source provisioning system Next generation system: new technologies and unique features Customer influence and participation

Questions and Answers

Thank You Radovan Semančík www.evolveum.com