Identity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com. http://www.owasp.



Similar documents
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

The Unique Alternative to the Big Four. Identity and Access Management

Identity & Access Management Gliding Flight. Paolo Ottolino PMP CISSP ISSAP CISA CISM OPST ITIL

Identity Management with midpoint. Radovan Semančík FOSDEM, January 2016

Open Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

<Insert Picture Here> Oracle Identity And Access Management

Quest One Identity Solution. Simplifying Identity and Access Management

SAP Business Objects Security

Identity Governance Evolution

Identity Access Management Challenges and Best Practices

Integrating Hitachi ID Suite with WebSSO Systems

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Business-Driven, Compliant Identity Management

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Enterprise Identity Management Reference Architecture

Identity Management Overview. Bill Nelson Vice President of Professional Services

Authentication: Password Madness

How can Identity and Access Management help me to improve compliance and drive business performance?

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department

How To Get A Single Sign On (Sso)

CERN, Information Technology Department

Research. Identity and Access Management Defined

Passlogix Sign-On Platform

Oracle Role Manager. An Oracle White Paper Updated June 2009

Strategic Identity Management for Industrial Control Systems

Trust but Verify: Best Practices for Monitoring Privileged Users

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

NCSU SSO. Case Study

The Four "A's" of Information Security

Simplify Identity Management with the CA Identity Suite

RSA Identity Management & Governance (Aveksa)

The Role of Federation in Identity Management

Business-Driven, Compliant Identity Management

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

NetworkingPS Federated Identity Solution Solutions Overview

Identity and Access Management Point of View

PortWise Access Management Suite

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

1 Introduction Product Description Strengths and Challenges Copyright... 5

PingFederate. SSO Integration Overview

midpoint Overview Radovan Semančík December 2015

Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac

Identity Management Roadmap and Maturity Levels. Martin Kuppinger Kuppinger Cole + Partner mk@kuppingercole.de

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

Government of Canada Directory Services Architecture. Presentation to the Architecture Framework Advisory Committee November 4, 2013

Oracle Access Manager. An Oracle White Paper

Oracle Identity Manager, Oracle Internet Directory

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

Authentication Integration

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

OracleAS Identity Management Solving Real World Problems

Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success

Identity and Access Management. An Introduction to IAM

Access Management Analysis of some available solutions

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Identity and Access Management

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Password Management Before User Provisioning

Biometric Single Sign-on using SAML

Identity Management and Access Control

- Identity & Access Management

First-hand Information about the Enhanced Functionality and Integration Options Within SAP NetWeaver Identity Management 7.2

managing SSO with shared credentials

Single Sign On. SSO & ID Management for Web and Mobile Applications

Vyom SSO-Edge: Single Sign-On Solution for BMC Remedy

Architecture Guidelines Application Security

API-Security Gateway Dirk Krafzig

IBM Tivoli Identity Manager

Enterprise Single Sign-On City Hospital Cures Password Pain. Stephen Furstenau Operations and Support Director Imprivata, Inc.

Identity & access management solution IDM365 for the Pharma & Life Science

Web Applications Access Control Single Sign On

SAML-Based SSO Solution

ORACLE FUSION MIDDLEWARE PROFILE

Achieving HIPAA Compliance with Identity and Access Management

CA SiteMinder SSO Agents for ERP Systems

Interoperable Provisioning in a Distributed World

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM facebook/allidm

EXECUTIVE VIEW. EmpowerID KuppingerCole Report. By Peter Cummings October By Peter Cummings

IAM Open Discussion. Todd Rossin Managing Director

Open Source Identity Management

101 Things to Know About Single Sign On

PROTECT YOUR WORLD. Identity Management Solutions and Services

SAP Solution in Detail SAP NetWeaver SAP NetWeaver Identity Management. Business-Driven, Compliant Identity Management

Kuppinger Cole Virtual Conference The Three Elements of Access Governance

IBM Software Group. Deliver effective governance for identity and access management.

Transcription:

Identity Management Basics Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com May 9, 2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the License. The Foundation http://www.owasp.org

Agenda 1. Identity Management Overview 2. Concepts 3. Approach to Identity & Access Management 4. Example Scenarios 5. Product Demonstrations hopefully 2

Identity Management Flavours Single Sign On is a goal not a product Web application integration -- Web SSO Enterprise SSO (esso) involves corporate desktop application Some use a server -- TSE, tn3270/5250, SAP, Oracle forms, etc Some authenticate locally -- acrobat protected files IdM is different than Access Management One involves who you are and how that is recorded The other involved the policies around how you access resources Federation of identities across multiple jurisdictions SAML, SXIP, Identity 2.0, OASIS Passport (HAHA), Kerberos, Liberty 3

Identity Management Overview Defined: Central infrastructure to manage users, roles, and access to resources Concept of identity contains all user attributes Provisioning capabilities Technology ( connectors ) Approvals Workflow Management Features: Identity provisioning among integrated directories Self-registration and management Delegation of approvals and workflows Password reset capability Benefits: Meet regulatory & audit requirements around controlled access to resources Save costs through efficient workflows for provisioning and approval Asset (business) owners in control, rather than technology group 4

Identity Management Integration Integrates with: Enterprise single-sign-on (and related strong authentication) Access Management systems Role Engineering / Management systems Integration Risks: Focus on technology may distract from importance of roles and processes Too many roles (or exceptions) may result if access modeling and identity modeling are not well-planned Benefits may not be realized quickly if project scope is not managed Not respecting impact on business and applications may have adverse effects on buy-in and acceptance Ineffective processes and workflows may prevent cost savings from being realized Lack of proper knowledge transfer results in a system that the organization cannot effectively manage 5

Identity & Access Management Methodology 1. Inventory: gather information about users, access requirements, and applications & data 2. Create: future state roadmap, associating user groups with access controls, and designing operational support and workflow processes 3. Deploy: begin assigning access to systems and data using new processes and workflows 4. Optimize: deploy automated and delegated processes only after steady state has been achieved 5. Report: leverage investment to satisfy reporting requirements for legislation and internal controls 75 percent of deployment effort will be spent on people & process 6

Agenda 1. Identity Management Overview 2. Concepts 3. Approach to Identity & Access Management 4. Example Scenarios 5. Product Demonstrations 7

Identity & Access Management Basics Access Management Access to data or applications is defined by Business policies (segregation of duties) Security policies Industry regulations and customer requirements Access permissions are mapped to roles and rules to be used when managing identities Identity Management Map roles and rules to specific users to allow appropriate access Process to manage and track access to systems and data Provisioning Workflow Auditability Single Sign-on & Strong Authentication Single sign-on allows access to all resources strong authentication is required Tools exist to facilitate the mapping and ongoing management of roles & identities 8

Identity & Access Management Systems 1. User connects to Web server 2. Web server has a connector or Agent An interface to the Access Manager plug-ins or APIs 3. Access Manager is Policy Enforcement Point: PEP High-volulme system to make decisions on access requests from the Web server Must be high-availability 4. Identity Manager is the Policy Management Point: PMP Central management of all identity information from various sources Able to define processes and workflows to manage, maintain, and audit access to resources. Agent PEP PMP 9

Identity Management Framework Directory services repository is the most critical component, and is the primary data store for user- ID and profile information. Provisioning provides a rolebased approach to end-toend user lifecycle management Authentication leverage existing systems including Active Directory, Enterprise Single Sign-on, and RSA tokens. Access Management leverage existing access manager infrastructure Leverage existing technologies and processes 10

Role Based Access Control Create and manage within role engineering tool Functional roles & organization as defined by HR Stored and managed in directory Business Role Hierarchy ROLE Permissions Scenarios Tasks Work profiles Constraints Ned Flanders User Resource Approver Privileges 11

Role Engineering Process RBAC is widely supported and solves the Privilege management problem better than DAC or MAC, etc. but development of the Role Hierarchy is manual and utilities are few and not all are effective. The role engineering process Discovers Orphaned accounts, privileges, roles Merges overlapping roles Breaks apart overly broad roles: multiple jobs done by the same organization? Defines Role constraints that come from permission constraints Creates role hierarchies: junior roles with common bases and provides the benefits of Cleanup and streamline privileges and group definitions Essential for ongoing privilege management Assists with & documents compliance with policies 12

Role Engineering Creating Roles Functional Decomposition Matter of pulling apart the existing processes and relationships between resources and users and their jobs Understanding the interactions that constraints that exist on permissions Scenario-Driven Models the usage of the system overall Goal is to establish RBAC from concrete Role Hierarchies bottom-up approach 13

Role Engineering Process Each IdM tool integrates a set of features to assist Bridgestream (SmartRoles) Manages dynamic approval processes based on context and relationships Does this by assuming the job of managing roles all roles Defines Approval Policies to control relationships Eurekify (Sage) Can provide Query and Discovery functions preliminary review of privilege landscape Provides audit and compliance reporting on business roles xoret Initial Attempt at tool for scenario based role engineering Ultimately R.E. has so many human factors that there are key manual efforts required Identify & Model New Scenarios Define Scenario Permissions & Constraints Further Refine Scenario Model Define Tasks and Work Profiles Define Roles and Role Hierarchy 14

Logging & Monitoring is Critical 15

16

17

Agenda 1. Identity Management Overview 2. Concepts 3. Approach 4. Example Scenarios 5. Product Demonstrations 18

Applying a Methodology Discover Implement Tool Harvest Validate Develop Workflow Pilot Refine Where is role or identity information currently kept? What are the data assets to protect? Who owns the data? Who uses the data? Identity Management tool (or equivalent) Evaluate needs and technology Integration with existing systems Achieve quick wins Obtain information from existing repositories Active Directory, SiteMinder, LDAP, SAP Result: raw data as collected by the tool Validate against master (SAP) data Eliminate conflicts Complete missing information Result is coarse roles Businessoriented approach Consult IS, HR, and business stakeholders Create provisioning & admin workflows Limited rollout of pilot applications Apply coarse roles (regulated vs. non-reg) Pilot group chosen based on risk or priority Iterative process Add more granularity to roles Result: finegrained Role Based Access Control The actual process will not be linear 19

Agenda 1. Identity Management Overview 2. Concepts 3. Approach 4. Example Scenarios 5. Product Demonstrations 20

Typical Environments 21

Enterprise Single Sign-on 22

Enterprise Single Sign-on with IdM 23

Access Management 24

Access Management with IdM 25

Integrated Identity & Access Management IdM Without Context 26

SAML Primary concern is Complexity Built by committee but so was IPSec Motivated backers Seasoned backers Synchronized clocks for validation Multitude of Trust relationships A trusted third party resolves this but not mandatory 27

SAML Data Flow Sun 2007 http://developers.sun.com/identity/reference/techart/sso.html 28

Options - What are the Choices Key Vendors in this area include (no ranking) Sun Oracle Computer Associates BMC Software Novell Passlogix Imprivata RSA Many others Competitive Analysis is being prepared now Criteria being defined Federation Audit capability Encryption capability Workflow flexibility 29

Agenda 1. Introductions and Objectives 2. Concepts 3. Approach to Identity & Access Management 4. Example Scenarios 5. Product Demonstration hopefully 30

Links as of June 1, 2007 Sun http://www.sun.com/download/index.jsp?cat=identit y%20management&tab=3 Oracle http://www.oracle.com/technology/products/id_mgmt /index.html SXIP http://www.sxip.com http://identity20.com 31

Derek Browne, CISSP, ISSAP derek.browne@emergis.com 32