Cross-domain Identity Management System for Cloud Environment

Similar documents
An Introduction to SCIM: System for Cross-Domain Identity Management

Mobile Devices: Server and Management Lesson 06 Device Management

Property & Casualty Insurance Solutions from CCS Technology Solutions

nexus Hybrid Access Gateway

X.500 and LDAP Page 1 of 8

USING FEDERATED AUTHENTICATION WITH M-FILES

Centrify Cloud Connector Deployment Guide

IETF 84 SCIM System for Cross-domain Identity Management. Kelly Grizzle

tibbr Now, the Information Finds You.

Identity Management with midpoint. Radovan Semančík FOSDEM, January 2016

Remote Authentication and Single Sign-on Support in Tk20

Oracle Fusion Middleware 11g Release 1 IDM Suite

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

Introduction to Oracle Mobile Application Framework Raghu Srinivasan, Director Development Mobile and Cloud Development Tools Oracle

ORACLE APPLICATION EXPRESS 5.0

Web-Based Hazus-MH. A Conceptual Approach. Mourad Bouhafs, AVP ATKINS Atlanta mourad.bouhafs@atkinsglobal.com

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

Federated Directory Services

Leverage Your EMC Storage Investment with User Provisioning for Syncplicity:

Oracle Database Security and Audit

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

Smartphone Enterprise Application Integration

NetIQ Identity Manager Identity Reporting Module Guide

Using DeployR to Solve the R Integration Problem

2012 LABVANTAGE Solutions, Inc. All Rights Reserved.

Single Sign On In A CORBA-Based

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide

docs.hortonworks.com

MarkLogic Server. Reference Application Architecture Guide. MarkLogic 8 February, Copyright 2015 MarkLogic Corporation. All rights reserved.

Flexible Identity Federation

Building a Cloud-Ready, Future-Proof Identity Infrastructure:

NetworkingPS Federated Identity Solution Solutions Overview

Enterprise Digital Identity Architecture Roadmap

Secure the Web: OpenSSO

MATLAB Toolbox implementation for LDAP based Server accessing

Safe Harbor Statement

Leveraging Cloud Storage Through Mobile Applications Using Mezeo Cloud Storage Platform REST API. John Eastman Mezeo

SOA REFERENCE ARCHITECTURE: WEB TIER

JAVA WEB START OVERVIEW

This course provides students with the knowledge and skills to develop ASP.NET MVC 4 web applications.

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

Securing WebFOCUS A Primer. Bob Hoffman Information Builders

PingFederate. SSO Integration Overview

Designing RESTful Web Applications

How To Take Advantage Of Active Directory Support In Groupwise 2014

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft

Web Applications Access Control Single Sign On

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

SOA, case Google. Faculty of technology management Information Technology Service Oriented Communications CT30A8901.

NetBeans IDE Field Guide

A Standards-based Mobile Application IdM Architecture

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

How To Protect Your Computer From Being Hacked On A J2Ee Application (J2Ee) On A Pc Or Macbook Or Macintosh (Jvee) On An Ipo (J 2Ee) (Jpe) On Pc Or

Converting Java EE Applications into OSGi Applications

Improve your mobile application security with IBM Worklight

Distribution and Integration Technologies

Literature Review Service Frameworks and Architectural Design Patterns in Web Development

How To Deploy Cisco Jabber For Windows On A Server Or A Network (For A Non-Profit) For A Corporate Network (A.Net) For Free (For Non Profit) For An Enterprise) Or

Eclipse Open Healthcare Framework

WebSphere Training Outline

Microsoft Active Directory Authentication with SonicOS 3.0 Enhanced and SonicOS SC 1.0 (CSM 2100CF)

Symantec Enterprise Vault.cloud Overview

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity2

The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets

Web Application Hosting Cloud Architecture

Oracle Fusion Middleware

Tech Brief: Upgrading from Sun IAM to ForgeRock Open Identity Stack

Directory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Planning LDAP Integration with EMC Documentum Content Server and Frequently Asked Questions

Configuration Guide BES12. Version 12.2

Glassfish Architecture.

White Paper March 1, Integrating AR System with Single Sign-On (SSO) authentication systems

managing SSO with shared credentials

Maven or how to automate java builds, tests and version management with open source tools

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

Enterprise Portal Built by and for Higher Education

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

SOA CERTIFIED JAVA DEVELOPER (7 Days)

Glassfish, JAVA EE, Servlets, JSP, EJB

Customize Mobile Apps with MicroStrategy SDK: Custom Security, Plugins, and Extensions

ebay : How is it a hit

EMC Documentum Content Services for SAP Repository Manager

Centralized Oracle Database Authentication and Authorization in a Directory

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Administration Guide

OracleAS Identity Management Solving Real World Problems

Developing Web Services with Eclipse and Open Source. Claire Rogers Developer Resources and Partner Enablement, HP February, 2004

Single Sign-on (SSO) technologies for the Domino Web Server

owncloud Architecture Overview

SavvyDox Publishing Augmenting SharePoint and Office 365 Document Content Management Systems

Exploring OpenDaylight

1 What is Cloud Computing? Cloud Infrastructures OpenStack Amazon EC CAMF Cloud Application Management

Egnyte Cloud File Server. White Paper

MONDESIR Eunice WEILL-TESSIER Pierre FEDERATED IDENTITY. ASR 2006/2007 Final Project. Supervisers: Maryline Maknavicius-Laurent, Guy Bernard

Oracle Data Integrator 11g New Features & OBIEE Integration. Presented by: Arun K. Chaturvedi Business Intelligence Consultant/Architect

Transcription:

Cross-domain Identity Management System for Cloud Environment P R E S E N T E D B Y: N A Z I A A K H TA R A I S H A S A J I D M. S O H A I B FA R O O Q I T E A M L E A D : U M M E - H A B I B A T H E S I S S U P E R V I S O R : D R. M. AWA I S S H I B L I

Overview Cross-Domain Identity Management SCIM Schema UnboundID Maven Jetty Server LDAP Demo

Identity Management Management of individual principles and privileges across the system. Their Authentication and Authorization. GOAL: Increasing security and productivity Decreasing cost and repetition of tasks

Single sign-on Authentication / Authorization Provisioning Identity Management

Proposed Architecture CSP1 IDMS 1 Push Identity Data Pull Identity Data CSP2 IDMS 2 Push Identity Data Pull Identity Data Push Identity Data Pull Identity Data ECS CSC ECS CSC 5

Problem? In order to solve the interoperability issues in cross-domain Cloud environment, we are proposing an identity management system that will ensure seamless integration and utilization of identity credentials. In addition to basic identity management features, we intend to provide advanced security features including access right delegation, synchronization and user centricity in Cloud computing scenarios.

SCIM- System for Cross-domain Identity Management Designed for easier user identity management in cloud-based applications and services. Existing schemas and deployments Simplicity in applying existing authentication, authorization and privacy models Intend to reduce the cost and complexity of user management operations Provides a common user schema and extension model for exchange, using standard protocols

SCIM- Protocol

REST Roy Fielding described REST as an architecture style which attempts to minimize latency and network communication, while at the same time maximizing the independence and scalability of component implementations" Roy T Fielding. REST Dissertation at http://www.ics.uci.edu/~fielding/pubs/dissertation/rest_arch_style.htm 9

REST - Not a Standard REST is not a standard REST is just a design pattern REST does prescribe the use of standards: HTTP URL XML/HTML/GIF/JPEG/etc. (Resource Representations) text/xml, text/html, image/gif, image/jpeg, etc. (Resource Types, MIME Types) 10

What is REST? Uniform Interface Stateless Cacheable Client-Server Layered System Code on Demand (Optional) 11

REST- Operations GET: Retrieves a complete or partial resource. POST: Creates a new resource or bulk modifies resources. PUT: Modifies a resource with a complete, consumer-specified resource (replace). PATCH: Modifies a resource with a set of consumer-specified changes (partial update). DELETE: Deletes a resource.

UnboundID Dynamically store, manage, protect and share customer identity data in real time. The key editors and contributors for SCIM API First open source reference implementation for both SCIM client and server-side components.

Companies Working On SCIM 14

Maven Maven is a build automation tool used primarily for Java projects Maven uses an XML file to describe the software project Dependencies Build order Directories and plug-ins. Uses the Project Object Model (POM) Maven dynamically downloads Java libraries and Maven plug-ins from one or more repositories such as the Maven 2 Central Repository, and stores them in a local cache. In NetBeans IDE 6.7 and newer, Maven support is included in the IDE

Jetty Server Jetty is an open source servlet container It serves Java-based web content such as servlets and JSPs. Jetty is written in Java and its API is available as a set of JARs. Developers can instantiate a Jetty container as an object, instantly adding network and web connectivity to a stand-alone Java app.

Lightweight Directory Access Protocol An application protocol for accessing and maintaining distributed directory information services over an Internet Protocol By directory services are organized set of records For example, email directory or phone directory

LDAP Architecture

Operations Supported for LDAP client StartTLS use the LDAP TLS extension for a secure connection Bind authenticate and specify LDAP protocol version Search search for and/or retrieve directory entries Compare test if a named entry contains a given attribute value Add, Delete or Modify an entry Modify Distinguished Name (DN) move or rename an entry Abandon abort a previous request Unbind close the connection (not the inverse of Bind)

THANK YOU! Let s proceed to the demonstration