SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness



Similar documents
Entitlements Access Management for Software Developers

OPENIAM ACCESS MANAGER. Web Access Management made Easy

Web Services Security Standards Forum. Dr. Phillip M. Hallam-Baker C.Eng. FBCS VeriSign Inc.

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

Identity, Privacy, and Data Protection in the Cloud XACML. David Brossard Product Manager, Axiomatics

XACML and Access Management. A Business Case for Fine-Grained Authorization and Centralized Policy Management

Open Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0

Introduction to UDDI: Important Features and Functional Concepts

Run-time Service Oriented Architecture (SOA) V 0.1

SAML:The Cross-Domain SSO Use Case

JOHN KNEILING APRIL 3-5, 2006 APRIL 6-7, 2006 RESIDENZA DI RIPETTA - VIA DI RIPETTA, 231 ROME (ITALY)

Introduction to Web services architecture

Introduction to SAML

SCUR203 Why Do We Need Security Standards?

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

Secure Identity in Cloud Computing

Service Virtualization: Managing Change in a Service-Oriented Architecture

Authentication and Authorization Systems in Cloud Environments

OpenHRE Security Architecture. (DRAFT v0.5)

This Working Paper provides an introduction to the web services security standards.

Interoperable Provisioning in a Distributed World

Service Provisioning Markup Language (SPML) Version 1.0

Service-Oriented Architecture: Analysis, the Keys to Success!

A Service Oriented Security Reference Architecture

Web Services Trust and XML Security Standards

SOA Myth or Reality??

Federated Service Oriented Architecture for Effects-Based Operations

PARTNER INTEGRATION GUIDE. Edition 1.0

SAML Security Option White Paper

IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services. Combine resources for one complete online business security solution.

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

Santa Clara and Energy Systems. William Cox. Copyright All Rights Reserved

SAML basics A technical introduction to the Security Assertion Markup Language

Introduction to Service Oriented Architectures (SOA)

Biometric Single Sign-on using SAML

Service Oriented Architecture

CHAPTER - 3 WEB APPLICATION AND SECURITY

An Oracle White Paper Dec Oracle Access Management Security Token Service

Securing Web Services With SAML

Enterprise Federation through Web Services based Contracts Architecture

Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0

Business-Driven, Compliant Identity Management

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102

SAML AS AN SSO STANDARD FOR CUSTOMER IDENTITY MANAGEMENT. How to Create a Frictionless, Secure Customer Identity Management Strategy

Service-Oriented Architecture and its Implications for Software Life Cycle Activities

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact

IBM WebSphere Application Server

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS

Research on the Model of Enterprise Application Integration with Web Services

WebLogic Server 7.0 Single Sign-On: An Overview

Introduction to WebSphere Process Server and WebSphere Enterprise Service Bus

Perceptive Experience Single Sign-On Solutions

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Web Services Standards: obix in the wider XML Web Services context

Introduction to SAML. Jason Rouault Section Architect Internet Security Solutions Lab Hewlett-Packard. An XML based Security Assertion Markup Language

Improving Security and Productivity through Federation and Single Sign-on

Agenda. How to configure

Security System for Distributed Business Applications

Standards Required to Support XML-Based B2B Integration

White Paper The Identity & Access Management (R)evolution

An Introduction to SCIM: System for Cross-Domain Identity Management

Reducing SOA Identity Fatigue through Automated Identity Testing

ELM Manages Identities of 4 Million Government Program Users with. Identity Server

White paper. Implications of digital certificates on trusted e-business.

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0

Multi-Level Secure Architecture for Distributed Integrated Web Services

Biometric Single Sign-on using SAML Architecture & Design Strategies

Introduction into Web Services (WS)

UDDI v3: The Registry Standard for SOA

The Emerging Infrastructure for Identity and Access Management

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

White paper December Addressing single sign-on inside, outside, and between organizations

Realizing business flexibility through integrated SOA policy management.

Interoperate in Cloud with Federation

How To Understand A Services-Oriented Architecture

HP Software as a Service. Federated SSO Guide

The Primer: Nuts and Bolts of Federated Identity Management

Christoph Bussler. B2B Integration. Concepts and Architecture. With 165 Figures and 4 Tables. IIIBibliothek. Springer

WEB SERVICES SECURITY

Joseph D. Rogers. Team Lead National Program of Cancer Registries (NPCR) Centers for Disease Control and Prevention (CDC)

The OMA Perspective On SOA in Telecoms

Identity Management for Interoperable Health Information Exchanges

BUSINESS PROCESS AND EBXML - WEB SERVICES INTEGRATION PLATFORM, REQUIREMENTS, ARCHITECTURES, SECURITY

This research note is restricted to the personal use of

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

Security in B2B. Sami Tähtinen FRENDS Technology, Inc. S Security of Communication Protocols January 28 th, 2003

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

B2B Glossary of Terms

Avoiding Web Services Chaos with WebSphere Service Registry and Repository

E-government Data Interoperability Framework in Hong Kong

A Model for Access Control Management in Distributed Networks

SAML-Based SSO Solution

NIST s Guide to Secure Web Services

SOA Planning Guide The Value Enablement Group, LLC. All rights reserved.

CHAPTER 1 INTRODUCTION

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

APIs The Next Hacker Target Or a Business and Security Opportunity?

How to Implement Enterprise SAML SSO

Flexible Identity Federation

TrustedX - PKI Authentication. Whitepaper

Transcription:

Interoperability Summit 2002 SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness Gavenraj Sodhi Senior Technology Analyst Provisioning Services Technical Committee, OASIS June 2002 Orlando, Florida

Overview Goal 1: Standardizing and simplifying the interoperability of systems requiring identity information from a multitude of systems and organizations Goal 2: SPML, with other emerging standards, needs to interoperate and deliver a comprehensive interoperable standards-based infrastructure for ebusiness Page 2

Agenda! What is the Problem?! What are some standards that may play? " SPML Concepts " SAML Concept of Back Office Transactions " XACML Concept " XKMS Authentication Service! Conceptual ebusiness Framework with Standards Stack! Example of how ebusiness may use these standards " Business and Technological Case Representation! Q&A Page 3

What is the problem?! Currently a mess of standards which have been developed and are currently under development! How do they fit in the standard s pyramid and how do fix the real problems you are trying to solve for your customers?! The handling of the Identity has to be secure and properly handled across systems Page 4

Standards-based Components that are needed to solve the problem Components that are needed for a smooth secure transaction to occur: A Standards framework that allows the exchange of authentication and authorization data between security systems of one or many organizations. A Standards framework that reuses existing authorization information/credentials to access backend resources and services of one or many organizations. A Standards framework that provides fine-grained access control to bill back the use of a resource and/or a service used by a system entity s division or organizational unit. Plug ability of a Certificate-based authority system to provide third-party authentication assertion to authenticate the system entity to access a resource and/or a service. Common definitions is very important to be consistent. Page 5

SPML Concepts The PSTC (Provisioning Service Technical Committee) working group is developing SPML, which is a proposed specification that addresses the required semantics for Provisioning Service Points (organizations) to exchange data (I.e., Identity) requests relating to the managed Provisioning Service Targets (resource or service). SPML may dictate the provisioning activity of Provisioning Service Points (PSP) and Provisioning Service Targets (PST) based on an Authorization Decision Assertion (I.e., SAML). Add/Create Delete Modify Query Page 6

SAML Concepts SAML is a XML standard for exchanging authentication and authorization data between security systems. The SAML Domain model and specifications permit Authentication and Identity information to be federated among multiple organizations and servers. SAML provides the following: XML-based framework for exchanging security information XML-encoded security assertions XML-encoded request/response protocol Page 7

XACML Concepts A few aspects of XACML (extensible Access Control Markup Language) are: To address fine grained control of authorized activities In the case of billing a certain activity or allowing a doctor to view a certain part of a patient s medical record (XML-based) which the patient has authorized to view Page 8

XKMS Authentication Services XKMS - XML-based mechanism for doing PKI This mechanism, XKMS-based PKI may be used to verify against a certificate to provision a system entity to a service/resource Page 9

Conceptual ebusiness Framework with Standards Stack *Derived From: Gottschalk, Karl; Graham, Steve; Kreger, Heather; and Snell, James. Introduction to Web Services Architecture. http://www.research.ibm.com/journal/sj/412/gottschalk.html. Emerging Technologies. IBM Software Group. November 2001. Page 10

Business Case Issues A group of organizations who want to do business together need to trust the identities of system entities requesting access to a resource or service How does an organization authorize user s of another organization to use the service of the others to conduct business securely? What components can be used/reused to provide a seamless single sign-on solution to access web-based and backend resources and services with web services? Page 11

The Business vs. IT Challenge! IT Orientation: Managing user access in complex environments depends on " Well Defined Security Policy " Robust Security Enforcement Mechanisms " Establishing Identity, Authorization, and Trust " Level of automation vs. manual control! Business Orientation: Activities / access depend on achieving business goals while meeting " Contractual obligations " Regulatory and legal requirements Page 12

ebusiness Example! Large Supplier Network providing resources and services to a group of automobile dealerships " Simultaneously resell multiple products " Primary Sub-contractors continue to sub-contract several layers below themselves " A dynamic relationship is generated, via a web service, between the suppliers of the Supplier Network System! This scenario results in a complex chain of events leading to complex information access requirements from which the system entity must be authorized to use the resource or service based on the authorization attributes... Page 13

Supply Chain Complexity Car Dealer A (RA) Supplier 1 -Belts Supplier 2 - Oil Car Dealer B (RA) -Tires Supplier Network System/Registry Supplier 3 - Engines Supplier 4 - Glass Distributor (PSP) Page 14

Supply Chain Example Highlights! Resources and Services are published as web services in a UDDI registry! (Supplier): The system entity requesting to sell goods is summoned to provide credentials to the authorizer (I.e., Distributor PSP, Provisioning Service Point a.k.a. Policy Enforcement Point [PEP]) Page 15

Supply Chain Example Highlights! (Dealership): The system entity requests to purchase goods based on the fact that the supplier is authorized to sell those goods! XKMS certificate authority may be used to verify against a certificate to provision that system entity to a service/resource! Within SAML, the Policy Enforcement Point (the Distributor) of the application, checks permissions against the Policy Decision Point for an Authorization Decision Assertion, whether to allow access for the System Entity to that Application. Page 16

Supply Chain Example Highlights! Within SAML s Policy Enforcement Point (the Distributor) of the application, checks permissions against the Policy Decision Point for an Authorization Decision Assertion, whether to allow access for the System Entity to that Application. Page 17

Allowing the System Entity to have Access Page 18

Business Requirements relating to Attributes! Supply chain behavior is based on contractual relationships, legal requirements and regulatory conditions not just security concerns! Must reflect all parameters of the relationship. For example: " Number of users " Types of users / # per type " Length of stay " Access rights " Reporting hierarchy " Administrative hierarchy " Citizenship Page 19

Role of Standards! The role of SAML " SAML handles the Identity Information and its attributes across the transaction between parties " An authorization service is offered as shown in the diagram above Page 20

Role of Standards! The role of SPML " SPML, resident on the service provider and requestor s side, does a lookup on the Authorization Decision Assertion from SAML to understand what the system entity is allowed to sell, purchase, lease, or use at resource or service level " Conditions considered # Systems or Services requesting access for # May be IT-based, Billing, Parts (Services), etc System A SPML Identity Assertion SAML Assertion SPML Identity Assertion System B Page 21

Role of Standards! The role of XACML " Can Provide Detailed cost of transaction # XACML may be used to derive how many transactions were conducted during the month at the XML granular level of the resource or service provided. System Entity Requesting Report SAML Policy Enforcement Point SAML Assertion SPML Identity Assertion System B SAML Policy Decision Point XACML Policy for XML-based Resources XACML Repository Page 22

Analysis of the Scenario! Correct account setup for each person at each layer " Suppliers can only choose from options assigned by their Distributors authorization according to their credentials. " The SAML Authorization Decision Assertion, which tells that the system entity requesting access whether the entity is allowed or denied " If allowed, the SAML Authorization Decision Assertion will be passed to the SPML Identity Assertion at the Supplier s endpoint to validate access to the end resource or service. " Management # Subscription to the requested service or resource is handled according to above constraints # Creation and assignment of security mechanisms to users & resources is properly maintained Page 23

Where does Provisioning fit in?! Suppliers, who may use SPML-compliant applications/services (part of the supplier s endpoint) will validate the access to resources and services on the backend that are requested. " Additional functions that will be effects of using interoperable standards are: # Full end-to-end Audit trail processes providing consolidated reporting # Ability to incorporate Two-Factor Authentication methods to enhance security # Administrating the access to those backend resources/services Page 24

How will SPML help in the future based on what we have learned?! Components which may interoperate with SAML request and response! Delegated administration of digital resources to the extended enterprise " e.g., Access to backend resources for supply chain users and external administrators! Exchange of provisioning requests between users! Exchange of provisioning request and response between organizations Page 25

Collaboration among standards groups! SSJC (Security Standards Joint Committee) " A committee developed within OASIS to promote consistency, interoperability, and re-use across the Technical Committees within OASIS " Example of Joint Collaboration may be the idea of SPML, SAML, XACML working together to a joint goal Page 26

Final Thought! SPML is only one component of the pyramid that will allow identities to be managed effectively and for the ebusiness framework to become fluid. Many standards that need to build this scenario are still in development. Page 27

For further information For more information, please visit: (SPML) http://www.oasis-open.org/committees/spml (SAML) http://www.oasis-open.org/committees/saml (XACML) http://www.oasis-open.org/committees/xacml Business Case Paper may be reviewed at: http://lists.oasis-open.org/archives/provision/200206/msg00008.html Page 28

References HTTP: http://www.w3.org/protocols/ SOAP: http://www.w3.org/tr/soap/ WSDL: http://www.w3.org/tr/wsdl UDDI: http://www.uddi.org ebxml: http://www.ebxml.org SPML: http://www.oasis-open.org/committees/spml SAML: http://www.oasis-open.org/committees/saml XACML: http://www.oasis-open.org/committees/xacml Gottschalk, Karl; Graham, Steve; Kreger, Heather; and Snell, James. Introduction to Web Services Architecture. http://www.research.ibm.com/journal/sj/412/gottschalk.html. Emerging Technologies. IBM Software Group. November 2001. Sodhi, Gavenraj. Subscription and Identity Management Interoperability. http://lists.oasis-open.org/archives/provision/200206/msg00008.html. Business Layers. June 2002. Page 29

Q&A Thanks Page 30

Thank you Gavenraj Sodhi gavenraj.sodhi@businesslayers.com (201) 757-4090 2002 Business Layers, Inc. All rights reserved. The Business Layers logo, eprovision Day One logo, and other marked logos, Business Layers, eprovision Day One, eprovision, eprovisioning, eprovisionware, Making People Productive from Day One, and The eprovisioning Company are trademarks or registered trademarks of Business Layers, Inc. in the United States and other countries. All other company and product names mentioned are the trademarks or registered trademarks of their respective companies.