An Introduction to User-Managed Access (UMA)



Similar documents
UMA in Health Care: Providing Patient Control or Creating Chaos?

Axway API Gateway. Version 7.4.1

This use study analyzes a specific scenario for a financial credit interaction for an online personal loan request.

Brian Spector CEO, CertiVox. CloudAuthZ

OpenID Connect 1.0 for Enterprise

OAuth2 and UMA for ACE draft-maler-ace-oauth-uma-00.txt. Eve Maler, Erik Wahlström, Samuel Erdtman, Hannes Tschofenig

Access Control Venn Infographics. UMA Work Group 16 July 2013

Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 ( )

Dell One Identity Cloud Access Manager How to Develop OpenID Connect Apps

Egnyte Single Sign-On (SSO) Installation for OneLogin

Add Microsoft Azure as the Federated Authenticator in WSO2 Identity Server

OpenID Deutsche telekom. Dr. Torsten Lodderstedt, Deutsche Telekom AG

SAML and OAUTH comparison

Copyright Pivotal Software Inc, of 10

How to Extend Identity Security to Your APIs

A Standards-based Mobile Application IdM Architecture

Single-Sign-On between On-Premises and the Cloud: Leveraging Windows Azure Active Directory to authenticate custom solutions and Apps

How to create a SP and a IDP which are visible across tenant space via Config files in IS

Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia Pedro Borges

An Identity Management Survey. on Cloud Computing

MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation

OpenID Single Sign On and OAuth Data Access for Google Apps. Ryan Dave Primmer May 2010

Using SAML for Single Sign-On in the SOA Software Platform

Agenda. How to configure

Onegini Token server / Web API Platform

PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0

NISTIC Pilot - Attribute Exchange Network. Biometric Consortium Conference

The Future of Cloud Identity Security. Michael Schwartz Founder / CEO Gluu

The Top 5 Federated Single Sign-On Scenarios

Identity Management with Spring Security. Dave Syer, VMware, SpringOne 2011

Copyright: WhosOnLocation Limited

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

DocuSign Single Sign On Implementation Guide Published: March 17, 2016

Online Identity Attribute Exchange Initiatives

OpenLogin: PTA, SAML, and OAuth/OpenID

Authentication and Authorization for Mobile Devices

OIX IDAP Alpha Project - Technical Findings

OAuth Use Cases. George Fletcher, Torsten Lodderstedt, Zachary Zeltsan. November 2011

Online Identity Attribute Exchange Initiatives

Building Secure Applications. James Tedrick

Enterprise Access Control Patterns For REST and Web APIs

Comparative analysis - Web-based Identity Management Systems

Federation architectures for mobile applications OAuth 2.0 Drivers OAuth 2.0 Overview Mobile walkthrough

BYE BYE PASSWORDS. The Future of Online Identity. Hans Zandbelt Sr. Technical Architect. CTO Office - Ping Identity

Enabling SSO for native applications

Internet-Scale Identity Systems: An Overview and Comparison

IBM WebSphere Application Server

Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Getting Started with AD/LDAP SSO

Get a Whiff of WIF Windows Identity Foundation. Keith Brown

Identity Implementation Guide

Administering Jive Mobile Apps

The increasing popularity of mobile devices is rapidly changing how and where we

Safewhere*Identify 3.4. Release Notes

API-Security Gateway Dirk Krafzig

How To Manage Your Web 2.0 Account On A Single Sign On On A Pc Or Mac Or Ipad (For A Free) On A Password Protected Computer (For Free) (For An Ipad) (Free) (Unhack)

The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs

Identity, Privacy, and Data Protection in the Cloud XACML. David Brossard Product Manager, Axiomatics

OIOSAML Rich Client to Browser Scenario Version 1.0

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

Connected Data. Connected Data requirements for SSO

Identity Federation: Bridging the Identity Gap. Michael Koyfman, Senior Global Security Solutions Architect

Extending APS Packages with Single Sign On. Brian Spector, CEO, CertiVox / Gene Myers, VP Engineering, CertiVox

Proxied Authentication in SSO Setups with Common OSS. Open Identity Summit 2015 Prof. Dr. René Peinl Berlin,

ACR Connect Authentication Service Developers Guide

SAML, The Liberty Alliance, and Federation* Eve Maler

Internet-Scale Identity Systems: An Overview and Comparison

SAML Single-Sign-On (SSO)

TIB 2.0 Administration Functions Overview

UNI. UNIfied identity management. Krzysztof Benedyczak ICM, Warsaw University

USING FEDERATED AUTHENTICATION WITH M-FILES

OAuth 2.0 Developers Guide. Ping Identity, Inc th Street, Suite 100, Denver, CO

DualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.

Security and ArcGIS Web Development. Heather Gonzago and Jeremy Bartley

PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY

Table of Contents. KITC use-case 11 June 2010 Copyright MIT-KC All Rights Reserved. Page 4 of 14

Single Sign On for UNICORE command line clients

Privacy by Design in Federated Identity Management

HOL9449 Access Management: Secure web, mobile and cloud access

Federated Identity and Single Sign-On using CA API Gateway

Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML

Single Sign On. SSO & ID Management for Web and Mobile Applications

BYOD to the Cloud May 28, 2013

nexus Hybrid Access Gateway

Privacy by Design in Federated Identity Management

SAML:The Cross-Domain SSO Use Case

OAuth 2.0: Theory and Practice. Daniel Correia Pedro Félix

Towards an Open Identity Infrastructure with OpenSSO. RMLL Nantes July Fulup Ar Foll Master Architect

Keeping access control while moving to the cloud. Presented by Zdenek Nejedly Computing & Communications Services University of Guelph

Globus Auth. Steve Tuecke. The University of Chicago

IETF 84 SCIM System for Cross-domain Identity Management. Kelly Grizzle

Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper

APIs The Next Hacker Target Or a Business and Security Opportunity?

My Private Cloud. Project Objectives

OpenID & Strong Authentication

AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

Introduction to SAML

Implementation Guide SAP NetWeaver Identity Management Identity Provider

Transcription:

An Introduction to User-Managed Access (UMA) Eve Maler VP Innovation & Emerging Technology eve.maler@forgerock.com @xmlgrrl February 9, 2015 FORGEROCK.COM

Some apps are still in the Web 1.0 dark ages Provisioning user data by hand Provisioning it by value Oversharing Lying! 2

Some other apps are still in the Web 2.0 dark ages The password anti-pattern a third party impersonates the user It s a honeypot for shared secrets B2B partners are in the gray market 3

Apps using OAuth and OpenID Connect hint at a better, if not perfect, way 4

What about selective party-to-party sharing? 5

Our choices: send a private URL Handy but insecure Unsuitable for really sensitive data 6

or require impersonation 7

or implement a proprietary access management system 8

Killing or even wounding the password kills impersonation 9

IoT 2.0 is here and it too needs authorization 10

We have tough requirements for delegated authorization Lightweight for developers Robustly secure Privacy-enhancing Internet-scalable Multi-party Enables end-user convenience 11

The new Venn of access control 12

UMA protocol standardization in context 08 09 10 11 12 13 14 15 OAuth 1.0, 1.0a WRAP OAuth 2.0 Dynamic Client Reg (from UMA/OIDC contribu5ons) JWT Open ID OpenID AB/Connect OpenID Connect Protect Serve UMA Core, OAuth Resource Set Registra7on 5 Jan 15: 45- day public review of V1.0 candidate specs begun: 7nyurl.com/umacore & oauthrsr Interop test suite development under way 13

UMA turns online sharing into a Privacy-by-Design solution The user in User-Managed Access (UMA) Alice s authorization service hears Bob knocking on the resource do the rules say he can come in? 14

UMA-enabled systems can respect policies such as Only let my tax preparer with email TP1234@gmail.com and using client app TaxThis access my bank account data if they have authenticated strongly, and not after tax season is over. When a person driving a vehicle with an unknown ID comes into contact with my Solar Freakin Driveway, alert me and require my access approval. Let my health aggregation app, my doctor s office client app, and the client for my husband s employer s insurance plan (which covers me) get access to my wifi-enabled scale API and my fitness wearable API to read the results they generate. 15

UMA is about interoperable, RESTful authorization-as-a-service Outsources protection to a centralizable authorization server authz relying party (AzRP) authz provider (AzP) Has standardized APIs for privacy and selective sharing SSO relying party (RP) identity provider (IdP) 16

Use-case scenario domains Health Financial Education Personal Government Media Enterprise Web Mobile API IoT 17

Introducing the OpenUMA community open-source project 18

Demo!

Under the hood, it s OAuth++ Loosely coupled to enable an AS to onboard multiple RS s, residing in any security domains This concept is new, to enable party-to-party sharing driven by RO policy vs. run-time consent 20

The RS exposes whatever value-add API it wants, protected by an AS The RPT is the main access token and (by default it s profilable) is associated with time-limited, scoped permissions The RPT is a tuple of these four entities; it may potentially span ROs because the C or RqP should not know which RO controls which resource. 21

The AS exposes an UMA-standardized protection API to the RS The PAT protects the API and binds the RO, RS, and AS Resource registration endpoint Permission registration endpoint Token introspection endpoint 22

The AS exposes an UMA-standardized authorization API to the client The AAT protects the API and binds the RqP, client, and AS RPT endpoint The client may be told: need_info, necessitating trust elevation for authentication or CBAC (or, through extension, ABAC) 23

The AS can collect requesting party claims to assess policy A claims-aware client can proactively push an OpenID Connect ID token, a SAML assertion, a SCIM record, or other available user data to the AS per the access federation s trust framework A claims-unaware client can, at minimum, redirect the requesting party to the AS to log in, press an I Agree button, fill in a form, follow a NASCAR for federated login, etc. 24

UMA Binding Obligations Distributed authorization across domains? Scary! This legal spec enables parties operating and using software entities (and devices) to distribute rights and obligations fairly in access federation trust frameworks Individual! Subject or Nonperson entity Authorizing Party Requesting Party Requesting Party Agent Resource Server Operator Authorization Server Operator Client Operator Important state changes when new pairwise obligations tend to appear: Token issuance Token status checks Permission registration Claims gathering Access requests Successful access 25

Thank you! Eve Maler VP Innovation & Emerging Technology eve.maler@forgerock.com @xmlgrrl FORGEROCK.COM