Interoperate in Cloud with Federation



Similar documents
Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

managing SSO with shared credentials

The Top 5 Federated Single Sign-On Scenarios

Identity. Provide. ...to Office 365 & Beyond

SAML SSO Configuration

MY1LOGIN SOLUTION BRIEF: PROVISIONING. Automated Provisioning of Users Access to Apps

Cloud-Testing vs. Testing a Cloud

Flexible Identity Federation

Automating User Management and Single Sign-on for Salesforce.com OKTA WHITE PAPER. Okta Inc nd Street Suite 350 San Francisco CA, 94107

Single Sign On. SSO & ID Management for Web and Mobile Applications

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102

PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY

The Primer: Nuts and Bolts of Federated Identity Management

SaaS Security Testing: Guidelines and Evaluation Framework

WHITEPAPER SAML ALONE IS NOT SECURE - HERE S HOW TO FIX IT

How To Use Salesforce Identity Features

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

OPENIAM ACCESS MANAGER. Web Access Management made Easy

PingFederate. SSO Integration Overview

Connecting Users with Identity as a Service

Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control

OpenID Connect 1.0 for Enterprise

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM)

Identity Federation Broker for Service Cloud

Cloud Computing. Chapter 5 Identity as a Service (IDaaS)

A Standards-based Mobile Application IdM Architecture

Three Ways to Integrate Active Directory with Your SaaS Applications OKTA WHITE PAPER. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107

CA Technologies Strategy and Vision for Cloud Identity and Access Management

Avoid the Hidden Costs of AD FS with Okta

NCSU SSO. Case Study

Evaluating IaaS security risks

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

The increasing popularity of mobile devices is rapidly changing how and where we

The Primer: Nuts and Bolts of Federated Identity Management

Glinda Cummings World Wide Tivoli Security Product Manager

Single Sign-on. Overview. Using SSO with the Cisco WebEx and Cisco WebEx Meeting. Overview, page 1

Guideline on Implementing Cloud Identity and Access Management

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

Google Apps Deployment Guide

Web Access Management and Single Sign-On

IBM Tivoli Federated Identity Manager

Federated Identity and Single Sign-On using CA API Gateway

SAML 101. Executive Overview WHITE PAPER

The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

Cloud Security: Is It Safe To Go In Yet?

Extend and Enhance AD FS

WHITEPAPER. NAPPS: A Game-Changer for Mobile Single Sign-On (SSO)

SECUREAUTH IDP AND OFFICE 365

White paper December Addressing single sign-on inside, outside, and between organizations

The Challenges of Web single sign-on

Federated Identity for Cloud Computing and Cross-organization Collaboration

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

White paper Contents

CA Federation Manager

Introduction to SAML

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

Okta Identity Management for Portals Built on Salesforce.com. An Architecture Review. Okta Inc. 301 Brannan Street San Francisco, CA 94107

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

Directory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107

How to Overcome Challenges in Deploying Cloud Apps to Get the Most from your IAM Investment

Secure Identity in Cloud Computing

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

PingFederate. Integration Overview

An Overview of Samsung KNOX Active Directory-based Single Sign-On

Achieve Economic Synergies by Managing Your Human Capital In The Cloud

The Essential OAuth Primer: Understanding OAuth for Securing Cloud APIs

Security Services. Benefits. The CA Advantage. Overview

Google Identity Services for work

Enable Your Applications for CAC and PIV Smart Cards

IDENTITY & ACCESS MANAGEMENT IN THE CLOUD

Parallels Automation. Overview of New Features and Enhancements in Version 6.0. White Paper.

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013

Six Best Practices for Cloud-Based IAM

Integrating Single Sign-on Across the Cloud By David Strom

An Introduction to SCIM: System for Cross-Domain Identity Management

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper

CLOUD COMPUTING SECURITY ISSUES

Identity Implementation Guide

Cloud Computing. Key Considerations for Adoption. Abstract. Ramkumar Dargha

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department

Adding Stronger Authentication to your Portal and Cloud Apps

SINGLE & SAME SIGN-ON ASPECTS

TrustedX - PKI Authentication. Whitepaper

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0

Evaluation of different Open Source Identity management Systems

white paper 5 Steps to Secure Internet SSO Overview

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

Transcription:

Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra and Nitin Dangwal Federation in simple terms can be defined as two partners sharing some data. The data could be user s identity, resources, files, resource information or any other information. Identity Federation in particular has gained prominence because Internet users find it painful to maintain multiple access credentials to access services from multiple service vendors. Also, the Cloud service vendors need to maintain multiple access permissions for each user account. In Cloud offerings, multiple service vendors would generally interact with each other, so the need of the hour is a strong federation system built into Cloud-based offerings. The federation can play an important role in enabling two of the most important characteristics of the Cloud: Automatic Provisioning and Seamless Resource Access. Identity Federation enables authentication and authorization via trust credentials propagation. While performing ROI analysis for Cloud offerings, enterprises must also consider the federation support from the Cloud vendors. Enterprises can avoid vendor lock-in scenarios if their associated Cloud vendors support more than one federation s standards. This paper includes various use cases where Cloud federation deployment is substantially beneficial as it supports single sign-on access as well as interoperability. Aug 2011

From the Cloud vendor s perspective, it is advisable that more than one federation s protocols (like SAML, WSFED, OpenID, OAuth, etc.) are supported by the service offerings. Supporting multiple protocols provides the scalability and flexibility to federate with a wide range of products. Multiple protocols support the service offering and this is facilitated through a lightweight federation exchange layer that is deployed as a hub to convert trust attributes from one format to another. Organizations may have an established federation structure deployed within their enterprise. They would choose the Cloud vendor who either supports the same standard or provides the format conversion ability that would offer seamless access. It is out of the scope of this document to discuss how federation in Cloud impacts billing, licensing and tracking of the service parameter quality. Use Case #1: Inter Cloud Federation IaaS (Infrastructure as a Service) is one of the Cloud offerings wherein enterprises would take infrastructure on lease from various Cloud vendors. Although Cloud is considered to have infinite resources, in the real world, there would always be an upper limit based upon restrictions on available hardware, network bandwidth, etc. When there are many infrastructure offerings provided by a Cloud vendor, there arises a situation where the Cloud vendor suffers resource exhaustion. Under such circumstances a single Cloud vendor, by itself, may not be able to fulfill additional infrastructure requirements of enterprises (like requirement of additional servers during peak season). In such cases, Inter Cloud Federation contributes beneath the layers to fulfill the infrastructure requirements of enterprises seamlessly. The enterprise would be aware of only the primary Cloud vendor. Through the primary Cloud vendor s single virtual interface, the enterprise must be able to add infrastructure components and administer them as per their requirements. The actual action (addition, migration, etc.) on infrastructure components in different Clouds would be handled by Cloud vendors automatically. Such operations would be opaque to the enterprise utilizing the Cloud-based IaaS. Single Unified Interface for Administration of all Servers 1 Account Registration Confirmation messages 2 Server Adminstration messages can be SPML based XML messages Administration Server Cloud 1 Cloud 2 Figure 1: Inter Cloud: Single unified interface Providing federation capabilities among the Cloud offerings require all Cloud vendors to use some standardized mechanism for sharing resources and identity among themselves. The resources could be information, files, computing resources, etc. Inter Cloud Federation may require just-in-time identification and messaging protocol between Clouds. Technologies like XMPP (Extensible Messaging and Presence Protocol) can be used for identifying Cloud just-in-time and sharing messages between Clouds. OASIS s SPML (Service Provisioning Markup Language) can be used as a communication protocol between Clouds for user provisioning, resource information sharing and resource sharing. Service Provisioning Markup Language (SPML) provides XML based structures for representing provisioning or deprovisioning requests intended for identity lifecycle management. SPML can also be used for resource provisioning and resource information provisioning among partners. Hence, incorporating and adopting SPML within Cloud offerings can facilitate automatic provisioning and deprovisioning of resources without manual intervention. Inter Cloud Federation provides more flexibility to both Cloud vendors and enterprises. Billing, licensing and usage tracking of services would play an important role in case of Inter Cloud Federation. However, this white paper only focuses on how Inter Cloud Federation can be achieved. Billing, licensing, etc., are currently not discussed in this white paper. 2 Infosys View Point

1 Create Infrastructure Cloud 1 Cloud 2 Cloud, it deploys the services of other public Clouds. In such eventuality, it results in the private Cloud to federate with the public Cloud. 1.a Account Creation Infrastructure 1.b Creation 2 Created Infrastructure Private Cloud 3 Add more Servers 3.a Check capacity? No 3.b Register Account 3.d XML messages for communicating account provisioning,sharing resource info. 3.c Account Provisioning Unidirectional flow between Private and Public Cloud 4 Servers add successfully 3.e Add new servers 3.g XML messages for communicating resource / service provisioning info. 3.f Infra Provisioning Public Cloud 5 Server Maintenance e.g. migrating servers 6 5.a Server maintenance Server Maintenance completed 5.b 5.d Server Administration messages XML based messages for communicating resource / service provisioning,sharing resource info etc. There could be similar business use case where an enterprise is using IaaS from more than one Cloud vendor. The reason for choosing multiple Cloud vendors could be to mitigate risk, to avoid vendor lock-in or to manage bandwidth requirements. Each enterprise would have a secure account information to access specific Cloud offerings. In the production environment, this secure information needs to be shared with other Cloud vendors for seamless connectivity. The automatic activation and provisioning to the second vendor through SPML / SAML should happen in the background without any intervention. Single sign-on is available only with the appropriate federation among Cloud vendors. Public and Private Cloud Federation Server 5.c Maintenance As an extension to the Inter Cloud Federation concept, a private Cloud has restricted access and is controlled completely by the enterprise. It can host sensitive applications that are generally not suitable for deployment on a public Cloud. A private Cloud is not accessible from an outside enterprise network but can access the outside network. Consider a case wherein an enterprise has setup a private Cloud but now requires additional infrastructure. When there are many applications deployed on the private Use Case #2: Federation among Applications The following subsections discuss various deployment models for SaaS offerings and elaborates on how a federation can help in each of the deployment models. Federation among Applications deployed within a Cloud As more and more applications are deployed on a Cloud, communication among applications is inherently required. For instance, a travel service deployed on Cloud should successfully federate with a hotel booking service deployed on the same Cloud by a different SaaS vendor. Two SaaS offerings with in a Single Cloud communicating with each other Cloud User accesses a SaaS offering Infosys View Point 3

Federation amongst various SaaS offerings within a Cloud must be performed using some standardized mechanism like OASIS SAML (Simple Assertion Markup Language), WSFED, OAUTH, OpenID etc. Two SaaS offerings on different clouds communicating with each other Cloud 1 Cloud 2 Identity Provider: XYZTravel.com Service Provider: ABCHotels.com User accesses a SaaS offerring User logs into Application Login Successful User clicks on hotel booking link Assertion Generation Identity provider side generates an assertion and sends it over to the Service provider side for single sign-on Service provider consumes assertion and logs in the user. User is redirected to Service provider s hotel booking page. Assertion Consumption and SSO Federation among On-premise and Cloud Applications Cloud offerings must provide capabilities to be able to federate with on-premise applications through internet Consider a identity provider (XYZTravel.com) who has generated an XML document called assertion. The assertion contains user s identity information, identity provider s identity information, and user authentication details and may also contain attribute information pertaining to the user. This information is shared with Service provider (ABCHotels.com) as per SAML standards. ABCHotels.com validates, parses the assertion document and provides access to the user as per its policies. After successful single sign-on, the user can book the hotel through ABCHotels.com Web site without providing credentials explicitly. Each application (XYZTravel.com and ABCHotels. com) should have its own billing and licensing system. Federation between applications helps applications to federate identity and to perform single sign-on. After single sign-on parameters like licensing, billing etc. can be tracked at each application level. Federation among Applications Deployed on Different Clouds As explained above, using SAML standards for Federations among SaaS offerings would allow individual SaaS offerings to federate with other SaaS offerings deployed on different Clouds. Various SaaS offerings would access each other over Internet through SAML protocol to federate identity, account, service or any other information. Interface to access the offering Access over Internet Cloud Federation based upon protocols like SAML, WSFED, Open ID, Oauth, etc A non cloud offering For example, an on-premise reservation system provided by an independent vendor should be able to federate with a billing SaaS offering on Cloud. The exchange of secure information should happen similar to two SaaS offerings within a single Cloud. There may be use cases wherein an enterprise wants to move from a SaaS Cloud offering back to being hosted as an on-premise application due to security / ROI issues. The migration from a SaaS offering to on-premise application can be made easier with a federation capability between on-premise application and SaaS offerings (like database service or federation with other SaaS offerings). The SaaS offering (or on-premise offering) of the application can then be phased out gradually. Use Case #3: Deprovisioning Automated deprovisioning is one of the concerns in Cloud. When an enterprise uses IaaS from a Cloud 4 Infosys View Point

vendor, the need to provide a reliable mechanism for deprovisioning of resources whenever the contract between the Cloud vendor and the enterprise terminates is required. Deprovisioning can be considered as an extension to Use Case #1; wherein multiple Clouds are federating among themselves to provide required infrastructure services to an enterprise. On the similar lines during deprovisioning, Cloud vendors must federate among themselves to deprovision the resources as per requirements. 1 Existing infrastructure Deprovision infrastructure components Cloud 1 Cloud 2 applications to send / receive deprovisioning messages and act accordingly since it is a standards based approach deprovisioning messages across Cloud vendors. Deprovision has two important aspects associated with it: Migration of Data: The Cloud vendors must provide some mechanism to migrate data, application deployed on Cloud Clean Deprovision of Data: Removing data, application or infrastructure deployed on a Cloud is dependent on individual Cloud vendors to clean up. The clean up must happen as per the contract between the Cloud vendor and the enterprise using the Cloud services. There are risks associated with clean deprovisioning of resource and is out of scope of this white paper Identify 1.a component location Send de-provisioning 1.b message with required information 1.d XML based messages for communicating resource / service provisioning, sharing resource info and deprovisioning 1.c De-provision components Commercial and Contractual Point of View 2 Update component location Database De-provision completed Deprovisioning could be further of user s license, registration, resource access etc. The SPML framework also standardizes deprovisioning message. This would enable cloud vendors and The below table is a proposed contractual model between enterprises and Cloud vendors from understanding perspective. Since different enterprises may have different requirements and one contractual model may not fit all. So Cloud vendors need to provide different contractual offerings to enterprises to choose from. Increasing Contractual flexibility, Complexity and Cost Proposed Contractual models Pricing What is in for Enterprise What is in for Cloud vendors Opaque Cheapest Lesser price. Deployment is opaque to Enterprise. Enterprise does not have any level of control. Translucent More priced Enterprise know what infrastructure component is deployed in which cloud. Transparent / Premium Service. Highest Primary Cloud vendor is the SPOC for Enterprise. Maximum level of control provided to enterprise. Enterprise can choose Tier 2 cloud vendors. Avoids vendor lock-in. Complex contractual model. Least complexity. Cloud vendors determine what infrastructure components are deployed in which cloud. Primary Cloud vendor has control on which Tier 2 clouds vendors should be used. Cloud vendors get better price. Competitive: As enterprise has the flexibility to dump a cloud vendor. Infosys View Point 5

Business Use Case Following example demonstrates the significance of Federating Cloud Providers. Take an example of a Cloud consuming enterprise for storage. The enterprise deals in end-to-end QA assurance of products and majorly provides load testing and performance results and optimization for its clients. For one such scenario, it requires extensive storage for multiple data records to perform load testing for one of the leading Web service. Data storage is required for a short period of time and hence the enterprise is employing multiple IaaS vendors providing storage on demand. The enterprise can use multiple vendors to solicit maximum advantage and ROI using Federation. the even with increase in demand, Cloud vendor will be able to meet the requirements. Market Research: Federation Solutions and Standards for Cloud IAM software vendors have acknowledged the importance of Federation for Cloud services to support Interoperable and Open clouds. Federation solutions from various market leaders are being leveraged and deployed for Cloud Services. Major solutions and products are discussed in following sub sections. CA Technologies QA assurance enterprise Cloud 1 Cloud 2 Cloud 3 A prominent IAM solution vendor CA Technologies has demonstrated that its proprietary CA SiteMinder Federation Security Services and Federation Manager can provide identity federation capabilities and enable user to federate across organizations as well as cloud services. CA Cloud Security products provide end-to-end system for identity and access management for securing: Enterprises leveraging Cloud services Cloud vendors Above diagram demonstrates how this enterprise can interact with multiple storage vendors: The enterprise requests storage from Cloud 1 as well as Cloud 2. Cloud 1 supports different SLA and storage parameters than Cloud 2. Enterprise may also register and employ different Cloud vendors for backup and recovery. Now coming to Cloud 2. Cloud 3 is federated with Cloud 2. When storage requests exceeds the Cloud 2 capacity, Cloud 3 provides extra storage units to Cloud 2. The interaction between Cloud 2 and Cloud 3 is hidden from the end enterprise. SLA and Contracts still stay between the enterprise and Cloud 2. Although, the enterprise is using the storage units from Cloud 3 in case of increase in requirements, yet the whole management and contractual details stay hidden. Hence, Federation between Cloud 2 and Cloud 3 enables the parent Cloud vendor to meet the SLA as promised to the end Cloud consuming enterprise. In turn, enterprise is assured that Cloud offerings and services CA Federation Manager s deployment facilitates identity federation for Salesforce.com, Google Apps and any Cloud offering supporting SAML protocol. CA Identity Manager facilitates auto provisioning and enterprise onboarding by supporting SPML, SAML, Web services and customized connectors. CA has a successful provisioning connector for onboarding from Salesforce.com to Google Apps and demonstrated the capability of just in time provisioning while identity federated SSO and managing enhanced management for Cloud federation. CA also provides additional provisioning connectors for generic SaaS offerings. Ping Identity Ping Identity primarily deals in Federation enabling products like PingFederate and PingConnect. PingFederate has extensive support for SAML protocols and works with any SaaS product / application that supports SAML. PingConnect is an on demand Federation offering online SSO to small 6 Infosys View Point

and medium enterprises. More than 80 SaaS vendors like SalesForce.com, WebEx, Google Apps, and ADP etc. are using Ping Identity products. Ping s Cloud Identity Connectors support federation with Facebook, Salesforce CRM, Google Apps, AOL and Yahoo. Enterprises can now apply authentication to their SaaS applications with the connectors for B2C as well as B2B. Oracle Oracle Identity Federation shares trust data securely and supports SAML protocol. Oracle provides interoperability between Cloud vendors like Salesforce.com, Google Apps and Oracle CRM as a Service. Oracle Identity Federation 11g supports leading standards based protocols that leverages on the Cloud Federation. IBM IBM Tivoli Federated Identity Manager provides federated access control and management to onpremise as well as Cloud based services. IBM provides comprehensive support for SAML 2.0 and claims that its product enables a secure model across Cloud services by facilitating identity federation in a Cloud environment. TriCipher TM TriCipher offers a product named myonelogin that enables SSO to multiple Web services with single trust credentials. myonelogin uses strong authentication and prevents vulnerabilities and attacks. Like Ping Identity products, myonelogin grants access to SaaS vendors like Google Apps, WebEx, Salesforce.com, and Microsoft Outlook, ebay and PayPalTM. The product is also available on demand. Support & Capabilities Matrix Protocols SAML WS- Federation Vendors CA Technologies Oracle /Sun Microsoft Ping Identity OAuth SPML OpenID NA* NA* NA* NA* Google NA* NA* IBM TriCipher TM NA* NA* NA* NA* NA*: Information not available regarding whether the IAM vendor supports that particular protocol or not. The support matrix above highlights the various vendors versus the federation protocols that they support. Note that most vendors do acknowledge and accept almost all Federation protocols; yet the actual support in their products may be in progress and may not be currently available in the market. SAML supports strong authentication and SSO across domains as well. It is apt for most of the Cloud vendor / user requirements and is available in all leading Federation products. Though, OpenID is extensively becoming popular open Federation protocol and is supported by organizations like Google, Microsoft, PayPalTM, IBM, and Yahoo, yet, it is not adopted for Cloud services due to some inherent trust issues. Infosys View Point 7

Conclusion This paper elucidates the importance of Federation in Cloud deployment. In today s competent business scenario, enterprises would need to support various Federation protocols to be able to provide seamless connectivity across applications and across various forms of deployments. From an enterprise perspective, Federation between clouds provides flexibility to avoid vendor lock-in scenario. From the Cloud vendor s perspective, Federation helps to maintain the Quality of Service parameters committed to enterprises. For an end user, Federation provides the capability for seamless access across various applications. References http://www.securitymanagement.com/article/federation-cloud-005262. http://mscerts.net/programming/relevant%20iam%20standards%20and%20protocols%20for%20cloud%20 services%20(part%202).aspx http://www.xmpp.org http://www.pingidentity.com http://cloudstrategypartners.com/resources/using+xmpp+as+a+transport+in+intercloud+protocols+- +Draft+Copy.pdf About the Authors Nitin Dangwal is a Technology Architect at Infosys Engineering Services. He has more than 7 years of industry experience and almost 6 years of experience in Federation and Web Security domain. Over past 6 years, he has been involved in development and sustenance of Federation products. He can be contacted at Nitin_Dangwal@Infosys.com Neha Mehrotra is a Technology Architect at Infosys Engineering Services, Infosys Technologies. She has almost 8 years of experience in Java and Java EE technologies. She has been involved in development and sustenance of identity and access management products. She is currently involved in research involving Testing framework for Cloud based offerings. She can be contacted at Neha_Mehrotra@Infosys.com