Federated Identity- and Access Management for the Max-Planck Society



Similar documents
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

Open Source Identity Management

Enterprise Identity Management Reference Architecture

First-hand Information about the Enhanced Functionality and Integration Options Within SAP NetWeaver Identity Management 7.2

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

Delivering value to the business with IAM

Identity Governance Evolution

Identity & Access Management new complex so don t start?

Nutzung der BSI SOA Security Platform secrt

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

midpoint Overview Radovan Semančík December 2015

Quest One Identity Solution. Simplifying Identity and Access Management

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

Three Case Studies in Access Management

Trust but Verify: Best Practices for Monitoring Privileged Users

Apache Syncope OpenSource IdM

Securing your business

Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x

PingFederate. SSO Integration Overview

Identity Management with SAP NetWeaver IdM

Single Sign On. SSO & ID Management for Web and Mobile Applications

The Top 5 Federated Single Sign-On Scenarios

Documentation. CloudAnywhere. Page 1

Identity and Access Management. An Introduction to IAM

Identity Management. Manager, Identity Management. Academic Technology Services. Michigan State University Board of Trustees

API Architecture. for the Data Interoperability at OSU initiative

SAP Identity Management Overview

The Unique Alternative to the Big Four. Identity and Access Management

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

RSA Identity Management & Governance (Aveksa)

Managing identities. TICAL 2012, Lima, Peru Roland Hedberg tisdag 3 juli 12

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

Managing Access for External Users with ARMS

Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase

Shibboleth Identity Provider (IdP) Sebastian Rieger

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department

POTENTIAL DHH TECHNICAL ARCHITECTURE

Access Management Analysis of some available solutions

The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT

enterprise professional expertise distilled

Distributed File Systems An Overview. Nürnberg, Dr. Christian Boehme, GWDG

Authentication: Password Madness

NT III - Authentication and Authorisation Service

How To Improve Your University'S Reputation

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

Lot 3 Service Specification MANAGED MOBILE SERVICE

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

PingFederate. Integration Overview

Identity Management for Interoperable Health Information Exchanges

How to Get to Single Sign-On

BlueCielo Meridian Today

Encore Software Solutions (V3) Identity Lifecycle Management and Federated Security Suite (ILM/FSS) Overview and Technical Requirements

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

OracleAS Identity Management Solving Real World Problems

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Get Cloud Ready: Secure Access to Google Apps and Other SaaS Applications

BRITISH LIBRARY BOARD. Tuesday, 9 February F.O.I. Publication Status: OPEN - to be released without redaction IT STRATEGY

The Role of Federation in Identity Management

How Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT

The Challenges of Web single sign-on

WHITE PAPER Usher Mobile Identity Platform

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1

Development and deployment of integrated attribute based access control for collaboration

S P I E Information Environments Shibboleth and Its Integration into Security Architectures. EDUCAUSE & Internet 2 Security Professionals Conference

Biometric Single Sign-on using SAML

Cal Racey

BOF4803 Open source identity and access management. 1 October :30p San Francisco CA

Bill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Identity Access Management Challenges and Best Practices

Federated Identity Management Checklist

Identity Management with midpoint. Radovan Semančík FOSDEM, January 2016

Identity Management Overview. Bill Nelson Vice President of Professional Services

WSM 11 & Roadmap Lars Onasch Sr. Director Web Site Management

G-Cloud 7 Service Description Document. Third Party Services. Zendesk Licences 1. Zendesk Services (Consulting) 2. Nexus Pro Licences & Services 3

Derek Burney General Manager Microsoft SharePoint Platform Microsoft Corporation

E-LibUkr portal: Case study of Shibboleth and EZProxy in Ukraine.

Unifying IT Vision Through Enterprise Architecture

Course 50382A: Implementing Forefront Identity Manager 2010 OVERVIEW

Enabling cloud for e-science with OpenNebula

How To Manage A Database On A Microsoft System (U.S.A.Com)

Identity & Access Management Gliding Flight. Paolo Ottolino PMP CISSP ISSAP CISA CISM OPST ITIL

White Pages Managed Service Solution Rapid Global Directory Implementation. White Paper

Overcoming Barriers to Federation and Making IdPs Easier

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

DAMe Deploying Authorization Mechanisms for Federated Services in the eduroam Architecture

Integration of Shibboleth and (Web) Applications

SAML SSO Configuration

Why Cloud Platforms are the Secret Weapon to Make Your Business More Agile and Competitive

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, :00 AM

SNOW SOFTWARE. Fredrik Spolén Country Manager Sales Director. Norway Denmark Finland

A Shibboleth View of Federated Identity. Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Transcription:

Federated Identity- and Access Management for the Max-Planck Society Organisational Aspects & Funding Prof. Dr. Ramin Yahyapour Christof Pohl, Andreas Ißleiber GWDG Gesellschaft für wissenschaftliche Datenverarbeitung mbh Göttingen

Why FIM for the MPS? Growing importance of trans-institutional and external IT services and resources Examples: Collaboration: Conferencing, File Exchange, Wiki, SharePoint, SAP & E-Procurement Asset & License Management MPDL Services & Publications GWDG Customer Portal WLAN, DFNRoaming/eduroam Spam Filtering Paradigm: Support such applications without limiting the flexibility of local administration by centralization Federated Identity Management Meeting, 6/21/2012, Nijmegen 2

Status Quo: MPS Organization and Service Roles OUs MPIs Provided Services Research Services Service Consumer MPDL Data Centers (GWDG, RZG) Administrative Headquarters Digital Library Services: Access to Publisher Resources, Publications, IT Services: Collaboration, eduroam, File Exchange, Spam Filtering, Administrative Services: SAP, E- Procurement, Central Service Units (CSUs) Service Provider Federated Identity Management Meeting, 6/21/2012, Nijmegen 3

Status Quo: Local Identity- & Access Management at the MPIs App Varying from basic User Management Individual user accounts and -data in a multitude of application systems Low level of User Management automation Users App Users App Users MPI* to comprehensive Identity Management (IdM) solutions: Central user account and data repositories Only application specific data in application systems High level of User Management automation AD/ LDAP MPI** Federated Identity Management Meeting, 6/21/2012, Nijmegen 4 App App App IdM

Status Quo: Local Identity- & Access Management at the CSUs MPDL Basic IdM functionality for MPDL employees Federated Access Management for Publisher Resources through MPS AAI (Shibboleth) GWDG Advanced IdM solution (MetaDir) for identities of MPS and University of Göttingen Local Access Management (GWDG Account), Participation in MPS AAI (Shibboleth) Administrative Headquarters SAP Netweaver IdM for Management of MPS identities Considering MPS AAI for Access Management Federated Identity Management Meeting, 6/21/2012, Nijmegen 5

Status Quo: IdM Expansion Stages Expansion Stages Repository Management Basic Advanced Professional ID-Repository MetaDirectory n/a Lifecycle Management Manual Administration Provisioning Role-Management Self Service Priviledged User Management Access Management Login/PW SSO RBAC Strong Authentication AAI Policies & Workflows CRUD Basic Policies Workflows Policy Repository Federation Compliance & Audit Monitoring Reports Audit Compliance Federated Identity Management Meeting, 6/21/2012, Nijmegen 6

Challenges: Understanding of IdM & AAI Identity Lifecycle Active Directory Workflows Challenge I: Service Provider AAI SAML Identity Provider LDAP Provisioning MetaDir SAP Netweaver Unify understanding of Federated Identity & Access Management within the MPS Shibboleth Federated Identity Management Meeting, 6/21/2012, Nijmegen 7

Challenges: Federated vs. Local IAM Federated Identity Management needs (at least) to handle all identities of the MPS Advanced FIM Use Cases may also apply to external parties (partner institutions, companies, fellow researchers, ) Existing IdM activities of the CSUs should be considered as a starting point when inventing FIM at the MPS FIM needs to be connected to the local IdM solutions of MPIs and CSUs Challenge II: Find technical solutions for an FIM infrastructure with appropriate interfaces to the (heterogeneous) IdM approaches at the MPIs and CSUs Federated Identity Management Meeting, 6/21/2012, Nijmegen 8

Challenges: Efforts for inventing a FIM FIM work packages Requirements analysis (Identity Lifecycle, interfaces to services and local IdMs, provisioning workflows, AAI Use Cases, ) Conceptual design and IT architecture for FIM & FAM Implementation (core FIM components, interface programming) Testing, Documentation, initial Deployment Rollout & Integration (connect 80+ MPIs and the CSUs) Maintenance IAM projects tend to be time- and resource-intensive Challenge III: Ensure adequate funding of the FIM project Federated Identity Management Meeting, 6/21/2012, Nijmegen 9

Challenge I: Understanding FIM Prove Create Identity Management From: Gartner, 7/2011 Retire Use Verify Change Authorize Access Management Identity- and Access-Management solutions focus on different aspects of IAM From an IT perspective, both are separate systems But, they closely depend on each other in many use case scenarios Authenticate Federated Identity Management Meeting, 6/21/2012, Nijmegen 10

Challenge I: IdM vs. AAI solutions AAI solutions/shibboleth provide basic FIM features, e.g. transmission of user attributes are mainly designed for use with web applications (Web-SSO) IdM solutions provide advanced FIM features, e.g. connectors to lots of IT systems (LDAP, AD, Exchange, SQL, ), workflow engines, etc. can be used for provisioning of AAI systems (Identity Provider) Complex IT infrastructures (Data Center Infrastructure, SAP Business Software) need advanced IdM functionality FIM features of AAI solutions are not sufficient Advanced features of IdM products are used FIM needs dedicated products for its IdM & AAI parts Federated Identity Management Meeting, 6/21/2012, Nijmegen 11

Challenge II: Relation of Local and Federated IdM Federated IdM First & Last Name User Id/Login E-Mail Address (eventually more) Local IdM First & Last Name User Id/Login E-Mail Address Birthdate Department Office Roles X, Y,...... Local and Federated IdM have a different level of detail Federated IdM does not replace local IdM! Federated Identity Management Meeting, 6/21/2012, Nijmegen 12

Challenge II: IT-Infrastructures for FIM (Variant 1) Asset Management eduroam Spam Filter Publications Customer Portal File Exchange Conferencing SAP E-Procurement ASi Shib. IdP AD OpenID AD LDAP Shib. IdP Local User-DB @MPI* Local IdM @MPI** Local IdM @AHQ Federated Identity Management Meeting, 6/21/2012, Nijmegen 13

Challenge II: IT-Infrastructures for FIM (Variant 2) Asset Management eduroam Spam Filter Publications Customer Portal File Exchange Conferencing SAP E-Procurement ASi AD LDAP Shib. IdP OpenID Combined FIM Local IdM @AHQ Local User-DB @MPI* Local IdM @MPI** Federated IdM as-a-service Federated Identity Management Meeting, 6/21/2012, Nijmegen 14

Challenge II: Connectors to a Combined FIM (1) Combined FIM Local IdM @AHQ AD LDAP SQL Local User- DB @MPI 1) Local IdM @MPI 2) Local IdM @MPI 3) Local User- DB @MPI 4) MPI <-> Combined FIM through simple interfaces (LDAP, AD, SQL-DB, SAP, Flat File, Command Driver/Shell, etc.) Combined FIM <-> AHQ-IdM might use advanced features (e.g. workflows) Federated Identity Management Meeting, 6/21/2012, Nijmegen 15

Challenge II: Connectors to a Combined FIM (2) LDAP Remote Loader Encrypted Connection FIM Connector Remote Loader Java Application Runs on the MPI s Identity Repository Available Remote Loaders Directory Services (AD, LDAP,...) Databases (Oracle, mysql, ) SAP Command Driver (Shell-Scripts) Flat File (e.g. CSV file)... Federated Identity Management Meeting, 6/21/2012, Nijmegen 16

Challenge III: Awareness Identify relevant use cases which show the demand for a FIM Promote the benefits from an institutional approach and create critical mass for reference implementations Involve the MPS Stakeholders in fleshing out the use cases and convince them of the necessity to invent a FIM IAM and FIM are important infrastructure services that need a long-term strategy Establish a roadmap to consolidate the FIM with the selected added value service as part of a long-term strategy Federated Identity Management Meeting, 6/21/2012, Nijmegen 17

Challenge III: Financing Models - Variant a) Central Funding Invention of FIM through a central project with dedicated budget to establish the core functionalities Maintenance of the resulting FIM solution Activity focus: Development of core FIM components Realization of interfaces to important central IT systems Maintenance: - Updates - Bug fixes - Help desk Federated Identity Management Meeting, 6/21/2012, Nijmegen 18

Challenge III: Financing Models - Variant b) Offer-driven Funding An OU (e.g. Data Center) invents standardized FIM services, which are offered to all MPIs Institutional funding, or fixed costs for offers, customers of these services are billed Activity focus: Standardized interfaces between FIM and local IdM solutions (e.g. LDAP & AD) Connect own services to the FIM (added value) Federated Identity Management Meeting, 6/21/2012, Nijmegen 19

Challenge III: Financing Models - Variant c) On-demand Funding Realization of individual use-case scenarios on an on-demand basis; e.g. maintaining an interface for a specific local IdM or requested service Invoicing based on time and cost in individual projects Activity focus: Provisioning/Identity Lifecycle for individual services (e.g. research resources) Connection to non-standardized Local IdM solutions Federated Identity Management Meeting, 6/21/2012, Nijmegen 20

Challenge III: Financing Models - Assessment Most likely a mix, especially of a) and c) would lead to sufficient but fairly distributed funding of a FIM invention project Core services need to be centrally funded or maintained, e.g. through the central service units. An FIM is never complete but needs to evolve through projects and maintenance services. Status Max Planck Society: In an early phase for a MPS-wide FIM Mix of existing service provisioning and projects Federated Identity Management Meeting, 6/21/2012, Nijmegen 21

Conclusion FIM is a future-oriented topic for the MPS With the increasing importance of IT services and resources in science, the demand for an adequate FIM solution will grow For inventing FIM, a trans-institutional project must be established A common understanding of FIM needs to be developed The MPS AAI is not sufficient to cover the requirements of FIM Current IdM activities of MPS OUs focus mainly on the local IT infrastructure Long-term Funding of a FIM project should be a mix of central funding for the core FIM functionalities offer-based funding for standardized FIM tasks on-demand funding for individual, non-standardized FIM tasks Federated Identity Management Meeting, 6/21/2012, Nijmegen 22

Questions? Prof. Dr. Ramin Yahyapour ramin.yahyapour@gwdg.de www.gwdg.de Tel.: +49 (0)551 201-1545/ -1510 Fax: +49 (0)551 201-2150 Gesellschaft für wissenschaftliche Datenverarbeitung mbh Göttingen Am Fassberg 11 37077 Göttingen Federated Identity Management Meeting, 6/21/2012, Nijmegen 23