Скачать презентацию Click to edit Master title style Identity Скачать презентацию Click to edit Master title style Identity

c0e0a23ef43881787c2bf7c11edc4a70.ppt

  • Количество слайдов: 11

Click to edit Master title style Identity & Access Management Presenter: Mike Davis Mike. Click to edit Master title style Identity & Access Management Presenter: Mike Davis Mike. davis@va. gov (760) 632 -0294 January 09, 2007 HEALTH INFORMATION

Definitions Click to edit Master title style • Id. M: Identity management (Id. M) Definitions Click to edit Master title style • Id. M: Identity management (Id. M) is comprised of the set of business processes, and a supporting infrastructure, for the creation, maintenance, and use of digital identities within a legal and policy context. - Burton. Group™ 2003 • IAM: Identity and access management (IAM) is comprised of the set of services to include authentication, user provisioning (UP), password management, role matrix management, enterprise single sign-on, enterprise access management, federation, virtual and metadirectory services, and auditing. - Gartner HEALTH INFORMATION 2

More Master title Click to edit. Definitions style • Provisioning: Provisioning of user access More Master title Click to edit. Definitions style • Provisioning: Provisioning of user access control credentials refers to the creation, maintenance, correlation, synchronization and deactivation of user-objects and user-attributes, as they exist in one or more systems, directories or applications, in response to an automated or interactive business processes. Provisioning software may include one or more of the following processes: change propagation, self service workflow, consolidated user administration, delegated user administration, and federated change control. Provisioning is typically a subsystem or function of an identity management system that is particularly useful within organizations where users may be represented by multiple user objects on multiple systems. - EDE IPT • The process of managing attributes and accounts within the scope of a defined business process or interaction. Provisioning an account or service may involve the Creation, modification, deletion, suspension, restoration of a defined set of accounts or attributes. –OASIS SPML HEALTH INFORMATION 3

Yet edit Master title Click to More Definitions style • Single Sign-on: (SSO) Any Yet edit Master title Click to More Definitions style • Single Sign-on: (SSO) Any user authentication system permitting users to access multiple data sources through a single point of entry. Part of an integrated access management framework. • At present, there is no “universal” definition of SSO, no agreement on whether it is really possible and no understanding of what is considered true SSO. - Pistolstar HEALTH INFORMATION 4

Identity Mgt Attributes Click to edit Master title style HEALTH INFORMATION (1 of 2) Identity Mgt Attributes Click to edit Master title style HEALTH INFORMATION (1 of 2) 5

More to edit Master title style Click Identity Mgt Attributes HEALTH INFORMATION (2 of More to edit Master title style Click Identity Mgt Attributes HEALTH INFORMATION (2 of 2) 6

Access Mgt Attributes Click to edit Master title style HEALTH INFORMATION One. VA Identity Access Mgt Attributes Click to edit Master title style HEALTH INFORMATION One. VA Identity Management IPT, December 19, 2005 One. VA Enterprise Identity Management White Paper, v 1. 3, October 12, 2006 7

Authentication Services Click to edit Master title style • Centralized authentication services reduces complexity Authentication Services Click to edit Master title style • Centralized authentication services reduces complexity – PIV (HSPD 12, NIST FIPS PUB 201) – MS NAS (AD Kerberos) • Applications should accept trusted third party credential…applications do not authenticate users directly – Kerberos, X 509, SAML – CCOW – Security token services (STS) • SSO is intrinsic – SSO is now expected – SSO is now technically feasible HEALTH INFORMATION 8

Click WS Trust scenario style to edit Master title • A client sends a Click WS Trust scenario style to edit Master title • A client sends a SOAP message (Request) to a SOAP based application Server. • The original client request is intercepted at a SOAP gateway and redirected (based on Policy) to the IP/STS. • The SOAP gateway and STS will use WS-Trust messages to enable interoperable processing of the more fundamental WS-Security protected SOAP message sent between the client and the service. HEALTH INFORMATION 9

Click to edit Master title style IDM…Whose Identity is It? • VHA Problem Statement: Click to edit Master title style IDM…Whose Identity is It? • VHA Problem Statement: How does Security Id. M portion of IAM fit with traditional ownership of Id. M controlled by administrative, demographic, payroll and HR functions. Solution: Need standards for Id. M and for IAM. Consistent vocabularies. Clear differentiation of role/ ownership Id data used for different purposes. Oracle Identity Governance Framework is setting the initial definitions in this area prior to vetting in standards organization (TBD). Identity Governance Framework http: //www. oracle. com/technology/tech/standards/idm/igf/index. html HEALTH INFORMATION 10

IAM Technology Viewpoint Click to edit Master title style Assertions • IAM (PIV) transforms IAM Technology Viewpoint Click to edit Master title style Assertions • IAM (PIV) transforms future SOA security infrastructures • Centralization reduces complexity of authn/authz administration • Web Services provide the key underlying standards/technology • Application security (end-end) replaces castle and moat paradigm • SSO is assumed/expected Obstacles • Lack of consistent approach (Different goals, views, vendors) • Immature/incomplete industry technology/few solutions • Developer experience/confidence/ in solutions…resistance to change HEALTH INFORMATION Implications • Projects will use existing/closed solutions to avoid risk • Projects will not be able to adapt to coming centralized infrastructure • Project schedules will limit time to innovate in security • Security will continue to lag Advice Implement/innovate/adopt: • SOA Architecture • CCOW, Kerberos SSO/TTP Authn • HL 7 RBAC/ASIS XACML • Implement Web Services • Manage globally, enforce locally • Pilot a SOA Security Application 11