SlideShare a Scribd company logo
1 of 25
Download to read offline
Unlock the Business Potential of Service-
   Oriented Architectures via Identity
             Management
                    1


             BRUCE O'DELL
 SENIOR CONSULTANT, RISK MANAGEMENT
    AERITAE CONSULTING GROUP LTD.
         BODELL@AERITAE.COM
Agenda
                          2

 What is a service-oriented architecture (and
    why should security people care)?
   Prehistoric SOAs... primitive security
   Modern SOAs... point-to-point protocols
   Internet SOAs... novel products and services
   Future SOAs... “security” disappears
   And what to watch for next
Defining an SOA
                          3
 Wikipedia
     • SOA separates functions into distinct units, or
       services, which developers make accessible
       over a network in order to allow users to
       combine and reuse them in the production of
       applications.
 Key concepts
  – Encapsulation, composition, discoverability,
    abstraction... and, of course, re-use
  – Limitless scope for SOA design pattern
     • Component, application, organization,
       enterprise, consortium, nation, planet...
But... why bother perfectly
                 nice security people about SOA?
                           4

 SOA sounds like a great idea... but
  – In practice, results seldom matched the hype
  – Basic security requirements (authentication,
    authorization, confidentiality, non-repudiation,
    integrity, denial of service...) have been key
    dis-enablers of SOA
  – Paradoxically security is also about to the catalyst
    for an SOA renaissance
 To understand why... let's take a little trip
 through SOA history
Platforms that time forgot
                                                                  5

  Fossil records show (long ago) distributed
    object protocols fought to rule the world

The OMA - Object Management Architecture -    DCOM sits right in the middle of the components of your application; it
categorizes objects into four categories: the provides the invisible glue that ties things together
CORBAservices™, CORBAfacilities™,
CORBAdomain™ objects, and Application Objects.
Here is the classic OMA diagram:




   Source: OMG, http://www.omg.org/gettingstarted/specintro.htm
                                                                      Source: http://msdn.microsoft.com/en-us/library/ms809311.aspx

                     CORBA (IIOP)                                                   DCOM (DCE RPC)
The rise of web services
                                 6

 Both DCOM and CORBA were for all intents
 and purposes wiped out by the same
 “asteroid”... the Internet
     • XML over HTTP worked fine across firewalls
     • Free of platform-specific security hooks
     • Bridges Java, COM (and .NET) services + more
 A SOAP inventor's view
  – “low-tech wire protocols based on the standards of the Internet...
    I went on a private tour of execs in the industry, but none of
    them (I think) had a clue what I was talking about.” - Dave
    Winer
Web services challenges
                          7

 No XML security standards for a very long time
  – Security interoperability = standards, but
  – Multiple vendors + consensus =


 What was available …
  – Transport-layer security
     • Confidentiality
     • Basic or cert authentication


 Proliferation of roll your own solutions
WS-* to the rescue?
                          8

 Web services security standardization
  – Gradual emergence of security standards
  – More gradual adoption by vendors
  – Even more gradual interoperability
                Key standards
 WS-Security
  – How to pass credentials
 WS-Trust
  – The birth of the security token
Unbearable coolness of
                      security tokens
                          9

 Good answer to hard questions
  – Standard way to pass identity attributes
     • Arbitrary assertions
     • Attributes sound basis for RBAC
  – Digitally signed XML
     • Authentication, integrity, non-repudiation
  – Self contained and verifiable
     • Enables delegation of trust
     • Eliminates identity management by daily
       “batch file” transfer
Anatomy of a security token
                                10
<saml:Assertion
 <saml:Conditions> metadata </saml:Conditions>
 <saml:AuthenticationStatement
  <saml:Subject>
    <saml:NameIdentifier>subject</saml:NameIdentifier>
    <saml:SubjectConfirmation> metadata </saml:SubjectConfirmation>
  </saml:Subject>
 </saml:AuthenticationStatement>
 <saml:AttributeStatement>
  <saml:Subject>
    <saml:NameIdentifier>name</saml:NameIdentifier>
  </saml:Subject>
    <saml:Attribute AttributeName="name">
    <saml:AttributeValue>value</saml:AttributeValue>
  </saml:Attribute>
 </saml:AttributeStatement>
 <ds:Signature … digital signature & metadata... </ds:Signature>
</saml:Assertion>
Internet SOAP web
                           11
                              services?
 Vendor products began to support WS-
 Security
  –   SAML token binding
  –   Digital signatures are fragile
  –   Cross-vendor compatibility
  –   Heavyweight protocol
  –   Token lifetime & renewal


 Web browser SOAP client?
  – B2B niche, but SOAP seldom direct to end-users
RESTful evolution
                         12

 Web 2.0 – a lightweight way to browse
 REST = SOAP - except inside out
  – SOAP
     • complex request
     • obfuscated scope
     • “heavyweight” XML
        security parameters
  – REST
     • simple request, self-evident scope
     • “lightweight” query string security params
OpenID and OAuth
                         13

 Modeling identity as URI resources
 Identity providers + relying parties
  – Internet single sign on
  – Application to application permissioning
  – User control of attribute sharing




           OpenID                        OAuth
Web 2.0 threat model
                        14

 Deliberately break scripting “sandbox”
 JSON – render objects from content stream
 Asynchronous XML data transactions
 Cross-site request forgery
 Phishing OpenID 1.0
 Spoofing OAuth 1.0
 XML injection and DOS
 Domino effect - if federated IDP (Facebook) is
 compromised, so are FacebookConnect sites
Federated Identity and
                              15
                                 SSO
Identity Provider Site                   Service Provider Site




           1. Authenticate      1. Receive the
              the user             “token”
           2. Generate a        2. Verify its digital
              digitally-           signatures
              signed “token”    3. Create a valid
           3. Include one or       user session on
              more                 SP site using
              attributes           attributes
              needed by a          passed from IDP
              service
              provider
Federated account linking
                                         16

             Identity Provider                                Service Provider
             Site A                                           Site B
                                                            Invite user to
                                               Recognize link site B
                         Identity A            user is part     identity
                                                of IDP A       to site A
                                                               identity


•   Identity Provider Recognition: the Service Provider needs some mechanism
          to recognize that a Service Provider user is also registered with an
          Identity Provider within their circle of trust.

•   Service Provider Enrollment: the user is invited to link their SP account to
          their IDP identity, and logs in (one last time) to the SP. The linkage
          is registered on the IDP end, and the SP login is bypassed in future




                                                                                 | Page 16
User-centric identity
    17
Claims-based architecture
                                                                   18

 Abstract authentication from authorization




Source: http://download.microsoft.com/download/7/D/0/7D0B5166-6A8A-418A-ADDD-95EE9B046994/Claims-Based%20Identity%20for%20Windows.pdf
Internet-scale SOA
                        19

 Combine...
  –   large-scale consumer IDPs
  –   affiliated, linked service providers
  –   portable consumer identity tokens
  –   composable, RESTful web services
  –   mobile, location-aware hardware
  –   REST-SOAP gateways to corporate services

 … for ubiquitous, SOA internet applications
Today, RBAC...
                       tomorrow, ABAC?
                            20

 RBAC is the best idea seldom implemented
  – Role based access controls are great
  – Role based access controls are awful
 Attribute based access control (ABAC)
  –   A subject (an attending physician)
  –   An action (wants to read)
  –   A resource (a patient's test result)
  –   A context (in the ER at 2:00 AM)
 Practical considerations
  – Avoid RBAC complications
  – Limited choice of platforms for now
XACML as a design pattern
                       21

 XACML standard for ABAC




 Abstraction of IAM complete: authentication,
 authorization and policy metadata
XACML as a real platform
                        22

 More academic interest than industrial products
  – Example: Axiomatics product architecture
Internet 3.0 web services
                         23

 Internet 3.0
  – Web 2.0 + semantics + federated identity
 Interoperable attribute authorities
  – STS-mediated circles of trust
  – Semantic attribute mapping
 Multiple levels of assurance
 Ubiquitous ABAC
 Strong privacy safeguards...
  – Which many will choose to ignore to gain
    benefits of transparency within social networks
Long road to invisibility
                         24
 Evolution of SOA as driven by evolution of
 security
  – Before 1990 – monolithic platform SOAs,
    monolithic security (ACF2, RACF)
  – 1990 – 2000: distributed object SOAs, DCOM and
    CORBA security wrappers
  – 2000 – 2010: point to point SOAP with TLS
  – 2010 – 2015: consumer identity federation with
    portable identity
  – 2015 – 2020: ABAC and semantics for compliance
    and management of complexity
  – 2020 – SOA ubiquitous, “security” declarative
Questions?          YOUR
                       25
                                     LOGO

 Bruce O'Dell
 Senior Consultant, Risk Management
 Aeritae Consulting Group Limited
 bodell@aeritae.com
 (651) 229-0300
 www.aeritae.com



Leaders in bringing innovation, balance, and
     performance to IT organizations

More Related Content

What's hot

Context Automation (with video demos)
Context Automation (with video demos)Context Automation (with video demos)
Context Automation (with video demos)Phil Windley
 
OreDev 2008: Software + Services
OreDev 2008: Software + ServicesOreDev 2008: Software + Services
OreDev 2008: Software + Servicesukdpe
 
Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Hitachi, Ltd. OSS Solution Center.
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementNoam Bunder
 
OAuth 2.0 and OpenID Connect
OAuth 2.0 and OpenID ConnectOAuth 2.0 and OpenID Connect
OAuth 2.0 and OpenID ConnectJacob Combs
 
P hallam baker_keynote
P hallam baker_keynoteP hallam baker_keynote
P hallam baker_keynoteshindeshekhar
 
Iiw2007b Madsen 01
Iiw2007b Madsen 01Iiw2007b Madsen 01
Iiw2007b Madsen 01Paul Madsen
 
Extending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudExtending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudCA API Management
 
Layer 7: 2010 RSA Presentation on REST and Oauth Security
Layer 7: 2010 RSA Presentation on REST and Oauth SecurityLayer 7: 2010 RSA Presentation on REST and Oauth Security
Layer 7: 2010 RSA Presentation on REST and Oauth SecurityCA API Management
 
TechEd Preconference
TechEd PreconferenceTechEd Preconference
TechEd PreconferenceSimon Guest
 
4. tmg 2010 e uag 2010
4. tmg 2010 e uag 20104. tmg 2010 e uag 2010
4. tmg 2010 e uag 2010Fabrizio Volpe
 
Datapower it sec2019
Datapower   it sec2019Datapower   it sec2019
Datapower it sec2019Goran Angelov
 
Dave Carroll Application Services Salesforce
Dave Carroll Application Services SalesforceDave Carroll Application Services Salesforce
Dave Carroll Application Services Salesforcedeimos
 
User manual of i vms 4200-v2.3.1_20150415
User manual of i vms 4200-v2.3.1_20150415User manual of i vms 4200-v2.3.1_20150415
User manual of i vms 4200-v2.3.1_20150415IsraelGuillen12
 
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer
 
InterConnect 2015 session 2825 cics_and_the_new soa
InterConnect 2015 session 2825  cics_and_the_new soaInterConnect 2015 session 2825  cics_and_the_new soa
InterConnect 2015 session 2825 cics_and_the_new soanick_garrod
 
SURFnetRelatiedagen Microsoft Online Strategie 15 5 2008 V1.0
SURFnetRelatiedagen   Microsoft Online Strategie   15 5 2008   V1.0SURFnetRelatiedagen   Microsoft Online Strategie   15 5 2008   V1.0
SURFnetRelatiedagen Microsoft Online Strategie 15 5 2008 V1.0Peter de Haas
 

What's hot (20)

Context Automation (with video demos)
Context Automation (with video demos)Context Automation (with video demos)
Context Automation (with video demos)
 
OreDev 2008: Software + Services
OreDev 2008: Software + ServicesOreDev 2008: Software + Services
OreDev 2008: Software + Services
 
Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement Management
 
OAuth 2.0 and OpenID Connect
OAuth 2.0 and OpenID ConnectOAuth 2.0 and OpenID Connect
OAuth 2.0 and OpenID Connect
 
P hallam baker_keynote
P hallam baker_keynoteP hallam baker_keynote
P hallam baker_keynote
 
Iiw2007b Madsen 01
Iiw2007b Madsen 01Iiw2007b Madsen 01
Iiw2007b Madsen 01
 
Extending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudExtending Enterprise Security into the Cloud
Extending Enterprise Security into the Cloud
 
Layer 7: 2010 RSA Presentation on REST and Oauth Security
Layer 7: 2010 RSA Presentation on REST and Oauth SecurityLayer 7: 2010 RSA Presentation on REST and Oauth Security
Layer 7: 2010 RSA Presentation on REST and Oauth Security
 
TechEd Preconference
TechEd PreconferenceTechEd Preconference
TechEd Preconference
 
4. tmg 2010 e uag 2010
4. tmg 2010 e uag 20104. tmg 2010 e uag 2010
4. tmg 2010 e uag 2010
 
Datapower it sec2019
Datapower   it sec2019Datapower   it sec2019
Datapower it sec2019
 
Dave Carroll Application Services Salesforce
Dave Carroll Application Services SalesforceDave Carroll Application Services Salesforce
Dave Carroll Application Services Salesforce
 
User manual of i vms 4200-v2.3.1_20150415
User manual of i vms 4200-v2.3.1_20150415User manual of i vms 4200-v2.3.1_20150415
User manual of i vms 4200-v2.3.1_20150415
 
Authentication Server
Authentication ServerAuthentication Server
Authentication Server
 
17h30 aws enterprise_app_jvaria
17h30 aws enterprise_app_jvaria17h30 aws enterprise_app_jvaria
17h30 aws enterprise_app_jvaria
 
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
 
Analyzing OAuth
Analyzing OAuthAnalyzing OAuth
Analyzing OAuth
 
InterConnect 2015 session 2825 cics_and_the_new soa
InterConnect 2015 session 2825  cics_and_the_new soaInterConnect 2015 session 2825  cics_and_the_new soa
InterConnect 2015 session 2825 cics_and_the_new soa
 
SURFnetRelatiedagen Microsoft Online Strategie 15 5 2008 V1.0
SURFnetRelatiedagen   Microsoft Online Strategie   15 5 2008   V1.0SURFnetRelatiedagen   Microsoft Online Strategie   15 5 2008   V1.0
SURFnetRelatiedagen Microsoft Online Strategie 15 5 2008 V1.0
 

Similar to O Dell Secure360 Presentation5 12 10b

CTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricCTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricSpiffy
 
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...Cisco Canada
 
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...Using Windows Azure for Solving Identity Management Challenges (Visual Studio...
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...Michael Collier
 
Cloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security ExplainedCloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security ExplainedCisco Canada
 
Cisco connect winnipeg 2018 cloud and on premises collaboration security ex...
Cisco connect winnipeg 2018   cloud and on premises collaboration security ex...Cisco connect winnipeg 2018   cloud and on premises collaboration security ex...
Cisco connect winnipeg 2018 cloud and on premises collaboration security ex...Cisco Canada
 
Protecting Your APIs Against Attack & Hijack
Protecting Your APIs Against Attack & Hijack Protecting Your APIs Against Attack & Hijack
Protecting Your APIs Against Attack & Hijack CA API Management
 
Cloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security ExplainedCloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security ExplainedCisco Canada
 
The Middleware technology that connects the enterprise
The Middleware technology that connects the enterpriseThe Middleware technology that connects the enterprise
The Middleware technology that connects the enterprise Kasun Indrasiri
 
Middleware in the cloud platform-v2
Middleware in the cloud   platform-v2Middleware in the cloud   platform-v2
Middleware in the cloud platform-v2Hammad Rajjoub
 
451 Research Client Event Nov 10
451 Research Client Event Nov 10451 Research Client Event Nov 10
451 Research Client Event Nov 10stavvmc
 
“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with EverythingDave Hay
 
Mike Taulty MIX10 Silverlight 4 Patterns Frameworks
Mike Taulty MIX10 Silverlight 4 Patterns FrameworksMike Taulty MIX10 Silverlight 4 Patterns Frameworks
Mike Taulty MIX10 Silverlight 4 Patterns Frameworksukdpe
 
Microservices: Where do they fit within a rapidly evolving integration archit...
Microservices: Where do they fit within a rapidly evolving integration archit...Microservices: Where do they fit within a rapidly evolving integration archit...
Microservices: Where do they fit within a rapidly evolving integration archit...Kim Clark
 
CIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCloudIDSummit
 
MS TechDays 2011 - How to Run Middleware in the Cloud Story of Windows Azure ...
MS TechDays 2011 - How to Run Middleware in the Cloud Story of Windows Azure ...MS TechDays 2011 - How to Run Middleware in the Cloud Story of Windows Azure ...
MS TechDays 2011 - How to Run Middleware in the Cloud Story of Windows Azure ...Spiffy
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016 ForgeRock
 
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...VMworld
 
S+S Architecture Overview
S+S Architecture OverviewS+S Architecture Overview
S+S Architecture OverviewDavid Solivan
 

Similar to O Dell Secure360 Presentation5 12 10b (20)

CTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricCTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App Fabric
 
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
 
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...Using Windows Azure for Solving Identity Management Challenges (Visual Studio...
Using Windows Azure for Solving Identity Management Challenges (Visual Studio...
 
Cloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security ExplainedCloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security Explained
 
Cisco connect winnipeg 2018 cloud and on premises collaboration security ex...
Cisco connect winnipeg 2018   cloud and on premises collaboration security ex...Cisco connect winnipeg 2018   cloud and on premises collaboration security ex...
Cisco connect winnipeg 2018 cloud and on premises collaboration security ex...
 
Protecting Your APIs Against Attack & Hijack
Protecting Your APIs Against Attack & Hijack Protecting Your APIs Against Attack & Hijack
Protecting Your APIs Against Attack & Hijack
 
Cloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security ExplainedCloud and On Premises Collaboration Security Explained
Cloud and On Premises Collaboration Security Explained
 
The Middleware technology that connects the enterprise
The Middleware technology that connects the enterpriseThe Middleware technology that connects the enterprise
The Middleware technology that connects the enterprise
 
Middleware in the cloud platform-v2
Middleware in the cloud   platform-v2Middleware in the cloud   platform-v2
Middleware in the cloud platform-v2
 
451 Research Client Event Nov 10
451 Research Client Event Nov 10451 Research Client Event Nov 10
451 Research Client Event Nov 10
 
Net Services
Net ServicesNet Services
Net Services
 
“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything
 
Mike Taulty MIX10 Silverlight 4 Patterns Frameworks
Mike Taulty MIX10 Silverlight 4 Patterns FrameworksMike Taulty MIX10 Silverlight 4 Patterns Frameworks
Mike Taulty MIX10 Silverlight 4 Patterns Frameworks
 
Microservices: Where do they fit within a rapidly evolving integration archit...
Microservices: Where do they fit within a rapidly evolving integration archit...Microservices: Where do they fit within a rapidly evolving integration archit...
Microservices: Where do they fit within a rapidly evolving integration archit...
 
CIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCIS14: Identity Management for the Cloud
CIS14: Identity Management for the Cloud
 
MS TechDays 2011 - How to Run Middleware in the Cloud Story of Windows Azure ...
MS TechDays 2011 - How to Run Middleware in the Cloud Story of Windows Azure ...MS TechDays 2011 - How to Run Middleware in the Cloud Story of Windows Azure ...
MS TechDays 2011 - How to Run Middleware in the Cloud Story of Windows Azure ...
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016
 
OpenSSO Tech Overview Aquarium
OpenSSO Tech Overview AquariumOpenSSO Tech Overview Aquarium
OpenSSO Tech Overview Aquarium
 
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
 
S+S Architecture Overview
S+S Architecture OverviewS+S Architecture Overview
S+S Architecture Overview
 

O Dell Secure360 Presentation5 12 10b

  • 1. Unlock the Business Potential of Service- Oriented Architectures via Identity Management 1 BRUCE O'DELL SENIOR CONSULTANT, RISK MANAGEMENT AERITAE CONSULTING GROUP LTD. BODELL@AERITAE.COM
  • 2. Agenda 2  What is a service-oriented architecture (and why should security people care)?  Prehistoric SOAs... primitive security  Modern SOAs... point-to-point protocols  Internet SOAs... novel products and services  Future SOAs... “security” disappears  And what to watch for next
  • 3. Defining an SOA 3  Wikipedia • SOA separates functions into distinct units, or services, which developers make accessible over a network in order to allow users to combine and reuse them in the production of applications.  Key concepts – Encapsulation, composition, discoverability, abstraction... and, of course, re-use – Limitless scope for SOA design pattern • Component, application, organization, enterprise, consortium, nation, planet...
  • 4. But... why bother perfectly nice security people about SOA? 4  SOA sounds like a great idea... but – In practice, results seldom matched the hype – Basic security requirements (authentication, authorization, confidentiality, non-repudiation, integrity, denial of service...) have been key dis-enablers of SOA – Paradoxically security is also about to the catalyst for an SOA renaissance  To understand why... let's take a little trip through SOA history
  • 5. Platforms that time forgot 5  Fossil records show (long ago) distributed object protocols fought to rule the world The OMA - Object Management Architecture - DCOM sits right in the middle of the components of your application; it categorizes objects into four categories: the provides the invisible glue that ties things together CORBAservices™, CORBAfacilities™, CORBAdomain™ objects, and Application Objects. Here is the classic OMA diagram: Source: OMG, http://www.omg.org/gettingstarted/specintro.htm Source: http://msdn.microsoft.com/en-us/library/ms809311.aspx CORBA (IIOP) DCOM (DCE RPC)
  • 6. The rise of web services 6  Both DCOM and CORBA were for all intents and purposes wiped out by the same “asteroid”... the Internet • XML over HTTP worked fine across firewalls • Free of platform-specific security hooks • Bridges Java, COM (and .NET) services + more  A SOAP inventor's view – “low-tech wire protocols based on the standards of the Internet... I went on a private tour of execs in the industry, but none of them (I think) had a clue what I was talking about.” - Dave Winer
  • 7. Web services challenges 7  No XML security standards for a very long time – Security interoperability = standards, but – Multiple vendors + consensus =  What was available … – Transport-layer security • Confidentiality • Basic or cert authentication  Proliferation of roll your own solutions
  • 8. WS-* to the rescue? 8  Web services security standardization – Gradual emergence of security standards – More gradual adoption by vendors – Even more gradual interoperability Key standards  WS-Security – How to pass credentials  WS-Trust – The birth of the security token
  • 9. Unbearable coolness of security tokens 9  Good answer to hard questions – Standard way to pass identity attributes • Arbitrary assertions • Attributes sound basis for RBAC – Digitally signed XML • Authentication, integrity, non-repudiation – Self contained and verifiable • Enables delegation of trust • Eliminates identity management by daily “batch file” transfer
  • 10. Anatomy of a security token 10 <saml:Assertion <saml:Conditions> metadata </saml:Conditions> <saml:AuthenticationStatement <saml:Subject> <saml:NameIdentifier>subject</saml:NameIdentifier> <saml:SubjectConfirmation> metadata </saml:SubjectConfirmation> </saml:Subject> </saml:AuthenticationStatement> <saml:AttributeStatement> <saml:Subject> <saml:NameIdentifier>name</saml:NameIdentifier> </saml:Subject> <saml:Attribute AttributeName="name"> <saml:AttributeValue>value</saml:AttributeValue> </saml:Attribute> </saml:AttributeStatement> <ds:Signature … digital signature & metadata... </ds:Signature> </saml:Assertion>
  • 11. Internet SOAP web 11 services?  Vendor products began to support WS- Security – SAML token binding – Digital signatures are fragile – Cross-vendor compatibility – Heavyweight protocol – Token lifetime & renewal  Web browser SOAP client? – B2B niche, but SOAP seldom direct to end-users
  • 12. RESTful evolution 12  Web 2.0 – a lightweight way to browse  REST = SOAP - except inside out – SOAP • complex request • obfuscated scope • “heavyweight” XML security parameters – REST • simple request, self-evident scope • “lightweight” query string security params
  • 13. OpenID and OAuth 13  Modeling identity as URI resources  Identity providers + relying parties – Internet single sign on – Application to application permissioning – User control of attribute sharing OpenID OAuth
  • 14. Web 2.0 threat model 14  Deliberately break scripting “sandbox”  JSON – render objects from content stream  Asynchronous XML data transactions  Cross-site request forgery  Phishing OpenID 1.0  Spoofing OAuth 1.0  XML injection and DOS  Domino effect - if federated IDP (Facebook) is compromised, so are FacebookConnect sites
  • 15. Federated Identity and 15 SSO Identity Provider Site Service Provider Site 1. Authenticate 1. Receive the the user “token” 2. Generate a 2. Verify its digital digitally- signatures signed “token” 3. Create a valid 3. Include one or user session on more SP site using attributes attributes needed by a passed from IDP service provider
  • 16. Federated account linking 16 Identity Provider Service Provider Site A Site B Invite user to Recognize link site B Identity A user is part identity of IDP A to site A identity • Identity Provider Recognition: the Service Provider needs some mechanism to recognize that a Service Provider user is also registered with an Identity Provider within their circle of trust. • Service Provider Enrollment: the user is invited to link their SP account to their IDP identity, and logs in (one last time) to the SP. The linkage is registered on the IDP end, and the SP login is bypassed in future | Page 16
  • 18. Claims-based architecture 18  Abstract authentication from authorization Source: http://download.microsoft.com/download/7/D/0/7D0B5166-6A8A-418A-ADDD-95EE9B046994/Claims-Based%20Identity%20for%20Windows.pdf
  • 19. Internet-scale SOA 19  Combine... – large-scale consumer IDPs – affiliated, linked service providers – portable consumer identity tokens – composable, RESTful web services – mobile, location-aware hardware – REST-SOAP gateways to corporate services  … for ubiquitous, SOA internet applications
  • 20. Today, RBAC... tomorrow, ABAC? 20  RBAC is the best idea seldom implemented – Role based access controls are great – Role based access controls are awful  Attribute based access control (ABAC) – A subject (an attending physician) – An action (wants to read) – A resource (a patient's test result) – A context (in the ER at 2:00 AM)  Practical considerations – Avoid RBAC complications – Limited choice of platforms for now
  • 21. XACML as a design pattern 21  XACML standard for ABAC  Abstraction of IAM complete: authentication, authorization and policy metadata
  • 22. XACML as a real platform 22  More academic interest than industrial products – Example: Axiomatics product architecture
  • 23. Internet 3.0 web services 23  Internet 3.0 – Web 2.0 + semantics + federated identity  Interoperable attribute authorities – STS-mediated circles of trust – Semantic attribute mapping  Multiple levels of assurance  Ubiquitous ABAC  Strong privacy safeguards... – Which many will choose to ignore to gain benefits of transparency within social networks
  • 24. Long road to invisibility 24  Evolution of SOA as driven by evolution of security – Before 1990 – monolithic platform SOAs, monolithic security (ACF2, RACF) – 1990 – 2000: distributed object SOAs, DCOM and CORBA security wrappers – 2000 – 2010: point to point SOAP with TLS – 2010 – 2015: consumer identity federation with portable identity – 2015 – 2020: ABAC and semantics for compliance and management of complexity – 2020 – SOA ubiquitous, “security” declarative
  • 25. Questions? YOUR 25 LOGO  Bruce O'Dell  Senior Consultant, Risk Management  Aeritae Consulting Group Limited  bodell@aeritae.com  (651) 229-0300  www.aeritae.com Leaders in bringing innovation, balance, and performance to IT organizations