SlideShare une entreprise Scribd logo
1  sur  48
Télécharger pour lire hors ligne
Tackling the
          Single Sign-On Challenge
                                                                   Mihai Nadăș
                                                                     Windows Azure MVP
                                                                            Yonder CTO

                                                                             @mihainadas
                                                                           mihainadas.com




@   itcampro   # itcamp12   Premium conference on Microsoft technologies
ITCamp 2012 sponsors                                                       Private &
                                                                           Public Cloud




@   itcampro   # itcamp12   Premium conference on Microsoft technologies
About myself                                                               Private &
                                                                           Public Cloud


• mihainadas.com
• @mihainadas

• Passionate about technology, background in
  the .NET World
• Windows Azure MVP

• Driving Yonder’s appetite for innovation


@   itcampro   # itcamp12   Premium conference on Microsoft technologies
On security and the future                                                     Private &
                                                                               Public Cloud



    • As the world becomes more interconnected, security
      becomes a more important topic

    • Holland, 2012 – VCD’s SaaS solution exposed publically
      information about its user’s medical history




                            We spend our time searching for security
                            and hate it when we get it.

                                                                      -John Steinbeck


@   itcampro   # itcamp12       Premium conference on Microsoft technologies
Passwords and implementations                                              Private &
                                                                           Public Cloud




@   itcampro   # itcamp12   Premium conference on Microsoft technologies
OWASP’s Top 5                                                              Private &
                                                                           Public Cloud




1. Injection
2. Cross Site Scripting (XSS)
3. Broken Authentication and Session
   Management
4. Insecure Direct Object References
5. Cross Site Request Forgery


@   itcampro   # itcamp12   Premium conference on Microsoft technologies
OWASP’s Top 5                                                              Private &
                                                                           Public Cloud




1. Injection
2. Cross Site Scripting (XSS)
3. Broken Authentication and Session
   Management
4. Insecure Direct Object References
5. Cross Site Request Forgery


@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Agenda                                                                     Private &
                                                                           Public Cloud


• Claims-Based Identity and Access Control

• The Single Sign-On Challenge and Benefits

• Windows Azure Access Control Service

• Q&A



@   itcampro   # itcamp12   Premium conference on Microsoft technologies
The problem with Identity and Access Control in the Enterprise

     ENOUGH TALKING,
     LET’S DEMO!

@   itcampro   # itcamp12      Premium conference on Microsoft technologies
What you’ll see?                                                           Private &
                                                                           Public Cloud


• A fictious case study of an enterprise called
  Adatum

• The whiteboard diagram showing the
  situation of the auth/auth problem pre-
  claims

• DEMO


@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Adatum Infrastructure Pre-Claims                                           Private &
                                                                           Public Cloud




@   itcampro   # itcamp12   Premium conference on Microsoft technologies
The problem with Identity and Access Control in the Enterprise

     DEMO


@   itcampro   # itcamp12      Premium conference on Microsoft technologies
What’s the problem?                                                        Private &
                                                                           Public Cloud


• Users of a-Expense need user/password

• The IT staff have to sync roles between
  authentication systems

• a-Order can’t be accessed from the Internet

• No Single Sign-On aka „Credentials Hell”


@   itcampro   # itcamp12   Premium conference on Microsoft technologies
What’s the problem?                                                        Private &
                                                                           Public Cloud




@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Be the consultant and please Adatum!                                       Private &
                                                                           Public Cloud


• Adatum’s requirements
     – Single Sign-On (SSO) Capabilities
     – Enable Adatum employees to access corporate
       applications from the Internet (no VPN)
     – Plan for the future (cloud, new apps)


• What is your solution?




@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Introducing Claims-Based Identiy                                           Private &
                                                                           Public Cloud


• Control the digital experience based on
  things that are said about one party by the
  other

• A party can be – web site, web service,
  person, government, organization




@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Claims are not new!                                                        Private &
                                                                           Public Cloud


• Mainframes asked about user/password and passed
  „claims” about them to applications
     – uid, gid
     – sudo su

• As systems became interconnected we needed ways
  to identify parties across multiple computers

• Specialized services appeared
     – NTML, Kerberos (Windows Integrated Authentication)
     – Public Key Infrastructure (PKI)
     – Security Assertion Markup Lanaguage (SAML)


@   itcampro   # itcamp12   Premium conference on Microsoft technologies
The Claims-Based ID Framework                                              Private &
                                                                           Public Cloud


• Two major components
     1. A single, general notion of claims
     2. Concept of issuer / authority

• Terminology
     1.   Application (Relying Party, Service Provider)
     2.   User (Subject, Principal)
     3.   Issuer (Security Token Service, Identity Provider)
     4.   Rich Client (Active Client)
     5.   Browser (Passive Client)


@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Claim-Based ID in Real World                                                            Private &
                                                                                        Public Cloud

     Traveler                        Check-In Counter                                Airport Agents




        1       Show ID or Passport




                Give Boarding Card             2




                                 Show Boarding Card to Gain
        3                                 Access




@   itcampro    # itcamp12            Premium conference on Microsoft technologies
Claim-Based ID in Real World                                                             Private &
                                                                                         Public Cloud

     Traveler                        Check-In Counter                                Airport Agents

                User                                      Issuer

                                                                           Application


        1       Show ID or Passport

                 Authentication
                  Credentials


                Give Boarding Card             2

                       Claims
                                                                   Authorization

                                  Show Boarding Card to Gain
        3                                  Access




@   itcampro    # itcamp12            Premium conference on Microsoft technologies
What are the benefits?                                                     Private &
                                                                           Public Cloud


• Simplified authentication logic

• Decoupled authentication from authorization

• Eliminate redundancy




@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Implementing Claims-Based Identity                                         Private &
                                                                           Public Cloud


• What you need?
     – An App (Web Service, Web Site, Mobile App, etc.)
     – An Issuer
     – Claims-Based Identity Magic

• What are the steps?
     1.   Setup an Issuer
     2.   Configure the Issuer to know about the App
     3.   Add logic to the App to support claims
     4.   Configure the App to trust the Issuer


@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Claims-Based Identity Lifecycle                                            Private &
                                                                           Public Cloud




@   itcampro   # itcamp12   Premium conference on Microsoft technologies
What’s WIF?                                                                Private &
                                                                           Public Cloud


• Windows Identity Foundation

• Framework for building identity-aware applications

• Provides APIs for building ASP.NET or WCF based
  security token services

• Tools for building claims-aware and federation
  capable applications

• Now part of .NET Framework 4.5


@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Solving Adatum’s problem using Claims-Based Identity

     ENOUGH TALKING,
     LET’S DEMO!

@   itcampro   # itcamp12     Premium conference on Microsoft technologies
Adatum Infrastructure Post-                                                Private &

Claims
                                                                           Public Cloud




@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Technologies at work                                                       Private &
                                                                           Public Cloud




• Windows Identity Foundation

• Active Directory Federation Services




@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Solving Adatum’s problem using Claims-Based Identity

     DEMO


@   itcampro   # itcamp12     Premium conference on Microsoft technologies
Going beyond Identity Providers                                            Private &
                                                                           Public Cloud




• Welcome Federated Providers!
• Powerful way to provide SSO cross-domains

@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Adatum meets Litware                                                       Private &
                                                                           Public Cloud




@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Windows Azure

     ACCESS CONTROL SERVICE


@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Shortly                                                                    Private &
                                                                           Public Cloud


• A feature of Windows Azure Active Directory

• Outsourcing Authentication (no need to write
  code)

• Works with .NET, PHP, Python, Java and Ruby

• Out-of-the-box support for a variety of identify
  providers

• Integrates with on-premises Active Directory

@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Benefits                                                                   Private &
                                                                           Public Cloud


• Open industry standards
     – Protocols: OAuth 2.0, WS-Trust, WS-Federation
     – Token formats: SAML 1.1/2.0 and Simple Web
       Token


• $1,99 / 100.000 transactions




@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Identity Providers                                                         Private &
                                                                           Public Cloud


• Built-in support for
     – Windows Live ID
     – Facebook
     – Google
     – Yahoo!
     – WS-Federation Identity Providers

• Programatic configuration for
     – WS-Trust based (AD FS 2.0)
     – OpenID based


@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Relying Party Applications                                                 Private &
                                                                           Public Cloud


• An application that relies on claims

• Implements federated authentication using
  ACS

• Trusts the ACS namespace

• Can be configured manually or
  programatically through ACS Management
  Service

@   itcampro   # itcamp12   Premium conference on Microsoft technologies
ACS Architecture                                                           Private &
                                                                           Public Cloud




@   itcampro   # itcamp12   Premium conference on Microsoft technologies
ACS - Protocol Handling                                                    Private &
                                                                           Public Cloud


• ACS does heavy lifting for handling protocols
  – WS-Federation
  – WS-Trust
  – OpenID
  – OAuth 2.0, OAuth WRAP
  – Facebook Graph

• ACS issues normalized tokens
     – SAML
     – SWT

@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Windows Azure ACS

     ENOUGH TALKING,
     LET’S DEMO!

@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Goals                                                                      Private &
                                                                           Public Cloud


1. Configure your application to outsource authentication
   to ACS

2. Configure ACS to include the identity providers you want
   to leverage

3. Configure ACS to process incoming identities and add
   new claims

4. Modify your application to consume claims from ACS
   and drive authorization decisions

5. Customize the default authentication user experience
   provided by ACS


@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Requirements                                                               Private &
                                                                           Public Cloud


• Windows Vista SP2, Windows Server 2008
  SP2, Windows Server 2008 R2, or Windows 7
  (32-bits or 64-bits)
• Internet Information Services (IIS) 7.0
• .NET Framework 4
• Visual Studio 2010
• Windows Identity Foundation Runtime
• Windows Identity Foundation SDK


@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Windows Azure ACS

     DEMO


@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Summary                                                                    Private &
                                                                           Public Cloud


• A feature of Windows Azure Active Directory

• Outsourcing Auth and Auth (no need to write code)

• Works with .NET, PHP, Python, Java and Ruby

• Out-of-the-box support for identify providers like
  Windows Live ID, Google, Yahoo! and Facebook

• Integrates with on-premises Active Directory



@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Conclusions                                                                Private &
                                                                           Public Cloud


• Claims get the job done

• Separate authentication from authorization

• Solves OWASP’s 3rd vulnerability

• How can it work for you?



@   itcampro   # itcamp12   Premium conference on Microsoft technologies
References                                                                 Private &
                                                                           Public Cloud




                                        • Windows Azure
                                          Training Kit

                                        • claimsid.codeplex.com




@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Check Out AzureWorks.ro                                                    Private &
                                                                           Public Cloud




           www.azureworks.ro
@   itcampro   # itcamp12   Premium conference on Microsoft technologies
meetwindowsazure.com




@   itcampro   # itcamp12   Premium conference on Microsoft technologies
Q&A


@   itcampro   # itcamp12   Premium conference on Microsoft technologies
What about Smart Clients?                                                  Private &
                                                                           Public Cloud




@   itcampro   # itcamp12   Premium conference on Microsoft technologies

Contenu connexe

Tendances

Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceUNIT4 IT Solutions
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Acrodex
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudRochester Security Summit
 
Vunvulea radu it camp-ro 2012 - building metro style applications on window...
Vunvulea radu   it camp-ro 2012 - building metro style applications on window...Vunvulea radu   it camp-ro 2012 - building metro style applications on window...
Vunvulea radu it camp-ro 2012 - building metro style applications on window...Radu Vunvulea
 
Overcoming Barriers to Adoption of Virtual Worlds in Government
Overcoming Barriers to Adoption of Virtual Worlds in GovernmentOvercoming Barriers to Adoption of Virtual Worlds in Government
Overcoming Barriers to Adoption of Virtual Worlds in Governmentjcichelli
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMwareOpSource
 
ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...
ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...
ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...ITCamp
 
STKI 2012 summit presentation knowledge management and learning tools
STKI 2012 summit presentation knowledge management and learning toolsSTKI 2012 summit presentation knowledge management and learning tools
STKI 2012 summit presentation knowledge management and learning toolsliza_Bodogin
 
Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDaniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDigicomp Academy AG
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000authority12
 
Winkler Cloud, ORCON, and Mobility
Winkler Cloud, ORCON, and MobilityWinkler Cloud, ORCON, and Mobility
Winkler Cloud, ORCON, and MobilityVic Winkler
 
Citrix Receiver: the road ahead
Citrix Receiver: the road aheadCitrix Receiver: the road ahead
Citrix Receiver: the road aheadCitrix
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security StrategyCapgemini
 
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...ptaglephd
 
I GOvirtual En Brochure
I GOvirtual En BrochureI GOvirtual En Brochure
I GOvirtual En Brochureguybelliveau
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)itforum-roundtable
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityDhaval Dave
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computingHossam Zein
 
Isaca 2011 trends in virtual security v1.0
Isaca 2011 trends in virtual security v1.0Isaca 2011 trends in virtual security v1.0
Isaca 2011 trends in virtual security v1.0kimwisniewski
 

Tendances (20)

Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public Cloud
 
Vunvulea radu it camp-ro 2012 - building metro style applications on window...
Vunvulea radu   it camp-ro 2012 - building metro style applications on window...Vunvulea radu   it camp-ro 2012 - building metro style applications on window...
Vunvulea radu it camp-ro 2012 - building metro style applications on window...
 
Overcoming Barriers to Adoption of Virtual Worlds in Government
Overcoming Barriers to Adoption of Virtual Worlds in GovernmentOvercoming Barriers to Adoption of Virtual Worlds in Government
Overcoming Barriers to Adoption of Virtual Worlds in Government
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 
ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...
ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...
ITCamp 2012 - Radu Vunvulea - Building metro style applications on Windows 8 ...
 
STKI 2012 summit presentation knowledge management and learning tools
STKI 2012 summit presentation knowledge management and learning toolsSTKI 2012 summit presentation knowledge management and learning tools
STKI 2012 summit presentation knowledge management and learning tools
 
Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDaniel künzli cloudgateway.next
Daniel künzli cloudgateway.next
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
Sms passcode
Sms passcodeSms passcode
Sms passcode
 
Winkler Cloud, ORCON, and Mobility
Winkler Cloud, ORCON, and MobilityWinkler Cloud, ORCON, and Mobility
Winkler Cloud, ORCON, and Mobility
 
Citrix Receiver: the road ahead
Citrix Receiver: the road aheadCitrix Receiver: the road ahead
Citrix Receiver: the road ahead
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...Info Sec 2010   Possibilities And Security Challenges Of Cloud Computing (Han...
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
 
I GOvirtual En Brochure
I GOvirtual En BrochureI GOvirtual En Brochure
I GOvirtual En Brochure
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
Isaca 2011 trends in virtual security v1.0
Isaca 2011 trends in virtual security v1.0Isaca 2011 trends in virtual security v1.0
Isaca 2011 trends in virtual security v1.0
 

En vedette

How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourHow to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourCyren, Inc
 
Pyscho-Strategies for Social Engineering
Pyscho-Strategies for Social EngineeringPyscho-Strategies for Social Engineering
Pyscho-Strategies for Social EngineeringIshan Girdhar
 
Cusomizing Burp Suite - Getting the Most out of Burp Extensions
Cusomizing Burp Suite - Getting the Most out of Burp ExtensionsCusomizing Burp Suite - Getting the Most out of Burp Extensions
Cusomizing Burp Suite - Getting the Most out of Burp ExtensionsAugust Detlefsen
 
Burp suite
Burp suiteBurp suite
Burp suiteAmmar WK
 
Windows Azure Versioning Strategies
Windows Azure Versioning StrategiesWindows Azure Versioning Strategies
Windows Azure Versioning StrategiesPavel Revenkov
 
Wcf security session 1
Wcf security session 1Wcf security session 1
Wcf security session 1Anil Kumar M
 
Burp plugin development for java n00bs (44 con)
Burp plugin development for java n00bs (44 con)Burp plugin development for java n00bs (44 con)
Burp plugin development for java n00bs (44 con)Marc Wickenden
 
Basics of WCF and its Security
Basics of WCF and its SecurityBasics of WCF and its Security
Basics of WCF and its SecurityMindfire Solutions
 
Pentesting With Web Services in 2012
Pentesting With Web Services in 2012Pentesting With Web Services in 2012
Pentesting With Web Services in 2012Ishan Girdhar
 
WCF Security, FSec
WCF Security, FSecWCF Security, FSec
WCF Security, FSecAnte Gulam
 
Pentesting RESTful webservices
Pentesting RESTful webservicesPentesting RESTful webservices
Pentesting RESTful webservicesMohammed A. Imran
 
Pentesting Using Burp Suite
Pentesting Using Burp SuitePentesting Using Burp Suite
Pentesting Using Burp Suitejasonhaddix
 
Lunch Learn - WCF Security
Lunch Learn - WCF SecurityLunch Learn - WCF Security
Lunch Learn - WCF SecurityPaul Senatillaka
 

En vedette (17)

Paypal-IPN
Paypal-IPNPaypal-IPN
Paypal-IPN
 
How to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an HourHow to Launch a Web Security Service in an Hour
How to Launch a Web Security Service in an Hour
 
Pyscho-Strategies for Social Engineering
Pyscho-Strategies for Social EngineeringPyscho-Strategies for Social Engineering
Pyscho-Strategies for Social Engineering
 
Cusomizing Burp Suite - Getting the Most out of Burp Extensions
Cusomizing Burp Suite - Getting the Most out of Burp ExtensionsCusomizing Burp Suite - Getting the Most out of Burp Extensions
Cusomizing Burp Suite - Getting the Most out of Burp Extensions
 
Burp suite
Burp suiteBurp suite
Burp suite
 
Windows Azure Versioning Strategies
Windows Azure Versioning StrategiesWindows Azure Versioning Strategies
Windows Azure Versioning Strategies
 
Wcf security session 1
Wcf security session 1Wcf security session 1
Wcf security session 1
 
Burp plugin development for java n00bs (44 con)
Burp plugin development for java n00bs (44 con)Burp plugin development for java n00bs (44 con)
Burp plugin development for java n00bs (44 con)
 
Web Service Security
Web Service SecurityWeb Service Security
Web Service Security
 
Basics of WCF and its Security
Basics of WCF and its SecurityBasics of WCF and its Security
Basics of WCF and its Security
 
Pentesting With Web Services in 2012
Pentesting With Web Services in 2012Pentesting With Web Services in 2012
Pentesting With Web Services in 2012
 
Burpsuite yara
Burpsuite yaraBurpsuite yara
Burpsuite yara
 
WCF Security, FSec
WCF Security, FSecWCF Security, FSec
WCF Security, FSec
 
Pentesting RESTful webservices
Pentesting RESTful webservicesPentesting RESTful webservices
Pentesting RESTful webservices
 
Intro to IronWASP
Intro to IronWASPIntro to IronWASP
Intro to IronWASP
 
Pentesting Using Burp Suite
Pentesting Using Burp SuitePentesting Using Burp Suite
Pentesting Using Burp Suite
 
Lunch Learn - WCF Security
Lunch Learn - WCF SecurityLunch Learn - WCF Security
Lunch Learn - WCF Security
 

Similaire à ITCamp 2012 - Mihai Nadas - Tackling the single sign-on challenge

ITCamp 2012 - Paula Januszkiewicz - Stronghold to Strengthen
ITCamp 2012 - Paula Januszkiewicz - Stronghold to StrengthenITCamp 2012 - Paula Januszkiewicz - Stronghold to Strengthen
ITCamp 2012 - Paula Januszkiewicz - Stronghold to StrengthenITCamp
 
ITCamp 2012 - Dan Fizesan - Serving 10 million requests per day
ITCamp 2012 - Dan Fizesan - Serving 10 million requests per dayITCamp 2012 - Dan Fizesan - Serving 10 million requests per day
ITCamp 2012 - Dan Fizesan - Serving 10 million requests per dayITCamp
 
ITCamp 2011 - Mihai Tataran - Migrating to Azure
ITCamp 2011 - Mihai Tataran - Migrating to AzureITCamp 2011 - Mihai Tataran - Migrating to Azure
ITCamp 2011 - Mihai Tataran - Migrating to AzureITCamp
 
Elements of DDD with ASP.NET MVC & Entity Framework Code First v2
Elements of DDD with ASP.NET MVC & Entity Framework Code First v2Elements of DDD with ASP.NET MVC & Entity Framework Code First v2
Elements of DDD with ASP.NET MVC & Entity Framework Code First v2Enea Gabriel
 
Modern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with themModern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with themTudor Damian
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud SecurityTudor Damian
 
Modern cybersecurity threats, and shiny new tools to help deal with them - T...
 Modern cybersecurity threats, and shiny new tools to help deal with them - T... Modern cybersecurity threats, and shiny new tools to help deal with them - T...
Modern cybersecurity threats, and shiny new tools to help deal with them - T...ITCamp
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor DamianITCamp
 
How # (sharp) is Your Katana (Ciprian Jichici)
How # (sharp) is Your Katana (Ciprian Jichici)How # (sharp) is Your Katana (Ciprian Jichici)
How # (sharp) is Your Katana (Ciprian Jichici)ITCamp
 
ITCamp 2012 - Ovidiu Stan - Social media platform with Telligent Community, W...
ITCamp 2012 - Ovidiu Stan - Social media platform with Telligent Community, W...ITCamp 2012 - Ovidiu Stan - Social media platform with Telligent Community, W...
ITCamp 2012 - Ovidiu Stan - Social media platform with Telligent Community, W...ITCamp
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ramy Houssaini
 
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsDoes Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsBluelock
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in CloudMphasis
 
ITCamp 2011 - Mihai Nadas - Windows Azure interop
ITCamp 2011 - Mihai Nadas - Windows Azure interopITCamp 2011 - Mihai Nadas - Windows Azure interop
ITCamp 2011 - Mihai Nadas - Windows Azure interopITCamp
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)ITCamp
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptxDefenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptxMatthew Levy
 
How to secure and manage modern IT - Ondrej Vysek
 How to secure and manage modern IT - Ondrej Vysek How to secure and manage modern IT - Ondrej Vysek
How to secure and manage modern IT - Ondrej VysekITCamp
 
In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...John Mancini
 
DCEU 18: Edge Computing with Docker Enterprise
DCEU 18: Edge Computing with Docker EnterpriseDCEU 18: Edge Computing with Docker Enterprise
DCEU 18: Edge Computing with Docker EnterpriseDocker, Inc.
 

Similaire à ITCamp 2012 - Mihai Nadas - Tackling the single sign-on challenge (20)

ITCamp 2012 - Paula Januszkiewicz - Stronghold to Strengthen
ITCamp 2012 - Paula Januszkiewicz - Stronghold to StrengthenITCamp 2012 - Paula Januszkiewicz - Stronghold to Strengthen
ITCamp 2012 - Paula Januszkiewicz - Stronghold to Strengthen
 
ITCamp 2012 - Dan Fizesan - Serving 10 million requests per day
ITCamp 2012 - Dan Fizesan - Serving 10 million requests per dayITCamp 2012 - Dan Fizesan - Serving 10 million requests per day
ITCamp 2012 - Dan Fizesan - Serving 10 million requests per day
 
ITCamp 2011 - Mihai Tataran - Migrating to Azure
ITCamp 2011 - Mihai Tataran - Migrating to AzureITCamp 2011 - Mihai Tataran - Migrating to Azure
ITCamp 2011 - Mihai Tataran - Migrating to Azure
 
Elements of DDD with ASP.NET MVC & Entity Framework Code First v2
Elements of DDD with ASP.NET MVC & Entity Framework Code First v2Elements of DDD with ASP.NET MVC & Entity Framework Code First v2
Elements of DDD with ASP.NET MVC & Entity Framework Code First v2
 
Modern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with themModern cybersecurity threats, and shiny new tools to help deal with them
Modern cybersecurity threats, and shiny new tools to help deal with them
 
2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security2016, A new era of OS and Cloud Security
2016, A new era of OS and Cloud Security
 
Modern cybersecurity threats, and shiny new tools to help deal with them - T...
 Modern cybersecurity threats, and shiny new tools to help deal with them - T... Modern cybersecurity threats, and shiny new tools to help deal with them - T...
Modern cybersecurity threats, and shiny new tools to help deal with them - T...
 
2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian2016, A New Era of OS and Cloud Security - Tudor Damian
2016, A New Era of OS and Cloud Security - Tudor Damian
 
How # (sharp) is Your Katana (Ciprian Jichici)
How # (sharp) is Your Katana (Ciprian Jichici)How # (sharp) is Your Katana (Ciprian Jichici)
How # (sharp) is Your Katana (Ciprian Jichici)
 
ITCamp 2012 - Ovidiu Stan - Social media platform with Telligent Community, W...
ITCamp 2012 - Ovidiu Stan - Social media platform with Telligent Community, W...ITCamp 2012 - Ovidiu Stan - Social media platform with Telligent Community, W...
ITCamp 2012 - Ovidiu Stan - Social media platform with Telligent Community, W...
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsDoes Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in Cloud
 
ITCamp 2011 - Mihai Nadas - Windows Azure interop
ITCamp 2011 - Mihai Nadas - Windows Azure interopITCamp 2011 - Mihai Nadas - Windows Azure interop
ITCamp 2011 - Mihai Nadas - Windows Azure interop
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptxDefenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
 
How to secure and manage modern IT - Ondrej Vysek
 How to secure and manage modern IT - Ondrej Vysek How to secure and manage modern IT - Ondrej Vysek
How to secure and manage modern IT - Ondrej Vysek
 
In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...
 
DCEU 18: Edge Computing with Docker Enterprise
DCEU 18: Edge Computing with Docker EnterpriseDCEU 18: Edge Computing with Docker Enterprise
DCEU 18: Edge Computing with Docker Enterprise
 

Plus de ITCamp

ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...
ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...
ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...ITCamp
 
ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...
ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...
ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...ITCamp
 
ITCamp 2019 - Peter Leeson - Managing Skills
ITCamp 2019 - Peter Leeson - Managing SkillsITCamp 2019 - Peter Leeson - Managing Skills
ITCamp 2019 - Peter Leeson - Managing SkillsITCamp
 
ITCamp 2019 - Mihai Tataran - Governing your Cloud Resources
ITCamp 2019 - Mihai Tataran - Governing your Cloud ResourcesITCamp 2019 - Mihai Tataran - Governing your Cloud Resources
ITCamp 2019 - Mihai Tataran - Governing your Cloud ResourcesITCamp
 
ITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UX
ITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UXITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UX
ITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UXITCamp
 
ITCamp 2019 - Florin Coros - Implementing Clean Architecture
ITCamp 2019 - Florin Coros - Implementing Clean ArchitectureITCamp 2019 - Florin Coros - Implementing Clean Architecture
ITCamp 2019 - Florin Coros - Implementing Clean ArchitectureITCamp
 
ITCamp 2019 - Florin Loghiade - Azure Kubernetes in Production - Field notes...
ITCamp 2019 - Florin Loghiade -  Azure Kubernetes in Production - Field notes...ITCamp 2019 - Florin Loghiade -  Azure Kubernetes in Production - Field notes...
ITCamp 2019 - Florin Loghiade - Azure Kubernetes in Production - Field notes...ITCamp
 
ITCamp 2019 - Florin Flestea - How 3rd Level support experience influenced m...
ITCamp 2019 - Florin Flestea -  How 3rd Level support experience influenced m...ITCamp 2019 - Florin Flestea -  How 3rd Level support experience influenced m...
ITCamp 2019 - Florin Flestea - How 3rd Level support experience influenced m...ITCamp
 
ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...
ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...
ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...ITCamp
 
ITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The Enterprise
ITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The EnterpriseITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The Enterprise
ITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The EnterpriseITCamp
 
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal Trends
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal TrendsITCamp 2019 - Cristiana Fernbach - Blockchain Legal Trends
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal TrendsITCamp
 
ITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data Lake
ITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data LakeITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data Lake
ITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data LakeITCamp
 
ITCamp 2019 - Andy Cross - Business Outcomes from AI
ITCamp 2019 - Andy Cross - Business Outcomes from AIITCamp 2019 - Andy Cross - Business Outcomes from AI
ITCamp 2019 - Andy Cross - Business Outcomes from AIITCamp
 
ITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud Story
ITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud StoryITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud Story
ITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud StoryITCamp
 
ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...
ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...
ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...ITCamp
 
ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...
ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...
ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...ITCamp
 
ITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go Now
ITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go NowITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go Now
ITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go NowITCamp
 
ITCamp 2019 - Peter Leeson - Vitruvian Quality
ITCamp 2019 - Peter Leeson - Vitruvian QualityITCamp 2019 - Peter Leeson - Vitruvian Quality
ITCamp 2019 - Peter Leeson - Vitruvian QualityITCamp
 
ITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World Application
ITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World ApplicationITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World Application
ITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World ApplicationITCamp
 
ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...
ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...
ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...ITCamp
 

Plus de ITCamp (20)

ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...
ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...
ITCamp 2019 - Stacey M. Jenkins - Protecting your company's data - By psychol...
 
ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...
ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...
ITCamp 2019 - Silviu Niculita - Supercharge your AI efforts with the use of A...
 
ITCamp 2019 - Peter Leeson - Managing Skills
ITCamp 2019 - Peter Leeson - Managing SkillsITCamp 2019 - Peter Leeson - Managing Skills
ITCamp 2019 - Peter Leeson - Managing Skills
 
ITCamp 2019 - Mihai Tataran - Governing your Cloud Resources
ITCamp 2019 - Mihai Tataran - Governing your Cloud ResourcesITCamp 2019 - Mihai Tataran - Governing your Cloud Resources
ITCamp 2019 - Mihai Tataran - Governing your Cloud Resources
 
ITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UX
ITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UXITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UX
ITCamp 2019 - Ivana Milicic - Color - The Shadow Ruler of UX
 
ITCamp 2019 - Florin Coros - Implementing Clean Architecture
ITCamp 2019 - Florin Coros - Implementing Clean ArchitectureITCamp 2019 - Florin Coros - Implementing Clean Architecture
ITCamp 2019 - Florin Coros - Implementing Clean Architecture
 
ITCamp 2019 - Florin Loghiade - Azure Kubernetes in Production - Field notes...
ITCamp 2019 - Florin Loghiade -  Azure Kubernetes in Production - Field notes...ITCamp 2019 - Florin Loghiade -  Azure Kubernetes in Production - Field notes...
ITCamp 2019 - Florin Loghiade - Azure Kubernetes in Production - Field notes...
 
ITCamp 2019 - Florin Flestea - How 3rd Level support experience influenced m...
ITCamp 2019 - Florin Flestea -  How 3rd Level support experience influenced m...ITCamp 2019 - Florin Flestea -  How 3rd Level support experience influenced m...
ITCamp 2019 - Florin Flestea - How 3rd Level support experience influenced m...
 
ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...
ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...
ITCamp 2019 - Emil Craciun - RoboRestaurant of the future powered by serverle...
 
ITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The Enterprise
ITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The EnterpriseITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The Enterprise
ITCamp 2019 - Eldert Grootenboer - Cloud Architecture Recipes for The Enterprise
 
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal Trends
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal TrendsITCamp 2019 - Cristiana Fernbach - Blockchain Legal Trends
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal Trends
 
ITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data Lake
ITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data LakeITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data Lake
ITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data Lake
 
ITCamp 2019 - Andy Cross - Business Outcomes from AI
ITCamp 2019 - Andy Cross - Business Outcomes from AIITCamp 2019 - Andy Cross - Business Outcomes from AI
ITCamp 2019 - Andy Cross - Business Outcomes from AI
 
ITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud Story
ITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud StoryITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud Story
ITCamp 2019 - Andrea Saltarello - Modernise your app. The Cloud Story
 
ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...
ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...
ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...
 
ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...
ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...
ITCamp 2019 - Alex Mang - I'm Confused Should I Orchestrate my Containers on ...
 
ITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go Now
ITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go NowITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go Now
ITCamp 2019 - Alex Mang - How Far Can Serverless Actually Go Now
 
ITCamp 2019 - Peter Leeson - Vitruvian Quality
ITCamp 2019 - Peter Leeson - Vitruvian QualityITCamp 2019 - Peter Leeson - Vitruvian Quality
ITCamp 2019 - Peter Leeson - Vitruvian Quality
 
ITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World Application
ITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World ApplicationITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World Application
ITCamp 2018 - Ciprian Sorlea - Million Dollars Hello World Application
 
ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...
ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...
ITCamp 2018 - Ciprian Sorlea - Enterprise Architectures with TypeScript And F...
 

Dernier

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Dernier (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

ITCamp 2012 - Mihai Nadas - Tackling the single sign-on challenge

  • 1. Tackling the Single Sign-On Challenge Mihai Nadăș Windows Azure MVP Yonder CTO @mihainadas mihainadas.com @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 2. ITCamp 2012 sponsors Private & Public Cloud @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 3. About myself Private & Public Cloud • mihainadas.com • @mihainadas • Passionate about technology, background in the .NET World • Windows Azure MVP • Driving Yonder’s appetite for innovation @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 4. On security and the future Private & Public Cloud • As the world becomes more interconnected, security becomes a more important topic • Holland, 2012 – VCD’s SaaS solution exposed publically information about its user’s medical history We spend our time searching for security and hate it when we get it. -John Steinbeck @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 5. Passwords and implementations Private & Public Cloud @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 6. OWASP’s Top 5 Private & Public Cloud 1. Injection 2. Cross Site Scripting (XSS) 3. Broken Authentication and Session Management 4. Insecure Direct Object References 5. Cross Site Request Forgery @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 7. OWASP’s Top 5 Private & Public Cloud 1. Injection 2. Cross Site Scripting (XSS) 3. Broken Authentication and Session Management 4. Insecure Direct Object References 5. Cross Site Request Forgery @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 8. Agenda Private & Public Cloud • Claims-Based Identity and Access Control • The Single Sign-On Challenge and Benefits • Windows Azure Access Control Service • Q&A @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 9. The problem with Identity and Access Control in the Enterprise ENOUGH TALKING, LET’S DEMO! @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 10. What you’ll see? Private & Public Cloud • A fictious case study of an enterprise called Adatum • The whiteboard diagram showing the situation of the auth/auth problem pre- claims • DEMO @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 11. Adatum Infrastructure Pre-Claims Private & Public Cloud @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 12. The problem with Identity and Access Control in the Enterprise DEMO @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 13. What’s the problem? Private & Public Cloud • Users of a-Expense need user/password • The IT staff have to sync roles between authentication systems • a-Order can’t be accessed from the Internet • No Single Sign-On aka „Credentials Hell” @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 14. What’s the problem? Private & Public Cloud @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 15. Be the consultant and please Adatum! Private & Public Cloud • Adatum’s requirements – Single Sign-On (SSO) Capabilities – Enable Adatum employees to access corporate applications from the Internet (no VPN) – Plan for the future (cloud, new apps) • What is your solution? @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 16. Introducing Claims-Based Identiy Private & Public Cloud • Control the digital experience based on things that are said about one party by the other • A party can be – web site, web service, person, government, organization @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 17. Claims are not new! Private & Public Cloud • Mainframes asked about user/password and passed „claims” about them to applications – uid, gid – sudo su • As systems became interconnected we needed ways to identify parties across multiple computers • Specialized services appeared – NTML, Kerberos (Windows Integrated Authentication) – Public Key Infrastructure (PKI) – Security Assertion Markup Lanaguage (SAML) @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 18. The Claims-Based ID Framework Private & Public Cloud • Two major components 1. A single, general notion of claims 2. Concept of issuer / authority • Terminology 1. Application (Relying Party, Service Provider) 2. User (Subject, Principal) 3. Issuer (Security Token Service, Identity Provider) 4. Rich Client (Active Client) 5. Browser (Passive Client) @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 19. Claim-Based ID in Real World Private & Public Cloud Traveler Check-In Counter Airport Agents 1 Show ID or Passport Give Boarding Card 2 Show Boarding Card to Gain 3 Access @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 20. Claim-Based ID in Real World Private & Public Cloud Traveler Check-In Counter Airport Agents User Issuer Application 1 Show ID or Passport Authentication Credentials Give Boarding Card 2 Claims Authorization Show Boarding Card to Gain 3 Access @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 21. What are the benefits? Private & Public Cloud • Simplified authentication logic • Decoupled authentication from authorization • Eliminate redundancy @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 22. Implementing Claims-Based Identity Private & Public Cloud • What you need? – An App (Web Service, Web Site, Mobile App, etc.) – An Issuer – Claims-Based Identity Magic • What are the steps? 1. Setup an Issuer 2. Configure the Issuer to know about the App 3. Add logic to the App to support claims 4. Configure the App to trust the Issuer @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 23. Claims-Based Identity Lifecycle Private & Public Cloud @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 24. What’s WIF? Private & Public Cloud • Windows Identity Foundation • Framework for building identity-aware applications • Provides APIs for building ASP.NET or WCF based security token services • Tools for building claims-aware and federation capable applications • Now part of .NET Framework 4.5 @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 25. Solving Adatum’s problem using Claims-Based Identity ENOUGH TALKING, LET’S DEMO! @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 26. Adatum Infrastructure Post- Private & Claims Public Cloud @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 27. Technologies at work Private & Public Cloud • Windows Identity Foundation • Active Directory Federation Services @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 28. Solving Adatum’s problem using Claims-Based Identity DEMO @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 29. Going beyond Identity Providers Private & Public Cloud • Welcome Federated Providers! • Powerful way to provide SSO cross-domains @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 30. Adatum meets Litware Private & Public Cloud @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 31. Windows Azure ACCESS CONTROL SERVICE @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 32. Shortly Private & Public Cloud • A feature of Windows Azure Active Directory • Outsourcing Authentication (no need to write code) • Works with .NET, PHP, Python, Java and Ruby • Out-of-the-box support for a variety of identify providers • Integrates with on-premises Active Directory @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 33. Benefits Private & Public Cloud • Open industry standards – Protocols: OAuth 2.0, WS-Trust, WS-Federation – Token formats: SAML 1.1/2.0 and Simple Web Token • $1,99 / 100.000 transactions @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 34. Identity Providers Private & Public Cloud • Built-in support for – Windows Live ID – Facebook – Google – Yahoo! – WS-Federation Identity Providers • Programatic configuration for – WS-Trust based (AD FS 2.0) – OpenID based @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 35. Relying Party Applications Private & Public Cloud • An application that relies on claims • Implements federated authentication using ACS • Trusts the ACS namespace • Can be configured manually or programatically through ACS Management Service @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 36. ACS Architecture Private & Public Cloud @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 37. ACS - Protocol Handling Private & Public Cloud • ACS does heavy lifting for handling protocols – WS-Federation – WS-Trust – OpenID – OAuth 2.0, OAuth WRAP – Facebook Graph • ACS issues normalized tokens – SAML – SWT @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 38. Windows Azure ACS ENOUGH TALKING, LET’S DEMO! @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 39. Goals Private & Public Cloud 1. Configure your application to outsource authentication to ACS 2. Configure ACS to include the identity providers you want to leverage 3. Configure ACS to process incoming identities and add new claims 4. Modify your application to consume claims from ACS and drive authorization decisions 5. Customize the default authentication user experience provided by ACS @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 40. Requirements Private & Public Cloud • Windows Vista SP2, Windows Server 2008 SP2, Windows Server 2008 R2, or Windows 7 (32-bits or 64-bits) • Internet Information Services (IIS) 7.0 • .NET Framework 4 • Visual Studio 2010 • Windows Identity Foundation Runtime • Windows Identity Foundation SDK @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 41. Windows Azure ACS DEMO @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 42. Summary Private & Public Cloud • A feature of Windows Azure Active Directory • Outsourcing Auth and Auth (no need to write code) • Works with .NET, PHP, Python, Java and Ruby • Out-of-the-box support for identify providers like Windows Live ID, Google, Yahoo! and Facebook • Integrates with on-premises Active Directory @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 43. Conclusions Private & Public Cloud • Claims get the job done • Separate authentication from authorization • Solves OWASP’s 3rd vulnerability • How can it work for you? @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 44. References Private & Public Cloud • Windows Azure Training Kit • claimsid.codeplex.com @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 45. Check Out AzureWorks.ro Private & Public Cloud www.azureworks.ro @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 46. meetwindowsazure.com @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 47. Q&A @ itcampro # itcamp12 Premium conference on Microsoft technologies
  • 48. What about Smart Clients? Private & Public Cloud @ itcampro # itcamp12 Premium conference on Microsoft technologies