SlideShare une entreprise Scribd logo
1  sur  14
AUTHENTICATION
AS A
SERVICE
by TEAM9 SOLUTIONS
OBJECTIVE
 What is Authentication?
 About cloud computing & its services
 Authentication as a service(AaaS)
 Components of AaaS
 Authentication Federation
 Advantages of AaaS
 AaaS Service Providers
AUTHENTICATION
 Authentication is the process of identifying a
user
 Authentication lets an entity prove who he/she
claims to be
 Authentication is the process of validating or
confirming that access credentials
 provided by a user (for instance, a user ID and
password) are valid. A user in this case could
be a person, another application, or a service
Authentication does not guarantee
authorization.
CLOUD COMPUTING & SERVICE
 Computing resources are provisioned, used and made
available on internet or intranet.
 Cloud computing makes heavy use of Virtualization and
SDN (software defined networking )
 Services that run on top of the cloud computing are
called cloud services.
 Gmail is a very good example of cloud service.
AUTHENTICATION AS A SERVICE
(AaaS)
 As online access to services becomes ubiquitous and
the cloud access model gains momentum, authentication
is increasingly becoming a focal point for security
professionals.
 With bank accounts, health records, corporate
intellectual property and politically sensitive information
being just a few clicks away, no matter where in the
world you are ,it is natural to worry about the identity of
those wishing to gain access .This is where
Authentication comes into play
AUTHENTICATION AS A SERVICE
(AaaS)
 Authentication server and other resources needed for
authentication are placed on the internet (cloud) and are
used by clients/users that are physically distant.
 The authentication servers and other components are
now on the cloud and not on the server farm of an
enterprise network.
 The Cloud Security Alliance (CSA) is a non-profit
organization with a mission to promote the use of best
practices for providing security within Cloud Computing,
and to provide education, led by a broad coalition of
industry practitioners, corporations, associations and
other key stakeholders.
COMPONENTS OF AaaS
 Cloud Federation: It refers to the unionization of
software, infrastructure and platform services from
different networks that can be accessed by a client via
the internet. It is important to note that federated cloud
computing services still rely on the existence of physical
data centers.
 Service Provider (SP): Provide hosting authentication
service.
 Identity Provider (IdP): An authoritative source of
identity data for users provides the primary
authentication of the user. The Identity Provider can be
the service consumer itself, or external to it.
AUTHENTICATION AS A SERVICE
(AaaS)
 AaaS involves Federated Single Sign-On (SSO) using
industry standards such as SAML, OAUTH and OpenID.
 Enables 2 factor strong authentication with convenient
soft OTP token support.
AUTHENTICATION FEDERATION
ADVANTAGE OF AaaS
 Elastic capability – scale up/down on demand
 Resources are abstracted /virtualized
 Interoperability between different platforms
 High availability
 Secure and reliable ( two factor)
 Pay as you go service or pay per use service (flexible
payment mode)
 Single Sign On ( SSO)
AaaS SERVICE PROVIDERS
 Support a wide range of tokens and tokenless
authentication methods allowing each user to choose the
right token type for their individual needs.
 Strong authentication can be provided , standards such
as RADIUS and SAML and the availability of APIs and
agents for other applications.
 We support 3rd party tokens ensuring that existing
investment in tokens is not lost when users migrate to
our solution.
 The comprehensive degree of automation in the solution
drastically reduces the cost of management and
administration.
AaaS SERVICE PROVIDERS
Conclusion
 Authentication As A Service (AaaS) gives us all the
benefits of cloud computing without worrying about
the security of our personal or business data.
 AaaS also provide the countermeasures against ID
theft, sensitive information like credit card, health
records etc.
Team9 presentation  version 3(1)

Contenu connexe

Tendances

Securely access and audit the cloud
Securely access and audit the cloudSecurely access and audit the cloud
Securely access and audit the cloud
Novell
 
MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)
Luís Serra Libório
 

Tendances (20)

SaaS Platform Securing
SaaS Platform SecuringSaaS Platform Securing
SaaS Platform Securing
 
Slides
SlidesSlides
Slides
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access management
 
CIS14: User-Managed Access
CIS14: User-Managed AccessCIS14: User-Managed Access
CIS14: User-Managed Access
 
Ping Identity
Ping IdentityPing Identity
Ping Identity
 
SailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity Governance
 
JoTechies - Cloud identity
JoTechies - Cloud identityJoTechies - Cloud identity
JoTechies - Cloud identity
 
Identity is key - Robin Gorris
Identity is key - Robin GorrisIdentity is key - Robin Gorris
Identity is key - Robin Gorris
 
The Platform Big Picture
The Platform Big PictureThe Platform Big Picture
The Platform Big Picture
 
Pres Bbx Cloudstorm Antwerpen
Pres Bbx Cloudstorm AntwerpenPres Bbx Cloudstorm Antwerpen
Pres Bbx Cloudstorm Antwerpen
 
Securely access and audit the cloud
Securely access and audit the cloudSecurely access and audit the cloud
Securely access and audit the cloud
 
MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)
 
Extending Enterprise Security into the Cloud
Extending Enterprise Security into the CloudExtending Enterprise Security into the Cloud
Extending Enterprise Security into the Cloud
 
Layer 7 Technologies: Enabling Hybrid Enterprise/Cloud SOA
Layer 7 Technologies: Enabling Hybrid Enterprise/Cloud SOALayer 7 Technologies: Enabling Hybrid Enterprise/Cloud SOA
Layer 7 Technologies: Enabling Hybrid Enterprise/Cloud SOA
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 
Federation in Practice
Federation in PracticeFederation in Practice
Federation in Practice
 
Cloud Email Firewall
Cloud Email FirewallCloud Email Firewall
Cloud Email Firewall
 
Mct summit 2021
Mct summit 2021Mct summit 2021
Mct summit 2021
 
Hybrid identity by Sandeep Kumar Seeram
Hybrid identity by Sandeep Kumar Seeram Hybrid identity by Sandeep Kumar Seeram
Hybrid identity by Sandeep Kumar Seeram
 
Azure multi factor authentication - Global Azure bootcamp 2018 security
Azure multi factor authentication - Global Azure bootcamp 2018  securityAzure multi factor authentication - Global Azure bootcamp 2018  security
Azure multi factor authentication - Global Azure bootcamp 2018 security
 

En vedette

Aparato respiratorio
Aparato respiratorioAparato respiratorio
Aparato respiratorio
mil oficios
 
Ci 350 thursday assure
Ci 350 thursday assureCi 350 thursday assure
Ci 350 thursday assure
jessie_arin
 
เรื่อง อุปกรณ์พื้นฐานคอมพิวเตอร์
เรื่อง อุปกรณ์พื้นฐานคอมพิวเตอร์เรื่อง อุปกรณ์พื้นฐานคอมพิวเตอร์
เรื่อง อุปกรณ์พื้นฐานคอมพิวเตอร์
Best12713
 
Práctica de geomorffología externa
Práctica de geomorffología externaPráctica de geomorffología externa
Práctica de geomorffología externa
Rodrii Campillos
 
ลักษณะการนำเสนอละครตะวันตก
ลักษณะการนำเสนอละครตะวันตกลักษณะการนำเสนอละครตะวันตก
ลักษณะการนำเสนอละครตะวันตก
Kunanya Taksin
 
Rcpe Pharmaceutical Proteins
Rcpe Pharmaceutical ProteinsRcpe Pharmaceutical Proteins
Rcpe Pharmaceutical Proteins
sleitgeb
 

En vedette (20)

課文本位與閱讀理解教學
課文本位與閱讀理解教學課文本位與閱讀理解教學
課文本位與閱讀理解教學
 
Презентация
Презентация Презентация
Презентация
 
Aparato respiratorio
Aparato respiratorioAparato respiratorio
Aparato respiratorio
 
Generación del 98
Generación del 98Generación del 98
Generación del 98
 
Ci 350 thursday assure
Ci 350 thursday assureCi 350 thursday assure
Ci 350 thursday assure
 
EDUARDO MENDICUTTI
EDUARDO MENDICUTTIEDUARDO MENDICUTTI
EDUARDO MENDICUTTI
 
assignment brief
assignment briefassignment brief
assignment brief
 
Componentes físicos
Componentes físicosComponentes físicos
Componentes físicos
 
140224 faktor-faktor dan karakteristik filsafat
140224 faktor-faktor dan karakteristik filsafat140224 faktor-faktor dan karakteristik filsafat
140224 faktor-faktor dan karakteristik filsafat
 
habilidaded gerenciales
habilidaded gerenciales habilidaded gerenciales
habilidaded gerenciales
 
El secuestro
El secuestroEl secuestro
El secuestro
 
เรื่อง อุปกรณ์พื้นฐานคอมพิวเตอร์
เรื่อง อุปกรณ์พื้นฐานคอมพิวเตอร์เรื่อง อุปกรณ์พื้นฐานคอมพิวเตอร์
เรื่อง อุปกรณ์พื้นฐานคอมพิวเตอร์
 
La Playa De La Oreja De Van Gohg
La Playa De La Oreja De Van GohgLa Playa De La Oreja De Van Gohg
La Playa De La Oreja De Van Gohg
 
Yurani
YuraniYurani
Yurani
 
A Study Report of Ancient Heritage Situated in Bangalore
A Study Report of Ancient Heritage Situated in BangaloreA Study Report of Ancient Heritage Situated in Bangalore
A Study Report of Ancient Heritage Situated in Bangalore
 
Práctica de geomorffología externa
Práctica de geomorffología externaPráctica de geomorffología externa
Práctica de geomorffología externa
 
ลักษณะการนำเสนอละครตะวันตก
ลักษณะการนำเสนอละครตะวันตกลักษณะการนำเสนอละครตะวันตก
ลักษณะการนำเสนอละครตะวันตก
 
Website Traffic London Traffic Metrics System PowerPoint
Website Traffic London Traffic Metrics System PowerPointWebsite Traffic London Traffic Metrics System PowerPoint
Website Traffic London Traffic Metrics System PowerPoint
 
Rcpe Pharmaceutical Proteins
Rcpe Pharmaceutical ProteinsRcpe Pharmaceutical Proteins
Rcpe Pharmaceutical Proteins
 
Era digital
Era digitalEra digital
Era digital
 

Similaire à Team9 presentation version 3(1)

School of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxSchool of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docx
jeffsrosalyn
 
Service now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxService now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docx
edgar6wallace88877
 
Ams 2 fa april 2013
Ams 2 fa april 2013Ams 2 fa april 2013
Ams 2 fa april 2013
Hai Nguyen
 
saassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdfsaassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdf
SahilSingh316535
 
Microsoft Windows Azure Platform Appfabric for Technical Decision Makers
Microsoft Windows Azure Platform Appfabric for Technical Decision MakersMicrosoft Windows Azure Platform Appfabric for Technical Decision Makers
Microsoft Windows Azure Platform Appfabric for Technical Decision Makers
Microsoft Private Cloud
 

Similaire à Team9 presentation version 3(1) (20)

School of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxSchool of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docx
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
Service now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxService now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docx
 
TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3
 
Entrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overviewEntrust datacard --Authentication solutions overview
Entrust datacard --Authentication solutions overview
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
Ams 2 fa april 2013
Ams 2 fa april 2013Ams 2 fa april 2013
Ams 2 fa april 2013
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
SaaS Security.pptx
SaaS Security.pptxSaaS Security.pptx
SaaS Security.pptx
 
saassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdfsaassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdf
 
Protect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloudProtect your business with identity and access management in the cloud
Protect your business with identity and access management in the cloud
 
A Guide to Cloud Computing Service Models.pptx
A Guide to Cloud Computing Service Models.pptxA Guide to Cloud Computing Service Models.pptx
A Guide to Cloud Computing Service Models.pptx
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
User Management, Enablement, Directory
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, Directory
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
Microsoft Windows Azure Platform Appfabric for Technical Decision Makers
Microsoft Windows Azure Platform Appfabric for Technical Decision MakersMicrosoft Windows Azure Platform Appfabric for Technical Decision Makers
Microsoft Windows Azure Platform Appfabric for Technical Decision Makers
 
Tcp security white paper
Tcp security white paperTcp security white paper
Tcp security white paper
 

Team9 presentation version 3(1)

  • 2. OBJECTIVE  What is Authentication?  About cloud computing & its services  Authentication as a service(AaaS)  Components of AaaS  Authentication Federation  Advantages of AaaS  AaaS Service Providers
  • 3. AUTHENTICATION  Authentication is the process of identifying a user  Authentication lets an entity prove who he/she claims to be  Authentication is the process of validating or confirming that access credentials  provided by a user (for instance, a user ID and password) are valid. A user in this case could be a person, another application, or a service Authentication does not guarantee authorization.
  • 4. CLOUD COMPUTING & SERVICE  Computing resources are provisioned, used and made available on internet or intranet.  Cloud computing makes heavy use of Virtualization and SDN (software defined networking )  Services that run on top of the cloud computing are called cloud services.  Gmail is a very good example of cloud service.
  • 5. AUTHENTICATION AS A SERVICE (AaaS)  As online access to services becomes ubiquitous and the cloud access model gains momentum, authentication is increasingly becoming a focal point for security professionals.  With bank accounts, health records, corporate intellectual property and politically sensitive information being just a few clicks away, no matter where in the world you are ,it is natural to worry about the identity of those wishing to gain access .This is where Authentication comes into play
  • 6. AUTHENTICATION AS A SERVICE (AaaS)  Authentication server and other resources needed for authentication are placed on the internet (cloud) and are used by clients/users that are physically distant.  The authentication servers and other components are now on the cloud and not on the server farm of an enterprise network.  The Cloud Security Alliance (CSA) is a non-profit organization with a mission to promote the use of best practices for providing security within Cloud Computing, and to provide education, led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.
  • 7. COMPONENTS OF AaaS  Cloud Federation: It refers to the unionization of software, infrastructure and platform services from different networks that can be accessed by a client via the internet. It is important to note that federated cloud computing services still rely on the existence of physical data centers.  Service Provider (SP): Provide hosting authentication service.  Identity Provider (IdP): An authoritative source of identity data for users provides the primary authentication of the user. The Identity Provider can be the service consumer itself, or external to it.
  • 8. AUTHENTICATION AS A SERVICE (AaaS)  AaaS involves Federated Single Sign-On (SSO) using industry standards such as SAML, OAUTH and OpenID.  Enables 2 factor strong authentication with convenient soft OTP token support.
  • 10. ADVANTAGE OF AaaS  Elastic capability – scale up/down on demand  Resources are abstracted /virtualized  Interoperability between different platforms  High availability  Secure and reliable ( two factor)  Pay as you go service or pay per use service (flexible payment mode)  Single Sign On ( SSO)
  • 11. AaaS SERVICE PROVIDERS  Support a wide range of tokens and tokenless authentication methods allowing each user to choose the right token type for their individual needs.  Strong authentication can be provided , standards such as RADIUS and SAML and the availability of APIs and agents for other applications.  We support 3rd party tokens ensuring that existing investment in tokens is not lost when users migrate to our solution.  The comprehensive degree of automation in the solution drastically reduces the cost of management and administration.
  • 13. Conclusion  Authentication As A Service (AaaS) gives us all the benefits of cloud computing without worrying about the security of our personal or business data.  AaaS also provide the countermeasures against ID theft, sensitive information like credit card, health records etc.