SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
Identity Management
with midPoint
Radovan Semančík
FOSDEM, January 2016
Radovan Semančík
Current:
Software Architect at Evolveum
Architect of Evolveum midPoint
Contributor to ConnId and Apache Directory API
Past:
Sun LDAP and IDM deployments (early 2000s)
OpenIDM v1, OpenICF
Many software architecture and security projects
Identity and Access Management
Identity
Repository
HR
Application
Application
Application
Application
A
M
Identity
Management
Users
CRM
System
Admin
Requester
Approver
Application
There is no security without
identity management
If you have no IDM, how can you
be sure that ...
● illegal accounts are disabled/deleted?
● temporary accounts are deleted?
● users have only the least privileges?
● the privileges are not accumulated?
● no secondary authentication is possible?
● the data are up to date? (title, affiliation, …)
● notifications and tasks are suspended?
The solution is trivial
Let's put everything in LDAP!
Expectation
Application
Application
Application
Application
S
S
O
Users
Application
LDAP
HR
Reality
Application
Application
Application
Application
S
S
O
Users
Application
LDAP
HR
Unsupported
No standard
(ugly script needed)
Unsupported
!Custom
schema
Incompatible
schema
Relational
database
Extremely
expensive
!Expensive
Home
directory
Local copy
Incompatible
identifiers
“Single directory” approach
is not going to work
… and this has been known since 2006 (at least)
Identity and Access Management
Identity
Repository
HR
Application
Application
Application
Application
A
M
Identity
Management
Users
CRM
System
Admin
Requester
Approver
Application
How IDM works?
Identity
Repository
HR
Application
Application
Application
Application
A
M
Identity
Management
Automatic user provisioning
Identity
Repository
HR
Application
Application
Application
Application
A
M
Identity
Management
Policies
RBAC
Rules
Business As Usual
Identity
Repository
HR
Application
Application
Application
Application
A
M
Identity
Management
Password reset (self-service)
Identity
Repository
HR
Application
Application
Application
Application
A
M
Identity
Management
Employee Leaves Company
Identity
Repository
HR
Application
Application
Application
Application
A
M
Identity
Management
Automatic user deprovisioning
Identity
Repository
HR
Application
Application
Application
Application
A
M
Identity
Management
Policies
RBAC
Rules
Business As Usual
Identity
Repository
HR
Application
Application
Application
Application
A
M
Identity
Management
Bidirectional Synchronization
Identity
Repository
HR
Application
Application
Application
Application
A
M
Identity
Management
Policy enforcement
Identity
Repository
HR
Application
Application
Application
Application
A
M
Identity
Management
Policies
RBAC
Rules
What Identity Management does?
● Provisioning
● Synchronization
● Self-service
● Password management
● Credentials distribution
(SSH, X.509)
● RBAC
● Organizational structure
● Entitlement management
● Identifier management
● Data mapping
● Segregation of duties
● Workflow
● Notifications
● Auditing
● Reporting
● Governance
● ...
This IDM looks like the best thing
since the sliced bread.
What's the catch?
This IDM looks like the best thing
since the sliced bread.
What's the catch?
The commercial IDM products are
expensive.
This IDM looks like the best thing
since the sliced bread.
What's the catch?
The commercial IDM products are
expensive.
Very, very expensive.
Open Source to the Rescue
There was no practical FOSS solution until 2010
(Sun Identity Manager was the king)
2010-2011: Syncope, OpenIDM, midPoint, ...
(that was the time when Oracle acquired Sun)
Now there are two leading open source*
IDMs:
● Apache Syncope
● Evolveum midPoint
*) by “open source” I mean both license and practice
Evolveum midPoint?
Identity
Repository
HR
Application
Application
Application
Application
A
M
Identity
Management
Users
CRM
Application
midPoint
The midPoint Story
● Started 2010-2011 (5 years, 14 releases)
● Github, Apache 2.0 License
● ~500K lines of code (Java)
● State-of-the-art IDM features
Provisioning
Synchronization
RBAC
Governance
Consistency Workflow
Audit Authorization
Management
Self-service
Delegated administration
Data mapping REST
Policy
Entitlements
Segregation of duties
HA
Identifiers
Notifications
Connectors
Localization
Parametric roles
Password reset
Organizational structure
Web UI
Expressions
SchemaConditions Extensibility
Scripting
Bulk actions
Questions and Answers
Provisioning
Synchronization
RBAC
Governance
Consistency Workflow
Audit Authorization
Management
Self-service
Delegated administration
Data mapping REST
Policy
Entitlements
Segregation of duties
HA
Identifiers
Notifications
Connectors
Localization
Parametric roles
Password reset
Organizational structure
Web UI
Expressions
SchemaConditions Extensibility
Scripting
Bulk actions
Radovan Semančík
www.evolveum.com
Thank You

Contenu connexe

Tendances

State of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers Mindset
CrowdStrike
 

Tendances (20)

Splunk for IT Operations
Splunk for IT OperationsSplunk for IT Operations
Splunk for IT Operations
 
Intro to AI & ML at Amazon
Intro to AI & ML at AmazonIntro to AI & ML at Amazon
Intro to AI & ML at Amazon
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
 
3 Modern Security - Secure identities to reach zero trust with AAD
3   Modern Security - Secure identities to reach zero trust with AAD3   Modern Security - Secure identities to reach zero trust with AAD
3 Modern Security - Secure identities to reach zero trust with AAD
 
Preparing, Piloting & Paths to Success with Microsoft Copilot
Preparing, Piloting & Paths to Success with Microsoft CopilotPreparing, Piloting & Paths to Success with Microsoft Copilot
Preparing, Piloting & Paths to Success with Microsoft Copilot
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
State of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers Mindset
 
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
O'Reilly SACon 2019 - (Continuous) Threat Modeling - What works?
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
Artificial Intelligence on AWS
Artificial Intelligence on AWSArtificial Intelligence on AWS
Artificial Intelligence on AWS
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Application Security Guide for Beginners
Application Security Guide for Beginners Application Security Guide for Beginners
Application Security Guide for Beginners
 
Understanding cloud with Google Cloud Platform
Understanding cloud with Google Cloud PlatformUnderstanding cloud with Google Cloud Platform
Understanding cloud with Google Cloud Platform
 
Limitless xdr meetup
Limitless xdr meetupLimitless xdr meetup
Limitless xdr meetup
 
Splunk Cloud
Splunk CloudSplunk Cloud
Splunk Cloud
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptx
 
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
 

En vedette

E gov security_tut_session_9
E gov security_tut_session_9E gov security_tut_session_9
E gov security_tut_session_9
Mustafa Jarrar
 
Open source identity management 20121106 - apache con eu
Open source identity management   20121106 - apache con euOpen source identity management   20121106 - apache con eu
Open source identity management 20121106 - apache con eu
Francesco Chicchiriccò
 

En vedette (13)

Project midPoint or how a handful of fools fought the Giants
Project midPoint or how a handful of fools fought the GiantsProject midPoint or how a handful of fools fought the Giants
Project midPoint or how a handful of fools fought the Giants
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access management
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Evolveum: About the company and its product - midPoint
Evolveum: About the company and its product - midPointEvolveum: About the company and its product - midPoint
Evolveum: About the company and its product - midPoint
 
Open iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-aOpen iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-a
 
User Interface Patterns and Nuxeo
User Interface Patterns and NuxeoUser Interface Patterns and Nuxeo
User Interface Patterns and Nuxeo
 
E gov security_tut_session_9
E gov security_tut_session_9E gov security_tut_session_9
E gov security_tut_session_9
 
Intalio’S Vision For An Open Source Bpm Suite
Intalio’S Vision For An Open Source Bpm SuiteIntalio’S Vision For An Open Source Bpm Suite
Intalio’S Vision For An Open Source Bpm Suite
 
Open source identity management 20121106 - apache con eu
Open source identity management   20121106 - apache con euOpen source identity management   20121106 - apache con eu
Open source identity management 20121106 - apache con eu
 
Apache Syncope 2.0 Enduser UI
Apache Syncope 2.0 Enduser UIApache Syncope 2.0 Enduser UI
Apache Syncope 2.0 Enduser UI
 
Identity Management Overview: CAS and Shibboleth
Identity Management Overview: CAS and ShibbolethIdentity Management Overview: CAS and Shibboleth
Identity Management Overview: CAS and Shibboleth
 
Nuxeo World Session: Case Management Framework
Nuxeo World Session: Case Management FrameworkNuxeo World Session: Case Management Framework
Nuxeo World Session: Case Management Framework
 
Nuxeo ECM Platform - Technical Overview
Nuxeo ECM Platform - Technical OverviewNuxeo ECM Platform - Technical Overview
Nuxeo ECM Platform - Technical Overview
 

Similaire à Identity Management with midPoint

Android Documentation
Android DocumentationAndroid Documentation
Android Documentation
Raj Dubey
 
SumitK's mobile app dev using drupal as base ststem
SumitK's mobile app dev using drupal as base ststemSumitK's mobile app dev using drupal as base ststem
SumitK's mobile app dev using drupal as base ststem
Sumit Kataria
 
Company Presentation (+Portfolio)
Company Presentation (+Portfolio)Company Presentation (+Portfolio)
Company Presentation (+Portfolio)
Joseph McKay
 
Building an API Centric SOA
Building an API Centric SOA Building an API Centric SOA
Building an API Centric SOA
WSO2
 
Running Data Platforms Like Products
Running Data Platforms Like ProductsRunning Data Platforms Like Products
Running Data Platforms Like Products
VMware Tanzu
 

Similaire à Identity Management with midPoint (20)

Simplify enterprise IT with no code platform - aPaaS
Simplify enterprise IT with no code platform - aPaaSSimplify enterprise IT with no code platform - aPaaS
Simplify enterprise IT with no code platform - aPaaS
 
Apache Syncope and Tirasa
Apache Syncope and TirasaApache Syncope and Tirasa
Apache Syncope and Tirasa
 
Resume
ResumeResume
Resume
 
Ti 1217 extend and surround your Adobe DX solutions with IBM Software
Ti 1217 extend and surround your Adobe DX solutions with IBM SoftwareTi 1217 extend and surround your Adobe DX solutions with IBM Software
Ti 1217 extend and surround your Adobe DX solutions with IBM Software
 
Android Documentation
Android DocumentationAndroid Documentation
Android Documentation
 
SumitK's mobile app dev using drupal as base ststem
SumitK's mobile app dev using drupal as base ststemSumitK's mobile app dev using drupal as base ststem
SumitK's mobile app dev using drupal as base ststem
 
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
 
Microsoft power platform
Microsoft power platformMicrosoft power platform
Microsoft power platform
 
Resume majid rafiei
Resume majid rafieiResume majid rafiei
Resume majid rafiei
 
Concurrency SharePoint Summit 2015
Concurrency SharePoint Summit 2015Concurrency SharePoint Summit 2015
Concurrency SharePoint Summit 2015
 
ashishtripathi
ashishtripathiashishtripathi
ashishtripathi
 
Yii Framework - Do we really need another php framework?
Yii Framework - Do we really need another php framework?Yii Framework - Do we really need another php framework?
Yii Framework - Do we really need another php framework?
 
Bp209
Bp209Bp209
Bp209
 
Company Presentation (+Portfolio)
Company Presentation (+Portfolio)Company Presentation (+Portfolio)
Company Presentation (+Portfolio)
 
Company presentation (+portfolio)
Company presentation (+portfolio)Company presentation (+portfolio)
Company presentation (+portfolio)
 
Domino app dev competitive advantage final
Domino app dev competitive advantage finalDomino app dev competitive advantage final
Domino app dev competitive advantage final
 
SaaS Ventures: Introduction
SaaS Ventures: IntroductionSaaS Ventures: Introduction
SaaS Ventures: Introduction
 
Building an API Centric SOA
Building an API Centric SOA Building an API Centric SOA
Building an API Centric SOA
 
Running Data Platforms Like Products
Running Data Platforms Like ProductsRunning Data Platforms Like Products
Running Data Platforms Like Products
 
AdminCamp 2018 - ApplicationInsights für Administratoren
AdminCamp 2018 - ApplicationInsights für AdministratorenAdminCamp 2018 - ApplicationInsights für Administratoren
AdminCamp 2018 - ApplicationInsights für Administratoren
 

Plus de Radovan Semancik

Plus de Radovan Semancik (7)

How To Maintain Million Lines Of Open Source Code And Remain Sane or The Stor...
How To Maintain Million Lines Of Open Source Code And Remain Sane or The Stor...How To Maintain Million Lines Of Open Source Code And Remain Sane or The Stor...
How To Maintain Million Lines Of Open Source Code And Remain Sane or The Stor...
 
There is REST and then there is "REST"
There is REST and then there is "REST"There is REST and then there is "REST"
There is REST and then there is "REST"
 
MidPoint: Consumer to Contributor
MidPoint: Consumer to ContributorMidPoint: Consumer to Contributor
MidPoint: Consumer to Contributor
 
Identity governance and data protection with mid point
Identity governance and data protection with mid pointIdentity governance and data protection with mid point
Identity governance and data protection with mid point
 
Introduction to LDAP and Directory Services
Introduction to LDAP and Directory ServicesIntroduction to LDAP and Directory Services
Introduction to LDAP and Directory Services
 
Complete open source IAM solution
Complete open source IAM solutionComplete open source IAM solution
Complete open source IAM solution
 
Open Source Identity Management
Open Source Identity ManagementOpen Source Identity Management
Open Source Identity Management
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Identity Management with midPoint