SlideShare une entreprise Scribd logo
1  sur  23
Télécharger pour lire hors ligne
Access Management 2.0:
UMA for the Enterprise	

@UMAWG
#UMAam20 for questions
20 March 2014
tinyurl.com/umawg for slides, recording, and more
1
Agenda
•  The realities and
challenges of modern
access control (CA)
•  “UMA for the Enterprise
101”
•  Enterprise UMA case
study and demo (Gluu)
•  What vendors are saying
and doing about UMA
•  Q&A
2	

Thanks to CA Technologies
for sponsoring this webinar!
Thanks to Kantara for
supporting the UMA work!
Thanks to our additional
webinar participants!
The realities and challenges of
modern access control
3	

Further reading:
tinyurl.com/umaam20
4	
   	
  	
  	
  
Copyright © 2014 CA. All rights reserved.
UMA	
  Con(nues	
  The	
  Shi0	
  In	
  Iden(ty	
  Management	
  
That	
  Began	
  With	
  OAuth	
  
The Traditional Enterprise The 21st Century Enterprise
This is the secret to
achieving scale and
agile federation
“UMA for the Enterprise 101”
5	

Further reading:
tinyurl.com/umafaq
OAuth is a three-entity protocol for
securing API calls in a user context
6	

Source:	
  The	
  OAuth	
  2.0	
  Authoriza4on	
  Framework,	
  h;p://tools.ie@.org/html/rfc6749	
  
End-user resource
owner gets
redirected to AS to
log in and consent
to access token
issuance
AS and RS are
typically in the
same domain and
communicate in a
proprietary way
UMA’s original goal: apply privacy-
by-design to OAuth data sharing
7	

Standardized APIs for
privacy and “selective
sharing”
Outsources protection to
a centralized “digital
footprint control console”
The “user” in User-Managed
Access (UMA)
Some guy not
accounted for
in OAuth…
Further reading:
tinyurl.com/umapbd
Emergent UMA properties: flexible,
modern, claims-based authorization
8	

Source:	
  XACMLinfo.org,	
  h;p://xacmlinfo.org/2011/10/30/xacml-­‐reference-­‐architecture/	
  
consumes authz data associated with token
native or a client of offboard source(s), in any language(s)
claims gathered through user interaction and/or consuming ID tokens
UMA and XACML can coexist nicely
The RS
exposes
whatever
value-add API
it wants,
protected by an
AS
9	

App-specific API
UMA-enabled
client
RPTrequesting party token
The AS
exposes an
UMA-
standardized
protection API
to the RS
10	

ProtectionAPI
Protectionclient
PAT
protection API token
includes resource
registration API and token
introspection API
The AS
exposes an
UMA-
standardized
authorization
API to the client
11	

Authorization API
Authorization client
AAT
authorization API token
supports OpenID
Connect-based claims-
gathering for authz
UMA, SAML, and OpenID Connect can coexist nicely
Key use cases
•  Managing
personal data
store access
•  E-transcript
sharing
•  Patient-centric
health data
access
•  …and enterprise access management 2.0
12	

Source:	
  MIT	
  Consor4um	
  for	
  Kerberos	
  and	
  Internet	
  Trust,	
  h;ps://kit.mit.edu	
  
AM1.0 vs AM2.0
•  Complex and feature-rich
•  Usually proprietary
•  Mobile/API-unfriendly
•  Brittle deployment
architecture
•  Not agnostic to authn
method
•  Hard to source distributed
policies
•  Usually coarse-grained
•  RESTful and simpler
•  Standard interop baseline
•  Mobile/API-friendly
•  Just call authz endpoints
vs. deploying an agent
•  Agnostic to authn method
and federation usage
•  Flexible in policy
expression and sourcing
•  Leverages API’s “scope-
grained authorization”
13
Enterprise UMA case study
14
What vendors are saying and doing
about UMA
15	

Further	
  reading:	
  
4nyurl.com/uma1iop	
  
NuveAM by Cloud Identity
•  UMA-compliant AS:
–  Access control to Web data
–  API security and management
–  Real-time monitoring and audit
•  Use cases: Securing Personal Data Services (PDS) and
access management 2.0 (API security)
•  Uses open standards, including UMA, OAuth 2.0, OpenID
Connect, and SAML 2.0
•  Open source frameworks: Java and Python
•  Support for mobile (Android)
•  Integrates with Identity Management and Identity Federation
http://www.cloudidentity.co.uk/products/nuveam
16
NuveAM by Cloud Identity
17
NuveAM for the enterprises
18	

•  Management of resources, APIs,
permissions, and access control policies
•  Access control on demand
•  Detailed audit information
•  Application management: resource servers
and clients (with NuveLogin)
•  Integration with identity management
•  Integration with identity federation and SSO
NuveAM for the enterprises
19
NuveAM for the enterprises
20
Next steps
21
Next steps for the WG…and you
•  Get involved!
–  Become an “UMAnitarian” (it’s free)
–  Participate in the interop and
our implementation discussions
–  Follow and engage with @UMAWG on Twitter
•  Current work:
–  Technical: claim profiling to allow claim-gathering
using SAML, OpenID Connect, LDAP…
–  Business: Binding Obligations spec to tie “terms of
authorization” to multi-party state changes
•  Stay tuned for another webinar in Q2
22	

Join	
  at:	
  
4nyurl.com/umawg	
  
Questions? Thank you!	

@UMAWG
#UMAam20 for questions
20 March 2014
tinyurl.com/umawg for slides, recording, and more
23

Contenu connexe

Tendances

Presentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloudPresentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloud
Hassan EL ALLOUSSI
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacks
John Davis
 

Tendances (16)

Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
Existing system
Existing systemExisting system
Existing system
 
Presentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloudPresentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloud
 
Identity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital TransformationIdentity and Access Management in the Era of Digital Transformation
Identity and Access Management in the Era of Digital Transformation
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
 
Sovereign identity
Sovereign identitySovereign identity
Sovereign identity
 
Reducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesReducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniques
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacks
 
Exploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareExploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in Healthcare
 
The emerging pci dss and nist standards
The emerging pci dss and nist standardsThe emerging pci dss and nist standards
The emerging pci dss and nist standards
 
Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
Access Lab 2020: Saying ‘no’ the publisher’s personal data gathering – our ex...
 
IT-Security@Contemporary Life
IT-Security@Contemporary LifeIT-Security@Contemporary Life
IT-Security@Contemporary Life
 

En vedette

20120512 robots en verzekeraar
20120512 robots en verzekeraar20120512 robots en verzekeraar
20120512 robots en verzekeraar
JGB de Groot
 
καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!
καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!
καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!
Kostas Tampakis
 
אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...
אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...
אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...
yossi koren
 
20100427 eyjafjalljokull
20100427 eyjafjalljokull20100427 eyjafjalljokull
20100427 eyjafjalljokull
NSTDA THAILAND
 
! автоматизированное управление рекламой 19 terehov-etarget2011
! автоматизированное управление рекламой 19 terehov-etarget2011! автоматизированное управление рекламой 19 terehov-etarget2011
! автоматизированное управление рекламой 19 terehov-etarget2011
Тарасов Константин
 
!Rif13.17apr s14--parshukova увеличение эффективности контекста
!Rif13.17apr s14--parshukova увеличение эффективности контекста!Rif13.17apr s14--parshukova увеличение эффективности контекста
!Rif13.17apr s14--parshukova увеличение эффективности контекста
Тарасов Константин
 
! реализовать настройки га 14 sergeev-etarget2011
! реализовать настройки га 14 sergeev-etarget2011! реализовать настройки га 14 sergeev-etarget2011
! реализовать настройки га 14 sergeev-etarget2011
Тарасов Константин
 
35 bark-optimization2010 стратегия развития сайта и seo
35 bark-optimization2010 стратегия развития сайта и seo35 bark-optimization2010 стратегия развития сайта и seo
35 bark-optimization2010 стратегия развития сайта и seo
Тарасов Константин
 

En vedette (20)

420
420420
420
 
20120512 robots en verzekeraar
20120512 robots en verzekeraar20120512 robots en verzekeraar
20120512 robots en verzekeraar
 
καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!
καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!
καταπληκτικοί φωτογραφικοί αντικατοπτρισμοί!!!
 
Fotos extra1
Fotos extra1Fotos extra1
Fotos extra1
 
אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...
אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...
אוהדי הספורט בארץ עוקבים בפליאה ובהשתאות אחרי המסע המופלא של קריית שמונה לאלי...
 
A face of greece!!
A face of greece!!A face of greece!!
A face of greece!!
 
20100427 eyjafjalljokull
20100427 eyjafjalljokull20100427 eyjafjalljokull
20100427 eyjafjalljokull
 
РИФ 2016, Перформанс в регионах. Блондинка.ру.
РИФ 2016, Перформанс в регионах. Блондинка.ру.РИФ 2016, Перформанс в регионах. Блондинка.ру.
РИФ 2016, Перформанс в регионах. Блондинка.ру.
 
Projektijuhtimine
ProjektijuhtimineProjektijuhtimine
Projektijuhtimine
 
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...
РИФ 2016, Как главенство данных меняет бизнес-процессы высоконагруженного про...
 
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителю
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителюРИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителю
РИФ 2016, Современный сайт бренда: от посетителя к вовлеченному потребителю
 
22apr s51-a-sergeev-110426092204-phpapp01
22apr s51-a-sergeev-110426092204-phpapp0122apr s51-a-sergeev-110426092204-phpapp01
22apr s51-a-sergeev-110426092204-phpapp01
 
РИФ 2016, Performance-маркетинг в электронной коммерции
РИФ 2016, Performance-маркетинг в электронной коммерцииРИФ 2016, Performance-маркетинг в электронной коммерции
РИФ 2016, Performance-маркетинг в электронной коммерции
 
! автоматизированное управление рекламой 19 terehov-etarget2011
! автоматизированное управление рекламой 19 terehov-etarget2011! автоматизированное управление рекламой 19 terehov-etarget2011
! автоматизированное управление рекламой 19 terehov-etarget2011
 
!Rif13.17apr s14--parshukova увеличение эффективности контекста
!Rif13.17apr s14--parshukova увеличение эффективности контекста!Rif13.17apr s14--parshukova увеличение эффективности контекста
!Rif13.17apr s14--parshukova увеличение эффективности контекста
 
! реализовать настройки га 14 sergeev-etarget2011
! реализовать настройки га 14 sergeev-etarget2011! реализовать настройки га 14 sergeev-etarget2011
! реализовать настройки га 14 sergeev-etarget2011
 
РИФ 2016, Make SMM not Likes
РИФ 2016, Make SMM not LikesРИФ 2016, Make SMM not Likes
РИФ 2016, Make SMM not Likes
 
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламе
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламеРИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламе
РИФ 2016, Сквозная аналитика как метод контроля подрядчика по рекламе
 
Rosja -soczi
Rosja  -socziRosja  -soczi
Rosja -soczi
 
35 bark-optimization2010 стратегия развития сайта и seo
35 bark-optimization2010 стратегия развития сайта и seo35 bark-optimization2010 стратегия развития сайта и seo
35 bark-optimization2010 стратегия развития сайта и seo
 

Similaire à Uma webinar 2014 03-20

Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
James Sutter
 
API’s and Micro Services 0.5
API’s and Micro Services 0.5API’s and Micro Services 0.5
API’s and Micro Services 0.5
Richard Hudson
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
SolarWinds
 

Similaire à Uma webinar 2014 03-20 (20)

Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
Consumerizing Industrial Access Control: Using UMA to Add Privacy and Usabili...
 
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
 
Security On The Cloud
Security On The CloudSecurity On The Cloud
Security On The Cloud
 
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
Efficiencies in RPA with UiPath and CyberArk Technologies - Session 2
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
 
API, Integration, and SOA Convergence
API, Integration, and SOA ConvergenceAPI, Integration, and SOA Convergence
API, Integration, and SOA Convergence
 
D@W REST security
D@W REST securityD@W REST security
D@W REST security
 
API’s and Micro Services 0.5
API’s and Micro Services 0.5API’s and Micro Services 0.5
API’s and Micro Services 0.5
 
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS SummitTop 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
Top 5 security errors and how to avoid them - DEM06-S - Mexico City AWS Summit
 
Shared Security Responsibility Model of AWS
Shared Security Responsibility Model of AWSShared Security Responsibility Model of AWS
Shared Security Responsibility Model of AWS
 
The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3
The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3 The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3
The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over Perimeter
 
Webinar hiware
Webinar hiwareWebinar hiware
Webinar hiware
 
Identiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffingIdentiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffing
 
EasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng OeiEasyStack True Private Cloud | Quek Keng Oei
EasyStack True Private Cloud | Quek Keng Oei
 
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIsWSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
 

Plus de kantarainitiative

Plus de kantarainitiative (20)

Kantara initiative - AGM 2022
Kantara initiative - AGM 2022Kantara initiative - AGM 2022
Kantara initiative - AGM 2022
 
2021 Annual General Meeting
2021 Annual General Meeting2021 Annual General Meeting
2021 Annual General Meeting
 
2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary2020 Annual General Meeting Executive Summary
2020 Annual General Meeting Executive Summary
 
2020 Annual General Meeting
2020 Annual General Meeting2020 Annual General Meeting
2020 Annual General Meeting
 
AARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiative
 
Kantara uma webinar july 2020
Kantara uma webinar   july 2020Kantara uma webinar   july 2020
Kantara uma webinar july 2020
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15Kantara webinar 800 63-3 approval 2020-07-15
Kantara webinar 800 63-3 approval 2020-07-15
 
Kantara orientation april 2020
Kantara orientation april 2020Kantara orientation april 2020
Kantara orientation april 2020
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
Kantara Initiative orientation 2019 (incl. 10th Anniversary video)
 
Kantara orientation 2018
Kantara orientation 2018Kantara orientation 2018
Kantara orientation 2018
 
Kantara Overview 2017
Kantara Overview 2017Kantara Overview 2017
Kantara Overview 2017
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
Cloud Identity Summit
Cloud Identity SummitCloud Identity Summit
Cloud Identity Summit
 
Trust Frameworks Explained
Trust Frameworks ExplainedTrust Frameworks Explained
Trust Frameworks Explained
 
Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)Mobile Device and Attribute Validation (MDAV)
Mobile Device and Attribute Validation (MDAV)
 
Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016 Kantara Initiative, Inc in 2016
Kantara Initiative, Inc in 2016
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Update
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Uma webinar 2014 03-20

  • 1. Access Management 2.0: UMA for the Enterprise @UMAWG #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 1
  • 2. Agenda •  The realities and challenges of modern access control (CA) •  “UMA for the Enterprise 101” •  Enterprise UMA case study and demo (Gluu) •  What vendors are saying and doing about UMA •  Q&A 2 Thanks to CA Technologies for sponsoring this webinar! Thanks to Kantara for supporting the UMA work! Thanks to our additional webinar participants!
  • 3. The realities and challenges of modern access control 3 Further reading: tinyurl.com/umaam20
  • 4. 4         Copyright © 2014 CA. All rights reserved. UMA  Con(nues  The  Shi0  In  Iden(ty  Management   That  Began  With  OAuth   The Traditional Enterprise The 21st Century Enterprise This is the secret to achieving scale and agile federation
  • 5. “UMA for the Enterprise 101” 5 Further reading: tinyurl.com/umafaq
  • 6. OAuth is a three-entity protocol for securing API calls in a user context 6 Source:  The  OAuth  2.0  Authoriza4on  Framework,  h;p://tools.ie@.org/html/rfc6749   End-user resource owner gets redirected to AS to log in and consent to access token issuance AS and RS are typically in the same domain and communicate in a proprietary way
  • 7. UMA’s original goal: apply privacy- by-design to OAuth data sharing 7 Standardized APIs for privacy and “selective sharing” Outsources protection to a centralized “digital footprint control console” The “user” in User-Managed Access (UMA) Some guy not accounted for in OAuth… Further reading: tinyurl.com/umapbd
  • 8. Emergent UMA properties: flexible, modern, claims-based authorization 8 Source:  XACMLinfo.org,  h;p://xacmlinfo.org/2011/10/30/xacml-­‐reference-­‐architecture/   consumes authz data associated with token native or a client of offboard source(s), in any language(s) claims gathered through user interaction and/or consuming ID tokens UMA and XACML can coexist nicely
  • 9. The RS exposes whatever value-add API it wants, protected by an AS 9 App-specific API UMA-enabled client RPTrequesting party token
  • 10. The AS exposes an UMA- standardized protection API to the RS 10 ProtectionAPI Protectionclient PAT protection API token includes resource registration API and token introspection API
  • 11. The AS exposes an UMA- standardized authorization API to the client 11 Authorization API Authorization client AAT authorization API token supports OpenID Connect-based claims- gathering for authz UMA, SAML, and OpenID Connect can coexist nicely
  • 12. Key use cases •  Managing personal data store access •  E-transcript sharing •  Patient-centric health data access •  …and enterprise access management 2.0 12 Source:  MIT  Consor4um  for  Kerberos  and  Internet  Trust,  h;ps://kit.mit.edu  
  • 13. AM1.0 vs AM2.0 •  Complex and feature-rich •  Usually proprietary •  Mobile/API-unfriendly •  Brittle deployment architecture •  Not agnostic to authn method •  Hard to source distributed policies •  Usually coarse-grained •  RESTful and simpler •  Standard interop baseline •  Mobile/API-friendly •  Just call authz endpoints vs. deploying an agent •  Agnostic to authn method and federation usage •  Flexible in policy expression and sourcing •  Leverages API’s “scope- grained authorization” 13
  • 15. What vendors are saying and doing about UMA 15 Further  reading:   4nyurl.com/uma1iop  
  • 16. NuveAM by Cloud Identity •  UMA-compliant AS: –  Access control to Web data –  API security and management –  Real-time monitoring and audit •  Use cases: Securing Personal Data Services (PDS) and access management 2.0 (API security) •  Uses open standards, including UMA, OAuth 2.0, OpenID Connect, and SAML 2.0 •  Open source frameworks: Java and Python •  Support for mobile (Android) •  Integrates with Identity Management and Identity Federation http://www.cloudidentity.co.uk/products/nuveam 16
  • 17. NuveAM by Cloud Identity 17
  • 18. NuveAM for the enterprises 18 •  Management of resources, APIs, permissions, and access control policies •  Access control on demand •  Detailed audit information •  Application management: resource servers and clients (with NuveLogin) •  Integration with identity management •  Integration with identity federation and SSO
  • 19. NuveAM for the enterprises 19
  • 20. NuveAM for the enterprises 20
  • 22. Next steps for the WG…and you •  Get involved! –  Become an “UMAnitarian” (it’s free) –  Participate in the interop and our implementation discussions –  Follow and engage with @UMAWG on Twitter •  Current work: –  Technical: claim profiling to allow claim-gathering using SAML, OpenID Connect, LDAP… –  Business: Binding Obligations spec to tie “terms of authorization” to multi-party state changes •  Stay tuned for another webinar in Q2 22 Join  at:   4nyurl.com/umawg  
  • 23. Questions? Thank you! @UMAWG #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 23