SlideShare une entreprise Scribd logo
1  sur  61
Télécharger pour lire hors ligne
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
MIT Kerberos & Internet Trust
Consortium
Mission & Vision
June 2013
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Contents
•  Brief History
•  MIT-KIT Mission
•  Emerging Personal Data Ecosystem
•  NSTIC IDESG
•  MIT-KIT Projects
•  Academic Advisory Board
•  2013 Events
•  Membership & Benefits
2
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Brief History
Kerberos: 1987 - today
3
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
A Brief History of Kerberos
•  Kerberos was developed as the Authentication engine for MIT’s Project
Athena in 1987:
–  Became IETF standard in 1993 (RFC1510) – now RFC4120
•  MIT’s release of Kerberos as open source in 1987 led to rapid adoption
by numerous organizations
•  Kerberos now ships standard with all major operating systems
–  Apple, Red Hat, Microsoft, Sun, Ubuntu
•  Serves tens of millions of enterprise users:
–  Microsoft has been using Kerberos as the default authentication package
since Windows 2000
–  Windows Logon used daily by millions of users.
–  Used in DOCSIS CableModems for device authentication.
–  Used for embedded systems security
•  Kerberos has been hugely successful
4
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
MIT Kerberos: Timeline & Milestones
5
MIT Project
Athena Started
1983 1988 1993 1999 2007 2013
Paper on MIT
Kerberos at
USENIX’88
IETF
RFC1510
published
Microsoft
Windows 2000
uses Kerberos
MIT Kerberos
Consortium
Founded
Huge adoption of
Kerberos by
Finance industry,
Defense, Cable,
etc
MIT KIT
expansion
http://web.mit.edu/kerberos/papers.html
2000
CableLabs uses
Kerberos for
Cable Modems
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
MIT Kerberos Consortium: Achievements
•  Provide leadership to the world community in
Kerberos authentication ü
•  Establish Kerberos as a ubiquitous
authentication mechanism ü
•  Make Kerberos appropriate for new
environments ü
•  Enable Kerberos across a plethora of
endpoints ü
•  Help worldwide community of developers
integrate Kerberos ü
6
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
MIT Kerberos in Commercial Products
•  Google
–  Enterprise Search
Appliance (GSA)
•  Cisco:
–  Cisco IOS - Rel. 11.2 +
–  NAC Appliance
–  ASA5000 & VPN3000
series.
•  Intel:
–  VPro II Platforms (AMT)
•  Red Hat:
–  Enterprise Linux & FreeIPA
•  Sun/Oracle:
–  Solaris 8 to 10 and Solaris
Nevada
•  Yahoo
•  Hadoop infra
•  Juniper:
•  Network Admission Control
•  SAP R3
•  NetApp:
•  Kerberized NFS
•  F5 Networks:
–  BIG-IP ADC
•  Other Open Source OS:
–  Ubuntu
–  Debian
7
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Kerberos Projects: Completed & Underway
•  MIT Kerberos code-base
–  Releases 1.7 to 1.11 (2007-2012)
–  Continuous (annual releases)
•  Kerberos for Windows 4.0
–  For Windows-7 (64bit) onwards
–  Rev 4.1 due in Q3/2013
•  Kerberos for Android (KFA):
–  Phase-1 completed (Proof of Concept)
–  Phase-2 (full Java-GSSAPI Bindings)
–  Completed in Dec 2012
•  RxGK for AFS
–  Implement new GSSAPI based rxgk for RX (for AFS)
–  Project commencing in January 2013
–  Status: Seeking sponsors
8
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
MIT-KIT Mission
2013 Mission Expansion
9
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Mission Statement (2013)
“The Mission of the MIT-KIT is to develop
the basic building blocks for the Internet's
emerging personal data ecosystem in
which people, organizations, and
computers can manage access to their
data more efficiently and equitably.”
(New site – under development)
1010
kit.mit.edu
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
MIT-KIT: Purpose of Mission Expansion
•  Provide leadership by addressing broader
areas of Identity, Authorization and Privacy
on the Internet
•  Provide leadership, common ground and
harmonization of current disparate solutions
•  Deliver reference open-source code with high
degree of interoperability
•  Continue the MIT tradition of leadership &
giving back to the world community
•  Dedicate efforts to relevant Standards bodies
11
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Deliverables
•  Components (software)
–  New protocols and architectures
–  Specifications & standards
–  Modular software – open source
•  Community (people)
–  International dev community
–  Bug reporting & patches
–  Interoperability testing
•  Creativity (mind)
–  Ingenuity in solving difficult problems
–  Thought Leadership
12
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Personal Data Ecosystem
The Emerging Ecosystem
13
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Personal Data: The New Oil
•  “Personal data is the new oil of the Internet and the new
currency of the digital world”
–  Meglena Kuneva, European, Consumer Commissioner, March 2009
•  Personal data “will emerge as a new asset class touching all
aspects of society”
•  Fundamental questions about privacy, property, global
governance, human rights – essentially around who should
benefit from the products and services built upon personal
data – are major uncertainties shaping the opportunity.
•  The rapid rate of technological change and commerciali-
zation in using personal data is undermining end user
confidence and trust
14
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Personal Data: Current State
•  The current personal data ecosystem is fragmented
and inefficient:
–  For many participants, the risks and liabilities exceed the
economic returns.
–  Personal privacy concerns are inadequately addressed.
•  Current technologies and laws fall short of providing
the legal and technical infrastructure needed to
support a well-functioning digital economy.
•  Common needs for all users: Reliability,
Predictability, Interoperability, Security, Ease of use,
Cost-effectiveness, Risk and liability reduction,
Transparency, Simplicity
15
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Personal Data: Way Forward
•  Alignment: align key stakeholders (people, private
firms and the public sector) in support of one
another.
•  “Data as Money”: a person’s data would be
equivalent to their “money”:
–  It would reside in an account where it would be controlled,
managed, exchanged and accounted for just like personal
banking services operate today
•  End-user centricity: recognize that end-users are
vital and independent stakeholders in the co-
creation and value exchange of services and
experiences.
16
Source: World Economic Forum, June 2010
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Simplified Ecosystem View
17
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Emerging Ecosystem Participants
•  Identity Providers
–  Social Network players (eg. Google+, FB, Yahoo, etc)
–  NSTIC IDESG participants (numerous)
–  OIX and AXN members (numerous)
•  Attribute Providers
–  Telcos, Banking & Finance
–  Gov orgs, State governments
–  Local Communities
•  OpenPDS Providers -- needed
–  Current offerings often called “personal clouds” - static data stores
•  Cloud and Virtualization vendors & providers
–  Compute infrastructure to host OpenPDSs
18
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
References
•  World Economic Forum: Personal Data: The
Emergence of a New Asset Class, 2011 Report
•  Alex (Sandy) Pentland, Reality Mining of Mobile
Communications: Toward a New Deal on Data, The
Global Information Technology Report 2008-2009,
World Economic Forum.
19
http://hd.media.mit.edu/wef_globalit.pdf
http://www3.weforum.org/docs/
WEF_ITTC_PersonalDataNewAsset_Report_2011.pdf
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
NSTIC IDESG
Brief Summary
20
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
NSTIC IDESG
•  Natl Strategy for Trusted Identities in Cyberspace
–  Identity Ecosystem Steering Group (IDESG)
•  Vision of IDESG:
“Individuals and organizations utilize secure, efficient,
easy-to-use, and interoperable identity solutions to
access online services in a manner that promotes
confidence, privacy, choice, and innovation.”
•  Principles of IDESG: solutions must be
–  Privacy-enhancing and voluntary
–  Secure and resilient
–  Interoperable
–  Cost-effective and easy to use
https://www.idecosystem.org
21
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
MIT-KIT and NSTIC IDESG
•  MIT is a member of NSTIC IDESG
–  Representative: Dazza Greenwood & Thomas Hardjono
•  Trust Frameworks for Personal Data Ecosystem
–  Transparency of personal data (vs. “ownership” of data)
–  Baseline SLAs for Service Providers
–  Digital Contracts-Negotiation protocol
–  Standardized Trust Marks
•  Some examples of marks:
https://www.idecosystem.org
22
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Why IDESG: Evolution of Identity Ecosystem
https://www.idecosystem.org
23
Identity
Provider
Identity
Provider
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Why IDESG: Evolution of Identity Ecosystem
https://www.idecosystem.org
24
Identity
Provider
Identity
Provider
FEDERATION
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Why IDESG: Evolution of Identity Ecosystem
https://www.idecosystem.org
25
Identity
Provider
Identity
Provider
Trust Framework
Provider
TRUST
FRAMEWORKS
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Why IDESG: Evolution of Identity Ecosystem
https://www.idecosystem.org
26
Identity
Provider
Identity
Provider
Trust Framework
Provider
Identity
Provider
Identity
Provider
Trust Framework
Provider
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Why IDESG: Evolution of Identity Ecosystem
https://www.idecosystem.org
27
Identity
Provider
Identity
Provider
Trust Framework
Provider
Identity
Provider
Identity
Provider
Trust Framework
Provider
INTERFEDERATION
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Why IDESG: Evolution of Identity Ecosystem
https://www.idecosystem.org
28
Identity
Provider
Identity
Provider
Trust Framework
Provider
Identity
Provider
Identity
Provider
Trust Framework
Provider
Identity Ecosystem Steering Group
Government
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
MIT-KIT Projects
29
•  MIT OpenPDS umbrella
•  OpenID-Connect
•  User Managed Access
(UMA)
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
OpenPDS: Open Source PDS Components
•  OpenPDS as umbrella for MIT-KIT projects:
–  Open-source personal data service (PDS)
•  Broad definition of OpenPDS:
–  A dynamic personal data system/service that has
compute capability, portable, secure & easy to use.
–  A computation environment (think Virtual Machines)
–  Can be run on user’s computer or be hosted at provider
–  Legally owned by the user
–  Portable: easily moveable from one provider to another
–  Captures and stores user’s dynamically generated data
(e.g. GPS location data, posts on social networks, etc)
–  Automated contract negotiations
30
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
OpenPDS: Components Needed
•  Requires a number of components:
–  Authentication & authorization (and audit)
–  Identity & persona management
–  Secure vault-like data store (local or remote)
–  Rule/Policy engine – can asses external read-requests
from third parties (e.g. data analytics)
–  Key storage and management
–  User data collector – reads from user generated data from
sources on the Internet (e.g. GPS, Twitter, FB, etc)
–  VM and Virtualization – for hosted PDS
–  Others
31
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
OpenPDS in the Cloud
32
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
OpenPDS: Technical Vision
33
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
OpenPDS: Modular Components
34
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
OpenPDS: Components Strategy
•  OpenPDS umbrella provides guidance for selecting
components/projects
•  Different components for different deployments
•  Bare-bones “Chassis & Engine Block” approach:
–  Vendors and users free to choose components
–  Build products around open-source components
35
We develop components You build products/services
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Criteria for Component Selection
•  Supports goal/vision of building PDS
•  Standardized Specifications
–  Component specification already RFC (or near RFC), or
can be contributed to standardization bodies
•  Standalone components useful
–  Components may be used/integrated for other use-cases
•  Open Source
–  Under MIT License or compatible licenses
•  Multiple implementations
–  Development community & Interoperability
36
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Current Projects: MITREid OIDC
•  MITREid-Connect
–  OpenID-Connect (and OAuth2.0) implementation
•  Single-Sign-On (SSO) using OAuth2.0
–  Specifications from OpenID Foundation (OIF)
•  http://openid.net/developers/specs/
–  Source code donated from MITRE Corp.
–  Rev 1.0 released under Apache 2.0 & MIT-License
•  OIDC used by OpenID Exchange (OIX) and AXN:
–  Google, Equifax, PayPal, VeriSign, Ping, NRI, etc
•  http://openidentityexchange.org
–  AXN: Attribute Exchange Network
•  http://openidentityexchange.org/projects/axn-pilots
37
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Current Projects: MITREid OIDC
•  Next rev features (planned):
–  Dynamic Registration
•  http://tools.ietf.org/wg/oauth/draft-ietf-oauth-dyn-reg/
•  In WG Last Call
–  Token Introspection
•  http://tools.ietf.org/id/draft-richer-oauth-introspection/
–  Token Chaining
•  OAuth2.0 Interop at MIT
–  2013: Oct/31 – Nov/1 (week before IETF88)
–  Informal OIDC interop
38
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Seeking Sponsors: UMA Project
•  UMA = User Managed Access
–  Extension or profiling of OpenID-Connect & OAuth2.0
•  UMA is a Working Group in Kantara Initiative
–  http://kantarainitiative.org/confluence/display/uma
–  http://kantarainitiative.org/confluence/display/uma/UMA+1.0+Core
+Protocol
•  Specs contributed to IETF OAuth2.0 WG:
–  http://tools.ietf.org/id/draft-hardjono-oauth-umacore
–  http://tools.ietf.org/id/draft-hardjono-oauth-resource-reg
•  Binding Obligations specification:
–  Identifies legal obligations of players within the protocol flow
–  http://docs.kantarainitiative.org/uma/draft-uma-trust.html
•  Implementations available (incomplete)
–  Gluu, CloudIdentity (UK)
39
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
UMA: User-Centric Resource Sharing
40
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
UMA: Single Point for Managing Access
41
Alice’sresourcesat3ResourceServers
Alice uses the UMA
Authorization Server
to set access-policy
For her resources
Bob uses the Client
to get authorization
from the AS, to access
Alice’s resources
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
UMA Phase-1: Alice registers Resource
42
(1)
(2)
(1) Alice registers her
Resource (e.g. files)
Stored at RS#1 to the
AS & sets access Policy
(2) & (3) The Resource
Server #1 obtains an
OAuth2.0 PAT Token
from the Authorization
Server.
(3)
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
UMA Phase-2: Client gets authorization token
43
(1)
(2)
(1) Clients attempts
access without token
(2) Client redirected to AS.
(3) AS issues AAT token to
Client
(3)
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
UMA Ph-3: Requesting Party gets Authorization
44
(1)(2)
(3)
(4)
(1) & (2) Bob attempts
access without token
(2) Client redirected to AS.
(3) AS issues RPT token to
Bob (the human)
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
UMA: Bob successfully accesses Alice’s files
45
(1)
(2)
(3)
(4)
(1)  & (2) Bob uses Client
to access files, presenting
RPT and AAT token
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
UMA: Relationship with OAuth2.0 & OIDC
46
Source:
Eve Maler & UMA WG
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Future Projects: An Open Invitation
•  We welcome new members to the MIT-KIT:
–  Introduce your ideas & proposals
–  Engage MIT research community
–  Use the MIT-KIT as forum for discussion & development
–  Take leadership of projects
•  Potential new projects:
–  Anonymous credential system
•  Open source U-Prove
–  Anonymous verifiable attributes
–  Homomorphic encryption of data stored in OpenPDS
–  Key management for OpenPDS (eg. KMIP standard)
47
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Events at MIT-KIT 2013
Annual Conference
Kerberos Interop
OAuth2.0 Interop
48
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
2013 MIT-KIT Annual Conference
•  Theme: “Personal Data & the Internet”
•  Co-Sponsor: Prof Sandy Pentland, MIT Media Lab
•  Date: Monday 7 October 2013
•  Venue: MIT Media Lab
•  Free registration
49
kit.mit.edu
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
2013 Kerberos Interop
•  Date: Tue-Wed 8th & 9th October 2013
•  Venue: MIT
50
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
OAuth2.0 Interop
•  Date: last Thursday & Friday in October
–  Oct 31 and Nov 1, 2013
–  This is week prior to IETF88-Vancouver
•  Co-Sponsor: Internet Society (ISOC)
•  Venue: MIT
–  Building W92
•  Basic OAuth2.0 Profile under development
51
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Current MIT-KIT Members
52
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Community Members
•  CMU
•  Centrify Corporation
•  Columbia University
•  Cornell University
•  US DOD
•  Fidelity *
•  Iowa State University
•  MIT *
•  Michigan State niv
•  MITRE
•  Microsoft *
•  Morgan Stanley*
•  NASA
•  Network Appliance *
•  Nippon Telephone and
Telegraph (NTT)*
•  Oracle/Sun *
•  Pennsylvania State Univ.
•  Red Hat *
•  TeamF1, Inc.
•  The University of Alaska
•  The University of Michigan
•  The U. of Pennsylvania
•  Stanford U.
•  (Google)
* = Advisory Board Member 53
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Community Members
54
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
MIT-KC Board Members
Company Name Title/Role
Microsoft Slava Kavsan Chief Architect, Windows
Security & Azure
Oracle Eric Kozlowski Snr. Manager, Solaris Security
NTT Satoru Kanno
(Dr. Masayuki Kanda)
VP, Security and Crypto, NTT
Software
NetApp Satyajit Deshmukh Snr. Manager
Fidelity Rajan Kulkarni SVP, Advanced Products &
Services
Red Hat Dmitri Pal Snr Manager, Enterprise Linux
Security
MIT Mark Silis Director of Network
Infrastructure
Morgan Stanley Ish Ahluwalia Director of Infra Security
55
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Academic Advisory Board (New)
Organization Name Title/Role
MIT Media Lab Prof. Sandy Pentland Toshiba Professor of Media &
Society
Brown University Prof. Anna Lysyanskaya Professor of Computer Science
RSA Inc Dr. Ari Juels Chief Scientist
MITRE Dr. Joshua Guttman Lead Scientist
MIT CSAIL Dr. Nickolai Zeldovich Assoc. Professor
56
*Prof. Ron Rivest, CSAIL, MIT
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Membership & Benefits
57
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Board Membership Benefits
•  Easy access to experts
–  Core team, consultants and developers worldwide
•  Special Projects
–  Fast-track special requests
–  Integrate into multi-year code releases
•  Features Request
–  Priority for new features for next release
•  Guidance in Deployment, integration & upgrades
–  Technical review of plans
–  F2F meetings
•  Influence on project evolution
•  Full view into development roadmap
58
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Fee Structure: Summary
•  Advisory Board Member:
–  $50K annually for 3 years
–  Co-designed, sponsor-focused special project
–  Voting seat on Advisory Board
–  Full view into roadmap
•  Patron Sponsor:
–  $25K annually for 3 years
–  Complimentary participation in workshops and
interoperability testing events.
•  Academic membership:
–  $8K to $10K annually for 3 years
59
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
Contact Information
The MIT Kerberos & Internet Trust (KIT)
Consortium
77 Massachusetts Avenue
W92-152
Cambridge, MA 02139 USA
kit.mit.edu
Thomas Hardjono, PhD.
Technical Lead & Executive Director
Email: hardjono@mit.edu
Mobile: +1 781 729 9559
Twitter: @FindThomas
Web: kit.mit.edu
60
© 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved.
kit.mit.edu
BACKUP SLIDES
61

Contenu connexe

Tendances

Future Internet: The European Initiative
Future Internet: The European InitiativeFuture Internet: The European Initiative
Future Internet: The European InitiativeSemantic Web Company
 
12 Myths about Blockchain Technology
12 Myths about Blockchain Technology12 Myths about Blockchain Technology
12 Myths about Blockchain TechnologyAhmed Banafa
 
Anil saldhana identitycloud
Anil saldhana identitycloudAnil saldhana identitycloud
Anil saldhana identitycloudAnil Saldanha
 
BLOCKCHAIN TECHNOLOGY IN AGRICULTURE: A CASE STUDY OF BLOCKCHAIN START-UP...
BLOCKCHAIN TECHNOLOGY IN   AGRICULTURE: A CASE STUDY OF   BLOCKCHAIN START-UP...BLOCKCHAIN TECHNOLOGY IN   AGRICULTURE: A CASE STUDY OF   BLOCKCHAIN START-UP...
BLOCKCHAIN TECHNOLOGY IN AGRICULTURE: A CASE STUDY OF BLOCKCHAIN START-UP...AIRCC Publishing Corporation
 
Social Coin: Blockchain-mediated incentivization of citizens for sustainable ...
Social Coin: Blockchain-mediated incentivization of citizens for sustainable ...Social Coin: Blockchain-mediated incentivization of citizens for sustainable ...
Social Coin: Blockchain-mediated incentivization of citizens for sustainable ...Diego López-de-Ipiña González-de-Artaza
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtInfosecurity2010
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Cloud Security Alliance Lviv Chapter
 
Cloud computing..
Cloud computing..Cloud computing..
Cloud computing..manoj kumar
 
Healthcare Blockchain Technology Landscape
Healthcare Blockchain Technology LandscapeHealthcare Blockchain Technology Landscape
Healthcare Blockchain Technology LandscapeCyrus Maaghul
 
Global Digital Sukuk (GDS) - A basic framework
Global Digital Sukuk (GDS) - A basic frameworkGlobal Digital Sukuk (GDS) - A basic framework
Global Digital Sukuk (GDS) - A basic frameworkTariqullah Khan
 
DHPA Techday 2015 - Marc Gauw - Trusted Networks Initiative
DHPA Techday 2015 - Marc Gauw - Trusted Networks InitiativeDHPA Techday 2015 - Marc Gauw - Trusted Networks Initiative
DHPA Techday 2015 - Marc Gauw - Trusted Networks InitiativeSplend
 
Cloud computing: Legal and ethical issues in library and information services
Cloud computing: Legal and ethical issues in library and information servicesCloud computing: Legal and ethical issues in library and information services
Cloud computing: Legal and ethical issues in library and information servicese-Marefa
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Cathy Dwyer
 
BlockchainHub Graz Meetup #25 - ELASTOS - Semir Ramovic
BlockchainHub Graz Meetup #25 - ELASTOS - Semir RamovicBlockchainHub Graz Meetup #25 - ELASTOS - Semir Ramovic
BlockchainHub Graz Meetup #25 - ELASTOS - Semir RamovicBlockchainHub Graz
 
Banji Adenusi - big data prezzie - InfoSci
Banji Adenusi - big data prezzie - InfoSciBanji Adenusi - big data prezzie - InfoSci
Banji Adenusi - big data prezzie - InfoSciBanji Adenusi
 
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...Infosecurity2010
 
Future (ICT) Technologies
Future (ICT) TechnologiesFuture (ICT) Technologies
Future (ICT) TechnologiesLeo Gaggl
 

Tendances (19)

Keith prabhu cloud security-public
Keith prabhu cloud security-publicKeith prabhu cloud security-public
Keith prabhu cloud security-public
 
Future Internet: The European Initiative
Future Internet: The European InitiativeFuture Internet: The European Initiative
Future Internet: The European Initiative
 
12 Myths about Blockchain Technology
12 Myths about Blockchain Technology12 Myths about Blockchain Technology
12 Myths about Blockchain Technology
 
Anil saldhana identitycloud
Anil saldhana identitycloudAnil saldhana identitycloud
Anil saldhana identitycloud
 
BLOCKCHAIN TECHNOLOGY IN AGRICULTURE: A CASE STUDY OF BLOCKCHAIN START-UP...
BLOCKCHAIN TECHNOLOGY IN   AGRICULTURE: A CASE STUDY OF   BLOCKCHAIN START-UP...BLOCKCHAIN TECHNOLOGY IN   AGRICULTURE: A CASE STUDY OF   BLOCKCHAIN START-UP...
BLOCKCHAIN TECHNOLOGY IN AGRICULTURE: A CASE STUDY OF BLOCKCHAIN START-UP...
 
Social Coin: Blockchain-mediated incentivization of citizens for sustainable ...
Social Coin: Blockchain-mediated incentivization of citizens for sustainable ...Social Coin: Blockchain-mediated incentivization of citizens for sustainable ...
Social Coin: Blockchain-mediated incentivization of citizens for sustainable ...
 
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs UtrechtAndrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
 
Cloud computing..
Cloud computing..Cloud computing..
Cloud computing..
 
Healthcare Blockchain Technology Landscape
Healthcare Blockchain Technology LandscapeHealthcare Blockchain Technology Landscape
Healthcare Blockchain Technology Landscape
 
Global Digital Sukuk (GDS) - A basic framework
Global Digital Sukuk (GDS) - A basic frameworkGlobal Digital Sukuk (GDS) - A basic framework
Global Digital Sukuk (GDS) - A basic framework
 
DHPA Techday 2015 - Marc Gauw - Trusted Networks Initiative
DHPA Techday 2015 - Marc Gauw - Trusted Networks InitiativeDHPA Techday 2015 - Marc Gauw - Trusted Networks Initiative
DHPA Techday 2015 - Marc Gauw - Trusted Networks Initiative
 
Cloud computing: Legal and ethical issues in library and information services
Cloud computing: Legal and ethical issues in library and information servicesCloud computing: Legal and ethical issues in library and information services
Cloud computing: Legal and ethical issues in library and information services
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"
 
BlockchainHub Graz Meetup #25 - ELASTOS - Semir Ramovic
BlockchainHub Graz Meetup #25 - ELASTOS - Semir RamovicBlockchainHub Graz Meetup #25 - ELASTOS - Semir Ramovic
BlockchainHub Graz Meetup #25 - ELASTOS - Semir Ramovic
 
Banji Adenusi - big data prezzie - InfoSci
Banji Adenusi - big data prezzie - InfoSciBanji Adenusi - big data prezzie - InfoSci
Banji Adenusi - big data prezzie - InfoSci
 
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
 
Future (ICT) Technologies
Future (ICT) TechnologiesFuture (ICT) Technologies
Future (ICT) Technologies
 
Presentation1
Presentation1Presentation1
Presentation1
 

Similaire à MIT-KIT Intro at #idcon sattelite

The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next? PayamBarnaghi
 
Dynamic Data Analytics for the Internet of Things: Challenges and Opportunities
Dynamic Data Analytics for the Internet of Things: Challenges and OpportunitiesDynamic Data Analytics for the Internet of Things: Challenges and Opportunities
Dynamic Data Analytics for the Internet of Things: Challenges and OpportunitiesPayamBarnaghi
 
Overview of XSEDE Systems Engineering
Overview of XSEDE Systems EngineeringOverview of XSEDE Systems Engineering
Overview of XSEDE Systems EngineeringJohn Towns
 
Next Generation Internet
Next Generation InternetNext Generation Internet
Next Generation InternetSabiha M
 
Federating Infrastructure as a Service cloud computing systems to create a un...
Federating Infrastructure as a Service cloud computing systems to create a un...Federating Infrastructure as a Service cloud computing systems to create a un...
Federating Infrastructure as a Service cloud computing systems to create a un...David Wallom
 
IoT Challenges: Technological, Business and Social aspects
IoT Challenges: Technological, Business and Social aspectsIoT Challenges: Technological, Business and Social aspects
IoT Challenges: Technological, Business and Social aspectsRoberto Minerva
 
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)Denny Muktar
 
IoTMeetupGuildford#12: Tirath Bansal - Independent Private Collaboration - myOrb
IoTMeetupGuildford#12: Tirath Bansal - Independent Private Collaboration - myOrbIoTMeetupGuildford#12: Tirath Bansal - Independent Private Collaboration - myOrb
IoTMeetupGuildford#12: Tirath Bansal - Independent Private Collaboration - myOrbMicheleNati
 
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...InnoTech
 
Unlocking Smart Building Potential with the RealEstateCore Ontology
Unlocking Smart Building Potential with the RealEstateCore OntologyUnlocking Smart Building Potential with the RealEstateCore Ontology
Unlocking Smart Building Potential with the RealEstateCore OntologyMemoori
 
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New...
 The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New... The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New...
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New...InnoTech
 
Modern Data Management for Federal Modernization
Modern Data Management for Federal ModernizationModern Data Management for Federal Modernization
Modern Data Management for Federal ModernizationDenodo
 

Similaire à MIT-KIT Intro at #idcon sattelite (20)

The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
 
Emerging Applications of Blockchain for Supply Chains
Emerging Applications of Blockchain for Supply ChainsEmerging Applications of Blockchain for Supply Chains
Emerging Applications of Blockchain for Supply Chains
 
Grid computing
Grid computingGrid computing
Grid computing
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
 
Dynamic Data Analytics for the Internet of Things: Challenges and Opportunities
Dynamic Data Analytics for the Internet of Things: Challenges and OpportunitiesDynamic Data Analytics for the Internet of Things: Challenges and Opportunities
Dynamic Data Analytics for the Internet of Things: Challenges and Opportunities
 
Columbia citi economics of net 060515 final
Columbia citi economics of net 060515 finalColumbia citi economics of net 060515 final
Columbia citi economics of net 060515 final
 
Columbia CITI Econonomics of Net 060515 final
Columbia CITI Econonomics of Net 060515 finalColumbia CITI Econonomics of Net 060515 final
Columbia CITI Econonomics of Net 060515 final
 
Digital transformation and AI @Edge
Digital transformation and AI @EdgeDigital transformation and AI @Edge
Digital transformation and AI @Edge
 
Overview of XSEDE Systems Engineering
Overview of XSEDE Systems EngineeringOverview of XSEDE Systems Engineering
Overview of XSEDE Systems Engineering
 
Next Generation Internet
Next Generation InternetNext Generation Internet
Next Generation Internet
 
Federating Infrastructure as a Service cloud computing systems to create a un...
Federating Infrastructure as a Service cloud computing systems to create a un...Federating Infrastructure as a Service cloud computing systems to create a un...
Federating Infrastructure as a Service cloud computing systems to create a un...
 
IoT Challenges: Technological, Business and Social aspects
IoT Challenges: Technological, Business and Social aspectsIoT Challenges: Technological, Business and Social aspects
IoT Challenges: Technological, Business and Social aspects
 
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
IBM Private Cloud Platform - Setting Foundation for Hybrid (JUKE, 2015)
 
Sgci esip-7-20-18
Sgci esip-7-20-18Sgci esip-7-20-18
Sgci esip-7-20-18
 
IoTMeetupGuildford#12: Tirath Bansal - Independent Private Collaboration - myOrb
IoTMeetupGuildford#12: Tirath Bansal - Independent Private Collaboration - myOrbIoTMeetupGuildford#12: Tirath Bansal - Independent Private Collaboration - myOrb
IoTMeetupGuildford#12: Tirath Bansal - Independent Private Collaboration - myOrb
 
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New ...
 
Internet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for futureInternet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for future
 
Unlocking Smart Building Potential with the RealEstateCore Ontology
Unlocking Smart Building Potential with the RealEstateCore OntologyUnlocking Smart Building Potential with the RealEstateCore Ontology
Unlocking Smart Building Potential with the RealEstateCore Ontology
 
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New...
 The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New... The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New...
The Future Paradigm Shifts of the Cloud and Big Data: Security Impacts & New...
 
Modern Data Management for Federal Modernization
Modern Data Management for Federal ModernizationModern Data Management for Federal Modernization
Modern Data Management for Federal Modernization
 

Plus de Nov Matake

#idcon vol.29 - #fidcon WebAuthn, Next Stage
#idcon vol.29 - #fidcon WebAuthn, Next Stage#idcon vol.29 - #fidcon WebAuthn, Next Stage
#idcon vol.29 - #fidcon WebAuthn, Next StageNov Matake
 
FedCM - OpenID TechNight vol.19
FedCM - OpenID TechNight vol.19FedCM - OpenID TechNight vol.19
FedCM - OpenID TechNight vol.19Nov Matake
 
Safari (ITP) & Chrome (SameSite=Lax as default) が Federation に与える影響 - OpenID ...
Safari (ITP) & Chrome (SameSite=Lax as default) が Federation に与える影響 - OpenID ...Safari (ITP) & Chrome (SameSite=Lax as default) が Federation に与える影響 - OpenID ...
Safari (ITP) & Chrome (SameSite=Lax as default) が Federation に与える影響 - OpenID ...Nov Matake
 
Sign in with Apple
Sign in with Apple Sign in with Apple
Sign in with Apple Nov Matake
 
FIDO @ LINE - #idcon vol.24
FIDO @ LINE - #idcon vol.24FIDO @ LINE - #idcon vol.24
FIDO @ LINE - #idcon vol.24Nov Matake
 
W3C Web Authentication - #idcon vol.24
W3C Web Authentication - #idcon vol.24W3C Web Authentication - #idcon vol.24
W3C Web Authentication - #idcon vol.24Nov Matake
 
NIST SP 800-63C - Federation and Assertions (FINAL)
NIST SP 800-63C - Federation and Assertions (FINAL)NIST SP 800-63C - Federation and Assertions (FINAL)
NIST SP 800-63C - Federation and Assertions (FINAL)Nov Matake
 
OPTiM StoreにおけるSCIM & OIDC活用事例 - ID&IT 2016
OPTiM StoreにおけるSCIM & OIDC活用事例 - ID&IT 2016OPTiM StoreにおけるSCIM & OIDC活用事例 - ID&IT 2016
OPTiM StoreにおけるSCIM & OIDC活用事例 - ID&IT 2016Nov Matake
 
NIST SP 800-63C #idcon vol.22
NIST SP 800-63C #idcon vol.22NIST SP 800-63C #idcon vol.22
NIST SP 800-63C #idcon vol.22Nov Matake
 
NIST SP 800-63-3 #idcon vol.22
NIST SP 800-63-3 #idcon vol.22NIST SP 800-63-3 #idcon vol.22
NIST SP 800-63-3 #idcon vol.22Nov Matake
 
ID連携入門 (実習編) - Security Camp 2016
ID連携入門 (実習編) - Security Camp 2016ID連携入門 (実習編) - Security Camp 2016
ID連携入門 (実習編) - Security Camp 2016Nov Matake
 
ID連携概要 - OpenID TechNight vol.13
ID連携概要 - OpenID TechNight vol.13ID連携概要 - OpenID TechNight vol.13
ID連携概要 - OpenID TechNight vol.13Nov Matake
 
ミスコンとプライバシー ~ IdentityDuck誕生秘話 ~ #idcon
ミスコンとプライバシー ~ IdentityDuck誕生秘話 ~ #idconミスコンとプライバシー ~ IdentityDuck誕生秘話 ~ #idcon
ミスコンとプライバシー ~ IdentityDuck誕生秘話 ~ #idconNov Matake
 
SAML / OpenID Connect / OAuth / SCIM 技術解説 - ID&IT 2014 #idit2014
SAML / OpenID Connect / OAuth / SCIM 技術解説  - ID&IT 2014 #idit2014SAML / OpenID Connect / OAuth / SCIM 技術解説  - ID&IT 2014 #idit2014
SAML / OpenID Connect / OAuth / SCIM 技術解説 - ID&IT 2014 #idit2014Nov Matake
 
FIDO alliance #idcon vol.18
FIDO alliance #idcon vol.18FIDO alliance #idcon vol.18
FIDO alliance #idcon vol.18Nov Matake
 
OpenID Connect 101 @ OpenID TechNight vol.11
OpenID Connect 101 @ OpenID TechNight vol.11OpenID Connect 101 @ OpenID TechNight vol.11
OpenID Connect 101 @ OpenID TechNight vol.11Nov Matake
 
池澤あやかと学ぼう!: はじめてのOAuthとOpenID Connect - JICS 2014
池澤あやかと学ぼう!: はじめてのOAuthとOpenID Connect - JICS 2014池澤あやかと学ぼう!: はじめてのOAuthとOpenID Connect - JICS 2014
池澤あやかと学ぼう!: はじめてのOAuthとOpenID Connect - JICS 2014Nov Matake
 
OAuth認証再考からのOpenID Connect #devlove
OAuth認証再考からのOpenID Connect #devloveOAuth認証再考からのOpenID Connect #devlove
OAuth認証再考からのOpenID Connect #devloveNov Matake
 
ID & IT 2013 - OpenID Connect Hands-on
ID & IT 2013 - OpenID Connect Hands-onID & IT 2013 - OpenID Connect Hands-on
ID & IT 2013 - OpenID Connect Hands-onNov Matake
 
JWT Translation #technight
JWT Translation #technightJWT Translation #technight
JWT Translation #technightNov Matake
 

Plus de Nov Matake (20)

#idcon vol.29 - #fidcon WebAuthn, Next Stage
#idcon vol.29 - #fidcon WebAuthn, Next Stage#idcon vol.29 - #fidcon WebAuthn, Next Stage
#idcon vol.29 - #fidcon WebAuthn, Next Stage
 
FedCM - OpenID TechNight vol.19
FedCM - OpenID TechNight vol.19FedCM - OpenID TechNight vol.19
FedCM - OpenID TechNight vol.19
 
Safari (ITP) & Chrome (SameSite=Lax as default) が Federation に与える影響 - OpenID ...
Safari (ITP) & Chrome (SameSite=Lax as default) が Federation に与える影響 - OpenID ...Safari (ITP) & Chrome (SameSite=Lax as default) が Federation に与える影響 - OpenID ...
Safari (ITP) & Chrome (SameSite=Lax as default) が Federation に与える影響 - OpenID ...
 
Sign in with Apple
Sign in with Apple Sign in with Apple
Sign in with Apple
 
FIDO @ LINE - #idcon vol.24
FIDO @ LINE - #idcon vol.24FIDO @ LINE - #idcon vol.24
FIDO @ LINE - #idcon vol.24
 
W3C Web Authentication - #idcon vol.24
W3C Web Authentication - #idcon vol.24W3C Web Authentication - #idcon vol.24
W3C Web Authentication - #idcon vol.24
 
NIST SP 800-63C - Federation and Assertions (FINAL)
NIST SP 800-63C - Federation and Assertions (FINAL)NIST SP 800-63C - Federation and Assertions (FINAL)
NIST SP 800-63C - Federation and Assertions (FINAL)
 
OPTiM StoreにおけるSCIM & OIDC活用事例 - ID&IT 2016
OPTiM StoreにおけるSCIM & OIDC活用事例 - ID&IT 2016OPTiM StoreにおけるSCIM & OIDC活用事例 - ID&IT 2016
OPTiM StoreにおけるSCIM & OIDC活用事例 - ID&IT 2016
 
NIST SP 800-63C #idcon vol.22
NIST SP 800-63C #idcon vol.22NIST SP 800-63C #idcon vol.22
NIST SP 800-63C #idcon vol.22
 
NIST SP 800-63-3 #idcon vol.22
NIST SP 800-63-3 #idcon vol.22NIST SP 800-63-3 #idcon vol.22
NIST SP 800-63-3 #idcon vol.22
 
ID連携入門 (実習編) - Security Camp 2016
ID連携入門 (実習編) - Security Camp 2016ID連携入門 (実習編) - Security Camp 2016
ID連携入門 (実習編) - Security Camp 2016
 
ID連携概要 - OpenID TechNight vol.13
ID連携概要 - OpenID TechNight vol.13ID連携概要 - OpenID TechNight vol.13
ID連携概要 - OpenID TechNight vol.13
 
ミスコンとプライバシー ~ IdentityDuck誕生秘話 ~ #idcon
ミスコンとプライバシー ~ IdentityDuck誕生秘話 ~ #idconミスコンとプライバシー ~ IdentityDuck誕生秘話 ~ #idcon
ミスコンとプライバシー ~ IdentityDuck誕生秘話 ~ #idcon
 
SAML / OpenID Connect / OAuth / SCIM 技術解説 - ID&IT 2014 #idit2014
SAML / OpenID Connect / OAuth / SCIM 技術解説  - ID&IT 2014 #idit2014SAML / OpenID Connect / OAuth / SCIM 技術解説  - ID&IT 2014 #idit2014
SAML / OpenID Connect / OAuth / SCIM 技術解説 - ID&IT 2014 #idit2014
 
FIDO alliance #idcon vol.18
FIDO alliance #idcon vol.18FIDO alliance #idcon vol.18
FIDO alliance #idcon vol.18
 
OpenID Connect 101 @ OpenID TechNight vol.11
OpenID Connect 101 @ OpenID TechNight vol.11OpenID Connect 101 @ OpenID TechNight vol.11
OpenID Connect 101 @ OpenID TechNight vol.11
 
池澤あやかと学ぼう!: はじめてのOAuthとOpenID Connect - JICS 2014
池澤あやかと学ぼう!: はじめてのOAuthとOpenID Connect - JICS 2014池澤あやかと学ぼう!: はじめてのOAuthとOpenID Connect - JICS 2014
池澤あやかと学ぼう!: はじめてのOAuthとOpenID Connect - JICS 2014
 
OAuth認証再考からのOpenID Connect #devlove
OAuth認証再考からのOpenID Connect #devloveOAuth認証再考からのOpenID Connect #devlove
OAuth認証再考からのOpenID Connect #devlove
 
ID & IT 2013 - OpenID Connect Hands-on
ID & IT 2013 - OpenID Connect Hands-onID & IT 2013 - OpenID Connect Hands-on
ID & IT 2013 - OpenID Connect Hands-on
 
JWT Translation #technight
JWT Translation #technightJWT Translation #technight
JWT Translation #technight
 

Dernier

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

MIT-KIT Intro at #idcon sattelite

  • 1. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu MIT Kerberos & Internet Trust Consortium Mission & Vision June 2013
  • 2. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Contents •  Brief History •  MIT-KIT Mission •  Emerging Personal Data Ecosystem •  NSTIC IDESG •  MIT-KIT Projects •  Academic Advisory Board •  2013 Events •  Membership & Benefits 2
  • 3. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Brief History Kerberos: 1987 - today 3
  • 4. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu A Brief History of Kerberos •  Kerberos was developed as the Authentication engine for MIT’s Project Athena in 1987: –  Became IETF standard in 1993 (RFC1510) – now RFC4120 •  MIT’s release of Kerberos as open source in 1987 led to rapid adoption by numerous organizations •  Kerberos now ships standard with all major operating systems –  Apple, Red Hat, Microsoft, Sun, Ubuntu •  Serves tens of millions of enterprise users: –  Microsoft has been using Kerberos as the default authentication package since Windows 2000 –  Windows Logon used daily by millions of users. –  Used in DOCSIS CableModems for device authentication. –  Used for embedded systems security •  Kerberos has been hugely successful 4
  • 5. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu MIT Kerberos: Timeline & Milestones 5 MIT Project Athena Started 1983 1988 1993 1999 2007 2013 Paper on MIT Kerberos at USENIX’88 IETF RFC1510 published Microsoft Windows 2000 uses Kerberos MIT Kerberos Consortium Founded Huge adoption of Kerberos by Finance industry, Defense, Cable, etc MIT KIT expansion http://web.mit.edu/kerberos/papers.html 2000 CableLabs uses Kerberos for Cable Modems
  • 6. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu MIT Kerberos Consortium: Achievements •  Provide leadership to the world community in Kerberos authentication ü •  Establish Kerberos as a ubiquitous authentication mechanism ü •  Make Kerberos appropriate for new environments ü •  Enable Kerberos across a plethora of endpoints ü •  Help worldwide community of developers integrate Kerberos ü 6
  • 7. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu MIT Kerberos in Commercial Products •  Google –  Enterprise Search Appliance (GSA) •  Cisco: –  Cisco IOS - Rel. 11.2 + –  NAC Appliance –  ASA5000 & VPN3000 series. •  Intel: –  VPro II Platforms (AMT) •  Red Hat: –  Enterprise Linux & FreeIPA •  Sun/Oracle: –  Solaris 8 to 10 and Solaris Nevada •  Yahoo •  Hadoop infra •  Juniper: •  Network Admission Control •  SAP R3 •  NetApp: •  Kerberized NFS •  F5 Networks: –  BIG-IP ADC •  Other Open Source OS: –  Ubuntu –  Debian 7
  • 8. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Kerberos Projects: Completed & Underway •  MIT Kerberos code-base –  Releases 1.7 to 1.11 (2007-2012) –  Continuous (annual releases) •  Kerberos for Windows 4.0 –  For Windows-7 (64bit) onwards –  Rev 4.1 due in Q3/2013 •  Kerberos for Android (KFA): –  Phase-1 completed (Proof of Concept) –  Phase-2 (full Java-GSSAPI Bindings) –  Completed in Dec 2012 •  RxGK for AFS –  Implement new GSSAPI based rxgk for RX (for AFS) –  Project commencing in January 2013 –  Status: Seeking sponsors 8
  • 9. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu MIT-KIT Mission 2013 Mission Expansion 9
  • 10. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Mission Statement (2013) “The Mission of the MIT-KIT is to develop the basic building blocks for the Internet's emerging personal data ecosystem in which people, organizations, and computers can manage access to their data more efficiently and equitably.” (New site – under development) 1010 kit.mit.edu
  • 11. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu MIT-KIT: Purpose of Mission Expansion •  Provide leadership by addressing broader areas of Identity, Authorization and Privacy on the Internet •  Provide leadership, common ground and harmonization of current disparate solutions •  Deliver reference open-source code with high degree of interoperability •  Continue the MIT tradition of leadership & giving back to the world community •  Dedicate efforts to relevant Standards bodies 11
  • 12. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Deliverables •  Components (software) –  New protocols and architectures –  Specifications & standards –  Modular software – open source •  Community (people) –  International dev community –  Bug reporting & patches –  Interoperability testing •  Creativity (mind) –  Ingenuity in solving difficult problems –  Thought Leadership 12
  • 13. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Personal Data Ecosystem The Emerging Ecosystem 13
  • 14. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Personal Data: The New Oil •  “Personal data is the new oil of the Internet and the new currency of the digital world” –  Meglena Kuneva, European, Consumer Commissioner, March 2009 •  Personal data “will emerge as a new asset class touching all aspects of society” •  Fundamental questions about privacy, property, global governance, human rights – essentially around who should benefit from the products and services built upon personal data – are major uncertainties shaping the opportunity. •  The rapid rate of technological change and commerciali- zation in using personal data is undermining end user confidence and trust 14
  • 15. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Personal Data: Current State •  The current personal data ecosystem is fragmented and inefficient: –  For many participants, the risks and liabilities exceed the economic returns. –  Personal privacy concerns are inadequately addressed. •  Current technologies and laws fall short of providing the legal and technical infrastructure needed to support a well-functioning digital economy. •  Common needs for all users: Reliability, Predictability, Interoperability, Security, Ease of use, Cost-effectiveness, Risk and liability reduction, Transparency, Simplicity 15
  • 16. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Personal Data: Way Forward •  Alignment: align key stakeholders (people, private firms and the public sector) in support of one another. •  “Data as Money”: a person’s data would be equivalent to their “money”: –  It would reside in an account where it would be controlled, managed, exchanged and accounted for just like personal banking services operate today •  End-user centricity: recognize that end-users are vital and independent stakeholders in the co- creation and value exchange of services and experiences. 16 Source: World Economic Forum, June 2010
  • 17. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Simplified Ecosystem View 17
  • 18. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Emerging Ecosystem Participants •  Identity Providers –  Social Network players (eg. Google+, FB, Yahoo, etc) –  NSTIC IDESG participants (numerous) –  OIX and AXN members (numerous) •  Attribute Providers –  Telcos, Banking & Finance –  Gov orgs, State governments –  Local Communities •  OpenPDS Providers -- needed –  Current offerings often called “personal clouds” - static data stores •  Cloud and Virtualization vendors & providers –  Compute infrastructure to host OpenPDSs 18
  • 19. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu References •  World Economic Forum: Personal Data: The Emergence of a New Asset Class, 2011 Report •  Alex (Sandy) Pentland, Reality Mining of Mobile Communications: Toward a New Deal on Data, The Global Information Technology Report 2008-2009, World Economic Forum. 19 http://hd.media.mit.edu/wef_globalit.pdf http://www3.weforum.org/docs/ WEF_ITTC_PersonalDataNewAsset_Report_2011.pdf
  • 20. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu NSTIC IDESG Brief Summary 20
  • 21. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu NSTIC IDESG •  Natl Strategy for Trusted Identities in Cyberspace –  Identity Ecosystem Steering Group (IDESG) •  Vision of IDESG: “Individuals and organizations utilize secure, efficient, easy-to-use, and interoperable identity solutions to access online services in a manner that promotes confidence, privacy, choice, and innovation.” •  Principles of IDESG: solutions must be –  Privacy-enhancing and voluntary –  Secure and resilient –  Interoperable –  Cost-effective and easy to use https://www.idecosystem.org 21
  • 22. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu MIT-KIT and NSTIC IDESG •  MIT is a member of NSTIC IDESG –  Representative: Dazza Greenwood & Thomas Hardjono •  Trust Frameworks for Personal Data Ecosystem –  Transparency of personal data (vs. “ownership” of data) –  Baseline SLAs for Service Providers –  Digital Contracts-Negotiation protocol –  Standardized Trust Marks •  Some examples of marks: https://www.idecosystem.org 22
  • 23. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Why IDESG: Evolution of Identity Ecosystem https://www.idecosystem.org 23 Identity Provider Identity Provider
  • 24. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Why IDESG: Evolution of Identity Ecosystem https://www.idecosystem.org 24 Identity Provider Identity Provider FEDERATION
  • 25. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Why IDESG: Evolution of Identity Ecosystem https://www.idecosystem.org 25 Identity Provider Identity Provider Trust Framework Provider TRUST FRAMEWORKS
  • 26. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Why IDESG: Evolution of Identity Ecosystem https://www.idecosystem.org 26 Identity Provider Identity Provider Trust Framework Provider Identity Provider Identity Provider Trust Framework Provider
  • 27. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Why IDESG: Evolution of Identity Ecosystem https://www.idecosystem.org 27 Identity Provider Identity Provider Trust Framework Provider Identity Provider Identity Provider Trust Framework Provider INTERFEDERATION
  • 28. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Why IDESG: Evolution of Identity Ecosystem https://www.idecosystem.org 28 Identity Provider Identity Provider Trust Framework Provider Identity Provider Identity Provider Trust Framework Provider Identity Ecosystem Steering Group Government
  • 29. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu MIT-KIT Projects 29 •  MIT OpenPDS umbrella •  OpenID-Connect •  User Managed Access (UMA)
  • 30. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu OpenPDS: Open Source PDS Components •  OpenPDS as umbrella for MIT-KIT projects: –  Open-source personal data service (PDS) •  Broad definition of OpenPDS: –  A dynamic personal data system/service that has compute capability, portable, secure & easy to use. –  A computation environment (think Virtual Machines) –  Can be run on user’s computer or be hosted at provider –  Legally owned by the user –  Portable: easily moveable from one provider to another –  Captures and stores user’s dynamically generated data (e.g. GPS location data, posts on social networks, etc) –  Automated contract negotiations 30
  • 31. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu OpenPDS: Components Needed •  Requires a number of components: –  Authentication & authorization (and audit) –  Identity & persona management –  Secure vault-like data store (local or remote) –  Rule/Policy engine – can asses external read-requests from third parties (e.g. data analytics) –  Key storage and management –  User data collector – reads from user generated data from sources on the Internet (e.g. GPS, Twitter, FB, etc) –  VM and Virtualization – for hosted PDS –  Others 31
  • 32. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu OpenPDS in the Cloud 32
  • 33. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu OpenPDS: Technical Vision 33
  • 34. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu OpenPDS: Modular Components 34
  • 35. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu OpenPDS: Components Strategy •  OpenPDS umbrella provides guidance for selecting components/projects •  Different components for different deployments •  Bare-bones “Chassis & Engine Block” approach: –  Vendors and users free to choose components –  Build products around open-source components 35 We develop components You build products/services
  • 36. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Criteria for Component Selection •  Supports goal/vision of building PDS •  Standardized Specifications –  Component specification already RFC (or near RFC), or can be contributed to standardization bodies •  Standalone components useful –  Components may be used/integrated for other use-cases •  Open Source –  Under MIT License or compatible licenses •  Multiple implementations –  Development community & Interoperability 36
  • 37. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Current Projects: MITREid OIDC •  MITREid-Connect –  OpenID-Connect (and OAuth2.0) implementation •  Single-Sign-On (SSO) using OAuth2.0 –  Specifications from OpenID Foundation (OIF) •  http://openid.net/developers/specs/ –  Source code donated from MITRE Corp. –  Rev 1.0 released under Apache 2.0 & MIT-License •  OIDC used by OpenID Exchange (OIX) and AXN: –  Google, Equifax, PayPal, VeriSign, Ping, NRI, etc •  http://openidentityexchange.org –  AXN: Attribute Exchange Network •  http://openidentityexchange.org/projects/axn-pilots 37
  • 38. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Current Projects: MITREid OIDC •  Next rev features (planned): –  Dynamic Registration •  http://tools.ietf.org/wg/oauth/draft-ietf-oauth-dyn-reg/ •  In WG Last Call –  Token Introspection •  http://tools.ietf.org/id/draft-richer-oauth-introspection/ –  Token Chaining •  OAuth2.0 Interop at MIT –  2013: Oct/31 – Nov/1 (week before IETF88) –  Informal OIDC interop 38
  • 39. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Seeking Sponsors: UMA Project •  UMA = User Managed Access –  Extension or profiling of OpenID-Connect & OAuth2.0 •  UMA is a Working Group in Kantara Initiative –  http://kantarainitiative.org/confluence/display/uma –  http://kantarainitiative.org/confluence/display/uma/UMA+1.0+Core +Protocol •  Specs contributed to IETF OAuth2.0 WG: –  http://tools.ietf.org/id/draft-hardjono-oauth-umacore –  http://tools.ietf.org/id/draft-hardjono-oauth-resource-reg •  Binding Obligations specification: –  Identifies legal obligations of players within the protocol flow –  http://docs.kantarainitiative.org/uma/draft-uma-trust.html •  Implementations available (incomplete) –  Gluu, CloudIdentity (UK) 39
  • 40. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu UMA: User-Centric Resource Sharing 40
  • 41. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu UMA: Single Point for Managing Access 41 Alice’sresourcesat3ResourceServers Alice uses the UMA Authorization Server to set access-policy For her resources Bob uses the Client to get authorization from the AS, to access Alice’s resources
  • 42. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu UMA Phase-1: Alice registers Resource 42 (1) (2) (1) Alice registers her Resource (e.g. files) Stored at RS#1 to the AS & sets access Policy (2) & (3) The Resource Server #1 obtains an OAuth2.0 PAT Token from the Authorization Server. (3)
  • 43. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu UMA Phase-2: Client gets authorization token 43 (1) (2) (1) Clients attempts access without token (2) Client redirected to AS. (3) AS issues AAT token to Client (3)
  • 44. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu UMA Ph-3: Requesting Party gets Authorization 44 (1)(2) (3) (4) (1) & (2) Bob attempts access without token (2) Client redirected to AS. (3) AS issues RPT token to Bob (the human)
  • 45. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu UMA: Bob successfully accesses Alice’s files 45 (1) (2) (3) (4) (1)  & (2) Bob uses Client to access files, presenting RPT and AAT token
  • 46. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu UMA: Relationship with OAuth2.0 & OIDC 46 Source: Eve Maler & UMA WG
  • 47. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Future Projects: An Open Invitation •  We welcome new members to the MIT-KIT: –  Introduce your ideas & proposals –  Engage MIT research community –  Use the MIT-KIT as forum for discussion & development –  Take leadership of projects •  Potential new projects: –  Anonymous credential system •  Open source U-Prove –  Anonymous verifiable attributes –  Homomorphic encryption of data stored in OpenPDS –  Key management for OpenPDS (eg. KMIP standard) 47
  • 48. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Events at MIT-KIT 2013 Annual Conference Kerberos Interop OAuth2.0 Interop 48
  • 49. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu 2013 MIT-KIT Annual Conference •  Theme: “Personal Data & the Internet” •  Co-Sponsor: Prof Sandy Pentland, MIT Media Lab •  Date: Monday 7 October 2013 •  Venue: MIT Media Lab •  Free registration 49 kit.mit.edu
  • 50. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu 2013 Kerberos Interop •  Date: Tue-Wed 8th & 9th October 2013 •  Venue: MIT 50
  • 51. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu OAuth2.0 Interop •  Date: last Thursday & Friday in October –  Oct 31 and Nov 1, 2013 –  This is week prior to IETF88-Vancouver •  Co-Sponsor: Internet Society (ISOC) •  Venue: MIT –  Building W92 •  Basic OAuth2.0 Profile under development 51
  • 52. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Current MIT-KIT Members 52
  • 53. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Community Members •  CMU •  Centrify Corporation •  Columbia University •  Cornell University •  US DOD •  Fidelity * •  Iowa State University •  MIT * •  Michigan State niv •  MITRE •  Microsoft * •  Morgan Stanley* •  NASA •  Network Appliance * •  Nippon Telephone and Telegraph (NTT)* •  Oracle/Sun * •  Pennsylvania State Univ. •  Red Hat * •  TeamF1, Inc. •  The University of Alaska •  The University of Michigan •  The U. of Pennsylvania •  Stanford U. •  (Google) * = Advisory Board Member 53
  • 54. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Community Members 54
  • 55. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu MIT-KC Board Members Company Name Title/Role Microsoft Slava Kavsan Chief Architect, Windows Security & Azure Oracle Eric Kozlowski Snr. Manager, Solaris Security NTT Satoru Kanno (Dr. Masayuki Kanda) VP, Security and Crypto, NTT Software NetApp Satyajit Deshmukh Snr. Manager Fidelity Rajan Kulkarni SVP, Advanced Products & Services Red Hat Dmitri Pal Snr Manager, Enterprise Linux Security MIT Mark Silis Director of Network Infrastructure Morgan Stanley Ish Ahluwalia Director of Infra Security 55
  • 56. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Academic Advisory Board (New) Organization Name Title/Role MIT Media Lab Prof. Sandy Pentland Toshiba Professor of Media & Society Brown University Prof. Anna Lysyanskaya Professor of Computer Science RSA Inc Dr. Ari Juels Chief Scientist MITRE Dr. Joshua Guttman Lead Scientist MIT CSAIL Dr. Nickolai Zeldovich Assoc. Professor 56 *Prof. Ron Rivest, CSAIL, MIT
  • 57. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Membership & Benefits 57
  • 58. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Board Membership Benefits •  Easy access to experts –  Core team, consultants and developers worldwide •  Special Projects –  Fast-track special requests –  Integrate into multi-year code releases •  Features Request –  Priority for new features for next release •  Guidance in Deployment, integration & upgrades –  Technical review of plans –  F2F meetings •  Influence on project evolution •  Full view into development roadmap 58
  • 59. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Fee Structure: Summary •  Advisory Board Member: –  $50K annually for 3 years –  Co-designed, sponsor-focused special project –  Voting seat on Advisory Board –  Full view into roadmap •  Patron Sponsor: –  $25K annually for 3 years –  Complimentary participation in workshops and interoperability testing events. •  Academic membership: –  $8K to $10K annually for 3 years 59
  • 60. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu Contact Information The MIT Kerberos & Internet Trust (KIT) Consortium 77 Massachusetts Avenue W92-152 Cambridge, MA 02139 USA kit.mit.edu Thomas Hardjono, PhD. Technical Lead & Executive Director Email: hardjono@mit.edu Mobile: +1 781 729 9559 Twitter: @FindThomas Web: kit.mit.edu 60
  • 61. © 2007-2013 The MIT Kerberos & Internet Trust Consortium. All Rights Reserved. kit.mit.edu BACKUP SLIDES 61