SlideShare une entreprise Scribd logo
1  sur  54
Télécharger pour lire hors ligne
Iscriviti al gruppo Linkedin WSO2 Italia per entrare nella community italiana,
conoscere la tecnologia WSO2 e condividere strategie di integrazione e use cases
WSO2 API Manager
Addresses full API lifecycle management
operations. Open, extensible, customizable.
WSO2 Enterprise Integrator
Hybrid integration platform for quick,
iterative integration of any application,
data, or system.
WSO2 Identity Server
Federates and manages identities across
both cloud service and enterprise
environments.
WSO2 Technology
WSO2 Open Banking
A purpose-built technology platform for
global open banking.
WSO2 Open Healthcare
Towards greater interoperability with a
proven integration platform and FHIR®
.
WSO2 Strategic Consulting
Streamline your business objectives and
rapidly achieve key results.
Together, with hundreds of the world’s largest corporations, leading universities, and governments, we execute in excess of
6 trillion transactions, expose more than 200,000 APIs, and manage over 100 million identities every single year.
WSO2 Identity Server
Federates and manages identities across both cloud service and enterprise environments.
Analyst Recognition
https://wso2.com/identity-and-access-management/
WSO2 Identity & Access Management
The WSO2 Identity Server is the #1 open source
IAM product with comprehensive capabilities
for identity federation, strong customer
authentication, adaptive access control and API
security.
Highlights:
❖ Comprehensive identity federation, single
sign-on & global sign-off capabilities
❖ Extensive set of adaptive access control
capabilities
❖ Comprehensive API and Microservices
Security
❖ Open, extensible architecture for unique
business needs; rich connector ecosystem
❖ Container-friendly deployments
High-level Capability Breakdown
Identity Federation and SSO
Identity Bridging
Strong and Adaptive Access Control
Identity Provisioning and Administration
Authorization
API & Microservice Security
Consent Management
Authentication
Identity Federation & Single Sign-On (SSO)
❖ Business users need access to multiple heterogeneous applications.
➢ Cloud and on-premises applications
➢ Consumers, enterprise customers, partners, workforce applications
➢ Web, mobile web, mobile native, SaaS, IoT device applications
❖ Single Sign-On and Single Logout across identity federation protocols
➢ Claim and Role transformation
➢ Standard identity federation protocols
Federation with Identity Providers
❖ Provide access to users from trusted internal identity providers (B2E)
❖ Provide access to partners or customers from trusted external identity providers (B2B)
➢ Example: Authenticate users in ADFS to Salesforce
❖ Provide social login/sign-up for your consumer websites (B2C)
❖ The same set of standard identity federation protocols are available for outbound authentication requests
as well
Log-in Journey
The log-in journey of a user to a particular application is defined as a sequence of authentication
steps (MFA). Each authentication step can provide the user with multiple authentication options
(authenticator). A user MUST authenticate successfully AT EACH authentication step using AT LEAST
ONE authentication option.
❖ Classification based on :
➢ responsibility of user authentication
➢ user experience in service provider
➢ user experience
➢ user experience defined by PSD2
Request-based Step-up Authentication
❖ Required Level of Assurance (LoA)
➢ Authentication ContextClassRef in SAML2
➢ ‘acr’ in OpenID Connect
➢ custom HTTP parameters
View Balance Fund Transfer
Environment-based Step-up Authentication
Region Country
Environment-based Step-up Authentication
❖ Location (home/work)
❖ IP / IP-Range
❖ Device (trusted/untrusted/new)
Identity-based Step-up Authentication
❖ Group Role
❖ Attributes
Risk-based Authentication
❖ Login patterns (time of the day, day of the week, etc.)
❖ Last successful login time
❖ Typing speed
❖ Consecutive incorrect password attempts
Adaptive Authentication JavaScript Editor
Directory Integration
❖ Support for primary and multiple secondary user stores
❖ Supports read-only user stores
Identity Management
❖ User Profile
➢ User attributes
➢ User credentials
➢ User groups
➢ User roles
❖ User Onboarding Workflows
➢ Admin Creation Workflow
➢ Invitation Workflow
➢ Self-Registration Workflow
➢ Just-in-time (JIT) Provisioning Workflow
➢ Bulk user onboarding workflow
❖ Users/Groups/Roles Management
➢ By administrator
➢ Self-service profile management
➢ Inbound Provisioning Endpoints:
■ SCIM 2.0
■ Self-registration API
➢ Outbound provisioning connectors
■ E.g. SCIM 2.0, Google Apps, Microsoft
Azure
■ Rule-based
➢ Identity Verification / Proofing
■ E.g. Evident
➢ Multi-level Approvals
➢ Username recovery
➢ Identity Integration Workflows, Business
❖ Processes and Business Rules with WSO2
❖ Enterprise Integrator
Identity Management
❖ Identity Change Events:
➢ USER_UPDATE
➢ USER_DELETION
➢ PASSWORD_UPDATE
➢ GROUP_CHANGE
➢ ROLE_CHANGE
❖ Identity Event Triggers:
➢ Admin-initiated actions
➢ Self-service actions
➢ System-initiated lifecycle state
transitions
❖ Identity Lifecycle
➢ States:
■ PENDING
■ ACTIVE
■ LOCKED
■ INACTIVE
➢ State Transitions Events:
■ ACCOUNT_CREATED
■ ACCOUNT_CONFIRMED
■ ACCOUNT_LOCKED_INVALID_PASSWORD
■ ACCOUNT_LOCKED_INVALID_CHALLENGE_QUESTION_ANSWER
■ ACCOUNT_UNLOCKED_TIMEOUT
■ ACCOUNT_UNLOCKED_ADMIN
■ ACCOUNT_DEACTIVATED_IDLE
❖ Features
➢ Account confirmation via email address and/or mobile number verification
➢ Email address and mobile number verification for existing accounts and on change
event
❖ Admin-initiated
➢ Password reset
➢ Admin-initiated password reset workflow
❖ Password policies
➢ Password complexity
➢ Password rotation
➢ Password history
❖ Self-service
➢ Set password on account confirmation for invitation
workflow
➢ On first log-in:
■ Set password
■ Set challenge questions/answers
➢ Password reset
➢ Challenge questions/answers
➢ Password recovery using:
■ Email address verification
■ Mobile number verification
■ Challenge question answers
Password management
Inbound and Outbound Provisioning
❖ Inbound: Users and groups can be provisioned into the WSO2 IS
➢ Outbound: Users and groups can be provisioned from WSO2 IS to external systems
➢ Supports SCIM 2.0 and SOAP (proprietary) APIs for inbound provisioning
➢ Supports SCIM 2.0, Salesforce, Google Apps, Microsoft Azure, etc. for outbound provisioning
Just-in-Time (JIT) Account Provisioning
Provision accounts for users from a federated IdP at the time of first login.
User story - A Company wishes to have social login with Facebook and Twitter for its consumer website, but also wishes to
manage a profile-lite for its users for offline communication purposes.
Approval Workflows
❖ Multi-step / multi-option approval template (similar to authentication)
❖ Approval option - either a user or a role
❖ Out-of-the-box supports for user or group management operations.
❖ Trigger conditions, e.g. ‘trigger workflow only if user is in the ‘manager’ group.
❖ Out-of-the-box integrates with
❖ WSO2 Business Process Server (BPS)
User story - students who are
added to a particular academic
year group have to be approved by
the administrators of that group.
Self-Care Portal
Putting the user at the center of the action
Authorization
❖ Coarse-grained entitlements are managed centrally and enforced both centrally and in the application
➢ Create and manage roles
➢ Manage user roles
➢ Manage virtual role mappings for federated users
➢ Conditional log-in managed and enforced centrally via XACML 3.0 authorization policies
➢ Coarse-grained authorization managed centrally and enforced in the application via
■ Sending user roles in the log-in response
■ Querying user roles via SCIM 2.0 API
■ Evaluating user roles via XACML 3.0 Rest/JSON API
Role-Based Access Control (RBAC)
Permission-Based Access Control
❖ Fine-grained entitlements are managed centrally
➢ Permission = resource + corresponding action
➢ Fine-grained resources and actions
➢ Hierarchical resources
➢ Typed-Resource-level permissions
➢ Role is a named collection of permissions
➢ Users are assigned to roles
➢ Permissions are assigned to user groups
➢ User entitlements are sent to the application in the log-in response
➢ SCIM 2.0 API to query user entitlements
➢ XACML 3.0 Rest/JSON API to evaluate user entitlements
Attribute-Based Access Control (ABAC)
❖ Fined-grained entitlements are managed centrally and enforced in the application
➢ Fine-grained
➢ Instance-level authorization
➢ Policy-based / Rule-based access control (PBAC)
➢ XACML 3.0 Rest/JSON API
➢ Plug-in model available for PIPs, PRPs, functions, combining algorithms and other language constructs
OAuth2
❖ OAuth 2.0 is a framework to delegate authorization to resources (APIs)
❖ OAuth 2.0 by design can limit the authorization to resources by,
➢ resource owner (user)
➢ resource owner consent
➢ client (application)
➢ authorization expiry time (token lifetime)
➢ additional Authorization Server policies (via scopes)
❖ Orchestrates an approval interaction between the resource owner and the authorization server
❖ Resource owners can manage and revoke authorization grants at any time
OAuth2 Grant Flow
❖ 5 core grant flows
➢ Authorization Code
➢ Implicit
➢ Resource Owner Password
➢ Client Credentials
➢ Refresh Token
❖ Extended grant flows
➢ SAML2 Bearer Assertion
➢ JWT Bearer Assertion
❖ Custom grant flows
➢ Kerberos grant flow
➢ NTLM grant flow
Federated Authorization
❖ UMA 2.0 is a federated authorization protocol built on top of OAuth 2.0
➢ UMA defines a workflow that creates authorization policies on a centralized
authorization server for resource owners to control the access to their protected
resources
Analytics
❖ Increased attack surface
❖ Authentication and authorization needed at each service
❖ Each microservice is a responsibility of a single team → Data security is also their responsibility
❖ Username/password is an option but self-signed JWT is better
Securing Microservices
Analytics, Alerts and Audit-trails
Analytics
Integrated with:
❖ Wso2 Analytics
❖ ELK
❖ Splunk
GDPR Compliance
Multy tenancy
❖ WSO2’s organization model, also technically known as multi-tenancy, is built with the intention of supporting IDaaS
offerings.
❖ In other words, WSO2 Identity Server is capable of hosting multiple organizations in the same runtime instance.
❖ With WSO2’s in-JVM multi-tenancy, you get API level isolation.
❖ With WSO2’s in-JVM multi-tenancy, you don’t get execution or data-level isolation.
❖ While the primary userstore is physically shared but logically separate, the secondary userstores are physically and
logically separate.
❖ With increasing number of tenants, tenant sharding/partitioning deployment models are available to support
horizontal scalability (beyond 1000 tenants).
White-labeled Pages & Custom Themes
Standards
❖ SAML2 Web Browser SSO, SAML2 Single Logout, SAML2 Artifact Resolution Profile,
❖ SAML2 Assertion Query/Request Profile, SAML2 Basic Attribute Profile, SAML2 SSO Metadata, Electronic
Identification Authentication and Trust Services (eIDAS)
❖ OAuth 2.0, OAuth2 Bearer Token Usage, SAML 2.0 Profile for OAuth 2.0, JWT Profile for OAuth 2.0, OAuth 2.0
Token Revocation, OAuth 2.0 Token Introspection, OAuth 2.0
❖ Form Post Response Mode, Proof Key for Code Exchange, MicroProfile JWT
❖ OpenID Connect 1.0 (except Front Channel Logout)
❖ UMA 2.0
❖ WS Security 1.0/1.1, SAML Token Profile Version 1.1, Kerberos Token Profile Version 1.1, X.509 Certificate Token
Profile Version 1.1, WS-Secure Converstation 1.3,
❖ WS-SecurityPolicy 1.1/1.2
❖ WS-Trust 1.3/1.4
❖ WS-Federation Passive Requestor Profile 1.2 (SAML 1.1), CAS v3.0
❖ Lightweight Directory Access Protocol (LDAP/S) v3, SCIM 1.1/2.0
❖ XACML 2.0/3.0
❖ Fast Identity Online (FIDO) Universal Two Factor (U2F)
❖ General Data Protection Regulation (GDPR)
Component Architecture
WSO2 Identity Server Connectors
Connectors for:
❖ Outbound federation
❖ Social login
❖ Infrastructure-as-a-Service (IaaS)
❖ Software-as-a-Service (SaaS)
❖ Identity-as-a-Service (IDaaS)
❖ Identity Proofing
❖ Security-as-a-Service (SECaaS)
❖ Outbound provisioning
❖ Hardware and software 2FA
❖ Mobile biometric authentication
❖ Identity Stores
❖ Cloud Directories
❖ Identity Server Rest API Security
❖ Authorization
❖ Hardware Security Module
Deployment
Deployment Pattern 1
❖ Highly available deployment of WSO2 Identity Server
➢ Minimum recommendation is 2 active/active nodes
❖ Deployment for scalability
➢ TPS based scaling (Single node can handle up to 34 million
authentication requests per day)
➢ Horizontal auto-scaling via AWS/Azure/Google App Engine
or container platforms such as K8S/Docker or OpenShift
Deployment Pattern 2
❖ Highly available deployment of WSO2 IS and WSO2 IS Analytics
➢ Minimum recommendation is 2 active/active IS nodes and 2
active/passive IS Analytics nodes
❖ Deployment for scalability
➢ TPS Based Scaling (Single IS Analytics node can handle up to 3000
event per second)
❖ IS Analytics doesn’t support horizontal dynamic scaling but events
published by upto 10 IS nodes
WSO2 Reference Architecture for CIAM
What's New in Next Releases - WSO2
Identity Server 5.12 and Beyond
48
WSO2 Identity Server Roadmap Summary
Phase I - near term
Make the current product offering API-driven, developer focused and cloud
native. Deploy in the cloud (WSO2 Identity Cloud) to provide core Identity
functionality targeting CIAM.
2020/2021
Phase II - mid term
Expand IAM ecosystem around Identity Server / WSO2 Identity Cloud by
integrating and building technical partnerships with IAM vendors outside the
access management segment (analytics, risk-based authentication, etc)
2021 / 2022
Phase III - long term
Build an integrated CIAM solution in the cloud (WSO2 Identity Cloud).
Out-of-the-box integrations with consent and preference management
systems, CRM systems, marketing platforms/solutions, content
management systems, data management platforms, etc.
2022+
All information pertaining to WSO2 Identity Cloud is strictly confidential until the offering launches in July 2021. At that time, the Identity Cloud roadmap information will be publicly available.
49
● Launch WSO2 Identity Cloud beta on top of Identity Server v5.12.0 as the base version.
● WSO2 Identity Cloud will support connecting to an on-prem identity store from the cloud
● Improved user experience with React based SPAs for self care, console (for devs and admins)
● Authentication SDKs (JS, React, Angular, Java, Android, .Net) and samples
● Authentication agents for Tomcat for SAML 2.0 and OIDC
● Developer tooling (VS Code plugin for adaptive scripts)
● Multiple Attribute login support
● Rest API for Multi Factor Authentication - SMS/Email OTP, TOTP, FIDO2
● Organization Management - B2B business use cases
Phase I: WSO2 Identity Cloud GA and WSO2 IS 5.12 - July 2021
50
Phase II: 2021 Q4/2022
● Provide integration option with identity verification and proofing systems (EvidentID, IDEMEA,
Jumio, Socure)
● Expand strong authentications options with biometric and passwordless authentication provider
integrations (HYPR, Trusona, Typing DNA, Veridium, BehavioSec, etc.)
● Enhance cloudnative ecosystem integrations (log analytics: ELK, key rotation: Hashicorp Vault,
AWS KMS, Azure KMS) and onboard to WSO2 Identity Cloud
● Enhance SIEM integrations ( LogRhythm).
● Evaluate and build deep integrations with Ellucian, AWS, Office365 etc.
● Get the WSO2 Identity Cloud audited for SOC 2, HIPAA and PCI DSS, and build regional
deployments of WSO2 Identity Cloud to be compliant with regulatory requirements.
● Integrate with fraud detection systems (ThreatMetrix etc.)
● Integrate bot detection and mitigation systems (Imperva etc), to protect WSO2 Identity Cloud
● Deploy connectors/extensions as Docker containers
51
Phase III: 2022+
● Provide integration options with 3rd party consent and preference management vendors: Consent
Systems, Didomi, KnowNow Information, Tealium, TrustArc.
● A web form designer for progressive profiling, that can be embedded into content management
systems
● Templated data orchestration flows between identity stores, CRM systems, CDM systems,
marketing automation platforms.
● Build out-of-the-box data-level integrations with MailChimp, Google Analytics, and Salesforce
Pardot (marketing platforms) in WSO2 Identity Cloud.
● Build out-of-the-box data-level integrations with Shopify, Magneto, Oracle Micros (ecommerce
platforms) in WSO2 Identity Cloud.
● Build out-of-the-box data-level integrations with SharePoint, Drupal, WordPress, and Joomla
(content management systems) in out-of-the-box.
Q&A?
GRAZIE!!!
Prossimo appuntamento:
Contatti
DOVE SIAMO
Milano - Torino - Padova - Roma
TELEFONO
Torino +39-011-0120371
EMAIL
wso2.sales@profesia.it
@

Contenu connexe

Tendances

IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference ArchitectureHannu Kasanen
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode
 
AWS Identity Access Management
AWS Identity Access ManagementAWS Identity Access Management
AWS Identity Access ManagementRichard Harvey
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTGlobal Online Trainings
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationDelivery Centric
 
Quest One Identity Management Summary
Quest One Identity Management   SummaryQuest One Identity Management   Summary
Quest One Identity Management SummaryQuest Software
 
Active Directory Self-Service Suite Overview
Active Directory Self-Service Suite OverviewActive Directory Self-Service Suite Overview
Active Directory Self-Service Suite OverviewEmpowerID
 
Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0John Bernhard
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Jack Forbes
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access ManagementKalyana Sundaram
 
Cloud identity access management market
Cloud identity access management marketCloud identity access management market
Cloud identity access management marketAllied Market Research
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
SSO Strategy Implementation Considerations
SSO Strategy Implementation ConsiderationsSSO Strategy Implementation Considerations
SSO Strategy Implementation ConsiderationsJohn Bauer
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management OverviewSAP Technology
 
Federation Services
Federation ServicesFederation Services
Federation ServicesEmpowerID
 
Short Sales Overview of EmpowerID
Short Sales Overview of EmpowerIDShort Sales Overview of EmpowerID
Short Sales Overview of EmpowerIDEmpowerID
 
Cloud Identity and Access Management
Cloud Identity and Access ManagementCloud Identity and Access Management
Cloud Identity and Access ManagementJarek Sokolnicki
 

Tendances (20)

IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference Architecture
 
Hexnode Identity and Access Management solution
Hexnode Identity and Access Management solutionHexnode Identity and Access Management solution
Hexnode Identity and Access Management solution
 
AWS Identity Access Management
AWS Identity Access ManagementAWS Identity Access Management
AWS Identity Access Management
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 
Quest One Identity Management Summary
Quest One Identity Management   SummaryQuest One Identity Management   Summary
Quest One Identity Management Summary
 
Active Directory Self-Service Suite Overview
Active Directory Self-Service Suite OverviewActive Directory Self-Service Suite Overview
Active Directory Self-Service Suite Overview
 
Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0Id m what-why-how presentationv2.0
Id m what-why-how presentationv2.0
 
IDM Reconciliation
IDM ReconciliationIDM Reconciliation
IDM Reconciliation
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access Management
 
Cloud identity access management market
Cloud identity access management marketCloud identity access management market
Cloud identity access management market
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
SSO Strategy Implementation Considerations
SSO Strategy Implementation ConsiderationsSSO Strategy Implementation Considerations
SSO Strategy Implementation Considerations
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
 
IDM Introduction
IDM IntroductionIDM Introduction
IDM Introduction
 
Federation Services
Federation ServicesFederation Services
Federation Services
 
Short Sales Overview of EmpowerID
Short Sales Overview of EmpowerIDShort Sales Overview of EmpowerID
Short Sales Overview of EmpowerID
 
Cloud Identity and Access Management
Cloud Identity and Access ManagementCloud Identity and Access Management
Cloud Identity and Access Management
 

Similaire à #3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le identità digitali

SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementManish Harsh
 
Microservices security - jpmc tech fest 2018
Microservices security - jpmc tech fest 2018Microservices security - jpmc tech fest 2018
Microservices security - jpmc tech fest 2018MOnCloud
 
WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016 ForgeRock
 
EduID Mobile App - Use-Cases, Concepts and Implementation
EduID Mobile App - Use-Cases, Concepts and ImplementationEduID Mobile App - Use-Cases, Concepts and Implementation
EduID Mobile App - Use-Cases, Concepts and ImplementationChristian Glahn
 
Introduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2CIntroduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2CJoonas Westlin
 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns WSO2
 
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...WSO2
 
Chakray.com - Enterprise Security and IAM with WSO2IS and Penrose
Chakray.com - Enterprise Security and IAM with WSO2IS and PenroseChakray.com - Enterprise Security and IAM with WSO2IS and Penrose
Chakray.com - Enterprise Security and IAM with WSO2IS and PenroseRoger CARHUATOCTO
 
Financial Event Sourcing at Enterprise Scale
Financial Event Sourcing at Enterprise ScaleFinancial Event Sourcing at Enterprise Scale
Financial Event Sourcing at Enterprise Scaleconfluent
 
Authenticator and provisioning connector in wso2 Identity Server
Authenticator and provisioning connector in wso2 Identity ServerAuthenticator and provisioning connector in wso2 Identity Server
Authenticator and provisioning connector in wso2 Identity ServerRajendram Kathees
 
Synergies across APIs and IAM
Synergies across APIs and IAMSynergies across APIs and IAM
Synergies across APIs and IAMSagara Gunathunga
 
Smart software-manager-satellite-enhanced-edition-datasheet
Smart software-manager-satellite-enhanced-edition-datasheetSmart software-manager-satellite-enhanced-edition-datasheet
Smart software-manager-satellite-enhanced-edition-datasheetWattson Alexander Ramírez Rodas
 
Authentication with OAuth and Connected Apps
Authentication with OAuth and Connected AppsAuthentication with OAuth and Connected Apps
Authentication with OAuth and Connected AppsSalesforce Developers
 
WSO2Con EU 2015: Securing, Monitoring and Monetizing APIs
WSO2Con EU  2015: Securing, Monitoring and Monetizing APIsWSO2Con EU  2015: Securing, Monitoring and Monetizing APIs
WSO2Con EU 2015: Securing, Monitoring and Monetizing APIsWSO2
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?ForgeRock
 
Five Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityFive Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityMark Diodati
 
Building a Fool Proof Security Strategy for PSD2 Compliance
Building a Fool Proof Security Strategy for PSD2 ComplianceBuilding a Fool Proof Security Strategy for PSD2 Compliance
Building a Fool Proof Security Strategy for PSD2 ComplianceWSO2
 

Similaire à #3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le identità digitali (20)

SSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy ManagementSSO IN/With Drupal and Identitiy Management
SSO IN/With Drupal and Identitiy Management
 
Microservices security - jpmc tech fest 2018
Microservices security - jpmc tech fest 2018Microservices security - jpmc tech fest 2018
Microservices security - jpmc tech fest 2018
 
WSO2 Identity Server - Product Overview
WSO2 Identity Server - Product OverviewWSO2 Identity Server - Product Overview
WSO2 Identity Server - Product Overview
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016
 
EduID Mobile App - Use-Cases, Concepts and Implementation
EduID Mobile App - Use-Cases, Concepts and ImplementationEduID Mobile App - Use-Cases, Concepts and Implementation
EduID Mobile App - Use-Cases, Concepts and Implementation
 
Introduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2CIntroduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2C
 
Governance and Security Solution Patterns
Governance and Security Solution Patterns Governance and Security Solution Patterns
Governance and Security Solution Patterns
 
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computi...
 
Iam f42 a
Iam f42 aIam f42 a
Iam f42 a
 
Keycloak SSO basics
Keycloak SSO basicsKeycloak SSO basics
Keycloak SSO basics
 
Chakray.com - Enterprise Security and IAM with WSO2IS and Penrose
Chakray.com - Enterprise Security and IAM with WSO2IS and PenroseChakray.com - Enterprise Security and IAM with WSO2IS and Penrose
Chakray.com - Enterprise Security and IAM with WSO2IS and Penrose
 
Financial Event Sourcing at Enterprise Scale
Financial Event Sourcing at Enterprise ScaleFinancial Event Sourcing at Enterprise Scale
Financial Event Sourcing at Enterprise Scale
 
Authenticator and provisioning connector in wso2 Identity Server
Authenticator and provisioning connector in wso2 Identity ServerAuthenticator and provisioning connector in wso2 Identity Server
Authenticator and provisioning connector in wso2 Identity Server
 
Synergies across APIs and IAM
Synergies across APIs and IAMSynergies across APIs and IAM
Synergies across APIs and IAM
 
Smart software-manager-satellite-enhanced-edition-datasheet
Smart software-manager-satellite-enhanced-edition-datasheetSmart software-manager-satellite-enhanced-edition-datasheet
Smart software-manager-satellite-enhanced-edition-datasheet
 
Authentication with OAuth and Connected Apps
Authentication with OAuth and Connected AppsAuthentication with OAuth and Connected Apps
Authentication with OAuth and Connected Apps
 
WSO2Con EU 2015: Securing, Monitoring and Monetizing APIs
WSO2Con EU  2015: Securing, Monitoring and Monetizing APIsWSO2Con EU  2015: Securing, Monitoring and Monetizing APIs
WSO2Con EU 2015: Securing, Monitoring and Monetizing APIs
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?
 
Five Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern IdentityFive Things You Gotta Know About Modern Identity
Five Things You Gotta Know About Modern Identity
 
Building a Fool Proof Security Strategy for PSD2 Compliance
Building a Fool Proof Security Strategy for PSD2 ComplianceBuilding a Fool Proof Security Strategy for PSD2 Compliance
Building a Fool Proof Security Strategy for PSD2 Compliance
 

Plus de Profesia Srl, Lynx Group

2. Guidare il futuro, l'approccio di WSO2 Italia alle tendenze tecnologiche e...
2. Guidare il futuro, l'approccio di WSO2 Italia alle tendenze tecnologiche e...2. Guidare il futuro, l'approccio di WSO2 Italia alle tendenze tecnologiche e...
2. Guidare il futuro, l'approccio di WSO2 Italia alle tendenze tecnologiche e...Profesia Srl, Lynx Group
 
Profesia 2023 State of the Software Supply Chain Talk.pdf
Profesia 2023 State of the Software Supply Chain Talk.pdfProfesia 2023 State of the Software Supply Chain Talk.pdf
Profesia 2023 State of the Software Supply Chain Talk.pdfProfesia Srl, Lynx Group
 
Web content design: creare contenuti di qualità con Newired
Web content design: creare contenuti di qualità con NewiredWeb content design: creare contenuti di qualità con Newired
Web content design: creare contenuti di qualità con NewiredProfesia Srl, Lynx Group
 
In Estra la Digital Transformation parte dalla User Experience del Cliente
In Estra la Digital Transformation parte dalla User Experience del ClienteIn Estra la Digital Transformation parte dalla User Experience del Cliente
In Estra la Digital Transformation parte dalla User Experience del ClienteProfesia Srl, Lynx Group
 
Omnichannel API integration in luxury market by Gianvito Rossi
Omnichannel API integration in luxury market by Gianvito RossiOmnichannel API integration in luxury market by Gianvito Rossi
Omnichannel API integration in luxury market by Gianvito RossiProfesia Srl, Lynx Group
 
API Transformation in Crédit Agricole Italia
API Transformation in Crédit Agricole ItaliaAPI Transformation in Crédit Agricole Italia
API Transformation in Crédit Agricole ItaliaProfesia Srl, Lynx Group
 
WSO2 ITALIA SMART TALK #10 - Interoperability nelle utility, un caso reale
WSO2 ITALIA SMART TALK #10 - Interoperability nelle utility, un caso realeWSO2 ITALIA SMART TALK #10 - Interoperability nelle utility, un caso reale
WSO2 ITALIA SMART TALK #10 - Interoperability nelle utility, un caso realeProfesia Srl, Lynx Group
 
WSO2 ITALIA SMART TALK #7 - Installare WSO2 in AWS: tips and tricks
 WSO2 ITALIA SMART TALK #7 - Installare WSO2 in AWS: tips and tricks WSO2 ITALIA SMART TALK #7 - Installare WSO2 in AWS: tips and tricks
WSO2 ITALIA SMART TALK #7 - Installare WSO2 in AWS: tips and tricksProfesia Srl, Lynx Group
 
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
 WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATUREProfesia Srl, Lynx Group
 
WSO2 ITALIA SMART TALK #9 - WSO2 IDENTITY SERVER & SPID: UN CASO REALE
WSO2 ITALIA SMART TALK #9 - WSO2 IDENTITY SERVER & SPID: UN CASO REALEWSO2 ITALIA SMART TALK #9 - WSO2 IDENTITY SERVER & SPID: UN CASO REALE
WSO2 ITALIA SMART TALK #9 - WSO2 IDENTITY SERVER & SPID: UN CASO REALEProfesia Srl, Lynx Group
 
WSO2 ITALIA SMART TALK #6 - Autenticazione User Centric: Identità digitale
WSO2 ITALIA SMART TALK #6 - Autenticazione User Centric: Identità digitaleWSO2 ITALIA SMART TALK #6 - Autenticazione User Centric: Identità digitale
WSO2 ITALIA SMART TALK #6 - Autenticazione User Centric: Identità digitaleProfesia Srl, Lynx Group
 
WSO2 ITALIA SMART TALK #5 - APIFICATION: OPPORTUNITÀ DELLE ORGANIZZAZIONI MOD...
WSO2 ITALIA SMART TALK #5 - APIFICATION: OPPORTUNITÀ DELLE ORGANIZZAZIONI MOD...WSO2 ITALIA SMART TALK #5 - APIFICATION: OPPORTUNITÀ DELLE ORGANIZZAZIONI MOD...
WSO2 ITALIA SMART TALK #5 - APIFICATION: OPPORTUNITÀ DELLE ORGANIZZAZIONI MOD...Profesia Srl, Lynx Group
 
WSO2 ITALIA SMART TALK #4 - Telefonica Use Case
WSO2 ITALIA SMART TALK #4 - Telefonica Use CaseWSO2 ITALIA SMART TALK #4 - Telefonica Use Case
WSO2 ITALIA SMART TALK #4 - Telefonica Use CaseProfesia Srl, Lynx Group
 
WSO2 ITALIA SMART TALK 2023 #2- WSO2 APIM new Feature
WSO2 ITALIA SMART TALK 2023 #2- WSO2 APIM new FeatureWSO2 ITALIA SMART TALK 2023 #2- WSO2 APIM new Feature
WSO2 ITALIA SMART TALK 2023 #2- WSO2 APIM new FeatureProfesia Srl, Lynx Group
 
PA NON TI DEMO: weModI e Interoperabilità delle PA...
PA NON TI DEMO: weModI e Interoperabilità delle PA...PA NON TI DEMO: weModI e Interoperabilità delle PA...
PA NON TI DEMO: weModI e Interoperabilità delle PA...Profesia Srl, Lynx Group
 
WSO2 ITALIA SMART TALK #1 - WSO2 diventa MODI e PDND compliant
WSO2 ITALIA SMART TALK #1 - WSO2 diventa MODI e PDND compliantWSO2 ITALIA SMART TALK #1 - WSO2 diventa MODI e PDND compliant
WSO2 ITALIA SMART TALK #1 - WSO2 diventa MODI e PDND compliantProfesia Srl, Lynx Group
 
WSO2 Oxygenate Italy 2022 CSI Piemonte. Marco Boero
WSO2 Oxygenate Italy 2022 CSI Piemonte. Marco BoeroWSO2 Oxygenate Italy 2022 CSI Piemonte. Marco Boero
WSO2 Oxygenate Italy 2022 CSI Piemonte. Marco BoeroProfesia Srl, Lynx Group
 
WSO2 Oxygenate Italy 2022 Raiffeisen Information Service. Roberto Palmarin
WSO2 Oxygenate Italy 2022 Raiffeisen Information Service. Roberto PalmarinWSO2 Oxygenate Italy 2022 Raiffeisen Information Service. Roberto Palmarin
WSO2 Oxygenate Italy 2022 Raiffeisen Information Service. Roberto PalmarinProfesia Srl, Lynx Group
 

Plus de Profesia Srl, Lynx Group (20)

2. Guidare il futuro, l'approccio di WSO2 Italia alle tendenze tecnologiche e...
2. Guidare il futuro, l'approccio di WSO2 Italia alle tendenze tecnologiche e...2. Guidare il futuro, l'approccio di WSO2 Italia alle tendenze tecnologiche e...
2. Guidare il futuro, l'approccio di WSO2 Italia alle tendenze tecnologiche e...
 
Profesia 2023 State of the Software Supply Chain Talk.pdf
Profesia 2023 State of the Software Supply Chain Talk.pdfProfesia 2023 State of the Software Supply Chain Talk.pdf
Profesia 2023 State of the Software Supply Chain Talk.pdf
 
Web content design: creare contenuti di qualità con Newired
Web content design: creare contenuti di qualità con NewiredWeb content design: creare contenuti di qualità con Newired
Web content design: creare contenuti di qualità con Newired
 
In Estra la Digital Transformation parte dalla User Experience del Cliente
In Estra la Digital Transformation parte dalla User Experience del ClienteIn Estra la Digital Transformation parte dalla User Experience del Cliente
In Estra la Digital Transformation parte dalla User Experience del Cliente
 
Omnichannel API integration in luxury market by Gianvito Rossi
Omnichannel API integration in luxury market by Gianvito RossiOmnichannel API integration in luxury market by Gianvito Rossi
Omnichannel API integration in luxury market by Gianvito Rossi
 
API Transformation in Crédit Agricole Italia
API Transformation in Crédit Agricole ItaliaAPI Transformation in Crédit Agricole Italia
API Transformation in Crédit Agricole Italia
 
Verso l’universo e oltre
Verso l’universo e oltreVerso l’universo e oltre
Verso l’universo e oltre
 
WSO2 ITALIA SMART TALK #10 - Interoperability nelle utility, un caso reale
WSO2 ITALIA SMART TALK #10 - Interoperability nelle utility, un caso realeWSO2 ITALIA SMART TALK #10 - Interoperability nelle utility, un caso reale
WSO2 ITALIA SMART TALK #10 - Interoperability nelle utility, un caso reale
 
WSO2 ITALIA SMART TALK #7 - Installare WSO2 in AWS: tips and tricks
 WSO2 ITALIA SMART TALK #7 - Installare WSO2 in AWS: tips and tricks WSO2 ITALIA SMART TALK #7 - Installare WSO2 in AWS: tips and tricks
WSO2 ITALIA SMART TALK #7 - Installare WSO2 in AWS: tips and tricks
 
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
 WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
WSO2 ITALIA SMART TALK #3 WSO2 IS NEW FEATURE
 
WSO2 ITALIA SMART TALK #9 - WSO2 IDENTITY SERVER & SPID: UN CASO REALE
WSO2 ITALIA SMART TALK #9 - WSO2 IDENTITY SERVER & SPID: UN CASO REALEWSO2 ITALIA SMART TALK #9 - WSO2 IDENTITY SERVER & SPID: UN CASO REALE
WSO2 ITALIA SMART TALK #9 - WSO2 IDENTITY SERVER & SPID: UN CASO REALE
 
WSO2 ITALIA SMARTTALK #8 ASYNCAPI.pdf
WSO2 ITALIA SMARTTALK #8 ASYNCAPI.pdfWSO2 ITALIA SMARTTALK #8 ASYNCAPI.pdf
WSO2 ITALIA SMARTTALK #8 ASYNCAPI.pdf
 
WSO2 ITALIA SMART TALK #6 - Autenticazione User Centric: Identità digitale
WSO2 ITALIA SMART TALK #6 - Autenticazione User Centric: Identità digitaleWSO2 ITALIA SMART TALK #6 - Autenticazione User Centric: Identità digitale
WSO2 ITALIA SMART TALK #6 - Autenticazione User Centric: Identità digitale
 
WSO2 ITALIA SMART TALK #5 - APIFICATION: OPPORTUNITÀ DELLE ORGANIZZAZIONI MOD...
WSO2 ITALIA SMART TALK #5 - APIFICATION: OPPORTUNITÀ DELLE ORGANIZZAZIONI MOD...WSO2 ITALIA SMART TALK #5 - APIFICATION: OPPORTUNITÀ DELLE ORGANIZZAZIONI MOD...
WSO2 ITALIA SMART TALK #5 - APIFICATION: OPPORTUNITÀ DELLE ORGANIZZAZIONI MOD...
 
WSO2 ITALIA SMART TALK #4 - Telefonica Use Case
WSO2 ITALIA SMART TALK #4 - Telefonica Use CaseWSO2 ITALIA SMART TALK #4 - Telefonica Use Case
WSO2 ITALIA SMART TALK #4 - Telefonica Use Case
 
WSO2 ITALIA SMART TALK 2023 #2- WSO2 APIM new Feature
WSO2 ITALIA SMART TALK 2023 #2- WSO2 APIM new FeatureWSO2 ITALIA SMART TALK 2023 #2- WSO2 APIM new Feature
WSO2 ITALIA SMART TALK 2023 #2- WSO2 APIM new Feature
 
PA NON TI DEMO: weModI e Interoperabilità delle PA...
PA NON TI DEMO: weModI e Interoperabilità delle PA...PA NON TI DEMO: weModI e Interoperabilità delle PA...
PA NON TI DEMO: weModI e Interoperabilità delle PA...
 
WSO2 ITALIA SMART TALK #1 - WSO2 diventa MODI e PDND compliant
WSO2 ITALIA SMART TALK #1 - WSO2 diventa MODI e PDND compliantWSO2 ITALIA SMART TALK #1 - WSO2 diventa MODI e PDND compliant
WSO2 ITALIA SMART TALK #1 - WSO2 diventa MODI e PDND compliant
 
WSO2 Oxygenate Italy 2022 CSI Piemonte. Marco Boero
WSO2 Oxygenate Italy 2022 CSI Piemonte. Marco BoeroWSO2 Oxygenate Italy 2022 CSI Piemonte. Marco Boero
WSO2 Oxygenate Italy 2022 CSI Piemonte. Marco Boero
 
WSO2 Oxygenate Italy 2022 Raiffeisen Information Service. Roberto Palmarin
WSO2 Oxygenate Italy 2022 Raiffeisen Information Service. Roberto PalmarinWSO2 Oxygenate Italy 2022 Raiffeisen Information Service. Roberto Palmarin
WSO2 Oxygenate Italy 2022 Raiffeisen Information Service. Roberto Palmarin
 

Dernier

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le identità digitali

  • 1.
  • 2. Iscriviti al gruppo Linkedin WSO2 Italia per entrare nella community italiana, conoscere la tecnologia WSO2 e condividere strategie di integrazione e use cases
  • 3. WSO2 API Manager Addresses full API lifecycle management operations. Open, extensible, customizable. WSO2 Enterprise Integrator Hybrid integration platform for quick, iterative integration of any application, data, or system. WSO2 Identity Server Federates and manages identities across both cloud service and enterprise environments. WSO2 Technology WSO2 Open Banking A purpose-built technology platform for global open banking. WSO2 Open Healthcare Towards greater interoperability with a proven integration platform and FHIR® . WSO2 Strategic Consulting Streamline your business objectives and rapidly achieve key results. Together, with hundreds of the world’s largest corporations, leading universities, and governments, we execute in excess of 6 trillion transactions, expose more than 200,000 APIs, and manage over 100 million identities every single year.
  • 4. WSO2 Identity Server Federates and manages identities across both cloud service and enterprise environments.
  • 6. WSO2 Identity & Access Management The WSO2 Identity Server is the #1 open source IAM product with comprehensive capabilities for identity federation, strong customer authentication, adaptive access control and API security. Highlights: ❖ Comprehensive identity federation, single sign-on & global sign-off capabilities ❖ Extensive set of adaptive access control capabilities ❖ Comprehensive API and Microservices Security ❖ Open, extensible architecture for unique business needs; rich connector ecosystem ❖ Container-friendly deployments
  • 7. High-level Capability Breakdown Identity Federation and SSO Identity Bridging Strong and Adaptive Access Control Identity Provisioning and Administration Authorization API & Microservice Security Consent Management
  • 9. Identity Federation & Single Sign-On (SSO) ❖ Business users need access to multiple heterogeneous applications. ➢ Cloud and on-premises applications ➢ Consumers, enterprise customers, partners, workforce applications ➢ Web, mobile web, mobile native, SaaS, IoT device applications ❖ Single Sign-On and Single Logout across identity federation protocols ➢ Claim and Role transformation ➢ Standard identity federation protocols
  • 10. Federation with Identity Providers ❖ Provide access to users from trusted internal identity providers (B2E) ❖ Provide access to partners or customers from trusted external identity providers (B2B) ➢ Example: Authenticate users in ADFS to Salesforce ❖ Provide social login/sign-up for your consumer websites (B2C) ❖ The same set of standard identity federation protocols are available for outbound authentication requests as well
  • 11. Log-in Journey The log-in journey of a user to a particular application is defined as a sequence of authentication steps (MFA). Each authentication step can provide the user with multiple authentication options (authenticator). A user MUST authenticate successfully AT EACH authentication step using AT LEAST ONE authentication option. ❖ Classification based on : ➢ responsibility of user authentication ➢ user experience in service provider ➢ user experience ➢ user experience defined by PSD2
  • 12. Request-based Step-up Authentication ❖ Required Level of Assurance (LoA) ➢ Authentication ContextClassRef in SAML2 ➢ ‘acr’ in OpenID Connect ➢ custom HTTP parameters View Balance Fund Transfer
  • 14. Environment-based Step-up Authentication ❖ Location (home/work) ❖ IP / IP-Range ❖ Device (trusted/untrusted/new)
  • 15. Identity-based Step-up Authentication ❖ Group Role ❖ Attributes
  • 16. Risk-based Authentication ❖ Login patterns (time of the day, day of the week, etc.) ❖ Last successful login time ❖ Typing speed ❖ Consecutive incorrect password attempts
  • 18. Directory Integration ❖ Support for primary and multiple secondary user stores ❖ Supports read-only user stores
  • 19. Identity Management ❖ User Profile ➢ User attributes ➢ User credentials ➢ User groups ➢ User roles ❖ User Onboarding Workflows ➢ Admin Creation Workflow ➢ Invitation Workflow ➢ Self-Registration Workflow ➢ Just-in-time (JIT) Provisioning Workflow ➢ Bulk user onboarding workflow ❖ Users/Groups/Roles Management ➢ By administrator ➢ Self-service profile management ➢ Inbound Provisioning Endpoints: ■ SCIM 2.0 ■ Self-registration API ➢ Outbound provisioning connectors ■ E.g. SCIM 2.0, Google Apps, Microsoft Azure ■ Rule-based ➢ Identity Verification / Proofing ■ E.g. Evident ➢ Multi-level Approvals ➢ Username recovery ➢ Identity Integration Workflows, Business ❖ Processes and Business Rules with WSO2 ❖ Enterprise Integrator
  • 20. Identity Management ❖ Identity Change Events: ➢ USER_UPDATE ➢ USER_DELETION ➢ PASSWORD_UPDATE ➢ GROUP_CHANGE ➢ ROLE_CHANGE ❖ Identity Event Triggers: ➢ Admin-initiated actions ➢ Self-service actions ➢ System-initiated lifecycle state transitions ❖ Identity Lifecycle ➢ States: ■ PENDING ■ ACTIVE ■ LOCKED ■ INACTIVE ➢ State Transitions Events: ■ ACCOUNT_CREATED ■ ACCOUNT_CONFIRMED ■ ACCOUNT_LOCKED_INVALID_PASSWORD ■ ACCOUNT_LOCKED_INVALID_CHALLENGE_QUESTION_ANSWER ■ ACCOUNT_UNLOCKED_TIMEOUT ■ ACCOUNT_UNLOCKED_ADMIN ■ ACCOUNT_DEACTIVATED_IDLE ❖ Features ➢ Account confirmation via email address and/or mobile number verification ➢ Email address and mobile number verification for existing accounts and on change event
  • 21. ❖ Admin-initiated ➢ Password reset ➢ Admin-initiated password reset workflow ❖ Password policies ➢ Password complexity ➢ Password rotation ➢ Password history ❖ Self-service ➢ Set password on account confirmation for invitation workflow ➢ On first log-in: ■ Set password ■ Set challenge questions/answers ➢ Password reset ➢ Challenge questions/answers ➢ Password recovery using: ■ Email address verification ■ Mobile number verification ■ Challenge question answers Password management
  • 22. Inbound and Outbound Provisioning ❖ Inbound: Users and groups can be provisioned into the WSO2 IS ➢ Outbound: Users and groups can be provisioned from WSO2 IS to external systems ➢ Supports SCIM 2.0 and SOAP (proprietary) APIs for inbound provisioning ➢ Supports SCIM 2.0, Salesforce, Google Apps, Microsoft Azure, etc. for outbound provisioning
  • 23. Just-in-Time (JIT) Account Provisioning Provision accounts for users from a federated IdP at the time of first login. User story - A Company wishes to have social login with Facebook and Twitter for its consumer website, but also wishes to manage a profile-lite for its users for offline communication purposes.
  • 24. Approval Workflows ❖ Multi-step / multi-option approval template (similar to authentication) ❖ Approval option - either a user or a role ❖ Out-of-the-box supports for user or group management operations. ❖ Trigger conditions, e.g. ‘trigger workflow only if user is in the ‘manager’ group. ❖ Out-of-the-box integrates with ❖ WSO2 Business Process Server (BPS) User story - students who are added to a particular academic year group have to be approved by the administrators of that group.
  • 25. Self-Care Portal Putting the user at the center of the action
  • 27. ❖ Coarse-grained entitlements are managed centrally and enforced both centrally and in the application ➢ Create and manage roles ➢ Manage user roles ➢ Manage virtual role mappings for federated users ➢ Conditional log-in managed and enforced centrally via XACML 3.0 authorization policies ➢ Coarse-grained authorization managed centrally and enforced in the application via ■ Sending user roles in the log-in response ■ Querying user roles via SCIM 2.0 API ■ Evaluating user roles via XACML 3.0 Rest/JSON API Role-Based Access Control (RBAC)
  • 28. Permission-Based Access Control ❖ Fine-grained entitlements are managed centrally ➢ Permission = resource + corresponding action ➢ Fine-grained resources and actions ➢ Hierarchical resources ➢ Typed-Resource-level permissions ➢ Role is a named collection of permissions ➢ Users are assigned to roles ➢ Permissions are assigned to user groups ➢ User entitlements are sent to the application in the log-in response ➢ SCIM 2.0 API to query user entitlements ➢ XACML 3.0 Rest/JSON API to evaluate user entitlements
  • 29. Attribute-Based Access Control (ABAC) ❖ Fined-grained entitlements are managed centrally and enforced in the application ➢ Fine-grained ➢ Instance-level authorization ➢ Policy-based / Rule-based access control (PBAC) ➢ XACML 3.0 Rest/JSON API ➢ Plug-in model available for PIPs, PRPs, functions, combining algorithms and other language constructs
  • 30. OAuth2 ❖ OAuth 2.0 is a framework to delegate authorization to resources (APIs) ❖ OAuth 2.0 by design can limit the authorization to resources by, ➢ resource owner (user) ➢ resource owner consent ➢ client (application) ➢ authorization expiry time (token lifetime) ➢ additional Authorization Server policies (via scopes) ❖ Orchestrates an approval interaction between the resource owner and the authorization server ❖ Resource owners can manage and revoke authorization grants at any time
  • 31. OAuth2 Grant Flow ❖ 5 core grant flows ➢ Authorization Code ➢ Implicit ➢ Resource Owner Password ➢ Client Credentials ➢ Refresh Token ❖ Extended grant flows ➢ SAML2 Bearer Assertion ➢ JWT Bearer Assertion ❖ Custom grant flows ➢ Kerberos grant flow ➢ NTLM grant flow
  • 32. Federated Authorization ❖ UMA 2.0 is a federated authorization protocol built on top of OAuth 2.0 ➢ UMA defines a workflow that creates authorization policies on a centralized authorization server for resource owners to control the access to their protected resources
  • 34. ❖ Increased attack surface ❖ Authentication and authorization needed at each service ❖ Each microservice is a responsibility of a single team → Data security is also their responsibility ❖ Username/password is an option but self-signed JWT is better Securing Microservices
  • 35. Analytics, Alerts and Audit-trails
  • 36. Analytics Integrated with: ❖ Wso2 Analytics ❖ ELK ❖ Splunk
  • 38. Multy tenancy ❖ WSO2’s organization model, also technically known as multi-tenancy, is built with the intention of supporting IDaaS offerings. ❖ In other words, WSO2 Identity Server is capable of hosting multiple organizations in the same runtime instance. ❖ With WSO2’s in-JVM multi-tenancy, you get API level isolation. ❖ With WSO2’s in-JVM multi-tenancy, you don’t get execution or data-level isolation. ❖ While the primary userstore is physically shared but logically separate, the secondary userstores are physically and logically separate. ❖ With increasing number of tenants, tenant sharding/partitioning deployment models are available to support horizontal scalability (beyond 1000 tenants).
  • 39. White-labeled Pages & Custom Themes
  • 40. Standards ❖ SAML2 Web Browser SSO, SAML2 Single Logout, SAML2 Artifact Resolution Profile, ❖ SAML2 Assertion Query/Request Profile, SAML2 Basic Attribute Profile, SAML2 SSO Metadata, Electronic Identification Authentication and Trust Services (eIDAS) ❖ OAuth 2.0, OAuth2 Bearer Token Usage, SAML 2.0 Profile for OAuth 2.0, JWT Profile for OAuth 2.0, OAuth 2.0 Token Revocation, OAuth 2.0 Token Introspection, OAuth 2.0 ❖ Form Post Response Mode, Proof Key for Code Exchange, MicroProfile JWT ❖ OpenID Connect 1.0 (except Front Channel Logout) ❖ UMA 2.0 ❖ WS Security 1.0/1.1, SAML Token Profile Version 1.1, Kerberos Token Profile Version 1.1, X.509 Certificate Token Profile Version 1.1, WS-Secure Converstation 1.3, ❖ WS-SecurityPolicy 1.1/1.2 ❖ WS-Trust 1.3/1.4 ❖ WS-Federation Passive Requestor Profile 1.2 (SAML 1.1), CAS v3.0 ❖ Lightweight Directory Access Protocol (LDAP/S) v3, SCIM 1.1/2.0 ❖ XACML 2.0/3.0 ❖ Fast Identity Online (FIDO) Universal Two Factor (U2F) ❖ General Data Protection Regulation (GDPR)
  • 42. WSO2 Identity Server Connectors Connectors for: ❖ Outbound federation ❖ Social login ❖ Infrastructure-as-a-Service (IaaS) ❖ Software-as-a-Service (SaaS) ❖ Identity-as-a-Service (IDaaS) ❖ Identity Proofing ❖ Security-as-a-Service (SECaaS) ❖ Outbound provisioning ❖ Hardware and software 2FA ❖ Mobile biometric authentication ❖ Identity Stores ❖ Cloud Directories ❖ Identity Server Rest API Security ❖ Authorization ❖ Hardware Security Module
  • 44. Deployment Pattern 1 ❖ Highly available deployment of WSO2 Identity Server ➢ Minimum recommendation is 2 active/active nodes ❖ Deployment for scalability ➢ TPS based scaling (Single node can handle up to 34 million authentication requests per day) ➢ Horizontal auto-scaling via AWS/Azure/Google App Engine or container platforms such as K8S/Docker or OpenShift
  • 45. Deployment Pattern 2 ❖ Highly available deployment of WSO2 IS and WSO2 IS Analytics ➢ Minimum recommendation is 2 active/active IS nodes and 2 active/passive IS Analytics nodes ❖ Deployment for scalability ➢ TPS Based Scaling (Single IS Analytics node can handle up to 3000 event per second) ❖ IS Analytics doesn’t support horizontal dynamic scaling but events published by upto 10 IS nodes
  • 47. What's New in Next Releases - WSO2 Identity Server 5.12 and Beyond
  • 48. 48 WSO2 Identity Server Roadmap Summary Phase I - near term Make the current product offering API-driven, developer focused and cloud native. Deploy in the cloud (WSO2 Identity Cloud) to provide core Identity functionality targeting CIAM. 2020/2021 Phase II - mid term Expand IAM ecosystem around Identity Server / WSO2 Identity Cloud by integrating and building technical partnerships with IAM vendors outside the access management segment (analytics, risk-based authentication, etc) 2021 / 2022 Phase III - long term Build an integrated CIAM solution in the cloud (WSO2 Identity Cloud). Out-of-the-box integrations with consent and preference management systems, CRM systems, marketing platforms/solutions, content management systems, data management platforms, etc. 2022+ All information pertaining to WSO2 Identity Cloud is strictly confidential until the offering launches in July 2021. At that time, the Identity Cloud roadmap information will be publicly available.
  • 49. 49 ● Launch WSO2 Identity Cloud beta on top of Identity Server v5.12.0 as the base version. ● WSO2 Identity Cloud will support connecting to an on-prem identity store from the cloud ● Improved user experience with React based SPAs for self care, console (for devs and admins) ● Authentication SDKs (JS, React, Angular, Java, Android, .Net) and samples ● Authentication agents for Tomcat for SAML 2.0 and OIDC ● Developer tooling (VS Code plugin for adaptive scripts) ● Multiple Attribute login support ● Rest API for Multi Factor Authentication - SMS/Email OTP, TOTP, FIDO2 ● Organization Management - B2B business use cases Phase I: WSO2 Identity Cloud GA and WSO2 IS 5.12 - July 2021
  • 50. 50 Phase II: 2021 Q4/2022 ● Provide integration option with identity verification and proofing systems (EvidentID, IDEMEA, Jumio, Socure) ● Expand strong authentications options with biometric and passwordless authentication provider integrations (HYPR, Trusona, Typing DNA, Veridium, BehavioSec, etc.) ● Enhance cloudnative ecosystem integrations (log analytics: ELK, key rotation: Hashicorp Vault, AWS KMS, Azure KMS) and onboard to WSO2 Identity Cloud ● Enhance SIEM integrations ( LogRhythm). ● Evaluate and build deep integrations with Ellucian, AWS, Office365 etc. ● Get the WSO2 Identity Cloud audited for SOC 2, HIPAA and PCI DSS, and build regional deployments of WSO2 Identity Cloud to be compliant with regulatory requirements. ● Integrate with fraud detection systems (ThreatMetrix etc.) ● Integrate bot detection and mitigation systems (Imperva etc), to protect WSO2 Identity Cloud ● Deploy connectors/extensions as Docker containers
  • 51. 51 Phase III: 2022+ ● Provide integration options with 3rd party consent and preference management vendors: Consent Systems, Didomi, KnowNow Information, Tealium, TrustArc. ● A web form designer for progressive profiling, that can be embedded into content management systems ● Templated data orchestration flows between identity stores, CRM systems, CDM systems, marketing automation platforms. ● Build out-of-the-box data-level integrations with MailChimp, Google Analytics, and Salesforce Pardot (marketing platforms) in WSO2 Identity Cloud. ● Build out-of-the-box data-level integrations with Shopify, Magneto, Oracle Micros (ecommerce platforms) in WSO2 Identity Cloud. ● Build out-of-the-box data-level integrations with SharePoint, Drupal, WordPress, and Joomla (content management systems) in out-of-the-box.
  • 52. Q&A?
  • 54. Contatti DOVE SIAMO Milano - Torino - Padova - Roma TELEFONO Torino +39-011-0120371 EMAIL wso2.sales@profesia.it @