SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
Consumerizing Industrial 
IoT Access Control 
Using UMA to Add Privacy and 
Usability to Strong Security 
FORGEROCK.COM 
Eve Maler 
VP Innovation & Emerging Technology 
eve.maler@forgerock.com 
@xmlgrrl 
October 2014
2 
Agenda 
■ Who am I? 
■ Authorization challenges 
■ Testing out web authorization solutions 
■ Introducing User-Managed Access (UMA) 
■ Conclusions and future work
Constrained environments 
present major authorization 
challenges 
h/t @gffletch, @domcat
4 
We need it for Internet-connected 
dishwashers… 
flickr.com | n1ct4yl0r | CC BY-NC-ND 2.0 | link
5 
…smart medical thingies…
6 
…and Solar Freakin’ Roadways
7 
What are the requirements? 
Scale Discovery
8 
What are the requirements? 
Privacy Flexibility 
flickr.com | ahilliker | CC BY-NC-ND 2.0 | link
9 
What are the requirements? 
Partitioning
How far do existing web 
authorization and consent 
technologies take us? 
flickr.com | smemon | CC BY 2.0 | link
11 
Extensible Access Control 
Markup Language (XACML) 
Scale 
Discovery 
Privacy 
Flexibility 
Partitioning 
X 
X 
? 
X 
?
12 
OAuth 2.0 Authorization 
Framework 
Scale 
Discovery 
Privacy 
Flexibility 
Partitioning 
? 
? 
? 
?
13 
How do we share data informally 
on the web? It’s not good…
flickr.com | thomashawk | CC BY-NC 2.0 | link 
Introducing User-Managed 
Access (UMA)
15 
UMA in a nutshell 
■ Draft standard for “authorization V.next” 
■ Profile and application of OAuth V2.0 
■ Set of authorization, privacy, and consent APIs 
■ Work Group of the Kantara Initiative 
■ Founder, chair, and “chief UMAnitarian”: 
■ Heading to V1.0 in Q1 2015 
■ In interop testing now
16 
The UMA protocol enables key 
new selective sharing options 
I want to share this stuff 
selectively 
• Among my own apps 
• With family and friends 
• With organizations 
I want to protect this stuff 
from being seen by everyone 
in the world 
I want to control access 
proactively, not just feel forced 
to consent over and over
17 
Under the hood, it’s “OAuth++” 
Loosely coupled to enable 
an AS to onboard multiple 
RS’s, residing in any security 
domains 
This concept is new, to enable 
person-to-person sharing 
driven by RO policy vs. run-time 
consent
18 
UMA is about interoperable, 
RESTful authorization-as-a-service 
Has standardized APIs 
for privacy and 
“selective sharing” 
Outsources protection to 
a centralizable 
authorization server 
“authz 
provider” 
(AzP) 
“authz 
relying 
party” 
(AzRP) 
identity 
provider 
(IdP) 
SSO 
relying 
party 
(RP)
19 
UMA-enabled systems can 
respect policies such as… 
Only let my tax preparer with email 
TP1234@gmail.com and using client 
app TaxThis access my bank account 
data if they have authenticated 
strongly, and not after tax season is 
over. 
Let my health aggregation app, my 
doctor’s office client app, and the 
client for my husband’s employer’s 
insurance plan (which covers me) 
get access to my wifi-enabled scale 
API and my fitness wearable API to 
read the results they generate. 
When a person driving a vehicle with an 
unknown ID comes into contact with 
my Solar Freakin’ Driveway, alert me 
and require my access approval.
20 
The user 
experience 
can simulate 
OAuth or 
proprietary 
sharing 
paradigms, or 
even be invisible 
(“better than 
OAuth”)
21 
The RS 
exposes 
whatever 
value-add API 
it wants, 
protected by 
an AS 
The RPT is the main 
“access token” and (by 
default – it’s profilable) is 
associated with time-limited, 
scoped 
permissions 
App-specific API 
UMA-enabled 
client 
RPT 
requesting party 
token
22 
The AS 
exposes an 
UMA-standardized 
protection 
API to the RS 
The PAT protects the 
API and binds the RO, 
RS, and AS 
Protection API 
Protection client 
PAT 
protection API token 
• Resource registration endpoint 
• Permission registration endpoint 
• Token introspection endpoint
23 
The AS 
exposes an 
UMA-standardized 
authorization 
API to the 
client 
The AAT protects the API 
and binds the RqP, client, 
and AS 
The client may be told: 
“need_claims” 
Authorization API 
AAT 
Authorization client 
authorization API token 
• Authorization request endpoint
24 
The AS can collect requesting 
party “claims” to assess policy 
A “claims-aware” client can 
proactively push an OpenID 
Connect ID token, a SAML 
assertion, a SCIM record, or 
other available user data to the 
AS per the access federation’s 
trust framework 
A “claims-unaware” client can, at 
minimum, redirect the 
requesting party to the AS to log 
in, press an “I Agree” button, fill 
in a form, follow a NASCAR for 
federated login, etc.
25 
Applying the UMA paradigm to a 
fitness wearable use case 
■ The device user is the resource owner, 
with discretionary resource access 
control rights 
– Access control confers proactive privacy 
capabilities through policy 
■ The device+service combination is likely 
to use an (out-of-band wrt UMA) 
constrained-device IoT protocol
26 
Benefits of the approach 
■ Flexibility in binding an individual to a device and to a corresponding service 
account 
– Enables persistent or temporary device controllers 
■ Flexibility and centralization in letting an individual choose sharing settings 
– Accommodating OAuth-style sharing with apps that the device user himself uses and also third 
parties 
■ Comprehensive yet simple platform approach to device service protection 
and access control 
– Enabling third-party services and devices to join an ecosystem 
■ Future-proofing if the platform operator needs to outsource protection to 
regulation-driven, consumer-driven, or healthcare-ecosystem-driven 
authorization services
27 
Concept mappings 
■ Device user 
■ Device + service 
■ Device certificate 
■ Service APIs exposing PII 
■ IoT identity/authorization platform 
■ PII-accessing web/native app 
■ PII-accessing app credentials 
■ User of PII-accessing app 
■ Onboarding device + user 
■ Onboarding app + user 
■ Device user sharing policy 
■ Dynamic entitlement management 
■ UMA resource owner (RO) 
■ UMA resource server (RS) 
■ UMA RS OAuth client credentials 
■ UMA protected resources 
■ UMA authz server (AS) 
■ UMA client 
■ UMA client OAuth client credentials 
■ UMA requesting party (RqP) 
■ Protection API token (PAT) 
■ Authz API token (AAT) 
■ RqP claims-gathering 
■ UMA requesting party token (RPT)
Conclusion and next steps
29 
UMA use-case scenario domains 
Health 
Financial 
Education 
Personal 
Citizen 
Media 
Behavioral 
Web 
Mobile 
API 
IoT
30 
UMA wrt the the “ACE actors” 
Partitioning
31 
How does User-Managed 
Access do? 
Scale 
Discovery 
Privacy 
Flexibility 
Partitioning 
?
32 
Next steps and future work 
■ A variety of IoT, web, and API case studies have been 
contributed 
■ Enterprise API use cases have been deployed in 
production 
■ Open source is available and more is expected 
■ Intel has done an experimental industrial IoT 
implementation in node.js 
■ V1.0 of the protocol is slated to be completed in Q1 
2015 
■ Further IoT investigation on disconnected operation 
modes, proof-of-possession tokens, etc. is warranted
Thank you! 
FORGEROCK.COM 
Eve Maler 
VP Innovation & Emerging Technology 
eve.maler@forgerock.com 
@xmlgrrl

Contenu connexe

Tendances

Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Ping Identity
 
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CloudIDSummit
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA Ping Identity
 
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...ForgeRock
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At CompliancePing Identity
 
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesIdentity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesPing Identity
 
Protecting APIs from Mobile Threats- Beyond Oauth
Protecting APIs from Mobile Threats- Beyond OauthProtecting APIs from Mobile Threats- Beyond Oauth
Protecting APIs from Mobile Threats- Beyond OauthApigee | Google Cloud
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Ping Identity
 
B4 the identity of things-securing the internet of everything
B4   the identity of things-securing the internet of everythingB4   the identity of things-securing the internet of everything
B4 the identity of things-securing the internet of everythingDr. Wilfred Lin (Ph.D.)
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationSylvain Maret
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise ReportOkta-Inc
 
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...CA API Management
 
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)ForgeRock
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016 ForgeRock
 
Identity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael DowlingIdentity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael DowlingForgeRock
 
OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater Apigee | Google Cloud
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsPing Identity
 

Tendances (20)

Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
 
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
 
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM PracticesIdentity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
 
Protecting APIs from Mobile Threats- Beyond Oauth
Protecting APIs from Mobile Threats- Beyond OauthProtecting APIs from Mobile Threats- Beyond Oauth
Protecting APIs from Mobile Threats- Beyond Oauth
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
 
B4 the identity of things-securing the internet of everything
B4   the identity of things-securing the internet of everythingB4   the identity of things-securing the internet of everything
B4 the identity of things-securing the internet of everything
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web Application
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
Trust No One: The New Security Model for Web APIs - SecTor talk by Greg Kliew...
 
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
 
ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016  ForgeRock Platform Release - Summer 2016
ForgeRock Platform Release - Summer 2016
 
Identity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael DowlingIdentity Live Sydney 2017 - Michael Dowling
Identity Live Sydney 2017 - Michael Dowling
 
OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of Things
 

En vedette

Webinar: Enlighted Technology Overview
Webinar: Enlighted Technology OverviewWebinar: Enlighted Technology Overview
Webinar: Enlighted Technology OverviewEnlightedInc
 
Enterprise World 2014 - Manufacturing Industry Breakout Session
Enterprise World 2014 - Manufacturing Industry Breakout SessionEnterprise World 2014 - Manufacturing Industry Breakout Session
Enterprise World 2014 - Manufacturing Industry Breakout SessionMark Morley, MBA
 
ESP8266 and IOT
ESP8266 and IOTESP8266 and IOT
ESP8266 and IOTdega1999
 
Home automation using internet of things
Home automation using internet of thingsHome automation using internet of things
Home automation using internet of thingsAbhishek Bhadoria
 
Esp8266 - Intro for dummies
Esp8266 - Intro for dummiesEsp8266 - Intro for dummies
Esp8266 - Intro for dummiesPavlos Isaris
 
HOME AUTOMATION USING ARDUINO
HOME AUTOMATION USING ARDUINOHOME AUTOMATION USING ARDUINO
HOME AUTOMATION USING ARDUINOEklavya Sharma
 
Home automation using IoT
Home automation using IoTHome automation using IoT
Home automation using IoTAthira_1993
 
ppt on embedded system
ppt on embedded systemppt on embedded system
ppt on embedded systemmanish katara
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 

En vedette (14)

Webinar: Enlighted Technology Overview
Webinar: Enlighted Technology OverviewWebinar: Enlighted Technology Overview
Webinar: Enlighted Technology Overview
 
Enterprise World 2014 - Manufacturing Industry Breakout Session
Enterprise World 2014 - Manufacturing Industry Breakout SessionEnterprise World 2014 - Manufacturing Industry Breakout Session
Enterprise World 2014 - Manufacturing Industry Breakout Session
 
WiFi SoC ESP8266
WiFi SoC ESP8266WiFi SoC ESP8266
WiFi SoC ESP8266
 
Lighting as-a-service
Lighting as-a-serviceLighting as-a-service
Lighting as-a-service
 
ESP8266 and IOT
ESP8266 and IOTESP8266 and IOT
ESP8266 and IOT
 
Home automation using internet of things
Home automation using internet of thingsHome automation using internet of things
Home automation using internet of things
 
Esp8266 - Intro for dummies
Esp8266 - Intro for dummiesEsp8266 - Intro for dummies
Esp8266 - Intro for dummies
 
HOME AUTOMATION USING ARDUINO
HOME AUTOMATION USING ARDUINOHOME AUTOMATION USING ARDUINO
HOME AUTOMATION USING ARDUINO
 
Home automation using IoT
Home automation using IoTHome automation using IoT
Home automation using IoT
 
ppt on embedded system
ppt on embedded systemppt on embedded system
ppt on embedded system
 
Smart homes
Smart homesSmart homes
Smart homes
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 

Similaire à Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usability to Strong Security

Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAkantarainitiative
 
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESSNEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESSForgeRock
 
API Security In Cloud Native Era
API Security In Cloud Native EraAPI Security In Cloud Native Era
API Security In Cloud Native EraWSO2
 
An Overview of OPC UA Security
An Overview of OPC UA SecurityAn Overview of OPC UA Security
An Overview of OPC UA SecuritySadatulla Zishan
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsGeorge Fletcher
 
API Security: Does My Business Need OAuth?
API Security: Does My Business Need OAuth?API Security: Does My Business Need OAuth?
API Security: Does My Business Need OAuth?Akana
 
OAuth big picture
OAuth big pictureOAuth big picture
OAuth big pictureMin Li
 
Datasheet over privileged_users
Datasheet over privileged_usersDatasheet over privileged_users
Datasheet over privileged_usersCristian Garcia G.
 
OAuth 2 Spring Boot 3 Integration Presentation
OAuth 2 Spring Boot 3 Integration PresentationOAuth 2 Spring Boot 3 Integration Presentation
OAuth 2 Spring Boot 3 Integration PresentationKnoldus Inc.
 
CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCloudIDSummit
 
FIWARE Identity Management and Access Control
FIWARE Identity Management and Access ControlFIWARE Identity Management and Access Control
FIWARE Identity Management and Access ControlFernando Lopez Aguilar
 
attacks-oauth-secure-oauth-implementation-33644.pdf
attacks-oauth-secure-oauth-implementation-33644.pdfattacks-oauth-secure-oauth-implementation-33644.pdf
attacks-oauth-secure-oauth-implementation-33644.pdfMohitRampal5
 
API Security: Does My Business Need OAuth?
API Security: Does My Business Need OAuth?API Security: Does My Business Need OAuth?
API Security: Does My Business Need OAuth?Akana
 
Introduction to Gravitational Teleport
Introduction to Gravitational TeleportIntroduction to Gravitational Teleport
Introduction to Gravitational TeleportTeleport
 
Securing FIWARE Architectures
Securing FIWARE ArchitecturesSecuring FIWARE Architectures
Securing FIWARE ArchitecturesFIWARE
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
Mohanraj - Securing Your Web Api With OAuth
Mohanraj - Securing Your Web Api With OAuthMohanraj - Securing Your Web Api With OAuth
Mohanraj - Securing Your Web Api With OAuthfossmy
 

Similaire à Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usability to Strong Security (20)

Extending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMAExtending the Power of Consent with User-Managed Access & OpenUMA
Extending the Power of Consent with User-Managed Access & OpenUMA
 
UMA for ACE
UMA for ACEUMA for ACE
UMA for ACE
 
Uma webinar 2014 03-20
Uma webinar 2014 03-20Uma webinar 2014 03-20
Uma webinar 2014 03-20
 
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESSNEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
 
API Security In Cloud Native Era
API Security In Cloud Native EraAPI Security In Cloud Native Era
API Security In Cloud Native Era
 
An Overview of OPC UA Security
An Overview of OPC UA SecurityAn Overview of OPC UA Security
An Overview of OPC UA Security
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open Standards
 
Oauth ebook-2012-02
Oauth ebook-2012-02Oauth ebook-2012-02
Oauth ebook-2012-02
 
API Security: Does My Business Need OAuth?
API Security: Does My Business Need OAuth?API Security: Does My Business Need OAuth?
API Security: Does My Business Need OAuth?
 
OAuth big picture
OAuth big pictureOAuth big picture
OAuth big picture
 
Datasheet over privileged_users
Datasheet over privileged_usersDatasheet over privileged_users
Datasheet over privileged_users
 
OAuth 2 Spring Boot 3 Integration Presentation
OAuth 2 Spring Boot 3 Integration PresentationOAuth 2 Spring Boot 3 Integration Presentation
OAuth 2 Spring Boot 3 Integration Presentation
 
CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open Standards
 
FIWARE Identity Management and Access Control
FIWARE Identity Management and Access ControlFIWARE Identity Management and Access Control
FIWARE Identity Management and Access Control
 
attacks-oauth-secure-oauth-implementation-33644.pdf
attacks-oauth-secure-oauth-implementation-33644.pdfattacks-oauth-secure-oauth-implementation-33644.pdf
attacks-oauth-secure-oauth-implementation-33644.pdf
 
API Security: Does My Business Need OAuth?
API Security: Does My Business Need OAuth?API Security: Does My Business Need OAuth?
API Security: Does My Business Need OAuth?
 
Introduction to Gravitational Teleport
Introduction to Gravitational TeleportIntroduction to Gravitational Teleport
Introduction to Gravitational Teleport
 
Securing FIWARE Architectures
Securing FIWARE ArchitecturesSecuring FIWARE Architectures
Securing FIWARE Architectures
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Mohanraj - Securing Your Web Api With OAuth
Mohanraj - Securing Your Web Api With OAuthMohanraj - Securing Your Web Api With OAuth
Mohanraj - Securing Your Web Api With OAuth
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 

Dernier (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 

Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usability to Strong Security

  • 1. Consumerizing Industrial IoT Access Control Using UMA to Add Privacy and Usability to Strong Security FORGEROCK.COM Eve Maler VP Innovation & Emerging Technology eve.maler@forgerock.com @xmlgrrl October 2014
  • 2. 2 Agenda ■ Who am I? ■ Authorization challenges ■ Testing out web authorization solutions ■ Introducing User-Managed Access (UMA) ■ Conclusions and future work
  • 3. Constrained environments present major authorization challenges h/t @gffletch, @domcat
  • 4. 4 We need it for Internet-connected dishwashers… flickr.com | n1ct4yl0r | CC BY-NC-ND 2.0 | link
  • 5. 5 …smart medical thingies…
  • 6. 6 …and Solar Freakin’ Roadways
  • 7. 7 What are the requirements? Scale Discovery
  • 8. 8 What are the requirements? Privacy Flexibility flickr.com | ahilliker | CC BY-NC-ND 2.0 | link
  • 9. 9 What are the requirements? Partitioning
  • 10. How far do existing web authorization and consent technologies take us? flickr.com | smemon | CC BY 2.0 | link
  • 11. 11 Extensible Access Control Markup Language (XACML) Scale Discovery Privacy Flexibility Partitioning X X ? X ?
  • 12. 12 OAuth 2.0 Authorization Framework Scale Discovery Privacy Flexibility Partitioning ? ? ? ?
  • 13. 13 How do we share data informally on the web? It’s not good…
  • 14. flickr.com | thomashawk | CC BY-NC 2.0 | link Introducing User-Managed Access (UMA)
  • 15. 15 UMA in a nutshell ■ Draft standard for “authorization V.next” ■ Profile and application of OAuth V2.0 ■ Set of authorization, privacy, and consent APIs ■ Work Group of the Kantara Initiative ■ Founder, chair, and “chief UMAnitarian”: ■ Heading to V1.0 in Q1 2015 ■ In interop testing now
  • 16. 16 The UMA protocol enables key new selective sharing options I want to share this stuff selectively • Among my own apps • With family and friends • With organizations I want to protect this stuff from being seen by everyone in the world I want to control access proactively, not just feel forced to consent over and over
  • 17. 17 Under the hood, it’s “OAuth++” Loosely coupled to enable an AS to onboard multiple RS’s, residing in any security domains This concept is new, to enable person-to-person sharing driven by RO policy vs. run-time consent
  • 18. 18 UMA is about interoperable, RESTful authorization-as-a-service Has standardized APIs for privacy and “selective sharing” Outsources protection to a centralizable authorization server “authz provider” (AzP) “authz relying party” (AzRP) identity provider (IdP) SSO relying party (RP)
  • 19. 19 UMA-enabled systems can respect policies such as… Only let my tax preparer with email TP1234@gmail.com and using client app TaxThis access my bank account data if they have authenticated strongly, and not after tax season is over. Let my health aggregation app, my doctor’s office client app, and the client for my husband’s employer’s insurance plan (which covers me) get access to my wifi-enabled scale API and my fitness wearable API to read the results they generate. When a person driving a vehicle with an unknown ID comes into contact with my Solar Freakin’ Driveway, alert me and require my access approval.
  • 20. 20 The user experience can simulate OAuth or proprietary sharing paradigms, or even be invisible (“better than OAuth”)
  • 21. 21 The RS exposes whatever value-add API it wants, protected by an AS The RPT is the main “access token” and (by default – it’s profilable) is associated with time-limited, scoped permissions App-specific API UMA-enabled client RPT requesting party token
  • 22. 22 The AS exposes an UMA-standardized protection API to the RS The PAT protects the API and binds the RO, RS, and AS Protection API Protection client PAT protection API token • Resource registration endpoint • Permission registration endpoint • Token introspection endpoint
  • 23. 23 The AS exposes an UMA-standardized authorization API to the client The AAT protects the API and binds the RqP, client, and AS The client may be told: “need_claims” Authorization API AAT Authorization client authorization API token • Authorization request endpoint
  • 24. 24 The AS can collect requesting party “claims” to assess policy A “claims-aware” client can proactively push an OpenID Connect ID token, a SAML assertion, a SCIM record, or other available user data to the AS per the access federation’s trust framework A “claims-unaware” client can, at minimum, redirect the requesting party to the AS to log in, press an “I Agree” button, fill in a form, follow a NASCAR for federated login, etc.
  • 25. 25 Applying the UMA paradigm to a fitness wearable use case ■ The device user is the resource owner, with discretionary resource access control rights – Access control confers proactive privacy capabilities through policy ■ The device+service combination is likely to use an (out-of-band wrt UMA) constrained-device IoT protocol
  • 26. 26 Benefits of the approach ■ Flexibility in binding an individual to a device and to a corresponding service account – Enables persistent or temporary device controllers ■ Flexibility and centralization in letting an individual choose sharing settings – Accommodating OAuth-style sharing with apps that the device user himself uses and also third parties ■ Comprehensive yet simple platform approach to device service protection and access control – Enabling third-party services and devices to join an ecosystem ■ Future-proofing if the platform operator needs to outsource protection to regulation-driven, consumer-driven, or healthcare-ecosystem-driven authorization services
  • 27. 27 Concept mappings ■ Device user ■ Device + service ■ Device certificate ■ Service APIs exposing PII ■ IoT identity/authorization platform ■ PII-accessing web/native app ■ PII-accessing app credentials ■ User of PII-accessing app ■ Onboarding device + user ■ Onboarding app + user ■ Device user sharing policy ■ Dynamic entitlement management ■ UMA resource owner (RO) ■ UMA resource server (RS) ■ UMA RS OAuth client credentials ■ UMA protected resources ■ UMA authz server (AS) ■ UMA client ■ UMA client OAuth client credentials ■ UMA requesting party (RqP) ■ Protection API token (PAT) ■ Authz API token (AAT) ■ RqP claims-gathering ■ UMA requesting party token (RPT)
  • 29. 29 UMA use-case scenario domains Health Financial Education Personal Citizen Media Behavioral Web Mobile API IoT
  • 30. 30 UMA wrt the the “ACE actors” Partitioning
  • 31. 31 How does User-Managed Access do? Scale Discovery Privacy Flexibility Partitioning ?
  • 32. 32 Next steps and future work ■ A variety of IoT, web, and API case studies have been contributed ■ Enterprise API use cases have been deployed in production ■ Open source is available and more is expected ■ Intel has done an experimental industrial IoT implementation in node.js ■ V1.0 of the protocol is slated to be completed in Q1 2015 ■ Further IoT investigation on disconnected operation modes, proof-of-possession tokens, etc. is warranted
  • 33. Thank you! FORGEROCK.COM Eve Maler VP Innovation & Emerging Technology eve.maler@forgerock.com @xmlgrrl