Top Banner
1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture
33

1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

Dec 19, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

1

Identity Management and Access Control Status

UNITS Forum, June 2006Tom Board, NUIT Info Systems

Architecture

Page 2: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

2

Agenda

• Current Project Status– Identity Management, Access Control,

Directory Services

• Futures– Multi-factor Authentication, Federation,

Trustworthiness, Roles

• Plans

• Short Q/A

Page 3: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

3

Definition: Identity Management

• Processes and policies to manage:– The assertion and identification of principals– The assignment of credentials– The granting of entitlements– The lifecycle of credentials– The retirement of credentials

• NetIDs, driver’s licenses, credit cards, Marlok, WildCard

Page 4: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

4

Definition: Access Control

• Access Control is the real-time, technical process of:– Examining and verifying credentials presented

by a principal (authentication)– Examining entitlements assigned to those

credentials, and deciding to allow or deny use of a resource (authorization)

– Logging access attempts and their results

• The goal: make access accountable to an individual – not impossible for anyone else

Page 5: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

5

Definition: Directory Services

• Directory services are database services which manage and expose the attributes of those entities requiring validation and authorization within the University network

• Services are multi-protocol– LDAP, Kerberos, Active Directory

Page 6: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

6

IdM/AC Project

• Replace locally-developed IdM software with a standards-based commercial package

• Add Web SSO – deployed!• Add multi-factor authentication• Support security services for a future Service-

Oriented Architecture deployment• Use workflows and roles to grant and remove

access• Support trustworthy federated services

Page 7: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

7

Replace Local IdM

• Replicate local IdM functions within a more readily maintained and rapidly extended environment

• Continue delegated administration

• Minimize visible changes for users

• Parallel operation and gradual migration

• Timeline: 10-12 months– January 2007 or June 2007

Page 8: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

8

Today

HR I SS E SM an u al

S N AP

M an u al

M an u al

Ad m is s io n s

S tu d en t S y sAu th _ z

M an u al

HR I SAu th _ z

M an u al

F in an c ia lsAu th _ z

M an u al

Ker b er o sAc tiv eD ir ec to r yS y n c h r o n iza tio n

S E S S e lf - S er v ic eHR I S S e lf - S er v ic e

C o u r s e M g m tT im e E n tr y

E - m ailC alen d ar in g

VP N /M o d em s

D ep ar tm en t S er v er s( N T 4 )

N o v ellS er v er s

M an u al

W in d o w sS er v er s

M an u al

D ep ar tm en t f ile &p r in t s e r v ic es

W in d o w s2 0 0 0 /0 3

LD A PR eg is t ry

Page 9: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

9

Tomorrow

HR I SS E SM an u al

I d M

M an u al

M an u al

Ad m is s io n s

L D APR eg is tr y

W e b S ingle S ign-O nE -m ail

C ale ndarC o urs e M anage m e nt

Tim e E ntryS tude nt R e c o rds

H um an R e s o urc e sF inanc ials

Ac tiv eD ir ec to ry

R e s e arc h

M an u al

B us ine s sP ar tne r s

Ac ade m icP ar tne r s

N e two rkVP N

K e rbe ro s

Fe de rat io nG ate way

E -m ailC ale ndar

C o urs e M anage m e ntS tude nt R e c o rds

H um an R e s o urc e sF inanc ials

W indo ws Se rve r s

P ro vis io ning

Page 10: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

10

Central AD Services

• New Windows 2003 R2 forest – June 2006– Migrate NUIT applications – October 2006– Migrate other applications – December 2006

• Shut down current forest – June 2007• Migrate synchronization of subsidiary

forests – June 2007+• Delegated OU services

– NUIT by December 2006– Open to other units early 2007?

Page 11: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

11

Futures

Multi-Factor Authentication

Page 12: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

12

Single Identity & Risk Aggregation

• Silos of identities and credentials give an illusion of security, but people won’t remember 10 passwords or carry five swipe cards– Supervisors must contact each silo to end access for

a separating employee

• A single identity and few credentials make the user’s job easier and separations rapid and reliable– However, a single identity and credential, valid on

many systems, increases risks if it is compromised

Page 13: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

13

Multi-factor Authentication

• Confidence in authentication can be increased by multiple credentials (factors)– “… two forms of identification …”– Password plus fingerprint, etc.

• Multiple factor authentication is expensive and inconvenient– Deployment should be targeted to protect high-value

information or transactions - not just ones where one might wish to be more confident

• Management of tokens is costly• Deployment of biometrics is very costly

Page 14: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

14

Strategy

• Deploy two-factor authentication to mitigate aggregated risk of single identity (NetID) and password.

• But, target deployments to control cost and support complexity

• Carefully coordinate between token-issuing offices (WildCard, FM) to combine tokens where possible.

Page 15: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

15

Futures

Federation

Page 16: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

16

Federation

• A federation is a group of identity realms which agree to accept one-another’s assertions of authentication (e.g. inCommon)

• Federated authentication is a necessary future step to minimize the overhead of operating collaborative groups and vendor relationships– Other research universities and centers– Government agencies– Suppliers (pair-wise)

• Federation is built on trust in the validity of your partner’s authentication processes

Page 17: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

17

Federation

• Can “B” trust “A”?

• What if “A” is wrong?

LD A P Re g is t ry

Ins titu tionporta l pa ge

S A M L

SAM Lgate way

SAM Lgate way

T a rge tre s ourc e

Insti tu tion A Insti tu tion B

Page 18: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

18

NU Federation Issues

• How will NU negotiate federations?

• Will federated authentication be transitive?

• What about authorization?

Page 19: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

19

Futures

Trustworthiness(or Level-of-Assurance)

Page 20: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

20

Trustworthiness of a Credential

• For a given credential, trustworthiness quantifies the level of confidence an Access Control process can place in the assertion, “This credential is being presented by the exact principal to whom it was associated in the Identity Management process.”

• Trustworthiness comes from both confidence in the identity itself and properties of the credential– Process of identifying the principal and issuing the credential– Managing the credential over time– Inherent difficulty in abusing or forging the credential– Process for retiring the credential

Page 21: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

21

Northwestern’s Identity Structure

Authority

IdentityManagementPrincipal

id e n tifica tio n

Identity

Attributes BusinessRules

CredentialService

AuthenticationService

issu a n ce

issu a n ce

Portal

a u th e n tica tio n

Identifier

ma in te n a n ce

Cre de n tialM ain te nance

acc

ess

att

em

pt

(sp

oo

fing

, m

isu

se,

rece

nt

tam

pe

rin

g)

TargetService

Fe de rationGateway

Fe de rationGatewayfe d e ra tio n

access a ttemp t

TargetService

a u th o r iza tio n

a sse rtio n

ma n a g e me n t

issu a n ce

cre

atio

n/m

ain

ten

an

ce

a u th o r iza tio n

Page 22: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

22

Trustworthiness is Real Issue

• Some trustworthiness decisions are made for us by others:– Department of Education “Standards for Electronic

Signatures in Electronic Student Loan Transactions”

• Federal Personal Identity Verification program:– Confidence: SOME, HIGH, and VERY HIGH

• Government e-authentication program will use federation – which relies upon our institutional trustworthiness

Page 23: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

23

NU Trustworthiness Issues

• Will trustworthiness requirements drive less convenient identity procedures?

• NU must decide the level of trustworthiness required for its own functions:– Registering for a class– Changing direct-deposit information– Entering into a housing contract– Submitting an electronic timesheet– Viewing versus changing grades, salaries, etc.

Page 24: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

24

Futures

Roles

Page 25: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

25

Roles – What’s the Buzz?

• A role is a usually descriptive name for a collection of permissions to view data or execute processes.

• If it were possible to determine a person’s “institutional role” from HR information, then services could be provisioned across all enterprise systems automatically – saving time and effort.

Page 26: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

26

Application Roles

• An application role is an attribute of the user’s application profile, and is of no interest outside the application – it is security-oriented.

• The application role bundles, into one descriptive package, many individual permissions to view data items and initiate processes within the application.

• Virtually all enterprise applications use this model to manage security.

Page 27: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

27

Enterprise Roles

• An enterprise role is an attribute in a central directory used for management of entitlements across multiple application systems

• Each application can choose to map an enterprise role into one or more application roles appropriate for that category of principal

• The specification of enterprise roles is a difficult problem

Page 28: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

28

Roles

Rul

es(r

un-t

ime,

envi

ronm

enta

llo

gic)

Pol

icy

(per

mis

sion

col

lect

ion)

Ac tio n D ata O b jec t

P erm is s io n

Ac tio n D ata O b jec t

P erm is s io n

Adm inis trat ive pro c e s s to as s ignapplic at io n ro le s to us e r pro f i le s

M anualas s ignm e nt

E nte rp ris e R o le

D e r ivat io nf ro m s o urc e s

E xpo s e d fo r us e byapplic at io ns

R un- t im ede te c t io n o f

e nte rpr is ero le ( s )

P o lic y (m apping toapplic at io n ro le s )

Id e n tity S pa c e

A pplic a tion S pa c e

P o lic y(m a p p in g toa p p lic a tio n

ro le s )

Auto m ate dus e r pro f i lem anage m e nt

App

licat

ion

Rol

e

T o d a y 's a p p lic a tio n

Page 29: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

29

Roles Prognosis

• Some enterprise roles already exist (“student”, “employee”, “faculty”) and could be used today

• Administrative Data Council is working on general enterprise role definitions

• Definition, implementation, and mapping from enterprise roles to application roles could take several years

Page 30: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

30

NUIT Plans in Motion

Page 31: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

31

NUIT Plans

The Northwestern situation and plans

• Trial two-factor authentication in summer 2006; initial deployments by year’s end

• Replace SNAP by end of January 2007

• Drive all applications to use central identity through access management services by June 2007

Page 32: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

32

NUIT Plans

• Implement federation technologies within 12 months– But joining federations could take longer to

negotiate

• Start discussions about– Trustworthiness for business functions– Ultimate extent of two-factor authentication

Page 33: 1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.

33

Questions?

QA&