Top Banner
How I Came to Share Signals & Learned to Love my Identity System Andrew Nash, Confyrm Inc. [email protected] @winemaker
28

CIS14: How I Came to Share Signals and Learned to Love my Identity System

Dec 05, 2014

Download

Technology

CloudIDSummit

Andrew Nash, Confyrm

A look at how operational notifications can be aggregated, processed and shared in ways that increase the resiliency and trust of your identity ecosystem.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CIS14: How I Came to Share Signals and Learned to Love my Identity System

How I Came to Share Signals & Learned to Love my Identity System

Andrew Nash, Confyrm Inc.

[email protected] @winemaker

Page 2: CIS14: How I Came to Share Signals and Learned to Love my Identity System

Identity Ecosystem …

Confyrm, Inc

Attribute Exchange

Attribute Providers

Identity Providers

RelyingPartiesUser

AuthorizationManager

Validation Service

Verification Service

Trust Eval Service

Authentication Service

Personal Date Store

Page 3: CIS14: How I Came to Share Signals and Learned to Love my Identity System

When the Ecosystem happy path fails … Operational events occur that are not accounted for by identity protocols

In aggregate, we all know more …

… than any one single entity or view point

Could we …

share operational events that enhance the integrity of the ecosystem and protect the user while providing privacy controls…?

Confyrm, Inc

Page 4: CIS14: How I Came to Share Signals and Learned to Love my Identity System

Google knew before AOL

7/2/13 Commercial in confidence – do not redistribute

Page 5: CIS14: How I Came to Share Signals and Learned to Love my Identity System

The Account Reset Pattern

Confyrm, Inc

Page 6: CIS14: How I Came to Share Signals and Learned to Love my Identity System

Trusted Communications Channels �  Only communications paths are:

�  Email �  SMS

�  Assumed level of Trust

�  “real security” for high value accounts devolves to controls on trusted channels

�  Every IAM mechanism leverages them: �  Username / Password �  Multi-factor Authentication �  Biometrics �  SSO Technologies

Confyrm, Inc

Page 7: CIS14: How I Came to Share Signals and Learned to Love my Identity System

New nomenclature …

Confyrm, Inc

IDP A

Email Svc

RP x

IDP B

RP x

RP z

IDP A

Email Svc

Event Parsing Service

Signal Multicast Service

SIgnal Manager

Signal Recipients

Event Publishers

Page 8: CIS14: How I Came to Share Signals and Learned to Love my Identity System

Signal Manager �  Trusted intermediary

�  Shields Account Identifiers & Event Publishers

�  Real world identities out of scope

�  Identification is limited to Account Identifiers �  Not usernames �  PII is not stored or shared

�  Policy based event distribution/transformation �  Events are artifacts of operational identity ecosystem

Page 9: CIS14: How I Came to Share Signals and Learned to Love my Identity System

Confyrm Sygnal Manager

Confyrm, Inc

fp{ e } = sevents signals

policy

Page 10: CIS14: How I Came to Share Signals and Learned to Love my Identity System

Event Notifications - ATO

Confyrm, Inc

[email protected]

[email protected]@aol.com

[email protected]@[email protected]

BofA AOL

[email protected]

[email protected] an

@ao

l.com

fp{ e } = s

Sygnal Manager

Page 11: CIS14: How I Came to Share Signals and Learned to Love my Identity System

Event Notifications – Password Change

Password :=new_password

[email protected]

[email protected]@eBay.com

eBay

[email protected]

an@

ebay

.com

fp{ e } = s

Sygnal ManagerConfyrm, Inc

Page 12: CIS14: How I Came to Share Signals and Learned to Love my Identity System

Account Query

Confyrm, Inc

[email protected]

[email protected]@eBay.com

[email protected]@Yahoo.com

eBay Yahoo!

Google

[email protected]

[email protected] [email protected]

fp{ e } = s

Sygnal [email protected]

AOL

[email protected]

Page 13: CIS14: How I Came to Share Signals and Learned to Love my Identity System

Recent Events �  OIX UK Govt Shared Signals Whitepaper, Sept ’13

�  Google Shared Signals Presentation �  October Internet Identity Workshop

�  UK IDAP Shared Signals Discovery Project �  Event & Signal Catalogues �  Architecture, Service API and IDP Integration �  Privacy & Legal Frameworks �  Alpha project late Summer

�  NSTIC Shared Signals Project �  Selected as finalist from 42 submissions �  Final set selected in Sept Confyrm, Inc

Page 14: CIS14: How I Came to Share Signals and Learned to Love my Identity System

PROTECTING THE IDENTITY ECOSYSTEM

Identity Ecosystem Collaborate to Protect Maintain Integrity

Page 15: CIS14: How I Came to Share Signals and Learned to Love my Identity System

Shared Signals in IDAP Context

Confyrm, Inc

VerizonMyDexDigIdentityPost OfficeExperian

IDPsIDAP Hub

fp{ e } = s

Sygnal Manager

VerizonMyDexDigIdentityPost OfficeExperian

UK Email Providers

Page 16: CIS14: How I Came to Share Signals and Learned to Love my Identity System

To Anticipate Some Questions … •  Events are Account level activities

•  Events & Signals are very simple structures : •  AccountID, EventType •  AccountID, SignalType [, PublisherClass] [, Priority]

•  Event Publisher & Signal Recipient AccountID are different

•  Signal Recipient AccountID is already known

•  Does not use transactional information, authentication activities, session activity or application activation

Confyrm, Inc

Page 17: CIS14: How I Came to Share Signals and Learned to Love my Identity System

Confyrm, Inc

Page 18: CIS14: How I Came to Share Signals and Learned to Love my Identity System

Signal Processing �  Loosely coupled Input and Output event streams

�  Asynchronous event notification eliminates polling overheads

�  Policy controlled signal handling �  Event transformation

�  Signal urgency

�  Delivery thresholds �  Signal content

�  Obfuscation techniques

�  “All Clear” reset notifications

�  Signal Types:

�  Password reset �  Account recycling

�  Account takeover �  Account suspension

�  Configurable signal classes

�  Optional User Notification (policy based) 7/2/13 Commercial in confidence – do not redistribute

Page 19: CIS14: How I Came to Share Signals and Learned to Love my Identity System

Use Cases �  Account Takeover

�  Password Change

�  Account Reuse

�  Recent account creation

�  Mobile device purchase

�  Stolen identity – cross IDPs

Confyrm, Inc

Page 20: CIS14: How I Came to Share Signals and Learned to Love my Identity System

ATOs are a fact of normal life

Confyrm, Inc

Page 21: CIS14: How I Came to Share Signals and Learned to Love my Identity System

Risky Account Changes and Account Quality

Adam Dawes ([email protected]) IIW

October 2013 http://goo.gl/MpTVyG

Page 22: CIS14: How I Came to Share Signals and Learned to Love my Identity System

IDP’s core value is to protect account security Already provide sophisticated systems for authentication

•  Risk analysis

•  Login challenges

•  Multifactor authentication

Page 23: CIS14: How I Came to Share Signals and Learned to Love my Identity System

What are the security risks for being a Relying Party? Account with IDP has been compromised

o  Credential theft §  Password reuse

§  Phishing

§  Malware

§  Unauthorized machine access

§  Account recovery

Account is abusive o  Spammy

o  Hijacked

Out of sync with Identity Provider o  Important events IDP has learned since RP authenticated user

Page 24: CIS14: How I Came to Share Signals and Learned to Love my Identity System

Big Account Changes are a risk for RPs Password change at IDP

1.  User gets hijacked but doesn’t know it

2.  Hijacker logs into site/app via federated login (and sets up a mobile app)

3.  Hijacker starts abusing user’s account on RP

4.  User discovers they have been hijacked; changes password on IDP

5.  Hijacker still has valid session on RP and continues to abuse account

Security best practice: on password change, RP should revoke:

•  All cookies for active web sessions

•  Auth tokens for mobile apps

But how is an RP to know that a user changed their password???

Page 25: CIS14: How I Came to Share Signals and Learned to Love my Identity System

Big Account Changes Challenges There are other IDP events that an RP should know about

•  Suspected hijacking [prompt for password change next login]

•  Account recovered

•  Account deleted

•  Account suspended

•  Account recycled

•  OAuth revocation of App

•  Expired token

•  New payment method?

•  New shipping address?

Page 26: CIS14: How I Came to Share Signals and Learned to Love my Identity System

•  Google is RP for many Google Apps customers via SAML o  Enterprises frequently require their users to change password (and sometimes detect an

employee’s account was hijacked)

o  Enterprise/School accounts are not usually “accounts for life” and eventually get terminated

•  Google is “RP” to other mail providers for accounts o  Account recycling - Hotmail, Yahoo! etc.

•  Are there already patterns we can follow? o  When do we revoke OAuth access to Gmail mobile app when an account is deleted?

o  Are there mechanisms for this already specified in SAML?

§  SCIM can signal an employee has left the company, is that a start?

o  What security practices do enterprises use to protect themselves now?

Google would like to be subscriber of changes too

Page 27: CIS14: How I Came to Share Signals and Learned to Love my Identity System

OIDC Session Management is not enough If the RP keeps login state synced with IDP, that should work

right?

•  Not all RPs or IDPs want to have their session state synced

•  Mobile apps use OAuth, don’t see session state changes. Which session would you want to tie it to anyway?

•  Hijacker can sign up for subscriptions (or other background activities) on RP that do not track session state

Page 28: CIS14: How I Came to Share Signals and Learned to Love my Identity System

Google to provide pub/sub feed for account changes Publish “risky events” to RP endpoint

when Google detects them

•  Site registers notification URL

•  Site receives notifications for users where it has an active OAuth grant