Top Banner
Enterprise Security Requirements Dimtuthu Leelarathne Director, Solutions Architecture
44

Enterprise Security Requirements

Feb 14, 2017

Download

Technology

WSO2 Inc.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Enterprise Security Requirements

Enterprise Security Requirements

Dimtuthu Leelarathne Director, Solutions Architecture

Page 2: Enterprise Security Requirements

A dozen solution patterns for common identity problems

in an enterprise!

Page 3: Enterprise Security Requirements

Enterprise Security Landscape

Bordersacrosssystemsdon’tworkanymore

Page 4: Enterprise Security Requirements

Why?

o  Open up APIs o  Bring your own identity

o  Identity maintained in one domain, accessed in other domains o  Social network identities

o  Bring your own device o  Ecosystems o  Mergers/Acquisitions

Page 5: Enterprise Security Requirements

An IAM System

Page 6: Enterprise Security Requirements

WSO2 Identity Server o  5th Generation Product

o  Current version 5.1.0 (released 2015) o  Federated identity and entitlement is a key part of any distributed

architecture o  Internal security threats, Partnerships o  Mergers, De-mergers o  APIs, Cloud systems

o  SSO is important but need to federate and bridge across SSOs o  Open Standards for Identity are changing the industry landscape

o  Based on WSO2 Carbon platform, which provides support for multi-tenancy, logging, clustering, and other common services

Page 7: Enterprise Security Requirements

Identity Server Landscape

Page 8: Enterprise Security Requirements

Enterprise Identity Bus

Page 9: Enterprise Security Requirements

Enterprise Identity Bus (EIB)

Page 10: Enterprise Security Requirements

10

Enterprise Identity Bus

Page 11: Enterprise Security Requirements

What Does an EIB Do ?

Bridges

Tokens

•  OAuth/2

•  OpenID/OpenID Connect

•  SAML2

•  WS-Federation

•  Kerberos, etc

Claims & Claim Dialects

•  Email Addresses

•  Phone Numbers

•  Names, etc

User Stores

•  SPML, SCIM, Salesforce, Google, etc

•  Just in Time provisioning, inbound, outbound

Page 12: Enterprise Security Requirements

A Story

o  Kermit Co is an open-source product development company

o  It has employees, customers, open-source community

o  It has some internal systems used by employees and some external systems

o  Kermit Co is going to upgrade their identity

Page 13: Enterprise Security Requirements

Kermit Cooperation

Page 14: Enterprise Security Requirements

Kermit Co has some internal Applications

o  Employees use several systems o  Office 365 o  Redmine o  Salesforce o  Star Accounts

o  Employee LDAP in Kermit Datacenter cannot be synched to Cloud

Page 15: Enterprise Security Requirements

Problem

o  Employees need to access cloud-based and on premise systems

o  De-centralized Identities o  Password exhaustion, re-login each time à  When the employee login to one system he should login

to the rest o  Different systems use different protocols – SAML 2.0,

WS-Federation

Page 16: Enterprise Security Requirements

SSO for Heterogeneous Systems using different Federation Protocols

Page 17: Enterprise Security Requirements

Problem

o  Ginger is from finance team

o  Her account is hacked

o  All finance data is leaked

à  Need to implement Multi-Factor Authentication (MFA) o  Something you know, Something you have,

Something you are

o  Add FIDO and SMSOTP

Page 18: Enterprise Security Requirements

MFA in Multi-Steps

Page 19: Enterprise Security Requirements

Problem

o  Customers need to authenticate to several system o  Website for product downloads

o  JIRA for issue reporting

o  Certification portal

o  Partner portal

o  All customers are in a different LDAP

Page 20: Enterprise Security Requirements

Handling Different Types of Identities

o  Technically can add to the existing WSO2 IS, but customer identities are, o  Scale is massive o  Control is not within the organization o  Self-service registration should be there o  Social identities & JIT provisioning o  Identity is low assured o  Delegated administration o  User experience must be excellent and distributed

Page 21: Enterprise Security Requirements

Managing Internal/External Identities

Page 22: Enterprise Security Requirements

Problem

o  Need to provide social sign-up/sign-in capabilities to the website

o  Facebook, Google

o  When users sign up via social media Kermit wants to add the user to the External Users DB

à Do just in time provisioning to the External Users DB

Page 23: Enterprise Security Requirements

Identity Federation and JIT

first_name

FirstName

given_name

Page 24: Enterprise Security Requirements

Problem

o  How are the external users going to manage their profile? o  All external users need to

manage their own profiles by logging into the website

o  Make website do direct LDAP calls?

o  Use APIs in WSO2IS o  SCIM – System for Cross-domain Identity

Management o  User information recover service o  User management Service

IcanuseREST/SOAPcallstodousermanagement

Page 25: Enterprise Security Requirements

Identity Management APIs

ExternalUsers

Page 26: Enterprise Security Requirements

Problem

o  Kermit employees need to login to external systems – JIRA, Website & Certificate Portal

o  Kermit employees are not in the external IdP à Kermit employee identities should be federated from internal IdP to external IdP and SPs

Page 27: Enterprise Security Requirements

Identity Federation – Custom Authenticator

Page 28: Enterprise Security Requirements

Problem

o  Matrix is a marketing analytics company that does lead identification for Kermit Co

o  It is file based batch process that update Kermit’s Salesforce

o  Kermit Co wants to automate the process by exposing APIs

o  addSQLead, getRawLeads, getUsers

Page 29: Enterprise Security Requirements

Expose OAuth Protected APIs

Page 30: Enterprise Security Requirements

Problem

o  Kermit Infra team wants to automate provisioning

o  Provisioning users to Apps o  LDAP synching + LDAP groups give same end result as

provisioning o  Per-app roles needs to be managed in central LDAP. Can be quite large

o  WSO2IS adaptors can be used for rule-based provisioning

o  Same Control Domain à Can use either (automated provisioning and LDAP Synching)

o  Different Control Domain à Use provisioning

Page 31: Enterprise Security Requirements

Rule-Based User Provisioning

Page 32: Enterprise Security Requirements

Problem

o  Kermit HCI expert wants to avoid showing login screen on the IdP

o  He wants the Login choices to be displayed on web site itself

à Home Realm Identifier

Page 33: Enterprise Security Requirements

Federation Hub

Page 34: Enterprise Security Requirements

Kermit Co has a pretty decent Identity Infrastructure!

Page 35: Enterprise Security Requirements
Page 36: Enterprise Security Requirements

Gonzo Group of Companies

o  Group of companies with 3 main companies

o  Problem – Require centralized, highly controlled IAM program for it’s external users

Page 37: Enterprise Security Requirements

Multi-tenant Identity Server

Page 38: Enterprise Security Requirements

Problem

o  Gonzo the group of companies wants centralized fine-grained authorization policies

o  Render menu items on web site using centralized authorizations

o  All internally-developed-apps should comply to centralized policy registry

Page 39: Enterprise Security Requirements

Fine-grained Centralized Authorization

Page 40: Enterprise Security Requirements

Problem

o  Gonzo wants all distributor registrations through their website to go through an approval process

Page 41: Enterprise Security Requirements

Workflows

Page 42: Enterprise Security Requirements

Other Advanced Patterns https://medium.facilelogin.com/thirty-solution-patterns-with-the-wso2-identity-server-16f9fd0c0389

Page 43: Enterprise Security Requirements
Page 44: Enterprise Security Requirements

CONTACT US !