Top Banner
Identity & Access Management LEVERAGING CONNECTIONS IN DATA WITH GRAPH DATABASES Webinar, September 22, 2016
64

Identity and Access Management

Apr 16, 2017

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Identity and Access Management

Identity & Access ManagementLEVERAGING CONNECTIONS IN DATA WITH GRAPH DATABASES

Webinar, September 22, 2016

Page 2: Identity and Access Management

Alessandro SvenssonSolutions @ Neo Technology

Ryan BoydDeveloper Relations @ Neo Technology

Page 3: Identity and Access Management

AgendaIntro to Graph ThinkingDefining Identity & Access ManagementHow IAM is evolvingUse of graph databases in IAMCase studies - Adoption of Neo4jDemoWrap up & Questions.

Page 4: Identity and Access Management

Intro to Graph Thinking

Page 5: Identity and Access Management

Databases have evolved in order to handle large networks of connected data

Page 6: Identity and Access Management

Databases have evolved in order to handle large networks of connected data

Page 7: Identity and Access Management

RELATIONAL DATABASES

Page 8: Identity and Access Management

The internet is a graph

Huge networks of connected

data

Page 9: Identity and Access Management
Page 10: Identity and Access Management

This is data modelled as graph!

Page 11: Identity and Access Management

A Graph Is

NODE

NODE

NODE

RELATIONSHIP

RELATIONSHIP

RELATIONSHIP

Page 12: Identity and Access Management

WITH

PERSON

CHECKING ACCOUNT

BANK

A Graph IsH

AS

Page 13: Identity and Access Management

HA

S

HAS

HOTEL

ROOM

BOOKING

A Graph Is

Page 14: Identity and Access Management

KNOWS

KN

OW

S

KNOWS

WO

RK

S_AT

WORKS_AT

WORKS_AT

COMPANY

STANFORD

STU

DIE

D_A

T

KNOWS

NEO

COLUMBIA

STU

DIE

D_A

T

STUDIED_AT

STUDIED_AT

NAME:ANNE

SINCE:2012

A Graph Is

Page 15: Identity and Access Management

Company

Stanford

Carl

Tom

Columbia

Bob

NeoAnne

WE

NT_

TO

KNOWS

WO

RK

S_A

T

WORKS_AT

KN

OW

S

KNOWS

KNOWS

WE

NT_

TO

WORKS_AT

A Graph Is

Page 16: Identity and Access Management

A Graph Is

Page 17: Identity and Access Management
Page 18: Identity and Access Management

and for the right reason

at the right time,Who gets access to what,

Identity & Access Management (IAM)

Page 19: Identity and Access Management

& Access Management

IdentityDefining Identity

Page 20: Identity and Access Management

& Access Management

Identity

The structure of organisations

Page 21: Identity and Access Management

Traditional IAM-systems

2) Underlying assumption that organisations are

hierarchal

1) Static idea of Identity

Page 22: Identity and Access Management

http://blogs.gartner.com/ian-glazer/2013/02/08/killing-iam-in-order-to-save-it/

IAM

Active Directory

SAP

Knowledge Base

CRM

HR-system

Page 23: Identity and Access Management

http://blogs.gartner.com/ian-glazer/2013/02/08/killing-iam-in-order-to-save-it/

Customer Support

IAM

Active Directory

SAP

Knowledge Base

CRM

HR-system

ADD

Page 24: Identity and Access Management

http://blogs.gartner.com/ian-glazer/2013/02/08/killing-iam-in-order-to-save-it/

IAM

Active Directory

SAP

Knowledge Base

CRM

Customer Support

Inside Sales

HR-system

CHANGE

Page 25: Identity and Access Management

http://blogs.gartner.com/ian-glazer/2013/02/08/killing-iam-in-order-to-save-it/

IAM

Active Directory

SAP

Knowledge Base

CRM

Customer Support

Inside Sales

HR-system

LEAVE

Page 26: Identity and Access Management

1) Identity is increasingly complex

What’s happening in the world of IAM?

Page 27: Identity and Access Management

2) Traditional hierarchies are being revised

1) Identity is increasingly complex

What’s happening in the world of IAM?

Page 28: Identity and Access Management

2) Traditional hierarchies are being revised

1) Identity is increasingly complex

What’s happening in the world of IAM?

3) Access Management is more and more about the relationships between users, partners, customers, things and their different touchpoint within organisations and eco-systems

Page 29: Identity and Access Management

Emerging Complexity of Identity

Page 30: Identity and Access Management

Complexity of Digital Identities

User identities Identity of Things

Serial # Unique idPersonal Customer Partner

Consumer Citizen

Page 31: Identity and Access Management

Device <-> ServiceSecurity End to EndIdentity of users

Identity of things

Applicationsand services

Complexity of Digital Identities

Page 32: Identity and Access Management

Identity Relationship ManagementIdentity Access Management

Applications and data

Endpoints

People

Customers(millions)

Partners and Suppliers

Workforce(thousands)

PCs Tablets

On-premises Private Cloud

Public Cloud

Things(Tens of millions)

WearablesPhones

PCs

Customers(millions)

On-premises

Applications and data

Endpoints

People

Page 33: Identity and Access Management

Identity Relationship ManagementIdentity Access Management

Applications and data

Endpoints

People

Customers(millions)

Partners and Suppliers

Workforce(thousands)

PCs Tablets

On-premises Private Cloud

Public Cloud

Things(Tens of millions)

WearablesPhones

PCs

Customers(millions)

On-premises

Applications and data

Endpoints

People

Page 34: Identity and Access Management

Identity Relationship ManagementIdentity Access Management

Applications and data

Endpoints

People

Customers(millions)

Partners and Suppliers

Workforce(thousands)

PCs Tablets

On-premises Private Cloud

Public Cloud

Things(Tens of millions)

WearablesPhones

PCs

Customers(millions)

On-premises

Applications and data

Endpoints

People

Page 35: Identity and Access Management

Access Management is traditionally designed with the underlying assumption that everything is hierarchal

Page 36: Identity and Access Management

Access Management is traditionally designed with the underlying assumption that everything is hierarchal

Page 37: Identity and Access Management

Rigid hierarchies have defined how we have built IAM-systems in the past

Page 38: Identity and Access Management

Representing your organisation as a graph, enables you to build stronger

and more accurate IAM

Page 39: Identity and Access Management

Parent-Child relationships

Ideal World

Query complex relationships in real-time

Real World

Page 40: Identity and Access Management

How Neo4j is used in IAM

Page 41: Identity and Access Management

1. Build your IAM as a Graph2. Augment your existing IAM with Neo4j

Different ways of adopting Neo4j

Page 42: Identity and Access Management

Case Study

Page 43: Identity and Access Management

Identity and Access Management

Telenor

Background• Oslo-based telcom provider, #1 in Nordic

countries and #10 in world• Online, mission-critical, self-serve system lets

users manage subscriptions and plans• Availability and responsiveness is critical to

customer satisfaction

Business Problem• Logins took minutes to retrieve relational access

rights• Massive joins across millions of plans,

customers, admins, groups• Nightly batch production required 9 hours and

produced stale data

Solution and Benefits• Shifted authentication from Sybase to Neo4j• Moved resource graph to Neo4j• Replaced batch process with real-time login

response using most recent data• Mitigated customer retention risks

Page 44: Identity and Access Management

Identity and Access Management

Telenor

Background• Oslo-based telcom provider, #1 in Nordic

countries and #10 in world• Online, mission-critical, self-serve system lets

users manage subscriptions and plans• Availability and responsiveness is critical to

customer satisfaction

Business Problem• Logins took minutes to retrieve relational access

rights• Massive joins across millions of plans,

customers, admins, groups• Nightly batch production required 9 hours and

produced stale data

Solution and Benefits• Shifted authentication from Sybase to Neo4j• Moved resource graph to Neo4j• Replaced batch process with real-time login

response using most recent data• Mitigated customer retention risks

Page 45: Identity and Access Management

Case Study

Page 46: Identity and Access Management

Challenges with existing IAM:

Partner

• Employee ID• Partner ID• Digital credentials• Sales record• Job Performance

Customer

• Employee ID• Company ID• Digital credentials• Devices managed• Portal software• Maintenance

Employee

• Employee ID• Roles• Digital Identities• Digital credentials• Personal devices

Device

• Serial number• Digital credentials• Make & model• GPS location• IP-adress• Firmware• Maintenance

Consumer

• Full name• Date/place birth• Home adress• Eye & hair color• Height/weight• Email Adress

Data will be separated in Silos

Page 47: Identity and Access Management

Partner

• Employee ID• Partner ID• Digital credentials• Sales record• Job Performance

Customer

• Employee ID• Company ID• Digital credentials• Devices managed• Portal software• Maintenance

Employee

• Employee ID• Roles• Digital Identities• Digital credentials• Personal devices

Device

• Serial number• Digital credentials• Make & model• GPS location• IP-adress• Firmware• Maintenance

Consumer

• Full name• Date/place birth• Home adress• Eye & hair color• Height/weight• Email Adress

Data will be separated in SilosIdentity data will be very static

Challenges with existing IAM:

Page 48: Identity and Access Management

Partner

• Employee ID• Partner ID• Digital credentials• Sales record• Job Performance

Customer

• Employee ID• Company ID• Digital credentials• Devices managed• Portal software• Maintenance

Employee

• Employee ID• Roles• Digital Identities• Digital credentials• Personal devices

Device

• Serial number• Digital credentials• Make & model• GPS location• IP-adress• Firmware• Maintenance

Consumer

• Full name• Date/place birth• Home adress• Eye & hair color• Height/weight• Email Adress

Data will be separated in SilosIdentity data will be very staticBased on a hierarchal representation of an organisation

Challenges with existing IAM:

Page 49: Identity and Access Management

Partner

• Employee ID• Partner ID• Digital credentials• Sales record• Job Performance

Customer

• Employee ID• Company ID• Digital credentials• Devices managed• Portal software• Maintenance

Employee

• Employee ID• Roles• Digital Identities• Digital credentials• Personal devices

Device

• Serial number• Digital credentials• Make & model• GPS location• IP-adress• Firmware• Maintenance

Leverage Cross-Silo Relationships to drive new business value

Name

CuID

Emp ID

Partner

Emp ID

Company Y

Emp ID

GPS Loc

GPS Loc

Emp ID

Dig Serial

#

GPS Loc

GPS Loc

Firmware

Serial#

Consumer

• Full name• Date/place birth• Home adress• Eye & hair color• Height/weight• Email Adress

RelationshipLayer

How Can You Augment This with Graphs?

Page 50: Identity and Access Management

Partner

• Employee ID• Partner ID• Digital credentials• Sales record• Job Performance

Customer

• Employee ID• Company ID• Digital credentials• Devices managed• Portal software• Maintenance

Employee

• Employee ID• Roles• Digital Identities• Digital credentials• Personal devices

Device

• Serial number• Digital credentials• Make & model• GPS location• IP-adress• Firmware• Maintenance

Leverage Cross-Silo Relationships to drive new business value

Name

CuID

Emp ID

Partner

Emp ID

Company Y

Emp ID

GPS Loc

GPS Loc

Emp ID

Dig Serial

#

GPS Loc

GPS Loc

Firmware

Serial#

Consumer

• Full name• Date/place birth• Home adress• Eye & hair color• Height/weight• Email Adress

RelationshipLayer

How Can You Augment This with Graphs?

Page 51: Identity and Access Management

Architecture openIDM

openIDM

Relationship layer

Connector

Datasources

Page 52: Identity and Access Management

OpenAM Agent

Service that user wants to

use

Login

username

passwords

Host

Architecture OpenAM

Write Event

AuthZPlugin

Authorize Service for

User

Page 53: Identity and Access Management

Learn more about this case study, visit the

Neo4j Youtube-channel

or graphconnect.com

Page 54: Identity and Access Management

Ryan BoydDeveloper Relations @ Neo Technology

Neo4j DEMO

Page 55: Identity and Access Management

Who’s using Neo4j?

Page 56: Identity and Access Management

Government Commercial clients

Who’s Using Neo4j?Institutions

Local Governments

Law Enforcement

Military & Intelligence

Page 57: Identity and Access Management

Neo4j Adoption by Selected VerticalsSOFTWARE FINANCIAL

SERVICES RETAIL MEDIA & OTHER

SOCIALNETWORKS TELECOM HEALTHC

ARE

Page 58: Identity and Access Management
Page 59: Identity and Access Management

Towards Graph Inevitability

Page 60: Identity and Access Management

“Graph analysis is possibly the single most effective competitive differentiator for

organizations pursuing data-driven operations and decisions after the design of data capture.

“By the end of 2018, 70% of leading organizations will have one or more pilot or proof-of-concept efforts underway utilizing

graph databases.”

Towards Graph Inevitability

Page 61: Identity and Access Management

“Forrester estimates that over 25% of enterprises will be using graph databases

by 2017.”

Towards Graph Inevitability

Page 62: Identity and Access Management

Valuable Resources!

neo4j.com/developer neo4j.com/solutions neo4j.com/product

Developers Solutions Product

Page 63: Identity and Access Management
Page 64: Identity and Access Management

Thank you!