SlideShare a Scribd company logo
Copyright ©2013 Ping Identity Corporation. All rights reserved.1
Identity at Scale
Hans Zandbelt
CTO Office – Ping Identity
CIS 2013
Copyright ©2013 Ping Identity Corporation. All rights reserved.2
•  Trends and Standards
•  Identity at Scale
•  Recommendations
Contents
Copyright ©2013 Ping Identity Corporation. All rights reserved.3
Trends
•  Cloud (SaaS), Mobile,
Social
–  Authentication:
SAML -> +OpenID
Connect
•  Web -> API
–  Core business:
information and
data, not
presentation
•  Internet of Things
•  Mutual authentication?
–  controlling other
cars, toasters,
lightbulbs
Copyright ©2013 Ping Identity Corporation. All rights reserved.4
•  Standards
–  Interoperability: need to deal with another vendor’s API/
product? Not an app for every thing in the IoT!
–  cross-domain
–  competition, replaceable implementations, leading to good
but cheap products?
•  APIs
–  Light-weight, SOAP -> REST/OAuth 2.0
•  Web SSO
–  Enterprise/Customer Identity, Consumer Identity
–  SAML -> OpenID Connect : scale?
•  OpenID Connect
–  Simplicity for clients/RPs -> complexity shifted to the OP
Standards (the nice thing is…)
Copyright ©2013 Ping Identity Corporation. All rights reserved.5
IDENTITY AT SCALE
Copyright ©2013 Ping Identity Corporation. All rights reserved.6
1-1 Federated Identity Today
•  Increase of Cloud/SaaS
adoption
–  # federated SSO
applications (SAML)
–  # partner connections
–  # connection
management overhead
(*)
•  But(!) also for “incidental”
connections
–  How to obtain updates
•  Authoritative
source -> trust
•  Infrastructure:
authenticated
source (e-mail…)
–  How to configure them
•  Automated
•  Managed,
outsourced
IDP
IDP
IDP
SP
SP
SP
Copyright ©2013 Ping Identity Corporation. All rights reserved.7
•  Metadata related (not so standard for other-than-SAML
protocols)
–  key material
–  SSO service URLs
–  point of contact
•  Attributes
–  could be metadata, often isn’t
–  may be bilateral (!)
–  required/optional, consent
•  Policies
–  contractual agreements
–  privacy
•  End-user/application/SSO related
–  how users can sign in (relation to service URLs)
–  change in look and feel
–  change in functionality
(*) Connection Management
<md>
Copyright ©2013 Ping Identity Corporation. All rights reserved.8
Metadata - SAML 2.0
•  Technical Trust
•  X.509 Certificate
–  Anchored vs.
unanchored
–  Key vs. other cert
info
•  URLs/Bindings
•  Contact info
–  Company name,
admin/tech contact
<md:EntityDescriptor!
xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata"!
xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"!
xmlns:ds="http://www.w3.org/2000/09/xmldsig#"!
entityID="https://idp.example.org/SAML2">!
!
<!-- insert ds:Signature element -->!
!
<md:IDPSSODescriptor!
protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">!
!
<md:KeyDescriptor use="signing">!
<ds:KeyInfo>…</ds:KeyInfo>!
</md:KeyDescriptor>!
!
<md:SingleSignOnService!
Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"!
Location="https://idp.example.org/SAML2/SSO/POST"/>!
<md:SingleSignOnService!
Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact"!
Location="https://idp.example.org/SAML2/Artifact"/>!
!
</md:IDPSSODescriptor>!
!
<md:Organization>!
<md:OrganizationName xml:lang="en">!
SAML Identity Provider !
</md:OrganizationName>!
<md:OrganizationURL xml:lang="en">!
http://www.idp.example.org/!
</md:OrganizationURL>!
</md:Organization>!
!
<md:ContactPerson contactType="technical">!
<md:SurName>SAML IdP Support</md:SurName>!
<md:EmailAddress>mailto:saml-support@idp.example.org</
md:EmailAddress>!
</md:ContactPerson>!
!
</md:EntityDescriptor>!
Copyright ©2013 Ping Identity Corporation. All rights reserved.9
Connection Management Metadata/Technical Issues
•  Conn Mgmt often a
one-shot process (cq.
a snapshot)
•  Certificate expiry and
update
•  Contact info update
•  URL and binding
updates
•  Changes in IDP
discovery process
•  Metadata documents
can contribute to the
solution, but how to
scale exchange?
Key Rollover
Contact Info
Bindings & URLs
Copyright ©2013 Ping Identity Corporation. All rights reserved.10
Contrary to popular belief:
The connection management problem is NOT
specific to SAML; any federated authentication
system deployed on true internet scale will have
to address this issue.
So: any solution should be protocol agnostic.
BE AWARE
Copyright ©2013 Ping Identity Corporation. All rights reserved.11
TOWARDS A SOLUTION
What can we do?
Copyright ©2013 Ping Identity Corporation. All rights reserved.12
Solution Approach (n=2): Shared Conn. Mgmt.
•  Single/central/shared
point of connection
management (trust)
•  Trusted 3rd party
–  From: user trust
scale through 2nd
party to SP/IDP trust
through 3rd-party
•  Compares to TLS and
a Certificate Authority
or DNS
•  Challenge
–  How to create a
trusted channel
Shared Service
IDP
IDP
IDP
SP
SP
SP
Copyright ©2013 Ping Identity Corporation. All rights reserved.13
A shared service… where does it apply?
•  intra-enterprise
–  large distributed
organizations, both
infrastructure and
responsibilities/trust
(acquisitions and
mergers)
–  connect multiple
applications to a
variety of externals &
internals; “user
access firewall”
•  inter-enterprise
–  verticals: healthcare,
automotive, banking/
financial, education
but also "cross e-Gov”
–  homogeneous(!)
group with shared
interest/organization
IDP SP
IDP SP
IDP SP
IDP SP
Copyright ©2013 Ping Identity Corporation. All rights reserved.14
A Next Step In Architecture Evolution…
Application Server
App 1
Fed Fed Fed
App 2 App 3
App Server or
Access System
App 1
Federation
App 2 App 3
App Server
App 1
Federation Server
App 2 App 3
App Server
App Srv
App 1
Fed Server
App 2
App Srv
Connection Management
App Server
App 3
Fed Fed
App 4
1
2 3
4
Copyright ©2013 Ping Identity Corporation. All rights reserved.15
Solution 1: Proxy
•  Indirect peer-to-peer
communication
•  Trust proxy only, relay
to peers, inband
•  Shift the metadata
problem to a central
facility: no distr. mgmt
•  Technical trust may be
combined with
organizational trust
•  Connection Mgmt
–  MxN -> M+N
•  Accommodate for diff
SAML implementations
•  Protocol translations
are possible
Operator
IDP
IDP
IDP
SP
SP
SP
SAML
Proxy
SP-IDP
SAML
Copyright ©2013 Ping Identity Corporation. All rights reserved.16
Benefits
•  Scalability of trust
–  Technical: single
connection to proxy,
central management
of partner
connections
–  Organizational: trust
in proxy operator
•  Updates
–  outsourced to the
proxy; proxy to
solve…
•  Discovery & Autoconf
–  Outsourced to the
proxy; proxy to
solve…
Centralized Trust Mgmt
Updates
Discovery & Autoconf
Copyright ©2013 Ping Identity Corporation. All rights reserved.17
Solution 2: Metadata Service
•  aka. multi-party
federation
•  Higher Education &
Research
–  InCommon, UK
Access Federation
–  40+ across the world
•  Business Verticals
–  Healthcare
–  Finance
–  e-Gov
•  Async technical trust
•  Sync direct peer-to-
peer communication
•  Metadata upload (!)
Federation Operator
IDP
IDP
IDP
SP
SP
SP
SAML
Metadata
Copyright ©2013 Ping Identity Corporation. All rights reserved.18
Distribution variants (SAML 2.0 metadata)
•  Flat file based (classic)
–  > 10 Mb files for large
federations
(EntitiesDescriptor)
•  Query-based (MDX)
•  Well known location for
metadata
–  EntityID-is-URL-to-
Metadata
–  SAML auto-connect
(Ping Identity)
•  DNS based (registry)
•  Trust
1.  signed metadata
2.  trusted registry
3.  SSL CA
IDP SP IDP SP
IDP SP IDP SP
IDP
IDP
D
N
S
IDP
D
N
S
1 2 3
Copyright ©2013 Ping Identity Corporation. All rights reserved.19
Metadata Expiry (!)
•  Attributes on Entity and
Entities level: validUntil
and cacheDuration
•  On EntitiesDescriptor
and EntityDescriptor
level
•  use only validUntil to
enforce expiration
•  use cacheDuration to
override (downward)
the refresh interval
•  keep using (valid)
metadata if the refresh
fails
d!
t1!
t1+d!
t1+2d!
v=t2!
t2+d!
t2+2d!
d = cacheDuration (interval)!
v = validUntil (timestamp)!
d!
Copyright ©2013 Ping Identity Corporation. All rights reserved.20
Benefits
•  Scalability of trust
–  Technical: removes
need to exchange
metadata on peer-to-
peer basis
–  Organizational:
federation operator
does IDP and SP
vetting through
contractual
agreements
•  Key rollover
–  Include multiple
signing keys for a
<validUntil> period
•  Discovery and auto-
configuration
–  Building block…
Scalability of Trust
Key Rollover
Discovery & Autoconf
Copyright ©2013 Ping Identity Corporation. All rights reserved.21
Metadata Service layering: interfederation
Interfederation Operator
IDP
IDP
SP
SP
IDP
IDP
SP
SP
Metadata Metadata
Aggregated Metadata
Copyright ©2013 Ping Identity Corporation. All rights reserved.22
•  MDUI
–  SAML version 2.0 Metadata Extensions for Login and
Discovery User interface, version 1.0
•  Entity attributes
–  SAML V2.0 Metadata Extension for Entity Attributes Version
1.0
–  Generic extension point
•  Signed Entity Attributes
–  Single source of metadata, support multiple trust levels or
hierarchies
•  Other protocols
–  SAML 1.0, SAML 1.1
–  WS-Federation (ADFS 2.0)
–  OpenID 2.0
–  OpenID Connect (?) -> independent registry or attr
SAML 2.0 Metadata extensions
Copyright ©2013 Ping Identity Corporation. All rights reserved.23
Taxonomy + Examples
External
Internal
Model
Proxy Metadata
IDMaaS
(PingOne)
Federation
(InCommon)
Proxy
(PingFed`)
“Metadata
Server”
Deployment
Copyright ©2013 Ping Identity Corporation. All rights reserved.24
•  Proxy
–  PingOne
–  wayf.dk
•  Metadata Service
–  InCommon
–  UK Access Federation
Any SAML product implementation today may
or not support one or both models, in the core
or through customizations.
Solution Examples for SAML 2.0
Copyright ©2013 Ping Identity Corporation. All rights reserved.25
OpenID Connect Metadata (OP and RP)
•  Metadata and key
material separated
•  Use HTTP cache
info for the JWK
set (optional)
•  Multiple keys with
“kids”
– JIT: client
fetches kid if
unknown
•  Client updates
keys with OP
through DynReg
OPRP
JWK set
metadata
JWK set
metadata
Metadata Service
Dynamic
Client
Registration
Copyright ©2013 Ping Identity Corporation. All rights reserved.26
RECOMMENDATIONS
Copyright ©2013 Ping Identity Corporation. All rights reserved.27
•  The problem is not protocol specific (!)
–  Any solution should be multi-protocol enabled or
rather protocol agnostic
•  A shared service, two possible approaches
–  Metadata Service (“automate”) or Proxy
(“outsource”)
•  True Internet scale? Expect combinations (!)
–  Local/enterprise/community: proxy based
–  Protocol Translation: proxy
–  Global: (interconnected) metadata service based
Recommendations
Copyright ©2013 Ping Identity Corporation. All rights reserved.28
•  Registration and publishing service for “endpoint”
metadata
–  Multi-protocol: both SAML 2.0 and OpenID Connect
(OPs)
•  Technical Trust
–  authenticated, trusted source
•  Discovery
–  multiple entities on a single OIDC domain
–  Entities that cannot or will not host their own metadata
–  Replace well-known URL starting point
•  Validation
•  Certification
Metadata Service
Copyright ©2013 Ping Identity Corporation. All rights reserved.29
Future? Not so much!
•  Identity is/as KEY
–  not just users, but
also devices and
applications
•  Unified access policy
implementation across
web and APIs/Mobile
–  Based on identity
•  Enterprise:
–  Single System ->
Identity Bridge
•  Identity Bridge
–  Bridge external SAML
and OpenID Connect
to internal OpenID
Connect (both ends
standardized)
Copyright ©2013 Ping Identity Corporation. All rights reserved.30
Thank You
Q&A
@hanszandbelt
Ping Identity

More Related Content

PPTX
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
Brian Campbell
 
PPTX
Criticality of identity
Nordic APIs
 
PPTX
Securing online services by combining smart cards and web-based applications
Olivier Potonniée
 
PPTX
Smart Card Authentication
Dan Usher
 
PDF
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
Salesforce Developers
 
PPTX
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Richard Bullington-McGuire
 
PDF
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer
 
PPTX
Con8902 developing secure mobile applications-final
OracleIDM
 
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
Brian Campbell
 
Criticality of identity
Nordic APIs
 
Securing online services by combining smart cards and web-based applications
Olivier Potonniée
 
Smart Card Authentication
Dan Usher
 
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
Salesforce Developers
 
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Richard Bullington-McGuire
 
TrustBearer - CTST 2009 - OpenID & Strong Authentication
TrustBearer
 
Con8902 developing secure mobile applications-final
OracleIDM
 

What's hot (20)

PDF
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
OKsystem
 
PDF
CIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
CloudIDSummit
 
PDF
DDS Web Enabled
Real-Time Innovations (RTI)
 
PDF
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
CA Technologies
 
PDF
SWM_WP_MaturityModel_July15
Mike Lemons
 
PDF
CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...
CloudIDSummit
 
PDF
CIS13: Introduction to OAuth 2.0
CloudIDSummit
 
PDF
CIS13: Bootcamp: PingOne as a Simple Identity Service
CloudIDSummit
 
PPTX
Workshop: Advanced Federation Use-Cases with PingFederate
Craig Wu
 
PPTX
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Michael Noel
 
PDF
Simplifying User Access with NetScaler SDX and CA Single Sign-on
CA Technologies
 
PDF
Gartner Catalyst Savvis Cloud API Case Study
CA API Management
 
PDF
EDI WS API ECGridOS Web Services
bizquirk
 
PPTX
Deploying an Extranet on SharePoint
Alan Marshall
 
PDF
CIS13: Bootcamp: Ping Identity SAML in Action with PingFederate Hands-On
CloudIDSummit
 
PPT
SSO Strategy Implementation Considerations
John Bauer
 
PPTX
InterConnect 2015 session 2825 cics_and_the_new soa
nick_garrod
 
DOC
Thiramas
thiyagu raj
 
PPTX
SharePoint 2010 anywhere access uag vs dmz
Kjell-Sverre Jerijærvi
 
PDF
Integrated social solutions, the power and pitfalls of mashups
Nordic APIs
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
OKsystem
 
CIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
CloudIDSummit
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
CA Technologies
 
SWM_WP_MaturityModel_July15
Mike Lemons
 
CIS13: Bootcamp: Ping Identity OAuth and OpenID Connect In Action with PingFe...
CloudIDSummit
 
CIS13: Introduction to OAuth 2.0
CloudIDSummit
 
CIS13: Bootcamp: PingOne as a Simple Identity Service
CloudIDSummit
 
Workshop: Advanced Federation Use-Cases with PingFederate
Craig Wu
 
Collaborating with Extranet Partners on SharePoint 2010 - SharePoint Connecti...
Michael Noel
 
Simplifying User Access with NetScaler SDX and CA Single Sign-on
CA Technologies
 
Gartner Catalyst Savvis Cloud API Case Study
CA API Management
 
EDI WS API ECGridOS Web Services
bizquirk
 
Deploying an Extranet on SharePoint
Alan Marshall
 
CIS13: Bootcamp: Ping Identity SAML in Action with PingFederate Hands-On
CloudIDSummit
 
SSO Strategy Implementation Considerations
John Bauer
 
InterConnect 2015 session 2825 cics_and_the_new soa
nick_garrod
 
Thiramas
thiyagu raj
 
SharePoint 2010 anywhere access uag vs dmz
Kjell-Sverre Jerijærvi
 
Integrated social solutions, the power and pitfalls of mashups
Nordic APIs
 
Ad

Viewers also liked (6)

PDF
CIS13: Hope or Hype: A Look at the Next Generation of Identity Standards
CloudIDSummit
 
PDF
CIS13: Identity Trends and Transients
CloudIDSummit
 
PPTX
2016 04-26 webinar - consumer-focused identity management
shivan82
 
PDF
Consumer Identity Management
webhostingguy
 
PDF
CIS13: OpenID Connect: How it Solves your Problems
CloudIDSummit
 
KEY
Push, Pull, or Punt - Identity management tug-of-war: Then, Now, and Beyond
Ian Glazer
 
CIS13: Hope or Hype: A Look at the Next Generation of Identity Standards
CloudIDSummit
 
CIS13: Identity Trends and Transients
CloudIDSummit
 
2016 04-26 webinar - consumer-focused identity management
shivan82
 
Consumer Identity Management
webhostingguy
 
CIS13: OpenID Connect: How it Solves your Problems
CloudIDSummit
 
Push, Pull, or Punt - Identity management tug-of-war: Then, Now, and Beyond
Ian Glazer
 
Ad

Similar to CIS13: Identity at Scale (20)

PDF
CIS14: Identity at Scale: Next Gen Federation Architectures
CloudIDSummit
 
PDF
CIS 2015 Extreme SAML - Hans Zandbelt
CloudIDSummit
 
PDF
CIS13: Federation Protocol Cross-Section
CloudIDSummit
 
PDF
SAML and Other Types of Federation for Your Enterprise
Denis Gundarev
 
PPT
Identity Federation on JBossAS
Roger CARHUATOCTO
 
PDF
An interoperability framework for
IJCNCJournal
 
PPTX
IdP, SAML, OAuth
Dan Brinkmann
 
PPTX
Jan19 scim webinar-04
Paul Madsen
 
PPT
Ping solutions overview_111904
eaiti
 
PPTX
CIS 2015- Beyond Federation Protocols- Praerit Garg
CloudIDSummit
 
PPTX
Connecting The Real World With The Virtual World
Ping Identity
 
PDF
A model for privacy-enhance federated identity management
rhoerbe1
 
PPTX
CIS 2013 Ping Identity Chalktalk
Craig Wu
 
PPTX
Ping Identity
Ping Identity
 
PDF
PingOne IDaaS: What You Need to Know
CloudIDSummit
 
PDF
CIS14: PingOne IDaaS: What You Need to Know
CloudIDSummit
 
PDF
FIDO, Federation and the Internet of Things
FIDO Alliance
 
PDF
Patterns to Bring Enterprise and Social Identity to the Cloud
CA API Management
 
PPT
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
e-Xpert Solutions SA
 
PDF
The “I” in API is for Identity (Nordic APIS April 2014)
Nordic APIs
 
CIS14: Identity at Scale: Next Gen Federation Architectures
CloudIDSummit
 
CIS 2015 Extreme SAML - Hans Zandbelt
CloudIDSummit
 
CIS13: Federation Protocol Cross-Section
CloudIDSummit
 
SAML and Other Types of Federation for Your Enterprise
Denis Gundarev
 
Identity Federation on JBossAS
Roger CARHUATOCTO
 
An interoperability framework for
IJCNCJournal
 
IdP, SAML, OAuth
Dan Brinkmann
 
Jan19 scim webinar-04
Paul Madsen
 
Ping solutions overview_111904
eaiti
 
CIS 2015- Beyond Federation Protocols- Praerit Garg
CloudIDSummit
 
Connecting The Real World With The Virtual World
Ping Identity
 
A model for privacy-enhance federated identity management
rhoerbe1
 
CIS 2013 Ping Identity Chalktalk
Craig Wu
 
Ping Identity
Ping Identity
 
PingOne IDaaS: What You Need to Know
CloudIDSummit
 
CIS14: PingOne IDaaS: What You Need to Know
CloudIDSummit
 
FIDO, Federation and the Internet of Things
FIDO Alliance
 
Patterns to Bring Enterprise and Social Identity to the Cloud
CA API Management
 
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
e-Xpert Solutions SA
 
The “I” in API is for Identity (Nordic APIS April 2014)
Nordic APIs
 

More from CloudIDSummit (20)

PPTX
CIS 2016 Content Highlights
CloudIDSummit
 
PPTX
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CloudIDSummit
 
PDF
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CloudIDSummit
 
PDF
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 
PDF
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CloudIDSummit
 
PDF
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CloudIDSummit
 
PDF
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CloudIDSummit
 
PDF
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CloudIDSummit
 
PDF
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CloudIDSummit
 
PDF
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CloudIDSummit
 
PDF
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CloudIDSummit
 
PDF
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CloudIDSummit
 
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CloudIDSummit
 
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
CloudIDSummit
 
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CloudIDSummit
 
PDF
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CloudIDSummit
 
PDF
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CloudIDSummit
 
PDF
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CloudIDSummit
 
PDF
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CloudIDSummit
 
PDF
CIS 2015 Identity Relationship Management in the Internet of Things
CloudIDSummit
 
CIS 2016 Content Highlights
CloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CloudIDSummit
 

Recently uploaded (20)

PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
Doc9.....................................
SofiaCollazos
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 

CIS13: Identity at Scale

  • 1. Copyright ©2013 Ping Identity Corporation. All rights reserved.1 Identity at Scale Hans Zandbelt CTO Office – Ping Identity CIS 2013
  • 2. Copyright ©2013 Ping Identity Corporation. All rights reserved.2 •  Trends and Standards •  Identity at Scale •  Recommendations Contents
  • 3. Copyright ©2013 Ping Identity Corporation. All rights reserved.3 Trends •  Cloud (SaaS), Mobile, Social –  Authentication: SAML -> +OpenID Connect •  Web -> API –  Core business: information and data, not presentation •  Internet of Things •  Mutual authentication? –  controlling other cars, toasters, lightbulbs
  • 4. Copyright ©2013 Ping Identity Corporation. All rights reserved.4 •  Standards –  Interoperability: need to deal with another vendor’s API/ product? Not an app for every thing in the IoT! –  cross-domain –  competition, replaceable implementations, leading to good but cheap products? •  APIs –  Light-weight, SOAP -> REST/OAuth 2.0 •  Web SSO –  Enterprise/Customer Identity, Consumer Identity –  SAML -> OpenID Connect : scale? •  OpenID Connect –  Simplicity for clients/RPs -> complexity shifted to the OP Standards (the nice thing is…)
  • 5. Copyright ©2013 Ping Identity Corporation. All rights reserved.5 IDENTITY AT SCALE
  • 6. Copyright ©2013 Ping Identity Corporation. All rights reserved.6 1-1 Federated Identity Today •  Increase of Cloud/SaaS adoption –  # federated SSO applications (SAML) –  # partner connections –  # connection management overhead (*) •  But(!) also for “incidental” connections –  How to obtain updates •  Authoritative source -> trust •  Infrastructure: authenticated source (e-mail…) –  How to configure them •  Automated •  Managed, outsourced IDP IDP IDP SP SP SP
  • 7. Copyright ©2013 Ping Identity Corporation. All rights reserved.7 •  Metadata related (not so standard for other-than-SAML protocols) –  key material –  SSO service URLs –  point of contact •  Attributes –  could be metadata, often isn’t –  may be bilateral (!) –  required/optional, consent •  Policies –  contractual agreements –  privacy •  End-user/application/SSO related –  how users can sign in (relation to service URLs) –  change in look and feel –  change in functionality (*) Connection Management <md>
  • 8. Copyright ©2013 Ping Identity Corporation. All rights reserved.8 Metadata - SAML 2.0 •  Technical Trust •  X.509 Certificate –  Anchored vs. unanchored –  Key vs. other cert info •  URLs/Bindings •  Contact info –  Company name, admin/tech contact <md:EntityDescriptor! xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata"! xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion"! xmlns:ds="http://www.w3.org/2000/09/xmldsig#"! entityID="https://idp.example.org/SAML2">! ! <!-- insert ds:Signature element -->! ! <md:IDPSSODescriptor! protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">! ! <md:KeyDescriptor use="signing">! <ds:KeyInfo>…</ds:KeyInfo>! </md:KeyDescriptor>! ! <md:SingleSignOnService! Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"! Location="https://idp.example.org/SAML2/SSO/POST"/>! <md:SingleSignOnService! Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact"! Location="https://idp.example.org/SAML2/Artifact"/>! ! </md:IDPSSODescriptor>! ! <md:Organization>! <md:OrganizationName xml:lang="en">! SAML Identity Provider ! </md:OrganizationName>! <md:OrganizationURL xml:lang="en">! http://www.idp.example.org/! </md:OrganizationURL>! </md:Organization>! ! <md:ContactPerson contactType="technical">! <md:SurName>SAML IdP Support</md:SurName>! <md:EmailAddress>mailto:[email protected]</ md:EmailAddress>! </md:ContactPerson>! ! </md:EntityDescriptor>!
  • 9. Copyright ©2013 Ping Identity Corporation. All rights reserved.9 Connection Management Metadata/Technical Issues •  Conn Mgmt often a one-shot process (cq. a snapshot) •  Certificate expiry and update •  Contact info update •  URL and binding updates •  Changes in IDP discovery process •  Metadata documents can contribute to the solution, but how to scale exchange? Key Rollover Contact Info Bindings & URLs
  • 10. Copyright ©2013 Ping Identity Corporation. All rights reserved.10 Contrary to popular belief: The connection management problem is NOT specific to SAML; any federated authentication system deployed on true internet scale will have to address this issue. So: any solution should be protocol agnostic. BE AWARE
  • 11. Copyright ©2013 Ping Identity Corporation. All rights reserved.11 TOWARDS A SOLUTION What can we do?
  • 12. Copyright ©2013 Ping Identity Corporation. All rights reserved.12 Solution Approach (n=2): Shared Conn. Mgmt. •  Single/central/shared point of connection management (trust) •  Trusted 3rd party –  From: user trust scale through 2nd party to SP/IDP trust through 3rd-party •  Compares to TLS and a Certificate Authority or DNS •  Challenge –  How to create a trusted channel Shared Service IDP IDP IDP SP SP SP
  • 13. Copyright ©2013 Ping Identity Corporation. All rights reserved.13 A shared service… where does it apply? •  intra-enterprise –  large distributed organizations, both infrastructure and responsibilities/trust (acquisitions and mergers) –  connect multiple applications to a variety of externals & internals; “user access firewall” •  inter-enterprise –  verticals: healthcare, automotive, banking/ financial, education but also "cross e-Gov” –  homogeneous(!) group with shared interest/organization IDP SP IDP SP IDP SP IDP SP
  • 14. Copyright ©2013 Ping Identity Corporation. All rights reserved.14 A Next Step In Architecture Evolution… Application Server App 1 Fed Fed Fed App 2 App 3 App Server or Access System App 1 Federation App 2 App 3 App Server App 1 Federation Server App 2 App 3 App Server App Srv App 1 Fed Server App 2 App Srv Connection Management App Server App 3 Fed Fed App 4 1 2 3 4
  • 15. Copyright ©2013 Ping Identity Corporation. All rights reserved.15 Solution 1: Proxy •  Indirect peer-to-peer communication •  Trust proxy only, relay to peers, inband •  Shift the metadata problem to a central facility: no distr. mgmt •  Technical trust may be combined with organizational trust •  Connection Mgmt –  MxN -> M+N •  Accommodate for diff SAML implementations •  Protocol translations are possible Operator IDP IDP IDP SP SP SP SAML Proxy SP-IDP SAML
  • 16. Copyright ©2013 Ping Identity Corporation. All rights reserved.16 Benefits •  Scalability of trust –  Technical: single connection to proxy, central management of partner connections –  Organizational: trust in proxy operator •  Updates –  outsourced to the proxy; proxy to solve… •  Discovery & Autoconf –  Outsourced to the proxy; proxy to solve… Centralized Trust Mgmt Updates Discovery & Autoconf
  • 17. Copyright ©2013 Ping Identity Corporation. All rights reserved.17 Solution 2: Metadata Service •  aka. multi-party federation •  Higher Education & Research –  InCommon, UK Access Federation –  40+ across the world •  Business Verticals –  Healthcare –  Finance –  e-Gov •  Async technical trust •  Sync direct peer-to- peer communication •  Metadata upload (!) Federation Operator IDP IDP IDP SP SP SP SAML Metadata
  • 18. Copyright ©2013 Ping Identity Corporation. All rights reserved.18 Distribution variants (SAML 2.0 metadata) •  Flat file based (classic) –  > 10 Mb files for large federations (EntitiesDescriptor) •  Query-based (MDX) •  Well known location for metadata –  EntityID-is-URL-to- Metadata –  SAML auto-connect (Ping Identity) •  DNS based (registry) •  Trust 1.  signed metadata 2.  trusted registry 3.  SSL CA IDP SP IDP SP IDP SP IDP SP IDP IDP D N S IDP D N S 1 2 3
  • 19. Copyright ©2013 Ping Identity Corporation. All rights reserved.19 Metadata Expiry (!) •  Attributes on Entity and Entities level: validUntil and cacheDuration •  On EntitiesDescriptor and EntityDescriptor level •  use only validUntil to enforce expiration •  use cacheDuration to override (downward) the refresh interval •  keep using (valid) metadata if the refresh fails d! t1! t1+d! t1+2d! v=t2! t2+d! t2+2d! d = cacheDuration (interval)! v = validUntil (timestamp)! d!
  • 20. Copyright ©2013 Ping Identity Corporation. All rights reserved.20 Benefits •  Scalability of trust –  Technical: removes need to exchange metadata on peer-to- peer basis –  Organizational: federation operator does IDP and SP vetting through contractual agreements •  Key rollover –  Include multiple signing keys for a <validUntil> period •  Discovery and auto- configuration –  Building block… Scalability of Trust Key Rollover Discovery & Autoconf
  • 21. Copyright ©2013 Ping Identity Corporation. All rights reserved.21 Metadata Service layering: interfederation Interfederation Operator IDP IDP SP SP IDP IDP SP SP Metadata Metadata Aggregated Metadata
  • 22. Copyright ©2013 Ping Identity Corporation. All rights reserved.22 •  MDUI –  SAML version 2.0 Metadata Extensions for Login and Discovery User interface, version 1.0 •  Entity attributes –  SAML V2.0 Metadata Extension for Entity Attributes Version 1.0 –  Generic extension point •  Signed Entity Attributes –  Single source of metadata, support multiple trust levels or hierarchies •  Other protocols –  SAML 1.0, SAML 1.1 –  WS-Federation (ADFS 2.0) –  OpenID 2.0 –  OpenID Connect (?) -> independent registry or attr SAML 2.0 Metadata extensions
  • 23. Copyright ©2013 Ping Identity Corporation. All rights reserved.23 Taxonomy + Examples External Internal Model Proxy Metadata IDMaaS (PingOne) Federation (InCommon) Proxy (PingFed`) “Metadata Server” Deployment
  • 24. Copyright ©2013 Ping Identity Corporation. All rights reserved.24 •  Proxy –  PingOne –  wayf.dk •  Metadata Service –  InCommon –  UK Access Federation Any SAML product implementation today may or not support one or both models, in the core or through customizations. Solution Examples for SAML 2.0
  • 25. Copyright ©2013 Ping Identity Corporation. All rights reserved.25 OpenID Connect Metadata (OP and RP) •  Metadata and key material separated •  Use HTTP cache info for the JWK set (optional) •  Multiple keys with “kids” – JIT: client fetches kid if unknown •  Client updates keys with OP through DynReg OPRP JWK set metadata JWK set metadata Metadata Service Dynamic Client Registration
  • 26. Copyright ©2013 Ping Identity Corporation. All rights reserved.26 RECOMMENDATIONS
  • 27. Copyright ©2013 Ping Identity Corporation. All rights reserved.27 •  The problem is not protocol specific (!) –  Any solution should be multi-protocol enabled or rather protocol agnostic •  A shared service, two possible approaches –  Metadata Service (“automate”) or Proxy (“outsource”) •  True Internet scale? Expect combinations (!) –  Local/enterprise/community: proxy based –  Protocol Translation: proxy –  Global: (interconnected) metadata service based Recommendations
  • 28. Copyright ©2013 Ping Identity Corporation. All rights reserved.28 •  Registration and publishing service for “endpoint” metadata –  Multi-protocol: both SAML 2.0 and OpenID Connect (OPs) •  Technical Trust –  authenticated, trusted source •  Discovery –  multiple entities on a single OIDC domain –  Entities that cannot or will not host their own metadata –  Replace well-known URL starting point •  Validation •  Certification Metadata Service
  • 29. Copyright ©2013 Ping Identity Corporation. All rights reserved.29 Future? Not so much! •  Identity is/as KEY –  not just users, but also devices and applications •  Unified access policy implementation across web and APIs/Mobile –  Based on identity •  Enterprise: –  Single System -> Identity Bridge •  Identity Bridge –  Bridge external SAML and OpenID Connect to internal OpenID Connect (both ends standardized)
  • 30. Copyright ©2013 Ping Identity Corporation. All rights reserved.30 Thank You Q&A @hanszandbelt Ping Identity