SlideShare a Scribd company logo
Athenz introduction
Update: 2018/05/13
Athenz introduction - ledung@yahoo-corp.jp
Agenda
1. What is Athenz?
2. Why we use it?
3. How to Athenz work?
4. Q&A
Athenz introduction - ledung@yahoo-corp.jp
01 What is Athenz?
Athenz introduction - ledung@yahoo-corp.jp
"Athenz" is the 'Auth' + the 'N' + 'Z' tokens
O
Open source of services and
libraries supporting role-based
access control (RBAC)
Z
Z-Token: Role Token
represent an authoritative
statement that a given principal
may assume some number of
roles in a domain for a limited
period of time
A
Authorization system utilizes
two types of tokens: Principal
Tokens (N-Tokens) and RoleTokens
(Z-Tokens)
N
N-Token: Principal Token
can be thought of an identity token
because it identifies either a user or
a service
Athenz introduction - ledung@yahoo-corp.jp
02 Why we use it?
Athenz introduction - ledung@yahoo-corp.jp
Auth PaaS Service Faster
Athenz introduction - ledung@yahoo-corp.jp
1
2
3
4
Service-based security profile
Dynamic provisioning
Self-Service
Dynamic manageability.
Single source of truth

We get advantages using Athenz
We get advantages using Athenz
1
2
3
4
Service-based security profile
Dynamic provisioning
Self-Service
Dynamic manageability.
Single source of truth

We get advantages using Athenz
1
2
3
4
Service-based security profile
Dynamic provisioning
Self-Service
Dynamic manageability.
Single source of truth

We get advantages using Athenz
1
2
3
4
Service-based security profile
Dynamic provisioning
Self-Service
Dynamic manageability.
Single source of truth

We get advantages using Athenz
1
2
3
4
Service-based security profile
Dynamic provisioning
Self-Service
Dynamic manageability.
Single source of truth

We get advantages using Athenz
03 How to Athenz work?
Athenz introduction - ledung@yahoo-corp.jp
Data Model
Data Model
• Domains are namespaces, strictly partitioned,
providing a context.
• Administrative tasks can be delegated to
created sub-domains to avoid reliance on
central “super user” administrative roles.
Data Model
• As a group. Anyone in the group can assume
the role that takes a particular action.
• Every policy assertion describes what can be
done by a role.
• Delegate the determination of membership
to another trusted domain.
Data Model
• A resource is something that is “owned” and
controlled in a specific domain while the
operations one can perform against that
resource are defined as actions.
• A resource could be a concrete object like a
machine or an abstract object like a security
policy.
Data Model
• A policy is a set of assertions (rules) about
granting or denying an operation/action on a
resource to all the members in the configured
role.
Data Model
• The actors in Athenz that can assume a role
are called principals.
• These principals are authenticated and can be
users.
• Principals can also be services that are
authenticated by a service management
system.
Data Model
• Users are actually defined in some external
authority, e.g. Unix or Kerberos system.
• A special domain is reserved for the purpose
of namespacing users;
• the name of that domain is “user,”
Data Model
• The concept of a Service Identity is
introduced as the identity of independent
agents of execution.
• Services have a simple way of naming them,
e.g. media.finance.storage identifies a service
called “storage” in domain media.finance.
• A Service may be used as a principal when
specifying roles, just like a user.
Data Model
System Overview
Centralization
Decentralization
System Overview
• ZMS is the source of truth for domains, roles, and policies
for centralized authorization.
• In addition to allowing CRUD operations on the basic
entities, ZMS provides an API to replicate the entities, per
domain, to ZTS.
• ZMS supports a centralized call to check if a principal has
access to a resource both for internal management system
checks, as well as a simple centralized deployment.
System Overview
• ZTS, the authentication token service, is only needed to
support decentralized functionality.
• ZTS is like a local replica of ZMS’s data to check a principal’s
authentication and confirm membership in roles within a
domain.
• The authentication is in the form of a signed ZToken that
can be presented to any decentralized service that wants
to authorize access efficiently.
• Multiple ZTS instances can be distributed to different
locations as needed to scale for issuing tokens.
System Overview
• Service Identity Agent is part of the container, although
likely built with Athenz libraries.
• Generate a NToken and sign it with the given private key so
that the service can present that NToken to ZMS/ZTS as its
identity credentials.
• The corresponding public key must be registered in ZMS so
Athenz services can validate the signature.
System Overview
AuthZ Policy Engine
• Support decentralized authorization.
• The subsystem of Athenz that evaluates policies
for a set of roles to yield an allowed or a denied
response.
• Library that your service calls and only refers to a
local policy cache for your services domain.
System Overview
AuthZ PolicyEngine Updater
• Support decentralized authorization.
• The policy updater is the utility that retrieves from
ZTS the policy files for provisioned domains on a
host, which ZPE uses to evaluate access requests
System Overview
04 Q&A?
Athenz introduction - ledung@yahoo-corp.jp
Referrence
Athenz Yahoo! Inc:
• https://github.com/yahoo/athenz
Athenz introduction - ledung@yahoo-corp.jp
THANK YOU
ledung@yahoo-corp.jp

More Related Content

PDF
Best Practices for Becoming an Exceptional Postgres DBA
 
PPTX
Seamless replication and disaster recovery for Apache Hive Warehouse
PPTX
Unix OS & Commands
PPTX
Meet Apache HBase - 2.0
PPTX
Introduction to KSQL: Streaming SQL for Apache Kafka®
PPTX
Apache Phoenix and Apache HBase: An Enterprise Grade Data Warehouse
PPTX
Lactate dehydrogenase assays
PPTX
PMM database open source monitoring solution
Best Practices for Becoming an Exceptional Postgres DBA
 
Seamless replication and disaster recovery for Apache Hive Warehouse
Unix OS & Commands
Meet Apache HBase - 2.0
Introduction to KSQL: Streaming SQL for Apache Kafka®
Apache Phoenix and Apache HBase: An Enterprise Grade Data Warehouse
Lactate dehydrogenase assays
PMM database open source monitoring solution

What's hot (19)

PDF
Load Balancing with Nginx
PPTX
Order of draw in phlebotomy section
PPTX
“Alexa, be quiet!”: End-to-end near-real time model building and evaluation i...
PDF
How to use histograms to get better performance
PPTX
Practical learnings from running thousands of Flink jobs
PPTX
Haemoglobin estimation bishwas neupane b.sc mlt part i
PDF
New Generation Oracle RAC Performance
PDF
HbA1c : glycosylated hemoglobin
PPTX
Peritoneal Fluid Analysis
PPTX
Glycated haemoglobin ppt by Basalingappa BG
PPTX
HBase Accelerated: In-Memory Flush and Compaction
PPTX
Off-heaping the Apache HBase Read Path
PDF
Oracle R12 EBS Performance Tuning
PPTX
Common Wild Edibles
PDF
Oracle database 12c data masking and subsetting guide
PDF
USENIX ATC 2017: Visualizing Performance with Flame Graphs
PPTX
Jaundice and case discussion
PPTX
Alfresco tuning part2
PDF
Load Balancing with Nginx
Order of draw in phlebotomy section
“Alexa, be quiet!”: End-to-end near-real time model building and evaluation i...
How to use histograms to get better performance
Practical learnings from running thousands of Flink jobs
Haemoglobin estimation bishwas neupane b.sc mlt part i
New Generation Oracle RAC Performance
HbA1c : glycosylated hemoglobin
Peritoneal Fluid Analysis
Glycated haemoglobin ppt by Basalingappa BG
HBase Accelerated: In-Memory Flush and Compaction
Off-heaping the Apache HBase Read Path
Oracle R12 EBS Performance Tuning
Common Wild Edibles
Oracle database 12c data masking and subsetting guide
USENIX ATC 2017: Visualizing Performance with Flame Graphs
Jaundice and case discussion
Alfresco tuning part2
Ad

Similar to Athenz introduction (20)

PDF
Keystone Federation
PDF
Null talk
PPTX
Ladies Be Architects - Study Group III: OAuth 2.0 (Ep 1)
PPTX
Aws security best practices
PDF
.NET Core, ASP.NET Core Course, Session 19
PPTX
Common Data Model - A Business Database!
PDF
09-01-services-slides.pdf for educations
PPTX
Alec MacEachern - Scaling Enterprise Agents
PPTX
Alec MacEachern - Scaling Enterprise Agents
PPT
Win2KServer Active Directory
PPTX
Building IAM for OpenStack
PDF
apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...
PPTX
Ladies Be Architects: Integration Study Group: Security & State Management
PPTX
PRShare: a framework for privacy-preserving, interorganizational data sharing.
PPT
Authentication Authorization-Lesson-2-Slides.ppt
PPTX
Common Data Service – A Business Database!
PPTX
Restful api
PPTX
Presentation
PPTX
information security(authentication application, Authentication and Access Co...
PPTX
Cloud Identity Management
Keystone Federation
Null talk
Ladies Be Architects - Study Group III: OAuth 2.0 (Ep 1)
Aws security best practices
.NET Core, ASP.NET Core Course, Session 19
Common Data Model - A Business Database!
09-01-services-slides.pdf for educations
Alec MacEachern - Scaling Enterprise Agents
Alec MacEachern - Scaling Enterprise Agents
Win2KServer Active Directory
Building IAM for OpenStack
apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...
Ladies Be Architects: Integration Study Group: Security & State Management
PRShare: a framework for privacy-preserving, interorganizational data sharing.
Authentication Authorization-Lesson-2-Slides.ppt
Common Data Service – A Business Database!
Restful api
Presentation
information security(authentication application, Authentication and Access Co...
Cloud Identity Management
Ad

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Big Data Technologies - Introduction.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
Teaching material agriculture food technology
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Machine Learning_overview_presentation.pptx
MYSQL Presentation for SQL database connectivity
Big Data Technologies - Introduction.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
The AUB Centre for AI in Media Proposal.docx
Teaching material agriculture food technology
Review of recent advances in non-invasive hemoglobin estimation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
A comparative analysis of optical character recognition models for extracting...
Diabetes mellitus diagnosis method based random forest with bat algorithm
The Rise and Fall of 3GPP – Time for a Sabbatical?
Mobile App Security Testing_ A Comprehensive Guide.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Network Security Unit 5.pdf for BCA BBA.
Per capita expenditure prediction using model stacking based on satellite ima...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Approach and Philosophy of On baking technology
Programs and apps: productivity, graphics, security and other tools
Machine Learning_overview_presentation.pptx

Athenz introduction

  • 1. Athenz introduction Update: 2018/05/13 Athenz introduction - ledung@yahoo-corp.jp
  • 2. Agenda 1. What is Athenz? 2. Why we use it? 3. How to Athenz work? 4. Q&A Athenz introduction - ledung@yahoo-corp.jp
  • 3. 01 What is Athenz? Athenz introduction - ledung@yahoo-corp.jp
  • 4. "Athenz" is the 'Auth' + the 'N' + 'Z' tokens O Open source of services and libraries supporting role-based access control (RBAC) Z Z-Token: Role Token represent an authoritative statement that a given principal may assume some number of roles in a domain for a limited period of time A Authorization system utilizes two types of tokens: Principal Tokens (N-Tokens) and RoleTokens (Z-Tokens) N N-Token: Principal Token can be thought of an identity token because it identifies either a user or a service Athenz introduction - ledung@yahoo-corp.jp
  • 5. 02 Why we use it? Athenz introduction - ledung@yahoo-corp.jp
  • 6. Auth PaaS Service Faster Athenz introduction - ledung@yahoo-corp.jp
  • 7. 1 2 3 4 Service-based security profile Dynamic provisioning Self-Service Dynamic manageability. Single source of truth  We get advantages using Athenz
  • 8. We get advantages using Athenz
  • 9. 1 2 3 4 Service-based security profile Dynamic provisioning Self-Service Dynamic manageability. Single source of truth  We get advantages using Athenz
  • 10. 1 2 3 4 Service-based security profile Dynamic provisioning Self-Service Dynamic manageability. Single source of truth  We get advantages using Athenz
  • 11. 1 2 3 4 Service-based security profile Dynamic provisioning Self-Service Dynamic manageability. Single source of truth  We get advantages using Athenz
  • 12. 1 2 3 4 Service-based security profile Dynamic provisioning Self-Service Dynamic manageability. Single source of truth  We get advantages using Athenz
  • 13. 03 How to Athenz work? Athenz introduction - ledung@yahoo-corp.jp
  • 15. Data Model • Domains are namespaces, strictly partitioned, providing a context. • Administrative tasks can be delegated to created sub-domains to avoid reliance on central “super user” administrative roles.
  • 16. Data Model • As a group. Anyone in the group can assume the role that takes a particular action. • Every policy assertion describes what can be done by a role. • Delegate the determination of membership to another trusted domain.
  • 17. Data Model • A resource is something that is “owned” and controlled in a specific domain while the operations one can perform against that resource are defined as actions. • A resource could be a concrete object like a machine or an abstract object like a security policy.
  • 18. Data Model • A policy is a set of assertions (rules) about granting or denying an operation/action on a resource to all the members in the configured role.
  • 19. Data Model • The actors in Athenz that can assume a role are called principals. • These principals are authenticated and can be users. • Principals can also be services that are authenticated by a service management system.
  • 20. Data Model • Users are actually defined in some external authority, e.g. Unix or Kerberos system. • A special domain is reserved for the purpose of namespacing users; • the name of that domain is “user,”
  • 21. Data Model • The concept of a Service Identity is introduced as the identity of independent agents of execution. • Services have a simple way of naming them, e.g. media.finance.storage identifies a service called “storage” in domain media.finance. • A Service may be used as a principal when specifying roles, just like a user.
  • 24. System Overview • ZMS is the source of truth for domains, roles, and policies for centralized authorization. • In addition to allowing CRUD operations on the basic entities, ZMS provides an API to replicate the entities, per domain, to ZTS. • ZMS supports a centralized call to check if a principal has access to a resource both for internal management system checks, as well as a simple centralized deployment.
  • 25. System Overview • ZTS, the authentication token service, is only needed to support decentralized functionality. • ZTS is like a local replica of ZMS’s data to check a principal’s authentication and confirm membership in roles within a domain. • The authentication is in the form of a signed ZToken that can be presented to any decentralized service that wants to authorize access efficiently. • Multiple ZTS instances can be distributed to different locations as needed to scale for issuing tokens.
  • 26. System Overview • Service Identity Agent is part of the container, although likely built with Athenz libraries. • Generate a NToken and sign it with the given private key so that the service can present that NToken to ZMS/ZTS as its identity credentials. • The corresponding public key must be registered in ZMS so Athenz services can validate the signature.
  • 27. System Overview AuthZ Policy Engine • Support decentralized authorization. • The subsystem of Athenz that evaluates policies for a set of roles to yield an allowed or a denied response. • Library that your service calls and only refers to a local policy cache for your services domain.
  • 28. System Overview AuthZ PolicyEngine Updater • Support decentralized authorization. • The policy updater is the utility that retrieves from ZTS the policy files for provisioned domains on a host, which ZPE uses to evaluate access requests
  • 30. 04 Q&A? Athenz introduction - ledung@yahoo-corp.jp
  • 31. Referrence Athenz Yahoo! Inc: • https://github.com/yahoo/athenz Athenz introduction - ledung@yahoo-corp.jp