SlideShare a Scribd company logo
Blibli Web Application Security Policy
Enforcement Point
Presented by Yudhi Karunia Surtan
Introduction
2
Yudhi Karunia Surtan
Work Code Name : Jon
Email : yudhi.k.surtan@gdn-commerce.com
Competition Achievement :
– Hackathon Bandung 2012, Soft-layer challenge 1st winner.
Professional Experience : 12 Years
Skill Concentration : Performance And Security
Title : Senior Principal Software Development Engineer
Software Security??
3
Software security is an idea implemented to protect software against
malicious attack and other hacker risks so that the software continues
to function correctly under such potential risks. Security is necessary to
provide integrity, authentication and availability.
Our Session Overview
• Blibli IT Department Facts
• Blibli Enterprise Architecture Overview
• Architecture Advantages vs Disadvantages (Security)
• Solution
• Chosen Technology Overview
• How To Combine All Technologies Together
• Authentication And Authorization Architecture
• Behind The Great Idea
• What We at Blibli.com Achieved
• What We at Blibli.com Learned
4
Blibli IT Department Facts
5
• > 80 Micro Services (UI and API) for both internal and external
customers
• > 100 Developers
• > 20 Teams
• 3 Weeks Release Cycle
• < 500 ms Application response time goal (Soft Agreement)
• < 4 seconds end user response time
Micro Services
Blibli Enterprise Architecture Overview
6
UI B-1
UI A-1
UI B-2
LB
LB
UI A-1
LB
LB
API A-1
API A-2
API B-1
API B-2
The Advantages of Architecture
• Independent Team and development cycle
• Rapid Software Development
• Each Microservices maintain their own data
• Problem and bug isolation
7
The Disadvantages of Architecture (Security)
• Is one user role will be the same across all the UI ?
• Are the user duplicated across all the UI ?
• How each application will check the role ?
• Is that possible to change the role during the runtime ?
• Is the user should login every time they change the UI
service?
• Etc… (Anyone saw problems from previous slide?)
8
Solution
• Make an UI Framework which provide the abstraction for
authentication and authorization without explicit declaration during
development.
• Centralize the user repository for easy maintainability purpose
• Single Sign On and Single Sign Off features
• Developer create roles by functionality point of view, business user
will mapping it with their role name
9
Chosen Technology Overview
10
• Spring Security
A Java/Java EE framework that provides authentication, authorization and
other security features for enterprise applications
• Apereo CAS
The Central Authentication Service project, more commonly referred to as
CAS is an authentication system originally created by Yale University to
provide a trusted way for an application to authenticate a user.
• Apache Fortress
A standards-based access management system, written in Java, that
provides role-based access control, delegated administration and password
policy services with LDAP.
Combine All the technologies
11
• Apereo CAS will Act as the provider for Single Sign On and Off
• Apache Fortress Will Provide Authorization and Whitelist of Security
Policies
• Spring Security as the main development framework for put the
logic authentication and authorization mechanism
• Create a templating project, so developer can easily setup their
project using those template
Authentication and Authorization Architecture
12
UI Service
API
Service
CAS
FortressLDAP
Delegate Authentication
RESTFul
User
Http Request
Behind the great idea
There are also another problems :
1. How developer should not statically type the roles in their
codes, especially in their javascript/presentation layer for hiding
a button
2. How to cut the response by roles, unnecessary information
need to be hide from other role
13
What We at Blibli Achieved
14
• Decouple business and application logic from security authorization
• More productive and predictive software
• User Roles Security and Easy Maintainability
• Single user repository for all internal application
What We at Blibli.com learned
15
Any Questions?
16
THANK YOU
17

More Related Content

PPTX
Managing Security in Agile Culture
PDF
Telco Business & Technology
PDF
Architecting for Hyper Growth and Great Engineering Culture
PDF
Implement OpenSAMM on blibli.com
PDF
The Evolution of Software for a Startup
PPTX
tantangan menjadi developer di abad 21
PDF
[WSO2Con EU 2017] Resilience Patterns with Ballerina
PPTX
The DevOps Journey
Managing Security in Agile Culture
Telco Business & Technology
Architecting for Hyper Growth and Great Engineering Culture
Implement OpenSAMM on blibli.com
The Evolution of Software for a Startup
tantangan menjadi developer di abad 21
[WSO2Con EU 2017] Resilience Patterns with Ballerina
The DevOps Journey

What's hot (20)

PDF
Micro Focus Filr - #MFSummit2017
PPTX
Static Application Security Testing Strategies for Automation and Continuous ...
PDF
Nicolas destor pres_f5agility2018
PPTX
OReilly Software Architecture Conference: Architecture as code - objective m...
PDF
Connect Bridge - Basic intoduction deck
PDF
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
PPT
BlackDuck Suite
PPTX
Agile software security assurance
PDF
Don't Let Open Source be the Deal Breaker In Your M&A
PDF
Training Webinar: Fitting OutSystems applications into Enterprise Architecture
PDF
What's New In Entando 6 (And Why Your Developers Will Love It)
PPTX
Building a Mobile Security Program
PPT
FLIGHT Amsterdam Presentation - From Protex to Hub
PPTX
Do you need microservices architecture?
PPTX
Enable DevSecOps using JIRA Software
PDF
Windows 7 v/ Kristian Svantorp Microsoft
PPTX
DevOps Security: A New Paradigm
PPTX
Programming languages and techniques for today’s embedded andIoT world
PDF
[WSO2 API Day Chicago 2019] Sustainable Competitive Advantage
PPTX
Digital Product Security
Micro Focus Filr - #MFSummit2017
Static Application Security Testing Strategies for Automation and Continuous ...
Nicolas destor pres_f5agility2018
OReilly Software Architecture Conference: Architecture as code - objective m...
Connect Bridge - Basic intoduction deck
Flight WEST 2018 Presentation - A Buyer Investor Playbook for Successfully Na...
BlackDuck Suite
Agile software security assurance
Don't Let Open Source be the Deal Breaker In Your M&A
Training Webinar: Fitting OutSystems applications into Enterprise Architecture
What's New In Entando 6 (And Why Your Developers Will Love It)
Building a Mobile Security Program
FLIGHT Amsterdam Presentation - From Protex to Hub
Do you need microservices architecture?
Enable DevSecOps using JIRA Software
Windows 7 v/ Kristian Svantorp Microsoft
DevOps Security: A New Paradigm
Programming languages and techniques for today’s embedded andIoT world
[WSO2 API Day Chicago 2019] Sustainable Competitive Advantage
Digital Product Security
Ad

Similar to Blibli Web Application Security Policy Enforcement Point (20)

PDF
Profile_Ahmad2
PPTX
The user s identities
PDF
Abhishek latest
PDF
7. oracle iam11g+strategyodrom
PDF
Getting Started with API Management – Why It's Needed On-prem and in the Cloud
PPT
2011 NASA Open Source Summit - Forge.mil
DOC
Subhajit_Das_Resume_2015
DOC
Subhajit das resume_2015
DOC
BadesahebKBichu
DOC
kowsalyamanickam_resume_OIM
DOC
Surya_CV
PPTX
Introduction-to-the-Waterfall-Model.pptx
PPTX
ABC’s Proposal
PPTX
Webinar: APPSeCONNECT Product Updates 2019 - Major Highlights
PDF
Wise Men Oracle Mobility Webinar- 11-December-2014
DOC
Alpana_Srivastava
DOC
5.10 years Expetience in Asp.net with MVC
DOC
Malli Resume_30 Jun 2012
Profile_Ahmad2
The user s identities
Abhishek latest
7. oracle iam11g+strategyodrom
Getting Started with API Management – Why It's Needed On-prem and in the Cloud
2011 NASA Open Source Summit - Forge.mil
Subhajit_Das_Resume_2015
Subhajit das resume_2015
BadesahebKBichu
kowsalyamanickam_resume_OIM
Surya_CV
Introduction-to-the-Waterfall-Model.pptx
ABC’s Proposal
Webinar: APPSeCONNECT Product Updates 2019 - Major Highlights
Wise Men Oracle Mobility Webinar- 11-December-2014
Alpana_Srivastava
5.10 years Expetience in Asp.net with MVC
Malli Resume_30 Jun 2012
Ad

More from SARCCOM (18)

PDF
Week 3 Deep Learning And POS Tagging Hands-On
PDF
Week 2 Sentiment Analysis Using Machine Learning
PDF
Week 1 Natural Language Processing Introduction
PDF
The Secret of Most Wanted Geek
PDF
Fundamental of Machine Learning
PDF
Data Warehousing Tools on Data Ecosystem
PDF
Startup Engineering Culture
PDF
Menggapai Paripurna Rekayasa
PPTX
Requirement Gathering Jump Start
PDF
Legacy code - Taming The Beast
PPTX
The Role of IT Architect in Enterprise Company (Garuda Indonesia)
PDF
The Role of IT Architect in Startup Company
PDF
Architecting for Huper Growth and Great Engineering Culture
PPTX
Software Architecture Introduction
PPTX
Software Architecture Fundamentals Part-1 Architecture soft skill
PDF
Best Practice In Software Development
PPTX
Is your code SOLID enough?
PPTX
How to work with us? We are Gen Y!
Week 3 Deep Learning And POS Tagging Hands-On
Week 2 Sentiment Analysis Using Machine Learning
Week 1 Natural Language Processing Introduction
The Secret of Most Wanted Geek
Fundamental of Machine Learning
Data Warehousing Tools on Data Ecosystem
Startup Engineering Culture
Menggapai Paripurna Rekayasa
Requirement Gathering Jump Start
Legacy code - Taming The Beast
The Role of IT Architect in Enterprise Company (Garuda Indonesia)
The Role of IT Architect in Startup Company
Architecting for Huper Growth and Great Engineering Culture
Software Architecture Introduction
Software Architecture Fundamentals Part-1 Architecture soft skill
Best Practice In Software Development
Is your code SOLID enough?
How to work with us? We are Gen Y!

Recently uploaded (20)

PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
Softaken Excel to vCard Converter Software.pdf
PPT
Introduction Database Management System for Course Database
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
AI in Product Development-omnex systems
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
ISO 45001 Occupational Health and Safety Management System
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
Online Work Permit System for Fast Permit Processing
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
Introduction to Artificial Intelligence
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PDF
System and Network Administraation Chapter 3
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
ai tools demonstartion for schools and inter college
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Softaken Excel to vCard Converter Software.pdf
Introduction Database Management System for Course Database
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
AI in Product Development-omnex systems
How Creative Agencies Leverage Project Management Software.pdf
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
ISO 45001 Occupational Health and Safety Management System
Upgrade and Innovation Strategies for SAP ERP Customers
Online Work Permit System for Fast Permit Processing
Design an Analysis of Algorithms II-SECS-1021-03
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
2025 Textile ERP Trends: SAP, Odoo & Oracle
Introduction to Artificial Intelligence
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
System and Network Administraation Chapter 3
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
ai tools demonstartion for schools and inter college
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf

Blibli Web Application Security Policy Enforcement Point

  • 1. Blibli Web Application Security Policy Enforcement Point Presented by Yudhi Karunia Surtan
  • 2. Introduction 2 Yudhi Karunia Surtan Work Code Name : Jon Email : yudhi.k.surtan@gdn-commerce.com Competition Achievement : – Hackathon Bandung 2012, Soft-layer challenge 1st winner. Professional Experience : 12 Years Skill Concentration : Performance And Security Title : Senior Principal Software Development Engineer
  • 3. Software Security?? 3 Software security is an idea implemented to protect software against malicious attack and other hacker risks so that the software continues to function correctly under such potential risks. Security is necessary to provide integrity, authentication and availability.
  • 4. Our Session Overview • Blibli IT Department Facts • Blibli Enterprise Architecture Overview • Architecture Advantages vs Disadvantages (Security) • Solution • Chosen Technology Overview • How To Combine All Technologies Together • Authentication And Authorization Architecture • Behind The Great Idea • What We at Blibli.com Achieved • What We at Blibli.com Learned 4
  • 5. Blibli IT Department Facts 5 • > 80 Micro Services (UI and API) for both internal and external customers • > 100 Developers • > 20 Teams • 3 Weeks Release Cycle • < 500 ms Application response time goal (Soft Agreement) • < 4 seconds end user response time
  • 6. Micro Services Blibli Enterprise Architecture Overview 6 UI B-1 UI A-1 UI B-2 LB LB UI A-1 LB LB API A-1 API A-2 API B-1 API B-2
  • 7. The Advantages of Architecture • Independent Team and development cycle • Rapid Software Development • Each Microservices maintain their own data • Problem and bug isolation 7
  • 8. The Disadvantages of Architecture (Security) • Is one user role will be the same across all the UI ? • Are the user duplicated across all the UI ? • How each application will check the role ? • Is that possible to change the role during the runtime ? • Is the user should login every time they change the UI service? • Etc… (Anyone saw problems from previous slide?) 8
  • 9. Solution • Make an UI Framework which provide the abstraction for authentication and authorization without explicit declaration during development. • Centralize the user repository for easy maintainability purpose • Single Sign On and Single Sign Off features • Developer create roles by functionality point of view, business user will mapping it with their role name 9
  • 10. Chosen Technology Overview 10 • Spring Security A Java/Java EE framework that provides authentication, authorization and other security features for enterprise applications • Apereo CAS The Central Authentication Service project, more commonly referred to as CAS is an authentication system originally created by Yale University to provide a trusted way for an application to authenticate a user. • Apache Fortress A standards-based access management system, written in Java, that provides role-based access control, delegated administration and password policy services with LDAP.
  • 11. Combine All the technologies 11 • Apereo CAS will Act as the provider for Single Sign On and Off • Apache Fortress Will Provide Authorization and Whitelist of Security Policies • Spring Security as the main development framework for put the logic authentication and authorization mechanism • Create a templating project, so developer can easily setup their project using those template
  • 12. Authentication and Authorization Architecture 12 UI Service API Service CAS FortressLDAP Delegate Authentication RESTFul User Http Request
  • 13. Behind the great idea There are also another problems : 1. How developer should not statically type the roles in their codes, especially in their javascript/presentation layer for hiding a button 2. How to cut the response by roles, unnecessary information need to be hide from other role 13
  • 14. What We at Blibli Achieved 14 • Decouple business and application logic from security authorization • More productive and predictive software • User Roles Security and Easy Maintainability • Single user repository for all internal application
  • 15. What We at Blibli.com learned 15