NEXT GEN FEDERATION
ARCHITECTURES
Identity at Scale
July 21st – Cloud Identity Summit 2014
Hans Zandbelt - CTO Office – Ping Identity
Copyright © 2014 Ping Identity Corp.All rights reserved. 1
Overview
1
• Challenges in Federated IDM
2
• Strategies for Scaling FIDM
3
• Now What?
•  Manual Creation/Mgmt
–  1-1
–  Increasing numbers
•  Authoritative/authenticated
source
•  Updates
–  Key rollover(!)
Challenges
Federated Identity Today
IDPSP
IDPSP
IDPSP
•  No overarching trust model
–  compare to SSL & Server Cert PKI
•  No trust model, p2p
–  No way forward to the IoT
•  3rd party provided trust is key
–  compare to SSL CA
•  Apply to / across:
–  Web SSO and API Access
–  mutual authentication
•  Technical Trust vs. Behavioral Trust
Trust Model
Beyond Standards and Protocols
[1] http://shop.soundingboardink.com/shop/2011/01/18/an-operational-definition-of-trust/!
Architecture Evolution
1
App
Fed
App
Fed
App
Fed
2
Federation
Application/Access Server
App App App
3
App App App
Federation Server
App. Server App. Server
4
Connection Management
App
Fed
App
Fed
App App
App. Server
Federation
Architectural Separation of Concerns
• Data Layer
– Protocol Runtime
– Message Processing
• Control Layer
– Technical Trust (protocol independent)
– Connection Management
Copyright © 2014 Ping Identity Corp.All rights reserved. 6
Trusted Shared Service
•  Single/central/shared point of
connection management (trust)
•  Trusted 3rd party
•  From: user trust scale through
2nd party to SP/IDP trust
through 3rd-party
•  Compares to TLS CA or
DNS(sec) root hierarchy
•  Challenge: problem reduced in
size, shifted up one level
IDPSP
IDPSP
IDPSP
•  Outsource metadata
management to a central
inband service
•  Trust proxy only, relay to peers,
inhouse/outhouse
•  MxN -> M+N connections
•  Technical trust may be
combined with organizational
trust
•  Accommodate for different
SAML implementations &
protocol translations
Solution 1: Proxy
IDPSP
IDPSP
IDPSP
Proxy
SPIDP
Metadata
•  Outsource metadata
management to a central out-
of-band service
•  aka. multi-party federation
•  Higher Education & Research:
InCommon, UK Access
Federation, 50+
•  Async technical trust (M+N)
•  Sync direct peer-to-peer
communication (MxN)
•  Metadata upload (!)
Solution 2: Metadata Service
IDPSP
IDPSP
IDPSP SAML
•  1-sided responsibility
instead of mutual
–  Google SAML, Salesforce
SAML, OIDC Dynamic
Client Registration
•  MxN connections+trust, but
burden shifted to 1 party
–  SAML: IDP, OIDC: RP
–  Shift rather than reduce
Solution 3*: Self Service / Registration
Copyright © 2014 Ping Identity Corp.All rights reserved. 10
IDPSP
IDPSP
IDPSP
Network
Applications
IDENTITY
¤
•  Scalable Identification
•  Scalable Security
–  Authentication, Privacy,
Confidentiality, Integrity
•  Scalable Trust
•  Scalable Attribute
Exchange
–  schemas
The Identity Layer
OpenID Connect
•  Discovery & Dynamic registration
–  auto-creation
–  auto-update (!)
•  Easier to develop, deploy, manage
•  Technical trust OOTB
–  except for “disconnected” domains -> metadata service
•  DEMO?
Copyright © 2014 Ping Identity Corp.All rights reserved. 12
•  Separate protocols for SSO and API
security
•  Heavyweight - in payload and
processing
•  Complex – develop and manage
•  Manual trust bootstrapping and
certificate management* (it’s alive)
•  SSO and API security in one
•  Lightweight – mobile
•  Simple – developer friendly
•  Auto client registration and key
management
SAML and OpenID Connect
SAML OpenID Connect
Recommendations
•  Adopt solutions for Scaling Federated IDM beyond 2015 or 50
connections
–  Short-term: auto-updates, long-term: auto-creation
–  Multi/cross protocol -> trust framework & mechanisms
•  Separate Trust/Connection Management from Protocol Runtime
–  control plane and data plane + trust framework
•  Global solution?
–  A combination of Proxy & Metadata Service & Self-Service
Copyright © 2014 Ping Identity Corp.All rights reserved. 14
Thank You
http://www.pingidentity.com
Hans Zandbelt
hzandbelt@pingidentity.com
Twitter: @hanszandbelt
QUESTIONS?

More Related Content

PDF
WSO2Con EU 2016: Future of Integration: Next Generation ESB/Integration Server
PDF
APIs from the Edge to the Mesh
PDF
Transforming Retail Banking: Competitive Advantage through Microservices
PDF
IBM InterConnect 2013 Cloud General Session: George Karidis
PDF
WSO2Con ASIA 2016: An Introduction to the WSO2 Integration Platform
PPTX
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
PDF
CIS14: PingAccess in Action
PPTX
DevOps & Apps - Building and Operating Successful Mobile Apps
WSO2Con EU 2016: Future of Integration: Next Generation ESB/Integration Server
APIs from the Edge to the Mesh
Transforming Retail Banking: Competitive Advantage through Microservices
IBM InterConnect 2013 Cloud General Session: George Karidis
WSO2Con ASIA 2016: An Introduction to the WSO2 Integration Platform
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
CIS14: PingAccess in Action
DevOps & Apps - Building and Operating Successful Mobile Apps

What's hot (20)

PDF
WSO2Con EU 2016: Understanding the WSO2 API Management Platform
PPT
Livo presentation
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
PPTX
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
PDF
[WSO2 API Day Dallas 2019] Extending Service Mesh with API Management
PDF
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
PDF
[WSO2 API Day Dallas 2019] API-Driven World
PDF
[WSO2 API Day Dallas 2019] Cloud-native Integration for the Enterprise
PPT
IntellectLink
PDF
CIS 2015 Extreme SAML - Hans Zandbelt
PDF
Architecting SaaS
PPTX
Criticality of identity
PDF
Delivering the Promise of SOA - Enterprise Integration Made Easy
PPTX
OpenID Foundation FastFed Working Group Update - 2017-10-16
PDF
Microintegration
PDF
Identiverse 2018 nathanael coffing
PDF
Deep-dive into Microservice Outer Architecture
PPTX
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
PDF
Microservice architecture-api-gateway-considerations
PPTX
API Security in a Microservice Architecture
WSO2Con EU 2016: Understanding the WSO2 API Management Platform
Livo presentation
CIS 2015 The IDaaS Dating Game - Sean Deuby
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
[WSO2 API Day Dallas 2019] Extending Service Mesh with API Management
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
[WSO2 API Day Dallas 2019] API-Driven World
[WSO2 API Day Dallas 2019] Cloud-native Integration for the Enterprise
IntellectLink
CIS 2015 Extreme SAML - Hans Zandbelt
Architecting SaaS
Criticality of identity
Delivering the Promise of SOA - Enterprise Integration Made Easy
OpenID Foundation FastFed Working Group Update - 2017-10-16
Microintegration
Identiverse 2018 nathanael coffing
Deep-dive into Microservice Outer Architecture
WSO2Con USA 2017: Enhancing Customer Experience with WSO2 Identity Server
Microservice architecture-api-gateway-considerations
API Security in a Microservice Architecture
Ad

Similar to CIS14: Identity at Scale: Next Gen Federation Architectures (20)

PDF
CIS13: Identity at Scale
PDF
CIS13: Federation Protocol Cross-Section
PDF
FIDO, Federation and the Internet of Things
PPTX
CIS 2015- Beyond Federation Protocols- Praerit Garg
PPT
Identity Federation on JBossAS
PPTX
CIS 2013 Ping Identity Chalktalk
PDF
Identity Federation Patterns with WSO2 Identity Server​
PDF
A model for privacy-enhance federated identity management
PPTX
Connecting The Real World With The Virtual World
PDF
Practical Federated Identity
PDF
An interoperability framework for
PDF
Patterns and Antipatterns in Enterprise Security
PPTX
Troubles with Large Identity Providers.pptx
PDF
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
PDF
Patterns to Bring Enterprise and Social Identity to the Cloud
PDF
Federation in Practice
PPT
Up 2011-ken huang
PDF
Security for Future Networks: A Prospective Study of AAIs
PDF
CIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
PDF
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
CIS13: Identity at Scale
CIS13: Federation Protocol Cross-Section
FIDO, Federation and the Internet of Things
CIS 2015- Beyond Federation Protocols- Praerit Garg
Identity Federation on JBossAS
CIS 2013 Ping Identity Chalktalk
Identity Federation Patterns with WSO2 Identity Server​
A model for privacy-enhance federated identity management
Connecting The Real World With The Virtual World
Practical Federated Identity
An interoperability framework for
Patterns and Antipatterns in Enterprise Security
Troubles with Large Identity Providers.pptx
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
Patterns to Bring Enterprise and Social Identity to the Cloud
Federation in Practice
Up 2011-ken huang
Security for Future Networks: A Prospective Study of AAIs
CIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Ad

More from CloudIDSummit (20)

PPTX
CIS 2016 Content Highlights
PPTX
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
PDF
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
PDF
Mobile security, identity & authentication reasons for optimism 20150607 v2
PDF
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
PDF
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
PDF
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
PDF
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
PDF
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
PDF
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
PDF
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
PDF
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PDF
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
PDF
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
PDF
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
PDF
CIS 2015 Identity Relationship Management in the Internet of Things
PDF
CIS 2015 The Ethics of Personal Data - Robin Wilton
PDF
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...
CIS 2016 Content Highlights
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
Mobile security, identity & authentication reasons for optimism 20150607 v2
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2015 What’s next? Discovery, Dynamic Registration, Mobile Connect and mor...

Recently uploaded (20)

PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Tartificialntelligence_presentation.pptx
PPTX
The various Industrial Revolutions .pptx
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Unlock new opportunities with location data.pdf
PPTX
Modernising the Digital Integration Hub
PPT
What is a Computer? Input Devices /output devices
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPT
Geologic Time for studying geology for geologist
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Hybrid model detection and classification of lung cancer
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Zenith AI: Advanced Artificial Intelligence
Tartificialntelligence_presentation.pptx
The various Industrial Revolutions .pptx
Taming the Chaos: How to Turn Unstructured Data into Decisions
Unlock new opportunities with location data.pdf
Modernising the Digital Integration Hub
What is a Computer? Input Devices /output devices
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Geologic Time for studying geology for geologist
Getting Started with Data Integration: FME Form 101
Web Crawler for Trend Tracking Gen Z Insights.pptx
O2C Customer Invoices to Receipt V15A.pptx
WOOl fibre morphology and structure.pdf for textiles
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
A novel scalable deep ensemble learning framework for big data classification...
A contest of sentiment analysis: k-nearest neighbor versus neural network
Getting started with AI Agents and Multi-Agent Systems
Hybrid model detection and classification of lung cancer
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...

CIS14: Identity at Scale: Next Gen Federation Architectures

  • 1. NEXT GEN FEDERATION ARCHITECTURES Identity at Scale July 21st – Cloud Identity Summit 2014 Hans Zandbelt - CTO Office – Ping Identity Copyright © 2014 Ping Identity Corp.All rights reserved. 1
  • 2. Overview 1 • Challenges in Federated IDM 2 • Strategies for Scaling FIDM 3 • Now What?
  • 3. •  Manual Creation/Mgmt –  1-1 –  Increasing numbers •  Authoritative/authenticated source •  Updates –  Key rollover(!) Challenges Federated Identity Today IDPSP IDPSP IDPSP
  • 4. •  No overarching trust model –  compare to SSL & Server Cert PKI •  No trust model, p2p –  No way forward to the IoT •  3rd party provided trust is key –  compare to SSL CA •  Apply to / across: –  Web SSO and API Access –  mutual authentication •  Technical Trust vs. Behavioral Trust Trust Model Beyond Standards and Protocols [1] http://shop.soundingboardink.com/shop/2011/01/18/an-operational-definition-of-trust/!
  • 5. Architecture Evolution 1 App Fed App Fed App Fed 2 Federation Application/Access Server App App App 3 App App App Federation Server App. Server App. Server 4 Connection Management App Fed App Fed App App App. Server Federation
  • 6. Architectural Separation of Concerns • Data Layer – Protocol Runtime – Message Processing • Control Layer – Technical Trust (protocol independent) – Connection Management Copyright © 2014 Ping Identity Corp.All rights reserved. 6
  • 7. Trusted Shared Service •  Single/central/shared point of connection management (trust) •  Trusted 3rd party •  From: user trust scale through 2nd party to SP/IDP trust through 3rd-party •  Compares to TLS CA or DNS(sec) root hierarchy •  Challenge: problem reduced in size, shifted up one level IDPSP IDPSP IDPSP
  • 8. •  Outsource metadata management to a central inband service •  Trust proxy only, relay to peers, inhouse/outhouse •  MxN -> M+N connections •  Technical trust may be combined with organizational trust •  Accommodate for different SAML implementations & protocol translations Solution 1: Proxy IDPSP IDPSP IDPSP Proxy SPIDP
  • 9. Metadata •  Outsource metadata management to a central out- of-band service •  aka. multi-party federation •  Higher Education & Research: InCommon, UK Access Federation, 50+ •  Async technical trust (M+N) •  Sync direct peer-to-peer communication (MxN) •  Metadata upload (!) Solution 2: Metadata Service IDPSP IDPSP IDPSP SAML
  • 10. •  1-sided responsibility instead of mutual –  Google SAML, Salesforce SAML, OIDC Dynamic Client Registration •  MxN connections+trust, but burden shifted to 1 party –  SAML: IDP, OIDC: RP –  Shift rather than reduce Solution 3*: Self Service / Registration Copyright © 2014 Ping Identity Corp.All rights reserved. 10 IDPSP IDPSP IDPSP
  • 11. Network Applications IDENTITY ¤ •  Scalable Identification •  Scalable Security –  Authentication, Privacy, Confidentiality, Integrity •  Scalable Trust •  Scalable Attribute Exchange –  schemas The Identity Layer
  • 12. OpenID Connect •  Discovery & Dynamic registration –  auto-creation –  auto-update (!) •  Easier to develop, deploy, manage •  Technical trust OOTB –  except for “disconnected” domains -> metadata service •  DEMO? Copyright © 2014 Ping Identity Corp.All rights reserved. 12
  • 13. •  Separate protocols for SSO and API security •  Heavyweight - in payload and processing •  Complex – develop and manage •  Manual trust bootstrapping and certificate management* (it’s alive) •  SSO and API security in one •  Lightweight – mobile •  Simple – developer friendly •  Auto client registration and key management SAML and OpenID Connect SAML OpenID Connect
  • 14. Recommendations •  Adopt solutions for Scaling Federated IDM beyond 2015 or 50 connections –  Short-term: auto-updates, long-term: auto-creation –  Multi/cross protocol -> trust framework & mechanisms •  Separate Trust/Connection Management from Protocol Runtime –  control plane and data plane + trust framework •  Global solution? –  A combination of Proxy & Metadata Service & Self-Service Copyright © 2014 Ping Identity Corp.All rights reserved. 14