SlideShare a Scribd company logo
CONNECTING THE REAL
WORLD WITH THE VIRTUAL
WORLD
The Identity of Things
EIC May 15, 2014
Hans Zandbelt – CTO Office – Ping Identity
Copyright © 2014 Ping Identity Corp. All rights reserved.
1
Overview
1
• Internet- & Identity of Things
2
• Infrastructure & Protocols
3
• Now what?
• Remote tracking
• Controlling functions
• Routing functions
• enabled by smart
sensor nodes and
devices
Use case: Manufacturing
Copyright © 2014 Ping Identity Corp. All rights reserved.
3
• integration with real-
time monitoring
• Health care providers
(insurers)
Use case: Healthcare
Copyright © 2014 Ping Identity Corp. All rights reserved.
4
• Self-driving cars
• Monitoring & reporting
(today)
Use case: Automotive
Copyright © 2014 Ping Identity Corp. All rights reserved.
5
• smart
thermometers/heating
• audio/video between
ALL devices with those
capabilities (phone,
mobile and fixed, iPad,
front door cam, TV,
stereo)
• integrating all electrical
devices
household/building
Use case: Home/Building Automation
Copyright © 2014 Ping Identity Corp. All rights reserved.
6
• Cloud / SaaS & Social
• Mobile Ubiquity
• Embedded, Wearable
• Smart Meters
• Industry Automation
• Home Automation
• Retail & Consumer
Automation
Internet of Things
• Security Scalability
– Access & Account
Mgmt
• Discovery, Identification &
Authentication
– Devices & Clients
– Services & Servers
– Users
• Passwords … NOOO!!
Challenges
Ehm
Copyright © 2014 Ping Identity Corp. All rights reserved.
9
INFRASTRUCTURE
Building the identity-enabled internet of everything
Consequence
Traditional firewall and enterprise domain-based security cannot deal with
Cloud, Mobile & IoT – Users, Applications or Devices.
IDENTITY IS THE NEW PERIMETER
FIREWALL
Network
Applications
IDENTITY

• Scalable Identification
• Scalable Security
– Authentication
– Privacy
– Confidentiality
– Integrity
• Scalable Trust
The Identity Layer
PROTOCOLS
Realizing the Identiverse and IoT infrastructure
Today’s Identity Protocol Landscape
SAML
LDAP
X.509
Modern Identity Protocol Stack
OpenID Connect SCIM
OAuth 2.0
OAUTH 2.0
A 30,000 feet overview
• 3rd party client store user
passwords
• Teaches users to be
indiscriminate with
passwords
• No multi-factor or federated
authentication
• No granularity
• No differentiation
• No revocation
Drawbacks
Password anti-pattern
OAuth 2.0 Drivers
Lack
Of
Standar
ds
Passwo
rd
Anti
Pattern
Native
Mobile
Apps
REST
Cloud
APIs
OAuth 2.0
• Secure API authorization
– simple & standard,
secure-enough (Bearer)
– for desktop, mobile, web,
IoT
• Delegated access
– mitigates password anti-
pattern
• Issue tokens for granular
access
– Without divulging your
credentials
Characteristics
OAuth 2.0 Protocol Framework
Open Redirect somewhere
in RP website
+
RP website uses federated
SSO for user login
+
SSO Token callback from
IDP to website is
configurable
=>
Assume the following
Intermezzo: Covert Redirect
Lesson: don’t forward messages that
were meant for you to anyone else…
CONCLUSIONS
Emerging Business Landscape
Cloud
Business
Mobile
Ubiquity
Social
Integration
Internet of
Things
Secure Identity Layer
1. Modern identity protocol
adoption
– OAuth 2.0 & OpenID
Connect
– Bindings to IoT
2. Password reduction
– Federation : default
– Strong / multi-factor
– Discrete > Continuous
3. Automation
– Scale and ease of use
– self-service as a backup
Actions
• IoT
– Scale
– Security
– Standards
• Identity Platform
– Spanning Cloud and IoT
– Identity Function APIs
– Multi-protocol
• Don’t Panic
– Let’s Start Moving Today
Summary
Thank You
http://www.pingidentity.com
Hans Zandbelt
hzandbelt@pingidentity.com
Twitter: @hanszandbelt
Ping Identity
Client
SOAP/REST
API
• HTTP – basic/digest…
• SOAP - WS-Security/WS-
Trust
• REST - ?
• Token-based
– Obtain
– Use
– Validate
Methods
API Access
Token
• Separate protocols for SSO
and API security
• Heavyweight - in payload and
processing
• Complex – develop and
manage
• Manual trust bootstrapping and
certificate management
• SSO and API security in one
• Lightweight – mobile
• Simple – developer friendly
• Auto client registration and key
management
SAML and OpenID Connect
SAML OpenID Connect

More Related Content

PPT
You Can't Spell Enterprise Security without MFA
PDF
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
PPTX
Catalyst 2015: Patrick Harding
PPTX
Managing Identity without Boundaries
PDF
Managing Mobile Business Insecurities
PPT
Identity-Defined Privacay & Security for Internet of Things
PPTX
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
PDF
Clear and Present Danger
You Can't Spell Enterprise Security without MFA
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Catalyst 2015: Patrick Harding
Managing Identity without Boundaries
Managing Mobile Business Insecurities
Identity-Defined Privacay & Security for Internet of Things
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Clear and Present Danger

What's hot (20)

PDF
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
PDF
The Case For Next Generation IAM
PPTX
CIS 2013 Ping Identity Chalktalk
PPTX
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
PPTX
Onboarding in the IoT
PDF
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
PPTX
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
PDF
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
PDF
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
PPTX
9.35am robert humphrey
PPTX
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
PPTX
IDENTITY IN THE WORLD OF IOT
PPTX
Identity's Role in a Zero Trust Strategy
PDF
Okta Digital Enterprise Report
PPTX
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
PPTX
Con8896 securely enabling mobile access for business transformation - final
PDF
Device Management for Connected Devices
PDF
2014 IoT Forum_ Fido Alliance
PDF
Get an overview of your network and relax with aruba clear pass and device in...
PDF
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
The Case For Next Generation IAM
CIS 2013 Ping Identity Chalktalk
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Onboarding in the IoT
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
9.35am robert humphrey
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
IDENTITY IN THE WORLD OF IOT
Identity's Role in a Zero Trust Strategy
Okta Digital Enterprise Report
Balancing Mobile UX & Security: An API Management Perspective Presentation fr...
Con8896 securely enabling mobile access for business transformation - final
Device Management for Connected Devices
2014 IoT Forum_ Fido Alliance
Get an overview of your network and relax with aruba clear pass and device in...
FIDO & The Mobile Network Operator - Goode Intelligence & Nok Nok Labs
Ad

Similar to Connecting The Real World With The Virtual World (20)

PDF
Identity for IoT: An Authentication Framework for the IoT
PDF
The “I” in API is for Identity (Nordic APIS April 2014)
PDF
Who’s Knocking? Identity for APIs, Web and Mobile
PDF
Exploring Secure Computing for the Internet of Things, Internet of Everything...
PDF
CIS14: Identifying Things (and Things Identifying Us)
PPTX
PDF
RISE OF THE MACHINES: IRM IN AN IOT WORLD
PDF
CIS13: APIs, Identity, and Securing the Enterprise
PDF
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
PDF
FIDO, Federation and the Internet of Things
PDF
Internet of Everything & WebRTC
PDF
[WSO2Con USA 2018] Identity APIs is the New Black
PDF
CIS13: Identity at Scale
PDF
1400 ping madsen-nordicapis-connect-01
PPTX
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
PDF
CIS13: Federation Protocol Cross-Section
PDF
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
PPTX
Jan19 scim webinar-04
PPTX
IoT mobile app device cloud identity and security architecture
PDF
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
Identity for IoT: An Authentication Framework for the IoT
The “I” in API is for Identity (Nordic APIS April 2014)
Who’s Knocking? Identity for APIs, Web and Mobile
Exploring Secure Computing for the Internet of Things, Internet of Everything...
CIS14: Identifying Things (and Things Identifying Us)
RISE OF THE MACHINES: IRM IN AN IOT WORLD
CIS13: APIs, Identity, and Securing the Enterprise
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
FIDO, Federation and the Internet of Things
Internet of Everything & WebRTC
[WSO2Con USA 2018] Identity APIs is the New Black
CIS13: Identity at Scale
1400 ping madsen-nordicapis-connect-01
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
CIS13: Federation Protocol Cross-Section
CIS 2015- IoT? The ‘I’ needs to be ‘Identity’- Paul Madsen
Jan19 scim webinar-04
IoT mobile app device cloud identity and security architecture
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
Ad

More from Ping Identity (19)

PDF
Healthcare Patient Experiences Matter
PDF
Optimize Your Zero Trust Infrastructure
PDF
Ping’s Technology Partner Program
PDF
Remote Work Fuels Zero Trust Growth
PDF
Identity Verification: Who’s Really There?
PDF
Extraordinary Financial Customer Experiences
PDF
Extraordinary Retail Customer Experiences
PDF
Security Practices: The Generational Gap | Infographic
PDF
Security Concerns Around the World | Infographic
PDF
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
PDF
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
PDF
Consumer Attitudes in a Post-breach Era: The Geographical Gap
PDF
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
PDF
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
PDF
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
PDF
API Security Needs AI Now More Than Ever
PDF
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
PDF
Digital Transformation and the Role of IAM
PDF
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
Healthcare Patient Experiences Matter
Optimize Your Zero Trust Infrastructure
Ping’s Technology Partner Program
Remote Work Fuels Zero Trust Growth
Identity Verification: Who’s Really There?
Extraordinary Financial Customer Experiences
Extraordinary Retail Customer Experiences
Security Practices: The Generational Gap | Infographic
Security Concerns Around the World | Infographic
LES ATTITUDES DES CONSOMMATEURS À L’ÈRE DES CYBERATTAQUES
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN?
Consumer Attitudes in a Post-breach Era: The Geographical Gap
ATTITUDES DES CONSOMMATEURS A L’ERE DES PIRATAGES LE CONFLIT DE GENERATIONS
2018 Survey: Consumer Attitudes in a Post-Breach Era - The Generational Gap
WIE TICKEN VERBRAUCHER IM ZEITALTER DER DATENSCHUTZVERLETZUNGEN? ALLES EINE F...
API Security Needs AI Now More Than Ever
Fishing for a CIAM Platform? 11 Question to Ask Before You Buy
Digital Transformation and the Role of IAM
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Encapsulation theory and applications.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
August Patch Tuesday
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
cloud_computing_Infrastucture_as_cloud_p
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
TLE Review Electricity (Electricity).pptx
Network Security Unit 5.pdf for BCA BBA.
Encapsulation theory and applications.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Empathic Computing: Creating Shared Understanding
Programs and apps: productivity, graphics, security and other tools
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Weekly Chronicles - August'25-Week II
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Unlocking AI with Model Context Protocol (MCP)
Digital-Transformation-Roadmap-for-Companies.pptx
OMC Textile Division Presentation 2021.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
August Patch Tuesday
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
cloud_computing_Infrastucture_as_cloud_p

Connecting The Real World With The Virtual World

Editor's Notes

  • #18: Deprecated way of dealing with API access: hand out your password to a client or third party service. Bad: store pwd, indiscriminate, no multi-factor, no granularity, no differentation, no revocation. Need something better.
  • #20: Enter Oauth 2.0: a protocol for secure API authorization. Simple standard or framework, based on REST and JSON, meant for the mobile web world. Delegated authorization, tokens are issued, obtained and used to mitigate the anti-password pattern. Granular, revokable access to specified parties, without exposing your credentials.
  • #27: How would you secure web apis: SOAP: WS-Security REST: nothing there yet until recently. Only passwords. What we need is a token based method to access APIs: will explain in the next slide.