SlideShare a Scribd company logo
© 2016 ForgeRock. All rights reserved.
Digital Trust
How Identity Tackles the Privacy, Security, and IoT Challenge
Eve Maler, VP Innovation & Emerging Technology
Jessica Morrison, Product Marketing Director
1
© 2016 ForgeRock. All rights reserved.
2010 Founded
10 Offices worldwide with headquarters in San Francisco
350+ Employees
450+ Customers
30+ Countries
$52M Funding to date (thru Series C) by Accel Partners,
Foundation Capital and Meritech Capital Partners
ForgeRock
The leading, next-generation, identity security software
platform.
© 2016 ForgeRock. All rights reserved.
$25 Billion
Est. Size of Consumer IoT Market in 2019
20%
Of Annual Security Budgets Will Be Spent on
IoT Security in 2020
5.5 Million
New Things Will Be Connected Every
Day in 2016
$11.1 Trillion
Est. Total Economic Impact of the IoT
20.8 Billion
Connected Devices by 2020
$2.5 Billion
Est. Retailer Spend on the IoT by 2020
Gartner Research, McKinsey Global Institute Juniper Research, CCS Insight
Global IoT Trends
© 2016 ForgeRock. All rights reserved.
Major Trends We Are Seeing in Identity…
Privacy
and
Consent
Contextual
Identity
IoT
Ready
Open
Source
Scalable
Unified
Platform
Single
Customer
View
© 2016 ForgeRock. All rights reserved.
From IAM to Identity Relationship
Management…
Digital business requires an identity-centric approach
Identity Access Management Identity Relationship Management
Customers
(millions)
On-premises
People
Applications
and data
PCs
Endpoints
Workforce
(thousands)
Partners and
Suppliers
Customers
(millions)
On-premises Public
Cloud
Private
Cloud
People
Things
(Tens of
millions)
Applications
and data
PCs PhonesTablets
Smart
Watches
Endpoints
Source: Forrester Research
© 2016 ForgeRock. All rights reserved.
ForgeRock Identity Platform
• Simple
• Scalable
• Modular
• Common services architecture
• Community participation
© 2016 ForgeRock. All rights reserved.
USER-MANAGED ACCESS (UMA)

A new standard for sharing
Regard for one's
wishes and
preferences
The true ability to
say no and change
one's mind
The ability to share
just the right
amount
The right moment
to make the
decision to share
Context Control
RespectChoice
© 2016 ForgeRock. All rights reserved. 8
flickr.com/photos/vincrosbie/16301598031/ CC BY-ND 2.0
flickr.com/photos/vincrosbie/16301598031/	
  CC	
  BY-­‐ND	
  2.0	
  
© 2016 ForgeRock. All rights reserved.
What Happens When Businesses Can’t Form
Trusted Digital Relationships With Consumers?
•  Revenue loss
•  Brand damage
•  Loss of trust
•  Missing out on opportunities
•  Compliance costs and penalties?
flickr.com/photos/delmo-baggins/3143080675 CC BY-ND 2.0
Source: Accenture, 2016 Technology Vision report
© 2016 ForgeRock. All rights reserved.
Why Enable Personal Data Sharing?

Let’s Use Health Relationship Trust as an Example
© 2016 ForgeRock. All rights reserved.
data quality
and accuracy
improved
clinical data
better care
© 2016 ForgeRock. All rights reserved.
Why Ensure Personal Control of Sharing?
© 2016 ForgeRock. All rights reserved.
How Dire is the Consent Technology
Situation?
9 percent [of companies]
believe current methods (i.e., check
boxes, cookie acknowledgment)
used to ensure data privacy and
consent will be able to adapt to the
needs of the emerging digital
economy.
– ForgeRock global survey conducted by
TechValidate, 16 Mar 2016
© 2016 ForgeRock. All rights reserved.
A Consumer Scenario
Alice	
  wants	
  to	
  allow	
  her	
  
accountant	
  to	
  import	
  her	
  
tax	
  data	
  directly	
  from	
  
her	
  employer’s	
  site	
  into	
  
the	
  tax	
  return	
  app	
  he	
  
uses,	
  with	
  the	
  ability	
  to	
  
revoke	
  that	
  consent.	
  
•  ProacMve	
  sharing	
  (“pushing”	
  her	
  
consent	
  to	
  him)	
  without	
  giving	
  
away	
  her	
  password	
  
•  Could	
  grant	
  “read”	
  but	
  not	
  
“print”	
  permissions	
  
•  She	
  can	
  decide	
  to	
  grant	
  “print”	
  later	
  
•  She	
  can	
  revoke	
  his	
  access	
  
•  She	
  can	
  Mme-­‐out	
  his	
  access	
  
© 2016 ForgeRock. All rights reserved.
authorizaMon	
  
server	
  
resource	
  
owner	
  
requesMng	
  
party	
  
client	
  
manage
control
protect
delegate
revoke
authorize
manageaccess
negotiate
deny
An Enterprise Scenario
IT	
  manages	
  hundreds	
  of	
  API-­‐
fronted	
  apps	
  in	
  the	
  enterprise	
  
(and	
  some	
  outside).	
  Alice	
  is	
  an	
  
employee	
  who	
  needs	
  to	
  
delegate	
  constrained	
  access	
  to	
  
app	
  features/funcMons	
  to	
  
fellow	
  employees	
  and	
  partners	
  
within	
  the	
  ecosystem,	
  giving	
  IT	
  
–	
  and	
  herself	
  –	
  centralized	
  
visibility	
  into	
  the	
  access	
  
granted.	
  
resource	
  
server	
  
© 2016 ForgeRock. All rights reserved.
A Deep Dive on a Consumer Health IoT Scenario
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
© 2016 ForgeRock. All rights reserved.
OAuth does
“RESTful WS-
Security,”
capturing user
consent for
app access
and respecting
its withdrawal
RS
resource
server
AS
authorization
server
C
client
Both servers are run by the
same organization;
RO goes to AS in each
ecosystem to revoke its
token
Standard OAuth
endpoints that
manage access
token issuance
API endpoints
that deliver the
data or other
“value-add”
App gets the consent
based on the API
“scopes” (permissions)
it requested; is uniquely
identified vs. the user
RO
resource
owner
Authorizes (consents) at run
time after authenticating
© 2016 ForgeRock. All rights reserved.
OpenID Connect Turns Single Sign-On
Into an OAuth-Protected Identity API
SAML 2, OpenID 2 OAuth 2 OpenID Connect
Initiating user’s login session
Collecting user consent
High-security identity tokens
Distributed/aggregated claims
Dynamic introduction (OpenID only)
Session management
No sessions
Collecting user consent
No identity tokens per se
No claims per se
Dynamic introduction (new)
No sessions
X
X
X
X
X
X
X
Initiating user’s login session
Collecting user consent
High-security identity tokens
Distributed/aggregated claims
Dynamic introduction
Session management (draft)
© 2016 ForgeRock. All rights reserved.
UMA adds
party-to-party,
asynchronous,
scope-grained
delegation and
control to
OAuth
Loosely coupled to enable
centralized authorization and a central
sharing management hub
Enables party-to-party sharing –
without credential sharing – driven
by “scope-grained” policy rather than
run-time opt-in consent
Tested for suitability through trust
elevation, e.g. step-up authn or
“claims-based access
control” (optionally using OIDC),
captured in a specially powerful
access token borne by the client
Subsidiary access tokens protect
UMA’s standardized endpoints and
represent each party’s authorization
(consent) to engage with the central
server
© 2016 ForgeRock. All rights reserved.
The CMO and the CPO Can and Must Meet
in the Middle
“Consent should not be regarded as
freely given if the data subject has no
genuine or free choice or is unable to
refuse or withdraw consent without
detriment. …
In order to ensure that consent is freely
given, consent should not provide a
valid legal ground for the processing of
personal data in a specific case where
there is a clear imbalance between the
data subject and the controller…”
We value personal data as an
asset
Our customers’ wishes have
value
Our customers have their own
reasons to share, not share,
and mash up data, which we
can address as value-add
Risk management perspective Business perspective
© 2016 ForgeRock. All rights reserved.
ForgeRock Identity Platform
UMA Provider
 Mobile App
 Synchronization
 Auditing
LDAPv3
 REST/JSON
Replication
 Access Control
Schema
Management
Caching
Auditing
Monitoring
Groups
Password Policy
Active 

Directory Pass-thru
Reporting
Authentication
 Authorization
 Provisioning
 User Self-Service
 Authentication
 OIDC / OAuth2
Federation / SSO
 User Self-Service
 Workflow Engine
 Reconciliation
 Password Replay
 SAML2
Adaptive Risk
 Stateless/Stateful
 Registration
Aggregated User
View
Message
Transformation
API Security
 Scripting
Built from Open Source Projects: 
UMA Protector
Access Management Identity Management Identity Gateway
Directory Services
CommonRESTAPI
CommonUserInterface
CommonAudit/Logging
CommonScripting
© 2016 ForgeRock. All rights reserved.
Thank You

More Related Content

PDF
ForgeRock Platform Release - Summer 2016
PPTX
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
PPTX
NYC Identity Summit Tech Day: ForgeRock Identity Platform Overview
PPTX
NYC Identity Summit Tech Day: Best Practices for API Security
PPTX
Webinar: Identity Wars: The Unified Platform Awakens
PPTX
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
PDF
The Future of Digital Identity in the Age of the Internet of Things
PDF
Beyond username and password it's continuous authorization webinar
ForgeRock Platform Release - Summer 2016
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
NYC Identity Summit Tech Day: ForgeRock Identity Platform Overview
NYC Identity Summit Tech Day: Best Practices for API Security
Webinar: Identity Wars: The Unified Platform Awakens
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
The Future of Digital Identity in the Age of the Internet of Things
Beyond username and password it's continuous authorization webinar

What's hot (20)

PPTX
Webinar: Access Management with the ForgeRock Identity Platform - So What’s N...
PPTX
Directory Services with the ForgeRock Identity Platform - So What’s New?
PPTX
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
PPTX
ForgeRock Gartner 2016 Security & Risk Management Summit
PDF
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release
PDF
NYC Identity Summit Tech Day: Authorization for the Modern World
PPTX
Identity Management with the ForgeRock Identity Platform - So What’s New?
PDF
Sydney Identity Summit: Addressing the New Threat Landscape with Continuous S...
PPTX
Webinar: Extend The Power of The ForgeRock Identity Platform Through Scripting
PDF
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
PPT
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
PDF
Pimping the ForgeRock Identity Platform for a Billion Users
PDF
Sydney Identity Unconference Introduction and Highlights
PDF
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
PPTX
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
PPTX
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
PDF
No IoT Without Identity
PDF
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
PPTX
OpenAM: An Introduction
PPTX
OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...
Webinar: Access Management with the ForgeRock Identity Platform - So What’s N...
Directory Services with the ForgeRock Identity Platform - So What’s New?
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
ForgeRock Gartner 2016 Security & Risk Management Summit
The Future is Now: The ForgeRock Identity Platform, Early 2017 Release
NYC Identity Summit Tech Day: Authorization for the Modern World
Identity Management with the ForgeRock Identity Platform - So What’s New?
Sydney Identity Summit: Addressing the New Threat Landscape with Continuous S...
Webinar: Extend The Power of The ForgeRock Identity Platform Through Scripting
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Pimping the ForgeRock Identity Platform for a Billion Users
Sydney Identity Unconference Introduction and Highlights
Sydney Identity Summit: Compound Eye: An Approach To A National Identity Ecos...
Customer Scale: Stateless Sessions and Managing High-Volume Digital Services
Webinar: Consent 2.0: Applying User-Managed Access to the Privacy Challenge
No IoT Without Identity
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
OpenAM: An Introduction
OpenIG Webinar: Your Swiss Army Knife for Protecting and Securing Web Apps, A...
Ad

Viewers also liked (15)

PPTX
Trust: The Currency of Tomorrow
PDF
Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)
PPTX
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
PPTX
Risto kunelius. security, privacy and trust, the legitimation challenge of th...
PDF
Cybesecurity of the IoT
PPT
Identity Relationship Management: The Community Revolution
PDF
Security challenges for IoT
PDF
Digital transformation in financial services through trusted digital relation...
PPTX
Predix Analytics
PPTX
National identity schemes - digital identity - national ID - eGovernment
PPTX
introduction to Embedded System Security
PDF
IoT Security: Problems, Challenges and Solutions
PPTX
IoT Security Risks and Challenges
PDF
Kantara Initiative - Connecting a More Trustworthy Internet
PDF
Internet of Things - Privacy and Security issues
Trust: The Currency of Tomorrow
Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)
IAM to IRM: The Shift to Identity Relationship Management in a Device-Rich an...
Risto kunelius. security, privacy and trust, the legitimation challenge of th...
Cybesecurity of the IoT
Identity Relationship Management: The Community Revolution
Security challenges for IoT
Digital transformation in financial services through trusted digital relation...
Predix Analytics
National identity schemes - digital identity - national ID - eGovernment
introduction to Embedded System Security
IoT Security: Problems, Challenges and Solutions
IoT Security Risks and Challenges
Kantara Initiative - Connecting a More Trustworthy Internet
Internet of Things - Privacy and Security issues
Ad

Similar to Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge (20)

PPTX
NYC Identity Summit Business Day: Doing Authorization, Consent, and Delegatio...
PPTX
Doing Authorisation, Consent, and Delegation Right with UMA - Paris Identity ...
PPTX
Doing Authorisation, Consent, and Delegation Right with UMA - London Identity...
PDF
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
PDF
WP-Privacy-IoT-Era - PRODUCTION
PDF
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
PPTX
Webinar: "Entitlements: Taking Control of the Big Data Gold Rush"
PPTX
UMA - An Open Standard for Consent-Driven Personal Data Sharing
PDF
Extending the Power of Consent with User-Managed Access & OpenUMA
PPTX
2015 Identity Summit - Stepping Up to New Data Protection Challenges
PDF
Implications of GDPR in Conjunction with UMA
PPTX
Digital Consent: Taking UMA from Concept to Reality
PDF
L’identité numérique : un atout incontournable pour construire une relation c...
PDF
CIS14: User-Managed Access
PPTX
Build a Trust Platform to Enable a Frictionless Customer Experience
PDF
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
PPTX
Identity Management: Using OIDC to Empower the Next-Generation Apps
PDF
Pas d'IoT sans Identité!
PPTX
The New Venn of Access Control in the API-Mobile-IOT Era
PPTX
2017 Predictions: Identity and Security
NYC Identity Summit Business Day: Doing Authorization, Consent, and Delegatio...
Doing Authorisation, Consent, and Delegation Right with UMA - Paris Identity ...
Doing Authorisation, Consent, and Delegation Right with UMA - London Identity...
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
WP-Privacy-IoT-Era - PRODUCTION
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
Webinar: "Entitlements: Taking Control of the Big Data Gold Rush"
UMA - An Open Standard for Consent-Driven Personal Data Sharing
Extending the Power of Consent with User-Managed Access & OpenUMA
2015 Identity Summit - Stepping Up to New Data Protection Challenges
Implications of GDPR in Conjunction with UMA
Digital Consent: Taking UMA from Concept to Reality
L’identité numérique : un atout incontournable pour construire une relation c...
CIS14: User-Managed Access
Build a Trust Platform to Enable a Frictionless Customer Experience
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
Identity Management: Using OIDC to Empower the Next-Generation Apps
Pas d'IoT sans Identité!
The New Venn of Access Control in the API-Mobile-IOT Era
2017 Predictions: Identity and Security

More from ForgeRock (20)

PDF
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
PPTX
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
PDF
Identity Live Sydney: Identity Management - A Strategic Opportunity
PDF
Identity Live Singapore: Transform Your Cybersecurity Capability
PDF
Identity Live Singapore 2018 Keynote Presentation
PDF
Identity Live Sydney 2018 Keynote Presentation
PDF
Identity Live Singapore: Just Ask 'Em
PDF
Identity Live Singapore: Building Trust & Privacy in a Connected Society
PDF
Identity Live Sydney: Intelligent Authentication
PDF
Identity Live Sydney: Building Trust and Privacy in a Connected Society
PDF
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
PPTX
Get the Exact Identity Solution You Need - In the Cloud - Overview
PDF
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
PDF
Opening Keynote (Identity Live Berlin 2018)
PDF
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
PDF
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
PDF
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
PDF
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
PDF
Shift from GDPR readiness to sustained compliance to improve your business an...
PDF
Intelligent Authentication (Identity Live Berlin 2018)
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution You Need - In the Cloud - Overview
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
Opening Keynote (Identity Live Berlin 2018)
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
Trust is Everything - The Future of Identity and the ForgeRock Platform (Iden...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Shift from GDPR readiness to sustained compliance to improve your business an...
Intelligent Authentication (Identity Live Berlin 2018)

Recently uploaded (20)

PPTX
Introduction to Artificial Intelligence
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Digital Strategies for Manufacturing Companies
PDF
top salesforce developer skills in 2025.pdf
PDF
System and Network Administraation Chapter 3
PPTX
Transform Your Business with a Software ERP System
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
AI in Product Development-omnex systems
PDF
Nekopoi APK 2025 free lastest update
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Introduction to Artificial Intelligence
Design an Analysis of Algorithms II-SECS-1021-03
Odoo POS Development Services by CandidRoot Solutions
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Which alternative to Crystal Reports is best for small or large businesses.pdf
Digital Strategies for Manufacturing Companies
top salesforce developer skills in 2025.pdf
System and Network Administraation Chapter 3
Transform Your Business with a Software ERP System
2025 Textile ERP Trends: SAP, Odoo & Oracle
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
AI in Product Development-omnex systems
Nekopoi APK 2025 free lastest update
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Odoo Companies in India – Driving Business Transformation.pdf
Design an Analysis of Algorithms I-SECS-1021-03
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx

Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge

  • 1. © 2016 ForgeRock. All rights reserved. Digital Trust How Identity Tackles the Privacy, Security, and IoT Challenge Eve Maler, VP Innovation & Emerging Technology Jessica Morrison, Product Marketing Director 1
  • 2. © 2016 ForgeRock. All rights reserved. 2010 Founded 10 Offices worldwide with headquarters in San Francisco 350+ Employees 450+ Customers 30+ Countries $52M Funding to date (thru Series C) by Accel Partners, Foundation Capital and Meritech Capital Partners ForgeRock The leading, next-generation, identity security software platform.
  • 3. © 2016 ForgeRock. All rights reserved. $25 Billion Est. Size of Consumer IoT Market in 2019 20% Of Annual Security Budgets Will Be Spent on IoT Security in 2020 5.5 Million New Things Will Be Connected Every Day in 2016 $11.1 Trillion Est. Total Economic Impact of the IoT 20.8 Billion Connected Devices by 2020 $2.5 Billion Est. Retailer Spend on the IoT by 2020 Gartner Research, McKinsey Global Institute Juniper Research, CCS Insight Global IoT Trends
  • 4. © 2016 ForgeRock. All rights reserved. Major Trends We Are Seeing in Identity… Privacy and Consent Contextual Identity IoT Ready Open Source Scalable Unified Platform Single Customer View
  • 5. © 2016 ForgeRock. All rights reserved. From IAM to Identity Relationship Management… Digital business requires an identity-centric approach Identity Access Management Identity Relationship Management Customers (millions) On-premises People Applications and data PCs Endpoints Workforce (thousands) Partners and Suppliers Customers (millions) On-premises Public Cloud Private Cloud People Things (Tens of millions) Applications and data PCs PhonesTablets Smart Watches Endpoints Source: Forrester Research
  • 6. © 2016 ForgeRock. All rights reserved. ForgeRock Identity Platform • Simple • Scalable • Modular • Common services architecture • Community participation
  • 7. © 2016 ForgeRock. All rights reserved. USER-MANAGED ACCESS (UMA)
 A new standard for sharing Regard for one's wishes and preferences The true ability to say no and change one's mind The ability to share just the right amount The right moment to make the decision to share Context Control RespectChoice
  • 8. © 2016 ForgeRock. All rights reserved. 8 flickr.com/photos/vincrosbie/16301598031/ CC BY-ND 2.0
  • 10. © 2016 ForgeRock. All rights reserved. What Happens When Businesses Can’t Form Trusted Digital Relationships With Consumers? •  Revenue loss •  Brand damage •  Loss of trust •  Missing out on opportunities •  Compliance costs and penalties? flickr.com/photos/delmo-baggins/3143080675 CC BY-ND 2.0 Source: Accenture, 2016 Technology Vision report
  • 11. © 2016 ForgeRock. All rights reserved. Why Enable Personal Data Sharing?
 Let’s Use Health Relationship Trust as an Example
  • 12. © 2016 ForgeRock. All rights reserved. data quality and accuracy improved clinical data better care
  • 13. © 2016 ForgeRock. All rights reserved. Why Ensure Personal Control of Sharing?
  • 14. © 2016 ForgeRock. All rights reserved. How Dire is the Consent Technology Situation? 9 percent [of companies] believe current methods (i.e., check boxes, cookie acknowledgment) used to ensure data privacy and consent will be able to adapt to the needs of the emerging digital economy. – ForgeRock global survey conducted by TechValidate, 16 Mar 2016
  • 15. © 2016 ForgeRock. All rights reserved. A Consumer Scenario Alice  wants  to  allow  her   accountant  to  import  her   tax  data  directly  from   her  employer’s  site  into   the  tax  return  app  he   uses,  with  the  ability  to   revoke  that  consent.   •  ProacMve  sharing  (“pushing”  her   consent  to  him)  without  giving   away  her  password   •  Could  grant  “read”  but  not   “print”  permissions   •  She  can  decide  to  grant  “print”  later   •  She  can  revoke  his  access   •  She  can  Mme-­‐out  his  access  
  • 16. © 2016 ForgeRock. All rights reserved. authorizaMon   server   resource   owner   requesMng   party   client   manage control protect delegate revoke authorize manageaccess negotiate deny An Enterprise Scenario IT  manages  hundreds  of  API-­‐ fronted  apps  in  the  enterprise   (and  some  outside).  Alice  is  an   employee  who  needs  to   delegate  constrained  access  to   app  features/funcMons  to   fellow  employees  and  partners   within  the  ecosystem,  giving  IT   –  and  herself  –  centralized   visibility  into  the  access   granted.   resource   server  
  • 17. © 2016 ForgeRock. All rights reserved. A Deep Dive on a Consumer Health IoT Scenario
  • 30. © 2016 ForgeRock. All rights reserved. OAuth does “RESTful WS- Security,” capturing user consent for app access and respecting its withdrawal RS resource server AS authorization server C client Both servers are run by the same organization; RO goes to AS in each ecosystem to revoke its token Standard OAuth endpoints that manage access token issuance API endpoints that deliver the data or other “value-add” App gets the consent based on the API “scopes” (permissions) it requested; is uniquely identified vs. the user RO resource owner Authorizes (consents) at run time after authenticating
  • 31. © 2016 ForgeRock. All rights reserved. OpenID Connect Turns Single Sign-On Into an OAuth-Protected Identity API SAML 2, OpenID 2 OAuth 2 OpenID Connect Initiating user’s login session Collecting user consent High-security identity tokens Distributed/aggregated claims Dynamic introduction (OpenID only) Session management No sessions Collecting user consent No identity tokens per se No claims per se Dynamic introduction (new) No sessions X X X X X X X Initiating user’s login session Collecting user consent High-security identity tokens Distributed/aggregated claims Dynamic introduction Session management (draft)
  • 32. © 2016 ForgeRock. All rights reserved. UMA adds party-to-party, asynchronous, scope-grained delegation and control to OAuth Loosely coupled to enable centralized authorization and a central sharing management hub Enables party-to-party sharing – without credential sharing – driven by “scope-grained” policy rather than run-time opt-in consent Tested for suitability through trust elevation, e.g. step-up authn or “claims-based access control” (optionally using OIDC), captured in a specially powerful access token borne by the client Subsidiary access tokens protect UMA’s standardized endpoints and represent each party’s authorization (consent) to engage with the central server
  • 33. © 2016 ForgeRock. All rights reserved. The CMO and the CPO Can and Must Meet in the Middle “Consent should not be regarded as freely given if the data subject has no genuine or free choice or is unable to refuse or withdraw consent without detriment. … In order to ensure that consent is freely given, consent should not provide a valid legal ground for the processing of personal data in a specific case where there is a clear imbalance between the data subject and the controller…” We value personal data as an asset Our customers’ wishes have value Our customers have their own reasons to share, not share, and mash up data, which we can address as value-add Risk management perspective Business perspective
  • 34. © 2016 ForgeRock. All rights reserved. ForgeRock Identity Platform UMA Provider Mobile App Synchronization Auditing LDAPv3 REST/JSON Replication Access Control Schema Management Caching Auditing Monitoring Groups Password Policy Active 
 Directory Pass-thru Reporting Authentication Authorization Provisioning User Self-Service Authentication OIDC / OAuth2 Federation / SSO User Self-Service Workflow Engine Reconciliation Password Replay SAML2 Adaptive Risk Stateless/Stateful Registration Aggregated User View Message Transformation API Security Scripting Built from Open Source Projects: UMA Protector Access Management Identity Management Identity Gateway Directory Services CommonRESTAPI CommonUserInterface CommonAudit/Logging CommonScripting
  • 35. © 2016 ForgeRock. All rights reserved. Thank You