CIS 2015- Beyond Federation Protocols- Praerit Garg
Beyond Federation Protocols
Praerit Garg
GM, AWS Identity & Directory Services
Copyright © 2015 Cloud Identity Summit . All rights reserved.
3
Rewinding the clock…
Infoworld, July 2002
“In a talk here at the Burton Group
Catalyst Conference 2002, Praerit Garg,
Microsoft group program manager,
detailed the company's vision for federated
security, which will in the future include
room for SAML (Security Assertion
Markup Language).”
Infoworld, July 2002
Copyright © 2015 Cloud Identity Summit . All rights reserved.
4
10+ Years, 2 career detours later…
Copyright © 2015 Cloud Identity Summit . All rights reserved.
5
Google search for federation yields…
OAuth 2.0 is broadly adopted for federating Web Identities – Google,
Facebook, Amazon, Microsoft, Twitter*, …
OAuth2 SAML Assertions support is standards track and gaining traction
But, SAML is DEAD! (OpenID Connect is the future)
97% OF SAAS VENDORS BACKING SAML-BASED SINGLE SIGN-ON
Cloud Security Alliance and OneLogin Survey, 2014
OAuth Wikipedia Page
Craig Burton
IETF, Phil Hunt’s blog, Salesforce
Copyright © 2015 Cloud Identity Summit . All rights reserved.
6
Federated Identities are now powering the Cloud Economy
Congratulations and Thank You!
Copyright © 2015 Cloud Identity Summit . All rights reserved.
7
But…
Have we simply adapted
Kerberos protocols for the
web?
Replaced ASN.1 encoding
with XML and now JSON?
I HEARD YOU LIKE ASN.1
SO I PUT AN OCTET STRING
IN YOUR OCTET STRING
SO YOU CAN PARSE WHILE
YOU PARSE
Copyright © 2015 Cloud Identity Summit . All rights reserved.
8
Unfortunately,
federation protocols aren’t sufficient
(those pesky “assertions” or “claims” matter)
Copyright © 2015 Cloud Identity Summit . All rights reserved.
9
1. Apps need to scope the trust with federated IDPs?
Copyright © 2015 Cloud Identity Summit . All rights reserved.
10
Mapping SAML Attributes to AWS Policy Keys
Copyright © 2015 Cloud Identity Summit . All rights reserved.
11
Federating using AWS Directory Service
Copyright © 2015 Cloud Identity Summit . All rights reserved.
12
2. Apps need to provision access for a federated Ids?
Copyright © 2015 Cloud Identity Summit . All rights reserved.
13
3. Apps need to enable collaboration experiences
across federated identities?
Copyright © 2015 Cloud Identity Summit . All rights reserved.
14
Call to Action
• Build on the great work you’ve all done thus far
• Find standards based solutions to
• make it easy to setup federated trust policies
• make it easy to provision access to federated
identities – e.g. identity lookups
• make it easy to enable collaboration experiences
across federated identities – e.g. identity search
Questions? Thoughts?

More Related Content

PPTX
Identity as the Perimeter
PPTX
Accelerating Information with Identity
PDF
CISCO’s Cloud Journey (Keynote at Cloud Symposium)
PPTX
New security solutions for next generation of IT
PPTX
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
PDF
Cisco at v mworld 2015 intercloud - hybrid cloud solutions for vmware workloa...
PDF
Cisco Intercloud Announcement, Cisco Live 2014
PPTX
Azure Event Grid - Serverless integration in Azure
Identity as the Perimeter
Accelerating Information with Identity
CISCO’s Cloud Journey (Keynote at Cloud Symposium)
New security solutions for next generation of IT
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
Cisco at v mworld 2015 intercloud - hybrid cloud solutions for vmware workloa...
Cisco Intercloud Announcement, Cisco Live 2014
Azure Event Grid - Serverless integration in Azure

What's hot (20)

PPTX
Connecting Your SIEM Tool with Akamai Security Events
PPTX
Securing AWS Environments
PPTX
Security in the Hybrid Cloud at Liberty Mutual
PPTX
Introduction to BizTalk Server 2016 Feature Pack 2
PDF
AWS re:Inforce 2019 re:Cap Opening and Closing
PDF
PPTX
PPTX
Microsoft Azure - Cloud Computing Platform
PPTX
Microsoft Azure News - October 2021
PPTX
From Monolithic applications to Microservices
PDF
Full Isolation in Multi-Tenant SaaS with Kubernetes and Istio
PDF
Designing for API Doomsday
PDF
Allianz x api_management_servic_fabric
PDF
Cisco at v mworld 2015 cisco powered_vmworld 2015
PPTX
Microsoft Azure News - September 2021
PDF
Cisco at vmworld 2015 joann_starke_let_your_business_soar
PDF
Cisco at v mworld 2015 joann_starke_let_your_business_soar
PDF
ATTACKing the Cloud: Hopping Between the Matrices
PDF
Cisco at v mword 2015
PDF
Mitigate Security Threats with SIEM
Connecting Your SIEM Tool with Akamai Security Events
Securing AWS Environments
Security in the Hybrid Cloud at Liberty Mutual
Introduction to BizTalk Server 2016 Feature Pack 2
AWS re:Inforce 2019 re:Cap Opening and Closing
Microsoft Azure - Cloud Computing Platform
Microsoft Azure News - October 2021
From Monolithic applications to Microservices
Full Isolation in Multi-Tenant SaaS with Kubernetes and Istio
Designing for API Doomsday
Allianz x api_management_servic_fabric
Cisco at v mworld 2015 cisco powered_vmworld 2015
Microsoft Azure News - September 2021
Cisco at vmworld 2015 joann_starke_let_your_business_soar
Cisco at v mworld 2015 joann_starke_let_your_business_soar
ATTACKing the Cloud: Hopping Between the Matrices
Cisco at v mword 2015
Mitigate Security Threats with SIEM
Ad

Viewers also liked (13)

PPTX
Microsoft Azure Identity and O365
PDF
CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of C...
PDF
CIS14: Filling the “authentication goes here” Hole in Identity
PDF
OpenId Connect in Shibboleth Identity Provider
PDF
CAS IU Presentation
PPTX
How to CASifying PeopleSoft and Integrating CAS and ADFS
PDF
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
PDF
CIS14: Working with OAuth and OpenID Connect
PPTX
2016 09-15 unicon-iam-update
PPTX
Mit 2014 introduction to open id connect and o-auth 2
PDF
Standard-based Identity (1)
PDF
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
PPTX
Kantara OTTO slides
Microsoft Azure Identity and O365
CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of C...
CIS14: Filling the “authentication goes here” Hole in Identity
OpenId Connect in Shibboleth Identity Provider
CAS IU Presentation
How to CASifying PeopleSoft and Integrating CAS and ADFS
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
CIS14: Working with OAuth and OpenID Connect
2016 09-15 unicon-iam-update
Mit 2014 introduction to open id connect and o-auth 2
Standard-based Identity (1)
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Kantara OTTO slides
Ad

Similar to CIS 2015- Beyond Federation Protocols- Praerit Garg (20)

PPTX
Modernize your application & Infrastructure with AWS Cloud.pptx
PPT
Up 2011-ken huang
PPTX
Cloudreach Voices - Azure AD and the Public Cloud
PPTX
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
PDF
PDF
Gae4 b for_atlanta_gtug (2)
PPTX
What all it takes to build a successful hybrid integration strategy?
PDF
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
PPTX
Con8817 api management - enable your infrastructure for secure mobile and c...
PDF
Oracle's Cloud Strategy
PPTX
Secure Application Development InfoShare 2022
PDF
Oracle mobile cloud service
PDF
Solving todays problems with oracle integration cloud
PDF
CA Security - Deloitte IAM Summit - Vasu
PDF
Ciphercloud Solutions Overview hsa oct2011
PPTX
Isaca india trust & value from cloud computing (aug 2011) print
PDF
CCSK, cloud security framework, Indonesia
PDF
Database@Home - Data Driven Reference Architecture
PDF
Thin Air or Solid Ground? Practical Cloud Security
PDF
Cisco at v mworld 2015 cisco-on-demand-private-cloud-for-vmworld-01_sep2015-a...
Modernize your application & Infrastructure with AWS Cloud.pptx
Up 2011-ken huang
Cloudreach Voices - Azure AD and the Public Cloud
OAuth 101 & Secure APIs 2012 Cloud Identity Summit
Gae4 b for_atlanta_gtug (2)
What all it takes to build a successful hybrid integration strategy?
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
Con8817 api management - enable your infrastructure for secure mobile and c...
Oracle's Cloud Strategy
Secure Application Development InfoShare 2022
Oracle mobile cloud service
Solving todays problems with oracle integration cloud
CA Security - Deloitte IAM Summit - Vasu
Ciphercloud Solutions Overview hsa oct2011
Isaca india trust & value from cloud computing (aug 2011) print
CCSK, cloud security framework, Indonesia
Database@Home - Data Driven Reference Architecture
Thin Air or Solid Ground? Practical Cloud Security
Cisco at v mworld 2015 cisco-on-demand-private-cloud-for-vmworld-01_sep2015-a...

More from CloudIDSummit (20)

PPTX
CIS 2016 Content Highlights
PPTX
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
PDF
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
PDF
Mobile security, identity & authentication reasons for optimism 20150607 v2
PDF
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
PDF
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
PDF
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
PDF
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
PDF
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
PDF
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
PDF
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
PDF
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PDF
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
PDF
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
PDF
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
PDF
CIS 2015 Identity Relationship Management in the Internet of Things
PDF
CIS 2015 The Ethics of Personal Data - Robin Wilton
CIS 2016 Content Highlights
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
Mobile security, identity & authentication reasons for optimism 20150607 v2
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 The Ethics of Personal Data - Robin Wilton

Recently uploaded (20)

PDF
Architecture types and enterprise applications.pdf
DOCX
search engine optimization ppt fir known well about this
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
STKI Israel Market Study 2025 version august
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
2018-HIPAA-Renewal-Training for executives
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PPTX
Modernising the Digital Integration Hub
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Configure Apache Mutual Authentication
Architecture types and enterprise applications.pdf
search engine optimization ppt fir known well about this
Getting started with AI Agents and Multi-Agent Systems
The influence of sentiment analysis in enhancing early warning system model f...
Convolutional neural network based encoder-decoder for efficient real-time ob...
CloudStack 4.21: First Look Webinar slides
Hindi spoken digit analysis for native and non-native speakers
STKI Israel Market Study 2025 version august
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Developing a website for English-speaking practice to English as a foreign la...
Module 1.ppt Iot fundamentals and Architecture
A review of recent deep learning applications in wood surface defect identifi...
2018-HIPAA-Renewal-Training for executives
Custom Battery Pack Design Considerations for Performance and Safety
Modernising the Digital Integration Hub
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Enhancing emotion recognition model for a student engagement use case through...
Chapter 5: Probability Theory and Statistics
Configure Apache Mutual Authentication

CIS 2015- Beyond Federation Protocols- Praerit Garg

  • 2. Beyond Federation Protocols Praerit Garg GM, AWS Identity & Directory Services
  • 3. Copyright © 2015 Cloud Identity Summit . All rights reserved. 3 Rewinding the clock… Infoworld, July 2002 “In a talk here at the Burton Group Catalyst Conference 2002, Praerit Garg, Microsoft group program manager, detailed the company's vision for federated security, which will in the future include room for SAML (Security Assertion Markup Language).” Infoworld, July 2002
  • 4. Copyright © 2015 Cloud Identity Summit . All rights reserved. 4 10+ Years, 2 career detours later…
  • 5. Copyright © 2015 Cloud Identity Summit . All rights reserved. 5 Google search for federation yields… OAuth 2.0 is broadly adopted for federating Web Identities – Google, Facebook, Amazon, Microsoft, Twitter*, … OAuth2 SAML Assertions support is standards track and gaining traction But, SAML is DEAD! (OpenID Connect is the future) 97% OF SAAS VENDORS BACKING SAML-BASED SINGLE SIGN-ON Cloud Security Alliance and OneLogin Survey, 2014 OAuth Wikipedia Page Craig Burton IETF, Phil Hunt’s blog, Salesforce
  • 6. Copyright © 2015 Cloud Identity Summit . All rights reserved. 6 Federated Identities are now powering the Cloud Economy Congratulations and Thank You!
  • 7. Copyright © 2015 Cloud Identity Summit . All rights reserved. 7 But… Have we simply adapted Kerberos protocols for the web? Replaced ASN.1 encoding with XML and now JSON? I HEARD YOU LIKE ASN.1 SO I PUT AN OCTET STRING IN YOUR OCTET STRING SO YOU CAN PARSE WHILE YOU PARSE
  • 8. Copyright © 2015 Cloud Identity Summit . All rights reserved. 8 Unfortunately, federation protocols aren’t sufficient (those pesky “assertions” or “claims” matter)
  • 9. Copyright © 2015 Cloud Identity Summit . All rights reserved. 9 1. Apps need to scope the trust with federated IDPs?
  • 10. Copyright © 2015 Cloud Identity Summit . All rights reserved. 10 Mapping SAML Attributes to AWS Policy Keys
  • 11. Copyright © 2015 Cloud Identity Summit . All rights reserved. 11 Federating using AWS Directory Service
  • 12. Copyright © 2015 Cloud Identity Summit . All rights reserved. 12 2. Apps need to provision access for a federated Ids?
  • 13. Copyright © 2015 Cloud Identity Summit . All rights reserved. 13 3. Apps need to enable collaboration experiences across federated identities?
  • 14. Copyright © 2015 Cloud Identity Summit . All rights reserved. 14 Call to Action • Build on the great work you’ve all done thus far • Find standards based solutions to • make it easy to setup federated trust policies • make it easy to provision access to federated identities – e.g. identity lookups • make it easy to enable collaboration experiences across federated identities – e.g. identity search

Editor's Notes

  • #2: Bumper
  • #3: Bumper with Presentation and Speaker