SlideShare a Scribd company logo
Adding Identity Management, Access Control and
API Management in your system
A complete framework for Identity, Access Control and API
Management
Álvaro Alonso
FIWARE Security Chapter
Identity Manager
2
Identity Manager
3
Account
OAuth 2.0
4
OAuth 2.0
																Login	with
OAuth 2.0
▪  Mechanism to provide applications access to restricted resources
without sharing credentials.
•  Applications use access tokens, issued by OAuth providers (e.g.
FIWARE), to access resources.
•  OAuth 2.0 specification is designed for use with HTTP.
▪  Roles:
•  Resource Owner: Entity capable of granting access to a protected
resource (e.g. end-user)
•  Resource Server: Server hosting protected resources.
•  Client: Application making protected resource requests on behalf of
the resource owner.
•  Authorization Server: The server issuing access tokens to the client.
OAuth 2.0
▪  Authorization Code Grant
▪  Implicit Grant
▪  Resource Owner Password Credentials Grant
▪  Client Credentials Grant
OAuth 2.0 Architecture
Authorization Code Grant
OAuth Provider
account.lab.fiware.org
OAuth 2.0 Architecture
Implicit Grant
OAuth Provider
account.lab.fiware.org
OAuth 2.0 Architecture
Resource Owner Password Credentials Grant
OAuth Provider
account.lab.fiware.org
OAuth 2.0 Architecture
Client Credentials Grant
OAuth Provider
account.lab.fiware.org
OAuth 2.0 Libraries
▪  http://oauth.net/2/
•  PHP, Cocoa, iOS, Java, Ruby, Javascript, Python.
▪  Example using Node.js
•  https://github.com/ging/oauth2-example-client
12
OAuth2 credentials in FIWARE Account
Getting protected user info
14
Web App Account
OAuth2 requests flow
access-token
OAuthLibrary
Request user info using access-token
GET /user?access_token={token}
Web Applications and GEs
15	
	
	
Generic	Enabler	
Account	
Request	+	
access-token	 Oauth2	flows	
access-token	
OK	+	user	info	(roles)	
Web	App	
OAuth	Library	
access_token	
GET https://GE_URL HTTP/1.1
Host: GE_hostname
X-Auth-Token: access_token
Securing your back-end
16	
Back-end	
Apps	
Account	
Request	+	
access-token	
Web	App	
Oauth	Library	
PEP	Proxy	
access-token	
OK	+	user	info	(roles)	
Oauth2	flows	
access_token	
GET https://PEP_PROXY HTTP/1.1
Host: PEP_PROXY_hostname
X-Auth-Token: access_token
PEP Proxy in FIWARE Lab Account
Securing your back-end
▪  Level 1: Authentication
•  Check if a user has a FIWARE account
▪  Level 2: Basic Authorization
•  Checks if a user has permissions to access a resource
•  HTTP verb + resource path
▪  Level 3: Advanced Authorization
•  Custom XACML policies
Level 1: Authentication
19	
Back-end	
Apps	
Account	
Request	+	
access-token	
Web	App	
Oauth	Library	
PEP	Proxy	
access-token	
OK	+	user	info	(roles)	
Oauth2	flows	
access_token
Level 2: Basic Authorization
20	
Back-end	
Apps	
Account	
Request	+	
access-token	
Web	App	
Oauth	Library	
PEP	Proxy	
access-token	
OK	+	user	info	
Oauth2	flows	
access_token	
Authz	PDP	
GE	
XACML	<Request>:		
roles	+	verb	+	path	
OK	
Basic	RBAC	policies	in	
XACML	
(simple	role	permissions)
Level 2: Basic Authorization
Level 3: Advanced Authorization
22	
Back-end	
Apps	
Account	
Request	+	
access-token	
Web	App	
Oauth	Library	
PEP	Proxy	extension	
Oauth2	flows	
access_token	
Auth	PDP	
GE	
access-token	
OK	+	user	info	
XACML	<Request>:		
roles	+	verb	+	path	
OK	
More	generic	ABAC	
policies	in	XACML	
(custom	XACML	Rules)
Level 3: Advanced Authorization
APInf & PEP Proxy
Back-end	
Request	+	
API	Key	
Web	App	
Back-end	 Back-end	 Back-end
APInf & PEP Proxy
Back
end	
App	
Account	
Request	+	
access-token	
Web	App	
Oauth	Library	
											PEP	Proxy	
access-token	
OK	+	user	info	(roles)	
Oauth2	flows	
access_token	
Back
end	
App	
Back
end	
App	
Back
end	
App
IoT Authentication
▪ Context Broker
•  IoT Management
•  Publish / subscribe model
□ Context producers
□ Context consumers
▪ Sensors Authentication
•  Sensor registration in IdM applications
•  Each sensor has its own account
□ Token creation and validation
IoT Authentication
27	
	
	
Context	Broker	
Account	
OK	+	user	info	(roles)	
Context	
Producer	/	
Consumer	
access-token	
update	/	query	
Token	creaon
IoT Sensors in FIWARE Account
Industrial Data Space
FIWARE Security ready
Industrial Data Space
Infrastructure
IdP PAP
Policies DB
PDP
Industrial Data Space
Context Consumer
Connector
Industrial Data Space
Context Producer
Connector
PEP
Security GEs
▪  Identity Management – Keyrock
▪  Authorization PDP – AuthZForce
▪  PEP Proxy – Wilma
▪ Get your own infrastructure!!!
•  Follow Security GEs
Installation and Configuration Guides
Security GEs – IdM - KeyRock
▪  APIs
•  OAuth2
•  Resources management
•  SCIM 2.0
▪  Source Code
•  https://github.com/ging/fi-ware-idm
▪  Documentation
•  http://catalogue.fiware.org/enablers/identity-management-keyrock
▪  FIWARE OAuth2 Demo:
•  https://github.com/ging/oauth2-example-client
31
New Keyrock release
▪  Support for custom themes.
▪  Improved OAuth 2.0 refresh tokens support.
▪  Application permissions can be now edited and removed.
▪  Driver for external database authentication.
▪  Support for configuring available Grant Types in registered applications.
▪  Improved organizations management.
▪  Clean up with regard Cloud dependencies.
▪  Support to PostgreSQL.
32
Security GEs – PEP Proxy - Wilma
▪  Policy Enforcement Point
▪  Compatible with OAuth2 and Keystone tokens
▪  Source code:
•  https://github.com/ging/fi-ware-pep-proxy
▪  Documentation
•  http://catalogue.fiware.org/enablers/pep-proxy-wilma
▪  Global instance
33
Security GEs – Authorization PDP – AuthZForce (1/2)
▪  Single Open Spec (Authorization PDP GE) & Open Source
implementation (GEri Authzforce) of 100% XACML-3.0 standard-
compliant and cloud-ready RESTful ABAC framework with XML
optimization
▪  Multi-tenant REST API for PDP(s)/PAP(s)
▪  Standards:
•  OASIS: XACML 3.0 + Profiles (REST, RBAC, Multiple Decision)
•  ISO: Fast Infoset
▪  Extensible: attribute providers (PIP), functions, etc.
▪  PDP clustering
34
By 2020, the majority of enterprises will use ABAC as the dominant mechanism
to protect critical assets, up from less than five percent today. (Gartner, 2013)
IBAC	
ABAC	
RBAC
Security GEs – Authorization PDP – AuthZForce (2/2)
▪  FIWARE catalogue: https://catalogue.fiware.org/enablers/authorization-pdp-authzforce
▪  FIWARE Lab image: authzforce-5.4.1
▪  Authorization PDP GE’s APIary: http://docs.authorizationpdp.apiary.io/#
▪  AuthzForce (GEri) source code:
•  API spec in WADL: https://github.com/authzforce/rest-api-model
•  Implementation: https://github.com/authzforce/server/
▪  AuthzForce distribution
•  Ubuntu/Debian-like: .deb / others: .tar.gz on Maven Central:
http://central.maven.org/maven2/org/ow2/authzforce/authzforce-ce-server-dist/
•  Docker: https://hub.docker.com/r/fiware/authzforce-ce-server/
▪  Global instance for testing: https://az.lab.fiware.org/authzforce-ce/
▪  Documentation: http://catalogue.fi-ware.org/enablers/access-control-tha-implementation/documentation
35
One more thing…
Account
National
eID
Thank you!
http://fiware.org
Follow @FIWARE on Twitter

More Related Content

PDF
UMA for ACE
PDF
How to authenticate users in your apps using FI-WARE Account - Introduction
PPTX
FI-WARE Account and OAuth solution
PPTX
FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)
PDF
FIWARE ID Management
PPT
OAuth2 Protocol with Grails Spring Security
PDF
AE - Dir - Authorized Entities Directory by Michael Ströder
PDF
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...
UMA for ACE
How to authenticate users in your apps using FI-WARE Account - Introduction
FI-WARE Account and OAuth solution
FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)
FIWARE ID Management
OAuth2 Protocol with Grails Spring Security
AE - Dir - Authorized Entities Directory by Michael Ströder
FIWARE Tech Summit - Complete Framework for Identity, Access Control and API ...

What's hot (17)

PPTX
OAuth2 Presentaion
PPTX
CIS 2012 - Going Mobile with PingFederate and OAuth 2
PDF
Spring security oauth2
PPTX
Securing your APIs with OAuth, OpenID, and OpenID Connect
PDF
Introduction to OAuth2.0
PPTX
JWT SSO Inbound Authenticator
PPTX
OAuth2 & OpenID Connect
PPTX
Keyrock - Lesson 3. Applications. How to create OAuth2 tokens.
PDF
Design and Analyze Secure Networked Systems - 3
PDF
Mixing OAuth 2.0, Jersey and Guice to Build an Ecosystem of Apps - JavaOne...
PDF
OAuth2 primer
PDF
Building an API Security Ecosystem
PDF
CyberoamNGFWTechSheet
PPTX
Id fiware upm-dit
PPTX
Securing Your Deployment with MongoDB and Red Hat's Identity Management in Re...
PDF
Stateless Auth using OAuth2 & JWT
PPTX
Intro to Deception techniques - Honey-*
OAuth2 Presentaion
CIS 2012 - Going Mobile with PingFederate and OAuth 2
Spring security oauth2
Securing your APIs with OAuth, OpenID, and OpenID Connect
Introduction to OAuth2.0
JWT SSO Inbound Authenticator
OAuth2 & OpenID Connect
Keyrock - Lesson 3. Applications. How to create OAuth2 tokens.
Design and Analyze Secure Networked Systems - 3
Mixing OAuth 2.0, Jersey and Guice to Build an Ecosystem of Apps - JavaOne...
OAuth2 primer
Building an API Security Ecosystem
CyberoamNGFWTechSheet
Id fiware upm-dit
Securing Your Deployment with MongoDB and Red Hat's Identity Management in Re...
Stateless Auth using OAuth2 & JWT
Intro to Deception techniques - Honey-*
Ad

Similar to FIWARE Global Summit - Adding Identity Management, Access Control and API Management in Your System (20)

PPTX
Adding identity management and access control to your app
PPTX
Adding Identity Management and Access Control to your App
PPTX
FIWARE Wednesday Webinars - How to Secure FIWARE Architectures
PDF
Securing FIWARE Architectures
PDF
FIWARE Identity Manager Exercises
PPTX
Adding Identity Management and Access Control to your Application - Exersices
PPTX
Adding Identity Management and Access Control to your Application
PDF
FIware Identity Manager
PDF
FIWARE Global Summit - Identity Management and Access Control
PDF
FIWARE Identity Management and Access Control
PDF
FIWARE Global Summit - Identity Management and Access Control
PPTX
Adding Identity Management and Access Control to your Application
PDF
FIWARE Identity Management and Access Control
PDF
FIWARE Training: Identity Management and Access Control
PPTX
PDF
API Security Best Practices & Guidelines
PDF
API Security In Cloud Native Era
PDF
API Security best practices Protect your APIs with Anypoint Platform
PDF
Understanding Identity in the World of Web APIs – Ronnie Mitra, API Architec...
PDF
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
Adding identity management and access control to your app
Adding Identity Management and Access Control to your App
FIWARE Wednesday Webinars - How to Secure FIWARE Architectures
Securing FIWARE Architectures
FIWARE Identity Manager Exercises
Adding Identity Management and Access Control to your Application - Exersices
Adding Identity Management and Access Control to your Application
FIware Identity Manager
FIWARE Global Summit - Identity Management and Access Control
FIWARE Identity Management and Access Control
FIWARE Global Summit - Identity Management and Access Control
Adding Identity Management and Access Control to your Application
FIWARE Identity Management and Access Control
FIWARE Training: Identity Management and Access Control
API Security Best Practices & Guidelines
API Security In Cloud Native Era
API Security best practices Protect your APIs with Anypoint Platform
Understanding Identity in the World of Web APIs – Ronnie Mitra, API Architec...
APIdays Paris 2019 - API Security Tips for Developers by Isabelle Mauny, 42Cr...
Ad

More from FIWARE (20)

PPTX
Behm_Herne_NeMo_akt.pptx
PDF
Katharina Hogrebe Herne Digital Days.pdf
PPTX
Christoph Mertens_IDSA_Introduction to Data Spaces.pptx
PPTX
Behm_Herne_NeMo.pptx
PPTX
Evangelists + iHubs Promo Slides.pptx
PPTX
Lukas Künzel Smart City Operating System.pptx
PPTX
Pierre Golz Der Transformationsprozess im Konzern Stadt.pptx
PPTX
Dennis Wendland_The i4Trust Collaboration Programme.pptx
PPTX
Ulrich Ahle_FIWARE.pptx
PPTX
Aleksandar Vrglevski _FIWARE DACH_OSIH.pptx
PDF
Water Quality - Lukas Kuenzel.pdf
PPTX
Cameron Brooks_FGS23_FIWARE Summit_Keynote_Cameron.pptx
PPTX
FiWareSummit.msGIS-Data-to-Value.2023.06.12.pptx
PPTX
Boris Otto_FGS2023_Opening- EU Innovations from Data_PUB_V1_BOt.pptx
PPTX
Bjoern de Vidts_FGS23_Opening_athumi - bjord de vidts - personal data spaces....
PDF
Abdulrahman Ibrahim_FGS23 Opening - Abdulrahman Ibrahim.pdf
PDF
FGS2023_Opening_Red Hat Keynote Andrea Battaglia.pdf
PPTX
HTAG_Skalierung_Plattform_lokal_final_versand.pptx
PPTX
WE_LoRaWAN _ IoT.pptx
PPTX
EU Opp_Clara Pezuela - German chapter.pptx
Behm_Herne_NeMo_akt.pptx
Katharina Hogrebe Herne Digital Days.pdf
Christoph Mertens_IDSA_Introduction to Data Spaces.pptx
Behm_Herne_NeMo.pptx
Evangelists + iHubs Promo Slides.pptx
Lukas Künzel Smart City Operating System.pptx
Pierre Golz Der Transformationsprozess im Konzern Stadt.pptx
Dennis Wendland_The i4Trust Collaboration Programme.pptx
Ulrich Ahle_FIWARE.pptx
Aleksandar Vrglevski _FIWARE DACH_OSIH.pptx
Water Quality - Lukas Kuenzel.pdf
Cameron Brooks_FGS23_FIWARE Summit_Keynote_Cameron.pptx
FiWareSummit.msGIS-Data-to-Value.2023.06.12.pptx
Boris Otto_FGS2023_Opening- EU Innovations from Data_PUB_V1_BOt.pptx
Bjoern de Vidts_FGS23_Opening_athumi - bjord de vidts - personal data spaces....
Abdulrahman Ibrahim_FGS23 Opening - Abdulrahman Ibrahim.pdf
FGS2023_Opening_Red Hat Keynote Andrea Battaglia.pdf
HTAG_Skalierung_Plattform_lokal_final_versand.pptx
WE_LoRaWAN _ IoT.pptx
EU Opp_Clara Pezuela - German chapter.pptx

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Weekly Chronicles - August'25 Week I
Network Security Unit 5.pdf for BCA BBA.
The Rise and Fall of 3GPP – Time for a Sabbatical?
Building Integrated photovoltaic BIPV_UPV.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
“AI and Expert System Decision Support & Business Intelligence Systems”
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
The AUB Centre for AI in Media Proposal.docx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
NewMind AI Monthly Chronicles - July 2025
20250228 LYD VKU AI Blended-Learning.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectral efficient network and resource selection model in 5G networks
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Dropbox Q2 2025 Financial Results & Investor Presentation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Weekly Chronicles - August'25 Week I

FIWARE Global Summit - Adding Identity Management, Access Control and API Management in Your System

  • 1. Adding Identity Management, Access Control and API Management in your system A complete framework for Identity, Access Control and API Management Álvaro Alonso FIWARE Security Chapter
  • 6. OAuth 2.0 ▪  Mechanism to provide applications access to restricted resources without sharing credentials. •  Applications use access tokens, issued by OAuth providers (e.g. FIWARE), to access resources. •  OAuth 2.0 specification is designed for use with HTTP. ▪  Roles: •  Resource Owner: Entity capable of granting access to a protected resource (e.g. end-user) •  Resource Server: Server hosting protected resources. •  Client: Application making protected resource requests on behalf of the resource owner. •  Authorization Server: The server issuing access tokens to the client.
  • 7. OAuth 2.0 ▪  Authorization Code Grant ▪  Implicit Grant ▪  Resource Owner Password Credentials Grant ▪  Client Credentials Grant
  • 8. OAuth 2.0 Architecture Authorization Code Grant OAuth Provider account.lab.fiware.org
  • 9. OAuth 2.0 Architecture Implicit Grant OAuth Provider account.lab.fiware.org
  • 10. OAuth 2.0 Architecture Resource Owner Password Credentials Grant OAuth Provider account.lab.fiware.org
  • 11. OAuth 2.0 Architecture Client Credentials Grant OAuth Provider account.lab.fiware.org
  • 12. OAuth 2.0 Libraries ▪  http://oauth.net/2/ •  PHP, Cocoa, iOS, Java, Ruby, Javascript, Python. ▪  Example using Node.js •  https://github.com/ging/oauth2-example-client 12
  • 13. OAuth2 credentials in FIWARE Account
  • 14. Getting protected user info 14 Web App Account OAuth2 requests flow access-token OAuthLibrary Request user info using access-token GET /user?access_token={token}
  • 15. Web Applications and GEs 15 Generic Enabler Account Request + access-token Oauth2 flows access-token OK + user info (roles) Web App OAuth Library access_token GET https://GE_URL HTTP/1.1 Host: GE_hostname X-Auth-Token: access_token
  • 17. PEP Proxy in FIWARE Lab Account
  • 18. Securing your back-end ▪  Level 1: Authentication •  Check if a user has a FIWARE account ▪  Level 2: Basic Authorization •  Checks if a user has permissions to access a resource •  HTTP verb + resource path ▪  Level 3: Advanced Authorization •  Custom XACML policies
  • 20. Level 2: Basic Authorization 20 Back-end Apps Account Request + access-token Web App Oauth Library PEP Proxy access-token OK + user info Oauth2 flows access_token Authz PDP GE XACML <Request>: roles + verb + path OK Basic RBAC policies in XACML (simple role permissions)
  • 21. Level 2: Basic Authorization
  • 22. Level 3: Advanced Authorization 22 Back-end Apps Account Request + access-token Web App Oauth Library PEP Proxy extension Oauth2 flows access_token Auth PDP GE access-token OK + user info XACML <Request>: roles + verb + path OK More generic ABAC policies in XACML (custom XACML Rules)
  • 23. Level 3: Advanced Authorization
  • 24. APInf & PEP Proxy Back-end Request + API Key Web App Back-end Back-end Back-end
  • 25. APInf & PEP Proxy Back end App Account Request + access-token Web App Oauth Library PEP Proxy access-token OK + user info (roles) Oauth2 flows access_token Back end App Back end App Back end App
  • 26. IoT Authentication ▪ Context Broker •  IoT Management •  Publish / subscribe model □ Context producers □ Context consumers ▪ Sensors Authentication •  Sensor registration in IdM applications •  Each sensor has its own account □ Token creation and validation
  • 28. IoT Sensors in FIWARE Account
  • 29. Industrial Data Space FIWARE Security ready Industrial Data Space Infrastructure IdP PAP Policies DB PDP Industrial Data Space Context Consumer Connector Industrial Data Space Context Producer Connector PEP
  • 30. Security GEs ▪  Identity Management – Keyrock ▪  Authorization PDP – AuthZForce ▪  PEP Proxy – Wilma ▪ Get your own infrastructure!!! •  Follow Security GEs Installation and Configuration Guides
  • 31. Security GEs – IdM - KeyRock ▪  APIs •  OAuth2 •  Resources management •  SCIM 2.0 ▪  Source Code •  https://github.com/ging/fi-ware-idm ▪  Documentation •  http://catalogue.fiware.org/enablers/identity-management-keyrock ▪  FIWARE OAuth2 Demo: •  https://github.com/ging/oauth2-example-client 31
  • 32. New Keyrock release ▪  Support for custom themes. ▪  Improved OAuth 2.0 refresh tokens support. ▪  Application permissions can be now edited and removed. ▪  Driver for external database authentication. ▪  Support for configuring available Grant Types in registered applications. ▪  Improved organizations management. ▪  Clean up with regard Cloud dependencies. ▪  Support to PostgreSQL. 32
  • 33. Security GEs – PEP Proxy - Wilma ▪  Policy Enforcement Point ▪  Compatible with OAuth2 and Keystone tokens ▪  Source code: •  https://github.com/ging/fi-ware-pep-proxy ▪  Documentation •  http://catalogue.fiware.org/enablers/pep-proxy-wilma ▪  Global instance 33
  • 34. Security GEs – Authorization PDP – AuthZForce (1/2) ▪  Single Open Spec (Authorization PDP GE) & Open Source implementation (GEri Authzforce) of 100% XACML-3.0 standard- compliant and cloud-ready RESTful ABAC framework with XML optimization ▪  Multi-tenant REST API for PDP(s)/PAP(s) ▪  Standards: •  OASIS: XACML 3.0 + Profiles (REST, RBAC, Multiple Decision) •  ISO: Fast Infoset ▪  Extensible: attribute providers (PIP), functions, etc. ▪  PDP clustering 34 By 2020, the majority of enterprises will use ABAC as the dominant mechanism to protect critical assets, up from less than five percent today. (Gartner, 2013) IBAC ABAC RBAC
  • 35. Security GEs – Authorization PDP – AuthZForce (2/2) ▪  FIWARE catalogue: https://catalogue.fiware.org/enablers/authorization-pdp-authzforce ▪  FIWARE Lab image: authzforce-5.4.1 ▪  Authorization PDP GE’s APIary: http://docs.authorizationpdp.apiary.io/# ▪  AuthzForce (GEri) source code: •  API spec in WADL: https://github.com/authzforce/rest-api-model •  Implementation: https://github.com/authzforce/server/ ▪  AuthzForce distribution •  Ubuntu/Debian-like: .deb / others: .tar.gz on Maven Central: http://central.maven.org/maven2/org/ow2/authzforce/authzforce-ce-server-dist/ •  Docker: https://hub.docker.com/r/fiware/authzforce-ce-server/ ▪  Global instance for testing: https://az.lab.fiware.org/authzforce-ce/ ▪  Documentation: http://catalogue.fi-ware.org/enablers/access-control-tha-implementation/documentation 35