SlideShare a Scribd company logo
© 2015 IBM Corporation
Security
Authentication and Authorization
Service (AAS)
IBM InfoSphere Streams Version 4.0
Steve Dickes
Software Engineer
For questions about this presentation contact Steve Dickes
sdickes@us.ibm.com
2 © 2015 IBM Corporation
Important Disclaimer
THE INFORMATION CONTAINED IN THIS PRESENTATION IS PROVIDED FOR INFORMATIONAL
PURPOSES ONLY.
WHILE EFFORTS WERE MADE TO VERIFY THE COMPLETENESS AND ACCURACY OF THE
INFORMATION CONTAINED IN THIS PRESENTATION, IT IS PROVIDED “AS IS”, WITHOUT WARRANTY
OF ANY KIND, EXPRESS OR IMPLIED.
IN ADDITION, THIS INFORMATION IS BASED ON IBM’S CURRENT PRODUCT PLANS AND STRATEGY,
WHICH ARE SUBJECT TO CHANGE BY IBM WITHOUT NOTICE.
IBM SHALL NOT BE RESPONSIBLE FOR ANY DAMAGES ARISING OUT OF THE USE OF, OR
OTHERWISE RELATED TO, THIS PRESENTATION OR ANY OTHER DOCUMENTATION.
NOTHING CONTAINED IN THIS PRESENTATION IS INTENDED TO, OR SHALL HAVE THE EFFECT OF:
• CREATING ANY WARRANTY OR REPRESENTATION FROM IBM (OR ITS AFFILIATES OR ITS OR
THEIR SUPPLIERS AND/OR LICENSORS); OR
• ALTERING THE TERMS AND CONDITIONS OF THE APPLICABLE LICENSE AGREEMENT
GOVERNING THE USE OF IBM SOFTWARE.
IBM’s statements regarding its plans, directions, and intent are subject to change or
withdrawal without notice at IBM’s sole discretion. Information regarding potential
future products is intended to outline our general product direction and it should not
be relied on in making a purchasing decision. The information mentioned regarding
potential future products is not a commitment, promise, or legal obligation to deliver
any material, code or functionality. Information about potential future products may
not be incorporated into any contract. The development, release, and timing of any
future features or functionality described for our products remains at our sole
discretion.
THIS INFORMATION IS BASED ON IBM’S CURRENT PRODUCT PLANS AND STRATEGY, WHICH ARE SUBJECT TO CHANGE BY IBM WITHOUT NOTICE.
IBM SHALL NOT BE RESPONSIBLE FOR ANY DAMAGES ARISING OUT OF THE USE OF, OR OTHERWISE RELATED TO, THIS PRESENTATION OR ANY OTHER DOCUMENTATION.
3 © 2015 IBM Corporation
Agenda
 High-Level Overview
 Use Case
 Demo
 Details
4 © 2015 IBM Corporation
High-Level Overview
 AAS performs two main functions:
– User authentication: verifying a user's existence and allowing the user to
access a domain and its instances. Authentication is configured to use PAM or
LDAP. Knowledge Center topic: Configuring > Configuring security
– User authorization: checking that a user has permission to perform a
requested function.
 You must use security; it is embedded throughout the product and cannot be
disabled.
– User authorization is performed for nearly all operations within Streams –
Domain Manager, streamtool, JMX, console, studio.
– User authorization at its simplest uses a standard set of permissions as set for
the default roles: DomainAdministrator, DomainUser, InstanceAdministrator,
InstanceUser.
Users may create their own roles: streamtool mkdomainrole, streamtool mkrole
– Domain and Instance Administrators can restrict or allow access by choosing
which Streams users or groups of users are members of which roles.
– Jobs are submitted to job groups and a job group contains the ACLs for all of its
submitted jobs.
5 © 2015 IBM Corporation
Use Case
 Provide consistent security configuration at the domain and for each
instance
– Users authenticate to a domain
– Users check for authorization to domain and instance objects
 Provide roles to manage permissions for sets of users
– Use roles to quickly authorize users to the appropriate functions in the domain
and instances
– Default roles for the domain and each instance – DomainAdministrator,
DomainUser, InstanceAdministrator, InstanceUser
 Provide jobgroups to simplify permission settings for sets of jobs
– Use jobgroups to manage permissions for jobs and to authorize/restrict user
access to jobs
– Use jobgroups to change permissions for all active jobs and newly submitted
jobs
6 © 2015 IBM Corporation
Demo
 See Streams security in action using streamtool commands.
 Attend the Console presentation to see its security functions.
7 © 2015 IBM Corporation
Details
 Security objects:
– Domain objects: config, domain, hosts, instances, system-log
– Instance objects: application-log, config, hosts, instance, jobgroup_default, jobs, jobs-
override, system-log
– Every object has default permissions
– Permissions identify which users, groups, or roles have permission to perform
operations against an object
– Streams operations – streamtool command, internal APIs, JMX, Domain
Manager, Console, Studio, Services – check for a specific set of permissions to
determine if a user is authorized. For example, mkinstance requires “add”
permission on the “instances” object in the domain
– Permission types: read, write, add, search, delete, own
– Knowledge Center topics:
Configuring > Configuring security
Configuring>Configuring security>User authorization>Security objects and access
permissions>Access permissions for domain and instance objects
8 © 2015 IBM Corporation
Details
 Job groups and jobs:
– Job groups are “containers” for submitted jobs and provide ACLs for all
submitted jobs in the job group.
– The owner/submitter of a job has all access to the job.
– Every instance has the “default” job group and mkjobgroup creates a job group.
The job group is backed by a security object named “jobgroup_<name>” so
jobgroup_default for the default job group.
– Security object hierarchy : jobs > jobgroup_name > job_id
– Newly created jobgroups inherit ACLs from “jobs” object “default:” ACLs
– Knowledge Center topic:
Configuring>Configuring security>User authorization>Job groups
9 © 2015 IBM Corporation
Questions?

More Related Content

PDF
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
PDF
IBM Streams V4.2 Submission Time Fusion and Configuration
PDF
IBM Streams Getting Started Resources
PDF
Installation and Setup for IBM InfoSphere Streams V4.0
PDF
Highlights of the Telecommunications Event Data Analytics toolkit
PDF
IBM Streams IoT Integration
PDF
Non-Blocking Checkpointing for Consistent Regions in IBM Streams V4.2.
PDF
What's New in IBM Streams V4.2
Consistent Regions in Specialized Toolkits for IBM InfoSphere Streams V4.0
IBM Streams V4.2 Submission Time Fusion and Configuration
IBM Streams Getting Started Resources
Installation and Setup for IBM InfoSphere Streams V4.0
Highlights of the Telecommunications Event Data Analytics toolkit
IBM Streams IoT Integration
Non-Blocking Checkpointing for Consistent Regions in IBM Streams V4.2.
What's New in IBM Streams V4.2

What's hot (20)

PDF
Streaming Analytics for Bluemix Enhancements
PDF
Toolkits Overview for IBM Streams V4.2
PDF
IBM ODM Rules Compiler support in IBM Streams V4.2.
PDF
IBM Streams V4.1 and Incremental Checkpointing
PDF
IBM Streams V4.1 Integration with IBM Platform Symphony
PDF
IBM Streams V4.1 REST API Support for Cross-Origin Resource Sharing (CORS)
PDF
IBM Streams V4.1 and JAAS Login Module Support
PDF
IBM Streams V4.1 and User Authentication with Client Certificates
PDF
Deploy, Monitor and Manage in Style with WebSphere Liberty Admin Center
PPTX
IBM OMEGAMON Performance Management Suite - Long Presentation
PPTX
IBM Endpoint Manager for Server Automation presentation
PPTX
IBM Endpoint Manager for Server Automation (Overview)
PPT
IBM Endpoint Manager V9.0
PDF
Pure Systems Patterns of Expertise - John Kaemmerer and Gerry Kovan, 11th Sep...
PDF
PureSystems on the Private Cloud, John Kaemmerer and Gerry Novan, 11th Sept 14
PPTX
SCUG.DK: Protecting Company Data using EMS, April 2015
DOCX
Sccm Interview Questions and Answers
PPT
IBM PureSystems
PPT
OMEGAMON XE for Storage V530 Long client presentation
PPTX
Avoiding the perils and pitfalls of cloud based integration
Streaming Analytics for Bluemix Enhancements
Toolkits Overview for IBM Streams V4.2
IBM ODM Rules Compiler support in IBM Streams V4.2.
IBM Streams V4.1 and Incremental Checkpointing
IBM Streams V4.1 Integration with IBM Platform Symphony
IBM Streams V4.1 REST API Support for Cross-Origin Resource Sharing (CORS)
IBM Streams V4.1 and JAAS Login Module Support
IBM Streams V4.1 and User Authentication with Client Certificates
Deploy, Monitor and Manage in Style with WebSphere Liberty Admin Center
IBM OMEGAMON Performance Management Suite - Long Presentation
IBM Endpoint Manager for Server Automation presentation
IBM Endpoint Manager for Server Automation (Overview)
IBM Endpoint Manager V9.0
Pure Systems Patterns of Expertise - John Kaemmerer and Gerry Kovan, 11th Sep...
PureSystems on the Private Cloud, John Kaemmerer and Gerry Novan, 11th Sept 14
SCUG.DK: Protecting Company Data using EMS, April 2015
Sccm Interview Questions and Answers
IBM PureSystems
OMEGAMON XE for Storage V530 Long client presentation
Avoiding the perils and pitfalls of cloud based integration
Ad

Viewers also liked (14)

DOC
4 dezv-prenat-ii 2013
PDF
SCREAM-15: Authentication and Authorization Considerations for a Multi-tenant...
PDF
Two factor authentication with Laravel and Google Authenticator
PPTX
REST Service Authetication with TLS & JWTs
PDF
Tomasz Janczuk - Webtaskalifragilistexpialidocious
PPTX
Security models for security architecture
PPT
graphical password authentication
PDF
3D Password PPT
PPTX
NIST CyberSecurity Framework: An Overview
PPTX
Graphical password authentication
PDF
Enterprise Security Architecture for Cyber Security
PDF
Serverless architectures
PDF
Enterprise Security Architecture
PPTX
Adidas brand case study
4 dezv-prenat-ii 2013
SCREAM-15: Authentication and Authorization Considerations for a Multi-tenant...
Two factor authentication with Laravel and Google Authenticator
REST Service Authetication with TLS & JWTs
Tomasz Janczuk - Webtaskalifragilistexpialidocious
Security models for security architecture
graphical password authentication
3D Password PPT
NIST CyberSecurity Framework: An Overview
Graphical password authentication
Enterprise Security Architecture for Cyber Security
Serverless architectures
Enterprise Security Architecture
Adidas brand case study
Ad

Similar to Security Authentication and Authorization Service (AAS) for IBM InfoSphere Streams V4.0 (20)

PDF
Ispim installing pdf
PPTX
IBM i Security Study
PDF
IBM Security SaaS IaaS and PaaS
PPTX
Are You Ready to Move Your IAM to the Cloud?
PDF
Ispim overview pdf
PPTX
Developing Secure IBM i Applications
PDF
Security and Audit for Big Data
PPTX
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
PDF
Ispim admin pdf
PDF
Db2.security.slides
PDF
IBM Cloud Security Enforcer
PDF
Usage and Benefits of IBM SR Tool
PDF
IBM InterConnect 2016: Security for DevOps in an Enterprise
PDF
Revealing the 2016 State of IBM i Security
PDF
IBM - IAM Security and Trends
PPTX
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
PPTX
Security in the Cognitive Era: Why it matters more than ever
PPTX
What Does a Full Featured Security Strategy Look Like?
PDF
Data Governance with IBM Streams V4.1
PDF
IBM Security Identity & Access Manager
Ispim installing pdf
IBM i Security Study
IBM Security SaaS IaaS and PaaS
Are You Ready to Move Your IAM to the Cloud?
Ispim overview pdf
Developing Secure IBM i Applications
Security and Audit for Big Data
최근 비즈니스에서 활용되는 보안 기술 및 성숙된 보안 관리를 위한 ibm 전략 소개
Ispim admin pdf
Db2.security.slides
IBM Cloud Security Enforcer
Usage and Benefits of IBM SR Tool
IBM InterConnect 2016: Security for DevOps in an Enterprise
Revealing the 2016 State of IBM i Security
IBM - IAM Security and Trends
Cloud security enforcer - Quick steps to avoid the blind spots of shadow it
Security in the Cognitive Era: Why it matters more than ever
What Does a Full Featured Security Strategy Look Like?
Data Governance with IBM Streams V4.1
IBM Security Identity & Access Manager

More from lisanl (15)

PDF
What's New Overview for IBM Streams V4.3
PDF
SPL Event-Time Processing in IBM Streams V4.3
PDF
Option Data Types in IBM Streams V4.3
PDF
Dynamic and Elastic Scaling in IBM Streams V4.3
PDF
Github Projects Overview and IBM Streams V4.1
PDF
What's New in Toolkits for IBM Streams V4.1
PDF
Introduction to IBM Platform Symphony Integration with IBM Streams V4.1
PDF
What's New in IBM Streams V4.1
PDF
What's New in the Streams Console in IBM Streams V4.1
PDF
Expanding beyond SPL -- More language support in IBM Streams V4.1
PDF
Introduction to the Spark MLLib Toolkit in IBM Streams V4.1
PDF
An Overview of IBM Streaming Analytics for Bluemix
PDF
ZooKeeper and Embedded ZooKeeper Support for IBM InfoSphere Streams V4.0
PDF
What's New in the Timeseries Toolkit for IBM InfoSphere Streams V4.0
PDF
Streams Studio Support for IBM InfoSphere Streams V4.0
What's New Overview for IBM Streams V4.3
SPL Event-Time Processing in IBM Streams V4.3
Option Data Types in IBM Streams V4.3
Dynamic and Elastic Scaling in IBM Streams V4.3
Github Projects Overview and IBM Streams V4.1
What's New in Toolkits for IBM Streams V4.1
Introduction to IBM Platform Symphony Integration with IBM Streams V4.1
What's New in IBM Streams V4.1
What's New in the Streams Console in IBM Streams V4.1
Expanding beyond SPL -- More language support in IBM Streams V4.1
Introduction to the Spark MLLib Toolkit in IBM Streams V4.1
An Overview of IBM Streaming Analytics for Bluemix
ZooKeeper and Embedded ZooKeeper Support for IBM InfoSphere Streams V4.0
What's New in the Timeseries Toolkit for IBM InfoSphere Streams V4.0
Streams Studio Support for IBM InfoSphere Streams V4.0

Recently uploaded (20)

PPTX
Introduction to Knowledge Engineering Part 1
PPT
Miokarditis (Inflamasi pada Otot Jantung)
PDF
.pdf is not working space design for the following data for the following dat...
PDF
Lecture1 pattern recognition............
PDF
Capcut Pro Crack For PC Latest Version {Fully Unlocked 2025}
PPTX
Database Infoormation System (DBIS).pptx
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PDF
Introduction to the R Programming Language
PDF
Data Engineering Interview Questions & Answers Cloud Data Stacks (AWS, Azure,...
PPT
Predictive modeling basics in data cleaning process
PPTX
modul_python (1).pptx for professional and student
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PPTX
Qualitative Qantitative and Mixed Methods.pptx
PDF
Introduction to Data Science and Data Analysis
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PDF
Transcultural that can help you someday.
PPTX
STERILIZATION AND DISINFECTION-1.ppthhhbx
PPT
ISS -ESG Data flows What is ESG and HowHow
PPTX
Managing Community Partner Relationships
Introduction to Knowledge Engineering Part 1
Miokarditis (Inflamasi pada Otot Jantung)
.pdf is not working space design for the following data for the following dat...
Lecture1 pattern recognition............
Capcut Pro Crack For PC Latest Version {Fully Unlocked 2025}
Database Infoormation System (DBIS).pptx
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
Introduction to the R Programming Language
Data Engineering Interview Questions & Answers Cloud Data Stacks (AWS, Azure,...
Predictive modeling basics in data cleaning process
modul_python (1).pptx for professional and student
Galatica Smart Energy Infrastructure Startup Pitch Deck
Qualitative Qantitative and Mixed Methods.pptx
Introduction to Data Science and Data Analysis
Introduction-to-Cloud-ComputingFinal.pptx
STUDY DESIGN details- Lt Col Maksud (21).pptx
Transcultural that can help you someday.
STERILIZATION AND DISINFECTION-1.ppthhhbx
ISS -ESG Data flows What is ESG and HowHow
Managing Community Partner Relationships

Security Authentication and Authorization Service (AAS) for IBM InfoSphere Streams V4.0

  • 1. © 2015 IBM Corporation Security Authentication and Authorization Service (AAS) IBM InfoSphere Streams Version 4.0 Steve Dickes Software Engineer For questions about this presentation contact Steve Dickes sdickes@us.ibm.com
  • 2. 2 © 2015 IBM Corporation Important Disclaimer THE INFORMATION CONTAINED IN THIS PRESENTATION IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. WHILE EFFORTS WERE MADE TO VERIFY THE COMPLETENESS AND ACCURACY OF THE INFORMATION CONTAINED IN THIS PRESENTATION, IT IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. IN ADDITION, THIS INFORMATION IS BASED ON IBM’S CURRENT PRODUCT PLANS AND STRATEGY, WHICH ARE SUBJECT TO CHANGE BY IBM WITHOUT NOTICE. IBM SHALL NOT BE RESPONSIBLE FOR ANY DAMAGES ARISING OUT OF THE USE OF, OR OTHERWISE RELATED TO, THIS PRESENTATION OR ANY OTHER DOCUMENTATION. NOTHING CONTAINED IN THIS PRESENTATION IS INTENDED TO, OR SHALL HAVE THE EFFECT OF: • CREATING ANY WARRANTY OR REPRESENTATION FROM IBM (OR ITS AFFILIATES OR ITS OR THEIR SUPPLIERS AND/OR LICENSORS); OR • ALTERING THE TERMS AND CONDITIONS OF THE APPLICABLE LICENSE AGREEMENT GOVERNING THE USE OF IBM SOFTWARE. IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. THIS INFORMATION IS BASED ON IBM’S CURRENT PRODUCT PLANS AND STRATEGY, WHICH ARE SUBJECT TO CHANGE BY IBM WITHOUT NOTICE. IBM SHALL NOT BE RESPONSIBLE FOR ANY DAMAGES ARISING OUT OF THE USE OF, OR OTHERWISE RELATED TO, THIS PRESENTATION OR ANY OTHER DOCUMENTATION.
  • 3. 3 © 2015 IBM Corporation Agenda  High-Level Overview  Use Case  Demo  Details
  • 4. 4 © 2015 IBM Corporation High-Level Overview  AAS performs two main functions: – User authentication: verifying a user's existence and allowing the user to access a domain and its instances. Authentication is configured to use PAM or LDAP. Knowledge Center topic: Configuring > Configuring security – User authorization: checking that a user has permission to perform a requested function.  You must use security; it is embedded throughout the product and cannot be disabled. – User authorization is performed for nearly all operations within Streams – Domain Manager, streamtool, JMX, console, studio. – User authorization at its simplest uses a standard set of permissions as set for the default roles: DomainAdministrator, DomainUser, InstanceAdministrator, InstanceUser. Users may create their own roles: streamtool mkdomainrole, streamtool mkrole – Domain and Instance Administrators can restrict or allow access by choosing which Streams users or groups of users are members of which roles. – Jobs are submitted to job groups and a job group contains the ACLs for all of its submitted jobs.
  • 5. 5 © 2015 IBM Corporation Use Case  Provide consistent security configuration at the domain and for each instance – Users authenticate to a domain – Users check for authorization to domain and instance objects  Provide roles to manage permissions for sets of users – Use roles to quickly authorize users to the appropriate functions in the domain and instances – Default roles for the domain and each instance – DomainAdministrator, DomainUser, InstanceAdministrator, InstanceUser  Provide jobgroups to simplify permission settings for sets of jobs – Use jobgroups to manage permissions for jobs and to authorize/restrict user access to jobs – Use jobgroups to change permissions for all active jobs and newly submitted jobs
  • 6. 6 © 2015 IBM Corporation Demo  See Streams security in action using streamtool commands.  Attend the Console presentation to see its security functions.
  • 7. 7 © 2015 IBM Corporation Details  Security objects: – Domain objects: config, domain, hosts, instances, system-log – Instance objects: application-log, config, hosts, instance, jobgroup_default, jobs, jobs- override, system-log – Every object has default permissions – Permissions identify which users, groups, or roles have permission to perform operations against an object – Streams operations – streamtool command, internal APIs, JMX, Domain Manager, Console, Studio, Services – check for a specific set of permissions to determine if a user is authorized. For example, mkinstance requires “add” permission on the “instances” object in the domain – Permission types: read, write, add, search, delete, own – Knowledge Center topics: Configuring > Configuring security Configuring>Configuring security>User authorization>Security objects and access permissions>Access permissions for domain and instance objects
  • 8. 8 © 2015 IBM Corporation Details  Job groups and jobs: – Job groups are “containers” for submitted jobs and provide ACLs for all submitted jobs in the job group. – The owner/submitter of a job has all access to the job. – Every instance has the “default” job group and mkjobgroup creates a job group. The job group is backed by a security object named “jobgroup_<name>” so jobgroup_default for the default job group. – Security object hierarchy : jobs > jobgroup_name > job_id – Newly created jobgroups inherit ACLs from “jobs” object “default:” ACLs – Knowledge Center topic: Configuring>Configuring security>User authorization>Job groups
  • 9. 9 © 2015 IBM Corporation Questions?