SlideShare a Scribd company logo
Last Updated: Jan. 2014
Tech	
  Lead	
  
Chamath	
  Gunawardana	
  
Iden/ty	
  and	
  En/tlement	
  
Management	
  –	
  Concepts	
  and	
  
Theories	
  
2	
  
About	
  the	
  Presenter(s)	
  
๏  Chamath	
  Gunawardana	
  
Chamath	
  Gunwardana	
  is	
  a	
  technical	
  lead	
  at	
  
WSO2	
  working	
  for	
  the	
  integra/on	
  technology	
  
group.	
  He's	
  engaged	
  in	
  the	
  developments	
  of	
  
the	
  WSO2	
  Iden/ty	
  Server	
  and	
  also	
  a	
  
commiKer	
  of	
  the	
  WSO2	
  Iden/ty	
  Server.	
  
Chamath	
  is	
  also	
  a	
  SUN	
  cer/fied	
  java	
  
programmer.	
  	
  
3	
  
About	
  WSO2	
  
๏  Global	
  enterprise,	
  founded	
  in	
  2005	
  
by	
  acknowledged	
  leaders	
  in	
  XML,	
  
web	
  services	
  	
  technologies,	
  
standards	
  	
  and	
  open	
  source	
  
๏  Provides	
  only	
  open	
  source	
  
plaVorm-­‐as-­‐a-­‐service	
  for	
  private,	
  
public	
  and	
  hybrid	
  cloud	
  
deployments	
  
๏  All	
  WSO2	
  products	
  are	
  100%	
  open	
  
source	
  and	
  released	
  under	
  the	
  
Apache	
  License	
  Version	
  2.0.	
  
๏  Is	
  an	
  Ac/ve	
  Member	
  of	
  OASIS,	
  
Cloud	
  Security	
  Alliance,	
  OSGi	
  
Alliance,	
  AMQP	
  Working	
  Group,	
  
OpenID	
  Founda/on	
  and	
  W3C.	
  
๏  Driven	
  by	
  Innova/on	
  
๏  Launched	
  first	
  open	
  source	
  API	
  
Management	
  solu/on	
  in	
  2012	
  
๏  Launched	
  App	
  Factory	
  in	
  2Q	
  2013	
  
๏  Launched	
  Enterprise	
  Store	
  and	
  
first	
  open	
  source	
  Mobile	
  solu/on	
  
in	
  4Q	
  2013	
  
4	
  
What	
  WSO2	
  delivers	
  
Agenda	
  
๏  En/tlement	
  management	
  
๏  overview	
  
๏  Access	
  control	
  concepts	
  
๏  XACML	
  
๏  En/tlement	
  architecture	
  in	
  iden/ty	
  server	
  
๏  Iden/ty	
  management	
  
๏  overview	
  
๏  Features	
  of	
  iden/ty	
  management	
  systems	
  
๏  Couple	
  of	
  Iden/ty	
  Management	
  Capabili/es	
  in	
  iden/ty	
  server	
  
๏  Demo	
  
5	
  
What	
  is	
  En/tlement	
  Mng..	
  
๏  En#tlement	
  management	
  is	
  technology	
  that	
  grants,	
  
resolves,	
  enforces,	
  revokes	
  and	
  administers	
  fine-­‐
grained	
  access	
  en/tlements.	
  
๏  Also	
  referred	
  to	
  as	
   authoriza/ons, privileges,
access	
  rights, permissions 	
  and/or	
   rules 	
  
	
   	
   	
  -­‐	
  Gartner	
  Glossary	
  
6	
  
En/tlement	
  Management	
  
๏  It s	
  a	
  broader	
  concept	
  
๏  Types	
  of	
  access	
  control	
  includes,	
  
๏  Access	
  control	
  lists	
  
๏  Role	
  based	
  access	
  control	
  
๏  AKribute	
  based	
  access	
  control	
  
๏  Policy	
  based	
  access	
  control	
  
7	
  
Access	
  control	
  lists	
  
๏  Oldest	
  and	
  most	
  	
  basic	
  form	
  of	
  access	
  control	
  
๏  Primarily	
  Opera/ng	
  systems	
  adopted	
  
๏  Maintains	
  set	
  of	
  user	
  and	
  opera/ons	
  can	
  performed	
  on	
  
a	
  resource	
  as	
  a	
  mapping	
  
๏  Also	
  easier	
  to	
  implement	
  using	
  maps	
  
๏  Not	
  scalable	
  for	
  large	
  user	
  bases	
  
๏  Difficult	
  to	
  manage	
  
8	
  
Role	
  based	
  access	
  control	
  
๏  System	
  having	
  users	
  that	
  belongs	
  to	
  roles	
  
๏  Role	
  defines	
  which	
  resources	
  will	
  be	
  allowed	
  
๏  Reduces	
  the	
  management	
  overhead	
  
๏  Users	
  and	
  roles	
  can	
  be	
  externalized	
  using	
  user	
  stores	
  
๏  Need	
  to	
  manage	
  the	
  roles	
  
๏  User	
  may	
  belong	
  to	
  mul/ple	
  roles	
  
9	
  
AKribute	
  based	
  access	
  control	
  
๏  Authoriza/on	
  based	
  on	
  aKributes	
  
๏  Addresses	
  the	
  limita/on	
  of	
  role	
  based	
  approach	
  to	
  
define	
  fine	
  grain	
  access	
  control	
  
๏  AKributes	
  of	
  user,	
  environment	
  as	
  well	
  as	
  resource	
  it	
  
self	
  
๏  More	
  flexible	
  than	
  role	
  based	
  approach	
  
๏  No	
  need	
  for	
  knowing	
  the	
  user	
  prior	
  to	
  gran/ng	
  access	
  
10	
  
Policy	
  based	
  access	
  control	
  
๏  Address	
  the	
  requirement	
  to	
  have	
  more	
  uniform	
  access	
  
control	
  mechanism	
  
๏  Helps	
  to	
  large	
  enterprises	
  to	
  have	
  uniform	
  access	
  
control	
  amount	
  org	
  units	
  
๏  Helps	
  for	
  security	
  audits	
  to	
  be	
  carried	
  out	
  
๏  Complex	
  than	
  any	
  other	
  access	
  control	
  system	
  
๏  Specify	
  policies	
  unambiguously	
  with	
  XACML	
  
๏  Use	
  of	
  authorized	
  aKribute	
  sources	
  in	
  the	
  enterprise	
  
11	
  
Advantages	
  
๏  Reduce	
  the	
  development	
  /me	
  on	
  cri/cal	
  business	
  
func/ons	
  
๏  Easy	
  management	
  of	
  en/tlements	
  
๏  Based	
  on	
  industry	
  standard	
  specifica/ons	
  
๏  Support	
  for	
  future	
  development	
  with	
  minimum	
  effort	
  
12	
  
XACML	
  
๏  XACML	
  is	
  a	
  policy	
  based	
  authoriza/on/en/tlement	
  
system	
  
๏  De-­‐facto	
  standard	
  for	
  authoriza/on	
  
๏  Evaluated	
  of	
  1.0,	
  2.0	
  and	
  3.0	
  versions	
  
๏  Externalized	
  
๏  Policy	
  based	
  
๏  Fine	
  grained	
  
๏  Standardized	
  
13	
  
XACML	
  
๏  Iden/ty	
  Server	
  supports	
  XACML	
  2.0	
  and	
  3.0	
  versions	
  
๏  Supports	
  mul/ple	
  PIPs	
  
๏  Policy	
  distribu/on	
  
๏  UI	
  wizards	
  for	
  defining	
  policies	
  
๏  Try	
  it	
  tool	
  
๏  Decision	
  /	
  AKribute	
  caching	
  
14	
  
XACML	
  
15	
  
Create	
  policy	
  op/ons	
  
16	
  
Simple	
  policy	
  editor	
  
17	
  
Basic	
  policy	
  editor	
  
18	
  
Try	
  it	
  tool	
  
19	
  
Try	
  it	
  tool	
  request	
  
20	
  
Extensions	
  
21	
  
Iden/ty	
  Management	
  
๏  Managing	
  Iden/ty	
  of	
  users	
  in	
  a	
  system	
  
๏  Control	
  access	
  to	
  resources	
  
๏  Important	
  component	
  in	
  an	
  enterprise	
  
๏  Enterprises	
  depends	
  on	
  the	
  security	
  provided	
  by	
  
iden/ty	
  management	
  systems	
  
22	
  
Why	
  Iden/ty	
  Management	
  
๏  Directly	
  influences	
  the	
  security	
  and	
  produc/vity	
  of	
  an	
  
organiza/on	
  
๏  To	
  enforce	
  consistency	
  in	
  security	
  policies	
  across	
  
organiza/on	
  
๏  To	
  comply	
  with	
  rules	
  and	
  regula/ons	
  enforced	
  in	
  some	
  
cri/cal	
  domains	
  by	
  governments	
  
๏  Provide	
  access	
  to	
  resources	
  to	
  outside	
  par/es	
  without	
  
compromising	
  security	
  
23	
  
Why	
  Iden/ty	
  Management	
  Cont.	
  
๏  Controlled	
  resource	
  access	
  increases	
  organiza/onal	
  
security	
  
๏  Increased	
  audit-­‐ability	
  of	
  the	
  systems	
  
๏  Automated	
  password	
  reset	
  capabili/es	
  
24	
  
Features	
  of	
  IDM	
  System	
  
๏  User	
  Stores	
  /	
  Directories	
  
๏  Authen/ca/on	
  
๏  Authoriza/on	
  
๏  Single	
  Sign	
  On	
  
๏  Provisioning	
  
๏  Delega/on	
  
๏  Password	
  reset	
  
๏  Self	
  registra/on	
  with	
  locking	
  25	
  
User	
  stores	
  /	
  Directories	
  
๏  Grouping	
  of	
  user	
  and	
  roles	
  
๏  Easy	
  management	
  in	
  authoriza/on	
  decisions	
  
๏  Different	
  types	
  of	
  user	
  stores	
  support	
  
26	
  
Authen/ca/on	
  
๏  Iden/fying	
  which	
  en/ty	
  are	
  we	
  communica/ng	
  with	
  
๏  En/ty	
  can	
  be	
  users	
  or	
  systems	
  
๏  Most	
  basic	
  form	
  is	
  user	
  name	
  and	
  password	
  
๏  Authen/ca/on	
  against	
  user	
  store	
  
๏  Concept	
  of	
  mul/	
  factor	
  authen/ca/on	
  
27	
  
Authoriza/on	
  
๏  What	
  an	
  en/ty	
  allowed	
  to	
  access	
  in	
  the	
  system	
  
๏  En/tlement	
  management	
  aspects	
  
๏  Discussed	
  
28	
  
Single	
  Sign	
  On	
  
๏  Having	
  mul/ple	
  applica/ons	
  with	
  login	
  requirements	
  
๏  Once	
  login	
  to	
  the	
  applica/on	
  automa/c	
  login	
  to	
  other	
  
applica/ons	
  
๏  Token	
  usage	
  
๏  Iden/ty	
  Federa/on	
  
๏  Technologies	
  used	
  
๏  OpenID	
  
๏  SAML	
  
๏  Kerboros	
  
๏  WS-­‐Federa/on	
  passive	
  
29	
  
Provisioning	
  
๏  Concept	
  of	
  adding	
  and	
  removing	
  iden//es	
  from	
  user	
  
store	
  
๏  Provisioning	
  to	
  external	
  systems	
  
๏  Technologies	
  
๏  SPML	
  
๏  SCIM	
  
30	
  
Delega/on	
  
๏  Giving	
  responsibility	
  to	
  another	
  en/ty	
  to	
  carry	
  out	
  tasks	
  
on	
  behalf	
  of	
  you	
  
๏  Creden/al	
  sharing	
  systems	
  
๏  Technologies	
  
๏  OAuth	
  
31	
  
Users	
  and	
  roles	
  
๏  Enterprise	
  user	
  stores	
  with	
  users	
  and	
  roles	
  
๏  Managing	
  user	
  stores	
  
๏  Support	
  for	
  mul/ple	
  user	
  stores	
  
๏  Easy	
  configura/on	
  of	
  user	
  stores	
  in	
  UI	
  
๏  Types	
  of	
  user	
  stores	
  	
  
๏  LDAP,	
  Ac/ve	
  Directory,	
  JDBC	
  
๏  Support	
  for	
  mul/-­‐tenancy	
  
32	
  
Password	
  reset	
  
๏  Web	
  apps	
  needing	
  end	
  user	
  password	
  reset	
  
func/onality	
  
๏  Supports,	
  
๏  Reset	
  with	
  no/fica/on	
  
๏  Reset	
  with	
  secret	
  ques/ons	
  
๏  Increased	
  security	
  with	
  mul/ple	
  keys	
  in	
  the	
  reset	
  flow	
  
๏  UI	
  based	
  email	
  templates	
  configura/on	
  
33	
  
Self	
  registra/on	
  with	
  locking	
  
๏  Separate	
  web	
  service	
  to	
  self	
  registra/on	
  with	
  account	
  
lock	
  
๏  Upon	
  registra/on	
  sending	
  confirma/on	
  link	
  to	
  account	
  
unlock	
  
๏  Only	
  users	
  with	
  valid	
  email	
  address	
  gain	
  access	
  to	
  
system	
  
๏  Configurable	
  email	
  no/fica/on	
  template	
  
34	
  
Demo	
  
35	
  
36	
  
Business	
  Model	
  
37	
  
More	
  Informa/on	
  !	
  
๏  The	
  slides	
  and	
  webinar	
  will	
  be	
  available	
  soon.	
  
๏  Please	
  refer	
  Iden/ty	
  Server	
  documenta/on	
  -­‐	
  hKps://
docs.wso2.org/display/IS500/WSO2+Iden/ty+Server
+Documenta/on	
  
Contact	
  us	
  !	
  

More Related Content

PPTX
Entitlement and Access Manegement
PDF
Sap grc-access-control-solution
PDF
IT Infrastructure Management Powerpoint Presentation Slides
PDF
Basics in IT Audit and Application Control Testing
PPTX
Identity Access Management 101
PPTX
CISA Training - Chapter 1 - 2016
PDF
Implementing SAP security in 5 steps
PDF
IT General Controls Presentation at IIA Vadodara Audit Club
Entitlement and Access Manegement
Sap grc-access-control-solution
IT Infrastructure Management Powerpoint Presentation Slides
Basics in IT Audit and Application Control Testing
Identity Access Management 101
CISA Training - Chapter 1 - 2016
Implementing SAP security in 5 steps
IT General Controls Presentation at IIA Vadodara Audit Club

What's hot (20)

PPT
The Gartner IAM Program Maturity Model
PPT
The information security audit
PDF
Infrastructure Management PowerPoint Presentation Slides
PDF
HFM Extended Analytics
PPT
Oracle 10g Introduction 1
PDF
Steps in it audit
PPT
Sap Security Workshop
PDF
A Gentle Introduction to Microsoft SSAS
PPTX
ITSM(IT Service Management)
PPTX
IT General Controls
PPTX
03.1 general control
PPTX
Introduction to Oracle Database
PDF
Step by step on changing ecc source systems without affecting data modeling o...
PPTX
CIS 2303 LO1: Introduction to System Analysis and Design
PPTX
MIS MANAGEMENT INFORMATION SYSTEM
PDF
Identity & Access Management by K. K. Mookhey
PPT
IT System & Security Audit
PPTX
Auditor Reporting on Controls at Service Organizations
PDF
Modèles de contrôle d accès_ RBAC (Role Based Access Control).pdf
The Gartner IAM Program Maturity Model
The information security audit
Infrastructure Management PowerPoint Presentation Slides
HFM Extended Analytics
Oracle 10g Introduction 1
Steps in it audit
Sap Security Workshop
A Gentle Introduction to Microsoft SSAS
ITSM(IT Service Management)
IT General Controls
03.1 general control
Introduction to Oracle Database
Step by step on changing ecc source systems without affecting data modeling o...
CIS 2303 LO1: Introduction to System Analysis and Design
MIS MANAGEMENT INFORMATION SYSTEM
Identity & Access Management by K. K. Mookhey
IT System & Security Audit
Auditor Reporting on Controls at Service Organizations
Modèles de contrôle d accès_ RBAC (Role Based Access Control).pdf
Ad

Viewers also liked (20)

PDF
Data Entitlement with WSO2 Enterprise Middleware Platform
PDF
Workshop on Identity & Access Management.
PDF
Landscape of Web Identity Management
PPTX
Git beyond basics
PDF
WSO2 Product Release Webinar: WSO2 Application Server 5.3
PPTX
A Practitioner´s Recommendations for successful IAM Programs
PDF
The Private API Economy
PDF
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
PDF
Alchemy of the API Economy
PDF
End-to-End Identity Management
PPT
Uk french national id card presentation
PPT
The Use of Formal Methods on the iFACTS Air Traffic Control Project
PPT
Anton's Log Management 'Worst Practices'
PPTX
Presentation gdpr ahti
PPTX
Identity Management: Front and Center for Healthcare Providers
PPTX
Identity Management: Tools, processes & services
PDF
Helping Utilities with Cybersecurity Preparedness: The C2M2
PDF
CIS14: PingAccess in Action
PPTX
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Data Entitlement with WSO2 Enterprise Middleware Platform
Workshop on Identity & Access Management.
Landscape of Web Identity Management
Git beyond basics
WSO2 Product Release Webinar: WSO2 Application Server 5.3
A Practitioner´s Recommendations for successful IAM Programs
The Private API Economy
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
Alchemy of the API Economy
End-to-End Identity Management
Uk french national id card presentation
The Use of Formal Methods on the iFACTS Air Traffic Control Project
Anton's Log Management 'Worst Practices'
Presentation gdpr ahti
Identity Management: Front and Center for Healthcare Providers
Identity Management: Tools, processes & services
Helping Utilities with Cybersecurity Preparedness: The C2M2
CIS14: PingAccess in Action
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Ad

Similar to Identity and Entitlement Management Concepts (20)

PDF
ESB Evaluation Framework
PDF
[Final] best practices for access management (mule soft meetups riyadh) - j...
PPTX
CyberArk
PDF
Advanced Controls access and user security for superusers con8824
PDF
Reshape Integration - Think Beyond the ESB
PDF
Automating Security Management in PBCS!
PDF
Identity Management Buyer’s Guide for the SME
PDF
Identity Management Buyer’s Guide for the SME
PPTX
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
PDF
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
PPTX
Monitoring in the DevOps Era
PDF
Oracle Identity Governance Technical Overview - 11gR2PS3
PPTX
Con8813 securing privileged accounts with an integrated idm solution - final
PPTX
Access Control Pitfalls v2
PDF
Introduction to Enterprise Mobility Manager
PPTX
Becomming a cloud governance ninja linthicum interop fall 2013
PDF
MuleSoft Singapore Meetup - Number 6 - September 24, 2020
PDF
ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!
PDF
Madrid Alfresco Day 2015 - John Pomeroy - Why Alfresco in today’s Digital Ent...
PDF
Big Data security: Facing the challenge by Carlos Gómez at Big Data Spain 2017
ESB Evaluation Framework
[Final] best practices for access management (mule soft meetups riyadh) - j...
CyberArk
Advanced Controls access and user security for superusers con8824
Reshape Integration - Think Beyond the ESB
Automating Security Management in PBCS!
Identity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SME
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
Monitoring in the DevOps Era
Oracle Identity Governance Technical Overview - 11gR2PS3
Con8813 securing privileged accounts with an integrated idm solution - final
Access Control Pitfalls v2
Introduction to Enterprise Mobility Manager
Becomming a cloud governance ninja linthicum interop fall 2013
MuleSoft Singapore Meetup - Number 6 - September 24, 2020
ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!
Madrid Alfresco Day 2015 - John Pomeroy - Why Alfresco in today’s Digital Ent...
Big Data security: Facing the challenge by Carlos Gómez at Big Data Spain 2017

More from WSO2 (20)

PDF
Demystifying CMS-0057-F - Compliance Made Seamless with WSO2
PDF
Quantum Threats Are Closer Than You Think – Act Now to Stay Secure
PDF
Modern Platform Engineering with Choreo - The AI-Native Internal Developer Pl...
PDF
Application Modernization with Choreo - The AI-Native Internal Developer Plat...
PDF
Build Smarter, Deliver Faster with Choreo - An AI Native Internal Developer P...
PDF
Platformless Modernization with Choreo.pdf
PDF
Application Modernization with Choreo for the BFSI Sector
PDF
Choreo - The AI-Native Internal Developer Platform as a Service: Overview
PDF
[Roundtable] Choreo - The AI-Native Internal Developer Platform as a Service
PPTX
WSO2Con 2025 - Building AI Applications in the Enterprise (Part 1)
PPTX
WSO2Con 2025 - Building Secure Business Customer and Partner Experience (B2B)...
PPTX
WSO2Con 2025 - Building Secure Customer Experience Apps
PPTX
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
PPTX
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
PPTX
WSO2Con 2025 - Unified Management of Ingress and Egress Across Multiple API G...
PPTX
WSO2Con 2025 - How an Internal Developer Platform Lets Developers Focus on Code
PPTX
WSO2Con 2025 - Architecting Cloud-Native Applications
PDF
Mastering Intelligent Digital Experiences with Platformless Modernization
PDF
Accelerate Enterprise Software Engineering with Platformless
PDF
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
Demystifying CMS-0057-F - Compliance Made Seamless with WSO2
Quantum Threats Are Closer Than You Think – Act Now to Stay Secure
Modern Platform Engineering with Choreo - The AI-Native Internal Developer Pl...
Application Modernization with Choreo - The AI-Native Internal Developer Plat...
Build Smarter, Deliver Faster with Choreo - An AI Native Internal Developer P...
Platformless Modernization with Choreo.pdf
Application Modernization with Choreo for the BFSI Sector
Choreo - The AI-Native Internal Developer Platform as a Service: Overview
[Roundtable] Choreo - The AI-Native Internal Developer Platform as a Service
WSO2Con 2025 - Building AI Applications in the Enterprise (Part 1)
WSO2Con 2025 - Building Secure Business Customer and Partner Experience (B2B)...
WSO2Con 2025 - Building Secure Customer Experience Apps
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
WSO2Con 2025 - Unified Management of Ingress and Egress Across Multiple API G...
WSO2Con 2025 - How an Internal Developer Platform Lets Developers Focus on Code
WSO2Con 2025 - Architecting Cloud-Native Applications
Mastering Intelligent Digital Experiences with Platformless Modernization
Accelerate Enterprise Software Engineering with Platformless
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation

Recently uploaded (20)

PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Big Data Technologies - Introduction.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation theory and applications.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The AUB Centre for AI in Media Proposal.docx
Spectroscopy.pptx food analysis technology
Big Data Technologies - Introduction.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Digital-Transformation-Roadmap-for-Companies.pptx
Machine learning based COVID-19 study performance prediction
Spectral efficient network and resource selection model in 5G networks
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation theory and applications.pdf
sap open course for s4hana steps from ECC to s4
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation_ Review paper, used for researhc scholars
MIND Revenue Release Quarter 2 2025 Press Release
Diabetes mellitus diagnosis method based random forest with bat algorithm
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Identity and Entitlement Management Concepts

  • 1. Last Updated: Jan. 2014 Tech  Lead   Chamath  Gunawardana   Iden/ty  and  En/tlement   Management  –  Concepts  and   Theories  
  • 2. 2   About  the  Presenter(s)   ๏  Chamath  Gunawardana   Chamath  Gunwardana  is  a  technical  lead  at   WSO2  working  for  the  integra/on  technology   group.  He's  engaged  in  the  developments  of   the  WSO2  Iden/ty  Server  and  also  a   commiKer  of  the  WSO2  Iden/ty  Server.   Chamath  is  also  a  SUN  cer/fied  java   programmer.    
  • 3. 3   About  WSO2   ๏  Global  enterprise,  founded  in  2005   by  acknowledged  leaders  in  XML,   web  services    technologies,   standards    and  open  source   ๏  Provides  only  open  source   plaVorm-­‐as-­‐a-­‐service  for  private,   public  and  hybrid  cloud   deployments   ๏  All  WSO2  products  are  100%  open   source  and  released  under  the   Apache  License  Version  2.0.   ๏  Is  an  Ac/ve  Member  of  OASIS,   Cloud  Security  Alliance,  OSGi   Alliance,  AMQP  Working  Group,   OpenID  Founda/on  and  W3C.   ๏  Driven  by  Innova/on   ๏  Launched  first  open  source  API   Management  solu/on  in  2012   ๏  Launched  App  Factory  in  2Q  2013   ๏  Launched  Enterprise  Store  and   first  open  source  Mobile  solu/on   in  4Q  2013  
  • 4. 4   What  WSO2  delivers  
  • 5. Agenda   ๏  En/tlement  management   ๏  overview   ๏  Access  control  concepts   ๏  XACML   ๏  En/tlement  architecture  in  iden/ty  server   ๏  Iden/ty  management   ๏  overview   ๏  Features  of  iden/ty  management  systems   ๏  Couple  of  Iden/ty  Management  Capabili/es  in  iden/ty  server   ๏  Demo   5  
  • 6. What  is  En/tlement  Mng..   ๏  En#tlement  management  is  technology  that  grants,   resolves,  enforces,  revokes  and  administers  fine-­‐ grained  access  en/tlements.   ๏  Also  referred  to  as   authoriza/ons, privileges, access  rights, permissions  and/or   rules        -­‐  Gartner  Glossary   6  
  • 7. En/tlement  Management   ๏  It s  a  broader  concept   ๏  Types  of  access  control  includes,   ๏  Access  control  lists   ๏  Role  based  access  control   ๏  AKribute  based  access  control   ๏  Policy  based  access  control   7  
  • 8. Access  control  lists   ๏  Oldest  and  most    basic  form  of  access  control   ๏  Primarily  Opera/ng  systems  adopted   ๏  Maintains  set  of  user  and  opera/ons  can  performed  on   a  resource  as  a  mapping   ๏  Also  easier  to  implement  using  maps   ๏  Not  scalable  for  large  user  bases   ๏  Difficult  to  manage   8  
  • 9. Role  based  access  control   ๏  System  having  users  that  belongs  to  roles   ๏  Role  defines  which  resources  will  be  allowed   ๏  Reduces  the  management  overhead   ๏  Users  and  roles  can  be  externalized  using  user  stores   ๏  Need  to  manage  the  roles   ๏  User  may  belong  to  mul/ple  roles   9  
  • 10. AKribute  based  access  control   ๏  Authoriza/on  based  on  aKributes   ๏  Addresses  the  limita/on  of  role  based  approach  to   define  fine  grain  access  control   ๏  AKributes  of  user,  environment  as  well  as  resource  it   self   ๏  More  flexible  than  role  based  approach   ๏  No  need  for  knowing  the  user  prior  to  gran/ng  access   10  
  • 11. Policy  based  access  control   ๏  Address  the  requirement  to  have  more  uniform  access   control  mechanism   ๏  Helps  to  large  enterprises  to  have  uniform  access   control  amount  org  units   ๏  Helps  for  security  audits  to  be  carried  out   ๏  Complex  than  any  other  access  control  system   ๏  Specify  policies  unambiguously  with  XACML   ๏  Use  of  authorized  aKribute  sources  in  the  enterprise   11  
  • 12. Advantages   ๏  Reduce  the  development  /me  on  cri/cal  business   func/ons   ๏  Easy  management  of  en/tlements   ๏  Based  on  industry  standard  specifica/ons   ๏  Support  for  future  development  with  minimum  effort   12  
  • 13. XACML   ๏  XACML  is  a  policy  based  authoriza/on/en/tlement   system   ๏  De-­‐facto  standard  for  authoriza/on   ๏  Evaluated  of  1.0,  2.0  and  3.0  versions   ๏  Externalized   ๏  Policy  based   ๏  Fine  grained   ๏  Standardized   13  
  • 14. XACML   ๏  Iden/ty  Server  supports  XACML  2.0  and  3.0  versions   ๏  Supports  mul/ple  PIPs   ๏  Policy  distribu/on   ๏  UI  wizards  for  defining  policies   ๏  Try  it  tool   ๏  Decision  /  AKribute  caching   14  
  • 19. Try  it  tool   19  
  • 20. Try  it  tool  request   20  
  • 22. Iden/ty  Management   ๏  Managing  Iden/ty  of  users  in  a  system   ๏  Control  access  to  resources   ๏  Important  component  in  an  enterprise   ๏  Enterprises  depends  on  the  security  provided  by   iden/ty  management  systems   22  
  • 23. Why  Iden/ty  Management   ๏  Directly  influences  the  security  and  produc/vity  of  an   organiza/on   ๏  To  enforce  consistency  in  security  policies  across   organiza/on   ๏  To  comply  with  rules  and  regula/ons  enforced  in  some   cri/cal  domains  by  governments   ๏  Provide  access  to  resources  to  outside  par/es  without   compromising  security   23  
  • 24. Why  Iden/ty  Management  Cont.   ๏  Controlled  resource  access  increases  organiza/onal   security   ๏  Increased  audit-­‐ability  of  the  systems   ๏  Automated  password  reset  capabili/es   24  
  • 25. Features  of  IDM  System   ๏  User  Stores  /  Directories   ๏  Authen/ca/on   ๏  Authoriza/on   ๏  Single  Sign  On   ๏  Provisioning   ๏  Delega/on   ๏  Password  reset   ๏  Self  registra/on  with  locking  25  
  • 26. User  stores  /  Directories   ๏  Grouping  of  user  and  roles   ๏  Easy  management  in  authoriza/on  decisions   ๏  Different  types  of  user  stores  support   26  
  • 27. Authen/ca/on   ๏  Iden/fying  which  en/ty  are  we  communica/ng  with   ๏  En/ty  can  be  users  or  systems   ๏  Most  basic  form  is  user  name  and  password   ๏  Authen/ca/on  against  user  store   ๏  Concept  of  mul/  factor  authen/ca/on   27  
  • 28. Authoriza/on   ๏  What  an  en/ty  allowed  to  access  in  the  system   ๏  En/tlement  management  aspects   ๏  Discussed   28  
  • 29. Single  Sign  On   ๏  Having  mul/ple  applica/ons  with  login  requirements   ๏  Once  login  to  the  applica/on  automa/c  login  to  other   applica/ons   ๏  Token  usage   ๏  Iden/ty  Federa/on   ๏  Technologies  used   ๏  OpenID   ๏  SAML   ๏  Kerboros   ๏  WS-­‐Federa/on  passive   29  
  • 30. Provisioning   ๏  Concept  of  adding  and  removing  iden//es  from  user   store   ๏  Provisioning  to  external  systems   ๏  Technologies   ๏  SPML   ๏  SCIM   30  
  • 31. Delega/on   ๏  Giving  responsibility  to  another  en/ty  to  carry  out  tasks   on  behalf  of  you   ๏  Creden/al  sharing  systems   ๏  Technologies   ๏  OAuth   31  
  • 32. Users  and  roles   ๏  Enterprise  user  stores  with  users  and  roles   ๏  Managing  user  stores   ๏  Support  for  mul/ple  user  stores   ๏  Easy  configura/on  of  user  stores  in  UI   ๏  Types  of  user  stores     ๏  LDAP,  Ac/ve  Directory,  JDBC   ๏  Support  for  mul/-­‐tenancy   32  
  • 33. Password  reset   ๏  Web  apps  needing  end  user  password  reset   func/onality   ๏  Supports,   ๏  Reset  with  no/fica/on   ๏  Reset  with  secret  ques/ons   ๏  Increased  security  with  mul/ple  keys  in  the  reset  flow   ๏  UI  based  email  templates  configura/on   33  
  • 34. Self  registra/on  with  locking   ๏  Separate  web  service  to  self  registra/on  with  account   lock   ๏  Upon  registra/on  sending  confirma/on  link  to  account   unlock   ๏  Only  users  with  valid  email  address  gain  access  to   system   ๏  Configurable  email  no/fica/on  template   34  
  • 37. 37   More  Informa/on  !   ๏  The  slides  and  webinar  will  be  available  soon.   ๏  Please  refer  Iden/ty  Server  documenta/on  -­‐  hKps:// docs.wso2.org/display/IS500/WSO2+Iden/ty+Server +Documenta/on