SlideShare a Scribd company logo
KeyRock and Wilma
Openstack-based Identity Management in FIWARE
Joaquín Salvachúa - Álvaro Alonso
jsalvachua@dit.upm.es - aalonsog@dit.upm.es
FIWARE
 FIWARE is an innovative, open cloud-based infrastructure for cost-effective
creation and delivery of Future Internet applications and services, at a scale
not seen before.
 These APIs are public and royalty-free, driven by the development of an open
source reference implementation which accelerates the availability of
commercial products and services based on FIWARE technologies.
 More in
• https://www.fiware.org
• /https://www.fiware.org/formation
2
FIWARE Generic Enablers
 Generic Enablers (GE) offer a number of general-purpose functions, offered
through well-defined APIs, easing development of smart applications in
multiple sectors. They will set the foundations of the architecture associated
to your application.
 Specifications of FIWARE GE APIs are public and royalty-free. You can
search for the open source reference implementation, as well as alternative
implementations, of each FIWARE GE in the FIWARE Reference
Architecture.
3
4
FIWARE Community
5
http://map.fiware.org/
FIWARE Lab
6
http://infographic.lab.fiware.org/
FIWARE Lab & Cloud
7
Region 1
OS
Service
Region 2
OS
Service
Region n
OS
Service
Cloud Portal Keyrock
DB
getCatalogue
FIWARE Lab & Cloud
8
Region 1
OS
Service
Region 2
OS
Service
Region n
OS
Service
Cloud Portal Keyrock
DB
request (token)
FIWARE Lab & Cloud
9
Region 1
OS
Service
Region 2
OS
Service
Region n
OS
Service
Cloud Portal Keyrock
DBvalidate (token)
:service credentials
FIWARE Lab & Cloud
10
Region 1
OS
Service
Region 2
OS
Service
Region n
OS
Service
Cloud Portal
Keyrock 2
DB
Keyrock 1
HA
Proxy
Keyrock architecture
 Horizon
• Fron-end component
• User views
 Keystone
• Back-end component
• Resources management
• Connection to data base
Horizon
Keystone
DB
Horizon extensions
Openstack Horizon
FIWARE UI
AuthZForce Driver
OAuth2
Driver
FIWARE
Accounts
Admin
tools
reCaptcha
Keystone extensions
Openstack Keystone
Keystone API
SCIM 2.0
User
Registration
Two factor auth
OAuth2
OAuth2
14
Cloud Portal
OAuth2
Keyrock
OAuth2
15
Cloud Portal
OAuth2
Keyrock
Keystone TOKEN TOKEN
Google Account
16
FIWARE Account
17
Account
FIWARE Account
Login with
OAuth2
External applications
19
Cloud Portal
Keyrock
App 1 App 2
OAuth2
OAuth2OAuth2
Token validation
20
Cloud Portal
OAuth2
Keyrock
Keystone TOKEN
Region 1
OS Service
Keystone Middleware
TOKEN Validation
Token validation
External Applications
21
App
OAuth2
Keyrock
Keystone TOKEN
Backend service
Wilma
TOKEN Validation
Wilma
Backend Service
REST API
REST Client
Other
services
HTTP request
Web App
User 1 User 2
Wilma
Backend Service
REST API
REST Client
Other
services
HTTP request + TOKEN
Web App
Wilma
User 1 User 2
Authentication
Backend Service
REST API
HTTP request + TOKEN
Wilma
User
Keyrock GE
TOKEN
OK + user info
Authorization
Backend Service
REST API
HTTP request + TOKEN
Wilma
User
Keyrock GE
AuthZForce
GE
AuthZForce
 The other part in Policy Management
 Wilma  PEP
• Policy Enforcement Point
 AuthZForce  PAP & PDP
• Policy Administration Point
• Policy Decision Point
26
FIWARE Lab Accounts
 Basic
• Manage organizations
• Register applications
• Use Cloud if other users authorize him
 Trial
• Cloud 14 days Trial period  Cloud Project
• Spain2 region
 Community
• Cloud during 9 months  Cloud Project
• Assigned region
FIWARE Lab Accounts
Basic
Trial
Community
1
2
4
3
5
6
7
Private Regions Support
 Goal
• Support to private regions that wants to offer part of their Cloud resources to
FIWARE Lab users
29
The scenario
• FL user represent a user with a registered account in FIWARE Lab
• In FIWARE Lab environment, FL OS Services represent the services of all the Federated nodes
• Private Cloud is a Commercial Cloud Provider that wants to offer some of its resources (part of Local OS
Services) to be available in FIWARE Lab as a new node.
• Private Cloud has their own users registered in its local Keystone (Ext User is one of them) and using Cloud
resources deployed in Local OS Services
Keyrock
Cloud Portal
FIWARE Lab
FL
OS Services
FL User
Keystone
Horizon
Private Cloud
Local
OS Services
Ext User
Requirements
• Ext User can continue using his deployed resources in Local OS Services using Horizon
• FL User (if he has the correct rights) can deploy resources in Private Cloud Local OS Services using Cloud
Portal
• In Cloud Portal, Private Cloud node appears as a new node. It is accessible for FIWARE Lab users with quotas
in that node (community users assigned to that node)
• Private Cloud infrastructure owners can assign quotas of Local OS Services to FIWARE Lab users (to their
cloud projects)
• FL User can continue using FL OS Services as before.
• If a Ext User wants to use FIWARE Lab nodes resources, he has to create an account in FIWARE Lab.
Keyrock
Cloud Portal
FIWARE Lab
FL
OS Services
FL User
Keystone
Horizon
Private Cloud
Local
OS Services
Ext User
Solution – FL User using FIWARE Lab resources
Everything works as always
1. Cloud Portal authenticates the user in Keyrock
2. Cloud Portal sends a request to an OS Service
3. OS Service validates the token with Keyrock
Keyrock
Cloud Portal
FIWARE Lab
FL
OS Services
FL User
Keystone
Horizon
Private Cloud
Local
OS Services
Ext User
1
2
3
Solution – Ext User using Local resources
Everything works as always
1. Horizon authenticates the user in Keystone
2. Horizon sends a request to an OS Service
3. OS Service validates the token with Keystone
Keyrock
Cloud Portal
FIWARE Lab
FL
OS Services
FL User
Keystone
Horizon
Private Cloud
Local
OS Services
Ext User
1
2
3
Solution – FL User using Private Cloud resources
1. Cloud Portal authenticates the user in Keyrock
2. Cloud Portal sends a request to a Private Cloud OS Service
3. Private Cloud OS Service tries to validate the token in Keystone
4. As the validation doesn’t success (the token is not stored in Keystone), Keystone validates it with Keyrock
acting as a gateway and sending the response to Private Cloud OS Service
*. If the validation success, Keystone stores the token locally (in cache), so the next times the step 4 is
not required.
Keyrock
Cloud Portal
FIWARE Lab
FL
OS Services
FL User
Keystone
Horizon
Private Cloud
Local
OS Services
Ext User
1
2
4
3
Token driver
IoT Support
Context Broker
Sensor authentication
update / query
Context
Producer /
Consumer
PEP Proxy
Keyrock GE
Token creation
Token
validation
Conclusions
 Evolution and integration between OpenStack and a IDM.
 Evolution in Open Source (development by UPM in the proyect).
 Identity solution widely used among all the startups ( Most used GE ).
 Goal to have it integrated in different susteniable ecosystems:
• Full integration with OpenStack.

37
Important Links
 FIWARE
• https://www.fiware.org/
 FIWARE Lab
• https://account.lab.fiware.org/
 Keyrock
• http://catalogue.fiware.org/enablers/identity-management-keyrock
 Wilma
• http://catalogue.fiware.org/enablers/pep-proxy-wilma
 AuthZForce
• http://catalogue.fiware.org/enablers/authorization-pdp-authzforce
38
Opensource projects
 Keyrock
• https://github.com/ging/fiware-idm
• Horizon fork: https://github.com/ging/horizon
• Keystone fork: https://github.com/ging/keystone
 Wilma
• https://github.com/ging/fiware-pep-proxy
 AuthZForce
39
KeyRock and Wilma
Openstack-based Identity Management in FIWARE
Joaquín Salvachúa - Álvaro Alonso
jsalvachua@dit.upm.es - aalonsog@dit.upm.es

More Related Content

PDF
Kubernetes Introduction
PPTX
Introducing Project Longhorn - April 2016 Rancher Online Meetup
PDF
Sopra Steria: Intelligent Network Analysis in a Telecommunications Environment
PDF
Neo4j GraphDay Seattle- Sept19- neo4j basic training
PPTX
Building Event Driven Architectures with Kafka and Cloud Events (Dan Rosanova...
PPTX
Domain Driven Design - Strategic Patterns and Microservices
PDF
SRv6 study
PPTX
Introduction to Redis
Kubernetes Introduction
Introducing Project Longhorn - April 2016 Rancher Online Meetup
Sopra Steria: Intelligent Network Analysis in a Telecommunications Environment
Neo4j GraphDay Seattle- Sept19- neo4j basic training
Building Event Driven Architectures with Kafka and Cloud Events (Dan Rosanova...
Domain Driven Design - Strategic Patterns and Microservices
SRv6 study
Introduction to Redis

What's hot (20)

PDF
モニタリングプラットフォーム開発の裏側
PDF
Containers technologies
PDF
SDDC Strategy 1.3
PPTX
Grafana optimization for Prometheus
PDF
GDPR: Leverage the Power of Graphs
PDF
Open shift 4 infra deep dive
PPTX
How YugaByte DB Implements Distributed PostgreSQL
PDF
虎の穴ラボ エンジニア採用説明資料
PDF
OpenShift Multicluster
PDF
An Introduction to Kubernetes
PDF
Robert Kubis - gRPC - boilerplate to high-performance scalable APIs - code.t...
PDF
Deep Dive on ClickHouse Sharding and Replication-2202-09-22.pdf
PDF
Prestoで実現するインタラクティブクエリ - dbtech showcase 2014 Tokyo
PDF
Backstage l'Internal Developer Portal Open Source per una migliore Developer ...
PDF
Apache Hiveの今とこれから
PDF
Elk devops
PPTX
Kubernetes Introduction
PDF
P2P Container Image Distribution on IPFS With containerd and nerdctl
PDF
Domain Driven Design (Ultra) Distilled
PDF
Red Hat Essentials
モニタリングプラットフォーム開発の裏側
Containers technologies
SDDC Strategy 1.3
Grafana optimization for Prometheus
GDPR: Leverage the Power of Graphs
Open shift 4 infra deep dive
How YugaByte DB Implements Distributed PostgreSQL
虎の穴ラボ エンジニア採用説明資料
OpenShift Multicluster
An Introduction to Kubernetes
Robert Kubis - gRPC - boilerplate to high-performance scalable APIs - code.t...
Deep Dive on ClickHouse Sharding and Replication-2202-09-22.pdf
Prestoで実現するインタラクティブクエリ - dbtech showcase 2014 Tokyo
Backstage l'Internal Developer Portal Open Source per una migliore Developer ...
Apache Hiveの今とこれから
Elk devops
Kubernetes Introduction
P2P Container Image Distribution on IPFS With containerd and nerdctl
Domain Driven Design (Ultra) Distilled
Red Hat Essentials
Ad

Similar to KeyRock and Wilma - Openstack-based Identity Management in FIWARE (20)

PDF
UKC - Msc Project - Providing Moonshot access to OpenStack
PDF
Berlin OpenStack Summit'18
PPT
Shmoocon 2013 - OpenStack Security Brief
PPTX
Coding with-fiware-quick tour - cloud
PDF
Openstack Pramod
PPTX
Identity service keystone ppt
PPTX
Identity in Openstack Icehouse
PPTX
Keystone - Openstack Identity Service
PDF
Anil saldhana cloudidentitybestpractices
PDF
CIS 2015- Building IAM for OpenStack- Steve Martinelli
PDF
Integrating Fiware Orion, Keyrock and Wilma
PPTX
Building IAM for OpenStack
PPTX
Federico Michele Facca - FIWARE Primer - Learn FIWARE in 60 Minutes
PPTX
FIWARE Primer - Learn FIWARE in 60 Minutes
PPTX
OpenStack Keystone
PPTX
Aptira presents OpenStack keystone identity service
PPTX
OpenStack Paris 2014 - Federation, are we there yet ?
PPTX
OpenStack Toronto Meetup - Keystone 101
PDF
FIWARE Identity Management and Access Control
PDF
Open stack identity project update (havana) (1)
UKC - Msc Project - Providing Moonshot access to OpenStack
Berlin OpenStack Summit'18
Shmoocon 2013 - OpenStack Security Brief
Coding with-fiware-quick tour - cloud
Openstack Pramod
Identity service keystone ppt
Identity in Openstack Icehouse
Keystone - Openstack Identity Service
Anil saldhana cloudidentitybestpractices
CIS 2015- Building IAM for OpenStack- Steve Martinelli
Integrating Fiware Orion, Keyrock and Wilma
Building IAM for OpenStack
Federico Michele Facca - FIWARE Primer - Learn FIWARE in 60 Minutes
FIWARE Primer - Learn FIWARE in 60 Minutes
OpenStack Keystone
Aptira presents OpenStack keystone identity service
OpenStack Paris 2014 - Federation, are we there yet ?
OpenStack Toronto Meetup - Keystone 101
FIWARE Identity Management and Access Control
Open stack identity project update (havana) (1)
Ad

More from Álvaro Alonso González (20)

PPTX
Adding identity management and access control to your app
PPTX
Curso AngularJS - 7. temas avanzados
PPTX
Curso AngularJS - 6. formularios
PPTX
Curso AngularJS - 5. rutas
PPTX
Curso AngularJS - 4. filtros y servicios
PPTX
Curso AngularJS - 3. módulos y controladores
PPTX
Curso AngularJS - 1. introducción
PPTX
Curso AngularJS - 2. conceptos básicos
PPTX
Lesson 6 - How to register your sensors in account portal
PPTX
Lesson 5 - Installing Keyrock in your own infrastructure
PPTX
Keyrock - Lesson 3. Applications. How to create OAuth2 tokens.
PPTX
Keyrock - Lesson 1. Introduction
PPTX
Cloud Portal - Lesson 5. Advanced tasks
PPTX
Cloud Portal - Lesson 4. Managing Storage
PPTX
Cloud Portal - Lesson 2. Cloud Portal Overview
PPTX
Cloud Portal - Lesson 1. Introduction
PPTX
Cloud Portal - Lesson 3. Launching an Instance
PPTX
Primeros pasos con Docker
PDF
Introducción al Protocolo OAuth 2.0
PPTX
Adding Identity Management and Access Control to your Application
Adding identity management and access control to your app
Curso AngularJS - 7. temas avanzados
Curso AngularJS - 6. formularios
Curso AngularJS - 5. rutas
Curso AngularJS - 4. filtros y servicios
Curso AngularJS - 3. módulos y controladores
Curso AngularJS - 1. introducción
Curso AngularJS - 2. conceptos básicos
Lesson 6 - How to register your sensors in account portal
Lesson 5 - Installing Keyrock in your own infrastructure
Keyrock - Lesson 3. Applications. How to create OAuth2 tokens.
Keyrock - Lesson 1. Introduction
Cloud Portal - Lesson 5. Advanced tasks
Cloud Portal - Lesson 4. Managing Storage
Cloud Portal - Lesson 2. Cloud Portal Overview
Cloud Portal - Lesson 1. Introduction
Cloud Portal - Lesson 3. Launching an Instance
Primeros pasos con Docker
Introducción al Protocolo OAuth 2.0
Adding Identity Management and Access Control to your Application

Recently uploaded (20)

PDF
project resource management chapter-09.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Approach and Philosophy of On baking technology
PDF
Encapsulation theory and applications.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
August Patch Tuesday
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Hybrid model detection and classification of lung cancer
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
project resource management chapter-09.pdf
TLE Review Electricity (Electricity).pptx
Zenith AI: Advanced Artificial Intelligence
MIND Revenue Release Quarter 2 2025 Press Release
DP Operators-handbook-extract for the Mautical Institute
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Approach and Philosophy of On baking technology
Encapsulation theory and applications.pdf
cloud_computing_Infrastucture_as_cloud_p
Building Integrated photovoltaic BIPV_UPV.pdf
WOOl fibre morphology and structure.pdf for textiles
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
August Patch Tuesday
Univ-Connecticut-ChatGPT-Presentaion.pdf
Programs and apps: productivity, graphics, security and other tools
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
1 - Historical Antecedents, Social Consideration.pdf
Hybrid model detection and classification of lung cancer
SOPHOS-XG Firewall Administrator PPT.pptx

KeyRock and Wilma - Openstack-based Identity Management in FIWARE

  • 1. KeyRock and Wilma Openstack-based Identity Management in FIWARE Joaquín Salvachúa - Álvaro Alonso jsalvachua@dit.upm.es - aalonsog@dit.upm.es
  • 2. FIWARE  FIWARE is an innovative, open cloud-based infrastructure for cost-effective creation and delivery of Future Internet applications and services, at a scale not seen before.  These APIs are public and royalty-free, driven by the development of an open source reference implementation which accelerates the availability of commercial products and services based on FIWARE technologies.  More in • https://www.fiware.org • /https://www.fiware.org/formation 2
  • 3. FIWARE Generic Enablers  Generic Enablers (GE) offer a number of general-purpose functions, offered through well-defined APIs, easing development of smart applications in multiple sectors. They will set the foundations of the architecture associated to your application.  Specifications of FIWARE GE APIs are public and royalty-free. You can search for the open source reference implementation, as well as alternative implementations, of each FIWARE GE in the FIWARE Reference Architecture. 3
  • 4. 4
  • 7. FIWARE Lab & Cloud 7 Region 1 OS Service Region 2 OS Service Region n OS Service Cloud Portal Keyrock DB getCatalogue
  • 8. FIWARE Lab & Cloud 8 Region 1 OS Service Region 2 OS Service Region n OS Service Cloud Portal Keyrock DB request (token)
  • 9. FIWARE Lab & Cloud 9 Region 1 OS Service Region 2 OS Service Region n OS Service Cloud Portal Keyrock DBvalidate (token) :service credentials
  • 10. FIWARE Lab & Cloud 10 Region 1 OS Service Region 2 OS Service Region n OS Service Cloud Portal Keyrock 2 DB Keyrock 1 HA Proxy
  • 11. Keyrock architecture  Horizon • Fron-end component • User views  Keystone • Back-end component • Resources management • Connection to data base Horizon Keystone DB
  • 12. Horizon extensions Openstack Horizon FIWARE UI AuthZForce Driver OAuth2 Driver FIWARE Accounts Admin tools reCaptcha
  • 13. Keystone extensions Openstack Keystone Keystone API SCIM 2.0 User Registration Two factor auth OAuth2
  • 20. Token validation 20 Cloud Portal OAuth2 Keyrock Keystone TOKEN Region 1 OS Service Keystone Middleware TOKEN Validation
  • 21. Token validation External Applications 21 App OAuth2 Keyrock Keystone TOKEN Backend service Wilma TOKEN Validation
  • 22. Wilma Backend Service REST API REST Client Other services HTTP request Web App User 1 User 2
  • 23. Wilma Backend Service REST API REST Client Other services HTTP request + TOKEN Web App Wilma User 1 User 2
  • 24. Authentication Backend Service REST API HTTP request + TOKEN Wilma User Keyrock GE TOKEN OK + user info
  • 25. Authorization Backend Service REST API HTTP request + TOKEN Wilma User Keyrock GE AuthZForce GE
  • 26. AuthZForce  The other part in Policy Management  Wilma  PEP • Policy Enforcement Point  AuthZForce  PAP & PDP • Policy Administration Point • Policy Decision Point 26
  • 27. FIWARE Lab Accounts  Basic • Manage organizations • Register applications • Use Cloud if other users authorize him  Trial • Cloud 14 days Trial period  Cloud Project • Spain2 region  Community • Cloud during 9 months  Cloud Project • Assigned region
  • 29. Private Regions Support  Goal • Support to private regions that wants to offer part of their Cloud resources to FIWARE Lab users 29
  • 30. The scenario • FL user represent a user with a registered account in FIWARE Lab • In FIWARE Lab environment, FL OS Services represent the services of all the Federated nodes • Private Cloud is a Commercial Cloud Provider that wants to offer some of its resources (part of Local OS Services) to be available in FIWARE Lab as a new node. • Private Cloud has their own users registered in its local Keystone (Ext User is one of them) and using Cloud resources deployed in Local OS Services Keyrock Cloud Portal FIWARE Lab FL OS Services FL User Keystone Horizon Private Cloud Local OS Services Ext User
  • 31. Requirements • Ext User can continue using his deployed resources in Local OS Services using Horizon • FL User (if he has the correct rights) can deploy resources in Private Cloud Local OS Services using Cloud Portal • In Cloud Portal, Private Cloud node appears as a new node. It is accessible for FIWARE Lab users with quotas in that node (community users assigned to that node) • Private Cloud infrastructure owners can assign quotas of Local OS Services to FIWARE Lab users (to their cloud projects) • FL User can continue using FL OS Services as before. • If a Ext User wants to use FIWARE Lab nodes resources, he has to create an account in FIWARE Lab. Keyrock Cloud Portal FIWARE Lab FL OS Services FL User Keystone Horizon Private Cloud Local OS Services Ext User
  • 32. Solution – FL User using FIWARE Lab resources Everything works as always 1. Cloud Portal authenticates the user in Keyrock 2. Cloud Portal sends a request to an OS Service 3. OS Service validates the token with Keyrock Keyrock Cloud Portal FIWARE Lab FL OS Services FL User Keystone Horizon Private Cloud Local OS Services Ext User 1 2 3
  • 33. Solution – Ext User using Local resources Everything works as always 1. Horizon authenticates the user in Keystone 2. Horizon sends a request to an OS Service 3. OS Service validates the token with Keystone Keyrock Cloud Portal FIWARE Lab FL OS Services FL User Keystone Horizon Private Cloud Local OS Services Ext User 1 2 3
  • 34. Solution – FL User using Private Cloud resources 1. Cloud Portal authenticates the user in Keyrock 2. Cloud Portal sends a request to a Private Cloud OS Service 3. Private Cloud OS Service tries to validate the token in Keystone 4. As the validation doesn’t success (the token is not stored in Keystone), Keystone validates it with Keyrock acting as a gateway and sending the response to Private Cloud OS Service *. If the validation success, Keystone stores the token locally (in cache), so the next times the step 4 is not required. Keyrock Cloud Portal FIWARE Lab FL OS Services FL User Keystone Horizon Private Cloud Local OS Services Ext User 1 2 4 3 Token driver
  • 36. Context Broker Sensor authentication update / query Context Producer / Consumer PEP Proxy Keyrock GE Token creation Token validation
  • 37. Conclusions  Evolution and integration between OpenStack and a IDM.  Evolution in Open Source (development by UPM in the proyect).  Identity solution widely used among all the startups ( Most used GE ).  Goal to have it integrated in different susteniable ecosystems: • Full integration with OpenStack.  37
  • 38. Important Links  FIWARE • https://www.fiware.org/  FIWARE Lab • https://account.lab.fiware.org/  Keyrock • http://catalogue.fiware.org/enablers/identity-management-keyrock  Wilma • http://catalogue.fiware.org/enablers/pep-proxy-wilma  AuthZForce • http://catalogue.fiware.org/enablers/authorization-pdp-authzforce 38
  • 39. Opensource projects  Keyrock • https://github.com/ging/fiware-idm • Horizon fork: https://github.com/ging/horizon • Keystone fork: https://github.com/ging/keystone  Wilma • https://github.com/ging/fiware-pep-proxy  AuthZForce 39
  • 40. KeyRock and Wilma Openstack-based Identity Management in FIWARE Joaquín Salvachúa - Álvaro Alonso jsalvachua@dit.upm.es - aalonsog@dit.upm.es