SlideShare a Scribd company logo
IBM Security Systems




OpenStack Security


Sreekanth Iyer
Executive IT Architect
IBM Security Systems




© 2013 IBM Corporation
1                            © 2013 IBM Corporation
IBM Security Systems


OpenStack - Core Projects / Components

                                                                                             Compute (Nova)
                                                                                              – Provision and manage
                                                                                                virtual machines

                                                                                             Dashboard (Horizon)
                                                                                              – Self-service portal

                                                                                             Image (Glance)
                                                                                              – Catalog and manage
                                                                                                server images

                                                                                             Identity (Keystone)
                                                                                              – Unified authentication,
                                                                                                integrates with existing
                                                                                                systems

                                                                                             Object Storage (Swift)
                                                                                              – petabytes of secure,
                                                                                                reliable object storage

Source: http://ken.pepple.info/openstack/2012/02/21/revisit-openstack-architecture-diablo/


2                                                                                                           © 2013 IBM Corporation
IBM Security Systems


Keystone (Identity Service) offers project-wide identity, token, service
catalog, and policy service designed for integrate with existing systems

                                           Core Use Cases:
                                         • Authenticate user / password requests against
                                           multiple backends (SQL, LDAP, etc) (Identity
                                           Service)
                                         • Validates / manages tokens used after initial
                                           username/password verification (Token
                                           Service)
                                         • Endpoint registry of available services (Service
                                           Catalog)
                                         • Authorize API requests (Policy Service)


                                           Key Capabilities:
                                         • User / Tenant model with Role-Based Access
                                           Control
                                         • Policy service provides a rule-based
                                           authorization engine and the associated rule
                                           management interface.
                                         • Each service configured to serve data from
                                           pluggable backend (Key-Value, SQL, PAM,
                                           LDAP, Templates)
                                         • REST-based APIs

3                                                                             © 2013 IBM Corporation
IBM Security Systems


Basic Concepts



    The Identity service has two primary functions:
     –User management: keep track of users and what
      they are permitted to do
     –Service catalog: Provide a catalog of what
      services are available and where their API
      endpoints are located




4                                             © 2013 IBM Corporation
IBM Security Systems


Identity Service – Key terms                              Token
                                                            A token is an arbitrary bit of text that is used to
User                                                        access resource which is valid for a finite duration
  A digital representation of a person, system, or          and can be revoked at anytime
  service                                                 Tenant
  Users have a login and may be assigned tokens to          A container used to group or isolate resources
  access resources.                                         and/or identity objects. Depending on the service
  Users may be directly assigned to a particular            operator, a tenant may map to a customer, account,
  tenant                                                    organization, or project.
Credentials                                               Service
  Data that belongs to, is owned by, and generally          An OpenStack service, such as Compute (Nova),
  only known by a user that the user can present to         Object Storage (Swift), or Image Service (Glance).
  prove they are who they are for example –                 A service provides one or more endpoints through
  username/password                                         which users can access resources and perform
                                                            (presumably useful) operations.
Authentication
                                                          Endpoint
  Validate the user claims like a set of credentials
  (username& password, or username and API key).            An network-accessible address, usually described
                                                            by URL, where a service may be accessed.
  After initial confirmation, Keystone will issue the
  user a token which the user can then provide to         Role
  demonstrate that their identity has been                  A personality that a user assumes when performing
  authenticated when making subsequent requests.            a specific set of operations. A role includes a set of
                                                            right and privileges.


    Source : http://docs.openstack.org/api/openstack-identity-service/2.0/content/identity-dev-guide-2.0.pdf
5                                                                                                © 2013 IBM Corporation
IBM Security Systems


Identity Service – Key Concepts

Identity Management                                     RBAC
  Tenant -> User -> [ Credential | Token | Role ]        OpenStack has a configurable RBAC system that
  Tenants have Users. Users can belong to many           can be used to customize API access by Role.
  tenants.
  Users authenticate using a Credential and get a        Role is given to a user in Keystone.
  time-scoped Token.
  Tenant + User pairs can have many roles.               The API access is defined by a policy.json file that
                                                         is specific to each project (Nova example).
Service "Catalog"
  Service -> Endpoint                                    In Keystone, a token that is issued to a user
  Services (e.g. Compute, Object Storage, Image          includes the list of roles that user can assume.
  Service) have many Endpoints. Endpoints are
  typically a URL + where it is accessible from (e.g.    Services that are being called by that user
  internal, public)                                      determine how they interpret the set of roles a user
                                                         has and which operations or resources each roles
                                                         grants access to.




6                                                                                               © 2013 IBM Corporation
IBM Security Systems


Keystone Workflow




    http://docs.openstack.org/trunk/openstack-compute/admin/content/keystone-concepts.html
7                                                                                            © 2013 IBM Corporation
IBM Security Systems


    Configuring Services to work with Keystone

Once Keystone is installed and running, services need to be configured to work with it.
In general:

    Clients making calls to the service will pass in an authentication token.
    The Keystone middleware will look for and validate that token, taking the appropriate action.
    It will also retrieve additional information from the token such as user name, id, tenant name,
    id, roles, etc...
    The middleware will pass those data down to the service as headers.

Keystone Auth-Token Middleware
 The Keystone auth_token middleware is a WSGI component that can be inserted in the
 WSGI pipeline to handle authenticating tokens with Keystone.

Configuring Keystone for an LDAP backend
 It is possible to connect an LDAP backend with the Identity service Keystone.




8                                                                                      © 2013 IBM Corporation
IBM Security Systems


Keystone APIs

    Token Operations




    User Operations




    Tenant Operations




9                           © 2013 IBM Corporation
IBM Security Systems


Keystone – Observations & Enhancements


     Integration with enterprise security systems

     Support for Security Standards & Federation
      – Need to support external services for Authentication and Authorization i.e. OAuth, SAML
        and OpenID

     Audit, Compliance & Governance
      – Current logging mostly focused on debugging and monitoring; Need automated way to
        provide audit and assessment data

     Scalability and Performance
      – Need to scale and perform for enterprise grade deployments

     Support for Multi-tenancy & Keystone Domains




10                                                                                 © 2013 IBM Corporation

More Related Content

PPTX
Openstack security presentation 2013
PPT
Security Issues in OpenStack
PDF
CIS13: OpenStack API Security
PPT
Shmoocon 2013 - OpenStack Security Brief
PDF
OpenStack Identity - Keystone (liberty) by Lorenzo Carnevale and Silvio Tavilla
PDF
OpenStack keystone identity service
PPTX
OpenStack Security Project
PPTX
Keystone - Openstack Identity Service
Openstack security presentation 2013
Security Issues in OpenStack
CIS13: OpenStack API Security
Shmoocon 2013 - OpenStack Security Brief
OpenStack Identity - Keystone (liberty) by Lorenzo Carnevale and Silvio Tavilla
OpenStack keystone identity service
OpenStack Security Project
Keystone - Openstack Identity Service

What's hot (19)

PDF
Holistic Security for OpenStack Clouds
PDF
Design and implement a new cloud security method based on multi clouds on ope...
ODP
OpenStack keystone identity service
PDF
Managed Cloud Platform
PPTX
Windows Azure Security Features And Functionality
PPTX
Connect your datacenter to Microsoft Azure
PPTX
Intro to the FIWARE Lab
PPTX
Setting up your virtual infrastructure using FIWARE Lab Cloud
PPT
Open Source Cloud Computing -Eucalyptus
PDF
OpenStack: Security Beyond Firewalls
PPTX
Trust No-One Architecture For Services And Data
PPTX
Setting up your virtual infrastructure using FIWARE Lab Cloud
PDF
Hadoop Security, Cloudera - Todd Lipcon and Aaron Myers - Hadoop World 2010
PDF
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
PDF
VMworld 2013: Security Automation Workflows with NSX
PDF
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
PDF
Networking deep dive
PPTX
Building Secure Architectures on AWS
PPTX
CCI2018 - Azure Network - Security Best Practices
Holistic Security for OpenStack Clouds
Design and implement a new cloud security method based on multi clouds on ope...
OpenStack keystone identity service
Managed Cloud Platform
Windows Azure Security Features And Functionality
Connect your datacenter to Microsoft Azure
Intro to the FIWARE Lab
Setting up your virtual infrastructure using FIWARE Lab Cloud
Open Source Cloud Computing -Eucalyptus
OpenStack: Security Beyond Firewalls
Trust No-One Architecture For Services And Data
Setting up your virtual infrastructure using FIWARE Lab Cloud
Hadoop Security, Cloudera - Todd Lipcon and Aaron Myers - Hadoop World 2010
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: Security Automation Workflows with NSX
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
Networking deep dive
Building Secure Architectures on AWS
CCI2018 - Azure Network - Security Best Practices
Ad

Similar to OpenStack Security (20)

PPTX
IdM in Smart Applications on Virtual Infrastructure
PPTX
Seasonal Burst Handling Using Hybrid Cloud Infrastructure from Cloud Security...
PDF
Quantum Networks
PDF
My private cloud overview
PDF
FederatedAccessOpenStack.pdf
PDF
A Single Strong Authentication Platform for Cloud and On-Premise Applications
PPTX
Workshop: Advanced Federation Use-Cases with PingFederate
PDF
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
PDF
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
PPTX
Private cloud day session 5 a solution for private cloud security
PDF
Hitachi ID Solutions Supporting SOX Compliance
PDF
Projecting Enterprise Security Requirements on the Cloud
PDF
IDM & IAM 2012
PDF
Hitachi ID Solutions Support GLB Compliance
PDF
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
PPT
Trend micro - Your journey to the cloud, where are you
PPTX
Enterprise API Security & Data Loss Prevention - Intel
PDF
NetAuthority Brochure
PDF
SafeNet - Data Protection Company
PPTX
BayThreat Why The Cloud Changes Everything
IdM in Smart Applications on Virtual Infrastructure
Seasonal Burst Handling Using Hybrid Cloud Infrastructure from Cloud Security...
Quantum Networks
My private cloud overview
FederatedAccessOpenStack.pdf
A Single Strong Authentication Platform for Cloud and On-Premise Applications
Workshop: Advanced Federation Use-Cases with PingFederate
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
Private cloud day session 5 a solution for private cloud security
Hitachi ID Solutions Supporting SOX Compliance
Projecting Enterprise Security Requirements on the Cloud
IDM & IAM 2012
Hitachi ID Solutions Support GLB Compliance
Layer 7: The Importance of Standards for Enterprise SOA and Cloud Security
Trend micro - Your journey to the cloud, where are you
Enterprise API Security & Data Loss Prevention - Intel
NetAuthority Brochure
SafeNet - Data Protection Company
BayThreat Why The Cloud Changes Everything
Ad

More from openstackindia (20)

PDF
Guts & OpenStack migration
PDF
Copr HD OpenStack Day India
PDF
OPNFV & OpenStack
PDF
Your first patch to OpenStack
PPTX
OpenStack Neutron Behind The Senes
PDF
OpenStack Storage Buddy Ceph
PDF
OpenStack Watcher
PPTX
State of Containers in OpenStack
PPTX
The OpenStack Contribution Workflow
PPTX
Introduction to Cinder
PDF
OpenStack NFV Edge computing for IOT microservices
PDF
OpenStack Tempest and REST API testing
PDF
Deploying openstack using ansible
PDF
Ceph openstack-jun-2015-meetup
PPTX
Role of sdn controllers in open stack
PDF
Outreachy with-openstack-zaqar
PPTX
Enhancing OpenStack FWaaS for real world application
PDF
Openstack devops challenges
PPTX
Demistifying open stack storage
PPTX
OpenStack Heat
Guts & OpenStack migration
Copr HD OpenStack Day India
OPNFV & OpenStack
Your first patch to OpenStack
OpenStack Neutron Behind The Senes
OpenStack Storage Buddy Ceph
OpenStack Watcher
State of Containers in OpenStack
The OpenStack Contribution Workflow
Introduction to Cinder
OpenStack NFV Edge computing for IOT microservices
OpenStack Tempest and REST API testing
Deploying openstack using ansible
Ceph openstack-jun-2015-meetup
Role of sdn controllers in open stack
Outreachy with-openstack-zaqar
Enhancing OpenStack FWaaS for real world application
Openstack devops challenges
Demistifying open stack storage
OpenStack Heat

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
cuic standard and advanced reporting.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
“AI and Expert System Decision Support & Business Intelligence Systems”
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Building Integrated photovoltaic BIPV_UPV.pdf
Empathic Computing: Creating Shared Understanding
MIND Revenue Release Quarter 2 2025 Press Release
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Network Security Unit 5.pdf for BCA BBA.
cuic standard and advanced reporting.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Reach Out and Touch Someone: Haptics and Empathic Computing
Chapter 3 Spatial Domain Image Processing.pdf
Big Data Technologies - Introduction.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Review of recent advances in non-invasive hemoglobin estimation

OpenStack Security

  • 1. IBM Security Systems OpenStack Security Sreekanth Iyer Executive IT Architect IBM Security Systems © 2013 IBM Corporation 1 © 2013 IBM Corporation
  • 2. IBM Security Systems OpenStack - Core Projects / Components Compute (Nova) – Provision and manage virtual machines Dashboard (Horizon) – Self-service portal Image (Glance) – Catalog and manage server images Identity (Keystone) – Unified authentication, integrates with existing systems Object Storage (Swift) – petabytes of secure, reliable object storage Source: http://ken.pepple.info/openstack/2012/02/21/revisit-openstack-architecture-diablo/ 2 © 2013 IBM Corporation
  • 3. IBM Security Systems Keystone (Identity Service) offers project-wide identity, token, service catalog, and policy service designed for integrate with existing systems Core Use Cases: • Authenticate user / password requests against multiple backends (SQL, LDAP, etc) (Identity Service) • Validates / manages tokens used after initial username/password verification (Token Service) • Endpoint registry of available services (Service Catalog) • Authorize API requests (Policy Service) Key Capabilities: • User / Tenant model with Role-Based Access Control • Policy service provides a rule-based authorization engine and the associated rule management interface. • Each service configured to serve data from pluggable backend (Key-Value, SQL, PAM, LDAP, Templates) • REST-based APIs 3 © 2013 IBM Corporation
  • 4. IBM Security Systems Basic Concepts The Identity service has two primary functions: –User management: keep track of users and what they are permitted to do –Service catalog: Provide a catalog of what services are available and where their API endpoints are located 4 © 2013 IBM Corporation
  • 5. IBM Security Systems Identity Service – Key terms Token A token is an arbitrary bit of text that is used to User access resource which is valid for a finite duration A digital representation of a person, system, or and can be revoked at anytime service Tenant Users have a login and may be assigned tokens to A container used to group or isolate resources access resources. and/or identity objects. Depending on the service Users may be directly assigned to a particular operator, a tenant may map to a customer, account, tenant organization, or project. Credentials Service Data that belongs to, is owned by, and generally An OpenStack service, such as Compute (Nova), only known by a user that the user can present to Object Storage (Swift), or Image Service (Glance). prove they are who they are for example – A service provides one or more endpoints through username/password which users can access resources and perform (presumably useful) operations. Authentication Endpoint Validate the user claims like a set of credentials (username& password, or username and API key). An network-accessible address, usually described by URL, where a service may be accessed. After initial confirmation, Keystone will issue the user a token which the user can then provide to Role demonstrate that their identity has been A personality that a user assumes when performing authenticated when making subsequent requests. a specific set of operations. A role includes a set of right and privileges. Source : http://docs.openstack.org/api/openstack-identity-service/2.0/content/identity-dev-guide-2.0.pdf 5 © 2013 IBM Corporation
  • 6. IBM Security Systems Identity Service – Key Concepts Identity Management RBAC Tenant -> User -> [ Credential | Token | Role ] OpenStack has a configurable RBAC system that Tenants have Users. Users can belong to many can be used to customize API access by Role. tenants. Users authenticate using a Credential and get a Role is given to a user in Keystone. time-scoped Token. Tenant + User pairs can have many roles. The API access is defined by a policy.json file that is specific to each project (Nova example). Service "Catalog" Service -> Endpoint In Keystone, a token that is issued to a user Services (e.g. Compute, Object Storage, Image includes the list of roles that user can assume. Service) have many Endpoints. Endpoints are typically a URL + where it is accessible from (e.g. Services that are being called by that user internal, public) determine how they interpret the set of roles a user has and which operations or resources each roles grants access to. 6 © 2013 IBM Corporation
  • 7. IBM Security Systems Keystone Workflow http://docs.openstack.org/trunk/openstack-compute/admin/content/keystone-concepts.html 7 © 2013 IBM Corporation
  • 8. IBM Security Systems Configuring Services to work with Keystone Once Keystone is installed and running, services need to be configured to work with it. In general: Clients making calls to the service will pass in an authentication token. The Keystone middleware will look for and validate that token, taking the appropriate action. It will also retrieve additional information from the token such as user name, id, tenant name, id, roles, etc... The middleware will pass those data down to the service as headers. Keystone Auth-Token Middleware The Keystone auth_token middleware is a WSGI component that can be inserted in the WSGI pipeline to handle authenticating tokens with Keystone. Configuring Keystone for an LDAP backend It is possible to connect an LDAP backend with the Identity service Keystone. 8 © 2013 IBM Corporation
  • 9. IBM Security Systems Keystone APIs Token Operations User Operations Tenant Operations 9 © 2013 IBM Corporation
  • 10. IBM Security Systems Keystone – Observations & Enhancements Integration with enterprise security systems Support for Security Standards & Federation – Need to support external services for Authentication and Authorization i.e. OAuth, SAML and OpenID Audit, Compliance & Governance – Current logging mostly focused on debugging and monitoring; Need automated way to provide audit and assessment data Scalability and Performance – Need to scale and perform for enterprise grade deployments Support for Multi-tenancy & Keystone Domains 10 © 2013 IBM Corporation