SlideShare a Scribd company logo
SPELLPOINT
N O R D I C I A M C O N F E R E N C E 2 0 1 8
Microservice has no finger to type with
Securing Access for the non-interactive
24.5.2018 Tero Pasanen, Senior IAM Architect
Identity and Access Management (IAM)…
…is needed because all data cannot be available to everyone.
So how to grant and enforce right accesses efficiently
…and how to ensure security.
…this holds true for the more traditional software ecosystem, but what
about the modern, agile, API based architectures?
Well.
Does it really matter?
I mean, what matters to the end-user?
Copyright © Spellpoint Oy, 2000 – 2018 PUBLIC
 Monolith dusty mainframe servers  Latest buzzword friendly
microservices backed by
blockchain audit ledgers?
21a0d5
Service 1 Service 2
Copyright © Spellpoint Oy, 2000 – 2018 PUBLIC
What matters to the end-user…
Correct data and trust
…and probably usability too.
So are we lost in digital transformation?
It’s API, it’s all open to
everyone
Someone will take care of
it, we’ll have an API for
that
Where do you get the
data for the access
control API?
Someone will take care of
it, we’ll have an API for that
Copyright © Spellpoint Oy, 2000 – 2018 PUBLIC
All-out API environment?
 Probably not.
 Consider consistent user rights
across different types of sw
ecosystems
 Avoid platform lock-in
Copyright © Spellpoint Oy, 2000 – 2018 PUBLIC
Microservices ecosystem – Remember SOA?
SOA
People
Process
Practice
Platform
 Existing investments?
 ESB  API Gateway
 SAML  OpenID Connect,
Oauth, JWT
 SOA – Agile?
Copyright © Spellpoint Oy, 2000 – 2018 PUBLIC
Microservices ecosystem puts agility in the dead center
Agility &
DevOps
Quick to
develop
Easy to
deploy
Possibly
short-
lived
Easily
scalable
However…
There are more attack surfaces in the microservices world
So we need to authenticate and authorize
 Authenticate source and target
API’s
 To ensure data confidentiality and
integrity
 Authorize end-user actions
 .. in the way-way back-end systems
Copyright © Spellpoint Oy, 2000 – 2018 PUBLIC
Ways to do it
 API Key “Do you know who I am?”
 OAuth (possibly with JWT) as bearer token “I’ve got a ticket to ride”
 MSSL (Mutual Authentication) “..and I can prove it”
Performance matters
Amazon: 100ms of latency cost 1% in sales
Google: extra 0.5 seconds in search page generation time dropped traffic by 20%
Looks a lot like traditional IAM
Take away
With microservices we still have an end-point - service URL - to protect. Lo-and-
behold - that is just what customer IAM SSO services do.
Be efficient utilizing light weight protocols like OpenID Connect for
authentication and OAuth for authorization.
And provide access to legacy applications using the already established
controls.
Copyright © Spellpoint Oy, 2000 – 2018 CONFIDENTIAL
SECURING THE DIGITAL EVOLUTION
END OF PRESENTATION

More Related Content

PDF
Kantara - Digital Identity in 2018
PDF
Aditro - IAM as part of Cloud Business strategy
PDF
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
PDF
Inside Security - Strong Authentication with Smartphones
PDF
Open Identity Exchange - the Global Growth of Digital Identity
PDF
Telia - The New Norm of the Digital World
PDF
Blockchain with iot
PDF
Extending the Power of Consent with User-Managed Access & OpenUMA
Kantara - Digital Identity in 2018
Aditro - IAM as part of Cloud Business strategy
GSMA - How To Combine Cross-border eID Recognition With Convenience For Users...
Inside Security - Strong Authentication with Smartphones
Open Identity Exchange - the Global Growth of Digital Identity
Telia - The New Norm of the Digital World
Blockchain with iot
Extending the Power of Consent with User-Managed Access & OpenUMA

What's hot (20)

PDF
The Future of Identity - OpenID Summit 2020
PDF
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
PDF
Go Beyond PSD2 Compliance with Digital Identity
PPTX
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
PDF
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
PDF
SecureMAG Volume 6 - 2014
PPTX
IDENTITY IN THE WORLD OF IOT
PDF
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
PDF
SecureMAG Vol 3
PDF
Trends in IRM: Internet of Things
PDF
Intelligent Authentication (Identity Live Berlin 2018)
PDF
case-study-on-digital-identity-swisscom-mobile-id_en
PDF
Belgian mobile ID presents itsme
PPTX
Smart City Lecture 1: How to build a Smart City
PDF
A digital society needs a digital id
PDF
A Telco and End-user Perspective on the Authentication Journey
PDF
Belgian Mobile ID: taking digital ID to another level
PDF
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
PPTX
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
The Future of Identity - OpenID Summit 2020
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Go Beyond PSD2 Compliance with Digital Identity
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Blockchain Decentralized Identifier (DID) Innovation Insights from Patents
SecureMAG Volume 6 - 2014
IDENTITY IN THE WORLD OF IOT
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
SecureMAG Vol 3
Trends in IRM: Internet of Things
Intelligent Authentication (Identity Live Berlin 2018)
case-study-on-digital-identity-swisscom-mobile-id_en
Belgian mobile ID presents itsme
Smart City Lecture 1: How to build a Smart City
A digital society needs a digital id
A Telco and End-user Perspective on the Authentication Journey
Belgian Mobile ID: taking digital ID to another level
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Ad

Similar to Spellpoint - Securing Access for Microservices (20)

PPTX
Leveraging open banking specifications for rigorous API security – What’s in...
PDF
[WSO2Con USA 2018] Integration is Sexy
PDF
[WSO2Con Asia 2018] Integration is Sexy
PPTX
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
PDF
INTERFACE, by apidays - Knowledge Workers of the World Unite.pdf
PPTX
Identity as a Matter of Public Safety
PDF
CWIN17 Rome / AI and data insights
PPTX
Identity and Client Management using OpenID Connect and SAML
PPTX
AI Microservices APIs and Business Automation as a Service Denis Gagne
PDF
[WSO2 Summit Brazil 2018] The API-driven World
PDF
MuleSoft Surat Virtual Meetup#19 - Identity and Client Management With MuleSoft
PDF
Oracle Code Beijing/Sydney APIM & Microservices: A Match Made in Heaven
PDF
Enabling a Real-Time, Agile, Event-Driven Enterprise
PDF
RISE OF THE MACHINES: IRM IN AN IOT WORLD
PDF
Gartner: Top 10 Technology Trends 2015
PDF
Oracle Code Capgemini: API management & microservices a match made in heaven
PPTX
Advanced Event Broker: what are they, and when should you use one?
PDF
2022 APIsecure_Harnessing the Speed of Innovation
PDF
OUGN 2018 - Chatbot and the need to integrate
PDF
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
Leveraging open banking specifications for rigorous API security – What’s in...
[WSO2Con USA 2018] Integration is Sexy
[WSO2Con Asia 2018] Integration is Sexy
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
INTERFACE, by apidays - Knowledge Workers of the World Unite.pdf
Identity as a Matter of Public Safety
CWIN17 Rome / AI and data insights
Identity and Client Management using OpenID Connect and SAML
AI Microservices APIs and Business Automation as a Service Denis Gagne
[WSO2 Summit Brazil 2018] The API-driven World
MuleSoft Surat Virtual Meetup#19 - Identity and Client Management With MuleSoft
Oracle Code Beijing/Sydney APIM & Microservices: A Match Made in Heaven
Enabling a Real-Time, Agile, Event-Driven Enterprise
RISE OF THE MACHINES: IRM IN AN IOT WORLD
Gartner: Top 10 Technology Trends 2015
Oracle Code Capgemini: API management & microservices a match made in heaven
Advanced Event Broker: what are they, and when should you use one?
2022 APIsecure_Harnessing the Speed of Innovation
OUGN 2018 - Chatbot and the need to integrate
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
Ad

More from Ubisecure (17)

PDF
User Management, Enablement, Directory
PDF
Identity Platform Use Cases
PDF
Single Sign-On
PDF
Multi-Factor Authentication & Authorisation
PDF
Identity Data & Credential Self-Service
PDF
Using Strong / Verified Identities
PDF
Using Social & Business Identities
PDF
Delegation of Authority
PDF
SAML VS OAuth 2.0 VS OpenID Connect
PDF
Protecting your APIs with OAuth 2.0
PDF
Customer IAM vs Employee IAM (Legacy IAM)
PDF
An Introduction to Authentication for Applications
PDF
Introduction to Mobile Connect
PDF
General Data Protection Regulation & Customer IAM
PDF
SSH - Credentialess Cloud Access
PDF
Nixu - Passwords must Die!
PDF
FICORA - Building a Trust Network on Strong Identification
User Management, Enablement, Directory
Identity Platform Use Cases
Single Sign-On
Multi-Factor Authentication & Authorisation
Identity Data & Credential Self-Service
Using Strong / Verified Identities
Using Social & Business Identities
Delegation of Authority
SAML VS OAuth 2.0 VS OpenID Connect
Protecting your APIs with OAuth 2.0
Customer IAM vs Employee IAM (Legacy IAM)
An Introduction to Authentication for Applications
Introduction to Mobile Connect
General Data Protection Regulation & Customer IAM
SSH - Credentialess Cloud Access
Nixu - Passwords must Die!
FICORA - Building a Trust Network on Strong Identification

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
Teaching material agriculture food technology
PPTX
Cloud computing and distributed systems.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Empathic Computing: Creating Shared Understanding
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Electronic commerce courselecture one. Pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
Agricultural_Statistics_at_a_Glance_2022_0.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Network Security Unit 5.pdf for BCA BBA.
Chapter 3 Spatial Domain Image Processing.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Teaching material agriculture food technology
Cloud computing and distributed systems.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Empathic Computing: Creating Shared Understanding
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Digital-Transformation-Roadmap-for-Companies.pptx
Unlocking AI with Model Context Protocol (MCP)
Diabetes mellitus diagnosis method based random forest with bat algorithm
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Electronic commerce courselecture one. Pdf
NewMind AI Monthly Chronicles - July 2025
Dropbox Q2 2025 Financial Results & Investor Presentation

Spellpoint - Securing Access for Microservices

  • 1. SPELLPOINT N O R D I C I A M C O N F E R E N C E 2 0 1 8
  • 2. Microservice has no finger to type with Securing Access for the non-interactive 24.5.2018 Tero Pasanen, Senior IAM Architect
  • 3. Identity and Access Management (IAM)… …is needed because all data cannot be available to everyone. So how to grant and enforce right accesses efficiently …and how to ensure security.
  • 4. …this holds true for the more traditional software ecosystem, but what about the modern, agile, API based architectures?
  • 5. Well. Does it really matter? I mean, what matters to the end-user?
  • 6. Copyright © Spellpoint Oy, 2000 – 2018 PUBLIC  Monolith dusty mainframe servers  Latest buzzword friendly microservices backed by blockchain audit ledgers? 21a0d5 Service 1 Service 2
  • 7. Copyright © Spellpoint Oy, 2000 – 2018 PUBLIC What matters to the end-user… Correct data and trust …and probably usability too.
  • 8. So are we lost in digital transformation? It’s API, it’s all open to everyone Someone will take care of it, we’ll have an API for that Where do you get the data for the access control API? Someone will take care of it, we’ll have an API for that
  • 9. Copyright © Spellpoint Oy, 2000 – 2018 PUBLIC All-out API environment?  Probably not.  Consider consistent user rights across different types of sw ecosystems  Avoid platform lock-in
  • 10. Copyright © Spellpoint Oy, 2000 – 2018 PUBLIC Microservices ecosystem – Remember SOA? SOA People Process Practice Platform  Existing investments?  ESB  API Gateway  SAML  OpenID Connect, Oauth, JWT  SOA – Agile?
  • 11. Copyright © Spellpoint Oy, 2000 – 2018 PUBLIC Microservices ecosystem puts agility in the dead center Agility & DevOps Quick to develop Easy to deploy Possibly short- lived Easily scalable
  • 13. There are more attack surfaces in the microservices world
  • 14. So we need to authenticate and authorize  Authenticate source and target API’s  To ensure data confidentiality and integrity  Authorize end-user actions  .. in the way-way back-end systems
  • 15. Copyright © Spellpoint Oy, 2000 – 2018 PUBLIC Ways to do it  API Key “Do you know who I am?”  OAuth (possibly with JWT) as bearer token “I’ve got a ticket to ride”  MSSL (Mutual Authentication) “..and I can prove it”
  • 16. Performance matters Amazon: 100ms of latency cost 1% in sales Google: extra 0.5 seconds in search page generation time dropped traffic by 20%
  • 17. Looks a lot like traditional IAM
  • 18. Take away With microservices we still have an end-point - service URL - to protect. Lo-and- behold - that is just what customer IAM SSO services do. Be efficient utilizing light weight protocols like OpenID Connect for authentication and OAuth for authorization. And provide access to legacy applications using the already established controls.
  • 19. Copyright © Spellpoint Oy, 2000 – 2018 CONFIDENTIAL SECURING THE DIGITAL EVOLUTION