Using IDaaS to Enable IAM for Applications
JULY 22, 2014
2	
  
Introduction – Ken Riggio
•  VP, Software Development - Ticketing
•  B2B Identity and Access Management
•  B2C Identity and Access Management
•  Consolidated System of Inventory and Catalog Management
•  Integration
•  Music Enthusiast m/
•  Dungeon Master!
•  Computer Nerd
•  NOT an Identity Management Expert
3	
  
Introduction – Live Nation Entertainment
•  Business Segments
•  Concerts
•  Venue Owner (House of Blues, Verizon Amphitheater, …)
•  Venue Operator
•  Promoters
•  Festival Operator
•  Artist Nation
•  Artist Management
•  Sponsorships & Advertising
•  Ticketing ($1.4 Billion in Revenue, 21.7% of total)
4	
  
Introduction – Ticketing
•  Clients (thousands of clients, tens of thousands of users)
•  Arenas, Stadiums, Amphitheaters, Music Clubs, Concert Promoters,
Professional Sport Franchises and Leagues, College Sports Teams,
Performing Arts Venues, Museums, Theaters
•  Sales Channels (hundreds of millions of users)
•  Web Sites – Ticketmaster, Livenation, TicketWeb, TicketsNow, Get Me In!,
TicketExchange, … (71%)
•  Mobile Apps (14%)
•  Ticket Outlets – Venue Box Offices, Walmart, Retail Kiosks, … (10%)
•  Telephone (5%)
5	
  
Business Objectives – Re-Architecture
•  The Old
•  17+ different systems that do the same thing…
•  Old technology (i.e. Assembly Programs running on VAX emulator)
•  Monolithic Applications
•  Long Delivery Cycles
•  The New
•  Consolidated and Unified Experience
•  Primarily Java & JavaScript (Node.js)
•  SOA 2.0 and EDA
•  Continuous Integration and Continuous Delivery
6	
  
Business Objectives – Core Principles
•  Increase Business Agility
•  More features, faster.
•  React quickly to new business opportunities.
•  Adopt new technologies as the become available.
•  Technology should enable, not constrain.
•  Reduce Operational Expenses
•  Focus head count on building the future, not supporting
the past.
7	
  
Requirements – Identity and Access Management
•  B2B
•  Multiple Tenants (Clients)
•  Authentication
•  Authorization
•  Access to various applications
•  Web Applications
•  Mobile Applications
•  Scanners (Devices)
•  Roles
•  Entitlements
•  User Management (Delegated Administration)
8	
  
Requirements – Identity and Access Management
•  B2C
•  Multiple Tenants (Channels with Different User Bases)
•  Authentication
•  Authorization
•  Access to Premium Services
•  Fraud Flags and Restrictions
•  Bot Mitigation
•  User Self Service
9	
  
Challenges – Identity and Access Management
•  B2B
•  Data Firewall
•  Clients
•  Internal Live Nation Segments (Ticketing v. Concerts)
•  Cross Tenant Entitlements
•  Tenant A wants to enable Tenant B to be a Promoter for Tenant A’s
events.
•  B2C
•  Performance (Burst Traffic!!!)
•  Both
•  Legacy… Integration, Migration…. Dealing with the past in general!
10	
  
Solution – Identity Bridge Service
•  Don’t Try To Read the
Diagram! ;)
•  API that abstracts and
integrates with
multiple identity
providers.
•  A common API
•  Really wish I
knew about SCIM
when we started
this project.
11	
  
Solution – Identity Bridge Service
•  Ignore the Fine Print, I will walk
you through it.
•  Multiple Consuming
Applications
•  Common Interface (IBS)
•  Routed to 1 or more Identity
Providers based on phase of
integration and migration
•  Bridge provider facilitates lazy
migration.
•  Strangler Pattern
12	
  
Solution – Bring it to the Cloud
•  Identity Bridge Service API (IBS)
•  Authentication
•  Authorization
•  User Management
•  Tenant Provisioning
•  Session Management
•  IBS Eats Its Own Dog Food
•  Access to the API is controlled using its own authentication and
authorization services.
•  Web-based User Interface (also protected using IBS)
13	
  
Solution – Bring it to the Cloud
IBS	
  
VERIZON	
  AMP	
  
HOB	
  
FILLMORE	
  
14	
  
Integration – Varying Client Capabilities
•  Small Clients
•  Few Employees
•  Little or No Technical Abilities
•  Limited Resources
•  Big Clients
•  Thousands of Employees
•  Strong Technical Team, Potentially Have Their Own Development
Teams
•  Have Their Own Internal Identity Solutions
15	
  
Integration – Client Needs
•  However, They Both Have Same Core Needs
•  User Provisioning
•  User Management
•  Authentication
•  Authorization
•  Why?
•  Create and Manage Events, Products, Merchandising, Pricing
•  Reporting
•  Marketing
•  Sales
•  Access Control (umm..Ticket Scanning)
16	
  
Integration – Client Implementation Options
•  Small Clients
•  Use Our Web-Based “Permissioning” UI
•  Use Our Applications and Scanners
•  Big Clients
•  Multiple Options
•  They Can Use Ours and do the “swivel chair”
•  They Can Use Our “Services” integrating with their own UI
•  Their Local Identity Solution can Provision Users through IBS to
leverage the Ticketing application platform.
17	
  
Integration – Our Web-Based “Permissioning” UI
18	
  
Integration – Our Web-Based “Permissioning” UI
19	
  
Integration – A Quick Digression into Mobile
•  Issues Exist on Desktop but Mobile has Made it Worse
•  Lots of reverse engineering, de-compiling, and data extraction
•  Certificates, API Keys, Long Running Access Tokens, etc. have
been farmed and used by bots.
•  Audits and Logs show “same device application” calling us
thousands of times per minute trying to get access to tickets
•  Privacy Laws have pushed us to use device application ids,
instead of actually device information as part of authentication
(smaller fingerprint L).
•  Most companies would love the fact that people are creating
automated ways of buying their stuff… For us, it’s a nightmare.
20	
  
Integration – A Quick Digression into Mobile
•  Mitigation Strategies
•  Session-based
•  No more than one concurrent session
•  A given token cannot be used more than once. Each response
returns a new session token.
•  Alerts
•  Speed bumps
•  Off switch :P
21	
  
Deployment– B2B vs B2C
•  Ultimately, There is No Functional Difference
•  We have different scaling issues though
•  B2B has Constant Moderate Usage
•  B2C has Period Burst Usage
•  Options
•  Scale solution to handle both concurrently
•  Provide two physical deployments, one service B2B, the other B2C.
•  We chose the later.

More Related Content

PPT
Mobile - the next wave of opportunities and challenges
PPTX
Providing Full Featured Payments (API) at Scale
PPTX
Cellarix_is
PPTX
motionQR - Citi Mobile Challenge Finalist
PDF
API Pylon Webinar Slides
PDF
Mobility-RC
PDF
This is SecureNet
PPTX
Realex merchant presentation
Mobile - the next wave of opportunities and challenges
Providing Full Featured Payments (API) at Scale
Cellarix_is
motionQR - Citi Mobile Challenge Finalist
API Pylon Webinar Slides
Mobility-RC
This is SecureNet
Realex merchant presentation

What's hot (7)

PDF
prebooking_1.0
PPTX
PayLo Merchant Presentation
PPT
PPTX
Presentation of future of mobile commerce
PPTX
Mobile id public_2
PPTX
PDF
R2integrated Talk For Wit
prebooking_1.0
PayLo Merchant Presentation
Presentation of future of mobile commerce
Mobile id public_2
R2integrated Talk For Wit
Ad

Similar to CIS14: Using IDaaS to Enable IAM for Multiple Web-based and Mobile B2B and B2C Applications (20)

PPTX
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
PDF
Navigating Identity and Access Management in the Modern Enterprise
PDF
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
PDF
Bluemix Mobile Cloud Services - Accelerating Mobile App Development
PPTX
Security Architecture Best Practices for SaaS Applications
PPTX
Security architecture best practices for saas applications
PPTX
The Future of Enterprise Identity Management
PPTX
Leveraging Identity to Manage Change and Complexity
PDF
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
PDF
[2021 Somos Summit] - Rethinking Identity Access Management and The Rise of t...
PDF
VMware Zimbra vs. Novell Groupwise
PDF
Five Things You Gotta Know About Modern Identity
PDF
CIS14: Identity at Scale: Building from the Ground Up
PDF
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
PPT
Mr. desmond cloud security_format
PDF
Identity Insights: Social, Local and Mobile Identity
PPTX
Securing access inabyod-world-final-ext
PDF
Dom & Tom NYC Healthcare Cloud Meetup Case Study (5/4)
PPTX
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
PPTX
Biz case-keynote-final copy
Identity Beyond Employees: How Customer Experience Impacts Your IAM Practices
Navigating Identity and Access Management in the Modern Enterprise
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
Bluemix Mobile Cloud Services - Accelerating Mobile App Development
Security Architecture Best Practices for SaaS Applications
Security architecture best practices for saas applications
The Future of Enterprise Identity Management
Leveraging Identity to Manage Change and Complexity
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
[2021 Somos Summit] - Rethinking Identity Access Management and The Rise of t...
VMware Zimbra vs. Novell Groupwise
Five Things You Gotta Know About Modern Identity
CIS14: Identity at Scale: Building from the Ground Up
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
Mr. desmond cloud security_format
Identity Insights: Social, Local and Mobile Identity
Securing access inabyod-world-final-ext
Dom & Tom NYC Healthcare Cloud Meetup Case Study (5/4)
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
Biz case-keynote-final copy
Ad

More from CloudIDSummit (20)

PPTX
CIS 2016 Content Highlights
PPTX
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
PDF
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
PDF
Mobile security, identity & authentication reasons for optimism 20150607 v2
PDF
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
PDF
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
PDF
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
PDF
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
PDF
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
PDF
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
PDF
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
PDF
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PDF
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
PDF
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
PDF
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
PDF
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
PDF
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2016 Content Highlights
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
Mobile security, identity & authentication reasons for optimism 20150607 v2
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 Identity Relationship Management in the Internet of Things

Recently uploaded (20)

PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Architecture types and enterprise applications.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Five Habits of High-Impact Board Members
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
2018-HIPAA-Renewal-Training for executives
PPTX
Modernising the Digital Integration Hub
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPT
What is a Computer? Input Devices /output devices
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PPT
Geologic Time for studying geology for geologist
UiPath Agentic Automation session 1: RPA to Agents
Two-dimensional Klein-Gordon and Sine-Gordon numerical solutions based on dee...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Architecture types and enterprise applications.pdf
Developing a website for English-speaking practice to English as a foreign la...
Chapter 5: Probability Theory and Statistics
Five Habits of High-Impact Board Members
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Zenith AI: Advanced Artificial Intelligence
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
sbt 2.0: go big (Scala Days 2025 edition)
2018-HIPAA-Renewal-Training for executives
Modernising the Digital Integration Hub
Enhancing emotion recognition model for a student engagement use case through...
What is a Computer? Input Devices /output devices
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
A review of recent deep learning applications in wood surface defect identifi...
A proposed approach for plagiarism detection in Myanmar Unicode text
Consumable AI The What, Why & How for Small Teams.pdf
Geologic Time for studying geology for geologist

CIS14: Using IDaaS to Enable IAM for Multiple Web-based and Mobile B2B and B2C Applications

  • 1. Using IDaaS to Enable IAM for Applications JULY 22, 2014
  • 2. 2   Introduction – Ken Riggio •  VP, Software Development - Ticketing •  B2B Identity and Access Management •  B2C Identity and Access Management •  Consolidated System of Inventory and Catalog Management •  Integration •  Music Enthusiast m/ •  Dungeon Master! •  Computer Nerd •  NOT an Identity Management Expert
  • 3. 3   Introduction – Live Nation Entertainment •  Business Segments •  Concerts •  Venue Owner (House of Blues, Verizon Amphitheater, …) •  Venue Operator •  Promoters •  Festival Operator •  Artist Nation •  Artist Management •  Sponsorships & Advertising •  Ticketing ($1.4 Billion in Revenue, 21.7% of total)
  • 4. 4   Introduction – Ticketing •  Clients (thousands of clients, tens of thousands of users) •  Arenas, Stadiums, Amphitheaters, Music Clubs, Concert Promoters, Professional Sport Franchises and Leagues, College Sports Teams, Performing Arts Venues, Museums, Theaters •  Sales Channels (hundreds of millions of users) •  Web Sites – Ticketmaster, Livenation, TicketWeb, TicketsNow, Get Me In!, TicketExchange, … (71%) •  Mobile Apps (14%) •  Ticket Outlets – Venue Box Offices, Walmart, Retail Kiosks, … (10%) •  Telephone (5%)
  • 5. 5   Business Objectives – Re-Architecture •  The Old •  17+ different systems that do the same thing… •  Old technology (i.e. Assembly Programs running on VAX emulator) •  Monolithic Applications •  Long Delivery Cycles •  The New •  Consolidated and Unified Experience •  Primarily Java & JavaScript (Node.js) •  SOA 2.0 and EDA •  Continuous Integration and Continuous Delivery
  • 6. 6   Business Objectives – Core Principles •  Increase Business Agility •  More features, faster. •  React quickly to new business opportunities. •  Adopt new technologies as the become available. •  Technology should enable, not constrain. •  Reduce Operational Expenses •  Focus head count on building the future, not supporting the past.
  • 7. 7   Requirements – Identity and Access Management •  B2B •  Multiple Tenants (Clients) •  Authentication •  Authorization •  Access to various applications •  Web Applications •  Mobile Applications •  Scanners (Devices) •  Roles •  Entitlements •  User Management (Delegated Administration)
  • 8. 8   Requirements – Identity and Access Management •  B2C •  Multiple Tenants (Channels with Different User Bases) •  Authentication •  Authorization •  Access to Premium Services •  Fraud Flags and Restrictions •  Bot Mitigation •  User Self Service
  • 9. 9   Challenges – Identity and Access Management •  B2B •  Data Firewall •  Clients •  Internal Live Nation Segments (Ticketing v. Concerts) •  Cross Tenant Entitlements •  Tenant A wants to enable Tenant B to be a Promoter for Tenant A’s events. •  B2C •  Performance (Burst Traffic!!!) •  Both •  Legacy… Integration, Migration…. Dealing with the past in general!
  • 10. 10   Solution – Identity Bridge Service •  Don’t Try To Read the Diagram! ;) •  API that abstracts and integrates with multiple identity providers. •  A common API •  Really wish I knew about SCIM when we started this project.
  • 11. 11   Solution – Identity Bridge Service •  Ignore the Fine Print, I will walk you through it. •  Multiple Consuming Applications •  Common Interface (IBS) •  Routed to 1 or more Identity Providers based on phase of integration and migration •  Bridge provider facilitates lazy migration. •  Strangler Pattern
  • 12. 12   Solution – Bring it to the Cloud •  Identity Bridge Service API (IBS) •  Authentication •  Authorization •  User Management •  Tenant Provisioning •  Session Management •  IBS Eats Its Own Dog Food •  Access to the API is controlled using its own authentication and authorization services. •  Web-based User Interface (also protected using IBS)
  • 13. 13   Solution – Bring it to the Cloud IBS   VERIZON  AMP   HOB   FILLMORE  
  • 14. 14   Integration – Varying Client Capabilities •  Small Clients •  Few Employees •  Little or No Technical Abilities •  Limited Resources •  Big Clients •  Thousands of Employees •  Strong Technical Team, Potentially Have Their Own Development Teams •  Have Their Own Internal Identity Solutions
  • 15. 15   Integration – Client Needs •  However, They Both Have Same Core Needs •  User Provisioning •  User Management •  Authentication •  Authorization •  Why? •  Create and Manage Events, Products, Merchandising, Pricing •  Reporting •  Marketing •  Sales •  Access Control (umm..Ticket Scanning)
  • 16. 16   Integration – Client Implementation Options •  Small Clients •  Use Our Web-Based “Permissioning” UI •  Use Our Applications and Scanners •  Big Clients •  Multiple Options •  They Can Use Ours and do the “swivel chair” •  They Can Use Our “Services” integrating with their own UI •  Their Local Identity Solution can Provision Users through IBS to leverage the Ticketing application platform.
  • 17. 17   Integration – Our Web-Based “Permissioning” UI
  • 18. 18   Integration – Our Web-Based “Permissioning” UI
  • 19. 19   Integration – A Quick Digression into Mobile •  Issues Exist on Desktop but Mobile has Made it Worse •  Lots of reverse engineering, de-compiling, and data extraction •  Certificates, API Keys, Long Running Access Tokens, etc. have been farmed and used by bots. •  Audits and Logs show “same device application” calling us thousands of times per minute trying to get access to tickets •  Privacy Laws have pushed us to use device application ids, instead of actually device information as part of authentication (smaller fingerprint L). •  Most companies would love the fact that people are creating automated ways of buying their stuff… For us, it’s a nightmare.
  • 20. 20   Integration – A Quick Digression into Mobile •  Mitigation Strategies •  Session-based •  No more than one concurrent session •  A given token cannot be used more than once. Each response returns a new session token. •  Alerts •  Speed bumps •  Off switch :P
  • 21. 21   Deployment– B2B vs B2C •  Ultimately, There is No Functional Difference •  We have different scaling issues though •  B2B has Constant Moderate Usage •  B2C has Period Burst Usage •  Options •  Scale solution to handle both concurrently •  Provide two physical deployments, one service B2B, the other B2C. •  We chose the later.