SlideShare a Scribd company logo
Understanding 'Authentication’
and ‘Identity Federation'
Naohiro Fujie
MVP for Enterprise Mobility
Confusion…
•Identity = Authentication ??
•Authentication = Single Sign On ??
•Federation ??
What is ‘Identity’ – Johari Window
• We want to recognize existence
of ‘Entity’ like person, computer,
other physical things.
• But we cannot recognize ‘Entity’
directly since the ‘Entity’ is
different from ourselves.
• Also we cannot recognize all part
of own ‘Entity’.
Source: Wikipedia
https://en.wikipedia.org/wiki/Johari_window
Recognize ‘Entity’ through ‘Identity’
• ‘Identity’ is not only an ‘Identifier’ but a set of attributes.
• Identifier is one of attribute or a set of attribute of the entity to separate it
from other entities.
• Ex) If there is no ‘Fujie-san’ around here, surname can be used as identifier,
but at my home, we cannot use surname as identifier.
• We recognize ‘Entity’ through recognizing attributes.
Name
Company
Hair Style
Height
Loves Heavy Metal
Identity - Set of attributes
Entity to recognize
Identity related keywords
• Authentication
• To check entity is valid or not.
• Federation
• To federate(pass) identity related
information to other entities.
• By federate AuthN result attribute
to other entity(system), user can
Single Sign On between entities.
2.Verify
1.Name/Password
AuthN result3.Generate
Computer system A
- Entity which need
to validate a entity
Name
Company
Password
Attributes of the user
User
- Entity to be verified
4.Access
Authentication
Federation
6.SSO
Major protocols
are SAML, OpenID
Connect
Major protocols
are RADIUS,
Kerberos OpenID
Computer system B
- Federate with
system A
Name
Attributes of the user
5.Federate
AuthN result
Role of Identity & Access Management
Trust Trust
Trust/Federation
Provide
Credentials
Provide
Common
Attributes
Provide AuthN Result
Identity
Management
System
Authentication
System
Applications
Identity Management System’s role
- Provide trustworthy identities to other systems.
How?
ex) by import data from HR
Authentication System’s role
- Verify the validity of the user.
How?
ex) Password + SMS notification
Application’s role
- Authorize user’s access.
How?
ex) Change user’s role align to the department
and title attributes of the user
Trust means…
- Externalize and
delegate feature to
other system, and
trust the response
from the system.
Applications
Note)
User can SSO across apps if these
apps trust the same authN system.
App admins
App specific
attributes
Federation is based on inter-system ‘Trust’

More Related Content

PDF
Claim based authentaication
PDF
Difference between authentication and authorization in asp.net
PPTX
Introduction to OAuth2
PPT
Mashing Up with User-centric Identity
PPTX
Adfs 2 & claims based identity
PPT
Electronic resource management overview
PPTX
Asp.net membership anduserroles_ppt
Claim based authentaication
Difference between authentication and authorization in asp.net
Introduction to OAuth2
Mashing Up with User-centric Identity
Adfs 2 & claims based identity
Electronic resource management overview
Asp.net membership anduserroles_ppt

Viewers also liked (20)

PPT
Identity federation & user centric identity
PPTX
Identity federation and strong authentication
PPTX
Identity Federation for the Enterprise: Lessons Learned
PPTX
How information security empowers mobile innovation v3 branded
PDF
SSIR corporate presentation
PDF
Benefits and Risks of a Single Identity - IBM Connect 2017
PPTX
Anal ca vakalis
PPSX
Project Management in an Agency Environment
PPT
A Guide On Dating Safely
PPT
Max Intl Presentation
PPT
Thyroid
PDF
Save power
PPS
PPT
Ffplan New 97 2003
PPT
Coronado Island
PPT
Chemistry Jeopardy
PPT
David Scott Irevised Pp
PPT
SweepsPros 2009
PPT
6 Doamne Cine Esti
PPT
Greg Linch - Publish2 contest
Identity federation & user centric identity
Identity federation and strong authentication
Identity Federation for the Enterprise: Lessons Learned
How information security empowers mobile innovation v3 branded
SSIR corporate presentation
Benefits and Risks of a Single Identity - IBM Connect 2017
Anal ca vakalis
Project Management in an Agency Environment
A Guide On Dating Safely
Max Intl Presentation
Thyroid
Save power
Ffplan New 97 2003
Coronado Island
Chemistry Jeopardy
David Scott Irevised Pp
SweepsPros 2009
6 Doamne Cine Esti
Greg Linch - Publish2 contest
Ad

Similar to Understanding 'Authentication' and 'Identity Federation' (20)

PDF
Identity 101: Boot Camp for Identity North 2016
PPTX
PPTX
Identity 3.0 and Oracle
PDF
Self-Sovereign Identity: Lightening Talk at RightsCon
PDF
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
PPTX
Azure Active Directory by Nikolay Mozgovoy
PPTX
SharePoint Authentication And Authorization SPTechCon San Francisco
PPTX
SharePoint Saturday Austin - Share point authentication and authorization
PDF
Auth experience - vol 1.0
PPTX
Identity Proofing to provision accurately
PDF
Single Sign-On Best Practices
PDF
Open Standards for Trusted and Universal ID Systems
PPTX
FirstNet ICAM
PDF
Authentication vs Authorization: Understanding the Key Differences
PDF
Self-Sovereign Identity for the Decentralized Web Summit
PPTX
Laws of relationships v7
PDF
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
PDF
Architectural Approach for a Blochain based Profile management system
PPT
Identity Federation on JBossAS
PPTX
FIDO & Strong Authentication Technology Landscape
Identity 101: Boot Camp for Identity North 2016
Identity 3.0 and Oracle
Self-Sovereign Identity: Lightening Talk at RightsCon
SharePoint Saturday The Conference DC - Are you who you say you are share poi...
Azure Active Directory by Nikolay Mozgovoy
SharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Saturday Austin - Share point authentication and authorization
Auth experience - vol 1.0
Identity Proofing to provision accurately
Single Sign-On Best Practices
Open Standards for Trusted and Universal ID Systems
FirstNet ICAM
Authentication vs Authorization: Understanding the Key Differences
Self-Sovereign Identity for the Decentralized Web Summit
Laws of relationships v7
CIS13: Taking the Hyperspace Bypass: Controlling User Access to Other Worlds
Architectural Approach for a Blochain based Profile management system
Identity Federation on JBossAS
FIDO & Strong Authentication Technology Landscape
Ad

More from Naohiro Fujie (20)

PDF
分散型IDと検証可能なアイデンティティ技術概要
PDF
今なら間に合う分散型IDとEntra Verified ID
PDF
LINE Login総復習
PDF
Azure AD B2CにIdPを色々と繋いでみる
PDF
LINEログインの最新アップデートとアプリ連携ウォークスルー
PDF
ざっくり解説 LINE ログイン
PDF
Azure AD x LINE x Auth0
PDF
LINE Payも取り組んでいるKYCってなんだろう?KYCの基本と最近の動向
PDF
MicrosoftのDID/VC実装概要
PDF
LIFFとの連携でさらに強力に。こんなに使えるLINEログイン
PDF
自己主権型IDと分散型ID
PDF
Azure ADの外部コラボレーションとBYOID
PDF
祝!公式サポート Auth0 + LINE Login
PDF
IDaaSにSign in with Appleをつないでみた
PDF
次世代KYCと自己主権型アイデンティティの動向
PDF
これからの KYC と Identity on Blockchain の動向
PDF
SSIとDIDで何を解決したいのか?(β版)
PDF
教育機関におけるBYOIDとKYC
PDF
実装して理解するLINE LoginとOpenID Connect入門
PDF
組織におけるアイデンティティ管理の基本的な考え方
分散型IDと検証可能なアイデンティティ技術概要
今なら間に合う分散型IDとEntra Verified ID
LINE Login総復習
Azure AD B2CにIdPを色々と繋いでみる
LINEログインの最新アップデートとアプリ連携ウォークスルー
ざっくり解説 LINE ログイン
Azure AD x LINE x Auth0
LINE Payも取り組んでいるKYCってなんだろう?KYCの基本と最近の動向
MicrosoftのDID/VC実装概要
LIFFとの連携でさらに強力に。こんなに使えるLINEログイン
自己主権型IDと分散型ID
Azure ADの外部コラボレーションとBYOID
祝!公式サポート Auth0 + LINE Login
IDaaSにSign in with Appleをつないでみた
次世代KYCと自己主権型アイデンティティの動向
これからの KYC と Identity on Blockchain の動向
SSIとDIDで何を解決したいのか?(β版)
教育機関におけるBYOIDとKYC
実装して理解するLINE LoginとOpenID Connect入門
組織におけるアイデンティティ管理の基本的な考え方

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation theory and applications.pdf
PPTX
Spectroscopy.pptx food analysis technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
Teaching material agriculture food technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Big Data Technologies - Introduction.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Assigned Numbers - 2025 - Bluetooth® Document
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
MYSQL Presentation for SQL database connectivity
Chapter 3 Spatial Domain Image Processing.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
NewMind AI Weekly Chronicles - August'25-Week II
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation theory and applications.pdf
Spectroscopy.pptx food analysis technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
MIND Revenue Release Quarter 2 2025 Press Release
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Teaching material agriculture food technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Empathic Computing: Creating Shared Understanding
Encapsulation_ Review paper, used for researhc scholars
Big Data Technologies - Introduction.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Assigned Numbers - 2025 - Bluetooth® Document
The AUB Centre for AI in Media Proposal.docx
Dropbox Q2 2025 Financial Results & Investor Presentation
MYSQL Presentation for SQL database connectivity

Understanding 'Authentication' and 'Identity Federation'

  • 1. Understanding 'Authentication’ and ‘Identity Federation' Naohiro Fujie MVP for Enterprise Mobility
  • 2. Confusion… •Identity = Authentication ?? •Authentication = Single Sign On ?? •Federation ??
  • 3. What is ‘Identity’ – Johari Window • We want to recognize existence of ‘Entity’ like person, computer, other physical things. • But we cannot recognize ‘Entity’ directly since the ‘Entity’ is different from ourselves. • Also we cannot recognize all part of own ‘Entity’. Source: Wikipedia https://en.wikipedia.org/wiki/Johari_window
  • 4. Recognize ‘Entity’ through ‘Identity’ • ‘Identity’ is not only an ‘Identifier’ but a set of attributes. • Identifier is one of attribute or a set of attribute of the entity to separate it from other entities. • Ex) If there is no ‘Fujie-san’ around here, surname can be used as identifier, but at my home, we cannot use surname as identifier. • We recognize ‘Entity’ through recognizing attributes. Name Company Hair Style Height Loves Heavy Metal Identity - Set of attributes Entity to recognize
  • 5. Identity related keywords • Authentication • To check entity is valid or not. • Federation • To federate(pass) identity related information to other entities. • By federate AuthN result attribute to other entity(system), user can Single Sign On between entities. 2.Verify 1.Name/Password AuthN result3.Generate Computer system A - Entity which need to validate a entity Name Company Password Attributes of the user User - Entity to be verified 4.Access Authentication Federation 6.SSO Major protocols are SAML, OpenID Connect Major protocols are RADIUS, Kerberos OpenID Computer system B - Federate with system A Name Attributes of the user 5.Federate AuthN result
  • 6. Role of Identity & Access Management Trust Trust Trust/Federation Provide Credentials Provide Common Attributes Provide AuthN Result Identity Management System Authentication System Applications Identity Management System’s role - Provide trustworthy identities to other systems. How? ex) by import data from HR Authentication System’s role - Verify the validity of the user. How? ex) Password + SMS notification Application’s role - Authorize user’s access. How? ex) Change user’s role align to the department and title attributes of the user Trust means… - Externalize and delegate feature to other system, and trust the response from the system. Applications Note) User can SSO across apps if these apps trust the same authN system. App admins App specific attributes Federation is based on inter-system ‘Trust’