SlideShare a Scribd company logo
Security in the Context of
Distributed Computing
Who am I?
Solutions Architect
For DeARX
Based in our Cape Town office
Christhonie Geldenhuys
Topics
A practical view based on our experience with distributed computing
► A look at modern distributed systems
► Authentication
► Creating a seamless experience
► Leveraging Social login
► Additional factors
► Identity Management
► A single view
► Personal data and consent
► Authorisation
► Rate limiting or throttling
[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computing Environment
An evolution in component size
Source: Tiempo Development
And an evolution in location
Monolithic to Microservices
Source: Tiempo Development
So how does this impact security?
Key considerations remain the same
► Who is accessing
the system?
Authentication
► What can they do?
Authorization
► When/how often
can they do it?
Throttling
Authentication
Traditional monolithic authentication
Typical application level
implementation of role base
access control
Traditional approach cause duplication
Legacy User DB
Active Directory
App 1
App 2
We still see many examples of this!
Traditional approach cause duplication
Active Directory
Application 1
Application 2
This is much better.
Authentication as a service
Use a “Trusted 3rd
party”
Back-end servers
Central authentication mechanism
Provide a single mechanism
for identity management
and authentication.
Integrate applications with
the Identity server.
Benefits of this approach
► A single mechanism for authentication
► Common and shared across all application
► User information in one place
► Easy to maintain
► Can leverage proven security standards
Using an Identity Server provides;
► Central login mechanism
► Customised registration flow
► Customised approval flows
► Advanced authentication techniques
Single Sign-On
Single Sign-On application have the following characteristics;
► Static, well known URL – i.e. http://logon.acme.com
► Authentication session is maintained at this URL;
► Using cookies to identify the session
► Redirect mechanisms are used to redirect to and from this app
Benefits
► This enables the authentication session to span multiple application.
► Login once for a range of applications.
Implementation considerations
► Users and Groups now become a
central responsibility
► Roles remain an application
concern
► Share information via API or
claims.
How do we separate the various identity objects?
Social Login – Use cases
► End-users – Removes the risk to create yet another account
► Occasional or temporary workers – i.e. contractors, not requiring the benefits
corporate-wide access control groups / roles
Identity information and POPI
What is POPI
► Protection of Personal Information Act will regulate the Processing of
Personal Information. 
► Personal Information broadly means any information relating to an
identifiable, living natural person or juristic person (companies, CC’s etc.)
and includes, but is not limited to:
► contact details: email, telephone, address etc.
► demographic information: age, gender, race, birth date, ethnicity etc.
► history: employment, financial, educational, criminal, medical history
► biometric information: blood type etc.
► opinions of and about the person
► private correspondence etc.
► Processing means broadly anything that can be done with the Personal
Information, including collection, usage, storage, dissemination, etc.
Personal information as a service
What if…
► We can access personal data from a central source
► Information is stored once.
► Easy to add, change or remove in one place.
► Central access control
► Provide a customer self-help portal to view or change data.
► Get user content to determine who can use it.
Personal information capture
► Initial user / customer information is
captured as part of the registration
process.
► Additional user information can also be
stored here over time.
Personal information distribution
Obtaining the user consent is one
of the fundamental requirements
of personal information
regulation.
WSO2 Identity Server facilitates
this through its Consent
Management features. 
Support in WSO2 Identity Server
Consent Management
► Provides self-help profile creation, user provisioning to other systems, sharing
of user attributes through SSO, and identity federation are fully based on user
consent
► Users can review, modify, and revoke previously given consent via the
self-care user portal or RESTful Consent API
► Consent API can also be used to integrate WSO2 IS consent management
capabilities with existing applications
► WSO2 IS can be used to manage consent of any 3rd party application via the
RESTful Consent API
User account management by WSO2 IS
Authorization
OAuth to the rescue
WSO2 Identity Server includes
support for the popular OAuth
standards.
API Manager as a first line of defence
API Manager help offloads checking tokens at the point of ingress.
Who is this? – Access tokens
When using Access Tokens…
We might want to check who is using this token;
► For display of user name perhaps
► For additional authorization decisions
► Per operation, per business record, etc.
Access token lookup
► Use API to validate/lookup
token claims.
► Cache token for the validity
period.
► Store principle and claims as
part of cache.
Token validation
lookup
Who is this? - JWT
Access Token or JWT?
Access Token
Benefits
► Small, simple
► Ideal for smaller number of
sessions and “chatty” interfaces.
Drawbacks
► Require lookup
► Mitigated through caching
JWT
Benefits
► Self contained, stateless
► Verification can be self contained,
or via lookup (remember to cache)
Drawbacks
► Large (sometimes larger than
payload). Not ideal for;
► “Chatty” APIs
► Expensive networks, i.e. Mobile,
Satellite, IoT
Trust your services
It is vital to verify the communication path and authenticity of your identity /
authentication infrastructure.
Identity your infrastructure;
► Use HTTPS!
► Check the certificates!
Consider using certificate chains:
Which OAuth flow / grant type?
https://auth0.com/docs/api-auth/which-oauth-flow-to-use
Use the online decision tree to determine which OAuth flow
is best for your application;
Rate limiting
Rate limiting – Why and how
► Limit access to APIs using the
various rate limiting filters.
► Absolute limits or support for burst
traffic.
► API manager continuously monitors
the traffic and limits.
► API suspension is implemented
when limits are reached.
► Rather stop them at the gate than
try to deal with load while under
load.
► Suspension returns pre-defined
error codes (customisable)
► API auto resume after predefined
period(s).
WSO2 Throttling Policies
Summary
► Authentication as a service
► A seamless experience for the user,
across multiple applications
► Identity as a service
► User/customer information in one
place.
► Controlled access to that
information.
► Authorization
► A mechanism to provide access to
resources.
► Rate limiting
► To protect our systems from
over-use and abuse.

More Related Content

DOCX
Existing system
PPTX
Identity Management
PPTX
Access management
PDF
Nursecoin technology platform overview
PDF
Contextual Authentication
PDF
Context Based Authentication
PDF
Presenta zcondemo
PDF
Presentaz
Existing system
Identity Management
Access management
Nursecoin technology platform overview
Contextual Authentication
Context Based Authentication
Presenta zcondemo
Presentaz

What's hot (14)

PPT
Identity Federation on JBossAS
PPT
Single sign on assistant an authentication brokers
PPT
Openid
PDF
End-to-End Identity Management
PDF
Uma webinar 2014 06-19
PPTX
SCWCD : Secure web
ODP
Securing GIS data
PPTX
Security Ecosystem of Digital Wallets
PDF
Credit checking
PDF
Authentication through Claims-Based Authentication
PDF
[POSS 2019] MicroServices authentication and authorization with LemonLDAP::NG
PPTX
"Безопасность микросервисных приложений"
PPTX
Вячеслав Михайлов «Как сделать Single Sign-On в веб-приложении в 10 строк кода»
PDF
DIDS and AppIDS
Identity Federation on JBossAS
Single sign on assistant an authentication brokers
Openid
End-to-End Identity Management
Uma webinar 2014 06-19
SCWCD : Secure web
Securing GIS data
Security Ecosystem of Digital Wallets
Credit checking
Authentication through Claims-Based Authentication
[POSS 2019] MicroServices authentication and authorization with LemonLDAP::NG
"Безопасность микросервисных приложений"
Вячеслав Михайлов «Как сделать Single Sign-On в веб-приложении в 10 строк кода»
DIDS and AppIDS
Ad

Similar to [WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computing Environment (20)

PPTX
Extended Security with WSO2 API Management Platform
PDF
WSO2 Identity Server - Product Overview
PDF
Openstack identity protocols unconference
PDF
CIS13: Introduction to OAuth 2.0
PDF
JDD2015: Security in the era of modern applications and services - Bolesław D...
PPTX
IAM Overview Identiverse 2018
PDF
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
PPTX
Help! I Have An Identity Crisis: A look at various mechanisms of Single Sign On
PDF
Securing FIWARE Architectures
PDF
SSO with the WSO2 Identity Server
PDF
Sso with the wso2 identity server
PPTX
Presentation
PDF
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
PDF
OAuth in the Real World featuring Webshell
PDF
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
PDF
API Security In Cloud Native Era
PPTX
The New Venn of Access Control in the API-Mobile-IOT Era
PDF
Who’s Knocking? Identity for APIs, Web and Mobile
PDF
O Dell Secure360 Presentation5 12 10b
PPTX
Single Sign On 101
Extended Security with WSO2 API Management Platform
WSO2 Identity Server - Product Overview
Openstack identity protocols unconference
CIS13: Introduction to OAuth 2.0
JDD2015: Security in the era of modern applications and services - Bolesław D...
IAM Overview Identiverse 2018
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
Help! I Have An Identity Crisis: A look at various mechanisms of Single Sign On
Securing FIWARE Architectures
SSO with the WSO2 Identity Server
Sso with the wso2 identity server
Presentation
WSO2Con ASIA 2016: Case Study: Identity in the WSO2 Ecosystem
OAuth in the Real World featuring Webshell
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
API Security In Cloud Native Era
The New Venn of Access Control in the API-Mobile-IOT Era
Who’s Knocking? Identity for APIs, Web and Mobile
O Dell Secure360 Presentation5 12 10b
Single Sign On 101
Ad

More from WSO2 (20)

PDF
Demystifying CMS-0057-F - Compliance Made Seamless with WSO2
PDF
Quantum Threats Are Closer Than You Think – Act Now to Stay Secure
PDF
Modern Platform Engineering with Choreo - The AI-Native Internal Developer Pl...
PDF
Application Modernization with Choreo - The AI-Native Internal Developer Plat...
PDF
Build Smarter, Deliver Faster with Choreo - An AI Native Internal Developer P...
PDF
Platformless Modernization with Choreo.pdf
PDF
Application Modernization with Choreo for the BFSI Sector
PDF
Choreo - The AI-Native Internal Developer Platform as a Service: Overview
PDF
[Roundtable] Choreo - The AI-Native Internal Developer Platform as a Service
PPTX
WSO2Con 2025 - Building AI Applications in the Enterprise (Part 1)
PPTX
WSO2Con 2025 - Building Secure Business Customer and Partner Experience (B2B)...
PPTX
WSO2Con 2025 - Building Secure Customer Experience Apps
PPTX
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
PPTX
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
PPTX
WSO2Con 2025 - Unified Management of Ingress and Egress Across Multiple API G...
PPTX
WSO2Con 2025 - How an Internal Developer Platform Lets Developers Focus on Code
PPTX
WSO2Con 2025 - Architecting Cloud-Native Applications
PDF
Mastering Intelligent Digital Experiences with Platformless Modernization
PDF
Accelerate Enterprise Software Engineering with Platformless
PDF
architecting-ai-in-the-enterprise-apis-and-applications.pdf
Demystifying CMS-0057-F - Compliance Made Seamless with WSO2
Quantum Threats Are Closer Than You Think – Act Now to Stay Secure
Modern Platform Engineering with Choreo - The AI-Native Internal Developer Pl...
Application Modernization with Choreo - The AI-Native Internal Developer Plat...
Build Smarter, Deliver Faster with Choreo - An AI Native Internal Developer P...
Platformless Modernization with Choreo.pdf
Application Modernization with Choreo for the BFSI Sector
Choreo - The AI-Native Internal Developer Platform as a Service: Overview
[Roundtable] Choreo - The AI-Native Internal Developer Platform as a Service
WSO2Con 2025 - Building AI Applications in the Enterprise (Part 1)
WSO2Con 2025 - Building Secure Business Customer and Partner Experience (B2B)...
WSO2Con 2025 - Building Secure Customer Experience Apps
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
WSO2Con 2025 - AI-Driven API Design, Development, and Consumption with Enhanc...
WSO2Con 2025 - Unified Management of Ingress and Egress Across Multiple API G...
WSO2Con 2025 - How an Internal Developer Platform Lets Developers Focus on Code
WSO2Con 2025 - Architecting Cloud-Native Applications
Mastering Intelligent Digital Experiences with Platformless Modernization
Accelerate Enterprise Software Engineering with Platformless
architecting-ai-in-the-enterprise-apis-and-applications.pdf

Recently uploaded (20)

PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation theory and applications.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Modernizing your data center with Dell and AMD
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Empathic Computing: Creating Shared Understanding
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Electronic commerce courselecture one. Pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Dropbox Q2 2025 Financial Results & Investor Presentation
NewMind AI Monthly Chronicles - July 2025
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation theory and applications.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
“AI and Expert System Decision Support & Business Intelligence Systems”
Spectral efficient network and resource selection model in 5G networks
The Rise and Fall of 3GPP – Time for a Sabbatical?
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Chapter 3 Spatial Domain Image Processing.pdf
Modernizing your data center with Dell and AMD
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
MYSQL Presentation for SQL database connectivity
Empathic Computing: Creating Shared Understanding
Mobile App Security Testing_ A Comprehensive Guide.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Electronic commerce courselecture one. Pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

[WSO2 Integration Summit Johannesburg 2019] Security in a Distributed Computing Environment

  • 1. Security in the Context of Distributed Computing
  • 2. Who am I? Solutions Architect For DeARX Based in our Cape Town office Christhonie Geldenhuys
  • 3. Topics A practical view based on our experience with distributed computing ► A look at modern distributed systems ► Authentication ► Creating a seamless experience ► Leveraging Social login ► Additional factors ► Identity Management ► A single view ► Personal data and consent ► Authorisation ► Rate limiting or throttling
  • 5. An evolution in component size Source: Tiempo Development
  • 6. And an evolution in location
  • 8. So how does this impact security?
  • 9. Key considerations remain the same ► Who is accessing the system? Authentication ► What can they do? Authorization ► When/how often can they do it? Throttling
  • 11. Traditional monolithic authentication Typical application level implementation of role base access control
  • 12. Traditional approach cause duplication Legacy User DB Active Directory App 1 App 2 We still see many examples of this!
  • 13. Traditional approach cause duplication Active Directory Application 1 Application 2 This is much better.
  • 14. Authentication as a service Use a “Trusted 3rd party” Back-end servers
  • 15. Central authentication mechanism Provide a single mechanism for identity management and authentication. Integrate applications with the Identity server.
  • 16. Benefits of this approach ► A single mechanism for authentication ► Common and shared across all application ► User information in one place ► Easy to maintain ► Can leverage proven security standards Using an Identity Server provides; ► Central login mechanism ► Customised registration flow ► Customised approval flows ► Advanced authentication techniques
  • 17. Single Sign-On Single Sign-On application have the following characteristics; ► Static, well known URL – i.e. http://logon.acme.com ► Authentication session is maintained at this URL; ► Using cookies to identify the session ► Redirect mechanisms are used to redirect to and from this app Benefits ► This enables the authentication session to span multiple application. ► Login once for a range of applications.
  • 18. Implementation considerations ► Users and Groups now become a central responsibility ► Roles remain an application concern ► Share information via API or claims. How do we separate the various identity objects?
  • 19. Social Login – Use cases ► End-users – Removes the risk to create yet another account ► Occasional or temporary workers – i.e. contractors, not requiring the benefits corporate-wide access control groups / roles
  • 21. What is POPI ► Protection of Personal Information Act will regulate the Processing of Personal Information.  ► Personal Information broadly means any information relating to an identifiable, living natural person or juristic person (companies, CC’s etc.) and includes, but is not limited to: ► contact details: email, telephone, address etc. ► demographic information: age, gender, race, birth date, ethnicity etc. ► history: employment, financial, educational, criminal, medical history ► biometric information: blood type etc. ► opinions of and about the person ► private correspondence etc. ► Processing means broadly anything that can be done with the Personal Information, including collection, usage, storage, dissemination, etc.
  • 22. Personal information as a service What if… ► We can access personal data from a central source ► Information is stored once. ► Easy to add, change or remove in one place. ► Central access control ► Provide a customer self-help portal to view or change data. ► Get user content to determine who can use it.
  • 23. Personal information capture ► Initial user / customer information is captured as part of the registration process. ► Additional user information can also be stored here over time.
  • 24. Personal information distribution Obtaining the user consent is one of the fundamental requirements of personal information regulation. WSO2 Identity Server facilitates this through its Consent Management features. 
  • 25. Support in WSO2 Identity Server Consent Management ► Provides self-help profile creation, user provisioning to other systems, sharing of user attributes through SSO, and identity federation are fully based on user consent ► Users can review, modify, and revoke previously given consent via the self-care user portal or RESTful Consent API ► Consent API can also be used to integrate WSO2 IS consent management capabilities with existing applications ► WSO2 IS can be used to manage consent of any 3rd party application via the RESTful Consent API
  • 28. OAuth to the rescue WSO2 Identity Server includes support for the popular OAuth standards.
  • 29. API Manager as a first line of defence API Manager help offloads checking tokens at the point of ingress.
  • 30. Who is this? – Access tokens When using Access Tokens… We might want to check who is using this token; ► For display of user name perhaps ► For additional authorization decisions ► Per operation, per business record, etc.
  • 31. Access token lookup ► Use API to validate/lookup token claims. ► Cache token for the validity period. ► Store principle and claims as part of cache. Token validation lookup
  • 32. Who is this? - JWT
  • 33. Access Token or JWT? Access Token Benefits ► Small, simple ► Ideal for smaller number of sessions and “chatty” interfaces. Drawbacks ► Require lookup ► Mitigated through caching JWT Benefits ► Self contained, stateless ► Verification can be self contained, or via lookup (remember to cache) Drawbacks ► Large (sometimes larger than payload). Not ideal for; ► “Chatty” APIs ► Expensive networks, i.e. Mobile, Satellite, IoT
  • 34. Trust your services It is vital to verify the communication path and authenticity of your identity / authentication infrastructure. Identity your infrastructure; ► Use HTTPS! ► Check the certificates! Consider using certificate chains:
  • 35. Which OAuth flow / grant type? https://auth0.com/docs/api-auth/which-oauth-flow-to-use Use the online decision tree to determine which OAuth flow is best for your application;
  • 37. Rate limiting – Why and how ► Limit access to APIs using the various rate limiting filters. ► Absolute limits or support for burst traffic. ► API manager continuously monitors the traffic and limits. ► API suspension is implemented when limits are reached. ► Rather stop them at the gate than try to deal with load while under load. ► Suspension returns pre-defined error codes (customisable) ► API auto resume after predefined period(s).
  • 39. Summary ► Authentication as a service ► A seamless experience for the user, across multiple applications ► Identity as a service ► User/customer information in one place. ► Controlled access to that information. ► Authorization ► A mechanism to provide access to resources. ► Rate limiting ► To protect our systems from over-use and abuse.