240 likes | 394 Views
From Authentication to Privilege Management to the Attribute Eco-System: Marketing runs amok…. Topics. Coupling identity and privilege management – Isn’t that putting authn and authz back together? An almost whole view of identity and attributes The creation and consumption of attributes
E N D
From Authentication to Privilege Management to the Attribute Eco-System:Marketing runs amok…
Topics • Coupling identity and privilege management – • Isn’t that putting authn and authz back together? • An almost whole view of identity and attributes • The creation and consumption of attributes • From the enterprise view • From the VO view • From the user view • The unexplored regions of the ecosystem
Identities, Attributes and Privileges • (Avoid rathole of identity and identifiers) • Identities have attributes for privacy (secrecy) and scale • Many attributes reflect privileges; they are used by relying parties to make access control decisions • Privileges have a small subset of useful /qualifiers • Delegation, constraints, prerequisites, expirations, and a few more…
Unified IdM • A very, very common activity in much of life, and many of its computer applications • Select a set of people • Form them into a group (managed) • Assign the members of the group privileges • Happens in enterprises, VO’s and the p2p world. • The ecosystems view • …the p2p unknowns
Inviting Attributes into your life… • For privacy and secrecy • Albeit for a refined view of privacy • For better security • Federated identity allows for stronger security where needed in a manner scalable for both RP and the user. • For efficiency • Reduced sign-ons, reduced second-factors
Attributes in the enterprise • Designated sources of authority for systems and applications • Authority tree allows sources of authority to flow permissions and privileges to others in the enterprise • May need to be coupled with local conditions
Attributes in the VO • PI or subcommittee of management defines a set of roles for VO use • Individual PI’s assign the roles to people in their local workgroups • Attributes currently carried in the VO identity credential but can be stored in other locations, such as enterprise or local directories • Or everyone uses the PI’s cert to do everything
But together…the Attribute Ecosystem • We now understand, we think, an overall “attribute ecosystem” • Shibboleth is the real-time transport of attributes from an IdP to an SP for an authorization decision • Other, “compile-time” means are used to ship attributes from sources of authority to IdP • Or to the SP, or to the various middlemen (portals, proxies, etc.) • And a user needs to be manage all of this
User attribute management • As a user • Select an identity and authenticate • Release attributes • As a manager of privilege (attribute assignment) • Authentication • People picking • Group management • Privilege management
A Simple Life Application access controls (including network devices) Shib User IdP Source of Authority Source of Authority Source of Authority p2p
A Simple Life GUI Application access controls (including network devices) Autograph Shib User Authn IdP Source of Authority Source of Authority Source of Authority p2p
A Full IdM Life Application access controls (including network devices) Shib User IdP Local apps Source of Authority Source of Authority Source of Authority p2p
A Full Life GUI Application access controls (including network devices) Autograph Shib User Authn IdP Local apps Signet/ Grouper Source of Authority Source of Authority Source of Authority p2p
Real Life Source of Authority Application access controls (including network devices) Source of Authority Portal IdP Source of Authority Gateway Shib Proxy Source of Authority Source of Authority IdP User Source of Authority Source of Authority Source of Authority Source of Authority p2p
Example Flows in the Attribute Ecosystem Source of Authority Application access controls (including network devices) VO Service Center IdP Gateway Shib Source of Authority IdP User Source of Authority Source of Authority Source of Authority Source of Authority p2p
Application access controls (including network devices) Portal Shib Autograph User IdP Authn S/G S/G Source of Authority p2p Source of Authority
A VO Service Center Flow VO Service Center Application access controls (including network devices) Source of Authority Shib S/G Autograph User IdP Authn S/G S/G Source of Authority p2p Source of Authority
The Unexplored regions • Identity linking • Batch and real-time attribute flows • Metadata services • Federation support of VO’s • The “middlemen issues” • Constrained delegation • Science gateways • P2P integration issues
Characteristics of Attribute Flows • Context of a session • Attributes hang off an authn context • Meaning of a logout • Source of authority versus immediate provider of assertion • Quality of original attribute assignment • Identifier to identifier across autonomous
Example issues • Intermediaries making assertions that are not verifiable by the federated trust fabric. • Users not being able to manage their privacy on information passed to intermediaries • LoA on attributes • The IEEE distributing membership attributes • When to use multiple IdP’s versus send attributes