SlideShare una empresa de Scribd logo
1 de 36
Descargar para leer sin conexión
www.thalesgroup.com OPEN
AuthzForce
Next-Gen Access Control Framework
Romain Ferrari
Cyril Dangerville
2
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Outline
▌ AuthzForce overview
Why? What?
AuthzForce & OW2
Latest news
Use cases
▌ Use case focus:
Enterprise IAM / ABAC for Matrix chatrooms
FIDO, OpenID Connect, XACML & co
▌ Roadmap
www.thalesgroup.com OPEN
AuthzForce
Overview
4
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
AuthzForce overview - Why
By 2020, the majority of enterprises will use attribute-based access control
(ABAC) as the dominant mechanism to protect critical assets, up from less
than five percent today.
--Gartner
Source: 2013 ISSA International Conference, The Gartner Identity and Access Management Scenario, 2014-2020.
5
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Authzforce – Architecture (XACML)
PEP
PDP
Authz decision request
(with attributes)
Policy Enforcement Point(s)
Policy Decision Point
PIP
PRP
Policy Information Point
PAP Policy Administration Point
Policy Repository Point
PIPPIP
PEPPEP
Resources/Apps
Get policies
Manage policies
Get extra
attributes
6
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
AuthzForce – What?
▌ Attribute-Based Access Control framework (NIST standard)
100% XACML standard compliant (OASIS standard)
▌ AuthzForce & OW2 (Gitlab, award 2016, etc.)
▌ Latest news
Thales now contributes to the standard (although not XACML TC member)
CLI tool for quick & easy testing
XACML JSON Profile standard (v1.1 released 03/2019)
Other REST/JSON API improvements
Improved packaging (.deb, Docker), quality check, unit tests…
▌ Use cases
Domains: cloud, Big Data, IoT, 5G, telephony, real-time multimedia, crisis mgt, etc.
Collaborative projects: Easi-clouds, openCloudware, AU2EU, FIWARE, CHOReVOLUTION, 5G-
ENSURE, SENDATE, DRIVER+, PODIUM…)
THALES business
www.thalesgroup.com OPEN
AuthzForce
Use case focus: IAM & ABAC for Matrix/Riot
8
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Use case focus – Matrix framework overview
▌ Matrix/Synapse/Riot: what’s that?
▌ Thales interest
Thales Citadel
Also used by French government: Tchapp
▌ Security limitations for enterprise use (in Synapse)
No strong auth, SSO (except CAS) or identity federation out-of-the-box
Designed for DAC (Discretionary Access Control) only, not RBAC/ABAC/MLS:
- Each room admin is responsible for the AC policy on his/her own room(s)
- The room admin assigns permissions/roles (power levels) to each user individually
▌ Good news in latest Matrix framework developments:
Matrix Client-Server API: latest spec(still labeled « unstable ») supports SSO
Client-side implementation: generic Web SSO support in Riot-web and Riot-Android clients
(2019 versions)
Server-side implementation: Synapse extensible with custom auth modules
Matrix rooms now support tags (not yet usable in Riot UI but with web API)  security labels
9
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Use case focus – Solution architecture
▌ Strong auth: FIDO
▌ Web SSO & Id. fed.: OpenID
Connect
▌ Chatroom ABAC: XACML /
AuthzForce
▌ Examples of ABAC rules:
1. Only user with role(s) X, Y and
LoA ≥ N may join room tagged Z
2. Only users with clearance level ≥
room security tag may read
messages; others may send
messages only
3. Idem but depending on
message type
API
Gateway
(AuthzForce)
PDP
(AuthzForce)
Matrix/Synapse
LDAP Mission
Database
Matrix/Riot
+ FIDO key
OIDC IdP
(Lemonldap, Gluu…)
10
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
FIDO for (strong) authentication
▌ FIDO UAF/U2F/2.0 & WebAuthn standards
▌ Standard user-friendly & developer-friendly strong authentication
framework for smartphones, tablets, PCs, etc.
▌ Max interop within FIDO alliance (GAFAMI, most OS & device vendors)
▌ Large choice of cheap FIDO products for USB/Bluetooth/NFC,
biometrics, etc.
11
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
OpenID Connect for ID federation & SSO
▌ OpenID Connect = OAuth + SAML for dummies & more
▌ Interest for ABAC: provides standardized identity attributes/assertions
▌ Adopted by major players
Google, AWS, Azure…
▌ OSS implementations
Lemonldap (OW2  )
Keycloak (aka Red Hat SSO)
Gluu (supports FIDO2  )
▌ Proprietary COTS (many)
Azure AD
…
www.thalesgroup.com OPEN
AuthzForce
Roadmap
13
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Roadmap
▌ Rocket.Chat (OW2) !
▌ Industrializing
Improve perf testing
Functional testing (cf. STAMP project)
▌ GUI enhancements
▌ Lightweight ABAC (e.g. for IoT)
▌ GeoXACML (authz based on geo-
loc) – looking for interns!
www.thalesgroup.com OPEN
Thank You
http://authzforce.ow2.org
www.thalesgroup.com OPEN
AuthzForce
ABAC and XACML
16
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Evolution of Access Control models
Identity Based
• Based on user
identity
• Unmanageable
at large scale
Role based
• Role hierarchy
• Separation of
duties
• Issue with
context notion
• Role number
explosion
Attribute based
• Multiple attribute
sources
• Finer granularity
and flexibility
17
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Identity Based Access Control
Identity Based
• Based on user
identity
• Unmanageable
at large scale
Role based
• Role hierarchy
• Separation of
duties
• Issue with
context notion
• Role number
explosion
Attribute based
• Multiple attribute
sources
• Finer granularity
and flexibility
18
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Role Based Access Control
Identity Based
• Based on user
identity
• Unmanageable
at large scale
Role based
• Role hierarchy
• Separation of
duties
• Issue with
context notion
• Role number
explosion
Attribute based
• Multiple attribute
sources
• Finer granularity
and flexibility
19
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Attribute Based Access Control
Identity Based
• Based on user
identity
• Unmanageable
at large scale
Role based
• Role hierarchy
• Separation of
duties
• Issue with
context notion
• Role number
explosion
Attribute based
• Multiple attribute
sources
• Contextual
• Finer granularity
and flexibility
20
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
ABAC/XACML Architecture
PEP
PDP
Authz decision request
(with attributes)
Policy Enforcement Point(s)
Policy Decision Point
PIP
PRP
Policy Information Point
PAP Policy Administration Point
Policy Repository Point
PIPPIP
PEPPEP
Resources/Apps
Get policies
Manage policies
Get extra
attributes
21
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Why XACML for ABAC
▌ OASIS standard: XACML = eXtensible Access Control Markup Language
▌ Why XACML?
Standard technical implementation of ABAC
Rationale: enterprise security policy (if exists) managed in different places (HR, Legal, Finance, IT, etc.), enforced in
many points: network access, mail, intranet, business apps, etc.
 Assurance that your enterprise access control policy (including “best practices”) is consistently applied globally
is VERY VERY HARD to get when using different technologies and languages everywhere
▌ XACML is the only international standard that defines concrete languages and models for:
Expressing security policy
Authorization decision request-response format
22
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Policy enforcement in enterprise information systems (example)
23
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
XACML
24
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
XACML Request
XACML Request
….
Category subject
Category x Attribute Y
Attribute Type
(string, date, integer, …)
Category resource
Category action
Attribute Y
Attribute Value
(romain, 1970-01-01, …)
Attribute ID
(subject-id, subject-role, …)
Category n
25
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Scenario
subject-id=charles
resource-
id=MissionManager
mission-id=47
action-id=update
PEP
PDP
MissionManager
LDAP Mission
Database
Get members
of mission 47 ?
Charles wants to update mission information with
id=47 hosted on MissionManager service
26
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Scenario
subject-id=charles
resource-
id=MissionManager
mission-id=47
action-id=update
PEP
PDP
MissionManager
LDAP Mission
Database
Get members
of mission 47 ?
<Rule RuleId="update_Mission" Effect="Permit">
<Description>update_Mission_Rule</Description>
<Target>
<AnyOf>
<AllOf>
<Match MatchId="string-equal>
<AttributeValue DataType="string">update</AttributeValue>
<AttributeDesignator AttributeId="action-id"
Category=“Action” DataType="string"/>
</Match>
</AllOf>
</AnyOf>
</Target>
<Condition> <Target>
<AnyOf>
<AllOf>
<Match MatchId="string-equal>
<AttributeValue DataType="string"> Mission_Manager </AttributeValue>
<AttributeDesignator AttributeId=“subject-role"
Category=“Subject” DataType="string"/>
</Match>
<Match MatchId="string-equal>
<AttributeValue DataType="string"> Activity_Manager </AttributeValue>
<AttributeDesignator AttributeId=“subject-role"
Category=“Subject” DataType="string"/>
</Match>
<Match MatchId=" string-at-least-one-member-of” >
<AttributeValue DataType="string"> subject-id </AttributeValue>
<AttributeDesignator AttributeId=“mission-member "
Category=“Resource” DataType="string"/>
</Match>
</AllOf>
</AnyOf>
</Target>
</Condition>
</Rule>
27
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Contectual access control
28
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Role Based Access Control
Identity Based
• Based on user
identity
• Unmanageable
at large scale
Role based
• Role hierarchy
• Separation of
duties
• Issue with
context notion
• Role number
explosion
Attribute based
• Multiple attribute
sources
• Finer granularity
and flexibility
29
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Role Based Access Control – Limitations (1/2)
▌ Role explosion example:
Roles in a bank: Teller, Supervisor, Branch director
Many bank agencies: Paris, London, Berlin
What about Teller in Paris, Teller in London, Teller in Berlin, Supervisor in Paris, Supervisor
in London…?  9 roles!
▌ RBAC  / ABAC : Doctor-patient and patient-record relationships
Doctor may only access medical records of his/her own patients
If resource.type = ‘MEDICAL_RECORD’
AND action.id in {‘read’,’write’}
AND user.id = medical_record.doctor_id, then Permit
A patient may only access medical records about him/herself
If resource.type = ‘MEDICAL_RECORD’
AND action.id =‘read’
AND user.id = medical_record.patient_id, then Permit
30
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Role Based Access Control – Limitations (2/2)
▌ RBAC  / ABAC : Dynamic separation of duties
User may approve purchase order only if not assigned to him/herself (approver ≠
assignee)
ABAC-style (deny unless permit):
If resource.type = ‘PURCHASE_ORDER’
AND action.id = ‘approve’
AND user.id ≠ purchase_order.assignee, then Permit
31
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
US Standardization Activities (NIST, DoD…)
▌ NIST/NCCoE publications on ABAC/XACML
- NCCoE publications on « ABAC » building block, in partnership with Cisco,
Microsoft, Symantec, RSA… [2], in particular:
– NIST Cybersecurity Practice Guide SP 1800-3 (septembre 2017).
- NIST SP 800-162: Guide to ABAC
- NIST SP 800-178: Comparison of ABAC standards for Data Service Applications
- NIST SP 800-192: Verification and Test Methods for Access Control Policies/Models,
made a tool for editing and validating XACML policies (GUI is very technical,
expert-oriented)
▌ DoD
US Army IdAM (Identity & Access Mgt) architecture requirements include XACML
32
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Features – Community Edition
▌ XACML 3.0 standards:
Core
RBAC Profile
REST Profile
Multiple Decision profile
JSON Profile
Experimental: DLP/NAC,
Additional Combining Algorithms
▌ Multi-tenant REST API
Policy Admin
Policy Decision
XML/JSON data format
▌ Policy Enforcers (PEP)
Java & Python SDK
Apache Kafka authorizer
▌ Extensible Architecture (plugins)
Attribute Providers (XACML PIPs): SQL, LDAP…
Policy Providers (for XACML PRP)
Datatypes & Functions
Policy/Rule Combining Algorithms
Request/Result Filters
Decision Cache
▌ Security
XML/JSON schema & syntax validation
XML attack mitigation
Circular policy reference mitigation
▌ Performance
Fast Infoset (ISO standard)
PDP Clustering
33
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Code to product
▌ Source
Community: GitHub, OW2 Gitlab
Enterprise: Thales internal GitLab
▌ Continuous integration
Community: Github/Travis
CI/Maven Central
Enterprise: internal Jenkins/Nexus
▌ Quality check
Unit tests
PMD, FindBugs + Find Security
Bugs, Sonar, OWASP
dependency check
CII Best Practices
FOSSA license check
▌ Documentation
OW2 wiki
AuthzForce Server (readthedocs)
▌ Ticketing system
Community: GitHub issues
Enterprise: internal Gitlab issues
▌ Conventions
Keepachangelog.com
Semantic Versioning
▌ Distribution
.deb, .tar.gz, Docker
34
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Collaborative Projects
▌ Easi-clouds (2011-2015)
▌ openCloudware (2012-2015)
▌ FIWARE (2014-2016): REST API, integration with IAM framework
▌ AU2EU (2013-2015): Integration with IBM privacy framework
▌ 5G-ENSURE (2015-2017): Fine-grained & autonomous ABAC policy
enforcement in constrained environments (e.g. IoT)
▌ PODIUM (2016-2019): TRT NL’s Martello integration
▌ SENDATE (2016-2019): Access control in network slices (NFV)
▌ DRIVER+ (2017-2020): Access control to Apache Kafa topics (pub-sub)
35
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
5G-ENSURE – Efficient dynamic authorization for IoT
36
OPEN
Thisdocumentmaynotbereproduced,modified,adapted,published,translated,inanyway,inwholeorin
partordisclosedtoathirdpartywithoutthepriorwrittenconsentofThales-©Thales2015Allrightsreserved.
June 2019
Thales / Template : 87204467-DOC-GRP-EN-002
Competitors
▌ Open Source
XACML 3.0
- AT&T - OpenAZ (AT&T)
– Low activity since 2015
- WSO2 – Balana/Identity Server
– REST API for PDP only
– Buggy
XACML 2.0 only:
- SUN - SunXACML
- HERAS-AF
None provides 3.0 support and…:
- Multi-tenant (cloud-ready) REST API
for PDP/PAP
- Standard-based XML optimization
(ISO Fast Infoset)
▌ Commercial
XACML 3.0
- Axiomatics (leader)
- Atos DirX Access
- ViewDS Access Sentinel
- NextLabs
- Oracle Entitlements Server (only with
Oracle IAM suite)
- ForgeRock AM (only for policy export)
XACML 2.0 only
- IBM Tivoli Security Policy Manager
- Dell/EMC
- Cisco (network access control)

Más contenido relacionado

La actualidad más candente

P4, EPBF, and Linux TC Offload
P4, EPBF, and Linux TC OffloadP4, EPBF, and Linux TC Offload
P4, EPBF, and Linux TC Offload
Open-NFP
 

La actualidad más candente (20)

DerbyCon 2019 - Kerberoasting Revisited
DerbyCon 2019 - Kerberoasting RevisitedDerbyCon 2019 - Kerberoasting Revisited
DerbyCon 2019 - Kerberoasting Revisited
 
Flink on Kubernetes operator
Flink on Kubernetes operatorFlink on Kubernetes operator
Flink on Kubernetes operator
 
Macros no asterisk
Macros no asteriskMacros no asterisk
Macros no asterisk
 
Kibana Tutorial | Kibana Dashboard Tutorial | Kibana Elasticsearch | ELK Stac...
Kibana Tutorial | Kibana Dashboard Tutorial | Kibana Elasticsearch | ELK Stac...Kibana Tutorial | Kibana Dashboard Tutorial | Kibana Elasticsearch | ELK Stac...
Kibana Tutorial | Kibana Dashboard Tutorial | Kibana Elasticsearch | ELK Stac...
 
Data Streaming with Apache Kafka & MongoDB
Data Streaming with Apache Kafka & MongoDBData Streaming with Apache Kafka & MongoDB
Data Streaming with Apache Kafka & MongoDB
 
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CKOne Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
 
Comparison of SRv6 Extensions uSID, SRv6+, C-SRH
Comparison of SRv6 Extensions uSID, SRv6+, C-SRHComparison of SRv6 Extensions uSID, SRv6+, C-SRH
Comparison of SRv6 Extensions uSID, SRv6+, C-SRH
 
eBPF - Observability In Deep
eBPF - Observability In DeepeBPF - Observability In Deep
eBPF - Observability In Deep
 
aclpwn - Active Directory ACL exploitation with BloodHound
aclpwn - Active Directory ACL exploitation with BloodHoundaclpwn - Active Directory ACL exploitation with BloodHound
aclpwn - Active Directory ACL exploitation with BloodHound
 
Threat Hunting with Splunk
Threat Hunting with SplunkThreat Hunting with Splunk
Threat Hunting with Splunk
 
Cilium - Container Networking with BPF & XDP
Cilium - Container Networking with BPF & XDPCilium - Container Networking with BPF & XDP
Cilium - Container Networking with BPF & XDP
 
Performance Wins with eBPF: Getting Started (2021)
Performance Wins with eBPF: Getting Started (2021)Performance Wins with eBPF: Getting Started (2021)
Performance Wins with eBPF: Getting Started (2021)
 
Airflow at lyft for Airflow summit 2020 conference
Airflow at lyft for Airflow summit 2020 conferenceAirflow at lyft for Airflow summit 2020 conference
Airflow at lyft for Airflow summit 2020 conference
 
Lost in Translation - Blackhat Brazil 2014
Lost in Translation - Blackhat Brazil 2014Lost in Translation - Blackhat Brazil 2014
Lost in Translation - Blackhat Brazil 2014
 
Terraform AWS modules and some best practices - September 2019
Terraform AWS modules and some best practices - September 2019Terraform AWS modules and some best practices - September 2019
Terraform AWS modules and some best practices - September 2019
 
Brandon obrien streaming_data
Brandon obrien streaming_dataBrandon obrien streaming_data
Brandon obrien streaming_data
 
Netflix: From Clouds to Roots
Netflix: From Clouds to RootsNetflix: From Clouds to Roots
Netflix: From Clouds to Roots
 
Flink powered stream processing platform at Pinterest
Flink powered stream processing platform at PinterestFlink powered stream processing platform at Pinterest
Flink powered stream processing platform at Pinterest
 
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - WebinarUsing Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
 
P4, EPBF, and Linux TC Offload
P4, EPBF, and Linux TC OffloadP4, EPBF, and Linux TC Offload
P4, EPBF, and Linux TC Offload
 

Similar a Presentation of Authzforce project, OWcon'19, June 12-13, 2019, Paris.

Présentation openstackinaction v1.2
Présentation openstackinaction v1.2Présentation openstackinaction v1.2
Présentation openstackinaction v1.2
Regis Allegre
 
Red hat ansible automation technical deck
Red hat ansible automation technical deckRed hat ansible automation technical deck
Red hat ansible automation technical deck
Juraj Hantak
 

Similar a Presentation of Authzforce project, OWcon'19, June 12-13, 2019, Paris. (20)

AuthzForce - Open Source Next-gen Access Control Framework for the Enterprise...
AuthzForce - Open Source Next-gen Access Control Framework for the Enterprise...AuthzForce - Open Source Next-gen Access Control Framework for the Enterprise...
AuthzForce - Open Source Next-gen Access Control Framework for the Enterprise...
 
Arcadia and Capella: Model-Based Systems Engineering made easier! euroforum -...
Arcadia and Capella: Model-Based Systems Engineering made easier! euroforum -...Arcadia and Capella: Model-Based Systems Engineering made easier! euroforum -...
Arcadia and Capella: Model-Based Systems Engineering made easier! euroforum -...
 
Management of modes and states with Capella
Management of modes and states with CapellaManagement of modes and states with Capella
Management of modes and states with Capella
 
[Capella Day Toulouse] ATL2 modernization: when MBSE keeps its promises
[Capella Day Toulouse] ATL2 modernization: when MBSE keeps its promises[Capella Day Toulouse] ATL2 modernization: when MBSE keeps its promises
[Capella Day Toulouse] ATL2 modernization: when MBSE keeps its promises
 
MuleSoft Runtime Fabric (RTF): Foundations : MuleSoft Virtual Muleys Meetups
MuleSoft Runtime Fabric (RTF): Foundations  : MuleSoft Virtual Muleys MeetupsMuleSoft Runtime Fabric (RTF): Foundations  : MuleSoft Virtual Muleys Meetups
MuleSoft Runtime Fabric (RTF): Foundations : MuleSoft Virtual Muleys Meetups
 
21st Docker Switzerland Meetup - ISTIO
21st Docker Switzerland Meetup - ISTIO21st Docker Switzerland Meetup - ISTIO
21st Docker Switzerland Meetup - ISTIO
 
Simplified Data Preparation for Machine Learning in Hybrid and Multi Clouds
Simplified Data Preparation for Machine Learning in Hybrid and Multi CloudsSimplified Data Preparation for Machine Learning in Hybrid and Multi Clouds
Simplified Data Preparation for Machine Learning in Hybrid and Multi Clouds
 
Get SaaSy with Red Hat OpenShift on AWS (CON305-S) - AWS re:Invent 2018
Get SaaSy with Red Hat OpenShift on AWS (CON305-S) - AWS re:Invent 2018Get SaaSy with Red Hat OpenShift on AWS (CON305-S) - AWS re:Invent 2018
Get SaaSy with Red Hat OpenShift on AWS (CON305-S) - AWS re:Invent 2018
 
CA Performance Manager Agility by using Docker Containers for Network Manag...
CA Performance Manager Agility by using Docker Containers for Network Manag...CA Performance Manager Agility by using Docker Containers for Network Manag...
CA Performance Manager Agility by using Docker Containers for Network Manag...
 
Présentation openstackinaction v1.2
Présentation openstackinaction v1.2Présentation openstackinaction v1.2
Présentation openstackinaction v1.2
 
PSOCLD 1007 Cisco Hybrid Cloud Platform for Google Cloud
PSOCLD 1007 Cisco Hybrid Cloud Platform for Google CloudPSOCLD 1007 Cisco Hybrid Cloud Platform for Google Cloud
PSOCLD 1007 Cisco Hybrid Cloud Platform for Google Cloud
 
Introduction to Apache NiFi 1.11.4
Introduction to Apache NiFi 1.11.4Introduction to Apache NiFi 1.11.4
Introduction to Apache NiFi 1.11.4
 
2018 Genivi Xen Overview Nov Update
2018 Genivi Xen Overview Nov Update2018 Genivi Xen Overview Nov Update
2018 Genivi Xen Overview Nov Update
 
DevOps Digital Transformation: A real life use case enabled by Alien4Cloud
DevOps Digital Transformation: A real life use case enabled by Alien4CloudDevOps Digital Transformation: A real life use case enabled by Alien4Cloud
DevOps Digital Transformation: A real life use case enabled by Alien4Cloud
 
Understanding Platform as a Service
Understanding Platform as a ServiceUnderstanding Platform as a Service
Understanding Platform as a Service
 
Tap as a service: What you need to know now
Tap as a service: What you need to know nowTap as a service: What you need to know now
Tap as a service: What you need to know now
 
Red hat ansible automation technical deck
Red hat ansible automation technical deckRed hat ansible automation technical deck
Red hat ansible automation technical deck
 
Scaleable PHP Applications in Kubernetes
Scaleable PHP Applications in KubernetesScaleable PHP Applications in Kubernetes
Scaleable PHP Applications in Kubernetes
 
Managing the Machine Learning Lifecycle with MLOps
Managing the Machine Learning Lifecycle with MLOpsManaging the Machine Learning Lifecycle with MLOps
Managing the Machine Learning Lifecycle with MLOps
 
Security & Resiliency of Cloud Native Apps with Weave GitOps & Tetrate Servic...
Security & Resiliency of Cloud Native Apps with Weave GitOps & Tetrate Servic...Security & Resiliency of Cloud Native Apps with Weave GitOps & Tetrate Servic...
Security & Resiliency of Cloud Native Apps with Weave GitOps & Tetrate Servic...
 

Más de OW2

OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...
OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...
OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...
OW2
 
Enabling DevOps for IoT software development, powered by Open Source, OW2onli...
Enabling DevOps for IoT software development, powered by Open Source, OW2onli...Enabling DevOps for IoT software development, powered by Open Source, OW2onli...
Enabling DevOps for IoT software development, powered by Open Source, OW2onli...
OW2
 

Más de OW2 (20)

OW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in Roma
OW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in RomaOW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in Roma
OW2 and RIOS teaming up to boost the open source impact, Nov. 2022 in Roma
 
The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...
The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...
The Open Source Good Governance Initiative presented at RIOS OS Week, Nov. 20...
 
GLPi v.10, les fonctionnalités principales et l'offre cloud
GLPi v.10, les fonctionnalités principales et l'offre cloudGLPi v.10, les fonctionnalités principales et l'offre cloud
GLPi v.10, les fonctionnalités principales et l'offre cloud
 
Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...
Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...
Centreon: superviser le Cloud et le Legacy à partir d'une même plateforme, po...
 
FusionIAM : la gestion des identités et des accés open source
FusionIAM : la gestion des identités et des accés open sourceFusionIAM : la gestion des identités et des accés open source
FusionIAM : la gestion des identités et des accés open source
 
OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...
OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...
OW2 Association Européenne aux racines grenobloises, transformer l'industrie ...
 
SFScon'20 Bringing the User into the Equation
SFScon'20 Bringing the User into the EquationSFScon'20 Bringing the User into the Equation
SFScon'20 Bringing the User into the Equation
 
Towards a sustainable solution to open source sustainability, OW2online20, Ju...
Towards a sustainable solution to open source sustainability, OW2online20, Ju...Towards a sustainable solution to open source sustainability, OW2online20, Ju...
Towards a sustainable solution to open source sustainability, OW2online20, Ju...
 
Advanced proactive and polymorphing cloud application adaptation with MORPHEM...
Advanced proactive and polymorphing cloud application adaptation with MORPHEM...Advanced proactive and polymorphing cloud application adaptation with MORPHEM...
Advanced proactive and polymorphing cloud application adaptation with MORPHEM...
 
Open Source governance and the Eclipse Foundation, OW2online, June 2020
Open Source governance and the Eclipse Foundation, OW2online, June 2020Open Source governance and the Eclipse Foundation, OW2online, June 2020
Open Source governance and the Eclipse Foundation, OW2online, June 2020
 
Open source contribution policies, OW2online, June 2020
Open source contribution policies, OW2online, June 2020Open source contribution policies, OW2online, June 2020
Open source contribution policies, OW2online, June 2020
 
Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...
Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...
Software development at scale, pandemic lockdown and oss ecosystems, OW2onlin...
 
Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020
Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020
Overview of the OpenChain Reference Tooling Work Group, OW2online20, June 2020
 
Open Source Compliance at Orange, OW2online, June 2020
Open Source Compliance at Orange, OW2online, June 2020Open Source Compliance at Orange, OW2online, June 2020
Open Source Compliance at Orange, OW2online, June 2020
 
Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020
Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020
Ideas, methods and tools for OSS Compliance assessment, OW2online, June 2020
 
Intelligent package management with FASTEN, OW2online, June 2020
Intelligent package management with FASTEN, OW2online, June 2020Intelligent package management with FASTEN, OW2online, June 2020
Intelligent package management with FASTEN, OW2online, June 2020
 
DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020
DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020
DECODER, a Smarter Environment for DevOps Teams , OW2online, June 2020
 
Enabling DevOps for IoT software development, powered by Open Source, OW2onli...
Enabling DevOps for IoT software development, powered by Open Source, OW2onli...Enabling DevOps for IoT software development, powered by Open Source, OW2onli...
Enabling DevOps for IoT software development, powered by Open Source, OW2onli...
 
Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...
Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...
Upcoming Challenges in Artificial Intelligence Research and Development, OW2o...
 
Cacti and Big Data at Orange France, OW2online, June 2020
Cacti and Big Data at Orange France, OW2online, June 2020Cacti and Big Data at Orange France, OW2online, June 2020
Cacti and Big Data at Orange France, OW2online, June 2020
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Presentation of Authzforce project, OWcon'19, June 12-13, 2019, Paris.