SlideShare una empresa de Scribd logo
1 de 42
Web-services & Federated Identity ISSA- Motor City, March 18/04 Paul Madsen,  Senior Security Consultant Entrust - Advanced Security Technologies
Thesis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object]
Web Services & Identity Inseparable ,[object Object],[object Object],[object Object],[object Object],[object Object]
Web Services  impact on Identity Management ,[object Object],XML-DSIG SOAP SSL/TLS WAP XML SAML HTTP XML Enc WSDL WSS UDDI Gateway Web Service  Provider Domain   1 Domain 2 1. 2. 3. 4. Web Service  Client
Multiple Identities to manage XML-DSIG SOAP SSL/TLS WAP XML SAML HTTP XML Enc WSDL WSS UDDI App 1 App 2 App 3 Domain 1 Domain 2 User Identity Invoker Identity Intermediary Identity Trusted 3 rd  Party Identity
Agenda ,[object Object],[object Object],[object Object],[object Object]
Basic Web Services Model client service execution SOAP
Basic Web Services Model client service service development client development development execution distribution WSDL UDDI SOAP
Security Components client service service development client development development security execution distribution WSDL UDDI Services Proxy Gateway Proxy
Security Gateway ,[object Object],[object Object],[object Object],[object Object],[object Object]
Today client service service development client development development security execution distribution Gateway Gateway
Future client service service development client development development security execution distribution Gateway Gateway WS-Policy +
Security Proxy ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How do they help ,[object Object],[object Object],[object Object],[object Object],[object Object]
Flow Sec-WSDL WSDL UDDI Query Sec-WSDL WSDL SOAP Sec-SOAP + policy Sec-SOAP SOAP SOAP SOAP Client Security Registry Security Service
Agenda ,[object Object],[object Object],[object Object],[object Object]
What is Network Identity? A  Network Identity  is a  user ’s overall global set of  attributes  constituting  their various accounts
Network Identity? ,[object Object],[object Object],[object Object],Unique Identifier ,[object Object],[object Object],[object Object],[object Object],Consumer Profiles ,[object Object],[object Object],Common   Profile   Info Address ,  etc . Credentials Credentials App, Site, or Partner Profiles Employer Profiles App, Site, or Partner Profiles
The Problem with Network Identity? Multiple,  disconnected   identities  scattered  across isolated Internet sites ,[object Object],[object Object],[object Object]
Federated Identity Management ,[object Object],[object Object],[object Object],[object Object]
What does federated identity provide? ,[object Object],[object Object],[object Object],[object Object]
‘Standards’ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dependencies MSFT/IBM OASIS Liberty WS-Fed (7/8/03) WS-Security 4/5/02) Phase 1 ID-FF 1.1 (1/15/03) Phase 1 ID-FF 1.0 (7/15/02) SAML 1.0 (11/5/02) SAML 1.1 (9/2/03) Phase 1 ID-FF 1.2 (11/12/03) Phase 2 ID-WSF 1.0 (11/12/03) WS-Trust (12/18/02) Phase 3 (08/04) WSS (2/04) 2003 2004 SAML 2.0 (6/04)
SAML ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SAML  ,[object Object],[object Object],[object Object],[object Object],SAML is a building block
Liberty Alliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Liberty Components ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SAML & Liberty overlap
SAML/Liberty convergence ,[object Object],[object Object],[object Object]
WS-Federation ,[object Object],[object Object],[object Object],[object Object]
Liberty/WS-Fed convergence ,[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object]
Federated Supply Chain Scenario ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Liberty enabled Scenario ,[object Object],[object Object]
Geoff’s Experience ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Message Flow ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Request/Response <s:Body>         <ep:Query>             <ep:ResourceID> http://eip.acme.com/sdfjs78     </ep:ResourceID>             <ep:QueryItem itemID=&quot;type&quot;>                 <ep:Select>/ ep:EP/ep:EmployeeType </ep:Select>             </ep:QueryItem>         </ep:Query> </s:Body> <s:Body>         <ep:QueryResponse>             <ep:Status code=&quot;ep:OK&quot;/>             <ep:Data itemIDRef=&quot;type&quot;>                 <ep:EmployeeType>                  JuniorPurchasingAgent                 </ep:EmployeeType>             </ep:Data>         </ep:QueryResponse> </s:Body> Request Response
Summary ,[object Object],[object Object],[object Object],[object Object]
[object Object]
Entrust Web Services Webinar ,[object Object],[object Object],[object Object],Real World Customer Success with Identity Management Clerical Medical Europe will talk first hand about the success of their Web Services deployment and how Entrust enabled them to efficiently manage the digital identities of internal and external users alike Contact Duncan Hoge [email_address] 740-965-9493 Louise Popyk [email_address] 313-359-4393 http://www.entrust.com/events

Más contenido relacionado

La actualidad más candente

Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsBertrand Carlier
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Web Single sign on system
Web Single sign on systemWeb Single sign on system
Web Single sign on systemSwati Sinha
 
CCM_WP-9-8-16-v10__MT_GP_Final
CCM_WP-9-8-16-v10__MT_GP_FinalCCM_WP-9-8-16-v10__MT_GP_Final
CCM_WP-9-8-16-v10__MT_GP_FinalGreg Posten
 
Identity systems
Identity systemsIdentity systems
Identity systemsJim Fenton
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Sverige
 
Presentation sso design_security
Presentation sso design_securityPresentation sso design_security
Presentation sso design_securityMarco Morana
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Systems, Inc.
 
Microsoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Private Cloud
 
8 i internet_security
8 i internet_security8 i internet_security
8 i internet_securityAnil Pandey
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect DesignRajat Jain
 
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiIBM Sverige
 
Single sign on - benefits, challenges and case study : iFour consultancy
Single sign on - benefits, challenges and case study :  iFour consultancySingle sign on - benefits, challenges and case study :  iFour consultancy
Single sign on - benefits, challenges and case study : iFour consultancyDevam Shah
 
CA security-Management -Vasu Surabhi
CA security-Management -Vasu SurabhiCA security-Management -Vasu Surabhi
CA security-Management -Vasu SurabhiVasu Surabhi
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
 
Introducing SAML 2.0 Protocol: Security and Performance
Introducing SAML 2.0 Protocol: Security and PerformanceIntroducing SAML 2.0 Protocol: Security and Performance
Introducing SAML 2.0 Protocol: Security and PerformanceAmin Saqi
 

La actualidad más candente (20)

Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundations
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Web Single sign on system
Web Single sign on systemWeb Single sign on system
Web Single sign on system
 
CCM_WP-9-8-16-v10__MT_GP_Final
CCM_WP-9-8-16-v10__MT_GP_FinalCCM_WP-9-8-16-v10__MT_GP_Final
CCM_WP-9-8-16-v10__MT_GP_Final
 
Identity systems
Identity systemsIdentity systems
Identity systems
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 
Presentation sso design_security
Presentation sso design_securityPresentation sso design_security
Presentation sso design_security
 
Hitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and TechnologyHitachi ID Suite 9.0 Features and Technology
Hitachi ID Suite 9.0 Features and Technology
 
Microsoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management WhitepaperMicrosoft Forefront - Identity and Access Management Whitepaper
Microsoft Forefront - Identity and Access Management Whitepaper
 
8 i internet_security
8 i internet_security8 i internet_security
8 i internet_security
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
 
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
 
Single sign on - benefits, challenges and case study : iFour consultancy
Single sign on - benefits, challenges and case study :  iFour consultancySingle sign on - benefits, challenges and case study :  iFour consultancy
Single sign on - benefits, challenges and case study : iFour consultancy
 
CA security-Management -Vasu Surabhi
CA security-Management -Vasu SurabhiCA security-Management -Vasu Surabhi
CA security-Management -Vasu Surabhi
 
Single sign on
Single sign onSingle sign on
Single sign on
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
SINGLE SIGN-ON
SINGLE SIGN-ONSINGLE SIGN-ON
SINGLE SIGN-ON
 
Introducing SAML 2.0 Protocol: Security and Performance
Introducing SAML 2.0 Protocol: Security and PerformanceIntroducing SAML 2.0 Protocol: Security and Performance
Introducing SAML 2.0 Protocol: Security and Performance
 

Destacado

5.7 DEDICATED HOSTING SERVICES (DHS)
5.7 DEDICATED HOSTING SERVICES (DHS)5.7 DEDICATED HOSTING SERVICES (DHS)
5.7 DEDICATED HOSTING SERVICES (DHS)webhostingguy
 
Name Based Net Architectures
Name Based Net ArchitecturesName Based Net Architectures
Name Based Net Architectureswebhostingguy
 
Website hosting and infrastructure
Website hosting and infrastructureWebsite hosting and infrastructure
Website hosting and infrastructurewebhostingguy
 
Managing Clients' Mission Critical Applications
Managing Clients' Mission Critical ApplicationsManaging Clients' Mission Critical Applications
Managing Clients' Mission Critical Applicationswebhostingguy
 
Ensim Confidential Ensim The Hosting Automation Company
Ensim Confidential Ensim The Hosting Automation CompanyEnsim Confidential Ensim The Hosting Automation Company
Ensim Confidential Ensim The Hosting Automation Companywebhostingguy
 
Powerpoint Presentation
Powerpoint PresentationPowerpoint Presentation
Powerpoint Presentationwebhostingguy
 
Best Practises: Java OGSI Hosting Environment Design
Best Practises: Java OGSI Hosting Environment DesignBest Practises: Java OGSI Hosting Environment Design
Best Practises: Java OGSI Hosting Environment Designwebhostingguy
 
AITP Web Hosting-Web..
AITP Web Hosting-Web..AITP Web Hosting-Web..
AITP Web Hosting-Web..webhostingguy
 
hp StorageWorks host bus adapter for Windows and Linux ...
hp StorageWorks host bus adapter for Windows and Linux ...hp StorageWorks host bus adapter for Windows and Linux ...
hp StorageWorks host bus adapter for Windows and Linux ...webhostingguy
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Webwebhostingguy
 
5Portals_and_future_trends_4.ppt
5Portals_and_future_trends_4.ppt5Portals_and_future_trends_4.ppt
5Portals_and_future_trends_4.pptwebhostingguy
 
2008- Federation And Dp Law V0.02
2008- Federation And Dp Law V0.022008- Federation And Dp Law V0.02
2008- Federation And Dp Law V0.02evkas
 
Federated identity management and web services security with ibm tivoli secur...
Federated identity management and web services security with ibm tivoli secur...Federated identity management and web services security with ibm tivoli secur...
Federated identity management and web services security with ibm tivoli secur...Banking at Ho Chi Minh city
 
CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...
CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...
CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...CloudIDSummit
 
2. Day 2 - Identify and SSO
2. Day 2 -  Identify and SSO2. Day 2 -  Identify and SSO
2. Day 2 - Identify and SSOHuy Pham
 
CIS14: Case Study: Using a Federated Identity Service for Faster Application ...
CIS14: Case Study: Using a Federated Identity Service for Faster Application ...CIS14: Case Study: Using a Federated Identity Service for Faster Application ...
CIS14: Case Study: Using a Federated Identity Service for Faster Application ...CloudIDSummit
 

Destacado (20)

5.7 DEDICATED HOSTING SERVICES (DHS)
5.7 DEDICATED HOSTING SERVICES (DHS)5.7 DEDICATED HOSTING SERVICES (DHS)
5.7 DEDICATED HOSTING SERVICES (DHS)
 
Presentation
PresentationPresentation
Presentation
 
Name Based Net Architectures
Name Based Net ArchitecturesName Based Net Architectures
Name Based Net Architectures
 
59
5959
59
 
Website hosting and infrastructure
Website hosting and infrastructureWebsite hosting and infrastructure
Website hosting and infrastructure
 
Managing Clients' Mission Critical Applications
Managing Clients' Mission Critical ApplicationsManaging Clients' Mission Critical Applications
Managing Clients' Mission Critical Applications
 
Ensim Confidential Ensim The Hosting Automation Company
Ensim Confidential Ensim The Hosting Automation CompanyEnsim Confidential Ensim The Hosting Automation Company
Ensim Confidential Ensim The Hosting Automation Company
 
Download It
Download ItDownload It
Download It
 
English
EnglishEnglish
English
 
Powerpoint Presentation
Powerpoint PresentationPowerpoint Presentation
Powerpoint Presentation
 
Best Practises: Java OGSI Hosting Environment Design
Best Practises: Java OGSI Hosting Environment DesignBest Practises: Java OGSI Hosting Environment Design
Best Practises: Java OGSI Hosting Environment Design
 
AITP Web Hosting-Web..
AITP Web Hosting-Web..AITP Web Hosting-Web..
AITP Web Hosting-Web..
 
hp StorageWorks host bus adapter for Windows and Linux ...
hp StorageWorks host bus adapter for Windows and Linux ...hp StorageWorks host bus adapter for Windows and Linux ...
hp StorageWorks host bus adapter for Windows and Linux ...
 
The Internet and World Wide Web
The Internet and World Wide WebThe Internet and World Wide Web
The Internet and World Wide Web
 
5Portals_and_future_trends_4.ppt
5Portals_and_future_trends_4.ppt5Portals_and_future_trends_4.ppt
5Portals_and_future_trends_4.ppt
 
2008- Federation And Dp Law V0.02
2008- Federation And Dp Law V0.022008- Federation And Dp Law V0.02
2008- Federation And Dp Law V0.02
 
Federated identity management and web services security with ibm tivoli secur...
Federated identity management and web services security with ibm tivoli secur...Federated identity management and web services security with ibm tivoli secur...
Federated identity management and web services security with ibm tivoli secur...
 
CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...
CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...
CIS14: Creating a Federated Identity Service for ABAC and WebAccess Managemen...
 
2. Day 2 - Identify and SSO
2. Day 2 -  Identify and SSO2. Day 2 -  Identify and SSO
2. Day 2 - Identify and SSO
 
CIS14: Case Study: Using a Federated Identity Service for Faster Application ...
CIS14: Case Study: Using a Federated Identity Service for Faster Application ...CIS14: Case Study: Using a Federated Identity Service for Faster Application ...
CIS14: Case Study: Using a Federated Identity Service for Faster Application ...
 

Similar a FEDERATED IDENTITY AND WEB SERVICES

Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityOliver Pfaff
 
What is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdfWhat is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdfAngelicaPantaleon3
 
Web services and SOA [Modified]
Web services and SOA [Modified]Web services and SOA [Modified]
Web services and SOA [Modified]Subin Sugunan
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossASRoger CARHUATOCTO
 
Soa Testing An Approach For Testing Security Aspects Of Soa Based Application
Soa Testing   An Approach For Testing Security Aspects Of Soa Based ApplicationSoa Testing   An Approach For Testing Security Aspects Of Soa Based Application
Soa Testing An Approach For Testing Security Aspects Of Soa Based ApplicationJaipal Naidu
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarJohn Lewis
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huangKen Huang
 
the-most-dangerous-code-in-the-world
the-most-dangerous-code-in-the-worldthe-most-dangerous-code-in-the-world
the-most-dangerous-code-in-the-worldMartin Georgiev
 
the-most-dangerous-code-in-the-world
the-most-dangerous-code-in-the-worldthe-most-dangerous-code-in-the-world
the-most-dangerous-code-in-the-worldMartin Georgiev
 
Layer 7 Technologies: Enabling Hybrid Enterprise/Cloud SOA
Layer 7 Technologies: Enabling Hybrid Enterprise/Cloud SOALayer 7 Technologies: Enabling Hybrid Enterprise/Cloud SOA
Layer 7 Technologies: Enabling Hybrid Enterprise/Cloud SOACA API Management
 
Identity, Security and XML Web Services
Identity, Security and XML Web ServicesIdentity, Security and XML Web Services
Identity, Security and XML Web ServicesJorgen Thelin
 
Monetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksMonetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksCisco Service Provider
 
Cloud Computing Security Needs &amp; Problems Alon Refaeli
Cloud Computing Security Needs &amp; Problems   Alon RefaeliCloud Computing Security Needs &amp; Problems   Alon Refaeli
Cloud Computing Security Needs &amp; Problems Alon Refaelirefaeli
 
(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013STO STRATEGY
 
Web Services and Devices Profile for Web Services (DPWS)
Web Services and Devices Profile for Web Services (DPWS)Web Services and Devices Profile for Web Services (DPWS)
Web Services and Devices Profile for Web Services (DPWS)Jorgen Thelin
 

Similar a FEDERATED IDENTITY AND WEB SERVICES (20)

Saas security
Saas securitySaas security
Saas security
 
Identity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric IdentityIdentity 2.0 and User-Centric Identity
Identity 2.0 and User-Centric Identity
 
What is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdfWhat is Advanced Web Servicels.pdf
What is Advanced Web Servicels.pdf
 
Web services and SOA [Modified]
Web services and SOA [Modified]Web services and SOA [Modified]
Web services and SOA [Modified]
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
Soa Testing An Approach For Testing Security Aspects Of Soa Based Application
Soa Testing   An Approach For Testing Security Aspects Of Soa Based ApplicationSoa Testing   An Approach For Testing Security Aspects Of Soa Based Application
Soa Testing An Approach For Testing Security Aspects Of Soa Based Application
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huang
 
the-most-dangerous-code-in-the-world
the-most-dangerous-code-in-the-worldthe-most-dangerous-code-in-the-world
the-most-dangerous-code-in-the-world
 
the-most-dangerous-code-in-the-world
the-most-dangerous-code-in-the-worldthe-most-dangerous-code-in-the-world
the-most-dangerous-code-in-the-world
 
Shmat ccs12
Shmat ccs12Shmat ccs12
Shmat ccs12
 
Layer 7 Technologies: Enabling Hybrid Enterprise/Cloud SOA
Layer 7 Technologies: Enabling Hybrid Enterprise/Cloud SOALayer 7 Technologies: Enabling Hybrid Enterprise/Cloud SOA
Layer 7 Technologies: Enabling Hybrid Enterprise/Cloud SOA
 
Identity, Security and XML Web Services
Identity, Security and XML Web ServicesIdentity, Security and XML Web Services
Identity, Security and XML Web Services
 
SAML 101
SAML 101SAML 101
SAML 101
 
Web Services Security - Short Report
Web Services Security - Short ReportWeb Services Security - Short Report
Web Services Security - Short Report
 
Monetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksMonetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless Networks
 
Cloud Computing Security Needs &amp; Problems Alon Refaeli
Cloud Computing Security Needs &amp; Problems   Alon RefaeliCloud Computing Security Needs &amp; Problems   Alon Refaeli
Cloud Computing Security Needs &amp; Problems Alon Refaeli
 
(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013
 
Web Services and Devices Profile for Web Services (DPWS)
Web Services and Devices Profile for Web Services (DPWS)Web Services and Devices Profile for Web Services (DPWS)
Web Services and Devices Profile for Web Services (DPWS)
 
Federated and fabulous identity
Federated and fabulous identityFederated and fabulous identity
Federated and fabulous identity
 

Más de webhostingguy

Running and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test FrameworkRunning and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test Frameworkwebhostingguy
 
MySQL and memcached Guide
MySQL and memcached GuideMySQL and memcached Guide
MySQL and memcached Guidewebhostingguy
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3webhostingguy
 
Load-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serversLoad-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serverswebhostingguy
 
SQL Server 2008 Consolidation
SQL Server 2008 ConsolidationSQL Server 2008 Consolidation
SQL Server 2008 Consolidationwebhostingguy
 
Master Service Agreement
Master Service AgreementMaster Service Agreement
Master Service Agreementwebhostingguy
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...webhostingguy
 
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...webhostingguy
 
Managing Diverse IT Infrastructure
Managing Diverse IT InfrastructureManaging Diverse IT Infrastructure
Managing Diverse IT Infrastructurewebhostingguy
 
Web design for business.ppt
Web design for business.pptWeb design for business.ppt
Web design for business.pptwebhostingguy
 
IT Power Management Strategy
IT Power Management Strategy IT Power Management Strategy
IT Power Management Strategy webhostingguy
 
Excel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for MerchandisersExcel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for Merchandiserswebhostingguy
 
Parallels Hosting Products
Parallels Hosting ProductsParallels Hosting Products
Parallels Hosting Productswebhostingguy
 
Microsoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 MbMicrosoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 Mbwebhostingguy
 

Más de webhostingguy (20)

File Upload
File UploadFile Upload
File Upload
 
Running and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test FrameworkRunning and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test Framework
 
MySQL and memcached Guide
MySQL and memcached GuideMySQL and memcached Guide
MySQL and memcached Guide
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3
 
Load-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serversLoad-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web servers
 
SQL Server 2008 Consolidation
SQL Server 2008 ConsolidationSQL Server 2008 Consolidation
SQL Server 2008 Consolidation
 
What is mod_perl?
What is mod_perl?What is mod_perl?
What is mod_perl?
 
What is mod_perl?
What is mod_perl?What is mod_perl?
What is mod_perl?
 
Master Service Agreement
Master Service AgreementMaster Service Agreement
Master Service Agreement
 
Notes8
Notes8Notes8
Notes8
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
 
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
 
Managing Diverse IT Infrastructure
Managing Diverse IT InfrastructureManaging Diverse IT Infrastructure
Managing Diverse IT Infrastructure
 
Web design for business.ppt
Web design for business.pptWeb design for business.ppt
Web design for business.ppt
 
IT Power Management Strategy
IT Power Management Strategy IT Power Management Strategy
IT Power Management Strategy
 
Excel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for MerchandisersExcel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for Merchandisers
 
OLUG_xen.ppt
OLUG_xen.pptOLUG_xen.ppt
OLUG_xen.ppt
 
Parallels Hosting Products
Parallels Hosting ProductsParallels Hosting Products
Parallels Hosting Products
 
Microsoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 MbMicrosoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 Mb
 
Reseller's Guide
Reseller's GuideReseller's Guide
Reseller's Guide
 

FEDERATED IDENTITY AND WEB SERVICES

  • 1. Web-services & Federated Identity ISSA- Motor City, March 18/04 Paul Madsen, Senior Security Consultant Entrust - Advanced Security Technologies
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Multiple Identities to manage XML-DSIG SOAP SSL/TLS WAP XML SAML HTTP XML Enc WSDL WSS UDDI App 1 App 2 App 3 Domain 1 Domain 2 User Identity Invoker Identity Intermediary Identity Trusted 3 rd Party Identity
  • 7.
  • 8. Basic Web Services Model client service execution SOAP
  • 9. Basic Web Services Model client service service development client development development execution distribution WSDL UDDI SOAP
  • 10. Security Components client service service development client development development security execution distribution WSDL UDDI Services Proxy Gateway Proxy
  • 11.
  • 12. Today client service service development client development development security execution distribution Gateway Gateway
  • 13. Future client service service development client development development security execution distribution Gateway Gateway WS-Policy +
  • 14.
  • 15.
  • 16.
  • 17. Flow Sec-WSDL WSDL UDDI Query Sec-WSDL WSDL SOAP Sec-SOAP + policy Sec-SOAP SOAP SOAP SOAP Client Security Registry Security Service
  • 18.
  • 19. What is Network Identity? A Network Identity is a user ’s overall global set of attributes constituting their various accounts
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Dependencies MSFT/IBM OASIS Liberty WS-Fed (7/8/03) WS-Security 4/5/02) Phase 1 ID-FF 1.1 (1/15/03) Phase 1 ID-FF 1.0 (7/15/02) SAML 1.0 (11/5/02) SAML 1.1 (9/2/03) Phase 1 ID-FF 1.2 (11/12/03) Phase 2 ID-WSF 1.0 (11/12/03) WS-Trust (12/18/02) Phase 3 (08/04) WSS (2/04) 2003 2004 SAML 2.0 (6/04)
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. SAML & Liberty overlap
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39. Request/Response <s:Body>         <ep:Query>             <ep:ResourceID> http://eip.acme.com/sdfjs78 </ep:ResourceID>             <ep:QueryItem itemID=&quot;type&quot;>                 <ep:Select>/ ep:EP/ep:EmployeeType </ep:Select>             </ep:QueryItem>         </ep:Query> </s:Body> <s:Body>         <ep:QueryResponse>             <ep:Status code=&quot;ep:OK&quot;/>             <ep:Data itemIDRef=&quot;type&quot;>                 <ep:EmployeeType>                  JuniorPurchasingAgent                 </ep:EmployeeType>             </ep:Data>         </ep:QueryResponse> </s:Body> Request Response
  • 40.
  • 41.
  • 42.

Notas del editor

  1. This presentation is intended to facilitate discussion about Entrust’s role in securing the Web-services architecture.
  2. Basic Web-services model SOAP intermediaries may exist in the message path, including in the DMZ Security functions may be performed by a SOAP intermediary
  3. Basic Web-services model SOAP intermediaries may exist in the message path, including in the DMZ Security functions may be performed by a SOAP intermediary
  4. Basic Web-services model SOAP intermediaries may exist in the message path, including in the DMZ Security functions may be performed by a SOAP intermediary
  5. Disadvantages Sensitive information, such as private keys sitting in the DMZ Doesn’t protect applications and data and control access to services from within the perimeter A bottleneck: even messages for low-traffic internal services have to traverse go through this control point Advantages – Enforces a strong security policy for the internal network
  6. Today – policy administrators have to collaborate off-line to ensure compatible policies are implemented at client and service. If an end-point deals with many other end-points, then this collaboration could become burdensome.
  7. One possible solution, particularly likely for B2B applications, the policy administrator in the service domain dictates policy. The client domain simply accepts the policy dictated to it. Some aspects of policy are solely a local matter, e.g. audit policy.
  8. App server vendors may provide application firewalls for their own environments. These may have policy consoles, but they won’t be consistent with the SOAP gateway interfaces.
  9. What is Network Identity?   Purpose: To give the audience an idea of what network identity is. Bottom Line Message: Our ‘identity’ involves a lot of personal information about us that is very important to us. We maintain our identity and personal information in many places on the Internet. This represents both a convenience and a challenge. This page provides a definition of what is meant by user identity. You can talk about things such as: Non-network identity - look at how many cards you have in our wallet or purse – each is a separate identity Driver’s license, credit cards, ATM cards, auto insurance cards, employee identification, health insurance cards, motor club cards, membership cards, long distance cards, frequent flyer or hotel cards, etc. Think of all the information about you that exists behind each of these identities Think of all the different places where you maintain identity that is not in your wallet or purse Employment file, health records at your doctors and hospitals, web site accounts, etc
  10. What is Network Identity? Purpose: To demonstrate the different types of identity and personal information that we establish on the Internet and the challenges that maintaining this information on different sites creates. Bottom Line Message: It is difficult, insecure, and an inconvenience to maintain all these identities, user names and passwords, and personal information on multiple sites on the Internet.   This slide builds It starts with the title only and then the definition from the last page fades in, with the column to the right empty You need to ‘page down’ or click to have the column fill in with examples of different potential network identities that automatically phase in and are provided in three sections You need to ‘page down’ or click again to have those examples disappear and three bullet points appear one after the other with related points These bullets can be explained stating such things as: When users set up accounts on the Internet, they often tailor each site to meet their own preferences, including different user names and passwords Sometimes these are different and sometimes they are the same from site to site Users have a hard time remembering what they entered in each individual site, especially user names and passwords Users have to maintain the same personal information at multiple sites and when that information changes, they have to change it at each individual site or risk incorrect information existing with different accounts Keeping track of all of this is very difficult