24
IDENTITY MANAGEMET AND ACCESS CONTROL هدوی م رگان مه لان ی گ گاه ش ن ر دا ت و ی پ م ی کا س د ی ه م روه گ ار ادی ی س ا. . mahdavi@guilan ac ir

IDENTITY mANAGEMET and Access Control

  • Upload
    susan

  • View
    44

  • Download
    2

Embed Size (px)

DESCRIPTION

IDENTITY mANAGEMET and Access Control. مهرگان مهدوی استادیارگروه مهندسی کامپیوتر دانشگاه گیلان [email protected]. فهرست مطالب. مقدمه در خصوص Authentication مدیریت هویت متمرکز Single Sign On Federated Identity Management SAML Shibboleth نتیجه گیری. مقدمه. - PowerPoint PPT Presentation

Citation preview

Page 1: IDENTITY  mANAGEMET  and Access Control

IDENTITY MANAGEMET AND ACCESS CONTROL

مهرگان مهدوی

استادیارگروه مهندسی کامپیوتر دانشگاه گیالن[email protected]

Page 2: IDENTITY  mANAGEMET  and Access Control

فهرست مطالب

Authentication مقدمه در خصوص • مدیریت هویت متمرکز•• Single Sign On• Federated Identity Management• SAML• Shibboleth نتیجه گیری•

Page 3: IDENTITY  mANAGEMET  and Access Control

مقدمه

• Authentication ودیتAک موجAفت از یAک صAتی یAدیق درسAنی تصAه معAب میباشد.

ممکن است تصدیق هویت یک شخص یا یک برنامه باشد.•

• Token-based“ :هAی کAوال اساسAر این سAنی بAمبتWhat you have”?• Key card• Bank card• Smart Card

• Biometric“ :مبتنی بر این سوال اساسی کهWho you are”?

• Knowledge-based“ :هAی کAوال اساسAر این سAنی بAمبتWhat you know”?• Textual• Graphical

Page 4: IDENTITY  mANAGEMET  and Access Control

IDENTITY MANAGEMENT

• There are different systems at institutionsE.g. Email, Finance, Student portal, etc.

• Currently, Identity Management often fragmented (several directories or databases)

Page 5: IDENTITY  mANAGEMET  and Access Control

SunOne

OraclePeople Data

System

eDir

eDirStudent Portal

Web AuthNMail

Calendar

Password Management

Forgot passwordHelpdesk

Printer service

Finance System

Page 6: IDENTITY  mANAGEMET  and Access Control

SunOne

OraclePeople Data

System

eDir

eDirStudent Portal

Web AuthNMail

Calendar

Password Management

Forgot passwordHelpdesk

Printer service

Finance System

Sync

Sync Password

Sync

Sync

Page 7: IDENTITY  mANAGEMET  and Access Control

حل راه

•Same Sign On ( یک از و UseridاستفادهPassword) سیستمها همه در

•Key Ring) کلید ) دسته•Single Sign On

Page 8: IDENTITY  mANAGEMET  and Access Control

SINGLE SIGN-ON پیاده سازی

Authentication استفاده از یک دایرکتوری مرکزی جهت •

تصدیق کاربران بر اساس این دایرکتوری مرکزی•

اسAاس • بAر کAاربران مجوزهAای تعAیین Credential اربرAک هAای مربوطه

Page 9: IDENTITY  mANAGEMET  and Access Control

SINGLE SIGN-ON پیاده سازی

بین چند سازمان چگونه عمل خواهد کرد؟Single Sign Onسوال:

SAML (Security Assertion Markup Language)استفاده از

Page 10: IDENTITY  mANAGEMET  and Access Control

Federation

Page 11: IDENTITY  mANAGEMET  and Access Control

Federation

Page 12: IDENTITY  mANAGEMET  and Access Control

SAML

• Security Assertion Markup Language (SAML) is an XML-based open standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions).

• SAML is a product of the OASIS Security Services Technical Committee.

• SAML assumes the principal (often a user) has enrolled with at least one identity provider.

• This identity provider is expected to provide local authentication services to the principal

Page 13: IDENTITY  mANAGEMET  and Access Control

SAML ASSERTIONS

<saml:Assertion ...> ... </saml:Assertion>

• SAML assertions are usually transferred from identity providers to service providers. • Assertions contain statements that service providers use to make access-control decisions. • Three types of statements are provided by SAML:

• Authentication statements• Attribute statements• Authorization decision statements

Page 14: IDENTITY  mANAGEMET  and Access Control

SAML ASSERTIONS

• Authentication statements assert to the service provider that the principal did indeed authenticate with the identity provider at a particular time using a particular method of authentication.

• An attribute statement asserts that a subject is associated with certain attributes. An attribute is simply a name-value pair. Relying parties use attributes to make access-control decisions.

• An authorization decision statement asserts that a subject is permitted to perform action A on resource R given evidence E. The expressiveness of authorization decision statements in SAML is intentionally limited. More-advanced use cases are encouraged to use XACML instead.

Page 15: IDENTITY  mANAGEMET  and Access Control

XACML (eXtensible Access Control Markup Language)• An Attribute Based Access Control system

(ABAC)

• Attributes associated with a user or action or resource are inputs into the decision of whether a given user may access a given resource in a particular way.

• Role-based access control (RBAC) can also be implemented in XACML as a specialization of ABAC.

Page 16: IDENTITY  mANAGEMET  and Access Control
Page 17: IDENTITY  mANAGEMET  and Access Control

Shibboleth

• Shibboleth is an Internet2 Middleware Initiative project

• An architecture and open-source implementation for Identity management and federated identity-based authentication and authorization (or Access control) infrastructure based on SAML

• Federated identity allows for information about users in one security domain to be provided to other organizations in a federation

• This allows for cross-domain single sign-on and removes the need for content providers to maintain user names and passwords.

• Identity providers (IdPs) supply user information, while service providers (SPs) consume this information and give access to secure content.

Page 18: IDENTITY  mANAGEMET  and Access Control
Page 19: IDENTITY  mANAGEMET  and Access Control

XML

<bibliography><paper ID= "object-fusion">

<authors><author>Y. Papakonstantinou</author><author>S. Abiteboul</author><author>H. Garcia-Molina</author>

</authors><fullPaper source="fusion"/><title>Object Fusion in Mediator

Systems</title><booktitle>VLDB 96</booktitle>

</paper></bibliography>

Page 20: IDENTITY  mANAGEMET  and Access Control

Advantages of XML

• Human-readable• Machine-readable • Standard format for data interchange• Possible to validate• Extensible• can represent any data• can add new tags for new data formats

Page 21: IDENTITY  mANAGEMET  and Access Control

Well-Formed vs. Valid

• Well-Formed: Structure follows XML syntax rules

• Valid: Structure conforms to a DTD

Page 22: IDENTITY  mANAGEMET  and Access Control

Adding Structure and Semantics

• XML Document Type Definitions (DTDs)

• XML Schema• defines structure and data types• allows developers to build their own libraries

of interchanged data types

Page 23: IDENTITY  mANAGEMET  and Access Control

گیری نتیجه

مشکالت • از بسیاری میتواند متمرکز هویت مدیریتچندین را Passwordو Usernameنگهداری

دهد کاهشکاریردهایی • در هویت مدیریت جهت مکانیزمی به نیاز

نطایر و دیجیتال های داده گذاشتن اشتراک به نظیرآن

•SAML هویت مدیریت جهت مکانیزم یک•Shibboleth از سازی پیاده SAMLیک

Page 24: IDENTITY  mANAGEMET  and Access Control