Internet2 MACE Identity and Access Management (IAM) Projects. integ-tb-kh-02.ppt

Size: px
Start display at page:

Download "Internet2 MACE Identity and Access Management (IAM) Projects. integ-tb-kh-02.ppt"

Transcription

1 Internet2 MACE Identity and Access Management (IAM) Projects integ-tb-kh-02.ppt Keith Hazelton, U Wisconsin With help from Tom Barton and Walter Hoehn JA-SIGDecember 5, 2005, Austin, TX

2 integ-tb-kh-02.ppt Identity and Access Management (IAM) service-based model & Internet2 Middleware Initiative (I2MI) tools I2MI suite and integration techniques Addressing gaps in the tools and the model Harmonization objectives for I2MI tools 2

3 Identity & Access Management in the IT Ecosystem Each person s online activities are shaped by many Sources of Authority (SoAs) or Systems of Record (SoRs) Resource managers Program/activity heads Other policy making bodies Self Common middleware infrastructure should be operated centrally To not oblige departments/programs/activities to build their own core middleware Management of the information it conveys should be distributed Hook up all of those SoAs to the middleware 3

4 IAM and Application Integration 4

5 From Construction to Integration Construction Raw materials into systems Integration Subsystems into whole systems Multiple systems into ecosystems We re all moving from construction to integration The integration story across IAM services and with IAM services 5

6 IAM: Generic Services Verb Reflect Join Manage Provide Objects Data of interest from systems of record into registry, directory Identity information across systems Credentials, group memberships, affiliations, privileges, services, policies IAM info via - relay thru run-time request/response - provisioning into App/Service stores Authenticate (AuthN) Claimed identities Authorize (AuthZ) Access or denial of access Log Usage for audit 6

7 Reflect, Join, and Manage Credentials: One mapping to I2MI Systems of Record Enterprise Directory Stdnt HR Registry LDAP Other 7

8 Manage IAM Info and Provide it via run-time calls or provisioning Systems of Record Enterprise Directory Apps / Resources 8

9 IAM Services mapped to I2MI Tools Systems of Record Enterprise Directory Central AuthN/ WebISO Apps / Resources Grouper Signet Shibboleth 9

10 Relative Roles of Signet & Grouper Role-Based Access Control (RBAC) model Users are placed into groups Privileges are assigned to groups Groups can be arranged into hierarchies to effectively bestow privileges Signet manages privileges Grouper manages, well, groups Grouper Signet 10

11 Nutshell Description of Grouper Mix of manual and automation processes manage a common Group Registry Many sources of authority are reflected in group memberships Automation processes provision info from the Group Registry into LDAP, AD, directly into app-specific databases, or Wherever the value of the info warrants spending the resources to place it there Group management authority is delegatable 11

12 Grouper Groups Attributes of groups Names: name, displayname, guid Description Members Can extend the set of attributes to support groups with more specific purposes Subgroups, compound groups, and aging Stored in an RDBMS, the Group Registry 12

13 Signet Overview Analysts define privileges in Signet in business terms and specify associated permissions. Signet presents this view in a Web UI where users assign privileges and delegate authority across all areas in which they have authority. Signet internally maps assigned privileges into systemspecific terms needed by applications. Privileges are exported, transformed, and provisioned into applications and infrastructure services. 13

14 Business View Student Admin Course Support Add/Drop students Schedule Classes Which term Which campus Financial Aid Process Applicants Award Scholarships Manage Accounts For school From Fund For fund Clinical Trial Protocol A Patient Records Materials Control Read/Write Qty/day Administration Manage Grant Lab Access $ constraints Hours Subsystems organizing Categories Functions actions Limits 14

15 Systems View Signet internally maps assigned privileges into system specific terms needed by applications. Permissions Atomic units of control that map to specific access rules in systems. Includes limits that must be evaluated when interpreting permissions. Resources The target of a specific privilege; things that have access rules to control their use. 15

16 Systems Integration Privileges are exported, transformed, and provisioned into integrated systems and infrastructure services. Privileges document XML representation of privileges for an individual or group. Compatible with SAML and XACML representations of Subjects and Access Rules. Integration Site-specific 16

17 Privilege Elements by Example By authority of the Dean principal investigators who have completed training can approve purchases in the School of Medicine for research projects up to $100,000 until January 1, 2006 as long as a faculty member at grantor grantee (group/role) prerequisite function scope resource limit conditions Privilege Lifecycle 17

18 IAM Services mapped to I2MI Tools Systems of Record Enterprise Directory Central AuthN/ WebISO Apps / Resources Grouper Signet Shibboleth 18

19 Empty spaces in the I2MI toolbox Those pesky lines between the boxes-- left to the reader The lines are where service integration happens Metadirectory functions Provisioning (in the general sense)?? Should I2MI try to help with integration tasks? 19

20 Modeling the lines: Initial thoughts Data flows? Event publication on a service bus Content-based routing Service invocations? SAML request/responses WS-* wide world of web services Is it a particle or a wave? Document-oriented transformation services 20

21 New under the sun Roland Hedberg s deep design (mantra: OM) Content based information routing Governed by embedded policy engine (SPOCP s brain) Walter Hoehn s Nth generation provisioner, Nexus Consumer-specific mappings & transforms configured transparently 21

22 Legacy provisioning challenges Difficult to maintain Expanding list of managed resources Outdated technology New ERPs, upgrades Expanding customer base 22

23 Evolution vs. Revolution Validate approach along the way Realize the benefits sooner Avoid extended design process Ease the pain of conversion 23

24 Nexus: Basic Requirements Robust technologies Resource connector API Timely updates to consumer systems Resource integrity verification Change Management / Component Testing Administrative interfaces 24

25 Nexus Features Runtime configuration (mapping logic) Single provisioning engine Integrity verification / repair Dependency analysis Abstract consumer interface (SPML) Robust queueing Multi-threaded Platform independent 25

26 Benefits of run-time provisioning Clearer data relationships Verifiable data integrity Re-use Change management 26

27 Nexus 27

28 NEXUS 28

29 NEXUS 29

30 NEXUS 30

31 Provisioning configuration QuickTime and a TIFF (LZW) decompressor are needed to see this picture. 31

32 Provisioning config., cont. QuickTime and a TIFF (LZW) decompressor are needed to see this picture. 32

33 Provisioning config., cont. QuickTime and a TIFF (LZW) decompressor are needed to see this picture. 33

34 Nexus command modes QuickTime and a TIFF (LZW) decompressor are needed to see this picture. 34

35 Nexus command modes, cont. QuickTime and a TIFF QuickTime (LZW) decompressor and a are needed TIFF (LZW) to see decompressor this picture. are needed to see this picture. 35

36 Nexus command modes, cont. Daemon mode nexus --daemon --map=conf/provisioning.map.xml --file=conf/nexus.properties Runs continuously Queues and processes registry changes Keeps all consumer systems synchronized 36

37 Nexus command modes, cont. Show mode nexus --show=wassa --map=conf/provisioning.map.xml --file=conf/nexus.properties Displays correct provisioning for a given user Can be run for a set of users 37

38 Nexus command modes, cont. Verify mode nexus --verify=wassa --map=conf/provisioning.map.xml --file=conf/nexus.properties Displays synchronization status for a given user Helps in diagnosing account problems Useful for testing configuration changes Can be run for a set of users 38

39 Nexus command modes, cont. Repair mode nexus --repair=wassa --map=conf/provisioning.map.xml --file=conf/nexus.properties Fully synchronizes a user s data in all consumers Helpful in fixing account problems Useful for adding new consumer resources Can be run for a set of users 39

40 Grouper & Signet: Site IAM Integration Requirements Subject - a person, group, application, or other type of object whose identity is managed by your IAM system Abstract the underlying technology and data model from a relying application Enable identifier namespaces to be selected to match application needs Username vs. opaque registryid vs. Scenarios Map authenticated user to internal security principal Search for or select subjects within application 40

41 Subject API: Integration with Site s IAM 41

42 More Subject API Info Subject and Source interface specs are at v0.1 they may yet change Searching Some per-subjecttype methods? Grouper includes a GroupSourceAdapter that is a provider of group subjecttypes from the Group Registry Subject API will not support the Join function JDBC source adapter is included now, JNDI source adapter will be provided in a subsequent release 42

43 Harmonizing I2MI Tools: Objectives We should eat our own dogfood Common technique for integration with site IAM infrastructure Capable of integration with external privilege and/or group management Common or coordinated web presence, documentation, product placement info Just starting to address this Steering group formed & documentation resource assigned 43

44 Further I2MI Integration Needs Cookbook of ways to deploy I2MI tools to address various attribute and access management scenarios Mechanism for sustained viability of I2MI tools On-going support Post-working-group model for continued development & QA 44

45 Alternative boxes & lines The service model could be implemented with any number of toolsets I2MI Home-grown (perl scripts, SQL tables & procedures, OpenLdap directories, ) Vendor offerings Novell, Sun, Oracle, Microsoft, IBM, 45

46 Q & A grouper hazelton@doit.wisc.edu 46

47 47