Design Summit - Security Roadmap - Keenan Brock, Alberto Bellotti

16

Click here to load reader

description

This presentation is about how ManageIQ helps with enterprise security. For example, ManageIQ allows admins to design policies that recognize and decommission resources that are vulnerable to specific security exploits. On the roadmap is the ability to integrate with other security tools. For more on ManageIQ, see http://manageiq.org/

Transcript of Design Summit - Security Roadmap - Keenan Brock, Alberto Bellotti

Page 1: Design Summit - Security Roadmap - Keenan Brock, Alberto Bellotti

Security: Trusting Identities

Page 2: Design Summit - Security Roadmap - Keenan Brock, Alberto Bellotti

IntroductionsAlberto Bellottigithub: abellotti

Keenan Brockgithub: kbrocktwitter: @kbrock

Page 3: Design Summit - Security Roadmap - Keenan Brock, Alberto Bellotti

Overview

● Definition● Mechanics● Components of the system● Goals● Demo● Future

Page 4: Design Summit - Security Roadmap - Keenan Brock, Alberto Bellotti

Definition: Identity and Trust

● Authentication○ What is your identity?

● Authorization○ What do I trust you to do?

● Auditing○ What did you actually do?

Page 5: Design Summit - Security Roadmap - Keenan Brock, Alberto Bellotti

Goals: Identity and Trust

● Fewer copies● Simpler definitions● Leverage existing definitions

○ identity stores○ trust profiles

Page 6: Design Summit - Security Roadmap - Keenan Brock, Alberto Bellotti

Goals: Desired Results

● Simplify appliance configuration● Simplify access for users (SSO)● More secure system

Page 7: Design Summit - Security Roadmap - Keenan Brock, Alberto Bellotti

Accessing Auth* sources

PostgresVmdb

Amazon

ReST

IdM/LdapKerberos LDAP

Apache

sssd/pamkerberos

UI/WS Workers

LdapLDAP

AD

ApplianceConsole

/etc/passwdTerminal

Aws Client

KDC

Appliance

IdM

Page 8: Design Summit - Security Roadmap - Keenan Brock, Alberto Bellotti

Mechanics?

● Client○ Provides identity

● Server○ Has a copy of identity○ Fetch stored identity○ grant trust

Page 9: Design Summit - Security Roadmap - Keenan Brock, Alberto Bellotti

What is a Client and Server

a system or component that calls another

● User● Computer● Component

Page 10: Design Summit - Security Roadmap - Keenan Brock, Alberto Bellotti

Mechanics: Client’s Identity

● Password● Kerberos ticket (keytab)● IP Address● Client side certificates*● Saml (SSO)*

* future

Page 11: Design Summit - Security Roadmap - Keenan Brock, Alberto Bellotti

Mechanics - Copy of Identity

● plaintext● md5● aes - symmetric cipher (v2_key)● id_rsa.pub

Goal: protect the identity

Page 12: Design Summit - Security Roadmap - Keenan Brock, Alberto Bellotti

Mechanics - Fetch Identity

● Postgres table (e.g.: pg_shadow, users)● host based (firewall)● Filesystem (e.g.: /etc/passwd)● LDAP (AD, IdM)● Kerberos (IdM)*● Amazon (IAM)● Certificate Authority** generated remotely, stored locally

Page 13: Design Summit - Security Roadmap - Keenan Brock, Alberto Bellotti

Accessing Auth* sources

PostgresVmdb

Amazon

ReST

IdM/LdapKerberos LDAP

Apache

sssd/pamkerberos

UI/WS Workers

LdapLDAP

AD

ApplianceConsole

/etc/passwdTerminal

Aws Client

KDC

Appliance

IdM

Page 14: Design Summit - Security Roadmap - Keenan Brock, Alberto Bellotti

Mechanics - Grant Trust

● same password or md5● correct ip / user● ticket has correct origin

Page 15: Design Summit - Security Roadmap - Keenan Brock, Alberto Bellotti

IdM/Kerberos SSO Demo

● External Authentication● Web-UI Login● ReST API access● Web-UI SSO Login

All using IPA credentials

Page 16: Design Summit - Security Roadmap - Keenan Brock, Alberto Bellotti

Going forward

● Tighter Authorization of components● Moving LDAP/AD configuration to

console/Apache● Leveraging Apache/IdM

○ AD○ SAML○ 2-Factor Authentication