Gaps and Overlaps in Identity Management...

25
Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference Workshop, EIC 2009 Dale Olds Novell Distinguished Engineer [email protected]

Transcript of Gaps and Overlaps in Identity Management...

Page 1: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

Gaps and Overlaps in Identity Management SolutionsOASIS Pre-conference Workshop, EIC 2009

Dale OldsNovell Distinguished Engineer

[email protected]

Page 2: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

© Novell, Inc. All rights reserved.2

Overview

• Problems with identity management today– It's a mess, why can't it be easy enough for Grandma?

– Online relationships need more intuitive usability, context, courtesy, and respect – as well as security.

• Significant improvements and trends– Cross domain identity systems and the identity provider model

– More authorization less identification

– Token transformation/combination rather than connect/retrieve

• Overlaps and gaps– Are overlaps bad?

– Some examples of overlaps and gaps

– What can be done about them

Page 3: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

Problems of Identity Managementin the Real World

Page 4: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

© Novell, Inc. All rights reserved.4

Simple Beginnings

Web SiteCorp Portal

UsernamePassword

It seemed like such a good idea at the time...

Page 5: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

© Novell, Inc. All rights reserved.5

Multiplication of Network Services

5 passwordpolicies

5 accounts

ExternalInstant

MessagingSystem

DepartmentalFile and

Print

CorporateEmail

CorporateHR Web Site

CorporateDocument

Management

5 administrators

UsernamePassword

UsernamePassword

UsernamePassword Username

Password

UsernamePassword

Page 6: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

© Novell, Inc. All rights reserved.6

Boundaries and Identity Management

2 passwordpolicies

2 accounts3 synced accounts

Access Manager

IdentityProvider

ExternalInstant

MessagingSystem

Access Manager

DepartmentalFile and

Print

CorporateEmail

IdentityVault

CorporateHR Web Site

CorporateDocument

Management

Synch

Redirect

Page 7: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

© Novell, Inc. All rights reserved.7

Obsolete and Evolving Services

ObsolutePoint of Sale System

DepartmentalWiki

DepartmentalBlog

4 passwordpolicies

4 accounts3 synced accounts

Access Manager

IdentityProvider

ExternalInstant

MessagingSystem

Access Manager

DepartmentalFile and

Print

CorporateEmail

Synch

Redirect

IdentityVault

CorporateHR Web Site

CorporateDocument

Management

UsernamePassword

Page 8: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

© Novell, Inc. All rights reserved.8

Changing Boundaries, Dissolving Perimeters

ObsolutePoint of Sale System

DepartmentalWiki

DepartmentalBlog

6 passwordpolicies

7 accounts2 synced accounts

Open ID

Access Manager

IdentityProvider

ExternalInstant

MessagingSystem

Access Manager

DepartmentalFile and

Print

Renegade Department

CorporateEmailNew Email

System

MegaCorporate

HR

IdentityVault

CorporateHR Web Site

CorporateDocument

Management

Home Access

Mergersand

Acquisitions

?

?

InformationCard

Synch

Redirect

UsernamePasswordAlso, need to add

compliance reporting

Page 9: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

© Novell, Inc. All rights reserved.9

It's Not So Simple Anymore

ObsolutePoint of Sale System

DepartmentalWiki

DepartmentalBlog

6 passwordpolicies

7 accounts2 synced accounts

Open ID

Access Manager

IdentityProvider

ExternalInstant

MessagingSystem

Access Manager

DepartmentalFile and

Print

Renegade Department

CorporateEmailNew Email

System

MegaCorporate

HR

IdentityVault

CorporateHR Web Site

CorporateDocument

Management

Home Access

Mergersand

Acquisitions

?

?

InformationCard

Synch

Redirect

UsernamePassword

•Unknown accounts, lost track•Unknown password policies•Reset password every time•Authorization unpredictable•Corporate compliance reporting difficult

Weare

here

Page 10: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

© Novell, Inc. All rights reserved.10

Statement from panel discussion at

EIC 2008

(as best as I can remember it)

“Internet identity systems won't be widely used until they are simple enough for grandma, and she will only remember one username and password.”

The Problem with Identity Systems

I could not disagree more.

Page 11: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

© Novell, Inc. All rights reserved.11

Granny Needs a Richer Identity System

We don't need to dumb it down for her. She can easily handle complex forms like politeness. She can handle context, courtesy, respect … relationships.

Politeness is calibrated to the level of the threat to the hearer's face. The threat level in turn depends on the size of the imposition, the social distance from the hearer (the lack of intimacy or solidarity), and the power gap between them.The Stuff of Thought – Language as a Window into Human Nature, by Steven Pinker

Page 12: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

© Novell, Inc. All rights reserved.12

The Real Problem for Identity Systems

• The problem is not to make is simple enough – as in one username and password – for granny.

• The problem is that it needs to be intuitive, contextual, and nuanced enough for granny to express the subtleties and richness of her relationships.

• These issues exist in employee and customer relationships as much as they do for granny.

• Granny manages it all just fine in real life – better than most technologists.

Page 13: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

Trends to Help Granny and the Rest of Us

Page 14: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

© Novell, Inc. All rights reserved.14

Multi-domain Identity Systems and the Identity Provider Model

• In the picture of the current mess, most problems are related to one user account per online service.

• The Identity Provider model separates (frees) the user account, authentication, and identity information from the online service.

• Federation and user-centric approaches all follow the model, e.g. SAML, WS-Fed, OpenID, Information Cards, OAuth.

• The identity provider model is just as useful within an enterprise (across departmental boundaries) as it is for consumer Internet services (multiple service providers).

• This is good timing since the enterprise walls are coming down.• Cloud computing services are accelerating the collapse.

Page 15: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

© Novell, Inc. All rights reserved.15

Less Identification More Authorization

• We are moving to less identification by a service.

• Instead access is granted due to token contents rather than authentication.

• Authentication is external to application or service, only to Identity Providers.

– The anonymous student health clinic story

• The difficulty is that it involves a paradigm shift for programmers who are used to asking “who is this and what can they do” (authentication then authorization).

Page 16: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

© Novell, Inc. All rights reserved.16

Token Transformation & Combination

• Many identity information transactions involve more than 2 identities.

– The identity provider(s) who assert the information

– The user(s) who release the information

– The service that uses the information

• Token and document transformation/combination rather than connection/credential.

– Token based (e.g. SAML) rather than connection (LDAP)

• For example, consider the grade school field trip permission system.

Page 17: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

Progress, Overlaps, and Gaps

Page 18: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

© Novell, Inc. All rights reserved.18

Progress in Internet Identity Systems

• Last year this stuff (OpenID, information cards, user-centric, federation) was a hot topic, now...

– “Don't hear much about it anymore...”– “Not much traction...”– “So... how's that identity metasystem coming?”

• However, progress has been steady and fast:– Before the dawn of time there were Directory Services which begat LDAP. Shortly

thereafter the Liberty Alliance begat federation...

– 2006: Protocol consolidation and open implementation issues resolved (Open Specification Promise, OpenID 2.0 started, and, um, federation kept going).

– 2007: Dozens of interoperable implementations developed and demonstrated.

– 2008: Vendor supported products developed and early adopters deploy.

– 2009: Started with shipping products (insert shameless Novell plug here), government deployments scheduled, even identity conference usage (like EIC).

• What's next? It should be real world deployments.

Page 19: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

© Novell, Inc. All rights reserved.19

Are Overlaps Bad?

• The world runs on a financial services model that is similar to the identity provider model

• Checks similar to OpenID: easy to implement, but spoofable.

• Information cards similar to credit/debit/business cards: useful for many things, but more difficult to implement.

• Electronic transfers between linked accounts are like federation: difficult to set up trust relationship, but essential.

• All are useful for some scenarios.

Page 20: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

© Novell, Inc. All rights reserved.20

Some Overlaps are Not Useful

• Overlap of browser plugins and client agents between protocol families are counter-productive.

• Perceived “protocol wars” in the press are distracting.

• Semantic clashes (impedance mismatches) between protocol families are an insidious problem.

– For example, there are various approaches and meaning as to how to transfer a SAML token via OpenID.

– Syntax and protocol are easy for specific use cases.

– Synchronizing schema and semantics of a general (and good) underlying identity model is hard.

– But that's what we should do.

Page 21: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

© Novell, Inc. All rights reserved.21

Gaps 1

• Terms and conditions should be attached to claims– If your service asks for identity information, make it clear to the user

(and attach it to the data) the terms and conditions to which the user agreed, e.g. did you promise not to sell it to spammers?

• User-agent string pollution– Some identity selectors are advertising themselves in inappropriate

ways.

– The user agent string is for diagnostic messages, not client capabilities.

– Show some respect to granny. Offending vendors, you know who you are.

• Multiple information card support – Many real-word information card use cases involve multiple sources of

identity information (or cards), yet the user interface does not support this.

Page 22: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

© Novell, Inc. All rights reserved.22

Gaps 2

• Auditing instrumentation, standards, tools– Who did what, when?

– Appears to be surprisingly little interest from vendors and implementors

– However, XDAS is active and viable.

• Receipts– When granny buys something (a transaction involving a more

powerful entity) she gets a receipt.

– Allows her recourse in case of a dispute

– Allows her to mercilessly harangue the unfortunate kid at the returns counter

Page 23: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

© Novell, Inc. All rights reserved.23

Questions?

For me: Dale Olds <[email protected]>

For Granny: Are you sure you want to ask? If so send them to me, I will relay them.

Page 24: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference
Page 25: Gaps and Overlaps in Identity Management Solutionsvirtualsoul.org/stuff/OASIS_Gaps_and_Overlaps_in_IdM-2.pdf · Gaps and Overlaps in Identity Management Solutions OASIS Pre-conference

Unpublished Work of Novell, Inc. All Rights Reserved.This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.

General DisclaimerThis document is not to be construed as a promise by any participating company to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. Novell, Inc. makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for Novell products remains at the sole discretion of Novell. Further, Novell, Inc. reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.