This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its...

83
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other authorized recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates. © 2011 Gartner, Inc. and/or its affiliates. All rights reserved. Ian Glazer Research VP, Agenda Manager [email protected] @iglazer Looking at federation through enterprise eyes

Transcript of This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its...

Page 1: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other authorized recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates.© 2011 Gartner, Inc. and/or its affiliates. All rights reserved.

Ian Glazer

Research VP, Agenda Manager

[email protected]

@iglazer

Looking at federation through enterprise eyes

Page 2: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Recent Past

Page 3: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Federation=

SSO

Page 4: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Hub and Spoke

Page 5: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Network of peers

Page 6: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Except

• Both hub and spoke, as well as, network of peers faced challenges scaling.- Some of these issues were technical.

- Some of these issues were value-related.

• Communities of interest formed to address both challenges.

Page 7: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Today's World

Page 8: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Enterprise federation today

• Majority of enterprises do not participate in federations per se.

• However, enterprises do use federation technologies to connect to externally-provided services.

• Federation found its enterprise stride via SaaS adoption.

Page 9: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Status Quo

Page 10: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Welcome SaaS and Its Friends

Page 11: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Welcome SaaS and Its Friends

Big shiny object!

Page 12: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Federation=

Way to attach SaaS to the enterprise

=SSO

Page 13: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Joining a Federation(The Short Version)

Page 14: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Sign business agreement

Page 15: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Except

• The business isn’t involved.

• Lawyers are involved.- Appropriate use of attributes and other information is a

legal agreement.

• Business expectations are assumed to be met but inherent value of the service.

Page 16: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Determine RP’s needs

Page 17: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Except

• This isn’t a dialogue.

• “Provide the following attributes.”

• But what about entitlements?

• But what about authorization policies?

Page 18: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Start building SAML metadata

Page 19: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Map local attributes to RPs entitlements

and attributes

Page 20: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Except

• These mappings are poorly documented

• Lots of tribal knowledge, less institutional knowledge

• Brittle mappings aren’t contextual friendly

Page 21: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Perform telekinesis

Page 22: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Perform telekinesis?

Page 23: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Action at a distance

Page 24: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Telekinesis

• Want to effect the authorizations in a remote system

• Provisioning local objects to effect remote authorization state

• But this is a hoax- Provision remote objects too

Page 25: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Spray old data everywhere

• Lots of attributes being pushed

• But now with less visibility!- RPs don’t know the quality of the data

- RPs don’t know the data’s “Sell By” date

- Information sources don’t always know where the data went

Page 26: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Today's Federated ProvisioningApproaches

Page 27: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

How to Connect People toFederated/Cloud Apps?

Page 28: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

How to Connect People toFederated/Cloud Apps?

?

Page 29: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Federation=

Way to attach SaaS to the enterprise

=SSO

Page 30: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Variety of techniques exist

• Broad spectrum of federated provisioning techniques- Manual one-off

- “Traditional”

- Creative

• Service providers lack consistency

Page 31: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Service Provider User Management Tools

• User management console:- Allows administrator to manually create and manage

user accounts and privileges

• Bulk load operations:- Most support .csv file uploads

• Integration tools:- Proprietary user management APIs

- Directory Synchronization

- Support for IAM standards such as LDAP, SAML, SPML, etc.

Page 32: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

• User management console- Allows administrator to manually create and manage

user accounts and privileges

• Bulk load operations- Most support .csv file uploads

• Integration tools- Proprietary user management APIs

- Directory Synchronization

- Support for IAM standards such as LDAP, SAML, SPML, etc.

Majority

Service Provider User Management Tools

The select few

Page 33: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

You Call This a Provisioning Tool?

Page 34: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

You Call This a Provisioning Tool?

Yes!

Page 35: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Local Connector

A target application is just a target.

Page 36: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Cloud-Based Connector

Everything is better in the cloud?

Page 37: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

To the Cloud With Your Provisioning Server

Page 38: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Directory Synchronization

Hosted

On-Premises

SaaS App Identity Repository

Sync Server Enterprise Identity Store (LDAP or AD)

User Attributes

Change Detection

Page 39: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Just-In-Time Provisioning via SAML

Page 40: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Welcome back!

Page 41: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Except

• All of these approaches only solve a portion of the problem:- Administrative authorization

- SSO

• What happens with attributes and entitlements that get pushed to the federation partner/service?

• The enterprise fixation with federated authentication is blinding it from the larger issues – federated authorization

41

Page 42: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Administrative & runtime

authorization

Page 43: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Two Kinds of Authorization Policies

Page 44: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Administrative Policies

• Sets up attributes and entitlements needed to enable access

• Ahead of their use

Page 45: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

• Provisioning

• Identity and access governance (IAG)

- Access policy management

- Role management

• In people’s heads

- Workflow as manually enforced policies

Where Do Administrative Policies Live?

Page 46: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

• Authorizes user to perform an action based on context

• Context = attributes, entitlements, and external factors

Runtime Policies

Page 47: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

• Applications

• Web access management

• Externalized authorization management

• Federated services

Where Do Runtime Policies Live?

Page 48: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Administrative Policy

Page 49: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

... in Action

Page 50: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Runtime Policy

Page 51: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

... in Action

Page 52: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Two Policies; One Goal

Page 53: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Attributes and Entitlements Dependencies

Page 54: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

• Each type of policy is maintained by separate teams with separate change management processes

• Neither kind of policy is aware of the other

• The teams maintained these policies are usually disconnected as well

A Part and Yet Apart

Page 55: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

• To completely answer who can do what, both administrative and runtime environments must be examined

• Lack of awareness and linkage of both environments prevents complete answers

• Disconnected policies inhibit traceability

• We do not know if we are faithfully fulfilling business controls

The Problem

Page 56: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Things don’t get better in a federated scenario

Page 57: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Brain surgery with Buckaroo Banzai

57

No, no! Don’t tug on that.

You never know what it is attached to.

Page 58: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Manipulating attributes has unknown and unknowable consequences

Page 59: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Things don’t get better in a federated scenario

• Policy coherence is harder to achieve- Administrative policies are typically tribal in nature

- Runtime policies are tribal in nature… and maintained by a different tribe!

- Examining both sets of policies together is nearly impossible

• Federated SSO is not hard to establish- What happens after sign-on is crucial… and it is often

well out of sight of the IdP

59

Page 60: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Looking into the near future

Page 61: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

New developments in federated provisioning

Page 62: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Cloud HR Is the Lifecycle Feed

Page 63: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Cloud Directory Is the New Lifecycle Feed

Page 64: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Token Flipper Is the New Lifecycle Feed

Page 65: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Token Flipper Is the New Connector

Page 66: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Multi-Protocol JIT

Page 67: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

But all of these solutions

67

Page 68: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

will eventually fail.

Page 69: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Federation=

Way to attach SaaS to the enterprise

=SSO

Page 70: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Enterprise fixation with federated

authentication is blinding it from the

larger issue.

Page 71: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Federated Authorization

Page 72: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Shared Problems

Page 73: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Problems with our administrative tools

• Traditional on-premise administrative IAM tools are push-oriented.- These tools are “copy” not “reference” in nature.

• Policies should be provisioned, not attributed- Attributes should be referenced not copied.

• Authorization policies are increasingly split between administrative and run-time environments.

Page 74: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Problems with our runtime tools

• Runtime authorization environments often have opaque policies.- Hard to execute compliance-related activities.

• Attribute and entitlement meaning is inferred and codified in varying ways.

• What is acceptable use doesn’t always make it into the authorization policies.

74

Page 75: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Problems with federated services

• There are inconsistent ways of discovering entitlements- And on-premise tools (especially IAG) don’t know to

deal with that

• Authorization policies is:- Sometimes managed by the enterprise

- Sometimes by the RP

- Sometimes both

- And not rationalized against administrative policies

75

Page 76: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

The problems beneath the problems

• Our models are insufficient- IAM tools do not model relationships well.

- IAM tools do not model context well.

• Authorization is a problem of relationship and context.- Federated authorization is more so

• We push attributes instead of pull them.

• We lack mechanisms to share, distributed, and link authorization policy.

76

Page 77: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Calls to Action and Readings

Page 78: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

What you should do: Know and Map

• Know your entitlements- An entitlement catalog transforms tribal knowledge into

institutional knowledge

• Know your authorization policies- Document authorization policies

- Try to close the gap between administrative and runtime authorization policies

• Map attribute dependencies- First step to addressing authorization policy coherence

is knowing where shared attribute dependencies exist.

78

Page 79: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

What can you do: Demand more

• Enterprises often lag higher education and federal governments in federation sophistication

• Vendors primarily selling to private enterprise will thus lag as well.

• Bulk load interface ≠ acceptable federation solution

79

Page 80: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

What we must do: Hasten evolution

• The industry needs to move from pushing attributes to pushing authorization policies.

• Relationships and context must become first-class citizens in the IAM world and its tools.

• The enterprise notion of federation as glorified SSO must evolve.

80

Page 81: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Federation≠

Way to attach SaaS to the enterprise

≠SSO

Page 82: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Federation=

Authorization across boundaries

Page 83: This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner.

Recommended Gartner Reading

• Achieving Greater Control Over AuthorizationIan Glazer

• Combating Policy Sprawl: Identity and Access Governance and Externalized Authorization Management SystemsIan Glazer

• Upcoming - The Brave New World of FederationRobin Wilton

• Upcoming - Combating Policy Sprawl: Identity and Access Governance and Externalized Authorization Management SystemsMark Diodati

83