Identity and Access Management Overview
Identity and Access Management Overview
Identity and Access Management Overview
Copyright 2006 Microsoft Corp & Project Botticelli Ltd. E&OE. For informational purposes only. No warranties of any kind are made and you have to verify all information before relying on it. You can re-use this presentation as long as you read, agree, and follow the guidelines described in the Comments field in File/Properties. This presentation is based on work of many authors from Microsoft, Oxford Computer Group and other companies. Please see the Introductions presentation for acknowledgments.
Objectives
Build a good conceptual background to enable later technical discussions of the subject Overview the problems and opportunities in the field of identity and access management Introduce terminology Highlight a possible future direction
Session Agenda
Identity Problem of Today Identity Laws and Metasystem Components and Terminology Roadmap
Universal Identity?
Internet was build so that communications are anonymous In-house networks use multiple, often mutuallyincompatible, proprietary identity systems Users are incapable of handling multiple identities Criminals love to exploit this mess
Explosion of IDs
# of Digital IDs
Business Partners Automation (B2B)
Company (B2E)
Customers (B2C)
Mobility
Internet
Client Server
Mainframe
Time
Pre 1980s 1980s 1990s 2000s
HR System
NOS Lotus Notes Apps Infra Application COTS Application In-House Application In-House Application
Enterprise Directory
Identity Chaos
Lots of users and systems required to do business Multiple repositories of identity information; Multiple user IDs, multiple passwords Decentralized management, ad hoc data sharing
Multiple Contexts
Customer satisfaction & customer intimacy Cost competitiveness Reach, personalization
Your CUSTOMERS
Your SUPPLIERS
Collaboration Outsourcing Faster business cycles; process automation Value chain
Your PARTNERS
10
Pain Points
IT Admin
Developer
End User
Security/ Compliance
Business Owner
11
Possible Savings
Directory Synchronization
Improved updating of user data: $185 per user/year Improved list management: $800 per list
Password Management
Password reset costs range from $51 (best case) to $147 (worst case) for labor alone. Gartner
User Provisioning
Improved IT efficiency: $70,000 per year per 1,000 managed users Reduced help desk costs: $75 per user per year
12
Number of phishing and pharming sites grew over 1600% over the past year
Corporate IT Ops manage an average of 73 applications and 46 suppliers, often with individual directories
13
Quicker Option:
Build an in-house, federated identity metasystem based on standards Federate it to others, system-by-system
14
15
16
17
Relying Parties
Online services or sites, doors, etc.
Subjects
Individuals and other bodies that need its identity established
18
Metasystem Players
Identity Providers
Issue identities
Relying Parties
Require identities
Subjects
Individuals and other entities about whom claims are made
19
20
Identity Laws
www.identityblog.com
3. Justifiable Parties
4. Directed Identity 5. Pluralism of Operators and Technologies 6. Human Integration 7. Consistent Experience Across Contexts
21
Enterprise Applicability
That proposed metasystem would work well inside a corporation Of course, we need a solution before it becomes a reality Following the principles seems a good idea while planning immediate solutions Organic growth likely to lead to an identity metasystem in long term
22
Enterprise Trends
Kerberos is very useful but increasingly it does not span disconnected identity forests and technologies easily We are moving away from static Groups and traditional ACLs
Increasingly limited and difficult to manage on large scales
23
24
25
A system of procedures, policies and technologies to manage the credentials lifecycle The process of authenticating and Access controlling access to networked resources Management and entitlements of electronic based on trust and identity credentials
Identity Lifecycle Management
The processes used to create and delete accounts, manage account and entitlement changes, and track policy compliance
26
HR System NOS Lotus Notes Apps Infra Application COTS Application In-House Application In-House Application
Enterprise Directory
Authentication Authorization Identity Data Authentication Authorization Identity Data Authentication Authorization Identity Data Authentication Authorization Identity Data
27
Identity Integration
Authentication Authorization Identity Data Authentication Authorization Identity Data Authentication Authorization Identity Data Authentication Authorization Identity Data Authentication Authorization Identity Data Authentication Authorization Identity Data Authentication Authorization Identity Data
Enterprise Directory
HR System Student Admin Lotus Notes Apps Infra Application COTS Application In-House Application In-House Application
28
IAM Benefits
Benefits today (Tactical)
Save money and improve operational efficiency Improved time to deliver applications and service Enhance Security
29
Authorization (AuthZ)
Deciding what actions, rights or privileges can the subject be allowed
30
Components of IAM
Administration
User Management Password Management Workflow
Delegation
Authentication Authorization Administration Authentication
Access Management
Authorization
Identity Management
Account Provisioning Account Deprovisioning Synchronisation
31
IAM Architecture
32
Roadmap
33
Authorization Manager
BizTalk
PKI / CA
ISA Server
34
Application Directory
Lifecycle Management Workflow
AD/AM (LDAP)
MIIS BizTalk, Partner Solutions (Ultimus BPM, SAP)
Role-Based Access Control Authorization Manager or Partner Solutions (ex: OCG, RSA) and traditional approaches
Directory & Password Synchronization SSO (Intranet) Enterprise SSO (Intranet) Strong Authentication Web SSO Integration of UNIX/Novell MIIS & Partner solutions Kerberos/NTLM, Vintela/Centrify Sharepoint ESSO, BizTalk ESSO, HIS ESSO SmartCards, CA/PKI, Partner (eg. RSA SecurID, MCLMS, WizeKey) ADFS, Partner (eg. RSA ClearTrust) SFU, SFN, Partner (eg. Vintella/Centrify)
Federation
ADFS
35
Summary
36
Summary
We have reached an Identity Crisis both on the intranet and the Internet Identity Metasystem suggests a unifying way forward Meanwhile, Identity and Access Management systems need to be built so enterprises can benefit immediately Microsoft is rapidly becoming a strong provider of IAM technologies and IM vision
www.microsoft.com/idm & www.microsoft.com/itsshowtime & www.microsoft.com/technet
37
Special Thanks
This seminar was prepared with the help of:
Oxford Computer Group Ltd
Expertise in Identity and Access Management (Microsoft Partner) IT Service Delivery and Training www.oxfordcomputergroup.com