Identity and Access Management Overview
Identity and Access Management Overview
Overview
Rafal Lukawiecki
Strategic Consultant, Project Botticelli Ltd
[email protected]
www.projectbotticelli.co.uk
Copyright 2006 © Microsoft Corp & Project Botticelli Ltd. E&OE. For informational purposes only. No warranties of any kind are made and you have to verify all
information before relying on it. You can re-use this presentation as long as you read, agree, and follow the guidelines described in the “Comments” field in
File/Properties. This presentation is based on work of many authors from Microsoft, Oxford Computer Group and other companies. Please see the “Introductions”
presentation for acknowledgments.
2
Objectives
Session Agenda
Identity Problem of
Today
5
Universal Identity?
Explosion of IDs
Business Partners
# of Automation (B2B)
Digital IDs
Company
(B2E)
Customers
(B2C)
Mobility
ns
it o Internet
lica
p p
A
Client Server
Mainframe
Time
Multiple Contexts
Customer satisfaction & customer intimacy
Cost competitiveness
Reach, personalization
M&A
Mobile/global workforce
Flexible/temp workforce
Data Sources: Gartner, AMR Research, IDC, eMarketer, U.S. Department. of Justice
10
Pain Points
Security/ Business
IT Admin Developer End User
Compliance Owner
Too many user stores and Redundant Too many Too many Too expensive to
account admin requests
code in each orphaned reach new
Unsafe sync scripts passwords accounts partners, channels
app
Long waits for Limited auditing Need for control
Rework code access to ability
too often
apps,
resources
11
Possible Savings
Directory Synchronization
“Improved updating of user data: $185 per user/year”
“Improved list management: $800 per list”
- Giga Information Group
Password Management
“Password reset costs range from $51 (best case) to $147 (worst
case) for labor alone.” – Gartner
User Provisioning
“Improved IT efficiency: $70,000 per year per 1,000 managed users”
“Reduced help desk costs: $75 per user per year”
- Giga Information Group
12
Source: Microsoft’s internal research and Anti-phishing Working Group Feb 2005
13
Better Option:
Build a global, universal, federated identity metasystem
Will take years…
Quicker Option:
Build an in-house, federated identity metasystem based on
standards
Federate it to others, system-by-system
Identity Providers
Organisations, governments, even end-users
They provide Identity Claims about a Subject
Name, vehicles allowed to drive, age, etc.
Relying Parties
Online services or sites, doors, etc.
Subjects
Individuals and other bodies that need its identity
established
18
Metasystem Players
Identity
Providers
Issue identities
Relying Parties
Require identities
Subjects
Individuals and other
entities about whom
claims are made
19
Identity Lawswww.identityblog.com
Enterprise Applicability
Enterprise Trends
Components and
Terminology
24
Role
Manageme
nt
Web Services Provisionin
g
Security
Authorization d it in g&
Au ing
p o rt
Re
t or ies
c
g Dire
Digital Stron tion
Rights he nti ca
Management Aut PKI
25
credentials
Identity The processes used to create and delete
Lifecycle accounts, manage account and entitlement
Management changes, and track policy compliance
26
Identity Integration
•Authenticati
•
on
Authorizatio HR
•
nIdentity
Data
System
IAM Benefits
Authentication (AuthN)
Verification of a subject’s identity by means of relying on a
provided claim
Identification is sometimes seen as a preliminary step of
authentication
Collection of untrusted (as yet) information about a subject, such as
an identity claim
Authorization (AuthZ)
Deciding what actions, rights or privileges can the subject be
allowed
Components of IAM
Administration
User Management
Password Management
Workflow
Delegation
Access Management
Authentication
Administration
Authorization
Authentication
Authorization
Identity Management
Account Provisioning
Account Deprovisioning
Synchronisation Reliable Identity Data
31
IAM Architecture
32
Roadmap
33
Summary
36
Summary
Special Thanks
This seminar was prepared with the help of:
Appendix
39
Directory
ServicesUser Service Network
Management Managemen Management
t
Network Access Infrastructu
Security Control re
Managemen
t
40
Frontend Services
Self-Service Enterprise Enterprise
Interface User-Man. Role-Man.
Directory
ServicesUser Service Network
Management Managemen Management
t
Network Access Infrastructu
Security Control re
Managemen
t
41
IIS
Active AzMan
Directory Sharepoint
Federation SQL-Server BizTalk
Server
Provisioning & Password Management Services
Quest
/Centrify Microsoft Identity Integration
HIS/ESSO Server
ISA Directory
Server Services
Windows Server
(Active Directory/ADAM, Quest
MOM /
PKI, AzMan)
& ACS Centri
fy
Info Extended Directory Services
Card Windows MS RMS
PKI Alacris Server
52
FastPass
Active AVAC
Directory bHold
Federation Quest Ultimus
Server
Provisioning & Password Management Services
Quest
/Centrify Microsoft Identity Integration
HIS/ESSO Server
ISA Directory
Server Services
Windows Server
(Active Directory/ADAM, Quest
MOM /
PKI, AzMan)
& ACS Centri
fy
Info Extended Directory Services
Card Windows MS RMS
PKI Alacris Server
53