infosafe ah iam 2013

26
Identity and Access Management Data modeling Alain Huet

Upload: alain-huet

Post on 05-Dec-2014

249 views

Category:

Technology


5 download

DESCRIPTION

www.infosafe.be Identity and Access Management Data modeling concepts Alain Huet

TRANSCRIPT

Page 1: Infosafe ah iam 2013

Identity and Access Management

Data modeling

Alain Huet

Page 2: Infosafe ah iam 2013

2

Summary

Data modeling : back to basics

IAM data model

IAM management functions

IAM implementation / service issues

IAM paradigms

Page 3: Infosafe ah iam 2013

3

Summary

Data modeling : back to basics

IAM data model

IAM management functions

IAM implementation / service issues

IAM paradigms

Page 4: Infosafe ah iam 2013

4

Global reality

Cadastral administration

Commercial business

Data modeling : back to basics

————————————————————————————————————

————————————————————————————————————

Page 5: Infosafe ah iam 2013

5

Summary

Data modeling : back to basics

IAM data model

IAM management functions

IAM implementation / service issues

IAM paradigms

Page 6: Infosafe ah iam 2013

6

IAM

Identity and Access Management

Issues

User authentication

Access management

IAM data model (1)

General objective

Page 7: Infosafe ah iam 2013

7

Identity management

Credential : something that allows an end user to prove his identity

Credentials identity management authorities

Credential level = trust level

• Technology : password ... crypto certificate

• Quality of the identity authority : zero-trust ... diplomatic

credentials

At run time

Credential checked authentication of the user

Credential level checked access to resource

IAM data model (2)

User authentication

Page 8: Infosafe ah iam 2013

8

Improvements

Grouping of technical resources logical function

Grouping of users profile (same access rights)

# Stability + ― +

IAM data model (3)

Access management

Page 9: Infosafe ah iam 2013

9

# Stability + + +

IAM data model (4)

Grouping of technical resources

Page 10: Infosafe ah iam 2013

10

# Stability + ― + –/+ +

IAM data model (5)

Grouping of users

Page 11: Infosafe ah iam 2013

11

# Stability + ― + –/+ + + +

# Stability + ― +

IAM data model (6)

Result of improvements

Page 12: Infosafe ah iam 2013

12

The owning department manages the list of user departments

entitled to the owned logical function

The user department gets the catalog of logical functions

granted by the owning departments

IAM data model (7)

Ownership of logical functions Catalog management

Page 13: Infosafe ah iam 2013

13

The user department establishes the adequate profiles according

to the catalog of granted logical functions

IAM data model (8)

Profile management

Page 14: Infosafe ah iam 2013

14

IAM data model (9)

User management

The user department assigns the needed profile(s) to his users

Page 15: Infosafe ah iam 2013

15

IAM data model (10)

Global

Page 16: Infosafe ah iam 2013

16

IAM data model (11)

Enhancements

Mandates

Assertion (civil servant, notary, doctor, etc.) management

Etc.

Logical

Page 17: Infosafe ah iam 2013

17

Summary

Data modeling : back to basics

IAM data model

IAM management functions

IAM implementation / service issues

IAM paradigms

Page 18: Infosafe ah iam 2013

18

IAM management functions

Ownership management

Catalog management

Profile management

Identity / credential management

User management (user profile)

Technical resources

Logical functions

Profiles

User access rights

Page 19: Infosafe ah iam 2013

19

Summary

Data modeling : back to basics

IAM data model

IAM management functions

IAM implementation / service issues

IAM paradigms

Page 20: Infosafe ah iam 2013

20

IAM implementation / service issues

Enforcement of the model (on the long run)

Mapping : model ICT features

Cross platform

Consolidated administration tool

Quality of management (ownership, profile, etc.)

Training / motivation of the managers

Page 21: Infosafe ah iam 2013

21

Summary

Data modeling : back to basics

IAM data model

IAM management functions

IAM implementation / service issues

IAM paradigms

Page 22: Infosafe ah iam 2013

22

IAM paradigms (1)

Discretionary Access Control (DAC)

Page 23: Infosafe ah iam 2013

23

IAM paradigms (2)

Mandatory Access Control (MAC)

e.g. : Bell - LaPadula

High assurance level

Resource security labels

User clearance levels

User clearance levels ≥ Resource security labels

Page 24: Infosafe ah iam 2013

24

IAM paradigms (3)

Role Based Access Control (RBAC)

+ Constraints (user/role + session) separation of duties

– Ownership

[Wikipedia : art. "Role-based access control"]

Page 25: Infosafe ah iam 2013

25

IAM paradigms (4)

Organization Based Access Control (OrBAC)

• Permissions depending on context (time, location, intention, etc.)

• Coding of complex rules conflict risk validation tool

[www.orbac.org]

Page 26: Infosafe ah iam 2013

26

[email protected]

+ 32 2 212.96.77