Access Management Handbook

Similar documents
A Practical Step-by-Step Guide to Managing Cloud Access in your Organization

Identity and Authentication PKI Portfolio

Virtual Machine Encryption Security & Compliance in the Cloud

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Deliver Data Protection Services that Boost Revenues and Margins

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1

HIPAA Compliance Checklist

Ramnish Singh IT Advisor Microsoft Corporation Session Code:

SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK

PKI Credentialing Handbook

Dissecting NIST Digital Identity Guidelines

SAP Single Sign-On 2.0 Overview Presentation

Google Identity Services for work

Centrify for Dropbox Deployment Guide

MOBILITY TRANSFORMING THE MOBILE DEVICE FROM A SECURITY LIABILITY INTO A BUSINESS ASSET E-BOOK

The Cloud Identity Crisis

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

SAP Security in a Hybrid World. Kiran Kola

Integration Patterns for Legacy Applications

EBOOK The General Data Protection Regulation. What is it? Why was it created? How can organisations prepare for it?

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Safelayer's Adaptive Authentication: Increased security through context information

Liferay Security Features Overview. How Liferay Approaches Security

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Cloud Access Manager Overview

Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)

Dell One Identity Cloud Access Manager 8.0. Overview

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate

Identität und Autorisierung als Grundlage für sichere Web-Services. Dr. Hannes P. Lubich IT Security Strategist

Authlogics for Azure and Office 365

Warm Up to Identity Protocol Soup

Authentication. Katarina

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith

Horizon Workspace Administrator's Guide

BlackBerry Enterprise Identity

THE SECURITY LEADER S GUIDE TO SSO

SAML-Based SSO Solution

Introduction. The Safe-T Solution

Single Sign-On for PCF. User's Guide

Expertise that goes beyond experience.

Integrated Access Management Solutions. Access Televentures

white paper SMS Authentication: 10 Things to Know Before You Buy

SafeNet Authentication Client

SafeNet Authentication Service

Best Practices: Authentication & Authorization Infrastructure. Massimo Benini HPCAC - April,

Configuration Guide - Single-Sign On for OneDesk

Secure single sign-on for cloud applications

Identity management. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Better MDM

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

Enhanced OpenID Protocol in Identity Management

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

Introduction to application management

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

Salesforce External Identity Implementation Guide

Identity management. Tuomas Aura T Information security technology. Aalto University, autumn 2011

Solution. Imagine... a New World of Authentication.

ADAPTIVE AUTHENTICATION ADAPTER FOR IBM TIVOLI. Adaptive Authentication in IBM Tivoli Environments. Solution Brief

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products

Choosing the right two-factor authentication solution for healthcare

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

DDS Identity Federation Service

Extranet Identity Management and Authentication for SharePoint On Premise, Office 365 and Beyond

Securing Office 365 with Okta

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for Okta

Crash course in Azure Active Directory

SAML-Based SSO Solution

SafeNet Authentication Service

The Modern Web Access Management Platform from on-premises to the Cloud

IBM SmartCloud Engage Security

WSO2 Identity Management

DigitalPersona for Healthcare Organizations

Identity Implementation Guide

SharePoint 2019 and Extranet User Manager

Unified Secure Access Beyond VPN

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Salesforce External Identity Implementation Guide

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for SonicWALL Secure Remote Access

Best Practices for Augmenting IDaaS in a Cloud IAM Architecture PAM DINGLE, PING IDENTITY OFFICE OF THE CTO

Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter

The Device Has Left the Building

VMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2

ArcGIS Server and Portal for ArcGIS An Introduction to Security

Zero Trust in Healthcare Centrify Corporations. All Rights Reserved.

About This Document 3. Overview 3. System Requirements 3. Installation & Setup 4

Architecture Assessment Case Study. Single Sign on Approach Document PROBLEM: Technology for a Changing World

Protecting SugarCRM with SafeNet Authentication Manager

SafeNet Authentication Service (SAS) SAML Authentication Quick Start Guide

Identity Implementation Guide

SafeNet Authentication Manager

Salesforce External Identity Implementation Guide

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

RSA SecurID Ready Implementation Guide. Last Modified: December 13, 2013

Udemy for Business SSO. Single Sign-On (SSO) capability for the UFB portal

ArcGIS Enterprise Security: An Introduction. Randall Williams Esri PSIRT

Transcription:

Access Management Handbook

Contents An Introduction 3 Glossary of Access Management Terms 4 Identity and Access Management (IAM) 4 Access Management 5 IDaaS 6 Identity Governance and Administration (IGA) 6 Identity Federation 7 Federated Login 7 Identity Provider 8 SAML 9 WS-Fed 11 Open ID Connect 13 Single Sign-On (SSO) 15 Password Vault 16 Authorization 17 Authentication 17 Context-based Authentication 18 Continuous Authentication 19

An Introduction Over the years, you may have heard a lot about access management. In fact, we tended to use the terms authentication and access management pretty much to mean the same thing. But in fact there are differences between the two. While authentication validates a user s identity, access management determines that a user has the permission to access a certain resource and enforces the access policy that has been set up for that resource. Access management is very important when it comes to managing access to cloud resources. Nowadays, a person typically has to access numerous cloud apps throughout the day. This is a hassle for both users and IT: Users have to remember countless passwords; while IT need to endlessly reset forgotten passwords. The solution to this problem is SSO: By having one credential for all cloud apps, users can easily login once to several apps while IT saves precious time over password resets. Since that single identity is only as secure as the authentication used to verify it, the method of verifying users identities becomes paramount to maintaining cloud access security. To this end, access management solutions and singlesign on solution offer granular control over the access policies defined per application. By requiring an additional authentication factor in high risk situations, a frictionless user experience is maintained.

Glossary of Access Management Terms Identity and Access Management (IAM) Identity and Access Management (IAM) solutions are composed of Identity Governance and Administration (IGA) functionality and Access Management (AM) functionality. IAM solutions provide a methodic framework for granting (and requesting) access to applications (IGA), enforcing access controls (AM) and ensuring visibility into access events (AM). Given that most organizations deploy the IGA and AM components separately of each other, these disciplines are being increasingly evaluated as distinct, standalone solution families, rather than as composite functionalities of a single IAM suite.

Access Management Access management is a functionality that enables determining whether a user has permission to access a certain resource, and enables the enforcement of the access policy that has been set up for that resource. Access management is implemented based on access policies that are defined by IT administrators and include such information as which groups of users (e.g. Sales, R&D, HR) are allowed access to which cloud applications (e.g. Salesforce, Office 365, Jira, Taleo), as well as the set of user attributes required to access each application (e.g. trusted network, password, OTP). access policies defined for each cloud application. (For more details, see context-based authentication.) Also central to cloud access management is single sign-on, which enables the use of a single usernameand-password set or identity to log in to all one s cloud applications. (For more details, see single sign-on.) Authorization Two Factor Authentication Access Management Policy Enforcement Adaptive Access The access policy can require more or less user attributes to be assessed depending on the sensitivity of a cloud application. These attributes are assessed using risk-based or context-based authentication, which is central to enforcing the different Reporting SSO

IDaaS IDaaS stands for IAM-as-a-Service, also called identity-as-a-service, to describe Identity and Access Management (IAM) solutions that offer a cloud-based as-aservice delivery model for Identity and Access Management. While IDaaS has been reviewed as a separate market in recent years, given recent market trends, going forward it will be treated as two separate disciplines that of Access Management and IGA, whose delivery methods include on-premises installations, software or cloud-based platforms. EMM Reporting Policy Enforcement SSO IDaaS Provisioning 2FA Identity Governance and Administration (IGA) Identity Governance and Administration (IGA) solutions help answer the questions, Who should receive access, or who is entitled access, to which application? and Who in practice was granted access to which application, by whom and when. For example, an IGA solution may help establish that R&D staff are entitled access to certain development applications, such as GitHub, Jira and Confluence. An IGA solution can automatically provision access to these applications, based on their R&D group membership. The R&D user may also request to be provisioned access to other applications, a request which would then go through a management approval process that is supported by some IGA solutions. Indentity Life Cycle

Identity Federation With identity federation, a single system called a trusted Identity Provider ( IdP ) governs the authentication of users, with cloud apps relaying the authentication process to the Identity Provider each time a user attempts to access them. Federated identity solves the challenges and frustrations of managing credentials for numerous web apps separately, whether internal or external to an organization. Identity federation relies on federation protocols such as SAML and Open ID Connect, as well as proprietary protocols such as Microsoft s WS-Federation. Federated Login Federated login is a function of federation protocols, such as SAML, Open ID Connect and others, which use an Identity Provider model to authenticate users and relay that authentication information to the target system in the form of an authentication assertion. The assertion contains an accept or reject response, resulting in the user being denied or granted access. Federated login allows users to sign in once in order to concurrently gain access to all their cloud applications. Instead of logging in to separate cloud applications using different username-and-password sets, or identities, federated login lets users log in to office 365, Salesforce, AWS etc. with the same identity they use to log in to the corporate network in the morning, or the VPN at night. With identity federation, a single system called a trusted Identity Provider governs the authentication of users, with cloud apps relaying the authentication process to the Identity Provider each time a user attempts to access them.

Identity Provider SAML, and other identity federation protocols which enable the safe exchange of identity data between unaffiliated websites, are based on an Identity Provider (IdP) and Service Provider model. When a user accesses a Service Provider (cloudbased service), they are redirected to the trusted Identity Provider for authentication and/or authorization data. The Identity Provider verifies the user s authentication data (e.g. user s cookie, device, network, OTP) and produces an accept or reject response which is then sent to the Service Provider. Authorization data may include the permission to access such information as email addresses from a webmail account or names of friends from a social network account. For example, SafeNet Authentication Service acts as an identity provider when users access cloud applications as in the scenario described above. Security Token Services Identity Provider models are also called Token-based Authentication, or Security Token Services. A Security Token Service (STS), is equivalent to an Identity Provider, and a Relying Party (RP) is equivalent to a Service Provider. And instead of exchanging SAML assertions, these are called Security Tokens. Different names, same concept. 1 User accesses cloud app 2 User is redirected to IdP for Authentication Username & Known Device 3 IdP returns an accept/reject response in a SAML assertion or security token SAML Assertion by IdP

SAML SAML, pronounced sammel, stands for Security Assertion Markup Language, which is an XML-based open standard for exchanging authentication data between unaffiliated websites, a capability also called identity federation or federated authentication. Identity federation means the ability to extend users current enterprise identities to the cloud, enabling them to log in to their cloud applications with their current enterprise identity. Federated authentication to cloud apps with SAML allows users to log in to all their cloud applications with their current enterprise identity, so that instead of maintaining 5 or 25 username-and-password sets, they can maintain just one.

How SAML Works When a user attempts to log in to a cloud-based application, they are redirected to a trusted Identity Provider for authentication. The Identity Provider collects the user s credentials, for example, their username and one-time-password, and it returns a response to the cloud application being accessed. This response is called a SAML assertion, and the SAML assertion contains an accept or reject response. Based on this response, the Service Provider, e.g. Salesforce, Office 365 or DropBox, blocks or grants access to the application. Strong authentication + federated login SAML Assertion bill@safenet-inc.com UserID OTP Bill SafeNet Authentication Service SAML Assertion bill@safenet-inc.com Single point of management SAML Assertion bill@safenet-inc.com

WS-Fed WS-Federation Services, or WS-Fed, is Microsoft s proprietary identity federation protocol. WS-Fed works with Microsoft s Active Directory Federation Services, or AD FS, to extend identities stored in Active Directory to Microsoft cloud applications such as Office 365 and Azure. Like SAML, WS-Fed users an Identity Provider model. When accessing a Microsoft cloud application, the user is redirected for authentication to AD FS, based on whose response the cloud application grants or denies the user access. 1 User accesses cloud app 2 User is redirected to IdP for Authentication SAML Identity Provider OAuth Identity Provider Open ID Connect Identity Provider WS-Federation Identity Provider 3 IdP returns an accept/reject response via assertion or token Assertion or Token

OAuth OAuth, pronounced oh-auth, stands for Open Authorization, and it is an open standard for federated, or token-based authentication and authorization between unaffiliated websites. As with other identity federation protocols, such as SAML, Open ID Connect and WS-Fed, OAuth enables logging into an application with an identity that is verified by a trusted identity provider. OAuth goes beyond federated authentication to enable users to authorize relying party websites to access certain account information such as contact names and email addresses. For example, OAuth is the protocol used by social network websites to access your webmail contacts and ask you if you d like to invite your webmail contacts into your social networks.

Open ID Connect Like SAML, OpenID Connect is an open standard identity federation protocol that uses an Identity Provider model. However, unlike SAML, which works using a cookie and therefore only works with applications that open in a browser ( browser-based applications ), OpenID Connect provides a single-sign on framework that enables the implementation of single sign-on across browserbased applications, native mobile apps and desktop clients (such as rich clients and some VPNs). So while most single sign-on implementations today support only cloud and browser-based apps, as more identity providers adopt OpenID Connect, we ll be able to authenticate just once in order to concurrently gain access to all our resources - be they desktop clients, browser-based applications or native mobile apps.

Bring Your Own Identity (BYOI) In the identity management space, vendors and organizations are looking to enable employees and partners to use their own identity to access corporate resources. This identity could theoretically be any identity that provides a sufficient level of identity assurance for example, government-issued identity cards, healthcare smart cards, as well as online identities, such as social identities, professional network identities and commercially-available identities such as FIDO. The enterprise and consumer worlds are merging closer together, with enterprise security teams under increasing pressure to implement the same type of authentication methods typically seen in consumer services. Social VDI Government BYOI Identity Broker VPN Commercial Wearables Cloud

Single Sign-On (SSO) Single sign-on (SSO) provides the capability to authenticate once, and be subsequently and automatically authenticated when accessing various resources. It eliminates the need to separately log in and authenticate to individual applications and systems, essentially serving as an intermediary between the user and target applications. Behind the scenes, target applications and systems still maintain their own credential stores and present sign-on prompts to the user s system. SSO responds to those prompts and maps the credentials to a single login/password pair. (Source: Gartner) SSO, whether in a standalone solution or a broader access management solution, can be achieved through a range of identity federation protocols. These include open-source protocols such as SAML 2.0 and Open ID Connect, proprietary protocols such as Microsoft s WS-Federation, and other technologies such as password vaulting and reverse proxies.

Password Vault Password vaults, also called password managers, are a simple way to create a single sign on (SSO) experience when a target application does not support identity federation protocols, for example, a legacy or custom application. Password vaults are systems that work by storing and encrypting the passwords of different websites. Instead of logging to each application with a dedicated password, the user can simply authenticate with a master password (which in turn decrypts the password vault), eliminating the need to maintain disparate passwords.

Authorization Authorization is a process that ensures that properly authenticated users can access only the resources which they are allowed to access, as defined by the owner or administrator of that resource. In the consumer world, Authorization may also refer to the process whereby a user ensures that a cloud-based application (for example, a social network) accesses only certain information from a non-affiliated website (for example, the user s webmail account). Authentication Authentication is a process in which a user s identity is validated or verified based on the the credentials that the user provides when logging in to an application, service, computer or digital environment. Most authentication credentials consist of something the user has, for example a username, and something the user knows, for example a password. If the credentials provided by the user, match those that are stored by the underlying application or Identity Provider, the user is successfully authenticated and granted access.

Context-based Authentication Context-based authentication verifies the identity of users by assessing a range of supplemental information at the time a person logs into an application. The most common type of contextual information include a user s location, time of day, IP address, type of device, URL and application reputation. Context-based authentication, also called risk-based or adaptive authentication, is central to the world of SSO and access management where the objective is to make the authentication journey as transparent and painless as possible. By assessing a user s login attributes, be they contextual (device, role, location) or behavior based (e.g. typing speed, page view sequence), single sign on and access management solutions can continuously match the level of authentication required from the user with the access policy defined for each application. In this way, authentication is applied granularly in the most frictionless manner possible per an application s access policy, rather than as a blanket, uniform rule for all enterprise resources.

Continuous Authentication With a token, a password or a fingerprint authentication is basically a yes / no decision: The system validates a user s identity and either allows or denies them access to an application. But thanks to newer technologies, such as context-based authentication or behavioral biometrics (for example, typing pattern and other physical traits), authentication can become a more continuous process. By assessing a range of attributes such as IP address, mobile parameters, known device, operating system etcetera, contextual or risk based authentication can continuously verify a person s identity each time they log into an application. In fact, it can do so without the user even knowing. Contextual authentication offers many frictionless ways of verifying a person s identity. And this is really what allows us to balance user convenience with the ability to apply granular access controls for numerous cloud applications. And this is why the concept of continuous authentication which is based on context-based authentication is a foundation of cloud access management. APPLY IDENTIFY MONITOR ASSESS

Through its acquisition of SafeNet, Gemalto offers one of the most complete portfolios of enterprise security solutions in the world, enabling its customers to enjoy industryleading protection of digital identities, transactions, payments and data from the edge to the core. Gemalto s newly expanded portfolio of SafeNet Identity and Data Protection solutions enable enterprises across many verticals, including major financial institutions and governments, to take a data-centric approach to security by utilizing innovative encryption methods, best-in-class crypto management techniques, and strong authentication and identity management solutions to protect what matters, where it matters. Through these solutions, Gemalto helps organizations achieve compliance with stringent data privacy regulations and ensure that sensitive corporate assets, customer information, and digital transactions are safe from exposure and manipulation in order to protect customer trust in an increasingly digital world. Contact Us: For all office locations and contact information, please visit safenet.gemalto.com Follow Us: blog.gemalto.com/security GEMALTO.COM Gemalto 2017. All rights reserved. Gemalto, the Gemalto logo, are trademarks and service marks of Gemalto and are registered in certain countries. eb (EN)-18May2017 - Design: DB