1 / 59

Why LDAP & Security Are Critical to Your Success

Why LDAP & Security Are Critical to Your Success. UBC Certificate in eBusiness Presentation Wednesday, January 17, 2001 Guy Huntington, President,HVL. Presentation Goals. Understand the critical role that trust plays in achieving modern business models

hector
Télécharger la présentation

Why LDAP & Security Are Critical to Your Success

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Why LDAP & Security Are Critical to Your Success UBC Certificate in eBusiness Presentation Wednesday, January 17, 2001 Guy Huntington, President,HVL

  2. Presentation Goals • Understand the critical role that trust plays in achieving modern business models • Relate this to the challenge of creating, managing and authenticating the identity • Probe into accepting authorizations between system, partners and other enterprises • Take a look at the role of LDAP vs. Databases • See what kinds of tools are out there to do the job

  3. It All Starts With Trust • Trust is the heart of successful ongoing transactions, relationships and business processes • In the “old days” it was primarily based on someone you had physical proximity to or, taken on faith from someone you knew • But what about today?

  4. Trust and E-business • Billions of interactions occurring around the globe, increasingly with software based systems, where we may never ever see the face behind the transaction or business process • A large enterprise may have tens or hundred of millions of customers (e.g. Wal*Mart, Coke or Pepsi) • They may have hundreds of thousands of employees (e.g. United Airlines, McDonalds) • They may have thousands, tens of thousands or more business partner’s employees interacting with the enterprise (e.g. GM)

  5. Interactions Are Fast, Varied and Sensitive • Interactions often require split-second decision-making (several thousand identity lookups and authentications per second) • Access can be to many traditional “back-office” systems (shipping, account info, manufacturing, sales/marketing, etc.) • Customers and business partners are drilling to very sensitive information (e.g. data warehouses containing personal account info.)

  6. Identity Management • Usually taken for granted • Identity creation is usually a mixed bag of: • Different people doing the creation • Different ways of doing the creation • Different systems holding the creation

  7. Take “Fred Johnson” • Fred Johnson – Facilities • Fred S. Johnson - Parking • Fjohnson – E-mail • F. Johnson HR Manager - Payroll • Fred Johnson Human Resources Manager - HRIS • Fred Johnston (oops…typo!) - Security • F. Johnsonn (another typo) - Networks

  8. Identity Integrity • Causes a lot of grief • Direct cost to the enterprise • Lost productivity • Hard to find up to date org charts and basic contact info • Can cost many tens of millions of dollars annually

  9. Managing the Identity • Who creates it? • How do you handle the changes to it? • The numbers can be staggering • 15-30% identity changes • 20-30% employee churn in some sectors • Thousands to millions of users • You need to somehow both centralize identity reference and at the same time delegate admin to appropriate levels

  10. Security Lapses • Time delays for system updates take days, weeks and even months • Manual processes for updating mean manual errors • Wrong people get taken on and off systems • Identities entered differently don’t match in systems and access is denied to applications etc

  11. Authentication • Now we have an identity, how do we authenticate it to continue the process of trust? • “How do I know you’re you?”

  12. Challenges • What if I don’t know you? • What if you’ve been passed from one or two portals to my e-business website? • How do you achieve single sign on to reduce the number of passwords, tokens, smartcards and number of times authentication is required? • The answers affect ease of use, trust and manageability of the business models you’re building!

  13. Authentication Basics • What you know • What you have • What you are

  14. Authentication Methods • Basic authentication • Certificate authentication • Form authentication • Tokens/smart cards authentication • Biometric authentication

  15. Basic Authentication • Uses something you know • Username and password are the most common • Most common form of authentication • Can be a lot of problems/challenges in using it

  16. Basic Challenges • Password cracking programs can guess passwords at over 1.5 million guesses per second to minute • Passwords are difficult to remember and should be changed frequently

  17. Basic Challenges • Password lengths are often insecure • Password storage may be not secure • Passwords may travel in the clear

  18. Basic Challenges • Browsers cache passwords • Lost password management is very expensive

  19. Certificate Authentication • Uses public key infrastructure • Involves use of trusted third parties called “certificate authorities” • Certificates use a couple of different types of encryption to assure identity • Parties exchange certificates and verify each other

  20. Certificate Challenges • Managing certificate users can be very demanding, costly and time consuming • Level of trust may not be appropriate for all your needs • Encryption use may require accelerator cards on the authenticating servers • Browser’s cache certificate info

  21. Form Authentication • Uses an html form usually embedded in the internet, intranet or extranet interface • Can use username and password or some other challenge and response • Advantage to this method is the browser doesn’t cache the challenge and response

  22. Tokens • You’ve probably seen or used some tokens many times • This can include driver’s license and social security card • It can also include key fobs with digitally changing numbers

  23. Token Challenges • Can be forged or hacked • People lose them • Management of the whole process can be daunting • People get sick of having to carry around so many tokens (just check your wallet for the number of loyalty cards you carry)

  24. Smart Cards • Use chip technology • Includes debit cards to financial and medical information cards • Widely used in Europe • Gaining momentum in N.America • Lots and lots of politics involved in setting global standards • Often use multi-factor authentication

  25. Smart Card Challenges • Can be hacked (although it can be harder to do) • A lot of behind the scenes fighting over standards for potentially billions and trillions of dollars in transactions • Need plant and equipment to deploy

  26. Biometric Authentication • “James Bond” comes of age • Includes • Finger recognition • Fingerprint scans • Hand geometry • Face geometry • Signature recognition • Iris and retina recognition • Voice recognition

  27. Biometric Authentication • Price points are dropping quickly below $150, $100 and even much less • Becoming embedded in chips placed in cell phones, palm pilots and soon watches • Often used with smart cards and/or other authentication methods such as passwords

  28. Biometric Challenges • Can have trouble with people having hangovers, colds, etc • Still a little pricey for widespread adoption • Device required to conduct the enrollment and reading

  29. So What Do You Use? • Probably combinations of all of these! • You need to think in terms of layers of trust • Let’s move on to authorization and then come back to view the challenges in providing single sign on, integrating different authentication methods and accepting other parties authentications/authorizations

  30. Authorization • This is the second step of the triple A’s (authentication, authorization and auditing) • How do you authorize? • How do you integrate authorization mechanisms across an enterprise and between enterprises? • It isn’t always easy

  31. Daily Sales Report • Sales rep can view only their own reports • Managers can view all direct reports “reports” and their summaries but not other areas • Regional managers can view all reports below them, rolled up summaries but not outside their area • VP, CEO and CFO can view all reports and summaries

  32. Daily Sales Report • Special exemptions for some identities • Individuals, roles, groups, geography • Special exemptions for some reports • Specific reports, groups of reports • Special exemptions based on time • Hourly, daily, weekly, monthly, seasonally, yearly

  33. Granularity • Your infrastructure needs to provide flexibility for different combinations of granularity at both the identity and resource/application level • Some of this logic is already in your ERP’s, HRMS’s, data warehouses, CRM’s and the rest of your systems • How do you knit this together both internally and externally?

  34. The Devil Is in the Details • Potential show stopper stuff for B2B’s and large internal reengineering • You’re crossing multiple systems, with little or no authentication and authorization standards • The information and rules are stored in specific formats, logic and databases each with their own generally inflexible standards • You’re also crossing over a lot of political power centers within the enterprise

  35. Databases • Many of the systems requiring authentication/authorization integration use databases/data warehouses • There’s challenges with using database only solutions

  36. Advantages of Databases • Maintain state of the transaction • Excellent for fast writes • Wal*Mart updates the DSS at approx 8.4 million updates per minute • Great for routine and complex querying • Wal*Mart queries DSS at over 100,000 complex queries a week • Flexible

  37. Disadvantages of Databases • Lack standards when it comes to how information is stored • Not optimized for fast reads • Generally relational not hierarchical

  38. Infrastructure “Glue” • Need to bind together/coordinate the identity management, authentication and authorization components of all the systems • Has to work exceedingly fast • Databases are not the best choice in either cost or performance for this application • Databases may hold the authoritative source of the information e.g. ERP, HRMS • That’s why directories come into play

  39. Directories • Optimized for fast reads not writes • Excellent for stateless/semi-stateless environments • Scale relatively easily for replication and fail over • Operate to standards

  40. LDAP • Lightweight Directory Application Protocol • IETF standard • Built with the internet in mind • Offspring of x.500 • Provides enough standards to be attractive as a coordinating vehicle for identity management, authentication, authorization and auditing

  41. Putting It All Together • LDAP directory acts as the coordinating hub for your authentication, identity management, authorization and auditing systems • Can be Master, Child or both for authoritative source of information • Store digital certificates, username, password(s), challenge phrases, biometric point info., etc. • Also store summary info from the CRM or portal info on your business partners

  42. You Want: • To provide a central integration point • Something that scales • Enhance not reduce existing security • To provide end user ease of use • To quickly integrate systems required by the existing and emerging business models

  43. Single Sign On (SSO) • Need some tools to work with the directory and your systems • Can be quite complex without the tools

  44. SSO Challenges • Coordinate the identity management • Delegate the identity management where warranted • Coordinate authentication • Security compatible with things like TLS/SSL, IPSec, digital certificates, etc. • Pre and Post authorization features to hand off to ERP’s, NOS’s, CRM’s, data warehouses, portals and all your other many systems

  45. SSO Challenges • Maintain state to identify session beginning and endings • Timing out the user • Store authentication and authorization levels to which the identity is approved to prevent reauthentication unless desired • Involves the use of encrypted cookies and application servers • Work within a domain and across multiple domains

  46. SSO Challenges • How are you going to handle managing the authorization rules for who gets to see what when? • You need tools allowing you to delegate this where required • e.g. extranet, portal, departmental level • How do you integrate your auditing systems with the ERP’s, NOS’s, firewalls, CRM’s, facilities and all your other systems?

  47. Infrastructure Tools • Without tools, this kind of work is exceedingly complicated, fraught with peril, expensive and time consuming • Tools must allow you to scale very quickly • Easy to use • Flexible to allow to you tailor your authentication, identity management, authorization and auditing just the way you want it and not to someone else’s preconceived idea of what they should be

  48. That’s Where Oblix and Others Comes Into Play • Oblix • Netegrity • IBM • Entrust • others

  49. Features to Look For • Deploys relatively quickly • Delegate identity and authorization rule management to whatever level if granularity makes sense • Solid identity management • Gives you great flexibility in post authentication, authorization and post authorization actions

  50. Features to Look For • Flexible in granularity for determining protection of resources/applications • Flexible in determining auditing requirements to different levels of resources/applications • Scales easily without performance loss • Works with most NOS’s, directories, ERP’s, portals, etc.

More Related