|By Priyamvada Nigam||
|December 30, 2013 09:30 AM EST||
Enterprises are seeing a great potential in cloud-based services. However, security is a primary concern that keeps enterprise from harnessing the full potential. Identity management is one of the most important aspects of security. There is always an authentication required in an application to identify the user and provide service based on the user details. Authorization is required to allow only privilege user to execute privilege operation. An identity store required to maintain the identity and roles for the user.
Identity Management is a solution that takes into consideration all the identity concerns: authentication, authorization and maintaining identity.
In this article we will discuss some of the challenges occur while moving to the cloud in terms of identity. And what are the Microsoft technologies available to resolve identity management issues over the cloud and scenarios and solutions to use those technologies
Challenges on Identity Management While Moving to Cloud
Maintaining Identity for on-premise applications is easy, as you can have a centralized source of Identity which can be used across all applications since they are hosted in your own private network.
Challenges emerge when attempting migration to cloud or building a new application for cloud where the applications would not have direct access to the on-premise directory. Some of the challenges are:
- Most of the origination will already have their own directory setup in their premises and as for security it will be good to maintain it at centralized location at the premise itself. So organization tents to reuse the same over the cloud also.
- To access corporate application user should not has to setup a VPN connection to their network, application should be allowed to access over the internet
- Multiple applications which are tightly coupled with the on-premise identity store like Sql server and the customer want to keep the identity and central location do not want to span to multiple store.
- Allowing user to log once and access all the application seamlessly by adding the single sign-on capability.
To make application extensible such a way without much modification it should work with multiple identity providers which follows different protocols.
Let's look in the following section how Windows Azure platform give solutions to this issues.
Different technique of Identity management
Identity management structure can be classified in two major groups, Role based and Claim based access.
Roles based access is a traditional approach out of most authorization process. In role based authentication user provides credential such as username and password to application, and user will be authenticated based on that. User will map to groups or roles and permissions are provided based on the group or role. Application store user details along with credential in an identity store.
Some of the generally used Microsoft Technologies to implement Role based Identity for on-premise and over the Azure -
ASP.net Membership Profile - This is simple yet powerful technique, where identity can be store on SQL Server or SQL Azure.
Windows Identity - The on premise application can be authenticated directly by windows directory such as Active Directory. Whereas when moving to Azure, domain join could be created by Azure Connect between on-premise and Azure Cloud service, to access on premise windows directory.
Custom store- Custom Identity store can be created over SQL Server or SQL Azure.
In a Claim-based approach the user provides credentials to Identity Provider's Secure Token Service (IP STS), IP STS in turn provides the signed token which has collection of claims, Application extract the claims from token and use the information to execute the business process. Figure shows a simple picture of how this happens.
Trust need to be created between IP STS and Application (Relying Party) by setting up the different protocols, policies and rules for generating a token. Application only accepts the token from the issuer (STS) which it trusts.
Difficulty arise, what if user want to get authenticated by the Identity Provider which Application doesn't trust. We can take one step further to claim based by going to identity federation.
In Federation, the issuer can accept the token form another issuer, instead of authenticating user directly. So issuer becomes federation provider (FP- STS) not only issue token as well accept token from the other Identity Provider (IP- STS). The figure below shows how identity federation is used.
Users first authenticate with an IP- STS and get the Token. They present the tokens they receive from IP -STS to FP-STS, which accepts it and authenticating them directly and Issue token for application to use. This token is what the user sends to application.
Getting security token form STS can be done actively or passively. Active Federation where Relying Party should own login logic where as in passive from browser user gets redirected to the login page hosted by STS. Typically Active Federation uses when Authentication needs to build on Service rather than UI part, where as Passive Federation use to provide authentications of users accessing a web site.
Microsoft Technologies to implement Claim-based Federated Identity for on-premise and over Azure:
- Windows Identity Foundation (WIF): WIF is a set of .NET Framework classes that implement essential identity functions, such as receiving a token, verifying its signature, and accessing the claims it contains.
- Windows Active Directory Service2.0: Its fully featured STS built on Active Directory. The same AD FS 2.0 instance can act as either an identity provider STS or a federation provider STS.
- Windows Azure Access Control Service (ACS): ACS works as a Cloud-based federation provider STS. it simplify user access and authorization in application. ACS allowed application running on cloud or on premise to access the token form on-primes STS of different organization as well as access the token form different cloud identity providers like Windows Live ID, Google, Facebook, Yahoo, and OpenID. ACS supports various protocols, including WS-Federation, WS-Trust, OpenID 2.0, and OAuth 2.0. and accept and issue tokens in SAML and Simple Web Token (SWT) formats.
- Windows Azure Active Directory (WAAD): WAAD is a cloud extension of Windows Server AD. It offers users to extended already existing on-premises Active Directory to the cloud and provides a highly scalable enterprise identity management solution. WAAD is underlying technology for identity management in Office 365, Dynamics CRM Online, Windows Intune, and Windows Azure Online Backup. So if customer has Office 365 / Windows Intune Online accounts, He is already a WAAD-Tenant. There are two major scenarios where WAAD can be used for application building for a single organization or provides support for multi tenant software-as-a-service (SaaS) applications.
Scenarios and Solutions for identity management in Azure
Let's take a very basic scenario where organization migrate an application to azure which use windows authentication to grant access to its user.
Domain join can be created by using Azure connect between Hosted Azure VM / web role to the on-premise network. With this approach there are no changes required in the access management of the application. User can login to the application with their windows credentials as it is allowed in on premise application.
Let's take a another scenario two trading partners exchanging purchase-order messages, where a large high-tech equipment manufacturer to migrate there web application to Azure which use for partners exchanging purchase-order message. Where application should allowed organization and partner user to access the application with their domain credentials
One of the solutions could be federating authentication with Azure ACS. Where between organization and partner Issuer trust can be created with ACS. And the application needs to configure for accepting the token form ACS.
As diagram depict if organization user logs in; user will get redirected to organization ADFS server to get authenticated; whereas for partner user, user get authenticated by their STS.
To make user more convenience automated home realm discovery (HRD) can be implemented where based on cookies or URI/ query string user directed to direct their organization ADFS server.
Benefits of the solution are any number of partners can be connected to site by just doing a configuration in ACS. Or same site can be accessed by the any other social identity providers. As the overhead of the understanding the token format and protocol used by Identity providers is done by the ACS, so no much changes required at application site with respect to identity management.
As the growing the use of the smart phone; user wants their most of the work done by the smart phone itself. User expects to gain access to his data and service same as he gets on his PC. Let's take a scenario where a windows phone app needs to give an access to user with their existing identity and the same time they have to expose secure service that integrate with multiple web identity provider.
Internal web service hosted on premise could be exposed to internet by a secured Azure service bus; same can be consumed by the windows phone application.
To secure the service bus there could be two ways one by Shared Secret or by ACS, In ACS we can configured for the different web identity providers based on the requirement.
Here the windows phone application can authenticate by using passive federation model with ACS. ACS will redirect the user to selected identity provider Login page user will get authenticated by the IP and ACS will generate the SWT / SAML token based on the Token provided by the IP. As in passive federation, we should verify that issuer renders a suitable sign-in page.
Let's take another example where an independent software vendor (ISV), is building a customer relationship management (CRM) solution as a SaaS (Software as a service) based Application. Where for each new customer application need to give access to customer user based on their domain credential. Using Windows Azure AD it's easy to develop identity management for a SaaS based application where application can be easily integrated with multiple WAAD Tenants. Once application is integrated with one WAAD account, there will be no much change to integrate another.
Application should maintain the Windows Azure AD tenants info and key for checking signatures on tokens coming from Windows Azure AD with the respective customer. On first login of the Customer admin it should redirect to a consent page, where he can configure application to access their Windows Azure directory.
Add some logic to redirect unauthenticated requests to the correct Windows Azure AD tenant for user authentication. And the users who authenticated with Windows Azure AD can be recognized and granted access.
Azure support both Role-based and Claim-based access management approach. Domain join can be used to achieve windows authentication on azure similar to on-primes. SQL Azure can used to store member ship profile data for role based authentication. For claim based access ACS and WAAD can used in Azure.
ACS could be used for securing Service Bus, web service and web application. Windows Azure Active Directory enables solutions for many common scenarios such as single sign-on, authentication for multitenant application.
Companies can harness IoT and predictive analytics to sustain business continuity; predict and manage site performance during emergencies; minimize expensive reactive maintenance; and forecast equipment and maintenance budgets and expenditures. Providing cost-effective, uninterrupted service is challenging, particularly for organizations with geographically dispersed operations.
May. 28, 2016 05:00 AM EDT Reads: 2,062
SYS-CON Events announced today TechTarget has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. TechTarget is the Web’s leading destination for serious technology buyers researching and making enterprise technology decisions. Its extensive global networ...
May. 28, 2016 05:00 AM EDT Reads: 3,187
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management...
May. 28, 2016 04:15 AM EDT Reads: 3,162
SYS-CON Events announced today Object Management Group® has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
May. 28, 2016 03:00 AM EDT Reads: 2,496
As cloud and storage projections continue to rise, the number of organizations moving to the cloud is escalating and it is clear cloud storage is here to stay. However, is it secure? Data is the lifeblood for government entities, countries, cloud service providers and enterprises alike and losing or exposing that data can have disastrous results. There are new concepts for data storage on the horizon that will deliver secure solutions for storing and moving sensitive data around the world. ...
May. 28, 2016 03:00 AM EDT Reads: 1,299
SYS-CON Events announced today that MangoApps will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. MangoApps provides modern company intranets and team collaboration software, allowing workers to stay connected and productive from anywhere in the world and from any device. For more information, please visit https://www.mangoapps.com/.
May. 28, 2016 02:30 AM EDT Reads: 778
The essence of data analysis involves setting up data pipelines that consist of several operations that are chained together – starting from data collection, data quality checks, data integration, data analysis and data visualization (including the setting up of interaction paths in that visualization). In our opinion, the challenges stem from the technology diversity at each stage of the data pipeline as well as the lack of process around the analysis.
May. 28, 2016 01:30 AM EDT Reads: 1,436
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
May. 28, 2016 01:00 AM EDT Reads: 1,916
Designing IoT applications is complex, but deploying them in a scalable fashion is even more complex. A scalable, API first IaaS cloud is a good start, but in order to understand the various components specific to deploying IoT applications, one needs to understand the architecture of these applications and figure out how to scale these components independently. In his session at @ThingsExpo, Nara Rajagopalan is CEO of Accelerite, will discuss the fundamental architecture of IoT applications, ...
May. 28, 2016 01:00 AM EDT Reads: 1,246
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
May. 28, 2016 12:30 AM EDT Reads: 2,008
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will exhibit at the 18th International CloudExpo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, New York, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
May. 28, 2016 12:15 AM EDT Reads: 2,414
In his session at 18th Cloud Expo, Bruce Swann, Senior Product Marketing Manager at Adobe, will discuss how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects). Bruce Swann has more than 15 years of experience working with digital marketing disciplines like web analytics, social med...
May. 28, 2016 12:00 AM EDT Reads: 1,325
SYS-CON Events announced today that EastBanc Technologies will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. EastBanc Technologies has been working at the frontier of technology since 1999. Today, the firm provides full-lifecycle software development delivering flexible technology solutions that seamlessly integrate with existing systems – whether on premise or cloud. EastBanc Technologies partners with p...
May. 27, 2016 11:30 PM EDT Reads: 2,305
SYS-CON Events announced today that BMC Software has been named "Siver Sponsor" of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2015 at the Javits Center in New York, New York. BMC is a global leader in innovative software solutions that help businesses transform into digital enterprises for the ultimate competitive advantage. BMC Digital Enterprise Management is a set of innovative IT solutions designed to make digital business fast, seamless, and optimized from mainframe to mo...
May. 27, 2016 10:30 PM EDT Reads: 2,205
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discuss how businesses can gain an edge over competitors by empowering consumers to take control through IoT. We'll cite examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He'll also highlight how IoT can revitalize and restore outdated business models, making them profitable...
May. 27, 2016 07:45 PM EDT Reads: 2,876
Customer experience has become a competitive differentiator for companies, and it’s imperative that brands seamlessly connect the customer journey across all platforms. With the continued explosion of IoT, join us for a look at how to build a winning digital foundation in the connected era – today and in the future. In his session at @ThingsExpo, Chris Nguyen, Group Product Marketing Manager at Adobe, will discuss how to successfully leverage mobile, rapidly deploy content, capture real-time d...
May. 27, 2016 04:45 PM EDT Reads: 1,584
SoftLayer operates a global cloud infrastructure platform built for Internet scale. With a global footprint of data centers and network points of presence, SoftLayer provides infrastructure as a service to leading-edge customers ranging from Web startups to global enterprises. SoftLayer's modular architecture, full-featured API, and sophisticated automation provide unparalleled performance and control. Its flexible unified platform seamlessly spans physical and virtual devices linked via a world...
May. 27, 2016 03:30 PM EDT Reads: 2,213
SYS-CON Events announced today that ContentMX, the marketing technology and services company with a singular mission to increase engagement and drive more conversations for enterprise, channel and SMB technology marketers, has been named “Sponsor & Exhibitor Lounge Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York City, New York. “CloudExpo is a great opportunity to start a conversation with new prospects, but what happens after the...
May. 27, 2016 03:30 PM EDT Reads: 1,144
IoT generates lots of temporal data. But how do you unlock its value? How do you coordinate the diverse moving parts that must come together when developing your IoT product? What are the key challenges addressed by Data as a Service? How does cloud computing underlie and connect the notions of Digital and DevOps What is the impact of the API economy? What is the business imperative for Cognitive Computing? Get all these questions and hundreds more like them answered at the 18th Cloud Expo...
May. 27, 2016 12:00 PM EDT Reads: 2,236
What a difference a year makes. Organizations aren’t just talking about IoT possibilities, it is now baked into their core business strategy. With IoT, billions of devices generating data from different companies on different networks around the globe need to interact. From efficiency to better customer insights to completely new business models, IoT will turn traditional business models upside down. In the new customer-centric age, the key to success is delivering critical services and apps wit...
May. 27, 2016 08:45 AM EDT Reads: 1,156