23
Tue, Apr
1 New Articles

System Sentinel: An Introduction to Federated Identity Management

Security - Other
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

In last month's article, I explained the importance of a varied, tailored approach to authentication. I now want to expand on the topic of authentication to introduce the subject of Federated Identity Management (FIM), something that is likely to affect both you and the organizations you work for over the coming years. FIM can be thought of as a mechanism to simplify identity processing across organizational boundaries.

Continuing in the vein of my last article, I return to my favorite movie, Monty Python and the Holy Grail, to explain what this definition of FIM really means. In the movie, King Arthur asks a simple question of one of his lowly subjects he meets by the side of the road. The peasant, named Dennis, objects to the way King Arthur automatically treats him as an inferior. King Arthur explains that he is superior because he is their king. Not satisfied with the answer, Dennis asks, "Well how'd you become king then?" As atmospheric music rises in the background, the king explains, "The Lady of the Lake, her arm clad in the purest shimmering samite, held aloft Excalibur from the bosom of the water, signifying by divine providence that I, Arthur, was to carry Excalibur. That is why I am your king." Dennis immediately challenges with an ultimate put-down remark: "Listen, strange women lying in ponds distributing swords is no basis for a system of government. Supreme executive power derives from a mandate from the masses, not from some farcical aquatic ceremony."

I choose to ignore the political implications of this comment, but I want to dwell on the authentication side of this scene. How does King Arthur justify being the king? Just because his courtiers and knights saw the mystical ceremony involving the Lady of the Lake does not mean that all of his subjects will immediately recognize his position as their ruler. That is one of the basic tenets of FIM: proving to multiple parties that you are who you say you are.

The inter-connectedness of business these days provides many security dilemmas. One of those is the fact that an organization can no longer focus only on its own internal subset of users. Access to applications and databases can come from partners, clients, and affiliated companies. So how should a company authenticate users trying to access its systems? Of course, the classic way, as we discussed last month, is by using some sort of user ID and a password/token/biometric. But that has two major drawbacks: It is another prompt for the user to navigate through in order to get to the data, and for the organization, there is yet another identity to maintain in the user registries.

If we consider business on the Web, FIM is part of a solution to these problems because it enables the sharing of user identities across trusted domains. As an example, let's consider a car manufacturer. When its users validate themselves in the morning, they are permitted to access many of their internal applications through some sort of single sign-on solution. But as part of their daily work, they may need to access other companies' Web-based applications:

  • Car dealers, to check on their stock levels and promotions
  • Component manufacturers, to review product details and shipping information
  • Travel companies, to review and book trips using the corporate travel scheme

Traditionally, for each of these examples (including multiple dealers and multiple suppliers), the car manufacturer's users will need to revalidate themselves, each time entering another user ID and another password. In addition, someone has to maintain the user details on each system the user might touch. FIM, along with associated technologies, allows the car manufacturer to assert that it has correctly validated its internal users so that these ancillary companies do not need to ask them again for their passwords and IDs.

So how might this work, and what benefits are derived from this approach to security? Let's cover some of the concepts behind FIM, and then we will look at an overview of the technology.

What Is FIM?

Conceptually, there are four main areas to FIM: identity mapping, profile attribute sharing, single sign-on, and user administration.

  • Identity Mapping--Most people agree that there will never be a solution in which every user repository agrees on consistent naming conventions for each user ID. Therefore, one of the first concepts an FIM solution needs to address is that a user will be called JSMITH in one registry, SmithJohn in another, and even JS992830 in another. Identity mapping joins all of these together.
  • Profile Attribute Sharing--Once external users have been authenticated and permitted access to your system, what can they do on your system? The only sensible way to control this is through Role-Based Access Control (RBAC). This means that when the component manufacturer receives a request from the car manufacturer's "Accounts Payable clerk level 2," the component manufacturer knows what permissions to grant to that user.
  • Single Sign-on--If the technology can share authentication information across domains, there is no need to ask users to repeatedly enter passwords and user IDs.
  • User Administration--Some organizational entity needs to take responsibility for maintaining user ID details, and all organizations involved must trust that administrating company to perform that task correctly and securely.

At this point, it is important that I remind you of IBM's Enterprise Identity Mapping (EIM) solution, which I mentioned last month. Although EIM has nothing directly to do with authentication, it is a powerful enabler to achieve reduced sign-on in the eServer marketplace. In reviewing these four concepts of FIM, we can see that EIM is part of an eServer-centric solution that already mirrors FIM. Not many people realize the power and impact of the EIM technology. (My apologies for the similarity between these two abbreviations. I did not name them!)

Technology Overview

It's not hard to understand the concepts of FIM and the potential behind them, but what about the reality? Is this another security architecture with great promise that will never achieve its true potential? Actually, FIM projects are already starting to succeed in terms of connecting an organization's partners, customers, and employees on multiple applications around the Web. It's not easy, but it's possible.

One reason we are starting to see successful FIM implementations is because of the strength of the standards behind FIM. Obviously, when we talk about connecting multiple user registries in multiple domains, those domains must agree on the structure and content of security and identity data. Several organizations are making powerful strides toward practical standards:

The Liberty Alliance
The Internet2 Shibboleth Project
The OASIS Web Services security standards

The OASIS project has brought forth a specialized framework called Security Assertion Markup Language (SAML). OASIS says, "SAML is an XML-based framework for communicating user authentication, entitlement, and attribute information. As its name suggests, SAML allows business entities to make assertions regarding the identity, attributes, and entitlements of a subject (an entity that is often a human user) to other entities, such as a partner company or another enterprise application." As SAML has matured since its launch in late 2002, it has also promoted convergence with the other standards. The current version, SAML V2.0, is already a useable standard.

Maturing standards mean that we can put the technology in place and agree on the necessary relationships. For example, one organization (or more than one for failover purposes) agrees to be an "identity provider" for a subset of users. It is that company's responsibility to perform the user ID administration on behalf of all the domains in the federation. Other organizations within the federation are then just "service providers." It is their duty to allow access to their applications and databases based upon authentication and profile attributes received from the "identity provider."

However, the final challenge to the increase in successful FIM projects is the maturity of the domains involved in the process. The first few successful projects have involved some of the usual suspects--for example, some are in the federal marketplace, where there has been strong collaboration before and there is already the required level of trust. Similarly, some of the major car manufacturers have demonstrated the necessary power to persuade their affiliated companies that they are ideal and trustworthy central identity managers.

But it is not as simple as that. Referring back to my example, does the component manufacturer have sufficient control of its own users and authentication controls that it will be invited to the party by the car manufacturer? If the component manufacturer has a disorganized profile base, with no implementation of an RBAC solution, then including that company as a domain in a FIM project would be dangerous.

But these problems can be overcome. With better internal controls, many organizations can start to look at the actual tools that will make FIM a reality for them. This will be beneficial in many ways:

  • To the users--In addition to a better user experience and less frustration, the internal users will see much more cooperation with partners by sensible sharing of common data.
  • To the enterprise--The company will benefit from reduction in costs, decreased help desk intervention, and greater productivity.
  • To the external client--We can replace the realtor's mantra of "location, location, location" with "single sign-on, single sign-on, single sign-on."

It's in Your Future

Clearly, FIM is a concept that is driven by very powerful motivators for all parties involved in these federated domains. So we have strong, recognized needs. And we have a lot of powerful organizations behind the standards--IBM, Microsoft, GM, AOL, and RSA, to name a few. We have successful initial projects, proving that this is not just theory.

My recommendation is to take some time to look at this area of security and see how it will affect and benefit you. The links to the standards organizations mentioned above are a good starting point, as is this IBM Redbook: Federated Identity Management and Secure Web Services.

Martin Norman is Senior Systems Engineer for SafeStone Technologies, an IBM BP specializing in compliance and identity management. As one of the original developers of SafeStone's security portfolio, Martin has performed security audits and advised on installations for clients throughout the United States and Europe. Martin can be contacted at This email address is being protected from spambots. You need JavaScript enabled to view it..

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$0.00 Raised:
$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: