Identity Centric Architecture Aligning SOA with NGN

50
1 Sun Microsystems, Inc. Proprietary & Confidential Internal Use ONLY Sun Microsystems, Inc. Proprietary & Confidential Identity Centric Architecture Aligning SOA with NGN Rakesh Radhakrishnan August 29, 2007 Liberty Alliance Webcast Series http://identity-centric-architecture.blogspot.com/

description

 

Transcript of Identity Centric Architecture Aligning SOA with NGN

Page 1: Identity Centric Architecture Aligning SOA with NGN

1Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity Centric ArchitectureAligning SOA with NGN

Rakesh RadhakrishnanAugust 29, 2007Liberty Alliance Webcast Series

http://identity-centric-architecture.blogspot.com/

Page 2: Identity Centric Architecture Aligning SOA with NGN

2Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Agenda Topics• Identity enabled Sensor Networks• Identity enabled Programmable Networks• Identity enabled WiMAX & Wifi Networks• Identity enabled IMS Network and Network Services• Identity enabled Enterprise Networks (NAC)• Identity enabled IN Services• Identity enabled OAM&P Services (IPSF/ITSM) • Identity enabled Web Services• Identity enabled ESB Services• Identity enabled DRM Services• Identity enabled ILM• Identity enabled User Centric Services

Page 3: Identity Centric Architecture Aligning SOA with NGN

3Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

9 Pain Points (Mobility with Security)

- 9 Pain Points to addresses Mobility for SOA – Seamless Integration of different Access Networks– Secure and Controlled integration of external SP– Integrated registration and customer service support– Common view of the static and dynamic data of the

customer– Access control and content filtering– Flexible and convergent charging– Integrated environment for VAS development and

management– Integrated environment for multi-device support– Management of internal and external content and DRM

policy support

Page 4: Identity Centric Architecture Aligning SOA with NGN

4Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

9 Step Process (Mobility with Security)

- Step 1: Reputation - Step 2: Rigid Authentication- Step 3: Random numbers/token generation - Step 4: Roles - Roles based Access Control (RBAC) - Step 5: Rules- Step 6: Resources- Step 7: Relationship - Step 8: Regulation- Step 9: Real-time Observe-ability

Page 5: Identity Centric Architecture Aligning SOA with NGN

5Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity System

• Relationship. Regulation and RT

Trust Relationships, Auditing and

RT visual

Trust Relationships, Auditing and

RT visual

AuthNConfident-

ialityIntegrity

AuthNConfident-

ialityIntegrity

• Reputation & Rigid AuthN

Distributed Session, AuthN

Session, restrictions

Distributed Session, AuthN

Session, restrictions

• Random No=Token

Includes fine grain

rights mgmt, aligned AuthZ

Includes fine grain

rights mgmt, aligned AuthZ

• Roles, Rules and Resources

Page 6: Identity Centric Architecture Aligning SOA with NGN

6Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Vertical Integration

Access & Sensor Network IDS

Core & Federated Network IDS

Content & Service Centric IDS

User & Device Centric IDSUser ID & ProfileDevice ID & ProfileUser & Device specific Policies

AM Agents for Wifi, WiMAX, BPL, Cable head end, xDSL, RFID/EPC & more

FM integration with OAM, NG IN, HSS, HLR, NAC, FW & more

Integration with ServiceRegistry Repository, ESB,DRM, Service specific Policies, & more.

Page 7: Identity Centric Architecture Aligning SOA with NGN

7Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled Sensor Networks

Page 8: Identity Centric Architecture Aligning SOA with NGN

8Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled Sensor Networks

• Connecting Business at the edge• Solution for Warehouse Management• Solution for Physical Asset Tracking• Solution for Drug authentication• Solution for Transportation and Distribution• Solution for Retail Sales• Logical and Physical Authentication• Logical and Physical Authorization & Access Control• Sizzle and ECC enabled Containers• Correlating RFID with product profiles• Product Authentication

Page 9: Identity Centric Architecture Aligning SOA with NGN

9Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled Programmable Networks

Page 10: Identity Centric Architecture Aligning SOA with NGN

10Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled Programmable Networks

• Programmable Active Grid Networks• Virtualized Systems & Resources• Provision-able Services & Software• Provisionally Compute, bandwidth and storage

resource• System Service Container• Utility Model• Trusted Network Computing (TCG standard)• Encryption to devices (compute and storage)

Page 11: Identity Centric Architecture Aligning SOA with NGN

11Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled Wireless Networks (Wifi/Wimax/4G)

Page 12: Identity Centric Architecture Aligning SOA with NGN

12Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled Wireless Networks (Wifi/Wimax)

• Integrated Wifi Access Controllers• Integrated with WiMAX base stations• Access Manager's support for RADIUS• AAA Services (replaced with ID/NAC)• One IDP for 20 WiMAX base stations that is part of a Mesh

(or a Wifi Mesh)• Applicable to BPL as well (broadband over power line• Connectivity after Authentication (Boingo)

Page 13: Identity Centric Architecture Aligning SOA with NGN

13Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled IMS Networks/Network Services

Page 14: Identity Centric Architecture Aligning SOA with NGN

14Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled IMS Networks/Network Services

• Loose Integration with HSS• HSS could potentially extent to WiMax/4G• Broad NEP Support• Federation and SSO• Integrated Provisioning, SEM and Auditing• ID enabled IMS Services (location, presence, etc.)• Integrated with Telecom SOA & Web Services

Page 15: Identity Centric Architecture Aligning SOA with NGN

15Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled Enterprise Networks (NAC)

Page 16: Identity Centric Architecture Aligning SOA with NGN

16Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled Enterprise Networks (NAC)

• Industry Support (CTO) Sean Convery, Identity Engines, Paul Sangster, Symantec, Sanjay Uppal, Caymas Systems, Robin Matherus, Oracle & Jeff Prince, ConSentry Networks

• Weave together the application and network layers of corporate networks

• Trusted Network Technologies• Machine AC and User AC• NAP and NAC (access protection and admission control)• Pre-admission to the network (patch levels, anti-virus and spyware

detection)• Replaces RADIUS and AAA

Page 17: Identity Centric Architecture Aligning SOA with NGN

17Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled NG IN Services

Page 18: Identity Centric Architecture Aligning SOA with NGN

18Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled NG IN Services

• SLEE Container Integration• SBB lookups• JEE Container Integration• Common Security Framework• NG IN Services are device and network agnostic• Device Identities as well (TS 69)• Integrated IN Services (3G, wireline, IP, etc.)• Location, Presence, etc., are NG IN Services

Page 19: Identity Centric Architecture Aligning SOA with NGN

19Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled OAM&P Services

Page 20: Identity Centric Architecture Aligning SOA with NGN

20Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled OAM&P Services

• OSS/J Services run on JEE Containers• Additional Modules -PAM• Federation• Session Centric Policies• Manage the Control Plane and the Service Plane• Adopted by NEP's • Integrates with RADIUS, Tacacs, AAA, etc.• Usefull for Outsourcing Models (OAM outsourcing)

Page 21: Identity Centric Architecture Aligning SOA with NGN

21Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled ESB Services

Page 22: Identity Centric Architecture Aligning SOA with NGN

22Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled ESB Services

• Linking Service Registries• Federation for Choreography• QOS Policies• Authentication Levels• Secure Service Broker-ing• JSR 196 Support• Aligning Identity life-cycle with Service lifecycle• Service Orchestration Aligning with Policy

Execution

Page 23: Identity Centric Architecture Aligning SOA with NGN

23Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled DRM Services

Page 24: Identity Centric Architecture Aligning SOA with NGN

24Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled DRM Services

• Inter-operable user centric DRM leverages an IDP• Federation for DRM• Content to Service agnostic• Device and Access Network agnostic• Important for IPTV and VOD services• Disintermediation• Adoption by AT&T (SBC) in the US• Proposed at ATIS• Potential for leveraging XACML 3.x

Page 25: Identity Centric Architecture Aligning SOA with NGN

25Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled ILM Services

Page 26: Identity Centric Architecture Aligning SOA with NGN

26Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled ILM Services

• Harnessing Data Sprawl• Common Anchor of Intelligence (Identity)• Tighter Control makes information accessible• Identity Aware Data• Foundation for ID enabled SOA• Meta Layer – OMG's MDA

Page 27: Identity Centric Architecture Aligning SOA with NGN

27Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled UC ID Services

Page 28: Identity Centric Architecture Aligning SOA with NGN

28Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Identity enabled UC ID Services

• In the Identity 2.0 space• SXIP, DIX, LID, OpenID, OpenSSO, I-names and more • user centric, • XRI/XDI or URI based, • Distributed identity system for the developer community. • Industry specific identity initiatives as well - such as E-NUM for

Telco, E-HR for Healthcare, and more that uses unique identifiers and industry specific profile (identity schema)

• Identity discovery services such as YADIS • Ruby in Rails on Web Containers for OpenID• OpenID as a SAML assertion

Page 29: Identity Centric Architecture Aligning SOA with NGN

29Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Vertical Integration of ID Services and Systems

Page 30: Identity Centric Architecture Aligning SOA with NGN

30Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Vertical Integration• Device Centric IDS• User Centric IDS• Access Network Centric IDS• Control Network Centric IDS• Enterprise Network Centric IDS (NAC, etc,)• Service Centric IDS• Information/Data Centric IDS• Content Centric IDS (DRM)• And more.

Page 31: Identity Centric Architecture Aligning SOA with NGN

31Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Vertical Integration• Profile Services

• About users (profile and reputation)• About Services (profile and behaviours)• About Devices (profile and context)• About content (profile and drm)• About data (meta-data and ilm)

•This intelligence actually need not be SILO'd, it can be integrated through;

-consolidation (virtual mapping), -federation (linking),-correlation (linking based on policies),-aggregation (using it as a core reusable SBB/IDSP within an EA), and,-trailing (indexing), xri, etc.

Page 32: Identity Centric Architecture Aligning SOA with NGN

32Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Vertical Integration via Standards• TS69• XRI/XDI• GUP/ENUM• iName/iNumber• SAML, XACML• Federation (liberty)• Trusted Network Computing• OSE• DevID• PubID/ConID• RFID/EP• IPSF and ITSM (for QOS and SLA)• ITU-FG and Liberty Concordia

Page 33: Identity Centric Architecture Aligning SOA with NGN

33Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Vertical Integration via Meta Layer• Morpghing into a Multi-M (media/modal/protocol) Meta System

- Actividentity for integrating logical and physical asset security with the Identity System.- Approva for integrating, streamlining and automating compliant provisioning processes with the Identity System.- Bridgestream for integrating roles management solution with the Identity System.- Bonsai Networks for integrating Wifi (& Wimax) Service Managers with the Identity System.- Consul for integrating privileged user monitoring and auditing with the Identity System.- Leapstone for integrating Service Brokering and Subscriber information with the Identity System.- Locationnet platform for GIS engine and location application engine integration with the Identity System.- Lucents VOIP platform integration with Identity (& Directory) System.- Mobicents SLEE and other SLEE platforms integration for policies, profiles, etc., with the Identity System.- Passlogix for integrating simplified enterprise & desktop SSO (non web applications) with the Identity System.- Pronto Networks for integrating wireless SDP (service delivery platform) with the Identity System.- Vaau for integrating role engineering, identity auditing and identity certification with the Identity System.- Verimatrix for integrating with OMC DRM via disintermediation (d15n- implied) with the Identity System.- Virsa for integrating continuous compliance and real time insights with the Identity System.- Nominum for Secure Sharing and Managing ENUM profile (iName and iNumber as well)- Layer 7 for integrating with XML firewall – security co-processing with ESB- IDE NetBeans for integrating with a development tool- Appium for Profile sharing

Page 34: Identity Centric Architecture Aligning SOA with NGN

34Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Vertical Integration

Access & Sensor Network IDS

Core & Federated Network IDS

Content & Service Centric IDS

User & Device Centric IDSUser ID & ProfileDevice ID & ProfileUser & Device specific Policies

AM Agents for Wifi, WiMAX, BPL, Cable head end, xDSL, RFID/EPC & more

FM integration with OAM, NG IN, HSS, HLR, NAC, FW & more

Integration with ServiceRegistry Repository, ESB,DRM, Service specific Policies, & more.

Page 35: Identity Centric Architecture Aligning SOA with NGN

35Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

2008

Vertical Integration Target State

Page 36: Identity Centric Architecture Aligning SOA with NGN

36Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Vertical Integration Target StateTo achieve this target state (as depicted in the picture above) an Identity System (with a the 5 integration models) has to be integrated:

● with the User (the "me") : User Centric Identity Systems (URI/XRI based, extensive profile, preferences and policies -defined by the user);● with the Access Devices (such as TS69/OMA): Device Centric Identity Systems (for device profile, machine authentication, virus checks, client side fire wall updates, sensory devices, etc.).,● with the Access Networks (for context, QOS capabilities of access networks, session traversals, mobility, etc.).,● with the Core Network (for controlled invocation, federation, secure choreography, OAM&P, NG IN, Single Sign-off, auditing, etc.).,● with the Service Networks (for NAC, RBAC, Service orchestration, ESB, programmable network elements, service profile, context, etc.).,● and the Content Networks (for disintermediation of DRM, entitlement, content protection, content profile, content context, etc.).

Page 37: Identity Centric Architecture Aligning SOA with NGN

37Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Project Liberty Slides – Business Problem -Structural Changes in the Industry

Page 38: Identity Centric Architecture Aligning SOA with NGN

38Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Project Liberty Slides – Business Problem -Trust, QOE and Secure

Page 39: Identity Centric Architecture Aligning SOA with NGN

39Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Project Liberty Slides – Business Problem -enabler the Business of Government and Enterprise

Page 40: Identity Centric Architecture Aligning SOA with NGN

40Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Project Liberty Slides – Business Problem -Who is Who? What is What? Who gets access to What?

Page 41: Identity Centric Architecture Aligning SOA with NGN

41Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Project Liberty Slides – Business Problem -Aligning with Inter-oprable Standards

Page 42: Identity Centric Architecture Aligning SOA with NGN

42Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Project Liberty Slides – Business Problem -Secure delivery of Content (IPTV, Games, etc.)

Page 43: Identity Centric Architecture Aligning SOA with NGN

43Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Project Liberty Slides – Business Problem -Revenue Flow (access and usage)

Page 44: Identity Centric Architecture Aligning SOA with NGN

44Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Project Liberty Slides – Business Problem -Lack of a Cohesive Contrl Layer

Page 45: Identity Centric Architecture Aligning SOA with NGN

45Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Project Liberty Slides – Business Problem -Seperation of Concerns

Page 46: Identity Centric Architecture Aligning SOA with NGN

46Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Project Liberty Slides

Page 47: Identity Centric Architecture Aligning SOA with NGN

47Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Project Liberty Slides – Business Problem -Convergence

Page 48: Identity Centric Architecture Aligning SOA with NGN

48Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Project Liberty Slides – Business Problem -Leverage Voice as an Application

Page 49: Identity Centric Architecture Aligning SOA with NGN

49Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Project Liberty Slides – Business Problem -Privacy and Policies

Page 50: Identity Centric Architecture Aligning SOA with NGN

50Sun Microsystems, Inc.

Proprietary & ConfidentialInternal Use ONLY

Sun Microsystems, Inc. Proprietary & Confidential

Close