Identity Centric Architecture Aligning SOA with NGN
-
Upload
catharine24 -
Category
Documents
-
view
989 -
download
1
description
Transcript of Identity Centric Architecture Aligning SOA with NGN
1Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity Centric ArchitectureAligning SOA with NGN
Rakesh RadhakrishnanAugust 29, 2007Liberty Alliance Webcast Series
http://identity-centric-architecture.blogspot.com/
2Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Agenda Topics• Identity enabled Sensor Networks• Identity enabled Programmable Networks• Identity enabled WiMAX & Wifi Networks• Identity enabled IMS Network and Network Services• Identity enabled Enterprise Networks (NAC)• Identity enabled IN Services• Identity enabled OAM&P Services (IPSF/ITSM) • Identity enabled Web Services• Identity enabled ESB Services• Identity enabled DRM Services• Identity enabled ILM• Identity enabled User Centric Services
3Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
9 Pain Points (Mobility with Security)
- 9 Pain Points to addresses Mobility for SOA – Seamless Integration of different Access Networks– Secure and Controlled integration of external SP– Integrated registration and customer service support– Common view of the static and dynamic data of the
customer– Access control and content filtering– Flexible and convergent charging– Integrated environment for VAS development and
management– Integrated environment for multi-device support– Management of internal and external content and DRM
policy support
4Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
9 Step Process (Mobility with Security)
- Step 1: Reputation - Step 2: Rigid Authentication- Step 3: Random numbers/token generation - Step 4: Roles - Roles based Access Control (RBAC) - Step 5: Rules- Step 6: Resources- Step 7: Relationship - Step 8: Regulation- Step 9: Real-time Observe-ability
5Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity System
• Relationship. Regulation and RT
Trust Relationships, Auditing and
RT visual
Trust Relationships, Auditing and
RT visual
AuthNConfident-
ialityIntegrity
AuthNConfident-
ialityIntegrity
• Reputation & Rigid AuthN
Distributed Session, AuthN
Session, restrictions
Distributed Session, AuthN
Session, restrictions
• Random No=Token
Includes fine grain
rights mgmt, aligned AuthZ
Includes fine grain
rights mgmt, aligned AuthZ
• Roles, Rules and Resources
6Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Vertical Integration
Access & Sensor Network IDS
Core & Federated Network IDS
Content & Service Centric IDS
User & Device Centric IDSUser ID & ProfileDevice ID & ProfileUser & Device specific Policies
AM Agents for Wifi, WiMAX, BPL, Cable head end, xDSL, RFID/EPC & more
FM integration with OAM, NG IN, HSS, HLR, NAC, FW & more
Integration with ServiceRegistry Repository, ESB,DRM, Service specific Policies, & more.
7Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled Sensor Networks
8Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled Sensor Networks
• Connecting Business at the edge• Solution for Warehouse Management• Solution for Physical Asset Tracking• Solution for Drug authentication• Solution for Transportation and Distribution• Solution for Retail Sales• Logical and Physical Authentication• Logical and Physical Authorization & Access Control• Sizzle and ECC enabled Containers• Correlating RFID with product profiles• Product Authentication
9Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled Programmable Networks
10Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled Programmable Networks
• Programmable Active Grid Networks• Virtualized Systems & Resources• Provision-able Services & Software• Provisionally Compute, bandwidth and storage
resource• System Service Container• Utility Model• Trusted Network Computing (TCG standard)• Encryption to devices (compute and storage)
11Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled Wireless Networks (Wifi/Wimax/4G)
12Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled Wireless Networks (Wifi/Wimax)
• Integrated Wifi Access Controllers• Integrated with WiMAX base stations• Access Manager's support for RADIUS• AAA Services (replaced with ID/NAC)• One IDP for 20 WiMAX base stations that is part of a Mesh
(or a Wifi Mesh)• Applicable to BPL as well (broadband over power line• Connectivity after Authentication (Boingo)
13Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled IMS Networks/Network Services
14Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled IMS Networks/Network Services
• Loose Integration with HSS• HSS could potentially extent to WiMax/4G• Broad NEP Support• Federation and SSO• Integrated Provisioning, SEM and Auditing• ID enabled IMS Services (location, presence, etc.)• Integrated with Telecom SOA & Web Services
15Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled Enterprise Networks (NAC)
16Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled Enterprise Networks (NAC)
• Industry Support (CTO) Sean Convery, Identity Engines, Paul Sangster, Symantec, Sanjay Uppal, Caymas Systems, Robin Matherus, Oracle & Jeff Prince, ConSentry Networks
• Weave together the application and network layers of corporate networks
• Trusted Network Technologies• Machine AC and User AC• NAP and NAC (access protection and admission control)• Pre-admission to the network (patch levels, anti-virus and spyware
detection)• Replaces RADIUS and AAA
17Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled NG IN Services
18Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled NG IN Services
• SLEE Container Integration• SBB lookups• JEE Container Integration• Common Security Framework• NG IN Services are device and network agnostic• Device Identities as well (TS 69)• Integrated IN Services (3G, wireline, IP, etc.)• Location, Presence, etc., are NG IN Services
19Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled OAM&P Services
20Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled OAM&P Services
• OSS/J Services run on JEE Containers• Additional Modules -PAM• Federation• Session Centric Policies• Manage the Control Plane and the Service Plane• Adopted by NEP's • Integrates with RADIUS, Tacacs, AAA, etc.• Usefull for Outsourcing Models (OAM outsourcing)
21Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled ESB Services
22Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled ESB Services
• Linking Service Registries• Federation for Choreography• QOS Policies• Authentication Levels• Secure Service Broker-ing• JSR 196 Support• Aligning Identity life-cycle with Service lifecycle• Service Orchestration Aligning with Policy
Execution
23Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled DRM Services
24Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled DRM Services
• Inter-operable user centric DRM leverages an IDP• Federation for DRM• Content to Service agnostic• Device and Access Network agnostic• Important for IPTV and VOD services• Disintermediation• Adoption by AT&T (SBC) in the US• Proposed at ATIS• Potential for leveraging XACML 3.x
25Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled ILM Services
26Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled ILM Services
• Harnessing Data Sprawl• Common Anchor of Intelligence (Identity)• Tighter Control makes information accessible• Identity Aware Data• Foundation for ID enabled SOA• Meta Layer – OMG's MDA
27Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled UC ID Services
28Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Identity enabled UC ID Services
• In the Identity 2.0 space• SXIP, DIX, LID, OpenID, OpenSSO, I-names and more • user centric, • XRI/XDI or URI based, • Distributed identity system for the developer community. • Industry specific identity initiatives as well - such as E-NUM for
Telco, E-HR for Healthcare, and more that uses unique identifiers and industry specific profile (identity schema)
• Identity discovery services such as YADIS • Ruby in Rails on Web Containers for OpenID• OpenID as a SAML assertion
29Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Vertical Integration of ID Services and Systems
30Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Vertical Integration• Device Centric IDS• User Centric IDS• Access Network Centric IDS• Control Network Centric IDS• Enterprise Network Centric IDS (NAC, etc,)• Service Centric IDS• Information/Data Centric IDS• Content Centric IDS (DRM)• And more.
31Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Vertical Integration• Profile Services
• About users (profile and reputation)• About Services (profile and behaviours)• About Devices (profile and context)• About content (profile and drm)• About data (meta-data and ilm)
•This intelligence actually need not be SILO'd, it can be integrated through;
-consolidation (virtual mapping), -federation (linking),-correlation (linking based on policies),-aggregation (using it as a core reusable SBB/IDSP within an EA), and,-trailing (indexing), xri, etc.
32Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Vertical Integration via Standards• TS69• XRI/XDI• GUP/ENUM• iName/iNumber• SAML, XACML• Federation (liberty)• Trusted Network Computing• OSE• DevID• PubID/ConID• RFID/EP• IPSF and ITSM (for QOS and SLA)• ITU-FG and Liberty Concordia
33Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Vertical Integration via Meta Layer• Morpghing into a Multi-M (media/modal/protocol) Meta System
- Actividentity for integrating logical and physical asset security with the Identity System.- Approva for integrating, streamlining and automating compliant provisioning processes with the Identity System.- Bridgestream for integrating roles management solution with the Identity System.- Bonsai Networks for integrating Wifi (& Wimax) Service Managers with the Identity System.- Consul for integrating privileged user monitoring and auditing with the Identity System.- Leapstone for integrating Service Brokering and Subscriber information with the Identity System.- Locationnet platform for GIS engine and location application engine integration with the Identity System.- Lucents VOIP platform integration with Identity (& Directory) System.- Mobicents SLEE and other SLEE platforms integration for policies, profiles, etc., with the Identity System.- Passlogix for integrating simplified enterprise & desktop SSO (non web applications) with the Identity System.- Pronto Networks for integrating wireless SDP (service delivery platform) with the Identity System.- Vaau for integrating role engineering, identity auditing and identity certification with the Identity System.- Verimatrix for integrating with OMC DRM via disintermediation (d15n- implied) with the Identity System.- Virsa for integrating continuous compliance and real time insights with the Identity System.- Nominum for Secure Sharing and Managing ENUM profile (iName and iNumber as well)- Layer 7 for integrating with XML firewall – security co-processing with ESB- IDE NetBeans for integrating with a development tool- Appium for Profile sharing
34Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Vertical Integration
Access & Sensor Network IDS
Core & Federated Network IDS
Content & Service Centric IDS
User & Device Centric IDSUser ID & ProfileDevice ID & ProfileUser & Device specific Policies
AM Agents for Wifi, WiMAX, BPL, Cable head end, xDSL, RFID/EPC & more
FM integration with OAM, NG IN, HSS, HLR, NAC, FW & more
Integration with ServiceRegistry Repository, ESB,DRM, Service specific Policies, & more.
35Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
2008
Vertical Integration Target State
36Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Vertical Integration Target StateTo achieve this target state (as depicted in the picture above) an Identity System (with a the 5 integration models) has to be integrated:
● with the User (the "me") : User Centric Identity Systems (URI/XRI based, extensive profile, preferences and policies -defined by the user);● with the Access Devices (such as TS69/OMA): Device Centric Identity Systems (for device profile, machine authentication, virus checks, client side fire wall updates, sensory devices, etc.).,● with the Access Networks (for context, QOS capabilities of access networks, session traversals, mobility, etc.).,● with the Core Network (for controlled invocation, federation, secure choreography, OAM&P, NG IN, Single Sign-off, auditing, etc.).,● with the Service Networks (for NAC, RBAC, Service orchestration, ESB, programmable network elements, service profile, context, etc.).,● and the Content Networks (for disintermediation of DRM, entitlement, content protection, content profile, content context, etc.).
37Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Project Liberty Slides – Business Problem -Structural Changes in the Industry
38Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Project Liberty Slides – Business Problem -Trust, QOE and Secure
39Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Project Liberty Slides – Business Problem -enabler the Business of Government and Enterprise
40Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Project Liberty Slides – Business Problem -Who is Who? What is What? Who gets access to What?
41Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Project Liberty Slides – Business Problem -Aligning with Inter-oprable Standards
42Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Project Liberty Slides – Business Problem -Secure delivery of Content (IPTV, Games, etc.)
43Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Project Liberty Slides – Business Problem -Revenue Flow (access and usage)
44Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Project Liberty Slides – Business Problem -Lack of a Cohesive Contrl Layer
45Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Project Liberty Slides – Business Problem -Seperation of Concerns
46Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Project Liberty Slides
47Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Project Liberty Slides – Business Problem -Convergence
48Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Project Liberty Slides – Business Problem -Leverage Voice as an Application
49Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Project Liberty Slides – Business Problem -Privacy and Policies
50Sun Microsystems, Inc.
Proprietary & ConfidentialInternal Use ONLY
Sun Microsystems, Inc. Proprietary & Confidential
Close