Uma webinar 2014 06-19

41
Protecting “Personal Clouds” with UMA and OpenID Connect @UMAWG #UMApcloud for questions 19 June 2014 tinyurl.com/umawg for slides, recording, and more 1

description

Webinar: Managing Access to Personal Data: Protecting "Personal Clouds" with UMA and OpenID Connect You can't spell human without UMA... The User-Managed Access (UMA) protocol was created to help individuals gain control over data sharing -- with software applications, with family and friends, with online retailers, and even with doctors and employers.

Transcript of Uma webinar 2014 06-19

Page 1: Uma webinar 2014 06-19

Protecting “Personal Clouds” with UMA and OpenID Connect

@UMAWG #UMApcloud for questions

19 June 2014 tinyurl.com/umawg for slides, recording, and more

1

Page 2: Uma webinar 2014 06-19

The marvelous spiral of controlled personal data sharing

2

Further reading: tinyurl.com/umawg

Page 3: Uma webinar 2014 06-19

Agenda •  The realities and challenges

of personal data sharing •  “UMA for humans 101” •  A walk through personal

cloud models •  Use cases •  How UMA leverages OpenID

Connect – with demo •  Next steps

3

Thanks to Kantara for supporting the UMA work!

Thanks to our additional webinar participants!

Thanks to MIT-KIT for sponsoring this webinar

and taking part!

Page 4: Uma webinar 2014 06-19

The realities and challenges of personal data sharing

4

Page 5: Uma webinar 2014 06-19

What is personal data?

5

Personal Data is the Life Blood of the Information Age

Personal Data is the New “Oil of the Internet”

Personal Data is the new currency

Page 6: Uma webinar 2014 06-19

Ways to measure the value of personal data

6

•  Market capitalization

•  Revenue per record/user

•  Market Price •  Cost of data breach •  Pay to protect

$112  per  user  record  

0! 10! 20! 30! 40!

Streat address!

Data of Birth!

Social Number!

Military record!

USD  1.7  per  record  Data  breach  cost  $171M  

Source:  OECD  (2013),  “Exploring  the  Economics  of  Personal  Data:  A  Survey  of  Methodologies  for  Measuring  Monetary  Value”  

USD  

Page 7: Uma webinar 2014 06-19

Personal data risks

7

Individual   OrganizaPon  

Personal  Data  

…t  e  n  s  i  o  n…  

“72%  of  European  ciPzens  are  concerned  that  their  personal  data  may  be  misused…”  

Individuals have little visibility into the practices of the organizations they are putting their trust in – until their data is breached or misused.

Risks:  Loss  of  Trust  

EU  commission  survey  2012  

Page 8: Uma webinar 2014 06-19

The “personal data price” for online service is too high: typing…

•  Provisioning by hand

•  Provisioning by value

•  Oversharing •  Lying!

8

Page 9: Uma webinar 2014 06-19

The “personal data price” for online service is too high: connecting…

•  Meaningless consent to unfavorable terms

•  Painful, inconsistent, and messy access management

•  Oblivious oversharing

9

Page 10: Uma webinar 2014 06-19

The “personal data price” for online service is too high: private URLs…

•  Handy but insecure

•  Unsuitable for really sensitive data

10

Page 11: Uma webinar 2014 06-19

“UMA for humans 101”

11

Page 12: Uma webinar 2014 06-19

UMA turns online sharing into a privacy-by-design solution

12

The “user” in User-Managed Access (UMA)

Alice hears Bob knocking – can he come in?

Further reading: tinyurl.com/umapbd

Page 13: Uma webinar 2014 06-19

UMA turns online sharing into a privacy-by-design solution

Historical Municipal Financial Vocational Artistic Social Geolocation Computational Genealogical Biological Legal ...

13

Page 14: Uma webinar 2014 06-19

UMA turns online sharing into a privacy-by-design solution

I want to share this stuff selectively •  Among my own apps •  With family and friends •  With organizations

I want to protect this stuff from being seen by everyone in the world

14

I want to control access proactively, not just feel forced to consent over and over

Page 15: Uma webinar 2014 06-19

UMA turns online sharing into a privacy-by-design solution

15

Standardized APIs for privacy and “selective sharing”

Outsources protection to a centralized “digital footprint control console”

Page 16: Uma webinar 2014 06-19

A walk through personal cloud models

16

Page 17: Uma webinar 2014 06-19

Personal data ecosystem emerging trends

17

Page 18: Uma webinar 2014 06-19

Mapping UMA to personal clouds and life management platforms

18

Access   Requesting Party LMP

Bank  

Healthcare  

Home  

Car  

Data Stores

Data  Control  

Informed  Pull  

Controlled  Push  

Page 19: Uma webinar 2014 06-19

Mapping UMA to personal clouds and life management platforms

19

Data Stores

Bank  

Healthcare  

Home  

Car  

Requesting Party LMP

UMA AS

Page 20: Uma webinar 2014 06-19

Mapping UMA to personal clouds and life management platforms

20

Data Stores

Bank  

Healthcare  

Home  

Car  

Requesting Party LMP

Resource Owner

Client

UMA AS

manage  

negoPate  protect  

manage  consent  

authorize  

access  

Page 21: Uma webinar 2014 06-19

Use cases

21

Page 22: Uma webinar 2014 06-19

Case studies for…

•  Management and sharing of personal accessibility needs and preferences

•  Secure sharing of university e-transcripts •  Healthcare relationship locator service and

patient-centric consent directives •  Access management 2.0 for the enterprise

(previous webinar) •  … •  Protecting the personal data stores of everyone

at MIT

22

Further reading: tinyurl.com/umacase

Page 23: Uma webinar 2014 06-19

23

Protected personal data stores: MIT’s view

Page 24: Uma webinar 2014 06-19

How UMA leverages OpenID Connect

24

Page 25: Uma webinar 2014 06-19

Use case: Transcript of Records sharing

•  Student interacts with an online job application system •  Student fills in a job application form and provides:

–  Personal information

–  Transcript of Records document •  Data is transferred from the student’s personal data service

–  With explicit consent •  Employer requests access to additional data

–  …and this has to be confirmed by the student

“Sharing Trustworthy Personal Data with Future Employers” ���http://kantarainitiative.org/confluence/display/uma/cv_sharing_scenario

25

Page 26: Uma webinar 2014 06-19

UMA model

26

Page 27: Uma webinar 2014 06-19

Scenario (Peter sharing data)

27

27

(Student,    Job  Seeker)  

Personal  Informa-on  

Transcript  of  Records  

Page 28: Uma webinar 2014 06-19

Scenario (Tom accessing data)

28

28

(Employer)  

Phone  Number  

(Student,    Job  Seeker)  

Page 29: Uma webinar 2014 06-19

Live demo

29

Page 30: Uma webinar 2014 06-19

NuveAM – Authorisation Manager •  UMA-compliant Authorisation Server (AS)

from Cloud Identity Limited: –  Access control to data in the Cloud –  API security management

–  Real-time monitoring and audit

•  Use cases: Securing Cloud-based Personal Data Services (PDS); Managing access to Cloud-based APIs

•  Uses open standards, including: UMA, OAuth 2.0, OpenID Connect, SAML 2.0

•  Open source frameworks: Java and Python http://www.cloudidentity.co.uk/products/nuveam

30

Page 31: Uma webinar 2014 06-19

Nuve User-Managed Access

31

Page 32: Uma webinar 2014 06-19

UMA claims-based authorisation

32

•  UMA allows for the use of claims to support Claim-Based Access Control (CBAC): –  Trusted claims from Trusted Third Parties –  Self-asserted claims

•  In CBAC, the decision to grant access to a protected resource is made based on Subject’s information/attributes, such as name, age, email address, role, location, credit score, etc.

•  …or a Subject’s statement (e.g. promise to adhere to licensing terms)

Page 33: Uma webinar 2014 06-19

OpenID Connect role in UMA

33

•  OpenID Connect (OIDC) provides authentication, consented attribute sharing, and attribute transmission capability

•  OIDC allows third-party asserted claims from distributed sources to be collected

•  UMA leverages OIDC in claims-gathering flow in one of two ways: –  AS interacts directly with requesting parties, or –  indirectly via clients

Page 34: Uma webinar 2014 06-19

UMA AS Collecting Claims from Requesting Party

34

manage

control

protect

authorize

access

negotiate

consentmanage

resourceowner

resourceserver

authorizationserver

Authenticate OIDCServer

client

requestingparty

Client acting as claims conveyor

Client redirects the Requesting Party to AS

Page 35: Uma webinar 2014 06-19

Generic UMA Model

35

UMAAS

ResourceServer

ResourceOwner

Client

Requesting Party

Protect

Control

Authorize

policy decisionPoint

ProtectedResource

Access

Manage

SSO

UMADomain

OpenIDDomain

Page 36: Uma webinar 2014 06-19

Client application conveying claims to UMA AS

36

UMAAS

ResourceServer

ResourceOwner

Client

Requesting Party

OpenIDConnect

AS

Protect

1. Request

Control

Authorize

Protect

policy decisionPoint

ProtectedResource

4. Request Userinfo

Access

UserInfoEndPoint

Manage

SSO

2. AuthNAuthZ

UMADomain

OpenIDDomain

3. Access_token

5. Userinfo

OIDCClient

Page 37: Uma webinar 2014 06-19

UMA AS acting as Claims Client

37

UMAAS

ResourceServer

ResourceOwner

Client

Requesting Party

OpenIDConnect

AS

Protect

1. Request

Control

Authorize

Protect

policy decisionPoint

ProtectedResource

4. Request Userinfo

Access

UserInfoEndPoint

Manage

SSO

2. AuthNAuthZ

UMADomain

OpenIDDomain

OIDCClient 3. Access_token

5. Userinfo

Page 38: Uma webinar 2014 06-19

UMA AS acting as Claims Client

38

UMAAS

ResourceServer

ResourceOwner

Client

Requesting Party

OpenIDConnect

AS

Protect

1. Request

Control

Authorize

Protect

policy decisionPoint

ProtectedResource

4. Request Userinfo

Access

UserInfoEndPoint

Manage

SSO

2. AuthNAuthZ

UMADomain

OpenIDDomain

OIDCClient 3. Access_token

5. Userinfo

UMA AS can collect additional claims from internal user store

This can be a SAML-compliant IDP just as well

Page 39: Uma webinar 2014 06-19

Next steps

39

Page 40: Uma webinar 2014 06-19

Next steps for the WG…and you •  Get involved!

–  Become an “UMAnitarian” (it’s free) –  Participate in the interop and

our implementation discussions –  Follow and engage with @UMAWG on Twitter

•  Current work: –  Technical: claim profiling and core spec variations –  Business: access federation trust frameworks

•  Stay tuned for a webinar on UMA and Healthcare in Q3

40

Join  at:  Pnyurl.com/umawg  

Page 41: Uma webinar 2014 06-19

Questions? Thank you!

@UMAWG #UMApcloud for questions

19 June 2014 tinyurl.com/umawg for slides, recording, and more

41