view slides - Events

advertisement
From Identity and
Authentication
‘point solutions’
to SOA and ESB –
‘NZ Gov’
IdM Architectural Thinking:
Five Years On
The Dept. of Internal Affairs is..
• New Zealand Government’s leader in identity management
principles and processes
• Author of the NZ Identity Assurance Framework, & the NZ
Evidence of Identity Standard – principles-based documents on
best practice identity information management
• Holder of authoritative information on New Zealand citizens –
registers for births deaths, marriages, issues passports, citizenship
• The home of Government Technology Services (GTS), the All of
government IT initiatives – centralised Authentication and Identity
Verification Services (igovt since 2007), emerging federated
services, collaboration services (Public Service Intranet since
2007), centralised IP and Telephony networks (one.govt since 2009
)
Background: New Zealand’s
culture, policy and legislation
• Privacy legislation (EU-like) e.g. citizen controls use
of/ release of data
• No national ID or ID card, no exchange of biometrics
• Low national security or illegal immigration drivers
• No Inter-agency data matching excl. few exceptions
• Citizen opt-in: Not compelled to use online services
• Agency opt-in: Not compelled to deliver via online
• Low risk, low budget approach (population: 4m)
In NZ, Identity Management is for citizen service, not national security
We start today’s story in 2005 but we
actually started in 2002…
• Policy principles before architectural design.
• Cabinet approved policy principles in 2002 for
authenticating people.
– Security
– Acceptability
– Protection of privacy
– All-of-government approach
– Fit for purpose
– Opt-in
Public sector approach to Identity Management for
service ≠ to Private Sector approach
• Government IdP-to-government RP is different
to private enterprise…




Implicit trust
Implicit (and sometimes explicit) federation
Minimal discovery – services are known
Minimal liability - Govt can’t sue itself (but
citizens can use common law)
 Opportunity to scale up integration
We set out to address 3 issues
The First Issue
The Second Issue
• Keeping track of username and password for
each online service is bad enough.
• It will become worse when each online service
moves to two-factor authentication:
“Necklace of tokens.”
And The Third Issue
• People have to use documents to establish
their identity with each government agency
individually




So what did we do?
Our approach to online authentication
• Two foundation services – both centralised but
separate – identity and logon management
• Separate who a person is (identity) - from logon
management - from what they do (activity)
• Decentralise authorisation and role management out
to the edge
The Government Shared services vision
Multiple All-of-Government Services
Browser
Identity Selector/Agent
Mobile Devices
Govt Logon
Service
Identity Providers
Idenitity
Verification
Service
Common
Online
Interface
Value
Added
Services
Govt Agency
SAML 2.0
ID-WSF
Attribute Providers
Applicable agency becomes
the authoritative source
Any Platform
Any OS
Any IAM Solution
Any Protocol
In 2005 it was all about Authentication…
Shared Authentication Services
Govt Logon
Service
Persistent
Pseudonyms
Govt Agency
SAML 1.1 initially then SAML 2.0 in 2008
In 2006 it was all about Identity...
Shared Authentication Services
Govt Logon
Service
Idenitity
Verification
Service
Persistent
Pseudonyms
Identity via Browser
SSO (SAML 2.0)
Govt Agency
By 2007 it was all about authoritative sources(v1.0)
Shared Authentication Services
Govt Logon
Service
Idenitity
Verification
Service
Persistent
Pseudonyms
Future
Services
Identity via Browser
SSO (SAML 2.0)
Govt Agency
Enter GOAAMS….
G Government
O Online
A Attribute
A Assertion
M Meta
S System
…the Shared Services nirvana – GOAAMS
Shared Authentication Services
Browser
Identity Selector/Agent
Mobile Devices
Govt Logon
Service
Identity Providers
Idenitity
Verification
Service
Value
Added
Services
Common
Online
Interface
Govt Agency
SAML 2.0
ID-WSF
Attribute Providers
Any Platform
Any OS
Any IAM Solution
Any Protocol
…for which we won an award
In 2008 we began to integrate the
services…
and brand them
In 2009 we paused for thought…
Legacy
technology
Identity Providers
No common
identifier
Duplicated
content
Multiple data
formats
Browser
Identity Selector/Agent
Mobile Devices
Govt Logon
Service
Idenitity
Verification
Service
Focus
was
here
Common
Online
Interface
Not here
Value
Added
Services
Govt Agency
Attribute Providers
We needed a ‘perspective’ shift...
• ‘citizen as a customer’ – authentication and identity
important for security but a by-product for folks to get the service
• Shift ….from ‘agency has these information
assets’
…. to ‘ citizens needs to conduct his life’ –
leverage off joined-up government business cases
• design for scale, not for pilots
Enter Service Oriented Architecture,
Enterprise Service Bus
and
a service platform delivery model
Use SOA and ESB as tools to...
• Retain all our privacy-aware best practice e.g. user
directed consent and ‘pseudonymization’
• Keep it lightweight
• Business and data at the edge – in agencies
• Avoid vendor product overbearance – look to fit-forpurpose open source and extend it
• Build a multi-channel delivery platform, not a web
portal
• Design for the Cloud
…the old model with the new ‘SOA’ look
Service Delivery Platform
Govt Logon
Service
Aggregated ‘account’
view of their
relationship with
government
Identity Providers
Idenitity
Verification
Service
Common
Online
Interface
Value
Added
Services
Govt Agency
Agencies in roles of
both Attribute
Providers and
Business service
Providers
SAML 2.0, WS-Trust
Semantic mapping
Internal system architecture
is hidden from the Platform;
each agency is treated as a
‘black box’ exposing welldefined services to the
outside world via the
Platform.
Government Service Bus
Service Delivery Platform Strawman Architecture
Service Platform
New Applications built around SOA principles and
standards requiring very lightweight GSB interfaces
GSB Interface
STS Client
Network/Security/Trust Interface
Identity on the GSB is made opaque by
STS Client before transiting the bus.
Identity is mapped into appropriate Identity
Context by receiving STS Client.
Data on the GSB will be represented in
Standards compliant formats; OASIS
CIQ, XBRL and other sector/context
specific standards as appropriate.
GSB
Process Orchestration
Network/Security/Trust Interface
Network/Security/Trust
Interface
Privacy/Consent
Service
STS
STS Client
GSB Interface
Identity
Verification
Service
(IVS)
STS Client
STS Client is a
proxy to STS which
generates portable
user identifying/
authenticating tokens.
Agencies: Identiful
transactions across the GSB
carry a token identifying
‘pseudonymizing’ the user.
GSB Interface
Account Linking
Service (ALS)
igovt
logon service
Identity
Context for its
users
Govt Agency
Business Business
Application Service
Service Delivery Platform Strawman Architecture
What agencies get from the Government Service Bus...
• A single interface to send/receive information to other partners
• Synchronous and asynchronous data services over OASIS Web Services
(Stateful & REST-like)
• Publish & Subscribe services
• Syntax and protocol transformation & adaptation via the GSB Interface
and App/Service Interface
• A way to transport and transform data between agency format and
standards based GSB format (semantic mapping).
• An interface for each app/service published via the GSB
Account Linking Service –
the agency ‘Club’ analogy
Service Delivery Platform Strawman Architecture
Service Delivery Platform
Identity Context
Agencies: expose common
endpoints for user management.
ALS Client
App
SL User Status
& Preferences
- GetUserStatus(pull)
- AssertUserInfo(push)
- AssertProvStatus(push)
GSB Interface
Probably REST-like
IdM Workflow Manager
Linking
Rules
GSB Interface
ALS Client: Used by
Platform to trigger
Account Linking.
Provides proxy/pathway
to provide ALS UI.
Govt Agency 1 ...n
Identity
Context
Local User
Store
GSB
Business
Apps/
Services
Account Linking Service (ALS)
GSB Interface
IVS Service
ALS Support
Endpoints
Endpoint
Identity Verification Service
(IVS)
Identity Context
IVS: Based on self-asserted
data, “Club” status and
corroborating information,
issues an appropriate
strength igovt Id.
STS
ALS Support
Endpoint
logon service
Business
Service
Endpoints
GSB Interface
FLT Meta-Data
igovt
Agencies: assess user
information from another agency
and correlate it with their own
information on that user – after
user consent of course!
Service Delivery Platform Strawman Architecture
What agencies get from the Account Linking Service...
•
A service that simplifies a user’s provisioning into online govt services
by exposing WS endpoints to ‘pull’ and ‘push’ user status and asserted
user information to:
–
–
–
–
query provisioning status of a user at agencies,
assert user provided information to agencies,
facilitate the collection of corroborating information from users
maintain a collective view of the user’s status and communicate that
view to partners
•
A Framework that offers simple IdM Workflow processing, relying on
agency relationships and user provided information to maintain identity
relationships and provisioning status.
•
igovt functionality by exposing Identity Verification services via the GSB
to allow user provisioning outside existing SAML process flow.
What’s next?
• There’s a lot to build/buy/rent - costing out a ESB/GSB & ALS without complete
requirements!
•
•
•
•
•
•
•
Build a Security Token Service (STS) - underway
Build an Enterprise/Government Service Bus (GSB) - proposed
Build an Account Linking Service (ALS) - proposed
Build a UI for the ALS for users to change preferences
Agencies need to re-tool to be ‘SOA-like’ to join ‘the club’
We don’t yet know what we don’t know!
Continue participating in OASIS and other standardisation efforts: ‘learnpilot-contribute’ – ‘learn-pilot-contribute’ e.g. write up as a use case for the ID-Cloud TC!
Thank you!
Colin.wallis@dia.govt.nz
Colin_wallis@hotmail.com
Download