Identity in the Cloud Outsourcing Profile Version 1.0
Committee Note 01
05 August 2013
Specification URIs
This version:
http://docs.oasis-open.org/id-cloud/IDCloud-outsourcing/v1.0/cn01/IDCloud-outsourcing-v1.0-cn01.doc (Authoritative)
http://docs.oasis-open.org/id-cloud/IDCloud-outsourcing/v1.0/cn01/IDCloud-outsourcing-v1.0-cn01.html
http://docs.oasis-open.org/id-cloud/IDCloud-outsourcing/v1.0/cn01/IDCloud-outsourcing-v1.0-cn01.pdf
Previous version:
N/A
Latest version:
http://docs.oasis-open.org/id-cloud/IDCloud-outsourcing/v1.0/IDCloud-outsourcing-v1.0.doc (Authoritative)
http://docs.oasis-open.org/id-cloud/IDCloud-outsourcing/v1.0/IDCloud-outsourcing-v1.0.html
http://docs.oasis-open.org/id-cloud/IDCloud-outsourcing/v1.0/IDCloud-outsourcing-v1.0.pdf
Technical Committee:
OASIS Identity in the Cloud TC
Chairs:
Anil Saldhana (anil.saldhana@redhat.com), Red Hat
Anthony Nadalin (tonynad@microsoft.com), Microsoft
Editors:
Ginés Dólera Tormo (gines.dolera@neclab.eu), NEC Corporation
Félix Gómez Mármol (felix.gomez-marmol@neclab.eu), NEC Corporation
Related work:
Abstract:
This document is intended to provide a profile for Identity Management outsourcing in Cloud Computing.
Status:
This document was last revised or approved by the OASIS Identity in the Cloud TC on the above date. The level of approval is also listed above. Check the “Latest version” location noted above for possible later revisions of this document.
Technical Committee members should send comments on this document to the Technical Committee’s email list. Others should send comments to the Technical Committee by using the “Send A Comment” button on the Technical Committee’s web page at http://www.oasis-open.org/committees/id-cloud/.
Citation format:
When referencing this document the following citation format should be used:
[IDCloud-Outsourcing-v1.0]
Identity in the Cloud Outsourcing Profile Version 1.0. 05 August 2013. OASIS Committee Note 01. http://docs.oasis-open.org/id-cloud/IDCloud-outsourcing/v1.0/cn01/IDCloud-outsourcing-v1.0-cn01.html.
Copyright © OASIS Open 2013. All Rights Reserved.
All capitalized terms in the following text have the meanings assigned to them in the OASIS Intellectual Property Rights Policy (the "OASIS IPR Policy"). The full Policy may be found at the OASIS website.
This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published, and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this section are included on all such copies and derivative works. However, this document itself may not be modified in any way, including by removing the copyright notice or references to OASIS, except as needed for the purpose of developing any document or deliverable produced by an OASIS Technical Committee (in which case the rules applicable to copyrights, as set forth in the OASIS IPR Policy, must be followed) or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by OASIS or its successors or assigns.
This document and the information contained herein is provided on an "AS IS" basis and OASIS DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY OWNERSHIP RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Table of Contents
3.1 Use Case 2: Identity Provisioning
3.1.2 Relevant applicable standards
3.2 Use Case 4: Identity Configuration
3.2.2 Relevant applicable standards
3.3 Use Case 16: Offload Identity Management to External Business Entity.
3.3.2 Relevant applicable standards
3.4 Use Case 17: Per Tenant Identity Provider Configuration
3.4.2 Relevant applicable standards
3.5 Use Case 18: Delegated Identity Provider Configuration
3.5.2 Relevant applicable standards
3.6 Use Case 20: Government Provisioning of Cloud Services
3.6.2 Relevant applicable standards
3.7 Use Case 26: Identity Impersonation / Delegation
3.7.2 Relevant applicable standards
3.8.2 Relevant applicable standards
3.9 Use Case 29: User Delegation of Access to Personal Data in a Public Cloud
3.9.2 Relevant applicable standards
This document describes the various Identity Management use cases, challenges and applicable standards in the Identity Management Outsourcing in the Cloud Computing model.
Many of the services in the Internet require some identity-related functionality, such as authentication, information exchange, user attributes aggregation, etc. However, due to the diversity raised by cloud environments, it is hard for some enterprises or organizations to provide the required identity functionality needed for interacting with the different services.
Organizations or enterprises which do not have enough resources to deploy the required identity infrastructure could decide to externalize such identity management functionality. By outsourcing the identity management, those enterprises get another enterprise to be in charge of providing the required identity management functionality on their behalf.
P. Mell, T. Grance, The NIST Definition of Cloud Computing SP800-145. National Institute of Standards and Technology (NIST) - Computer Security Division – Computer Security Resource Center (CSRC), January 2011. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.
[IDCLOUD-USECASES-1.0]
M.Rutkowski, OASIS Identity In The Cloud Use Cases v1.0, OASIS Standards Consortium, 08 May 2012. http://docs.oasis-open.org/id-cloud/IDCloud-usecases/v1.0/cn01/IDCloud-usecases-v1.0-cn01.html
Cloud Platform as a Service (PaaS)
The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. [NIST-SP800-145]
Outsourcing identity
Outsourcing consists of an entity contracting with another company or person to do a particular function. Typically, the function being outsourced is considered non-core to the business. A company may want to outsource some functionality if it could be done more efficiently and therefore more cost-effectively, by other companies with specialized tools and facilities and specially trained personnel.
In this document we focus on outsourcing the identity management functionality. We consider outsourcing identity management to externalize all or part of the identity-related functionality. That includes authentication, information exchange, user attributes aggregation, etc. Due to the diversity raised by cloud environments, it is hard for some enterprises or organizations to deploy the required infrastructure needed to interact with the different services. Hence, organizations or enterprises which do not have enough resources to deploy the required identity infrastructure could decide to externalize such identity management functionality
Moreover, identity-related functionality not only includes implementing standard protocols for authentication, or authorization, such as SAML, OpenID or XACML, but it also requires establishing trust relationships with the different services, defining complex SLA agreements, exchanging public key certificates and so forth. Furthermore, the organizations should be adapted to the peculiarities of each service to interact with it.
By outsourcing the identity management, those enterprises get another enterprise to be in charge of providing the required identity management functionality on their behalf. The outsourcing vendor deploys the required identity infrastructure and establishes the necessary trust relationships with the different services making use of virtual Identity Providers in the cloud, which offer identity management functionality via SaaS. In this way, other enterprises or organizations could make use of that solution to access the different services without requiring being in charge of identity management.
Figure 1 represents an overview of a basic outsourcing scenario, where two enterprises externalize their identity-related functionality to the outsourcing service, which in turn is used as a bridge for accessing the different Internet services.
Figure 1. Outsourcing service scenario overview
As previously commented, identity-related functionality involves many different aspects. They are represented in Figure 2 and described below.
Figure 2. Outsourcing services
· Session Management Services: Web sessions are established to maintain a state for each user of a web service. This form the basis for providing Single Sign-On (SSO).
· Authentication Services: The authentication process is often the aspect of security that is most visible to users. It validates that the user is actually who is claiming to be. There have been defined several authentication mechanisms, whose applicability depends on the requirements of the scenario.
· Key Management Services: An important part of outsourcing services is to manage trust relationships between the different providers. The outsourcing service establishes trust relationships by defining different Service-level agreements (SLA) and secured deploying certification services, such as public key infrastructure (PKI).
· Authorization Services: Besides authenticating the users, it is necessary to determine what actions are they able to perform over which resources.
· Audit Services: As many other identity management systems, outsourcing services have to incorporate an effective auditing system able to trace the relevant events happened in the system, so the users cannot deny performing an operation or initiating a transaction.
· Virtualization Services: The identity management functionality is virtualized for each company which wants to outsource this functionality. This allows the companies to manage their identity-related information without interferer with each other.
Feature the need support and manage customer policies for identity decommissioning including transitioning of affected resources to new identities. For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]
Feature the need for portable standards to configure identities in cloud applications and infrastructure (virtual machines, servers etc). For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]
· LDAP
· LDIF
· TOSCA
· OVF
· SAML
Show the need for federated identity management which enables an enterprise to make available cloud-hosted applications to either the employees of its customers & business partners or its own institutional consumers and avoid directly managing identities (accounts) for those users. For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]
Show the need for cloud tenants to securely manage cloud services using automated tools rather than navigating and manually configuring each service individually. For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]
· IMI
· SPML
· SCIM
Show the need for cloud tenant administrators need to delegate access to their identity services configuration within a multi-tenant cloud service to their chosen identity provider service. For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]
· IMI
Show how authorized government personnel could be granted access and assigned appropriate privileges to configure and provision a cloud service. For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]
Customers of the cloud provider may require a cloud provider to supply support that permits one identity to impersonates the identity of another customer without sacrificing security. For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]
· WS-Trust
Show the need for provisioning, administration and governance of user identities and their attributes for organizations that have a distributed structure which includes many central, branch offices and business partners where each may utilize cloud deployment models. For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]
Users are able to dynamically delegate (grant and revoke) and constrain access to files or data stored with a cloud service provider to users whose identities are managed by external identity providers. For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]
There is a need to manage lifecycle (Create, Read, Update and Delete) of users.
There is a need to perform authorization processes. Furthermore, the authorization may be directed by other entities and hence the delegated authorization enabled. For example, a company wants to control the access of their users by their own methods and the authorization decisions should be delegated to it.
There is a need to enable administration capabilities so the different enterprises could manage their identity-related information.
There is a need to provide confidentiality services for identities. This includes capabilities such as Encryption, Decryption and Key Management.
The following individuals have participated in the creation of this specification and are gratefully acknowledged:
Participants:
Anil Saldhana, Red Hat
Scott Stark, Red Hat
Anthony Nadalin, Microsoft
David Turner, Microsoft
Matt Rutkowski, IBM
David Kern, IBM
Abbie Barbir, Bank of America
Dominique Nguyen, Bank of America
Thomas Hardjono, MIT
Jeffrey Broberg, CA Technologies
John Tolbert, The Boeing Company
Gines Dolera Tormo, NEC Corporation
Felix Gomex Marmol, NEC Corporation
Cathy Tilton, Daon
Dale Moberg, Axway Software
David Chadwick, Individual
Gershon Jannsen, Individual
Roger Bass, Individual
Michele Drgon, Individual
Revision |
Date |
Editor |
Changes Made |
01a |
November 12, 2012 |
Ginés Dólera Tormo Félix Gómez Mármol |
Initial draft version. |
01b |
January 21, 2013 |
Ginés Dólera Tormo Félix Gómez Mármol |
Extended introduction and definition of the term ‘outsourcing’ |
01c |
April 29, 2013 |
Ginés Dólera Tormo Félix Gómez Mármol |
Merge introduction and outsourcing definition. Extended outsourcing definition. Added Challenges |