Identity in the Cloud PaaS Profile Version 1.0

Committee Note Draft 01 /
Public Review Draft 01

29 April 2013

Work Product URIs

This version:

http://docs.oasis-open.org/id-cloud/IDCloud-paas/v1.0/cnprd01/IDCloud-paas-v1.0-cnprd01.odt (Authoritative)

http://docs.oasis-open.org/id-cloud/IDCloud-paas/v1.0/cnprd01/IDCloud-paas-v1.0-cnprd01.html

http://docs.oasis-open.org/id-cloud/IDCloud-paas/v1.0/cnprd01/IDCloud-paas-v1.0-cnprd01.pdf

Previous version:

N/A

Latest version:

http://docs.oasis-open.org/id-cloud/IDCloud-paas/v1.0/IDCloud-paas-v1.0.odt (Authoritative)

http://docs.oasis-open.org/id-cloud/IDCloud-paas/v1.0/IDCloud-paas-v1.0.html

http://docs.oasis-open.org/id-cloud/IDCloud-paas/v1.0/IDCloud-paas-v1.0.pdf

Technical Committee:

OASIS Identity in the Cloud TC

Chairs:

Anil Saldhana (anil.saldhana@redhat.com), Red Hat, Inc.

Anthony Nadalin (tonynad@microsoft.com), Microsoft

Editor:

Anil Saldhana (anil.saldhana@redhat.com), Red Hat, Inc.

Related work:

This document is related to:

Abstract:

This document is intended to provide a profile for Identity Management in the Platform As A Service (PaaS) model of Cloud Computing.

Status:

This document was last revised or approved by the OASIS Identity in the Cloud TC on the above date. The level of approval is also listed above. Check the “Latest version” location noted above for possible later revisions of this document.

Technical Committee members should send comments on this Work Product to the Technical Committee’s email list. Others should send comments to the Technical Committee by using the “Send A Comment” button on the Technical Committee’s web page at http://www.oasis-open.org/committees/id-cloud/.

Citation format:

When referencing this Work Product the following citation format should be used:

[IDCloud-PaaS-v1.0]

Identity in the Cloud PaaS Profile Version 1.0. 29 April 2013. OASIS Committee Note Draft 01 / Public Review Draft 01. http://docs.oasis-open.org/id-cloud/IDCloud-paas/v1.0/cnprd01/IDCloud-paas-v1.0-cnprd01.html.





Copyright © OASIS Open 2013. All Rights Reserved.

All capitalized terms in the following text have the meanings assigned to them in the OASIS Intellectual Property Rights Policy (the "OASIS IPR Policy"). The full Policy may be found at the OASIS website.

This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published, and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this section are included on all such copies and derivative works. However, this document itself may not be modified in any way, including by removing the copyright notice or references to OASIS, except as needed for the purpose of developing any document or deliverable produced by an OASIS Technical Committee (in which case the rules applicable to copyrights, as set forth in the OASIS IPR Policy, must be followed) or as required to translate it into languages other than English.

The limited permissions granted above are perpetual and will not be revoked by OASIS or its successors or assigns.

This document and the information contained herein is provided on an "AS IS" basis and OASIS DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY OWNERSHIP RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.



Table of Contents



1 Introduction 6

1.1 References 6

2 Definitions 7

3 Use Cases 10

3.1 Use Case 1: Application and Virtualization Security in the Cloud 10

3.1.1 Short description 10

3.1.2 Relevant applicable standards 10

3.2 Use Case 3: Identity Audit 10

3.2.1 Short description 10

3.2.2 Relevant applicable standards 10

3.3 Use Case 4: Identity Configuration 10

3.3.1 Short description 11

3.3.2 Relevant applicable standards 11

3.4 Use Case 5: Middleware Container in a Public Cloud 11

3.4.1 Short description 11

3.4.2 Relevant applicable standards 11

3.5 Use Case 6: Federated SSO and Attribute Sharing 11

3.5.1 Short description 11

3.5.2 Relevant applicable standards 11

3.6 Use Case 10: Cloud Tenant Administration 12

3.6.1 Short description 12

3.6.2 Relevant applicable standards 12

3.7 Use Case 11: Enterprise to Cloud SSO 12

3.7.1 Short description 12

3.7.2 Relevant applicable standards 12

3.8 Use Case 17: Per Tenant Identity Provider Configuration 12

3.8.1 Short description 13

3.8.2 Relevant applicable standards 13

3.9 Use Case 18: Delegated Identity Provider Configuration 13

3.9.1 Short description 13

3.9.2 Relevant applicable standards 13

3.10 Use Case 19: Auditing Access to Company Confidential Videos in Public Cloud 13

3.10.1 Short description 13

3.10.2 Relevant applicable standards 13

3.11 Use Case 22: Cloud-based Two-Factor Authentication Service 14

3.11.1 Short description 14

3.11.2 Relevant applicable standards 14

3.12 Use Case 23: Cloud Application Identification using Extended Validation Certificates 14

3.12.1 Short description 14

3.12.2 Relevant applicable standards 14

3.13 Use Case 26: Identity Impersonation / Delegation 14

3.13.1 Short description 14

3.13.2 Relevant applicable standards 14

4 Challenges 15

4.1 Federated Identity Support 15

4.2 Identity Management Provisioning 15

4.3 Identity Audit 15

4.4 Authorization 15

4.5 Identity Confidentiality 15

5 Standards 16

5.1 Federated Identity Standards 16

5.2 Identity Management Provisioning 16

5.3 Authorization 16

Appendix A Acknowledgments 17

Appendix B Non-Normative Section 18

Appendix C Revision History 19

1 Introduction

This document describes the various Identity Management use cases, challenges and applicable standards in the Cloud Platform-As-A-Service (PaaS) model.


1.1 References


[NIST-SP800-145]

P. Mell, T. Grance, The NIST Definition of Cloud Computing SP800-145. National Institute of Standards and Technology (NIST) - Computer Security Division – Computer Security Resource Center (CSRC), January 2011. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.



[IDCLOUD-USECASES-1.0]

M.Rutkowski, OASIS Identity In The Cloud Use Cases v1.0, OASIS Standards Consortium, 08 May 2012. http://docs.oasis-open.org/id-cloud/IDCloud-usecases/v1.0/cn01/IDCloud-usecases-v1.0-cn01.html






2 Definitions


Cloud Platform as a Service (PaaS)

The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. [NIST-SP800-145]


This document defines PaaS as follows:

The Cloud Platform-As-A-Service (PaaS) model is a Cloud Computing model where an application owner is able to deploy applications on to a managed platform. The platform management is not a responsibility of the application owner but the responsibility of the platform provider. The provider provides all facilities and tools for the application owner to deploy and manage the applications. The platform is composed of the necessary infrastructure such as servers, virtual machines, operating systems, storage, security services and compilers, to enable the deployment of applications.


We now look at a typical PaaS architecture that depicts components and services.





Figure 1: Typical PaaS Architecture


A PaaS architecture consists of the following:



Figure 2: Security Services In PaaS


Figure 2 depicts the typical components or subsystems in the Security Services of PaaS. The components are not exhaustive.


3 Use Cases


The following use cases are chosen from the IDCloud Use Case document [IDCLOUD-USECASES-1.0] based on relevance to PaaS.


3.1 Use Case 1: Application and Virtualization Security in the Cloud


3.1.1 Short description

Feature the importance of managing identities that exist in cloud at all levels, including the host operating system, virtual machines as well as applications. Ownership and management of identities may vary at each level and also be external to the cloud provider. For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]

3.1.2 Relevant applicable standards


3.2 Use Case 3: Identity Audit


3.2.1 Short description

Feature the importance of auditing/logging of sensitive operations performed by users and administrators in the cloud. For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]

3.2.2 Relevant applicable standards


3.3 Use Case 4: Identity Configuration


3.3.1 Short description

Feature the need for portable standards to configure identities in cloud applications and infrastructure (virtual machines, servers etc). For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]

3.3.2 Relevant applicable standards


3.4 Use Case 5: Middleware Container in a Public Cloud


3.4.1 Short description

Show how cloud identities need to be administered and accounted for in order to manage middleware containers and their applications. For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]

3.4.2 Relevant applicable standards


3.5 Use Case 6: Federated SSO and Attribute Sharing


3.5.1 Short description

Feature the need for Federated Single Sign-On (F-SSO) across multiple cloud environments. For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]

3.5.2 Relevant applicable standards


3.6 Use Case 10: Cloud Tenant Administration


3.6.1 Short description

Feature the ability for enterprises to securely manage their use of the cloud provider’s services (whether IaaS, PaaS or SaaS), and further meet their compliance requirements.

Administrator users are authenticated at the appropriate assurance level (preferably using multi-factor credentials). For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]

3.6.2 Relevant applicable standards


3.7 Use Case 11: Enterprise to Cloud SSO


3.7.1 Short description

A user is able to access resource within their enterprise environment or within a cloud deployment using a single identity.

With enterprises expanding their application deployments using private and public clouds, the identity management and authentication of users to the services need to be decoupled from the cloud service in a similar fashion to the decoupling of identity from application in the enterprise. Users expect and need to have their enterprise identity extend to the cloud and used to obtain different services from different providers rather than multitude of userid and passwords.

By accessing services via a federated enterprise identity, not only the user experience of SSO is to gain, but also Enterprise compliance and for control of user access, ensuring only valid identities may access cloud services. For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]

3.7.2 Relevant applicable standards


3.8 Use Case 17: Per Tenant Identity Provider Configuration


3.8.1 Short description

Show the need for cloud tenants to securely manage cloud services using automated tools rather than navigating and manually configuring each service individually. For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]

3.8.2 Relevant applicable standards


3.9 Use Case 18: Delegated Identity Provider Configuration


3.9.1 Short description

Show the need for cloud tenant administrators need to delegate access to their identity services configuration within a multi-tenant cloud service to their chosen identity provider service. For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]

3.9.2 Relevant applicable standards


3.10 Use Case 19: Auditing Access to Company Confidential Videos in Public Cloud


3.10.1 Short description

Features the need to audit various role-based accesses of a confidential data objects stored in a public cloud against the owning company’s security policy. For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]

3.10.2 Relevant applicable standards


3.11 Use Case 22: Cloud-based Two-Factor Authentication Service


3.11.1 Short description

Exhibits the value of a Two-Factor Authentication (2FA) cloud-based service that can be used with an Identity Provider, deployed either at the enterprise, at the cloud service provider, or as a separate cloud service. For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]

3.11.2 Relevant applicable standards

3.12 Use Case 23: Cloud Application Identification using Extended Validation Certificates


3.12.1 Short description

Shows the value of providing validatable identification of the Cloud Provider/SaaS application to the user or consumer using Extended Validation (EV) certificates. For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]

3.12.2 Relevant applicable standards


3.13 Use Case 26: Identity Impersonation / Delegation


3.13.1 Short description

Customers of the cloud provider may require a cloud provider to supply support that permits one identity to impersonates the identity of another customer without sacrificing security. For extended description of this use case, please refer to [IDCLOUD-USECASES-1.0]

3.13.2 Relevant applicable standards



4 Challenges


4.1 Federated Identity Support


There is a need to support Federated Identities in a PaaS model.


4.2 Identity Management Provisioning

There is a need to manage lifecycle (Create, Read, Update and Delete) of users.


4.3 Identity Audit

There is a need to audit operations performed by an Identity in a PaaS model.


4.4 Authorization

There is a need to perform authorization of resources and applications by users and processes.


4.5 Identity Confidentiality

There is a need to provide confidentiality services for identities operating in a PaaS environment. This includes capabilities such as Encryption, Decryption and Key Management.








5 Standards

The standards that are applicable to Platform-As-A-Service are divided into the following sections.


5.1 Federated Identity Standards

The following OASIS standards for Federated Identity are applicable:


5.2 Identity Management Provisioning

The following OASIS Standards for Identity Management provisioning are applicable:


5.3 Authorization

The following OASIS Standard for Authorization is applicable:


The following IETF Standard for Authorization is applicable:

  1. Appendix A Acknowledgments

The following individuals have participated in the creation of this specification and are gratefully acknowledged:

Participants:

Anil Saldhana, Red Hat

Scott Stark, Red Hat

Anthony Nadalin, Microsoft

David Turner, Microsoft

Matt Rutkowski, IBM

David Kern, IBM

Abbie Barbir, Bank of America

Dominique Nguyen, Bank of America

Thomas Hardjono, MIT

Jeffrey Broberg, CA Technologies

John Tolbert, The Boeing Company

Gines Dolera Tormo, NEC Corporation

Felix Gomex Marmol, NEC Corporation

Cathy Tilton, Daon

Dale Moberg, Axway Software

David Chadwick, Individual

Gershon Jannsen, Individual

Roger Bass, Individual

Michele Drgon, Individual




  1. Appendix B Non-Normative Section

  2. Appendix C Revision History

Revision

Date

Editor

Changes Made

01a

October 01, 2012

Anil Saldhana

Initial draft version.

01b

October

26,2012

Anil Saldhana

Changes based on Feedback

01f

February 4, 2013

Anil Saldhana

  • Added Federated Identity concerns to Authentication and Provisioning Services

  • Expanded the Challenges Section

01g

April 26, 2013

Anil Saldhana

  • Acknowledgements