Federated Identity Management and Web Services Security with IBM Tivoli Security Solutions
Total Page:16
File Type:pdf, Size:1020Kb
Front cover Federated Identity Management and Web Services Security with IBM Tivoli Security Solutions Introduction to Web services security standards Complete product architecture and component discussion Extensive federation business scenario Axel Buecker Werner Filip Heather Hinton Heinz Peter Hippenstiel Mark Hollin Ray Neucom Shane Weeden Johan Westman ibm.com/redbooks International Technical Support Organization Federated Identity Management and Web Services Security with IBM Tivoli Security Solutions October 2005 SG24-6394-01 Note: Before using this information and the product it supports, read the information in “Notices” on page xiii. Second Edition (October 2005) This edition applies to Version 6 of Tivoli Federated Identity Manager (product number 5724-L73) and to all subsequent releases and modifications until otherwise indicated in new editions. Various other related IBM and Tivoli products are mentioned in this book. © Copyright International Business Machines Corporation 2004, 2005. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xiii Trademarks . xiv Preface . xv The team that wrote this redbook. xvi Become a published author . xviii Comments welcome. xix Part 1. Architecture and design . 1 Chapter 1. Business context for identity federation . 3 1.1 Federated identity . 4 1.2 Business environment . 5 1.2.1 Deconstruction of the enterprise . 5 1.2.2 Enterprise re-aggregation . 6 1.2.3 High-level example of a re-aggregated business . 7 1.2.4 Business models for federated identity . 9 1.2.5 The relationship - Trust and assurance. 15 1.3 IT environment . 17 1.3.1 The role of identity management. 17 1.3.2 Dealing with identities . 20 1.3.3 User life cycle management . 23 1.3.4 Inter-enterprise application to application integration . 25 1.3.5 Open standards. 27 1.4 Conclusion. 28 Chapter 2. Architecting an identity federation . 31 2.1 Federation example. 33 2.2 Federated identity management architecture . 36 2.2.1 Background to federation . 37 2.2.2 Architecture overview . 38 2.2.3 Roles . 41 2.2.4 Identity models . 42 2.2.5 Identity attributes. 45 2.2.6 Trust . 49 2.2.7 Federation protocol . 51 2.3 FIM standards and efforts . 51 2.3.1 SSL/TSL . 52 2.3.2 Security Assertion Markup Language (SAML) . 52 © Copyright IBM Corp. 2004, 2005. All rights reserved. iii 2.3.3 Shibboleth . 53 2.3.4 Liberty . 54 2.3.5 WS-Federation . 55 2.3.6 WS-Trust . 56 2.3.7 WS-Security . 57 2.3.8 WS-Provisioning . 57 2.3.9 Selecting Federation standards . 58 2.4 Federated single sign-on. 59 2.4.1 Push and Pull SSO . 60 2.4.2 Account linking . 61 2.4.3 Where are you from (WAYF). 62 2.4.4 Session management and access rights . 63 2.4.5 Logout . 63 2.4.6 Credentials clean up . 64 2.4.7 Global good-bye . 64 2.4.8 Account de-linking. 65 2.5 Web services security management . 65 2.5.1 Web services. 66 2.5.2 Web services security . 68 2.5.3 Gateways . 69 2.6 Federated identity provisioning . 70 2.7 On demand security reference architecture . 72 2.7.1 Policy management. 73 2.7.2 Identity management. 74 2.7.3 Key management . 74 2.7.4 Credential exchange . 74 2.7.5 Identity federation . 75 2.7.6 Authorization . 75 2.8 On demand integration reference architecture . 75 2.8.1 Connectivity services . 77 2.8.2 User interaction services. 77 2.8.3 Application and information assets . 78 2.8.4 Business application services . 78 2.8.5 Partner services . 78 2.8.6 Infrastructure services. 79 2.9 Method for architecting secure solution. 79 2.9.1 Implementation flow . 80 2.9.2 Definition phase of a federated identity management solution . 81 2.10 Conclusion. 83 Chapter 3. Tivoli Federated Identity Manager architecture . 85 3.1 Federated Identity Management functionality . 86 3.2 Federation services . 87 iv Federated Identity Management and Web Services Security with IBM Tivoli Security Solutions 3.2.1 Point of contact (PoC) . 89 3.2.2 Single sign-on protocol services (SPS). 91 3.2.3 Trust services . 92 3.2.4 Key services (KESS). 96 3.2.5 Identity services . 97 3.2.6 Authorization services . 97 3.2.7 Provisioning services . 98 3.2.8 Management Services . ..