SlideShare a Scribd company logo
1 of 74
Federated Identity & 
Attribute Based Resource 
Access Controls 
By Kingsley Idehen 
Founder & CEO, OpenLink Software
SITUATION ANALYSIS 
License CC-BY-SA 4.0 (International).
Presentation Goals 
Deconstruct: 
Identity 
Identifiers 
Identification 
License CC-BY-SA 4.0 (International).
Identity 
EVERY DAY WE HEAR 
License CC-BY-SA 4.0 (International). 
IDENTITY IS 
PROBLEMATIC 
IDENTITY IS 
COMPLEX 
IDENTITY IS 
IMPORTANT
Identity 
WE ALMOST NEVERHEAR ABOUT 
License CC-BY-SA 4.0 (International). 
WHAT IDENTITY 
ACTUALLY IS 
HOW IDENTITY IS 
CREATED 
HOW IDENTITY IS 
REPRESENTED
Identity Basics 
License CC-BY-SA 4.0 (International).
What is an Entity? 
An Entity is a Distinctly Identifiable Thing 
License CC-BY-SA 4.0 (International).
How is an Entity Identified (Named) ? 
An Entity is Identified (or named) through the combined effects of 
Identifier based denotation (signification) and document content 
based connotation (description). 
License CC-BY-SA 4.0 (International).
How is an Entity Denoted? 
An Entity is Denoted (Signified) 
through the use of an Identifier. 
License CC-BY-SA 4.0 (International).
What is an Identifier? 
An Identifier is a Sign 
(or Token) that Signifies 
(Denotes, or 
“Stands For”) an Entity 
License CC-BY-SA 4.0 (International).
Identifier Types? 
Quoted Literals such as: 
“Kingsley Idehen” or ‘Kingsley Idehen’ 
Relative Reference: 
<#KingsleyIdehen> 
Absolute HTTP URI based Reference: 
<http://kingsley.idehen.net/dataspace/person/kidehen#thi 
s> 
LDAP URI based Reference: 
<ldap://mail.openlinksw.com/cn=Kingsley%20Idehen%2Cou=Accounts 
%2Co=OpenLink%20Software%2Cc=US> 
License CC-BY-SA 4.0 (International).
What is a WebID? 
An HTTP Uniform Resource Identifier (URI) that identifies 
(names) an Agent. 
Example: 
<http://kingsley.idehen.net/dataspace/person/kidehen#this 
> 
License CC-BY-SA 4.0 (International).
What is a NetID? 
A Resolvable Uniform Resource Identifier (URI) that 
identifies (names) an Agent. 
Example: 
<ldap://mail.openlinksw.com/cn=Kingsley%20Idehen%2Cou 
=Accounts%2Co=OpenLink%20Software%2Cc=US> 
License CC-BY-SA 4.0 (International).
What is an Identity Card? 
A Document comprised 
of content in the form 
of identity claims that 
coalesce around an 
identifier that names 
the Identity Card’s 
subject. 
Basically, a document 
comprised of content 
that connotes 
(describes) its subject. 
License CC-BY-SA 4.0 (International).
WebID-Profile Document -- Front 
A Document comprised of 
RDF statement based 
identity claims that coalesce 
around an identifier that 
names the Identity Card’s 
subject. 
Identity Card subject name 
MUST be in the form of an 
HTTP URI. 
License CC-BY-SA 4.0 (International).
WebID-Profile Document -- Inside 
A Document comprised of RDF statement based identity claims 
that coalesce around an identifier that names the Identity 
Card’s subject. Identity Card subject identifiers MUST be in the 
form of an HTTP URI. 
License CC-BY-SA 4.0 (International).
NetID-Profile Document -- Front 
A Document comprised of 
RDF statement based 
identity claims that coalesce 
around an identifier that 
names the Identity Card’s 
subject. 
Identity Card subject 
identifiers MUST be in the 
form of Resolvable URIs, so 
LDAP scheme identifiers can 
apply. 
License CC-BY-SA 4.0 (International).
NetID-Profile Document -- Inside 
A Document comprised of RDF statement based identity claims 
that coalesce around an identifier that names the Identity Card’s 
subject. Identity Card subject identifiers MUST be in the form of 
Resolvable URIs, so LDAP scheme identifiers can apply. 
License CC-BY-SA 4.0 (International).
What Your Digital Identity Card Enables 
• Identification for 3rd Party Use – e.g., protected 
resource access controls and data access policies -- 
scoped specifically to your identity 
• Signing Statements (Endorsements), Messages (e.g., 
Email) that are cryptographically verifiable 
• Receipt of Encrypted Messages that are only readable 
by you – since the entire message or shared-secret is 
encrypted using data (Public Key) from your Digital 
Identity Card 
• All of the items above using existing open standards. 
License CC-BY-SA 4.0 (International).
Attributed Based 
Access Controls (ABAC) 
License CC-BY-SA 4.0 (International).
What is ABAC About? 
Fine-grained access to protected resources driven 
by attributes (characteristics, features, properties, 
predicates, relations etc.) of the resource 
requestor (an Identity Principal). 
License CC-BY-SA 4.0 (International).
RDF based Attributed based Access 
Controls 
1. Identity Principal Requests 
License CC-BY-SA 4.0 (International). 
Access to Protected Resource 
2. Protected Resource Server 
Assesses: 
 Identity (RDF based 
Identity Claims) 
 Access Control Rules 
(RDF based Protected 
Resource Access 
Policies) 
3. Protected Resource Access is 
Granted or Rejected.
ABAC Challenges? 
• Identifier Types – NetID vs WebID Issues 
• Data Access Protocols – LDAP vs HTTP issues 
• Data Representation – Data Virtualization issues 
• Data Integration – RDF based Linked Open Data 
• Data Access Performance & Scalability – 
Virtuoso! 
License CC-BY-SA 4.0 (International).
Identity Card Generation 
License CC-BY-SA 4.0 (International).
WebID 
Identity Card Generation 
License CC-BY-SA 4.0 (International).
Digital Identity Card Generation – PdP 
Selection 
Select from a vast collection of Profile Data Providers (PdPs) 
License CC-BY-SA 4.0 (International)
Digital Identity Card Generation – IdP 
Selection 
Select from a vast collection of Identity Card Storage Providers (IdPs) 
License CC-BY-SA 4.0 (International)
Generated Public Identity Card 
A Document comprised of 
content in the form of 
identity claims that 
coalesce around an 
identifier (e.g., HTTP URI) 
that names the Identity 
Card’s subject. 
Basically, a document 
comprised of content that 
connotes (describes) its 
subject. 
License CC-BY-SA 4.0 (International).
Local Identity Card (X.509 Cert.) View - 1 
License CC-BY-SA 4.0 (International).
Local Identity Card (X.509 Cert.) View - 2 
License CC-BY-SA 4.0 (International).
Local Identity Card (X.509 Cert.) View - 3 
License CC-BY-SA 4.0 (International).
Authentication Protocols 
(WebID-TLS and NetID-TLS) 
License CC-BY-SA 4.0 (International).
Critical Proof of Work 
Fundamentally, NetID-TLS and WebID-TLS authentication protocols 
combine shared-secret knowledge (PKI) with proof-of-work. This 
includes: 
• Private & Public Keypair Possession 
• Private (X.509 Cert.) and Public (Profile Document) Identity Card 
Creation & Storage Capability 
• Ability to Express Entity Identity Claims using Entity Relationship 
Semantics that are comprehensible to both Humans and 
Machines. 
License CC-BY-SA 4.0 (International).
What is WebID-TLS? 
TLS based authentication protocol where identity claims are verified 
as follows: 
1. User Agent initiates a TLS connection 
2. Presents a locally stored Identity Card (X.509 Certificate) 
comprised of a WebID as its SubjectAlternativeName (SAN) value 
3. Following successful TLS-handshake, a protected resource server 
performs these additional tests: 
 Checks that WebID successfully resolves to a profile document 
comprised of RDF statements 
 Checks existence of an RDF statement that associates WebID with the 
Public Key of the local X.509 certificate used to complete the successful 
TLS-handshake. 
License CC-BY-SA 4.0 (International).
WebID-TLS Authentication Protocol 
Example 
License CC-BY-SA 4.0 (International).
WebID-TLS Authentication – Step 1 
License CC-BY-SA 4.0 (International).
WebID-TLS Authentication – Step 2 
License CC-BY-SA 4.0 (International).
WebID-TLS Authentication – Step 3 
License CC-BY-SA 4.0 (International).
WebID-TLS Authentication – Step 4 
License CC-BY-SA 4.0 (International).
What is NetID-TLS? 
TLS based authentication protocols where identity claims are 
verified as follows: 
1. User Agent initiates a TLS connection 
2. Presents a locally stored Identity Card (X.509 Certificate) 
comprised of a NetID as its SubjectAlternativeName (SAN) value 
3. Following successful TLS-handshake, a protected resource server 
performs these additional tests: 
 Check that NetID is successfully resolved to a profile document 
 Checks that profile document is comprised of replica claims matching 
those in the local X.509 certificate – achieved by comparing the SHA1 
fingerprints of both documents. 
License CC-BY-SA 4.0 (International).
NetID 
Identity Card Generation 
License CC-BY-SA 4.0 (International).
YouID Identity Card Creation – Step 1 
License CC-BY-SA 4.0 (International).
YouID Identity Card Creation – Step 2 
License CC-BY-SA 4.0 (International).
Local Identity Card (X.509 Cert.) View - 1 
License CC-BY-SA 4.0 (International).
Local Identity Card (X.509 Cert.) View - 2 
License CC-BY-SA 4.0 (International).
Local Identity Card (X.509 Cert.) View - 3 
License CC-BY-SA 4.0 (International).
NetID-TLS Authentication Protocol 
Example 
(LDAP Directory Services) 
License CC-BY-SA 4.0 (International).
Identity Card Export for LDAP Directory Use 
License CC-BY-SA 4.0 (International).
LDAP Directory Profile Edit Page 
License CC-BY-SA 4.0 (International).
LDAP Directory Profile Edit – Certificate Binding 
Associate certificate exported from keystore / keychain 
with LDAP Directory record 
License CC-BY-SA 4.0 (International).
NetID-TLS Authentication 
(using an Identity Card with LDAP URI in it SAN) 
License CC-BY-SA 4.0 (International).
NetID-TLS Authentication – Step 1 
License CC-BY-SA 4.0 (International).
NetID-TLS Authentication – Step 2 
License CC-BY-SA 4.0 (International).
NetID-TLS Authentication – Step 3 
License CC-BY-SA 4.0 (International).
NetID-TLS Authentication – Step 4 
License CC-BY-SA 4.0 (International).
NetID-TLS Authentication – Step 5 
License CC-BY-SA 4.0 (International).
Attributed Based Access Controls (ABAC) 
via 
NetID-TLS & WebID-TLS Authentication 
Protocols 
License CC-BY-SA 4.0 (International).
Controlling Access 
to an HTTP-Accessible Document 
License CC-BY-SA 4.0 (International).
Resource Protection – Step 1 
License CC-BY-SA 4.0 (International).
Resource Protection – Step 2 
License CC-BY-SA 4.0 (International).
Resource Protection – Step 3 
License CC-BY-SA 4.0 (International).
Actual Attribute Based Access Control 
License CC-BY-SA 4.0 (International).
Protected Resource Access Challenge – Step 1 
License CC-BY-SA 4.0 (International).
Protected Resource Access Challenge – Step 2 
License CC-BY-SA 4.0 (International).
Protected Resource Access Challenge – Step 3 
License CC-BY-SA 4.0 (International).
Protected Resource Access Challenge – Step 3 
License CC-BY-SA 4.0 (International).
Controlling Access 
to a SPARQL Endpoint 
Example 
License CC-BY-SA 4.0 (International).
RDF based ACL scoped to a Named 
Graph -- Template 
## Protected (Private) Resource Authorization denoted by <{ACL-IRI}> ; 
## created by the Identity Principal denoted by <{Rule-Creator-WEBID}> ; 
## granting Read/Write privileges to the Named Graph denoted by <{Target-Named-GRAPH-IRI}> ; 
## to identity principals denoted by the following <{GROUP-or-AGENT-IRI-1}>, 
## <{GROUP-or-AGENT-IRI-N}> 
PREFIX oplacl: <http://www.openlinksw.com/ontology/acl#> 
PREFIX acl: <http://www.w3.org/ns/auth/acl#> 
PREFIX foaf: <http://xmlns.com/foaf/0.1/> 
<{ACL-IRI}> 
a acl:Authorization ; 
foaf:maker <http://kingsley.idehen.net/dataspace/person/kidehen#this> ; 
oplacl:hasAccessMode oplacl:Write ; 
acl:accessTo <urn:private:rdf:data:source> ; 
acl:agent 
<ldap://mail.openlinksw.com/cn=Kingsley%20Idehen,ou=Accounts,o=OpenLink%20Software,c=US>, 
<http://id.myopenlink.net/dataspace/person/KingsleyUyiIdehen#this> ; 
oplacl:hasScope oplacl:PrivateGraphs ; 
oplacl:hasRealm oplacl:DefaultRealm . 
License CC-BY-SA 4.0 (International).
Controlling Access 
to a SPARQL-accessible 
Named Graph 
License CC-BY-SA 4.0 (International).
RDF based ACL scoped to a Named 
Graph -- Example 
## Grant access to the Named Graph denoted by the IRI <urn:private:rdf:data:source> 
## to identity principals denoted by the following IRIs 
## <ldap://mail.openlinksw.com/cn=Kingsley%20Idehen,ou=Accounts,o=OpenLink%20Software,c=US>, 
## <http://id.myopenlink.net/dataspace/person/KingsleyUyiIdehen#this> 
PREFIX oplacl: <http://www.openlinksw.com/ontology/acl#> 
PREFIX acl: <http://www.w3.org/ns/auth/acl#> 
PREFIX foaf: <http://xmlns.com/foaf/0.1/> 
<#AccessPolicy1> 
a acl:Authorization ; 
foaf:maker <http://kingsley.idehen.net/dataspace/person/kidehen#this> ; 
oplacl:hasAccessMode oplacl:Write ; 
acl:accessTo <urn:private:rdf:data:source> ; 
acl:agent 
<ldap://mail.openlinksw.com/cn=Kingsley%20Idehen,ou=Accounts,o=OpenLink%20Software,c=US>, 
<http://id.myopenlink.net/dataspace/person/KingsleyUyiIdehen#this> ; 
oplacl:hasScope oplacl:PrivateGraphs ; 
oplacl:hasRealm oplacl:DefaultRealm . 
License CC-BY-SA 4.0 (International).
Controlling Access 
to an HTTP (Web) Service 
License CC-BY-SA 4.0 (International).
RDF based ACL scoped to a YouID 
Instance 
PREFIX oplacl: <http://www.openlinksw.com/ontology/acl#> 
PREFIX acl: <http://www.w3.org/ns/auth/acl#> 
PREFIX foaf: <http://xmlns.com/foaf/0.1/> 
<#YouIDUsagePolicy1> 
a acl:Authorization ; 
rdfs:comment ""”Machine-to-Machine ACL that controls access to an instance of the YouID 
Identity Card Generator.""” ; 
foaf:maker <{PERSON-WEBID}> ; 
oplacl:hasAccessMode oplacl:Write ; 
acl:accessTo <http://{HOST-CNAME}/youid> ; 
acl:agent {Agent-WebID} ; 
oplacl:hasScope <urn:virtuoso:val:scopes:youid> ; 
oplacl:hasRealm oplacl:DefaultRealm . 
License CC-BY-SA 4.0 (International).
Live Additional Information Links 
An Glossary of terms, in Linked Data form: 
• WebID 
• WebID-TLS 
• NetID 
• NetID-TLS 
• Linked Data 
• Linked Open Data 
• Semantic Web 
• Resource Description Framework (RDF) 
License CC-BY-SA 4.0 (International).
Additional Information 
Web Sites 
OpenLink Software 
YouID – Digital Identity Card (Certificate) Generator 
OpenLink Data Spaces – Semantically enhanced Personal & Enterprise Data Spaces & 
Collaboration Platform 
OpenLink Virtuoso - Hybrid Data Management, Integration, Application, and Identity Server 
Universal Data Access Drivers - High-Performance ODBC, JDBC, ADO.NET, and OLE-DB 
Drivers 
LDAP and NetID-TLS – How to use LDAP scheme URIs with NetID-TLS Authentication 
Social Media Data spaces 
http://kidehen.blogspot.com (weblog) 
http://www.openlinksw.com/blog/~kidehen/ (weblog) 
https://plus.google.com/112399767740508618350/posts (Google+) 
https://twitter.com/#!/kidehen (Twitter) 
Hashtag: #LinkedData (Anywhere). 
License CC-BY-SA 4.0 (International).

More Related Content

What's hot

Exploiting Linked (Open) Data via Microsoft Access using ODBC File DSNs
Exploiting Linked (Open) Data via Microsoft Access using ODBC  File DSNsExploiting Linked (Open) Data via Microsoft Access using ODBC  File DSNs
Exploiting Linked (Open) Data via Microsoft Access using ODBC File DSNsKingsley Uyi Idehen
 
Tableau Desktop as a Linked (Open) Data Front-End via ODBC
Tableau Desktop as a Linked (Open) Data Front-End via ODBCTableau Desktop as a Linked (Open) Data Front-End via ODBC
Tableau Desktop as a Linked (Open) Data Front-End via ODBCKingsley Uyi Idehen
 
Exploiting Linked Data via Filemaker
Exploiting Linked Data via FilemakerExploiting Linked Data via Filemaker
Exploiting Linked Data via FilemakerKingsley Uyi Idehen
 
Virtuoso ODBC Driver Configuration & Usage (Mac OS X)
Virtuoso ODBC Driver Configuration & Usage (Mac OS X)Virtuoso ODBC Driver Configuration & Usage (Mac OS X)
Virtuoso ODBC Driver Configuration & Usage (Mac OS X)Kingsley Uyi Idehen
 
Virtuoso Universal Server Overview
Virtuoso Universal Server OverviewVirtuoso Universal Server Overview
Virtuoso Universal Server Overviewrumito
 
Linked Open Data (LOD) Cloud & Ontology Life Cycles
Linked Open Data (LOD) Cloud & Ontology Life Cycles Linked Open Data (LOD) Cloud & Ontology Life Cycles
Linked Open Data (LOD) Cloud & Ontology Life Cycles Kingsley Uyi Idehen
 
Solving Real Problems Using Linked Data
Solving Real Problems Using Linked DataSolving Real Problems Using Linked Data
Solving Real Problems Using Linked Datarumito
 
Accessing the Linked Open Data Cloud via ODBC
Accessing the Linked Open Data Cloud via ODBCAccessing the Linked Open Data Cloud via ODBC
Accessing the Linked Open Data Cloud via ODBCKingsley Uyi Idehen
 
Virtuoso ODBC Driver Configuration & Usage (Windows)
Virtuoso ODBC Driver Configuration & Usage (Windows)Virtuoso ODBC Driver Configuration & Usage (Windows)
Virtuoso ODBC Driver Configuration & Usage (Windows)Kingsley Uyi Idehen
 
Linked Data Driven Data Virtualization for Web-scale Integration
Linked Data Driven Data Virtualization for Web-scale IntegrationLinked Data Driven Data Virtualization for Web-scale Integration
Linked Data Driven Data Virtualization for Web-scale Integrationrumito
 
Exploiting Linked (Open) Data via Microsoft Access
Exploiting Linked (Open) Data via Microsoft AccessExploiting Linked (Open) Data via Microsoft Access
Exploiting Linked (Open) Data via Microsoft AccessKingsley Uyi Idehen
 
Using SAP Crystal Reports as a Linked (Open) Data Front-End via ODBC
Using SAP Crystal Reports as a Linked (Open) Data Front-End via ODBCUsing SAP Crystal Reports as a Linked (Open) Data Front-End via ODBC
Using SAP Crystal Reports as a Linked (Open) Data Front-End via ODBCKingsley Uyi Idehen
 
Linked Data Planet Key Note
Linked Data Planet Key NoteLinked Data Planet Key Note
Linked Data Planet Key Noterumito
 
REST and REST-fulness
REST and REST-fulnessREST and REST-fulness
REST and REST-fulnessDavid Waite
 
HTML5 based PivotViewer for Visualizing LInked Data
HTML5 based PivotViewer for Visualizing LInked Data HTML5 based PivotViewer for Visualizing LInked Data
HTML5 based PivotViewer for Visualizing LInked Data Kingsley Uyi Idehen
 
Solving Real Problems Using Linked Data
Solving Real Problems Using Linked DataSolving Real Problems Using Linked Data
Solving Real Problems Using Linked DataKingsley Uyi Idehen
 

What's hot (20)

Exploiting Linked (Open) Data via Microsoft Access using ODBC File DSNs
Exploiting Linked (Open) Data via Microsoft Access using ODBC  File DSNsExploiting Linked (Open) Data via Microsoft Access using ODBC  File DSNs
Exploiting Linked (Open) Data via Microsoft Access using ODBC File DSNs
 
Tableau Desktop as a Linked (Open) Data Front-End via ODBC
Tableau Desktop as a Linked (Open) Data Front-End via ODBCTableau Desktop as a Linked (Open) Data Front-End via ODBC
Tableau Desktop as a Linked (Open) Data Front-End via ODBC
 
Integrating Semantic Systems
Integrating Semantic SystemsIntegrating Semantic Systems
Integrating Semantic Systems
 
ISWC 2012 - Linked Data Meetup
ISWC 2012 - Linked Data MeetupISWC 2012 - Linked Data Meetup
ISWC 2012 - Linked Data Meetup
 
Exploiting Linked Data via Filemaker
Exploiting Linked Data via FilemakerExploiting Linked Data via Filemaker
Exploiting Linked Data via Filemaker
 
Virtuoso ODBC Driver Configuration & Usage (Mac OS X)
Virtuoso ODBC Driver Configuration & Usage (Mac OS X)Virtuoso ODBC Driver Configuration & Usage (Mac OS X)
Virtuoso ODBC Driver Configuration & Usage (Mac OS X)
 
Virtuoso Universal Server Overview
Virtuoso Universal Server OverviewVirtuoso Universal Server Overview
Virtuoso Universal Server Overview
 
Linked Open Data (LOD) Cloud & Ontology Life Cycles
Linked Open Data (LOD) Cloud & Ontology Life Cycles Linked Open Data (LOD) Cloud & Ontology Life Cycles
Linked Open Data (LOD) Cloud & Ontology Life Cycles
 
Solving Real Problems Using Linked Data
Solving Real Problems Using Linked DataSolving Real Problems Using Linked Data
Solving Real Problems Using Linked Data
 
Accessing the Linked Open Data Cloud via ODBC
Accessing the Linked Open Data Cloud via ODBCAccessing the Linked Open Data Cloud via ODBC
Accessing the Linked Open Data Cloud via ODBC
 
Virtuoso ODBC Driver Configuration & Usage (Windows)
Virtuoso ODBC Driver Configuration & Usage (Windows)Virtuoso ODBC Driver Configuration & Usage (Windows)
Virtuoso ODBC Driver Configuration & Usage (Windows)
 
Linked Data Driven Data Virtualization for Web-scale Integration
Linked Data Driven Data Virtualization for Web-scale IntegrationLinked Data Driven Data Virtualization for Web-scale Integration
Linked Data Driven Data Virtualization for Web-scale Integration
 
Exploiting Linked (Open) Data via Microsoft Access
Exploiting Linked (Open) Data via Microsoft AccessExploiting Linked (Open) Data via Microsoft Access
Exploiting Linked (Open) Data via Microsoft Access
 
Using SAP Crystal Reports as a Linked (Open) Data Front-End via ODBC
Using SAP Crystal Reports as a Linked (Open) Data Front-End via ODBCUsing SAP Crystal Reports as a Linked (Open) Data Front-End via ODBC
Using SAP Crystal Reports as a Linked (Open) Data Front-End via ODBC
 
Semantics2014
Semantics2014Semantics2014
Semantics2014
 
Easily Serving and Accessing HDF-EOS2 Datasets Using DODS Technologies
Easily Serving and Accessing HDF-EOS2 Datasets Using DODS TechnologiesEasily Serving and Accessing HDF-EOS2 Datasets Using DODS Technologies
Easily Serving and Accessing HDF-EOS2 Datasets Using DODS Technologies
 
Linked Data Planet Key Note
Linked Data Planet Key NoteLinked Data Planet Key Note
Linked Data Planet Key Note
 
REST and REST-fulness
REST and REST-fulnessREST and REST-fulness
REST and REST-fulness
 
HTML5 based PivotViewer for Visualizing LInked Data
HTML5 based PivotViewer for Visualizing LInked Data HTML5 based PivotViewer for Visualizing LInked Data
HTML5 based PivotViewer for Visualizing LInked Data
 
Solving Real Problems Using Linked Data
Solving Real Problems Using Linked DataSolving Real Problems Using Linked Data
Solving Real Problems Using Linked Data
 

Viewers also liked

CA CloudMinder Vasu Surabhi
CA CloudMinder Vasu SurabhiCA CloudMinder Vasu Surabhi
CA CloudMinder Vasu SurabhiVasu Surabhi
 
Anypoint access management - Roles
Anypoint access management - RolesAnypoint access management - Roles
Anypoint access management - RolesShanky Gupta
 
Mule access management - Managing Environments and Permissions
Mule access management - Managing Environments and PermissionsMule access management - Managing Environments and Permissions
Mule access management - Managing Environments and PermissionsShanky Gupta
 
What Permissions Does Your Database User REALLY Need?
What Permissions Does Your Database User REALLY Need?What Permissions Does Your Database User REALLY Need?
What Permissions Does Your Database User REALLY Need?Denim Group
 
Presentation on Federated identity and Access Management
Presentation on Federated identity and Access ManagementPresentation on Federated identity and Access Management
Presentation on Federated identity and Access Managementokoliec
 
CIS14: Why Federated Access Needs a Federated Identity
CIS14: Why Federated Access Needs a Federated IdentityCIS14: Why Federated Access Needs a Federated Identity
CIS14: Why Federated Access Needs a Federated IdentityCloudIDSummit
 
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...NextLabs, Inc.
 
Value proposition of open government data
Value proposition of open government dataValue proposition of open government data
Value proposition of open government dataAlexander Howard
 
Semantic technologies for attribute based access: measurable security for the...
Semantic technologies for attribute based access: measurable security for the...Semantic technologies for attribute based access: measurable security for the...
Semantic technologies for attribute based access: measurable security for the...Josef Noll
 
Présentation de l'offre IAM de LINAGORA LinID
Présentation de l'offre IAM de LINAGORA LinIDPrésentation de l'offre IAM de LINAGORA LinID
Présentation de l'offre IAM de LINAGORA LinIDMichel-Marie Maudet
 
Generalized attribute centric access control
Generalized attribute centric access controlGeneralized attribute centric access control
Generalized attribute centric access controlarj_presenter
 
Bring Your Own Identity
Bring Your Own IdentityBring Your Own Identity
Bring Your Own IdentityNetIQ
 
10 02 authentification PAM
10 02 authentification PAM10 02 authentification PAM
10 02 authentification PAMNoël
 
Attribute Based Access Control
Attribute Based Access ControlAttribute Based Access Control
Attribute Based Access ControlChandra Sharma
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Controlidingolay
 
Introduction to column oriented databases
Introduction to column oriented databasesIntroduction to column oriented databases
Introduction to column oriented databasesArangoDB Database
 

Viewers also liked (20)

CA CloudMinder Vasu Surabhi
CA CloudMinder Vasu SurabhiCA CloudMinder Vasu Surabhi
CA CloudMinder Vasu Surabhi
 
Federated and fabulous identity
Federated and fabulous identityFederated and fabulous identity
Federated and fabulous identity
 
Anypoint access management - Roles
Anypoint access management - RolesAnypoint access management - Roles
Anypoint access management - Roles
 
Mule access management - Managing Environments and Permissions
Mule access management - Managing Environments and PermissionsMule access management - Managing Environments and Permissions
Mule access management - Managing Environments and Permissions
 
What Permissions Does Your Database User REALLY Need?
What Permissions Does Your Database User REALLY Need?What Permissions Does Your Database User REALLY Need?
What Permissions Does Your Database User REALLY Need?
 
Presentation on Federated identity and Access Management
Presentation on Federated identity and Access ManagementPresentation on Federated identity and Access Management
Presentation on Federated identity and Access Management
 
CIS14: Why Federated Access Needs a Federated Identity
CIS14: Why Federated Access Needs a Federated IdentityCIS14: Why Federated Access Needs a Federated Identity
CIS14: Why Federated Access Needs a Federated Identity
 
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
 
Value proposition of open government data
Value proposition of open government dataValue proposition of open government data
Value proposition of open government data
 
Semantic technologies for attribute based access: measurable security for the...
Semantic technologies for attribute based access: measurable security for the...Semantic technologies for attribute based access: measurable security for the...
Semantic technologies for attribute based access: measurable security for the...
 
Présentation de l'offre IAM de LINAGORA LinID
Présentation de l'offre IAM de LINAGORA LinIDPrésentation de l'offre IAM de LINAGORA LinID
Présentation de l'offre IAM de LINAGORA LinID
 
IAM
IAM IAM
IAM
 
Generalized attribute centric access control
Generalized attribute centric access controlGeneralized attribute centric access control
Generalized attribute centric access control
 
Bring Your Own Identity
Bring Your Own IdentityBring Your Own Identity
Bring Your Own Identity
 
Les processus IAM
Les processus IAMLes processus IAM
Les processus IAM
 
10 02 authentification PAM
10 02 authentification PAM10 02 authentification PAM
10 02 authentification PAM
 
Abac and the evolution of access control
Abac and the evolution of access controlAbac and the evolution of access control
Abac and the evolution of access control
 
Attribute Based Access Control
Attribute Based Access ControlAttribute Based Access Control
Attribute Based Access Control
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Control
 
Introduction to column oriented databases
Introduction to column oriented databasesIntroduction to column oriented databases
Introduction to column oriented databases
 

Similar to Enterprise & Web based Federated Identity Management & Data Access Controls

OpenID Connect 4 SSI (at EIC 2021)
OpenID Connect 4 SSI (at EIC 2021)OpenID Connect 4 SSI (at EIC 2021)
OpenID Connect 4 SSI (at EIC 2021)Torsten Lodderstedt
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
 
OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36Torsten Lodderstedt
 
Early Adopting Java WSIT-Experiences with Windows CardSpace
Early Adopting Java WSIT-Experiences with Windows CardSpaceEarly Adopting Java WSIT-Experiences with Windows CardSpace
Early Adopting Java WSIT-Experiences with Windows CardSpaceOliver Pfaff
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
 
CTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricCTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricSpiffy
 
DevDay: Extending CorDapps with Self-Sovereign Identity: Technology Deepdive ...
DevDay: Extending CorDapps with Self-Sovereign Identity: Technology Deepdive ...DevDay: Extending CorDapps with Self-Sovereign Identity: Technology Deepdive ...
DevDay: Extending CorDapps with Self-Sovereign Identity: Technology Deepdive ...R3
 
Cordacon 2018 - Cordentity - Hyperledger Indy + Corda
Cordacon 2018 -   Cordentity - Hyperledger Indy + CordaCordacon 2018 -   Cordentity - Hyperledger Indy + Corda
Cordacon 2018 - Cordentity - Hyperledger Indy + CordaVasiliy Suvorov
 
ARIN 35 Tutorial: How to certify your ARIN resources with RPKI
ARIN 35 Tutorial: How to certify your ARIN resources with RPKIARIN 35 Tutorial: How to certify your ARIN resources with RPKI
ARIN 35 Tutorial: How to certify your ARIN resources with RPKIARIN
 
Digital Locker Dedicated Repository API Specification v1 4
Digital Locker Dedicated Repository API Specification v1 4Digital Locker Dedicated Repository API Specification v1 4
Digital Locker Dedicated Repository API Specification v1 4Amit Ranjan
 
Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4DigiLocker
 
OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)Torsten Lodderstedt
 
Apache Knox Gateway "Single Sign On" expands the reach of the Enterprise Users
Apache Knox Gateway "Single Sign On" expands the reach of the Enterprise UsersApache Knox Gateway "Single Sign On" expands the reach of the Enterprise Users
Apache Knox Gateway "Single Sign On" expands the reach of the Enterprise UsersDataWorks Summit
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable CredentialsTorsten Lodderstedt
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...Information Security Awareness Group
 
O Dell Secure360 Presentation5 12 10b
O Dell Secure360 Presentation5 12 10bO Dell Secure360 Presentation5 12 10b
O Dell Secure360 Presentation5 12 10bBruce O'Dell
 
IBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsIBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsSandeep Patil
 
WSO2 Charon
WSO2 CharonWSO2 Charon
WSO2 CharonHasiniG
 

Similar to Enterprise & Web based Federated Identity Management & Data Access Controls (20)

Understanding data -latest
Understanding data  -latestUnderstanding data  -latest
Understanding data -latest
 
OpenID for SSI
OpenID for SSIOpenID for SSI
OpenID for SSI
 
OpenID Connect 4 SSI (at EIC 2021)
OpenID Connect 4 SSI (at EIC 2021)OpenID Connect 4 SSI (at EIC 2021)
OpenID Connect 4 SSI (at EIC 2021)
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
 
OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36
 
Early Adopting Java WSIT-Experiences with Windows CardSpace
Early Adopting Java WSIT-Experiences with Windows CardSpaceEarly Adopting Java WSIT-Experiences with Windows CardSpace
Early Adopting Java WSIT-Experiences with Windows CardSpace
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
 
CTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricCTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App Fabric
 
DevDay: Extending CorDapps with Self-Sovereign Identity: Technology Deepdive ...
DevDay: Extending CorDapps with Self-Sovereign Identity: Technology Deepdive ...DevDay: Extending CorDapps with Self-Sovereign Identity: Technology Deepdive ...
DevDay: Extending CorDapps with Self-Sovereign Identity: Technology Deepdive ...
 
Cordacon 2018 - Cordentity - Hyperledger Indy + Corda
Cordacon 2018 -   Cordentity - Hyperledger Indy + CordaCordacon 2018 -   Cordentity - Hyperledger Indy + Corda
Cordacon 2018 - Cordentity - Hyperledger Indy + Corda
 
ARIN 35 Tutorial: How to certify your ARIN resources with RPKI
ARIN 35 Tutorial: How to certify your ARIN resources with RPKIARIN 35 Tutorial: How to certify your ARIN resources with RPKI
ARIN 35 Tutorial: How to certify your ARIN resources with RPKI
 
Digital Locker Dedicated Repository API Specification v1 4
Digital Locker Dedicated Repository API Specification v1 4Digital Locker Dedicated Repository API Specification v1 4
Digital Locker Dedicated Repository API Specification v1 4
 
Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4Digital Locker Dedicated Repository Api Specification v1 4
Digital Locker Dedicated Repository Api Specification v1 4
 
OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)
 
Apache Knox Gateway "Single Sign On" expands the reach of the Enterprise Users
Apache Knox Gateway "Single Sign On" expands the reach of the Enterprise UsersApache Knox Gateway "Single Sign On" expands the reach of the Enterprise Users
Apache Knox Gateway "Single Sign On" expands the reach of the Enterprise Users
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
 
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A... Authorization Policy in a PKI Environment  Mary Thompson Srilekha Mudumbai A...
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
 
O Dell Secure360 Presentation5 12 10b
O Dell Secure360 Presentation5 12 10bO Dell Secure360 Presentation5 12 10b
O Dell Secure360 Presentation5 12 10b
 
IBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsIBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for Protocols
 
WSO2 Charon
WSO2 CharonWSO2 Charon
WSO2 Charon
 

Enterprise & Web based Federated Identity Management & Data Access Controls

  • 1. Federated Identity & Attribute Based Resource Access Controls By Kingsley Idehen Founder & CEO, OpenLink Software
  • 2. SITUATION ANALYSIS License CC-BY-SA 4.0 (International).
  • 3. Presentation Goals Deconstruct: Identity Identifiers Identification License CC-BY-SA 4.0 (International).
  • 4. Identity EVERY DAY WE HEAR License CC-BY-SA 4.0 (International). IDENTITY IS PROBLEMATIC IDENTITY IS COMPLEX IDENTITY IS IMPORTANT
  • 5. Identity WE ALMOST NEVERHEAR ABOUT License CC-BY-SA 4.0 (International). WHAT IDENTITY ACTUALLY IS HOW IDENTITY IS CREATED HOW IDENTITY IS REPRESENTED
  • 6. Identity Basics License CC-BY-SA 4.0 (International).
  • 7. What is an Entity? An Entity is a Distinctly Identifiable Thing License CC-BY-SA 4.0 (International).
  • 8. How is an Entity Identified (Named) ? An Entity is Identified (or named) through the combined effects of Identifier based denotation (signification) and document content based connotation (description). License CC-BY-SA 4.0 (International).
  • 9. How is an Entity Denoted? An Entity is Denoted (Signified) through the use of an Identifier. License CC-BY-SA 4.0 (International).
  • 10. What is an Identifier? An Identifier is a Sign (or Token) that Signifies (Denotes, or “Stands For”) an Entity License CC-BY-SA 4.0 (International).
  • 11. Identifier Types? Quoted Literals such as: “Kingsley Idehen” or ‘Kingsley Idehen’ Relative Reference: <#KingsleyIdehen> Absolute HTTP URI based Reference: <http://kingsley.idehen.net/dataspace/person/kidehen#thi s> LDAP URI based Reference: <ldap://mail.openlinksw.com/cn=Kingsley%20Idehen%2Cou=Accounts %2Co=OpenLink%20Software%2Cc=US> License CC-BY-SA 4.0 (International).
  • 12. What is a WebID? An HTTP Uniform Resource Identifier (URI) that identifies (names) an Agent. Example: <http://kingsley.idehen.net/dataspace/person/kidehen#this > License CC-BY-SA 4.0 (International).
  • 13. What is a NetID? A Resolvable Uniform Resource Identifier (URI) that identifies (names) an Agent. Example: <ldap://mail.openlinksw.com/cn=Kingsley%20Idehen%2Cou =Accounts%2Co=OpenLink%20Software%2Cc=US> License CC-BY-SA 4.0 (International).
  • 14. What is an Identity Card? A Document comprised of content in the form of identity claims that coalesce around an identifier that names the Identity Card’s subject. Basically, a document comprised of content that connotes (describes) its subject. License CC-BY-SA 4.0 (International).
  • 15. WebID-Profile Document -- Front A Document comprised of RDF statement based identity claims that coalesce around an identifier that names the Identity Card’s subject. Identity Card subject name MUST be in the form of an HTTP URI. License CC-BY-SA 4.0 (International).
  • 16. WebID-Profile Document -- Inside A Document comprised of RDF statement based identity claims that coalesce around an identifier that names the Identity Card’s subject. Identity Card subject identifiers MUST be in the form of an HTTP URI. License CC-BY-SA 4.0 (International).
  • 17. NetID-Profile Document -- Front A Document comprised of RDF statement based identity claims that coalesce around an identifier that names the Identity Card’s subject. Identity Card subject identifiers MUST be in the form of Resolvable URIs, so LDAP scheme identifiers can apply. License CC-BY-SA 4.0 (International).
  • 18. NetID-Profile Document -- Inside A Document comprised of RDF statement based identity claims that coalesce around an identifier that names the Identity Card’s subject. Identity Card subject identifiers MUST be in the form of Resolvable URIs, so LDAP scheme identifiers can apply. License CC-BY-SA 4.0 (International).
  • 19. What Your Digital Identity Card Enables • Identification for 3rd Party Use – e.g., protected resource access controls and data access policies -- scoped specifically to your identity • Signing Statements (Endorsements), Messages (e.g., Email) that are cryptographically verifiable • Receipt of Encrypted Messages that are only readable by you – since the entire message or shared-secret is encrypted using data (Public Key) from your Digital Identity Card • All of the items above using existing open standards. License CC-BY-SA 4.0 (International).
  • 20. Attributed Based Access Controls (ABAC) License CC-BY-SA 4.0 (International).
  • 21. What is ABAC About? Fine-grained access to protected resources driven by attributes (characteristics, features, properties, predicates, relations etc.) of the resource requestor (an Identity Principal). License CC-BY-SA 4.0 (International).
  • 22. RDF based Attributed based Access Controls 1. Identity Principal Requests License CC-BY-SA 4.0 (International). Access to Protected Resource 2. Protected Resource Server Assesses:  Identity (RDF based Identity Claims)  Access Control Rules (RDF based Protected Resource Access Policies) 3. Protected Resource Access is Granted or Rejected.
  • 23. ABAC Challenges? • Identifier Types – NetID vs WebID Issues • Data Access Protocols – LDAP vs HTTP issues • Data Representation – Data Virtualization issues • Data Integration – RDF based Linked Open Data • Data Access Performance & Scalability – Virtuoso! License CC-BY-SA 4.0 (International).
  • 24. Identity Card Generation License CC-BY-SA 4.0 (International).
  • 25. WebID Identity Card Generation License CC-BY-SA 4.0 (International).
  • 26. Digital Identity Card Generation – PdP Selection Select from a vast collection of Profile Data Providers (PdPs) License CC-BY-SA 4.0 (International)
  • 27. Digital Identity Card Generation – IdP Selection Select from a vast collection of Identity Card Storage Providers (IdPs) License CC-BY-SA 4.0 (International)
  • 28. Generated Public Identity Card A Document comprised of content in the form of identity claims that coalesce around an identifier (e.g., HTTP URI) that names the Identity Card’s subject. Basically, a document comprised of content that connotes (describes) its subject. License CC-BY-SA 4.0 (International).
  • 29. Local Identity Card (X.509 Cert.) View - 1 License CC-BY-SA 4.0 (International).
  • 30. Local Identity Card (X.509 Cert.) View - 2 License CC-BY-SA 4.0 (International).
  • 31. Local Identity Card (X.509 Cert.) View - 3 License CC-BY-SA 4.0 (International).
  • 32. Authentication Protocols (WebID-TLS and NetID-TLS) License CC-BY-SA 4.0 (International).
  • 33. Critical Proof of Work Fundamentally, NetID-TLS and WebID-TLS authentication protocols combine shared-secret knowledge (PKI) with proof-of-work. This includes: • Private & Public Keypair Possession • Private (X.509 Cert.) and Public (Profile Document) Identity Card Creation & Storage Capability • Ability to Express Entity Identity Claims using Entity Relationship Semantics that are comprehensible to both Humans and Machines. License CC-BY-SA 4.0 (International).
  • 34. What is WebID-TLS? TLS based authentication protocol where identity claims are verified as follows: 1. User Agent initiates a TLS connection 2. Presents a locally stored Identity Card (X.509 Certificate) comprised of a WebID as its SubjectAlternativeName (SAN) value 3. Following successful TLS-handshake, a protected resource server performs these additional tests:  Checks that WebID successfully resolves to a profile document comprised of RDF statements  Checks existence of an RDF statement that associates WebID with the Public Key of the local X.509 certificate used to complete the successful TLS-handshake. License CC-BY-SA 4.0 (International).
  • 35. WebID-TLS Authentication Protocol Example License CC-BY-SA 4.0 (International).
  • 36. WebID-TLS Authentication – Step 1 License CC-BY-SA 4.0 (International).
  • 37. WebID-TLS Authentication – Step 2 License CC-BY-SA 4.0 (International).
  • 38. WebID-TLS Authentication – Step 3 License CC-BY-SA 4.0 (International).
  • 39. WebID-TLS Authentication – Step 4 License CC-BY-SA 4.0 (International).
  • 40. What is NetID-TLS? TLS based authentication protocols where identity claims are verified as follows: 1. User Agent initiates a TLS connection 2. Presents a locally stored Identity Card (X.509 Certificate) comprised of a NetID as its SubjectAlternativeName (SAN) value 3. Following successful TLS-handshake, a protected resource server performs these additional tests:  Check that NetID is successfully resolved to a profile document  Checks that profile document is comprised of replica claims matching those in the local X.509 certificate – achieved by comparing the SHA1 fingerprints of both documents. License CC-BY-SA 4.0 (International).
  • 41. NetID Identity Card Generation License CC-BY-SA 4.0 (International).
  • 42. YouID Identity Card Creation – Step 1 License CC-BY-SA 4.0 (International).
  • 43. YouID Identity Card Creation – Step 2 License CC-BY-SA 4.0 (International).
  • 44. Local Identity Card (X.509 Cert.) View - 1 License CC-BY-SA 4.0 (International).
  • 45. Local Identity Card (X.509 Cert.) View - 2 License CC-BY-SA 4.0 (International).
  • 46. Local Identity Card (X.509 Cert.) View - 3 License CC-BY-SA 4.0 (International).
  • 47. NetID-TLS Authentication Protocol Example (LDAP Directory Services) License CC-BY-SA 4.0 (International).
  • 48. Identity Card Export for LDAP Directory Use License CC-BY-SA 4.0 (International).
  • 49. LDAP Directory Profile Edit Page License CC-BY-SA 4.0 (International).
  • 50. LDAP Directory Profile Edit – Certificate Binding Associate certificate exported from keystore / keychain with LDAP Directory record License CC-BY-SA 4.0 (International).
  • 51. NetID-TLS Authentication (using an Identity Card with LDAP URI in it SAN) License CC-BY-SA 4.0 (International).
  • 52. NetID-TLS Authentication – Step 1 License CC-BY-SA 4.0 (International).
  • 53. NetID-TLS Authentication – Step 2 License CC-BY-SA 4.0 (International).
  • 54. NetID-TLS Authentication – Step 3 License CC-BY-SA 4.0 (International).
  • 55. NetID-TLS Authentication – Step 4 License CC-BY-SA 4.0 (International).
  • 56. NetID-TLS Authentication – Step 5 License CC-BY-SA 4.0 (International).
  • 57. Attributed Based Access Controls (ABAC) via NetID-TLS & WebID-TLS Authentication Protocols License CC-BY-SA 4.0 (International).
  • 58. Controlling Access to an HTTP-Accessible Document License CC-BY-SA 4.0 (International).
  • 59. Resource Protection – Step 1 License CC-BY-SA 4.0 (International).
  • 60. Resource Protection – Step 2 License CC-BY-SA 4.0 (International).
  • 61. Resource Protection – Step 3 License CC-BY-SA 4.0 (International).
  • 62. Actual Attribute Based Access Control License CC-BY-SA 4.0 (International).
  • 63. Protected Resource Access Challenge – Step 1 License CC-BY-SA 4.0 (International).
  • 64. Protected Resource Access Challenge – Step 2 License CC-BY-SA 4.0 (International).
  • 65. Protected Resource Access Challenge – Step 3 License CC-BY-SA 4.0 (International).
  • 66. Protected Resource Access Challenge – Step 3 License CC-BY-SA 4.0 (International).
  • 67. Controlling Access to a SPARQL Endpoint Example License CC-BY-SA 4.0 (International).
  • 68. RDF based ACL scoped to a Named Graph -- Template ## Protected (Private) Resource Authorization denoted by <{ACL-IRI}> ; ## created by the Identity Principal denoted by <{Rule-Creator-WEBID}> ; ## granting Read/Write privileges to the Named Graph denoted by <{Target-Named-GRAPH-IRI}> ; ## to identity principals denoted by the following <{GROUP-or-AGENT-IRI-1}>, ## <{GROUP-or-AGENT-IRI-N}> PREFIX oplacl: <http://www.openlinksw.com/ontology/acl#> PREFIX acl: <http://www.w3.org/ns/auth/acl#> PREFIX foaf: <http://xmlns.com/foaf/0.1/> <{ACL-IRI}> a acl:Authorization ; foaf:maker <http://kingsley.idehen.net/dataspace/person/kidehen#this> ; oplacl:hasAccessMode oplacl:Write ; acl:accessTo <urn:private:rdf:data:source> ; acl:agent <ldap://mail.openlinksw.com/cn=Kingsley%20Idehen,ou=Accounts,o=OpenLink%20Software,c=US>, <http://id.myopenlink.net/dataspace/person/KingsleyUyiIdehen#this> ; oplacl:hasScope oplacl:PrivateGraphs ; oplacl:hasRealm oplacl:DefaultRealm . License CC-BY-SA 4.0 (International).
  • 69. Controlling Access to a SPARQL-accessible Named Graph License CC-BY-SA 4.0 (International).
  • 70. RDF based ACL scoped to a Named Graph -- Example ## Grant access to the Named Graph denoted by the IRI <urn:private:rdf:data:source> ## to identity principals denoted by the following IRIs ## <ldap://mail.openlinksw.com/cn=Kingsley%20Idehen,ou=Accounts,o=OpenLink%20Software,c=US>, ## <http://id.myopenlink.net/dataspace/person/KingsleyUyiIdehen#this> PREFIX oplacl: <http://www.openlinksw.com/ontology/acl#> PREFIX acl: <http://www.w3.org/ns/auth/acl#> PREFIX foaf: <http://xmlns.com/foaf/0.1/> <#AccessPolicy1> a acl:Authorization ; foaf:maker <http://kingsley.idehen.net/dataspace/person/kidehen#this> ; oplacl:hasAccessMode oplacl:Write ; acl:accessTo <urn:private:rdf:data:source> ; acl:agent <ldap://mail.openlinksw.com/cn=Kingsley%20Idehen,ou=Accounts,o=OpenLink%20Software,c=US>, <http://id.myopenlink.net/dataspace/person/KingsleyUyiIdehen#this> ; oplacl:hasScope oplacl:PrivateGraphs ; oplacl:hasRealm oplacl:DefaultRealm . License CC-BY-SA 4.0 (International).
  • 71. Controlling Access to an HTTP (Web) Service License CC-BY-SA 4.0 (International).
  • 72. RDF based ACL scoped to a YouID Instance PREFIX oplacl: <http://www.openlinksw.com/ontology/acl#> PREFIX acl: <http://www.w3.org/ns/auth/acl#> PREFIX foaf: <http://xmlns.com/foaf/0.1/> <#YouIDUsagePolicy1> a acl:Authorization ; rdfs:comment ""”Machine-to-Machine ACL that controls access to an instance of the YouID Identity Card Generator.""” ; foaf:maker <{PERSON-WEBID}> ; oplacl:hasAccessMode oplacl:Write ; acl:accessTo <http://{HOST-CNAME}/youid> ; acl:agent {Agent-WebID} ; oplacl:hasScope <urn:virtuoso:val:scopes:youid> ; oplacl:hasRealm oplacl:DefaultRealm . License CC-BY-SA 4.0 (International).
  • 73. Live Additional Information Links An Glossary of terms, in Linked Data form: • WebID • WebID-TLS • NetID • NetID-TLS • Linked Data • Linked Open Data • Semantic Web • Resource Description Framework (RDF) License CC-BY-SA 4.0 (International).
  • 74. Additional Information Web Sites OpenLink Software YouID – Digital Identity Card (Certificate) Generator OpenLink Data Spaces – Semantically enhanced Personal & Enterprise Data Spaces & Collaboration Platform OpenLink Virtuoso - Hybrid Data Management, Integration, Application, and Identity Server Universal Data Access Drivers - High-Performance ODBC, JDBC, ADO.NET, and OLE-DB Drivers LDAP and NetID-TLS – How to use LDAP scheme URIs with NetID-TLS Authentication Social Media Data spaces http://kidehen.blogspot.com (weblog) http://www.openlinksw.com/blog/~kidehen/ (weblog) https://plus.google.com/112399767740508618350/posts (Google+) https://twitter.com/#!/kidehen (Twitter) Hashtag: #LinkedData (Anywhere). License CC-BY-SA 4.0 (International).