Welcome!

@CloudExpo Authors: Zakia Bouachraoui, Elizabeth White, Liz McMillan, Pat Romanski, Roger Strukhoff

Related Topics: Cloud Security, @CloudExpo

Cloud Security: Article

Federated Security in Windows Azure

B2B Collaboration in Cloud

Collaboration Is the Key to  Business
In today's business, it is no longer a single large organization that owns the complete life cycle of a product, i.e., conceiving, designing, producing, marketing  cycle. Rather the product life cycle management has moved to multiple stakeholders who collaboratively work together  to achieve the desired efforts.

Some of the scenarios where  collaboration between business are  evident are listed below :

  • OEM (Automobile majors ) and their Suppliers need to collaborate
  • Hospitals and Health Care Support Systems and Insurance Providers need to collaborate
  • Governments can collaborate with Voluntary organizations

Security Considerations in Collaboration
However, when different  organizations coordinate to use and update common systems, we need a stronger security provider to authenticate the users so that the  information exchanged is not compromised in any way.

A federated business model mandates a foundation of trust. In a federated model an organization is willing to provide access to an identity that is not vetted by the organization's own internal security processes. Instead the organization is trusting an identity asserted by a third party.

Several organizations have implemented  Federated Security products and solutions to mitigate this issue.

Supporting information sharing across the largest B2B ecosystem of manufacturers worldwide, Covisint OEM & Supplier Collaboration Services offer cloud based, on-demand connectivity and communication for organizations of all sizes.  OEMs and suppliers rely on Covisint OEM & Supplier Collaboration Services to reduce the cost, complexity and risk of information and application sharing-all through an industry-proven, on-demand web environment.

Covisint's on-demand approach to identity management results in reduced complexity, automation of organizational processes, and improved policy compliance. As a hosted security service (Identity Management as a Service or IdMaaS), Covisint provides a services-based approach to federated identity management that centralizes and automates the process of exposing, accepting and monitoring digital identities across security domains.

Companies that choose to collaborate in identity-based business processes may benefit from Tivoli Federated Identity Manager's ability to help the below needs:

Rather than having to enroll third-party users into a company's internal identity systems, federated identity management enables IT service providers to offload the cost of user administration to their business partner companies.

Windows Azure and Collaboration
Windows Azure, one of the leading platforms for hosting Cloud Solutions, will provide a common platform for multiple businesses to collaborate, without worrying about the  associated costs and operational expenses of identify management.

However, when several business partners communicate over Windows Azure Cloud, it requires a stronger federated identity management support as explained below.

Windows Azure AppFabric provides a comprehensive cloud middleware platform for developing, deploying and managing applications on the Windows Azure Platform. It delivers additional developer productivity, adding in a higher-level Platform-as-a-Service (PaaS) capabilities on top of the familiar Windows Azure application model. It also enables bridging your existing applications to the cloud through secure connectivity across network and geographic boundaries, and by providing a consistent development model for both Windows Azure and Windows Server.

Federated Security In Windows Azure Appfabric  - Access Control
Three  main concepts that make up Windows Azure AppFabric:

  1. Middleware Services - pre-built services that provide valuable capabilities developers can use when developing applications. This reduces the time and complexity when building the application, and allows the developer to concentrate on the core application logic.
  2. Building Composite Applications - capabilities that enable you to assemble, deploy, and manage a composite application that is made up of several different components, as a single logical entity.
  3. Scale-out Application Infrastructure - capabilities that make it seamless to get the benefit of the cloud, such as: elastic scale, high availability, high density, multi-tenancy, etc.

The Middleware Services include five services:

  1. Service Bus - provides secure connectivity and messaging
  2. Access Control - provides identity and access control capabilities to web applications and services
  3. Caching - provides a distributed, in-memory application cache
  4. Integration - provides common integration and business user enablement capabilities
  5. Composite App - enables building applications that are made up of a composite of services, components, web services, workflows, and existing applications

The Windows Azure AppFabric Access Control (AC) service is a hosted service that provides federated authentication and rules-driven, claims-based authorization for REST Web services. REST Web services can rely on AC for simple username/password scenarios, in addition to enterprise integration scenarios that use Active Directory Federation Services (ADFS) v2.

The following diagram (courtesy from vendor) provides a conceptual view of  Windows Azure AppFabric - Access Control providing federated access to  shared applications, which will go a long way in improving collaboration.

Summary
Currently  Windows Azure Appfabric Access Control  supports the following identify providers.

  • Active Directory Federation Services
  • Widows Live ID
  • Facebook
  • Google
  • Yahoo

This support for can be extended to several other federated identified providers in the future, which will position  Windows Azure which is  a leading  cloud application platform  to  enable business  to collaborate and share in a secured way.

More Stories By Srinivasan Sundara Rajan

Highly passionate about utilizing Digital Technologies to enable next generation enterprise. Believes in enterprise transformation through the Natives (Cloud Native & Mobile Native).

CloudEXPO Stories
The precious oil is extracted from the seeds of prickly pear cactus plant. After taking out the seeds from the fruits, they are adequately dried and then cold pressed to obtain the oil. Indeed, the prickly seed oil is quite expensive. Well, that is understandable when you consider the fact that the seeds are really tiny and each seed contain only about 5% of oil in it at most, plus the seeds are usually handpicked from the fruits. This means it will take tons of these seeds to produce just one bottle of the oil for commercial purpose. But from its medical properties to its culinary importance, skin lightening, moisturizing, and protection abilities, down to its extraordinary hair care properties, prickly seed oil has got lots of excellent rewards for anyone who pays the price.
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected path for IoT innovators to scale globally, and the smartest path to cross-device synergy in an instrumented, connected world.
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
ScaleMP is presenting at CloudEXPO 2019, held June 24-26 in Santa Clara, and we’d love to see you there. At the conference, we’ll demonstrate how ScaleMP is solving one of the most vexing challenges for cloud — memory cost and limit of scale — and how our innovative vSMP MemoryONE solution provides affordable larger server memory for the private and public cloud. Please visit us at Booth No. 519 to connect with our experts and learn more about vSMP MemoryONE and how it is already serving some of the world’s largest data centers. Click here to schedule a meeting with our experts and executives.
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understanding as the environment changes.