filmeu

Class Identity Management Systems

  • Presentation

    Presentation

    In order to access services in the web, which are essential component of the cloud computing paradigm, it must be assured that access to information is performed securely by authenticated entities that have authorization for the operations requested. This need is common to institutional environments and individual users, and explains why identity management, which is present in most of large enterprise infrastructures, has evolved to the concept of user centric identity management. This Curricular Unit addresses the recent evolutions of identity management platforms, detailing the main aspects of security that they guarantee and the technological paradigms on which they are based. It is therefore inserted as a relevant area in a cycle of studies, which is at the convergence between the engineering of applications and the information systems that support them.
  • Code

    Code

    ULHT457-1-13322
  • Syllabus

    Syllabus

    Introduction Needs, objectives and evolution Identification and Authentication: authentication factors, security contexts Authentication & Authorization Infrastructures Identity Management (IdM) Models Evolution of Identity Management models Authorization and Access Control: Policies, models and mechanisms Local, networked, federal and decentralized models Trust Models Trusted Third Party Centralized Trust: PKI Federative Model: IdP / SP Decentralized Model: Trust over IP (ToIP) Technologies for Trust Propagation XML Security: XML encryption, XML Signature SAML: Profiles, Bindings, Assertions JSON Web Tokens (JWT): format, extensions and usage Decentralized Identifiers (DIDs) Verifiable Credentials (VCs) IdM Models and Platforms Shibboleth: federative institutional model OAuth2, OpenID: user centric web model DID, Dock, Sovrin: decentralized and self-sovereign model
  • Objectives

    Objectives

    The purpose of this course is to present the principles for establishing trust relationships between applications in distributed and potentially unsafe environments, leading to an important modification of Identity Management technologies, in order to allow federative, distributed and decentralized aggregations of user attributes and access policies. At the end of this course, students should: Identify the various components of an Identity Management System Understand the security technologies on which Authentication and Authorization infrastructure rely Identify ways to propagate trust among the various stakeholders of a access transaction Understand the principles of decentralized identity management and be familiar with its the current implementations Use the concepts acquired in the course in their professional or academic activities, implementing or participating in R&D projects in the area of Identity Management in distributed computing environments.
  • Teaching methodologies and assessment

    Teaching methodologies and assessment

    In this course, specific and controlled assistance from Artificial Intelligence applications will be allowed, for suggestion and validation of source code. In particular, the use of Github Copilot will be encouraged, since it is already available in many Integrated Development Environments (IDEs). In assessments, the teacher will always certify that the students have actually implemented and understood their programs.
  • References

    References

    Windley, Ph., "Learning Digital Identity: Design, Deploy, and Manage Identity Architectures", 2023, Ed. O'Reilly, ISBN 1098117696 Preukschat, A. Reed, D., "Self-Sovereign Identity: Decentralized digital identity and verifiable credentials", Iª Edição, Ed. Manning, 2021, ISBN 9781617296598  
SINGLE REGISTRATION
Lisboa 2020 Portugal 2020 Small financiado eu 2024 prr 2024 republica portuguesa 2024 Logo UE Financed Provedor do Estudante Livro de reclamaões Elogios