【Lightweight Identity Management System 轻量级用户体系设计方案】
2022/1/4 23:04:09
本文主要是介绍【Lightweight Identity Management System 轻量级用户体系设计方案】,对大家解决编程问题具有一定的参考价值,需要的程序猿们随着小编来一起学习吧!
Lightweight Identity Management System 轻量级用户体系设计方案
- LIMS Design Notebook
- 【Section 1】Application ARCHITECTURE
- LEVEL 1: Monolithic Architecture
- LEVEL 2: Vertical Architecture
- LEVEL 3: SOA Architecture
- LEVEL 4: Microservice Architecture (MSA)
- Architecture Consistency
- 【Section 2】QUICK START
- FUNCTIONALITY
- 【Section 3】SSO MANAGEMENT
- Enable / Disable SSO
- Create Resource Directory
- Modify Resource Directory
- Associate SSO with Authorization
- 【Section 4】USER MANAGEMENT
- 1. Basic Support
- 2. Sign In Settings
- 3. 2FA/MFA Management
- 【Section 5】ORGANIZATION MANAGEMENT
- 1. Basic Support
- 【Section 6】EXTERNAL IDENTITY MANAGEMENT
- 1. SCIM (System for Cross-Domain Identity Management) Synchronization
- 2. SSO (Single-Sign-On)
- 【Section 7】ACCESS CONTROL
- 1. Overview
- 2. Create
- 3. Modity
- 4. Authorization Management
- 5. Client Access Types
- 【Section 8】AUTHORIZATION MANAGEMENT
- 1. Manage Multi-Account Authorization
- 2. Resource Account Authorization
- 3. Deployment of Access Configurations
- 【Section 9】SIGN IN MANAGEMENT
- 1. Sign In from The Portal, and Access Resources
- 2. Sign In by CLI, and Access Resources
- 【Section 10】BEST PRACTICES
- 1. API Calling
- 2. Common Parameters
- 3. Service Management
- 【Section 11】SSO References
- Popular B/S-Architecture SSO Protocols
- 1. CAS 3.0
- 2. OAuth 2.0
- 3. OIDC (OpenID Connect) 1.0
- 4. SAML 2.0
LIMS Design Notebook
【Section 1】Application ARCHITECTURE
LEVEL 1: Monolithic Architecture
- Codes are developed and maintained within a single application.
LEVEL 2: Vertical Architecture
- Tiered application. Mostly use the MVC mode (a 3-tier simple architecture mode).
- Key Words: Veritically Tiered, Load Balancing.
LEVEL 3: SOA Architecture
- Build the cloud computing ecology for an enterprise. Services are provided to the other components by distributed and reusable application components.
- Service behaviors are predictable.
- Services are defined by platform-neutral interface contract.
- Key Words: RPC, Frontend and Backend Split, Caching, Middleware, Full-Text-Search.
LEVEL 4: Microservice Architecture (MSA)
- System consists of a group of microservices in separate processes. Communication between microservices uses HTTP resource APIs (lightweight).
- Key Words: Split Business and Database, Service Governance and Monitoring, Distributed Caching.
Architecture Consistency
- Meet requirements in Open-Source, Internal Ecology, Business scenarios.
【Section 2】QUICK START
FUNCTIONALITY
- USER & GROUP MANAGEMENT
- SIGN IN & SIGN ON
- ACCESS CONTROL
- AUTHORIZATION
- ACCESS MANAGEMENT
【Section 3】SSO MANAGEMENT
Enable / Disable SSO
Create Resource Directory
Modify Resource Directory
Associate SSO with Authorization
【Section 4】USER MANAGEMENT
1. Basic Support
- Create
- Show
- Modify
- Enable / Disable
2. Sign In Settings
- Only ONE of the following options is available at the same time.
- Username / Password
- SSO
3. 2FA/MFA Management
- Enable / Disable
- Delete 2FA/MFA Device
【Section 5】ORGANIZATION MANAGEMENT
1. Basic Support
- Create
- Show
- Modify
- Add / Remove User(s)
【Section 6】EXTERNAL IDENTITY MANAGEMENT
1. SCIM (System for Cross-Domain Identity Management) Synchronization
- Goal: Standard Multi-Tentant Cloud Application / Service Identity Management
- Requirement: To synchronize users / groups from the enterprise IdP.
- Steps
- Create SCIM key; Enable SCIM Synchronization from the console.
- Add / Remove User(s) / Group(s) to / from the application.
- Set up the Enterprise IdP Synchronization in the application.
- Verification: Sign in the system console. View the list of users / groups that has the successful synchronization (source is marked as ‘SCIM Synchronization’).
- Keys Management
- Each account has at most a limit number of SCIM keys.
- Operations: Create, Enable / Disable, Delete.
- Enable / Disable SCIM Synchronization
- SCIM 2.0 Object Model
- All objects MUST be inherited from the Resource.
- Official Models: Resource, User, Group, Enterpriseuser
- Scenarios
- Identity Migration from one Cloud Provider to the other
- apply SCIM on all stakeholders, i.e., User and Cloud Provider(s)
- SSO between trusted applications running in different Cloud Providers
- Identity Management: SaaS for a Global Commity
- Identity Settings
- Dispatch Info
- User Attributes Transferred between Trusted Websites based on Authorization Protocol (OAuth, SAML, etc)
- Change Notifications to Website, Requests for change(s) update (caches) issued at desired time to Directory
- Identity Migration from one Cloud Provider to the other
- Features: Interactive, Secure, Scalable; Easy, Cost-Efficient.
2. SSO (Single-Sign-On)
- Workflow
- In the view of the IdP: Set up the system as the trusted SAML SP.
- In the view of the system: Set up the IdP as the trusted SAML IdP.
- Enable SCIM Synchronization.
- Big volume of data: synchronoize to the system.
- General volume of data: Register from the system.
- Enterprise IdP user SSO.
【Section 7】ACCESS CONTROL
1. Overview
2. Create
3. Modity
4. Authorization Management
- Goals: abstract, plug-in, compatible.
- Internal Systems: RBAC
- Define the account authorization record by a set of roles.
- Formula: Account + Role + Permission
- External Systems: ABAC
- Define the account authorization record by a set of policies.
- Formula: Account + Policy + Rule
- Note: The more fine the authorization granularity is, the bigger the data volume is.
5. Client Access Types
- Confidential
- Design for Server-Side Application
- Sign in by Browser
- Retrieve Access Token by keys
- Scenario: Web Application rendered by server
- Public
- Design for Client-Side Application
- Sign in by Browser
- Scenario: Frontend Web Application
- Token
- Design for Server-Side Application
- Scenario: RESTful API
【Section 8】AUTHORIZATION MANAGEMENT
1. Manage Multi-Account Authorization
2. Resource Account Authorization
3. Deployment of Access Configurations
【Section 9】SIGN IN MANAGEMENT
1. Sign In from The Portal, and Access Resources
2. Sign In by CLI, and Access Resources
【Section 10】BEST PRACTICES
1. API Calling
2. Common Parameters
3. Service Management
【Section 11】SSO References
Popular B/S-Architecture SSO Protocols
1. CAS 3.0
- Goal: Authentication
- Response Type: Ticket
2. OAuth 2.0
- Goal: Authorization
- Response Type: Access Token, Refresh Token
- Pros: Easy to apply; Community support.
- Cons: Different implements that need customized development; ONLY Authorization.
3. OIDC (OpenID Connect) 1.0
- Goal: Authorization + Authentication
- Response Type: ID Token, Access Token, Refresh Token
- Pros: Easy to apply; Community support; Authorization + Authentication; Support mobile application and SPA application.
- Cons: Calls from Client to OpenID Provider may fail due to network failure.
4. SAML 2.0
- Goal: Authentication
- Response Type: XML Assertion
- Pros: Complete support for various SSO scenarios.
- Cons: Heavy to apply (too many optional details); Technical complexity for signature and encryption based on XML.
这篇关于【Lightweight Identity Management System 轻量级用户体系设计方案】的文章就介绍到这儿,希望我们推荐的文章对大家有所帮助,也希望大家多多支持为之网!
- 2024-11-23Springboot应用的多环境打包入门
- 2024-11-23Springboot应用的生产发布入门教程
- 2024-11-23Python编程入门指南
- 2024-11-23Java创业入门:从零开始的编程之旅
- 2024-11-23Java创业入门:新手必读的Java编程与创业指南
- 2024-11-23Java对接阿里云智能语音服务入门详解
- 2024-11-23Java对接阿里云智能语音服务入门教程
- 2024-11-23JAVA对接阿里云智能语音服务入门教程
- 2024-11-23Java副业入门:初学者的简单教程
- 2024-11-23JAVA副业入门:初学者的实战指南