Akamai Identity Cloud is a purpose-built customer identity and access management (CIAM) platform specifically architected to meet the needs of application owners and API providers consumer identity needs. As a cloud-based SaaS offering, all interactions with Identity Cloud occur over the public internet. And as an integrated part of the larger Akamai Intelligent Edge Platform, Identity Cloud transactions benefit from many of the same services that Akamai customers do namely, Ion for application acceleration and Kona Site Defender for web security and DDoS protection.
All request/response interactions with Identity Cloud, either front channel direct from the end user or via back-channel communication from application infrastructure, are accelerated by Ion and protected by Kona.
But theres a bit more to this story, because many Identity Cloud customers are also users of these same Akamai acceleration and security services. And through the magic of DNS CNAMEs, these Akamai customers are also able to apply their instances of Ion, Kona, and even Bot Manager and Client Reputationwith their settings and their rulesto their Identity Cloud web-based transactions.
The purpose of this post is to explain the various interactions across user, application, and Identity Cloud and where exactly, architecturally speaking, customer-managed Akamai services are invoked vs. where Akamai services that are solely managed by Identity Cloud engineers are invoked.
The following diagram helps to describe these distinctions
In the rest of this post, well be breaking down this diagram in more detail.
At a high level, this diagram represents the various possible elements of an Identity Cloud setup and the interaction points between those elements. Some elements always exist, while others may or may not exist.
And finally, lots of lines. These lines represent the various ways these components might interact with each other. Because were talking about the modern-day internet, all of these lines represent HTTPS request/response transactions: the back-and-forth conversation between clients and servers, all based on the HTTP protocol, all secured via TLS. Additionally, one of the defining characteristics of modern-day HTTP is the use of DNS names (A records and CNAMEs), which you see in the boxes that straddle the lines.
As well see shortly, these DNS names are one of the keys to understanding exactly when various elements of Akamai functionality are applied. To foreshadow, keep an eye out for customer-owned domains (e.g., http://www.customer.com, accounts.customer.com) vs. shared Akamai domains (e.g., janrain.com, janraincapture.com). This will give us a major hint as to where Identity Cloud customers can apply their own configurations settings to Identity Cloud transactions.
Now well break things down in more detail. Lets start with Identity Cloud itself.
The box on the right represents the entirety of Identity Cloud the storage and application components that allow our customers to collect, store, and access end-user profile data. This is a cloud-hosted, redundant, and highly available set of services.
Notice, however, that there is only one line going to this box! This is because, as a part of the Akamai family, Identity Cloud itself takes advantage of the same robust acceleration and security Akamai edge features as many of our customers doIon and Kona. To put it simply:
All requests and responses to and from Identity Cloud pass through the Akamai edge.
This allows us to apply acceleration and security controls to all requests destined for the infrastructure of Identity Cloud. Note: These performance and security controls are shared, and are based on configuration settings managed and monitored by a team of engineers at Akamai. These controls are designed to increase the overall performance of the platform (using Ion) and to protect the platform against a broad swath of web application vulnerabilities (using Kona).
Referring to the point made above about DNS names, notice that the requests to the Akamai edge are all to janrain.com and janraincapture.com hostnamesthis is how you know the Ion and Kona configurations are shared. It is important to understand that Identity Cloud customers do not have control over the settings applied at this point.
Next, well look at how Akamai customers can control performance and security controls using their own instances of Ion, Kona, and even Bot Manager and Client Reputation.
While Identity Cloud customers are unable to control the shared performance and security settings and controls that are applied to incoming Identity Cloud requests, those customers with existing Ion, Kona, Bot Manager, and/or Client Reputation entitlements are able to use those entitlements to control and protect certain Identity Cloud workflows.
Across the top of this diagram, we see the main places where requests to Identity Cloud originate. Youll notice that each of the three boxes across the top can generate these requests.
1) Directly from the user agent
In this case, an application such as a single-page browser app or a mobile app communicates directly with Identity Cloud hostnames (e.g., *.janrain.com) without benefit of proxying through the customers own Akamai instance. As such, these requests will only benefit from the shared level of acceleration and protection discussed previously.
2) Proxied through the Akamai edge
As most Akamai customers know, Akamai edge features are enabled by way of a DNS CNAME, which allows a customer to still use hostnames associated with their own domains, yet direct that traffic to Akamai edge proxy servers. This is fundamentally how products like Ion, Kona, and Bot Manager are injected into the path of web traffic, and Identity Cloud requests are no different.
In this case, however, the customers various edge configurations are set up to use Identity Cloud as its origin, after the customers acceleration and security controls are applied.
Lets look at a more concrete example.
An Akamai customer who also uses Kona, Ion, Bot Manager, and Client Reputation wishes to move its aging and homegrown customer identity functionality over to Identity Cloud. It wishes to use the modern OIDC standard and choose Identity Clouds Hosted Login model, which provides an authentication, registration, and profile management experience that is simple to use and robust right out of the box. It creates a new hostname
accounts.customer.com
which, like its other properties, is CNAMEd to the Akamai edge
accounts.customer.com. IN CNAME accounts.akamai.com.edgekey.net
Now, when it wants its application to invoke an authentication/registration experience, itll make a standard OIDC authorize call to this new hostname
https://accounts.customer.com/{{customer_id}}/login/authorize?client_id=xxx
...which now arrives at an Akamai server. However, because this request was made using the accounts.customer.com hostname, our customer is able to apply its own configuration settings to this Identity Cloud traffic. What might it do?
Once these controls are applied, the requests are then forwarded, or proxied, to the normal Identity Cloud hostname (e.g., v1.api.us.janrain.com), which has been configured as the proxys origin server.
Note that in terms of OIDC and OAuth flows, these are still front-channel requests theyre simply proxied through the customers Akamai edge instance before being sent to the IdP.
Also, if youre paying attention, you might notice that the above request to /authorize appears to be going through two different edge server instances: the customers instance, and then the shared instance. While this is true, in practical terms these will most likely either be the same physical Akamai edge server (i.e., a localhost request), or another server in the same region.
This means there will be very little impact from a performance perspective.
3) Back-channel or machine-to-machine requests generated from customer managed infrastructure
The final place in the architecture where well see Identity Cloud requests originate is from the customers own infrastructure. These API requests are often, though not always, kicked off by a user-driven event, and involve a direct request from the back-end infrastructure to Identity Cloud.
An example of a user-driven back-channel request is the code-for-token exchange that occurs during the OAuth/OIDC authorization code grant flow. But this could also include other administrative RESTful API calls, such any profile updates that may be executed in response to, for instance, a webhook.
Notice that these requests are to Akamai identity domains, and thus are protected only by the shared Ion and Kona configurations, not customer-specific setups. That said, from a security perspective this is generally less worrying. In the case of the code-for-token exchange, for example, the back-channel requests are preceded by a front-channel request as we saw in #2 above, so customer protections can be applied upstream, earlier in the flow.
Other back-end RESTful API calls that are generated server side will simply not present the same level of risk as a user-agent generated front-channel request.
As described above, Identity Cloud is an integral part of the Akamai platform, and utilizes some of the same acceleration and security features that many of our web and media delivery customers benefit from. Identity Cloud comes out of the box with enhanced performance and security that comes from the shared Ion and Kona configurations that are in place.
In addition, Identity Cloud customers that have entitlements to Ion, Kona, Bot Manager, and Client Reputation can also layer these products in front of their own Identity Cloud request flow and customize these to their own specific needs.
*** This is a Security Bloggers Network syndicated blog from The Akamai Blog authored by Michael Schmidt. Read the original post at: http://feedproxy.google.com/~r/TheAkamaiBlog/~3/__ljgGCvUtg/the-interaction-between-identity-cloud-and-akamai-edge-services.html
See more here:
The Interaction Between Identity Cloud and Akamai Edge Services - Security Boulevard
- Setting up a Virtual Server on Ninefold - Video [Last Updated On: February 26th, 2012] [Originally Added On: February 26th, 2012]
- ScaleXtreme Automates Cloud-Based Patch Management For Virtual, Physical Servers [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- Secure Cloud Computing Software manages IT resources. [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- Dell unveils new servers, says not a PC company [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- Wyse to Launch Client Infrastructure Management Software as a Service, Enabling Simple and Secure Management of Any ... [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- As the App Culture Builds, Dell Accelerates its Shift to Services with New Line of Servers, Flash Capabilities [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- Terraria - Cloud In A Ballon - Video [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- Ethernet Alliance Interoperability Demo Showcases High-Speed Cloud Connections [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- RSA and Zscaler Teaming Up to Deliver Trusted Access for Cloud Computing [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- [NEC Report from MWC2012] NEC-Cloud-Marketplace - Video [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- IBM SmartCloud Virtualized Server Recovery - Video [Last Updated On: February 28th, 2012] [Originally Added On: February 28th, 2012]
- BeyondTrust Launches PowerBroker Servers Windows Edition [Last Updated On: February 29th, 2012] [Originally Added On: February 29th, 2012]
- Ericsson joins OpenStack cloud infrastructure community [Last Updated On: February 29th, 2012] [Originally Added On: February 29th, 2012]
- ScaleXtreme Cloud-Based Patch Management Open for New Customers [Last Updated On: March 1st, 2012] [Originally Added On: March 1st, 2012]
- RootAxcess - Getting Started - Video [Last Updated On: March 1st, 2012] [Originally Added On: March 1st, 2012]
- How to Create a Terraria Server 1.1.2 (All Links Provided) - Video [Last Updated On: March 1st, 2012] [Originally Added On: March 1st, 2012]
- Dell #1 in Hyperscale Servers (Steve Cumings) - Video [Last Updated On: March 1st, 2012] [Originally Added On: March 1st, 2012]
- Managing SAP on Power Systems with Cloud technologies delivers superior IT economics - Video [Last Updated On: March 1st, 2012] [Originally Added On: March 1st, 2012]
- AMD Acquires Cloud Server Maker SeaMicro for $334M USD [Last Updated On: March 3rd, 2012] [Originally Added On: March 3rd, 2012]
- Web Host 1&1 Provides More Flexibility with Dynamic Cloud Server [Last Updated On: March 3rd, 2012] [Originally Added On: March 3rd, 2012]
- Leap Day brings down Microsoft's Azure cloud service [Last Updated On: March 3rd, 2012] [Originally Added On: March 3rd, 2012]
- RightMobileApps White Label Program - Video [Last Updated On: March 3rd, 2012] [Originally Added On: March 3rd, 2012]
- bzst server ban #2 - Video [Last Updated On: March 3rd, 2012] [Originally Added On: March 3rd, 2012]
- “Cloud storage served from an array would cost $2 a gigabyte” [Last Updated On: March 6th, 2012] [Originally Added On: March 6th, 2012]
- More Flexibility with the 1&1 Dynamic Cloud Server [Last Updated On: March 6th, 2012] [Originally Added On: March 6th, 2012]
- Hub’s future jobs may be in cloud [Last Updated On: March 6th, 2012] [Originally Added On: March 6th, 2012]
- Cloud computing growing jobs, says Microsoft [Last Updated On: March 6th, 2012] [Originally Added On: March 6th, 2012]
- TurnKey Internet Launches WebMatrix, a New Application in Partnership with Microsoft [Last Updated On: March 6th, 2012] [Originally Added On: March 6th, 2012]
- Cebit 2012: SAP Cloud Computing Strategy - Introduction - Video [Last Updated On: March 6th, 2012] [Originally Added On: March 6th, 2012]
- Dome9 Security Launches Industry's First Free Cloud Security for Unlimited Number of Servers [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- Servers Are Refreshed With Intel's New E5 Chips [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- Samsung's AllShare Play pushes pictures from phone to cloud and TV [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- Google drops the price of Cloud Storage service [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- New Intel Server Technology: Powering the Cloud to Handle 15 Billion Connected Devices [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- Swisscom IT Services Launches Cloud Storage Services Powered by CTERA Networks [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- KineticD Releases Suite of Cloud Backup Offerings for SMBs [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- First Look: Samsung Allshare Play - Video [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- Bill The Server Guy Introduces the New Intel XEON e5-2600 (Romley) Server CPU's - Video [Last Updated On: March 7th, 2012] [Originally Added On: March 7th, 2012]
- New Cisco servers have Intel Xeon E5 inside [Last Updated On: March 8th, 2012] [Originally Added On: March 8th, 2012]
- Cisco rolls out UCS servers with Intel Xeon E5 chips [Last Updated On: March 8th, 2012] [Originally Added On: March 8th, 2012]
- From scooters to servers: The best of Launch, Day One [Last Updated On: March 8th, 2012] [Originally Added On: March 8th, 2012]
- Computer Basics: What is the Cloud? - Video [Last Updated On: March 9th, 2012] [Originally Added On: March 9th, 2012]
- Could the digital 'cloud' crash? [Last Updated On: March 10th, 2012] [Originally Added On: March 10th, 2012]
- Dome9 Security Launches Free Cloud Security For Unlimited Number Of Servers [Last Updated On: March 10th, 2012] [Originally Added On: March 10th, 2012]
- Cloud computing 'made in Germany' stirs debate at CeBIT [Last Updated On: March 11th, 2012] [Originally Added On: March 11th, 2012]
- New Key Technology Simplifies Data Encryption in the Cloud [Last Updated On: March 11th, 2012] [Originally Added On: March 11th, 2012]
- Can a private cloud drive energy efficiency in datacentres? [Last Updated On: March 12th, 2012] [Originally Added On: March 12th, 2012]
- Porticor's new key technology simplifies data encryption in the cloud [Last Updated On: March 12th, 2012] [Originally Added On: March 12th, 2012]
- Borders + Gratehouse Adds Three New Clients in Cloud Sector [Last Updated On: March 12th, 2012] [Originally Added On: March 12th, 2012]
- Dell to invest $700 mn in R&D, unveils 12G servers [Last Updated On: March 13th, 2012] [Originally Added On: March 13th, 2012]
- Defiant Kaleidescape To Keep Shipping Movie Servers [Last Updated On: March 13th, 2012] [Originally Added On: March 13th, 2012]
- Data Centre Transformation Master Class 3: Cloud Architecture - Video [Last Updated On: March 13th, 2012] [Originally Added On: March 13th, 2012]
- DotNetNuke Tutorial - Great hosting tool - PowerDNN Control Suite - part 1/3 - Video #310 - Video [Last Updated On: March 13th, 2012] [Originally Added On: March 13th, 2012]
- Cloud Computing - 28/02/12 - Video [Last Updated On: March 13th, 2012] [Originally Added On: March 13th, 2012]
- SYS-CON.tv @ 9th Cloud Expo | Nand Mulchandani, CEO and Co-Founder of ScaleXtreme - Video [Last Updated On: March 13th, 2012] [Originally Added On: March 13th, 2012]
- Oni Launches New Cloud Services for Enterprises Using CA Technologies Cloud Platform [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- SmartStyle Advanced Technology - Video [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- SmartStyle Infrastructure - Video [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- The Hidden Risk of a Meltdown in the Cloud [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- FireHost Launches Secure Cloud Data Center in Phoenix, Arizona [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- Panda Security Launches New Channel Partner Recruitment Campaign: "Security to the Power of the Cloud" [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- NetSTAR, Inc. Announces Safe and Secure Web Browsers for iPhones, iPads, and Android Devices [Last Updated On: March 14th, 2012] [Originally Added On: March 14th, 2012]
- Amazon Cloud Powered by 'Almost 500,000 Servers' [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- NetSTAR Announces Secure Web Browsers For iPhones, iPads, And Android Devices [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- Be Prepared For When the Cloud Really Fails [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- Dr. Cloud explains dinCloud's hosted virtual server solution - Video [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- New estimate pegs Amazon's cloud at nearly half a million servers [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- Amazon’s Web Services Uses 450K Servers [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- Saving File On Internet - Cloud Computing - Video [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- DotNetNuke Tutorial - Great hosting tool - PowerDNN Control Suite - part 2/3 - Video #311 - Video [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- Linux servers keep growing, Windows & Unix keep shrinking [Last Updated On: March 15th, 2012] [Originally Added On: March 15th, 2012]
- Cloud Desktop from Compute Blocks - Video [Last Updated On: March 16th, 2012] [Originally Added On: March 16th, 2012]
- Amazon EC2 cloud is made up of almost half-a-million Linux servers [Last Updated On: March 17th, 2012] [Originally Added On: March 17th, 2012]
- HP trots out new line of “self-sufficient” servers [Last Updated On: March 17th, 2012] [Originally Added On: March 17th, 2012]
- Cloud Web Hosting Reviews - Australian Cloud Hosting Providers - Video [Last Updated On: March 17th, 2012] [Originally Added On: March 17th, 2012]
- Using Porticor to protect data in a snapshot scenario in AWS - Video [Last Updated On: March 17th, 2012] [Originally Added On: March 17th, 2012]
- CDW - Charles Barkley - New Office - Video [Last Updated On: March 17th, 2012] [Originally Added On: March 17th, 2012]
- Nearly a Half Million Servers May Power Amazon Cloud [Last Updated On: March 17th, 2012] [Originally Added On: March 17th, 2012]
- Morphlabs CEO Winston Damarillo talks about their mCloud Rack - Video [Last Updated On: March 20th, 2012] [Originally Added On: March 20th, 2012]
- AMD reaches for the cloud with new server chips [Last Updated On: March 20th, 2012] [Originally Added On: March 20th, 2012]