SYS-CON MEDIA Authors: Liz McMillan, Carmen Gonzalez, Zakia Bouachraoui, Roger Strukhoff, David Linthicum

Blog Feed Post

Providing fine grained access to SalesForce and Google Apps

Companies that move to Cloud Providers like Salesforce and Google apps quickly discover that part of the migration involves revisiting their security model. Authentication, authorization, account management, and federation are on the menu of activities for most organizations as they strive to garner the cost savings and distribution of the Cloud and retain some level of control of users and assets.

Cloud consumers can insulate their implementations from the vagaries of proprietary identity implementations through using standards. In most cases, SAML represents a logical starting point for conveying identity information from the Cloud Consumer to the Cloud Provider. SAML is a well adopted industry standard that is available in many commercial and open source implementations. SAML is referenced by many industry groups such as the Cloud Security Alliance.

SAML’s architecture lends itself to Cloud scenarios, because the Cloud Consumer (enterprise) and Cloud Provider fit naturally into the core SAML roles. The primary roles in a SAML architecture are the Identity Provider (IdP) who asserts information about a user, and Relying Party (RP), who acts on the information for the service provider, such as the Cloud Provider. Because SAML was designed with this separation of roles in mind, it maps cleanly onto Cloud Deployment models.

Cloud consumers get three main benefits from this architecture:

‘ Cloud consumers retain management and provisioningof user accounts, providing the Cloud applications with the freshest and most accurate data on users

‘ Applications are built using peer reviewed access control protocols instead of home grown or proprietary access controls

‘ Cloud consumers implement a standards-based identity interface which simplifies integration to other vendors

Both Google and Salesforce support SAML to communicate identity information from the Cloud Consumer to the Cloud Provider, so the Cloud Consumer can leverage their existing on-premise enterprise directory and SAML IDentity Provider to serve identity information to two different Cloud providers.

Access Control Model SAML provides a standards-based means to get identity information to the Cloud provider in a reliable way, but the Cloud applications’ business logic and data will determine what the proper access control and authorization rules should be.

The basic algebra of authorization is pretty straightforward: authorization rules govern the interaction between a subject (such as a user), and an object (such as web service or database), based on the action requested, in a certain context (sometimes called scope). These four primitives – Subject, Object, Action, and Context – are evaluated against conditions and chains of responsibilities.

Where the difficult decisions lie for the security architect is to identify the level of granularity to apply the authorization rules. To simply grant or deny access to anyone in the enterprise directory to access the Cloud Provider is very likely too coarsely grained. In most cases authorization rules are more context specific. This means that SAML and other identity standards perform the crucial function of moving the identity data to the authorization logic, but the application must still assemble the request, and map the request against the target’s authorization rules. Many applications use Role Based Access Control (RBAC) for this mapping, and SAML and identity providers do not replace this.

Integration Concerns The two basic roles Identity Provider and Relying Party use SAML to communicate, so their conversation is supported via that standard. There are two areas that require additional work for an integrated solution. Note for an extended demo of these concepts in practice, please see Cloud Access 360 demo

The Identity Provider issues the SAML assertion based on the session and use profile in the enterprise directory. The Relying Party validates the SAML assertion and initiates a session on the Cloud Provider application. This means that integration work is required to ensure the Identity Provider is integrated to the enterprise directory; and the Relying Party is integrated to the Cloud Provider. In the latter case, Cloud Providers like Google and have done the integration work to ensure that their applications are integrated, but this still leaves Cloud consumers with an integration effort towards ensuring that the Identity Provider can communicate with the Enterprise directory.

The next Integration concern is to get the proper information to the Relying Party to make its authorization decision. This is likely to be application-specific, but one thing is for sure, simply being logged on to the Cloud Consumer’s enterprise directory is likely to be insufficient to access Cloud Provider applications, so the SAML assertion must be enriched with additional information from the enterprise directory such as Group, Role and other attributes.

To accomplish this, the Identity Provider and Relying Party must agree upon a schema for communicating the attributes needed to make the authorization decision. In some cases, the Cloud Provider can act simply on the Group and Role information, however increasingly authorization is more subtle and specific, and additional attributes are needed to convey permissions such as allowable Create, Read, Update and Delete on objects.

Once the mapping of the Group, Role and/or attributes in the enterprise directory to the Cloud Provider permissions is completed, these must be exchanged and typically issued in a way that supports Single Sign On. One way to accomplish this in is to exchange the grant_type Assertion via SAML for the access token. The next step is to ensure the mapping extends to the permission grants, these typically include permissions such as Manage Billing, Manage Call Centers, Manage Users, Transfer Record, and Weekly Export Data. What the Cloud Consumer gains in this case is to retain the user management on premises via the enterprise directory and gain the capabilities of the Salesforce Cloud.


In the case of Google Apps, there are a variety of token types supported, the SAML token is likely to be exchanged for an oauth token. The oauth token uses the consumer key to convey the authorized users’ information to the Google Cloud Provider. The token maps to the Google permission model, for example to show if a given user is able to Read a Calendar, Update a Calendar, or Read Calendar details.


The combination of SAML roles such as Identity provider and Relying party provide the separation of duties that works well in Cloud Environments. The Cloud Consumers retain user management and convey this information to the Cloud Provider via interoperable, open standards. There are two areas of integration in the Identity provider and Relying party which require integration to the enterprise directory and Cloud Provider respectively.

Companies must also integrate the Roles, Group and attribute information from their user accounts in the enterprise directory to the Cloud Provider access models. This requires some additional review of business processes and use cases to complete, but the end result allows the Cloud consumer a level of user control that drives the authorization decisions made in the Cloud

Gunnar Peterson is a Managing Principal at Arctec Group. He is focused on distributed systems security for large mission critical financial, financial exchanges, healthcare, manufacturer, and federal/Gov systems, as well as emerging start ups. Mr. Peterson is an internationally recognized software security expert, frequently published, an Associate Editor for IEEE Security & Privacy Journal on Building Security In, an Associate Editor for Information Security Bulletin, a contributor to the SEI and DHS Build Security In portal on software security, and an in-demand speaker at security conferences. He blogs at

Read the original blog entry...

More Stories By Cloud Access Security

This blog has some of our best blog posts about how Intel is enabling trusted client to cloud access.

Latest Stories
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
ScaleMP is presenting at CloudEXPO 2019, held June 24-26 in Santa Clara, and we’d love to see you there. At the conference, we’ll demonstrate how ScaleMP is solving one of the most vexing challenges for cloud — memory cost and limit of scale — and how our innovative vSMP MemoryONE solution provides affordable larger server memory for the private and public cloud. Please visit us at Booth No. 519 to connect with our experts and learn more about vSMP MemoryONE and how it is already serving some of...
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the mod...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
Platform9, the leader in SaaS-managed hybrid cloud, has announced it will present five sessions at four upcoming industry conferences in June: BCS in London, DevOpsCon in Berlin, HPE Discover and Cloud Computing Expo 2019.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
When you're operating multiple services in production, building out forensics tools such as monitoring and observability becomes essential. Unfortunately, it is a real challenge balancing priorities between building new features and tools to help pinpoint root causes. Linkerd provides many of the tools you need to tame the chaos of operating microservices in a cloud native world. Because Linkerd is a transparent proxy that runs alongside your application, there are no code changes required. I...
In his general session at 21st Cloud Expo, Greg Dumas, Calligo’s Vice President and G.M. of US operations, discussed the new Global Data Protection Regulation and how Calligo can help business stay compliant in digitally globalized world. Greg Dumas is Calligo's Vice President and G.M. of US operations. Calligo is an established service provider that provides an innovative platform for trusted cloud solutions. Calligo’s customers are typically most concerned about GDPR compliance, application p...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
"NetApp's vision is how we help organizations manage data - delivering the right data in the right place, in the right time, to the people who need it, and doing it agnostic to what the platform is," explained Josh Atwell, Developer Advocate for NetApp, in this interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Druva is the global leader in Cloud Data Protection and Management, delivering the industry's first data management-as-a-service solution that aggregates data from endpoints, servers and cloud applications and leverages the public cloud to offer a single pane of glass to enable data protection, governance and intelligence-dramatically increasing the availability and visibility of business critical information, while reducing the risk, cost and complexity of managing and protecting it. Druva's...
Kubernetes as a Container Platform is becoming a de facto for every enterprise. In my interactions with enterprises adopting container platform, I come across common questions: - How does application security work on this platform? What all do I need to secure? - How do I implement security in pipelines? - What about vulnerabilities discovered at a later point in time? - What are newer technologies like Istio Service Mesh bring to table?In this session, I will be addressing these commonly asked ...
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.