wilma - lesson 1 - introduction
TRANSCRIPT
![Page 1: Wilma - Lesson 1 - Introduction](https://reader036.vdocuments.us/reader036/viewer/2022082509/5871e61c1a28ab6a7b8b7057/html5/thumbnails/1.jpg)
PEP Proxy - Wilma GELesson 1 - Introduction
Álvaro Alonso. UPM – DITSecurity Chapter. [email protected], @larsonalonso
![Page 2: Wilma - Lesson 1 - Introduction](https://reader036.vdocuments.us/reader036/viewer/2022082509/5871e61c1a28ab6a7b8b7057/html5/thumbnails/2.jpg)
Contents
1. Why to use Wilma GE2. Security levels3. Related GEs4. Course lessons5. Documentation
![Page 3: Wilma - Lesson 1 - Introduction](https://reader036.vdocuments.us/reader036/viewer/2022082509/5871e61c1a28ab6a7b8b7057/html5/thumbnails/3.jpg)
Why to use Wilma GE
Public Backend ServiceREST API
REST Client Other services
HTTP request
Web App
User 1 User 2
![Page 4: Wilma - Lesson 1 - Introduction](https://reader036.vdocuments.us/reader036/viewer/2022082509/5871e61c1a28ab6a7b8b7057/html5/thumbnails/4.jpg)
Why to use Wilma GE
Backend ServiceREST API
REST Client Other services
HTTP request + TOKEN
Web App
Wilma
User 1 User 2
![Page 5: Wilma - Lesson 1 - Introduction](https://reader036.vdocuments.us/reader036/viewer/2022082509/5871e61c1a28ab6a7b8b7057/html5/thumbnails/5.jpg)
Security levels
• Level 1: Authentication– Check if a user is a registered user
• Level 2: Basic Authorization– Check if a user has permissions to access a resource– HTTP verb + resource path
• Level 3: Advanced Authorization– Check if a user has permissions to access a resource– Custom XACML policies
![Page 6: Wilma - Lesson 1 - Introduction](https://reader036.vdocuments.us/reader036/viewer/2022082509/5871e61c1a28ab6a7b8b7057/html5/thumbnails/6.jpg)
Related GEs• Identity Management – Keyrock
– To retrieve the tokens that represent a user– To check authentication
• Needed knowledge– How to register an application– How to manage roles and permissions– How to create an OAuth2 token– How to manage organizations
• Course available– https://edu.fiware.org/course/view.php?id= 79
![Page 7: Wilma - Lesson 1 - Introduction](https://reader036.vdocuments.us/reader036/viewer/2022082509/5871e61c1a28ab6a7b8b7057/html5/thumbnails/7.jpg)
Related GEs
• Authorization PDP – AuthZForce– Policy Decision Point– Policy Administration Point– To check authorization
• Needed knowledge– XACML concepts
• Course available– https://edu.fiware.org/course/view.php?id=57
![Page 8: Wilma - Lesson 1 - Introduction](https://reader036.vdocuments.us/reader036/viewer/2022082509/5871e61c1a28ab6a7b8b7057/html5/thumbnails/8.jpg)
Course lessons
• Contents• Main concepts• Guidelines• Live tutorial• Documentation
![Page 9: Wilma - Lesson 1 - Introduction](https://reader036.vdocuments.us/reader036/viewer/2022082509/5871e61c1a28ab6a7b8b7057/html5/thumbnails/9.jpg)
Documentation
• Wilma GE– http://catalogue.fiware.org/enablers/pep-proxy-wilma
• Source code– https://github.com/ging/fiware-pep-proxy
• Documentation– http://fiware-pep-proxy.readthedocs.org
• Keyrock GE– http://catalogue.fiware.org/enablers/identity-manageme
nt-keyrock
• AuthZForce GE– http://catalogue.fiware.org/enablers/authorization-pdp-
authzforce
![Page 10: Wilma - Lesson 1 - Introduction](https://reader036.vdocuments.us/reader036/viewer/2022082509/5871e61c1a28ab6a7b8b7057/html5/thumbnails/10.jpg)
PEP Proxy - Wilma GELesson 1 - Introduction
Álvaro Alonso. UPM – DITSecurity Chapter. [email protected], @larsonalonso