Skip to main content

Reference Service Model for Federated Identity Management

  • Conference paper
  • First Online:
Enterprise, Business-Process and Information Systems Modeling (BPMDS 2021, EMMSAD 2021)

Abstract

With the pandemic of COVID-19, people around the world increasingly work from home. Each natural person typically has several digital identities with different associated information. During the last years, various identity and access management approaches have gained attraction, helping for example to access other organizations’ services within trust boundaries. The resulting heterogeneity creates a high complexity to differentiate between these approaches and scenarios as participating entity; combining them is even harder. Last but not least, various actors have a different understanding or perspective of the terms, like “service”, in this context. Our paper describes a reference service with standard components in generic federated identity management. This is utilized with modern Enterprise Architecture using the framework ArchiMate. The proposed universal federated identity management service model (FIMSM) is applied to describe various federated identity management scenarios in a generic service-oriented way. The presented reference design is approved in multiple aspects and is easily applicable in numerous scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Al Hadidi, F., Baghdadi, Y.: Ontology for enterprise interactions: extended and virtual enterprises. In: Baghdadi, Y., Harfouche, A. (eds.) ICT for a Better Life and a Better World. LNISO, vol. 30, pp. 365–379. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-10737-6_24

    Chapter  Google Scholar 

  2. Amaral, G., Sales, T.P., Guizzardi, G., Almeida, J.P.A., Porello, D.: Modeling trust in enterprise architecture: a pattern language for archimate. In: Grabis, J., Bork, D. (eds.) PoEM 2020. LNBIP, vol. 400, pp. 73–89. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-63479-7_6

    Chapter  Google Scholar 

  3. Azevedo, C.L., et al.: Modeling resources and capabilities in enterprise architecture: a well-founded ontology-based proposal for ArchiMate. Inf. Syst. 54, 235–262 (2015)

    Article  Google Scholar 

  4. Buschmann, F., et al.: Pattern-Oriented Software Architecture: On Patterns and Pattern Languages, vol. 5. Wiley, Hoboken (2007)

    Google Scholar 

  5. Dabrowski, M., Pacyna, P.: Modular reference framework architecture for identity management. In: IEEE International Conference on Communication Systems, Guangzhou, China, pp. 743–749 (2008)

    Google Scholar 

  6. Dhamija, R., Dusseault, L.: The seven flaws of identity management. IEEE Secur. Priv. 6(2), 24–29 (2008)

    Article  Google Scholar 

  7. Friebe, S., et al., DecentID: decentralized and privacy-preserving identity storage system using smart contracts. In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ International Conference on Big Data Science and Engineering, New York, USA, pp. 37–42 (2018)

    Google Scholar 

  8. Griffo, C., et al.: From an ontology of service contracts to contract modeling in enterprise architecture. In: IEEE 21st International Enterprise Distributed Object Computing Conference, Quebec, Canada, pp. 40–49 (2017)

    Google Scholar 

  9. Heiland, E. et al.: Enterprise architecture model transformation engine. In: International Conference on Operations Research and Enterprise Systems, Online, pp. 137–144 (2021)

    Google Scholar 

  10. Katsikogiannis, G., et al.: An identity and access management approach for SOA. In: IEEE International Symposium on Signal Processing and Information Technology, Limassol, Cyprus, pp. 126–131 (2016)

    Google Scholar 

  11. Lord, N.: Uncovering Password Habits: Are Users’ Password Security Habits Improving? Digital Guardian (2020). https://digitalguardian.com/blog/uncovering-password-habits-are-users-password-security-habits-improving-infographic. Accessed 22 May 2021

  12. Oberhaus, R.: Rethinking enterprise architecture frameworks for the digital age. Int. J. Adv. Softw. 12(1 & 2), 125–151 (2019)

    Google Scholar 

  13. Cao, Y., Yang, L.: A survey of Identity Management technology. In: IEEE International Conference on Information Theory and Information Security, Beijing, China, pp. 287–293 (2010)

    Google Scholar 

  14. Perroud, T., Inversini, R.: Enterprise Architecture Patterns. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37561-3

    Book  Google Scholar 

  15. Pöhn, D., Hommel, W.: Management architecture for dynamic federated identity management. In: CS & IT Conference Proceedings, vol. 6, no. 6, pp. 211–226 (2016)

    Google Scholar 

  16. Pöhn, D., Hommel, W.: An overview of limitations and approaches in identity management. In: International Conference on Availability, Reliability and Security. Association for Computing Machinery, New York, USA, Article 90, pp. 1–10 (2020)

    Google Scholar 

  17. Petrovska, J., et al.: SOA approach - identity and access management for the risk management platform. In: Mediterranean Conference on Embedded Computing, Budva, Montenegro, pp. 1–4 (2019)

    Google Scholar 

  18. Schoonderbeek, J.: Modelling Identity in Enterprise Architecture, ArchiMate (2018). https://www.archimatetool.com/blog/2018/12/07/long-read-modelling-identity-in-enterprise-architecture-archimate/. Accessed 22 May 2021

  19. The Open Group: ArchiMate 3.1 Specification (2017). https://pubs.opengroup.org/architecture/archimate3-doc/. Accessed 22 May 2021

  20. Toth, K.C., Anderson-Priddy, A.: Self-sovereign digital identity: a paradigm shift for identity. IEEE Secur. Priv. 17(3), 17–27 (2019)

    Article  Google Scholar 

  21. Yang, Y., et al.: An identity and access management architecture in cloud. In: Seventh International Symposium on Computational Intelligence and Design, Hangzhou, China, pp. 200–203 (2014)

    Google Scholar 

  22. Zwattendorfer, B., et al.: An overview of cloud identity management-models. In: International Conference on Web Information Systems and Technologies, vol. 1, pp. 82–92 (2014)

    Google Scholar 

  23. Cioroaica, E., et al.: Reference architecture for trust-based digital ecosystems. In: IEEE International Conference on Software Architecture Companion, Salvador, Brazil, pp. 266–273 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Daniela Pöhn or Peter Hillmann .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pöhn, D., Hillmann, P. (2021). Reference Service Model for Federated Identity Management. In: Augusto, A., Gill, A., Nurcan, S., Reinhartz-Berger, I., Schmidt, R., Zdravkovic, J. (eds) Enterprise, Business-Process and Information Systems Modeling. BPMDS EMMSAD 2021 2021. Lecture Notes in Business Information Processing, vol 421. Springer, Cham. https://doi.org/10.1007/978-3-030-79186-5_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-79186-5_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-79185-8

  • Online ISBN: 978-3-030-79186-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics