Workshop on IT Systems: Identity and Access Management

Program Overview:

We are living in the age of the Internet of Things (IoT) which provides seamless integration and ease of access between various objects regardless of their physical proximity. The IoT is spreading across different vertical domains such as healthcare systems, government services, banks, and telecommunications, just to name a few. We are no longer only vulnerable to attacks against valuable enterprises’ digital content but also to life-threatening attacks, terrorist attacks, espionage attacks, etc. The need for providing identity assurance and stringent access control, as a result, is of utmost importance. This course covers the fundamental principles and architecture framework for an end-to-end IT identity and access management system. This includes identity assurance, authentication, authorization, accountability, auditability, Single Sign-On (SSO) and identity federation. It also discusses practical case studies such as e-passport, mobile banking, e-government services, EMV systems and other selected cases.

For Whom:

This course has been designed for IT professionals such as IT Strategic Planners, Project Managers, Security Managers, Security Architects, and Risk Managers. Although the course is technical in nature, complex concepts are discussed at an abstract level to fit the needs of participants from various technical backgrounds.

Learning Objectives:

At the end of the program, participants will be able to:

  1.  Illustrate the identity and access management architecture framework and discuss the security risks associated with its various deployment options
  2. Discuss the different mechanisms for establishing strong authentication (e.g. OTP, certificate based authentication, device authentication, etc.)
  3. Explain the principles of key public infrastructure and certification authorities, and demonstrate their value in mitigating the security risks facing modern societies
  4. Explain the most well-known access control mechanisms and the roles of oauth, OATH, SAML and OpenID standards in the IAM domain and apply the concepts of (federated) SSO
  5. Demonstrate the building of IAM using selected industrial tools and practical case studies (e.g. e-passport and boarder gate, mobile-banking, EMV scheme, and e-movement services)

Course Outline:

Day 1: Introduction and principles of information security:

Identity and access management (IAM) overview

Attributes of information security:







Symmetric and asymmetric cryptography

Hashing and digital signature

Key management

Day 2: Public Key Infrastructure (PKI)

Architecture: certification and registration authority

Life cycle management

Types of certificates and usage patterns


Digital signature

Client certificate

SSL server certificate

Attribute based certificate

Case studies (e.g. email protection, mobile banking, and document signing)

Day 3: Identification and authentication

Identification, verification and authentication overview

Mechanisms of identification and authentication

One time password


Digital signature


Soft/hard tokens

Mobile device

Day 4: Risk based authentication

Step-up authentication

Single-sign on and federated single-sign-on

OATH, OpenID, BorwserID, and SAML

Architecture framework and industrial tools

Trusted computing role in identity assurance

Security risks associated with the discussed mechanisms

Day 5: Access control

Principles of authorization

Access control schemes

OAuth protocol

Enterprise rights management and

digital rights management

Privileged account management

Governance and compliance

IAM architecture framework

IAM echo system

IAM and cloud computing

Illustrative use cases

Border control


National ID


E-health system

EMV scheme

Training Methodology

Lectures, discussions, exercises, and case studies will be used to reinforce these teaching/learning methods.