Академический Документы
Профессиональный Документы
Культура Документы
Executive Overview
The reference architecture As part of our cloud computing strategy, Intel IT has been opportunistically taking
provides a proven template advantage of external offerings of software as a service (SaaS) applications. To
solution that Intel SaaS project prepare for broader SaaS adoption, we designed a SaaS architecture that will
enable us to shift to a more strategic view and facilitate faster, more standardized
teams can immediately apply to
implementations.
specific implementation projects.
To create our architecture, we analyzed • A reference architecture providing a proven
SaaS industry trends and scanned existing template solution that Intel SaaS project
Intel SaaS implementations to gather best- teams can immediately apply to specific
known methods and architectural techniques. implementation projects.
We then extended existing enterprise The SaaS architecture promotes standardization
application frameworks and architecture to and best practices. It defines the components
create the elements that comprise the SaaS and capabilities required for deployment and
architecture, including: a vocabulary for consistent communication
Catherine Spence
• A use-case model based on a typical with SaaS providers. Our goal is to facilitate
Enterprise Architect, Intel IT
scenario that requires back-end data a shift from organic growth to prescriptive
exchange between Intel and the deployment of SaaS applications at Intel, with
Jason Devoys
SaaS provider. greater consistency among implementations
Enterprise Architect, Intel IT
and reduced implementation effort.
• A conceptual architecture that provides
Sudip Chahal a long-term view of all the components
Principal Engineer, Intel IT required in a complete SaaS implementation.
IT@Intel White Paper Architecting Software as a Service for the Enterprise
2 www.intel.com/IT
Architecting Software as a Service for the Enterprise IT@Intel White Paper
SAAS ARCHITECTURE Intel SaaS project teams can immediately INTEL SAAS DEPLOYMENTS
apply to specific implementation projects. Over time, Intel has experimented with or
Our goal was to provide a proven
deployed a variety of SaaS applications,
template solution that comprehends the
Environmental Scan including four of the five most widely used
unique requirements of SaaS, defines the
The environmental scan incorporated two SaaS categories: customer relationship
components and capabilities required for
activities. First, we examined industry trends. management (CRM), human resources
deployment, and promotes consistent
Second, we surveyed representative Intel management systems, collaboration, and
communication with external solution
SaaS deployments to gather architectural business expenses.
providers.
techniques and best-known methods.
We surveyed 14 SaaS solutions that had
We began by conducting an environmental been used at Intel. Of these, 11 were in
INDUSTRY TRENDS
scan of industry trends and existing production use: these included expense and
Intel SaaS solution architecture. We then Our examination of industry trends painted a
time-card tools, online learning, hiring tools,
developed a series of architectural elements. positive picture of SaaS, with a rich application
and health benefits. Table 1 summarizes the
These included a use-case model and a pipeline. Though the market is still relatively
characteristics of these applications.
conceptual architecture that represent a small, it is expected to grow up to 40 percent
annually; as a result, some analysts expect Key findings of our survey included:
long-term vision of the key capabilities
required in a complete SaaS offering. that one quarter of all business software Uses and benefits. Intel’s most successful
Because not all of these capabilities are will be delivered using SaaS by 2011. In one SaaS projects have involved the delivery
available today, we also developed a near- survey of organizations using SaaS, over of non-critical capabilities: commoditized
term reference architecture based on 90 percent said they were satisfied. Many functions that do not contribute directly to
existing enterprise application frameworks software suppliers are creating SaaS solutions Intel’s competitive advantage. The biggest
and architecture. The reference architecture based on their traditional offerings; this will benefit has been that SaaS provides agility,
provides a proven template solution that create additional outsourcing options. with fast access to new functionality.
Application Categories • Good candidates for SaaS are applications with industry-standard workflows, which do not involve intellectual property or
sensitive data,
such as human resources management, employee stock options, medical benefits, and expense reports.
Users • The number of users varies—from participants in a small pilot project to a majority of Intel employees for several applications.
• About half of SaaS applications are used globally and half are specific to the United States.
Costing Model • Most applications use subscription licensing, with a fee paid at regular intervals—yearly, quarterly, monthly.
• A few applications are priced per transaction.
Platform • In about 30 percent of cases, suppliers provide a dedicated hardware platform for Intel’s application; in the other 70 percent, the
platform is shared. The application is typically not virtualized.
• In about half of the cases, suppliers provide a dedicated application instance for Intel; the rest use a standard multi-tenant
shared instance.
Security • All SaaS solutions have undergone a security risk assessment. Most data has a relatively low security rating.
• Half of the SaaS applications use single sign-on (SSO); the rest use personal profiles.
• Data may be encrypted in transit and at rest. Native Web applications use HTTPS/SSL to protect important data during
transmission.
Monitoring • Typically, vendors monitor applications and infrastructure and send us selected or summary alerts.
www.intel.com/IT 3
IT@Intel White Paper Architecting Software as a Service for the Enterprise
4 www.intel.com/IT
Architecting Software as a Service for the Enterprise IT@Intel White Paper
tightly coupled with the Intel environment. We we assign these security ratings relative to of data in contracts, including liability in the
found that the key has been to evaluate the the sensitivity and importance of the data. event of legal action.
intersection of each SaaS solution with our We requested evidence of protection level
existing business processes, systems, and data. and encryption; with multi-tenant solutions, Use-Case Model
we probed how suppliers separate Intel’s As part of our SaaS architecture, we defined
Ideally, we want a good fit between a
information from that of other companies. In a use-case model that shows how the
SaaS application and our business process,
some cases, we required a physical inspection system behaves from a user-centered design
with minimal need for configuration or
of the provider premises and employee perspective. Our model, shown in Figure 2,
customization. Where changes are required,
background checks. focuses primarily on IT-approved solutions for
we have favored configuration of SaaS
commoditized functions used by many Intel
applications over customization, but we have Regulatory compliance. We identified a few
employees, though there is enough flexibility
customized software in some cases where it areas as important for regulatory compliance.
in the model to include some cases in which
is necessary to meet Intel business needs. We Employees’ personal data must be protected,
an Intel department or end-user sources their
gathered best practices for testing and for such as bank account information associated
own solution.
troubleshooting—which is challenging when with expense reports. We also need to help
multiple parties, including an Internet service ensure intellectual property protection; for There are three types of primary SaaS user
provider, are involved. example, we do not want to store sensitive roles within Intel.
documents in the cloud for potential access
Security. With our existing SaaS applications, • IT users. Primary IT user roles are
by controlled countries. We have to comply
we have adopted a comprehensive approach applications administrators and
with local and national financial reporting
to security. The rigor of our assessment was SaaS specialists. The administrator
regulations. We explicitly defined jurisdiction
based primarily on the security rating of data; is responsible for the decision to use
Decide
SaaS
Manage
Users
Intel SaaS
Uses Specialist
Set up Intel Agree Contract
Service SaaS
Provider
IT Administrator Uses
Deliver
Audit Service
Security Extends Uses
Remove
SaaS Request
Service Meter Uses Manage
Usage Versions
Request Work
Service Offline
Removal
www.intel.com/IT 5
IT@Intel White Paper Architecting Software as a Service for the Enterprise
SaaS for a particular application and for • Multi-tenant efficient. The design Intel’s data and user accounts are typically
any integration work needed to deliver the should support multiple tenants using a hosted by the SaaS provider. We considered
service within Intel. The SaaS specialist single instance of the application. The the following capabilities:
is the technical resource who delivers data must be segregated for each tenant.
• Identity and federation. Identity uniquely
any personalization, programming, and • Configurable. The application can identifies a user or another entity such as
customization for Intel. be configured to meet the needs of an Intel application or system. An example
• End users. Primary end users are individual each tenant, using metadata and a is a user name. Federation describes the
workers at Intel who use SaaS applications metadata execution engine—also known function of enabling users in one domain
for job-related activities. Workers are located as a business rules engine. Routine to securely and seamlessly access data
within the enterprise or connected to Intel configuration changes should be possible within another domain.
while traveling or working from home. without the need to coordinate downtime
• Authentication and single sign-on
• SaaS provider. This is the external provider with other tenants.
(SSO). The process of identifying an
that delivers a software service over the • Scalable. Multi-tenant usage can result individual, usually based on a user name
Internet to Intel. in millions of users. Applications should be and password. In the context of SaaS, this
The model describes a typical SaaS solution designed from the ground up to scale up includes the ability to achieve SSO across
in which back-end integration is required. It and scale out—and to be able to do this multiple cloud applications and services.
encompasses the entire service life cycle and dynamically, on demand.
• Authorization and role-based access
includes use cases to define SaaS selection, control. After an identity has been
SAAS CAPABILITIES
initial setup at Intel and the SaaS provider, confirmed, authorization is the process
Many capabilities make up the SaaS
user consumption of the service, ongoing of giving individuals access to system
conceptual architecture. We group these
data exchange and administration, and objects based on their identities. Identities
into presentation, security, application,
service end of life. are usually assigned to roles for ease of
operations, and infrastructure categories, as
managing access.
Conceptual Architecture shown in Figure 3. The following sections
describe the most important capabilities. • Entitlement. The process of granting access
The conceptual architecture is intended
to a specific resource. Tenants are usually
to represent a three- to five-year vision of
Presentation responsible for maintaining their own user
SaaS architecture, free of implementation
This includes all capabilities exposed to the accounts using delegated administration.
technology details, and to establish common
user, such as: • Encryption. Data may need to be encrypted
capability definitions. The conceptual
• Menu and navigation. These provide in transit (between applications or between
architecture depicts all the key capabilities
access to the features and functionality the layers within an application) and at rest
required in a complete SaaS offering, the
within an application, organized in an (while stored).
logical separation of capabilities into tiers, and
the logical grouping of capabilities. We do not intuitive way so that the user can select • Regulatory controls. Tracking and
expect that individual SaaS applications will the desired function. reporting who accessed what, when,
necessarily include every capability described • Reporting. Application-specific predefined and why. It includes tracking access to
in the conceptual architecture. or ad-hoc reports. application features and data, the security
rating of the data, and the implementation
KEY FEATURES Security of a data retention policy. It also includes
A well-designed SaaS application has several Security is one of the most important identifying whether individuals are located
key architectural features. It should be: categories of SaaS capabilities, given that in controlled countries.
6 www.intel.com/IT
Architecting Software as a Service for the Enterprise IT@Intel White Paper
Presentation
Menu and User Display and Reporting
Navigation Controls Rendering
Performance and
Encryption Messaging Availability
Infrastructure
Networking and
Database Storage Compute Communications
Figure 3. Intel IT’s conceptual architecture for software as a service (SaaS) includes capabilities in five categories.
www.intel.com/IT 7
IT@Intel White Paper Architecting Software as a Service for the Enterprise
• Metering and indicators. Tracking and between internal Intel systems and data stores Additional work is required to qualify an
reporting items specifically related to the hosted by the SaaS provider—as their biggest externally hosted SaaS solution, so it is
service-level agreement, such as usage, challenge. It’s important to keep this data important to identify whether SaaS is an
availability, number of failures, and mean synchronized between internal and external option early in the life cycle of an application
time to respond to and fix problems. systems, so data transfer may need to occur implementation project; the additional
frequently, often on a scheduled basis. security review and requirements may affect
Infrastructure the overall agility and viability of the project.
The key challenge is locating the right
The underlying technical capabilities
version of the data, since data can be Intel’s security controls tend to be more
required for storing data and moving it
stored within the enterprise, in the cloud, mature than those of SaaS suppliers,
around the network:
or at both locations. Considerations include and we must consider complex legal and
• Database. In a multi-tenant data architecture, finding the master copy of data, searching regulatory requirements. Providers must
there could be one database per tenant or for data, and governance. be able to explain how jurisdiction of
one database shared by multiple tenants data is maintained. Together with the
Through our environmental scan, we discovered
with the data indexed by a specific tenant provider, we must be prepared to respond
that various tools and designs are used to
identification. to e-Discovery and legal notices. We must
exchange SaaS data today, with no common
• Compute. The physical clients, servers, or also address privacy concerns, comply with
architecture across all the implementations.
virtual machines that execute code. export restrictions that cover access from
This highlights the need to standardize on a
controlled countries, be prepared to satisfy
single data interchange reference architecture.
Reference Architecture audit requirements, and understand how the
We’ve identified two types of data supplier verifies that old data is destroyed.
The purpose of the reference architecture
interchange: asynchronous and synchronous.
is to provide a proven template solution From our environmental scan of existing
An asynchronous, or batch, interchange is
that project teams can immediately apply deployments, we identified several other key
typically used for back-end data exchange. For
to specific application domains. Accordingly, elements needed for a successful project:
example, a SaaS expense report application
it includes only a subset of the capabilities
needs to know about the management • Classification of the data by an IP attorney.
described in the conceptual architecture
structure to enable management approval of • Rigorous due diligence to help ensure the
and is more near-term in nature—one to
travel expenses. This requires employee data required controls are included in the contract.
two years. The reference architecture also
to be periodically copied from the enterprise
provides a common vocabulary for discussing • Completion of an information security
to the expense report application.
implementations; one goal is to increase the risk assessment.
commonality between them. In contrast, synchronous, or real-time,
• Protection of data in transit and at rest.
interchange involves data that is dynamically
Figure 4, on the next page, shows the high-
retrieved in real time directly from its • Making sure that suppliers provide
level reference architecture for a typical SaaS
source. Today, there is limited use of real- satisfactory disaster recovery and
offering at Intel. It includes summary views of
time exchange for enterprise data, but we business continuity plans.
data interchange, manageability, and security
anticipate increased use in the future. For our users, it would be ideal to be able
capabilities. We also developed more detailed
architecture designs for each of these areas; to achieve SSO or reduced sign-on to avoid
SECURITY continually re-authenticating for each
key aspects of these are summarized in the
SaaS providers must comply with a number application. In the future, we’d like to see
following sections.
of security policies. We have done a good this implemented with a federated identity
DATA INTERCHANGE job of assessing providers in advance of approach using tokens that the SaaS
implementation to help ensure they meet provider can decrypt and read. This would
Intel SaaS project teams cite data interchange—
our requirements, but we will continue to enable users to log on to the Intel network
moving employee data and other information
move cautiously. and immediately have access to all their
8 www.intel.com/IT
Architecting Software as a Service for the Enterprise IT@Intel White Paper
applications, without having to maintain Today, Intel users who are experiencing problems and certifications for use by service providers.
individual profiles for each SaaS provider. typically call their local Intel service desk. It is then This will provide organizations consuming
the support agent’s responsibility to escalate the SaaS applications with a common set of
MANAGEABILITY issue to the SaaS provider’s service desk. metrics, which will eliminate many of the
To date, automated manageability has not been initial validation steps currently required.
As we prepare for wider deployment of more-
a priority for us because we have had relatively
critical applications, the ability to automatically How much manageability data we will require
few applications and they have generally not
acquire reliable and complete manageability from SaaS providers is still an open question. Our
been business-critical. Intel relies largely on
data will become increasingly important. goal is to minimize introspection into incidents,
user feedback and SaaS provider data to help
focusing more on application performance,
ensure the providers are meeting contractual We plan to work with standards bodies to
reliability, and common tracking of requirements.
obligations and addressing inadequacies. develop verifiable manageability standards
SaaS
Application Validate User
Push Data
File Server • Features
Workflow Engine Federation Service Desk
Pull (SaaS Provider) Services (SaaS Provider) Create SaaS Provider
File • Scheduling • Token Service • Ticket Ticket Support
• Transform Management
Internet
Data Sources
Figure 4. Intel IT’s summary view of software as a service (SaaS) reference architecture.
www.intel.com/IT 9
IT@Intel White Paper Architecting Software as a Service for the Enterprise
This paper is for informational purposes only. THIS DOCUMENT IS Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and other
PROVIDED “AS IS” WITH NO WARRANTIES WHATSOEVER, INCLUDING countries.
ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS
* Other names and brands may be claimed as the property of others.
FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE
ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE. Intel Copyright © 2009 Intel Corporation. All rights reserved.
disclaims all liability, including liability for infringement of any proprietary
rights, relating to use of information in this specification. No license, express Printed in USA Please Recycle
or implied, by estoppel or otherwise, to any intellectual property rights is 1009/KC/KC/PDF 322460-001US
granted herein.