Case study of XML based PKI management protocols. Tomas Gustavsson PrimeKey Solutions AB

Slides:



Advertisements
Similar presentations
PKIX BASED CERTIFICATION INFRASTRUCTURE IMPLEMENTATION ADAPTED TO NON PERSONAL END ENTITIES Jacob E., Liberal F., Unzilla J. {jtpjatae, jtplimaf,
Advertisements

Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
SPEKE S imple Password-authenticated Exponential Key Exchange Robert Mol Phoenix Technologies.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
PKI Administration Using EJBCA and OpenCA
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
The UMU-PBNM Antonio F. Gomez Skarmeta Gregorio Martínez
Windows Vista And Longhorn Server PKI Enhancements Avi Ben-Menahem Lead Program Manager Windows Security Microsoft Corporation.
SKS – Secure Key Store KeyGen2 –Token Provisioning Protocol Executive Level Presentation.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Understanding Active Directory
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Web Services Security Multimedia Information Engineering Lab. Yoon-Sik Yoo.
Chapter 11: Active Directory Certificate Services
About PKI Key Stores Dartmouth College PKI Lab. Key Store Defined Protected “vault” to hold user’s private key with their copy of their x.509 certificate.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) Web Service Description KEYPROV WG IETF-68 Prague March 2007 Andrea Doherty.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Certificate and Key Storage Tokens and Software
1 Digital Credential for Higher Education John Gardiner August 11, 2004.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Configuring Directory Certificate Services Lesson 13.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV BOF IETF-67 San Diego November 2006 Andrea Doherty.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV WG IETF-68 Prague March 2007 Andrea Doherty.
KeyGen2 Presentation, V0.33, A. Rundgren 2006, 2007, 2008, KeyGen2 KeyGen2 * – “Universal Provisioning” KeyGen2 is an effort creating a standard.
Task Force CoRD Meeting / XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
Ondrej Sevecek | GOPAS a.s. MCSM:Directory Services | MVP:Enteprise Security | CISA | CEH | CHFI | Enterprise certification.
27/09/2016 © 2009 PrimeKey Solutions AB 1 EAC ePassport PKI PrimeKey Solutions AB Tomas Gustavsson, Tham Wickenberg
27/09/2016 © 2009 PrimeKey Solutions AB 1 EJBCA PKI PrimeKey Solutions AB Tomas Gustavsson
Enterprise Key Management Infrastructure (EKMI) Securing data for e-Business and e-Government Arshad Noor, Co-Chair, EKMI-TC
28/09/20161 PKI and card issuance EJBCA.org SignServer.org Tomas Gustavsson
EJBCA Certificate Lifecycle. Contents Different ways to call with EJBCA The dialogue with EJBCA Web Pages command Line Interface API JAVA SCEP CMP & CRMF.
PAWS Framework draft-lei-paws-framework-datamodel-00
An Analysis of XKMS Yamini Ghadge Shanky Subramanian.
Data and Applications Security Developments and Directions
Web Services Security.
Product Manager, Keon PKI
Secure communication among services
Web Services UNIT 5.
CS691 M2009 Semester Project PHILIP HUYNH
CS691 M2009 Semester Project PHILIP HUYNH
NAAS 2.0 Features and Enhancements
Goals Introduce the Windows Server 2003 family of operating systems
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Distributed Systems Bina Ramamurthy 11/30/2018 B.Ramamurthy.
Security & .NET 12/1/2018.
جايگاه گواهی ديجيتالی در ايران
Public Key Infrastructure from the Most Trusted Name in e-Security
Office 365 Identity Management
CS 465 Certificates Last Updated: Oct 14, 2017.
Tim Bornholtz Director of Technology Services
Microsoft .NET Presentation
Install AD Certificate Services
RSA Digital Certificate Solutions RSA Solutions for PKI David Mateju RSA Sales Consultant
Tim Polk, NIST PKI Program Manager March 2000
Update on BRSKI-AE – Support for asynchronous enrollment
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Case study of XML based PKI management protocols. Tomas Gustavsson PrimeKey Solutions AB

Background Data loss and key management issues Requirement: encrypt data to prevent unauthorized disclosure Data loss: a lost encryption key means data is lost Secure key management: generate, store, renew and recover keys

Common PKI scenario CA serviceRA service Clients SCEP CMP PKCS#10/HTTP WebService The WebService API is typically used in these scenarios: Tolima – Token Lifecycle Management, smart card issuing system with user friendly front-end. EU ePassport PKI – front end to inter country communication and border control system with passport readers.

ToLiMa case study Hard Token Management Framework in Java used to manage the complete livecycle of an organizations Smartcard and/or USB dongles. ToLiMa is an application build using the famework, used to manage smart cards in the Swedish Police. Issue tokens, regular, temporary and project Unlock PIN of a token without exposing the PUK code for the users or administrators Revoke lost cards Renew expiring cards Activate cards in the organizations systems It is also possible to issue and unlock tokens on an approval basis, used in scenarios were no token administrator is available.

ToLiMa

ToLiMa - WS CA service RA / Tolima WebService WS-calls used: -getTokenData - getUserData-findUser -deleteUserData -genCertificates -republishCertificate -checkRevokationStatus -revokeCert/Token/User -isApproved -isAuthorized -customLog

ePassport PKI case study Passport management system manages inspection systems. Receives requests from IS, forwards to PKI and returns certificate back to IS. Also requests from other EU member states are handled though this interface. EAC PKI Passport mgmt Border Control System WS cvcRequest Passport application EU member states WS? WS (SCEP like)

ePassport WS standards First attempt – based protocol. Will mostly be used for manual fallback. Second attempt – standardize WS-API (soap) for CVCA communication between member states (CVCA communication protocol). Future – build on the CVCA communication protocol to include everything needed to inspection system enrollment. CVCA communication protocol modeled after the SCEP protocol (Simple Certificate Enrollment Protocol). No standard alternative exists.

Available XML protocols Current standard: XKMS - Provisioning, distributing and managing assymmetric keys Proposed Oasis standard: EKMI – Arshad Noor Provisioning, distributing and managing symmetric keys Other proposals: Keygen2 – Anders Rundgren Provisioning asymmetric keys for web browsers

XKMS X-KISS - XML Key Information Service Specification X-KRSS - XML Key Registration Service Specification Early protocol, defined before WebService gained real wide spread use. Interoperability between stacks was not an easy task. Many competing, industry standard non-XML protocols. - SCEP, CMP, LDAP, OCSP,... Security is still handled much on local scale, not using services as anticipated for X-KISS. Complex and some parts of standard is unclear. Hypothetical examples... No open source referens implementation.

EKMI Enterprise Key Management Infrastructure (EKMI) is the term given to "a collection of technology, policies and procedures for managing all cryptographic keys - symmetric and asymmetric - in the enterprise". OASIS EKMI-TC: To standardize a protocol - the Symmetric Key Services Markup Language (SKSML) - for applications and/or computerized devices to acquire symmetric key management services, securely, over a network. EKMI and PKI: EKMI relies on PKI for strong authentication for management of symmetric keys.

EKMI

Keygen2 KeyGen2 is an effort creating a standard for browser-based on-line provisioning of PKI user-certificates and keys. In addition, KeyGen2 supports an option for “piggybacking” symmetric keys like OTP (One Time Password) seeds on PKI. Using a generic credential extension mechanism, KeyGen2 can support things like Microsoft InfoCards and downloadable code associated with a specific key. One of the core targets for KeyGen2 are mobile phones equipped with TPMs (Trusted Platform Modules), which properly applied, can securely emulate any number of smart-cards. Although TPMs definitely is not a standard utility today, it is anticipated in the future. More info at

Different WS APIs PKI service RAs Administration Enrollment/key mgmt Different APIs needed for end entities and RAs. - Enrollment and key management - Administration End entities EKMI/XKMS/ Keygen2 EJBCA WS-API

Different WS APIs PKI service RAs WS Admin WS provisioning/mgmt Different APIs needed for end entities and RAs. - Enrollment and key management - Administration - Certificate exchange and cross certification End entities PKI service WS exchange

Standardization dilemma Need for completeness and applicability for different use cases. Complexity and ability to deploy. WS-APIs relatively easy to invent and deploy your own. Need careful consideration which areas really benefit from standardization. ”Competition” from howgrown WS-APIs for various use cases, e.g. epassport CVCA – DV communications protocol. Open source reference implementations.

Key managment future Unified key management protocol handling all aspect of enterprise key management. XKMS – first try EKMI – Symmetric key management Keygen2 – Asymmetric provisioning Unified key mgmt Administration XKM S Keygen2 EKMI

Key managment future Leverage existing standards. Otherwise WS will be forever left on server-server level. Example: Most clients generate PKCS#10 request messages. If WS protocol allows that a simple adapter can be used to WS-enable the client. Unified key mgmt Administration CMP/CRM F SCEP PKCS#1 0 CVC

Key managment future Administration is where many commericial offerings try to differentiate. Unified key mgmt Administration XKMS Keygen2 EKMI