Levels of Assurance OGF Activity

Slides:



Advertisements
Similar presentations
© 2006 Open Grid Forum OGF20 LoA-RG Monday 11:00am Charter Suite 4 Chairs: Ning Zhang and Yoshio Tanaka.
Advertisements

© 2006 Open Grid Forum Security Area OGF19 Standard All Hands.
TNC 2008 / Short Lived Credential Service Implementation Based on National AAI Short Lived Credential Service Implementation Based on National AAI Emir.
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
PKI and LOA Establishing a Basis for Trust David L. Wasley PKI Deployment Forum April 2008.
Appropriate Access InCommon Identity Assurance Profiles David L. Wasley Campus Architecture and Middleware Planning workshop February 2008.
Overview of US Federal Identity Management Initiatives Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO E-Authentication, NIH.
Levels of Assurance: An Overview Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority.
X509-bindings-profiles-sep061 Bindings and Profiles for Attribute-based Authz in the Grid Tom Scavo NCSA.
Identity Assurance at Virginia Tech CSG January 13, 2010 Mary Dunker
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Enterprise Architecture 2014 EAAF as a vehicle for LoA Using EAAF processes to incrementally approach InCommon/UCTrust certification.
Grid Security. Typical Grid Scenario Users Resources.
National Institute of Advanced Industrial Science and Technology Proposals for auditing Yoshio Tanaka Grid Technology Research.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Levels of Assurance OGF Activity Michael Helm ESnet/LBNL 27 Feb 2007.
1 Trust Framework Portable Identity Schemes Trust Framework Portable Identity Schemes NIH iTrust Forum December 10, 2009 Chris Louden.
Federated Identity, Levels of Assurance, and the InCommon Silver Certification Jim Green Identity Management Academic Technology Services © Michigan State.
Intra-ASEAN Secure Transactions Framework Project Progress Report
Federal Requirements for Credential Assessments Renee Shuey ITS – Penn State February 6, 2007.
Policy, Trust and Technology Mitigating Risk in the Digital World David L. Wasley Camp 2006 © David L. Wasley, 2006.
The InCommon Federation The U.S. Access and Identity Management Federation
EuroPKI 2008 Manuel Sánchez Óscar Cánovas Gabriel López Antonio F. Gómez Skarmeta University of Murcia Levels of Assurance and Reauthentication in Federated.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Identity Management Report By Jean Carreon and Marlon Gonzales.
EMI AAI Strategy & Plans John White / Helsinki Institute of Physics Federated Identity Systems for Scientific Collaborations Workshop , CERN,
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
© 2006 Open Grid Forum Security Activities at OGF24 Security Area Meeting.
Levels of Assurance in Authentication Tim Polk April 24, 2007.
Ning Zhang, the University of Manchester, UK David Groep, National Institute for Nuclear and High Energy Physics, NL Blair Dillaway, OGF Security Area.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
Government-University Identity Management Opportunities Peter Alterman, Ph.D. Chair, U.S. Federal PKI Policy Authority and Assistant CIO/E-Authentication,
Credentialing in Higher Education Michael R Gettes Duke University CAMP, June 2005, Denver Michael R Gettes Duke University
NIST E-Authentication Technical Guidance Bill Burr Manager, Security Technology Group National Institute of Standards and Technology
Identity Federations and the U.S. E-Authentication Architecture Peter Alterman, Ph.D. Assistant CIO, E-Authentication National Institutes of Health.
Summary of AAAA Information David Kelsey Infrastructure Policy Group, Singapore, 15 Sep 2008.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Electronic Security and PKI Richard Guida Chair, Federal PKI Steering Committee Chief Information Officers Council
WLCG Authentication & Authorisation LHCOPN/LHCONE Rome, 29 April 2014 David Kelsey STFC/RAL.
VOMS Attribute Authorities Michael Helm ESnet/LBNL 23 Feb 2007.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
AuthZ WG Conceptual Grid Authorization Framework document Presentation of Chapter 2 GGF8 Seattle June 25th 2003 Document AID 222 draft-ggf-authz-framework pdf.
Security Bob Cowles
18 th EUGridPMA, Dublin / SRCE CA Self Audit SRCE CA Self Audit Emir Imamagić SRCE Croatia.
News from EUGridPMA EGI OMB, 22 Jan 2013 David Kelsey (STFC) Using notes from David Groep 22/01/20131EUGridPMA News.
Federal Initiatives in IdM Dr. Peter Alterman Chair, Federal PKI Policy Authority.
29 th EUGridPMA meeting, September 2013, Bucharest AEGIS Certification Authority Dušan Radovanović University of Belgrade Computer Centre.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Soapbox (S-Series) Certificate Validation Jens Jensen, STFC.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
LoA In Electronic Identity Jasig Dallas Levels of Assurance In Electronic Identity Considerations for Implementation Benjamin Oshrin Rutgers University.
EAuthentication – Update on Federal Initiative Jacqueline Craig IR&C September 27, 2005.
International Grid Trust Federation Session GGF 19 Chapel Hill, NC, USA Thursday, Feb CAOPS-WG session #1.
Access Policy - Federation March 23, 2016
Shibboleth Roadmap
Phil Hunt, Hannes Tschofenig
Grid Security.
NIST Cybersecurity Framework
Secure 3-Party Protocol
Status and Future Steps
NAAS 2.0 Features and Enhancements
PLUG-N-HARVEST ID: H2020-EU
Laws for Secure Credentialing
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
Technical Approach Chris Louden Enspier
E-Authentication: What Technologies Are Effective?
Federal Requirements for Credential Assessments
HIMSS National Conference New Orleans Convention Center
Install AD Certificate Services
Appropriate Access InCommon Identity Assurance Profiles
Presentation transcript:

Levels of Assurance OGF Activity Michael Helm ESnet/LBNL 27 Feb 2007

Middleware Security WG Goals What are levels of assurance? Introduce LoA activities just begun at OGF Test interest here – draw in co-authors for OGF documents/other activities 27 Feb 2007 Middleware Security WG

What Are Levels of Assurance? Parse the phrase…. Assurance – Assurance about what? About identity – about trust assertions – about an authentication token &c Levels – Some “levels” are above/below others  some better/worse than others (for what? to whom?) Implicit – levels represent a class; a bundle of attributes; perhaps attributes of some equivalence in value? 27 Feb 2007 Middleware Security WG

Middleware Security WG Examples of LoA LoA in Grids IGTF Certificate Authority “profiles” LoA in US Government PKI OMB definitions NIST specifications 27 Feb 2007 Middleware Security WG

Middleware Security WG IGTF LoA “Classic” X.509 CA profile Latest: http://www.eugridpma.org/guidelines/IGTF-AP-classic-20050930-4-0.html Early: http://www.eugridpma.org/guidelines/CACG-minimum-requirements-v1.txt Originally – one size fits all; over time has added features, become more precise (and restrictive) Proposal to split – provide a profile with less government ID-based ID proofing, reduce face to face requirement SLCS (Short lived Certification Service) profile Based on site ID management service 27 Feb 2007 Middleware Security WG

US Government Authentication LoA Reference URL’s OMB: OMB M-04-04 http://www.whitehouse.gov/omb/memoranda/fy04/m04-04.pdf NIST NIST 800-63 http://csrc.nist.gov/publications/nistpubs/800-63/SP800-63V1_0_2.pdf Long history of evolution Ning Zhang at OGF mentioned the year 2000, but the idea was around in the mid -90’s. Warwick Ford? 27 Feb 2007 Middleware Security WG

Middleware Security WG OMB Definition Level 1: Little or no confidence in the asserted identity’s validity. Level 2: Some confidence in the asserted identity’s validity. Level 3: High confidence in the asserted identity’s validity. Level 4: Very high confidence in the asserted identity’s validity. Important to read this whole document, including the risk assessment content and the advisory material. 27 Feb 2007 Middleware Security WG

Middleware Security WG OMB Definition (2) Each assurance level describes the agency’s degree of certainty that the user has presented an identifier (a credential in this context) that refers to his or her identity. In this context, assurance is defined as the degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued, and the degree of confidence that the individual who uses the credential is the individual to whom the credential was issued. 27 Feb 2007 Middleware Security WG

Middleware Security WG NIST 800-63 Revised fairly regularly (annually?) Level 1 – self assertion; no plaintext passwords on the network; assertions about identity are cryptographically authenticated, or obtained from a trusted provider thru trusted methods Level 2 – add some identity proofing; eavesdropping, online guessing, replay prevented; assertions about claimants validated (rules) Level 3 – 2 factor, proof of possession of private key, or OTP required ; validation of identity documents/process; add MITM protection Level 4 – hardware token required; “All sensitive data transfers are cryptographically authenticated using keys bound to the authentication process.” 27 Feb 2007 Middleware Security WG

Middleware Security WG NIST 800-63 (2) 27 Feb 2007 Middleware Security WG

Middleware Security WG NIST 800-63 (3) 27 Feb 2007 Middleware Security WG

Middleware Security WG NIST 800-63 (4) That’s 2/3 pages of the ID proofing section Also protocol requirements, mapping to other related infrastructure, threat model, &c Relationship to other Federal/US programs Incommon (Shibboleth) has a set of levels US Gov Fed Bridge PKI has ~5 levels Similar … subtle differences/asynchrony 27 Feb 2007 Middleware Security WG

Middleware Security WG Relevance What LoA are appropriate for Grids? Is the concept useful? Have modern authorization concepts superceded it? What about interoperability? Do existing LoA standard cover things of interest to Grids (eg hosts, authorization, delegation)? [Ans: No, or poorly?] These issues are among those that motivated Ning Zhang to organize an LoA BOF at OGF-19 27 Feb 2007 Middleware Security WG

What Should Grid LoA Look Like? What are our relevant security use cases ? Existing debate in IGTF PMAs on related subjects Meaning of/process behindhost & service certifications Face to face proof of identity Government ID vs project ID Surprise when IGTF tried to map onto US Fed PKI The more rigorous IGTF classic X.509 CA profile doesn’t map to US Fed levels (or one could say, maps to the lowest possible level, with problems) 27 Feb 2007 Middleware Security WG

Middleware Security WG LoA Activites in OGF BoF arrived at rough consensus for: OGSA-AUTHN – issues related to protocol; delivery of LoA attributes; should be much interest in MSWG? LOA-RG – Use cases, survey of existing LoA standards for relevance to Grids, examination of gaps in existing LoA, missing features CAOPS – Either specification of levels, or application / utilization of levels - a little unclear Providing use cases, and discussing “bundling”, is a critically important activity – any contributors in the house? 27 Feb 2007 Middleware Security WG

Middleware Security WG LoA at OGF – Conclusion LoA RG leaders Ning Zhang (nzhang@cs.man.ac.uk) Yoshio Tanaka (yoshio.tanaka@aist.go.jp) OGSA-AUTHN (status?) Alan Sill (Alan.Sill@ttu.edu) CAOPS WG http://www.ogf.org/gf/group_info/view.php?group=caops-wg Need authors/contributors to a use-case paper 27 Feb 2007 Middleware Security WG