PKI Implementation at the University of Wisconsin-Madison

Slides:



Advertisements
Similar presentations
HCQ P MEDICARES HEALTH CARE QUALITY IMPROVEMENT PROGRAM QualityNet Exchange Dennis Stricker Director, Information Systems Group Office of Clinical Standards.
Advertisements

1 PKI Buy vs. Build Decision at UW-Madison Presented by Nicholas Davis PKI Project Leader UWMadison, Division of Information Technology.
PKI Solutions: Buy vs. Build David Wasley, U. California (ret.) Jim Jokl, U. Virginia Nick Davis, U. Wisconsin.
Active Directory Structure By Erick Engelke and Bruce Campbell.
Public Key Infrastructure (PKI) Hosting Services.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential The Internet offers no inherent security services to its users; the data transmitted.
PKI Past, Present and Future at the UW Nicholas Davis, PKI Project Leader Eighth Annual Educause PKI Summit.
Public Key Infrastructure at the University of Pittsburgh Robert F. Pack, Vice Provost Academic Planning and Resources Management March 27, 2000 CNI Spring.
Understanding Active Directory
The Unique Challenges of Rolling Out a PKI in the U.W. Academic Environment Nicholas A. Davis.
1 11 th Fed/Ed PKI Meeting Some quick updates from recent HEPKI-TAG and SURA work Jim Jokl
Public Key Infrastructure from the Most Trusted Name in e-Security.
Public Key Infrastructure Ammar Hasayen ….
State of Information Technology Presentation for Faculty Council November 14, 2013 Mike Carlin Vice Chancellor for IT and CIO.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Making Digital Security a Reality With PKI Nicholas A. Davis, UW-Madison November 28, 2006.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
PKI interoperability and policy in the wireless world.
Nicholas A. Davis DoIT Middleware September 29, 2005.
Configuring Directory Certificate Services Lesson 13.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
PKI Update December, 2008 Nicholas Davis. Quick Background 2004 UW-Madison purchased co-managed solution from Geotrust Both client certs and SSL certs.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Remote Access Portal Project Ben Dawson Larry Finn Peter Stickney Ken Vedaa May 7, GC.
Chapter 2 Securing Network Server and User Workstations.
PKI Session Overview 1:30 pm edt - Welcome, etiquette, session outline 1:40 pm edt - HEPKI-TAG Update (Jim Jokl, Virginia) 2:00 pm edt - HEPKI-PAG Update.
John Castilia, PMP Service Management Office CIT CIT/OCIO Pilot Implementation of HSPD-12: A PM’s Insights.
The Decision to Buy vs. Build Nicholas Davis (UW-Madison) Tom McDonnell (Geotrust)
Identity Management, Federating Identities, and Federations November 21, 2006 Kevin Morooney Jeff Kuhns Renee Shuey.
Introduction to the PKI Issues at UW Madison Presented to ITC on Friday, 3/18/2005 Tom Jordan Systems Engineer,
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
TAG Presentation 18th May 2004 Paul Butler
Pace University | Information Technology Services
City-wide Active Directory Project Town Hall II
Tim Carter Sales Director Sybase Confidential Propriety.
California State University CSUconnect Federation
TAG Presentation 18th May 2004 Paul Butler
Chapter 17 Risks, Security and Disaster Recovery
Module 8: Securing Network Traffic by Using IPSec and Certificates
Living in a Network Centric World
Living in a Network Centric World
Public Key Infrastructure (PKI)
Tim Carter Sales Director Sybase Confidential Propriety.
CS691 M2009 Semester Project PHILIP HUYNH
Secure Enterprise Technology Initiatives e-Provisioning Group
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
U.S. Federal e-Authentication Initiative
CS691 M2009 Semester Project PHILIP HUYNH
Living in a Network Centric World
Public Key Infrastructure from the Most Trusted Name in e-Security
Technical Approach Chris Louden Enspier
PKI Update December, 2008 Nicholas Davis
David L. Wasley Spring 2006 I2MM
Enterprise Program Management Office
Fed/ED December 2007 Jim Jokl University of Virginia
Financial Affairs Users Group Update
Federated Environments and Incident Response: The Worst of Both Worlds
Module 8: Securing Network Traffic by Using IPSec and Certificates
Install AD Certificate Services
Microsoft Virtual Academy
Federating and PKI: Case Studies Paul Hill, MIT
e-Security Solutions Penki Kontinentai Vladas Lapinskas
IT Office hours – 1 Data Sharing 101
Fy ‘08 NETWORK PLANNING TASK FORCE
National Trust Platform
Information Technology Organization Overview RFP #220-05
Presentation transcript:

PKI Implementation at the University of Wisconsin-Madison CIC Presentation Nicholas A. Davis November 7, 2005

Overview AuthN/Z at UW-Madison Quick outline of PKI technology Why the UW-Madison uses PKI History of PKI at UW-Madison How the technology is being used Current challenges On the horizon Q&A session

Communities Served by UW-Madison AuthNZ

Outline of PKI technology PKI - Acronym for Public Key Infrastructure Confidentiality Authenticity Integrity Non-repudiation The Infrastructure portion of PKI

Why UW-Madison uses PKI HIPAA FERPA Research activities Open network Higher education PKI partners Help and learn from Internet2, Educause and CIC

UW-Madison PKI Activity 2002 – Present Provided Digital Certs to Shibboleth Testing Community Spring - 2005 Presentation to DoIT CIO’s Office relating to PKI technical findings and costs 2003 – Present Pilot CA service made available to selective applications September 2000 Created PKILab with CS and others 2000 2001 IAIMS Secure Email Pilot 2002 Participated in Federal Bridge Pilot Project Fall 2003 CA server installed in production Summer 2004 Campus Requirements Gathering and RFI Sept. 2005 End user cert Deployment

PKI infrastructure The U.W.-Madison PKI is co-managed Time to implement Cost to implement Off site key backup The Equifax Secure Ebusiness CA1 Ability to migrate easily to in house solution

How the technology is being used Faculty – Staff – Students 120 “Early Adopters” Cryptographic USB devices Windows and Macintosh Digitally sign files and email Encrypt email and attachments Outlook, Outlook Express, Thunderbird and Mail.app

The look of UW-Madison digital certificiates

Case Examples UW-Madison Survey Center University Health Services Division of Information Technology Social Sciences Various Help Desks across campus

Current challenges Decentralized IT environment Cost Reaching critical mass Education Scaling User management and CRLs

The cost of not doing PKI University of California at Berkeley Stanford University University of Tennessee George Mason University Qualcomm

On the horizon Proposed digital signing of mass emails Proposed authentication to “high value” workstations and servers Proposed SSL certificates Convergence of other authentication technologies Digital signing as a replacement for ink signatures?

Critical success factors Transparency to the end users Ease of administration A clear roadmap and menu of service offerings Organizational awareness and education Top down management support and awareness of the complexity related to PKI policy A willingness to understand that rolling out a PKI is an iterative process of continuous improvement

Summary UW-Madison went live with PKI in September, 2005 Macintosh and Windows Email and file encryption and signing PKI as a technology suffers in general from several implementation challenges Running a successful PKI is an iterative process with some degree of fluidity Benefits of implementing a PKI far outweigh the risks of not having a PKI

Questions and feedback www.doit.wisc.edu/middleware/pki Nicholas Davis University of Wisconsin-Madison Division of Information Technology ndavis1@wisc.edu 608-262-3837