The E-Authentication Initiative My Government, My Terms Georgia K. Marsh, Deputy Program Manager E-Authentication Initiative “Getting to Green with E-Authentication” February 3, 2004 Executive Session
The Vision for E-Authentication The E-Authentication Initiative The Vision for E-Authentication E-Authentication is an online identity validation service that enables the American public to access government services in a secure, trusted environment with credentials of their choosing E-Authentication Enables E-Government 2
The E-Authentication Initiative Providing Choice E-Authentication provides choice – for agencies and citizens: Agencies May select from a number of interoperable products Decide whether to use all CSPs at the appropriate assurance level, or limit to specific CSPs Still control system access (authorization) Citizens: Control/manage their relationships with government May opt-in to single-sign-on Decide what credential to use Decide whether to use one credential or many 3
Meeting the Need Functional Business Credential reusability The E-Authentication Initiative Meeting the Need Functional Credential reusability Single sign-on No central information collection point Business Standards-based COTS-based Federated model Flexibility adjust to evolving technology Not product or standard dependent Financially viable Scalability – administratively as well as technically Support multiple environments Ease-of-operation, maintenance Extensibility – (can extend from the FEA to myriad agency apps) Reliability 4
The E-Authentication Initiative Producing Results AT FOC, E-Authentication will simplify, unify and produce results: Protect privacy – No central information collection point Secure agency systems and information – Verification of credentials against standardized assurance levels Save money and resources – A government-wide authentication service will save agencies money and man-hours to build redundant, stand-alone systems Speed time to market – Focusing resources will allow agencies to implement E-Government more rapidly 5
A FACILITATOR, providing expertise and the authentication blueprint The E-Authentication Initiative E-Authentication: What we ARE A FACILITATOR, providing expertise and the authentication blueprint Architecture Policies Credential Trust List Interoperability Lab Approved technology provider list 6
A black box E-Authentication: What we AREN’T The E-Authentication Initiative E-Authentication: What we AREN’T A black box 7
An INFRASTRUCTURE COMPONENT of the FEA, that enables E-Government The E-Authentication Initiative E-Authentication: What we ARE An INFRASTRUCTURE COMPONENT of the FEA, that enables E-Government 8
E-Security E-Authentication: What we AREN’T The E-Authentication Initiative E-Authentication: What we AREN’T E-Security 9
AUTHENTICATION E-Authentication: What we ARE The E-Authentication Initiative E-Authentication: What we ARE AUTHENTICATION 10
Authorization E-Authentication: What we AREN’T The E-Authentication Initiative E-Authentication: What we AREN’T Authorization 11
Your direct service provider for the benefit of your customers The E-Authentication Initiative E-Authentication: What we ARE Your direct service provider for the benefit of your customers 12
A direct service provider to your customers (the American public) The E-Authentication Initiative E-Authentication: What we AREN’T A direct service provider to your customers (the American public) 13
E-Authentication: The Service Components The E-Authentication Initiative E-Authentication: The Service Components Policy Administration & Management Policy Administration & Management Applications Technology Credentials Credentials Technology Applications 14