The E-Authentication Initiative

Slides:



Advertisements
Similar presentations
Connected Health Framework
Advertisements

The Need for Trusted Credentials Information Assurance in Cyberspace Mary Mitchell Deputy Associate Administrator Office of Electronic Government & Technology.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Copyright © 2011 Cloud Security Alliance Trusted Cloud Initiative Work Group Session.
Identity Management In A Federated Environment Identity Protection and Management Conference Presented by Samuel P. Jenkins, Director Defense Privacy and.
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
U.S. Environmental Protection Agency Central Data Exchange EPA E-Authentication Pilot NOLA Network Node Workshop February 28, 2005.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Federal Student Aid Technical Architecture Initiatives Sandy England
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
1 eAuthentication in Higher Education Tim Bornholtz Session #47.
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
The E-Authentication Initiative: A Status Report Presented at Educause Meeting June 16, 2004 The E-Authentication Initiative.
Information Technology Division Executive Office for Administration and Finance Shared Application Infrastructure (SAI) Program Overview.
State of Wyoming Department of Environmental Quality To the cloud my friend! Steve Alison – Georgia EPD Simon Watson – Windsor Why Georgia has its node.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Report from Breakout Session 1.2 Secure Consumerization: the Genuine Trustworthiness Revolution Chair: Craig Lee Rapporteur: Paolo Mazzetti.
E-Authentication: The Need for Open-Standards in Implementing E-Government October 6, 2004 The E-Authentication Initiative.
PROJECT NAME: DHS Watch List Integration (WLI) Information Sharing Environment (ISE) MANAGER: Michael Borden PHONE: (703) extension 105.
1 Identity and Transparency ( Bridging the GAPS of Governance Bridging the GAPS of Governance in eGov Initiatives in eGov Initiatives )‏ Badri Sriraman.
A DESCRIPTION OF CONCEPTS AND PLANS MAY 14, 2014 A. HUGHES FOR TFTM The Identity Ecosystem DISCUSSION DRAFT 1.
Mike Bartell Chief Information Officer FDIC Advancing Enterprise Architecture XBRL and the Collection of Call Report Data.
Cyber Authentication Renewal Project Executive Overview June – minute Brief.
Use of Identity Credentials in Public Transit Fare Payment Systems Professional Capacity Building Program T3 Webinar June 29, 2011 Washington Metropolitan.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
GC Credential Management Evolution for the OASIS/World Bank eGov Workshop 17 th April, 2009For information, please contact:
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Middleware Support for Virtual Organizations Internet 2 Fall 2006 Member Meeting Chicago, Illinois Stephen Langella Department of.
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
FEDERATIONS Clair Goldsmith, Ph.D., Associate Vice Chancellor and CIO September 27,
© 2005 ESP Solutions Group Max Yield Data™ Max Yield Data™ (MYD) simply means “data that everyone agrees are worth the effort.” Max Yield Data™ have been.
7 th FIM 4 R meeting April 2014 ESRIN Frascati.
The Federal Bridge A Brief Overview 1. 4BF Industry Forum April Fed PKI: View from 20,000 km FBCA C4 Common Policy CA (HSPD-12) CertiPath SSPs.
Introduction to soarchitect. agenda SOA background and overview transaction recorder summary.
GRID Overview Internet2 Member Meeting Spring 2003 Sandra Redman Information Technology and Systems Center and Information Technology Research Center National.
E-Authentication Overview & Technical Approach Scott Lowery Technical Track Session.
The Feds and Shibboleth Peter Alterman, Ph.D. Asst. CIO, E-Authentication National Institutes of Health.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Federal Enterprise BOF Rick Murphy Chief Architect, Blueprint Technologies June 7, 2004.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority Meet FedFed.
David Saslav Principal Product Manager Database and Application Server Technologies Oracle Corporation.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
Identity and Access Management
GEOSS Federated Single Sign-On
Law Enforcement Information Sharing Program (LEISP) Federated Identity Management Pilot February 27, 2006.
Segmap Solutions Mapping segments.
Transforming the Business of Government Through Shared Services JOHN SINDELAR Deputy Associate Administrator United States General Services Administration.
Federated Identity Management for Researchers (FIM4R)
Company Overview & Strategy
U.S. Federal e-Authentication Initiative
NAAS 2.0 Features and Enhancements
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Public Key Infrastructure from the Most Trusted Name in e-Security
Technical Approach Chris Louden Enspier
HIMSS National Conference New Orleans Convention Center
The E-Authentication Initiative
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Web Information Systems Engineering (WISE)
HLN Consulting, LLC® November 8, 2006
Presentation transcript:

The E-Authentication Initiative My Government, My Terms Georgia K. Marsh, Deputy Program Manager E-Authentication Initiative “Getting to Green with E-Authentication” February 3, 2004 Executive Session

The Vision for E-Authentication The E-Authentication Initiative The Vision for E-Authentication E-Authentication is an online identity validation service that enables the American public to access government services in a secure, trusted environment with credentials of their choosing E-Authentication Enables E-Government 2

The E-Authentication Initiative Providing Choice E-Authentication provides choice – for agencies and citizens: Agencies May select from a number of interoperable products Decide whether to use all CSPs at the appropriate assurance level, or limit to specific CSPs Still control system access (authorization) Citizens: Control/manage their relationships with government May opt-in to single-sign-on Decide what credential to use Decide whether to use one credential or many 3

Meeting the Need Functional Business Credential reusability The E-Authentication Initiative Meeting the Need Functional Credential reusability Single sign-on No central information collection point Business Standards-based COTS-based Federated model Flexibility adjust to evolving technology Not product or standard dependent Financially viable Scalability – administratively as well as technically Support multiple environments Ease-of-operation, maintenance Extensibility – (can extend from the FEA to myriad agency apps) Reliability 4

The E-Authentication Initiative Producing Results AT FOC, E-Authentication will simplify, unify and produce results: Protect privacy – No central information collection point Secure agency systems and information – Verification of credentials against standardized assurance levels Save money and resources – A government-wide authentication service will save agencies money and man-hours to build redundant, stand-alone systems Speed time to market – Focusing resources will allow agencies to implement E-Government more rapidly 5

A FACILITATOR, providing expertise and the authentication blueprint The E-Authentication Initiative E-Authentication: What we ARE A FACILITATOR, providing expertise and the authentication blueprint Architecture Policies Credential Trust List Interoperability Lab Approved technology provider list 6

A black box E-Authentication: What we AREN’T The E-Authentication Initiative E-Authentication: What we AREN’T A black box 7

An INFRASTRUCTURE COMPONENT of the FEA, that enables E-Government The E-Authentication Initiative E-Authentication: What we ARE An INFRASTRUCTURE COMPONENT of the FEA, that enables E-Government 8

E-Security E-Authentication: What we AREN’T The E-Authentication Initiative E-Authentication: What we AREN’T E-Security 9

AUTHENTICATION E-Authentication: What we ARE The E-Authentication Initiative E-Authentication: What we ARE AUTHENTICATION 10

Authorization E-Authentication: What we AREN’T The E-Authentication Initiative E-Authentication: What we AREN’T Authorization 11

Your direct service provider for the benefit of your customers The E-Authentication Initiative E-Authentication: What we ARE Your direct service provider for the benefit of your customers 12

A direct service provider to your customers (the American public) The E-Authentication Initiative E-Authentication: What we AREN’T A direct service provider to your customers (the American public) 13

E-Authentication: The Service Components The E-Authentication Initiative E-Authentication: The Service Components Policy Administration & Management Policy Administration & Management Applications Technology Credentials Credentials Technology Applications 14