Global Authentication: Liberty Alliance Identity Assurance Framework

Slides:



Advertisements
Similar presentations
Mutual OATH HOTP Variants 65th IETF - Dallas, TX March 2006.
Advertisements

Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March 11, 2015.
Kantara Initiative Identity Assurance Framework Overview and Value Proposition March 8, 2011.
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
1 Enabling Open Government Using the OIDF/ICF Open Trust Framework OASIS Identity Management 2009 September 29, 2009 Don Thibeau, ED, OpenID Foundation.
1 Trust Framework Portable Identity Schemes Trust Framework Portable Identity Schemes NIH iTrust Forum December 10, 2009 Chris Louden.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Federated Identity, Levels of Assurance, and the InCommon Silver Certification Jim Green Identity Management Academic Technology Services © Michigan State.
Update on Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
Building Trusted Transactions Identity Authentication & Attribute Exchange In Public and Private Federations OASIS Conference September 2010 Joni Brennan,
E-Authentication: What Technologies Are Effective? Donna F Dodson April 21, 2008.
Intra-ASEAN Secure Transactions Framework Project Progress Report
Digital Rights Management 5th Annual Wireless Java Conference January 21-23, 2004 Kevin Mowry, Motorola Chair, OMA Download and DRM group.
Introduction to OIX: A Market Solution to Online Identity Trust Don Thibeau.
Policy, Trust and Technology Mitigating Risk in the Digital World David L. Wasley Camp 2006 © David L. Wasley, 2006.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Assuring Identities in an Open Trust Framework The Identity Assurance Framework Kantara Initiative Presentation to the Kantara Healthcare Identity.
Assuring Identities in an Open Trust Framework Interoperability and Connectivity: Privacy, Security and Trust in Health Information Exchange - 5th Annual.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Trusted Systems Laboratory Hewlett-Packard Laboratories Bristol, UK InfraSec 2002 InfraSec 2002 Bristol, October 2002 Marco Casassa Mont Richard.
Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
A DESCRIPTION OF CONCEPTS AND PLANS MAY 14, 2014 A. HUGHES FOR TFTM The Identity Ecosystem DISCUSSION DRAFT 1.
5 th Annual Conference on Technology & Standards April 28 – 30, 2008 Hyatt Regency Washington on Capitol Hill
Cyber Authentication Renewal Project Executive Overview June – minute Brief.
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Helsinki Institute of Physics (HIP) Liberty Alliance Overview of the Liberty Alliance Architecture Helsinki Institute of Physics (HIP), May 9 th.
ITU-T X.1254 | ISO/IEC An Overview of the Entity Authentication Assurance Framework.
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Integrating Federated Identity and Web services in the RHIO Environment John Richardson Vice-Chair, Liberty Alliance eHealth SIG Intel Corporation Digital.
Federal e-Authentication Initiative: Federated Identity and Interoperability David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide.
Levels of Assurance in Authentication Tim Polk April 24, 2007.
Ning Zhang, the University of Manchester, UK David Groep, National Institute for Nuclear and High Energy Physics, NL Blair Dillaway, OGF Security Area.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Credentialing in Higher Education Michael R Gettes Duke University CAMP, June 2005, Denver Michael R Gettes Duke University
E-Authentication Overview & Technical Approach Scott Lowery Technical Track Session.
“The FIDO Alliance Today”
Identity Federations and the U.S. E-Authentication Architecture Peter Alterman, Ph.D. Assistant CIO, E-Authentication National Institutes of Health.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Connect. Communicate. Collaborate Universität Stuttgart A Client Middleware for Token- Based Unified Single Sign On to eduGAIN Sascha Neinert, University.
Geneva, Switzerland, September 2014 ITU-T SG 17 Identity management (IdM) Progress Report Abbie Barbir Ph.D., ITU-T Study Group 17 Q10/17 (Identity.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Kantara Initiative Privacy Framework Overview and Value Proposition 13 May 2011.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
The Value of Creating the Identity Ecosystem. The Identity Ecosystem Steering Group (IDESG) is the source of expertise, guidance, best practices and tools.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
Presentation Title Presenter Session Document Name/Version Submission/Revision date: XX April 2016.
1© Copyright 2012 EMC Corporation. All rights reserved. Authentication Manager Integration Services (AMIS) RSA Global Services Customer Presentation SP.
Literature Survey Venn Diagram
Sandy Porter - Strategy Director Avoco Secure
Update from the Faster Payments Task Force
Data and Applications Security Developments and Directions
An Overview of Kantara Initiative, Inc.
Service Organization Control (SOC)
SWIM Common PKI and policies & procedures for establishing a Trust Framework                           Kick-off meeting Patrick MANA Project lead 29 November.
Organization for the Advancement of Structured Information Standards
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
E-Authentication: What Technologies Are Effective?
Federal Requirements for Credential Assessments
E-Commerce for Developing Countries (EC-DC)
HIMSS National Conference New Orleans Convention Center
The E-Authentication Initiative
Appropriate Access InCommon Identity Assurance Profiles
WEQ-012 PKI Overview March 19, 2019
Reinhard Scholl, GTSC-7 Chairman
Jeremy Grant Coordinator Better Identity Coalition
Presentation transcript:

Global Authentication: Liberty Alliance Identity Assurance Framework Roger Brett McDowell, Executive Director, Liberty Alliance brett@projectliberty.org phone: +1.413.652.1248

Agenda Introduction State of the Market Levels of Assurance Assessment Criteria Process Conclusions Roger

Why was Liberty Alliance Formed? Identity is important & complex. We must deliver clarity OR: industry will become more fractured governments will intervene Foster the ubiquitous, open, interoperable, privacy-respecting, identity layer (holistic identity management): Liberty represents all constituencies toward this objective (vendors, enterprise, government, universities, SME’s, etc.)‏ Develop standards-based model to … Interoperate in heterogeneous environments Avoid proprietary vendor lock-in Provide flexible foundation for future growth Scale to the WWW Deliver consumer & enterprise confidence that security, privacy and data integrity will be maintained Roger

Liberty’s Global Membership 150 diverse member companies and organizations representing leaders in IT, mobility, government, service provision, system integration and finance working collaboratively to address the technology, business and policy aspects of digital identity management Management Board Sponsors Roger

Assurance Liberty Focus 04/17/08 Technology Standards and Guidelines Business and Privacy Guidelines Assurance Roger An Ecosystem of Interoperable Products & Services An Ecosystem of Interoperable Products & Services Identity Assurance Framework & Assessors 04/17/08

Some Liberty Achievements The de-facto standard for Identity Federation (SAML 2.0)‏ Standard framework for secure Web Services (ID-WSF 2.0)‏ Publish case studies of successful deployments (17 verticals)‏ EAP merger & Identity Assurance Framework public draft GSA joins those requiring Liberty Interoperable™ testing Concordia Project standards harmonisation demo at RSA openLiberty.org Web Services Client (Java) beta release Completed requirements for Strong Authentication (ID-SAFe)‏ Initiated Identity Governance Framework (IGF) specification Finalized Advanced Client specification for device provisioning Roger 04/17/08

Agenda Introduction State of the Market Levels of Assurance Assessment Criteria Process Conclusions Roger to Soren Peter

Issues Remain to be Solved World of identity is too complex for its own good….. Individuals and commercial entities need simplicity in achieving what they want to do securely, privately, and confidently In order to grow outside the enterprise—federate the federations—identity marketplace needs an open, scalable, trustworthy commercially viable solution Soren Peter for Global context Myisha for US view

The General Ecology Identity Reliance Identity Assertion Commercial Networks Financial Government Institutions Industry Employers Family/ Friends People, Entities, Machines More? Identity Reliance Identity Assertion Jane

Getting more complex all the time … The General Ecology Commercial Comm. Networks Financial Government Institutions Industry Employers Family/ Friends People, Entities, Machines More? Jane Getting more complex all the time …

There needs to be a Consistent & Clear Customer Experience Jane to Alex

Focus on Identity Assurance Alex 04/17/08

Identity Assurance Expert Group (IAEG)‏ 2007 formed Identity Assurance Expert Group (IAEG) designed to foster adoption of identity assurance services Initial contributions from EAP and U.S. E-Authentication Federation Objective is to create a framework of baseline policies, business rules and commercial terms against which identity assurance services can be assessed and certified Initial goal is to facilitate broad, uniform, interoperable, trusted identity federation practices across identity service providers – aka credential service providers (CSP’s) Desired result is operational streamlining of identity service provider certification and accreditation processes for entire industry Alex 04/17/08

Agenda Introduction State of the Market Levels of Assurance Assessment Criteria Process Conclusions Roger to Jane

IAF Assurance Levels Policy Overview Level of trust associated with a credential measured by the strength and rigor of the identity-proofing process; the inherent strength of the credential and the policy and practice statements employed by the CSP‏. Four Primary Levels of Assurance Level 1 – little or no confidence in asserted identity’s validity Level 2 – Some confidence Level 3 – High level of confidence Level 4 – Very high level of confidence Use of Assurance Level is determined by level of authentication necessary to mitigate risk in the transaction, as determined by the Relying Party (RP) CSPs are certified by Federation Operators (FO’s) to a specific Level(s)‏ Jane to Alex

IAF Assurance Levels in Detail Assurance level criteria as posited by the OMB M-04-04 and NIST Special Publication 800-63: Level 1 – (e.g. registration to a news website)‏ Satisfied by a wide range of technologies, including PINs Does not require use of cryptographic methods Level 2 – (e.g. change of address by beneficiary)‏ Single-factor remote network authentication Claimant must prove control of token through secure authentication protocol Level 3 – (e.g. online access to a brokerage account)‏ Multi-factor remote network authentication Authentication by keys through cryptographic protocol Tokens can be “soft”, “hard” or “one-time password” Level 4 – (e.g. distribution of controlled drugs)‏ Multi-factor remote authentication through “hard” tokens Transactions are cryptographically authenticated using keys bound to the authentication process

Assurance in Action Jane

Agenda Introduction State of the Market Levels of Assurance Assessment Criteria Process Conclusions Soren Peter / Myisha

IAF Service Assessment Criteria (SAC)‏ Common Organization SAC - The general business and organizational conformity of services and their providers Enterprise maturity; Information Security Mgmt; Operational Infrastructure, etc. Identity Proofing SAC - The functional conformity of identity proofing services Identity verification; Verification records Credential Management SAC - The functional conformity of credential management services and their providers Operating environment; Issuance; Revocation; Status Mgmt; Validation/Authentication Soren Peter / Myisha

Assurance level criteria as posited by the OMB M-04-04 and NIST Special Publication 800-63: Multi-factor auth; Cryptographic protocol; “soft”, “hard”, or “OTP” tokens Stringent criteria – stronger attestation and verification of records Stringent organizational criteria Access to an online brokerage account AL 3 Multi-factor auth w/hard tokens only; crypto protocol w/keys bound to auth process More stringent criteria – stronger attestation and verification Dispensation of a controlled drug or $1mm bank wire AL 4 Single factor; Prove control of token through authentication protocol Moderate criteria - Attestation of Govt. ID Moderate organizational criteria Change of address of record by beneficiary AL 2 PIN and Password Minimal criteria - Self assertion Minimal Organizational criteria Registration to a news website AL 1 Assessment Criteria – Credential Mgmt Assessment Criteria – Identity Proofing Assessment Criteria -- Organization Example Assurance Level Alex, back to Jane

Agenda Introduction State of the Market Levels of Assurance Assessment Criteria Process Conclusions

IAF Business Rules Focused on the use of credentials for authentication, initially targeting CSP’s Liberty Alliance Project (LAP) provides accreditation of assessors who will perform certification assessment Federation Operators will require LAP-accredited assessments IAF provides guidelines for how all involved parties (relying parties, CSP’s and Federation Operators) may work together LAP will maintain the Identity Assurance Framework and provide a current list of accredited assessors Myisha

IAF Certification Model Program for assessors to become accredited Provide candidate CSP’s with guidelines for certifying against IAF Enables Federation Operators to certify members against common industry framework and assessment practices Liberty Alliance to define and provide governance over accreditation process Phase one certification process is for CSP’s as defined in IAF Myisha

Agenda Introduction State of the Market Levels of Assurance Assessment Criteria Process Conclusions Roger to lead conclusion discussion

Roadmap Phase One of Certification Program for CSP’s/IDP’s, ratified in Identity Assurance Framework v1.0 FINAL (Q2 2008)‏ Launch Accreditation Program to enable the Certification model and spur the market (Mid-2008)‏ Introduce IAF Suite – documentation to support IAF Scope and define Phase 2 IAF Version 2.0 to focus on Federation Operators (begins Q3 2008)‏ Best Practices / Usage Guidelines document for Relying Parties 04/17/08

References (Contributions to IAF standard) EAP Trust Framework: http://eap.projectliberty.org/docs/Trust_Framework_010605_final.pdf OMB e-Authentication Guidance (OMB M-04-04): http://www.whitehouse.gov/omb/memoranda/fy04/m04-04.pdf NIST Special Publication 800-63 Version 1.0.1: http://csrc.nist.gov/publications/nistpubs/800-63/SP800-63V1_0_2.pdf Authentication Service Component Interface Specifications: http://www.cio.gov/eauthentication/documents/TechApproach.pdf GSA Credential Assessment Framework, Password CAP, Certificate CAP and Entropy Spreadsheet: http://www.cio.gov/eauthentication/documents/PasswordCAP.pdf Tscheme http://www.tscheme.org/profiles/index.html TSCP http://tscp.org/about.htm

Getting Involved Liberty Alliance Identity Assurance Expert Group (Liberty Alliance membership is required)‏ http://www.projectliberty.org/liberty/membership/become_a_member Identity Assurance Special Interest Group (Liberty Alliance membership is not required)‏ http://wiki.projectliberty.org/index.php/IASIG Identity Assurance Framework for Review and Comment http://www.projectliberty.org/liberty/content/download/3736/24651/file/liberty -identity-assurance-framework-v1.0.pdf

Thank You Any Questions? Please get involved!