NZ igovt/RealMe proposed consent service: overview Kantara eGov Working Group April 8 th 2013 CROWN COPYRIGHT © This work is licensed under the Creative.

Slides:



Advertisements
Similar presentations
Lousy Introduction into SWITCHaai
Advertisements

© 2006 Open Grid Forum Network Services Interface Introduction to NSI Guy Roberts.
From Identity and Authentication ‘point solutions’ to SOA and ESB – ‘NZ Gov’ IdM Architectural Thinking: Five Years On.
© State Services Commission, 2006 Authentication to access government services What might the future hold? Laurence Millar Deputy Commissioner Information.
AUTHENTICATION AND KEY DISTRIBUTION
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Appropriate Access InCommon Identity Assurance Profiles David L. Wasley Campus Architecture and Middleware Planning workshop February 2008.
Operating System Security
A brief look at the WS-* framework Josh Howlett, JANET(UK) TF-EMC2 Prague, September 2007.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
Authentication & Kerberos
1 Security Assertion Markup Language (SAML). 2 SAML Goals Create trusted security statements –Example: Bill’s address is and he was authenticated.
1 Trust Framework Portable Identity Schemes Trust Framework Portable Identity Schemes NIH iTrust Forum December 10, 2009 Chris Louden.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
Mashing Up with User-Centric Identity America Online LLC John Panzer, Praveen Alavilli.
Government Online – White Paper Companion – Copyright © 2007 Credentica Inc. All Rights Reserved. This presentation is animated. Press the “space bar”
Beispielbild Shibboleth, a potential security framework for EDIT Lutz Suhrbier AG Netzbasierte Informationssysteme (
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
OpenID And the Future of Digital Identity Alicia Bozyk April 1, 2008.
Business Driven Technology Unit 2 Exploring Business Intelligence Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
July 25, 2005 PEP Workshop, UM A Single Sign-On Identity Management System Without a Trusted Third Party Brian Richardson and Jim Greer ARIES Lab.
Proposed Whole of Government Direction for ICT Functional Leadership Workshop for monitoring departments 28 November 2013 John Roberts
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
UMA Could I Manage My Own Data. Please?. Agenda Business Trends & Technical Solutions Distributed Business (Decentralisation) Mobility & Automation Delegation.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
Identity Management Report By Jean Carreon and Marlon Gonzales.
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Shib-Grid Integrated Authorization (Shintau) George Inman (University of Kent) TF-EMC2 Meeting Prague, 5 th September 2007.
GC Credential Management Evolution for the OASIS/World Bank eGov Workshop 17 th April, 2009For information, please contact:
OpenPASS Open Privacy, Access and Security Services “Quis custodiet ipsos custodes?”
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Session ID: Session Classification: Dr. Michael Willett OASIS and WillettWorks DSP-R35A General Interest OASIS Privacy Management Reference Model (PMRM)
(Business) Process Centric Exchanges
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Ning Zhang, the University of Manchester, UK David Groep, National Institute for Nuclear and High Energy Physics, NL Blair Dillaway, OGF Security Area.
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
Ian Bailey Director Application Architecture Office of CIO, Province of BC A User Centric and Claims Based Architecture for British Columbia.
Shibboleth: An Introduction
Internet2 Middleware Initiative Shibboleth Ren é e Shuey Systems Engineer I Academic Services & Emerging Technologies The Pennsylvania State University.
SSO Case Study Suchin Rengan Principal Technical Architect Salesforce.com.
Scenario w/ WS-Federation to SAML 2.0 interop challenge for Danish public sector The following slides illustrates in a basic manner the technical/security.
Access Management 2.0: UMA for the #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 1.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Creating a European entity Management Architecture for eGovernment Id GUIDE Keiron Salt
Security Hannes Tschofenig. Goal for this Meeting Use the next 2 hours to determine what the security consideration section of the OAuth draft(s) should.
BE-com.eu Brussel, 26 april 2016 EXCHANGE 2010 HYBRID (IN THE EXCHANGE 2016 WORLD)
Service Organization Control Reports What Have We Learned? Chris Bruhn DIRECTOR, IT RISK SERVICES, BKD, LLP SAS 70 ENDS EXIT TO SSAE 16.
Connected Identity & the role of the Identity Bus Prabath Siriwardena Director of Security Architecture WSO2.
Identity Management Overview
Access Policy - Federation March 23, 2016
Cryptography and Network Security
Tokens & Proofing De-Mystified
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Chemical Purchasing.
Example Use Case for Attribute Authorities and Token Translation Services - the case for eduGAIN Andrea Biancini.
SDMX IT Tools SDMX Registry
Presentation transcript:

NZ igovt/RealMe proposed consent service: overview Kantara eGov Working Group April 8 th 2013 CROWN COPYRIGHT © This work is licensed under the Creative Commons Attribution 3.0 New Zealand licence. In essence, you are free to copy, distribute and adapt the work, as long as you attribute the work to the Crown and abide by the other licence terms. To view a copy of this licence, visit Please note that no departmental or governmental emblem, logo or Coat of Arms may be used in any way which infringes any provision of the Flags, Emblems, and Names Protection Act Attribution to the Crown should be in written form and not by reproduction of any such emblem, logo or Coat of Arms.

BACKGROUND TO NZ’S IGOVT/REALME In New Zealand, the logon service has been in production since April 2007 and now provides citizens with federated pseudonymous authentication using SAML integration for about 40 different government service providers with about ¾ of a million users (17% of pop) and set to grow rapidly as IRS and SSA complete integrations in Separate from the logon service, the identity verification service provides a complementary online assertion of identity from authoritative government documents. Recent legislation permits the identity verification service to progress from pilot to full implementation for use by both the government and private sectors. Privacy legislation in New Zealand prohibits any unique identifier to be shared across organisations to link a citizen’s record at one agency with their record. Furthermore, two agencies may only share information where legislation permits the specific exchange, unless the individual explicitly provides consent for the information to be shared. These privacy principles are fundamental to the design of the logon service which maintains a separate pseudonymous identifier - a federated logon tag (FLT) for each service provider – i.e. each privacy domain. When an online business service needs to information from another organisation to fulfil the user’s service request, it becomes more challenging to extend the authentication while meeting the relevant privacy constraints. For more complex scenarios, reliance on browser redirects between service providers can become impractical as it relies on a continuous browser session.. This cross-agency online service objective has been achieved by a combination of browser and web services to maintain an extended authentication context management service (referred to as iCMS) that utilises a security token service based on WS-Trust messaging and SAML tokens. This stands in contrast what we understand the UK does – using SAML front channel. Each transaction between one service provider and another needs to be based on a user-centric flow that obtains consent for sharing any personal identity attributes. When the circle of trust extends to more than two service providers, or combines multiple identity attribute providers (IAPs), finding the means to obtain, store and access information sharing conditions and users’ consents becomes problematic. To address this need, we are implementing a centralised consent service. The consent service will provide three functions – a central repository of sharing terms (i.e. content of the sharing label), an archive of current and historical consents, and the ability to issue and validate consent tokens.

NZ igovt services (with the forthcoming RealMe ‘refresh’). Confirms that this is the same dog/person/entity as last interaction CONSISTENCY Other providers to come (if needed) identity assurance services login Service (currently igovt logon) Client has confidence in user’s identity (in advance of applying authz policy) Authentication is separated from identity and authorization Confirms the identity of the person wishing to use the client site UNIQUENESS IVS AVS

The upcoming design further separates the logon service, from assertion, and adds a consent service (discreet cloud services?)

Snapshot: The igovt logon service What it does: pseudonymous logon management (the FLT), carries no PI, designed in privacy.

Snapshot: The igovt identity verification service (customer view)

The notion of a privacy framework with a consent service:

Consent tokens (We are still working on the definition and design of the consent token concept). For the first iteration of the consent service, the consent token may be no more than a means to refer to a consent event recorded by the consent service. To comply with the New Zealand privacy principles we need to ensure that this reference cannot be used as a unique identifier to subsequently link a person across the privacy domains of two different service providers (RPs). In subsequent iterations, we anticipate that a consent token issued by the consent service will be something like a SAML authentication token or attribute assertion. It will provide sufficient information to the RPs or identity attribute providers (IAPs) in an information sharing exchange that allows them to determine not only if the user has provided consent, but that the key agreed sharing conditions for the exchange have been satisfied. While the label directly addresses the ability of the user to provide informed consent, we would like to see the approach cater for the ‘transformation’ of the key sharing terms so that these can be subsequently accessible by any of the downstream systems or organisations involved in multi-party business transactions.

The notion of a creative commons license * A thought for the next phase: The notion of a creative commons license * Example: Minimal – No Share – Single Transaction (min-no-1 license) It can be graphical:

Igovt/RealMe consent service - UX and Screen flow