Seven Perspectives on CardSpace Ronny Bjones Security Strategist Microsoft Corporation.

Slides:



Advertisements
Similar presentations
Identity Network Ideals – Heterogeneity & Co-existence
Advertisements

.NET Technology. Introduction Overview of.NET What.NET means for Developers, Users and Businesses Two.NET Research Projects:.NET Generics AsmL.
Hello i am so and so, title/role and a little background on myself (i.e. former microsoft employee or anything interesting) set context for what going.
Smartphone-based authorization system Advisor: Dr. Wenjun Zeng - Professor Presenter: Yilihamujiang, Ailiyasijiang Zhou, Guanlong Al-Sinani, H. S. (2011).
Advances in Digital Identity
Ljubomir Ivaniš CPU d.o.o.
 Jan Alexander Program Manager Microsoft Corporation BB43.
InfoCard and the Identity Metasystem Kim Cameron, Chief Architect of Identity Microsoft.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
11 steve plank (“planky”) identity architect microsoft uk.
Windows CardSpace and the Identity Metasystem Glen Gordon Developer Evangelist, Microsoft
Infocard and Eduroam Enrique de la Hoz, Diego R. L ó pez, Antonio Garc í a, Samuel Mu ñ oz.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
By: Ansuya Chauhan.
.NET Framework V3.0 Mike Taulty Developer & Platform Group Microsoft Ltd
Higgins 1: A species of Tasmanian long-tailed mouse 2: An open source identity framework being developed at the Eclipse Foundation.
Infocard support in simpleSAMLphp Enrique de la Hoz, Diego R. L ó pez, Antonio Garc í a, Samuel Mu ñ oz.
T Network Application Frameworks and XML Service Federation Sasu Tarkoma.
1 Higgins 1: a species of Tasmanian long-tailed mouse 2: the name of an open source collaboration of IBM, Novell, Oracle, Parity…
 Lynn Ayres Program Manager Identity Services  Tore Sundelin Program Manager Identity Services BB29.
© 2009 The MITRE Corporation. All rights Reserved. April 28, 2009 MITRE Public Release Statement Case Number Norman F. Brickman, Roger.
The Laws of Identity and Cardspace Charles Young Solidsoft.
Mario Szpuszta Solutions Architect Microsoft Austria, Vienna.
CertAnon A Proposal for an Anonymous WAN Authentication Service David Mirra CS410 January 30, 2007.
A claims-based Identity Metasystem
Design Choices Underlying the Identity Metasystem Proposal Kim Cameron and Mike Jones Microsoft.
Christian Paquin May 1 st, 2007 Identity Management Techniques – CFP 2007 Tutorial – Copyright © 2007 Credentica Inc. All Rights Reserved.
An Introduction to Information Card Barry Dorrans Charteris plc
Matt Steele Senior Program Manager Microsoft Corporation SESSION CODE: SIA326.
Policy, Trust and Technology Mitigating Risk in the Digital World David L. Wasley Camp 2006 © David L. Wasley, 2006.
IA: Week 1 Trust & Threats Trust Models Threats and Vulnerabilities Threat Profiles.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Phishing Rising to the challenge Amy Marasco Microsoft.
Who are you? From Directories and Identity Silos to Ubiquitous User-Centric Identity Mike Jones, Microsoft and Dale Olds, Novell.
A Claims Based Identity System Steve Plank Identity Architect Microsoft UK.
Windows Azure Dave Glover Developer Evangelist Microsoft Australia Tel:
Workgroup Discussion on RESTful Application Programming Interface (API) Security Transport & Security Standards Workgroup January 12, 2014.
ArcGIS Server and Portal for ArcGIS An Introduction to Security
Slide 1 ASP Authentication There are basically three authentication modes Windows Passport Forms There are others through WCF You choose an authentication.
© 2008 by Matt Flaherty & Mary Ruddy; made available under the EPL v1.0 Security & Identity : From present to future Matt Flaherty, IBM Mary Ruddy, Meristic.
Windows CardSpace Martin Parry Developer Evangelist Microsoft
Privacy in Cloud Computing Identity Management System for Cloud Microsoft CardSpace Purdue University.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
ITS – Identity Services ONEForest Security Jake DeSantis Keith Brautigam
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Session: MIX09-T27F. Web Developers Customizable identity UX Single Sign On Access to user data ISVs Federation for selling their applications to organizations.
Wireless and Mobile Security
Web Services Security Patterns Alex Mackman CM Group Ltd
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Linus Joyeux Valerie Alonso Managing consultantLead consultant blue-infinity (Switzerland) Active Directory Federation Services v2.
Introduction to.NET FX 3.0 (+ sneak preview of.NET FX 3.5) Martin Parry Developer & Platform Group Microsoft Ltd
.NET Framework Enterprise. Agenda WCF Overview WCF Solutions WF Overview WF Solutions Card Spaces Bringit it all together: Dinner Now Scenario.
CERN IT Department CH-1211 Genève 23 Switzerland t Single Sign On, Identity and Access management at CERN Alex Lossent Emmanuel Ormancey,
Windows CardSpace™ Adlai Maschiach Senior Consultant
Copyright © 2007 Microsoft Corporation. All Rights Reserved. Claims-based Identity Beyond Identity Silos 1st European Identity Conference 2007 Don Schmidt.
Identity and Access Management
Secure Connected Infrastructure
Microsoft Passport and Windows Hello Developer’s Guide to Windows 10 Build SDK Update Andy Wigley
Introduction to Windows Azure AppFabric
Federation Systems, ADFS, & Shibboleth 2.0
Data and Applications Security Developments and Directions
SaaS Application Deep Dive
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
An Identity on the Internet
Security & .NET 12/1/2018.
Building "One Size Fits All" Identity Systems Possible or Fantasy
Martin Parry Developer Evangelist Microsoft
Presentation transcript:

Seven Perspectives on CardSpace Ronny Bjones Security Strategist Microsoft Corporation

The Laws of Identity The original research 1. User control and consent 2. Minimal disclosure for a defined use 3. Justifiable parties 4. Directional identity 5. Pluralism of operators and technologies 6. Human integration 7. Consistent experience across contexts Join the discussion at

Seven Perspectives on CardSpace 1. Component of the identity metasystem 2. Abstraction layer for authentication technologies 3. Anti-phishing technology 4. User convenience 5. Security 6. Privacy 7. Development Framework

Perspective #1 CardSpace as a component of the Identity Metasystem The need of an identity layer on the Internet The need of an identity layer on the Internet Interoperability Interoperability Technology & Platform independence Technology & Platform independence

The Identity Metasystem Internet Services Partners Customers Identity Metasystem Extending the Reach of Information Workers Extending the Reach of Applications WS-* Web Services Architecture

WS-* Based Metasystem Internet Claim Source Enterprise Claim Source App-specific Claim Source Service 3. Obtain claims (WS-Trust) 1. Read policy (WS-MetadataExchange,WS-SecurityPolicy) 2. Select source, consent to disclosure (UX)

Framework for Interoperability TCP/IP of Identities Defined on open standards – WS* Extended by CardSpaces definition of CLAIMS 464c-4961-a934-d47f91b66228/infocard-techref-beta2- published.pdf 464c-4961-a934-d47f91b66228/infocard-techref-beta2- published.pdf CardSpace is security token agnostic SAML, Kerberos, X.509, custom Identity Providers can bridge different identity silos Multiprotocol Federation Interoperability Demonstration Burton Group – Gerry Gebel - November 1th 2005

Protocol Drill Down Identity Provider (IP) Relying Party (RP) Client Client would like to access a resource RP provides identity requirements: format, claims & issuer of security token 1 2 User 3 Client shows which of known IPs can satisfy requirements User selects an IP 4 5 Request to IP Security Token Service for security token providing user credentials 6 IP generates security token based on RPs requirements with display token and proof of possession for user 7 User views display token and approves the release of token 8 Token is released to RP with proof of possession RP reads claims and allows access

Protocol Drill Down Identity Provider (IP) Relying Party (RP) Client Client would like to access a resource RP provides identity requirements: format, claims & issuer of security token 1 2 User 3 Client shows which of known IPs can satisfy requirements User selects an IP 4 5 Request to IP Security Token Service for security token providing user credentials 6 IP generates security token based on RPs requirements with display token and proof of possession for user 7 User views display token and approves the release of token 8 Token is released to RP with proof of possession RP reads claims and allows access

Contains claims about my identity that I assert Not corroborated Stored locally Signed and encrypted to prevent replay attacks Provided by banks, stores, government, clubs, etc Locally stored cards contain metadata only! Data stored by Identity Provider and obtained only when card submitted CardSpace Cards SELF - ISSUEDMANAGED

Platform & Technology Independent Third-party support for Firefox Information Card support on MAC-Safari Open Source Initiatives Higgens Trust Framework Project

Perspective #2 CardSpace as an abstraction layer for authentication mechanisms Orchestrate the dead of the password Orchestrate the dead of the password Multi-factor Authentication Multi-factor Authentication

Root Causes of e-Identity Theft Lack of Awareness Vulnerabilities/ Spyware Weak foundation provided by password systems Admin password Admin.R386W 992 Days After Product Release 87 Released 11/29/2000 Released 09/28/

Abstraction Layer

eID Cards Microsofts support Enterprise Scenarios Consumer Scenarios

Perspective #3 CardSpace as an anti-phishing technology Move away from ID/Passwords Move away from ID/Passwords Human integration Human integration

How to remember all these passwords?

Identity Crisis The Internet is a dangerous place! Identity theft, spoofing, phishing, phraud, malware Username + password is weak and overwhelmed Poor choice Poor management Poor (re-)use How do we safely, reliably identify a site to a user… …and a user to a site? Good phishing sites fooled 90% of participants - Harvard

Human Integration A simple, consistent, secure way to represent identity Support cryptographic verifiable, yet user-friendly Security Tokens

Wallet Metaphor A set of claims someone makes about me Claims are packaged as security tokens Many identities for many uses Useful to distinguish from profiles

Windows CardSpace Enables federated claims-based identity Lingua franca for identity, roles & attributes that builds on EID Any identity/service provider can integrate using public WS-* protocols Identity provider support for: Windows Server with Active Directory PingID for Linux, UNIX, Apache, others More to come… New credential common dialog One-click login Streamlines user registration Mitigates some common attack vectors (e.g. phishing) Additional privacy benefits

Perspective #4 CardSpace as a user convenience technology

Demo

Perspective #5 CardSpace as a security technology Move away from ID/Passwords Move away from ID/Passwords Secure Desktop integration Secure Desktop integration

Windows CardSpace Easier Provides consistent user experience Replaces usernames and passwords with strong tokens Safer Protects users from phishing & phraud attacks Support for two-factor authentication Tokens are crypto- graphically strong Standards, standards, standards!! Built on WS-* Web Services Protocols Can be supported by websites on any technology & platform

Secure CardSpace Environment Runs under separate desktop and restricted account Isolates CardSpace runtime from Windows desktop Deters hacking attempts by user-mode processes

Perspective #6 CardSpace as a privacy enhancing technology User control on revealing identity information User control on revealing identity information No unique identifiers No unique identifiers Fine-grained Claims – mandates & identity attributes Fine-grained Claims – mandates & identity attributes

Many privacy concerns with existing identity systems Microsoft Passport The systems reveal too much privacy-related information Linkability of transactions because of unique identifier (e.g. public keys)

Privacy attributes of CardSpace The user controls which data to reveal to the relying party No need for the relying party to copy all privacy related information A different identifier used for each relying party Allows for fine-grained identity attributes E.g. Claim (Subject above 18)

Perspective #7 CardSpace as a development framework Integration into.NET Framework 3.0 Integration into.NET Framework 3.0 IE7 Integration IE7 Integration Easy integration Easy integration

.NET At The Core XP XP Vista Vista W2k3 W2k3

Building a Relying Party Four key tasks Update user database Create an association page Update the sign in page Update the registration page Examples here in ASP.NET 2.0 But can be done in PHP/Java/PERL/etc. if required

Create an association page Update account with your Information Card <param name="tokenType" value="urn:oasis:names:tc:SAML:1.0:assertion"> <param name="issuer value=" <param name="requiredClaims" value="

Update the sign in page Sign in with your Information Card <param name="tokenType" value="urn:oasis:names:tc:SAML:1.0:assertion"> <param name="issuer value=" <param name="requiredClaims" value="

Update the registration page Register with your Information Card <param name="tokenType" value="urn:oasis:names:tc:SAML:1.0:assertion"> <param name="issuer value=" <param name="requiredClaims" value="

Seven Perspectives on CardSpace 1. Component of the identity metasystem 2. Abstraction layer for authentication technologies 3. Anti-phishing technology 4. User convenience 5. Security 6. Privacy 7. Development Framework

Resources Windows Vista Security CardSpace

© 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.