Certificate Authorities - Commercial Options Robert Brentrup Educause/Dartmouth PKI Summit July 26, 2005.

Slides:



Advertisements
Similar presentations
Single Sign-On with GRID Certificates Ernest Artiaga (CERN – IT) GridPP 7 th Collaboration Meeting July 2003 July 2003.
Advertisements

Digital Certificate Installation & User Guide For Class-2 Certificates.
SSL Implementation Guide Onno W. Purbo
 1997 Entrust Technologies Orchestrating Enterprise Security Entrust Public Key Infrastructure Erik Schetina Chief Technology Officer IFsec, LLC
1 PK-Enabling Toolkits August 27, CSOS Interfaces STATUS CHECKING Network Interface: HTTP Port 80 PKI Interface: PKCS 10 Request PKCS 7 Response.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
Windows Vista And Longhorn Server PKI Enhancements Avi Ben-Menahem Lead Program Manager Windows Security Microsoft Corporation.
Dartmouth PKI Deployment Robert Brentrup PKI Summit July 14, 2004.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
The PKI Lab at Dartmouth. Dartmouth PKI Lab R&D to make PKI a practical component of a campus network Multi-campus collaboration sponsored by the Mellon.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
X.509 at the University of Michigan CIC-RPG Meeting June 7, 1999 Kevin Coffman Bill Doster
Optinuity Confidential. All rights reserved. C2O Configuration Requirements.
About PKI Key Stores Dartmouth College PKI Lab. Key Store Defined Protected “vault” to hold user’s private key with their copy of their x.509 certificate.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Tripwire Enterprise Server – Getting Started Doreen Meyer and Vincent Fox UC Davis, Information and Education Technology June 6, 2006.
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.
Configuring Active Directory Certificate Services Lesson 13.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Page Copyright Giritech A/S an – Excitor company.
1 Digital Credential for Higher Education John Gardiner August 11, 2004.
VDA Security Services Freeware Libraries Update IETF S/MIME WG 29 March 2000 John Pawling J.G. Van Dyke & Associates (VDA), Inc;
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Digital Certificates With Chuck Easttom. Digital Signatures  Digital Signature is usually the encryption of a message or message digest with the sender's.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
E.halFILE 2.2 New Application Features Session II.
1 PKI Update September 2002 CSG Meeting Jim Jokl
Security Directions - Release 6 and beyond SearchDomino.com Webcast Patricia Booth Security and Directory Product Management 9/25/02.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
S/MIME Freeware Library IETF S/MIME WG 13 December 2000 Getronics Government Solutions.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Configuring Directory Certificate Services Lesson 13.
Certificate revocation list
Communications-Electronics Security Group. PKI interoperability issues for UK Government Richard Lampard
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
® Gradient Technologies, Inc. Inter-Cell Interworking Access Control Across the Boundary Open Group Members Meeting Sand Diego, CA USA April 1998 Brian.
Dartmouth PKI Update Robert Brentrup Internet2 Member Meeting April 21, 2004.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
PKI Activities at Virginia September 2000 Jim Jokl
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
Jens G Jensen UK e-Science Alternative CA software Jens G Jensen UK e-Science CA Rutherford Appleton Laboratory.
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Creating and Managing Digital Certificates Chapter Eleven.
Some Technical Issues in PKI Deployment David Chadwick
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Exploring Access to External Content Providers with Digital Certificates University of Chicago Team Charles Blair James Mouw.
SCEP Simple Certificate Enrollment Protocol.
CERN Certificates platform Emmanuel Ormancey / Anatoly Gladkov
Public Key Infrastructure from the Most Trusted Name in e-Security
CLASP Project AAI Workshop, Nov 2000 Denise Heagerty, CERN
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
September 2002 CSG Meeting Jim Jokl
Presentation transcript:

Certificate Authorities - Commercial Options Robert Brentrup Educause/Dartmouth PKI Summit July 26, 2005

Current Commercial CA Products Sun iPlanet / AOL-Netscape –=> RedHat Certificate Server, LDAP RSA Certificate Manager (formerly Keon) Entrust Authority CyberTrust Unicert –(formerly Betrusted) (formerly Baltimore) Microsoft Certificate Services Spyrus PKI System 6.0 Oracle Application Server Certificate Authority

Related Services and Products CA Services –Verisign –Identrus/DST –Geotrust –Entrust –RSA –CyberTrust OCSP –Corestreet –Computer Associates (CA)

PKI Components CA server LDAP (or DAP) directory server Database for CA records RA function Client/application software support

Basic Requirements Supported software (OS) and hardware PKCS standards supported? Interoperability with other PKIs CA hardware key storage support –what FIPS Level rating? –PKCS#11 and proprietary

CA hardware key storage nCipher –(FIPS Level 3) Safenet –(FIPS Level 2, 3) –(Data Key and Rainbow Tech subsidiaries –(Rainbow Tech bought Chrysalis) AEP Networks –Keyper (FIPS Level 4) Spyrus –LYNK (PCMCIA, USB) –Fortezza (PCMCIA)

Key Features 1 Key sizes and types –at least 1024, >4096? RSA, DSA, Elliptic Curve Dual key certificates? Certificate profiles –prebuilt and customizable? –vendor key extensions? Naming support: X.500, DC naming LDAP chaining or referrals, X500, Active Directory CRLs and/or OCSP

Key Features 2 RA functions: online or off-line, self service User interface for CA and RA operators –Web Page or vendor software? Key escrow and recovery –How much operator intervention required? Record keeping (who has how many certs) and notifications (reminder of certs that need to be renewed) functionality

Key Features 3 Interoperability with applications –Browser SSL, secure mail, signed documents, VPN, 802.1x EAP/TLS –OS smart card signon (MS requires special OIDs) Client interface: Web Browser or vendor software –CSPs for MS IE Client key storage –OS key store, PKCS#12 files, Vendor software, hardware tokens and smartcards

Key Features 4 Issue server certificates –request types supported PKCS#10, CRMF. SPKAC(Netscape), PKIX CMP, SCEP CA can be interconnected with other PKIs –can be signed by recognized root certificates (some vendors own well known roots) –can cross certify

Prices In general a wide range, but decreasing Models are either per seat or per certificate –per seat is important if your organization has a large turnover of individuals (like a graduating class) though the number of individuals may be relatively constant Personal –$100 to $1 per seat –$70 to $7 per cert Server $50 - $1000 Other costs: annual maintenance or additional certificates

Netscape-AOL-Sun-Redhat (formerly iPlanet CMS) uses SunOS or Windows web browser client interface (inherently cross platform RA can be adapted to self service model Chrysalis, nCipher CA key storage standard LDAP, uses LDAP for internal DB Low cost per seat RedHat Certificate Server: Open Source, runs on Linux too

RSA Keon Platform: Solaris 8-9 or Windows Integrated LDAP certificate repository Publishes to LDAP v2/v3 and X.500 Directories Origin of PKCS standards Up to 2048-bit keys for authentication X.509 CRLs and CRLs with extensions Unlimited sub-CA certificate chaining RSA, DSA, ECDSA FIPS level 1 through 3 key security (via nCipher and/or other PKCS#11 devices)

Entrust Authority client software/keystore (windows only) automatic key update, multiple key pairs per user Attribute Authority X.500 or LDAP, Algorithm Support –RSA, DSA, ECDSA signing, DES, 3-DES, CAST, RC- 2 Compatible, RC-4 Compatible, Elliptic Curve Cryptographic (ECC) signing, IDEA

Entrust: Security Manager Platforms: –Compaq Tru64 (Oracle database) –Microsoft® Windows NT® 4.0 (Informix database) –Microsoft® Windows® 2000 Server (Informix database) –Sun® Solaris® 7 and 8 (Informix or Oracle database) –HP® - UX® 11.0 (Informix database) –IBM® AIX® (Informix database)

CyberTrust (formerly baltimore) Solaris 8, Windows XP, Windows 2003 Server and Windows 2000 Supports RSA (up to 4096 bits), DSA and Elliptic Curve DSA (ECDSA) key pairs Active Directory and LDAPv3 publishing OCSP, CRLs, Oracle DB

Microsoft Certificate Services Component of Windows 2003 server –(NT/2000 Certificate Server 1.0, 2.0) Integrated with Active Directory and Windows CAPI (OS and IE) Part of server site licensing (with AD) Added more features with new versions

Spyrus Platform: Windows NT and 2000 –Uses IIS, IE, Exchange and SQL Server as some of its infrastructure components Value-add Windows Server Certificate Services and Active Directory Integrated with Active Directory and Windows CAPI Attribute Authority for privilege management Distributed RA LYNK key hardware End user smart token management Windows smart card login support

Dartmouth PKI Implementation: Commercial CA Software (Sun/iPlanet) Sun 250 server Single Online CA Server Hardware Key Storage Dedicated Firewall Publishes CRLs and provides OCSP LDAP Directory Maintained from Institutional Systems SIS, HR, Sponsored Guests Automated Addition and Deletion CA Publishes Certificates and CRLs to LDAP

Dartmouth PKI RA User Enrollment Key Generation by Web Browser –Internet Explorer and Netscape/Mozilla –Cross platform Software or Token Key and Certificate Storage LDAP authorization, self-service for SW certs

Dartmouth PKI Timeline Planning late 2001 Staffing Jan - April 2002 HW/SW Acquisition began Feb 2002 CA Installation began June 2002 Test CA available Sept 2002 Production CA available Jan 2003 First Applications –Library Jun 2003, Banner Aug 2003

Product Links Netscape/AOL/iPlanet Certificate Server: RSA Certificate Manager: Entrust Authority: infrastructure/index.htm Spyrus PKI System : Oracle Application Server Certificate Authority: CyberTrust Unicert: Oracle Application Server Certificate Authority:

Company Links RSA: Entrust: CyberTrust: Spyrus: Microsoft: Oracle: Computer Associates: Verisign: Identrus/DST: Geotrust: