Identity Assurance at Virginia Tech CSG January 13, 2010 Mary Dunker

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

Appropriate Access InCommon Identity Assurance Profiles David L. Wasley Campus Architecture and Middleware Planning workshop February 2008.
Overview of US Federal Identity Management Initiatives Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO E-Authentication, NIH.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Digital Certificate Installation & User Guide For Class-2 Certificates.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
NMFS FIS ER eSignature Project Risk Analysis October 1, 2008.
Public Key Infrastructure (PKI) Hosting Services.
Federal Identity Management
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Department of Labor HSPD-12
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
Lecture 23 Internet Authentication Applications
1 Enabling Open Government Using the OIDF/ICF Open Trust Framework OASIS Identity Management 2009 September 29, 2009 Don Thibeau, ED, OpenID Foundation.
U.S. Environmental Protection Agency Central Data Exchange EPA E-Authentication Pilot NOLA Network Node Workshop February 28, 2005.
1 Trust Framework Portable Identity Schemes Trust Framework Portable Identity Schemes NIH iTrust Forum December 10, 2009 Chris Louden.
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
FIT3105 Smart card based authentication and identity management Lecture 4.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Mary Dunker Common Solutions Group January 12, 2010.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
User Authentication Recommendations Transport & Security Standards Workgroup December 10, 2014.
Intra-ASEAN Secure Transactions Framework Project Progress Report
Identity Management and PKI Credentialing at UTHSC-H Bill Weems Academic Technology University of Texas Health Science Center at Houston.
Rural Development Department Government of Tripura Venue: Conference Hall #1, Pragna Bhawan, Gorkhabasti Date: 7 th March, 2014.
I DENTITY M ANAGEMENT Joe Braceland Mount Airey Group, Inc.
Web Application Authentication with PKI & Other Functions Bill Weems & Mark B. Jones Academic Technology University of Texas Health Science Center at Houston.
Virginia Tech Overview of Tech Secure Enterprise Technology Initiatives e-Provisioning Group Frank Galligan Fed/Ed.
Copyright Copyright Ian Taylor This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Who Are You? Leveraging PKI for Digital Signatures at Virginia Tech Mary Dunker Educause Security Professionals Conference 2008 May 4, 2008
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Privacy and Security Tiger Team Meeting Discussion Materials Today’s Topic Recommendations on Trusted Identities for Providers in Cyberspace August 20,
NMFS FIS ER eSignature Project Risk Analysis October 1, 2008.
Copyright © 2008, CIBER Norge AS 1 Using eID and PKI – Status from Norway Nina Ingvaldsen and Mona Naomi Lintvedt 22 nd October 2008.
Electronic Submission of Medical Documentation (esMD) Digital Signature and Author of Record Pre-Discovery Wednesday May 9,
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Identity Management Practical Issues Associated with Sharing Federated Services UT System Identity Management Federation William A. Weems The University.
1 Personal Digital Certificates at Virginia Tech: Who Are You? Mary Dunker Internet-2 December 4, 2006
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
How Can NRCS Clients Use the Conservation Client Gateway
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Levels of Assurance in Authentication Tim Polk April 24, 2007.
Ning Zhang, the University of Manchester, UK David Groep, National Institute for Nuclear and High Energy Physics, NL Blair Dillaway, OGF Security Area.
Privacy and Security Tiger Team Meeting Discussion Materials Today’s Topic Recommendations on Trusted Identities for Providers in Cyberspace August 6,
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
NIST E-Authentication Technical Guidance Bill Burr Manager, Security Technology Group National Institute of Standards and Technology
E-Authentication Overview & Technical Approach Scott Lowery Technical Track Session.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
U.S. Department of Agriculture eGovernment Program eAuthentication Initiative eAuthentication Solution Screens Review Meeting October 7, 2003.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
LoA In Electronic Identity Jasig Dallas Levels of Assurance In Electronic Identity Considerations for Implementation Benjamin Oshrin Rutgers University.
How Can NRCS Clients Use the Conservation Client Gateway
Preparing For An InCommon Silver Audit – Lessons From the First Phase
Federated Identity Management at Virginia Tech
Authentication.
Installation & User Guide
Secure Enterprise Technology Initiatives e-Provisioning Group
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Technical Approach Chris Louden Enspier
Copyright Copyright Ian Taylor This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Installation & User Guide
Appropriate Access InCommon Identity Assurance Profiles
Presentation transcript:

Identity Assurance at Virginia Tech CSG January 13, 2010 Mary Dunker

Background 2008 Board of Visitors Resolution on increasing administrative efficiencies through expansion of automated systems and enhanced security charged Vice Presidents to develop a plan to continue to automate the University’s administrative systems utilizing modern information technology processes and security tools to gain process efficiencies. 2

Automating Processes Involves Personal digital identities Decisions on the part of sponsors of automated electronic systems, applications Integration – secure authentication 3

Requirement Ability to determine, with some level of certainty, that the person presenting themselves in an online transaction is who they say they are. Identity Assurance 4

VT Enterprise Personal Digital Identities Guest accounts – little or no assurance in identity Personal Identifier (PID), Active Directory account, Oracle ID – some assurance in identity. Personal Digital Certificate (PDC) on eToken – 2-factor, high assurance in identity 5

Identity Proofing, Issuing Credentials Guest accounts – guest is invited via e- mail to create ID PID – issued remotely; user answers questions based on information in university data base. Identity proofing part of admission or hiring process. PDC – issued in person, requires PID, government-issued photo IDs. 6

PDC Issued on Aladdin eToken, certified at FIPS level 2. Tamper-resistant Private key cannot be exported off eToken Face-to-face identity verification; 2 government- issued photo Ids; must match information in our Enterprise Directory 2-person issuance process (RAA and CAA) Available to all employees Enabled for authentication and digital signature Employee signs agreement not to share 7

Standard/Guidance for Sponsors Office of Management Budget M-04-04, E- Authentication Guidance for Federal Agencies; /m04-04.pdf /m04-04.pdf National Institute of Standards and Technology Special Publication , Electronic Authentication Guideline; rev1/SP Rev1_Dec2008.pdf 8

Process 1.Determine potential impact of authentication error 2.Map potential impact level to LOA of personal digital identity 3.Select credentials 4.Request technical review from Identity Management Services 5.Implement digital credentials 6.Validate with security review 7.Document; reassess annually 9

Potential Impact Profile Level 10 Potential Impact Profile Levels Consequences Inconvenience, distress, or damage to standing or reputation N/ALowMod HighVery high Financial loss or university liabilityN/ALowMod HighVery high Harm to university programs or public interests N/A LowModHighVery high Unauthorized release of sensitive informationN/A LowModHighVery high Personal safetyN/A LowMod (or) High Very high Penalties for civil, criminal, or disciplinary violations N/A LowModHighVery high

11 LOA Identity assertion Identity proofing requirements Authentication factorsDigital credential examples 0No identity is asserted. None No authentication is required. Site is open to public 1Little or no confidence in the validity of the asserted identity Some identity information is acquired. Little or no verification is performed. Single-factor authentication with password Guest accounts 2Some confidence that the asserted identity is valid Some identity information is acquired, with some level of verification. Single-factor authentication with password or biometric attribute PID and password; Active Directory ID and password; Oracle ID and password. Finger print reader. Hokie Passport card with photo 3Moderate degree of confidence in validity of the asserted identity Matching of the collected identity information is strengthened by additional identity verification from a trusted authority. Identity proofing may be in-person or in some circumstances, remote. A minimum of two authentication factors is required; i.e., something you know and (something you have or something you are) Personal digital certificates; finger print readers requiring passwords or PINs, 4High degree of confidence in the validity of the asserted identity In-person identity proofing is required, including referencing a biometric attribute. A minimum of two authentication factors is required, including a cryptographic key stored on a hardware token that does not allow the export of authentication keys. Personal digital certificate (PDC) on Aladdin eToken USB device protected with password 5Very high degree of confidence in the validity of the asserted identity In-person identity proofing is required, including recording a biometric attribute. Three authentication factors are required, including a biometric attribute and a cryptographic key stored on a hardware token that meets certain technical specifications. Fingerprint reader with PIN, plus something you have Levels of assurance of personal digital identities

Integration: CAS Version 3.1+ Recognizes login credential and assigns LOA Passes LOA to application in SAML payload Supports guest accounts, PID, PDC for login 12

Levels of Assurance using CAS 13 LOA values defined by VT CAS, reflecting NIST NIST CAS client must support SAML 1.1 messages. urn:oasis:names:tc:SAML:2.0:post:ac:classes:nist :v1- 0-2:1 – Guest Id/password urn:oasis:names:tc:SAML:2.0:post:ac:classes:nist :v1- 0-2:2 - PID/password urn:oasis:names:tc:SAML:2.0:post:ac:classes:nist :v1- 0-2:3 - NOT USED urn:oasis:names:tc:SAML:2.0:post:ac:classes:nist :v1- 0-2:4 - PDC on eToken

References National Institute of Standards and Technology Special Publication , Electronic Authentication Guideline; Rev1_Dec2008.pdf Office of Management Budget M-04-04, E-Authentication Guidance for Federal Agencies; University of Wisconsin, Madison, User Authentication and Levels of Assurance; Virginia Tech, Standard for Use of Personal Digital Identities 14