The ISA concept in the Telco Environment Philippe Clement Lannion, Telco WG 08 9 2011.

Slides:



Advertisements
Similar presentations
KI TI WG ITU-T SG17 Q10/17 Identity Summit Event 10 Dec. 10, Geneva Jonas Högberg, Ericsson 1.
Advertisements

IHE Profile Proposal: Dynamic Configuration Management October, 2013.
WP8 Security and Privacy Identity Management 15. November 2012 Wolfgang Steigerwald (DT) Robert Seidl (NSN)
Stonesoft Roadmap WHAT FEATURES WILL COME IN
This work was performed under the following financial assistance award 70NANB13H189 from the U.S. Department of Commerce, National Institute of Standards.
Software Frame Simulator (SFS) Technion CS Computer Communications Lab (236340) in cooperation with ECI telecom Uri Ferri & Ynon Cohen January 2007.
Step-up Authentication as-a Service Pieter van der Meulen Technical Product Manager.
IdP Selection WG Hillsboro, March 10th Version v0.
A View into the Mi$t 1 RL "Bob" Morgan University of Washington Co-chair, InCommon Technical Advisory Committee.
Digital Identities for Networks and Convergence Joao Girao, Amardeo Sarma.
© 2004 Mobile VCE June 2004 Security – Requirements and approaches to securing future mobile services Malcolm K Payne BT.
1 Trust Framework Portable Identity Schemes Trust Framework Portable Identity Schemes NIH iTrust Forum December 10, 2009 Chris Louden.
Healthcare Identity Assurance Work Group a project of the Kantara Initiative Introduction to: By John Fraser, MEDNETWorld.com October 22 nd, 2009.
Orange's ID Selector A New tool in the Authentication Scheme The European e-Identity Management Conference, London June 10th 2010 Philippe ClémentHead.
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
Lecture 2b: Software Project Management CSCI102 - Introduction to Information Technology B ITCS905 - Fundamentals of Information Technology.
Secure Element Access from a Web browser W3C Workshop on Authentication, Hardware Tokens and Beyond 11 September Oberthur Technologies – Identity.
Finalize RESTful Application Programming Interface (API) Security Recommendations Transport & Security Standards Workgroup January 28, 2014.
UAGSharePoint InternetIntranet.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Metadata for the Cloud Telco Motivation presentation to ISO/IEC JTC1 SC32 WG2 Ewelina Szczekocka, Orange Labs Poland, Telekomunikacja Polska S.A. 25th.
Who am I? Mats Ohlin Swedish Defence Materiel Administration (FMV) IT Security area –International Standardisation: ISO/IEC JTC 1/SC 27/WG 3 (Security.
1 Connect | Communicate | Collaborate Motivation When utilizing special-purpose networking you need to bring the network into place end-to-end GÉANT services.
Page 1 WWRF General Assembly London, June 25/26, 2002 Agenda General Assembly London, June 2002   Confirmation of new members and membership upgrades.
Identity Management Report By Jean Carreon and Marlon Gonzales.
- 1 - Roadmap to Re-aligning the Customer Master with Oracle's TCA Northern California OAUG March 7, 2005.
The Semantic Web Service Shuying Wang Outline Semantic Web vision Core technologies XML, RDF, Ontology, Agent… Web services DAML-S.
Market Health SOME CONCLUDING REMARKS. This project has received funding from the European Union’s Seventh Framework Programme for research, technological.
Mihir Daptardar Software Engineering 577b Center for Systems and Software Engineering (CSSE) Viterbi School of Engineering 1.
Helsinki Institute of Physics (HIP) Liberty Alliance Overview of the Liberty Alliance Architecture Helsinki Institute of Physics (HIP), May 9 th.
Next Steps in Fuego Kimmo Raatikainen Principal Scientist Helsinki Institute for Information Technology
STANDARDS COORDINATION COMMITTEE PLENARY BREAKOUT 18 SEPTEMBER 2014 Interoperability Requirements.
Geneva, Switzerland, April 2012 Introduction to session 7 - “Advancing e-health standards: Roles and responsibilities of stakeholders” ​ Marco Carugi.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Workshop Presentation [1] Investigating Liberty Alliance and Shibboleth Integration Nishen Naidoo, Supervisor: Dr. Steve Cassidy.
PAWS: Security Considerations Yizhuang WU, Yang CUI PAWS WG
Work Group / Work Item Proposal Slide 1 © 2012 oneM2M Partners oneM2M-TP oneM2M_Work_Group_Work_Item_Proposal Group name: Technical Plenary Source:
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
THE DEVIL IS IN THE (IMPLEMENTATION) DETAILS: AN EMPIRICAL ANALYSIS OF OAUTH SSO SYSTEMS SAN-TSAI SUN & KONSTANTIN BEZNOSOV PRESENTED BY: NAZISH KHAN COMPSCI.
SeON WG (GISFI #8) Agenda GISFI # 08, Mar 26-28, 2012, Patna Chair: Parag Pruthi, NIKSUN Chair-Delegate: Ashutosh Dutta, NIKSUN Vice-Chair: Debabrata Nayak,
Access Management 2.0: UMA for the #UMAam20 for questions 20 March 2014 tinyurl.com/umawg for slides, recording, and more 1.
The German eID and eIDAS
Authentication and Authorisation for Research and Collaboration Licia Florio REFEDS Meeting The AARC Project I2 Technology Exchange.
Authentication and Authorisation for Research and Collaboration Licia Florio AARC Workshop The AARC Project Brussels, 26 October.
No one left behind Open Systems Reference Architectures, Standards and Platforms for Independent Living and Active ageing: a proposal Paolo Inchingolo.
IdP Selection WG A proposal to next steps (Draft) Version v0.2.
Kantara Initiative Privacy Framework Overview and Value Proposition 13 May 2011.
IoT Architecture GISFI # 07, Dec 19-22, 2011, New Delhi Organization: NEC Doc No: GISFI_IoT_
1 © NOKIA WWRF-Reference-Framework.PPT/ 26 June 2002 / Kimmo Raatikainen WWRF Reference Framework Nokia’s Perspective WWRF WG2 Meeting 26 June 2002 Kimmo.
Stefan Arbanowski, FOKUS Wolfgang Kellerer, DoCoMo Euro-Labs WWRF13, Jeju, Korea, Feb.
Hardware-based secure services past and future Olivier POTONNIEE, Aurélien COUVERT, Virginie GALINDO April 2016.
1 Automating Network Diagnostics to Help End-Users Dave Thaler
Possibilities for Grouper in a cross/inter organizational use Andrea Biancini, Consortium GARR GN3+ F-2-F meeting Stockholm, April.
Networks ∙ Services ∙ People Andrea Biancini #TNC15, Porto, Portugal Implementing Grouper to federate user authorization Federated Authorization.
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
REST API to develop application for mobile devices Mario Torrisi Dipartimento di Fisica e Astronomia – Università degli Studi.
The Future Digital Identity Landscape in Europe Timothée Mangenot, chairman 14th of December, 2015 ACSIEL partners day.
Géant-TrustBroker Dynamic inter-federation identity management Daniela Pöhn TNC2014 Dublin, Ireland May 19 th, 2014.
Azure Active Directory - Business 2 Consumer
Kantara Initiative Healthcare Identity Assurance Work Group
Géant-TrustBroker Dynamic inter-federation identity management
European AFS & Kerberos Conference 2010
API state-of-the-art Next steps ?
Office 365 Identity Management
Usability Issues in Identity Management Improving the engagement ceremony between users and services Panel Moderator: J. Trent Adams
Orange ID Selector A Necessary Evolution in Authentication Tools
UNIT No: IV IDENTITY MANAGEMENT MODELS IN IoT
Report from the trenches of an HTML5 game provider
Operator Based Authentication
Presentation transcript:

The ISA concept in the Telco Environment Philippe Clement Lannion, Telco WG

Agenda Initial objectives around the IDP Selection ULX and IDS WG merging ULX closing The ISA in the Telco environment Business opportunities Following possible steps

Relying Party Identity Provider ISA* * ISA: Identity Provider Selection Agent  RP addresses easily the majority of main IdPs to increase their audience  IdPs extend their footprint on many RPs  The user uses easily the same tool to access IdPs whatever the RP  ISA reconciles the expectations of the 3 actors and simplifies the relations User Initial Objectives around the IDP Selection: The Concept  Transform the complex 3-3 relations into a simpler 1-3 relation

Initial objectives around the IDP Selection  Started in Liberty Alliance BMEG  Business, Use Cases and Requirements defined  With Business Objectives  increase the business around authentication  All added value on the web begins by an authentication  By promoting a large adoption of the ISA concept  simplifies the authent implementation at SPs  simplifies the journey for users  And Technical objectives  Fill the gap in protocols to achieve business objectives  Gap analysis regarding Use Cases and Requirements  Transformed into the IDS WG in Kantara Initiative

Contributors of the ID Selector (BMEG):  Shin (NTT)  Jonas (Ericsson)  Mikko (Telia Sonera)  Paavo (Telia Sonera)  Ken Salzberg (Intel)  Gael Gourmelen (Orange FT)  Paul Simons (Nortel)  Ingo Freeze (DT)  Joao (NEC)  Sreeram (Fidelity)  Initially Telco oriented Initial objectives around the IDP Selection

ULX and IDS WG merging before IDS and ULX merging: MRD with detailed Use Cases, Requirements and Business motivations done. gap analysis done ULX and IDS charters merged Objectives of the merging: Mutualize efforts in a common group On the overall user authentication experience By a common approach of “in the device”, “in the browser” and “in the network” ISA By using protocol knowledge from experts in former ULX WG

ULX closing Due to lack of traction Concerned actors are said missing Tendancy is rather to individual products (Google ID, Janrain, Gigya…) Uncomplete work : only the graphic aspects have been addressed. Communication between actors (e.g.SP and ISA) not addressed Question of Metadata not really addressed A gap remains between visions of “in the device” or “in the browser” or “in the network” approaches

The ISA in the Telco Environment ? Positive points: When Telcos join, they address the world’s population Authentication means are from far more simple than those used with OTT actors like FB, Google, MS… Strong or multi-factor authentication that allows to easily climb on the LOA layers The similarity of technical networks, user informations, registration processes… A trust framework can easily been made for Telcos, like roaming in mobile networks Threats: Major actors begin to take their independence on mobile authentication ? (Apple tentative…)

The ISA in the Telco Environment Relying Party Identity Provider: Orange DT … ISA User ?

Reconquer the authentication domain taken over by major Web players Mix authentication and Telco APIs User Profile On bill billing Centralized Privacy … Business opportunities

Following possible steps ? Build a roadmap Recruit more Telcos Write specific (more?) telco Use Cases Define basic (then extended) telco metadata and claims Check protocols for feasibility Liaise with specific groups/bodies to not reinvent the wheel Target a Telco Trusted Framework, maybe an European One ? Even Build a POC ?

Questions / Discussion