Monitoring and Supervision Seminar 15 June 2006, Rotterdam, The Netherlands Safe and trustworthy access in a working environment: the MoodlePKI project.

Slides:



Advertisements
Similar presentations
Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
Advertisements

Introduction of Grid Security
Electronic Filing Case Study NSW Land and Environment Court.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
PKI Implementation in the Real World
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
A Third Party Service for Providing Trust on the Internet Work done in 2001 at HP Labs by Michael VanHilst and Ski Ilnicki.
6/2/2015Information Technology Standing Committee of the IMO 1 Digital Certificate Initiative Guy Springgay Holiday Inn - Oakville.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
PUBLIC KEY INFRASTRUTURE Don Sheehy
Understanding Active Directory
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Summer School Certificates Diego Romano & Gilda Team.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Signing and Encrypting With the Thawte Web of Trust CSU Professional Development Institute January 8, 2009 Steve Lovaas.
03 December 2003 Public Key Infrastructure and Authentication Mark Norman DCOCE Oxford University Computing Services.
S/MIME and PKI Dartmouth College PKI Lab. What Is S/MIME? RFC 2633 (S/MIME Version 3)RFC 2633 Extensions to MIME Uses PKI certificates, keys, and.
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Inside the PKI Framework: * Activating the Puzzle Pieces PKI Summit Snowmass August
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Virginia Tech Overview of Tech Secure Enterprise Technology Initiatives e-Provisioning Group Frank Galligan Fed/Ed.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Galileo - Knowledge Testing Service e-MSoft Artur Majuch.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
1 PKI & USHER/HEBCA Fall 2005 Internet2 Member Meeting Jim Jokl September 21, 2005.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Module 9: Fundamentals of Securing Network Communication.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Security in ebXML Messaging CPP/CPA Elements. Elements of Security P rivacy –Protect against information being disclosed or revealed to any entity not.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Chapter 7: Cryptographic Systems
Universidad de Zaragoza LEFIS General Assembly Firenze February 2006 LEFIS - APTICE: Legal Framework for the Information Society II The LEFIS Network:
LEFIS Steering Committee Meeting Brussels, 11th November 2005 SOCRATES PROGRAMME ERASMUS - Thematic Network projects LEFIS - APTICE: Legal Framework for.
LEFIS PKI LEFIS General Beja, Portugal October 2006 Leo Catalinas.
The LEFIS UNIZAR PKI as a Case of Identification Management at a Regional Level.
Using Public Key Cryptography Key management and public key infrastructures.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Digital Signatures and Digital Certificates Monil Adhikari.
Introduction to the PKI Issues at UW Madison Presented to ITC on Friday, 3/18/2005 Tom Jordan Systems Engineer,
The Trusted Network · · · LEFIS PKI · · · 2 nd June, 2006 · Sofia by Leonardo Catalinas · May 2006
INFSO-RI Enabling Grids for E-sciencE Sofia, 17 March 2009 Security, Authentication and Authorisation Mike Mineter Training, Outreach.
The trusted network. Stamp of guarantee. Policies proposals (of European and National character): to the executive, legislative and judicial powers 3.
Trusted Component Deployment Trusted Components Bernd Schoeller January 30 th, 2006.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Mobile PKI ● Demo ● Overview / Terminology ● Use cases ● Trust ● Costs ● Feedback.
Organized by governmental sector (National Institute of information )
Secure Enterprise Technology Initiatives e-Provisioning Group
Security in ebXML Messaging
Public Key Infrastructure
The Smarter Balanced Assessment Consortium
PKI (Public Key Infrastructure)
National Trust Platform
Presentation transcript:

Monitoring and Supervision Seminar 15 June 2006, Rotterdam, The Netherlands Safe and trustworthy access in a working environment: the MoodlePKI project Pilar Lasala & Leo Catalinas University of Zaragoza

Monitoring and Supervision Seminar 15 June 2006, Rotterdam, The Netherlands When users access to a working environment :  The system needs to know who is accessing  The user needs to know where he/she is accessing The user should have an identification system so that the server allows him/her the access The server should have a certification system so that the user is sure where he/she is accessing Safe and trustworthy access in a working environment: the MoodlePKI project Working environments

Monitoring and Supervision Seminar 15 June 2006, Rotterdam, The Netherlands Safe and trustworthy access in a working environment: the MoodlePKI project LEFIS working environment  The server will let anyone navigate through its pages, but it will only let the LEFIS members access to the restricted areas  The LEFIS member will know that he/she is really working with the LEFIS server  The LEFIS documents will be digitally signed to assure their integrity and legitimacy

Monitoring and Supervision Seminar 15 June 2006, Rotterdam, The Netherlands Safe and trustworthy access in a working environment: the MoodlePKI project Username: Password: Digital certificate LEFIS working environment

Monitoring and Supervision Seminar 15 June 2006, Rotterdam, The Netherlands Safe and trustworthy access in a working environment: the MoodlePKI project Digital certificate LEFIS working environment ?

Monitoring and Supervision Seminar 15 June 2006, Rotterdam, The Netherlands Safe and trustworthy access in a working environment: the MoodlePKI project LEFIS working environment Digital signature 0 I I I I I I 0 0 I 0 I 0 0 I I I 0 0 I 0 I ?

Monitoring and Supervision Seminar 15 June 2006, Rotterdam, The Netherlands Safe and trustworthy access in a working environment: the MoodlePKI project MoodlePKI Project + Digital certificate Digital signature 0 I I I I I I 0 0 I 0 I 0 0 I I I 0 0 I 0 I Digital certificate Modular Object-Oriented Dynamic Learning Environment  Is a ‘CMS’ (course management system)  Open Source software package  WG Activities Support  User’s communication  Dynamic contents  Workshops  Assemblies …… Public Key Technologies to increase security  Our own PKI with Open Source Software  Secure and identified web access, signed documents and signed

Monitoring and Supervision Seminar 15 June 2006, Rotterdam, The Netherlands Safe and trustworthy access in a working environment: the MoodlePKI project LEFIS PKI design APTICE Certification Authority LEFIS Registration Authorities The LEFIS PKI signs delegates manages Lays Trust Base Used LEFIS Subordinated Certification Authority Hierarchical Capable of recognize other PKIs Permits building multiple PKIs Cross Certification between PKIs Trust based in APTICE CA APTICE CA LEFIS PKI ORG1 PKI ORG2 PKI Lays Trust Base Trust

Monitoring and Supervision Seminar 15 June 2006, Rotterdam, The Netherlands Safe and trustworthy access in a working environment: the MoodlePKI project How to get a LEFIS Certificate?  (PKI Sign up option in the left menu) LEFIS_MAN_EN_ENROLL_LEFIS_PKI.pdf MANUAL CSR Certificate signing request More information

Monitoring and Supervision Seminar 15 June 2006, Rotterdam, The Netherlands Safe and trustworthy access in a working environment: the MoodlePKI project What does the user get with a LEFIS Certificate?  Identified access to LEFIS Web resources  Documents and digital signature  Users can use public/private keys to sing and/or encrypt documents in their own computers (if their are interested)