Update on federations, PKI, and federated PKI for US feds and higher eds Tom Barton University of Chicago.

Slides:



Advertisements
Similar presentations
PKI and LOA Establishing a Basis for Trust David L. Wasley PKI Deployment Forum April 2008.
Advertisements

Overview of US Federal Identity Management Initiatives Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO E-Authentication, NIH.
Levels of Assurance: An Overview Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
NSF Middleware Initiative: Managing Identity on Campus Michael R Gettes, Duke University Tom Barton, University of Chicago.
US E-authentication and the Culture of Compliance RL “Bob” Morgan University of Washington CAMP, June 2005.
NIH – EDUCAUSE PKI Interoperability Pilot Update Peter Alterman, Ph.D. Director of Operations, Office of Extramural Research, NIH and Senior Advisor to.
PKI in US Higher Education TAGPMA Meeting, March 2006 Rio De Janeiro, Brazil.
1 Issues in federated identity management Sandy Shaw EDINA IASSIST May 2005, Edinburgh.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
US Higher Ed PKI Activities Internet2/EDUCAUSE ++ TF-EMC2 November, 2004 Amsterdam Michael R Gettes, Duke University TF-EMC2 November, 2004 Amsterdam Michael.
PKI: Glue of Middleware Michael R Gettes, Duke University EuroCAMP March, 2005 Michael R Gettes, Duke University EuroCAMP March, 2005.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
The 4BF The Four Bridges Forum Higher Education Bridge Certificate Authority.
1 eAuthentication in Higher Education Tim Bornholtz Session #47.
Federated Identity, Levels of Assurance, and the InCommon Silver Certification Jim Green Identity Management Academic Technology Services © Michigan State.
NIH-EDUCAUSE Interoperability Project, Phase 3: Fulfilling the Promise Dartmouth PKI Implementation Workshop Peter Alterman, Ph.D. Assistant CIO for E-Authentication.
NIH iTrust Peter Alterman/Debbie Bucci National Institutes of Health October 2010.
The E-Authentication Initiative: A Status Report Presented at Educause Meeting June 16, 2004 The E-Authentication Initiative.
The E-Authentication Initiative An Overview Peter Alterman, Ph.D. Assistant CIO for e-Authentication, NIH and Chair, Federal PKI Policy Authority The E-Authentication.
1 USHER Update Fed/ED December 2007 Jim Jokl University of Virginia.
1 11 th Fed/Ed PKI Meeting Some quick updates from recent HEPKI-TAG and SURA work Jim Jokl
InCommon Policy Conference April Uses  In order to encourage and facilitate legal music programs, a number of universities have contracted with.
Policy, Trust and Technology Mitigating Risk in the Digital World David L. Wasley Camp 2006 © David L. Wasley, 2006.
The InCommon Federation The U.S. Access and Identity Management Federation
Interfederation RL “Bob” Morgan University of Washington and Internet2 Digital ID World 2005 San Francisco.
1 The Partnership Challenge Higher education’s missions are realized in increasingly global, collaborative, online relationships –Higher educations’ digital.
IDENTITY ASSURANCE PROFILES AND FRAMEWORK DOCUMENTS: PEEK INTO PROPOSED FICAM CHANGES 12/12/12 1.
(Inter)Federation as Identity Management Policy Driver? RL "Bob" Morgan University of Washington.
Federated Identity Management for HEP David Kelsey WLCG GDB 9 May 2012.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
NSF Middleware Initiative Renee Woodten Frost Assistant Director, Middleware Initiatives Internet2 NSF Middleware Initiative.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Federated Access to US CyberInfrastructure Jim Basney CILogon This material is based upon work supported by the National Science.
PKI and the U.S. Federal E- Authentication Architecture Peter Alterman, Ph.D. Assistant CIO for e-Authentication National Institutes of Health Internet2.
GFIPM FICAM Status Update GFIPM Delivery Team Meeting November 2011.
The InCommon Federation The U.S. Access and Identity Management Federation
Shibboleth Update Eleventh Federal & Higher Education PKI Coordination Meeting (Fed/Ed Thursday, June 16, 2005.
State of e-Authentication in Higher Education August 20, 2004.
A community-based CA: The (slow) rise of the house of Usher (The CA former known as CREN)
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
The Feds and Shibboleth Peter Alterman, Ph.D. Asst. CIO, E-Authentication National Institutes of Health.
Identity Federations and the U.S. E-Authentication Architecture Peter Alterman, Ph.D. Assistant CIO, E-Authentication National Institutes of Health.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Identity Federations: Here and Now David L. Wasley Thomas Lenggenhager Peter Alterman John Krienke.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
E-Authentication October Objectives Provide a flexible, easy to implement authentication system that meets the needs of AES and its clients. Ensure.
InCommon® for Collaboration Institute for Computer Policy and Law May 2005 Renee Shuey Penn State Andrea Beesing Cornell David Wasley Internet 2.
Federal PKI Update Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority.
National Institutes of Health Interfederation Initiatives Peter Alterman, Ph.D. Assistant CIO for e-Authentication.
Higher Education Bridge CA (HEBCA) – Planting is required before the harvest (Scott Rea) Fed/Ed June 2007.
E-Authentication briefing for 11th Fed/Ed PKI Meeting Thursday June 16th, 2005.
Trusted Electronic Communications for Federal Student Aid Mark Luker Vice President EDUCAUSE Copyright Mark Luker, This work is the intellectual.
Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority Meet FedFed.
Leveraging Campus Authentication to Access the TeraGrid Scott Lathrop, Argonne National Lab Tom Barton, U Chicago.
1 US Higher Education Root CA (USHER) Update Fed/Ed Meeting December 14, 2005 Jim Jokl University of Virginia.
Federal Identity Management Overview and Current Status Dr. Peter Alterman, Chair Federal PKI Policy Authority.
Federal Initiatives in IdM Dr. Peter Alterman Chair, Federal PKI Policy Authority.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
EAuthentication – Update on Federal Initiative Jacqueline Craig IR&C September 27, 2005.
Privacy, Security, and Identity Management Update
U.S. Federal e-Authentication Initiative
Technical Approach Chris Louden Enspier
Higher Education Bridge CA (HEBCA) – Planting is required before the harvest (Scott Rea) Fed/Ed June 2007.
Inter-institutional Trust Fabric Overview and Synergies
Fed/ED December 2007 Jim Jokl University of Virginia
September 2002 CSG Meeting Jim Jokl
Presentation transcript:

Update on federations, PKI, and federated PKI for US feds and higher eds Tom Barton University of Chicago

TF-EMC E-Authentication Problem: design an authentication service supporting access to applications at dozens of huge US Federal agencies by US citizens and others Solution: use federated identities –Many identity providers (IdPs) –Common federating technologies –Trust built through risk assessment, conformance testing, & audit processes

TF-EMC Federating with E-Auth Two adopted authentication schemes –SAML 1.0 artifact profile –Bridged PKI ◦through FBCA – Federal Bridge Certificate Authority E-Authentication Interoperability Lab does conformance testing Shibboleth v1.2 is conformant federating product, and only privacy preserving one –Growing list of commercial SAML implementations are now also certified

TF-EMC E-Auth LoAs NIST defined 4 levels of authentication assurance to be used by US Feds –LoA 1 - rudimentary –LoA 2 - basic –LoA 3 - medium –LoA 4 – high –risk assessment tool to know what LoA you need All available for PKI authentication Only LoA 1 and 2 available for SAML authentication

TF-EMC So who are or will be the Identity Providers (IdPs)? US Federal agencies or their authentication service contractors (using PKI bridged with the FBCA) Large public IdPs like AOL, MSN, … –AOL in process at LoA 1 (LoA 2 might be value-add) Universities –University of Washington, Cornell, Penn State in process Banks –Fidelity Bank already, several others underway

TF-EMC E-Auth IdP wannabees CAF – Credential Assessment Framework –Auditing standards for identity proofing and IdMS operations of an IdP –PIN, password, & PKI profiles –You must be CAFed to be an E-Auth IdP University CAF experiences –Early reports are that the GAO auditors doing the CAF audit are reasonable and accepting of identity proofing and IdMS operations at Universities –But will they be certified for LoA 2?

TF-EMC Early E-Auth applications Grant submission –NSF, NIH Agricultural permits 30 US Federal agencies are required to each put up at least one application by end of 2005 –Maybe just the Department of the Interior blog, we’ll see

TF-EMC Inter-federation issues: NSF’s FastLane as example How will National Science Foundation’s FastLane application (online grant proposal submission) trust a SAML authentication assertion from University of Washington? Will FastLane need any attributes about the proposal submitter in addition to their IdP’s LoA? –Currently hold an appropriate role at the submitting institution? –How to agree on schema, semantics, and bindings?

TF-EMC E-Auth Federation Present model: eGovernance Certification Authority (eGCA) defines a single SAML federation –Two CAs issue AA certs to IdPs following CAF assessment. One for LoA 1, the other for LoA 2 –Another CA issues certs to Applications (SP’s) Shortcomings –Potential scaling issue –Attribute assertions aren’t used yet – at present it’s only about LoA for authentication Muse about an inter-federation future …

TF-EMC Bridged PKI to support inter- federations? (ala Gettes)

TF-EMC Extending federation model to digitally signed documents Proposed Phase 5 of PKI Interoperability Project –Demonstrate academic transcript delivery between InCommon members –Demonstrate InCommon member filing a report to a Federal Agency Issues to be examined & resolved –Digital signatures in federation and inter-federation contexts –Attributes about the document attached to the document

TF-EMC Federated document preparation 1.Document routed intra-campus with local workflow, referencing local roles, using digital signatures local to campus PKI 2.Strip all local stuff 3.Sign doc using key verifiable by federation (“enterprise signature”) 4.Attach XML attribute blob (roles, digital rights & IP, archival status, whatever) to doc signed with enterprise signature 5.Sign combination to ensure integrity using enterprise signature

TF-EMC Federated PKI for signed documents Signing certs (“enterprise signature”) issued not to servers, not to end users, but to federation member organizations Standardized roles (to be determined) expressed as attributes attached to the federation document. –Registrar –Purchasing Officer –… ?? Desirability of inserting 3 rd party “testamonial” artifact?? –Example: “American Council on Education attests that this signature belongs to the Registrar of an accredited university in good standing”

TF-EMC HEBCA, USHER, FBCA, and InCommon in trust perspective USHER

TF-EMC US higher ed PKI and InCommon update USHER (US Higher Ed Root) –Internet2’s replacement for CREN CA, operated by Dartmouth –Starts up in May 2005 –Policy Authority is InCommon Steering Committee –Cert revocation service is … still jelling –Will cross certify with HEBCA (Higher Ed Bridge CA) InCommon CA –Operated by Internet2, for now –Same identity proofing framework as USHER (enhanced CREN) –Same one-time & continuing fee as USHER –Will either be signed by USHER or itself cross certify with HEBCA

TF-EMC US higher ed PKI and InCommon update HEBCA –Operated by Dartmouth –Production status June 2005?? InCommon –Open for business –12 members so far, including Elsevier & OCLC Scott Rea’s October 2004 DigitalIDWorld slides slides/1028_1000_E2.pdf

TF-EMC Discussion Are there potential use cases to motivate cross certification of some European CAs with HEBCA? Which CAs? TACAR+EUGridPMA contrast with bridge CA approach. Would a bridge provide better or worse support for expanding authentication to EU grids? Nothing TACAR-like in US. Should there be? Should TACAR go there?