Government Online – White Paper Companion – Copyright © 2007 Credentica Inc. All Rights Reserved. This presentation is animated. Press the “space bar”

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

Installation & User Guide
Dating Portal showcase Copyright © 2007 Credentica Inc. All Rights Reserved. February 15th - 16th, 2007.
Digital Certificate Installation & User Guide For Class-2 Certificates.
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Claudia Diaz, Hannelore Dekeyser, Markulf Kohlweiss, Girma Nigusse K.U.Leuven IDIS Workshop 29/05/2008 [Work done in the context of the ADAPID project]
Session Hijacking Why web security depends on communications security and how TLS everywhere is the only solution. Scott Helme - 6th Aug scotthel.me.
Copyright © Microsoft Corporation. All Rights Reserved. Kantara Paris October 2010 Presented By: Kim Cameron Chief Architect of Identity Microsoft.
7/11/2011Pomcor 1 Pros and Cons of U-Prove, Idemix and Other Privacy-Enhancing Technologies Francisco Corella Karen Lewison Pomcor.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Integration Considerations Greg Thompson April 20 th, 2006 Copyright © 2006, Credentica Inc. All Rights Reserved.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Understanding Active Directory
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
OpenID And the Future of Digital Identity Alicia Bozyk April 1, 2008.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Christian Paquin May 1 st, 2007 Identity Management Techniques – CFP 2007 Tutorial – Copyright © 2007 Credentica Inc. All Rights Reserved.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Understanding Security Lesson 6. Objective Domain Matrix Skills/ConceptsMTA Exam Objectives Understanding the System.Security Namespace Understand the.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
IDENTITY MANAGEMENT Hoang Huu Hanh (PhD), OST – Hue University hanh-at-hueuni.edu.vn.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Secure Electronic Transaction (SET)
A Claims Based Identity System Steve Plank Identity Architect Microsoft UK.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Identity Assurance Services For Preventing Identity Theft Bob Pinheiro Robert Pinheiro Consulting LLC
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Workgroup Discussion on RESTful Application Programming Interface (API) Security Transport & Security Standards Workgroup January 12, 2014.
The Evolution of Identity Management February 18, 2005 © Copyright 2004, Credentica – all rights reserved Dr. Stefan Brands.
Unit 1: Protection and Security for Grid Computing Part 2
1 Boundary Control Chapter Materi: Boundary controls:  Cryptographic controls  Access controls  Personal identification numbers  Digital signatures.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Web Security : Secure Socket Layer Secure Electronic Transaction.
SharePoint Security Fundamentals Introduction to Claims-based Security Configuring Claims-based Security Development Opportunities.
Chapter 21 Distributed System Security Copyright © 2008.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Levels of Assurance in Authentication Tim Polk April 24, 2007.
Government Online Copyright © 2007 Credentica Inc. All Rights Reserved. February 15th - 16th, 2007 Mobile Showcase.
Digital Signatures, Message Digest and Authentication Week-9.
THE DEVIL IS IN THE (IMPLEMENTATION) DETAILS: AN EMPIRICAL ANALYSIS OF OAUTH SSO SYSTEMS SAN-TSAI SUN & KONSTANTIN BEZNOSOV PRESENTED BY: NAZISH KHAN COMPSCI.
Public Key Infrastructure (PKI) Chien-Chung Shen
Digital Rights Management and Trusted Computing Kari Kostiainen T Special Course in Operating System Security April 13 th 2007.
Government Online Copyright © 2007 Credentica Inc. All Rights Reserved. February 15th - 16th, 2007 User-Centric Information Page.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
Understanding Security
Electronic Security and PKI Richard Guida Chair, Federal PKI Steering Committee Chief Information Officers Council
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Fall 2006CS 395: Computer Security1 Key Management.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Access Account Activation and Electronic Signature Web Application.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
Radius, LDAP, Radius used in Authenticating Users
Module 8: Securing Network Traffic by Using IPSec and Certificates
Module 8: Securing Network Traffic by Using IPSec and Certificates
SSO and Data Sharing Use Cases
Introduction to Cryptography
Digital Signatures Network Security.
Presentation transcript:

Government Online – White Paper Companion – Copyright © 2007 Credentica Inc. All Rights Reserved. This presentation is animated. Press the “space bar” to go through the animation steps; wait until an animation finishes before pressing the “space bar” again. If you missed an animation step, simply press the “left-arrow” key to rewind the animation Version 1.0 April 23, 2007

Copyright © 2007 Credentica Inc. All Rights Reserved. Contents Introduction Part I – Leading Industry SolutionsPart I – Leading Industry Solutions Federated identity management (SSO) Windows CardSpace (data sharing) Part II – Credentica’s TechnologyPart II – Credentica’s Technology Overview of ID Tokens Secure SSO Data sharing across unlinked accounts

Copyright © 2007 Credentica Inc. All Rights Reserved. Introduction Goals of government online Improve access to government services Reduce costs and improve productivity Improve participation in democratic process Current priorities Single sign-on (SSO) to services Data sharing across governmental departments Critical security and privacy requirements Avoid unwanted tracing and linking powers Prevent denial-of-service attacks Prevent impersonation attacks Prevent user fraud

Copyright © 2007 Credentica Inc. All Rights Reserved. Part I Leading Industry Solutions

Copyright © 2007 Credentica Inc. All Rights Reserved. Each service knows the user under a local identifier that may be different from the user’s identity at the authority With identity federation, services do not authenticate users themselves but delegate this step to a trusted authority that has already established authenticated relations with these users Service A Accounts Service B Accounts Service C Accounts Authority Accounts Federated identity management (SSO) Alice I’m Alice Who is this? Who are you? It’s Welcome Who is this? It’s Alice It’s Welcome The user enjoys a single sign-on experience when visiting other services from the same federation in the same browsing session

Copyright © 2007 Credentica Inc. All Rights Reserved. Authority Accounts Service C Accounts Service B Accounts Service A Accounts Federated identity management (SSO) Alice Impersonator Who is this? I don’t know Who is this? It’s Welcome In the context of government online, federated identity management has several shortcomings. Firstly, the government would have the capability to electronically link and trace all user actions in real time Secondly, the authority can deny targeted citizens access to services by providing incorrect authentication assertions It’s Alice Thirdly, the government would have the capability to impersonate targeted users The user enjoys a single sign-on experience when visiting other services from the same federation in the same browsing session Welcome Alice

Copyright © 2007 Credentica Inc. All Rights Reserved. Relying party Accounts Identity Provider Accounts Windows CardSpace (data sharing) Alice Are you over 18? I’m Alice. Please assert that I’m over 18 Welcome Who is this? It’s Alice Over 18 Windows CardSpace enables users to directly transfer claims from identity providers to relying parties. Identity providers authenticate users before issuing claims about them The shortcomings of Windows CardSpace in the context of Government Online are almost identical to those of federated identity In collusion with relying parties it is trivial to trace all presented claims to their issuance (either by comparing issuing and presentation times or by linking the provider’s signatures on the claims)

Copyright © 2007 Credentica Inc. All Rights Reserved. Relying party Accounts Identity Provider Accounts Windows CardSpace (data sharing) Alice John Are you over 18? I need to assert that I’m over 18 I’m John. Please assert that I’m over 18 Over 18 Welcome Fraudulent users can transfer (copies of) claims about themselves to other parties In collusion with relying parties it is trivial to trace all presented claims to their issuance (either by comparing issuing and presentation times or by linking the provider’s signatures on the claims) It’s Alice No I’m not…

Copyright © 2007 Credentica Inc. All Rights Reserved. Part II Credentica’s Technology

Copyright © 2007 Credentica Inc. All Rights Reserved. An ID Token is a cryptographically protected container of identity- related assertions that is issued to a user. An ID Token can contain any kind of attribute information that is bound to a key pair Attribute information contained in one or more ID Tokens can be selectively disclosed in response to unanticipated requests from verifiers Issuers can cryptographically bind ID Tokens to trusted modules (such as smart cards or Trusted Computing chips) that can enforce third-party security policies throughout the entire life cycle of the ID Tokens. A single low-cost device can protect arbitrarily many ID Tokens Overview of ID Tokens Alice IssuerVerifier ? ID Tokens cannot be forged or modified, cannot be stolen through eavesdropping or phishing, and cannot be replayed by legitimate verifiers In contrast to conventional technologies, the use of an ID Token does not leak any information that others could exploit to link or trace user activities The user presents the ID Token to a verifier, either in the same session (in case of a transient ID Token) or later (in case of a long-lived ID Token stored by the user) Consult the U-Prove SDK white paper companion presentation to learn more about ID Tokenscompanion presentation

Copyright © 2007 Credentica Inc. All Rights Reserved. Alice Authority Token Service Service A Accounts Token IDService Service A Name: Alice Smith DOB: 1973/08/24 Name: Alice Smith DOB: 1973/08/24 AliceS Service A Token IDService a9e28b3c74 9b87f3c4dd2(unlinked) f88e37ba221(unlinked) Service A Secure SSO Service C Accounts Service B Accounts In an enrollment phase, Alice’s computer obtains a batch of long-lived ID Tokens from a trusted authority When Alice subsequently accesses and authenticates to a government service for the first time, her computer transmits a fresh ID Token to the service. Alice’s computer uses a different ID Token with each government service, and maintains a mapping of all of her ID Tokens to their corresponding services The service associates the ID Token it receives from Alice with its account information on her In subsequent visits to a government service, Alice’s computer authenticates using the ID Token that the service has associated with her account Legacy authentication data +

Copyright © 2007 Credentica Inc. All Rights Reserved. Alice Service C Accounts Authority Token Service Service A Accounts Service B Accounts Address: 1010 Sherbrooke Postal code: H3A 2R7 ASmith Service B Address: 1010 Sherbrooke Postal code: H3A 2R7 Service B Secure SSO Name: Alice Smith DOB: 1973/08/24 AliceS Token IDService a9e28b3c74Service A 9b87f3c4dd2Service B f88e37ba221Service C As a result, the authority and the services do not gain any correlation powers, neither through data flow analysis nor through timing analysis In subsequent visits to a government service, Alice’s computer authenticates using the ID Token that the service has associated with her account

Copyright © 2007 Credentica Inc. All Rights Reserved. Service C You need to be over 18 to access this service Service C Welcome Service C Accounts Authority Token Service Service A Accounts Hereto they package data they hold about Alice into ID Tokens that they provide to Alice, protecting them against any unauthorized manipulations Alice Name: Alice Smith DOB: 1973/08/24 AliceS Service B Accounts Service C Data sharing across unlinked accounts Address: 1010 Sherbrooke Postal code: H3A 2R7 ASmith Service A Over 18 Government services can securely share data on Alice, without needing to know her under a common identifier

Copyright © 2007 Credentica Inc. All Rights Reserved. Address: 1010 Sherbrooke Postal code: H3A 2R7 ASmith Name: Alice Smith DOB: 1973/08/24 AliceS To prevent timing correlations, Alice can obtain long-lived copies of her account data whenever she visits the services Alice Service C Accounts Authority Token Service Service B Accounts Service A Accounts Service B Address Postal code Service A Name DOB Data sharing across unlinked accounts Hereto they package data they hold about Alice into ID Tokens that they provide to Alice, protecting them against any unauthorized manipulations

Copyright © 2007 Credentica Inc. All Rights Reserved. Name: Alice Smith DOB: 1973/08/24 AliceS Address: 1010 Sherbrooke Postal code: H3A 2R7 ASmith Service B Accounts Authority Token Service When Alice subsequently accesses a service that requires some information about her, she selectively discloses only the minimal assertion information needed from her long-lived copies Alice Service C Accounts Service A Accounts Service C Welcome Service C You must be over 18 and from Quebec to access this service. Service A Name DOB Service B Address Postal code Service A Name DOB 18+ Service B Address Postal code proof Service C Service C Data sharing across unlinked accounts To prevent timing correlations, Alice can obtain long-lived copies of her account data whenever she visits the services

Copyright © 2007 Credentica Inc. All Rights Reserved. Credentica