Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All ITU-T Identity Management Update Bilel Jamoussi, Chief, SGD/TSB ITU Abbie Barbir, Q10/17 Rapporteur.

Slides:



Advertisements
Similar presentations
GSC: Standardization Advancing Global Communications ITU-T Status Report on standardization of Networked RFID P.A. Probst/Chairman of ITU-T SG16 SOURCE:ITU-T.
Advertisements

ITU-T activity in ICT security
Trust Elevation through Contextual Authentication Regional Arab Forum on Cybersecurity Giza (Smart Village)-Egypt, December 2011 Abbie Barbir,
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Wayne Zeuch, ATIS ATIS Cybersecurity Standards Document No: GSC16-GTSC9-10 Source: ATIS Contact:
Cloud computing security related works in ITU-T SG17
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Recent Standardization Activities on Cloud Computing Kishik Park, Kangchan Lee, Seungyun Lee TTA.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All The Internet of Things (IoT) aka Machine 2 Machine (M2M) Bilel Jamoussi Chief, Study Groups Department.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All ETSI Standardization Activities on M2M communications Joachim Koss, ETSI Board Member Document No:
International Telecommunication Union An Emerging Global Convergence on Identity Management Tony Rutkowski mailto: Vice President,
Geneva, Switzerland, 4 December 2014 ITU-T Study Group 17 activities in the context of digital financial services and inclusion: Security and Identity.
Halifax, 31 Oct – 3 Nov 2011 Brian K. Daly, Director, Core Standards AT&T ATIS Identity Management (IdM) Standards Development Document No: GSC16-PLEN-93.
Standards for Shared ICT Jeju, 13 – 16 May 2013 Gale Lightfoot Senior Staff Program Manager, Office of the CTO, SPB Cisco ATIS Cybersecurity Standards.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Consolidated M2M standards boost the industry Li Li (Thomas) CCSA(Huawei) Document No: GSC16-PLEN-73.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All IEEE-SA Smart Grid Steve Mills, President, IEEE Standards Association Document No: GSC16-PLEN-47.
DOCUMENT #:GSC15-PLEN-08 FOR:Presentation SOURCE:ISACC AGENDA ITEM:Opening Plenary (4.5) CONTACT(S):Jim MacFie ISACC Activities Since GSC-14 Jim MacFie.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All High Intelligent Network (Smart Pipe) Yuqing CHEN CCSA Document No: GSC16-PLEN-75 Source: CCSA Contact:
Introduction to Object Identifiers (OIDs) France Telecom Orange Olivier Dubuisson 15 June 2009.
DOCUMENT #:GSC15-GTSC-05 FOR:Presentation SOURCE:ITU-T AGENDA ITEM:4.1 NGN, Testing specification and Beyond Chaesub.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All ITU-T Focus Group on Cloud Computing Olivier Colas, ITU-T FGCC Vice-Chairman Document No: GSC16-PLEN-45.
SCC Activities C. Tilton. Standards Are applied to SOMETHING Within some CONTEXT Something = ID Ecosystem Context = Use Cases 2.
DOCUMENT #:GSC15-PLEN-29 FOR:Presentation or Information SOURCE:ITU-T AGENDA ITEM:6.4 Identity Management Jianyong.
DOCUMENT #:GSC15-PLEN-29 FOR:Presentation or Information SOURCE:ITU-T AGENDA ITEM:6.4 Identity Management Jianyong.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Document No: GSC16-PLEN-79 Source: TIA Contact: Anil Kripalani GSC Session:
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All NGN interoperability - TTC activities in ITU-T - Kaoru Kenyoshi TTC as the PPSO of interoperability.
DOCUMENT #:GSC15-PLEN-26 FOR:Presentation SOURCE: ATIS AGENDA ITEM: PLEN 6.4 CONTACT(S): James McEachern ATIS Identity Management.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Green ICT activities of TTC & ITU-T toward low-carbon society Yoh SOMEMURA TTC, Prime PSO for ICT.
DOCUMENT #: GSC15-GTSC8-06 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.2 CONTACT(S): Art Reilly ATIS Cybersecurity.
1 CJK9, Zhangjiajie, China NID-related activities in ITU-T Document number Zhangjiajia, China 8-10 April 2009 Hyoung Jun KIM, Jun Seob LEE
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All SMART GRID ICT: SECURITY, INTEROPERABILITY & NEXT STEPS John O’Neill, Senior Project Manager CSA.
International Telecommunication Union Eighth Global Standards Collaboration (GSC) Meeting - Ottawa, Canada, 27 April-1 May 2003 Security Standardization.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Cloud Computing in TTC Kazunori MATSUO, TTC Cloud Computing Advisory Group Document No: GSC16-PLEN-17.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 Identity Management Anthony M. Rutkowski V-P, Regulatory Affairs and Standards VeriSign,
ITU Overview Empowering global ICT development Malcolm Johnson DOCUMENT #:GSC13-XXXX-nn FOR:Presentation SOURCE:ITU AGENDA ITEM:Opening Plenary, 4.6 CONTACT(S):Malcolm.
Progress on Identity Management: A Canadian Perspective on GSC Resolution 14/4 Colman Ho ISACC DOCUMENT #:GSC15-PLEN-28 FOR:Presentation SOURCE:ISACC AGENDA.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All ICT Accessibility Standardization Dr. Jim Carter, ISACC Document No: GSC16-PLEN-57r2 Source: ISACC.
DOCUMENT #: GSC15-GTSC8-06 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.2 CONTACT(S): Art Reilly ATIS Cybersecurity.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Security activities in ETSI Presenter: Mike Sharpe, ETSI VP ESP (ETSI Standardization Projects) Document.
GSC Global Standards Collaboration GSC August – 2 September 2005 Sophia Antipolis, France August 28 – September 2, ISACC Opening Plenary Presentation.
ITU-T SG16 and JCA-IoT activities
DOCUMENT #:GSC15-PLEN-82r2 FOR:Presentation SOURCE:ATIS AGENDA ITEM: PLEN 6.14 CONTACT(S): Andrew White ATIS’
Geneva, Switzerland, September 2014 ITU-T SG 17 Identity management (IdM) Progress Report Abbie Barbir Ph.D., ITU-T Study Group 17 Q10/17 (Identity.
Fostering worldwide interoperabilityGeneva, July 2009 IdM and Identification Systems Arkadiy Kremer ITU-T SG 17 Chairman Global Standards Collaboration.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
GSC-17, Jeju / Korea Standards for Shared ICT Standardization Activities on Cloud Computing in TTA, KOREA Eui-Nam Huh, TTA PG420 Chair Document No: GSC17-PLEN-17.
ATIS Identity Management Standards Development DOCUMENT #:GSC13-PLEN-37 FOR:Presentation SOURCE:ATIS AGENDA ITEM:Plenary; IdM and Identification Systems;
Jeju Island, Korea, 13 – 16 May 2013Identity Management and Identification Systems GSC17-PLEN-43 ITU-T IDENTITY MANAGEMENT UPDATE Bilel Jamoussi, Chief,
Fostering worldwide interoperabilityGeneva, July 2009 ITU-T Telecom Security Update Arkadiy Kremer ITU-T SG 17 Chairman Global Standards Collaboration.
ITU - Empowering global ICT development Malcolm Johnson DOCUMENT #:GSC13-PLEN-44 FOR:Presentation SOURCE:ITU AGENDA ITEM:Opening Plenary, 4.6 CONTACT(S):Malcolm.
IdM: Platform for Ubiquitous Chae Sub LEE DOCUMENT #:GSC13-PLEN-12 FOR:Presentation SOURCE:ITU-T AGENDA ITEM:Plenary 6.4
ITU-T Activities in Bridging The Standardization Gap Vijay Mauree Programme Coordinator, TSB ITU ITU Regional Standardization Forum for Asia-Pacific (Jakarta,
Fostering worldwide interoperabilityGeneva, July 2009 ATIS Identity Management Standards Development James McEachern, Manager – Application Enabler.
DOCUMENT #:GSC15-PLEN-27 FOR:Presentation SOURCE:ETSI AGENDA ITEM:PLEN 6.4 CONTACT(S): Amardeo Sarma, ISG INS Chair Identity & Access Management activities.
Jeju, 13 – 16 May 2013Standards for Shared ICT TTA activities since GSC-16 Keun Hyeob Lee, President of TTA Document No: GSC17-PLEN-39 Source: TTA Contact:
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All IEEE Activities in Cloud Computing Steve Mills, President, IEEE Standards Association Document No:
ITU-T SG17 Q.3 Telecommunication information security management An overview Miho Naganuma Q.3/17 Rapporteur 17 March 2016.
International Telecommunication Union ICT Security Role in National Trusted Identities Initiatives Abbie Barbir, PhD ITU-T Study Group 17 Identity Management.
Issues need harmonization
Global Standards Collaboration (GSC) GSC-15
Yong-Woon KIM HyoungJun KIM TTA
High Intelligent Network (Smart Pipe)
The ITU-T SG 17 Q10/17 IdM standardization activity
ITU Update since GSC-15 Bilel Jamoussi
ITU-T SG17 Q.3 Telecommunication information security management
ITU-T Study Group 17 Security
Martin Euchner, Advisor, ITU-T Study Group 17
Recent Standardization Activities on NID
ITU-T activity in ICT security
Recent Standardization Activities on Cloud Computing
Wayne Zeuch, GTSC-6 Chair Nicole Butler, ATIS Staff
Presentation transcript:

Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All ITU-T Identity Management Update Bilel Jamoussi, Chief, SGD/TSB ITU Abbie Barbir, Q10/17 Rapporteur Document No: GSC16-PLEN-24 Source: ITU Contact: Bilel Jamoussi GSC Session: PLENARY Agenda Item: 6.4

Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All GSC16-PLEN-24 2 ITU-T Joint Coordination for IdM (JCA IdM) is now under SG 17 umbrella. JCA IdM has developed an inventory of major national, regional and international Identity Management initiatives ITU-T works collaboratively with other key bodies including: OASIS,ETSI; Kantara Initiative, OMA, NIST,ISO/IEC JTC 1/SC 27, ISO/IEC JTC 1/SC 38, etc.. ITU-T’s IdM focus work is on enhancing identity identification and enrolment through the development of better authentication assurance frameworks. Enhanced trust through open trust Frameworks, Identity in the Cloud, identity based services for mobile and finances and interoperability of diverse IdM capabilities in telecommunications. The JCA-IdM analyzes IdM standardization items and coordinate an associated roadmap Highlight of IdM Current Activities

Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All GSC16-PLEN-24 3 ITU-T Joint coordination activity in IdM JCA-IdM Coordination and collaboration

Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All GSC16-PLEN-24 4 Published ITU-T IdM Recommendation Y.2720, NGN identity management framework Supplement to Y.2704, Y.NGN Certificate Management Certificate management Y.NGN IdM Use-cases (Technical Report) X.1250, Baseline capabilities for enhanced global identity management trust and interoperability X.1251, A framework for user control of digital identity X Baseline identity management terms and definitions Recommendation in Advanced Stages X.1253 (X.idmsg), Security guidelines for identity management systems, approved September 2011 X.eaa/ISO 29115, Entity authentication assurance framework. Working with OASIS on synchronizing with SAML 2.0 and XACML 3.0 and their equivalent ITU-T Recommendations Y.NGN trusted SP requirements, NGN Requirements and Use Cases for Trusted Service Provider Identity Highlight of IdM Current Activities

Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All GSC16-PLEN-24 5 Draft Recommendation in progress Y.NGN-OAuth Support for OAuth in NGN Y.NGN-OOF, Framework for NGN Support and Use of OpenID and OAuth Y.NGN-OpenID, Support for OpenID in NGN X.atag, Attribute aggregation framework X.authi, Guideline to implement the authentication integration of the network layer and the service layer X.discovery. Discovery of identity management information X.giim, Mechanisms to support interoperability across different IdM services X.idmcc, Requirement of IdM in cloud computing X.idmgen, Generic identity management framework X.idm-ifa, Framework architecture for interoperable identity management systems X.mob-id, Baseline capabilities and mechanisms of identity management for mobile applications and environment X.oitf, Open identity trust framework X.priva, Criteria for assessing the level of protection for personally identifiable information in identity management Highlight of IdM Current Activities

Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All GSC16-PLEN-24 Current Q10/17 IdM Focus Interoperability of identity management –X.giim, Generic IdM interoperability mechanisms –X.idm-ifa, Framework architecture for interoperable identity management systems –X.idm-cloud, identity in the cloud Trust of identity management –X.authi, Authentication integration in IDM –X.EVcert, Extended validation certificate –X.eaa, Information technology – Security techniques – Entity authentication assurance –X. OITF, Open identity trust framework Discovery of of identity management information –X.discovery, Discovery of identity management information Protection of personally identifiable information –X.1275, Guidelines on protection of personally identifiable information in the application of RFID technology –X.priva, Criteria for assessing the level of protection for personally identifiable information in identity management 6

Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All GSC16-PLEN-24 7 Trend is towards the support of strong authentication in online transaction. A major challenge is how to enable the use of strong authentication techniques and best practices in an interoperable and secure fashion. Identity Federations based on standardized trust model and global interoperability of diverse identity management schemas are major inhibitors to wide scale deployment of IdM capabilities Development of just in time secure cloud standards for identity provisioning, de-provisioning and the control of fine grain authorizations. Enhance online trust, reducing fraud and identity theft while protecting PII. Challenges for IdM

Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All GSC16-PLEN-24 8 Conclusions Identity based services is a key technology for cloud based SaaS Online transaction requires means for identification of all parties involved in a transaction There need for open interoperable trust frameworks for IdM Identity Management continue to be a key security enabler for mobile and wireless interactions Protection of Personally Identifiable Identifiers (PII) is a required capability for IdM systems

Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All GSC16-PLEN-24 9 Q&A Discussion

Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All GSC16-PLEN Backup

Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All GSC16-PLEN OID Resolution system Provides information associated with any object identified by an OID: access information child node information OID-IRI canonical form Joint work between ITU-T SG 17 and ISO/IEC JTC 1/SC 6 since Oct (draft Rec. ITU-T X.oid-res | ISO/IEC 29168) Get an OID identifier arc assigned for identifying cybersecurity organizations, information, and policies Will specify: OID resolution architecture OID resolution protocol (probably based on DNS) operation of the OID resolution service security and trust of the OID resolution process etc.

Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All GSC16-PLEN Object Identifiers (OIDs) One of many identification schemes Basically very simple: A tree Arcs are numbered and may have an associated alphanumeric identifier (beginning with a lowercase) Infinitely many arcs from each node (except at the root) Objects are identified by the path (OID) from the root to a node A Registration Authority (RA) allocates arcs beneath its node to subordinate RAs, and so on, to an infinite depth The OID tree is a hierarchical structure of RAs Standardized in the ITU-T X.660 | ISO/IEC 9834 series (ITU-T SG 17 and ISO/IEC JTC 1/SC 6) Originated in 1985, still in use!