Mary Dunker Common Solutions Group January 12, 2010.

Slides:



Advertisements
Similar presentations
1 Leveraging Your Existing Campus Systems to Access Resource Partners: Federated Identity Management and Tales of Campus Participation EDUCAUSE 2006 October.
Advertisements

Bronze and Silver Identity Assurance Profiles for Technical Implementers Tom Barton Senior Director for Integration University of Chicago Jim Green Manager,
The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
Going for the Silver Winter 2010 CSG January 13, 2010.
1 GPO PKI – Getting Started U.S. Government Printing Office May 20, 2011.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
Identity Assurance at Virginia Tech CSG January 13, 2010 Mary Dunker
InCommon Assurance Certification VA-SCAN October 3, 2013 Mary Dunker.
Getting to Silver: Practical Matters for CIC Universities Tom Barton University of Chicago © 2009 The University of Chicago.
Enterprise Architecture 2014 EAAF as a vehicle for LoA Using EAAF processes to incrementally approach InCommon/UCTrust certification.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Information Resources and Communications University of California, Office of the President UCTrust David Walker Office of the President University of California.
Technical Issues with Establishing Levels of Assurance Zephyr McLaughlin Lead, Security Middleware Computing & Communications University of Washington.
Update on federations, PKI, and federated PKI for US feds and higher eds Tom Barton University of Chicago.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
Federated Identity, Levels of Assurance, and the InCommon Silver Certification Jim Green Identity Management Academic Technology Services © Michigan State.
Information Resources and Communications University of California, Office of the President Current Identity Management Initiatives at UC & Beyond: UCTrust.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
InCommon and Federated Identity Management 1
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
National Center for Supercomputing Applications University of Illinois at Urbana-Champaign InCommon and TeraGrid Campus Champions Jim Basney
Meeting InCommon Silver Profile Standards at UCD and UCB Bob Ono, UC Davis, Dedra Chamberlin, UC Berkeley, David Walker, UC Davis, Doreen Meyer, UC Davis.
Winter 2011 CSG Workshop: InCommon Silver January 12, 2011.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Security Management.
Identity Management and PKI Credentialing at UTHSC-H Bill Weems Academic Technology University of Texas Health Science Center at Houston.
PKI-Enabled Applications That work! Linda Pruss Office of Campus Information Security
1 USHER Update Fed/ED December 2007 Jim Jokl University of Virginia.
Using InCommon Client Certs for eduroam Jeff Hagley and Ryan Martin October 3 rd, 2011 Internet2 Fall Member Meeting.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Public Key Infrastructure Ammar Hasayen ….
Federal Requirements for Credential Assessments Renee Shuey ITS – Penn State February 6, 2007.
Virginia Tech Overview of Tech Secure Enterprise Technology Initiatives e-Provisioning Group Frank Galligan Fed/Ed.
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
Who Are You? Leveraging PKI for Digital Signatures at Virginia Tech Mary Dunker Educause Security Professionals Conference 2008 May 4, 2008
IdM Identity Proofing & Registration Gary Chapman David Millman September 2006.
InCommon Michigan State Common Solutions Group, January 2011 Matt Kolb
The InCommon Federation The U.S. Access and Identity Management Federation
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
National Center for Supercomputing Applications University of Illinois at Urbana-Champaign Secure Access to Research Infrastructure via the InCommon Federation.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
1 Personal Digital Certificates at Virginia Tech: Who Are You? Mary Dunker Internet-2 December 4, 2006
IDENTITY ASSURANCE PROFILES AND FRAMEWORK DOCUMENTS: PEEK INTO PROPOSED FICAM CHANGES 12/12/12 1.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
Virginia Tech’s Effective Practices for Managing Sensitive Data Common Solutions Group January 11, 2008.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Identity Assurance: When it Matters David L. Wasley Internet2 / InCommon.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Identity Management in Open Science Grid Identity Management in Open Science Grid Challenges, Needs, and Future Directions Mine Altunay OSG Security Officer.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Using Levels of Assurance Well, at least thinking about it…. MAX (just MAX)
How to Deploy and Get the Most Out of Tokens Paul Caskey PKI Deployment Forum 2008.
University of Washington Identity and Access Management IEEAF – RENU Network Design Workshop Seattle - 29 Nov 2007 Lori Stevens, Director, Distributed.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
E-Science Security Roadmap Grid Security Task Force From original presentation by Howard Chivers, University of York Brief content:  Seek feedback on.
Identity Management, Federating Identities, and Federations November 21, 2006 Kevin Morooney Jeff Kuhns Renee Shuey.
Winter 2011 CSG Workshop: InCommon Silver Campus Panel: University of Iowa January 12, 2011.
Using InCommon Client Certs for eduroam Jeff Hagley and Ryan Martin October 3 rd, 2011 Internet2 Fall Member Meeting.
UCTrust Integration for UC Grid David Walker University of California, Davis ucdavis.edu Kejian Jin University of California, Los Angeles kjin.
Preparing For An InCommon Silver Audit – Lessons From the First Phase
Federated Identity Management at Virginia Tech
Password Escrow Service
Secure Enterprise Technology Initiatives e-Provisioning Group
A Business Case for Identity Management in Higher Education
Federal Requirements for Credential Assessments
E-cert (Digital Certificate)
Install AD Certificate Services
Appropriate Access InCommon Identity Assurance Profiles
Presentation transcript:

Mary Dunker Common Solutions Group January 12, 2010

Where we were… Rewind to CSG, January 2010 Developing levels of assurance for personal digital identities at Virginia Tech Developing method for determining LoA Developing technology for authenticating at LoA Aware that InCommon Silver was “out there”

Where we are now… CSG January 2011 Established Standard for Personal Digltal Identity Levels of AssuranceStandard for Personal Digltal Identity Levels of Assurance CAS recognizes LoA of authentication credential CAS front-ends Shibboleth Ex-officio member of CIC Silver Project planning group

Where we are going… Initially, achieve InCommon Silver with personal digital certificates on eToken Later possibilities VASCO Digipass one-time password devices soft personal certs for employees

How we decided… Participated in CIC Silver project calls Learned challenges re: identity proofing – in-person desirable Issuing VASCO devices currently not scalable Soft certificates require infrastructure changes, development of new user interfaces

How we decided… Realized we already had most of process, security, and documentation in place for personal certificates on eTokens Realized users were likely to be faulty/staff – not students. eTokens already available to faculty, staff, graduate students

Remaining tasks… Wait for Silver to be finalized Ensure line-item compliance with Silver – may require change to record (and encrypt) DL/passport number Ensure that CAS checks certificate revocation list Request audit Apply for Silver