User Authentication for Enterprise Applications - The Future in Transitions.

Slides:



Advertisements
Similar presentations
Click to edit Master title style HEALTH INFORMATION 1 Identity & Access Management Presenter: Mike Davis (760) January 09, 2007.
Advertisements

Agenda 2 factor authentication Smart cards Virtual smart cards FIM CM
Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
Access Control Chapter 3 Part 3 Pages 209 to 227.
Copyright Tom Parker, Ron DiNapoli, Andrea Beesing, Joy Veronneau This work is the intellectual property of the authors. Permission is granted for.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
User Authentication for Enterprise Applications November 16, 2005 Tom Board, NUIT.
Microsoft Identity Solutions
FIspace Security Components FIspace Security Components NetFutures 2015 FIspace project Javier Romero Negrín Javier Hitado Simarro ATOS Serdar Arslan KoçSistem.
Identity & Access Management Project Tom Board February 2006.
Access Control Methodologies
Lecture 23 Internet Authentication Applications
1 Authentication Trustworthiness The Next Stage in Identity-Based Access and Security Tom Board, NUIT.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Information Technology Registry Services Security LDAP-based Attributes and Authentication.
Virtual techdays INDIA │ august 2010 Managing Active Directory Using Microsoft Forefront Identity Manager: Amol R Bhandarkar │ Tech Specialist –
3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,
1 Identity Management and Access Control Status UNITS Forum, June 2006 Tom Board, NUIT Info Systems Architecture.
Information Technology Current Work in System Architecture November 2003 Tom Board Director, NUIT Information Systems Architecture.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
Applied Cryptography Week 13 SAML Applied Cryptography SAML and XACML Mike McCarthy Week 13.
Identity Management, what does it solve By Gautham Mudra.
Identity and Access Management
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Microsoft Identity and Access Solutions Market Trends and Futures
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
IDENTITY MANAGEMENT: PROTECTING FROM THE INSIDE OUT MICHAEL FORNAL, SECURITY ANALYST PROVIDENCE HEALTH & SERVICES SOURCE SEATTLE CONFERENCE
Overview of Access and Information Protection
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
©2011 Quest Software, Inc. All rights reserved. Patrick Hunter EMEA IDAM Team Lead 7 th February 2012 Creating simple, effective and lasting IDAM solutions.
Security Planning and Administrative Delegation Lesson 6.
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Auditing Information Systems (AIS)
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Shibboleth: An Introduction
Overview: Application Integration, Data Access, and Process Change November 16, 2005 Tom Board, NUIT.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Information Technology Current Work in System Architecture January 2004 Tom Board Director, NUIT Information Systems Architecture.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
Access Control / Authenticity Michael Sheppard 11/10/10.
University of Washington Collaboration: Identity and Access Management Lori Stevens University of Washington October 2007.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
SEC835 Identity and Access Management Overview. Tasks of IAM Specify the rules of electronic identity Maintain identity Validate identity Define access.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Linus Joyeux Valerie Alonso Managing consultantLead consultant blue-infinity (Switzerland) Active Directory Federation Services v2.
11 SECURITY PLANNING AND ADMINISTRATIVE DELEGATION Chapter 6.
Unit 7 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/3/2016 Instructor: Williams Obinkyereh.
Chris Louloudakis Solution Specialist Identity & Access Management Microsoft Corporation SVR302.
CERN IT Department CH-1211 Genève 23 Switzerland t Single Sign On, Identity and Access management at CERN Alex Lossent Emmanuel Ormancey,
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
MIM/PAM Case Study Dean Guenther IAM Manager Washington State University May 2016 Copyright 2016, Washington State University.
THE CAMPUS IDENTITY SYSTEM Lucy Lynch, NSRC. Learning Objectives Discovering the key role campus networks play in trusted identities for R&E Authoritative.
WSO2 Identity Server. Small company (called company A) had few services deployed on one app server.
Secure Single Sign-On Across Security Domains
Using Your Own Authentication System with ArcGIS Online
Identity Management (IdM)
SECURITY PLANNING AND ADMINISTRATIVE DELEGATION
System Management Issues for the Future Real-Time University Environment Tom Board September 22, 2004 Northwestern University Information Technology.
CompTIA Security+ Study Guide (SY0-401)
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
What are IAM Key Processes.
James Cowling Senior Technical Architect
Presentation transcript:

User Authentication for Enterprise Applications - The Future in Transitions

2 Thesis Well-managed, trustworthy authentication and authorization are important today and will be vital in the future Moving the authentication and authorization functions to the Web layer allows rapid deployment of newer tools and technologies The services needed are largely available today, and will be complete within 18 months The work must now shift to the applications and business processes

3 Agenda Trends in User Authentication NUIT Plan How Should Applications Prepare? Transitions Wrap-up

4 Agenda Trends in User Authentication NUIT Plan How Should Applications Prepare? Transitions Wrap-up

5 Trends in User Authentication Defining clear business rules for identity creation and lifecycle management Requiring stronger passwords Requiring multi-factor authentication for high-value transactions Moving to universal identity tokens and federated domains

6 Business Rules for Identity Lifecycle Management Document the necessary and sufficient conditions for identity creation Define the lifecycle and especially what authorizations are granted and revoked at each transition Grant authorizations in manners that fit business goals and minimize risks Log and audit the management processes

7 Stronger Passwords Password cracking technology is advancing beyond our ability to remember passwords Because attacks are automated, risks are greater and defenses must be stronger Passwords must become longer and more complex.

8 Stronger Passwords Number of characters A..ZA..Z, a..zA..Z, a..z, 0..9, symbols 65 mins6 hrs8 days 858 hrs21 mons196 yrs 105 yrs4648 yrs1.7M yrs Assumes 1M password tests per second Stated figures are 100% surety, 50% would be half, 25% one-quarter, etc. Source:

9 Multi-Factor Authentication Factors: something you … –Know (passwords) –Have (swipe card, USB token) –Are (thumbprint, handprint, retinal pattern) –Do (typing pattern, walking gait) How many factors are needed to be POSITIVE that the attempted access is by the real person? –What is the risk of being wrong? –What is the inconvenience?

10 Universal Identity and Federation If multi-factor authentication is needed then everyone should have two or more factors available Certification attests to the level of confidence which a third party puts into the association of a factor to a particular person Federation is not giving another institution access to our authentication services, it is based upon trust in our assertions of authentication. That trust is built upon their knowledge of our identification and management practices

11 Agenda Trends in User Authentication NUIT Plan How Should Applications Prepare? Transitions Wrap-up

12 NUIT Plan Single identity for each person Remove authentication from applications and place it in the surrounding service environment Four network-wide authentication services but only one and one-half authorization services Workflow-based identity management Federated authentication Smartcards, USB tokens, etc.

13 Four Services LDAP 3.x: authentication and authorization attributes MSFT Active Directory: authentication and some authorization attributes MIT Kerberos 5: authentication Web SSO: authentication and coarse- grained access control through LDAP authorization attributes

14 Agenda Trends in User Authentication NUIT Plan How Should Applications Prepare? Transitions Wrap-up

15 How Should Applications Prepare? Move user authentication into the Web server Use identity management workflow to control access to the application Use institutional roles or other attributes for coarse-grained access control Optional: Employ first-access provisioning to simplify management of user profiles within the application

16 Authenticating at the Web Server Applications must give up internal passwords and programming logic to check NetID passwords Moving this function to the Web server level allows new functions (Web SSO) to be deployed without wide-spread effects If the application is invoked, then the user was successfully authenticated

17 Approve Access Through IdM The Identity Management (IdM) system must know if a NetID has been granted access to an enterprise application. Using IdM-based workflow to request, authorize, approve and grant access can support this easily. The IdM system can enforce business rules subject to entitlements granted.

18 Coarse-Grained Access Control Through Web SSO and access rules, any NetID attribute can be used to allow or deny access to an application Web page. –Role: “faculty”, “employee” –Entitlement: “access to HRIS” Session environment can also be used –IP address –Level of authentication

19 First-Access Provisioning Avoid provisioning user profiles within the application until the user attempts access. Recognizing no user profile exists: –Invoke an IdM workflow to request access –Create a place-holder profile and allow access –Automatically create a profile from attribute information (institutional roles) Result: savings in administrative time

20 Agenda Trends in User Authentication NUIT Plan How Should Applications Prepare? Transitions Wrap-up

21 Step 1

22 Step 2

23 Step 3

24 Step 4

25 Step 5

26 Step 6

27 Step 7

28 Step 8

29 Step 9

30 Agenda Trends in User Authentication NUIT Plan How Should Applications Prepare? Transitions Wrap-up

31 Wrap-Up “Abstraction” frees the application from any particular authentication technology Identity workflow orders the approval process, allows audit controls, and flags the user’s identity for other business rules First-access provisioning saves time and effort for the application administrator Just as secure, with just as much control, just using different tools

Questions? Tom Board