Federated Identity and Interoperability: Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide.

Slides:



Advertisements
Similar presentations
1 U.S. General Services Administration E-Government Procurement: Standard Transactions and Interoperability David Temoshok Director, Federal Identity Management.
Advertisements

The Need for Trusted Credentials Information Assurance in Cyberspace Mary Mitchell Deputy Associate Administrator Office of Electronic Government & Technology.
1 HSPD-12 Compliance: The Role of Federal PKI Judith Spencer Chair, Federal Identity Credentialing Office of Governmentwide Policy General Services Administration.
Institutional Transformation of Government in the Network Society Jane E. Fountain Director, National Center for Digital Government Harvard University.
1 The E-Authentication Initiative E-Authentication: A Federated Approach to Identity Management December 2004.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
Public Key Infrastructure (PKI) Hosting Services.
Department of Health and Human Services Personal Identity Verification Training APPLICANT.
1 Federal Identity Management and Homeland Security Presidential Directive 12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
HIMSS/GSA E-Authentication Initiative A Pilot Project of the HIMSS RHIO Federation HIMSS Public Policy Forum September 28, 2006 Mary Grizkewicz, HIMSS.
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
U.S. Environmental Protection Agency Central Data Exchange EPA E-Authentication Pilot NOLA Network Node Workshop February 28, 2005.
Federal Approach to Electronic Credentials For services to citizens, businesses, other governments, and employees Mary J. Mitchell Office of Electronic.
1 Trust Framework Portable Identity Schemes Trust Framework Portable Identity Schemes NIH iTrust Forum December 10, 2009 Chris Louden.
The U.S. Federal PKI and the Federal Bridge Certification Authority
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
1 eAuthentication in Higher Education Tim Bornholtz Session #47.
Emergence of Identity Management: A Federal Perspective Dr. Peter Alterman Chair, Federal PKI Policy Authority.
E-Authentication: Creating an Environment of Trust David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy The E-Authentication.
E  Authentication Federation The enabler of Electronic Government! presented to AIPC by Stephen A. Timchak June 12, 2005 The E-Authentication Federation.
E-Authentication: What Technologies Are Effective? Donna F Dodson April 21, 2008.
1 Implementation of Homeland Security Presidential Directive 12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide FED/ED.
The E-Authentication Initiative: A Status Report Presented at Educause Meeting June 16, 2004 The E-Authentication Initiative.
The E-Authentication Initiative An Overview Peter Alterman, Ph.D. Assistant CIO for e-Authentication, NIH and Chair, Federal PKI Policy Authority The E-Authentication.
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov FICAM Testing Program and Approved Products List (APL) Overview.
U.S. Federal Enterprise Architecture World Bank Seminar November 22, 2006 Dick Burk Chief Architect and Manager, Federal Enterprise Architecture Program,
Status of E-Government. E-Government: the use of digital technologies to transform government operations in order to improve effectiveness, efficiency,
E-Authentication: The Need for Open-Standards in Implementing E-Government October 6, 2004 The E-Authentication Initiative.
Dao Dinh Kha National Centre of Digital Signature Authentication - Agency of Information Technology Application A vision on a national Electronic Authentication.
HSPD-12 and FIPS-201 Overview v Learning Objectives At the end of this course, you will be able to: Describe Homeland Security Presidential Directive.
Transforming the Business of Government Through Shared Services JOHN SINDELAR Deputy Associate Administrator United States General Services Administration.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
1 The Government-wide Implementation of Homeland Security Presidential Directive 12 (HSPD-12) David Temoshok Director, Identity Policy and Management GSA.
“FEA: Beyond Reference Models” September 07, 2006 Dick Burk Chief Architect and Manager, Federal Enterprise Architecture Program Management Office – OMB.
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
GC Credential Management Evolution for the OASIS/World Bank eGov Workshop 17 th April, 2009For information, please contact:
E-Authentication: The Need for Public and Private Sector Trust David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Federal e-Authentication Initiative: Federated Identity and Interoperability David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide.
U.S. Department of Agriculture eGovernment Program July 9, 2003 eAuthentication Initiative Update for the eGovernment Working Group eGovernment Program.
PKI and the U.S. Federal E- Authentication Architecture Peter Alterman, Ph.D. Assistant CIO for e-Authentication National Institutes of Health Internet2.
U.S. Department of Agriculture eGovernment Program eAuthentication Draft Business Case Executive Summary January 2003.
E-Authentication Overview & Technical Approach Scott Lowery Technical Track Session.
Identity Federations and the U.S. E-Authentication Architecture Peter Alterman, Ph.D. Assistant CIO, E-Authentication National Institutes of Health.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Transforming Government Jane E. Fountain Director, National Center for Digital Government (supported by the National Science Foundation) Associate Professor,
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority Meet FedFed.
1 Federal Identity Management Infrastructure and Policy David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide August 15,
Federal Initiatives in IdM Dr. Peter Alterman Chair, Federal PKI Policy Authority.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
The E-Authentication Federation
Transforming the Business of Government Through Shared Services JOHN SINDELAR Deputy Associate Administrator United States General Services Administration.
U.S. Federal e-Authentication Initiative
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Technical Approach Chris Louden Enspier
The E-Authentication Initiative
HIMSS National Conference New Orleans Convention Center
The E-Authentication Initiative
E-Government Procurement: Standard Transactions and Interoperability David Temoshok Director, Federal Identity Management GSA Office of Governmentwide.
Presentation transcript:

Federated Identity and Interoperability: Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy The E-Authentication Initiative Educause Annual Meeting February 7, 2005

2 The E-Authentication Initiative Session Objectives  Provide status of ID Federation efforts in government and industry  Discuss key infrastructure needed for ID Federation  Discuss issues related to interoperability for ID Federation  Discuss Federal e-Authentication initiative infrastructure  Present the goals of the Electronic Authentication Partnership and how it facilitates identity federation

3 The E-Authentication Initiative Background  Industry snapshot – federated identity Federated identity definition Agreements, standards, technologies that make identity and entitlements portable across loosely coupled, autonomous domains Standards and specifications Security Assertion Markup Language (SAML) 1.0, 1.1, 2.0 Liberty Alliance, Shibboleth, and Web services security Adoption Burton Group cites over 200 organizations implementing SAML plus other specifications, in multiple industries Vendors Multiple identity management and other vendors have implemented SAML and federated identity in COTS products Interoperability, trust, deployment still challenging

4 The E-Authentication Initiative Identity Federation – Key Interoperability Needs Federation Communications (Technical Interoperability) Federation Business Relationships (Business Interoperability) Federation Trust (Policy Interoperability) Identity Federations extend beyond current peer-peer, bi-lateral agreements to build common infrastructure shared among multiple parties.

5 The E-Authentication Initiative Federation Infrastructure Interoperable Technology (Communications) Determine intra-Federation communication architecture Administer common interface specifications, use cases, profiles Conduct interoperability testing ( as needed) according to the specifications Provide a common portal service (I.e., discovery and interaction services) Trust Establish common trust model Administer common identity management/authentication policies for Federation members Business Relationships Establish and administer common business rules Manage relations among relying parties and CSPs Manage compliance/dispute resolution

6 The E-Authentication Initiative President’s Management Agenda 1 st Priority: Make Government citizen-centered. 5 Key Government-wide Initiatives: Strategic Management of Human Capital Competitive Sourcing Improved Financial performance Expanded Electronic Government Budget and Performance Integration

7 The E-Authentication Initiative Government to Govt.Internal Effectiveness and Efficiency 1. e-Vital (business case) 2. Grants.gov 3. Disaster Assistance and Crisis Response 4. Geospatial Information One Stop 5. Wireless Networks 1. e-Training 2. Recruitment One Stop 3. Enterprise HR Integration 4. e-Travel 5. e-Clearance 6. e-Payroll 7. Integrated Acquisition 8. e-Records Management PMC E-Gov Agenda OPM GSA OPM GSA NARA Lead SSA HHS FEMA DOI FEMA Lead GSA Treasury DoED DOI Labor Government to Business 1. Federal Asset Sales 2. Online Rulemaking Management 3. Simplified and Unified Tax and Wage Reporting 4. Consolidated Health Informatics (business case) 5. Business Gateway 6. Int’l Trade Process Streamlining Lead GSA EPA Treasury HHS SBA DOC Cross-cutting Infrastructure: eAuthentication GSA Government to Citizen 1. USA Service 2. EZ Tax Filing 3. Online Access for Loans 4. Recreation One Stop 5. Eligibility Assistance Online

8 The E-Authentication Initiative The Starting Place for e-Authentication: Key Policy Points For Governmentwide deployment:  No National ID.  No National unique identifier.  No central registry of personal information, attributes, or authorization privileges.  Different authentication assurance levels are needed for different types of transactions. And for e-Authentication technical approach:  No single proprietary solution  Deploy multiple COTS products -- users choice  Products must interoperate together  Controls must protect privacy of personal information.

9 The E-Authentication Initiative The Federal E-Authentication Service Credential Service Provider Agency Application Access Point Application User Step 3Step 2 Step 1 Step 1: At access point (portal, agency Web site or credential service provider) user selects agency application and credential provider (Discovery Portal) Step 2: User is redirected to selected credential service provider If user already possesses credential, user authenticates If not, user acquires credential and then authenticates Step 3: Credential service hands off authenticated user to the agency application user selected at the access point Discovery Portal

10 The E-Authentication Initiative Governments Federal States/Local International Higher Education Universities Higher Education PKI Bridge Healthcare American Medical Association Patient Safetty Institute Travel Industry Airlines Hotels Car Rental Trusted Traveler Programs Central Issue with Federated Identity – Who do you Trust? E-Commerce Industry ISPs Internet Accounts Credit Bureaus eBay Trust Network Financial Services Industry Home Banking Credit/Debit Cards Absent a National ID and unique National Identifier, the e-Authentication initiative will establish trusted credentials/providers at determined assurance levels. 280 Million Americans Millions of Businesses State/local/global Govts

11 The E-Authentication Initiative The Need for Federated Identity Trust and Business Models  Technical issues for sharing identities are being solved, but slowly  Trust is critical issue for deployment of federated identity Federated ID networks have strong need for trust assurance standards How robust are the identity verification procedures? How strong is this shared identity? How secure is the infrastructure?  Common business rules are needed for federated identity to scale N 2 bi-lateral trust relationships is not a scalable business process Common business rules are needed to define: Trust assurance and credential strength Roles, responsibilities, of IDPs and relying parties Liabilities associated with use of 3 rd party credentials Business relationship costs Privacy requirements for handling Personally Identifiable Information (PII)  Federal e-Authentication Initiative will provide trust framework to integrate (policy, technology, business relationships) across disparate and independent identity systems

12 The E-Authentication Initiative Factor Token Very High Medium Standard Low Employee Screening for a High Risk Job Obtaining Govt. Benefits Applying for a Loan Online Access to Protected Website Surfing the Internet Click-wrap Knowledge Pin/Password -Based PKI/ Digital Signature Multi- Increased $ Cost Increased Need for Identity Assurance Multiple Authentication Assurance Levels to meet multiple risk levels

13 The E-Authentication Initiative e-Authentication Trust Model for Federated Identity 3. Establish technical standards for e-Authentication systems (NIST Special Pub Authentication Technical Guidance 6/04) 1. Establish e-Authentication risk and assurance levels (OMB M Federal Policy Notice 12/16/03) 4. Establish methodology for evaluating credentials/providers on assurance criteria (FBCA & Credential Assessment Framework 11/03) 2. Establish standard methodology for e-Authentication risk assessment (ERA) 2/04 5. Assess CSPs and maintain trust list of trusted CSPs for govt-wide (and private sector) use 2/04 6. Establish common business rules for use of trusted 3rd-party credentials (11/04) 7. Test products and implementations for interoperability (2/04)

14 The E-Authentication Initiative Federal Interoperability Lab  Tests interoperability of products for participation in e-Authentication architecture. Conformance testing to Fed e-Authentication Interface Specification Interoperability testing among all approved products  Currently 10 SAML 1.0 products on Approved Product List. See URL:  Federal e-Authentication Program will adopt additional schemes SAML 2.0 Liberty Alliance Shibboleth  Protocol Translator is required for technical architecture  Multiple protocol interoperability testing will be very complex  Federal Government will operate Interoperability lab until protocol/product convergence or industry test lab is in place  Approved products list is publicly available.

15 The E-Authentication Initiative The Approach to a U.S. Federal PKI  Agencies implement their own PKIs  Create a Federal Bridge CA using COTS products to bind Agency PKIs together  Establish a Federal PKI Policy Authority to oversee operation of the Federal Bridge CA  Ensure directory compatibility  Use ACES for transactions with the public

16 The E-Authentication Initiative University PKI University PKI University PKI A Snapshot of the U.S. Federal PKI NFC PKI Higher Education Bridge CA NASA PKI DOD PKI Illinois PKI CANADA PKI Federal Bridge CA ACES PKI Treasury PKI DOL PKI Wells Fargo Bank State Dept PKI

17 The E-Authentication Initiative The Need for the Electronic Authentication Partnership State/Local Governments Industry Policy Authentication Assurance levels Credential Profiles Accreditation Business Rules Privacy Principles Technology Adopted schemes Common specs User Interfaces APIs Interoperable COTS products Authz support Federal Government Commercial Trust Assurance Services Policy, Technical, & Business Interoperability Common Business and Operating Rules IDP RP Interoperability for:

18 The E-Authentication Initiative What is the EAP Multi-industry partnership creating a framework for interoperable authentication Plans to establish itself as a member-supported organization, and complete framework in early 2005 Goals Provide organizations with a straightforward means of relying on digital credentials issued by a variety of authentication systems Eliminate or at least reduce the need for organizations to establish bilateral agreements Organizations would operate under common EAP rule set, resulting in multilateral trust In practice this means a federated approach

19 The E-Authentication Initiative What the EAP is doing now for ID Federation Current State of Industry: Bi-Lateral Pairs IDP SP/RP Bi-lateral Agreements Pair-wise Trust Model Pair-wise Interface Spec and Products EAP Objective: Multi-Party, Interoperable Federation IDP SP/RP Common Business Rules/Agreements Common Trust Model Common Interface Specification Interoperable Products

20 The E-Authentication Initiative What the EAP envisions for ID Federation IDP SP/RP EAP Vision: Multiple, Interoperable Federations EAP Common Business Rules/Agreements Common Trust Models Common Basic Interface Specifications Interoperable Products Federation 1 Federation 2 Federation 3

21 The E-Authentication Initiative Subject: Policy for a Common Identification Standard for Federal Employees and Contractors (1) Wide variations in the quality and security of forms of identification used to gain access to secure Federal and other facilities where there is potential for terrorist attacks need to be eliminated. Therefore, it is the policy of the United States to enhance security, increase Government efficiency, reduce identity fraud, and protect personal privacy by establishing a mandatory, Government-wide standard for secure and reliable forms of identification issued by the Federal Government to its employees and contractors (including contractor employees). (2) To implement the policy set forth in paragraph (1), the Secretary of Commerce shall promulgate in accordance with applicable law a Federal standard for secure and reliable forms of identification (the "Standard") not later than 6 months after the date of this directive in consultation with the Secretary of State, the Secretary of Defense, the Attorney General, the Secretary of Homeland Security, the Director of the Office of Management and Budget (OMB), and the Director of the Office of Science and Technology Policy. The Secretary of Commerce shall periodically review the Standard and update the Standard as appropriate in consultation with the affected agencies. Homeland Security Presidential Directive/HSPD-12 FIPS 201 Personal Identity Verification Standard

22 The E-Authentication Initiative (3) "Secure and reliable forms of identification" for purposes of this directive means identification that (a) is issued based on sound criteria for verifying an individual employee's identity; (b) is strongly resistant to identity fraud, tampering, counterfeiting, and terrorist exploitation; (c) can be rapidly authenticated electronically; and (d) is issued only by providers whose reliability has been established by an official accreditation process. The Standard will include graduated criteria, from least secure to most secure, to ensure flexibility in selecting the appropriate level of security for each application. The Standard shall not apply to identification associated with national security systems as defined by 44 U.S.C. 3542(b)(2). (4) Not later than 4 months following promulgation of the Standard, the heads of executive departments and agencies shall have a program in place to ensure that identification issued by their departments and agencies to Federal employees and contractors meets the Standard. As promptly as possible, but in no case later than 8 months after the date of promulgation of the Standard, the heads of executive departments and agencies shall, to the maximum extent practicable, require the use of identification by Federal employees and contractors that meets the Standard in gaining physical access to Federally controlled facilities and logical access to Federally controlled information systems. Homeland Security Presidential Directive/HSPD-12

23 The E-Authentication Initiative Federal Personal Identification Verification Standard

24 The E-Authentication Initiative For More Information Phone David Temoshok Websites