Stronger Authentication in a Federated World Bill Young Government Technology Services NZ State Services Commission.

Slides:



Advertisements
Similar presentations
Secure Single Sign-On Across Security Domains
Advertisements

McAfee One Time Password
Strong Mobile Authentication in Finland (MPKI, WPKI) Special Discussion Topic Kantara Initiative Telco Identity Working Group Prepared by: Keith Uber Ubisecure.
Overview of US Federal Identity Management Initiatives Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO E-Authentication, NIH.
NZ igovt/RealMe proposed consent service: overview Kantara eGov Working Group April 8 th 2013 CROWN COPYRIGHT © This work is licensed under the Creative.
Step Up Authentication in SAML (and XACML) Hal Lockhart February 6, 2014.
Xavier Verhaeghe Vice President Oracle Security Solutions
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Step-up Authentication as-a Service Pieter van der Meulen Technical Product Manager.
DRAGOLJUB NESIC 08/12/2013 DOES IDENTITY MANAGENT REALLY HAVE TO BE DIFFICULT?
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Online Identity Authentication and Data Broker SNAP Director’s Conference September 23, 2013.
State Services Commission New Zealand Government Crown Copyright “Standards are only the beginning.. …of the beginning.. … of interoperability”
Digital DNA Server Login People ®. Login People ˃ IT security vendor ˃ Patented Digital DNA ® technology innovation Digital DNA Server Multi-factor Authentication.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
Chapter 12 Network Security.
Carl A. Foster.  What is SAML?  Security Assertion and Markup Language is an XML-based standard for exchanging authentication and authorization between.
About PKI Key Stores Dartmouth College PKI Lab. Key Store Defined Protected “vault” to hold user’s private key with their copy of their x.509 certificate.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Certificate and Key Storage Tokens and Software
Online and Mobile Banking. Online banking Online Banking  Online banking is a fairly established practice in our internet-saturated world.  Many people.
National Smartcard Project Work Package 8 – Security Issues Report.
Policy, Trust and Technology Mitigating Risk in the Digital World David L. Wasley Camp 2006 © David L. Wasley, 2006.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Author of Record Digital Identity Management Sub-Workgroup October 24, 2012.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Functional Model Workstream 1: Functional Element Development.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Identity Management Report By Jean Carreon and Marlon Gonzales.
© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. Leveraging Information to Detect and Prevent Insider Attacks Phoram Mehta Senior.
Developing Applications for SSO Justen Stepka Authentisoft, LLC
GC Credential Management Evolution for the OASIS/World Bank eGov Workshop 17 th April, 2009For information, please contact:
“Stronger” Web Authentication: A Security Review Cory Scott.
Helsinki Institute of Physics (HIP) Liberty Alliance Overview of the Liberty Alliance Architecture Helsinki Institute of Physics (HIP), May 9 th.
Levels of Assurance in Authentication Tim Polk April 24, 2007.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
0 1 WHAT KEEPS USERS AWAY? 2 47% 46% 43% 39% 40% 50% 45% 34% 21% 15% 20% 19% 13% 26% 20% 12% I fear that my account information will be viewed by an unauthorized.
Shibboleth What is it and what is it good for? Chad La Joie, Georgetown University.
Identity Federations and the U.S. E-Authentication Architecture Peter Alterman, Ph.D. Assistant CIO, E-Authentication National Institutes of Health.
ISPAB Panel on Usable Security Mary Frances Theofanos - NIST Ellen Cram Kowalczyk - Microsoft.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Identity Management, Federating Identities, and Federations November 21, 2006 Kevin Morooney Jeff Kuhns Renee Shuey.
Internet2 Base CAMP Topics in Middleware: Authentication.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
1 © Copyright 2015 EMC Corporation. All rights reserved. RSA SecurID Update {Rep Name}
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
F5 APM & Security Assertion Markup Language ‘sam-el’
A l a d d I n. c o m Strong Authentication and Beyond Budai László, IT Biztonságtechnikai tanácsadó.
Copyright © 2016 VALENTINE OBI, MD/CEO, eTRANZACT PLC The Experience Powering Retail Payments in Digital Africa.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Access Policy - Federation March 23, 2016
Identity and Access Management
Secure Single Sign-On Across Security Domains
Challenge/Response Authentication
Future Ideas: Federation and Integration
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
State of e-Authentication in Higher Education Bernie Gleason
Strong Authentication and Single Sign-On (SSO) for Health Care
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Presentation transcript:

Stronger Authentication in a Federated World Bill Young Government Technology Services NZ State Services Commission

NZ State Services Commission Crown Copyright Quick Background of NZ Authentication n “Commercial” IdP for any government Agency n Policy Driven l Privacy l Security l Standards n Evolutionary Development - Web Applications First

NZ State Services Commission Crown Copyright Our Big Drivers n Privacy n May not Disenfranchise any part of the Public n Breadth of Scale in govt Departments

NZ State Services Commission Crown Copyright NZ AuthN & IdM Services

NZ State Services Commission Crown Copyright What’s our Challenge? n Continuous Improvement of Services n Risk-Based Approach to Security l Adapt to Evolving Threats l Match Pace with the New Services Provided to End Users n Limit Barriers to Uptake

NZ State Services Commission Crown Copyright Typical Responses to the Need for Stronger Authentication n Conventional l ‘Better’ Passwords l OTP Tokens n Less Conventional l PKI l Biometrics

NZ State Services Commission Crown Copyright Passwords “We need Stronger Passwords. Let’s Improve our Password Policy” n Longer more complex passwords, system generated passwords, password history, force frequent changes, etc. And the Result? n Un-usable, Un-Fit, Un-Friendly, Un-Supportable n Support Costs n Social Engineering There are Ways to Improve Passwords (just rarely used)

NZ State Services Commission Crown Copyright One Time Passwords (OTP) n Tokens l $$ - Token Cost & Logistics n Bingo cards & TAN sheets l More Cost-Effective, but Frequently Copied n Soft Tokens l Security & Usability Issues n SMS l Good, Except for High Volume Use

NZ State Services Commission Crown Copyright PKI n Soft Certificates l Issues with Usability and Security l Support Cost n Centrally Stored l Ok, But not Really 2FA n Smartcards, USB tokens l Hardware & OS Support is Incomplete l High Support Cost

NZ State Services Commission Crown Copyright Biometrics More Questions than Answers… ? ? ? ? ? ? ? ? ? ? ? ? ? ? ?

NZ State Services Commission Crown Copyright That’s all fine, but… …how does it contribute to a Risk-Based approach?

NZ State Services Commission Crown Copyright Run-Time Smartcard Risk Assessment Information Architecture AuthN Topology User Navigates Low ValueModerate Value High Value TokenUserId/Passwd Application/Resources Development Federated Identifier

NZ State Services Commission Crown Copyright Context Sensitive Authentication Definition: “Authentication based on Real Time Risk Analysis”

NZ State Services Commission Crown Copyright Run-Time Requested AuthN Context 5% High Value/risk 70% Low value/risk Real-time Risk Assessment Continue With Application User Enters Application OTP AuthN Application/ Resources Federated Identifier & Risk ‘Advice’ “Strong” AuthN No Action Required 25% Increased value/risk Device Detection UID/Password or Higher Requested AuthN Context Context Sensitive Approach

NZ State Services Commission Crown Copyright OOB Authentication Definition: Out of Band Authentication requires that separate information channels are used for authentication and access.

NZ State Services Commission Crown Copyright Run-Time AuthnContext User Enters Application Application/ Resources Federated Identifier & Risk ‘Advice’ UID/Password or Higher OOB AuthN Application Continues Perceived Channel Risk Phone AuthnContext SMS Out of Band Authentication

NZ State Services Commission Crown Copyright Transaction Authentication/Verification Definitions: “Transaction Authentication Verifies that the Correct User is Requesting a Transaction” “Transaction Verification Verifies that the Correct Transaction is Performed for the User” I’m combining both under the term “Transaction Authentication”

NZ State Services Commission Crown Copyright Run-Time Transaction Context/Details User Enters Application/ Resources Federated Identifier & Risk ‘Advice’ UID/Password or Higher “You are about Transfer $ to Account #BNZ Enter OTP to Continue” Application Continues Perceived Transaction Risk Transaction Authentication

NZ State Services Commission Crown Copyright Run-Time Transaction Context 5% High risk 70% Low value/risk Real-time Risk Assessment Continue With Application User Enters Step Up AuthN Application/ Resources OOB AuthN Transaction AuthN No Action Required 20% Increased value/risk 5% Perceived threat Device Detection UID/Password or Higher AuthN Context Federated Identifier & Risk ‘Advice’ Putting it all Together

NZ State Services Commission Crown Copyright Question? Should Transaction AuthN be done using SAML Web SSO? It’s an AuthZ problem too…

NZ State Services Commission Crown Copyright SAML Considerations How do these techniques look from a SAML point of view?

NZ State Services Commission Crown Copyright Context Sensitive Authentication Step Up Authentication SAML SpecWell Supported Liberty InteropNot Specified – Optional in US eAuth profile eGov ProfileSupported Vendor SupportBecoming Well Supported

NZ State Services Commission Crown Copyright Context Sensitive Authentication Returning Risk Context to SP SAML SpecWell Supported Liberty InteropNot Specified eGov ProfileNot Specified Vendor SupportMixed

NZ State Services Commission Crown Copyright OOB Authentication Passing to IdP SAML SpecWell Supported Liberty InteropNot Specified eGov ProfileNot Specified or Restricted Vendor SupportUnknown, but doubtful

NZ State Services Commission Crown Copyright Transaction Authentication Transaction Details and Context SAML SpecUnanticipated – Some options available Liberty InteropNot Specified eGov ProfileNot Specified Vendor SupportUnknown, but doubtful

NZ State Services Commission Crown Copyright Moving Forward n Look at Real Time Risk Analysis l Need an easy model for agencies n Establish Conventions for SAML usage n Update NZSAMS & eGov profile n Lab Implementation n Work with Vendors

NZ State Services Commission Crown Copyright Questions?