Signing On for FSA Systems Tokens/Two-Factor Authentication and Modifications to User Sign-on in 2013 Bridget-Anne Hampden U.S. Department of Education.

Slides:



Advertisements
Similar presentations
Campus Based Authentication & The Project Presented By: Tim Cameron National Council of Higher Education Loan Programs.
Advertisements

15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
Catherine Metcalf | Dec U.S. Department of Education 2014 FSA Training Conference for Financial Aid Professionals Introducing the FSA ID - The FSA.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Electronic Status Reporting for Lenders FSA Guaranteed Loan System.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Two Factor Authentication Protocol and the Protection of PII Steven A. Burke U.S. Department of Education 1.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Federal Student Aid Technical Architecture Initiatives James McMahon Ganesh Reddy U.S. Department of Education Session T-03.
Office of the Chief Information Officer EFCOG Annual Meeting Fred Catoe (IM-32) U.S. Department of Energy.
1 eAuthentication in Higher Education Tim Bornholtz Session #47.
FSA ID TRANSITION Ditch the PIN. WHAT IS THE NEW FSA ID AND PASSWORD? U.S. Department of Education has a new login process beginning April 26 th for student-
Understanding Active Directory
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
Identity and Access Management IAM A Preview. 2 Goal To design and implement an identity and access management (IAM) middleware infrastructure that –
Updating User Information Password – use this field to change your own password Confirm Password – retype the new password for verification purposes To.
Network security policy: best practices
1. 2 ECRF survey - Electronic signature Mr Yves Gonner Luxembourg, June 12, 2009.
Understanding Active Directory
Federal Requirements for Credential Assessments Renee Shuey ITS – Penn State February 6, 2007.
1 Data Strategy Overview Keith Wilson Session 15.
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Federal Student Aid Identification username and password – this is how students and parents will sign the FAFSA application. The FSA ID process replaced.
Division of Instructional and Information Technology Amy Johnson, Project Manager Student-Parent Project Overview January, 2011.
Session 52 Security Architecture – What Does It Mean Katie Blot Nina Colon.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
U.S. Department of Agriculture eGovernment Program August 14, 2003 eAuthentication Agency Application Pre-Design Meeting eGovernment Program.
Msix.ed.gov. 9. How do I get access to MSIX? School and MEP personnel can request an MSIX account using the "How Do I Get an Account?" link at the bottom.
PIV 1 Ketan Mehta May 5, 2005.
Session # 10 NSLDS Update Valerie Sherrer Ron Bennett.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
UCLA Enterprise Directory Identity Management Infrastructure UC Enrollment Service Technical Conference October 16, 2007 Ying Ma
Computer Emergency Notification System (CENS)
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
Federal Student Aid Technical Architecture Initiatives James McMahon Ganesh Reddy U.S. Department of Education Session T-03.
Shibboleth: An Introduction
Warren Gordon U.S. Department of Education 2012 Software Developers Webinar #3 Identity Management.
Bridget-Anne Hampden | Nov U.S. Department of Education 2012 Fall Conference Enterprise Identity Management – Leveraging Participation Management.
1 Standard Student Identification Method Jeanne Saunders Session 16.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Session 3 Integrated Partner Management (IPM) Presenters Molly Wyatt Susan Stallard Margaret Ayanian Andrea DiDonna.
Amber Johnson U.S. Department of Education WVASFAA Fall 2015 Conference October 29, 2015 FSA ID: The FSA PIN Replacement.
Presentation of the Online Pre-Screening Process on EasyAppsOnline.
National Enrolment Service (NES) Overview October 2015 – June 2016.
Diahann Greene| Dec U.S. Department of Education 2015 FSA Training Conference for Financial Aid Professionals Integrated Partner Management (IPM)
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Project Presentation to: The Electronic Access Partnership July 13, 2006 Presented by: Tim Cameron, Meteor Project Manager The.
MassHealth Medicaid Management Information System (MMIS) Provider Online Service Center (POSC) Technical Upgrade January 13, 2016.
Session 58 Integrated Partner Management (IPM) for Financial Institutions Presenters Molly Wyatt Susan Stallard Margaret Ayanian Andrea DiDonna.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Session #23 Improving the School Eligibility Application Process with the Integrated Partner Management (IPM) Solution Molly Wyatt Susan Stallard U.S.
Catherine Metcalf | Dec U.S. Department of Education 2015 FSA Training Conference for Financial Aid Professionals The FSA ID – Resources for Assisting.
SEPARATE ACCOUNTS FOR PROSPECTS? WHAT A HEADACHE! Ann West Assistant Director, InCommon Assurance and Community Internet2 at Michigan Tech.
Automate Blue Button Initiative Pull Workgroup Meeting December 13, 2012.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Two Factor Authentication & PII Security Updates March 9, 2012 Steven Burke & Cheng Tang.
Step 1 Lead Notifications Dear Partner, New leads have been assigned to your organization based on customer preference and are available for you.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
BIM 360 Glue Migration to BIM 360 Account Administration (HQ)
SaaS Application Deep Dive
Identity Management Warren Gordon U.S. Department of Education 2012 Software Developers Webinar #3.
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

Signing On for FSA Systems Tokens/Two-Factor Authentication and Modifications to User Sign-on in 2013 Bridget-Anne Hampden U.S. Department of Education

Contents Need Objective Comprehensive Security Strategy Approach Achievements Two-Factor Authentication Technical Proof of Concept Modifications Lessons Learned Feedback Next Steps Questions 2

Need The registration and sign-on for FSA users required a more improved process which still maintained security by: – Simplifying access to FSA systems with single (reduced) sign-on – Creating a standardized solution supporting the entire user community and all business systems – Removing Personally Identifiable Information (PII), such as the current use of Social Security Numbers (SSN) and Date of Birth from log-in – Maintaining a consistent data security posture across all FSA systems 3

Need Previous authentication processes did not address the distinct needs of two very different user groups and FSA: – Privileged Users (partners, schools, etc..) Need to maintain tens/hundreds of FSA user accounts Centralized provisioning – Non-privileged Users (applicants, borrowers, parents) Use of Personally Identifiable Information (PII) in non-privileged (applicant or borrower) User IDs and passwords Ability to provide self service features to the non-privileged users (change password, retrieve username, etc.) Ability to separate authentication and e-signature credentials – FSA Need for centralized operations and management, and audit and reporting capabilities Need for two-factor authentication 4

Objective The Objective of EIMS is to: “make provisioning and access management for FSA systems more efficient and secure for both privileged (partners) and non-privileged users (students/borrowers).” 5

FSA Comprehensive Security Strategy INITIATIVES STRATEGY Security Governance Audit Privacy / Data Protection Trusted Internet Connection (TIC) COD behind TIC / Einstein IPS Enterprise Identity Management Services (EIMS) COD/PM/AIMSPINPRMSSoft Tokens Two Factor Authentication TFA deployed for privileged users Network Intrusion Detection / Monitoring 48 Month Timeline 6

Approach Phase 1: Place all FSA Privileged user systems [e.g. National Student Loan Data System (NSLDS), COD, eCampus-Based System (ECB)] behind a single authentication application (AIMS) which uses one FSA ID and password Phase 1a: Implement two-factor authentication Phase 2: Leverage PM system for COD online enrollments and provide privileged users a single FSA ID for COD and other FSA Systems; test use of Federated IDs Phase 3: Create non-identifiable standard FSA User IDs and passwords for students and borrowers to access FSA systems Phase 4: Move from physical (hard) tokens to the use of soft tokens 7

Achievements Phase 1 – Migrated over 60,000 users to a single FSA ID and password – Consolidated authentication of FSA Privileged user systems (e.g. NSLDS, COD, ECB etc…) behind a single authentication application (AIMS) Phase 1a – Responded to a requirement from OMB to provide additional safeguards for PII data – Modified nine FSA Systems to integrate with Two-Factor Authentication (TFA or hard tokens) – In-process of distributing hard tokens to privileged users (to be completed by Fall 2013) 8

Achievements Phase 2: – Consolidated provisioning through the PM system for COD online enrollments – Re-permissioned over 32,000 COD online users between March and June 2013 – Reduced the number of COD User IDs to a single FSA ID for COD and other FSA Systems – Conducted technical proofs of concept to ensure the feasibility of proposed functionality and scalability of AIMS for Phase 3 9

Achievements Phase 3: Developed requirements for a consolidated authentication and access management system for over 80 million non-privileged users which would: – Implement a User ID and password that does not include personally identifiable information (PII) – Allow for the self service capability to change passwords, retrieve username, etc. – Be scalable for future expected growth – Deploy in late Fall 2014 Began government acquisition process by releasing a Request for Proposals (RFP) 10

Two-Factor Authentication (TFA) Objectives Comply with OMB M which requires the safeguarding against the breach of Personally Identifiable Information (PII) Implement a security protocol which requires all authorized users to enter two forms of authentication to access FSA systems Authentication is made through a hard token derived password accompanied by a User ID and password 11

Two-Factor Authentication Results Modified nine systems to accept new protocols Deployed TFA in 35 countries and the US Deployed tokens to and enabled over 57,000 privileged user accounts – Including Post Secondary schools, Guarantee Agencies, TIVAs and NFPs In process of deploying and enabling Third Party Servicers and Lenders 12

InCommon Federation Technical Proof of Concept Objectives Demonstrate the ability to participate in the InCommon Federation as a Service Provider Identify and document the identity federation scenarios (use cases) for a university user Verify the university user’s login will allow the user to access an FSA application protected by FSA’s Access and Identity Management System (AIMS) Conduct test with the University of Maryland-Baltimore County (UMBC) and Pennsylvania State University (PSU) 13

InCommon Federation Technical Proof of Concept Results Configured AIMS as an InCommon Service Provider using FSA Access and Identity Management System Configured AIMS to trust UMBC and PSU IDs and passwords, as the InCommon Identity Providers Developed user activation module to map InCommon User IDs to FSA IDs Successfully accessed FSA systems using InCommon / University User ID and password 14

Modifications: COD Changes PastCurrent Security Administrator enrolls users through COD for online access Users receive different log-ins for each school and profile Users need to log-out to change schools or profile Users only have access to report structures created for a specific school or profile Primary DPA enrolls users through PM for COD online access Users receive 1 FSA log-in for all schools and profile Users can change schools or profile without logging-out Users have access to all report structures created for any schools or profile 15

Modifications: PM Changes PM provisions COD online access enrollments Primary DPA only needs to enter user and enrollment information into one system, PM, for COD, NSLDS, ECB etc... PM is linked to AIMS which provides COD, NSLDS etc… online access authentication PreviousCurrent PM does not provision enrollments for COD online access Primary DPAs may need to enter user and enrollment information into multiple systems, COD and PM PM is not linked to AIMS for COD online access authentication 16

Modifications: Privacy and Security Improvements FSA requires that all users accept their responsibilities regarding the use of FSA systems and information as is written in the Privacy Statement and the Rules of Behavior In addition, FISMA requires that FSA track this information and provide audit information as requested On a daily basis, users are asked to accept both these statements when they first log-in to COD (or any system accepting the FSA ID) 17

Modifications: Annual Security Training Notification Users are now required to complete Annual Security Training which: – Provides an understanding of the security responsibilities associated with accessing FSA systems – Reminds users of their responsibilities to protect the information in FSA systems especially the PII data of the students, borrowers, and users – Specifies certain activities as not allowed, such as the sharing of FSA IDs For the ten (10) days prior to expiration, users are notified of the expiration of their security training when they log-in to COD If the Annual Security Training is not complete, users will not be able to access COD 18

Lessons Learned Phase 2 Needed to provide greater clarity during pre-enrollment (March – May) on which User ID to use (COD or AIMS) Extent of duplicate ID’s and the amount of time/effort required to “scrub” the data Importance of confirmation of information during enrollment in PM by DPA; mis-keying information resulted in data conflicts and need for additional account cleanup Need for greater clarity in error messages; – Users were confused when they received "Invalid User ID" error message when logging in to COD after May 5 th and thought it was a token or account issue not an enrollment issue Importance of more targeted communication with the DPA and with COD users about the pre-enrollment process 19

Feedback So, how did we do? 20

Next Steps for EIMS Complete distribution of hard tokens Complete procurement award Develop solution which will remove PII for non-privileged users Test and implement the solution (late Fall 2014) 21

Questions?

Contact Info Bridget-Anne Hampden Senior Advisor Federal Student Aid 23