E-SENS WP5.2 eID Pilot INTRODUCTION 1. CardInfo eID configuration CardInfo artifacts specify and configure specific eID carrier for use with e-SENS eID.

Slides:



Advertisements
Similar presentations
Improving Learning Object Description Mechanisms to Support an Integrated Framework for Ubiquitous Learning Scenarios María Felisa Verdejo Carlos Celorrio.
Advertisements

Practical Digital Signature Issues. Paving the way and new opportunities. Juan Carlos Cruellas – DSS-X co-chair Stefan Drees - DSS-X.
Functional requirements for non- repudiation in eHealth domain For potential eHealth dispute resolution we need the following (among possible other data):
OOI-CI–Ragouzis– Ocean Observatories Initiative Cyberinfrastructure Component CI Design Workshop October 2007.
Stork 2.0 is an EU co-funded project INFSO-ICT-PSP Robert Scharinger & Gottfried Heider (Ministry of Health, AT) WP 5.4 eHealth pilot - epSOS OpenNCP.
ITIL: Service Transition
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
TF-EMC2 February 2006, Zagreb Deploying Authorization Mechanisms for Federated Services in the EDUROAM Architecture (DAME) -Technical Project Proposal-
E-SENS Electronic Simple European Networked Services e-SENS CC5.2 F2F Porto, May 12/13, 2015 SMP & SML Massimiliano Masi.
PAWN: A Novel Ingestion Workflow Technology for Digital Preservation
Tools and Services for the Long Term Preservation and Access of Digital Archives Joseph JaJa, Mike Smorul, and Sangchul Song Institute for Advanced Computer.
Configuration Management
GFIPM Web Services Concept and Normative Standards GFIPM Delivery Team Meeting November 2011.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Methodology and Tools for End-to-End SOA Configurations By: Fumiko satoh, Yuichi nakamura, Nirmal K. Mukhi, Michiaki Tatsubori, Kouichi ono.
Web Development Process Description
E-SENS eHealth Use Cases. eHealth Use Cases (Overview) eConfirmation How is a health care provider in MS B able to get an insurance confirmation for a.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
E-SENS Electronic Simple European Networked Services e-SENS CC5.2 F2F, Porto, 2015 Architecture and use of e-SENS Building Blocks: e-ID SAT Pilot eID Stakeholder.
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
XML in Development of Distributed Systems Tooling Programming Runtime.
Direct Project Direct + Policy Enablement. 12/06/10 Overview Policy Role In Direct Policy Enablement Security and Trust Support Architecture Tool Demo.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
X-Road – Estonian Interoperability Platform
Shib-Grid Integrated Authorization (Shintau) George Inman (University of Kent) TF-EMC2 Meeting Prague, 5 th September 2007.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
OpenPASS Open Privacy, Access and Security Services “Quis custodiet ipsos custodes?”
OOI CI LCA REVIEW August 2010 Ocean Observatories Initiative OOI Cyberinfrastructure Architecture Overview Michael Meisinger Life Cycle Architecture Review.
By Rick Freeman THE HEALTHCARE INNOVATION ECOSYSTEM HiMSS 2015 & Development Sandboxes Update President & Founder iSalus Consulting June 19, 2015.
17 March 2008 © 2008 The University of Edinburgh, European Microsoft Innovation Center and University of Southampton IT Innovation Centre 1 NextGRID Security.
Connect. Communicate. Collaborate Federation Interoperability Made Possible By Design: eduGAIN Diego R. Lopez (RedIRIS)
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
Software Engineering Prof. Ing. Ivo Vondrak, CSc. Dept. of Computer Science Technical University of Ostrava
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security Token Service Valéry Tschopp - SWITCH.
E-SENS Electronic Simple European Networked Services e-SENS CC5.2 eID sub-task f2f Berlin, 25 August, 2015 NCP Deployment and Direct Brokered Trust Massimiliano.
ESafe Open Modules Overview Open modules implementing the eSafe document exchange protocol.
Security, Privacy Access openPASS Open Privacy, Access and Security Services Project Status Report July 1, 2008.
Security Token Service (STS) Design & Development Plans Henri Mikkonen / HIP 3 rd EMI All-Hands Meeting , Padova, Italy.
IHE ITI Profile Proposal XCA Query and Retrieve Fraunhofer ISST and Tiani Spirit on behalf of epSOS Consortium and epSOS Industry Team.
Status Update on Other GFIPM Activity Threads GFIPM Delivery Team Meeting November 2011.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
April, 2005 ebSOA Based on FERA Reference Model Vasco Drecun Collaborative Product Development Associates, LLC Goran Zugic ebXMLsoft Inc.
Creating a European entity Management Architecture for eGovernment Id GUIDE Keiron Salt
A proposal for a Non Repudiation Protocol for epSOS Massimiliano Masi.
Integrating the Healthcare Enterprise The IHE Process: Developing Standards-based Solutions Kevin O’Donnell Co-chair, IHE Radiology Planning Committee.
University of Murcia Gabriel López.  Network authentication in eduroam and SSO token distribution ◦ RADIUS hierarchy ◦ Token based on SAML  Network.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks OpenSAML extension library and API to support.
E-SENS Electronic Simple European Networked Services e-Health in e-SENS Patient Summary and ePrescription 2nd Year Review, 24th June 2015.
PEPPOL is an EU co-funded project CIP-ICT PSP-2007 No OpenPEPPOL Common Session Rome October 3, 2013 Page 1.
Stork is an EU co-funded project INFSO-ICT-PSP STORK PRESENTATION Frank LEYMAN Manager International Relations 04/06/2009.
WP3 Task 3.2 Adaptation of the Training Material.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
Eclipse Foundation, Inc. Eclipse Open Healthcare Framework v1.0 Interoperability Terminology HL7 v2 / v3 DICOM Archetypes Health Records Capture Storage.
Frank Schipplick Work Package Coordinator WP1 - eSignatures.
Alain Bethuyne Web Security Architect BNPParibas Fortis
ITIL: Service Transition
RDA 9th Plenary Breakout 3, 5 April :00-17:30
Cross-sector and user-centric AAI
Shibboleth Roadmap
The GEMBus Architecture and Core Components
Enterprise Service Bus (ESB) (Chapter 9)
CEF eID SMO The use of eID in eHealth
e-Invoicing – e-Ordering 20/11/2008
Una herramienta para la gestión de identidad, el control de acceso y uso compatible con la regulación de identidad europea eIDAS.
Presentation transcript:

e-SENS WP5.2 eID Pilot INTRODUCTION 1

CardInfo eID configuration CardInfo artifacts specify and configure specific eID carrier for use with e-SENS eID building blocks support auto-detection of plugged eID carrier constrain the attribute realm to be available (SMP?) PT – basic profile, extended profile IT – basic profile, extended profile LX – basic profile, limited functionality (cert.-based) GR – basic profile, limited functionality (cert.-based) AT – extended profile ES – missing  DE – extended profile, no piloting planned 2

e-SENS LARMS Local Attribute Mapping and Retrieval: extract, transform, and process attributes from an eID processing local to the PoC in country-B independent of locally available middleware/country-A NI also referred to as passive AuthN provides two baseline profiles: 1.BASIC – identity traits can be freely extracted (Identification) 2.EXTENDED – identity traits can be extracted after controlled AuthN access to further information depending on eID carrier Status: INTEGRATED & DEPLOYED IF INTERESTED: Double Demo with DE & PT (5’+10’ Discussion) 3

advanced/distributed e-SENS eID SAT distributed attribute retrieval and cross eID mapping: usefulness limited but interesting for STORK enrichment pre-authorization by PIN-controlled attribute release: required for advanced functions, prerequisite for many MW providence of authenticated attributes from eID: very useful for mobile eID and STORK-based integrations digital signature for cross-border documents: patient consent as manifest of patient authorization no other document/AuthZ currently envisioned PAC out of scope due to missing x-border properties 4

E-SENS LAM Fully local card-based AuthN and implicit AuthZ based on locally available smart card service functions mandates a full patient authentication cycle by card unlocks higher level card functions: based on Authentication and Signature plan configuration and national constraints issues patient-signed epSOS assertions with NCP-B and NCP-A enforcement options may link to external signature creation and validation schemes requires country-A anchor in SecMan NCP-A reopens ancient issue on introduction of Security Context Status: INTEGRATED & NCP-INTEGRATED & DEPLOYED 5

DCA STORK 2.0 Junction selecting most appropriate eID means available: 1.STORK 2.0 (discussion: STORKv1 DSI component?) 2.advanced e-SENS eID profile (AuthN/AuthZ), FutureID 3.e-SENS LARMS, 4.„typing“ (epSOS), local extraction, proprietary tool chain required is available and dry tested early demonstrator components available need access to STORK 2.0 infrastructure for real tests priority component for regulatory robustness Status: EARLY DEMONSTRATOR w/ GR & IT 6

eID Integration integration development artifacts and progress: e-SENS LARMS: jnlp.fokus.fraunhofer.de e-SENS ready OpenNCP demonstrator e-SENS eID Attribute Mapping Policy documents: not included in current work assignments / budget consideration e-SENS Digital Signature code base re-integrated (harmonizing LARMS and DSig code for joint use) prototype integration into OpenNCP (not RC2 yet) auto-detection of plugged/available eID token carrier auto-filling of search masks with extracted attributes 7

eID physical Integration all integration is unofficial based on OpenNCP staged, complimentary deployment missing architectural cornerstones: security context handler (XACML-style on NCP level) NCP-level services but facades for pan-European selective providence to unburden local HIT (AIS, STORK) metadata / middleware locator and retrieval services re-issuing, compilation, enrichment of attributes from different sources, final LoA/AAL assignments local HIT integration by PAM/JS LARMS component 8

e-SENS WP5.2 eID Pilot REAL-WORLD INTEGRATION AND DEPLOYMENT (e-SENS SCOPE) 9

eID Integration // OpenNCP LARMS is decoupled, „passive“ data provisioning LAM is an active component: needs to be fed with NCP-internal data needs to be granted processing time blocking scheduling, use case MUST be needs to return data to internal NCP components DCA is an active, externalized component: substitutes/enriches an NCP-internal artefact is coordinated from the PoC, not NCP or NI needs to be granted blocking processing 10

eID Integration // OpenNCP II NCP workflow coordination / orchestration: specified Workflow Manager not implemented XACML Security Context Handler not commonly available Liferay Message Bus absorbs orchestration needs: session is the common umbrella for meta data assertions, endpoints, etc. are held in session context Liferay orchestrates time sequence of service invocation Liferay invocation of external NCP services and data flow Liferay implements and triggers epSOS workflows Problem: LAM/DCA have no portal interactions not every PN uses Liferay  no message bus 11

eID Integration // OpenNCP III Problem session-centricity: HP epSOS IdA should not relate with a portal session: def epSOS IdA no portal session = no IdA  no epSOS use case runs matching IdA (+ TRC) are persisted in the session context unknown what IdA relates to which TRC and vice versa Problem Certificates & Management: certificates still rather incompliant to spec’s. huge problem in combination with x-signatures of eID massive changes in cert validation services on country-A 12

eID Integration // OpenNCP III Problem merging of security zones: portal merges all security zones into classic MitM vector: holds all endpoints, IdA, TRC, and signature material epSOS after security relaxations: 13 Portal B Acts on CLAIMS from Portal-B

eID Integration // OpenNCP IV epSOS as specified (Animation): 14 PoC-B NI-B + NCA-B + legal domain B NI-A + NCA-A + legal domain A

eID Integration // OpenNCP III Problem merging of security zones (con’t.): portal merges all security zones into classic MitM vector: holds all endpoints, IdA, TRC, and signature material no portal session = no IdA  no epSOS use case runs matching IdA (+ TRC) are persisted in the session context unknown what IdA relates to which TRC and vice versa Problem NCP w/f Sequencing/Orchestration: as specified, portal is not a component of the NCP orchestration/sequence hard-coded or portal controlled STS’s and Facades cannot re-flow/divert information (con’t. on next slides) 15

Security Architecture: injection of new sequencings LAM time & succession = orchestrating time: LAM/DCA cannot determine *when* to trigger DSig succession: LAM/DCA do not know *if* to engage completion: NCP/STS/LAM cannot control chronology Options: TRC-STS triggers LAM w/ piggybacked TRC-A prototype STS needs to localise LAM, LAM blindly trusts TRC, IdA opaque LAM substitutes TRC-STS and is triggered with IdA NCP needs to localize LAM, LAM trusts NCP, IdA inaccessible portal mediates exchange between TRC-STS and LAM portal merges domains, may withhold tokens, no „local“ display NCP may disengage all advanced functions in all options 16

Security Architecture II: injection of new sequencings OpenNCP v3 Proposal (compatibility & innovation): Option #1 – TRC-STS triggers LAM provides adequate security degree & AAL/LoI: separation/decoupling of concerns clear responsibilities of SOP’s (card, terminal, environment, etc.) much easier integration regarding workflow, IdA harder localization of local LAM module by TRC-STS LAM as a local deployment needs to listen for requests preserves NCP-level orchestration & fat-client support acknowledges patient control regarding eID token encapsulates patient-centric DSig strictly to trusted zone enables trusted viewer for exercising patient control 17

Security Architecture II: injection of new sequencings OpenNCP v3 Proposal (compatibility & innovation): Option #2 – LAM requests unsigned TRC-A from TRC-STS provides adequate security degree & AAL/LoI: clear responsibilities of SOP’s (card, terminal, environment, etc.) harder workflow synchronization: w/f NCP and PoC decoupled correct IdA must be made available to TRC-STS prior to request easier local handling and no external connectivity (but portal) preserves NCP-level orchestration & fat-client support acknowledges patient control regarding eID token encapsulates patient-centric DSig strictly to trusted zone enables trusted viewer for exercising patient control DECISION required to avoid Blocker 18

Security Architecture III: injection of new sequencings 19

e-SENS WP5.2 eID Pilot Housekeeping INTEGRATION 20

Housekeeping // Integration Current To-Do‘s: SP certificate exchange IT, PT, AT, GR for STORK 2.0 Test provision of test-PS/eP bound to the test cards PT to provide context for eID Architecture Document PT to clarify documentation need for x-project work AT to formalize joining the pilot, provisioning of S/W 21