Identity in the Virtual World: Creating Virtual Certainty David L. Wasley Information Resources & Communications UC Office of the President.

Slides:



Advertisements
Similar presentations
PKI Solutions: Buy vs. Build David Wasley, U. California (ret.) Jim Jokl, U. Virginia Nick Davis, U. Wisconsin.
Advertisements

Appropriate Access InCommon Identity Assurance Profiles David L. Wasley Campus Architecture and Middleware Planning workshop February 2008.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
Campus Based Authentication & The Project Presented By: Tim Cameron National Council of Higher Education Loan Programs.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Secure Communication Architectures.
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
Donkey Project Introduction and ideas around February 21, 2003 Yuri Demchenko.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
6/2/2015Information Technology Standing Committee of the IMO 1 Digital Certificate Initiative Guy Springgay Holiday Inn - Oakville.
Figure 1: SDR / MExE Download Framework SDR Framework Network Server Gateway MExE Download + Verification Using MExE Repository (Java sandbox) MExE Applet.
SMUCSE 5349/7349 Public-Key Infrastructure (PKI).
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
CNI Fall 1998 Access Management Requirements and Approaches Joan Gargano California Digital Library
Understanding Active Directory
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Mar 4, 2003Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Security Management.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
9/20/2000www.cren.net1 Root Key Cutting and Ceremony at MIT 11/17/99.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 10: Authentication Guide to Computer Network Security.
Understanding the Value of Identity in Government Social Networking A Framework of Identity Trust in Government Social Networking September 4, 2015.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
1 TAPAS Workshop Nicola Mezzetti - TAPAS Workshop Bologna Achieving Security and Privacy on the Grid Nicola Mezzetti.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Configuring Directory Certificate Services Lesson 13.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
David L. Wasley Office of the President University of California Shibboleth Safe delivery of reliable authorization data David L. Wasley University of.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
The privacy risks and rewards of distributed identity Conference Presentation (8 September 2003) Surveillance and Privacy 2003, University of New South.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Building trust on the internet Extending Attribute Protocols for Status Management and “Other Things” Patrick Richard, Xcert International.
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
DIGITAL SIGNATURE.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Creating and Managing Digital Certificates Chapter Eleven.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
TAG Presentation 18th May 2004 Paul Butler
TAG Presentation 18th May 2004 Paul Butler
PASSHE InCommon & Federated Identity Workshop
Certificates An increasingly popular form of authentication
Appropriate Access InCommon Identity Assurance Profiles
Presentation transcript:

Identity in the Virtual World: Creating Virtual Certainty David L. Wasley Information Resources & Communications UC Office of the President

4 Overview  What are we trying to accomplish?  “Network Identity”  Authentication is not Authorization  The Need for Anonymity  What’s missing?  The UC Common Authentication Project

5 The Problem  On the network, traditional “clues” to identity of an individual are not available

6 The Problem  On the network, traditional “clues” to identity of an individual are not available  Appropriate control of access to information resources and services is necessary l possibly for cost allocation

7 The Problem  On the network, traditional “clues” to identity of an individual are not available  Appropriate control of access to information resources and services is necessary l possibly for cost allocation  We need digital credentials that l associate an individual with eligibilities l can assert ‘class’, perhaps anonymously  e.g. “dog”

4 What are we trying to accomplish?  We must create a set of credentials and supporting infrastructure so that we can recreate in the digital world an analog of the control and management procedures with which we are familiar.  This includes a basis for “trust”  To accomplish this requires fundamental understanding of the problems

10 What is “Identity” ?  The essence depends on context l Identity is based on attributes associated with an individual or thing l Not all attributes are important for all uses l “Given Name” is seldom useful  It is the individual’s relationship with the world that is (most) important

10 Different types of Identity  Specific association with an individual is required for many purposes  Association with a class of individuals may be adequate for some things  Correlation of sequential activities may be the important function l e.g. application for admission l User Profile

11 Electronic Identity  Essential elements include: l A basic credential that is not easily forged l Attributes associated with that credential V e.g. name, campus position, campus role(s), etc. l Safe means to offer that credential to a service l A means for services to verify that credential  May be assigned to individuals, servers, etc. l “public workstations” can have an identity  An individual may hold several credentials

12 How we use Identity  Eligibility to do something l Based on one or more attributes, etc.  “Signing” transactions or documents for validation and/or non-repudiation  Associating resource use with cost allocation l i.e. charging  As part of “trust”

8 Who creates Identity?  Whoever assigns the attributes!  Dozens of different “authorities”  Inherently a distributed model  Acceptance is based on mutual trust  Broad access creates a new set of challenges

9 Authentication is not Authorization  Authentic credentials merely help to relate an individual to attributes  The application or service determines “authorization” l based on attributes l possibly other heuristics  Credentials may assert eligibility

9 Example - internal service  An application may be used by any faculty member l The user offers a basic ID credential l The appliction looks up the “faculty” attribute V should require authentication of the attribute service V may use a campus “attribute proxy” l The application authorizes the user (or not)  An application may be used by any graduate student in Physics after 5PM or on weekends

9 Example - external service A provider of site licensed content needs to know that a potential user belongs to the class of individuals eligible to gain access l The license holder determines eligibility V Based on the relationship of the individual to the institution and the Ts & Cs of the contract l The content provider is given a credential that V is issued by the contract holder V asserts eligibility l The content provider authorizes the user (or not)

8 Conflicts can arise because...  Intellectual freedom demands privacy  The institution has occasional need to circumvent privacy  Service providers need assurance that access is granted appropriately  Who decides what is appropriate? l Application or service requirements l University policy l Faculty vs. “other”

14 Public Key Certificates  Electronic documents  Issued by a registered Certificate Authority  Issued to a known entity  Attributes can be associated with the entity l perhaps indirectly via “attribute databases”  Any receiver can validate the credential  The “private key” can be used for “signing”  Public keys are used for secure transactions

15 Using Public Key Certificates  The basic personal certificate should have minimal content (NetID) l Minimal impact if it is compromised  Attributes should be retrieved from databases l With appropriate access control  Applications use the PKC and attributes l A common Attribute Server can help  Anonymity may require “on demand” secondary certificates

16 The Need for Anonymity  Intellectual freedom  Competitive advantage  Protect appropriate privacy (e.g. marketing)  Electronic voting (very hard)  True anonymity means it isn’t possible to trace the credential to any association with a particular individual l Libraries now go to some length to ensure this

17 Multiple Certificates  It is inevitable that individuals will have more than one certificate l Perhaps many more than one l Perhaps issued by different authorities  We need to make this work l Automatic generation and selection l Certificate templates

17 Multiple Certificate Types  Personal certificates are associated with known individuals l Owner must protect the “private key”  “Anonymous certificates” only assert certain attributes associated with the holder l E.g. registered student, UC employee, etc. l Eligible to access on-line information under the terms of publisher’s contract with UC

13 Trust Models  Traditional (institutional) trust is hierarchical l Driver’s licenses, passports, SSNs, credit cards l Transitive Trust: V A & B trust; B & C trust; do A & C trust? V In “real life” A asks B about C; C asks B about A  We can do the same digitally l Credentialing services must be registered with one or more trust brokers l The trust broker must enforce standard practices

17 What’s missing in PKI today?  Lots! l The CA is the easy part  User interface to the use of certificates  Portability  Management of certificates l E.g. revocation, escrow  Attribute definitions and services  Heirarchical trust

17 A Common Solution?  Can we articulate a common framework and strategy for the use of PK certificates?  Can we define the missing pieces? l E.g. Attribute definitions and services  Can we develope hierarchical trust? l E.g. CREN’s CA  Can we work with vendors to “fix” browsers?  Can we demonstrate proof of concept

18 UC Common Authentication Project  Uses Public Key Certificates l CA may be outsourced...  Will provide electronic credentials for all members of the UC community l a lifetime NetID  Flexible association of attributes l the University Directory l Campus attribute directories  Anonymous Certificates also will be issued

20 Certificate Management Issues  Initial issuance l “Strength” of the ID required l Who is the “notary”? l What are the implications of being a notary?  User interface must be simple, intuitive  Portability  Revocation  Public Workstations

21 UCCAP Initial Applications  MELWEB  Benefits enrollment  Other ESS functions  Access to licensed electronic publications  Electronic commerce  Etc.

22 UCCAP Status  Limited Production System initially  Prototype Root CA operational at OP l uses Netscape CA server  Prototype Campus CA’s under development  MELWEB certificate interface in test mode  University Directory in prototype stage l NetID’s defined l All UC employees are entered l Students will be entered during Spring term

24 More information David L. Wasley Vance Vaughan See also