Government Online Copyright © 2007 Credentica Inc. All Rights Reserved. February 15th - 16th, 2007 Mobile Showcase.

Slides:



Advertisements
Similar presentations
Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010.
Advertisements

Lousy Introduction into SWITCHaai
Installation & User Guide
Dating Portal showcase Copyright © 2007 Credentica Inc. All Rights Reserved. February 15th - 16th, 2007.
Access & Identity Management “An integrated set of policies, processes and systems that allow an enterprise to facilitate and control access to online.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Xavier Verhaeghe Vice President Oracle Security Solutions
Functional component terminology - thoughts C. Tilton.
Single Sign On Tutorial for New Employees February 10, 2005.
Access Control Methodologies
Privacy and Identity Authentication © Copyright 2004, Credentica Inc. All Rights Reserved. Dr. Stefan Brands Credentica & McGill School of Computer Science.
Chief Information Officer Branch Gestion du dirigeant principal de l’information “We will have a world class public key infrastructure in place” Prime.
16/3/2015 META ACCESS MANAGEMENT SYSTEM Implementing Authorised Access Dr. Erik Vullings MAMS Programme Manager
Government Online – White Paper Companion – Copyright © 2007 Credentica Inc. All Rights Reserved. This presentation is animated. Press the “space bar”
Understanding Active Directory
Using Digital Credentials On The World-Wide Web M. Winslett.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Christian Paquin May 1 st, 2007 Identity Management Techniques – CFP 2007 Tutorial – Copyright © 2007 Credentica Inc. All Rights Reserved.
1 © Copyright 2008 EMC Corporation. All rights reserved. EMC Documentum Trusted Content Services.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
A Product of Corporate Instant Messenger Enterprise Communication and Collaboration with Secure Instant Messaging Copyright © ANGLER.
New Data Regulation Law 201 CMR TJX Video.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 © 2011 Dow Jones & Company, Inc. All rights reserved. ©2012 Dow Jones & Company, Inc. All rights reserved. Digital Access Registration Overview.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Single Sign-On Multiple Benefits via Alaska K20 Identity Federation 20 May 2011 BTOP Partner Meeting Anchorage, Alaska 20 May 2011 BTOP Partner Meeting.
Internet2 – InCommon and Box Marla Meehl Colorado CIO 11/1/11.
© Synergetics Portfolio Security Aspecten.
The Evolution of Identity Management February 18, 2005 © Copyright 2004, Credentica – all rights reserved Dr. Stefan Brands.
Single Sign On Tutorial for Current and Former Employees February 10, 2005.
Lecture 11: Strong Passwords
C HAPTER 4 A UTHENTICATION POLICY C YBER S ECURITY FOR E DUCATIONAL L EADERS : A G UIDE TO U NDERSTANDING AND I MPLEMENTING T ECHNOLOGY P OLICIES © Routledge.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
SAML 2.0: Federation Models, Use-Cases and Standards Roadmap
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
SSO Case Study Suchin Rengan Principal Technical Architect Salesforce.com.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Your friend, Bluestem. What is Bluestem? “Bluestem is a software system which enables one or more high-security SSL HTTP servers in a domain (entrusted.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Overview of “Attribute Aggregation In Federated Identity Management”[1] Presented by Daniel Waymel November 2013 at UT Dallas.
Web Services Security Patterns Alex Mackman CM Group Ltd
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Chapter 9 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Government Online Copyright © 2007 Credentica Inc. All Rights Reserved. February 15th - 16th, 2007 User-Centric Information Page.
Click to edit Master title style © by Nat Sakimura. Coping with Information Asymmetry SESSION G: Managing Risk & Reducing Online Fraud Using New.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
Threshold password authentication against guessing attacks in Ad hoc networks Authors: Zhenchuan Chai, Zhenfu Cao, Rongxing Lu Sources: Ad Hoc Networks,
1 /6 Introducing TaxWise Online’s Administrator Functions © 2006, Universal Tax Systems, Inc. All Rights Reserved. Administrator Functions Objectives –In.
Electronic Commerce Semester 1 Term 1 Lecture 14.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Overview of “Attribute Aggregation In Federated Identity Management”[1] Presented by Daniel Waymel June 2013 at UT Dallas.
Identity and Access Management
A National e-Authentication Service
Secure Single Sign-On Across Security Domains
Using Your Own Authentication System with ArcGIS Online
GEOSS Federated Single Sign-On
A secure and traceable E-DRM system based on mobile device
Radius, LDAP, Radius used in Authenticating Users
Discretionary Access Control (DAC)
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
SharePoint Online Authentication Patterns
SSO and Data Sharing Use Cases
Appropriate Access InCommon Identity Assurance Profiles
Presentation transcript:

Government Online Copyright © 2007 Credentica Inc. All Rights Reserved. February 15th - 16th, 2007 Mobile Showcase

2 Copyright © 2007 Credentica Inc. All Rights Reserved. Legacy Environment Immigration Board Treasury Board File number Full name Creation date Current status Username Password Full name Address 2003 Revenue

3 Copyright © 2007 Credentica Inc. All Rights Reserved. GPRS Moving to Government Online GPRS Treasury Board Issuing Authority Immigration Board

4 Copyright © 2007 Credentica Inc. All Rights Reserved. One-Time Registration GPRS Immigration Board Treasury Board Issuing Authority

5 Copyright © 2007 Credentica Inc. All Rights Reserved. GPRS Subsequent Access GPRS Immigration Board Treasury Board Issuing Authority

6 Copyright © 2007 Credentica Inc. All Rights Reserved. Benefits to users and service providers SSO experience Improved security No passwords / secrets over the wire Secret keys can be stored in trusted user device Off-line sessions Improved scalability and availability Privacy preservation No identification at access time No cross-linking powers User-authenticated audit trail User digitally signs access requests No loss of autonomy/power to IdP

7 Copyright © 2007 Credentica Inc. All Rights Reserved. Not yet implemented Data sharing between Service Providers User-centric Privacy preservation (modulo transferred attributes) Content signing following login Using secret key of pseudonym used for access Strongest protection against MITM phishing attacks Dual-chip enhancements Trusted chip can handle any number of identity assertions Fine-grained privilege & entitlement management Revoking access across Service Providers Blacklist on basis of built-in User identifier Blacklist even if built-in User identifier is unknown