LEFIS PKI LEFIS General Beja, Portugal 19-21 October 2006 Leo Catalinas.

Slides:



Advertisements
Similar presentations
Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
Advertisements

Public Key Infrastructure and Applications
Launching Egyptian Root CA and Inaugurating E-Signature Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E IEPG March 2000 APNIC Certificate Authority Status Report.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Geneva, Switzerland, 2 June 2014 Introduction to public-key infrastructure (PKI) Erik Andersen, Q.11 Rapporteur, ITU-T Study Group 17 ITU Workshop.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Monitoring and Supervision Seminar 15 June 2006, Rotterdam, The Netherlands Safe and trustworthy access in a working environment: the MoodlePKI project.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
PKI Administration Using EJBCA and OpenCA
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
An In-Depth Examination of PKI Strengths, Weaknesses and Recommendations.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
CNI Fall 1998 Access Management Requirements and Approaches Joan Gargano California Digital Library
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Configuring Active Directory Certificate Services Lesson 13.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Web Application Authentication with PKI & Other Functions Bill Weems & Mark B. Jones Academic Technology University of Texas Health Science Center at Houston.
Online AAI José A. Montenegro GISUM Group Security Information Section University of Malaga Malaga (Spain) Web:
Virginia Tech Overview of Tech Secure Enterprise Technology Initiatives e-Provisioning Group Frank Galligan Fed/Ed.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
魂▪創▪通魂▪創▪通 Use Case and Requirement for Future Work Sangrae Cho Authentication Research Team.
Galileo - Knowledge Testing Service e-MSoft Artur Majuch.
1 Lecture 11 Public Key Infrastructure (PKI) CIS CIS 5357 Network Security.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
1 PKI Update September 2002 CSG Meeting Jim Jokl
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Configuring Directory Certificate Services Lesson 13.
06 APPLYING CRYPTOGRAPHY
System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,
Bridge Certification Architecture A Brief Demo by Tim Sigmon and Yuji Shinozaki June, 2000.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Module 9: Fundamentals of Securing Network Communication.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Integrating security services with the automatic processing of content TERENA 2001 Antalya, May 2001 Francesco Gennai, Marina Buzzi Istituto.
Windows 2000 Certificate Authority By Saunders Roesser.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
SWEB SWEB Security and Privacy Technologies – Implementation Aspects Venue:SWEB Day in APV, Novi Sad Author(s):Dr. Milan Marković Organisations:MISANU.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
LEFIS Steering Committee Meeting Brussels, 11th November 2005 SOCRATES PROGRAMME ERASMUS - Thematic Network projects LEFIS - APTICE: Legal Framework for.
PKI: News from the Front and views from the Back Ken Klingenstein, Project Director, Internet2 Middleware Initiative Chief Technologist, University of.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
X.509 standard and CA’s operation Certificate path validation Dec. 18, C&IS lab. Vo Duc Liem.
Creating and Managing Digital Certificates Chapter Eleven.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
The Trusted Network · · · LEFIS PKI · · · 2 nd June, 2006 · Sofia by Leonardo Catalinas · May 2006
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
X509 Web Authentication From the perspective of security or An Introduction to Certificates.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
EJBCA AT THE HEART OF A TRUST CENTER F.Koray ATSAN Trust Center Project manager F.Koray ATSAN Trust Center Project manager
S/MIME T ANANDHAN.
Secure Enterprise Technology Initiatives e-Provisioning Group
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Presentation transcript:

LEFIS PKI LEFIS General Beja, Portugal October 2006 Leo Catalinas

Abstract Achieved/Pending Aims - Stable PKI - MoodlePKI Next Steps - IRIS-PKI - Spanish DNI-e MAP Lefis-PKI

Achieved Aims Stable PKI  GNU/Linux  IETF ITU-T X.509 Standard  Hierarchical, 2 CAs  OpenCA  PKI Doc  User support (en/es) MoodlePKI  Secure communications  User Auth with Certs  Generic Java PKI Auth Service

Lefis-PKI Pending Aims PKI  Digital signature in  Digital signature in documents  Cryptographic devices MoodlePKI  Standardization of Moodle modifications (to moodle specs)  Generic Java PKI Auth Service Recognize external PKI certificates Revoked LEFIS and external Certificates (CRL) More verbosity in error handling  Web utility for Sign/Verify for material delivery/download

Lefis-PKI Next Steps IRIS-PKI  What is RedIRIS ?  And IRIS-PKI?  PKI Hierarchy Now: Aptice-CA New: IRIS-PCA  Advantages: Consolidated PKI Great support National field More recognition More guarantees Server Certificates Free

Lefis-PKI Next Steps Spanish DNI-e  issued by Spanish National Police  Allows: to identify to sign  Like the cryptographic cards we use  Published Applications: buy in Internet securely procedures with Administration secure online bank...access to web applications like LEFIS with MoodlePKI

Lefis-PKI Next  Public Validation Infrastructure  Ministry of Public Administration  Services Validation of Certificates  high cost  MultiCA: DNIe and others  X.509: ldap, http, ftp, ocsp Validation of Signatures Signature (web and client app) Encryption (client application) TimeStamping

Lefis-PKI Enter The PKI:

Lefis-PKI Thank you very much Leonardo Catalinas