EGovernment Commonalities within Europe and beyond Colin Wallis & Fulup Ar Foll European Identity Conference 2011.

Slides:



Advertisements
Similar presentations
A brief look at the WS-* framework Josh Howlett, JANET(UK) TF-EMC2 Prague, September 2007.
Advertisements

Step Up Authentication in SAML (and XACML) Hal Lockhart February 6, 2014.
1 1 GFIPM Enabling Federated Identity and Single Sign-on John Ruegg LA County Information Systems Advisory Body June 11, 2014.
OOI-CI–Ragouzis– Ocean Observatories Initiative Cyberinfrastructure Component CI Design Workshop October 2007.
Saml-v2_0-intro-dec051 Security Assertion Markup Language An Introduction to SAML 2.0 Tom Scavo NCSA.
State Services Commission New Zealand Government Crown Copyright “Standards are only the beginning.. …of the beginning.. … of interoperability”
The ICAR Federated Identity Model Massimiliano Pianciamore, CEFRIEL Francesco Meschia, CSI-Piemonte
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
1 Trust Framework Portable Identity Schemes Trust Framework Portable Identity Schemes NIH iTrust Forum December 10, 2009 Chris Louden.
Carl A. Foster.  What is SAML?  Security Assertion and Markup Language is an XML-based standard for exchanging authentication and authorization between.
Building Trusted Transactions Identity Authentication & Attribute Exchange In Public and Private Federations OASIS Conference September 2010 Joni Brennan,
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
Copyright JNT Association 20051OptionalCopyright JNT Association 2007 Overview of the UK Access Management Federation Josh Howlett.
A Use Case for SAML Extensibility Ashish Patel, France Telecom Paul Madsen, NTT.
Shibboleth-intro-dec051 Shibboleth A Technical Overview Tom Scavo NCSA.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Web Service Standards, Security & Management Chris Peiris
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
Copyright 2006 Archistry Limited. All Rights Reserved. SOA Federated Identity Management How much do you really need? Andrew S. Townley Founder and Managing.
SWITCHaai Team Introduction to Shibboleth.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Saml-intro-dec051 Security Assertion Markup Language A Brief Introduction to SAML Tom Scavo NCSA.
SAML Right Here, Right Now Hal Lockhart September 25, 2012.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
SAML 2.1 Building on Success. Outline n Summary of SAML 2.0 n Work done since 2.0 n Objectives of SAML 2.1 n Proposed Task List n Undecided Issues n Invitation.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
SAML 2.0: Federation Models, Use-Cases and Standards Roadmap
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Connect. Communicate. Collaborate Place organisation and project logos in this area Usage of SAML in eduGAIN Stefan Winter, RESTENA Foundation TERENA Networking.
Connect. Communicate. Collaborate Federation Interoperability Made Possible By Design: eduGAIN Diego R. Lopez (RedIRIS)
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
Navigating the Standards Landscape Andrew Owen SEARCH.
SAML in Authorization Policies draft-guenther-geopriv-saml-policy-01.
SAML: An XML Framework for Exchanging Authentication and Authorization Information + SPML, XCBF Prateek Mishra August 2002.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
MAT U M A T U Middleware Assisted Take-Up Service For JISC Funded Early Adopters.
Technical Break-out group What are the biggest issues form past projects – need for education about standards and technologies to get everyone on the same.
EGEE-II INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks Security Token Service Valéry Tschopp - SWITCH.
GFIPM FICAM Status Update GFIPM Delivery Team Meeting November 2011.
OIX initiative, US only? Mapping Swedish Academic Identity Federation 2.0 Policy Framework to Open Identity Exchange (OIX) Trust Framework Provider Assessment.
Shibboleth Update Eleventh Federal & Higher Education PKI Coordination Meeting (Fed/Ed Thursday, June 16, 2005.
E-Authentication Overview & Technical Approach Scott Lowery Technical Track Session.
Authentication and Authorisation for Research and Collaboration Christos Kanellopoulos GRNET Proposed Pilots for Libraries and eGov.
Status Update on Other GFIPM Activity Threads GFIPM Delivery Team Meeting November 2011.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
E-Authentication October Objectives Provide a flexible, easy to implement authentication system that meets the needs of AES and its clients. Ensure.
June 9, 2009 SURFfederatie: implementing a multi- protocol federation Hans Zandbelt & Joost van Dijk, SURFnet.
Creating a European entity Management Architecture for eGovernment Id GUIDE Keiron Salt
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
EMI is partially funded by the European Commission under Grant Agreement RI Security Token Service (STS) Transforming the Existing User Credentials.
EMI is partially funded by the European Commission under Grant Agreement RI Security Token Service (STS) Simplified Credential Management Henri.
Workshop on Security for Web Services. Amsterdam, April 2010 Applying SAML to Identity Data Exchange.
Authentication and Authorisation for Research and Collaboration Peter Solagna, Nicolas EGI AAI integration experiences AARC Project.
ESRIN, 15 July 2009 Slide 1 Web Service Security support in the SSE Toolbox HMA-T Phase 2 FP 14 December 2009 S. Gianfranceschi, Intecs.
Access Policy - Federation March 23, 2016
Shibboleth Architecture
Cross-sector and user-centric AAI
Mechanisms of Interfederation
Federation made simple
OGSA-WG Basic Profile Session #1 Security
Federation Systems, ADFS, & Shibboleth 2.0
Identity Federations - Overview
Prime Service Catalog 12.0 SAML 2.0 Single Sign-On Support
Identity management Aalto University, autumn 2013.
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Technical Approach Chris Louden Enspier
HIMSS National Conference New Orleans Convention Center
Presentation transcript:

eGovernment Commonalities within Europe and beyond Colin Wallis & Fulup Ar Foll European Identity Conference 2011

A 2-part presentation with conclusion and discussion: Colin: overview the landscape & highlight policy-oriented common touch points Fulup: detail technically-oriented common touch points Colin: draw conclusions and facilitate discussion

‘the Venn of eGovernment’ – a framework of frameworks? What is this? GovernancePolicy Legislation & regulation Conformance & certification Technology Management Identity Information Management Interoperability

..of ecosystems, federations and frameworks…. is it all semantics? Identity Ecosystem? Trust framework? eGovernment (interoperability) Framework? Transformational Government framework? Cloud computing framework? Trust federation?

…grouped by breadth of scope, level of detail European Interoperability Framework National Strategy for Trusted Identities in Cyberspace OASIS’s Transformational Government Framework eGIFs everywhere.. PEPOL STORK etc Semantics and taxonomy Conformance and certification etc

Question… If one framework uses asserted government issued credentials (a government IdP) and another framework uses asserted private sector credentials (a private sector IdP) does it matter?

Question… If one framework is based on regulation and legislation and another framework is based on contract and common law does it matter?

Technical Commonalities eGov Profile v2.0 The goal is to implement a certification process that allows a non-expert to select the correct product suite. Common technical issues are: Metadata exchanges Authentication assurance SSO/SLO session management Proxy and authentication attributes

Metadata exchange Most, if not every, government relies on some form of contract to handle IDP/SP relationship. Publication of Metadata in a well-known location Generation/Exportation is OPTIONAL Verification, if implemented, MUST use XML signature

Authentication Assurance Framework Most governments rely on some form of assurance framework based on some form of NIST equivalent level Implemented through OASIS Assurance Framework MUST support the acceptance/rejection of assertions based on the content of the elements It is hard to agree on a common certification, but it is a MUST have to agree on a common framework and assure interoperability

SSO/SLO Session Management Logout is the main technical issue for implementers. eGov profile enforces as a MUST for SLO HTTP transport binding SAML SOAP LogOut request SAML redirect [optional for SP] Specify user options to control SLO behaviours. TLS and other forms of authentication with SAML/SOAP are optional.

Proxy Authentication [Only for Full V2.0 Profile] Suppression or editing of RequesterID elements from outgoing AuthnRequest Support the mapping of incoming to outgoing AuthnContext elements MUST support the suppression of

Questions?

Conclusions They are all (federated) trust frameworks There are broad (eGov and TGov) trust framework deployment profiles There are narrower (cloud) trust framework deployment profiles They comprise common components They have common requirements – policy, semantics, conformance, compliance, certification etc