ATIS Identity Management Standards Development DOCUMENT #:GSC13-PLEN-37 FOR:Presentation SOURCE:ATIS AGENDA ITEM:Plenary; IdM and Identification Systems;

Slides:



Advertisements
Similar presentations
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Wayne Zeuch, ATIS ATIS Cybersecurity Standards Document No: GSC16-GTSC9-10 Source: ATIS Contact:
Advertisements

Identity Federation Rules and Process Linda Elliott President, PingID Network Electronic Authentication Partnership Washington, DC February 12, 2004.
DOCUMENT #:GSC15-PLEN-23 FOR:Presentation SOURCE:ATIS AGENDA ITEM:PLEN 6.3 CONTACT(S):Michael J. Fargano, Qwest,
Digital Identities for Networks and Convergence Joao Girao, Amardeo Sarma.
International Telecommunication Union An Emerging Global Convergence on Identity Management Tony Rutkowski mailto: Vice President,
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All ITU-T Identity Management Update Bilel Jamoussi, Chief, SGD/TSB ITU Abbie Barbir, Q10/17 Rapporteur.
DOCUMENT #:GSC15-PLEN-37 FOR:Presentation SOURCE:ITU-T AGENDA ITEM:Plenary 6.6 Networked Vehicle Chaesub Lee and Yushi.
Geneva, Switzerland, 4 December 2014 ITU-T Study Group 17 activities in the context of digital financial services and inclusion: Security and Identity.
Halifax, 31 Oct – 3 Nov 2011 Brian K. Daly, Director, Core Standards AT&T ATIS Identity Management (IdM) Standards Development Document No: GSC16-PLEN-93.
Standards for Shared ICT Jeju, 13 – 16 May 2013 Gale Lightfoot Senior Staff Program Manager, Office of the CTO, SPB Cisco ATIS Cybersecurity Standards.
DOCUMENT #:GSC15-PLEN-46 FOR:Presentation SOURCE:ATIS AGENDA ITEM:PLEN 6.9 CONTACT(S):Michael J. Fargano, Qwest,
DOCUMENT #: GSC15-GTSC8-02 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.1 CONTACT(S): Wayne Zeuch ATIS:
DOCUMENT #:GSC15-PLEN-11 FOR:Presentation SOURCE:TTA AGENDA ITEM:Plenary 4.8 TTA activities since GSC14 Keun Hyeob LEE, TTA President.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All High Intelligent Network (Smart Pipe) Yuqing CHEN CCSA Document No: GSC16-PLEN-75 Source: CCSA Contact:
DOCUMENT #:GSC15-GTSC-05 FOR:Presentation SOURCE:ITU-T AGENDA ITEM:4.1 NGN, Testing specification and Beyond Chaesub.
DOCUMENT #:GSC15-PLEN-48 FOR:Presentation SOURCE: ATIS AGENDA ITEM: PLEN 6.10 CONTACT(S): James McEachern
DOCUMENT #:GSC15-PLEN-26 FOR:Presentation SOURCE: ATIS AGENDA ITEM: PLEN 6.4 CONTACT(S): James McEachern ATIS Identity Management.
DOCUMENT #:GSC15-CL-04 FOR:Presentation SOURCE:CCSA AGENDA ITEM:Closing Plenary, 2.3 GTSC-8 Summary Report Duo Liu GTSC-8.
DOCUMENT #: GSC15-GTSC8-06 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.2 CONTACT(S): Art Reilly ATIS Cybersecurity.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
IP over BA in support of convergence - What’s next - DOCUMENT #:GSC13-PLEN-20 FOR:Presentation SOURCE:TTA AGENDA ITEM:Plenary; 6.8; IP over BA in support.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Fostering worldwide interoperabilityGeneva, July 2009 Standardization activities on Home Networking in CCSA Duo LIU, Deputy Secretary General of.
ITU Overview Empowering global ICT development Malcolm Johnson DOCUMENT #:GSC13-XXXX-nn FOR:Presentation SOURCE:ITU AGENDA ITEM:Opening Plenary, 4.6 CONTACT(S):Malcolm.
DOCUMENT #:GSC15-PLEN-62 FOR:Presentation SOURCE:ISACC AGENDA ITEM:Opening Plenary (6.14) CONTACT(S):Jim MacFie Cloud Computing Jim MacFie Chairman, ISACC.
DOCUMENT #: GSC15-GTSC8-06 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.2 CONTACT(S): Art Reilly ATIS Cybersecurity.
Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.
DOCUMENT #:GSC15-PLEN-82r2 FOR:Presentation SOURCE:ATIS AGENDA ITEM: PLEN 6.14 CONTACT(S): Andrew White ATIS’
ATIS’ Service Oriented Networks (SON) Activity Andrew White, Nokia Siemens Networks DOCUMENT #:GSC15-PLEN-81r1 FOR:Presentation SOURCE:ATIS AGENDA ITEM:PLEN.
Fostering worldwide interoperabilityGeneva, July 2009 Standardization activities on NGN in CCSA Duo LIU Deputy Secretary General of CCSA Global Standards.
Fostering worldwide interoperabilityGeneva, July 2009 IdM and Identification Systems Arkadiy Kremer ITU-T SG 17 Chairman Global Standards Collaboration.
Fostering worldwide interoperabilityGeneva, July 2009 The Home Network: Where Convergence Takes Hold Tim Jeffries, VP Technology and Business Development,
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All ATIS: Advancing the Next Generation Network Wayne Zeuch, ATIS Document No: GSC16-GTSC9-09 Source:
Update on ETSI Security work Charles Brookson OCG Security Chairman DOCUMENT #:GSC13-PLEN-57 FOR:Information SOURCE:Charles Brookson AGENDA ITEM:6.3
Jeju Island, Korea, 13 – 16 May 2013Identity Management and Identification Systems GSC17-PLEN-43 ITU-T IDENTITY MANAGEMENT UPDATE Bilel Jamoussi, Chief,
Standardization activities on IPTV in CCSA CCSA DOCUMENT #:GSC13-PLEN-25 FOR:Presentation SOURCE:CCSA AGENDA ITEM:Plenary; 6.6
DOCUMENT #:GSC15-PLEN-52 FOR:Presentation SOURCE:ATIS AGENDA ITEM:PLEN 6.11 CONTACT(S):Maria Estefania ATIS and.
IdM: Platform for Ubiquitous Chae Sub LEE DOCUMENT #:GSC13-PLEN-12 FOR:Presentation SOURCE:ITU-T AGENDA ITEM:Plenary 6.4
Standardization activities on Home Networking in CCSA CCSA DOCUMENT #:GSC13-GTSC6-08 FOR:Presentation or Information SOURCE:CCSA AGENDA ITEM:GTSC; 4.3.
SDO/Forum Collaboration: An Essential Part of ICT Management Dave Sidor Chairman, ITU-T SG 4 Nobuo Fujii Vice Chairman, ITU-T SG 4 DOCUMENT #:GSC13-PLEN-10.
Fostering worldwide interoperabilityGeneva, July 2009 ATIS Identity Management Standards Development James McEachern, Manager – Application Enabler.
DOCUMENT #:GSC15-PLEN-27 FOR:Presentation SOURCE:ETSI AGENDA ITEM:PLEN 6.4 CONTACT(S): Amardeo Sarma, ISG INS Chair Identity & Access Management activities.
Jeju, 13 – 16 May 2013Standards for Shared ICT Andrew White Principal Consultant Nokia Siemens Networks ATIS Identity Management (IdM) Standards Development.
Jeju, 13 – 16 May 2013Standards for Shared ICT Dr. Farrokh Khatibi Director of Engineering Qualcomm ATIS and the Smart Grid Document No: GSC17-PLEN-63.
DOCUMENT #:GSC15-PLEN-82 FOR:Presentation SOURCE:ATIS AGENDA ITEM: PLEN 6.14 CONTACT(S): Andrew White ATIS’
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
ATIS Management and Operations Standards Development DOCUMENT #:GSC13-PLEN-40 FOR:Presentation SOURCE:ATIS AGENDA ITEM:Plenary; ICT Management and Operations;
ATIS Interoperability
Federated IdM Across Heterogeneous Clouding Environment
Global Standards Collaboration (GSC) 14
ATIS’ Cloud Services Activity
OmniRAN Introduction and Way Forward
ATIS Cybersecurity DOCUMENT #: GSC13-GTSC6-12 FOR: Presentation
Global Standards Collaboration (GSC) GSC-15
Glenn Parsons, GTSC-9 Chair, ISACC
ATIS Interoperability
ATIS Emergency Communications (EC) Standards Development
HIMSS National Conference New Orleans Convention Center
ATIS Identity Management (IdM) Standards Development
ATIS Interoperability
ATIS’ Service Oriented Networks (SON) Activity
OmniRAN Introduction and Way Forward
Martin Euchner, Advisor, ITU-T Study Group 17
ATIS’ Cloud Activity Andrew White Nokia Siemens Networks
Reinhard Scholl, GTSC-7 Chairman
Presenter: Richard Brennan, Vice-Chair TC TISPSAN
Advancing the Next Generation Network
Glenn Parsons, GTSC-9 Chair, ISACC
NGN Summary Contributions from ETSI (GTSC9-05) and ATIS (GTSC9-09):
Presentation transcript:

ATIS Identity Management Standards Development DOCUMENT #:GSC13-PLEN-37 FOR:Presentation SOURCE:ATIS AGENDA ITEM:Plenary; IdM and Identification Systems; 6.4 CONTACT(S):Wayne Zeuch Submission Date: July 1, 2008

2 Highlight of Current Activities (1) Identity Management (IdM) Requirements for NGN –Deliverable: ATIS NGN IdM Requirements Standard Develops NGN IdM system requirements (based on the high-level trust model), security requirements, and interoperability requirements (based on Use Cases). Target Date: 3Q 2008 Identity Management (IdM) Framework for NGN –Deliverable: ATIS NGN IdM Framework Standard Describes the fundamental concepts associated with NGN IdM (including threats and risks), defines NGN IdM entities, their roles, and the interactions among them within the IdM trust model, and specifies relationships between the IdM trust model and NGN interfaces for interoperability. Target Date: 4Q 2008 ATIS PTSC is actively developing the following IdM-related standards:

3 Highlight of Current Activities (1) Identity Management (IdM) Use Cases for NGN –Deliverable: ATIS NGN IdM Use Cases Technical Report Derives informative examples illustrating NGN IdM capabilities, functions and concepts. Use Cases will be used to derive and specify requirements. Target Date: 4Q 2008 Identity Management (IdM) Mechanisms for NGN –Deliverable: ATIS NGN IdM Mechanisms Standard Describes the specific IdM mechanisms and suites of options that should be used to satisfy the ATIS IdM Requirements Standard. Target Date: 4Q 2008 Identity Management (IdM) Use Cases and Requirements for Service Provider Identity (SPID) –Deliverable: ATIS IdM SPID Use Cases and Requirements Standard Describes use cases to illustrate service scenarios where SPID is utilized, including assumptions on security, authentication, and discovery. SPID requirements are derived from these Use Cases. Target Date: 2Q 2009

4 Strategic Direction Leverage User-Centric solutions where possible, while identifying deltas to meet the needs of NGN providers –NGN service providers need to address both real-time and near-real time applications –Solution for real-time applications (e.g., exchange of IdM information for SIP communication sessions) would be different Provide structured and standard means to discover and exchange identity information across network domains/federations –Bridge different technology dependent systems including existing network infrastructure systems (e.g., use of existing resources such as LIDB where appropriate) –Address new and emerging applications and services (e.g., IPTV and convergence) –Address unique security needs Define value added use cases that will derive requirements

5 Challenges Un-trusted identity information as a result of migration to IP packet networks, emergence of new service providers (e.g., 3 rd party providers) and other changes over the past decade (e.g., smart terminals, and open internet environment) –Historically, trusted information was provided by closed and fixed network environment operating under regulatory conditions –Resulting in operations, accounting, settlements, security and infrastructure protection problems Silo solutions –Focusing on web services and electronic commerce –Available standards focuses mainly on web services (e.g. OASIS, WS*, Liberty, SAML) and human identities –Vendor specific solutions/products (e.g., Microsoft Cardspace, PayPal, iNames) No standard means for user control of Personal Identification Information (PII) and providing consent No standard solution for interoperability/bridging

6 Next Steps/Actions Continue to leverage User-Centric IdM solutions –Avoid duplication and redundancy Leverage, use, enhance and adapt existing work and technology solutions where appropriate managed networks Enhance and customize existing IP/web services capabilities and work of other industry groups (e.g., Liberty Alliance, OASIS, 3GPP, ITU-T) as appropriate –Allow for the use of existing (e.g., LIDB) and new (e.g., IPTV) resources and capabilities Continue to solicit IdM Use Case/Requirements Input from all the ATIS committees Contribute ATIS IdM requirements and solutions to the ITU-T

7 Proposed Resolution N/A

8 Supplemental Slides

9 Identity Management (IdM) Identity Management (IdM) involves secure management of the identity life cycle and the exchange of identity information (e.g., identifiers, attributes and assertions) based on applicable policy of entities such as: Users/groups Organizations/federations/enterprise/service providers Devices/network elements/systems Objects (Application Process, Content, Data)

10 Value Added for NGN Provider Dynamic/automatic IdM means between multiple partners (e.g., end users, visited and home networks) compared to pair-wise arrangements to –Establish service arrangements –Exchange identity information –Exchange policy information and enforce policy Enabler of new applications and services (e.g., IPTV and convergence) including identity services Leverage existing and expanding customer base Common IdM infrastructure supporting multiple applications and services Standard API and data scheme for application design Multi-vendor/platforms solutions Inter-network/federations interoperability Security protection of application services, network infrastructure and resources

11 Value Added for the User Privacy/user control –Protection of Personal Identifiable Information [PPII] –Ability to control who is allow access (i.e., providing consent) to personal information and how it is used Ease of use and single sign-on / sign-off (multiple application/services across multiple service providers/federations) Enabler of Social Networking Security (e.g., confidence of transactions, and Identity (ID) Theft protection)

12 Government Motivations Infrastructure Protection (i.e., against cyber threats) Protection of Global Interests (e.g., business and commerce) Provide assurance capabilities (e.g., trusted assertions about digital identities [credentials, identifiers, attributes and reputations]) to enable National Security/Emergency Preparedness (NS/EP) Early Warning Services Electronic Government (eGovernment) Services (e.g., web-based transactions) Public Safety Services (e.g., Emergency 911 services) Law Enforcement Services (e.g., Lawful Interceptions) National/Homeland Security Intelligence Services

13 PTSC Issue Issue TitleIssue Description S0051ATIS NGN IdM Requirements Requirements for handling identities in a secured and authenticated manner in a multi-network, multiple service provider environment Harmonized approach to address IdM issues in the ATIS NGN architecture S0058ATIS NGN IdM Framework Framework for handling identities in a secured and authenticated manner in a multi-network, multiple service provider environment S0059ATIS NGN IdM Use Cases Develop Use Cases illustrating IdM applications in a multi- network, multiple service provider environment defined by the ATIS NGN architecture S0060ATIS NGN IdM Mechanisms Develop IdM mechanisms (e.g., registration, authorization, authentication, attribute sharing, discovery) to be used in a harmonized approach for the ATIS NGN architecture proposed New Issue ATIS Service Provider ID (SPID) Develop an ATIS NGN SPID standard that derives requirements from Use Cases applicable to managed NGN deployments. These requirements will be used to define industry solutions. ATIS PTSC IdM Issues

14 DocumentScopeEditorsTarget Date ATIS IdM Framework Standard [PTSC Issue S0058] Framework for NGN Identity Management Martin Dolly (AT&T) Ray Singh (Telcordia) 4Q 2008 ATIS IdM Use Cases Technical Report [PTSC Issue S0059] Identity Management Use Case examples for NGN Martin Dolly (AT&T) Ray Singh (Telcordia) 4Q 2008 ATIS IdM Requirements Standard [PTSC Issue S0051] NGN Identity Management Requirements Martin Dolly (AT&T) Ray Singh (Telcordia) 3Q 2008 ATIS IdM Mechanisms Standard [PTSC Issue S0060] NGN Identity Management Mechanisms and Procedures Martin Dolly (AT&T) Ray Singh (Telcordia) 4Q 2008 ATIS Service Provider Identity (SPID) Use Cases and Requirements Standard Define ATIS Use Cases and Requirements for SPID Martin Dolly (AT&T) Ray Singh (Telcordia) 2Q 2009 Note: parallel documents exist in ITU-T SG13, Q15 ATIS PTSC IdM Documents