Introduction to the PKI Issues at UW Madison Presented to ITC on Friday, 3/18/2005 Tom Jordan Systems Engineer,

Slides:



Advertisements
Similar presentations
© 2006 IBM Corporation Tivoli Identity Manager Express Tivoli Access Manager for Enterprise Single Sign-On (Product Demonstrations) Tivoli Live! – 15 June.
Advertisements

Public Key Infrastructure and Applications
May 06, 2002 Getting Started with Digital Certificates: Is PKI-Lite Real PKI? Internet2 Spring Meeting 2002 Wash, DC.
Dartmouth PKI Certificate Deployment June 2004 Fed Ed Meeting.
User Authentication for Enterprise Applications November 16, 2005 Tom Board, NUIT.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Problems With Centralized Passwords Dartmouth College PKI Lab.
Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.
Identity Management Realities in Higher Education NET Quarterly Meeting January 12, 2005.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Dartmouth PKI Deployment Robert Brentrup PKI Summit July 14, 2004.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Public Key Infrastructure at the University of Pittsburgh Robert F. Pack, Vice Provost Academic Planning and Resources Management March 27, 2000 CNI Spring.
GGF15 Workshop MyProxy Integration with PubCookie Marty Humphrey*, Jim Jokl*, and Jim Basney** *Department of Computer Science, University of Virginia,
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Understanding Active Directory
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Web Services Security Multimedia Information Engineering Lab. Yoon-Sik Yoo.
May 22, 2002 Joint Operations Group Discussion Overview Describe the UC Davis Security Architecture Describe Authentication Efforts at UC Davis Current.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Identity Management and PKI Credentialing at UTHSC-H Bill Weems Academic Technology University of Texas Health Science Center at Houston.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
PKI-Enabled Applications That work! Linda Pruss Office of Campus Information Security
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Public Key Infrastructure Ammar Hasayen ….
Web Application Authentication with PKI & Other Functions Bill Weems & Mark B. Jones Academic Technology University of Texas Health Science Center at Houston.
Virginia Tech Overview of Tech Secure Enterprise Technology Initiatives e-Provisioning Group Frank Galligan Fed/Ed.
Brian Arkills Software Engineer, LDAP geek, AD bum, Senior Heckler, and Associate Troublemaking Officer State of Windows Services at the UW.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Web Services Security. Introduction Developing standards for Web Services security – XML Key Management Specification (XKMS) – XML Signature – XML Encryption.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
Digital Certificates Securing Communication Nicholas Davis, IS Consultant/Admin DoIT Middleware.
Nicholas A. Davis DoIT Middleware September 29, 2005.
Protecting the Player– Information Security Concerns Gus March 21, 2014.
Configuring Directory Certificate Services Lesson 13.
Co Chairs C. W. Goldsmith University of Alabama at Birmingham David L. Wasley University of California Office of the President.
Module 9: Fundamentals of Securing Network Communication.
Dartmouth PKI Update Robert Brentrup Internet2 Member Meeting April 21, 2004.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
The Distribution Online Vending Pilot Project Demo Testing Certificate Management Kennedy P Subramoney 23 July 2004.
SWEB SWEB Security and Privacy Technologies – Implementation Aspects Venue:SWEB Day in APV, Novi Sad Author(s):Dr. Milan Marković Organisations:MISANU.
MARK B. JONES PKI DEPLOYMENT FORUM MADISON, WI APRIL 16 TH, 2008 Why do I need a Digital ID?
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
DIGITAL SIGNATURE.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
/ 8 FEIDHE Electronic Identification in Finnish Higher Education Janne Kanner FEIDHE Electronic Identification in Finnish Higher Education.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
Online Security Myths & Challenges HIGHER COLLEGES OF TECHNOLOGY Abeer Nijmeh Account Manager April 14, 2002.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
PKI Implementation at the University of Wisconsin-Madison
Web Services Security.
Module 8: Securing Network Traffic by Using IPSec and Certificates
Secure Enterprise Technology Initiatives e-Provisioning Group
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Message Digest Cryptographic checksum One-way function Relevance
MyProxy Integration with PubCookie
CLIENT/SERVER COMPUTING ENVIRONMENT
Module 8: Securing Network Traffic by Using IPSec and Certificates
Install AD Certificate Services
Presentation transcript:

Introduction to the PKI Issues at UW Madison Presented to ITC on Friday, 3/18/2005 Tom Jordan Systems Engineer, DoIT Middleware Group

What is PKI? PKI is Public Key Infrastructure PKI makes communications and data more secure PKI facilitates: aa0377ffee22 9fc23b7623ac 748aa0377ffe e229fc23b762 3ac7 Data Encryption Secure Messaging Stronger Authentication Encrypted Communications

Closely related to PKI Token Authentication Smart Cards Multifactor Authentication Digital Signatures Electronic Workflow SSL Secure Data Transmission Single signon / reduced signon

Why PKI? What’s wrong with what we’ve got? –Username and password authentication –Lots of cleartext messaging –Little secure workflow –Lots of data vulnerable in transit and at rest Existing systems adequate for some things, not for others Many tactical problems that would benefit from a strategic effort

What does it mean to have an infrastructure? Address tactical problems piecemeal vs. defining a strategic direction Commonality enables interoperability

How are other folks using PKI? University of Texas HSC, Houston –10,000 users doing document signing and electronic workflow –5 years in production Dartmouth –8,000 users using PKI for VPN authentication –2 years in production University of Texas, Galveston –13,000 users of secure –3 years pilot, 6 months production University of Alabama, Birmingham –30,000 users of enterprise authentication system –3 years in production University of Virginia –30,000 users of secure –2 years in production Minnesota – token authentication for administrative users Penn State – not PKI per se, but heavy into data encryption

How do folks here want to use PKI? State Lab of Hygiene –Business & Research –Local data encryption Office of the Registrar –Stronger authentication for course enrollment –Digitally signed transcript requests Computer Science –Identification and Authorization for Grid Computing Graduate School –FastLane Grant submission DoIT –More secure access to server / datacenter environs –Secure support in WiscMail –Security for Web Services / SOA / Distributed Computing –Multifactor Institutional Authentication

Why now? Regulatory pressures –Secure communications –Data encryption Peer Institution Exploits Trends towards interoperability –Integrated applications –SOA / Distributed Computing Window of adoption – where do we need to be in 3-5 years? Budgetary pressure to find common solutions

What will it take? Strategic Planning Policy Work Process Work Technical Planning & Implementation Adoption & adaptation

Questions? -----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNAD CBiQKBgQC5eD8plw5d8s8qA6BgfVsu N2G+TSdlmDLNugx510ehFOeLID+3dW 0Y9WDzSwMyRcTez2DzTLg5YusaGJEa vleImO1qi1UZONOTPNp5xFcejXCwfz W8AzYmXZy53kx1Ff3xTOJyoIFdZtec 9oaTN711pYTTIuhDv2Xn2uM0eYOjIQ IDAQAB -----END PUBLIC KEY-----