Download presentation
Presentation is loading. Please wait.
Published byHarriet Bailey Modified over 6 years ago
1
InCommon Participant Operating Practices: Friend or Foe?
InCommon CAMP 21 June 2010 Paul Caskey, U.T. System
2
Agenda Introducing the InCommon POP document Why is the POP Important?
Examples of POPs Why might the POP be inappropriate? Introducing “Level of Assurance” (LoA) InCommon assurance framework and profiles Issues/Questions/Discussion…
3
Introducing the InCommon POP Document
What is it? Am I required to have a POP? What goes into the POP? Who writes it? Who looks at it? Does anyone ever check its accuracy? How do you change it? What is it? Description of how identities are managed at your institution Contains practice statements that describe how users are identified and how credentials are issued Am I required to have a POP? yes, InCommon requires this However, InCommon does not check the content What goes into the POP? actual documented practices about your IdM system categories: General Info, Community, Credentials, Identity Data, Credential Use, user attributes, privacy Who writes it? Your identity mgmt group, if you have one. Otherwise, Information Security frequently champions that role. Many stakeholders: registrar, HR, legal, IT, Audit Who looks at it? External entities (educational institutions, vendors) who will rely on your identity mgmt system Auditors, so they can verify that you are doing what you say that you do (basic InCommon membership does not, however, require audits) InCommon, to make sure its completed Does anyone ever verify the stated practices? No, you are trusted to accurately reflect reality in your POP. How do you change it? Very carefully and deliberately You should make sure those who trust you, based on your previous version, know that you have revised it Changes should be summarized for quick viewing You should also let InCommon know, if the URL to your POP has changed
4
Why is the POP Important?
*YOU* are now part of my identity mgmt system and I need to know what types of risk that entails The foundation of trust is understanding how those you rely on manage identities – the POP is how you achieve that The “high-value transaction“… Helps you to identify weaknesses in your process Helps auditors measure your performance Chain is only as strong as weakest link If I am to be a good steward of my resources, I must understand how you operate your system (in a federated scenario) High-value transactions mean more is at stake if something goes wrong (student financial aid versus a campus music service) By documenting your processes, you can learn a lot about things *really* work on your campus and identify opportunities for improvement When you have a concrete practice statement, it can help auditors know exactly what it is you intend on doing in various situations (rather than have them speculate or assume)
5
Example of POPs The InCommon "starter" document Institutional:
Institutional: Many are there, but only InCommon registered contacts can see the URLs – some campuses feel this is sensitive information. System-based: UT System: Federation-based: U.K. Federation:
6
Why might the POP be inappropriate?
Some are inclined to “hide” them (or URLs get changed) Strong desire to “make it look good” or “how we plan on things working” Can be speculative in terms of how things really work POPs can become stale (practices/technologies change) POPs are rarely/never verified (the “A” word…) So, there needs to be some “teeth” in the operating practices to promote trust among participants……..
7
Introducing “Level of Assurance” (LoA)…
What is LoA? What is LoA NOT? Why is it stronger than a POP? Who gets to set the standards? Examples of LoA How is the required level determined? How is it used? What is LoA? definition: how certain a service provider can be that an authenticated user is who they claim to be way of describing common practices that reflect degrees of strength in an IdM provides for a consistent understanding of IdM frequently represents “best practices” for operating an IdM infrastructure governs identity-related activities, typically in-person vetting, password complexity requirements, and data currency What LoA is NOT? required for participation law the only way to conduct high-value transactions a “quality score” for your identity practices not necessarily hierarchical Why is it better than a POP? they typically reflect a well thought-out standard intended to reflect quality/best practices many enterprises can follow the same standard and discuss IdM in common terms usually, it is verified to ensure compliance Who gets to set the standards? Federations (InCommon) Collaborative organizations (TAGPMA) Those with valuable resources/services (NIH) Those with legislative authority (government) Examples of LoA US Government: FICAM/TFPAP originally based off NIST : 1: Little or no confidence in the asserted identity 2: confidence exists that asserted identity is accurate 3: high confidence in the asserted identity’s accuracy 4: very high confidence in the asserted identity’s accuracy Kantara Initiative 4 levels provisionally approved by FICAM InCommon (next topic) Bronze (1) Silver (2) seeking FICAM approval How is the required level determined? SPs must determine the LoA they require based on a careful risk assessment Fed Gov’t provides a framework for such an assessment in OMB M04-04 Based on perceived institutional risk Often an over-looked responsibility of SPs How is it used? Typically, one of the attributes an IdP sends to an SP for a user will be a representation of all applicable LoA values that apply to the transaction. An IdP’s assertion of these values should be controlled by either the SP or the federation operator (not everyone is certified to assert all levels) Newer ways of expressing this information, using native fields in SAML, are being explored and developed
8
The InCommon Assurance Framework
What's an IAP? Background How are they used? Bronze ( Silver (same URL as above) How to get started? What’s an IAP? (Identity Assurance Profile) “structured sets of requirements intended to satisfy management of access to general classes of resources” (Wasley) an IAP represents the requirement for a particular LoA Background started with the fed’s eAuth program, which died on the vine a few years ago originally based off of 4 levels defined by InCommon wanted to be compliant with federal standards and began development work on InCommon IAPs Silver and Bronze More than vetting and credentialing, it includes requirements for legal status, help desk operations, records management, network protocols, etc, etc All info avail on the InCommon website How are they used? First, you apply Then, you assemble documentation and evidence of compliance Next, a “sufficiently independent” auditor reviews your documentation and evidence against the requirements in the IAP Then, an assessment of compliance is made by InCommon If approved, the InCommon metadata is updated to allow your IdP to assert transactions under the Silver IAP Service providers receive an LoA value from you in an attribute (typically eduPersonAssurance) and, if federation metadata allows you to assert that value, they will accept your assertion and the user is allowed to access the resource in question. Bronze Intended to map to fed level 1 in-person vetting not required less restrictive password entropy requirements (1 chance in 1024 – 2^-10) Silver Intended to map to fed level 2 identity validation required (in-person or remote) more restrictive password entropy requirements (1 chance in 16,384 – 2^-14) How to get started? If not done already, establish an IdM stakeholders group on your campus Build your POP, based on what you actually do perform a gap analysis between your POP and InCommon Silver develop an action plan to address deficiencies identified in gap analysis notify InCommon of your desired LoA certification have your internal audit department perform an audit sign InCommon legal addendum for that LoA
9
Issues/Questions/Discussion…
Organization-based versus subject-based? (the "exception process") What infrastructure is needed to implement higher LoAs? Is LoA determined only at credentialing time or should there be a run-time component? What about remote password resets? How urgent is LoA? To be capable of higher LoAs, does that man that everyone on your campus must meet the requirements? What is needed to implement higher LoAs? documented processes internal controls to verify process is being followed password policy system (strength, composition, notification) ability to reliably assert LoA values (provisioning) Does LoA change if your IdM system locks an account out 50 times in a day? How about if one of your staff members who you saw at lunch records authentication events from an IP address in Croatia? What about if the security group discovers a keystroke logger on the user’s computer? Do you lower LoA when a user creates a new password remotely (the forgotten password scenario)? Urgent? Don’t wait until it is – this is a complicated process involving most of your campus’ business units
10
Thank You! Contact Information: Paul Caskey
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.