Presentation is loading. Please wait.

Presentation is loading. Please wait.

Integrating the Healthcare Enterprise Enterprise User Authentication and Consistent Time Glen Marshall Co-Chair, IHE IT Infrastructure Planning Committee.

Similar presentations


Presentation on theme: "Integrating the Healthcare Enterprise Enterprise User Authentication and Consistent Time Glen Marshall Co-Chair, IHE IT Infrastructure Planning Committee."— Presentation transcript:

1 Integrating the Healthcare Enterprise Enterprise User Authentication and Consistent Time Glen Marshall Co-Chair, IHE IT Infrastructure Planning Committee

2 Sept 13-15, 2004IHE Interoperability Workshop 2 IHE IT Infrastructure 2004-2005 Enterprise User Authentication Provide users a single name and centralized authentication process across all systems Retrieve Information for Display Access a patient’s clinical information and documents in a format ready to be presented to the requesting user Retrieve Information for Display Access a patient’s clinical information and documents in a format ready to be presented to the requesting user Patient Identifier Cross-referencing for MPI Map patient identifiers across independent identification domains Patient Identifier Cross-referencing for MPI Map patient identifiers across independent identification domains Synchronize multiple applications on a desktop to the same patient Patient Synchronized Applications Consistent Time Coordinate time across networked systems Audit Trail & Node Authentication Centralized privacy audit trail and node to node authentication to create a secured domain. New Patient Demographics Query New Personnel White Page Access to workforce contact information New Cross-Enterprise Document Sharing Registration, distribution and access across health enterprises of clinical documents forming a patient electronic health record New

3 Sept 13-15, 2004IHE Interoperability Workshop 3 IHE IT Infrastructure 2004-2005 Retrieve Information for Display Access a patient’s clinical information and documents in a format ready to be presented to the requesting user Retrieve Information for Display Access a patient’s clinical information and documents in a format ready to be presented to the requesting user Patient Identifier Cross-referencing for MPI Map patient identifiers across independent identification domains Patient Identifier Cross-referencing for MPI Map patient identifiers across independent identification domains Synchronize multiple applications on a desktop to the same patient Patient Synchronized Applications Audit Trail & Node Authentication Centralized privacy audit trail and node to node authentication to create a secured domain. New Patient Demographics Query New Personnel White Page Access to workforce contact information New Cross-Enterprise Document Sharing Registration, distribution and access across health enterprises of clinical documents forming a patient electronic health record New Enterprise User Authentication Provide users a single name and centralized authentication process across all systems Consistent Time Coordinate time across networked systems

4 Sept 13-15, 2004IHE Interoperability Workshop 4 Enterprise User Authentication Scope Support a single enterprise governed by a single set of security policies and having a common network domain. Establish one name per user to be used for all IT applications and devices. Facilitate centralized user authentication management. Provide users with single sign-on.

5 Sept 13-15, 2004IHE Interoperability Workshop 5 Enterprise User Authentication Value Proposition Meet a basic security requirement  User authentication is necessary for most applications and data access operations. Achieve cost savings/containment  Centralize user authentication management  Simplify multi-vendor implementations Provide workflow improvement for users  Increase user acceptance through simplicity  Decrease user task-switching time. More effective security protection  Consistency and simplicity yields greater assurance.

6 Sept 13-15, 2004IHE Interoperability Workshop 6 Consistent Time Scope and Value Proposition Meet a basic security requirement  System clocks and time stamps of the many computers in a network must be synchronized.  Lack of consistent time creates a “security hole” for attackers.  Synchronization ±1 second is generally sufficient. Achieve cost savings/containment  Use the Network Time Protocol (NTP) standard defined in RFC 1305.  Leverage exisisting Internet NTP services, a set-up option for mainstream operating systems.

7 Sept 13-15, 2004IHE Interoperability Workshop 7 Enterprise User Authentication Use Case: Single Sign On Motivation  Users need to frequently communicate with many non- integrated IT application services.  Managing multiple user identities and passwords is costly to users and system administration. Solution  EUA supports a single common user identity for browser- based applications.  EUA allows multiple user authentication technologies.  EUA uses well-trusted standardized user identity mechanisms: Kerberos and CCOW user context.

8 Sept 13-15, 2004IHE Interoperability Workshop 8 Enterprise User Authentication Use Case: Fast User Switch Motivation  Customer requirement for fast user switching on a multi- user workstation due to long startup times during normal system login Solution  Initiate a “null user” during workstation startup.  Utilize EUA to authenticate actual users once, e.g., at start of work shift, via Kerberos.  Utilize Follow Context to switch user identities without incurring the high startup costs, via CCOW user context.

9 Sept 13-15, 2004IHE Interoperability Workshop 9 Enterprise User Authentication Key Attributes Limited network overhead  Kerberos is network-efficient, developed at a time when high-speed networks were rare.  CCOW is similarly network-efficient Kerberos and CCOW work with any user authentication technology  Tokens, biometric technologies, smart cards, …  Specific implementations require some proprietary components, e.g., biometric devices.  Once user authentication is complete, network transactions are the same for all technologies.

10 Sept 13-15, 2004IHE Interoperability Workshop 10 Enterprise User Authentication Key Attributes Multi-year roll-out  2004: Kerberos Server HTTP Authentication Shared Identity through CCOW Grouped with Consistent Time  Future: DICOM (Supplement 99) HL7 (v2.6 UAC segment or WSDL/SOAP transport) CCOW – Kerberos service ticket as part of use context

11 Sept 13-15, 2004IHE Interoperability Workshop 11 EUA and CT Key Technical Properties Standards Used  Kerberos v5 (RFC 1510) Stable since 1993, Widely implemented on current operating system platforms Successfully withstood attacks in its 10-year history Fully interoperable among all platforms  HL7 CCOW, user subject  Network Time Protocol (RFC 1305) Minimal Application Changes  Eliminate application-specific, non-interoperable authentication  Replace less secure proprietary security techniques  Leverage NTP interfaces built-into operating systems

12 Sept 13-15, 2004IHE Interoperability Workshop 12 Enterprise User Authentication Transaction Diagram

13 Sept 13-15, 2004IHE Interoperability Workshop 13 Enterprise User Authentication Transaction Diagram: CCOW Option

14 Sept 13-15, 2004IHE Interoperability Workshop 14 Consistent Time Transaction Diagram Maintain Time [ITI-1] ↑ Time Server Time Client

15 Sept 13-15, 2004IHE Interoperability Workshop 15 Enterprise User Authentication Kerberos Authentication Kerberos Server “kinit” Cache Request TGT Response (contains TGT) application TGT Request Service ticket Response with Service Ticket Application server Protocol specific communication, using Service Ticket as authenticator Communication Initiated Initial username, password Single System Environment

16 Sept 13-15, 2004IHE Interoperability Workshop 16 Enterprise User Authentication HTTP Authentication Client Authentication Agent HTTP Client HTTP Kerberized Server Kerberos Authentication Server Start HTTP Session HTTP Get – with no authentication. 401 response (WWW Authenticate: Negotiate) Get Kerberos Service Ticket Service Ticket HTTP Get – Kerberized Communication HTTP Response

17 Sept 13-15, 2004IHE Interoperability Workshop 17 Enterprise User Authentication Fast User Switch Kerberos Authentication Server Device with Fast User Switching User Context Participant Context Manager Client Authentication Agent Join Context Switch to User A Change Context User A Login Follow Context User B Login Change Context Follow Context Switch to User B

18 Sept 13-15, 2004IHE Interoperability Workshop 18 Kerberos Documentation Online  “Moron’s Guide” http://www.isi.edu/gost/brian/security/kerberos.html  MIT Site http://web.mit.edu/kerberos/www/  Various Microsoft MSDN support documents Hardcopy  Kerberos, by Brian Tung, Addison Wesley  Various vendor manuals Configuration and API documentation  Microsoft, Unix, and other vendor documentation

19 Sept 13-15, 2004IHE Interoperability Workshop 19 HTTP Documentation Internet draft for Kerberization of HTTP  draft-brezak-spnego-http-05.txt Other documentation  http://support.microsoft.com/default.aspx?scid=kb;ben- us;326985

20 Sept 13-15, 2004IHE Interoperability Workshop 20 EUA Futures HL7 CCOW Proposal EUA defines a CCOW identity space  User.Id.Logon.Kerberos  This enables some single signon capabilities. CCOW exchange of SAML assertions  Assertions can contain Kerberos service tickets  Is an HL7 work item, now underway  Use cases are needed in order to move this forward.

21 Sept 13-15, 2004IHE Interoperability Workshop 21 EUA Futures HL7 v2.6 Proposal HL7 v2.6 User Authentication Credential (UAC) segment  Kerberos service tickets or SAML assertion User identified associations enables  Better Audit logs  User specific customizations  User specific authorization HL7 also allows EUA as part of WSDL/SOAP, via SAML assertion

22 Sept 13-15, 2004IHE Interoperability Workshop 22 EUA Futures DICOM Proposal DICOM Associations convey user identification User identified associations enable  Better audit logs  User specific customizations  User specific authorization Under development as Supplement 99

23 Sept 13-15, 2004IHE Interoperability Workshop 23 More information…. IHE Web sites: http://www.himss.org/IHE http://www.rsna.org/IHE http://www.acc.org/quality/ihe.htmhttp://www.acc.org/quality/ihe.htm. Technical Frameworks: ITI V1.0, RAD V5.5, LAB V1.0 Technical Framework Supplements - Trial Implementation May 2004: Radiology August 2004: Cardiology, IT Infrastructure Non-Technical Brochures : Calls for Participation IHE Fact Sheet and FAQ IHE Integration Profiles: Guidelines for Buyers IHE Connect-a-thon Results Vendor Products Integration Statements


Download ppt "Integrating the Healthcare Enterprise Enterprise User Authentication and Consistent Time Glen Marshall Co-Chair, IHE IT Infrastructure Planning Committee."

Similar presentations


Ads by Google