Download presentation
Presentation is loading. Please wait.
Published byPriscilla Davis Modified over 8 years ago
1
PKI and the U.S. Federal E- Authentication Architecture Peter Alterman, Ph.D. Assistant CIO for e-Authentication National Institutes of Health Internet2 Spring Meeting 2004 The E-Authentication Initiative March 2, 2004
2
2 The E-Authentication Initiative E-Gov Program Management Office Why Does PKI Fit into the e-Authentication Architecture? While the bulk of the early phase rollouts of e-Gov applications are web-enabled applications.. 2003 OASIS survey identified signed electronic forms as the highest priority use for PKI (1) Does anybody want to estimate how many Government forms are in use? (1) OASIS Public Key Infrastructure Technical Committee, “Analysis of June 2003 Survey on Obstacles to PKI Deployment and Usage”, August 8, 2003 http://www.oasis- open.org/committees/pki/pkiobstaclesjune2003surveyreport.pdf
3
3 The E-Authentication Initiative E-Gov Program Management Office OASIS Survey of PKI Issues: Uses ApplicationsMost ImportantImportantNot ImportantNo Answer WeightWeight Rank Document Signing43%47%6%3%1.381 Web Server Security42%48%6%4%1.372 Secure Email40%46%8%6%1.333 Web Services Security34%53%9%4%1.264 Virtual Private Network33%50%11%6%1.245 Electronic Commerce34%48%13%5%1.226 Single Sign On28%56%12%4%1.177 Secure Wireless LAN25%48%19%8%1.068 Code Signing20%50%22%8%0.989 Secure RPC6%40%40%13%0.6110 Other Application9%3%7%81%0.2111 (1) OASIS Public Key Infrastructure Technical Committee, “Analysis of June 2003 Survey on Obstacles to PKI Deployment and Usage”, August 8, 2003 http://www.oasis- open.org/committees/pki/pkiobstaclesjune2003surveyreport.pdf
4
4 The E-Authentication Initiative E-Gov Program Management Office What Role Does PKI Play in the e- Authentication Architecture? Reliably satisfies identity assurance levels 3 & 4 (OMB M-04-04) Reliably satisfies risk levels 3 & 4 (FIPS 199, SP 800-63) In Hoc Signo Vinces – PKI with Bridge interoperability is a great example of federated identity management PKI integrates well with emerging technologies that link authentication and authorization, e.g., SAML
5
5 The E-Authentication Initiative E-Gov Program Management Office Therefore.. PKI is the prime candidate technology for satisfying electronic forms signing business processes; PKI is the prime candidate for satisfying the authentication needs of business transactions that require levels 3 and 4 identity assurance PKI is an excellent technology match for e- Authentication authentication and authorization implementations
6
6 The E-Authentication Initiative E-Gov Program Management Office Status of PKI in the Federal e-Authentication Framework Federal Identity Management Framework acknowledges hardware-based PKI as best candidate for consolidated logical and physical access mechanism for Feds and contractors; Operational PKIs in defense and civilian agencies now; DOD and State Department PKIs are hardware-based Federal Bridge is operational and linked to all currently operational Federal PKIs, State of Illinois PKI and prototype Higher Ed Bridge; links to Canada, Australia, UK and EU under way Other Federal Agencies rolling out PKIs in near future, either self-managed or acquired from approved service providers
7
7 The E-Authentication Initiative E-Gov Program Management Office FBCA Certification Authority Two way Cross-certified (FBCA High & FBCA Medium) Agencies (Legacy Agency CA policy) States Foreign Entities Citizen & Commerce Class Common (C4) Certificate Policy -certified Wells FargoAOLPEPCO Private Sector FPKI Common Policy Framework (FCPF) Certificate Policy C4 Policy Certification Authority (Included in browser list ofCAs) FCPF Policy Certification Authority (Trust anchor for Common FPKI Policy hierarchical PKI subscribers) E-Governance Certification Authority (Mutual authentication of SAML/SSL Certificates only) Qualified Shared Service Provider USDA/NCF Verisign DST Two way Cross-certified One way Cross - certified Federal PKI Assurance Level 1 Assurance Level 2 E-Governance Certificate Policy Other BridgeCAs ACES New Agency Optionally Two Way Cross - certified Two Way Cross Federal PKI The Federal PKI FBCA & The E-Authentication Federated Approach T w o w a y C r o s s - c e r t i f i e d XKMS OCSP CAM SOAP Others ©p©p Step #1: User goes to Portal to select the AA and ECP Portal Step #3: The user authenticates to the AA directly using SSL or TLS. Figure : FPKI Validation Service AA CA 1 Community 1 CA 4 CA 4bCA 4a CA 2 Community 2 Bridge CA 3 Community 3 FPKI Step #4: The AA uses the validation service to validate the certificate Step #2: The user is passed directly to the AA eAuth Trust List FBCA Certificate Policy
8
8 The E-Authentication Initiative E-Gov Program Management Office How PKIs Link to the e-Authentication Architecture Existing Federal Agencies cross-certify and interoperate through the Federal Bridge New Federal Agencies use the Common Policy Framework and shared service providers (SSPs) External PKIs (governments, corporations, colleges and universities, etc.) cross-certify and interoperate with the Federal Bridge Other bridges cross-certify and interoperate with the Federal Bridge
9
9 The E-Authentication Initiative E-Gov Program Management Office More Information peter.alterman@nih.gov peter.alterman@nih.gov http://csrc.nist.gov/pki http://csrc.nist.gov/pki http://www.cio.gov/eauthentication http://www.cio.gov/eauthentication http://pki.od.nih.gov http://pki.od.nih.gov
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.