Stronger / Multi-factor Authentication For Enterprise Applications (Identity Assurance using PKI, Smart cards and Biometrics)
|
|
|
- Blake Butler
- 10 years ago
- Views:
Transcription
1 Stronger / Multi-factor Authentication For Enterprise Applications (Identity Assurance using PKI, Smart cards and Biometrics) Sun Virtualization Solutions Presented to OWASP Seminar, Hartford (Feb 10, 2009) Ramesh Nagappan Sun Microsystems, Burlington, MA
2 Agenda The Identity Dilemma Identity Assurance vs. Stronger Security Multi-factor Authentication Strategies Understanding Real-world Implementation Tools of the Trade Role of JAAS Role of Sun OpenSSO Enterprise Architecture and Deployment Demonstration OTPs, Smartcards, PKI and Biometrics Choosing the credential: Pros and Cons Multi-factor SSO with PKI, Smart cards and Biometrics. Q&A
3 Who am I? A technical guy from Sun Microsystems, Burlington, MA. Focused on Security and Identity Management technologies Co-Author of 5 technology books and numerous articles on Java EE, XML Web Services and Security. Holds CISSP and CISA. Contributes to Java, XML security, Biometrics, Smart cards standards and open-source initiatives. Contributes to Graduate curriculum of Information Security programs at multiple universities. Ph.D drop-out. Read my blogs at Write to me at [email protected]
4 The Identity Dilemma : Who Are You? Internet is a faceless channel of interaction. No mechanisms for physically verify a person who is accessing your resources. Identifying the legitimate user has become crucial. With higher strength of authentication Cartoon by Peter Steiner. The New Yorker, July 5, 1993 issue (Vol.69 (LXIX) no. 20) page 61 and security. Mandates mechanisms driven by human recognition characteristics. Growing trends on on-demand SaaS, Cloud computing infrastructures. Everyone is concerned about their private information and privacy.
5 How do I know..it's you? Identity thefts and on-line frauds: The fastest growing crime in the world. Someone wrongfully obtains or abuses another person's identity for economic or personal gain. Impersonation, Counterfeits, stolen or forged credentials (PINs, Passwords, ID cards), Phishing are widely becoming common. Most frauds happens through trusted insiders. Fake credentials are everywhere : Few detected and many undetected! Identity thefts results huge losses to organizations. Loss of consumer confidence and leading to incur huge government penalties. Growing needs for stringent Personal Identity Verification and Assurance (i.e HSPD-12, ICAO 9303). Growing mandates for protecting Identity information and compliance (i.e. Massachusetts 201 CMR 17.00)
6 Growing need for Identity Assurance High degree of authentication and assurance is the most critical requirement for physical and logical access control. Acquire Identity credentials that tightly binds an event to a person's proof of possessions, physiological characteristics and behavioural traits. Identification and authentication as equivalent to Face-to-Face verification of a person. Credentials must provide at-least some long-term stability. Credentials should be non-intrusive but still qualitatively and quantitatively measured. Integrate/Interoperable with physical and logical infrastructures for assured identity verification. Support for pervasive use (On-demand SaaS and Cloud-computing based application infrastructures) for authenticating a person with irrefutable proof. Lesser impact on privacy and social values.
7 Human Factors of Identity Assurance Human attributes as Identity Assurance Credentials Proof-of-Knowledge Something I know? Passwords, PIN, Mom's Maiden Name, Phone #, etc. Proof-of-Possession Something I have? Smartcards, Tokens, Driver's license, PKI certificates Proof-of-Characteristics Something I physiologically or behaviorally own? Fingerprints, Hand geometry, Facial image, Iris, Retina, DNA, voice, signature patterns Proof-of-Physical Presence
8 Security Levels vs. Identity Assurance Courtesy: Randy Vanderhoof, Smartcard Alliance
9 Strong Authentication Strategies Authentication Questions HTTP/s Request/Response attributes Hardware/Software Token based One-time Passwords (OTP) Hardware/Software Token based Challenge/Response OTP Phone call based OTP SMS based OTP PKI Certificate USB Tokens/Smart cards (PIN and PKI Certificates) Biometrics (Fingerprints) USB Token/Smart cards (PKI and Match-on-card Biometrics).
10 One-Time Passwords Hardware/Software Tokens Generate one-time passwords Mathematical problem or Crypto function or Random number generation Challenge/Response Dynamic password, Asynchronous Password Time synchronization between client & server. Deliver Passwords Proprietary devices, USB, Key fobs SMS Messages, , Phone Known issues Vulnerable to MITM, Phishing attacks where Time-synchronization not effective. DES key and Lost token issues Standards: OAUTH (Open Authentication Initiative) One-Time Passwords : Alternative to static passwords
11 Smart cards w. PKI Smart cards Standards A credit card sized computing device acts as a Cryptographic token. Contact / Contactless cards ISO-7816 Allows perforning security functions Key generation Public/Private key operations PIN/Biometric authentication Challenge/response authentication Supports the use of Public-key infrastructure to verify the Identity claim. PKI credential issuance. Credential validation/verification via OCSP, CRLs Java Card, Multos Global Platform PC/SC FIPS-201/PIV, CAC PKCS#11, PKCS#15 GSM/PCS EMV (Europay/Mastercard/Visa) Defends against tampering and hacking. PKI/Private key protection Issues: Lost cards, Key compromise recovery is difficult. Smart cards as a Cryptographic Token
12 Biometric Assurance Biometric Identity Standards Use of Physiological or Behavioral characteristics to identify a person. High degree of assurance with proof of presence. Fingerprints, Facial image/geometry, Iris, Retina, Voice, Hand geometry, Keystroke, Signature INCITS 378 / CBEFF (Fingerprints) Biometric templates can be stored on Smart card for personal identification. Fingerprint template is ~200 bytes Iris template is 500 bytes JavaCard BioAPI INCITS 379 (Iris) OASIS BIAS BioAPI FIPS-201 / PIV Biometric credential must be exchanged in a secure network channel (Trusted path) Issues: Biometrics is not a secret False Acceptance (FAR) & False Reject (FRR) rates Vulnerable to Message replay/mitm attacks, if not exchanged in secure channel. Biometric Assurance : Who I claim to be
13 Real-world Scenario : Authentication Identity Assurance Credentials Authentication Server / Directory User name, password One-time Passwords Smart Card (PKI Certificates) Enterprise Applications Biometrics Validate Good Bad Ideally, credentials are: something you know + something you have + something you are
14 Real World Scenario : SSO / Federation IDP/SSO Server + Directory Multi-factor Identity Credentials (e.g. username/password, Smartcard PKI, Biometrics) Application A Application B SSO Token SAML Artifact Acquire Credentials Proprietary token Kerberos ticket etc
15 Tools of the Trade : What do you need? Multi-factor Authentication for Enterprise Applications Web Authentication JAAS Login Module Desktop Authentication PAM Module (Solaris, Linux) GINA (Windows XP, 2003) Identity Provider Infrastructure (IDP) Single Sign-on (SSO) Multi-factor authentication Directory Server Repository for user accounts Your target applications
16 Tools of the Trade : From Authentication Providers Multi-factor Authentication for Enterprise Applications Browser Plugin PKCS#11 Client for Smartcard ActiveX/Java Plugin for USB Biometric Scanners Enrollment Middleware Biometric Enrollment, Smartcard/Token Credential Issuance/Management One-time Password (Token) registration/issuance Authentication Middleware Biometric Authentication, One-time password authentication PKI Credential validation via OCSP, CRL, Directory, Certificate Authority
17 Java Authentication Authorization Service (JAAS) JAAS plays a vital role delivering Multi-factor authentication. All Java EE compliant Application server provide support for JAAS. JAAS allows to enable Multi-factor authentication in Java EE Enterprise environment. Facilitates pluggable authentication providers as Login Modules. Ensure Java EE remain independent of authentication providers. Implementing a Login module is not cumbersome.. Callback handler Prompt the user for acquiring credentials Login (), commit (), Logout () Choose your own JAAS based Identity Provider Infrastructure? Get introduced to Sun OpenSSO
18 Sun OpenSSO Enterprise Identity Services Infrastructure facilitates Single Sign-On (SSO) for Web applications residing within an enterprise or across networks. Based on Sun's Open-source initiative. Open standards based framework supports centralized authentication, authorization and auditing. JAAS based authentication services Agent-based and XACML based policy enforcement Identity-enabled XML Web services for AuthN, AuthX, Audit and Provisioning Identity Federation Protocols support include SAMLv2, ID-*, WS-Federation,WSPolicy) XML Web Services Security (WS-Security, WS-Trust, WS-I Basic Security Profile) Multi-factor authentication via chaining Centralized configuration, logging and auditing services Supports multiple Java EE application servers and Web containers Fedlets Deployed as a Web application (single WAR file)
19 Multi-factor Authentication and Session Upgrade OpenSSO Authentication Chain and Session upgrade thru AuthN OpenSSO facilitates stronger/ multi-factor authentication through authentication chain including multiple authentication providers. Enables an authentication process where an user must pass credentials to one or more authentication modules before session validation. Session validation is determined based on the JAAS control flag (Required, Requisite, Sufficient, Optional) configured to the authentication module instance chain. The overall authentication success or failure is determined based on the control flag assigned to each module in the authentication stack. OpenSSO is tested and verified to provide multi-factor authentication chain that include BiObex Login, Smartcard/PKI and other OpenSSO supported authentication providers. Session Upgrade allows upgrading a valid session based on a successful second-factor authentication performed by the same user. Allows user authenticate to access second resource under the same or different realm If authentication is successful - OpenSSO updates the session based on the secondlevel authentication. If authentication fails, the current session will be maintained.
20 OpenSSO Policy Agents Authorization and Policy Enforcement Policies are managed by Policy Configuration Service in OpenSSO. Policy service authorizes a use based on the policies stored in OpenSSO. Policy consists of Rules, Subjects, Conditions and Response providers. OpenSSO Policy Agents enforce policy and Policy decisions on protected resources. Intercepts the requests from user clients and applications and redirects them to OpenSSO server for authentication If no SSO token exists. Once authenticated, the policy agent communicates with OpenSSO Policy service to grant/deny access to the user based on policy evaluation.
21 Multi-factor Authentication w. Biometrics
22 Multi-factor Authentication Smartcard/PIN/PKI and Biometrics
23 Deployment Architecture
24 Participate in OpenSSO Community! Join 700 project members at opensso.org Join Sign up at opensso.org Download OpenSSO Enterprise 8 Subscribe OpenSSO Mailing Lists dev, users, announce Chat #opensso on freenode.net Sun Confidential: Partners and Customers NDA/CDA only
25 Demonstration... Thank You Sun Virtualization Solutions Ramesh Nagappan Sun Microsystems, Burlington, MA
Stronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSO using OpenSSO Enterprise and BiObex TM Ramesh Nagappan Sun Microsystems, Burlington, MA [email protected] http://www.coresecuritypatterns.com/blogs Setting
Biometric SSO Authentication Using Java Enterprise System
Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect [email protected] & Ramesh Nagappan CISSP Java Technology Architect [email protected] Agenda Part 1 : Identity
Biometric Single Sign-on using SAML
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP [email protected] 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On
Biometric Single Sign-on using SAML Architecture & Design Strategies
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems [email protected] 1 Setting Expectations What you can take away! Understand
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Moving to Multi-factor Authentication. Kevin Unthank
Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
A Method of Risk Assessment for Multi-Factor Authentication
Journal of Information Processing Systems, Vol.7, No.1, March 2011 DOI : 10.3745/JIPS.2011.7.1.187 A Method of Risk Assessment for Multi-Factor Authentication Jae-Jung Kim* and Seng-Phil Hong** Abstract
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
French Justice Portal. Authentication methods and technologies. Page n 1
French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication
Adding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach
Biometrics for Global Web Authentication: an Open Source Java/J2EE-Based Approach Ruchir Choudhry [email protected]; Abstract. J2EE based Web applications have largely spread over our multiple
Multi Factor Authentication API
GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...
CoSign by ARX for PIV Cards
The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response
Swivel Multi-factor Authentication
Swivel Multi-factor Authentication White Paper Abstract Swivel is a flexible authentication solution that offers a wide range of authentication models. The use of the Swivel patented one-time code extraction
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
Ken Scudder Senior Director Business Development & Strategic Alliances XYPRO Technology Talbot A. Harty CEO DeviceAuthority XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
Identity & Privacy Protection
Identity & Privacy Protection An Essential Component for a Federated Access Ecosystem Dan Turissini - CTO, WidePoint Corporation [email protected] 703 246 8550 CyberSecurity One of the most serious economic
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
Implementing Identity Provider on Mobile Phone
Implementing Identity Provider on Mobile Phone Tsuyoshi Abe, Hiroki Itoh, and Kenji Takahashi NTT Information Sharing Platform Laboratories, NTT Corporation 3-9-11 Midoricho, Musashino-shi, Tokyo 180-8585,
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
White Paper. Authentication and Access Control - The Cornerstone of Information Security. Vinay Purohit September 2007. Trianz 2008 White Paper Page 1
White Paper Authentication and Access Control - The Cornerstone of Information Security Vinay Purohit September 2007 Trianz 2008 White Paper Page 1 Table of Contents 1 Scope and Objective --------------------------------------------------------------------------------------------------------
Secure the Web: OpenSSO
Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1 Agenda Need for identity-based
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
CryptoNET: Security Management Protocols
CryptoNET: Security Management Protocols ABDUL GHAFOOR ABBASI, SEAD MUFTIC CoS, School of Information and Communication Technology Royal Institute of Technology Borgarfjordsgatan 15, SE-164 40, Kista,
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014
Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent
ADVANCE AUTHENTICATION TECHNIQUES
ADVANCE AUTHENTICATION TECHNIQUES Introduction 1. Computer systems and the information they store and process are valuable resources which need to be protected. With the current trend toward networking,
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
Alternative authentication what does it really provide?
Alternative authentication what does it really provide? Steve Pannifer Consult Hyperion Tweed House 12 The Mount Guildford GU2 4HN UK [email protected] Abstract In recent years many new technologies
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011
NetWeaver Single Sign-On Product Management NetWeaver Identity Management & Security June 2011 Agenda NetWeaver Single Sign-On: Solution overview Key benefits of single sign-on Solution positioning Identity
White Paper. FFIEC Authentication Compliance Using SecureAuth IdP
White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Implementing two-factor authentication: Google s experiences. Cem Paya ([email protected]) Information Security Team Google Inc.
Implementing two-factor authentication: Google s experiences Cem Paya ([email protected]) Information Security Team Google Inc. Google services and personalization Identity management at Google 1. Internal
OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com
OpenSSO: Simplify Your Single-Sign-On Needs Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com 1 Agenda Enterprise security needs What is OpenSSO? OpenSSO features > > > > SSO and
WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)
WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,
Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
Chapter 15 User Authentication
Chapter 15 User Authentication 2015. 04. 06 Jae Woong Joo SeoulTech ([email protected]) Table of Contents 15.1 Remote User-Authentication Principles 15.2 Remote User-Authentication Using Symmetric
Multi-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
How CA Arcot Solutions Protect Against Internet Threats
TECHNOLOGY BRIEF How CA Arcot Solutions Protect Against Internet Threats How CA Arcot Solutions Protect Against Internet Threats we can table of contents executive summary 3 SECTION 1: CA ArcotID Security
Out-Of-Band Authentication Using a Real-time, Multi-factor Service Model
Out-Of-Band Authentication Using a Real-time, Multi-factor Service Model Andrew Rolfe Authentify, Inc. [email protected] Presentation Overview Authentication basics What is OOBA? Why is it important?
JVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015
Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction
Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.
Polling Question Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication. Please type in your response. This poll will close promptly at 1:00 pm CDT Getting the
Vidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET
EXPLORING SMARTCARDS: AN INDEPENDENT LOOK TO TECHNOLOGIES AND MARKET Giuseppe Gippa Paternò [email protected] June 2008 WHO AM I Experienced architect Linux, Networking and Security Focused on Telcos
Simplifying Security with Datakey Axis Single Sign-On. White Paper
Simplifying Security with Datakey Axis Single Sign-On White Paper Copyright and trademark notice 2003 Datakey Inc. All rights reserved. Version 1.0 No part of this document may be reproduced or retransmitted
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords Mika Devonshire Associate Product Manager 1 Agenda 2 What is Cybersecurity? Quick overview of the core concepts 3 Cybercrime
The Current and Future Direction of Identity Assurance. A critical foundation for identity and access management solutions
The Current and Future Direction of Identity Assurance A critical foundation for identity and access management solutions Viewpoint paper systems with identity management. The surge in the number of managed
Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust
Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Imprivata Confirm ID and the DEA Interim Final Rule on EPCS Technology requirements to comply with the DEA
Multi-Factor Authentication Core User Policy and Procedures
Multi-Factor Authentication Core User Policy and Procedures Core Users with access to other people s sensitive or restrictive information must use one-time passwords (OTP) generated from approved fobs
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.
Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout
Strong Authentication for Healthcare
Strong Authentication for Healthcare Entrust Solutions for Centers for Medicare & Medicaid Services Authentication Compliance Entrust Inc. All All Rights Reserved. 1 1 Entrust is a registered trademark
IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Leveraging SAML for Federated Single Sign-on:
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Digital identity: Toward more convenient, more secure online authentication
Digital identity: Toward more convenient, more secure online authentication For more than four decades, the familiar username/password method has been the basis for authentication when accessing computer-based
WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES
WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES Executive Overview U.S. Federal mandates dictates that personal with defense related initiatives must prove access
IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers
IDENTITY & ACCESS Providing Cost-Effective Strong Authentication in the Cloud a brief for cloud service providers Introduction Interest and use of the cloud to store enterprise resources is growing fast.
Single Sign-On. Security and comfort can be friend. Arnd Langguth. [email protected]. September, 2006
Single Sign-On Security and comfort can be friend. Arnd Langguth [email protected] September, 2006 Identity proliferation in the enterprise Password management problem How many passwords do you have?
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
solutions Biometrics integration
Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the
Authentication Levels. White Paper April 23, 2014
Summary White Paper April 23, 2014 This document describes levels of authentication that can be utilized for users known and unknown to gain access to applications and solutions. Summary... 1 Description...
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Open Source Identity Integration with OpenSSO
Open Source Identity Integration with OpenSSO April 19, 2008 Pat Patterson Federation Architect [email protected] blogs.sun.com/superpat Agenda Web Access Management > The Problem > The Solution >
White Paper PalmSecure truedentity
White Paper PalmSecure truedentity Fujitsu PalmSecure truedentity is used for mutual service and user authentication. The user's identity always remains in the possession of the user. A truedentity server
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
5 Day Imprivata Certification Course Agenda
Class time consists of a break in the morning and afternoon as well as an allotted time for lunch. Lengths of breaks are at the discretion of the instructor based on the time to cover material. 5 Day Imprivata
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
Microsoft vs. Red Hat. A Comparison of PKI Vendors
Microsoft vs. A Comparison of PKI Vendors 1 Outline Definitions Issue #1: RedHat vs. Microsoft CA Issue #2: Cross Flows Issue #3: Core PKI Recommendation 2 Definitions User or Enrollment Officer - The
