Interagency Advisory Board Meeting Agenda, May 27, 2010
|
|
|
- Cecilia Henderson
- 10 years ago
- Views:
Transcription
1 Interagency Advisory Board Meeting Agenda, May 27, Opening Remarks 2. PIV-I Status (Judy Spencer, GSA) 3. PIV Test Requirements (Dave Temoshok, GSA) 4. ICAM Progress at USDA (Owen Unangst, USDA)) 5. PIV-I Discussion Panel (Jim Hatcher, Mike Mestrovich, Chris Louden, Rebecca Nielson) 6. FIWG Status Update (Corinne Irwin, NASA) 7. LAWG Status Update (Bill Erwin, GSA) 8. Closing Remarks
2 Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management Federation Interoperability Working Group (FIWG) May 2010
3 Agenda What is the FIWG? Federal Identity Profile BAE Federal agreements Encryption/signing certs EGCA Physical Access Challenges 2 5/27/2010
4 ICAM Mission Fostering effective government-wide identity and access management Enabling trust in online transactions through common identity and access management policies and approaches Aligning federal agencies around common identity and access management practices Reducing the identity and access management burden for individual agencies by fostering common interoperable approaches Ensuring alignment across all identity and access management activities that cross individual agency boundaries Collaborating with external identity management activities through inter-federation to enhance interoperability 3 Co-Chairs: Paul D. Grant, DOD & Judith Spencer, GSA
5 All Assurance Levels 4 Identity, Credential, and Access Management Applicability
6 FIWG Purpose Promote federation pilots Intra-Federal External parties Levels of Assurance 2 4 Identify roadblocks to federation Address roadblocks 5 5/27/2010
7 Roadblocks Identified Identifiers/Linkage PIV Enablement Trusted Certificate Authorities Federation Agreements 6 5/27/2010
8 Identifiers/Linkage How do you uniquely identify federated users? How do you link identity data you have with your federated partner? Partnered with HR LOB to define: Common identity profile for use in Fed-to-Fed space Identifier(s) that can be relied upon to uniquely identify a person Identifier(s) that can be used to link existing identities in two systems to enable PIV and SAML authentication 7 5/27/2010
9 PIV Enablement Two basic methods Registration User is invited to remotely present PIV card Linkage is made between Identity/account and PIV card Backend Attribute Exchange Federation partners exchange data to enable linkage For existing applications that already exchange identity information, adding key PIV attributes to the existing exchange is simple to implement 8
10 PIV Enablement and SAML/Single Sign-on Is it acceptable to use a SAML assertion of PIV authentication? Yes, depending on your risk assessment OASIS standard developed for asserting PIV SAML assertions still must be signed and encrypted See Trusted Certificate Authorities 9
11 Trusted Certificate Authorities Need a Trust Anchor, similar to FBCA, to allow for SAML exchanges Signed, encrypted assertions for BAE and authentication exchange egov Certificate Authority (egca) can meet this need Re-vamping egov eauth documents to allow issuance of egca certs for BAE and federated authentication Federal Agencies will be able to self-certify to receive certs Other partners will certify through the Trust Provider Framework 10 5/27/2010
12 Federation Agreements Developing a standard federation agreement that can be used multi-laterally Owner of the agreement establishes the parameters for federation Other parties sign on In general, the use of bi-lateral agreements should be avoided Difficult to maintain agreement standards Doesn t support attribute aggregation 11 5/27/2010
13 Attribute Aggregation Collect multiple attributes from different sources in order to make authorization decisions Example: NASA asserts that I am a NASA employee DHS asserts that I am authorized to access a disaster site Anne Arundel County asserts that I am a certified Emergency Medical Technician Bank of America asserts that I am the owner of the smartcard credential they issued Goal is to collect attributes from the authoritative source The certifier/issuer is the authoritative source 12
14 Presenter Corinne Irwin Project Executive, Authentication & Authorization National Aeronautics and Space Administration (NASA)
Identity, Credential, and Access Management
NIST Privilege Management Workshop September 1, 2009 Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management in and with The Federal Government
Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board
Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management An information exchange For Information Security and Privacy Advisory Board Deb Gallagher
Government Smart Card Interagency Advisory Board Moving to SHA-2: Overview and Treasury Activities October 27, 2010
Government Smart Card Interagency Advisory Board Moving to SHA-2: Overview and Treasury Activities October 27, 2010 Interagency Advisory Board Meeting Agenda, October 27, 2010 1. Opening Remarks 2. A Discussion
Identity, Credential, and Access Management. Open Solutions for Open Government
Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management www.idmanagement.gov Open Solutions for Open Government Judith Spencer Co-Chair, ICAM
Office of the Chief Information Officer Department of Energy Identity, Credential, and Access Management (ICAM)
Department of Energy Identity, Credential, and Access Management (ICAM) Cyber Security Training Conference Tuesday, May 18, 2010 1 Announcement LACS Birds-of-a-Feather Session Logistics Wednesday, May
Identity, Credential, and Access Management at NASA, from Zachman to Attributes
Identity, Credential, and Access Management at NASA, from Zachman to Attributes Corinne Irwin Dennis Taylor VISION: Integrated, secure, and efficient information technology and solutions that support NASA
Understanding the differences in PIV, PIV-I, PIV-C August 23, 2010
Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management Understanding the differences in PIV, PIV-I, PIV-C August 23, 2010 Tim Baldridge AWG
Identity Management for Interoperable Health Information Exchanges
Identity Management for Interoperable Health Information Exchanges Presented to the NASMD Medicaid Transformation Grants HIE Workgroup - March 26, 2008 Presented by: John (Mike) Davis, Department of Veterans
GFIPM & NIEF Single Sign-on Supporting all Levels of Government
GFIPM & NIEF Single Sign-on Supporting all Levels of Government Presenter: John Ruegg, Director LA County Information Systems Advisory Body (ISAB) & Chair, Global Federated ID & Privilege Management (GFIPM)
Federal Identity, Credential, and Access Management Trust Framework Solutions. Relying Party Guidance For Accepting Externally-Issued Credentials
Federal Identity, Credential, and Access Management Trust Framework Solutions Relying Party Guidance For Accepting Externally-Issued Credentials Version 1.1.0 Questions? Contact the FICAM TFS Program Manager
Federal Identity, Credentialing, and Access Management. Identity Scheme Adoption Process
Federal Identity, Credentialing, and Access Management Identity Scheme Adoption Process Version 1.0.0 Release Candidate July 8, 2009 ii Document History Status Release Date Comment Audience Draft 0.0.1
U.S. Department of Energy Washington, D.C.
U.S. Department of Energy Washington, D.C. ORDER DOE O 206.2 Approved: SUBJECT: IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT (ICAM) 1. PURPOSE. To establish requirements and responsibilities for DOE s identity,
INCIDENT SCENE AUTHORIZED ACCESS USING A MOBILE DEVICE
INCIDENT SCENE AUTHORIZED ACCESS USING A MOBILE DEVICE Karyn Higa-Smith DHS Science and Technology Directorate Homeland Security Advanced Research Projects Agency CyberSecurity Division Session ID: PNG-F42A
Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ)
Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ) Version 1.0 January 18, 2011 Table of Contents 1. INTRODUCTION... 3 1.1 BACKGROUND... 3 1.2 OBJECTIVE AND AUDIENCE...
U.S. Office of Personnel Management Human Resources Line of Business. Federal Human Resources Process Model
U.S. Office of Personnel Management Human Resources Line of Business Federal Human Resources Process Model Elizabeth A. Mautner, Zbynek Krobot, Tim Biggert November 10, 2011 OPM Overview Federal Human
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, DC 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, DC 20301-6000 CHIEF INFORMATION OFFICER OCT 05 2010 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOrNT CHIEFS OF STAFF
Federal Identity, Credential, and Access Management Trust Framework Solutions. Overview
Federal Identity, Credential, and Access Management Trust Framework Solutions Overview Version 1.0 02/07/2014 Questions? Contact the FICAM TFS Program Manager at [email protected] 1 Table of Contents 1.
DOE Joint ICAM Program - Unclass & Secret Fabrics
DOE Joint ICAM Program - Unclass & Secret Fabrics GSA Federal ICAM Day, 16 April 2014 Mr. Frank Husson & Mr. Rich Tannich Unclassified Agenda Unclassified Initiative Mr. Frank Husson will share DOE s vision
Federal Identity, Credentialing, and Access Management. Personal Identity Verification Interoperable (PIV-I) Test Plan. Version 1.1.
Federal Identity, Credentialing, and Access Management Personal Identity Verification Interoperable (PIV-I) Test Plan Version 1.1.0 Final February 22, 2011 Table of Contents 1 Introduction... 1 1.1 Background...
Federated Identity Management
Federated Identity Management SWITCHaai Introduction Course Bern, 1. March 2013 Thomas Lenggenhager [email protected] Overview What is Federated Identity Management? What is a Federation? The SWITCHaai Federation
STATEMENT OF WORK. For
STATEMENT OF WORK For Credentialing and Validation Support for DC Homeland Security & Emergency Management Agency (DC HSEMA) IN SUPPORT OF THE GOVERNMENT OF THE DISTRICT OF COLUMBIA November 15, 2012 1.
DEPARTMENTAL REGULATION
U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C. 20250 DEPARTMENTAL REGULATION SUBJECT: Identity, Credential, and Access Management Number: 3640-001 DATE: December 9, 2011 OPI: Office of the Chief Information
What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form December 3, 2012 HSPD-12
Department of Defense PKI Use Case/Experiences
UNCLASSIFIED//FOR OFFICIAL USE ONLY Department of Defense PKI Use Case/Experiences PKI IMPLEMENTATION WORKSHOP Debbie Mitchell DoD PKI PMO [email protected] UNCLASSIFIED//FOR OFFICIAL USE ONLY Current
Federal PKI. Trust Infrastructure. Overview V1.0. September 21, 2015 FINAL
Federal PKI Trust Infrastructure Overview V1.0 September 21, 2015 FINAL This Page is Blank Table of Contents 1. Introduction... 1 2. Public Key Infrastructure Overview... 2 3. Federal Public Key Infrastructure
Commonwealth of Virginia Personal Identity Verification-Interoperable (PIV-I) First Responder Authentication Credential (FRAC) Program
Commonwealth of Virginia Personal Identity Verification-Interoperable (PIV-I) First Responder Authentication Credential (FRAC) Program October 2012 W. Duane Stafford Statewide Credentialing Coordinator
E-Authentication Federation Adopted Schemes
E-Authentication Federation Adopted Schemes Version 1.0.0 Final May 4, 2007 Document History Status Release Date Comment Audience Template 0.0.0 1/18/06 Outline PMO Draft 0.0.1 1/19/07 Initial draft Internal
Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements
Joint White Paper: Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements Submitted Date: April 10, 2013 Submitted
Developing a Federal Vision for Identity Management
Developing a Federal Vision for Identity Management Duane Blackburn Office of Science and Technology Policy Executive Office of the President January 16, 2009 Height DNA Biometric Name Date of Birth SSN
Standard Government-Wide Senior Executive Service (SES) Performance Appraisal System
Standard Government-Wide Senior Executive Service (SES) Performance Appraisal System Briefing on Interagency SES Performance Management Workgroup Project Standard Government-Wide SES Appraisal System OBJECTIVE:
An Operational Architecture for Federated Identity Management
An Operational Architecture for Federated Identity Management March 2011 Implementing federated identity management and assurance in operational scenarios Federated Identity Solution The Federated identity
GAO PERSONAL ID VERIFICATION. Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards
GAO United States Government Accountability Office Report to Congressional Requesters September 2011 PERSONAL ID VERIFICATION Agencies Should Set a Higher Priority on Using the Capabilities of Standardized
The Implementation of Homeland Security Presidential Directive 12
The Implementation of Homeland Security Presidential Directive 12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy Information Security and Privacy Advisory Board
U.S. Department of Agriculture HSPD 12 Program. USDA HSPD-12 Implementing PIV cards @ USDA
U.S. Department of Agriculture HSPD 12 Program USDA HSPD-12 Implementing PIV cards @ USDA April 2009 USDA and the GSA HSPD-12 Shared Solution USDA has been at the forefront of driving a shared solution
National Capital Region. Electronic Designation and Validation of Federal/Emergency Response Officials (F/EROs) in support of National Preparedness
National Capital Region Electronic Designation and Validation of Federal/Emergency Response Officials (F/EROs) in support of National Preparedness Presented to TechAmerica February 25, 2009 Topics for
Information Technology Policy
Information Technology Policy Identity Protection and Access Management (IPAM) Architectural Standard Identity Management Services ITP Number ITP-SEC013 Category Recommended Policy Contact [email protected]
Practical Challenges in Adopting PIV/PIV-I
UNCLASSIFIED Practical Challenges in Adopting PIV/PIV-I Hank Morris UNCLASSIFIED 2 UNCLASSIFIED // FOUO Purpose and Agenda Purpose: Explore the policy, process, and mechanisms to securely leverage biometrics
State Identity, Credential, and Access Management (SICAM) Roadmap and Implementation Guidance Version 2.0 October 14, 2013
State Identity, Credential, and Access Management (SICAM) Roadmap and Implementation Guidance Version 2.0 October 14, 2013 Statewide Information Management Manual (SIMM) Section 158A Enterprise Architecture
Federal Public Key Infrastructure Technical Working Group Meeting Minutes
Federal Public Key Infrastructure Technical Working Group Meeting Minutes Prepared for the General Services Administration By SRA International Time Topic Friday March 25, 2015 1:00 p.m. 2:30 p.m. Teleconference
Derived credentials. NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials
Daon your trusted Identity Partner Derived Credentials A Use Case Cathy Tilton Daon 1 February 2012 Derived credentials NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials Derived credential
Shared Services Canada (SSC)
Shared Services Canada (SSC) Cloud Computing Architecture Identity, Credential & Access Architecture Framework Advisory Committee Transformation, Service Strategy and Design August 29, 2013 1 Agenda TIME
Life After PIV. Authentication In Federated Spaces. Presented to. Card Tech/Secure Tech. May 2009. By Lynne Prince Defense Manpower Data Center
Life After PIV Authentication In Federated Spaces Presented to Card Tech/Secure Tech By Lynne Prince Defense Manpower Data Center Interoperability with HSPD12 Capability PIV provides a secure common credential,
For Official Use Only (FOUO)
The FEMA Mission To support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, and
The Government-wide Implementation of Biometrics for HSPD-12
The Government-wide Implementation of Biometrics for HSPD-12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy September 24, 2008 1 The HSPD-12 Mandate Home Security
Integration of Access Security with Cloud- Based Credentialing Services
Integration of Access Security with Cloud- Based Credentialing Services Global Identity Summit September 17, 2014 All text, graphics, the selection and arrangement thereof, unless otherwise cited as externally
Information Systems Security Line of Business (ISS LoB)
Information Systems Security Line of Business (ISS LoB) Information Security and Privacy Advisory Board George Washington University Washington, DC March 22, 2007 Agenda Background Status Next Steps Background
Identity and Access Management Initiatives in the United States Government
Identity and Access Management Initiatives in the United States Government Executive Office of the President November 2008 Importance of Identity Management within the Federal Government "Trusted Identity"
State Identity Credential and Access Management (SICAM) Guidance and Roadmap
State Identity Credential and Access Management (SICAM) - Version 1.0 September 2012 EXECUTIVE SUMMARY The State Identity and Credential Access Management (SICAM) outline a strategic vision for state-based
NSTIC National Program Office Discussion Draft STANDARDS CATALOG
NSTIC National Program Office Discussion Draft STANDARDS CATALOG Contents Introduction Source Documents Introduction This document is a contribution from the NSTIC National Program Office to the Identity
Canadian Access Federation: Trust Assertion Document (TAD)
Participant Name: RESEARCH RESEARCH LTD. 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources
Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance
Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance December 2, 2011 Powered by the Federal Chief Information Officers Council and the Federal Enterprise Architecture
Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance
Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance Part B: Implementation Guidance February 25, 2011 Powered by the Federal Chief Information Officers Council
Federated Identity Management
Federated Identity Management SWITCHaai Team [email protected] Agenda 2 What is Federated Identity Management? What is a Federation? The SWITCHaai Federation Interfederation Evolution of Identity Management
ABAC Workshop Minutes
ABAC Workshop Minutes Prepared by Jeff Coleman (NSA), Paul Jacob (Booz Allen and Hamilton), and Vincent Hu (NIST) Date: 17 July 2013 Location: National Cybersecurity Center of Excellence (NCCoE), 9600
Biometric Single Sign-on using SAML
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP [email protected] 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On
SAML:The Cross-Domain SSO Use Case
SAML:The Cross-Domain SSO Use Case Chris Ceppi Oblix Corporate Engineer Ed Kaminski OBLIX Federal Business Manager 410-349-1828 [email protected] Mike Blackin Principal Systems Engineer Oblix, Inc. 202-588-7397
Federal Identity, Credential, and Access Management Trust Framework Solutions
1 2 3 4 5 6 7 Federal Identity, Credential, and Access Management Trust Framework Solutions 8 9 10 11 Trust Framework Provider Adoption Process (TFPAP) For All Levels of Assurance 12 13 14 15 16 17 18
NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II?
NOAA HSPD-12 PIV-II Implementation What is HSPD-12? Homeland Security Presidential Directive 12 (HSPD-12) is a Presidential requirement signed on August 27, 2004 requiring Federal agencies comply with
OFFICE OF THE CHIEF INFORMATION OFFICER IDENTITY, CREDENTIAL, & ACCESS MANAGEMENT PROGRAM. Logging In with my LincPass
OFFICE OF THE CHIEF INFORMATION OFFICER IDENTITY, CREDENTIAL, & ACCESS MANAGEMENT PROGRAM Logging In with my LincPass February 23, 2015 Document Information Document Revision and History REVISION DATE
FCCX Briefing. Information Security and Privacy Advisory Board. June 13, 2014
FCCX Briefing Information Security and Privacy Advisory Board June 13, 2014 1 Agenda Overview NSTIC FICAM Federal Cloud Credential Exchange Lessons Learned Enhancing Federation Privacy Questions 2 Challenge
A Smart Card Alliance Physical Access Council and Identity Council White Paper. Publication Date: January 2011 Publication Number: PAC-11001
Personal Identity Verification Interoperability (PIV-I) for Non-Federal Issuers: Trusted Identities for Citizens across States, Counties, Cities and Businesses A Smart Card Alliance Physical Access Council
Identity opens the participation age. Dr. Rainer Eschrich. Program Manager Identity Management Sun Microsystems GmbH
Identity opens the participation age Open Web Single Sign- On und föderierte SSO Dr. Rainer Eschrich Program Manager Identity Management Sun Microsystems GmbH Agenda The Identity is the Network Driving
Fiscal Year 2011 Report to Congress on the Implementation of The Federal Information Security Management Act of 2002
Fiscal Year 2011 Report to Congress on the Implementation of The Federal Information Security Management Act of 2002 March 7, 2012 Table of Contents I. Introduction: Current State of Federal Information
MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES
M-XX-XX MEMORANDUM FOR THE HEADS OF DEPARTMENTS AND AGENCIES FROM: Anne E. Rung, United States Chief Acquisition Officer Tony Scott, United States Chief Information Officer SUBJECT: Category Management
Can We Reconstruct How Identity is Managed on the Internet?
Can We Reconstruct How Identity is Managed on the Internet? Merritt Maxim February 29, 2012 Session ID: STAR 202 Session Classification: Intermediate Session abstract Session Learning Objectives: Understand
Frequently Asked Questions (FAQs) SIPRNet Hardware Token
Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:
Biometric Single Sign-on using SAML Architecture & Design Strategies
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems [email protected] 1 Setting Expectations What you can take away! Understand
Canadian Access Federation: Trust Assertion Document (TAD)
Participant Name: University of Lethbridge 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources
ANNUAL REPORT TO CONGRESS: FEDERAL INFORMATION SECURITY MANAGEMENT ACT
ANNUAL REPORT TO CONGRESS: FEDERAL INFORMATION SECURITY MANAGEMENT ACT OFFICE OF MANAGEMENT AND BUDGET May 1, 2014 Identical Letter Sent to: The Honorable Tom Coburn The Honorable Elijah Cummings The
ANNUAL REPORT TO CONGRESS: FEDERAL INFORMATION SECURITY MANAGEMENT ACT
ANNUAL REPORT TO CONGRESS: FEDERAL INFORMATION SECURITY MANAGEMENT ACT OFFICE OF MANAGEMENT AND BUDGET February 27, 2015 TABLE OF CONTENTS INTRODUCTION: FEDERAL CYBERSECURITY YEAR IN REVIEW... 6 SECTION
NEIS HELP DESK FAQS. HSPD-12 Policy/Business Process. General HSPD-12 FAQs can be found online at: http://lincpass.usda.gov/faq.
General HSPD-12 FAQs can be found online at: http://lincpass.usda.gov/faq.html HSPD-12 Policy/Business Process 1. How long is the entire process for Non-Employees? After enrollment, applicants should receive
GAO ELECTRONIC GOVERNMENT ACT. Agencies Have Implemented Most Provisions, but Key Areas of Attention Remain
GAO United States Government Accountability Office Report to the Committee on Homeland Security and Governmental Affairs, U.S. Senate September 2012 ELECTRONIC GOVERNMENT ACT Agencies Have Implemented
