Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
|
|
|
- Scarlett Beasley
- 10 years ago
- Views:
Transcription
1 Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved.
2 Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered trademark of Entrust Limited in Canada. All other company and product names are trademarks or registered trademarks of their respective owners. The material provided in this document is for information purposes only. It is not intended to be advice. You should not act or abstain from acting based upon such information without first consulting a professional. ENTRUST DOES NOT WARRANT THE QUALITY, ACCURACY OR COMPLETENESS OF THE INFORMATION CONTAINED IN THIS ARTICLE. SUCH INFORMATION IS PROVIDED "AS IS" WITHOUT ANY REPRESENTATIONS AND/OR WARRANTIES OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY, BY USAGE OF TRADE, OR OTHERWISE, AND ENTRUST SPECIFICALLY DISCLAIMS ANY AND ALL REPRESENTATIONS, AND/OR WARRANTIES OF MERCHANTABILITY, SATISFACTORY QUALITY, NON-INFRINGEMENT, OR FITNESS FOR A SPECIFIC PURPOSE. Copyright 2006 Entrust. All rights reserved.
3 Table of Contents 1 CMS Integration Overview Benefits to CMS with Entrust Integration CMS Integration with Managed Solutions CMS Integration Requirements for Managed Solutions CMS Integration Changes for Managed Solutions Architecture/Design CMS Integration with Unmanaged Solution CMS Integration Requirement for Unmanaged Solutions CMS Integration Changes for Unmanaged Solutions Architecture/Design Authorizing Requests to Entrust Certification Authority Planned Integration with CMS Products Summary About Entrust Copyright 2006 Entrust. All rights reserved.
4 1 CMS Integration Overview Many organizations are turning to two-factor authentication solutions to verify the identities of users on their networks. Simply put, two-factor authentication is based on something you know (for example, a PIN) and something you have (for example, a smart card). By requiring two independent elements for user authentication, this approach can help in decreasing the chances of unauthorized information access and fraud. A significant number of Entrust customers use card management systems (CMS) to enroll users with certificates that are stored on smart cards or tokens. (Note that throughout this document references to smart cards include both smart cards and other cryptographic tokens, such as USB tokens.) Interest in smart card deployment has increased amongst North American organizations and their US subsidiaries around the world with the introduction of Homeland Security Presidential Directive #12 (HSPD 12), which mandates the implementation of advanced identity credentials to standardize the form and level of security by which employees and contractors are identified in order to grant them access to federal facilities and information systems. In addition to assuring physical security at federally controlled facilities, the directive is aimed at securing electronic access to the federal government s information systems. It stipulates that identity must be verified by rapid, two-factor electronic authentication specifically, the infrastructure used must support identification cards that contain both public key certificates and a PIN or password. Entrust products meet the HSPD 12 mandates and can help CMS vendors meet the process and supporting infrastructure requirements defined by the FIPS 201 Personal Identity Verification (PIV) Standard. Using Entrust Authority Toolkits, CMS products can enroll users for managed or unmanaged certificates thereby helping to address a broad range of government and commercial enrollment requirements. This document outlines tools developed within the Entrust Authority portfolio to facilitate easier smart card management system integration with Entrust products for both managed and unmanaged certificate solutions. To the extent that encryption key pairs are being deployed, Entrust would recommend integration using the managed identities as this approach helps to enable key recovery and prevent loss of data in the event that a key is lost or damaged. It also offers more flexibility for CMS vendors to leverage additional management features that Entrust plans to make available to CMS vendors. Copyright 2006 Entrust. All rights reserved. Page 1
5 2 Benefits to CMS with Entrust Integration CMS vendors can take advantage of various benefits through integration with Entrust products. Specifically: Entrust has established relationships with many government departments and agencies and private sector businesses. Integration with Entrust s leading PKI product portfolio can help provide CMS vendors with opportunities for revenue growth that relate to enabling comprehensive, scalable security solutions designed to address certain needs such as compliance with corporate and government regulations for stronger authentication, encryption, and digital signatures. Entrust works closely with CMS vendors and customers to collect information and obtain a better understanding of the smart card requirements desired within the industry. This information is then used in selecting the features and functionality for Entrust products to enhance and complement card management solutions. Entrust PKI and complementary Entrust products can help in providing CMS compatibility with the Personal Identity Verification I and II (PIV I and II) system enabling the use of public key cryptography security by CMS customers for addressing HSPD-12 and Federal Information Processing Standard 201 FIPS 201 requirements. Integration with an Entrust PKI is designed to help provide a more cost effective option for the management of digital identity keys and certificates which is needed by many CMS customers to transparently automate security-related processes. With managed solutions, keys are automatically updated to avoid business interruption associated with expiry of keys and/or certificates. Decryption keys are backed up at the Security Manager to enable key recovery and prevent loss of data in the event that a key is lost or damaged or if an employee leaves the organization after encrypting data. Entrust also provides the flexibility to use unmanaged certificate solutions for scenarios such as when automatic key and certificate update is not required or desired. Entrust continues to enhance our developer tools and high-level APIs to enhance integration capabilities for both managed and unmanaged solutions. Copyright 2006 Entrust. All rights reserved. Page 2
6 3 CMS Integration with Managed Solutions 3.1 CMS Integration Requirements for Managed Solutions Automated key and certificate management services are critical to many customer solutions as they enable security capabilities such as encryption and digital signature across applications in a way that is transparent and easy to use. Entrust delivers products that help CMS products to be deployed within public-key infrastructures, lower the total cost of ownership and meet organization-wide security requirements. In general, CMS vendors and customers are looking for CMS integration APIs to achieve the following aspects of key and certificate lifecycle management: facilitated enrollment, key backup at the Certification Authority (CA), key recovery, automatic renewal and revocation via a card management system generation of keys on the CMS and transfer of keys where appropriate from software to hardware according to specific card management system standards 3.2 CMS Integration Changes for Managed Solutions With the above goals in mind, the Security Toolkit for the Java Platform includes a card management system module designed to facilitate digital identity enrollment, key backup at the CA and associated key recovery to enable appropriate access to protected data, renewal and revocation via a CMS. Specifically, Security Toolkit for the Java Platform can: a) accept a decryption key generated externally via the CMS rather than requiring the key to be generated via Entrust software (All signing/verification key pairs will be generated by the CMS) b) provide PKCS #11 or CryptoAPI formatted information to enable the CMS to write digital identity information to the smart card, including the private keys that the CMS has created, in such a way that Entrust software can manage the keys and certificates on the smart card 3.3 Architecture/Design The Entrust Authority Security Toolkit for the Java Platform can be used to accomplish user enrollment onto a smart card once the user has been set up and created using the Entrust Authority Security Manager software. This is done through the Security Toolkit for the Java Platform CredentialReader/CredentialWriter architecture. The Security Toolkit for the Java Platform triggers generation of the keys on the card via PKCS11 calls directly to the card, completes a Certificate Management Protocol (CMP) transaction with the Entrust Authority Security Manager software (activating the user), and writes the Entrust digital identity to the card via PKCS11 calls. The entire process is hidden from the application developer using the APIs provided in Entrust Authority Security Toolkit for the Java Platform. Copyright 2006 Entrust. All rights reserved. Page 3
7 In addition to these user enrollment capabilities, features have been added to the Entrust Authority Security Toolkit for the Java Platform to further facilitate CMS integration with Entrust products. With the new integration capabilities, decryption key pairs are either generated and/or backed up as necessary by the Entrust Authority Security Manager software and securely passed back to the CMS via the Security Toolkit for the Java Platform, or generated by the CMS and securely passed via the Security Toolkit for the Java Platform to the Security Manager software for backup. (The documentation for the Entrust Authority Security Toolkit for the Java Platform provides details on how to integrate a card management system with Entrust software.) The specific module that enables CMS creation of keys and certificates that can be managed via Entrust software is called CMPForCardMS and it can be located within the com.entrust.toolkit.credentials package. The main CardMS class that explains what the CardMS module is and how it is used is: com.entrust.toolkit.credentials.cmpforcardms Card management system vendors may also be interested in the following classes available through the CardMS module: com.entrust.toolkit.credentials.cardmscertreqinfo com.entrust.toolkit.credentials.p11storageobject com.entrust.toolkit.credentials.p11dataobject com.entrust.toolkit.credentials.p11privatekeyobject com.entrust.toolkit.credentials.p11x509certificateobject Please request a copy of the documentation for the Entrust Authority Security Toolkit for the Java Platform to learn more about the above mentioned classes and receive additional details on how to integrate a card management system with Entrust software. Copyright 2006 Entrust. All rights reserved. Page 4
8 Note that the diagram set out in Figure 1 below, digital identity lifecycle management is achieved using a combination of Entrust client-side software and the Certification Authority. See Section 6 titled Planned Integration with CMS Products, for further information regarding changes that may affect integration plans. Figure 1: Sample user enrollment request and response with decryption key backup User or Admin initiates enrollment 3. Send public signing & auth n keys CMS CMS Admin Toolkit* Security Toolkit for the Java Platform 9. Return certificates & protected decryption key 1. Create entry & return activation codes 4. Public Keys over CMP 8. Return certificates & protected decryption key Entrust Authority Security Manager 5. Create decryption key + certificates 6. Publish public certificates 7. Escrow decryption key Directory Database 2. Create signing & authentication key pairs *See Section 5 for details on administration interface options for Entrust Authority Security Manager. Copyright 2006 Entrust. All rights reserved. Page 5
9 4 CMS Integration with Unmanaged Solution 4.1 CMS Integration Requirements for Unmanaged Solutions The CardMS module described above can be used to enroll users for credentials that can be managed as well as credentials that will not be managed. Entrust is seeing increased interest from customers and CMS partners in an API that addresses the following requirements for unmanaged solutions. An API that: enables an unmanaged certificate to be retrieved from an Entrust CA when the key is generated externally by a non-entrust product supports variable per user and per card certificate extensions including biometric and subject directory attributes included as extensions to CMP requests per RFC3739 or Personal Identity Verification extensions as defined in FIPS 201 supports flexible key pairs for users and/or devices including key pairs for authentication, non-repudiation, encryption only or encryption in combination with digital signature supports various types of device certificates that can be stored in hardware or software as required and used for devices, smart cards & tokens on a wide variety of platforms Note that Unmanaged Solutions will not provide key backup and recovery or automatic renewal capabilities. 4.2 CMS Integration Changes for Unmanaged Solutions With the above requirements in mind, the Entrust Authority Security Toolkit for the Java Platform provides a client API that accepts a request for an unmanaged user or device certificate and communicates with an Entrust CA to retrieve a certificate based on that request. The new API accepts a public key, information about the certificate policy pertaining to the request, and activation codes authorizing the request. See Entrust Authority Security Manager documentation for more information on certificate policies. Certificates may be requested for users or devices that have been setup using the Entrust CA for creation or recovery (user/device already has a reference number and authorization code). Entrust Authority Security Manager is very flexible in terms of the types of certificates that can be requested and the extensions that can be requested in the certificates and is capable of requesting critical and non-critical extensions. An Administrator Authenticated (AA) mode has been added to the Entrust Authority Security Manager to provide additional flexibility to add certificate extensions. (This capability is only available with Security Manager 7.1 patch and later.) The Entrust Authority Security Toolkit for the Java Platform makes use of the Administrator Authenticated CMP mode to retrieve unmanaged certificates from an Entrust CA. In addition to the Administrator Authenticated CMP mode, default certificate types and certificate definitions have been added to Security Manager Master Certificate Specification to simplify processing of unmanaged certificate requests. More specifically, an Entrust CA associates a certificate type and associated certificate definitions with each user. The definitions contain policy that governs the user's keys. Copyright 2006 Entrust. All rights reserved. Page 6
10 4.3 Architecture/Design The Entrust Authority Security Toolkit for the Java Platform can be used to accomplish user enrollment onto a smart card once the user has been set up or created using the Entrust Authority Security Manager software. Each piece of certificate request information will contain the public key for which certification is being requested, an identifier for the certificate definition policy that the request corresponds to, and any requested X.509 certificate extensions. Every Entrust user is given a certificate type, which in turn contains a set of certificate definitions. Each certificate definition represents one of the user's key/certificate pairs, and contains the client policy settings governing this key/certificate. The Entrust Authority Security Toolkit for the Java Platform public class EntrustP10CertRetriever enables unmanaged end user certificates to be retrieved from the Entrust Authority Security Manager software when the key pair is generated externally. It requires the Entrust Authority Security Toolkit for the Java Platform to be set up for PKIX-CMP operation in Administrator Authenticated (AA) mode which is available with the Entrust Authority Security Manager 7.1 software, patch and later. The Entrust Authority Security Toolkit for the Java Platform API accepts a public key, a certificate definition identifier, a reference number, and an authorization code. The request does not need to be in PKCS #10 format. The request may contain custom extension information and must contain the following: A public key Activation codes Information about certificate policy pertaining to the request Further technical details are available in documentation for the Entrust Authority Security Toolkit for the Java Platform under com.entrust.toolkit.credentials Class EntrustP10CertRetriever. Request a copy of the documentation for technical integration details. Copyright 2006 Entrust. All rights reserved. Page 7
11 Figure 2: Sample enrollment request and response without key backup User or Admin initiates enrollment CMS Admin Toolkit Security Toolkit for the Java Platform 1. Create entry & return activation codes 3. Public Key over CMP 5. Return certificate Entrust Authority Security Manager 4. Publish public certificate Directory 2. Create signing key pair, send public key to CMS 6. Return certificate to user Copyright 2006 Entrust. All rights reserved. Page 8
12 5 Authorizing Requests to Entrust Certification Authority Entrust Authority Security Toolkit for the Java Platform provides an API that accepts a certificate request and communicates with an Entrust CA to retrieve an end user certificate based on that request. Certificates can be retrieved for end users that exist within the Entrust Authority Security Manager in the added or keyrecover state. Requests for issuance or recovery of digital identities must contain valid activation codes authorizing fulfillment of the request by the Entrust CA. Users may be added to the Entrust CA by an authorized Administrator, either manually via the administration GUI or programmatically via the Administration Toolkit for C. The createuser sample included with the Entrust Authority Administration Toolkit for C provides the steps required to create a user and retrieve the activation codes from the Entrust CA using a programmatic approach. Request the Entrust Authority Administration Toolkit for C Programmer s Reference Guide for more details. The required steps are: 1. Create a new directory entry 2. Create the user on the CA 3. Get the reference number and authorization codes Copyright 2006 Entrust. All rights reserved. Page 9
13 6 Planned Integration with CMS Products In addition to the modifications described in the sections above, further enhancements are planned to address other integration requirements that may arise with respect to lifecycle management. While customers generally use desktop clients to cost-effectively and transparently manage keys and certificates on smart cards or in software, some customers require all writing to a smart card be handled by a CMS via card management system standards. Entrust is currently reviewing CMS vendor requests in this area and plans to create simple high level APIs to enable CMS vendors to integrate with Entrust s lifecycle management capabilities without requiring key management expertise. CMS vendors are encouraged to provide feedback on future integration requirements. Copyright 2006 Entrust. All rights reserved. Page 10
14 7 Summary Entrust is committed to providing solutions that can help card management system vendors address customer needs in the area of smart card enrollment and management, including support for automated Digital ID management, HSPD 12 specifications and the related Personal Identity Verification I and II requirements. We are working closely with CMS vendors in an effort to proactively anticipate product features that will likely be desired by customers. Whether CMS customers need managed or unmanaged solutions, Entrust helps provide tools for organizations to deploy credentials in a number of security applications. Entrust products provide an extensible environment that allows organizations to start with any one of Entrust s security applications and add capabilities as needed, while still leveraging their initial investment. By securing digital identities and information, Entrust solutions can help in making it possible to costeffectively extend the enterprise to stakeholders and improve compliance with regulatory demands for stronger internal controls and information privacy. For more information or to provide feedback on card management system needs related to integrating with Entrust products, please contact your Entrust Account Representative or one of the following: North America Sales: EMEA Sales: +44 (0) [email protected] Copyright 2006 Entrust. All rights reserved. Page 11
15 8 About Entrust Entrust, Inc. is a world leader in securing digital identities and information. Over 1,400 enterprises and government agencies in more than 50 countries use Entrust solutions to help secure the digital lives of their citizens, customers, employees and partners. Our proven software and services can help customers in achieving regulatory and corporate compliance, while helping to turn security challenges such as identity theft and security into business opportunities. For more information on how Entrust can help secure your digital life, please visit: Copyright 2006 Entrust. All rights reserved. Page 12
How To Manage A Password Protected Digital Id On A Microsoft Pc Or Macbook (Windows) With A Password Safehouse (Windows 7) On A Pc Or Ipad (Windows 8) On An Ipad Or Macintosh (Windows 9)
Overview November, 2006 Copyright 2006 Entrust. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. All other Entrust product names and service names are
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,
Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions
A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Deriving a Trusted Mobile Identity from an Existing Credential
Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile
Defending the Internet of Things
Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity
Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
An Introduction to Entrust PKI. Last updated: September 14, 2004
An Introduction to Entrust PKI Last updated: September 14, 2004 2004 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In
Symantec Managed PKI Service Deployment Options
WHITE PAPER: SYMANTEC MANAGED PKI SERVICE DEPLOYMENT............. OPTIONS........................... Symantec Managed PKI Service Deployment Options Who should read this paper This whitepaper explains
Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
Strong Identity Authentication for First Responders
Strong Identity Authentication for First Responders Entrust Solutions for Compliance to U.S. Department of Homeland Security First Responder Authentication Credential (FRAC) Standards Entrust Inc. All
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Did security go out the door with your mobile workforce? Help protect your data and brand, and maintain compliance from the outside
Help protect your data and brand, and maintain compliance from the outside September 2006 Copyright 2006 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States
Understanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
HKUST CA. Certification Practice Statement
HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of
Strong Authentication for Healthcare
Strong Authentication for Healthcare Entrust Solutions for Centers for Medicare & Medicaid Services Authentication Compliance Entrust Inc. All All Rights Reserved. 1 1 Entrust is a registered trademark
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?
esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents
Executive Summary P 1. ActivIdentity
WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
IDaaS: Managed Credentials for Local & State Emergency Responders
IDaaS: Managed Credentials for Local & State Emergency Responders NextgenID ID*TRUST Platform NextgenID - Headquarters USA 10226 San Pedro, Suite 100 San Antonio, TX 78216 +1 (210) 530-9991 www.nextgenid.com
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
Ericsson Group Certificate Value Statement - 2013
COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...
Implementing Federal Personal Identity Verification for VMware View. By Bryan Salek, Federal Desktop Systems Engineer, VMware
Implementing Federal Personal Identity Verification for VMware View By Bryan Salek, Federal Desktop Systems Engineer, VMware Technical WHITE PAPER Introduction This guide explains how to implement authentication
Why outsourcing your PKI provides the best value A Total Cost of Ownership analysis
A Total Cost of Ownership analysis July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is
Case Study: Leveraging TPM for Authentication and Key Security
Case Study: Leveraging TPM for Authentication and Key Security 09/20/2011 Gautam Muralidharan Manager, Advisory Services PwC Speaker Introduction Gautam is a manager in the Advisory Technology practice
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
How To Protect Your Data From Harm With Safenet
SafeNet Information Security Government Solutions Disk & File Encryption Database & Application Encryption Network & WAN Encryption Identity & Access Management Application & Transaction Security Information
WHITE PAPER ENTRUST ENTELLIGENCE SECURITY PROVIDER 7.0 FOR WINDOWS PRODUCT OVERVIEW. Entrust 2003. All rights reserved.
WHITE PAPER ENTRUST ENTELLIGENCE SECURITY PROVIDER 7.0 FOR WINDOWS PRODUCT OVERVIEW Entrust 2003. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain
How much do you pay for your PKI solution?
Information Paper Understand the total cost of your PKI How much do you pay for your PKI? A closer look into the real costs associated with building and running your own Public Key Infrastructure and 3SKey.
HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006
HSPD-12 Implementation Architecture Working Group Concept Overview Version 1.0 March 17, 2006 Table of Contents 1 PIV Lifecycle... 3 2 High Level Component Interaction Diagram... 4 3 PIV Infrastructure
Moving to Multi-factor Authentication. Kevin Unthank
Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that
Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.
Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions
DIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
CA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview
White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4
Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003
Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
Certificate Policies and Certification Practice Statements
Entrust White Paper Certificate Policies and Certification Practice Statements Author: Sharon Boeyen Date: February 1997 Version: 1.0 Copyright 2003 Entrust. All rights reserved. Certificate Policies and
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Installation and Configuration Guide
Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
Why Digital Certificates Are Essential for Managing Mobile Devices
WHITE PAPER: WHY CERTIFICATES ARE ESSENTIAL FOR MANAGING........... MOBILE....... DEVICES...................... Why Digital Certificates Are Essential for Managing Mobile Devices Who should read this paper
Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ)
Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ) Version 1.0 January 18, 2011 Table of Contents 1. INTRODUCTION... 3 1.1 BACKGROUND... 3 1.2 OBJECTIVE AND AUDIENCE...
Best Practices for Choosing a Content Control Solution
Best Practices for Choosing a Content Control Solution March 2006 Copyright 2006 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other
Innovations in Digital Signature. Rethinking Digital Signatures
Innovations in Digital Signature Rethinking Digital Signatures Agenda 2 Rethinking the Digital Signature Benefits Implementation & cost issues A New Implementation Models Network-attached signature appliance
Managed Services PKI 60-day Trial Quick Start Guide
Entrust Managed Services PKI Managed Services PKI 60-day Trial Quick Start Guide Document issue: 3.0 Date of issue: Nov 2011 Copyright 2011 Entrust. All rights reserved. Entrust is a trademark or a registered
Frequently Asked Questions (FAQs) SIPRNet Hardware Token
Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Certificate Policy. SWIFT Qualified Certificates SWIFT
SWIFT SWIFT Qualified Certificates Certificate Policy This Certificate Policy applies to Qualified Certificates issued by SWIFT. It indicates the requirements and procedures to be followed, and the responsibilities
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
End User Encryption Key Protection Policy
End User Encryption Key Protection Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization.
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)
WHITE PAPER Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ) SEPTEMBER 2004 Overview Password-based authentication is weak and smart cards offer a way to address this weakness,
Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid)
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate on Aladdin etoken (Personal eid) Wherever Security relies on Identity,
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public
SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On Public Speakers Las Vegas, Oct 19-23 Christian Cohrs, Area Product Owner Barcelona, Nov 10-12 Regine Schimmer, Product Management
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003
Entrust Secure Web Portal Solution Livio Merlo Security Consultant September 25th, 2003 1 Entrust Secure Web Portal Solution Only the Entrust Secure Web Portal solution provides Security Services coupled
Service Description. 3SKey. Connectivity
Connectivity 3SKey Service Description This document describes the features and functions of the components of the 3SKey solution and the roles and responsibilities of all parties involved in the 3SKey
Information Technology Policy
Information Technology Policy Identity Protection and Access Management (IPAM) Architectural Standard Identity Management Services ITP Number ITP-SEC013 Category Recommended Policy Contact [email protected]
PUBLIC Secure Login for SAP Single Sign-On Implementation Guide
SAP Single Sign-On 2.0 SP04 Document Version: 1.0-2014-10-28 PUBLIC Secure Login for SAP Single Sign-On Implementation Guide Table of Contents 1 What Is Secure Login?....8 1.1 System Overview.... 8 1.1.1
Defender Delegated Administration. User Guide
Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
The Encryption Anywhere Data Protection Platform
The Encryption Anywhere Data Protection Platform A Technical White Paper 5 December 2005 475 Brannan Street, Suite 400, San Francisco CA 94107-5421 800-440-0419 415-683-2200 Fax 415-683-2349 For more information,
Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C
Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates
How To Issue A Certificate On A Cablelabs Device (Cablelabs) To A Certificate Request Agent (Cra)
CableLabs Certificate Issuance Process Notice This document is furnished by Cable Television Laboratories, Inc. (CableLabs) in an AS IS basis. CableLabs does not provide any representation or warranty,
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
Security and Security Certificates for OpenADR systems. Background. Content:
Security and Security Certificates for OpenADR systems Content: Background... 1 Setup for OpenADR... 2 Test-, Evaluation-, and Production Certificates... 3 Responsibilities... 3 Certificate Requesting
I N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-3 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William E. Burr Hildegard Ferraiolo David Cooper I N F
Cybersecurity and Secure Authentication with SAP Single Sign-On
Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle
Six Steps to SSL Certificate Lifecycle Management
Six Steps to SSL Certificate Lifecycle Management Why you need an SSL certificate management solution and how to get started +1-888-690-2424 entrust.com Table of contents Introduction Page 3 Consequences
I N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-2 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William. E. Burr I N F O R M A T I O N S E C U R I T Y
Public Key Infrastructure for a Higher Education Environment
Public Key Infrastructure for a Higher Education Environment Eric Madden and Michael Jeffers 12/13/2001 ECE 646 Agenda Architectural Design Hierarchy Certificate Authority Key Management Applications/Hardware
EMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support
EMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support Technology Concepts and Business Considerations Abstract Encryption plays an increasingly important role in IT infrastructure
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
IBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
The Costs of Managed PKI:
The Costs of Managed PKI: In-House Implementation of PKI vs. Traditional Managed PKI vs. ON-Demand PKI A TC TrustCenter Whitepaper Last Updated: February 2008 Introduction Until recently, organizations
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Enterprise Data Protection
PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Managed Portable Security Devices
Managed Portable Security Devices www.mxisecurity.com MXI Security leads the way in providing superior managed portable security solutions designed to meet the highest security and privacy standards of
Technical Integration Guide for Entrust IdentityGuard 9.1 and Citrix Web Interface using RADIUS
Technical Integration Guide for Entrust IdentityGuard 9.1 and Citrix Web Interface using RADIUS Document issue: 2.0 August 2009 Entrust is a registered trademark of Entrust, Inc. in the United States and
Exploring ADSS Server Signing Services
ADSS Server is a multi-function server providing digital signature creation and signature verification services, as well as supporting other infrastructure services including Time Stamp Authority (TSA)
Two-Factor Authentication
Chen Arbel Vice President, Strategic Development Authentication Unit & Software DRM Aladdin Knowledge Systems Two-Factor Authentication The key to compliance for secure online banking Legal Notice Copyright
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology
20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business
Identity and Access Management Initiatives in the United States Government
Identity and Access Management Initiatives in the United States Government Executive Office of the President November 2008 Importance of Identity Management within the Federal Government "Trusted Identity"
