Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014
|
|
|
- Gwendoline Logan
- 10 years ago
- Views:
Transcription
1 Standards for Identity & Authentication Catherine J. Tilton 17 September 2014
2 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent on standards, both de facto and de jure. Standards aim at consolidating requirements of suppliers, users, relying parties and government legislative bodies into frameworks that may be used for coordinated implementation of authentication schemes. OECD on Electronic Authentication 2
3 Buckets of standards Interoperability Identity management Identity authentication (security) Identity federation Sector specific Biometrics (& other technology specific) Testing Conformance... 3
4 Where is this work being done? JTC1 SC27, SC37, SC17; TC68 Trust Framework Providers Consortia Government Agencies 4
5 Identity Management (IdM) ISO/IEC 24760, A framework for identity management ISO/IEC TR 29144:2014, The use of biometric technology in commercial Identity Management applications and processes Discusses concepts, considerations, and implementation issues ISO/IEC Identity proofing (WD) ANSI/NASPO-IDPV-2014, Requirements and Implementation Guidelines for Assertion, Resolution, Evidence, and Verification of Personal Identity ITU-T X.125x series Study Period (SP) on a privacy-respecting identity management scheme using attribute-based credentials has been initiated in SC27. 5
6 ISO/IEC ISO/IEC 24760, A framework for identity management Part 1 (Terminology & concepts) published (free) Part 2 (Reference architecture & requirements) at DIS Part 3 (Practice) at CD Specifies a framework for the issuance, administration, and use of data that serves to characterize individuals, organizations or information technology components which operate on behalf of individuals or organizations. Specifies fundamental concepts and operational structures of identity management 6
7 ISO/IEC TR ISO/IEC TR 29144:2014, The use of biometric technology in commercial Identity Management applications and processes Discusses concepts, considerations, and implementation issues Complements ISO/IEC TR = Technical Report (recommendations) Addresses: Capture processes Biometric identifiers Binding of biometrics to identity data Exceptions Database considerations 7
8 ISO/IEC ISO/IEC Information technology Security techniques Identity Proofing (WD) Identity proofing and verification (IPV) processes Provides best practices and guidance on required processes for initial establishment and subsequent confirmation of an entity s identity Complements ISO/IEC IS (normative) Meant to provide greater confidence in an entity s identity prior to delivery of a service to that entity Requirements mapped to LoAs (levels of assurance) Covers in-person and remote proofing Includes controls for enrollment, verification and threats 8
9 NASPO IDPV ANSI/NASPO-IDPV-2014, Requirements and Implementation Guidelines for Assertion, Resolution, Evidence, and Verification of Personal Identity Scope: Establishes an Identity Proofing process to be used by the Identity Proofer to meet the needs of 3 parties the individual, relying parties, and the proofer Establishes a 4-step methodology for identity proofing: Select an identity assurance level Assertion of unique identity Verification of asserted identity Determination Public review of v5.3.1 closed 8 Sep 9
10 ITU-T SG17 X Baseline capabilities for enhanced global identity management and interoperability X A framework for user control of digital identity X Baseline identity management terms and definitions X Security guidelines for identity management systems X Framework for discovery of identity management information 10
11 Identity Authentication SP , Electronic Authentication Guideline ISO/IEC 29115:2013 (ITU-T X.1254) - Entity Authentication Assurance Framework (published) OECD Recommendation on Electronic Authentication and OECD Guidance for Electronic Authentication NIST SP , Guide to Enterprise Password Management ISO/IEC 24761: Authentication context for biometrics (published) ITU-T X.1085 / ISO/IEC Telebiometric authentication framework using biometric hardware security module (in progress, CD) ISO/IEC A framework for access management (CD) 11
12 Identity Authentication ISO/IEC 29191: Requirements for partially anonymous, partially unlinkable authentication (published) OASIS Identity in the Cloud TC Trust Elevation TC Identity Based Attestation and Open Exchange Protocol Specification (IBOPS) Recently proposed within OASIS (new TC) TLS (RFC 5246) Used in proof-of-possession & device authentication Kerberos (RFC 2140 & related) Computer network authentication protocol based on tickets SC17 smartcards / identity cards 12
13 NIST SP Provides technical guidelines for Federal agencies implementing electronic authentication Covers remote authentication of users (such as employees, contractors, or private individuals) interacting with government IT systems over open networks. Defines technical requirements for each of four levels of assurance in the areas of identity proofing, registration, tokens, management processes, authentication protocols and related assertions. 13
14 ISO/IEC ISO/IEC 24761: Authentication context for biometrics (published) Defines the structure and the data elements of Authentication Context for Biometrics (ACBio), which is used for checking the validity of the result of a biometric verification process executed at a remote site. Specifies cryptographic syntax based on an abstract Cryptographic Message Syntax (CMS) schema Recognizing that the result of a biometric verification process is dependent upon Security level of the process executed Performance level of the devices used It uses PKI to provide this information at each step of the process to the validator Biometric Processing Unit (BPU) certificates 14
15 Identity Federation SAML OpenID 2 & OpenID Connect Shibboleth An open-source project that provides Single Sign-On capabilities and allows sites to make informed authorization decisions for individual access of protected online resources in a privacy-preserving manner. IMI (Identity Metasystem Interoperability) Enables the use of Information Cards to universally manage personal digital identities. A Web 2.0-friendly method for shared light authentication, Information Cards let people authenticate themselves on multiple web sites without maintaining passwords for each site. Trust Framework specifications* Kantara, SAFE BioPharma, InCommon, FICAM FIDO (emerging) 15
16 Identity Federation SCIM Simple Cloud Identity Management UMA User Managed Access (Kantara) access control by third parties to protected web resources Oauth (RFC 6749/6750) - user-authorized access by an API client to a web API Used by SCIM, OpenID Connect, and UMA IETF RFC 6711, An IANA Registry for Level of Assurance (LoA) Profiles Intended as an aid to discovering LoA definitions in protocols that use an LoA concept, including Security Assertion Markup Language (SAML) 2.0 and OpenID Connect. X General framework of combined authentication on multiple identity service provider environments XACML (Access Control Markup Language WS-Security 16
17 SAML OASIS Security Assertion Markup Language, v2.0 Defines the syntax and processing semantics of assertions made about a subject by a system entity (structure, protocol, rules) Series of related standards Used for WebSSO 17
18 SAML Authentication Method Identifiers Ver 2.0 Auth Context Classes IP Address IP Address + Password Kerberos Mobile 1/2 Factor Unregistered Mobile 1/2 Factor Contract Password Password protected transport Previous session Public Key - X.509/PGP/SPKI Public Key, XML Digital Signature Smartcard Smartcard + PKI Software PKI Telephony Nomadic, Personalized, Authenticated Secure Remote Password (SRP) (RFC 2945) SSL/TLS Certificate Based Client Authentication Time Sync Token Unspecified 18
19 OpenID Connect OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol. It enables Clients (relying parties) to verify the identity of the End-User based on the authentication performed by an Authorization Server (OpenID Provider), as well as to obtain basic profile information about the End-User in an interoperable and REST-like manner. 19
20 FIDO Fast IDentity Online Developing technical specifications that define an open, scalable, interoperable set of mechanisms that reduce the reliance on passwords to authenticate users 2 Protocol Specifications (draft) Universal Authentication Framework (UAF) Universal Second Factor (U2F) 20
21 Sector specific Financial FFIEC Authentication in an Internet Banking Environment, Supplement to reinforce the Guidance s risk management framework and update the Agencies expectations regarding customer authentication, layered security, or other controls in the increasingly hostile online environment. ANSI X , Biometric Information Management and Security ISO 19092, Financial Services Biometrics Part 1: Security framework Developed by ISO TC68, based on ANSI X9.84 describes adequate controls and proper procedures for using biometrics as an authentication mechanism for secure remote electronic access or local physical access controls Includes specific control objective across biometric life cycle Also includes annex of attacks/countermeasures Healthcare (?) 21
22 ISO ISO :2006, Financial Services Biometrics Part 1: Security framework Developed by ISO TC68, based on ANSI X9.84 describes adequate controls and proper procedures for using biometrics as an authentication mechanism for secure remote electronic access or local physical access controls Includes specific control objective across biometric life cycle Also includes annex of attacks/countermeasures Part 2 is Message syntax and cryptographic requirements, not complete 22
23 Core requirements of ISO Mechanisms shall be in place to maintain the integrity of biometric data and authentication results between any two components using: Cryptographic mechanisms such as a digital signature. Physical protection where no transmission is involved and all components reside within the same tamper resistant unit. 2. Mechanisms shall be in place to mutually authenticate the source and destination of the biometric data and authentication results, between the sender and receiver component, using: Cryptographic mechanisms such as a digital signature Physical protections where no transmission is involved and all components reside within the same tamper resistant unit 3. If desired, mechanisms may be in place to ensure the confidentiality of the biometric data between any two components and within any component, using: Cryptographic encryption Physical protections where no transmission is involved and all components reside within the same tamper resistant unit 23
24 Sector specific Law enforcement ANSI/NIST ITL1-20xx, Data Format for the Interchange of Fingerprint, Facial, & Other Biometric Information & related profiles) Border management ICAO 9303, Machine Readable Travel Documents Federal FIPS 201, Personal Identity Verification (PIV) of Federal Employees and Contractors (& associated SPs) 24
25 Related work of interest ISO/IEC 30107, Presentation Attack Detection Part 1, Framework (CD) Part 2, Data formats (WD) Part 3, Testing & reporting (WD) Addresses anti-spoofing and liveness detection (related to attacks at the biometric sensor) Pertinent to confident use of biometric authentication Also, SC27 project on security evaluation of anti spoofing techniques for biometrics (moving from study to NWIP) 25
26 Final note IDESG Standards Coordination Committee (SCC) Standards Inventory Meant to be a compilation of known identity-related standards - a survey of the identity standards landscape. Good resource + Please contribute! 26
27 Contact Info: Catherine Tilton, CBP VP, Stds & Tech, Daon Random Hills Dr, Suite 650 Fairfax, VA
Biometrics in Identity as a Service
Daon - your trusted Identity Partner Biometrics in Identity as a Service What is BaaS and who is doing it? Catherine Tilton 28 September 2011 The Need As the world becomes more interdependent, as transactions
SECURITY INFRASTRUCTURE Standards and implementation practices for protecting the privacy and security of shared genomic and clinical data
Global Alliance for Genomics and Health SECURITY INFRASTRUCTURE Standards and implementation practices for protecting the privacy and security of shared genomic and clinical data VERSION 1.1 March 12,
NISTIC Pilot - Attribute Exchange Network. Biometric Consortium Conference - 2013
NISTIC Pilot - Attribute Exchange Network Biometric Consortium Conference - 2013 Market Development Startup (2011) Unrealized Large Market Potential Evolving Value Props & Use-Cases Evolving Tech/Policy
Derived credentials. NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials
Daon your trusted Identity Partner Derived Credentials A Use Case Cathy Tilton Daon 1 February 2012 Derived credentials NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials Derived credential
Rich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association. SAFE-BioPharma Association
Navigating the Identity Landscape Rich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association SAFE-BioPharma Association Overview An overview of US and EU government
Scalable Authentication
Scalable Authentication Rolf Lindemann Nok Nok Labs, Inc. Session ID: ARCH R07 Session Classification: Intermediate IT Has Scaled Technological capabilities: (1971 2013) Clock speed x4700 #transistors
IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0
International Virtual Observatory Alliance IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 IVOA Proposed Recommendation 20151029 Working group http://www.ivoa.net/twiki/bin/view/ivoa/ivoagridandwebservices
WEB SERVICES SECURITY
WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
This Working Paper provides an introduction to the web services security standards.
International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand
Can We Reconstruct How Identity is Managed on the Internet?
Can We Reconstruct How Identity is Managed on the Internet? Merritt Maxim February 29, 2012 Session ID: STAR 202 Session Classification: Intermediate Session abstract Session Learning Objectives: Understand
Digital Signature Web Service Interface
1 2 Digital Signature Web Service Interface 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 1 Introduction This document describes an RPC interface for a centralized
Chapter 15 User Authentication
Chapter 15 User Authentication 2015. 04. 06 Jae Woong Joo SeoulTech ([email protected]) Table of Contents 15.1 Remote User-Authentication Principles 15.2 Remote User-Authentication Using Symmetric
Secure Identity in Cloud Computing
Secure Identity in Cloud Computing Michelle Carter The Aerospace Corporation March 20, 2013 The Aerospace Corporation 2013 All trademarks, service marks, and trade names are the property of their respective
Identity, Credential, and Access Management. Open Solutions for Open Government
Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management www.idmanagement.gov Open Solutions for Open Government Judith Spencer Co-Chair, ICAM
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
NIST s Guide to Secure Web Services
NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:
UAF Architectural Overview
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 UAF Architectural Overview Specification Set: fido-uaf-v1.0-rd-20140209 REVIEW DRAFT Editors: Rob Philpott, RSA, the Security Division of EMC Sampath
October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
October 2014 Issue No: 2.0 Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security
International Telecommunication Union ITU-T Y.2723 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/2013) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS
NSTIC National Program Office Discussion Draft STANDARDS CATALOG
NSTIC National Program Office Discussion Draft STANDARDS CATALOG Contents Introduction Source Documents Introduction This document is a contribution from the NSTIC National Program Office to the Identity
FIDO Modern Authentication Rolf Lindemann, Nok Nok Labs
Rolf Lindemann, Nok Nok Labs cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 Authentication in Context Single Sign-On Modern Authentication Federation
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Mobile Security. Policies, Standards, Frameworks, Guidelines
Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Cloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
Integrating Multi-Factor Authentication into Your Campus Identity Management System
Integrating Multi-Factor Authentication into Your Campus Identity Management System Mike Grady, Unicon David Walker, Internet2 (both associated with the Internet2 Scalable Privacy Project) Agenda Multi-Context
Authentication and Authorization Systems in Cloud Environments
Authentication and Authorization Systems in Cloud Environments DAVIT HAKOBYAN Master of Science Thesis Stockholm, Sweden 2012 TRITA-ICT-EX-2012:203 Abstract The emergence of cloud computing paradigm offers
CryptoNET: Security Management Protocols
CryptoNET: Security Management Protocols ABDUL GHAFOOR ABBASI, SEAD MUFTIC CoS, School of Information and Communication Technology Royal Institute of Technology Borgarfjordsgatan 15, SE-164 40, Kista,
CHAPTER - 3 WEB APPLICATION AND SECURITY
CHAPTER - 3 WEB APPLICATION AND SECURITY 3.1 Introduction Web application or Wepapp is the general term that is normally used to refer to all distributed web-based applications. According to the more technical
Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin [email protected]
Shibboleth : An Open Source, Federated Single Sign-On System David E. Martin [email protected] International Center for Advanced Internet Research Outline Security Mechanisms Access Control Schemes
GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET
http:// GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET Manisha Dawra 1, Ramdev Singh 2 1 Al-Falah School of Engg. & Tech., Vill-Dhauj, Ballabgarh-Sohna Road, Faridabad, Haryana (INDIA)-121004
Glossary of Key Terms
and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which
Authentication, Authorization, and Audit Design Pattern: Internal User Identity Authentication
Authentication, Authorization, and Audit Design Pattern: Internal User Identity Authentication Office of Technology Strategies (TS) Architecture, Strategy, and Design (ASD) Office of Information and Technology
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
FIDO Trust Requirements
FIDO Trust Requirements Ijlal Loutfi, Audun Jøsang University of Oslo Mathematics and Natural Sciences Faculty NordSec 2015,Stockholm, Sweden October, 20 th 2015 Working assumption: End Users Platforms
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION
Federal Identity, Credential, and Access Management Trust Framework Solutions. Relying Party Guidance For Accepting Externally-Issued Credentials
Federal Identity, Credential, and Access Management Trust Framework Solutions Relying Party Guidance For Accepting Externally-Issued Credentials Version 1.1.0 Questions? Contact the FICAM TFS Program Manager
Single Sign-On. Security and comfort can be friend. Arnd Langguth. [email protected]. September, 2006
Single Sign-On Security and comfort can be friend. Arnd Langguth [email protected] September, 2006 Identity proliferation in the enterprise Password management problem How many passwords do you have?
TrustedX: eidas Platform
TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements
Joint White Paper: Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements Submitted Date: April 10, 2013 Submitted
SAML for EPCS (Electronic Prescription of Controlled Substances)
SAML for EPCS (Electronic Prescription of Controlled Substances) Discussion Slides for review in the OASIS Security Services (SAML) TC August, 2014 DEA Regulation Compliance with New York s istop law-
Securing Web Services With SAML
Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
E-Authentication Federation Adopted Schemes
E-Authentication Federation Adopted Schemes Version 1.0.0 Final May 4, 2007 Document History Status Release Date Comment Audience Template 0.0.0 1/18/06 Outline PMO Draft 0.0.1 1/19/07 Initial draft Internal
Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT
Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to
The Importance of Security Standards
The Importance of Security Standards Presented by Douglas Kozlay Principal Engineer, Information Resource Engineering, Inc. Member: ANSI X9F INFORMATION RESOURCE ENGINEERING, INC. The Importance of Security
GSA FIPS 201 Evaluation Program
GSA FIPS 201 Evaluation Program David Temoshok Director, Federal Identity Policy and Management GSA Office of Governmentwide Policy NIST/DHS/TSA TWIC QPL Workshop April 21, 2010 1 HSPD-12 Government-wide
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Biometric Single Sign-on using SAML
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan CISSP [email protected] 1 Setting Expectations What you can take away! Understand the importance of Single Sign-On
SAML and OAUTH comparison
SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, [email protected], twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single
Comparative analysis - Web-based Identity Management Systems
Comparative analysis - Web-based Identity Management Systems Oscar Manso, Morten Christiansen and Gert Mikkelsen THE ALEXANDRA INSTITUTE 15 December 2014 2/45 Contents 1. Introduction... 2 2. Current State
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
Biometric Single Sign-on using SAML Architecture & Design Strategies
Biometric Single Sign-on using SAML Architecture & Design Strategies Ramesh Nagappan Java Technology Architect Sun Microsystems [email protected] 1 Setting Expectations What you can take away! Understand
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Revised October 25, 2007 These standards can be obtained (for a fee) at ANSI s estandards Store: http://webstore.ansi.org/
Single Sign-On: Reviewing the Field
Outline Michael Grundmann Erhard Pointl Johannes Kepler University Linz January 16, 2009 Outline 1 Why Single Sign-On? 2 3 Criteria Categorization 4 Overview shibboleth 5 Outline Why Single Sign-On? Why
White Paper. FFIEC Authentication Compliance Using SecureAuth IdP
White Paper FFIEC Authentication Compliance Using SecureAuth IdP September 2015 Introduction Financial institutions today face an important challenge: They need to comply with guidelines established by
How Secure is Authentication?
FIDO UAF Tutorial How Secure is Authentication? How Secure is Authentication? How Secure is Authentication? Cloud Authentication Password Issues Password might be entered into untrusted App / Web-site
WebLogic Server 7.0 Single Sign-On: An Overview
WebLogic Server 7.0 Single Sign-On: An Overview Today, a growing number of applications are being made available over the Web. These applications are typically comprised of different components, each of
Cloud-Based Identity Services
Cloud-Based Identity Services TrustX Technologies, Inc. 11325 Random Hills Rd., Suite 650 Fairfax, VA 22030 TrustX Identity Services Affordable Identity Assurance TrustX is a cloud-based implementation
Digital Identity and Identity Management Technologies.
I. Agudo, Digital Identity and Identity Management Technologies, UPGRADE - The European Journal of the Informatics Professional, vol. 2010, pp. 6-12, 2010. NICS Lab. Publications: https://www.nics.uma.es/publications
TIB 2.0 Administration Functions Overview
TIB 2.0 Administration Functions Overview Table of Contents 1. INTRODUCTION 4 1.1. Purpose/Background 4 1.2. Definitions, Acronyms and Abbreviations 4 2. OVERVIEW 5 2.1. Overall Process Map 5 3. ADMINISTRATOR
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
SWIFT: Advanced identity management
SWIFT: Advanced identity management Elena Torroglosa, Alejandro Pérez, Gabriel López, Antonio F. Gómez-Skarmeta and Oscar Cánovas Department of Information and Communications Engineering University of
ARCHIVED PUBLICATION
ARCHIVED PUBLICATION The attached publication, NIST Special Publication 800-63 Version 1.0.2 (dated April 2006), has been superseded and is provided here only for historical purposes. For the most current
2013 AWS Worldwide Public Sector Summit Washington, D.C.
Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company
An Introduction to SCIM: System for Cross-Domain Identity Management
An Introduction to SCIM: System for Cross-Domain Identity Management Nicholas Crown UnboundID Session ID: IAM-107A Session Classification: General Interest Agenda Why Standards-Based Provisioning? History
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On
A Federated Authorization and Authentication Infrastructure for Unified Single Sign On Sascha Neinert Computing Centre University of Stuttgart Allmandring 30a 70550 Stuttgart [email protected]
Page 1. Smart Card Applications. Lecture 7: Prof. Sead Muftic Matei Ciobanu Morogan. Lecture 7 : Lecture 7 : Smart Card Applications
in Open Distributed Processing s 1 in Open Distributed Processing s 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 7: 1 2 in Open Distributed Processing s 3 in Open Distributed Processing s Smart s
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
1. The human guard at the access control entry point determines whether the PIV Card appears to be genuine and has not been altered in any way.
+ Expiration date + Agency card serial number (back of card) + Issuer identification (back of card). The PIV Card may also bear the following optional components: + Agency name and/or department + Department
Designing federated identity management architectures for addressing the recent attacks against online financial transactions.
Designing federated identity management architectures for addressing the recent attacks against online financial transactions. Dr. Christos K. Dimitriadis Security Officer INTRALOT S.A. Scope and Agenda
Information Technology Policy
Information Technology Policy Identity Protection and Access Management (IPAM) Architectural Standard Identity Management Services ITP Number ITP-SEC013 Category Recommended Policy Contact [email protected]
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Andrew Sessions, Abel Sussman Biometrics Consortium Conference Agenda
Identity Management for Interoperable Health Information Exchanges
Identity Management for Interoperable Health Information Exchanges Presented to the NASMD Medicaid Transformation Grants HIE Workgroup - March 26, 2008 Presented by: John (Mike) Davis, Department of Veterans
SAML Federated Identity at OASIS
International Telecommunication Union SAML Federated Identity at OASIS Hal Lockhart BEA Systems Geneva, 5 December 2006 SAML and the OASIS SSTC o SAML: Security Assertion Markup Language A framework for
Modern Multi-factor and Remote Access Technologies
Modern Multi-factor and Remote Access Technologies ANDREW BRICKEY Senior IT Engineer Identity and Access Management / Core Computing Services NLIT Summit 2016 May 11, 2016 1 Agenda Problem and solution
Attestation and Authentication Protocols Using the TPM
Attestation and Authentication Protocols Using the TPM Ariel Segall June 21, 2011 Approved for Public Release: 11-2876. Distribution Unlimited. c 2011. All Rights Reserved. (1/28) Motivation Almost all
