Can We Reconstruct How Identity is Managed on the Internet?
|
|
|
- Cornelius Fleming
- 10 years ago
- Views:
Transcription
1 Can We Reconstruct How Identity is Managed on the Internet? Merritt Maxim February 29, 2012 Session ID: STAR 202 Session Classification: Intermediate
2 Session abstract Session Learning Objectives: Understand the reasons a new Internet identity approach is needed Envision how current government & private federation based approaches are showing the way to an Internet scale approach Project into the future of how Internet identity could operate if this approach continues to increase in popularity and what implications this could have for existing and new players Classify the challenges of policy, interoperability, legal, privacy, and others that stand in the way of broader adoption Recommend actions for both individuals and organizations to accelerate the adoption of this new approach 2
3 Agenda Internet identity problem Solution overview Overview of current trust frameworks Where is there progress? What is still missing? Trends to monitor Conclusion Q&A 3
4 Think of the Internet Identity Problem as Humpty Dumpty Now that it is broken, how do we put it back together? 4
5 The Internet Identity problem Simple to understand, hard to solve How do I securely and accurately link these two? Is a carbon life form Has a name & address Has home phone Pays taxes Has utility bills Has privacy wants Uses financial institution Multiple addresses Multiple digital identities Social media accounts Highly mobile Uses multiple devices Has many online accounts Has a transaction history Is a collection of Internet events
6 So what? Internet identity creates problems such as: Increased risk Identity theft High management costs Poor user experience Problem cannot be ignored Increased reliance on internet for commerce 6
7 Four conceptual approaches to identity B2E Identities increasingly crossing these boundaries B2B SAML B2C OpenID G2C OpenID 7
8 Identity was an easier issue 10+ years ago Enterprise manages B2E on premise B2C just emerging B2B and G2C in infancy Implicit trust established between the user and applications User Corporate Directory Identity Provider IAM Enterprise LAN Public Remote user In house Applications 8
9 Identity in 2012 Increased complexity B2E still managed by enterprise, but highly distributed workforce B2C, B2B and G2C much more established Trust between user and app no longer a given Enterprise LAN Corporate Directory Identity Provider Cloud IM Service Public Remote user User IAM Dir Dir In house Applications Dir 9
10 So what is a possible solution? How about trust frameworks. "Trusted identities and consumer control of personal information are essential to the effectiveness of transactions on the Internet. Trusted frameworks that provide identity assurance are a critical factor in the success of the digital identity ecosystem." Andrew Nash, Senior Director of Identity Services for Google Inc. OIX Founding Board Member
11 Some definitions (courtesy Kantara Initiative) Party Trust Framework Provider Relying Party Identity Provider Credential Provider Attribute Provider Description Sets the rules for operation of the trust framework; Accredits assessors Controls a resource that users wish to access Determines attributes required for access to resources Verifies identity of Subjects as specified in the trust framework Issues credentials that meet criteria for content and technical specifications as specified in the trust framework; Verifies validity of credentials when requested by Relying Party Verifies attributes associated with Subjects as specified in the trust framework
12 What is a trust framework? is a trust framework Examples of Trust Frameworks Phone networks, credit card payment networks 12
13 Trust Framework Example 1 Kantara Initiative Joint initiative founded in 2009 by: Liberty Alliance, Concordia Project, Internet Society, Information Card Foundation and XDI.org Not a standards body cooperates with OASIS & IETF Only Approved US Government Trust Framework Provider (TFP) with certified Levels of Assurance (LoA) 1, 2 and 3 non crypto (non PKI) Currently working on user managed access (UMA) model 13
14 Trust Framework Example 2 Open Identity Exchange (OIX) Launched at RSA 2010 Executive members AT&T, Booz Allen, CA Technologies, Equifax, Google, Symantec, Verizon Created partially out of US Government need to accept identities issued by 3 rd parties Goal: Build trust in the exchange of identity credentials online Offer frameworks with different level of assurance (LOA) LOAs based on NIST
15 Trust Framework Example 3 National Strategy for Trusted Identities in Cyberspace (NSTIC) Announced April 2011 Envisions an Identity Ecosystem a user centric online environment, a set of technologies, policies, and agreed upon standards that securely supports transactions ranging from anonymous to fully authenticated and from low to high value. Managed through NIST/Commerce Department Privacy Act of 1974 is underlying legislative framework Allows for identity providers outside government. Established National Program Office (NPO) Announced $10M program to fund 6 8 pilots in
16 US Government Identity Assurance Levels Level 1 Level 2 Level 3 Level 4 Little or no confidence in asserted identity Some confidence in asserted identity High confidence in asserted identity Very high confidence in asserted identity No identity proofing required, and some confidence the same claimant is accessing the protected transaction or Data Provides single factor remote authentication using a wide range of available authentication technologies Provides multi factor remote authentication using soft cryptographic tokens, hard cryptographic tokens, and one time password tokens Provides multi factor remote authentication using hard cryptographic tokens Source pdf 16
17 Benefits of Trust Frameworks Standardized identity interactions Early progress US Govt NIH PubMed program projects ~$3M in savings/5 yrs Simplified end user experience Reduced cost of supporting end users Reduced the friction of logins, registrations, purchases, and other online activities Increased confidence in online identity infrastructure Increased confidence in regulatory compliance 17
18 Progress to date US Government Trust Framework Program US ICAM LOA 1 Trust Framework operational March 2010 Enables Federal Agency websites to accept OpenID credentials Trust Framework Providers: InCommon Federation Level of Assurance 1 (provisionally approved) Kantara Initiative Level of Assurance 1, 2, and non PKI 3 (provisionally approved) Open Identity Exchange Level of Assurance 1 (provisionally approved) Approved Identity Schemes (Levels 1, 2 and non PKI 3): Identity Metasystem Interoperability (IMI) 1.0 Profile OpenID 2.0 Profile SAML 2.0 Web Browser Single Sign On Profile Approved Identity Providers Yahoo OpenID Wave Systems, OpenID 2.0, LoA 1 PayPal OpenID 2.0, LoA 1 PayPal IMI 1.0, LoA 1 VeriSign OpenID 2.0, LoA 1 Equifax IMI 1.0, LoA 1 Google OpenID 2.0, LoA 1
19 Why not use governments as sole online verifier? Consumers expect choice 1 size fits all is not likely solution Practical problem 200M+ people have dual citizenship (Economist) Private sector has skills and expertise Risk (perceived or real) of government monitoring online behavior can inhibit adoption Solution should be open and flexible This issue is geographic dependent In some countries, citizens are ok with this model Not all governments have the same capabilities 19
20 Identity Trend to monitor Google Street Identity/LMNOP Project Experimenting with authorizing access to verified street addresses Relying party sends postcard to end user s home with 1 time code User goes online and enters code Relatively low cost, relatively secure Uses cases can get more elegant (and complex) User can authorize IdP to issue physical address attribute to RP RP can contact mobile operator to verify address attribute 20
21 Identity Trend to monitor User managed access (UMA) Evolution of OAuth user centric model to enhance user control over user attribute/claim usage and RP compliance requirements Protocol for users to manage what attributes to share Managed through Kantara s UMA Working Group Contributed to the IETF for consideration Planning interoperability testing and increased OpenID Connect integration in 2012 Initial implementations Newcastle University (UK) Smartam.org Fraunhofer AISEC photo sharing project User defined Photo sharing service 21
22 What is still missing? For everyone Use of standards to promote interoperability Linking strong credentials/authentication to identity Risk analysis Processes to automate trust establishment Portability between web and mobile environments For user Choice, privacy, portability of identity between communities For IdPs and RPs Limitation on liability As RP, what legal or contractual protection is there in event of fraud? Orgs may wait until there is a body of case law before proceeding. Confidence of good behavior by RPs Defined metrics for Level of Protection (LOP) 22
23 Apply If you are a Consider the following in 90+ days Relying Party Understand strengths and weaknesses of each framework. Conduct risk assessment of your environment (NIST is good basis) Select appropriate level of assurance you expect from IdP Is accepting an ID from ID provider X acceptable? Identity Providers Credential Providers Complete internal assessment of your security procedures Publicize your due diligence Consider something like SAS 70 audit W/o these few relying parties will want to work with you If partnering with attribute providers: Determine freshness of underlying attributes Understand any liability issues associated with using 3 rd party attributes Attribute Provider Provide details on freshness of attributes Work on partnering with IdPs
24 In conclusion Session Learning Objectives: Trust Frameworks are one proven approach to address the Internet Identity problem Current government & private federation based approaches are showing the way to an Internet scale approach Kantara, OIX, NSTIC are proven this now Project into the future of how Internet identity could operate if this approach continues to increase in popularity and what implications this could have for existing and new players Policy, interoperability, legal, privacy challenges remain Still many challenges to be addressed, but off to a good start There are concrete actions that individuals and organizations can begin taking to take advantage of these new approaches. 24
25 Thank you Tracking/stalking me: maxim/0/315/526 Blog 25
NISTIC Pilot - Attribute Exchange Network. Biometric Consortium Conference - 2013
NISTIC Pilot - Attribute Exchange Network Biometric Consortium Conference - 2013 Market Development Startup (2011) Unrealized Large Market Potential Evolving Value Props & Use-Cases Evolving Tech/Policy
Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements
Joint White Paper: Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements Submitted Date: April 10, 2013 Submitted
Rich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association. SAFE-BioPharma Association
Navigating the Identity Landscape Rich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association SAFE-BioPharma Association Overview An overview of US and EU government
Identity, Credential, and Access Management. Open Solutions for Open Government
Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management www.idmanagement.gov Open Solutions for Open Government Judith Spencer Co-Chair, ICAM
FCCX Briefing. Information Security and Privacy Advisory Board. June 13, 2014
FCCX Briefing Information Security and Privacy Advisory Board June 13, 2014 1 Agenda Overview NSTIC FICAM Federal Cloud Credential Exchange Lessons Learned Enhancing Federation Privacy Questions 2 Challenge
Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014
Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent
The Future of Cloud Identity Security. Michael Schwartz Founder / CEO Gluu
The Future of Cloud Identity Security Michael Schwartz Founder / CEO Gluu Session ID: IAM-207 Session Classification: General Interest Background 2 Finally an Internet Identity Foundation 3 Who is behind
Identity: The Key to the Future of Healthcare
Identity: The Key to the Future of Healthcare Chief Medical Officer Anakam Identity Services July 14, 2011 Why is Health Information Technology Critical? Avoids medical errors. Up to 98,000 avoidable hospital
The Role of Federation in Identity Management
The Role of Federation in Identity Management August 19, 2008 Andrew Latham Solutions Architect Identity Management 1 The Role of Federation in Identity Management Agenda Federation Backgrounder Federation
Scalable Authentication
Scalable Authentication Rolf Lindemann Nok Nok Labs, Inc. Session ID: ARCH R07 Session Classification: Intermediate IT Has Scaled Technological capabilities: (1971 2013) Clock speed x4700 #transistors
Frans Bolk CEO UniQ-ID
Frans Bolk CEO UniQ-ID Uses certificates ( x.509) Has its own UniQ-CA ETSI Level of Security LoS5 ( Common Criteria EAL5+) ISO29115 and ISO29003 Level of Assurance LoA 4, and 3, and 2 ( STORK4+, and 3,
NOK NOK LABS AUTHENTICATION & OTT SERVICES
NOK NOK LABS AUTHENTICATION & OTT SERVICES RAJIV DHOLAKIA VP PRODUCTS & BUSINESS DEVELOPMENT 1 NOK NOK LABS The authentication challenge A DILEMMA UNTIL WE CAN TRULY RECOGNIZE PEOPLE ONLINE, IN REAL TIME...
Federal Identity, Credential, and Access Management Trust Framework Solutions. Overview
Federal Identity, Credential, and Access Management Trust Framework Solutions Overview Version 1.0 02/07/2014 Questions? Contact the FICAM TFS Program Manager at [email protected] 1 Table of Contents 1.
The Impact of NSTIC on the Internal Revenue Service. Economic Case Study: Planning Report 13-2
Planning Report 13-2 Economic Case Study: The Impact of NSTIC on the Internal Revenue Service Prepared by: RTI International for National Institute of Standards & Technology July 2013 Contents Chapter
Key Enablers for the Cloud Service Broker: Identity, Privacy, and Security
Key Enablers for the Cloud Service Broker: Identity, Privacy, and Security OMG Telecom Cloud Workshop Dec 6, 2010 David F. Chen Lead Principal-Technical Architect Ecosystem & Innovation, AT&T, Inc. Footer
National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
Biometrics in Identity as a Service
Daon - your trusted Identity Partner Biometrics in Identity as a Service What is BaaS and who is doing it? Catherine Tilton 28 September 2011 The Need As the world becomes more interdependent, as transactions
Auth0 SSO Drives B2B Expansion
Auth0 SSO Drives B2B Expansion An Auth0 Customer Case Study auth0.com Setting up our application to integrate with one partner and then having that partner act as a service hub for dozens of identity systems
Single Sign-On (SSO), Identity Exchange Hub, Remote Identity Proofing
Single Sign-On (SSO), Identity Exchange Hub, Remote Identity Proofing Brian Seggie Director of Security 1 Why are we doing this? Leverage large MICAM investment ($30 M) Improve identity verification to
Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone
Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone Although single sign-on (SSO) technology based on Liberty standards is being rapidly adopted by businesses, governments and
Interoperate in Cloud with Federation
Interoperate in Cloud with Federation - Leveraging federation standards can accelerate Cloud computing adoption by resolving vendor lock-in issues and facilitate On Demand business requirements Neha Mehrotra
RECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP
RECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP 1. Identity Ecosystem Steering Group Charter The National Strategy for Trusted Identities in Cyberspace (NSTIC or Strategy), signed by President
The Security Framework 4.1 Programming and Design
Tel: (301) 587-3000 Fax: (301) 587-7877 E-mail: [email protected] Web: www.setecs.com Security Architecture for Development and Run Time Support of Secure Network Applications Sead Muftic, President/CEO
Federal Identity, Credential, and Access Management Trust Framework Solutions. Relying Party Guidance For Accepting Externally-Issued Credentials
Federal Identity, Credential, and Access Management Trust Framework Solutions Relying Party Guidance For Accepting Externally-Issued Credentials Version 1.1.0 Questions? Contact the FICAM TFS Program Manager
Identity Relationship and Access Management for the Extended Enterprise
Identity Relationship and Access Management for the Extended Enterprise Benefits in External Identity Management CONTENTS Introduction... 3 Internal vs External identities... 3 Productivity vs Convenience...
Final Project Report December 9, 2012. Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540
Final Project Report December 9, 2012 Cloud-based Authentication with Native Client Server Applications. Nils Dussart 0961540 CONTENTS Project Proposal... 4 Project title... 4 Faculty Advisor... 4 Introduction...
Cloud-Based Identity Services
Cloud-Based Identity Services TrustX Technologies, Inc. 11325 Random Hills Rd., Suite 650 Fairfax, VA 22030 TrustX Identity Services Affordable Identity Assurance TrustX is a cloud-based implementation
OpenID & Strong Authentication
OpenID & Strong Authentication CTST 2009: Emerging Technology D14: Smart Cards, Tokens & Digital Identity May 5, 2009 Brian Kelly Vice President TrustBearer Labs Simplify Multi-factor authentication can
Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board
Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management An information exchange For Information Security and Privacy Advisory Board Deb Gallagher
Federated Identity for Cloud Computing and Cross-organization Collaboration
Federated Identity for Cloud Computing and Cross-organization Collaboration Steve Moitozo Strategy and Architecture SIL International 20110616.2 (ICCM) Follow me @SteveMoitozo2 2 Huge Claims You want federated
Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department [email protected]
Masdar Institute Single Sign-On: Standards-based Identity Federation John Mikhael ICT Department [email protected] Agenda The case for Single Sign-On (SSO) Types of SSO Standards-based Identity Federation
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Glossary of Key Terms
and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which
NSTIC National Program Office Discussion Draft STANDARDS CATALOG
NSTIC National Program Office Discussion Draft STANDARDS CATALOG Contents Introduction Source Documents Introduction This document is a contribution from the NSTIC National Program Office to the Identity
EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report
KuppingerCole Report EXECUTIVE VIEW by Dave Kearns March 2015 SecureAuth IdP SecureAuth IdP combines cloud single sign-on capabilities with strong authentication and risk-based access control while focusing
WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com
WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com Table of Contents 03...Introduction 04...Wipro Cloud (WIC) as a Service Type 05...Wipro Cloud Capabilities
FIDO Modern Authentication Rolf Lindemann, Nok Nok Labs
Rolf Lindemann, Nok Nok Labs cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com 1 Authentication in Context Single Sign-On Modern Authentication Federation
The identity management (IdM) ecosystem: minding the gaps
The identity management (IdM) ecosystem: minding the gaps Tony Rutkowski [email protected] Georges Sebek [email protected] Telecommunication Standardization Sector (ITU-T) International Telecommunication
IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation
IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Author: Creation Date: Last Updated: Version: I. Bailey May 28, 2008 March 23, 2009 0.7 Reviewed By Name Organization
Intelligent Security Design, Development and Acquisition
PAGE 1 Intelligent Security Design, Development and Acquisition Presented by Kashif Dhatwani Security Practice Director BIAS Corporation Agenda PAGE 2 Introduction Security Challenges Securing the New
CA Technologies Strategy and Vision for Cloud Identity and Access Management
WHITE PAPER CLOUD IDENTITY AND ACCESS MANAGEMENT CA TECHNOLOGIES STRATEGY AND VISION FEBRUARY 2013 CA Technologies Strategy and Vision for Cloud Identity and Access Management Sumner Blount Merritt Maxim
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
OIX IDAP Alpha Project - Technical Findings
OIX IDAP Alpha Project - Technical Findings Warwickshire County Council - using a Federated UK Government ID in trusted Local Authority transactions. By Graham Dunnings and Ian Litton 1 Table of Contents
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Andrew Sessions, Abel Sussman Biometrics Consortium Conference Agenda
TrustedX: eidas Platform
TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
CAS s IDP system and resources in Education Cloud
CAS s IDP system and resources in Education Cloud DAREN ZHA CANS2015, Chengdu Outline CAS s IDP system and Education Cloud introduction Problems of interoperation A interoperation plan CAS s Education
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Innovations in Digital Signature. Rethinking Digital Signatures
Innovations in Digital Signature Rethinking Digital Signatures Agenda 2 Rethinking the Digital Signature Benefits Implementation & cost issues A New Implementation Models Network-attached signature appliance
Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance
Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance Christina Stephan, MD Co-Chair Liberty Alliance ehealth SIG National Library of Medicine
Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management
Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management 1 Product Roadmap Disclaimer Any forward-looking indication of plans for products is preliminary and all future release
SIGNIFICANT CHANGES DOCUMENT
SIGNIFICANT CHANGES DOCUMENT Descriptive Title Schedule 70_MassModification_Health IT SIN Significant Changes Disclaimer Language DISCLAIMER: GSA FAS is posting this notification of a planned solicitation
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY
PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY Shane Weeden IBM Session ID: CLD-W01 Session Classification: Advanced Agenda Cloud security
Mobile Connect & FIDO
Mobile Connect & FIDO About the GSMA The GSMA represents the interests of mobile operators worldwide Spanning more than 220 countries, the GSMA unites nearly 800 of the world s mobile operators, as well
Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant
Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding
A trusted identity management system is not only essential for ensuring your customers safety and confidence.
A trusted identity management system is not only essential for ensuring your customers safety and confidence. With the new EU legislation, high protection of personal data has become a pressing need. Side
White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Privacy and Security Advantages of Social Login. White Paper
Privacy and Security Advantages of Social Login White Paper User Management Platform for the Social Web white paper Privacy and Security Advantages of Third-Party Authentication The practice of implementing
Federal Identity, Credential, and Access Management Trust Framework Solutions
1 2 3 4 5 6 7 Federal Identity, Credential, and Access Management Trust Framework Solutions 8 9 10 11 Trust Framework Provider Adoption Process (TFPAP) For All Levels of Assurance 12 13 14 15 16 17 18
Mobile Security. Policies, Standards, Frameworks, Guidelines
Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf
OpenID Single Sign On and OAuth Data Access for Google Apps. Ryan Boyd @ryguyrg Dave Primmer May 2010
OpenID Single Sign On and OAuth Data Access for Google Apps Ryan Boyd @ryguyrg Dave Primmer May 2010 Why? View live notes and questions about this session on Google Wave: http://bit.ly/magicwave Agenda
Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm
Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect
SECURITY INFRASTRUCTURE Standards and implementation practices for protecting the privacy and security of shared genomic and clinical data
Global Alliance for Genomics and Health SECURITY INFRASTRUCTURE Standards and implementation practices for protecting the privacy and security of shared genomic and clinical data VERSION 1.1 March 12,
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015
Federation At Fermilab Al Lilianstrom National Laboratories Information Technology Summit May 2015 About Fermilab Since 1967, Fermilab has worked to answer fundamental questions and enhance our understanding
Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0
sm Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0 Table of Contents Legal Notice... 3 Executive Summary... 4 Related Usage Models... 5 Reference Framework...
The Primer: Nuts and Bolts of Federated Identity Management
The Primer: Nuts and Bolts of Federated Identity Management Executive Overview For any IT department, it is imperative to understand how your organization can securely manage and control users identities.
SAML and OAUTH comparison
SAML and OAUTH comparison DevConf 2014, Brno JBoss by Red Hat Peter Škopek, [email protected], twitter: @pskopek Feb 7, 2014 Abstract SAML and OAuth are one of the most used protocols/standards for single
