CAMPUS EXPERIENCES USING NET+ TRUST, IDENTITY, AND SECURITY SERVICES



Similar documents
Integrating Multi-Factor Authentication into Your Campus Identity Management System

STRONGER AUTHENTICATION for CA SiteMinder

Adding Stronger Authentication to your Portal and Cloud Apps

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Multi-Factor Authentication, Assurance, and the Multi-Context Broker

Google Identity Services for work

Securing Physician and Patient Portals for HIPAA Compliance

The PortalGuard All-In-One Authentication Solution-set: A Comparison Guide of Two-Factor Capabilities vs. the Competition

ADDING STRONGER AUTHENTICATION for VPN Access Control

nexus Hybrid Access Gateway

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public

Evolving Strong Authentication at The University of Arizona

Multi- factor Authentication Initiative

Cisco Mobile Collaboration Management Service

PortWise Access Management Suite

Guide to Evaluating Multi-Factor Authentication Solutions

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

PortWise Access Management Suite

SAP Single Sign-On 2.0 Overview Presentation

API-Security Gateway Dirk Krafzig

The University of Texas Rio Grande Valley. Network Security. Create a Virtual Private. Network (VPN) Connection. Network Security How-to:

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

Symantec Mobile Management 7.2

Request for Proposals. Statewide Two Factor Authentication Solution. Addendum #2 October 5, Questions and Responses

Symantec Mobile Management 7.1

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department

Enterprise Mobility Management for Financial Sector

Symantec Mobile Management 7.1

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Enterprise Mobility Suite Overview. Joe Kuster Catapult Systems

White Paper. FFIEC Authentication Compliance Using SecureAuth IdP

Improving Online Security with Strong, Personalized User Authentication

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

The increasing popularity of mobile devices is rapidly changing how and where we

Authentication: Password Madness

Mobile device and application management. Speaker Name Date

How To Be Successful At Workday

WHITE PAPER Usher Mobile Identity Platform

Application Security Made in Switzerland

WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES

Athena Mobile Device Management from Symantec

The Cloud App Visibility Blindspot

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report

Top Five Security Must-Haves for Office 365. Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering

MobileIron Product Packaging

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

CONSUMERIZATION OF IT BYOD and Cloud-based File Storage

Initial DUO 2 Factor Setup, Install, Login and Verification

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

Clavister InSight TM. Protecting Values

Mobile Device Management for CFAES

Architecture, Implementations, Integrations, and Technical Overview

AirWatch Solution Overview

White Paper. McAfee Cloud Single Sign On Reviewer s Guide

How To Comply With Ffiec

How To Achieve Pca Compliance With Redhat Enterprise Linux

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Symantec Mobile Management for Configuration Manager 7.2

SECUREAUTH IDP AND OFFICE 365

Drawbacks to Traditional Approaches When Securing Cloud Environments

Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM facebook/allidm

Identity in the Cloud

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Secure Access Control for Mobile, Cloud, and Web Apps

Axway API Portal. Putting APIs first for your developer ecosystem

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University

How to Get to Single Sign-On

Top. Reasons Federal Government Agencies Select kiteworks by Accellion

Facebook s Security Philosophy, and how Duo helps.

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device

How To Manage A Mobile Device Management (Mdm) Solution

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

SP-initiated SSO for Smartsheet is automatically enabled when the SAML feature is activated.

Three Campus Case Studies: Managing Access with Grouper

The Cloud, Mobile and BYOD Security Opportunity with SurePassID

Casper Suite. Security Overview

PULSE SECURE FOR GOOGLE ANDROID

Transcription:

CAMPUS EXPERIENCES USING NET+ TRUST, IDENTITY, AND SECURITY SERVICES Nicholas Roy Penn State (Pennsylvania State University, The) Andrea Harrington Penn State (Pennsylvania State University, The) Michael Corn Brandeis University Tom McMahon - Weill Cornell Medical College David Bantz University of Alaska Fairbanks 2015 Internet2

What is the NET+ Security and Identity Portfolio A partnership focused on the needs of the broad higher educa3on community: Internet2's Trust and Identity team will focus on the federation and the TIER program NET+ Security and Identity portfolio will be the delivery mechanism for security and identity services. This alignment also reflects the linkages between identity and security within the higher education community and the affinities between some of these services, such as two-factor authentication and electronic signature solutions that are important to campus security and identity initiatives. Realigning the NET+ service portfolios is the first step in expanding engagement with security service providers and the higher education information security community. [ 2 ]

Penn State Identity Services Two-Factor (2FA) Duo Security Service

My Role Technical Director for Penn State Identity Services Responsibilities include managing: Software development (Central Person Registry) Systems management (~135 Linux VMs CPR, AMQ, LDAP, Shibboleth IdP, Web Services, Web Apps, etc.) Database Systems (Oracle RAC) All highly sensitive, all now required to be protected by 2FA

How We Got There With Duo Summer 13 Project Kickoff 50 stakeholders across PSU IT Common requirements Many off-the-shelf integrations Accessible Smartphone, dumbphone, hardware tokens Nervousness about cloud

Choosing Duo Completed a marketplace analysis Compiled requirements and analysis into assessment matrix At the time, only Duo met all requirements Rollout at scale has been highly successful

A Tidbit about Splunk> In the process of buying a Splunk license Will push person identifiers into security log streams and vice versa Hope to correlate IDS events with Duo fraud alerts

Deployment Strategy Users are required to have a Penn State Access Account Funding Central IT covers funding for licensing and telephony credits Departments cover funding for hardware tokens Project Sponsorship by the Risk Management Office and Information Technology Services (ITS) Team comprised of Identity Services (IdS) and Security Operations and Services (SOS)

Deployment Strategy Policy Making the case for a central 2FA service Data Categorization Public, Internal/Controlled, Restricted Minimum Security Baseline Internal/Controlled data should implement 2FA authentication as soon as feasible Restricted data must use 2FA authentication Pilots Identity Services and Security Office October January Campus Health Center (University Park) November February enrolled 8 users Talisma CRM for Student Recruitment May - June enrolled 300+ users Hershey Medical Center for Remote Access June - August enrolled 6,000+ users Systems for System Administrators August March

Deployment Strategy Service Development Duo role-based Administrative Console In-house development of a Self-Service Portal for user enrollment and management of devices (includes hardware tokens) Penn State Single Sign-On Authentication (WebAccess) integration with Duo 2FA service Other major integrations with Duo 2FA service (Unix, Windows, ) Content/Marketing/Communications Web site service information Engaged central IT Communications Information postcards Enrollment video News releases for University online publications and email messaging

Deployment Strategy Service Desk Training service desk staff (Duo Administrative Console, Portal, Service) Training Services Training the Trainers Outreach Dozens of meetings with departments sharing information about the service Presentations through University forums

Duo Stats Integrations - configured 275 as of April 13, 2015 Users - enrolled 9,117 Hardware Devices - registered to users 545 Phones - 10,372 ( ios 5,371, Android 2,412, Landline 1,488, ) Total Devices - registered to users 10,917

Brandeis University Library and Technology Services Skyhigh

Skyhigh Networks Three facets: Discover, Analyze, Secure Focusing on Discover and Analyze Deployed Log Processor 9 weeks ago Began subnet tagging Friday Sending logs from our border Palo Alto firewalls/ips Encrypting IP info

Requires stepping back and thinking about service usage policy Where on your network can you ask this question? What do you need to know to have this conversation? Where you can t act, you can educate Library and Technology

Weill Cornell Medical College Duo and Splunk

Two Factor Replacement Duo Security

Our Problems Password are no longer considered adequate to prevent fraudulent or unauthorized access User accounts are susceptible to phishing attack, malware infections and password guessing attacks WCMC VPN and email accounts have been compromised User acceptance of legacy 2FA system is low Deadline to meet NYS and DEA requirements for EPCS Password resets workflow is ineffective Our legacy two-factor authentication system, software and appliances where EOL

Why Duo Met most use cases and features in our requirements matrix Duo Push and similar user experience as Google Authenticator (OATH) 5 year TCO $25k Others where $225k and $150k Single non-intrusive option for accessing all of ITS systems with flexibility for other systems Free integrations and full API s to support other integrations Support of Android, ios, WinMobile, and other factor forms such as Tokens and SMS A solution that will not aggravate our users

Duo Multi-factor Roadmap Pilot Phase April Sept 2014 100+ Users ITS Administrative Systems Decommission and ITS Deployment Phase Sept Dec 2014 Removal of all RSA agents Shutdown of RSA SecurID System ITS Administrative Systems User Systems Phase 1 Dec April 2015 4000+ Users 2FA Verification Implementation into HIPM Deployment into Remote access systems EPCS Phase Feb Nov 2015 1200+ Users EPIC Electronic Prescription of Controlled Substances functionality User Systems Phase 2 April Oct 2015 5000+ Users Implementation to CMS and Web systems Deployment into SSO solutions SAP User (WBG) Future Concepts EPIC MyChart Integration EPIC Login SAP Administrative

SIEM Replacement Splunk

Our Problems Legacy SIEM deployment was 7 years old and at capacity and system issues make it challenging to fulfill some audit requests Vendor was purchased by a large company and support became unsatisfactory Legacy platform had limitations to data ingest and normalization Use cases needed to be updated to reflect new security challenges

Why Splunk? Met all use cases and features in our requirements matrix Splunk Apps, flexibility and ecosystem allows for fast and cheap deployment of integrations Data Normalization is at Read vs. Write Creating/Customizing parsers where much easier then other platforms Enterprise Security gave us functionality that a SIEM could not Distributed architecture lets it scale horizontally easily and increase as you go

Splunk Post Deployment Went live in October Changed metrics reporting to real-time from monthly Other ITS and college groups are approaching Security about utilizing Splunk Now implementing Splunk for all operational monitoring Increased our license from 100gb to 300gb within 6 months Increasing our Splunk infrastructure within 9 months

U Alaska integrated 2FA from DuoSecurity in its Shibboleth IdP [ 25 ] 2015 Internet2

Pilot Two-factor AuthN in institutional SSO (Shibboleth) Pilot as opt-in to gain acceptance Service opt in to require for authn Individuals opt in to require with their ID Opt in to facilitate phase in Required use anticipated only for key secure services [ 26 ] 2015 Internet2

Pilot Two-factor AuthN in institutional SSO (Shibboleth) Multi-Context Broker key to pilot Services opt in by specifying an authn context Individuals opt in based on a Directory attribute (group membership) Thanks to InCommon Assurance Program, Scalable Privacy Project https://spaces.internet2.edu/display/incassurance/multi-context+broker [ 27 ] 2015 Internet2

Pilot Two-factor AuthN in institutional SSO (Shibboleth) Duo Security 2FA Net+ and existing integrations with Shibboleth Duo Java Repository Wide range of additional integrations supported (Unix, VPN ) Robust array of 2FA supported, including out-of-band App SMS OTCs [ 28 ] Phone 2015 Internet2

Duo 2FA in combination with initial username/password Thanks David Langenberg, U Chicago: https://spaces.internet2.edu/display/incassurance/university+of+chicago Several Integration steps set up Duo account build & install duo java jar build & install a login handler (thanks David Langenberg, U Chicago) customize the login pages enable logging for testing [ 29 ] 2015 Internet2

Pilot Two-factor AuthN in institutional SSO (Shibboleth) Duo 2FA w/ initial username/password (1/3) [ 30 ] 2015 Internet2

Pilot Two-factor AuthN in institutional SSO (Shibboleth) Duo 2FA w/ initial username/password (2/3) [ 31 ] 2015 Internet2

Pilot Two-factor AuthN in institutional SSO (Shibboleth) Duo 2FA w/ initial username/password (3/3) [ 32 ] 2015 Internet2

Pilot Two-factor AuthN in institutional SSO (Shibboleth) Duo 2FA in combination with initial username/password in production for several months - Pretty much bullet proof, but still small pilot - Political and financial factors remain to enable wide deployment [ 33 ] 2015 Internet2

U Alaska Pilot of Two-factor AuthN in institutional SSO [ 34 ] 2015 Internet2

Questions?

PRESENTATION TITLE Presenter name Presenter title, organization 2014 Internet2