MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013



Similar documents
The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control

Moving to Multi-factor Authentication. Kevin Unthank

Executive Summary P 1. ActivIdentity

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

Authentication Levels. White Paper April 23, 2014

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006

Arkansas Department of Information Systems Arkansas Department of Finance and Administration

STRONGER AUTHENTICATION for CA SiteMinder

Deriving a Trusted Mobile Identity from an Existing Credential

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Longmai Mobile PKI Solution

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

Identity & Privacy Protection

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

ADDING STRONGER AUTHENTICATION for VPN Access Control

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012

CoSign by ARX for PIV Cards

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Advanced Authentication Methods Determining the Best Fit for Your Agency. Strong Authentication. Simplified.

Entrust IdentityGuard

Page 1. Smart Card Applications. Lecture 7: Prof. Sead Muftic Matei Ciobanu Morogan. Lecture 7 : Lecture 7 : Smart Card Applications

Authentication: Password Madness

Required changes to Table 6 2 in FIPS 201

Alternative authentication what does it really provide?

Smart Card Two Factor Authentication

Identity Governance Evolution

PROTECT YOUR WORLD. Identity Management Solutions and Services

U.S. Department of Agriculture HSPD 12 Program. USDA HSPD-12 Implementing PIV USDA

Finger Vein digital biometric signature: use cases

Schlumberger PKI /Corporate Badge Deployment. Neville Pattinson Director of Business Development & Technology IT & Public Sector

Status: Final. Form Date: 30-SEP-13. Question 1: OPDIV Question 1 Answer: OS

Guard All Security Symposium. Identity and Access Management

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Introducing etoken. What is etoken?

Multi-Factor Authentication of Online Transactions

These additional levels of security are NOT required if you are using a Derbyshire County Council machine on council premises.

Identity and Access Management The road to sustained compliance

Strong Authentication for Secure VPN Access

Microsoft Enterprise Mobility Suite

Global network of innovation. Svein Arne Lindøe Arnfinn Strand Security Competence Center Scandic Siemens Business Services (Norway)

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Jort Kollerie SonicWALL

Strong Identity Authentication for First Responders

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

HOTPin Integration Guide: DirectAccess

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Session ID: Session Classification:

etoken Single Sign-On 3.0

Information Technology Policy

The University of Texas Rio Grande Valley. Network Security. Create a Virtual Private. Network (VPN) Connection. Network Security How-to:

API-Security Gateway Dirk Krafzig

Department of Veterans Affairs Two-Factor Authentication MobilePASS Quick Start Guide November 18, 2015

Integration Guide. SafeNet Authentication Client. Using SAC CBA for Check Point Security Gateway

Information Security Basic Concepts

Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust

RAPIDS Self Service User Guide

French Justice Portal. Authentication methods and technologies. Page n 1

Two Factor Authentication and PKI Token (for Windows)

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics

Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards

Remote Access End User Reference Guide for F5 Edge VPN Client Access

Human Factors in Information Security

Microsoft Office365 with Active Directory Federated Services (ADFS) Authenticating Users Using SecurAccess Server by SecurEnvoy

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Entrust IdentityGuard Versatile Authentication Platform for Enterprise Deployments. Sam Linford Senior Technical Consultant

Glossary of Key Terms

USER GUIDE WWPass Security for Windows Logon

id center definitely with biometrics strong authentication

Global Headquarters: 5 Speen Street Framingham, MA USA P F

NOAA HSPD-12 PIV-II Implementation October 23, Who is responsible for implementation of HSPD-12 PIV-II?

Enhancing Organizational Security Through the Use of Virtual Smart Cards

McAfee Endpoint Encryption Manager

Extending Identity and Access Management

Using etoken for Securing s Using Outlook and Outlook Express

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Smart Cards and Biometrics in Physical Access Control Systems

Exploring Converged Access of IT Security and Building Access Today, Tomorrow and the Future

Adobe PDF for electronic records

The Cloud, Mobile and BYOD Security Opportunity with SurePassID

Hosted Microsoft Exchange Client Setup & Guide Book

esign Online Digital Signature Service

Derived credentials. NIST SP ( 5.3.5) provides for long term derived credentials

A brief on Two-Factor Authentication

ViSolve Open Source Solutions

Public Key Applications & Usage A Brief Insight

Transcription:

MAESON MAHERRY 3 Factor Authentication and what it means to business. Date: 21/10/2013

Concept of identity

Identity and Access Management Authoritive Identity Source User Identity Feed and Role Management Application SSO & Strong Authentication Support Identity Provisioning Policy Management Workflow and User Lifecycle Credentials Management Recertification Attestation USERS DESK USERS MOBILE Access Control User Self-Service Identity & Administration with Role and Credential Modeling Policy Rules Engine Compliance Governance Identity Provisioning Integration Adapters MS Active Directory and MS Exchange Unix Servers ORACLE EBS RACF Databases Legacy Applications & Physical Access Control

The identity landscape is changing

The Corporate Reality Today Logical Partners Customers Physical Employees Suppliers Remote Employees 5

Balancing needs with effective implementation Drivers Physical and Logical Security Considerations Costs IP Protection Effectiveness Regulatory/Audit Pressures User Experience 6

Logical Access Complexity & cost of systems increasing Unmanaged devices Applications Different user requirements Fraud threats Audit Compliance Websites & Remote Access Windows Logon Encryption & Digital Signatures

Mobile Device Impact 50% of firms have embraced a multiplatform mobile strategy 60% of firms provide some support to personal devices * Forrester Fall 2010

Legacy Physical Access (PACs) Closed loop legacy systems Easy to clone cards No integration with Logical Access data Physical Access Reader Control Panel Panel decides who can enter door Logical Access data 9

Multiple Identities and Credentials per User Logical Access Physical Access 10 10

One Credential, multiple functions Logical No password changes Portable across devices Multiple applications Secure Physical One Card Simultaneous -legacy & new (PKI) systems. Easy Transition Secure 11

The concept of AND to protect your valuables

What are the three factors What you know What you have What you are

You have seen a digital certificate before: the yellow padlock indicates certificate based banking security

Windows Smartcard Logon What can be done? Strong certificate authentication to Windows PIN protected eliminates need for password Easy to use 15

Smart Card Log On 16

VPN What can be done? Strong certificate based authentication for remote access VPN Outlook Web Access PIN protected eliminates need for password 17

Email and Digital Signature What can be done? Secure storage of certificates for Secure email Digitally signing documents 18

Secure Email 19

Physical Access Control (PACs) What can be done? Legacy and Next Generation PACs support in one card Multiple card and applet options PIV support 20

Citizen 3FA solution

Legal Summary ECT Act of 2002 Section 14 You may have an electronic original as long as the integrity is assured Section 15 Data is rebuttable evidence and the evidential will be established by considering the reliability and integrity of the process and how the identity of the initiator was established Section 13 Advanced Electronic Signatures must be used where the law requires a signature, but where your convention is to rely on a signature, this may be any electronic signature that conveys acceptance and has evidential weight

Digital Signature capability Document Signing for integrity and accountability

Government Signing Use cases Cloud Based Workflow Existing Workflow Signing DocFusion Personal Signing BAS, Persal, Logis, SAP Document Generation Transactional Signing Organisational Signing

Authentication and electronic signatures Positive Act of Acceptance Positive Act of Acceptance with verifiable integrity Positive Act of Acceptance with verifiable integrity and F2F and 3FA Biometric Acceptance Server Chip, pin, key Chip, bio, key Electronic Signature Signature Image Password Acceptance OTP Acceptance Smartcard Digital Signature -digital certificate based Digitised tablet Signature Windows store Adv Electronic Signature - Accredited digital certificate based NID, bio, Key Mobile Phone Mobile, Pin, Key

Transactional Signing Non repudiation User enrolled with face to face verification and supporting documentation User prompted for fingerprint, smartcard and digital signature on logon User prompted for fingerprint, smartcard and digital signature on transaction approval No transaction can be concluded if user does not acknowledge with a fingerprint and a smartcard present Creates user and personalizes card with fingerprint and digital certificate Recognize request for sensitive page Create Time Stamp and seals the record before storing in the evidence vault Forensic report drawn with enrolment data, downstream page, transaction changes and fingerprint

Thank you